Counter Terror Business Volume 10

104
www.counterterrorbusiness.com | ISSUE 10 DEFENCE BUSINESS | FARNBOROUGH AIR SHOW | DEFENCE NEWS 25 John Marshall of the Perimeter Security Suppliers Association (PSSA) outlines the UK security challenges PERIMETER SECURITY Sector must adopt security solutions with longevity says BSIA PROTECTING UTILITIES Building on the inherent security strengths of digital technology TETRA 31 57 COMMUNICATIONS SECURITY ASIA FOCUS addressing the Asian counter terror, security and defence markets 43

description

The Business Magazine for Security Technology

Transcript of Counter Terror Business Volume 10

Page 1: Counter Terror Business Volume 10

www.counterterrorbusiness.com | ISSUE 10

DEFENCE BUSINESS | FARNBOROUGH AIR SHOW | DEFENCE NEWS

25

John Marshall of the Perimeter SecuritySuppliers Association (PSSA) outlinesthe UK security challenges

PERIMETERSECURITY

Sector must adopt security solutions with longevity says BSIA

PROTECTING UTILITIES

Building on the inherent security strengths of digital technology

TETRA

31 57

COMMUNICATIONS

SECURITY

ASIA FOCUS

addressing the

Asian counter terror,

security and

defence

markets

43

Page 2: Counter Terror Business Volume 10

Asset LabelsPlastic & Metal Security SealsC-TPAT Metal Bolt Security Seals

Tamper Evident Bags

NEW!

C-TPAT

PRODUCTS

Page 3: Counter Terror Business Volume 10

Contents

05 COUNTER TERROR NEWS

07 PROTECTING UTILITIESUtilities must adopt security solutions with longevity, supplied by expert and reliable security providers, says Mike Sussman

13 COUNTER TERROR EXPO REVIEWWhat happened at the UK’s premier event for counter terrorism, which featured 400 exhibiting companies, five conference streams, 12 workshops and a plethora of demonstrations

25 COUNTER TERRORISM STRATEGYWith the eyes of the world on the United Kingdom, Phil Chesworth from the National Counter Terrorism Security Office (NaCTSO) says that partnership working with businesses, Government and the police will continue to be the best long term approach to reducing the threat and impact of a terrorist attack

31 CYBER SECURITYProfessor John Walker believes the days of external simplex threats have now given way to multi-faceted attack vectors from both outside and inside the average organisation, plus a look at InfoSecurity Europe, where Cyberattacks, security budgets and BYOD were all in the spotlight.

43 ASIA FOCUSCounter Terror Business looks at three events taking place that address the Asian counter terror, security and defence markets including Securing Asia, Defence Services Asia and CBRNe Asia.

51 OLYMPIC SECURITY

With the London 2012 Olympic and Paralympic Games finally upon us, David Evans, project director for 2012 at the British Security Industry Association (BSIA), reminds us of the extensive planning that aims make the Olympics a success in terms of safety and entertainment.

57 PERIMETER SECURITYJohn Marshall of the Perimeter Security Suppliers Association (PSSA) outlines the security challenges facing the UK and highlights best practice to protect against terrorist attack, plus a look at the need for an integrated verification system for high security perimeter installation by Richie Bignell.

67 BORDER CONTROLCTB looks forward to the BORDERPOL Conference, taking place at Central Hall Westminster, London on 16th-17th October

69 COMMUNICATIONSTETRA (Terrestrial Trunked Radio) builds on the inherent security strengths of digital technology, says Phil Kidner, CEO of the TETRA + Critical Communications Association

77 POLICE AND LAWThe police service’s delivery of resources for largest ever pre-planned operation - the London 2012 Olympic and Paralympic Games - has required meticulous planning

79 SECURING OIL REFINERIESJames Kelly, chief executive at the British Security Industry Association (BSIA), looks at how the oil industry can keep safe its precious material by employing an integrated approach

89 TRANSPORT SECURITYGovernment, law enforcement and public transport officials gather together to address pressing security issues across open transport networks during Transport Security Expo at Olympia, London on 14-15th November.

93 DEFENCE NEWS

97 SECURITY RISKSCSARN gives a brief analysis of the security risks concerning the Olympic and Paralympic Games

101 FARNBOROUGH AIR SHOWA platform for some 1,400 exhibitors from the aerospace, defence, space and security sectors on the 9-15th July

PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk

EDITORIAL DIRECTOR Danny Wright ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Karl O’Sullivan PRODUCTION DESIGN Jacqueline Lawford PRODUCTION CONTROLLER Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Lucy Carter, Charlotte Casey GROUP PUBLISHER Barry Doyle REPRODUCTION & PRINT Argent Media

If you would like to receive 4 issues of Counter Terror Business magazine for £35 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET.Tel: 020 8532 0055, Fax: 020 8532 0066, or visit the Counter Terror Business website at:

P ONLINE P IN PRINT P MOBILE P FACE TO FACE

www.counterterrorbusiness.com

© 2012 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

03 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 4: Counter Terror Business Volume 10

Suddenly ‘Head of Security’ is a dream job.

Security RedefinedIt’s your responsibility for securing business and people rely on you for a safe and secure work-place. But security technology can be inflexible, complex and, let’s face it, it’s necessary but not often appreciated. What if you could make security control rewarding, reporting a pleasure and visitor management a joy? Nedap’s AEOS system delivers just this because it is the 21st century model for dynamic security management. If you’d like that dream job contact Nedap Security Management www.nedap-securitymanagement.com

Page 5: Counter Terror Business Volume 10

Counter Terror New

s

EMERGENCY PLANNINGNEWS IN BRIEF

Counter Terror Expo makes successful US debut The inaugural Counter Terror Expo US conference and expo serving the US counter-terror community, has been hailed as a success. The event featured an educational program including more than 60 speakers, 23 sessions, and four keynote sessions featuring industry-renowned speakers complemented by an exhibition of nearly 100 exhibiting companies., Counter Terror Expo 2013 is scheduled to take place in September next year in Washington, DC.

Detectives travel to Libya for Yvonne Fletcher probeTwo detectives have visited Libya as part of the ongoing investigation into the murder of WPc Yvonne Fletcher.The officers, from the Metropolitan Police’s Counter Terrorism Command, flew to Tripoli where they met Libyan officials to discuss how the investigation can be taken forward in the future. In a statement the force said: “We hope these preliminary discussions will pave the way for the MPS and Libyan authorities to work jointly to identify who was responsible for WPc Fletcher’s murder in 1984.” WPc Fletcher, who was 25, was shot dead as she policed an anti-Gaddafi demonstration outside the Libyan People’s Bureau in April 1984. The bullets which killed her and injured 10 protesters came from inside the embassy. Her death led to an 11-day siege of the building in St James’s Square and the severing of diplomatic links between the UK and Libya.

ASA upholds window film leaflet complaintAn advertisement for an anti-shatter window firm warning of the possibility of a terrorist attack during the Olympics has been banned for causing undue fear and distress, a watchdog said. Northgate Solar Controls (NSC) warned of the ‘very real threat’ surrounding the Games in a leaflet sent to businesses which also featured an image of the July 7 Tavistock Square bus bombing.

READ MORE.. tinyurl.com/76msk47

TO READ MORE PLEASE VISIT... www.counterterrorexpo.us

Guidance for pubs and clubs issuedThe National Counter Terrorism Security Office (NaCTSO) has issued a list of guidance to pubs and clubs ahead of the UK’s event-filled summer to make sure licensees and their employees keep businesses as secure as possible. With the Olympic Games on the agenda, NaCTSO has made pub operators aware of the dangers of ‘Crowded Places’. It says that large numbers of people in one place can be vulnerable to a range of criminality, including terrorism, and has provided some information on how to keep premises safe. This includes: Basic good housekeeping, which reduces the opportunity for placing suspect packages and helps to deal with false alarms and hoaxes. Pubs are advised to search their premises at all times of the day; remain

vigilant during opening hours; and ensure emergency exits are secure when not in use. Evacuation responsibilities and roles must be clearly communicated to staff, routes and

exits must be well defined and evacuation plans exercised regularly.CCTV can help clarify if a security alert is real and is often vital in any post-incident investigation. Licensees are advised to ensure that their CCTV system, if they have one, is well

maintained and has accurate time and date stamps; and that recorded images of people and vehicles are clearly identifiable and retained for at least 31 days.

TO READ MORE PLEASE VISIT... tinyurl.com/cge4spr

US journal prints bird flu researchThe US journal Science has published research on how a mutant bird flu may spread among mammals and possibly humans, following months of controversy over the risks of bioterrorism. The paper detailed how a Dutch lab engineered an H5N1 bird flu virus that can be transmitted in the air among ferrets, and followed the publication last month of findings by a US-based team that made similar advances. Last year, a US biosecurity panel called for only heavily edited results of the two papers to be released, for fear that an ill-intentioned scientist might be able to use the data to

unleash a potent and lethal form of bird flu that humans could catch easily. But international experts have since agreed that the benefits of publishing outweighed the risks. Deadly flu pandemics have killed millions of people in the past. Until now,

there have been fewer than 600 human cases of H5N1 bird flu infection in the world since it first infected people in Hong Kong in 1997, but more than half of all cases have been fatal. The World Health Organisation has tallied 606 human cases of bird flu since 2003 and 357 deaths, according to its latest report issued this month.

Jubilee provides massive Airwave test An unprecedented number of public safety organisations used the Airwave Service during the Queen’s Diamond Jubilee celebrations setting a new record for the number of users communicating on the same platform in one location. The four days of the Queen’s Jubilee celebrations saw 167 organisations connected to the network and of these, 74 represented individual bodies from the emergency services (police, fire and ambulance). These included services from Hampshire, Wales and the Home Counties. The remaining agencies using the Airwave Network were user groups from the Airwave Direct community (including the local authorities, coastal agencies and port

authorities) who were also connected. According to John Lewis, chief operating officer, Airwave: “The Thames River Pageant saw the greatest Network usage for the weekend which recorded over a million push-to-talk (PTT) interactions on the Network between 6 am and 5:30 pm. We also recorded over 11,100 connections to the Network in London at 2pm, which is a 52 per cent increase on the previous month.” A total of 25,477 radio terminals were connected to the Airwave Network during the full 24 hour period on 3 June. This compares with 6,000 at last years’ Royal wedding

TO READ MORE PLEASE VISIT... tinyurl.com/7n2gfdz

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

05 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 6: Counter Terror Business Volume 10
Page 7: Counter Terror Business Volume 10

Written by M

ike Sussman, BSIA

The utilities sector is responsible for the critical elements of our everyday life such as the water and electricity supply, gas and oil. However, changes in the social and political environment, as well as the growing scope and impact of the sector in almost evearything we do have increased its vulnerability to threats such as terrorism and vandalism. With the eyes of the world turning to the UK this summer, keeping the sector secure becomes a particularly important issue, with threat of terrorism attacks putting everyone on high alert In July 2011, the disclosure of the Department of Homeland Security’s warning of a potential threat to utility facilities in the US served as a further remainder of the ongoing vulnerability of infrastructure in the utilities sectors across the globe. Utility companies have in fact never been more exposed to risks than in today’s climate, where threats include terrorism, natural disaster, theft and internal crime. Being part of the nation’s critical infrastructure, utilities play a vital role in a country’s ability to sustain itself, and therefore the protection of key facilities such as water treatment works, power plants, remote sites and network infrastructure (particularly electricity substations) has become not only essential, but also high on the political agenda. To this end, the government has already taken specific actions to ensure the safety and preparedness, for example, of the nation’s water supply in the event of terrorist attacks, by enacting laws, developing guidelines and providing financial assistance to tighten security across the government and the private sector. Moreover, by integrating effective security measures with the day to day running of the operations, utilities companies can further guarantee the protection of their sites.

SECURING REMOTE SITESThe utilities sector is characterised by its large number of remote locations as well as multi-site offices and production facilities that are used by a variety of people on a daily basis. Remote locations have to be secure yet accessible 24 hours a day. With maintenance visits being irregular and often conducted by different staff, keys constantly change hands, increasing the security risk and potentially resulting in theft, vandalism or even acts of terrorism. Therefore, reliable and professional security companies will understand that, due to the nature of many of the remote sites in E

INFRASTRUCTURE

SECURING CRITICAL NATIONAL INFRASTRUCTUREUtilities must adopt security solutions with longevity, supplied by expert and reliable security providers. Mike Sussman, chairman of the British Security Industry Association’s Access Control section, explains how.

Infrastructure SecurityTHE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

07 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 8: Counter Terror Business Volume 10

PENTAX RICOH IMAGINGDEUTSCHLAND GmbHSecurity Systems DivisionJulius-Vosseler-Str. 10422527 HamburgGermanySales: +49 (0)40 56192109Email: [email protected]

PENTAX RICOH IMAGINGUK LTD.Security Systems DivisionHeron Drive, LangleySlough SL3 8PNUnited KingdomSales: +44 (0) 7973 154430Email: [email protected]

PENTAX RICOH IMAGINGFRANCE S.A.S.Security Systems Division112 Quai de Bezons, B.P. 20495106 Argenteuil CedexFranceSales: +33 (0) 680 614348Email: [email protected] www.pentax-security.com

PAIR-Technology Up to 140X ZOOM with build-in

2.5X Extender Full HD Resolution 1080p 2 Megapixels High Speed Motors 1/2", C-Mount Iris Override Presets Compact and Robust Optimised for use in Port Facilities,

Border Control, Coastal Oil Fields,Highway Monitoring etc.

The best just got better! PAIR Technology (Reduction of Airborne Interference, e. g. Fog, Rain, Sand, Smoke, Snow) has been

combined with a Full HD resolution 55X zoom lens for even greater quality and defi nition to offer the best possible security.

ALL NEW FULL HD PAIRMEGAPIXEL ZOOM LENS

55X

SD

HD

DON‘T TAKE OUR WORD FOR IT - SEE IT LIVE AT SECESSEN, GERMANY

SEPTEMBER 25-28

HALL 2,BOOTH 429

Page 9: Counter Terror Business Volume 10

E the utilities sector, there is a requirement for robust solutions, with security systems offering physical security as well as flexibility in terms of access control. Products should offer temporary access to mobile employees whilst balancing the need for high security, the ability to withstand attack and cope with potentially corrosive conditions due to extreme weather. Nowadays access control products such as readers can offer temporary PIN access via SMS or card-based access assigning user rights via GSM systems, ensuring the sector’s need for flexible and secure solutions can be met. As mentioned, the integration of access control systems with sturdy physical security equipment can also prove valuable, with the market continuing to become highly dependent on CEN-rated padlocks and, indeed, alternatives to padlocks that offer specially designed shields to prevent attack to the cylinders within.

MULTI-SITE OFFICES AND PRODUCTION FACILITIESAlthough administration and production facilities do not have the same issues as remote locations, they do still require protection, high security and management of access. In some cases, facilities managers or security managers are based on site, but a physical security presence is not necessarily the norm. This makes the definition of user groups, security zones, access authorisation

profiles and a suitable access control system a necessity. Security door systems are typically used in perimeter security, and online access control systems offer the ability to centrally manage access at multiple sites nationally. Whether owner-occupied with long-term requirements or sales offices rented on a short-term basis, office spaces need a flexible access control system, where users can be given right of entry depending on their job role and areas that they need to access.

SEEKING RELIABLE SECURITY PROVIDERSIn many new-build developments, architects look for hardware that blends into the design of the building. Meanwhile, occupants look for effective security measures that are easy to operate and cost effective. Expert access control manufacturers and integrators are able to advise on solutions that will take in consideration both requirements, and can offer flexible concepts based on intelligent, electronic access control systems. These systems are often also combined with a mechanical master-key system and revolving

security doors or turnstiles that, as an add-on benefit, provide excellent thermal insulation whilst regulating the throughput of employees or authorised visitors into main reception areas. When approaching security providers, utilities companies should therefore seek suppliers able to offer solutions with longevity, and with plenty of experience working with the sector, understanding its needs and priorities. Members of the BSIA’s Access Control system have extensive experience providing access control measures to the utilities sector, and have joined forces in putting together a useful guide for the sector. Entitled ‘A Guide to Access Control for the Utilities Sector’, the document brings useful insight into what utilities companies must take into consideration when looking at procuring or updating access control systems, providing also ample examples of BSIA members’ work within the sector. The guide can be downloaded by visiting www.bsia.co.uk/publications and searching for form 119. L

FURTHER INFORMATION www.bsia.co.uk/publications

Infrastructure Security

INFRASTRUCTURE

The utilities sector is characterised by its large number of remote locations as well as multi-site offices and production facilities that are used by a variety of people on a daily basis.

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

09 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 10: Counter Terror Business Volume 10

10

The new terminal was built as part of the massive infrastructure development for Delhi ahead of the highly successful 2010 Commonwealth Games. Delhi is India’s second largest airport and with the recent expansion can handle 34 million passengers per year. Airport’s create one of the most demanding security environments, with multiple operators from different agencies and departments requiring access to live and recorded video 24/7, from different locations in and around the terminal building. This requires the surveillance system to be flexible, reliable, easy to use, and low maintenance in order to avoid any delays or problems in the operation of the airport. IndigoVision’s distributed server-less IP Video architecture provides the airport with such a solution, being scalable, resilient and through a virtual matrix easy to operate, even for a project of this scale. Commenting on the success of the project, an operations manager at DIAL’s state of the art AOCC control room said, “The Control Room and all 3700 plus cameras run extremely well and without any problems. The video quality is excellent and the software

is easy to use by our operators. Due to the high number of cameras and amount of activity in the airport, it was important to have a system that provides a smooth user experience and no downtime – IndigoVision has exceeded all of our expectations.” CONTROL CENTER WORKSTATIONSIndigoVision’s ‘Control Center’ Security Management Software is at the heart of the system and is used by operators throughout the airport. IndigoVision’s distributed architecture allows ‘Control Center’ workstations to be used at any point on the network. The software provides advanced Identification Authentication Management (IAM) features, which ensure only the operators with the correct permissions are allowed to access the video. This allows the various cameras to be partitioned into groups for various departments and agencies. For added security, 120 cameras for the Immigration department have been allocated to a separate site database, with recording on their own dedicated Network Video Recorders (NVRs).

A total of 80 ‘Control Center’ workstations have been installed in three separate control rooms; the Airport Operation Control Centre (AOCC), situated in the terminal; the Airport Security Building (ASB), located off-site 250m away; and in the Air Traffic Control (ATC) centre, where aircraft ground movements are monitored. The AOCC, which is the main monitoring centre for the airport, boasts the biggest video wall in Asia. The 10 X 5 metre wall holds twenty-eight 70” screens that display the information inputs from all the airport departments through live camera feeds. Each screen can display up to 25 multiple camera images, providing the AOCC with the capacity to display 700 images at one time. Monitoring so many cameras in such a complex building is a major task for any security team. DIAL has extensively deployed IndigoVision’s real time analytics, which run at the network-edge in IndigoVision IP cameras and encoders, to help operators improve efficiency and incident response. Analytics are configured to create alarms when certain conditions in a camera scene are met, automatically alerting operators to potential problems. Examples of the analytics deployed include Virtual Tripwire for alerting entry into secure areas and Abandoned Object, used to identify luggage stuck on a conveyor belt in the baggage handling system. Operator efficiency is further enhanced by the use of IndigoVision’s integration modules to interface to the CEM access control system (over 3000 card readers) and the series of travelators and escalators from ThyssenKripp (using an OPC interface). Again the operators are automatically alerted if for example, a forced entry alarm is triggered by a door or an emergency stop button is pushed on an escalator.

VIDEO QUALITYAnother area that is vitally important for the airport is the quality and reliability of recorded video; operators and law enforcement agencies need to rely on high-quality evidential video to aid investigations and cannot afford to lose video through missing frames or unreliable equipment. IndigoVision is unique in the ability to deliver very high-quality full-framerate video with a guarantee to never drop a frame under any circumstances. This coupled with its fault-tolerant recording solution provides DIAL with the archive security they require. The airport uses a total of 57 IndigoVision 10TB Windows NVRs for recording video continuously for 30 days from all of the cameras. Ten of the NVRs are used as backups, automatically recording video from any of the primary NVRs that go off line. L

FURTHER INFORMATIONTel: +44 131 475 [email protected]

IP VIDEO

A SMOOTH USER EXPERIENCEIndigoVision’s integrated end-to-end IP Video solution has been used for a 3700 plus camera surveillance system in the new Terminal 3 at Delhi International Airport. The project is believed to be the largest single installation of an IP Video system anywhere in Asia

Adve

rtise

men

t Fea

ture THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 1010

Page 11: Counter Terror Business Volume 10

11

30 St Mary Axe, widely known as ‘The Gherkin’ is situated on the former site of The Baltic Exchange and at 180m tall, is the third tallest building in the City of London. ‘The Gherkin’ is a multi-tenanted commercial office block occupied by a number of the world’s best known insurance and legal businesses. The distributed and open architecture of IndigoVision’s IP Video system provides the ideal installation platform for the migration of legacy CCTV and the seamless integration with other security systems. Using this advanced capability, Universal Security Systems Ltd, IndigoVision’s Authorised Partner, implemented a fully integrated surveillance, access control and intercom solution. The new surveillance system replaced old analogue CCTV matrix and DVR equipment with a fully digital network solution using an IP-based distributed virtual matrix. This allows any component in the system to be located at any point on the IP network, delivering a scalable and flexible solution that was a key factor in IndigoVision being chosen for the project. All of the original analogue fixed and PTZ cameras were reused and the migration was achieved without any disruption to building operations, an important consideration for a building of this type with diverse activity occurring 24/7.

HIGH QUALITY AUDIO AND VIDEOIndigoVision’s ability to stream high-quality, fully synchronised audio across the network alongside the video, allowed Universal Security Systems to develop an innovative video intercom system, recording audio from existing intercom equipment with the appropriate video from nearby cameras. The security of the video archive, through the use of a resilient and redundant recording solution, was another important factor for the building owners choosing IndigoVision. Video is recorded on 6 standalone IndigoVision Network Video Recorders (NVRs), with a seventh used as a failover backup. Should any NVR fail or be taken off-line for maintenance, the backup automatically starts recording in its place. The standalone NVRs have a Linux-based software engine and a fault tolerant design with dual redundant network and power supply connections. Two ‘Control Center’ workstations are used in the Security Office to monitor live video and analyse recorded footage from all of the cameras. ‘Control Center’ provides advanced analysis tools such as motion thumbnails for fast incident review. Guard tours, sequences and Privacy Zones are all supported, with

video being displayed on PC viewing panes or traditional monitors. Operators can view an interactive map of the entire site to quickly locate cameras and alarms. L

FURTHER INFORMATION Tel: +44 131 475 [email protected]

The distributed and open architecture of IndigoVision’s IP Video system provides the ideal installation platform for the migration of legacy CCTV and the seamless integration with other security systems.

IP VIDEO

SECURING THE GHERKINIndigoVision’s integrated IP Video surveillance system has been deployed as part of a major security upgrade at one of London’s most iconic skyscrapers

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

11 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 12: Counter Terror Business Volume 10

YOUR HIGH QUALITY PRODUCTS.......REQUIRE HIGH QUALITY PROFILES.

Unit 6a, Hessay Industrial EstateHessay

YorkNorth Yorkshire

YO26 8LE

Laser Cutting,WaterJet Cutting,

& Sheet Metal Folding

www.YorkshireProfiles.co.uk

Mild Steel, Stainless Steel, Aluminium, Copper, Brass, Bronze, Wood, Acrylic, Perspex, Hardox, Zintec, Galvanised Steel, Nylon, Titanium, Composite Materials, Fibreglass,

Ceramics, Marbles, Stone, Rubbers, Foams, Fabrics and many more!

Up To 200mm Thickness.

Delivery to anywhere in the UK mainland.

Tel: 01904 737 095 Fax: 01904 737 [email protected]

Page 13: Counter Terror Business Volume 10

There they saw 400 exhibiting companies, five conference streams, 12 workshops and a plethora of demonstrations and showcases as well as partaking in numerous private meetings. The show delivered visitors from across government, police, military, critical national infrastructure, emergency services, border control and transport security. There was significant increases from attendees within the private sector/critical national infrastructure, MOD, training, government, transport security and border control/customs & immigration.

Terrorism is a global issue, with attacks taking places in many countries around the world. Never has there been a greater need to share best practice and learn from current and past operations and incidents. London makes an ideal location to bring together the wider international counter terror community to search out best of breed solutions, learn from detailed case studies and network with global partners. The show already delivers security and counter terror professionals from 68 different countries around the world, and this is set to grow going forward as we make the fight against terrorism more cohesive and learn from other countries experiences. Spending on counter terror is set to increase - the continuing threat to civil and national security is clearly evidenced by the growth of spend cited at Counter Terror Expo. Over the next 12 months, more than 46 per cent of attendees are due to spend over £100,000 with double the amount of purchases exceeding £1

million of orders from last years show. Counter Terror Expo 2012 provides an opportunity for the entire industry to meet, network and source new technologies and equipment. The show saw over 400 exhibitors showcase hundreds of products to meet the services of over 32 sectors, including access control, explosive detection, information management and security systems, technical clothing and protection, training services, oil & gas security, cyber security and support vehicles.

VIPS – KEY DELEGATIONS ATTENDEDFor the first time, Counter Terror Expo successfully launched a dedicated VIP and International Delegation Programme hosted by Admiral the Right Honourable, Lord West of Spithead. This brought over 168 VIPs, senior military and government officials from across the globe including delegation groups from Belgium, Canada, European ECSA, Kuwait, NATO, Netherlands, Norway, Russia, Saudi Arabia and Pakistan. Complemented by a E

COUNTER TERROR EXPO REVIEW

COUNTER TERROR EXPO DELIVERS THE GOODSSince its launch in 2009, Counter Terror Expo has been growing at a substantial rate, with the 2012 event producing a record attendance - 8,519 members of the global counter terror community came together between 25-26 April.

Counter Terror ExpoTHE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

13 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 14: Counter Terror Business Volume 10
Page 15: Counter Terror Business Volume 10

E fully hosted meet the buyer programme, these initiatives brought the requirements of the end user community directly to the most relevant solutions and innovations offered by the Counter Terror Expo exhibitors.

CONFERENCECounter Terror Expo hosted five highly targeted conference streams focused on global counter terrorism, protecting crowded places, critical national infrastructure – protection, security and resilience, cyber security and electronic terrorism and the cost of terrorism to business – best practice risk assessment. Delivering 95 high level speakers from across the counter terror spectrum, the conference successfully ensured that delegates received up-to-date and accurate analysis, critical to protecting and shaping future policy. The speaker line up was made up of top level counter terror and security experts, including Dr Jamie Shea, Deputy ASG, Emerging Security Challenges Division, NATO, Charles Farr, director general, Office for Security and Counter Terrorism, Home Office and John Tesh, deputy director, Civil Contingencies Secretariat, Cabinet Office. Event director Philip Hunter stated: “Threats to the safety of the public at large continue to threaten us and dominate the news headlines: from allegedly linked Al Qaeda terrorist attacks in Syria recently; to the recent events surrounding the “Underwear bomber”; to the recent Anders Breivik court case in Norway; the analysis and prevention of these sorts of events is the entire raison d’être behind Counter Terror Expo. “We gather world-leading experts in the

field of counter terrorism together annually, to showcase, discover and debate current and emerging issues and solutions and determine necessary counter measures moving forward. “Beating the terrorist threat is a collaborative process and Counter Terror Expo exists to foster close cooperation amongst the principal agencies, organisations and industry suppliers responsible for the wellbeing of the public.”

PLANS FOR 2013Counter Terror Expo continually evolves to reflect the threat horizon, in conference, workshop and exhibition format. As Clarion Events begins building on this year’s success to design Counter Terror Expo 2013 (which takes place again in Olympia, London, 24th–25th April) to look at both emerging issues and future threats. Phil Hunter explained on site at the 2012 event about the expectations he had for the show and the year ahead: “Counter Terror Expo continues to deliver deep insight into the global, regional and national security issues faced by the primary agencies and

organisations tasked with delivering solutions to ongoing and emerging threats, worldwide. We are very excited about our plans for the 2013 event and they include a range of new areas, new focus points, new content and new demonstrations, all geared to keeping the attendees up to speed with the latest in threat prevention and management.”

IEDD DEMONSTRATION THEATREPerhaps the most common and widely used weapons of the terrorist are Improvised Explosive Devices (IEDs). On the battlefield, in the public transport arena and within the urban environment, the threat from IEDs remains potent. Advanced threat detection methods, threat handling techniques and threat containment solutions, are helping to mitigate the danger inherent in safe IED disposal and enhance the safety of those engaged in this difficult work. This feature was one of the most popular events for the 2012 show targeted specifically at EOD regiments, police, bomb disposal teams, fire, military and special ops teams. The demo will continue E

From allegedly-linked Al Qaeda terrorist attacks in Syria recently; to the recent events surrounding the ‘Underwear Bomber’ to the recent Anders Breivik court case in Norway; the analysis and prevention of these sorts of events is the entire raison d’être behind Counter Terror Expo

Counter Terror Expo

COUNTER TERROR EXPO REVIEW

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

15 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 16: Counter Terror Business Volume 10

Infranor Defence & Security Applications

Infranor Group offers innovative solutions from detailed design through to manufacture.

We are your global partner for servo motors, servo drives, servo amplifiers, servo controllers and complete distributed or non-distributed automation systems.

For over 30 years we have been manufacturing and supplying products and solutions to OEM’s in the defence, security, training and simulation markets.

Our production facilities are based in Europe. We can support your business with sales and engineering organizations based in the US , Europe and China . This allows us to adapt and change rapidly to a constantly changing customer need.

[email protected]

Page 17: Counter Terror Business Volume 10

XtraforsPrime, AC Servomotors

The slot less stator design results in outstanding technical properties such as high speed, high torque, zero cogging, minimal torque ripple, high efficiency and high rigidity. This results in making these motors perfectly suited for various demanding servo applications within the defence, security and flight simulation industries.

The Inranor Group

Infranor creates added value for its customers by providing tailor-made motion solutions. Based on strong working relationships, Infranor offers extensive market know-how, comprehensive engineering skills and a wide range of high-quality products leading to productivity gains and therefore to comparative advantages for its customers in their respective markets.

[email protected]

The Infranor Group is divided into two divisions:

The Infranor Division operates as an industry-independent drive specialist, particularly in the general servo and drive technology area. These products and services are used by manufacturers of machinery and equipment in many different industries. The Infranor Division is structured into product companies and engineering/sales companies.

The Cybelec Division is a total provider of automation equipment for bending presses including controls, i/o units, fieldbus systems, drives and motors. The company also supplies controls for machine-tool manufacturing and general machine automation.

Page 18: Counter Terror Business Volume 10

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 1018

26 Tyne Road, Sandy, Bedfordshire, SG19 1SATel: +44 (0) 1767 680300 - Fax: +44 (0) 1767 680400

E-mail: [email protected]: www.kinematic-eng.co.uk

CMM - Metrology Services & Productsn CMM Test Item measurement reports (measurement volume of co-ordinate measuring machine: - 90 cm x 150 cm x 90 cm)n CMM Turn Key projects, dimensional & SPC data reportsn CMM Reverse Engineering development datan CMM Batch & 1st Off measurement reportsn CMM Training & supportn CMM Auxiliary Equipment & Accessories

visaudio

secure, hygienic and simple

As seen at Counterterror Expo 2012 10% discount with this advert

CT10/MAY12

Connector Solutions through Distribution

• Extensive Connector Inventories (150,000 + part numbers)• Qualified assembling distributor of the Souriau D38999 Series 3 & 1 including zinc cobalt , zinc nickel , and steel shells with a 3 day turnaround• Competitive pricing on connectors and accessories• Extensive technical knowledge and technical support• System complies with the requirements of ISO9001:2008 • Kanban / Just In Time ( JIT ) Agreements available• Scheduled Call Off Orders available www.servoconnectors.co.uk

[email protected]+44 [0] 1797 322500

Page 19: Counter Terror Business Volume 10

legacy or new, and provide intelligence and data in real time on the current state of play within any given situation. By co-ordinating data and intelligence over IP networks from multiple systems and security points, organisations, police, armed forces, emergency services, homeland security, intelligence agencies and security personnel can respond faster and better to evolving situations. The Integrated Security Zone will bring together some of the leading suppliers of integrated solutions with a full workshop programme to demonstrate: intelligence reporting and analysis, video management systems, video analytics, CCTV, perimeter security, access control, biometrics, PSIM software, risk identification and management, integrated physical security solutions, integrated access control, biometrics, command & control, life critical systems, data analytics, GPS tracking and GIS mapping.

OIL & GAS ON/OFF SHORE SECURITY ZONEOil & Gas installations and exploration operations are critical in supplying society’s power needs and represent one of the core areas of critical national infrastructure. By their very nature, their on-shore facilities cover wide expanses of land, while their off-shore facilities are, by definition, remote. Both are linked by vulnerable networks of pipelines and support facilities that need to be protected from a multitude of threats including: terrorist attack, sabotage, illegal tapping, and natural disasters. There is a wide range of facilities involved in this sector, from oilfields and refining base areas, to the headquarters of the operating companies or contractors, to pipelines, seaports, airports and power generating facilities. All of them require unique security solutions in order to protect, not only the assets, but also the people involved in each part of the supply chain. The Oil & Gas Security Zone at CTX 2013 will cover solutions including: blast protection systems, fire protection & suppression, command & control technology, fibre optic transmission systems, IP based transmission systems for CCTV surveillance, close protection, hostage crisis management, counter industrial espionage, VIP & rig protection, ROV’s, CCTV integrating specialised cameras (i.e. explosion-proof, thermal cameras, etc.), integrated plant-wide security-perimeter, radar & sonar detection,

floating barriers, diver disruption systems, fast craft detection, autonomous underwater surveillance, scanning and screening, persons on-board monitoring (POB), intrinsically safe detection, surveillance and access control.

MARITIME SECURITYSecurity and defence are key challenges for the maritime world at this time of changing global circumstances. Threats from terrorism, piracy and political crises need new solutions and joint actions for the protection of shipping routes, ports, harbours and our supply chain. For 2013 Counter Terror Expo will contain a new zone dedicated to the following solutions for combating this increasing risk: surveillance and security systems, sensors and communication systems, command and information systems, underwater security equipment, unexploded ordnance disposal, high risk shore-end cable–lay, underwater pipeline security, ISPS (International Ship and Port Facility Code), training courses, maritime border and cargo security equipment, anti- piracy services to safeguard ships, on-shore marine intelligence, on-board security staff, non-lethal defence, ship security assessment services, counter piracy audits and hardening, hostage negotiation trainings, crisis management services and anti-smuggling solutions, on-board security systems, repelling solutions, radar & sonar detection, ship detection, on-board armaments, and special ops equipment, among others.

COUNTER TERROR & SPECIALIST SECURITY AWARDSThe great and the good of this business gathered together for an evening of networking, fun and celebration of the health and strength of the counter terror industry after the first day of the show this year. The CTSS Awards were the highlight of a formal Gala Dinner. The winners, as voted for by members of the global security community, were announced by Nadia Dunn - producer/director and reporter at the BBC. Awards were presented in the following categories. Voting was open to anyone in the industry. Products were nominated and then shortlisted by a panel of judges, who were then asked to choose the ‘best of breed’ in their respective areas.

CLARION EVENTS TAKES OVERThis year saw the handover of ownership from Niche Events, who launched the show, E

Counter Terror Expo

COUNTER TERROR EXPO REVIEW

E to showcase, live, scenario based IEDD demonstrations, featuring a range of ROV (Remote Operated Vehicle) solutions, hook & line solutions and protective suits.

ARMOURED & SUPPORT VEHICLE ZONEArmoured vehicles offer crucial protection to the services of Homeland Security, counter terrorism, police security, force protection and SWAT teams as well as protecting key personnel in more volatile areas of the world. Aimed specifically at purchasers, fleet operators and end user specificers from embassies, government personnel and MP’s, private enterprise looking to protect C level and above, VIP and critical personnel, police, military, tactical, special ops and private security, this area will feature a dedicated Armoured Vehicle Zone within the exhibition hall to exhibit armoured vehicle manufacturers, armouring solutions, accessories, retro-fit solutions, up-armouring and upgrades.

CYBER SECURITY CONFERENCEThe Internet has long been an integral part of our society, from personal to enterprise level businesses; from governmental usage to national and international level operations. It is all pervasive and of fundamental importance to our society today. Cyber Security, therefore, is one of the highest areas of interest within the security market. Its security threats range from the personal to the corporate, and right up to national security, whether through terrorism, crime or industrial espionage. Cyber terrorism, e-Crime and Cyber-crime are now a fact of life, and we have to be prepared, in our security and counter terrorism strategies, to guard against attacks of this nature to protect our access to the internet, our data, key systems and networks. The Cyber Security Conference and Solutions Zone will focus on the strategic analysis of cyber security for homeland security, governments, critical national infrastructure and enterprise level corporations. It looks at cyber security from a strategic level, not the IT management level, and covers strategic content and solutions for advanced evasion techniques, secure global networks, secure government ICT networks, secure online platforms, threat naturalisation software and systems, threat awareness software, cyber security strategies, CNI data and systems resilience, cyber investigation solutions, data protection and storage, and regulatory compliance.

INTEGRATED SECURITY ZONEWhen it comes to mission-critical security operations within complex environments, single, stand-alone security solutions are simply not enough. Government facilities, critical national infrastructure, military bases, safe city projects and global corporations need to look at multiple, integrated security solutions which can connect up, whether

Security and defence are key challenges for the maritime world. Threats from terrorism, piracy and political crises need new solutions and joint actions for the protection of shipping routes, ports, harbours and our supply chain

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

19 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 20: Counter Terror Business Volume 10

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 1020

Manufacturer and supplier of QuartzCrystals Oscillators and Filters

High ShockResilience

CrystalsOscillators

Special ProductSelection

MiniaturePackages

MiniaturePackages

MilitarySpecifications

High OperatingTemperature-55 ~ 220°C

TCXO

OCXO

VCXO

LVDS

PECL

LOW EMI

Euroquartz has been manufacturing and supplying quartz crystal product since 1982, our aim is to offer a comprehensive, design led, support for our customer’s.

Euroquartz Ltd, Blacknell Lane Ind Estate, Crewkerne, Somerset, TA18 7HE TEL: 01460 230000 FAX: 01460 230001

Website: www.euroquartz.co.uk email: [email protected]

• 15yearsofexperienceinhighmix,highvaluePCBandproductassemblies

• Areputationforconsistentlydeliveringqualityandreliability

• Thecapacitytogrowwithcustomerneedsandrequirements

• Highcommitmenttomanufacturingexcellencewithongoinginvestmentsininnovationandtalent

• Competitivepricingwithfastturnaroundmanufacturingservice

• Servingawidecustomerbaseoperatinginamyriadofverticalmarketsandindustries

DOUBLESIDED&MIXEDTECHNOLOGYPCBASSEMBLIESRAPIDPRODUCTPROTOTYPINGNPISERVICEFR4POLYIMIDEFLEXRIGIDHIGHTGMULTILAYERPCBsPACKAGEONPACKAGE(PoP)PROGRAMMING&TESTINGSERVICES(HALT,ESS,FLYINGPROBES,BOUNDARYSCAN,GOEPEL,JTAG,ICT,RFTESTING& GPS EMULATION) 3D XRAY & IPCA610D COMPLIANCE INSPECTION SERVICE AOI INSPECTIONWITHCOPLANARITYLASERMODULECABLEHARNESSES&ELECTROMECHANICALASSEMBLIESSMALLTOVOLUMEPRODUCTIONCAPABILITIESCOMPLETEBOXASSEMBLIES&PRODUCTSUPPORTGLOBALPROCUREMENT FOR BAREBOARDS, COMPONENTS & METALWORKS, DESIGN FOR MANUFACTURE………

BS.EN.ISO9001:2008●BS.EN.ISO140012004●IPCA610D(Class3+)●IPC/WHMA620

Page 21: Counter Terror Business Volume 10

E to Clarion Events. The process was aided by a long working partnership over many months, involving a large amount of co-working and transition planning, culminating in the handover at the end of the 2012 show. Clarion Events has grown to become one of the largest independent event organisers based in the UK, and has a portfolio of specialist defence and security events globally, with offices in Germany, The Netherlands, Turkey, Brazil, Singapore, South Africa, United Arab Emirates and the US. Clarion Events’ other defence & security products include DSEI, LAAD (Latin American Aerospace and Defence) - and its security equivalent, LAAD Security - ITEC, Counter Terror Expo US, Forensics Europe Expo, Future Land Forces, UAS Conference, UDT, UDT Asia, Combat Trauma Innovation and a number of other high profile conferences and events.

BIG NAMES INVOLVED IN 2013Many of the leading names in the industry have already made their commitment to the 2013 show, which features a revised floorplan to allow for new features and create and even more favourable flow of visitors. L

FURTHER INFORMATIONTel: +44 (0) 20 7384 [email protected]

Counter Terror Expo

COUNTER TERROR EXPO REVIEW

Counter Terror & Specialist Security Awardsn Access Control, ID and Biometrics - Abloy UK

n Armoured Vehicles, Support Vehicles and Emergency Vehicles - Access Risk Control Ltd

n Building and Facilities Protection - Security Blinds

n CBRNe Detection and Protection - Northrop Grumman

n CCTV and Monitoring - BRS Labs

n Communication Systems - Northrop Grumman

n Cyber Security and Electronic Security - Northrop Grumman

n Electro Optic, Thermal Imaging and Night Vision - Laser Optical Engineering

n Improvised Explosive Device Disposal - Northrop Grumman

n Perimeter Protection and Intrusion Detection - Becatech

n Personal Protection Equipment - VestGuard UK

n Surveillance, Data and Intelligence - Co-Decision Technology

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

21 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

RangeWe offer one of the widest ranges of waterproof cases available

ApplicationsThe strength, waterproof and dustproof characteristics ofParaPro cases ensure they offer absolute protection evenin the most extreme and harshest of environments.The cases have been subjected to a series of test toprove their suitability for use in these environments andto ensure they meet the demanding standards of IP67and Defence Standards.

InteriorsParotec Solutions also provide an in-house foam interiordesign and manufacturing service to reduce lead time fora special design to a minimum.

www.parotecsolutions.co.uk or Call Sales on: 01204 868630

Page 22: Counter Terror Business Volume 10

P KHYDRAULICS LTDRIGHT CONNECTION

Portable Hydrostatic Test Units (available for hire)

Quality pressure test equipment designed and manufactured in Aberdeen by PK Hydraulics

Based in Aberdeen, PK Hydraulics is a well established Hydraulics company serving the needs of major oil companies and smaller businesses alike.

Our quality policy means we are certified to BS EN ISO 9001 standard and we are recognised by the British Fluid Power and Distributors Association. In addition, we hold Shell Approval and are official distributors for many industry leaders in the supply of Hydraulics, Hose Assemblies, Valves and Fittings. We are confident our staff have the technical knowledge to service, supply and provide prompt efficient quotations to meet the requirements of our customers.

To meet the growing demand from our customers our product range is constantly expanding. This combined with our excellent communication skills and commitment to prompt and punctual delivery makes PK Hydraulics a name you can depend on.

PK Hydraulics is the official distributor for Curtiss-Wright Flow Control Sprague Products

Sprague Products Advanced High Pressure Applications For 60 years Sprague Products has been a leader in the development and manufacture of high performance and high quality products designed to operate on applications requiring zero leakage at high operating pressures.

Air Driven Liquid Pumps Pressures to 33,000 PSI (2,310 bar) Air Driven Gas Boosters Pressures to 10,000 PSI (690 bar) Air Driven Power Units for Hydrostatic Testing, Wellhead Control Pumps, Wellhead Injection Pumps, Valve Actuation, Valve Testing, Accumulator Charging Nitrogen, CO2, Helium, and Nitrous Charging Bolt Tensioning. Commitment to Quality, Reliability and Safety

At Sprague Products, we are committed to outstanding quality, reliability, and safety for all of our products.

Sprague Products – ISO 9001 2000 – 97/23/EC Pressure Equipment (PED) - 94/9/EC ATEX

USA: 10195 BRECKSVILLE ROAD, BRECKSVILLE, OHIO. 44141 t: 440.838.7690 f: 440.838.7528

EUROPEAN SALES OFFICE - WAREHOUSE: Gore Cross Business Park, Corbin Way, Bridport, Dorset, UK DT6 3UX t: +44 (0) 422256

Any customers wishing to discuss a particular application, should contact:PK Hydraulics LTD, River House, South Esplanade East, Aberdeen, AB11 9PB T: 01224 249 600 F: 01224 870 701 [email protected]

sprague.cwfc.com

Page 23: Counter Terror Business Volume 10

The rapidly expanding business, founded by Kevin Watson and Peter Elphinstone in April 2005, continues to go from strength to strength. Formed primarily to offer a service to the oil and related industries, its relationship with prestigious distributors and suppliers has been a major factor in PK Hydraulics’ success with its customers. The company has taken the deliberate decision to associate with distributors and communicate with suppliers of stature. This is highlighted by the quality of products it stocks and by the fact it has been accepted as a Shell approved supply company. PK Hydraulics has quadrupled its staff numbers since its inception, and the company’s new premises were purchased with considerable expansion in mind. Stretching to 22,000 sq. ft. of workshop and office space, the location is conveniently situated for the harbour, road, rail and airport. LATEST TECHNOLOGYThe Aberdeen company boasts the latest technology in hose management systems. This in turn guarantees efficiency, which allows it to offer a first-class service to its customers. PK Hydraulics’ quality policy means it is certified to BS EN ISO 9001 standard and is recognised by the British Fluid Power and Distributors Association. In addition, it holds Shell Approval and is the official distributor for many industry leaders in the supply of hydraulics, hose assemblies, valves and fittings. Managing director Kevin Watson said: “We are confident our staff have the technical knowledge to service, supply and provide prompt efficient quotations to meet the requirements of our customers. To meet the growing demand from our customers our product range is constantly expanding. This, combined with our excellent communication skills and commitment to prompt and punctual delivery, makes PK Hydraulics a name you can depend on.” He continued: “And PK Hydraulics is pleased to announce we have successfully enhanced the business by developing a rental department. Rentals range from test pumps, swaging machines, gas boosters, flushing rigs etc. We have a lot of the specialised equipment that our clients need, and we still afford the customer the opportunity to purchase hose, fittings, valves and pumps. It is always our aim to provide customers with materials, equipment and services in a timely manner.” PK Hydraulics continues to lead from the front thanks to the quality of its workforce.

The company’s employees are technically educated and highly motivated, and work together as a team. This is a significant factor in helping it to achieve its goals. Leading European manufacturer Larzep has appointed PK Hydraulics as its sole distributor in Scotland. This development further enhances the Aberdeen company’s supplier portfolio and once again broadens the range of products and services it can offer to clients. Larzep is a leading European manufacturer of 700bar hydraulic tools and lifting equipment. Its products are used in a wide variety of applications including: oil

and gas, mining, railways, construction, manufacturing ship-building and maintenance, aerospace and power stations. Kevin continued: “We are also a distributor for Cejn Products, the quick connect specialist. Since 1955, Cejn has expanded its product line from compressed air to include and cover all media such as breathing air, hydraulic oil, fluids and gases.” L

FOR MORE INFORMATIONVisit www.pkhydraulics.co.uk for the full range of equipment offered by PK Hydraulics.

To meet the growing demand, our product range is constantly expanding. This, combined with our excellent communication skills and commitment to prompt and punctual delivery, makes PK Hydraulics a name you can depend on.

PK HYDRAULICS

LEADING FROM THE FRONTAberdeen’s industry-leading PK Hydraulics is a well-established company serving the needs of major oil firms and smaller businesses alike

Advertisement Feature

P KHYDRAULICS LTDRIGHT CONNECTION

Portable Hydrostatic Test Units (available for hire)

Quality pressure test equipment designed and manufactured in Aberdeen by PK Hydraulics

Based in Aberdeen, PK Hydraulics is a well established Hydraulics company serving the needs of major oil companies and smaller businesses alike.

Our quality policy means we are certified to BS EN ISO 9001 standard and we are recognised by the British Fluid Power and Distributors Association. In addition, we hold Shell Approval and are official distributors for many industry leaders in the supply of Hydraulics, Hose Assemblies, Valves and Fittings. We are confident our staff have the technical knowledge to service, supply and provide prompt efficient quotations to meet the requirements of our customers.

To meet the growing demand from our customers our product range is constantly expanding. This combined with our excellent communication skills and commitment to prompt and punctual delivery makes PK Hydraulics a name you can depend on.

PK Hydraulics is the official distributor for Curtiss-Wright Flow Control Sprague Products

Sprague Products Advanced High Pressure Applications For 60 years Sprague Products has been a leader in the development and manufacture of high performance and high quality products designed to operate on applications requiring zero leakage at high operating pressures.

Air Driven Liquid Pumps Pressures to 33,000 PSI (2,310 bar) Air Driven Gas Boosters Pressures to 10,000 PSI (690 bar) Air Driven Power Units for Hydrostatic Testing, Wellhead Control Pumps, Wellhead Injection Pumps, Valve Actuation, Valve Testing, Accumulator Charging Nitrogen, CO2, Helium, and Nitrous Charging Bolt Tensioning. Commitment to Quality, Reliability and Safety

At Sprague Products, we are committed to outstanding quality, reliability, and safety for all of our products.

Sprague Products – ISO 9001 2000 – 97/23/EC Pressure Equipment (PED) - 94/9/EC ATEX

USA: 10195 BRECKSVILLE ROAD, BRECKSVILLE, OHIO. 44141 t: 440.838.7690 f: 440.838.7528

EUROPEAN SALES OFFICE - WAREHOUSE: Gore Cross Business Park, Corbin Way, Bridport, Dorset, UK DT6 3UX t: +44 (0) 422256

Any customers wishing to discuss a particular application, should contact:PK Hydraulics LTD, River House, South Esplanade East, Aberdeen, AB11 9PB T: 01224 249 600 F: 01224 870 701 [email protected]

sprague.cwfc.com

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

23 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 24: Counter Terror Business Volume 10

An OSI Systems Company

Rapiscan Systems - the Leading Provider of Security Screening SolutionsSecurity. Performance. Value. When it comes to your security needs, Rapiscan Systems understands the environment in which you operate — and knows how to protect it.

With the broadest range of products for major events, aviation security, border protection, perimeter security and personnel screening, we provide comprehensive, fully-integrated security solutions.

And with over 15 years experience, global expertise and a world class service and support network, we have the proven capability to meet your most demanding requirements – on time and on budget.

To learn more or to schedule a demonstration, contact us at +44 (0) 870-7774301 (EMEA), +1 310-978-1457 (Americas), or +65 6846 3511 (AsiaPac).

Come and visit us at Counter Terror Expo 2012, London Olympia, April 25-26, stand number E70.

Metor 6M

Rapiscan 620DV

Rapiscan 638DV

SECURE MORE.

SCAN

MO

RE

.

[email protected] • www.rapiscansystems.com ONE COMPANY - TOTAL SECURITY

Rapiscan Systems is the official security equipment and systems supplier for the London 2012 Olympic and Paralympic Games.

Page 25: Counter Terror Business Volume 10

Written by Phil Chesw

orth, NaTSCO

One of the objectives in the UK Government’s counter terrorism strategy ‘Contest’ is to improve protective security for crowded places. Better protective security will help reduce our vulnerabilities to terrorist attack. This in turn will help reduce the impact of an attack if it should take place, not only in terms of reduced fatalities and casualties but also in terms of helping businesses recover more quickly. Since 2001,NaCTSO, a small police unit co-located with the Centre for Protection of National Infrastructure (CPNI), has been largely responsible for turning counter terrorism strategy in to local delivery of CT protective security advice to business and organisations who may be most at risk from a terrorist attack. NaCTSO work very closely with the Office of Security and Counter Terrorism at the Home Office (OSCT) in agreeing the means of delivering a nationally consistent approach to assessing the risks to crowded places and the provision of security advice.

WHERE IS THE THREAT TO OUR CROWDED PLACES FROM TERRORISM?We only have to look at those terrorist attacks that have taken place in the UK in recent times

such as 7/7, Haymarket in London, Glasgow Airport that terrorist groups perceive an attack on places where people congregate in large numbers or in confined spaces as a means of causing mass casualties and mass disruption. We also need to remember those very recent foiled or unsuccessful plots that have targeted UK transport hubs, retail and shopping centres, and entertainment areas to know that the threat from terrorism is still substantial. However, we also need to look overseas at current and emerging attack methodology used by terrorist groups and lone actors and adapt our CT security advice to meet an evolving threat.

HAS THE PLANNING AND IMMINENT ARRIVAL OF THE OLYMPIC GAMES HAD AN EFFECT ON THIS WORK?The Home Office and NaCTSO have strived to ensure that the events during 2012 will not adversely affect our business as usual in protecting other crowded places before, during and after the games. There will rightly, be extensive security around the Olympic venues over the games period to target harden the sites. Our challenge, as

always is to continue to provide the best possible proportionate security advice to businesses across all crowded places sectors and ensure that they are not perceived as a soft target compared to games venues.

SO HOW IS ADVICE DELIVERED TO THOSE BUSINESSES?The Home Office (and Scottish Government) provides dedicated funding for a network of Counter Terrorism Security Advisers (CTSAs) based within all UK police forces. This allows for the CTSAs to focus on those nationally agreed priorities contained in the Contest strategy which includes the protection of crowded places. CTSAs work alongside their CT policing colleagues in police forces, making them best placed to know their local communities, able to access the current threat and intelligence picture and engage with businesses in their areas most at risk from terrorism. All of our CTSAs undergo extensive training, accreditation and continual professional development. Business engaging with their local CTSAs can be confident that the free and independent advice they receive will be threat informed, impact driven and vulnerability focused.

WHAT DO YOU THINK IS THE FUTURE DIRECTION FOR THIS ENGAGEMENT?In these times of financial uncertainty and funding austerity, making the best use of resources combined with stakeholder engagement at all levels takes on even more significance. Firstly, NaCTSO and CTSAs are committed to long term partnership development at local and national level and to build on existing good practice. Many of the security measures that can provide substantial protection from a terrorist attack such as hostile vehicle mitigation and enhanced glazing can take considerable time, effort and resources to implement. Our long term commitment is to continue to support and encourage site owners and operators who ultimately hold the risk for their sites E

COUNTER TERRORISM STRATEGY

PROTECTING CROWDED PLACESThe eyes of the world are on the United Kingdom this year like never before with events such as the Olympic Games and Queen’s Diamond Jubilee celebrations. Phil Chesworth from the National Counter Terrorism Security Office (NaCTSO) says that partnership working with businesses, Government and the police will continue to be the best long term approach to reducing the vulnerability and impact of a terrorist attack on our everyday crowded places, long after the Olympic flame has been extinguished

Counter Terrorism Strategy

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

25 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 26: Counter Terror Business Volume 10

Sarix TI is not only the evolution of thermal imaging but a “game changer” according to judges at this year’s IFSEC Security Industry Awards. Named the CCTV camera of the year, Sarix TI further cements its position as the leading thermal imaging solution for video security applications.

Thanks to its all-digital design, the Sarix TI family of thermal imaging cameras is redefining image quality and performance for customers interested in affordable thermal technology. Delivering the highest video quality in low-light and no-light environments, Sarix TI is an ideal choice for border and perimeter security, port and industrial installations as well as other locations where ambient light is at a premium.

To see how the 2012 IFSEC Camera of the year is redefining thermal imaging for today’s critical video security applications and enter to win an Ipad 2 visit www.sereply.com and enter 21171P

Sarix TI“The game changer”

WINNER

Page 27: Counter Terror Business Volume 10

E to embrace the need for better security. At a local level we will continue to work closely with our existing higher risk crowded places to support the reductions in vulnerability and impact of an attack through recommended physical security measures and response planning to deal with major incidents. We will also continue to deliver Project Argus and Griffin events to staff and management at these sites to raise awareness and skills. Secondly, CTSAs across the UK are working with architectural liaison officers and crime prevention design advisers to establish a robust process with local authority planning departments that will identify planning applications for new builds and redevelopments that would benefit from CT protective security advice at the design and planning stage. This is easily the most cost effective and appropriate point in the process to include security measures to mitigate against a range of attacks and any future increases in threat. This approach dovetails with the existing Argus Professional and Planners products that CTSAs deliver to architects, planners and developers. From a national perspective, NaCTSO and the Home Office recognise the need to engage with stakeholders such as professional bodies, the security industry and national and international companies at corporate level to ensure that existing and future products are fit for purpose, have stakeholder approval for delivery and that we have the capacity to deliver at a local level.

SURELY THERE ARE THOUSANDS OF CROWDED PLACES IN THE UK, HOW DO YOU PRIORITISE THE WORK?Readers of this publication may well be familiar with risk assessment processes. We use this type of approach to identify those crowded places sites across the country that are most at risk by virtue of their attractiveness as a target, the impact of an attack and the vulnerability of the site to different types of attack. Having identified the higher risk sites, our CTSAs focus their

efforts in protecting these locations by engaging with site owners and operators, completing a CT protective security survey with recommendations for improvement. However that is not the end of the partnership. CTSAs then continue to provide support to the site with advice and liaison and re-assess sites to measure any reductions in vulnerability. Maintaining this contact is an important part of the service and demonstrates the real long term commitment we have to businesses in our communities. But we also recognise that the next terrorist attack at a crowded place may not be at one of those higher risk sites, so what can we do to help protect those other small and medium businesses in our crowded places sectors that make up the vast majority of locations? Your readers may be familiar with NaCTSO’s Vulnerability Self-Assessment Tool (VSAT) that allows businesses to log on to our website and complete their own assessment of their security for free, safely and in confidence. The VSAT report generated by the process provides recommendations to improve security and reduce vulnerabilities based on the responses to the questions completed online by the applicant. VSAT is currently undergoing a comprehensive update that will allow single site or multi-site corporate users to complete the assessment to suit their needs.

ABOUT NACTSOThe National Counter Terrorism Security Office (NaCTSO) is a police unit working alongside the Centre for the Protection of National Infrastructure (CPNI) in London.

NaCTSO trains, tasks and co-ordinates a national network of police Counter Terrorism Security Advisers (CTSAs) in relation to their delivery of CT protective security advice as a part of HM Government’s Contest strategy. This advice falls into three areas - the protection of crowded places, the protection of hazardous sites and substances, and assisting the CPNI in the protection of Critical NationalInfrastructure. There has been much publicity in the UK and around the world about the use of peroxide based explosives and the precursors for their manufacture. Since 2005 NaCTSO has developed, promoted and delivered awareness raising campaigns, such as ‘Know Your Customer’, and has benefitted in that endeavour from the significant support of businesses and professional associations.These campaigns aim to increase knowledge of how legitimate products and materials can be accessed and misused and encourage the reporting of suspicious transactions and activity to the authorities. Businesses trading in or utilising these materials in their processes are crucial to the ongoing success of this work and NaCTSO continues to engage at this level to maintain a collaborative and effective approach. L

FURTHER INFORMATIONFurther details of all NaCTSO products, advice booklets and contact details of local CTSAs can be found on their website www.nactso.gov.uk

Counter Terrorism Strategy

COUNTER TERRORISM STRATEGY

At a local level we will continue to work closely with our existing higher risk crowded places to support the reductions in vulnerability and impact of an attack through recommended physical security measures and response planning to deal with major incidents.

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

27 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 28: Counter Terror Business Volume 10

Adve

rtise

men

t Fea

ture

When we refer to PAS68 barriers and bollards, and hostile vehicle mitigation, people straight away think of these products as ugly, over-engineered and over-bearing, which scar the landscape. PAS68 products have always been known to be oversized and military or industrial-looking. They are however needed to protect our assets and key infrastructure, therefore aesthetics have been put aside. Safetyflex Barriers has invented one of the most innovative PAS68 security products in the world today. We’ve taken away the overpowering large bollard, and concentrated on designing products that are slimline, aesthetically sculptured and that blend into the landscape and urban street environment, which architects and clients are always searching for. Unlike standard PAS68 steel tube bollards, Safetyflex’s unique PAS68 bollards are manufactured using a special composition of spring steel allowing them to absorb extreme amounts of energy/impact thanks to its springflex technology. On impact, the dynamics of Safetyflex’s spring steel bollards can move around five Cartesian co-ordinates, as opposed to a standard steel concrete tube bollard which can only move through one co-ordinate. It’s this technology which enables the spring steel bollard to return to its starting point after impact – whereas other bollards would collapse. We have found that most PAS68 Barrier and Bollard systems in the market place today are heavily over-engineered, with a large mass of steel, in and out of the ground.

They require this large mass to stop the vehicle impact, fighting force with force. Our concept is more of an engineered product. We do not fight force with force – we let the vehicle impact into the spring steel barriers. The spring steel barriers absorb the energy from the impact and transfer the energy back into the vehicle. This allows us to use a very small amount of steel, and a small amount of rebar in a shallow footing of only 400mm. Making the Safetyflex Bollards a lot

smaller and streamlined than existing PAS68 bollards in the market place also brings down the cost dramatically.

SAFETYFLEX – LEADING THE WAYThe world’s number one manufacturer of PAS68 spring steel barriers and bollards have a solid future after entering the busiest trading period in the company’s history. Safetyflex Barriers, a division of the GME Springs group which has operations in the Midlands, Yorkshire and Scotland, has live enquiries worldwide of more than £100 million and has made more than 10,000 anti-terrorist PAS68 bollards in the last 12 months.

The group has a solid base of 40 years of manufacturing experience during which time they have won a string of top awards – including a prestigious Chartered Institute of Highways & Transportation CIHT/CPNI Security in the Public Realm Award in 2010. The award was for PAS68 Bollards at the Bournemouth Conference centre.

TESTED TO THE MAXEvery single Safetyflex bollard and barrier is rigorously load tested at the company’s in-house testing facility – providing customers

with a guarantee that the product they install will withstand extreme pressure. Director Marcus Gerrard said demand for Safetyflex’s services has gone through the roof.“We are now the world’s number one manufacturer of PAS68 spring steel barriers and bollards, and one of the major factors behind this is very much down to the vigorous pre-testing we carry out on every product we produce,” he said. “These are the only pre-tested PAS68 bollards available on the market and we see this as a major factor why they can be seen protecting high-profile buildings across the UK and beyond. “Our customers demand the highest quality E

The world’s number one manufacturer of PAS68 spring steel barriers and bollards have a solid future after entering the busiest trading period in the company’s history.

PAS68 BOLLARDS AND BARRIERS

BEAUTY, NOT A BEASTSafetyflex presents its slimline, aesthetically sculptured PAS68 anti-terrorist barriers that blend into the landscape and urban street environment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 1028

Page 29: Counter Terror Business Volume 10

Advertisement Feature

E products and need to have confidence that in the event of an impact the barriers and bollards are going to work. “Without the extreme testing we carry out as standard, there’s no way we’d be able to give them that guarantee. It’s this level of service which sets us apart from our competitors.” Gerrard said the Bollard foundations in Safetyflex’s products are only 400mm deep and the spring steel is designed to withstand extremely heavy impacts and more than 20 years of wear and tear. “In years gone by anti-terrorist bollards would only be used at high-security sites around the perimeter and to guard key infrastructure,” he added. “Due to the environment we live in today we now supply these bollards to protect cash centres, sports arenas and shopping centres along with key government buildings and airports – so basically to secure any potentially vulnerable area. We also offer our PAS68 Street furniture, benches, bike racks and planters. In addition we can offer a bespoke design, as all our products are manufactured in-house.”

EDGBASTON CRICKET CLUBOne of the world’s top sporting venues is among the latest high profile clients of Safetyflex Barriers and the GME Springs group. Around 200 PAS68 anti-terrorist security bollards have been installed by Safetyflex to protect the entrance to the new £32 million Pavilion End at Edgbaston.

Phil Macdonald, project director at Warwickshire CCC, said he was pleased to work with an innovative manufacturer like Safetyflex. “We were hugely impressed by Safetyflex’s expertise and pleased a Midlands manufacturer has designed a top quality security system which really blends in well with the character of the stadium,” he said. ATTENTION TO DETAIL“Everyone at Warwickshire CCC is absolutely delighted with the new Pavilion End. Every attention to detail was taken into account on the renovation and the bollards fit perfectly into the scene outside the ground,” Marcus continued. “We were really pleased to be approached by Warwickshire CCC project director Phil Macdonald to provide our expertise and play a part in the expansion of one of the world’s leading cricket grounds “The club didn’t want the standard PAS68 bollards, as they would have been too over-bearing for the new plaza, so were overjoyed with our slim line PAS68 bollards. “The stadium looks fantastic following the renovation and we’re proud to have one of our bespoke security systems at the front of the ground.” L

FOR MORE INFORMATIONSafetyflex Barriers, Unit C, Boston Place, Foleshill, Coventry.Tel: 024 76 664911www.safetyflexbarriers.co.uk

New product launch

Safetyflex Barriers is delighted to announce the launch of its new range of Shallow Mount Bollards.The bollards have a shallow footing of only 200mm, a fraction of the underground depth many products on the market require, and as with all Safetyflex’s products provide the highest security without the high price.

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

29 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 30: Counter Terror Business Volume 10

C

M

Y

CM

MY

CY

CMY

K

11FE470-FireEye_Ad_053012_R2_outline.pdf 1 5/30/12 1:26 PM

Page 31: Counter Terror Business Volume 10

And this is before we get into the realm of rogue employees and privileged identity management. And it’s against this backdrop that the fundamental principles of governance, risk and compliance (GRC – the bedrock of ISACA) have returned to the fore. But what are today’s cyberthreats? From detailed analysis of the current threat landscape, it can be seen that the hybridised nature of today’s security threats centres on hacking, serious and organised crime and the recently-arrived issue of hacktivists. And let’s not overlook the problem of misplaced data. Add to this the dangers hosted by smart malware code such as Stuxnet and Duqu – and the possibility of a cyberwar as outlined by Foreign Secretary William Hague this year – and you have an idea of the challenges facing government. The risk landscape changed last year largely as a result of hacktivist groups such as Anonymous and its forebears. This is no idle threat – attacks targetted the Royal Navy, the UK government, the NHS and commercial sector organisations and newspapers.

OVERACTIVE IMAGINATION?For many years there has also been some debate as to the reality of any form of cyberwar or cyberconflict – which many observers ascribe to an overactive imagination on the part of the industry’s thought leaders and analysts. Even taking into account recent high-profile system hacks – there have been no examples of a pure cyberwar casualty. While there has never been a cyberwar, let us not forget, neither has there been a nuclear war, but such weapons of mass destruction have nevertheless been used. During 2010/2011 the US and UK governments announced they were focusing more on cyber defences. In doing so, they indicated that this low-cost method of delivering a potentially devastating payload to the heart of the enemy’s systems was now considered a serious threat. In addition, the UK Government also revealed that, at the end of 2010, various servers has been attacked using the notorious Zeus malware. On this same topic Foreign Secretary Hague informed a Munich security conference that the attack was considered to be part of an E

CYBERCRIME

Cyberthreats have come a long way in the last few years. Professor John Walker, London Chapter ISACA Security Advisory Group and CTO of Secure-Bastion, believes the days of external simplex threats have now given way to multi-faceted attack vectors from both outside and inside the average organisation

UNDERSTANDING THE VERY REAL NATURE OF THE LATEST CYBERTHREATS

IT SecurityTHE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

31 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

C

M

Y

CM

MY

CY

CMY

K

11FE470-FireEye_Ad_053012_R2_outline.pdf 1 5/30/12 1:26 PM

Page 32: Counter Terror Business Volume 10
Page 33: Counter Terror Business Volume 10

IT Security

E international effort to infect systems. Though malware is still on the rise – the concept that today’s malware is ever more imaginative is weakening and, as a result, the anti-malware developers may be a little closer to developing ahead-of-the-game compliance technologies. This should not allow complacency. The Infosecurity Europe show in the spring of 2011 saw the threat of AETs – advanced evasion threats – becoming reality, but very little media attention was given to the development of more advanced AET threats and the malware bandwagon inevitably evolved.

A REAL THREATAETs are real. They are not a product of an aggressively-badged application but more of an imaginative mix of old code, new vulnerabilities and skill-based imagination on the part of the developer in attempting to circumvent the security of a trusted perimeter networked device, such as a firewall, Intrusion Detection System (IDS), or Intrusion Prevention System (IPS). AETs are a natural evolution of the multi-faceted attack vector threats. They may also be defined as an amalgam of various components that may be leveraged by criminal and cybercriminal fraternities, or sponsored international groups and hacktivists seeking to locate and infiltrate selected targets. AETs can have many guises, including old-to-new cloaked code, insider contacts, integration into websites and the leverage of some other agent-seeking tool ordered to embed itself in a micro endpoint, such as a smartphone. The evolution of AETs is a methodology combining imagination and creativity to achieve an objective. The key question is whether your critical digital assets are protected against such evasion techniques. To qualify and quantify this question, Stonesoft, the company that discovered AETs in the latter half of 2010, conducted research into AET evolution. In addition, Gartner has concluded that AETs are real, credible and growing threat against the security of company networks and allied IT resources that protects governments, commerce and information-sharing systems. Once you consider the potential effects of AETs – and the prospect of being hit by a well-targeted payload from an AET-delivered vector – it is clear that our industry’s move to harnessing the power of cloud and virtualised resources needs to be paralleled by the development of better defences.

DEFENDING GOVERNMENTAnd it’s not just the commercial sector that needs to better defend its digital data assets – thought also needs to be given as to how the public sector can raise its game on defending government and allied agency computer systems. This brings us to the new and sexy world of advanced malware code such as Stuxnet and

the recently-arrived Duqu darkware – dubbed `Son of Stuxnet’ by some sources. With the advent of Stuxnet we have observed the manifestation of smart code that exhibits seek and destroy capabilities capable of locating and impacting specific types of systems and allied apparatus, most notably IT control systems from specific vendors and with specific functions that include nuclear and similar platforms. A key feature of the multi-vectored Stuxnet malware was the inclusion of its own form of digital passport – a forged X509 digital certificate – to assure automated monitoring systems and their onlookers that it is a friend, rather than a foe. It is also worth noting that, unlike some common malware variants of the 80s, such as Casino, which really wanted to tell you they were infecting you – this modern day code is much more subliminal. Stuxnet, a well-designed aggressive application, is also considered to be the product of some high investment, extensive research, and long term production. The next variant of this genus of smart malware is the underestimated Duqu variant, which entered the public scene in the third quarter of 2011. Before we look at the way in whichDuqu changes the IT security ball game, let’s look at a few facts about this malcode. These are significant since, prior to being given its moniker, there were widely-reported incidents involving drones operated by the US Air Force being infected with malware.

However, as the strain in question did not directly impact the operational ability of the infected craft, it was tolerated, and allowed to accompany these smart models on their missions. Notwithstanding the malware in question did not have any designed intent to directory impact or affect the assets, it was obviously there for a reason - the malware in question was all about snooping, and the gathering of information which was passing through the bird concerned. Shortly after the infection of the USAF drones, there was the revelation that there was had

been some suspected hacking of a number of terrain and agricultural satellites. The big question, of course, that many experts have been quietly asking themselves is whether these two hacking potential cyber-terrorist or similar hacking developments are linked. And if so, what are the implications?

Looking at Duqu, our first observation is that the darkware is

all about the invasive placement of the code on to a remote

platform with this distinct objective of accessing and stealing information from that system. The data that is being sought to be cyber-heisted, includes a list of running processes and

drive names being used on the infected machine,

as well as access to output devices. The malware also

harvest network information and all available input data, including open window names and the enumeration of computers in the domain through NetServerEnum As with Stuxnet, Duqu carries a signed valid digital certificate with an expiration date set as 2nd August 2012. It also uses a mixture of HTTP and HTTPS IP sessions to communicate back home – typically to an Indian site at IP address 206.183.111.97.

INQUISITIVE CODEThe big question here is, was this an evolution of the program code which infected the USAF drone’s computer systems? Or was a close variant? Perhaps more importantly, what are the implications of such inquisitive code invading sensitive government systems – and then

going on to capture data from those systems? There should be no doubt whatsoever that the age of cyberconflict is now upon us and has global governments in its focus. It is therefore time to look beyond those rolled up security policies and procedures, and look to GRC frameworks such as COBIT (http://bit.ly/vtZJw8) to help secure our electronic borders, no matter where they may be hosted. L

FURTHER INFORMATIONtwitter.com/ISACANewswww.isaca.org/knowledge-center

CYBERCRIME

There should be no doubt whatsoever that the age of cyberconflict is now upon us and has global governments in its focus. It is therefore time to look beyond those rolled up security policies and procedures, and look to GRC frameworks.

“This is no idle threat – attacks targetted the Royal Navy, the UK government, the NHS and commercial sector organisations and newspapers”

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

33 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 34: Counter Terror Business Volume 10

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 1034

One of the major exhibitors at InfoSec 2012, Barracuda Networks, have highlighted that while the decline in traditional botnets, arrests and spam traps has reduced spam, there has been a 300 per cent rise in attacks through social networks. Barracuda Networks’ chief research officer, Dr Paul Judge, said attacks have gone up significantly over the past two years and attackers are now using Facebook’s new implementations and APIs and creating fake pages to attract ‘likes’. “We monitor mass attacks on social networks closely on Twitter and Facebook and both are in a critical state. Only 1 per cent of Twitter messages are bad, but the sheer amount of messages makes it worrying. “On Facebook, if one person likes a page, they can be tagged in a photo with 50 other people, which reaches 1,000’s more, and the photo can contain malicious links to spread malware. It has become part of Facebook; fake accounts account for 1 per cent of all profiles, while 10-30 per cent are not real people.” For organisations, the solution is a more sophisticated approach to dealing

with the challenge than a simple ban. “A lot of companies try to tell people they can’t use Facebook or Twitter, but it is easier to let them access the sites in a controlled way,” Judge explained. “For instance, they can gives employees access in a controlled way through application control and policies, which investigates suspicious content and protects against malware and data loss. Aside from social networking sites, he claimed businesses are also leaving themselves

open to attack by failing to secure their corporate sites properly. “Large financial institutions have been doing [a great job of this] for years, but your average company’s website is just sat out on the internet with nothing protecting it,” he claimed. “It is changing. The Anonymous era has increased awareness of network and website breaches and increasingly the board is saying to the IT department, ‘how can we stop that happening to us?” Increasingly corporate, government and community websites involve greater integration with social media websites that are designed to help generate content, engage with the public or increase awareness of activities. However,

this increases threats through interaction with insecure websites outside of the control of the website’s administrator, raising the potential for hosting malware (and exposing the website users to spam or malicious attacks) or becoming vulnerable to attacks (from SQL injections to DoS attacks).

FOR MORE INFORMATIONwww.e92plus.com/barracuda

Barracuda Networks highlights the threat from social media and corporate websites

Page 35: Counter Terror Business Volume 10

The 17th Infosecurity Europe, which spanned three days in late April, witnessed a revolution taking place in the security space, with most CSOs and CISOs reporting that their IT security budgets, even in the cash-strapped public sector, remaining relatively intact. The show had an increase in attendance with 12,959 visitors attending the show compared to 10,482 in 2011. This underlines the importance that information security has to all sectors of the economy. But against the backdrop of cybercrime reportedly costing the world an amazing $380 billion a year, says Neelie Kroes, the European Commission vice-president, this is still not enough to protect IT users and citizens. In her keynote speech at the event, Kroes said that since everyone uses computers, cyberattacks can affect everyone, meaning

that cybersecurity is no longer the domain of national security authorities and needs a comprehensive solution that involves governments, businesses and individuals. To assist in this regard, she explained that the European Commission will present a plan - a European strategy for Internet security - in the third quarter of this year. The plan will be based around five key areas. Firstly, there is a need to build a network to respond to cyberthreats and share that information - EU member countries will be asked to guarantee their minimum capabilities to respond adequately to threats, as well as sharing critical information in a secure and confidential manner. Secondly, says Kroes, there needs to be a governance structure with member countries being required to establish competent authorities to centralise information and create regional forums to support collaboration with the private sector.

Kroes added that the third aim of the strategy plan will be to improve security at every point in the supply chain. The fourth aim will centre on the creation of vibrant IT security market. The fifth prong of the EC’s strategy, she explained, is that Internet security is not a Europe-only problem, but an international one, meaning that everyone must be involved in the creation of a more secure Internet. Despite the underlying theme this year being about the increasing trend towards BYOD (bring-your-own-device) into the workplace, Simon Wise, deputy head of the Ministry of Defence’s global operations security centre, effectively vetoed the idea as far as Government agencies in the security sector. At the MoD, he said in an Infosecurity Europe round table session: “We have a bring you own policy and it’s simple: Don’t!” The key risk with BYOD, he told delegates, is the fact that unauthorised devices pose a serious threat to the rest of the E

INFOSECURITY EUROPE REVIEW

IT SECURITY BUDGETS REMAIN INTACTCybercrime reportedly costs the world an amazing $380 billion a year. Cyberattacks, security budgets and BYOD were all in the spotlight at InfoSecurity Europe this April, which demonstrated new ways to protect organisations and IT users from the threat.

IT Security

Large organisations are more visible to attackers, which increases the likelihood of an attack on their systems. They also have more staff-which may explain why small businesses report fewer breaches than larger ones.

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

35 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 36: Counter Terror Business Volume 10
Page 37: Counter Terror Business Volume 10

IT Security

E network – which in the MoD’s case involves around 750,000 IP-enabled devices. Wise revealed that the MoD deals with 200 different firm’s IT systems, of which it has 20 main suppliers. As a result, he says, its suppliers need to be more honest about their position in the market, rather than claiming they have a `magic box’ solution to cybersecurity requirements. Wise’s caution is backed up by the results of a joint survey between PricewaterhouseCoopers and the organisers of Infosecurity Europe, which found that one in seven large organisations has been hacked in the last year – and with 20 per cent of organisations spending less than just one per cent of their IT budget on information security. Researchers found that as a result, the number of large organisations being hacked into is at a record high, with the overall cost of security breaches to UK PLC measured well into the billions of pounds mark a year. The survey – which took in responses from a total of 447 UK organisations – found that 70 per cent of large organisations have detected significant attempts to break into their networks over the last year – a record high. On average, each large organisation suffered 54 significant attacks by an unauthorised outsider during 2011 - twice the level in 2010 - whilst 15 per cent of large organisations had their networks successfully penetrated by hackers.

RISK OF BEING HACKEDAccording to Chris Potter, a PwC information security partner, the UK is under relentless cyber attack and hacking is a rising risk to businesses. “The number of security breaches large organisations are experiencing has rocketed and as a result, the cost to UK plc of security breaches is running into billions every year. Since most businesses now share data with their business partners across the supply chain, these numbers are startling and make uncomfortable reading for business leaders,” he said. “Large organisations are more visible to attackers, which increases the likelihood of an attack on their IT systems. They also have more staff and more staff-related breaches which may explain why small businesses report fewer breaches than larger ones,” he added. Potter went on to say that it is also true that small businesses tend to have less mature controls, and so may not detect the more sophisticated attacks. A major set of FOI (Freedom of Information)

requests made to the ICO (Information Commissioner’s Office) has revealed that 35 per cent ICO complaints now centre on personal data disclosure. From an FOI request, IT security specialist Axway found that during the first three months of 2012, the ICO had received 1,002 complaints. This, the data security specialist says, has raised concerns over the disclosure of personal data or breaches of the DPA: an average of eight breaches per day.

Axway also discovered that, since being formed in 1984 as the

Data Protection Registrar, the Government’s data security

regulator has received a total of 26,227 data protection complaints, which resulted in the regulator serving just 14 monetary penalties totalling £1.17 million in fines.

The monetary penalties imposed by the ICO,

however, pale in significance when the indirect costs are

considered - especially as the cost of data breaches have risen 70 per cent

over the last five years, the firm claims. As a result of its research, Axway is calling for a major rethink on how data is protected when it comes to Data Protection Act penalties and ICO intervention. Axway claims that, with Big Data management continuing to keep many CIOs and CISOs awake at night, data security will be of paramount concern in the future - regardless of current ICO enforceable legislation. In view of this, the firm adds that it is key for organisations to ensure their data is as secure as possible. John Thielens, Axway’s chief security officer, said that information needs to be securely managed to prevent the data breaches that continue to be headline news around the world. “The threat of ICO intervention should not be the business driver. It’s not surprising that the public is alarmed. Restoring public confidence with absolute visibility and concentrating on protecting their data, no matter where it lives, is paramount in today’s world,” he explained.

TABLET DEVELOPMENTSOver at Cryptzone, the data security firm says that the increasing use of tablet computers by members of staff has been behind the vendor’s development of the latest version of its NETconsent Compliance Suite, which supports a wide range of portable devices, including tablet computers. The software is billed as ensuring that employees are aware of policies, are educated on the reasons why they are important and tested to see if they understand their responsibilities. Dominic Saunders, Cryptzone’s vice president for the NETconsent Business Unit,

said that, although many organisations have persisted in their refusal to allow employees to use some mobile devices for work, they are set to become commonplace in the business environment, just as with previous innovations. Security policies and systems, he explained, need to catch up fast as a new generation of workers demand the ability to take advantage of the personal and business value such devices offer. Rob Rachwald, security director with fellow data security specialist Imperva, meanwhile, said that organisations need to understand that the threats landscape has significantly changed over the last few years, as witnessed by the rise in political hacktivism.

HACK OF THE DECADEThis, he says, is what makes the Sony data security hack of spring 2011 so significant – arguably the most significant in the last ten years – meaning that that it will go down in the IT history books as being the most significant external hack of the last decade. The reason, he says, is that the Sony breach marked one of the first times that a major company was seriously compromised by a group of external hackers. The Sony saga, he claims, showed hackers that they could seriously hurt a company on several levels if they put their mind to it. ISACA, the not-for-profit IT security association which now has more than 95,000 members around the world, officially launched vesion 5 of its COBIT governance and management framework. The COBIT 5 framework – which is available from the Association as a free download at www.isaca.org/cobit - provides globally accepted principles, practices, analytical tools and models designed to help business and IT leaders maximise trust in, and value from, their enterprise’s information and technology assets. This update is the result of a four-year initiative led by a global task force and has been reviewed by more than 95 experts worldwide. To date, more than 16,000 professionals have pre-registered to receive a copy. “The advance interest in COBIT 5 has been overwhelming. It is clear that enterprises everywhere are aggressively seeking guidance on how to manage and ensure value from the growing mountain of information and increasingly complex technologies they are grappling with,” said Derek Oliver, Ph.D., CISA, CISM, CRISC, CITP, FBCS, FISM, MInstISP, and co-chair of the COBIT 5 Task Force. “Information is the currency of the 21st century, and COBIT helps enterprises effectively govern and manage this critical asset,” he added. L

FURTHER INFORMATION Infosecurity Europe 2013 takes place at Earls Court, London from 23-25th April. Visit www.infosec.co.uk for further information.

INFOSECURITY EUROPE REVIEW

“With Big Data management continuing to keep many CIOs awake at night, data security will be of paramount concern in the future”

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

37 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 38: Counter Terror Business Volume 10

simply secure

originstorage.com3

The only touch screen USB 3.0 hard drive with 256-Bit hardware encryption. Available in 320GB, 640GB and 1000GB. No software, no fuss. Keep you data safe in style.

Page 39: Counter Terror Business Volume 10

Last month, penalties issued by the Information Commissioners’ Office (ICO) to local authorities for data loss officially hit £1million. In every instance, the fine was related to data in transit. However, despite an increasing number of reported – and in some cases extremely high profile – incidents, the loss or theft of sensitive data from devices such as laptops and tablets continue to dominate the headlines. Despite overwhelming internet adoption, organisations often need to transfer or carry large amounts of sensitive data on physical devices, whether it’s laptops, tablets, USB sticks or other removable media or drives.

In most cases, the need to carry sensitive data is born from convenience, especially if secure internet access to a fixed source is not available, or if a dataset is large. RISKSBut accidents do happen. Last year, the FSA fined Zurich Insurance a whopping £2.3 million for the loss of sensitive information for 46,000 of its customers. In the past, other banks including HSBC and Nationwide have been fined for similar offences. Also, last September more than 200 hard drives containing confidential information regarding thousands of patients were stolen from Brighton General Hospital. The NHS Trust had subcontracted the destruction of the drives to a registered contractor but instead they had appeared for sale on eBay. Following action by the police, the drives were all recovered but the ICO now intends to fine the Trust around £375,000 for the incident. The reason for these huge fines is that the

loss or theft of such sensitive data could lead to financial or emotional damage to individuals or businesses. In the case of the NHS Trust, the loss of confidential patients’ records from the hard drives could lead to reputational damage, or even blackmail. ENCRYPTIONIn both cases, had the data been securely encrypted, there may not have even been a need to report the incidents. Indeed, with the NHS case the trust had placed its trust in a third party to destroy the sensitive information but had no means of confirming if this had taken place.

Subsequently, organisations are looking to create better frameworks for both handling and protecting data at rest and in transit. Having systems that require staff to change working practices and add processes to ensure better security should be a no-brainer. However, optional encryption schemes are inherently flawed if they can be circumvented by users. As such, both public and private firms are now embedding security at the device layer. This normally focuses around the hard drives of desktop or laptop computers that automatically encrypt and decrypt data on the fly in a transparent method. Specialist encryption solutions like the Data Locker 3 PIN-protected portable hard drive, and the Enigma SED FIPS 140-2 (self encrypting drive), both provide an increased level of security for laptops and PCs. The advantage of full disk encryption is two-fold. The first is

that the user cannot turn it off and every read, write or copy on the disk is encrypted. This ‘always-on’ approach leads to a second major advantage: accountability. By having unbreakable encryption at the physical disk layer, there is a certainty that this lost information is effectively non-actionable, and thus not able to cause damage. So while it’s essential that an organisation takes every step available to them to protect their data, it’s just as important that the firm can prove it to the authorities should the worst happen. Conventional security software alone can fail to effectively authenticate users and machines on the network or secure data on lost or stolen laptops – or importantly ensure compliance with laws that require disclosure of lost personal data. Fortunately, SEDs, trusted platform modules (TPMs) and BitLocker client PCs can help safeguard an organisation’s critical information. However, these technologies provide only half the answer. DEMONSTRATING COMPLIANCEDirectory-based security management software like Wave’s EMBASSY remote administration server (ERAS) can help by remotely monitoring and logging all activity on the device, and offering advanced reporting capabilities. This ability to demonstrate compliance is as crucial as securing the data itself. The reality is that even with the most diligent staff working in secure environments, laptops or removable drives go missing. By not having encryption at the most basic layer, organisations are just waiting for the inevitable compliance failure and subsequent painful fine. L

FOR MORE INFORMATIONTel: +44 (0)844 288 6868www.originstorage.com

Despite overwhelming internet adoption, organisations often need to transfer or carry large amounts of sensitive data on physical devices. Last year, the FSA fined Zurich Insurance a whopping £2.3 million for the loss of sensitive information for 46,000 of its customers. In the past, other banks including HSBC and Nationwide have been fined for similar offences.

DATA LOSS

DATA LOSS: ARE YOU SECURE?High penalties for data loss mean that it’s just not enough to ensure your sensitive data is encrypted – you need to prove it, says Andy Cordial, managing director of Origin Storage Limited

Advertisement Feature

TM

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

39 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 40: Counter Terror Business Volume 10

Adve

rtise

men

t Fea

ture

Every time there is an aviation-related terrorist incident – whether successful or not – it is airlines and airports that take the flak. Then come demands for tougher security measures, swiftly followed by passengers complaining of increasingly intrusive procedures. Yet with equipment ranging from e-passports to full body scanners, we already have highly sophisticated methods of identifying and apprehending criminals. To be really effective though, this cutting edge technology needs to be backed up by a system of international standardisation and collaboration that enables information to be shared – speedily, reliably and securely. In other words, intelligence-led border management that collects and processes information to all relevant national and international agencies, harmonising standards of identifying, verifying and authenticating passengers.

COMMON-LANGUAGE DATA SERVICETechnical problems created by the varying data sources and formats used by different agencies is cited as the main problem to such standardisation. This is easily overcome by using ARINC’s

Electronic Borders – a common-language immigration data service combining items such as interactive Advance Passenger Information System (iAPIS) with Passenger Name Records (PNR). Translating messages from disparate agencies and systems, it provides a unique screening solution that enables airlines to meet their legal obligations whilst maintaining passenger privacy. ARINC’s private, highly secure AviNet global communications network, with its 99.999 per cent availability, provides seamless, efficient and reliable communications between airlines and border control agencies (BCAs). More and more governments require airlines to use iAPIS and impose hefty fines for those that fail to do so. Electronic borders, requiring little or no new system development, or even the modification of existing systems,

provide a cost-effective solution. The combined use of iAPIS and PNR allows security resources to be employed more effectively to target undesirables for screening whilst enabling faster processing of low-risk passengers. BCAs, law enforcement organisations and intelligence services get a valuable head-start on checking names against watch lists, highlighting suspect travel patterns, assessing potential risks and locating suspects.

SECURE DATA PROTECTIONData protection is a concern for many passengers, particularly where Advance Passenger Information (API) messages are transmitted by e-mail and over the internet. This is not an issue with a fully-managed IP network like ARINC’s AviNet, which provides a level of reliability and end-to-end security that is absent from a public internet connection. Airlines, too, have concerns regarding data collation. Those using legacy systems find government demands to extract data, particularly in the absence of standards harmonisation, can entail budget-breaking costs. With a long and successful track record

in systems integration, ARINC recognises the need for software flexibility to accommodate varying border regime requirements.

BIOMETRIC TECHNOLOGYComplementing API and PNR is biometric technology, which helps prevent a range of criminal activities made possible with forged documents and stolen identities. ARINC’s fully-integrated Identity Management System (IdMS) is designed to be applicable in many critical settings and can collect, verify, and maintain biometric and biographical information – ensuring that biometric systems integrate with existing airline and airport processes – as well as supporting all phases of the identity management lifecycle. Over 80 per cent of passengers now use

mobile devices, the internet and self-service kiosks to check in away from traditional, dedicated airport workstations. The downside is that passengers taking only hand luggage need have no interaction with the airline until they reach the gate. Since the ability to track the progress of each passenger in the airport is crucial, this self-service travel has boosted demand for Passenger Reconciliation Systems (PRS) such as ARINC’s VeriPax, which is designed to maximise security checkpoint operations while optimising passenger flow. VeriPax not only complements ARINC’s IdMS but also has links to watch lists, assisting government agencies responsible for border control. VeriPax validates the authenticity of barcodes on boarding passes using 2D scanners, automatically screens passengers against airline host systems in real time and determines clearance, providing audio and visual status alerts to agents when necessary.

INFORMATION SHARING IS CRITICALInformation-sharing is a crucial element in the fight against terrorism and ARINC’s Multi-User System Environment (MUSE) family of passenger and flight information systems allows airlines to share vital passenger and baggage information in real time on high-speed multi-user networks. Whether from off-site locations, CUSS kiosks or traditional check-in desks, airlines can access the information they need whenever they need it. Since each transaction – from ticketing and baggage handling to car rental and hotel reservations – can be processed over the common network, communications barriers are completely eliminated and security is enhanced We have the tools – what’s missing is international harmonisation of standards and reliable intelligence-sharing with every effort made to eliminate opportunities for human error. Border control agencies must use all the available information at their disposal, including that which is in the public domain on personal websites, blogs and on social networking sites. Analysing and correctly interpreting this information is fundamental to intelligence-led border management. L

FOR MORE [email protected]

PASSENGER INFORMATION

INTELLIGENCE-LED BORDER MANAGEMENTAndrew Priestley, business development director at ARINC, looks at how intelligent-led border management is fundamental to fighting terrorism

The combined use of iAPIS and PNR allows security resources to be employed more effectively to target undesirables for screening whilst enabling faster processing of low-risk passengers.

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 1040

Page 41: Counter Terror Business Volume 10

The corporate environment has already been extended outside the typical boundaries of traditional, physical, and formal places of work. Webmail and the recent proliferation of powerful mobile devices such as smartphones and tablets have led to 96% of employees accessing e-mail and other business systems remotely—be this at home, or “on the run” from a café or train station. Certainly, security professionals must continue to protect their physical office building and data-hosting facilities as well as train employees to secure their devices; the simplest snatch and grab of an executive’s mobile device by a budding malfeasant

could cause a major security breach. However, the number one type of data leak is much more insidious and widespread. It comes from the hidden information in documents, the so-called ‘metadata’ that is sprinting out of organisations every day. Some of the data is well known, such as the author and the date created. But what many users don’t know is that metadata can also contain all the document revisions, including tracked changes and comments added by reviewers, distribution of the document, total editing time, and more. RISKSMost companies – especially those in highly regulated industries – have already put desktop metadata cleaners in place to prevent accidental sharing of this information. However, what will happen during the Olympics when many employees will be working from home on other devices? According to a recent white paper issued

by Litéra Corp: ‘The Risks in a Mobile World of Hidden Data in Documents’, 10 per cent of all e-mails on average are sent with attachments that contain unscrubbed metadata. It is clear that metadata cleaning must move from the desktop to also include the server to cover remote users.

DATA - A DIFFERENT STORY When corporate assets are tracked and tagged, it is hard for a computer or phone to go missing without it being immediately noticed. Data is a different story; it is ethereal, and more of it is out in the public domain, outside of corporate security or

compliance policies and controls, than even the companies that own it are aware. Information is the lifeblood of every business today, regardless of type. It is the hidden, intangible asset on the corporate balance sheet. Because of the importance of keeping information confidential, all businesses are subject to loss of consumer confidence and declining reputation if information is leaked, and leaks always affect the bottom line. Data breaches are the equivalent of corporate dirty washing in public or publishing corporate secrets for your competition to see. MANAGEMENTInformation and data security may be well understood, but as all the evidence attests—with many public notices of high-profile data breaches of military, government, and corporations—it is largely poorly managed. One specific type of breach that has hit the headlines multiple times is the leaking of information via the hidden content of

documents. Barclays Bank accidentally leaked information hidden in an Excel spreadsheet converted to a PDF, which materially affected the acquisition of Lehman Brothers’ assets. The UK Government itself leaked information from Charles Clarke that exposed the cabinet’s position on the number of days a terrorist should be detained ; had to apologise to an Anglo-Nigerian national at the start of this year; and do not forget the infamous “Dodgy Dossier”—all because of information hidden in document metadata. Corporate asset security risk management begins to pale in comparison to the ramifications that a data breach could have on a company.

EVENT HORIZONThe event horizon of the Olympics means time is short. The huge increase in teleworking and the expansion of the virtual office over the period of the Olympic Games means that businesses must address this area in their corporate security and risk management policies and processes now. There are tried and tested solutions offered by experienced vendors that are already available to mitigate these risks. Litéra, the content risk management company, provides solutions to help mitigate the risk from both visible and hidden information contained in a document.

METADACT-EMetadact-e, Litéra’s server-based document metadata cleaning solution, provides central policy management and a patented unified platform for mail gateways. it cleans hidden information in all Microsoft Office files, PDFs, images, and ZIP files, and is intuitive for users or is as invisible as you desire. L

FOR MORE INFORMATION Tel: +44(0)20 300 48426 www.litera.com

“There is now enough evidence to prove that security is a business risk which must be accounted for in every organisation’s enterprise risk management plan.” Experian Report – How Data Breaches Impact Bottom Lines.

CONTENT RISK MANAGEMENT

HOW FIT IS YOUR ORGANISATION?The UK government is promoting more agile ways of working, including encouraging businesses in London to allow their employees to work from home. Whilst this will help alleviate other issues during the Olympic Games, it introduces risks to businesses. Litéra, the content risk management company, provides solutions to help mitigate the risk from both visible and hidden information contained in a document

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

41 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 42: Counter Terror Business Volume 10

TIGER HELICOPTERS

Military | Aero-Medical Training | Government | Police Students

Tiger Helicopters Ltd, Shobdon Aerodrome, Leominster, Herefordshire HR6 9NR, UKTel: 01568 708028 Fax: 01568 708005 www.tigerhelicopters.co.uk email: [email protected]

Based in the heart of the UK countryside, Tiger Helicopters are uniquely located to offer the maximum training potential in an extensive, purpose designed facility that

provides a complete Helicopter Training solution. It is internationally recognised and accepted as a Centre of Excellence for initial International, Police and Air Ambulance pilot training.

The place where we Train the Trainers.

BECOME A HELICOPTER PILOTTake your first step toward an exciting new career

n Large Fleet of Aircraft

n All Multimedia Classrooms

n CAA Approved Exam Hall

n Highly Qualified Flight Instructors

Page 43: Counter Terror Business Volume 10

Written by Sim

on Chelton

In April, Prime Minster David Cameron visited Tokyo to discuss a whole range of proposals on bilateral cooperation along with a series of new defence initiatives, including agreement to work together in development of new defence equipment. Japan has been cautious in making defence agreements since the Second World War, outside of its treaty relationship with the US. The roles of its self defence forces have been restricted primarily to territorial defence (although some limited peacekeeping has been conducted abroad since the early 1990s) and expenditure capped to 1 per cent of GDP. Further, in 1967 Japan imposed restrictions on arms exports, and tightened these in 1976, isolating its defence industry from international collaboration and competition, apart from very occasional exceptions on a case by case basis, such as joint production of Ballistic Missile Defence equipment with the United States in 2003.

In late 2011, the Japanese cabinet relaxed the arms export ban, allowing some exports for peacekeeping purposes, and to allow Japanese defence companies to participate in international collaborative projects. The detailed implications of this change in policy have not yet been published, and it is likely that there will need to be a number of amendments in time, including new arms export control legislation similar to that used by other countries, which will allow Japan to control the export of any equipment or technology to third parties. Since the end of the Cold War, the capacity of individual

countries to build and maintain an industrial base capable of supplying military equipment for all eventualities has become more and more constrained. New information technology that has allowed substantially more accurate surveillance together with precision targeting has dramatically reduced the numbers of military systems needed to deliver weapons for military effect, whilst at the same time the unit costs of such equipment has increased substantially. Further advancedments such as stealth technologies and unmanned autonomous systems have reinforced this trend. Most western countries E

European governments are keen to maintain investment in design capability and to a lesser extent in industrial capacity, but have an open mind on technology transfer.

SECURING ASIA

NEW COLLABORATION IN IN EAST ASIAFor Japan to enter the world of defence, collaboration will require some careful management.Securing Asia, taking place on June 25-27 in London, provides a dedicated forum for representatives of Asian nations and global security suppliers to meet and address vital issues

Asia FocusTHE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

43 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 44: Counter Terror Business Volume 10
Page 45: Counter Terror Business Volume 10

E realised some time ago that totally indigenous development was unsustainable and, in Europe in particular, collaborative programmes have become increasingly the norm as countries have sought to balance limited budgets with the need to maintain national production capability within key areas.

INCREASED COLLABORATIONFor Japan to enter the world of defence, collaboration will require some careful management, to ensure that Japanese companies will be able to work on an equal basis with their counterparts. Selecting the UK as an initial partner makes sense; Japan and the UK are island nations, with similar core capability needs, similar strategic relationships with the US, and with similar defence budgets. There is a long historical bilateral relationship, stretching back to the 19th Century, including earlier collaboration in defence equipment. The two governments reaffirmed the commitments made by the Prime Ministers when officials signed defence agreements in the margins of the IISS Shangri-La Dialogue in Singapore on 3 June 2012. This commits both sides to development of appropriate protocols for sharing of protected information and creation of appropriate procedures in which collaboration can take place, as well as to cooperation in cyber defence and international peacekeeping. It is not yet clear whether the initiative for collaborative defence industrial projects will be government led, or whether both sides will look to industry to identify ways in which companies from both countries

can take forward the commitments set out in the joint statement in April. There are reasons for believing that this new bilateral initiative between the UK and Japan might set a trend for increased collaboration between western countries, particularly in Europe, and the emerging economies of Asia. Put simply, European countries have managed to sustain advanced capabilities in defence technology since the end of the Cold War, but are increasingly finding that the defence budgets to pay for continued development are dwindling. At the same time, in this specialist industrial area, Asian countries are looking to devote some of their wealth to defence and security capabilities as national security tensions within the Indian Ocean and in the western Pacific rim assume greater priority.

INCREASING INDIGENOUS DEFENCEAsian countries will want not just to purchase advanced technologies, but also to increase indigenous defence. European governments are keen to maintain investment in design capability and to a lesser extent in industrial capacity, but have an open mind on technology transfer. There are clearly deals that can be done. A showcase for this new era of collaboration takes place in London on

25 to 27 June this year, at the Securing Asia Summit, being held at the Queen Elizabeth II Conference Centre. Over the three day programme, delegates from across Asia and Europe will discuss key issues of defence and security, and the technological solutions that are increasingly being used in multilateral arenas. The conference will explore ways in which practical collaboration can take place at the industry level. The Summit will facilitate business opportunities through a series of conferences and exhibitions running throughout with focused workshops on the third day comprising ‘How to do Business in Asia’ covering market entries, strategies and advice. Also included is a session on the Asian Legal Framework which encompasses Anti-Corruption, Anti-Bribery Acts, Defence Offset and Procurement Policies. Securing Asia is an annual event and will be held next on 18th-19th June 2013 with the ultimate goal to bring to the western corridor, a host of Asian government buyers and influencers looking to source the latest information and solutions on counter terror and homeland security. L

FURTHER INFORMATION www.securingasia2012.com

This new bilateral initiative between the UK and Japan might set a trend for increased collaboration between western countries, particularly in Europe and Asia.

Asia FocusSECURING ASIA

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

45 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 46: Counter Terror Business Volume 10

Heats or cools while on the move

Chills water, heats MREs, gives hot potable water on demand

Keeps contents hot for up to 6 hours

Non-spill relief system

Low thermal signature

24V DC

Designed and Manufactured to :-

MIL-PRF-44466DNSF ANSI 4-2007

‘CROCK POT’

...it now also cools! cools!

A Bibby Scientific company

ELECTROTHERMAL USAA Bibby Scientific comapny

3 Terri Lane, Suite 10, Burlington, NJ 08016, USA TEL: +1 609 589 2560 FAX: +1 609 589 2571 www.electrothermalusa.com

ELECTROTHERMAL UKA Bibby Scientific comapny

Unit 12A Purdeys Way, Purdeys Industrial Estate, Rochford, Essex, SS4 1ND, United KingdomTEL: +44 (0) 1702 303350 FAX: +44 (0) 1702 468731www.electrothermal.com

Combat Morale Booster just got better...

...it now also

Page 47: Counter Terror Business Volume 10

The defence industry is highly capital/technology intensive and offers bright prospects for economic growth in Malaysia. In April, around 850 companies from 48 countries participated in the 13th Defence Services Asia 2012 at the Putra World Trade Centre in Kuala Lumpur. The show featured a display of the world’s sophisticated hardware and electronic warfare in land, air & sea defence, battle field healthcare products technology, training & simulation systems and police and security peripherals. Over the years, the event has built up a firm reputation, putting Malaysia on the radar within the defence and security exhibition arena. It was the first show to have an exlusive section dedicated to the Battlefield Healthcare sector. DSA 2012 continued to play a pivotal role in bringing together the key players in the defence industry and government

agencies for strategic alliances, business collaboration and successful networking. Over sixty UK defence companies exhibited, ranging through primes, mid-caps and small to medium sized enterprises. ADS, the UK trade organisation for the Aerospace, Defence, Security and Space industries, continued its promotion of the industry’s interests in the Malaysia and the Asia Pacific through managing the UK trade pavilion. Willy Hockin, director maritime at ADS, said: “As the high level of interest from UK industry present at DSA and our Prime Minister’s recent tour of the region has demonstrated, Asia is a key market for UK defence and security companies. Industry anticipates there to be a significant demand from the region in the future, and the UK as the second largest global exporter of defence equipment is an ideal partner to aid this growth.” The Eurofighter Typhoon Full Scale Replica (FSR) took pride of place at the event.

Situated outside hall 4, it gave Ministers, delegations and visitors the chance to experience what it’s like to be a Typhoon pilot, sit in the cockpit and gain an understanding of the working environment. This year Royal Air Force Typhoon pilots will play a key role in providing airspace security for the London 2012 Olympics, an extension to Typhoon’s normal activities as they routinely police the UK skies 24-hours-a-day, every day of the year. Amongst the other UK exhibitors was Hale Hamilton, designer and manufacturer of high pressure fluid control systems for the defence markets. Hale Hamilton’s AUTOCHARGE system has been implemented on a number of UK Ministry of Defence (MoD) vessels after a successful trial. Originally part of a scheme to prove the system as a method of delivering breathing air charging arrangements onboard HMS Ocean, AUTOCHARGE has delivered a number of benefits to the MoD, leading to its implementation on the Royal Navy’s latest Type 45 Destroyers. The show concluded literally with a big bang, with the Malaysian Army conducting a dynamic demonstration at the riverside for an audience comprising exhibitors, VIPs, visitors, and the media. The bi-annual event will next take place on 7-10 April in 2014.

FURTHER INFORMATION www.dsaexhibition.com

DSA 2012

DSA’S BIG BANGApril’s successful Defence Services Asia (DSA) event at the Putra World Trade Centre, Kuala Lumpar, brought together key players in the defence industry from across the world

Asia Focus - DSA 2012THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

47 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 48: Counter Terror Business Volume 10

Organised by

Book by

30th March

and

Save S$350

In Full Partnership with the Royal Thai Government

and is pending final endorsement from the Thai MoD

CBRNeAsia.com

To Keep up-to-date with the Latest Programme Updates, Developments and Announcements Visit:

Connect with 300 delegates from over 30 countries

Be visible and be recognised as a key CBRNe player at the premier CBRNe event for the ASEAN community

Reach out and get your opinions across to the people that matter

Networking - 5 days of activities which include workshops, conference, 3 days of exhibition, Royal Thai Governemnt table top exercise day and the Thai National CBRN exercise make this the premier CBRNe event for networking in the world

Esteemed military and government speakers from Asia, Europe, USA, South America and the Middle East ensure that you will hear timely case studies from those at the forefront of current operations

CBRNe Asia 2012 is Asia’s first and largest 5 day CBRNe event, exhibition and exercise and will bring together experts, end users, policymakers,

industry and procurement staff.

The event will be held in conjunction with the annual Thai National CBRN Exercise, which will focus on a number of chemical and radiological scenarios,

and will be fully accessible to all conference delegates.

Lead Exercise Sponsor:

Delegate Bag Sponsor:

Event Sponsor:USB Sponsor:Exercise Product Sponsor:

Exhibitors:

Official Media Partner:Endorsing Partners::

a TNO company

Page 49: Counter Terror Business Volume 10

The shift in terrorist operations from large syndicates to small ‘cells’ that operate with little evidence means that their detection and ultimately capture is getting harder and harder. In addition to this, the threat of terrorism is evolving too, and with it, the risk of incidents intended to maximize the number of victims on a global scale. Recent events and discoveries regarding Al-Qaeda’s interest in CBRNe Weapons for example, indicate that terrorist groups are aware and working hard to acquire CBRNe materials and the expertise to use them in their operations. The prevention of such incidents therefore, is of the highest priority and merits a high level of attention, concern and preparedness. CBRNe, short for Chemical, Biological, Radiological, Nuclear and explosives is a relatively new concept, used to refer to incidents or weapons involving any of these five hazards. The national and global implications of such incidents can be devastating. Not only does this type of terrorism pose a clear threat to large-scale public health and safety, but such an event would have alarming ramifications for national security and economic and political stability on a global level. Keeping in mind the developments discussed previously, it is clear that the preparedness to face such an emergency, is therefore crucial and its importance simply cannot be exaggerated.

AWARENESS AND PREPAREDNESS It is for this reason, that IB Consultancy Asia is organising CBRNe Asia 2012, Asia’s first and largest five day CBRNe event, together with the Royal Thai Government, taking place in Bangkok Thailand on the 3rd – 7th of September, 2012. The conference, exhibition and exercise will bring together policymakers, procurement delegations and more than 300 delegates from all over the Asia-Pacific region. CBRNe Asia 2012 has been put together to heighten the level of CBRNe awareness and preparedness in the Asia Pacific region. Hosted in full partnership with the Royal Thai Government who have actively participated in the design and development of the event, Yongýoot Wichaidit, Minister for Interior, Royal Thailand Government will be the guest of honour speaker. The provisional

title of his presentation is “An Analysis of the CBRNe Programme in Thailand”.

KEY THEMESCBRNe Asia combines a pre-conference workshop led by the European Commission, two days of high-level conference covering key themes including the Fukushima Nuclear Crisis, Detect and Decon, Counter IED, Bioterrorism and Biosecurity, Non-Proliferation and CBRN Forensics,. Over three days, 40 companies will showcase their latest technologies for the CBRNe community, a full day of table top scenarios and the Royal Thai National CBRN Exercise. The week of activities ensures that attendees not only get to understand and discuss the most crucial, dangerous and imminent CBRNe threats faced, they also get to see, touch and engage with the latest methods, technologies and intelligence to help them counter the CBRNe threat. CBRNe Asia begins with a pre-conference interactive workshop hosted at the Dutch Embassy in Bangkok on 3rd September. The next day marks the start of the

conference and exhibition, which will cover various aspects of CBRNe and includes seven streams, including: The Fukushima Nuclear Crisis - case studies from the Japanese Government, Japanese Centre for Crisis and Contingency Management and Japan Medical Association Research Institute (JMARI) will shed new light on the context of the nuclear crisis and Japan’s lessons learned from Fukushima. Medical Countermeasures - in this stream, the topics covered will range from the broad (CBRNe medical emergencies – challenges & collaborations) to the specific (Thailand’s CBRN-E medical defence capabilities,

Medical CBRNe countermeasures in Vietnam). This stream is Asia centric and aims to generate insight into CBRNe medical capabilities in South East Asia. Detect and Decon - detection and decontamination of CBRN incidents are of paramount importance and this stream focuses on Malaysia’s detect and decon capabilities, 21st Century CBRN detection and decontamination and detoxification systems used successfully in global and international high profile events. Counter IED - the threat posed by IED’s is transnational, multidimensional and countering them is of paramount importance. Speakers will deliver on topics such as the IED as an enduring threat; Lessons taken from the Indonesia terror attacks, and; terrorist IED attacks in India - a case study. Bio Terrorism - this stream aims to highlight the importance of countering terrorists from using biological agents against civilians. The head of the Royal Thai Army medical program will speak on Thailand’s counter bioterrorism strategy whilst the Beijing Institute of Biotechnology will offer insight into China’s emergency preparedness bio terrorism plan.

FORENSICS CBRN Forensics - a niche field with the potential for extremely high growth, CBRN forensics is CBRNe Asia’s Pièce de résistance. It includes topics such as the Netherlands Forensic Institute and CBRNe crime scene investigation and planning for exercises of CBRN forensic capabilities. Non-Proliferation - this is just as an important issue today as it was during the cold war. This stream will have topics such

as: NATO’s non-proliferation policy, the EU Action Service non-proliferation programme and non-proliferation activities at the China Arms Control and Disarmament Association. 40 companies will exhibit their latest technologies and solutions during the 3 day exhibition taking place on the 4th, 5th and 6th September. Attendees will have the opportunity to see, feel and engage with companies who are leading the way in terms of CBRNe equipment and countermeasures. L

FURTHER INFORMATIONwww.ibcevents.com/events/CBRNe-Asia2012

Case studies from the Japanese Government, Japanese Centre for Crisis and Contingency Management and Japan Medical Association Research Institute (JMARI) will shed new light on Japan’s lessons learned from Fukushima.

CBRNe ASIA

FOSUSING ON PREVENTION CBRNe Asia 2012 on 3-7 September in Bangkok, Thailand will bring together experts, end users, policymakers and procurement staff. A special focus session will examine the Fukushima case.

Asia Focus - CBRNe Asia

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

49 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Organised by

Book by

30th March

and

Save S$350

In Full Partnership with the Royal Thai Government

and is pending final endorsement from the Thai MoD

CBRNeAsia.com

To Keep up-to-date with the Latest Programme Updates, Developments and Announcements Visit:

Connect with 300 delegates from over 30 countries

Be visible and be recognised as a key CBRNe player at the premier CBRNe event for the ASEAN community

Reach out and get your opinions across to the people that matter

Networking - 5 days of activities which include workshops, conference, 3 days of exhibition, Royal Thai Governemnt table top exercise day and the Thai National CBRN exercise make this the premier CBRNe event for networking in the world

Esteemed military and government speakers from Asia, Europe, USA, South America and the Middle East ensure that you will hear timely case studies from those at the forefront of current operations

CBRNe Asia 2012 is Asia’s first and largest 5 day CBRNe event, exhibition and exercise and will bring together experts, end users, policymakers,

industry and procurement staff.

The event will be held in conjunction with the annual Thai National CBRN Exercise, which will focus on a number of chemical and radiological scenarios,

and will be fully accessible to all conference delegates.

Lead Exercise Sponsor:

Delegate Bag Sponsor:

Event Sponsor:USB Sponsor:Exercise Product Sponsor:

Exhibitors:

Official Media Partner:Endorsing Partners::

a TNO company

Page 50: Counter Terror Business Volume 10

• Long term storageOver 3 years*1 data storage with the 32GB memory option.

• Remote data download & GPS location3G/GPRS data download & GPS location data with the new CK:680 outdoor measurement kit.SMS, Email & Twitter alerts when an AcousticFingerprint template is triggered.

• NR & NC Curves*2

View NR & NC values & curves on screen using 1:1 octave band data.

• High level noise measurementMeasure noise levels up to 165dB with the MV:200EH High Level Microphone system.

• Extended Ln capability*2

Up to 28 Ln values with independent time &frequency weightings and sampling periods.

• Updated NoiseTools software with licence free installationLicence-free installation with free updates. Install NoiseTools on as many PC’s as you need at no additional cost.

New features include:

• AuditStore™Anti-tamper data verification with the newAuditStore.Ensure the validity of your noise measurements.

• Acoustic Fingerprint™Advanced triggering of audio recording and alertsusing any combination of threshold, rate of changeand tonal noise criteria. Use up to 20 independentrules across 5 templates to detect, record andidentify noise sources.

• High resolution audio recordingStore audio recordings at 96kHz/32bit for furtheranalysis or store at 16bit/16kHz for listening andsource identification.

• Tonal noise detection*2

Tonal noise detection using ISO 1996-2:2007Simplified Method or the new Cirrus improvedmethod (extended frequency range, user definedthresholds, A & Z weightings & detection of tonesbetween bands).

Updated for 2012, the Optimus Green sound levelmeters give you the tools to measure, identify andrecord the information you really need.

6665 Counter Terror Mag Advert artwork:Layout 1 30/5/12 13:08 Page 1

Page 51: Counter Terror Business Volume 10

Written by David Evans, BSIA

Security for London 2012 is something that requires careful planning, and that takes into account the multi-faceted risks that large crowds and increasing numbers of visitors can bring to the country. The safety of visitors as well as athletes is of course a primary concern for security services, as is the need to allow for operations outside of the Games to not be unnecessarily disrupted. Transport, crowd control, business premises and VIPs therefore all require their own security considerations.

KEEPING THE NETWORK MOVINGMaintaining the infrastructure of London during Games-time will present a large-scale challenge, with the capital’s transport network put to the test by the large influx of visitors expected. Moreover, the recently staged security testing in the disused Aldwych station is further proof of just how important transport security is to ensure a safe and effective service.Arguably one of the most popular security measures around, the importance of CCTV images in the transport sector was demonstrated in a number of high profile incidents, such as the 7/7 bombings, where images of the perpetrators were obtained from Luton railway station, and for the aborted attack on 21/7, where four men were convicted thanks to evidence gathered off

28,000 CCTV recordings – then whittled down by police to seven hours of footage - on buses, trains and stations. During both incidents, police were able to utilise London’s extensive network of congestion charging cameras. ANPR (Automatic Number Plate Recognition) systems have proved to be especially beneficial, enabling the police to piece together the movement of vehicles in the lead-up to the incidents. Recent developments in the technology have also allowed it to be become an increasingly effective crime fighting tool. With the advent of video analytics, images from CCTV cameras can now be automatically analysed to create useful information about their content, instantly alerting operators. In 2007, the busy Clapham Junction station in London was amongst the first rail stations in the country to install a CCTV system equipped with video analytics specifically aimed at addressing the rising risk of terrorist attacks. The cameras were installed to help in the identification of suspicious behaviour and in spotting

unattended equipment. In recent years, this technology has been rolled out to many other stations in the UK transport network. Health and safety applications of video analytics are also useful for activities such as people counting as well as for the detection and identification of smoke or fire.

It is not only static cameras that can be employed to secure

the county’s busy transport network, but mobile CCTV

too, which is used by both the police and the transport industry itself. We are now seeing the widespread deployment of ruggedised mobile Digital Video Recorders (DVRs) on

trains and buses and other parts of the public

transport infrastructure. When fitted, these compact,

self-contained systems are capable of continuously monitoring the inside of a carriage or bus for suspicious behaviour, moreover providing a significant deterrent to criminal damage, delivering much-needed reassurance to the travelling public. Alongside the vast amount of electronic security measures available for the E

With the London 2012 Olympic and Paralympic Games finally upon us, David Evans, project director for 2012 at the British Security Industry Association (BSIA), reminds us of the extensive planning that continues to take place to make the Olympics a success in terms of safety and entertainment.

Olym

pic Security

OLYMPIC SECURITY

SECURING THE GREATEST SHOW ON EARTH

“Recent developments in ANPR have

proved beneficial and allowed it to become

an increasingly effective crime fighting tool”

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

51 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 52: Counter Terror Business Volume 10

PublicBuildings

Multi-tenantOccupancy

IndustrialCommercial

www.cdvigroup.com

Creator of electronic access solutions

CDVI UK

Unit B1, Knaves Beech Business Centre,Davies Way, Loudwater,High Wycombe, HP10 9QR Tel: 01628 531300 www.cdvi.co.uk

* Ref

er t

o Li

mited

Life

tim

e W

arra

nty

cond

tion

s.

Edition 5.1

INTEGRATED ACCESS CONTROL

LIFT CONTROL

POLYCARBONATEPROXIMITY READER

GRAPHICAL INTERFACE

TIME & ATTENDANCE

ALARM MANAGEMENT

52

64

3

1

78

CARD COUNTER

Perfect to install in the following enviroments.CDVI Reader Technologies

Great Features

VISITORMANAGEMENT

PARKINGMANAGEMENT

GUARD TOURMANAGEMENT

Included Modules

IP CAMERAS

DVR & NVR

Powerful Integration

ALARM INTEGRATION

STAINLESS STEELMIFARE®/DESFIRE® READER

STAINLESS STEELPROXIMITY READER

RFRECEIVER BIOMETRIC READER

LONG RANGEREADER

BIOMETRIC INTEGRATION

ENERGY MANAGEMENT

Scan the QR code to download the Centaur Brochure

Introducing Centaur Integrated Access Control, CDVI group’s flagship access control

platform.

Versatile and secure, Centaur offers flexible installation using a multitude of connection

methods from hard wired to IP, Centaur provides access control from 1-64 sites local

or remote.

Featuring powerful integration with CCTV, Fire, Intruder and Biometrics, Centaur is constantly evolving to fulfill your access

control requirements.

With market leading functionality and many add-on modules included as

standard, why not make Centaur youraccess control platform of choice?

Page 53: Counter Terror Business Volume 10

E protection of visitors, staff and vehicles operating in the transport sector, it is still important to ensure a physical security presence in vulnerable areas. Security officers can serve as a means to make the public feel safe, as well as provide that all-important first response to incidents as they occur. Security guards are often also in charge of monitoring and taking charge of the electronic security systems held on sites, such as CCTV and access control. The value of having manned security on hand was exemplified by the actions carried out by one of the winners of the BSIA’s Security Personnel Awards in 2011. Whilst on shift as a security officer at a local bus station in the Yorkshire region, Adam Todd was alerted by a member of the public that saw a fellow passenger drop what looked like a gun whilst on the bus. After confirming the presence of a possibly armed individual on site, the officer alerted the bus driver, police and CCTV control room, and with a pretext evacuated the vehicle to ensure passengers could leave the bus safely. The officer’s actions prevented the situation from escalating and panic from spreading.

SECURING THE EVENTSThe requirement for both manned and electronic security measures, however, goes further than that of ensuring the protection of the transport network. Electronic security such as CCTV and access control have a range of applications, and play a crucial part in the maintenance of order and safety at events, as do the practical application and involvement of security personnel. Officers’ duties can range from crowd management, operating of electronic security systems such as CCTV and access control, car

park attendance and general monitoring duties. They also provide that all important physical presence on the day, becoming a useful port of call for members of the public requiring assistance or information. With ticketed as well as non-ticketed events expected to draw in considerable crowds, effective crowd management planning in particular is a paramount concern for organisers of both the main events or of the many parallel events which will be held across the country in the summer. With large gatherings, in fact, the risk of incidents occurring such as theft, violence and vandalism increases, as do health and safety breaches such as irreparable damage to infrastructure or overcrowding. Personnel who have been trained as crowd safety officers with an NVQ Level 2 in Spectator Safety cover the important role of securing against these threats, by controlling the crowd and, assisted by security operatives, deterring criminals from their intent.

CLOSE PROTECTION REQUIREMENTSBut it is not just crowds that require particular security attention. In the case of the London 2012 Games, a large concentration of high profile individuals will be in attendance, including national and international politicians, celebrities, members of the Royal family and well-known sport personalities. Close protection detail therefore needs to be in place. Mike O’Neill, chairman of the BSIA’s Close Protection Section, comments: “There is a commonly-held perception that the Metropolitan Police will provide Close Protection services to visiting dignitaries, but with police close protection resources already allocated, many visitors will need to appoint a private company to provide Close

Protection during the summer’s celebrations.“A good working knowledge of London’s geography, its culture and the impact of the events taking place is an essential requirement for effective close protection.” Mike continues. “Equally important is a close protection officer’s ability to adapt their approach depending on the individuals under protection; for example, an individual travelling with young children or family will have much more complex requirements than a person travelling alone.” The close protection officer’s work starts before an event, with the in depth scrutiny of the venue to ensure all angles are covered. In most scenarios, officers must ensure that high profile attendees are able to go about their daily business with almost an invisible bubble around them, reacting only when required.

GOING ABOUT YOUR DAILY BUSINESSThe ability to go about their daily business with minimum disruption is a consideration that event organisers are making not only for individuals requiring special protection. Representing the largest post-war security challenge that the UK ever faced, the effects of the London 2012 Games will be felt by the companies directly involved with the events, by visitors, and also by all businesses operating in areas in and around the Games and its many events. Of course, this impact will not be restricted to the London area, but will engross major cities across the country that will be hosting one of the 37 competitions taking place outside the capital, as well as parallel events such as large-scale screenings. Forward planning and considerations regarding the logistics of how to guarantee business continuity during very busy times for the national infrastructure should be a top agenda item for businesses as well as local residents in the run up to the event, as should the need to ensure adequate cover and protection of premises, by adopting an integrated approach to security. There is a wealth of advice out there for residents, business owners and visitors on how to plan for travel arrangements and business continuity needs throughout the Games, and the London Organising Committee of the Olympic Games (LOCOG) website is a great place to start for information. Years of preparations have gone into the security planning for this remarkable event, and the BSIA has been at the forefront of security planning. Working alongside Government departments such as the Olympic Security Directorate (OSD) and Olympic Delivery Authority (ODA), as well as the London Organising Committee for the Olympic Games (LOCOG), the Association has helped to identify challenges that both public and private sectors will face. L

FURTHER INFORMATION www.london2012.com www.bsia.org.uk

Olym

pic Security

OLYMPIC SECURITY

Electronic security such as CCTV and access control plays a crucial part in the maintenance of order and safety at events, as do the practical application and involvement of security personnel

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

53 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 54: Counter Terror Business Volume 10

Protection without CompromiseArmoured Vehicles from Jaguar Cars Limited and Land Rover

Jaguar Land Rover’s range of armoured vehicle solutions covers a spectrum of requirements that cannot be matched by any other original equipment manufacturer. They cover needs that range from

head-of-state level to those of key workers operating in hostile environments.

Jaguar Land Rover, Banbury Road, Gaydon, Warwick, CV35 0RR

www.landrover.com/armoured | www.jaguar.com/armoured

email: [email protected]

Page 55: Counter Terror Business Volume 10

Once upon a time armoured vehicles were used solely by those whos very lives depended on them or who were at threat of constant attack. The Armed Forces, royalty, political figures and well-known celebrities all relied on the protection or armoured vehicles. However, in changing times and with the increase in the need for personal security, armoured vehicles are becoming a more popular choice for the wealthy as well as those in the public eye or in conflict situations. However, for many there has been the misconception that an armoured vehicle provided a clear sacrifice, in that it could not possibly offer the same style and performance of its rivals in the luxury car market. Jaguar Land Rover’s range of armoured vehicle solutions dispel this theory, covering a spectrum of requirements difficult to match by any other original equipment manufacturer. Jaguar Land Rover’s armoured vehicle range comprises four models: the XJ Sentinel, Range Rover, Discovery and Defender. In their standard ‘soft-skinned’ versions each has forged an enviable reputation for style, performance, refinement and reliability. Other OEMs may have luxury vehicles, or SUVs, or full off-roaders, but only Jaguar Land Rover has the expertise in all these areas to offer a seamless range of armoured vehicle solutions to match any requirement. This range of vehicles has been created through an exhaustive and extensive development process - offering levels of protection equal to or exceeding those of the competition. However, despite the fact that they are fully tested and certificated to internationally-recognised standards, they have not compromised on the legendary comfort and driveability offered by Jaguar Land Rover’s soft-skinned vehicles. A fact that, makes them virtually indistinguishable from the standard models.

XJ SENTINEL Leading the armoured range is the XJ Sentinel limousine. Utilising Jaguar Land Rover’s extensive experience in the armoured vehicle arena, the marque has produced a version of the long wheelbase XJ Portfolio. The XJ Sentinel in heavily armoured, offering certified ballistic protection. The suspension has been uprated to cater for the additional weight of the armour, and inside the vehicle retains

the standard level of luxury that provides the rear-seat occupants with a full metre of legroom, and a range of options. One major advantage of the XJ Sentinel is that it offers an exceptional 500-kilogramme payload, more than sufficient for four occupants and their luggage, and any additional security equipment that may be required.

ARMOURED RANGE ROVER Based on the popular Vogue model, the Armoured Range Rover SUV is aimed at a variety of customers who require a level of rough-road capability. In terms of protection the Range Rover is certificated to B6+ level against ballistic threats, offers side protection against 15-kg TNT blasts, and underfloor protection that can withstand grenade attacks. As with the other members of the Jaguar Land Rover armoured range, the Range Rover has run-flat tyres complete with warning system (where local legislation allows) and incorporates many of the advanced systems of the soft-skinned vehicle. It has a number of security options available, such as anti-tamper exhaust, opening driver’s window, vision assist and intercom. An auxiliary battery is fitted to provide additional power for specialist equipment such as communications, and there are options for covert headlight flash, blue lights and sirens, and under-bonnet fire suppression. In November 2011 the Armoured Range Rover was retested to EC whole vehicle type approval (ECWVTA) and has improved GVW which creates a payload to 455kg.

ARMOURED DISCOVERY Jaguar Land Rover is the only OEM to offer a fully certificated armoured vehicle that has off-road capability in the shape of the Armoured Discovery. Based on the Discovery SE model, this vehicle provides the same B6 levels of protection as the Range Rover. It is offered with both short and long armoured cells, the latter featuring armour that projects into the cargo bay at the rear. The cabin of the Discovery can be configured to meet a variety of needs, with options covering different seating options, additional power harnesses and the ability to mount special equipment. Combined with the 500-kilogramme payload available in the short-cell version and additional battery option, this versatility allows

it to carry a range of support equipment, such as communications and medical kit. In the short-cell version the vehicle can be fitted with an escape hatch in the rear of the cell, allowing occupants to dismount via the tailgate. Long cell versions have integral opening doors that allow both access into the protected cell from the luggage area, and emergency egress through the tailgate should the vehicles doors be prevented from opening as a result of attack or collision. L

FURTHER INFORMATIONwww.jaguar.com/armouredwww.landrover.com/armoured

ARMOURED VEHICLES

PROTECTION WITHOUT COMPROMISEArmoured vehicles come with many levels of protection. Jaguar Land Rover’s range has been designed to mirror as closely as possible the standard models, providing ultimate discretion. However, although the occupants appear to be travelling in a standard vehicle, they are protected by armour equal to or better than that offered by any competitor

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

55 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 56: Counter Terror Business Volume 10

WWW.GPSPerimeter.co.uk [email protected]

+44 ( 0 ) 1604 648344

Suitable for protecting: Cable Ducts

Pipelines Fences

The MILES is an innovative fiber optic detection system that has a number of

different configurations to detect attacks in many different applications. It can be used as a fence mounted detection system, a pipeline protection sys-

tem and for detection of interference or removal of cables in ducts or troughs. There is even a buried system, which has particular applications rail and tunnel

safety and security applications. It has:

Very high detection capabilities Attack point identification to within a few metres Variable range capabilities from 1km up to 25km

No power required in the field No requirement for new fibers, using existing spare fibers if available

Contact us now at

GPS Perimeter Systems for more detailed information

Page 57: Counter Terror Business Volume 10

Written by John M

arshall, Perimeter Security Suppliers Association

The UK threat level has fluctuated for some years now between ‘critical’, ‘severe’ and ‘substantial’, the three highest levels of threat, so it is apparent that we are still very much at risk from attack by international terrorist groups. Understanding the threat level is key when determining the ‘risk’ to a facility. Risk is defined as a function of probability and resulting consequences of an attack. However, threat levels do change so when determining a protective strategy the future variability of the threat level must be considered at the outset. Over the past few years much has been done to protect against terrorist attack. New security organisations have been put in place by HM Government, much good guidance issued and best practice published, and many high risk sites are now better protected. In this latter context protecting crowded places (including transport hubs, shopping centres, exhibition and convention centres and sports arenas, etc.) together with high profile Government, public and commercial sites, has been the focus of much attention. The Government has set up several key bodies to advise on anti-terrorist measures, two of which are the Centre for the Protection of National Infrastructure (CPNI) and the National Counter Terrorism Security Office (NaCTSO). Both provide essential guidance on protecting the UK’s most vulnerable and valuable sites and assets, enhancing the UK’s resilience to terrorist attack and generally raising awareness of the terrorist threat and how we can prepare for, and protect ourselves, in the event of an attack taking place.

BUILDINGS AND SITE PROTECTION – SEEKING AUTHORATIVE ADVICEGovernment guidance on counter-terrorism states, “as the level of risk varies, counter terrorism protective security measures should be proportionate to the risk of terrorist attack”. The guidance also includes a definition of the different site risk levels. There are four in all – high, medium-high, medium and low. The two highest risk categories will be an immediate focus for Counter Terror Security Advisors (CTSAs) - a nationwide team of police security experts whose purpose is to advise on how to best protect against terrorist, and criminal, attacks. Anyone currently involved in commissioning, planning, designing and managing new developments or major redevelopments within the built environment should consider security requirements from the outset. There is E

The term ‘proportionality’ continues to generate debate. Another similar approach is to consider providing mitigation measures that reduce consequences to As Low As Reasonably Practical

PERIMETER SECURITY

DESIGNING FOR COUNTER TERRORISMJohn Marshall, director of the Perimeter Security Suppliers Association outlines the security challenges facing the UK and highlights best practice to protect against terrorist attack.

Perimeter Security

Attractive stone clad balustrade walls and crash rated bollards in central London offer robust protection against hostile vehicle attack

Re-deployable surface mounted walling systems and pedestrian portals enable authorised access and can be rapidly deployed and easily reconfigured if the need arises

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

57 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 58: Counter Terror Business Volume 10

areba Security is a leading provider of perimeter intrusion detection systems (PIDS) that detect, deter, delay and respond to intrusions or escapes. These systems are recommended for:• Utility companies• Correctional & prison facilities • Government or military installations • Industrial/commercial property • Airports, Ports, auto dealers• Critical infrastructure • Oil re neries • Transport hubs

Zareba Security offers innovativesolutions for today’s heightened secu-rity challenges. The Induced Pulse® electric fence system provides aphysical barrier that is an imposingdeterrent and features extremely low false and nuisance alarm rates (In re-cent UK government long term trials the Induced Pulse system had the lowest incidence of false alarms amongst the systems being tested). This means the security guard and/or local authorities can respond to a veri ed alarm rather than a false alarm.

For highly secure areas the Induced Pulse® perimeter security system is

. Pulsed Electric Perimeter Fence

. Deterrent & Detection System

. Tamper resistant

. PC based GUI with mapping

. Simple to maintain & repair

. Integration with CCTV etc...

. Compliant with BSEN60335-2-76

. Compliant with BSEN1722-17

. Manufactured in the UK

. Design & after sales support

. Installation training

Tel: +44 (0)1572 722558www.zarebasecurity.com

Induced Pulse® a proven perimeter deterrent and detection systemthe ideal solution. It is an electric fence system that combines a barrier with intrusion sensing and a shockdeterrent to prevent security breaches.Adaptive fence sensing technology (patent pending) makes for a verystable system. It can ignore voltage uctuations caused by wet vegetation and other contaminates on the fence line but still give rapid response to fence attacks.

The system features: • Tamper-resistant with alternating high voltage and ground wires • Minimal nuisance alarms caused by birds, small animals, weather, etc. • Customised zones and wire array • Standalone installation or mounted on existing fence, roof or wall tops• PC Windows based user interface• Graphical mapping overlay• Customer friendly GUI• Interfacing with most common data bus systems• Integration with CCTV systems• Integration with Access Control & Building Management systems• Listed in the UK Secure By Design (SBD) product list• Solid & robust construction

Zareba Security have designed and engineered perimeter fence systemsfor satis ed customers around the world. We have sales and technical staff based in the UK. We also haveour own UK in house engineeringdepartment who are continually looking at innovative ways of improving the product.

We are committed to working with each customer to create a cost effective solu-tion for their clients site.

Zareba Security only sell toapproved installers. If you are interest-ed in becoming an installer we would like to hear from you. We offer in house training courses to Lantra standards.

Zareba Security(Rutland Electric Fencing)8 Lands End WayOakhamRutlandLE15 6RF

Tel: +44 (0) 1572 722558Fax: +44 (0) 1572 757614www.zarebasecurity.com

Z

Page 59: Counter Terror Business Volume 10

E considerable scope in the design and planning of facilities to include proven and effective protective security measures based on best practice guidance on bomb blast and hostile vehicle mitigation (HVM) available from CPNI. Fundamentally, a holistic approach is required that provides increased protection to life and assets by designing in proportionate security measures, whilst ensuring any facility remains visually attractive and functionally useable. Measures do exist for reducing risk with particular relevance to mitigating potential consequences. However, the big question is: “how much should we do?” Ultimately this will require an assessment of investment compared with the resulting potential benefits. The term ‘proportionality’ continues to generate much debate. Another similar approach is to consider providing mitigation measures that reduce consequences to As Low As Reasonably Practical (ALARP). But this still requires consideration of cost/benefit in determining and implementing protective schemes.

ASSESSING WHAT IS REQUIREDWhilst local CTSAs provide an invaluable service, organisations whose sites are in the high or medium-high category may wish to employ the services of expert security consultants to fully evaluate the risks and provide detailed recommendations. When undertaking a security review of this type a number of key factors and different threat scenarios need to be considered. These include car and truck bomb attack (Vehicle Borne Improvised Explosive Devices, static and dynamic), forced entry, covert/insider entry, firearms/ballistic attack and stand off

weapons. Typical expertise required from the security consultant will include blast and structural engineering, knowledge of the different types of threat scenarios and perimeter protection options that involve the use of vehicle and pedestrian security barriers to manage access control and maintain stand-off distance. Experts in this particular field can be found by contacting the relevant security and built environment trade bodies, organisations such as the Institution of Civil Engineers and the ADS Group. Supplier organisations including Tata Steel also have considerable expertise in this field and can provide a comprehensive security consultancy service.

BLENDING INAesthetic considerations now play a major part in the selection of appropriate security measures. A scheme, just recently completed, that delivered the very best in robust hostile vehicle mitigation measures in a way that was sympathetic to the local landscape and consistent with the local architecture, was the Whitehall Streetscape Project undertaken by Westminster City Council in partnership with The Cabinet Office. Measures to protect from hostile vehicle attack consisted of high performance bollards and Portland stone clad steel framed walls, both balustrade and solid. Although both have the appearance of the traditional bollards

and stone walls that predominate in this part of the city, the bollard systems and the stone clad steel wall frames were provided by Tata Steel, having been fully tested to withstand an attack by a hostile vehicle.

SECURING OUR FUTUREThere is now an increased awareness of the need to incorporate appropriate anti-terrorist measures into higher risk buildings and sites

with high levels of pedestrian traffic. There is also now

considerable expertise available both from

relevant Government organisations, industry bodies, the design community and suppliers of blast protection and physical security equipment. The

terrorist threat will be with us for

some time to come and those responsible

for future development of the built environment (including

developers, designers and end-user occupiers) must continue to embrace the need to build in security at the earliest possible stage in order to protect people and critical infrastructure from attack. L

FURTHER INFORMATION www.cpni.gov.ukwww.nactso.gov.ukwww.dft.gov.ukwww.pssasecurity.orgwww.tatasteelsecurity.com

Perimeter Security

PERIMETER SECURITY

“The Government has set up several key bodies to advise on anti-terrorist measures, two of which are the Centre for the Protection of National Infrastructure

(CPNI)”

Underground car parking areas need to be carefully assessed for riskShallow foundation bollard systems are fast to install thus minimising local disruption

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

59 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 60: Counter Terror Business Volume 10

Web: www.extrudakerb.co.uk | Email: [email protected]

Tel: +44 (0) 1709 862076

B U I L T O N I N N O V A T I O N

PREDOMINANTLY SURFACE MOUNTED

50 YEAR DESIGN LIFE WITH MINIMAL MAINTENANCE

ACTS AS FOUNDATION FOR FENCES, LIGHTING AND CCTV

RAPID PROFESSIONAL INSTALLATION

THWARTS BOTH VEHICULAR AND PERSON-BORNE ATTACK

MINIMAL FOOTPRINT

HIGH PROFILE CLIENT PORTFOLIO

INSITU CONCRETE PERIMETER DEFENCE SYSTEM

[email protected]

RAPID PROFESSIONAL INSTALLATION

THWARTS BOTH VEHICULAR AND PERSON-BORNE ATTACK

MINIMAL FOOTPRINT

HIGH PROFILE CLIENT PORTFOLIO

[email protected]

RAPID PROFESSIONAL INSTALLATION

THWARTS BOTH VEHICULAR AND PERSON-BORNE ATTACK

MINIMAL FOOTPRINT

HIGH PROFILE CLIENT PORTFOLIO

PAS 68:2010 accredited security system

7.5t vehicle (N2/N3) up to 90° impact at 64kph and 80kph

0505Extrudakerb Sec Barrier Ad V5.indd 1 09/03/2012 16:23

Page 61: Counter Terror Business Volume 10

Primarily, end users look for advice from external agencies and experts to recommend practical solutions to meet their operational physical security requirements. However, this has involved discussions with independent organisations such as the CPNI, who work with critical national infrastructure sites but does have a large influencing factor on other market sectors, and specialist security consultants to assist with the compilation of an appropriate operational requirement document. Ultimately, the end user needs to define the threat type they wish to protect themselves from, be it terrorist or criminal attack and their modus operandi. Whilst the PSSA can assist with this definition, it is recognised that the advice from CPNI generally drives

the global specification of any physical perimeter security solution. Whilst in principle this should be adequate, due to the political necessity for the CPNI to remain fully independent, it does mean that they cannot recommend particular solutions which favour one manufacturer over another.

PSSA ROLEThis is where the PSSA has a very important role in the process, as it can work with the industry to categorise products in such a way

to allow them to be selected and matched together, enabling the end user to select the best product(s) for an integrated solution. As a first step, the PSSA decided to build on the recognised PAS rating system and instigate an independently certified verification scheme for individual HVM products. Often PAS has been a misunderstood and misapplied standard when specifying HVM products, as it is a standard that confirms that a product manufactured and installed as tested should perform in the same manner as the crash test. In other words, as long as all the conditions remain equal, the result will be similar but it is fair to say that much changes between the test and final installation, due to numerous variables such as site specific

needs, dimensions and ground conditions. Given the need to accommodate so many variations, the PSSA feel that removing one variable will give clients more confidence in their installation. Therefore, the Product Verification System launched at the PSSA annual conference last December ensures that the product delivered to the client has been manufactured in exactly the same way as the one crash tested, with the same materials. With the entire industry present at the launch, the PSSA were pleased with the

reaction from the manufacturers, specifiers and end users, who see the product verification scheme as an important step on the road to raising the profile of the industry and generating client confidence. During 2012, the PSSA expect to see the large number of applications submitted from its members, for verification of products, resulting in a successful conclusion.

INDEPENDENT VERIFICATIONThe independent verification scheme from the PSSA also encompasses the handling of changes to products to meet site specification requirements. It has long been accepted industry practice to offer ‘engineered solutions’, where PAS results are extrapolated to suit the modification, supported by an independent engineering report from a specialist consultant. The PSSA scheme has formalised this process, so that the product manufactured is covered by the same stringent requirements and process documentation as the PAS tested product. This offers continuity and consistency of approach, giving client’s confidence in the solution. Now that the HVM Product Verification System is up and running, the next stage is to develop a complementary fencing scheme. There is a paucity of standards currently available, with the only recognised scheme primarily dealing with manual attack ratings. The PSSA feel that incorporating this factor with the applicable PAS rating elements will enable a fully compliant series of products to address clients’ HVM challenges. At the recent meeting on 23 February 2012, the fencing members of the PSSA met to continue their discussions surrounding the fundamental challenges that the clients are E

PERIMETER SECURITY

A HOLISTIC APPROACH TO HIGH SECURITY SITES The Perimeter Security Suppliers Association has long recognised the need for an integrated verification system for high security perimeter installation, as the historical approach of PAS 68 rated Hostile Vehicle Mitigation (HVM) products filling gaps in LPS 1175 rated fencing is inadequate for a number of reasons, writes Richie Bignell.

Perimeter Security

Written by Richie Bignell, Perim

eter Security Suppliers Association

Achieving a balance between products preventing attacks but being able to be repaired expediently and cost effectively will also be an integral part of the PSSA verification schemes.

ATG SP400 Bollards Barkers Fencing Stronguard 358 Broughton Defender 941 Barrier

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

61 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Web: www.extrudakerb.co.uk | Email: [email protected]

Tel: +44 (0) 1709 862076

B U I L T O N I N N O V A T I O N

PREDOMINANTLY SURFACE MOUNTED

50 YEAR DESIGN LIFE WITH MINIMAL MAINTENANCE

ACTS AS FOUNDATION FOR FENCES, LIGHTING AND CCTV

RAPID PROFESSIONAL INSTALLATION

THWARTS BOTH VEHICULAR AND PERSON-BORNE ATTACK

MINIMAL FOOTPRINT

HIGH PROFILE CLIENT PORTFOLIO

INSITU CONCRETE PERIMETER DEFENCE SYSTEM

[email protected]

RAPID PROFESSIONAL INSTALLATION

THWARTS BOTH VEHICULAR AND PERSON-BORNE ATTACK

MINIMAL FOOTPRINT

HIGH PROFILE CLIENT PORTFOLIO

[email protected]

RAPID PROFESSIONAL INSTALLATION

THWARTS BOTH VEHICULAR AND PERSON-BORNE ATTACK

MINIMAL FOOTPRINT

HIGH PROFILE CLIENT PORTFOLIO

PAS 68:2010 accredited security system

7.5t vehicle (N2/N3) up to 90° impact at 64kph and 80kph

0505Extrudakerb Sec Barrier Ad V5.indd 1 09/03/2012 16:23

Page 62: Counter Terror Business Volume 10

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 1062

Experience the difference...

CLD’s Security Fencing Systems create industry leading perimeter protection to safeguard high risk locations globally.

Our industry-leading team collaborates with you to share over 40 years of CLD expertise and deliver a security system that will suit your project perfectly.

Engineering tomorrow’s security

InnOvatIOn • COLLabOratIOn • ImpLEmEntatIOn

For more information please visit our website: www.cld-fencing.com

Our dedication shows every step of the way. We consider your challenges, listen to your concerns and create a system that gives you supreme performance, reliability and longevity – at exceptional value.

The CLD difference is clear. Make the experience yours.

Defence of our world

CLD Fencing Systems

Head Office:Unit 11,Springvale business Centre,millbuck Way,Sandbach,Cheshire,CW11 3HY

tel: +44 (0)1270 764751Fax: +44 (0)1270 757503

Email: [email protected]: www.cld-fencing.com

CLD4524 178 x 125mm Advert v.4 FAW.indd 1 25/5/12 14:02:27

Page 63: Counter Terror Business Volume 10

E asking them to address. It is clear that the plethora of fencing applications and lack of scheme is leading to client confusion and concern regarding over or under specifying products. As an industry, the PSSA Fencing Verification Scheme will address these concerns. In reality, the interaction between the HVM product(s) and fencing as an integrated solution to the operational needs of the client is the most important challenge the PSSA wishes to overcome. The current silo approach to this issue, with the stakeholders involved often working independently to achieve a cohesive solution can be time consuming, prone to error and potentially expensive. These two schemes will bring the individual elements together and develop a system which enables clients to specify and match relevant products. The final logical step in the process is an installation scheme, which the PSSA has begun working on. Its brief is not only to ensure that the way an HVM product(s) is finally installed complies as closely as possible to the PAS crash test condition, important as this is, but that it compliments and works with other products on site, be it PAS rated or not, such as access controls.

KEY ELEMENTOne key element of any installation should be whole life costs but this is often either overlooked or ignored, which is alarming given the economic times we currently live in. As this should be one of the major decision factors, the suite of PSSA scheme’s will have as its logical conclusion a process for deciding on the most suitable array of products to achieve a commensurate level of security within a given budget. In fact, the volume of PAS tested products now available for selection by customers has increased competition and reduced cost. Coupled with an unrivalled level of innovation, offering differing solutions to the same problem, the client needs to have a mechanism of looking at whole life costs as one means of differentiating between manufacturers. Clearly, static products generally require less on-going cost in terms of service and maintenance than dynamic products, so understanding the needs of each site is critical to an effective solution.

PRODUCT FAILUREHowever, cost is not the only factor to be taken into consideration. As soon as a dynamic product fails, this can adversely affect the physical security of the site. The PSSA verification schemes will continue to work to improve the reliability of installed products, so that clients’ confidence in their security will grow. Also the PSSA is well aware of how much networking goes on between customers and a consequence of this will be to raise the industry’s profile, further installing client confidence. From time to time, products are subject to

unforeseen damage in genuine accidents rather than hostile attack. Achieving a balance between products preventing attacks but being able to be repaired expediently and cost effectively will also be an integral part of the PSSA verification schemes. At the end of the day, security schemes involve so many stakeholders, from the end user client, to the consultant and main contractor, all of which have differing wants and needs. The historical piecemeal approach to meeting these needs has relied on manufacturers discussing with each stakeholder their requirements and promoting suitable products. This is not always wholly appropriate, as often what the client initially believes is required in terms of product is very far from the best solution, which can have disastrous and costly consequences. In fact, at the extreme, the solution may not actually prevent the event the client is concerned about, with the resultant repercussions. A holistic approach to physical perimeter security is one of the fundamental drivers of the PSSA, as it is critical that infrastructure is not only protected initially but is sufficiently robust and reliable in performance to continue the protection for a number of years. The PSSA verification schemes will drive the industry to ensure working with stakeholders during specification and on going operation will successfully achieve this. Members of the PSSA will be able to not only manufacture and where appropriate install and maintain suitable products, but they will be able to participate and advise at the design stage. As part of the PSSA rules, all members have to demonstrate an in-depth underlying knowledge and experience, as well as undertake a level of training to achieve verification. This means that any client will have the confidence of knowing that the PSSA has independently verified the member’s products and installations, so the advice given at all stages will be robust and improve the effectiveness of the project.

SAFE USEAnother area the PSSA covers is the safe use of product, so a client can be assured that they are dealing with an organisation that can assist with the conundrum of balancing the security of the site with the

safe operation of the products installed. Ever tightening regulations in this area are requiring the clients to seek advice during the planning of the perimeter scheme and the PSSA are well placed to assist. The PSSA is well down the road towards a truly holistic approach and is setting the standards which it believes the clients have been asking to be addressed. All its members are committed to see the PSSA achieve the raising of standards, both for the industry and the security of our critical infrastructure. L

FURTHER INFORMATION www.pssasecurity.org

PERIMETER SECURITY

Perimeter Security

Paradise Gate 2,3 & 4

replaced front radius

Terra V Gate 1 Frontier Pitts

IMG_1404 copy

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

63 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 64: Counter Terror Business Volume 10

As funding continues to be slashed as part of the Government’s Comprehensive Spending Review, pressures still remain for emergency services across the UK to make significant savings, while continuing to deliver high quality services for the communities in which they work. Recent and forthcoming events, such as the London 2012 Olympics and Paralympic Games, are also opening the discussion once again around the importance of interoperability within the blue light services. As a result, there has been a rise in collaborations between neighbouring police, fire and ambulance services as they continue to improve efficiency in the delivery of key front line services. These partnerships aim to ultimately improve emergency services through more effective and efficient use of resources – from staff, buildings and IT & communications to vehicles, equipment and training.

NEW IDEASThe Emergency Services Show 2012 is the ideal place to explore new ideas and initiatives in delivering efficient and effective emergency planning, as well as networking with like-minded professionals to discuss collaboration, ideas and initiatives focused on improving public safety. With over 4400 visitors attending last year’s event, the show will be a key event for anyone involved in emergency planning, response or recovery, both in the UK and abroad. This year, the event will take place on 21st and 22nd November at Stoneleigh Park, Coventry. Commenting on last year’s exhibition, Katie Wallis, Thames Valley Police, said: “The show was fantastic, the high levels of diversity among the different services coming together was phenomenal. I thoroughly enjoyed myself and look forward to next year’s show.” Robert Lankford, emergency planning officer, said: “The Emergency Services Show is a one-stop-shop to allow for networking, purchasing and learning to develop the emergency services.”

EXHIBITIONThe exhibition will feature three indoor halls and an outdoor exhibition area giving visitors the chance to meet specialist product and service suppliers. There will also be plenty of product launches at the show and a chance for visitors to look at budget savings. Over 400 exhibitors attended last year’s show and with five months to go, 320 exhibitors have already confirmed to attend this year’s exhibition, offering visitors the chance to view the latest security equipment and services from a range of leading companies. Some of the market leaders on display at this year’s exhibition will be: Babcock, British Red Cross, Emergency Planning College, Falck, Government Decontamination Service. The show’s Emergency Response Zone will once again feature exhibitors from police, fire and rescue, ambulance, professional, government and voluntary organisations from around the UK. This area demonstrates to visitors the capabilities of partnering agencies and the voluntary sector. Live demonstrations at the show will also provide a unique opportunity to see the latest equipment in action – in 2011 the show featured a public order water cannon from the Police Service of Northern Ireland. Expect more surprises at this year’s show.

FURTHER INFORMATION www.emergencyuk.com

EMERGENCY SERVICES SHOW

EMERGENCYSHOWCASE

Emer

genc

y Se

rvice

s Sho

w

The UK's only annual multi-agency event

The Emergency Services Show is the UK'sleading annual event bringing together all theemergency services, attracting buyers,procurement managers, planners andoperational staff.

Entry to the exhibition is FREE OF CHARGEfor all visitors. Online registration will be live fromMay at www.emergencyuk.com/hba

Make sure you are there to see the latest in:

• Communications & IT• PPE• Search & Rescue• Medical supplies• HazMat• Vehicles & accessories• RTC• First response• Training• Plus all other equipment and products

for the emergency services

SAVE THE DATEWed 21 – Thu 22 Nov 2012

STONELEIGH PARK | COVENTRY21-22 NOV 2012

w w w.emergenc yuk.com/hba

ESS is supported by ESS is organised by

Emergency planning professionals meet at Stoneleigh Park, Coventry on 21-22 November

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 1064

Page 65: Counter Terror Business Volume 10

IFSEC International delivered its most comprehensive show ever and reports a 25 per cent increase in end-users attending the show. Established for almost 40 years, IFSEC International took place at Birmingham’s NEC, UK 14 – 17 May 2012. Over 700 exhibitors were present including over 100 exhibiting for the first time. The show has undergone an overhaul of its content as it keeps pace with and reflects the changing trends and concerns within the security industry. As a result, a 68 per cent increase in the number of visitors attending education sessions at the show is reported. A hot topic for the industry which was heavily reflected is IP and the move towards convergence. A bespoke education programme with an emphasis on IP and integration skills and knowledge contributed to a 40 per cent rise in visitors from the IT/networking/telecoms sector. As part of this IP education drive, IFSEC debuted the ipAssured Education Zone, presented by Anixter, where a team of experts offered presentations on leading industry trends. Theresa Stenebring, EMEA program marketing manager, Anixter said: “ We want to help

people, both end-users and channels, to really get into the whole new world of IP, which is not so new anymore. It seems that the people were here to learn and to understand, and see new solutions and products.” With eight seminar theatres in total, free-to-attend education sessions and workshop programme ensured IFSEC International offered more education than ever. Eight country pavilions included China, Taiwan, Korea, Germany, France, Italy and the USA, accommodating leading manufacturers and suppliers.

AWARDS Acknowledging a number of successes across the security sector this past year, the IFSEC International Security Industry Awards, produced in association with the British Security Industry Association (BSIA), took place during the show. Hosted by BBC sports favourites Mark Lawrenson and Dan Walker, the awards event saw more than £4,000 raised for its charity partner ActionAid. Charlie Cracknell, event director, said: “IFSEC International defined itself as the must attend event that represents the ‘entire

security buying and influencing chain’ from across the globe. With a strong proposition combining the leading security and fire manufacturers, integrators, training via first-class free education, new show features, interactive experiences and networking, IFSEC International stepped up to the challenge. This has only been possible with the support of our partners and exhibitors and the commitment from our visitors”. IFSEC International is part of the UBM Live Protection & Management Series which took place from 14- 17 May encompassing Safety & Health Expo and Facilities Show. Other IFSEC global events take place in India, Saudi Arabia, South Africa, West Africa and Southeast Asia. IFSEC International is supported by leading industry and government associations and organisations; British Security Industry Association, UKTI/DSO, ASIS, National Security Inspectorate, Security Institute, Fire Industry Association, The Association of Police & Public Security Suppliers and The International Security Industry Organisation.

FURTHER INFORMATIONwww.ifsec.co.uk

Event Review - IFSEC

IFSEC INTERNATIONAL

Comprehensive education offering delivers significant visitor numbers at IFSEC

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

65 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

MOBILE SECURITY SOLUTIONS

BODY WORN SYSTEM and3G Transmission in ‘real time’

You can also ‘couple’ the Body worn system with the AGS StreamRS, a portable device designed to offer visual point of view Multimedia streaming from the field over the cellular 3G

network (using any SIM card). It allows users to stream live video/audio/location and the wearer can be monitored in real time from any location.

The unit has a built-in alarm button which can be pressed by personnel in the case of an event or emergency. The alarm triggers an SMS to any preset

phone number and will activate live video streaming on the connected server or PC/laptop client. The unit can stream high quality video/audio to any specified IP and iPhone/PDA. The system supports any HSPA/3G/Edge/GPRS SIM based cellular provider.

Both the Body Worn System and the AGS StreamRS are very small & lightweight, with built in rechargeable lithium batteries for 6+ hours of recording and streaming. Contact us for full specifications

BODY WORN SYSTEM HIGHLIGHTSn Touchscreen HD Digital Video Recorder n High Resolution camera n Solid State 16Gb SDHC Internal memoryn Pre-Event Recording n Still image capture n 6 x resolution settings n Law enforcement secure and tamperproof password protected files saved to solidstate robust memory n All DVR “Settings” are password controlled which ensures that the user cannot enter the “Settings menu” to change options

Audax Global Solutions Ltd T: +44 (0)1752 264950 F: +44 (0)1752 603087 E: [email protected] W: www.audaxuk.com

Page 66: Counter Terror Business Volume 10

ARINC_CTB_June_2012.pdf 1 14/06/2012 08:01

Page 67: Counter Terror Business Volume 10

BORDERPOL continues to announce leading experts who will be speaking at its inaugural conference in London this October, which features key names from the forces talking about border protection issues and challenges, as well as organisations that deliver the research and innovations that supports the function of the border agencies. The latest speaker confirmed for this year is Police Chief Quaestor Ioan Buda from General Inspectorate of the Romanian Border Police who will discuss the challenges facing border police on Europe’s eastern frontiers. Since the Arab Spring uprising, a sense of insecurity has swept the region and threats of civil war has created a surge of refugees and migrants looking towards Europe as a safer haven. Combined with the increase in drug and people trafficking, what are the major challenges facing Europe’s frontiers and how are border forces managing to maintain the successful protection of illegal immigration into Europe?

REFUGEE MIGRATIONOther confirmed speakers include Andreas Kamm, chair, European Council on Refugees and Exiles, who will deliver a presentation in the challenge on policies of refugee & migration movement from a refugee protection perspective. Migration has become an international challenge to ensure legal and safe movement of over 200 million migrants. The safe passage of refugees is also essential, as are the safeguards necessary to ensure legitimate refugees are safe and protected. Is it possible to build a common policy for easier and secure management of mass migration? Rey Koslowski, director of the Center for Policy Research Program on Border Control and Homeland Security, USA will look at “Challenges of Implementing Changing Immigration Policies” focusing on efforts to leverage technologies that

address broader issues of migration management and policy changes. Commodore Vasan Seshadri (Ret’d), head, strategy and security studies, Center for Asia Studies, India, will examine the issues of border control in Asia in general and South Asia in particular and establish how the issue of illegal immigration from this part of the world poses a great challenges in the west. The analysis looks at the legal, humanitarian, technical, social and political dimensions of such illegal acts. The session would aim to discuss all aspects of border control and make recommendations for both short term and long term measures.

FUTURE TECHNOLOGIESAndré Oeyen, director, biometric business development at SITA Belgium will look at future technologies of facilitating border management and solving the security dilemma through consolidation of biographic and biometric passenger identities. With ever more sophisticated methods being employed to avoid border security, both physical and in cyberspace, technology will play an increasingly important role in detection and analysis. This session askas what the future holds and discusses new technologies are in the pipeline, what the industry like to see and how can border security be employed in a borderless world. Prof. Frank Gregory, emeritus professor of European security, Mountbatten Centre for International Studies and former specialist adviser to the Commons Home Affairs Select Committee will contribute as an expert panelist in the debate on the Schengen Area

and how effective it is. The revolutionary Schengen Agreement set-up

pan-European travel with no internal border controls.

17 years later, how well is Schengen working in allowing the free movement of the citizens of the 26 European countries? Is Schengen still able to counter illegal

immigration and organized crime, such

as narcotics and people trafficking? What is the

future for Schengen in light of the recent economic and political challenges

in Europe? Can the example of Schengen be applied to other regions in the World? The BORDERPOL Annual Conference and Expo will bring together the world’s senior policy makers, practitioners and players, in London, UK, October 16th-17th 2012, to discuss and debate the current and future issues facing the border management, security and migration management sector. L

FURTHER INFORMATIONwww.borderpol-event.org

BORDER CONTROL

KEEPING UP WITH BORDER CONTROL

More leading Speakers announced at the BORDERPOL Conference, taking place at Central Hall Westminster, London on 16th-17th October

Border Control

17 years later, how

well is Schengen working in allowing the free movement of the citizens of the 26 European

countries?

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

67 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 68: Counter Terror Business Volume 10

GemaTech (UK) LtdTelford House, Houndmills, Basingstoke, Hampshire, RG21 6YT

Tel: 0845 345 3333Fax: 0845 345 3340Communicate

www.gematech.com

Introducing the quickest, simplest, and easiest way to deliver mass notification messages....with absolute certainty....each and every time!via sms, pre-recorded voice message, live voice message, email, web status page, all social media... with full audit trail guaranteeing compliance.

Crisis Command & Control

GemaTech’s Crisis Control Management Dashboard illustrating alert status, real time, for any number of concurrent alerts

Setting Up a New Alerttemplate is simplicity itself

The Alert Process can be as simple or as complicated as you wish to make it

To find out more on how simple and cost effectively this can be achieved, call us now on 0800 328 8354 or email [email protected]

Page 69: Counter Terror Business Volume 10

The TETRA (Terrestrial Trunked Radio) communications standard was born in ETSI (European Telecommunications Standards Institute) in the 1990s, designed to meet the requirements of public safety and government users, commercial professional users, operators, spectrum regulators, manufacturers and others involved in the implementation of critical communications. Today, TETRA is the public safety communications technology used by governments around the globe, delivering secure, reliable and robust critical communications to protect citizens worldwide. This endorsement and rapid adoption of TETRA by the public safety sector has catalysed its use in an increasingly wide range of markets. These include air, rail, road and water transport, utilities, mining, oil and gas exploration, extraction and delivery industries, commercial, retail and leisure organisations – all sectors looking for critical communications capability. TETRA is also regularly deployed to ensure resilient and secure communications at major sporting events such as the FIFA World Cup, Formula One racing, and of course the Olympic Games.

SECURITY AND SAFETYThe TETRA standard is designed to deliver capabilities that are essential for public safety services to carry out their work effectively and efficiently, thus maximising public protection during normal day-to-day events and during major planned and unplanned events. Security of communications services is essential, and TETRA builds on the inherent security strengths of digital technology. TETRA’s security measures deliver the strongest levels of protection; ensuring the privacy of conversations and the secure transmission of sensitive data. Authentication at the connection between the TETRA terminal and the network controls voice and data traffic to ensure that transmissions are from approved users – and in reverse, ensuring that it is your network! Air interface encryption then protects the communications between the base station and individual

terminals and between terminals when outside network coverage. For those users that need even more protection, end to end encryption can be added. TETRA also enables networks to be partitioned. This means that different user groups, such as police, fire, and ambulance services, can have access to independent private communications over their own Virtual Private Network (VPN) securely tunnelled across the system. If interoperability between agencies is required, this can be immediately and securely provisioned so specific inter-agency talk groups can be created. If a terminal is misplaced or stolen it can be immediately disabled, preventing unauthorised people listening in to

conversations or viewing sensitive information. Given the environments in which public safety organisations may need to operate, communications clarity is of paramount importance. TETRA call clarity is exceptional due to digital technology and special coding algorithms that help to screen out background noise. TETRA’s capacity management

features support rapid call set-up across many users and over large areas, even if a network is being used heavily over a small geographical area during a major event. Group calls can be activated at the touch of a button – inside 500 milliseconds – enabling almost instantaneous group communication, collaboration and coordination. Many TETRA solutions also enable calls to be recorded for analysis to refine crisis management and operational procedures.

REMOTE CONTROLTETRA’s narrowband data capability enables the sending and receiving of images, and interaction with more advanced remote applications. For example, dispatch teams

can send information to emergency response officers about an incident they are about to attend. The intelligence may include statistics on likely injuries and the number of casualties for paramedics. Police dispatch teams can access the records of a suspect and review the types of officers available to assess the best way to approach the individual. E

Given the environments in which public safety organisations need to operate, communications clarity is of paramount importance.

COMMUNICATIONS - TETRA

THE RISE OF TETRASecurity of communications services is essential. TETRA (Terrestrial Trunked Radio) builds on the inherent security strengths of digital technology, says Phil Kidner, CEO of the TETRA + Critical Communications Association

Comm

unications W

ritten by Phil Kidner, CEO, TETRA + Critical Com

munications Association

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

69 Volume 10 | COUNTER TERROR BUSINESS MAGAZINEGemaTech (UK) LtdTelford House, Houndmills, Basingstoke, Hampshire, RG21 6YT

Tel: 0845 345 3333Fax: 0845 345 3340Communicate

www.gematech.com

Page 70: Counter Terror Business Volume 10

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 1070

CDVI is a worldwide supplier of class-leading access control and electronic locking solutions, with products ranging from biometric and online access control, electromagnetic locking, keypads, standalone entrance systems and door automation. The CDVI Group has offices and factories in over 15 countries, encompassing four continents, with a turnover in excess of Euro 50,000,000. Its business sectors include security product manufacturing, biometric analysis, plastic and metallic engineering. The group is able to draw on a wealth of experience, ensuring that CDVI remains at the leading edge of technology and customer service. Centaur is the flagship, enterprise level, integrated access solution offered by the CDVI group of companies. With communication options to suit every installation and the ability to scale the system to site requirements, Centaur provides a very secure and flexible solution. Supported by arguably the industry’s best looking and most robust readers in the Digiprox range, Centaur will accommodate RFID, Mifare, Biometric and RF controls with ease thanks to its industry-standard Wiegand interface. Capable of managing 64 sites with remote

client server architecture, Centaur can be used to manage sites remotely via IP and internet connections. Centaur offers an integrated flexible solution and many high-end features, providing support for CCTV integration from leading manufacturers such as Genetec, Milestone, ONSSI, Dedicated Micros, Samsung, HikVision and Pelco, and biometrics from iEvo, L1 and Sagem With included modules free of charge for guard tour, parking management and visitor management, Centaur is an attractive investment for many security applications.

With its international influence and global reach, CDVI has a core focus on access control to ensure security for a wide variety of installations and will be demonstrating the flagship Centaur integrated access solution at Counter Terror Expo 2012 (stand E174 & E176) and IFSEC 2012 (with Milestone Systems on stand F90 in hall 4).

FOR MORE INFORMATIONTel: 01628 [email protected]

Flexible Security: CDVI’s centaur access solution provides powerful integration and management support

Page 71: Counter Terror Business Volume 10

E Firefighters can also transmit images to control centres for assistance in identifying symbols on chemical storage drums; police officers looking for a suspect for a street robbery can be sent real-time pictures of the individual from security cameras, while paramedics can provide pictures of a casualty’s injury to a remote specialist to seek treatment advice. By applying TETRA’s two way data communication channel, public safety officers can also manage administration away from the office, using voice to text recognition, tablet and stylus data entry, drop-down forms and on-screen keyboards. Police officers can log incidents and update records on the move, so they spend more time patrolling rather than managing paperwork back at base. Real-time field-based biometric systems enable police officers to use their TETRA devices to capture the fingerprints of a suspect and immediately verify identity against a remote database in a matter of seconds. All public safety users, particularly fire and rescue services, can face hazardous environments and the possible presence of explosive substances, dust and gases. TETRA terminals with ATEX1* certification are built to comply with rigorous requirements, enabling public safety agencies to operate in the most challenging conditions.

NATIONWIDE PUBLIC SAFETY SUPPORTIn Great Britain: The largest TETRA public safety network in the world to date is the Airwave Network. This covers 99 per cent of Great Britain’s landmass and delivers critical voice and data communications. The Network was purpose-built to meet the needs of the emergency services, and since 2005 has been rolled out to all police forces, fire and rescue services and ambulance trusts throughout Great Britain. In addition, several organisations with a public safety remit and responsible for assisting during an emergency response also use the Airwave Service. Airwave is also an official supplier to the London Organising Committee of the Olympic and Paralympic Games Ltd (LOCOG). Airwave will deliver a private mobile radio service across all the London 2012 venues via the purpose-built Apollo network, a new independent communications infrastructure. As the largest international event ever staged in the UK, the London 2012 Games are an opportunity to showcase Great Britain’s TETRA critical communications infrastructure. In the Republic of Ireland: The Tetra Ireland consortium has built a fully integrated service via a national TETRA network. Tetra Ireland operates the network as a fully managed

commercial service, providing the emergency services, public safety and civil protection users with secure voice and data, robust radio coverage and inter-agency communications. In Belgium: ASTRID is the operator of the national TETRA network, built to solve the communications issues of the emergency services. Hundreds of small analogue networks

were in operation throughout the country, each discipline using a different

frequency. This patchwork made any form of co-

ordination difficult, with jumbled and

inaudible messages the result of the limited capacity on the analogue networks. The Belgian government chose to set up a

common network to be shared by

all emergency and security services and

ASTRID was created in 1998. Today, the ASTRID network enables

the police, the fire services, emergency medical services and other organisations involved in public safety to communicate seamlessly. The radio network is based on the concept of the ‘talk group’, meaning the dynamic creation of groups of people who need to communicate with each other during specific operations. In Hungary: The nationwide authority network EDR is operated by Pro-M. The EDR network was launched in 2006, and is used by the police, customs officials, fire brigades, disaster prevention agencies, and ambulance services, as well as other organisations engaged in safeguarding the public. In Sweden: Rakel is the national digital communications system used by the emergency services and others in the fields of civil protection, public safety and security, emergency medical services and healthcare. In Iceland: Neydarlinan 112 is the organisation that manages the public safety TETRA network serving the emergency services, maritime and border agencies, aviation authority, coast guard, voluntary rescue organisation, public utilities and road administration. The network is also crucial to new homeland security measures being implemented following the departure of the US forces that had traditionally provided helicopter rescue services. Completed in 2009, the network serves some 5500 users and has already proven itself in two major disasters, an earthquake and a volcanic eruption. In Germany: The Federal Agency for Digital Radio of Security Authorities and Organisations (BDBOS) is currently implementing the nationwide TETRA communications system for the police forces of the Federation and the Länder, fire brigades and rescue services, the Federal Agency for Technical Relief, customs

authorities and intelligence services. The new TETRA system will replace the technically obsolete analogue radio system currently used by security authorities. And in Norway: The roll out of the nationwide Nødnett TETRA network for Norway’s public safety agencies continues. This is just a snapshot of the role that TETRA technology plays in ensuring the safety of the public. We have only touched on Europe in this article, but TETRA is in use by public safety agencies worldwide. As an example, two TETRA systems in Asia – those of the Shanghai Police and the Hong Kong Police Force, were recognised in the 2012 International TETRA Awards for their excellence and innovation. The annual TETRA World Congress was held this year in Dubai, recognising the Middle East as the fastest growing TETRA market in the world today. Whether you are at home or abroad, it is a fair bet that at some point you will be protected by TETRA technology, designed to protect the public.

THE TETRA + CRITICAL COMMUNICATIONS ASSOCIATIONThe TETRA MoU (Memorandum of Understanding) Association, now the TCCA (the TETRA + Critical Communications Association), was established in 1994 to act on behalf of all interested parties in the development of the TETRA communications standard, and today continues to develop, promote and protect the TETRA standard worldwide. Members include manufacturers, application providers, integrators, operators, test houses and telecommunications agencies. The TCCA represents more than 160 organisations from all continents of the world, providing a forum for all those interested in TETRA and the future of critical communications. Members of the TCCA have the opportunity to be fully involved in influencing and advancing critical communications technology. Users can share knowledge, experience and requirements. Manufacturers and suppliers can help open new markets and develop products and services that meet the needs of the professional communications user. The TCCA provides the central role in the enhancement of the TETRA standard. We advise and inform existing and potential customers, manufacturers, suppliers and partners around the world, promote the TETRA standard to countries and their governments, and lobby for spectrum to ensure sufficient capacity is available for the public safety services. L

FURTHER INFORMATIONwww.tandcca.com

*The ATEX directive consists of two EU directives describing what equipment is allowed in an environment with an explosive atmosphere. ATEX derives its name from the French title of the 94/9/EC directive: Appareils destinés à être utilisés en ATmosphères EXplosibles.

Comm

unications

COMMUNICATIONS - TETRA

“In Great Britain: The

largest in the world to date is the Airwave

Network. This covers 99 per cent of Great Britain’s

landmass and delivers critical voice and data

communications...”

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

71 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 72: Counter Terror Business Volume 10
Page 73: Counter Terror Business Volume 10

While even the most basic two-way communication systems have something to add to the safety and preparedness of any operation for situations/sites or vehicles vulnerable to potential terrorist attack, choosing not only the right communications system, but the right standards, will increase value and usability, especially in the longer term. Most people considering new set-ups will by now probably be looking at digital, rather than analogue, and almost all established manufacturers can provide a good basic level of functionality. For example, all of the current digital offerings come with some form of enhanced voice privacy, ensuring that your conversations remain private. Digital signals are far more difficult to intercept and decode than analogue signals, requiring expensive and complex equipment to achieve the task. Advanced features such as text messaging and private calls between radios on a network, are also standard features. Another benefit is that all digital radios are ‘backwards compatible’. This means they will work in analogue mode with any existing or legacy networks that you may be required to interface with in the course of your operations.

DIGITAL DECISIONHowever, once the ‘digital decision’ has been made, you then need to consider what else is required such as flexibility and saleability for future needs, additional functionality requirements such as location services, and the need for clear voice communication even in noisy operating conditions or at the edge of the coverage area, which can be vital for CT and CP work. Until fairly recently the real options had come down to analogue versus digital, but even within digital there is still a question of technical standards. Aside from the proprietary Tetrapol protocol owned by EADS/Cassidian, the mobile radio sector did not see any new digital proposal until 2005 when the ETSI released the draft DMR (Digital Mobile Radio) standard for professional and commercial needs. In the meantime, Kenwood and later ICOM worked

on the FDMA 6·25 kHz narrowband standard that was adopted by FCC as the Nexedge standard. The ETSI 6·25 kHz dPMR standard was released in October 2009. Since then we have seen wide acceptance of the DMR and dPMR standards in the lower-cost sector. DMR is designed to operate within the existing 12·5kHz channel spacing used in licensed land mobile frequency bands globally and delivers a spectrum efficiency of 6·25 kHz per channel. The primary goal is to specify affordable digital systems with low complexity. DMR provides voice, data and other supplementary services. There are three tiers in the DMR

standard, although in practice commercial application is mainly focused on the Tier II and III licensed categories. DMR Tier I provides for consumer applications and low‐power commercial applications unlicensed conventional. DMR Tier II covers licensed conventional radio systems, mobiles and hand portables and is targeted at users who need spectral efficiency, advanced voice

features and integrated IP data services in licensed bands for

high‐power communications. DMR Tier III covers trunking operation in frequency bands 66‐960MHz, supports voice and short messaging handling as well as packet data services. dPMR is digital radio protocol specifically

targeting highly functional solutions by

using low cost and low complexity technology. dPMR

is a narrowband (6·25 kHz) FDMA technology. Like DMR, it covers a range

of functional levels; dPMR446, dPMR Mode 1, dPMR Mode 2, dPMR Mode 3.

SIDING WITH DMRIt looks likely that both DMR and dPMR standards will continue alongside for some time, but more manufacturers seem to be siding with DMR as it gains wide-spread

acceptance. However, like all standards, these digital standards each have their respective advocates stating benefits for each option. Most discussions will come down to fairly technical observations that may mean very little in field based operation. While some claim that the bandwidth for a dPMR receiver can reduce the noise level compared with the 6·25e of the 12·5kHz DMR technology, in operation the DMR option can match narrowband efficiency. Also, when operated at higher RF levels there can be interference with dPMR and Europe, in particular, is not well geared to meet the needs of dPMR. When considering potential products you

will see some manufacturers in each ‘camp’ and some in both, with certainly a greater number signing up for DMR with four new signings this year alone. One of the key players in the DMR arena is Hytera which hasinvested more than 50 million yuan (£4.8 million) over the past five years, to develop digital products for professional and commercial applications. In this marketplace one of the leading providers of the Hytera brand is G6 Global. For the user, the important consideration is to understand what is being offered under each standard and what implications will this have for current and future operational efficiency. Having a clearly identified statement of your own operational priorities and potential priorities will make it much simpler to choose the appropriate options, but for some markets and applications there may not always be a wide choice of standards. For those wanting to know more about the technical aspects both DMR and dPMR have white-papers available from their respective websites. As well as the more technical aspects it is also important to ask prospective suppliers to show field-based experience with any proposed combination of standards and equipment. While theories are always interesting, communications need to work in very real and harsh environments. L

FURTHER INFORMATIONEmail: [email protected]

COMMUNICATIONS

CAPTURING THE STANDARDWhat part do technical standards play in developing a communications solution suited to counter-terror, close protection and high-end security applications? asks specialist consultant Andrew Clark

Comm

unicationsW

ritten by Andrew Clarke, m

anaging director, G6

For the user, the important consideration is to understand what is being offered under each standard and what implications will this have for current and future operational efficiency

“While theories are

always interesting, communications

need to work in very real and harsh environments”

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

73 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 74: Counter Terror Business Volume 10

The Professional Mobile Radio (PMR) industry has witnessed a rapid evolution over the last decade with sharp focus on digital migration. According to IMS Research, the PMR terminal market jumped a staggering 15 per cent in terms of unit volumes in 2010 (compared to 2009), and the migration is a main driver for the 25 per cent growth seen in the market for 2010. Amid the surging industry evolution, Hytera has been quick in taking foothold with its expanding digital portfolio and shrewd customer insights. Globally, Hytera flexed muscles to tap into the digital trend with complete DMR, TETRA, and PDT solutions. We would like to invite you to join us for a brief retrospect of our growth in the past year. – Dylan Liu, Hytera Media Manager

COMPLETE DMR PORTFOLIO The DMR market has constantly grown in

the recent years with joint efforts of more manufacturers. As a category 1 member of DMR Association, Hytera has released the most complete portfolio of both conventional and trunking modes, including portable radio, mobile radio, covert radio, intrinsically safe radio, repeater, data application, multi-site IP connection, simulcast system and trunking infrastructure. In 2011, Hytera became the first manufacture that released and delivered DMR Tier III solution. Since 2010, Hytera DMR solutions have served customers around the world, including public safety users like Indian National Police and Bangladesh police, and commercial users like New Zealand America’s Cup, Chile Costanera Center, Antwerp Diamond Museum, British University of Leeds, France AUCHAN super market and Australian MSS Security. Hytera has also put great efforts in developing DMR data applications with

partners across the world, forming a sound third party cooperation platform. At IWCE 2012, Hytera showcased HyTrack and SafeSYT dispatching applications by Premier Radio Operations. Later on at Hytera UK Dealers Convention, AVL application by TrakRanger and In-door Tracking & Alarm application by Zonith were demonstrated with Hytera DMR system.

FULL TETRA SOLUTIONTETRA, a well established digital trunking mobile radio standard by ETSI, is in daily operation by thousands of mission critical and business critical organisations. Since launched in 2010, Hytera TETRA terminals have won wide recognition from partners and users for its reliability, and served clients of public safety and utility like Bangkok Metro and Korea Electric Power. In August 2011, Hytera acquired Rohde & Schwarz Professional Mobile Radio GmbH (R&S PMR)*, a R&S subsidiary specialized in TETRA infrastructure, to further enhance the competitiveness in the global arena. R&S PMR, the developer of TETRA radio system ACCESSNET-T IP, has accumulated lots of experience in developing, planning and implementing TETRA solutions like national networking for Malaysian Police, Asian Games, Kingdom of Morocco, Poland Ministry of Interior, etc. Its expertise is a good compliment to Hytera’s TETRA terminals, which is certified by the recently secured TETRA contract with Peru National Police.

COMMUNICATIONS

BURGEONING DIGITAL STRENGTH Hytera, a leading designer and manufacturer of professional mobile radio communications equipments, is dedicated to bringing most valuable and customised solutions to clients across the world

Adve

rtise

men

t Fea

ture

Inner Mongolian police with Hytera PDT terminal

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 1074

Page 75: Counter Terror Business Volume 10

Advertisement Feature

As a competence center for tomorrow’s TETRA and LTE based broadband solutions within the Hytera group, R&S PMR, officially renamed as Hytera Mobilfunk GmbH* recently, will continue to develop its well established TETRA infrastructure, which already today provides reliable communications to many mission and business critical users around the globe.

CHINESE NATIONAL DIGITAL TRUNKING STANDARDConsidering the vast territory of China, a PMR standard with large coverage, high spectrum efficiency and affordable cost is demanded for digital migration in the nation. In 2008, Hytera, as a general technology leader, joined hands with other Chinese manufacturers in drafting the PDT standard (Police Digital Trunking Standard) under the commission of the Information and Communications Bureau of the Ministry of Public Security of China. In April 2010, the Information and Communications Bureau of the Ministry of Public Security of China officially released the PDT standard, and Hytera launched PDT series products at the same time. One year later, Hytera unveiled its PDT trunking infrastructure, and became the only provider of complete PDT solutions. To date, Hytera PDT trunking solutions have been adopted by Exit & Entry Administration of Shenzhen, which was the first delivery to public safety, Harbin police, and Inner Mongolian police in China. PDT technology also serves professional users in transport, utility and commercial markets. Hytera has already delivered PDT solutions to Guizhou Minority Civil Games and one of the largest oil fields in China. Outside of China, Hytera has deployed PDT trunking systems in Guatemala; and multi-site pilot systems are currently being set up in Thailand, Cambodia, Indonesia and Vietnam. After the successful IPO at Shenzhen Stock Exchange in May, 2011, Hytera was listed by Forbes as China’s Top 100 Public Small Businesses for the year. Stepping into 2012, the company showcased complete DMR communications solutions, including Wide-area Commanding Network, On-site Mobile Commanding Network, Intrinsically Safe Communication Solution and SmartDispatch Solution at International Wireless Communications Exhibition 2012 (IWCE) in February. In the coming TETRA World Congress 2012 (TWC) in May, Hytera will unveil its new TETRA covert and intrinsically safe terminals and next generation dispatching system alongside the ACCESSNET®-T IP solution. In 2013, Hytera will keep playing an active role of facilitating the global digital migration as a member of ETSI, DMR Association and TETRA MoU. L

FURTHER INFORMATIONwww.hytera.co.uk

Base station installed for Shenzhen Exit & Entry Administration

Hytera DMR solutions served America’s Cup

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

75 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 76: Counter Terror Business Volume 10

The best line-up of full-featured rugged mobile computers and PDAsHandheld is a leading manufacturer of rugged mobile computers and PDAs, and the fastest growing company in our sector. Our products are used in a wide spectrum of field applications, often in the most demanding environments.

All our products have the memory and storage capacity to handle the most demanding of field or industrial applications. And all products carry high IP-ratings and meet stringent MIL-STD-810F/G military standards for withstanding water, dust, drops, vibration and extreme temperatures.

Together with our strong network of business partners we supply complete mobility solutions to businesses within markets such as public transportation, logistics, geodesy, construction, service & maintenance, forestry, military and public security.

The Handheld headquarters is based in Lidköping, Sweden. Handheld has local offices in Finland, Italy, the Netherlands, Germany, Switzerland, UK, Australia and the USA.

[email protected]

Rugged Computers for Tough Environments

Page 77: Counter Terror Business Volume 10

With just days until the start of the London 2012 Games, the British police service has worked together to resource what will be the largest ever pre-planned policing operation. A total of 52 individual forces are contributing officers to keep the Games safe, while measures have been taken to ensure that core policing continues to be delivered. Overseen by AC Chris Allison, the National Olympic Security Coordinator, the Games require a 105-day long policing operation from 4 June until 16 September. On peak days, around 12,500 officers will police the Games nationally, with around 9,500 in London alone. 12 police forces will deliver an operation in support of a sporting venue; from Dorset Police in the south, to Strathclyde Police in the north. In addition, British Transport Police will police the railways. Gold Commanders have been developing local operational plans, working closely with their partners and LOCOG, the event organisers. For some, the sheer scale and duration of the Games requires the assistance of officers from outside of their force. The majority of the aid will be to the Metropolitan Police and Dorset Police. More limited numbers of officers, predominantly those with specialist skills and for specific periods of time, will be provided to Surrey Police, Thames Valley Police, British Transport Police and others.

THE BRITISH BOBBYA key contribution to the bid to host the Games was that policing would be provided, in the main, by the famous unarmed British ‘Bobby’. As such, the majority of officers required on

mutual aid are general beat officers, providing their usual professional service to the public. With such a complex operation, there is a high requirement for specialist skilled officers. Over 70 specific skills, from those trained in search techniques, marine, public order, mounted section, dog units, motorcycle escort, firearms officers, protection officers and other specialisms will be required. Building on tried and tested processes, ACPO’s Police National Information and Coordination Centre (PNICC), and the Scottish equivalent, S-PICC, are coordinating the sourcing of officers from nearly every force across the UK, including specialist forces such as the Ministry of Defence Police and Civil Nuclear Constabulary. Every Chief Constable has committed to contributing mutual aid and a proportionate approach has been taken, ensuring that each force is providing aid based upon an assessment of the force total size, its specific capabilities and with consideration to local events. While daily deployments will fluctuate, each force will provide a proportionately fair contribution across the duration of the Games, wherever possible. Critical to the planning is the need to ensure that core policing continues to be delivered. All forces have adopted a range of measures to maximise the number of officers available. Annual leave has been restricted across the service, non-essential training has been postponed , working arrangements reviewed and where appropriate the Special Constabulary and volunteers may play a role. Mutual aid costs are being met by the Home Office from the budget for Olympic safety

and security. This allows forces to backfill those officers sent to support the Games without financial impacts. The final costs will not be known until after the Games.

SUPPORTING CHIEF OFFICERSAssistant Commissioner Chris Allison is the National Olympic Security Coordinator (NOSC), the principal coordinating police officer for the delivery of the national safety and security operation for London 2012. The role involves supporting the chief officers of the 12 forces

hosting an Olympic venue and also coordinates non-policing Olympic

safety and security partners. The NOSC is also the single,

informed point of police contact for Government. 12 forces will host Games sporting venues: The Metropolitan Police, Dorset Police, Thames Valley Police, Surrey

Police, Hertfordshire Constabulary, Essex Police,

Kent Police. Strathclyde Police, Northumbria Police,

Greater Manchester Police, West Midlands Police and South Wales police

will police Olympic football venues. British Transport Police will police the railways.The Metropolitan Police Service, Dorset Police and British Transport Police will not contribute mutual aid due to the scale and duration of their local Games operations. Thames Valley Police’s contribution is limited for the same reason. In addition to the detail below, Ministry of Defence Police contribute resources to wider security operations for the Games. Bedfordshire Police and Hertfordshire Constabulary provide mutual aid through a collaboration agreement. L

FURTHER INFORMATIONwww.acpo.org

POLICE - OLYMPIC SECURITY

OPERATION OLYMPIC SECURITYThe police service’s delivery of resources for its largest ever pre-planned operation - the London 2012 Olympic and Paralympic Games - has required meticulous planning

Police and Law

“Ensuring core policing

continues to be delivered is critical.

A range of measures have been taken to maximise the

number of officers”

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

77 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 78: Counter Terror Business Volume 10

Holmatro Special

Tactics equipment

Hydraulic breaching, cutting,

spreading and lifting tools for

your tactical operations.

• Powerful

• Portable

• Quick & silent operation

Watch the videos on our website:

Holmatro | Rescue equipment

[email protected] | www.holmatro.com/rescue

Page 79: Counter Terror Business Volume 10

Although one of the most lucrative and depended upon industries in the world, the oil industry is also one of the most vulnerable due to the potential for safety and security breaches and the extreme consequences such events can have. Sadly, modern history has already provided us with plenty of examples of when the repercussions of incidents in the sector have been far reaching, affecting the environment, members of the public as well as other sectors. Moreover, the wavering nature of the raw material treated as well as the world’s dependency on it makes sites such as oil refineries highly attractive targets to terrorists and criminals.

SATISFYING DEMANDAccording to Oil and Gas UK, the trade association for the oil and gas sectors, oil produced on the UK Continental Shelf satisfied 87 per cent of domestic demand in 2010, and by 2020 it is estimated that 70 per cent of primary energy consumed in the UK will still come from oil and gas, despite the Government’s push towards promoting the development and use of renewable sources of energy. It is therefore clear how the consistent demand for its

resources, coupled with their finiteness, puts the oil sector in a very vulnerable position. In April 2010, BP’s Deepwater Horizon explosion in the Gulf of Mexico resulted in the death of 11 people and in 4.9m barrels of oil being discharged at sea. Although the incident was not caused by a security breach, it provided an unfortunate and elaborate example of the scale of the damage that can be caused when things go wrong in the industry. The consequences of the spillage were devastating and far reaching, from irreparable damage to the ecosystem to reduced tourism trade for the Gulf of Mexico, hefty costs associated with the clean-up operations and damage to reputation for BP as well as, potentially, other UK companies operating overseas. It is oil’s explosive and highly polluting nature, combined with the high value placed upon petroleum-based products, that makes the industry also a highly attractive target to thieves, criminals and, in worst cases, terrorists. Back in 2005, the report from the Department of National Defence in Canada already warned about oil refineries becoming

a high-priority target for radical groups, “given the potential economic devastation that the destruction of one of these sites could cause”. Now, with the eyes of the world turned to the UK this summer, and the country on a substantial terrorist alert, this threat could be all the more real.

SECURING THE SECTORPerimeter protection, intrusion detection, fire detection systems, remote supervision through CCTV technology, as well as pipelining monitoring are the most common technological elements employed for the security of the sites across the sector. However, without these systems working together to ensure all angles of security are covered and all vulnerable areas are being accounted for, even the most high-tech measure will prove powerless when faced with increasingly deceitful and intelligent criminals. Therefore, security integration is key to success. In order to achieve effective integration E

SECURITY - OIL REFINERIES

BLACK GOLD – SECURING THE OILJames Kelly, chief executive at the British Security Industry Association (BSIA), looks at how the oil industry can keep safe its precious material by employing an integrated approach that focuses on vulnerable and difficult to secure sites such as refineries and pipelines.

Security - Oil Refineries

Written by Jam

es Kelly, chief executive, BSIATHE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

79 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 80: Counter Terror Business Volume 10

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 1080

Who’s targeting your assets?

Your organisation’s assets are a target for terrorists. Mitigating this threat is a priority.

Traka’s silver bullet enables you to secure, manage and audit every asset, 24/7.

Need to know more? Call 01234 712345 or visit traka.com

Traka, the intelligent access management company, has been awarded a third Queen’s Award for Enterprise. Traka won the award for innovation for its work to automate the management and security of high-value and mission critical assets within organisations. Traka’s intelligent lockers use a combination of RFID and biometric technology to enable organisations to restrict, secure and audit access to devices ranging from police radios to keys for MOD facilities. This is the third time the company has won a Queen’s Award for Enterprise that recognises its pioneering work. President and founder of Traka, John Kent said, “The secret of our success has been the development of our core solution, the electronic dispensing of keys, to solve common problems faced by many organisations. Whether its radios in police forces or iPads in schools, more organisations now operate shared pools of high-value electrical items and Traka’s intelligent lockers are helping them to manage and secure access to these precious assets. “This is another very proud moment in Traka’s history and it is an honour to have been recognised for the third time for our continued efforts to find innovative solutions

that meet our customers’ different needs. The Queen’s Awards for Enterprise demonstrate that innovation in Britain is alive and well.” It follows the company’s most successful year, which saw it win a £5million contract with the Ministry of Justice to supply

Traka electronic key cabinets to potentially every HM Prison in the UK. It also recently announced a strategic development, which sees the company being acquired by ASSA ABLOY, the world leader in door locking solutions. Keys to Guard Rooms, research laboratories, vehicles and any other section of your facility can be securely stored and managed through Traka’s intelligent cabinets. Ammunition, explosives or security radios are best managed using intelligent lockers and Traka recently launched new weapons lockers that allow you to control who can access your weapons while ensuring you can identify who took what and when, confirming when it was returned and by whom. Products can be integrated with third party access control systems, so you can continue to use existing ID methods and user database with solutions. The company is a Lenel OAAP Certified Partner and has established relationships

with partners such as Unilink and Gunnebo.

FOR MORE INFORMATIONTel: +44 (0)1234 [email protected]

Intelligent asset protection from Traka wins Queens Award for Enterprise for the third time

Page 81: Counter Terror Business Volume 10

E of the systems on site, it is important for oil companies to undertake comprehensive reviews of the solutions available and the possible threats faced by the site in question. This is achieved by carrying out risk assessments and taking into consideration the current security infrastructure already in place.For this reason, employing professional and experienced security consultancies can greatly assist in the delivery and implementation of appropriate security strategies, particularly for multi-faceted sites such as oil refineries, where the level of detail and expertise required to make the necessary considerations and implementations warrant the need for highly experienced security advisors. BSIA members of the Security Consultancies section have a wealth of experience securing the oil industry at all levels, and are therefore best placed to provide sound and objective advice and guidance on this matter.

HIGH RISKAs the main locations where petroleum products are transformed into more usable goods such as gasoline and fuel, oil refineries are at particular high risk of security breaches. Often spread across large and multi-faceted sites, they require carefully integrated security strategies that encompass a review of all the threats the sites are likely to attract or encounter. Perimeter protection is essential to avoid the entry of unwarranted individuals on site. This is achieved by positioning higher than usual fences and barriers, often also alarmed, around the site, and integrating to it strategically places CCTV cameras, providing both a deterrent as well as an important crime solving solution, thanks to the post-incident footage gathered by the system. The physical presence of security patrols regularly checking the perimeter also provides a useful deterrent and an immediate response to incidents. Guards should also be on hand to man access points, in order to ensure only authorised personnel can gain entry to the site. From a CCTV point of view, technological developments such as video analytics allow the automatic analysis of footage to generate useful information about the image content and issue alerts to security personnel should an incident occur. In theory, any action or ‘behaviour’ that can be seen and accurately defined on a video image can be automatically identified by a video analytics system, and the scope of this technology has led to its use in a variety of applications including intruder detection, people counting, smoke and fire detection and camera failure or sabotage detection.

VIDEOWith the use of video analytics, refineries can improve efficiency of their staff by enabling security personnel to spend time away from the CCTV monitor to fulfill other security duties. Moreover, this technology highlights

incidents as soon as they occur, allowing for remedial action to be taken before incidents have a chance to escalate to a more serious level. Inside the perimeter, a well-thought out combination of manned and electronic security measures will again make sure all vulnerable areas are confidently secured. CCTV, alarms and access control measures that allow the monitoring and controlling of the through flow of people in designated areas, should all be in place, although the specific requirements will vary from site to site, depending on the type of threat and the vulnerabilities faced. This is where having on board a professional security consultancy proves its worth, as they will expertly take in consideration all of these individual requirements and advise on integrated and relevant solutions for their customers.

SECURING PIPESOil refineries, containers and extraction sites all require comprehensive security attention, however it is the sector’s distribution system that can be the most vulnerable and difficult to secure. Miles of pipelines run through often remote areas to transport the crude oil to refineries, or the refined product to its next destination for final delivery. For these locations, integration again plays a key role in a security strategy, to ensure any breaches across the length of the pipeline can be stopped and responded to. With the increased threat faced by the industry, many companies are turning towards the creation of security strategies that are incorporate in the whole operation, and not only limited to a specific oil refinery or pipeline. This holistic approach means that major players in the industry are increasingly

turning to expert security consultancies for the review and assessment of current security strategies, to inform more effective solutions that can be implemented across the board. This is a way to ensure that all areas of the operation, from excavation to pipelining, refining and distribution, are given the same amount of consideration, albeit tailored specifically to each site’s requirements.

TALKING TO THE EXPERTSecurity investment is a key consideration to be made for a sector as vulnerable as the oil one. Particularly areas such as oil refineries and pipelines can easily fall victim to criminals and vandals, however, although extensive security measures are available to improve the protection of these individual operations, putting in place company-wide plans that will take into considerations all sites and operations can ensure even more effective cover. Of course, in order to achieve this, the first step is that of seeking expert advice on what to do and how to approach such an important and demanding task. BSIA Security Consultancies are professionals and trustworthy companies who have experience securing the sector both at home in the UK and abroad. Their comprehensive approach to security ensures all vulnerabilities and opportunities are identified, whilst their expertise means they are best placed to advise the sector and assist with the implementation of the security strategies proposed. L

FURTHER INFORMATIONTo find out more, visit the Security Consultancies section of the BSIA website at www.bsia.co.uk/security-consultancies

Security - Oil Refineries

SECURITY - OIL REFINERIES

It is oil’s explosive and highly polluting nature, combined with the high value placed upon petroleum-based products, that makes the industry also a highly attractive target to thieves, criminals and, in worst cases, terrorists.

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

81 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 82: Counter Terror Business Volume 10

HESCO is a registered® trade mark of HESCO Bastion Limited.

Stops you inyour tracksIntroducing the HESCO® Redployable Security Fence. An anti-climb, rapidly erected and redeployable high-level security fence that doesn’t require ground preparation or foundations.

Rated to PAS68, HRSF can be built on almost any unprepared surface, and with available heights of up to 3.6m it provides a steadfast temporary perimeter or vehicle barrier.

See more at: www.hesco.com

HESCO Ad Left Handed CTB Jun 2012_Layout 1 15/06/2012 13:53 Page 1

Page 83: Counter Terror Business Volume 10

The West Qurna oilfield is the world’s second largest oilfield with 43,000 million barrels of reserves, employs thousands of people and is an essential part of the country’s oil infrastructure. The brief for HESCO was to protect mobile generators and the workforce from potential attack by insurgents. Despite having some of the world’s largest deposits of oil, the Iraqi power infrastructure is still developing, hence the need for mobile power providers such as Aggreko. Although the threat from attack was relatively benign at the date of installation (April 2012), Exxon Mobil and Aggreko were keen to be prepared for the worst case scenario – knowing that if discontent among insurgents increased, oil installations would be a likely target.

SOLUTIONWorking with two industry leading companies, HESCO developed a robust, flexible and cost effective solution that

ensured De-gassing Station 7 could continue to operate, protecting jobs and much needed government revenue. Following an assessment of the site, the HESCO team put together a security package comprising of an outer layer of its Redeployable Security Fence (HRSF) and an inner perimeter of Concertainer® recoverable Mil units (Mil 12 and Mil 5). The non-recoverable load-bearing Mil 1.9 unit was also used to support a lightweight bunker roof that was placed in situ as a run to shelter or safe haven. The outer perimeter was made up of HRSF, which is designed to provide a rapidly deployable high-level security fence. The mid-sized 3.1 metre high fence was chosen in this instance. It has an anti-climb mesh face and is PAS 68 rated, to mitigate against a vehicle attack with a 7.5 tonne truck at 50kph. It can be rapidly erected and dismantled and uses locally sourced counterweights, such as soil or rocks, to keep it in place. HRSF requires no foundations or posts – unlike many other security fences which require

extensive groundwork prior to installation. The inner perimeter was a configuration of Concertainer unit (often referred to as ‘HESCO barriers’), a defensive barrier system that is used extensively by US & NATO forces to protect bases, troops and critical assets around the world. HESCO barriers – acknowledged as the most significant development in field fortifications since World War Two – can protect against both small arms and indirect mortar fire. Hesco barriers are also used across the world in a variety of other security, flood, civil and humanitarian applications to protect people, property and critical infrastructure. The recently launched recoverable barrier incorporates a ‘recovery pin’ which allows each unit to be rapidly removed and ensures that the fill material can be easily collected and reused if required. Due to the simple recovery procedure the unit can be flat-packed and re-palletised, significantly reducing the logistic and manpower burden of removing the product from site once the threat of attack has passed. The flexibility of the product means the site can be quickly and easily returned to its original environmental state. Since installation in April 2012, the barriers have provided an effective deterrent against any possible insurgent attack and given staff working at the plant the reassurance to do their job in safety. According to Nicholas Higginbottom, regional security manager, Aggreko: “HESCO was chosen as the preferred solution because of the strength of their brand, reputation of their products and because they offered a more cost effective solution to what was available locally.” RESULTSBy protecting the Aggreko generators that effectively help operate a part of the huge West Qurna oilfield, thousands of jobs and oil revenue in the billions of dollars is being safeguarded. With oil very much the lifeblood of the economy, HESCO is proud of the fact that it is assisting Iraq in protecting its critical national infrastructure and playing a part in the country’s redevelopment and road to recovery. L

FOR MORE INFORMATIONwww.hesco.com

PERIMETER SECURITY

PROTECTING CRITICAL INFRASTRUCTUREIn December 2011, Aggreko, one of the world’s leading providers of mobile generators, approached HESCO about protecting its temporary power station, which provides electricity for De-gassing Station 7 on the West Qurna Oilfield in Southern Iraq managed by Exxon Mobil

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

83 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 84: Counter Terror Business Volume 10
Page 85: Counter Terror Business Volume 10

85

There’s no doubt that our law enforcement officers rely ever more heavily on new technology. Highly advanced equipment helps police to locate criminals, communicate clearly and quickly, and keep the peace. The latest technologies are important investments, providing evidence and allowing the police to be more efficient in carrying out their duties. One particular piece of technology in increased use is the thermal imaging camera. If you’ve seen the news lately you will have heard about the recent London protests, where thermal imaging cameras were used on police helicopters to monitor the event. It’s a demonstration of the wide uses of thermal imaging – but it goes beyond simply locating people. Leading the market in highly advanced thermal imaging cameras, Argus cameras surpass their competitors in technology, providing a range of settings and viewing options, with increased accuracy for use in many policing applications. ARGUS TT TYPEIn early 2012 Argus thermal imaging will launch a range of cameras designed with the guidance of a number of specialist police and security departments. The range will include a thermal torch for first responders called the Argus TT Type, a monocular camera called the Argus P Type for covert surveillance, and a specialist search camera called the Argus F Type. The TT may resemble a normal torch but benefits the user in countless ways a torch never can, providing patrol officers with the ultimate advantage over criminals. Not only does it detect the heat signatures of people and objects in daylight hours, it also provides an abundance of additional advantages in the dark of night. Officers can quickly and effectively search between homes and buildings, see into dark garages, entranceways and under vehicles. They can scan car parks, where they can see suspects hiding between cars, and can identify vehicles that were recently driven. When used in total darkness, officers can go virtually undetected, as they search for prowlers, and other criminal behaviour. Officers will be able to use this new technology for a range of patrol applications including: fugitive/suspect search, officer safety, search and rescue, detecting evidence, routine patrols, training and assessing, routine raids, occupancy evaluation and collision investigation.

ARGUS P TYPEThe Argus P type is a handheld, robust, simple-to operate, lightweight monocular thermal imaging camera which can power up fast. It is capable of withstanding harsh environments and provides the most superior features available on the market. Designed using sophisticated digital technology, the P Type offers users advanced thermal image quality, providing video recording and image capture to support the gathering of evidence. The P type has interchangeable lenses so will be a fantastic tool for covert surveillance operations, officer safety, fugitive/suspect search, collecting evidence, border surveillance and marine patrol. ARGUS F TYPEThe Argus F Type offers a simple-to-operate configuration; it is a robust, self-contained camera with fully automatic operation. The camera is lightweight at less than 3lb and specifically created to help police and security personnel to detect heat signatures in specialist search operations. The F type uses a high-resolution 320 x 240 pixel Amorphous Silicon (ASi) microbolometer detector. It has been designed using advanced digital imaging technology providing it with the sharpest picture available and superior performance. The F Type comes with the most advanced features available in any thermal imaging camera on the market and is a superb tool for applications such as:•Druginterdictionoperations•Detectionofhiddencompartments•FindingembeddedelectronicequipmentThe benefits to law enforcement agencies are clear: suspects can be caught quicker using less manpower and most importantly thermal imaging keeps the good guys safe and one step ahead of the criminal. The cameras are not as expensive as you might think, Argus cameras have been designed to keep purchasing cost down, creating affordable effective tools for the fight against crime. Clearly these cameras have a wide range of applications. Why not witness them yourself? The Argus sales team will be demonstrating its new range of cameras at the Emergency Services Show in the UK, as well as Intersec in Dubai. This new range of cameras will be available to purchase in the new year why not book a demonstration now? L

FOR MORE INFORMATIONwww.argus-tics.com

THERMAL IMAGING

EMBRACING THE LATEST THERMAL TECHNOLOGYArgus introduces its latest range of thermal imaging cameras for law enforcement agencies

Advertisement Feature

Argus TT Type – officer patrol

Argus P Type – covert surveillance

Argus F Type – specialist search

Suspect search in woodland

Drug interdiction

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 86: Counter Terror Business Volume 10
Page 87: Counter Terror Business Volume 10

Written by Steve Cham

bers, managing director of SDS G

roup Limited (part of Pentagon Protection Plc)

Effective search is a critical and often overlooked and underemphasised component of an active security operation. Search operations tend to be a low skill, boring and routine function that often does not yield any results. Therefore, there is a tendency to ignore it. Of course, search operations are conducted at transit locations such as airports and border crossings, large events and specific high risk venues, but a good number of these searches are completed incorrectly. Often people assigned to conduct these searches are untrained, unmotivated and unsupervised. As search is a critical part of effective security operations, organisations need to focus more on conducting accurate and effective searches. I recently spoke with world renowned counter-terrorism expert Dr John Wyatt, MBE, who spent more than 25 years in the army, most of it as a bomb disposal officer. Dr Wyatt has an intimate knowledge of correct search procedures, techniques and the critical role search plays in security operations and he agreed that most search operations could be more effective. He stressed that “search is not high tech, it’s pretty basic, but like a lot of basic things if it’s not done properly it’s pretty ineffective”. Dr Wyatt pointed out some ways in which companies could improve the results of their search efforts.

EFFECTIVE SEARCHThere are three key components to an effective search: training, technique and supervision. Search personnel need to be trained in proper search techniques, which can be taught relatively quickly. This is a key missing component. Properly trained personnel, who rigorously follow a set of procedures based on their training, form an effective defence and deterrent against explosive and other illicit devices from being introduced into a secure area. Equipment is the next component of effective search, keeping in mind its limitations. While politicians, bureaucrats and building managers are always looking for that piece of equipment that will positively detect an explosive or incendiary device hundreds of meters away with 100 per cent accuracy, 100 per cent of the time, (and at low cost), this utopian device simply does not exist. Search equipment should enhance

the human senses, not replace them. The human element, using experience, instinct and training, is the critical element determining whether or not a more in-depth investigation is warranted. “Search is a human operation enhanced by equipment,” according to Dr. Wyatt. “It is not an equipment operation”. Proper supervision ties together your teams’ training and equipment by ensuring proper search procedures are consistently followed and the equipment used correctly. As previously stated, search operations tend to be routine, boring affairs which rarely find anything. This is the nature of search - there usually isn’t anything to find. In these situations it’s tough to keep people motivated, attentive and alert. That’s the management role, to keep searchers alert, focussed, motivated and following procedures.

BARRIERS TO EFFECTIVE SEARCHTime constraints and a fear of false alarms are the biggest barriers to conducting an effective and thorough search, even for properly trained personnel. Think about the searches we’ve all experienced, the ones conducted at the airport or at the entrance to a museum or public event. Screening personnel often speed up the search process when queues become lengthy, often dramatically reducing search effectiveness. Dr. Wyatt relayed an experience he had with a museum that, when the queues became too long, implemented “quick searches” which, according to Dr. Wyatt, can be easily defeated. “They would have been better off randomly choosing individuals

for in-depth, proper searches rather than subjecting everyone to a quick, ineffective search. The element of randomness would have been a more effective deterrent to anyone seeking to bring in contraband.” Search personnel are reluctant to cause false alarms and often view them as a problem, but false alarms are not necessarily bad. False alarms, when based on a common sense analysis of the cause, where all the elements of an explosive or illicit device are present, are to be praised. These types of false alarms indicate search teams are effective. Management needs to take note however, as false alarms that are not based on real world criteria can be a problem. For example, an explosive detector that consistently tells you there are explosive elements when there are none, can destroy the team’s trust in that particular device. Like the boy who cried wolf, people will tend to discount the indications which could lead to tragic results. Little things make a difference. Something as fundamental and basic as search can be made much more effective when it is given the attention it deserves. Search personnel need to be trained in the proper procedures, given the appropriate equipment and managed to make sure they operate in accordance with effective search techniques and kept motivated. This is a simple step that can save lives and property whilst keeping us safe. L

FOR MORE INFORMATIONTel: +44 (0) 1580 715 [email protected]

EFFECTIVE SEARCH

EFFECTIVE SEARCH: THE FUNDAMENTAL BUILDING BLOCK OF SECURITYSearch is a critical part of effective security operations, and the equipment used should enhance the human senses, not replace them, says Steve Chambers, managing director of SDS Group

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

87 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 88: Counter Terror Business Volume 10

Security is not justsomething we do at ARINC–it’s part of who we are

For years, we’ve helped develop and implement solutions for commercial, government, and defense industries to help strengthen security around

the globe.

Whether it’s sending and receiving information securely, providing mobile wireless networks,

supporting systems that guard nuclear power plants, or developing the latest

biometric tools, ARINC delivers.

As a capabilities-driven company with communications, engineering,

and integration as our core competencies—you can trust us

to handle your greatest security challenges.

www.arinc.com/secure

ARINC_DefenceBusiness_Nov_2011.pdf 1 13/10/2011 16:10

Page 89: Counter Terror Business Volume 10

The annual Transport Security Expo event will bring focus to the difficult question of how best to secure such transport networks, examine the latest challenges and threats, security strategies, technologies and operational countermeasures in considerable detail. “Our public transport network delivers strategically vital links of high importance to the economic well being of the country. Disruption across these networks has an impact that can very quickly result in huge cost being amassed. The security of such public transport networks has previously been overshadowed by other largely transnational security concerns. Any form of disruption can directly challenge national security,” explains Peter Jones, chief executive, Transport Security Expo. Securing & Protecting Public Transport is a two-day conference that will immerse participants in the principal issues faced and encourage a solution-focused debate through round table and open forum discussion. The conference delivers a unique perspective on the pressing issues faced in this arena and an exclusive ability to share or discover knowledge with other transport industry leaders from across the sector.

ADDRESSING THE THREAT The conference will assess the threat from terrorism, examine the extent of threats from chemical, radiological and explosive weapons, consider how best to protect major transit hubs & crowded places from a diverse range of threats, debate crime, vandalism and anti-social behaviour reduction. Delegates will be able to learn about the state of emergency response preparedness and crisis management within the public transport arena, with the session delivering an overview of current safety and security strategies and partnerships.Securing & Protecting Public Transport incorporates keynote open forum debates which examine the extent of opportunist and organised theft across the rail network, determining how best to enhance crisis response. It is supported by a dedicated technology workshop and a hardware and software exhibition. The theft of high scrap value cable from across the UK railway system has become big business. Network Rail told members

of the parliamentary Transport Select Committee recently that compensation to train operators due to such theft leading to a loss of network availability, had reached £43 million over the past two years. British Transport Police emphasised the extent of the problem at the same hearing by disclosing it had over a 100 officers dedicated to the issue. “Extensive outreach across the transportation sector reveals an urgent need to expand protective security measures to encompass all arenas. Transport Security Expo brings governmental and law enforcement officials together with the entirety of the industry,” concludes Jones. The Transported Asset Protection Association (TAPA EMEA) will be holding its second regional conference at the show. According to the European Union, high risk products moving in supply chains in Europe costs businesses in excess of ‐8.2 billion a year. TAPA unites global manufacturers, logistics providers, freight carriers, law enforcement agencies, and other stakeholders with the common aim of reducing losses from international supply

chains. Today, in Europe, the Middle East and Africa, (EMEA) The Americas and Asia, TAPA’s membership is at its highest ever level. The Association’s 700+ members include many of the world’s leading manufacturing brands as well as their logistics and transport providers with combined annual sales of over $900bn.

WORKSHOPSIn its 10th anniversary year Transport Security Expo has unveiled an expanded workshop programme for its forthcoming event. Knowledge centric seminars deliver detailed information presented by industry experts. The programme has been expanded by demand. Reflecting concern expressed about the ability of the transport sector to thwart another major attack against principle assets, the workshop seminar programme identifies the key threats in each arena and presents a range of answers to them. Within the context of the aviation, maritime, public transport and supply chain sectors, six workshops will thus focus on passenger screening, freight and cargo security, E

Extensive outreach across the transportation sector reveals an urgent need to expand protective security measures

TRANSPORT SECURITY EXPO

ADDRESING TRANSPORTSECURITY ISSUES Government, law enforcement and public transport officials will gather together to address pressing security issues across open transport networks during the forthcoming Transport Security Expo, which takes place at Olympia. London on 14-15th November.

Transport Security

Security is not justsomething we do at ARINC–it’s part of who we are

For years, we’ve helped develop and implement solutions for commercial, government, and defense industries to help strengthen security around

the globe.

Whether it’s sending and receiving information securely, providing mobile wireless networks,

supporting systems that guard nuclear power plants, or developing the latest

biometric tools, ARINC delivers.

As a capabilities-driven company with communications, engineering,

and integration as our core competencies—you can trust us

to handle your greatest security challenges.

www.arinc.com/secure

ARINC_DefenceBusiness_Nov_2011.pdf 1 13/10/2011 16:10

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

89 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 90: Counter Terror Business Volume 10

THE SCENTLOGIX™ K9* SCENTKIT COLLECTION – THE WORLD'S FINEST AND MOST

COMPREHENSIVE SET OF SCENT-TRAINING AIDS FOR THE DETECTION OF EXPLOSIVES,

NARCOTICS, IED'S AND HME'S BY K-9'S

The World's Finest Training Aids

Military • Police • Bomb Squads • Hotels • Schools • Drug Squads • Government Facili�es • Seaports • Events • Airports

• Checkpoints • Courts • Rail • Embassies • Borders

For more information, please view

www.scentlogix.com

or email [email protected]

Also "like" us on FB, and watch

videos of worldwide users on

YouTube

Chemically Formulated ScentKit with an Odor Consistency Better than the Real Material Non-Illicit, Non-Hazardous, Non-Regulated Aids!

All products have been Double-Blind Tested Multiple Times, WorldWide

Easy To Transport, Store and Use Consistent Long-Lasting Odor

No Extinction Training Required Can Be Used Within Built-Up and Civilian

Environments Proven and Effective Usage in Many

Operational Theatres Trains K9’s to Detect Both Small and

Large Amounts of Target Material Specifications and overall detection range

exceeds current Worldwide (US, Canadian, British, European Union, Australian and South African etc) Military, Police and Customs K9 Kit Specifications for Explosives and Narcotics Detection

Opens Training Opportunities to all Breeds of K9's

Enables Effective Training in All Climates

Provides The Only Available K9 Training Aid For TATP, Methamphetamine, HMTD, IED's and HME's Each ScentKit can be Used to Generate Odor Equivalents of over 600 lbs of Explosives or Narcotics 100% of Green Dogs Trained on ScentLogix Have Passed Certification at First Try! Virtually the Whole Range of Standard, Plastic and Improvised Explosive Configurations (+1200) can be Detected Using ScentLogix K9's ScentKits within a K9 Training Program

Collectively, the Suite of ScentLogix™ K9* ScentKits Provide a New Gold Standard for K9-Detection Training Kits, Including Kits that Contain Real Explosives and Narcotics!

Currently Available ScentKits

Explosives: TNT • Tagged/Untagged RDX • Semtex A+H • All-Base Smokeless Powder • Black Powder • Dynamite • ICAO-Mandated

Explosive Taggants • TATP • HMTD • Chlorates • Nitrates • IED/HME-Nitrates • PETN

Narcotics: Cocaine • Heroin • Methamphetamine • Ecstasy • Marijuana • LSD

Page 91: Counter Terror Business Volume 10

E terminal and facilities protection, perimeter security & hostile vehicle mitigation, shipping protection and rail security. These workshop sessions will be chaired by Ian Taylor, editor, Cargo Security International; Chris Yates, principal, Yates Consulting, Graham le Fevre, former head of security, British Army, Graham Basset, UK vice chairman, Operation ASIS, Steven Jones, maritime director, SAMI and Roy Cooper, publisher, Professional Security Magazine.

RESEARCHTransport Security Expo conducts extensive research and engages in widespread outreach annually, to aid in understanding the needs of the industry it serves. This activity reveals the following key points: With the demand for air travel increasing, airports must innovate to ensure an appropriate balance between the competing needs of utmost security, greater revenue generation and an improved passenger experience. The threat trajectory is evolving and the probability of attacks against terminals and supporting facilities is considered a persistent threat with no easy solution. The freight and cargo channel remains an extremely vulnerable avenue of attack, particularly from a new generation of devices difficult to detect by normal screening. Painful history demonstrates a pressing requirement to combine traditional perimeter security measures with hostile vehicle mitigation techniques to ensure a robust defensive posture against an increasingly wide range of external threats. Despite the deployment of substantial naval assets in many of the worlds more notorious hotspots, piracy on the high seas remains an intractable problem for which self-help appears to be the only practical solution. Major security challenges, including protecting passengers using such open and vulnerable transport infrastructure from acts of terrorism and protecting valuable safety critical assets against organised and opportunistic theft, continue to bedevil national rail operators. Alongside the extensive conference and exhibition programme, this series of workshops delivers valuable insight into the technology options available to the transport industries, as they grapple with an evolving threat horizon including rising incidences of criminal activity. This event is being held against a backdrop of continuing tension on the world stage, an industry wide threat level that remains high and fundamental policy and operational changes under consultation. These factors will drive the debate, inform decision making and direct purchasing decisions when Transport Security Expo next convenes at London Olympia on 14-15 November 2012. L

FURTHER INFORMATION www.transec.com

Transport Security

TRANSPORT SECURITY EXPO

Transport Security Expo Workshops

Passenger ScreeningVast numbers of travellers are screened at our major air transport hubs every year. With the demand for air travel constantly increasing, airports must innovate to ensure an appropriate balance between the competing needs of utmost security, greater revenue generation and an improved passenger experience. This challenging balancing act requires that airports harness best practice techniques and adopt latest technological advances to ensure the smooth flow of travelers. This workshop seminar brings focus to the latest passenger screening solutions and how they can be harnessed to deliver enhanced capability and flexibility.

Ship Protection Piracy on the high seas remains an intractable problem despite the deployment of substantial naval assets in many of the worlds more notorious piracy hotspots. UK government officials recently gave the green light to arming merchant vessels traversing such dangerous waters. This important and timely workshop brings focus to the security options available to the merchant marine, including the deployment of armed personnel, real time tracking of vessels at sea and the wide range of other threat mitigation and hardening solutions available today to protect crews and ensure safe passage for valuable cargos.

Terminal & Facility SecurityThe probability of attacks against terminals and supporting facilities is considered a persistent threat with no easy solution. Two significant attacks at airports in Moscow and Frankfurt last year serve to illustrate this point graphically. Although deployment of plainclothes security personnel and quick reaction teams can help ameliorate the impact of attacks on airports, their ease of execution and the impossibility of eliminating all airport queues (be they for drop-off, check-in, security screening, baggage claim, or car rentals) make this tactic a growing threat. This timely workshop examines the options available to help better secure terminals and associated facilities.

Freight & Cargo SecurityUS officials recently unveiled their Strategy for Global Supply Chain Security at the World Economic Forum in Davos, Switzerland. The policy document was developed after the discovery of powerful improvised explosive devices at two major airfreight hubs, succinctly demonstrated the vulnerability of the freight and cargo channel to acts of terrorism. US strategy has an inevitable impact for freight and cargo handlers attempting to attain compliance with the requirements it contains. This must attend workshop sheds light on currently available technological solutions and examines the options available to operators across the supply chain going forward.

Perimeter Security & Hostile Vehicle MitigationIn an age when attacks have become increasingly random and often from the least expected trajectory, effective perimeter controls are a vital part of the overall security mix. Recent painful history has demonstrated a pressing requirement to combine traditional perimeter security measures with hostile vehicle mitigation techniques, to ensure a robust defensive posture against a wide range of external threats. This key workshop delivers a detailed overview of the solutions available.

Rail SecurityMajor security challenges continue to face national rail operators. These include protecting passengers using such open and vulnerable transport infrastructure from acts of terrorism and protecting valuable safety critical assets against organized and opportunistic theft. The key enabler across such extended and exposed networks is technology. This entirely new and highly specialized workshop brings clarity to the range of options available across the complimentary technology groups of surveillance, closed circuit television monitoring, access control, perimeter security, sensing and tracking amongst others. In these challenging times for the industry this workshop seminar is not to be missed.

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

91 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 92: Counter Terror Business Volume 10

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 1092

Who are we?A privately owned PCB Manufacturer with highly skilled and experienced staff (Est. 1969). We will provide customers with the service & quality, and peace of mind we will be here for another 40+ years

Where are we?Based in the South East of U.K. approximately 20 miles east of London

What can we do?3 Multilayer – Flexible – PTH – Conventional3 FR4 – PTFE – Polyimide – Polyester – Aluminium3 24 hours to 15 day standard lead time available.3 Prototype boards to large Antenna boards3 Offshore facility also available

Why?Because you would like an alternative, backup or replacement supplierAre you satisfied with the level of service your current supplier provides you?

Contact our sales team on 0845 166 50 50 or email [email protected]

DO YOU REQUIRE PRINTED CIRCUIT BOARDS?

Page 93: Counter Terror Business Volume 10

ARMOURED VEHCILES

Defence New

s

NEWS IN BRIEFHammond outlines Army 2020Defence Secretary Philip Hammond has discussed the key considerations behind the role of the Army in Future Force 2020. Speaking at the Land Warfare Conference at the Royal United Services Institute in London, the Defence Secretary said that, while the Strategic Defence and Security Review has set defence on a course for a sustainable future, the implementation of this vision of a formidable, adaptable and flexible Future Force 2020 requires transformation in every corner of the defence establishment. Hammond said: “Army 2020, as we call it, will deliver a new structure designed to meet the needs of a smaller, more flexible and agile Army. Set on a firm foundation, in terms of both men and materiel. Well-trained, well-equipped, and, crucially, fully-funded.” Hammond said that Future Force 2020 would embrace the ‘whole force concept’, built on three pillars: the Armed Forces, both regular and reserve; the civilians who work alongside them; and the contractors who support them on operations.

Boeing demonstrates SOTMBoeing has successfully demonstrated its SATCOM on the Move (SOTM) product on a live Ka-band satellite network. The demonstration in May connected three sites in Australia and the United States using integrated voice, video, and data communications over the increased bandwidth available on the latest generation Ka-band satellite mobile terminals. This capability uses the Wideband Global SATCOM (WGS) system, also developed by Boeing. During the demonstration, High Mobility Multipurpose Wheeled Vehicles (Humvees) fitted with cameras and handheld radios successfully connected to test labs in Australia and the United States, simultaneously combining videoconferencing with military radio and telephones. The integrated SOTM demonstration proved core elements of a seamless, secure and deployable communications system. This latest SOTM product evolved from combat-proven technologies used by the U.S. Army during Operation Iraqi Freedom in 2003.

TO READ MORE PLEASE VISIT... http://tinyurl.com/7f4nmjk

Foxhound on display at DVD 2012

The British Army’s new Foxhound vehicle has been unveiled for the first time since its arrival in Afghanistan. Hundreds of people involved in equipment and support for the UK’s Land Forces have flocked to the Defence Vehicle Dynamics (DVD) Exhibition at Millbrook in Bedfordshire, the largest of its kind in Europe. The Army took advantage of the audience to display Foxhound, the first vehicle to enter service using an ‘open systems’ approach, which means so-called off-the-shelf upgrades are easier and that

there will be greater uniformity with other new technologies and vehicles. The MOD has committed £270m for 300 Foxhound vehicles with General Dynamics Land Systems - Force Protection Europe, which will sustain around 750 UK jobs. Major General Carew Wilks, director, Land Equipment in the MOD Defence Equipment and Support organisation, said:“As well as showcasing current and future land equipment, DVD 2012 has given us a chance to work with our manufacturers and suppliers to see how we can improve our procurement processes by ensuring our equipment systems are easily connected with those of other suppliers. Such an approach allows us to quickly add, change or update sub-systems as needed.“Foxhound is the first vehicle to enter service taking account of our new generic vehicle architecture standards, so I’m pleased to see it here at DVD giving visitors a tangible idea of how systems integration works.”

TO READ MORE PLEASE VISIT... tinyurl.com/7zpgdey

US Drone use ‘encourages’ other states to flout human rights standards says UN investigatorThe US policy of using aerial drones to carry out targeted killings presents a major challenge to the system of international law that has endured since the second world war, a United Nations investigator has said. Christof Heyns, the UN special rapporteur on extrajudicial killings, summary or arbitrary executions, told a conference in Geneva that President Obama’s attacks in Pakistan, Yemen and elsewhere, carried out by the CIA, would encourage other states to flout long-established human rights standards. In his strongest critique so far of drone strikes, Heyns suggested some may even constitute “war crimes”. His comments

come amid rising international unease over the surge in killings by remotely piloted unmanned aerial vehicles (UAVs).

TO READ MORE PLEASE VISIT... tinyurl.com/83e6q4y

Afghan police & UK troops complete successful insurgent clearanceAfghan policemen accompanied by British troops recently cleared an insurgent hot spot to the east of Lashkar Gah in Helmand province. 90 Afghan police patrolmen supported by members of B Squadron of the King’s Royal Hussars and the 1st Battalion Welsh Guards patrolLed into the village of Pulpazay. The area has suffered from intimidation and extortion by the insurgents and from the laying of IEDs. The aim of the operation was to drive out the Taliban, allowing the Afghan forces to conduct policing within the area. This was one of the first joint operations of this scale to be conducted with the Afghan Uniform Police (AUP) in the district.

Captain Rob Bird, Second-in-Command of B Squadron of the King’s Royal Hussars, said:“This was definitely an Afghan pull and not an ISAF push operation. The Afghan police were extremely professional. The offensive spirit of the Afghan police put the insurgents on the back foot. The operation highlighted the effectiveness of the Afghan police in leading and conducting partnered operations in the Lashkar Gah area. This operation was intended to send a clear message to the Taliban; you can no longer operate here.”

TO READ MORE PLEASE VISIT... tinyurl.com/6olc52ow

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

93 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 94: Counter Terror Business Volume 10
Page 95: Counter Terror Business Volume 10

Proengin has developed biological and chemical warfare agents field detectors using flame spectrophotometry. The well-known and widely used AP2C has proven the capacity of that technology to be the most reliable on the field with the lowest false alarm rate and the simplest ease of use.

THE NEW AP4CNew developments such as the AP4C have extended the capacity of that technology to include chemical warfare agents and toxic industrial material in a simultaneous mode. There is no limitations in the number of gases detected by the AP4C. All nerve agents, all blister agents and all blood agents can be detected by AP4C within the requirements of response time and sensitivity of NATO recommendations. The AP4C has extended the range of chemicals that can be detected by Proengin chemical detectors. All dangerous compounds containing Sulfur, Phosphorous, Arsenic and/or HNO chemical bond can be detected simultaneously. Similarly to the AP2C unit, the AP4C has the capacity to work in very severe environmental conditions (explosive areas) and the measurements are unaffected by high humidity levels or by the presence of other organic chemical compounds, such as paint. The AP4C technology allows the simultaneous detection of an unlimited number of gases and the identification of the chemical elements that constitute these chemicals. It is therefore possible to detect impure agents or chemicals manufactured by terrorists that would not fit into traditional libraries of other detectors. Moreover AP4C will detect without upgrade new agents that will be developed in the future, as well as still not precisely known agents like Novichok agents (or non traditional agents). The response time is among the shortest on the market, but what makes the AP4C unique is the recovery time after a positive detection. The AP4C is therefore the chemical detector that has the highest level of availability of the field. Grateful to its remarkable performances, AP4C has been derived on other detectors, dedicated to the following uses:•useonreconnaissancevehiclesandbattletanks

•useaboardnavalships•useforcriticalbuildingsandareasprotection

AP4C-V Based on the same detection technology and the same internal design, air entrance has been designed to face high wind: AP4C-V is able to take in representative sample of the outside air, even with a direct cumulated wind and speed of 100 km/h. Data are shown on easy to understand control box or directly on the control computer of the vehicle.Sensitivity, short time to answer, low false alarm rate and short recovery time are the same as for AP4C, making AP4C-V the perfect detector for all kinds of reconnaissance missions and battle field exploration.

AP4C-FAt sea, ANEP-57 recommendations stipulate the availability of both fixed and mobile means of chemical detection. As AP4C is the perfect mobile chemical detector for contamination control, the use of AP4C-F provides the naval ships with reliable and efficient chemical detection. This ruggedized detector shows the same detection performances as the AP4C, with 2 supplementary features. It produces its consumable gas by electrolysis, thus lightening daily maintenance, and more than an alarm, is able to trigger the ventilation of the vessels, thus protecting the citadel from the chemical danger. The AP4C-F is able to be operated on open deck, with the same performances. National palaces, courts and parliaments are more and more equipped with fixed chemical detectors. AP4C-F, being able to be operated on naval citadels, is of course able to provide the same detection and protection on terra firma, for this kind of critical buildings.

BIOLOGICAL DETECTIONThe MAB, a new generation of biological field detector. MAB has the unique capacity of detecting and categorizing biological particles with a proven extremely low false alarm rate and the unique capacity to discriminate dangerous or suspicious biological particles such as Anthrax spores from natural background. The very liable MAB has been designed to be mounted on track vehicles. It is insensitive to diesel exhausts.

As all Proengin products and thanks to the flame spectrophotometry technology, MAB is running in very severe outside conditions, shows the lowest false alarm rates (negative and positive) and requires reduced maintenance. It shows such a high level of availability.

AP4C-FBGovernment premises, courts and parliaments are also more and more equipped with fixed chemical and biological detectors. AP4C-FB combines both chemical detection as for the AP4C-F, and biological alarm as for the MAB. This detector may be associated with a radiological probe, featuring the all in one full CBRN detector. L

FOR MORE INFORMATIONwww.proengin.com

CHEMICAL & BIOLOGICAL DETECTION SYSTEMS

BIOLOGICAL AND CHEMICAL DETECTION FOR THE FIELDThe MAB, a new generation of biological field detector from Proengin, has the means to detect and categorise biological particles with an extremely low false alarm rate

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

95 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 96: Counter Terror Business Volume 10

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 1096

The BUSINESS CONTINUITY and RESILIENCE SPECIALISTS

3 Quantified KPI and impact analysis3 Specialist support and advice 3 Accessible online questionnaires

3 Scalable to fit your organisation3 Comprehensive reporting3 Flexible to meet your needs

Visit www.inoni.co.uk/webinar to join a webinar today. Call us on 0845 045 1171 or email [email protected]

Sometimes, it’s obvious which assets need protectionBut it’s rarely this clear and you need to make the case convincingly.

INONI’s Resilience Maturity Framework gives you hard numbers to work with.

Free Webinar

Barrier Components was first established by Peter Evans in 1987, and is now in it’s 25th year. The company has become a well established brand supplying architectural hardware for the steel gate, sliding door and frameless glass markets and holds significant stocks in its modern 15000 square foot warehouse at Dolphin Point, Purfleet. This enables rapid supply to its customer base. Barrier’s stock holding includes solutions for all specifications and therefore provides a one stop shop for contractors and private buyers alike. The range incorporates hardware for steel swing, sliding and cantilevered gates manufactured by FAC (Italy), gate locks and closing mechanisms from Locinox (Belgium), sliding systems for agricultural/commercial applications from Helaform (Finland), stainless steel 304 patch, door rail and G-Tech fittings for frameless glass shop fronts by GCC Taiwan, stainless steel 304 shower hinge and support bar fittings by GCC, dry glaze aluminium balustrade system and stainless steel handrails

from USA, welding hinges manufactured from high grade steel by Clemenson (France), a wide range of brush strips and housings by Tribollet (France), stainless steel single point fixing bolts and spider fittings by Sadev (France), hardware for industrial doors and both internal and external folding and straight sliding systems for commercial and residential specifications from sources around the world. Working closely together with Sadev Manufacturing (France), Barrier Components has developed and tested a new Blast

Enhanced Structural Glass Fittings offer for the Counter Terror industry. The company offers Sadev Structural Glass Single Point and Spider Fittings precision manufactured from high quality 316 stainless steel, tested to meet ISO 16933 and to perform in excess of EXV25 (tests arranged and co-ordinated by Crossley Consult on Glass, West Sussex), which will suit the high profile Infrastructure projects of today. Information and full confidential technical advice for this product is available only on request. Barrier Components

provides expert technical support for all enquiries and is able to supply most projects from a stock plus situation. Its web site at www.barrier-components.co.uk is available for pricing and purchase information against the full stock range.

FOR MORE INFORMATIONTel: 01708 [email protected] www.barrier-components.co.uk

Barrier Components huge stock holding enables the quick supply of branded architectural hardware

Page 97: Counter Terror Business Volume 10

The capital will be visited by travelling teams, spectators, heads of state and other VIPs from over 183 nations. Estimated attendances are in the range of 17,000 athletes and officials, over 20,000 journalists, 400 ‘VVIPs’, over 100,000 volunteers and official guests, and nearly 8 million ticketed spectators. The Paralympic Games will follow, with visitors from over 174 nations, but will be on a smaller scale, with only 1.5 million ticketed spectators. With the above in mind – and the world’s spotlight firmly on London, a broad range of threats to security must be taken into consideration. Terrorism is quite clearly one of the most serious threats facing the games. There are four main possible threat groupings - Actors formally linked to major jihadist groups (mainly al-Qaeda and its franchises), Lone wolf jihadist actors, dissident Irish Republicans and other political extremists (eg neo-fascists) In general, the security measures have focused on Terrorism as a Tier 1 threat and just about anything possible has been done to minimise the risk. Whilst we assess that terrorist intent to strike the games is high, and they are undoubtedly a prominent target (especially given the initial planned targeting of London on the morning of the 2005 decision to award the games), the security environment is severely constraining capability for most threat actors. In this regard outdoor areas where people are due to assemble are perhaps the most prominent potential targets. Transport infrastructure is also a proven and attractive target, although we expect a comparatively high security presence around hubs. Open source jihad, i.e. the publication of details on how to make explosives on the web, has helped promote such activity – although the quid pro quo is that the devices used are likely not to be particularly effective.

RISK OVERVIEW – CYBERThe Beijing games saw a great deal of cyber activity and this has driven fears for London. Much of this was prompted by political imperatives, with e.g. Tibet being a big issue for both physical protestors and cyber hacktivists. Other significant dangers

include attacks on sponsors and attempts to “pwn” Olympics sites by casual hackers. Criminals will naturally be drawn to the crowds present at the games, and a number of hoax websites have already been shut down. Many of these related to accommodation or ticket sales, and these areas remain under threat, with it being very hard to tell official/licensed and unofficial sites. If in doubt, official web sources should be checked. Another significant possibility is the targeting of people via corrupted apps for smarthphones and – potentially most worryingly – the placing of fraudulent WiFi

networks masquerading as for example BT boxes, that can in fact act as data thieves for the unwary. Against, connecting to an unknown network can be a risky business.

THREATS TO INFRASTRUCTURE

Smooth and reliable transport infrastructure – particularly rail and road routes through London – will be essential to a successful Games. It is likely to be tested both by the high

load symptomatic of the tournament, and

potentially by a host of other problems and issues.

Event modelling suggests that peak road traffic flows will be experienced on the first weekend (from 27 July) and second weekend (3-4 August) of the games. The following issues have also been identified: Air - disruption at airports may be a severe issue as throughput increases. Key areas of concern are the efficiency and staffing adequacy of baggage handling and border control. Border control at UK airports has come under heavy fire recently for causing ‘unacceptable’ queues – and is likely to be a particular cause for concern during the Games.

Tube - earlier this year, drivers branded a £100 allowance for working during the Games as “desultory” – however, the RMT union has since quelled the concern by getting TFL to agree to extra pay. However, the union is continuing to ballot members over strike action in relation to other pay and conditions issues, which could yet affect the Games (although we assess this to be unlikely). Bus - over 20,000 bus drivers have been balloted over strike action, following a lack of action from operators to offer Olympic Games bonuses (as other transport workers in London are set to receive). UNITE has

said that strikes could take place during the Games – and could be highly disruptive. Taxi - with support of the RMT union, taxi drivers have conducted a series of disruptive ‘blockade’ protests in London earlier this year (acting out against issues including controversial ‘Games Lanes’ and other traffic restrictions planned for the summer). In each case, a large number of cabs blockaded and congested the one-way system in Stratford, causing traffic to draw to a standstill. The matter is yet to be resolved.

ENVIRONMENTAL & HEALTHIt is likely to be hot, and queues outside venues and for transport could be long. Water is banned from being taken into venues due to airline-style “mag and bag” security measures, although it will be available inside. As ever with a huge number of visitors disease transmission rates are expected to increase and this poses a collateral threat. Pandemic influenza remains a serious potential global issue and obviously gatherings on this scale offer a potentially ideal transmission arena, although the weather may well mitigate against that in due course L

FURTHER INFORMATIONCSARN is a leading UK based business security and resilience membership network. For further information visit csarn.org

Disruption at airports may be a severe issue as throughput increases. Key areas of concern are the efficiency and staffing adequacy of baggage handling and border control

SECURITY & RESILIENCE

MEASURING OLYMPIC RISKSLondon is now in the final stages of preparation for the 2012 Summer Olympic Games. CSARN gives a brief analysis of the security risks.

Security & Resilience

“Criminals will naturally be drawn to the crowds present at the games, and a number of hoax websites have already been shut down”

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

97 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 98: Counter Terror Business Volume 10
Page 99: Counter Terror Business Volume 10

Rubb Buildings Ltd is an innovating world leader when it comes to the design, manufacture and delivery of relocatable helicopter and fixed wing aircraft ‘super hangar’ systems. The Expeditionary Forces Aircraft Shelter System, which also features sunshades and warehouses, is uniquely suitable for the military and aviation services, designed to be rapidly deployed and quickly erected anywhere in the world. HIGHEST QUALITY PROTECTIONThroughout the first six months of 2012 Rubb has supplied EFASS hangars to the UK Royal Marines, the UK Royal Air Force, the USA Army, KBR and Rio Tinto – making a total of 13 structures. New orders include three 25m span x 36m long EFASS hangars for the Canadian Forces and three 25m span x 36m long steel-framed EFASS structures for Horizon Flight Academy in the UAE. General Manager Ian Hindmoor said: “Our

EFASS range of military buildings provides the highest quality protection to personnel and vital equipment in the most challenging of environments. It also offers some unique qualities including new state-of-the-art door options and crane technology. The product range is really taking off and we recently met some potential new clients at the Eurosatory exhibition in Paris.” ASSEMBLYEach hangar can be rapidly constructed using a number of steel fabricated components together with uniquely designed aluminum roof and leg sections, that bolt together to form the span trusses. When assembled, tough PVC coated polyester fabric sheets slide between the aluminium extrusions of adjacent spans, to form the shelter. Structures are available in three spans: 11.1m (36ft), 20.4m (67ft), 25m (82ft), by any length, with multiple door options. They pack into

20ft ISO containers ready for transport by sea or air. With unmatched engineered fabric structures currently in action across the globe, Rubb has the ideal solution to military and defence application requirements. INTERNATIONAL PRESENCEIan added: “We attended defence shows in the UAE, Brunei and the UK last year. This year we have been meeting with old and new clients in Europe and Eurosatory was an ideal platform to do this. This is part of our ongoing strategy to meet military requirements nationally and internationally.” Rubb welcomed military delegations and guests from India, Chile, Kuwait and Ukraine at Stand E470 on the ADS UK Pavilion, Hall 5A, at Eurosatory 2012, Paris Nord Villepinte, France, from June 11th - 15th. Many other potential clients also attended the stand and the EFASS product range was very well received. L

FURTHER INFORMATIONTel: (0191) 482 [email protected]

AIRCRAFT HANGARS

NEW ORDERS FLY IN FOR RUBB MILITARY HANGARSRubb has delivered 13 aircraft hangars within the first six months of 2012 – and is celebrating orders for six more

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

99 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

Page 100: Counter Terror Business Volume 10

100

Writ

ten

byAd

verti

sem

ent F

eatu

re

International trade and economic growth hinges on the efficient and secure movement of goods and services through the global supply chain. Identifying chinks in the armour of that supply chain and managing the risk is an ongoing task for security managers at airports, seaports, railways, metros, highways, coach stations and national borders. Solutions to deal with potential threats have to be regularly reviewed and updated to remain effective. The dangers are real. While open borders make travel quicker and easier, and the distribution of goods and utility services more straightforward, a secure, interconnected infrastructure – in transport, energy, technology and many other critical sectors – is crucial to the prosperity of every nation.

INTEGRATED SOFTWARE SYSTEMWhilst it is financially impractical to regularly invest in new equipment, a fully integrated software system that makes the most of disparate legacy equipment whilst also adapting to incorporate new technology provides the ideal compromise. This is where the flexible Advance Information Management (AIM) command-and-control platform from technology specialist ARINC comes in. The fully-managed, end-to-end solution that protects over 60 per cent of the USA’s nuclear facilities and critical infrastructure is now being utilised by an increasing number of organisations throughout Europe and the Middle East. As a market leader in the USA, the proven software has been successfully configured to protect nuclear power facilities, mass transit systems, airports, seaports, government facilities, military installations and education campuses. “This is a roll-call of recommendation to inspire complete confidence,” said Paul Hickox, ARINC International’s operations director. “It confirms the success of AIM in creating a common interface that combines advanced technology and functions to enhance security across an entire operation.” AFFORDABLE SOLUTION FOR ALL APPLICATIONSAIM is an effective and affordable solution for a varied range of applications and for organisations of all sizes. ARINC has deliberately positioned it midway between

costly, bespoke designs and prepackaged, one-size-(allegedly)-fits-all offerings. “We start by assessing the individual needs of each AIM customer,” said Hickox. “This enables us to select the most appropriate equipment and software. Each of our solutions is based on industry standards, open architectures and certified interfaces that are designed and implemented to leverage existing infrastructure.” Master systems integrator ARINC has vast experience in providing hardware, software and networking solutions that integrate smoothly with existing IT systems. It also has unrivalled expertise in transport communications, engineering, systems integration and project management. “And it’s not just our product that is first-class,” Hickox says. “Our service is equally impressive – we make sure that we deliver on time, in scope and within budget. To sum it up, we are a straightforward company that delivers on our promises.” SCALABLE ACROSS MULTIPLE ZONESAIM can be scaled across single or multiple zones within single or multiple facilities. This enables sophisticated monitoring of all sub-system activities and alarms and provides operators with a common picture of their facilities. The use of handheld devices, if desired, allows first responders to receive the relevant video images and data for real-time, front-line decision making. AIM ensures continuous and safe operations for an entire facility by offering interfaces for intrusion detection, access control, video surveillance management, physical security information management (PSIM), credential management, biometrics-based identity management, closed-circuit television (CCTV), vehicle identification, asset management and integrated geographicalinformation system (GIS). When AIM was installed to provide high-level supervisory control and communications for the US Strategic Petroleum Reserve sites the brief included integration of legacy alarm, access control, security and surveillance systems that had been installed over a number of years. New equipment upgrades were to be added where needed. “The project involved integrating numerous legacy third-party access control and video surveillance systems, some 15

years old, as well as a number of separate intrusion detection and alarm systems,” said Hickox. “This is precisely the type of application for which AIM is designed.” There are situations where fast deployment and straightforward integration with existing infrastructure are the main concerns. In such cases a scaled-down version, AIM Enterprise Security Platform (ESP), allows organisations to manage their own migration to newer types of security technologies at their own pace. AIM ESP is also suitable for facilities where security needs change or where a rapid response to threats is critical. TECHNOLOGY BRIDGEAIM ESP also provides a ‘technology bridge’ for those seeking a newer and open security enterprise environment while maximising the return on their existing investment in security infrastructure. The two AIM solutions offer the highest levels of operational efficiency and reliability which is why they have rapidly become the first choice in critical infrastructure protection. “ARINC has an unequalled 80 years’ experience of developing innovative products and services for commercial, aviation, government and defence customers all over the world,” said Hickox. “Every customer can be confident of receiving a top-quality product, a first-class service and, equally important, superb technical support.” L

FOR MORE [email protected]

SECURITY

ARINC’S AIM PLATFORM EXPANDS INTERNATIONALLYFully-managed, end-to-end security solution that protects over 60 per cent of USA’s Nuclear Facilities and critical infrastructure now available in Europe and Middle East

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 10100

Page 101: Counter Terror Business Volume 10

Farnborough International Airshow (FIA) is the largest truly global event of its kind. A platform for some 1,400 exhibitors from the aerospace, defence, space and security sectors to showcase and demonstrate aircraft, equipment and technologies, the show is specifically designed to facilitate tailor-made and unrivalled opportunities to meet, negotiate and announce business transactions. New to the show is the Aviation Security Zone, which will offer companies within the sector the chance to participate in a dedicated area within the heart of the main exhibition halls. The Zone will enjoy a favourable location ensuring that it benefits from maximum exposure to our trade visitor audience. As part of the themed conference programmes, the Zone will also feature the Security Conference, which will fill the area with security professionals and also feature high-level speakers. Military giants, fast jets, aerobatic display teams, historic classics and future aviation technology mark an unrivalled collection of aircraft that will be in attendance at this year’s Farnborough International Airshow. The five-hour flying display taking place during the public weekend – 14th and 15th July – will keep visitors enthralled and entertained A variety of military aircraft are expected to display during the Airshow trade week,

including the Boeing F/A18 Super Hornet and the US Marine Corps V-22 Osprey are scheduled to appear. Other aircraft include the Lockheed Martin F-16 Fighting Falcon and C-130J Super Hercules, the Saab Gripen Fighter and the Yak 130. During the weekend, military greats from the BBMF and Avro Vulcan XH558 will also be flying. Entertainment is high on the agenda with aerobatic display teams. The Breitling Jet Team,

The Blades, RedHawks, Breitling Wingwalkers and the RAF Red Arrows will fly over the skies of Farnborough aerodrome. The solo displays will also be enhanced by the first appearance of the South Korean Air Force T-50 jet trainer in the colours of the Black Eagles display team and the exciting aerobatics of Mark Jefferies.

FURTHER INFORMATIONwww.farnborough.com

Farnborough Airshow

FARNBOROUGH AIRSHOW

Aviation technology takes centre stageBoeing F/A18 Super Hornet

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

101 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

RAPID DEPLOYMENT CCTVIntegrated Solution for Remote MonitoringCompletely self contained camera system with battery

n Single or dual lens megapixel camera in a stainless steel casen Deployable in less than 15 minutesn 3G/GPRS/Wireless data communicationsn Simple HTTP accessn Hand carry or pole mountn Interchangeable lenses provide viewing versatilityn Low bandwidth requirementn Local recording and storagen No software installation or license fee

[email protected]: 01730 230 530

See us at Farnborough

International Airshow,

Hall 3 Security Zone.

9th -13th July

Page 102: Counter Terror Business Volume 10

Adve

rtise

rs In

dex

ADVERTISERS INDEXThe publishers accept no responsibility for errors or omissions in this free service

Arinc OBC, 40, 66, 88, 100

Atom Training 44

Audax Global Solutions 65

Barrier Components 96

CDVi 52, 70

Cirrus Research 50

CLD Fencing Systems 62

Cobham Antenna Systems 102

Draeger Safety 6

E2V Safety 84, 85

E92 Plus 34

Electrothermal 46

Emergency Services Show 64

Euroquartz 20

Extrudakerb 60

Fire Eye 30

Frontier Pitts 62

G6 Global 72

Gematech 68

GOM 70

GPS Perimeter Systems 56

Hale Hamilton Valves 47

Handheld UK 76

Hesco 82, 83

Holmatro 78

Hytera 74, 75

Indigo Vision 10, 11

Infranor 16, 17

Inoni 96

Intelsec IBC

Jaguar Land Rover 54, 55

Kinematic 18

Litera 41

M-Tek Assembly 20

Nedap 4

Origin Storage 38, 29

Parotec Solutions 21

Pentax Ricoh 8

Phoenix Datacom 32

Photomechanical Services 92

PK Hydraulics 22, 23

Proengin 14, 94, 95

Rapiscan 24

Rubb Buildings 98, 99

Safety Flex 28, 29

ScentLogix 90, 91

Schneider Electric 26, 27

SDS Group 86, 87

Security Labels IFC

Servo & Electronic Sales 18

Sesys 101

Signtrade 18

Tiger Helicopters 42

Traka 80

Trizo 92

Webroot 36

Yorkshire Profiles 12

Zareba Security 58

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Volume 10102

Phase Matched

Cavity-Backed Spiral Antennas

Directional Planar Spiral Antennas

High Power, 0.15 to 15GHz

Multiple Bands in Stacked

Omni Array

Ultra Wideband Omni-Directional • Biconical omni-directional antennas

• Fully efficient

• Vertically polarised

• Bandwidths from 3:1 to 30:1

• Multi-stacked omnis for versatile configurations

High Power Planar Spiral • Directional, ultra wideband, high power

• Bandwidths up to 30:1

• Ultra slim

Cavity Backed Spiral • High fidelity monotone patterns

• Direction finding systems

• Phase and amplitude matching available

Cobham Antenna Systems, Microwave Antennas

Lambda House, CheveleyNewmarket, Suffolk CB8 9RG, United KingdomT: +44 (0)1638 732177F: +44 (0)1638 731999 E: [email protected]

Cobham Antenna Systems, Microwave Antennas

Specialist Antenna Design and Manufacture

The most important thing we build is trust

High Performance Antennas for Countermeasures, where

Security is CriticalUltra Wideband

Omni Antennas, 0.1 to 18GHz

www.cobham.com/antennasystems/newmarket

Page 103: Counter Terror Business Volume 10

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

103 Volume 10 | COUNTER TERROR BUSINESS MAGAZINE

This form of attack presents the terrorist with one of the most efficient means of assassination in terms of the risk of detection during the assault and the amount of explosive material used. The victim can be selected precisely, to cause the maximum alarm and dismay amongst the community to which he or she belongs. A death rate of one person per week was caused by this method of attack during one period of the 30 year IRA campaign in the UK. The targets, security personnel, prominent politicians and citizens, were chosen with precision to gain maximum effect. Since the 1980s Intelligent Security has been involved in signal processing for a range of security products from perimeter intrusion detection systems, which at one time were installed at 21 of the UK’s high category prisons, through to today’s Talos Under Car Bomb Detection System and the Heartbeat Detection system. The Talos Undercar detection system development came about in 1988 as the result of the IRA’s attack on a minibus carrying soldiers who had just taken part in the Lisburn Half marathon for charity – six were killed. In late 1989 the Talos system designed to detect the placement of magnetically attached IEDs had under gone trials by the UK’S Defence and Research

Agency and was being installed by the Home Office for at risk personnel. Today with over 11,800 units in service Intelligent Security continues to monitor and develop the Talos system in order to meet new threats. Magnetically attached IEDs are still the most widely used undercar devices as they are selective both in their target identification and placement of the device on a vehicle. However other means are now used occasionally; the bomb may be wedged between the plastic under car tray that is now present on many upmarket cars or perhaps with elastic cord or by some other means. This plastic under car tray in itself renders the magnetically attached

bomb obsolete for those vehicles. The Talos Plus system has solved this problem. The method relies on the changes that occur in the vibrational resonance of the vehicle when the device has been attached. The resonance pattern of the vehicle is recorded by piezo-electric sensors placed at four or more positions on the car. This vibration pattern is processed by a microprocessor and if an anomalous pattern is detected an alarm is indicated.

FOR MORE INFORMATIONTel: (0)844 8268074Fax: (0) 844 [email protected]

Detecting and preventing under-vehicle bombs

Page 104: Counter Terror Business Volume 10

ARINC_CTB_210x297_Nov_2011.pdf 1 08/11/2011 12:01