Security Africa Magazine issue 1

47
African Renaissance? SECURITY AFRICA Security - Fire - Safety THE SECURITY INDUSTRY AND THE AFRICAN RENAISSANCE BIOMETRICS FOR AFRICA: HEALTHCARE AND ELECTORAL REFORM PG. 4 Pg. 19 Pg. 29 SOUTH AFRICA PAVILION AT INTERSEC 2014: PREVIEW

description

Security Africa Magazine the only Security/Fire/Safety publication in Print and digital representing the African Continent

Transcript of Security Africa Magazine issue 1

Page 1: Security Africa Magazine issue 1

African Renaissance?

SECURITYAFRICA

Security - Fire - Safety

THE SECURITY INDUSTRY AND THE AFRICAN RENAISSANCE

BIOMETRICS FOR AFRICA: HEALTHCARE AND ELECTORAL REFORM

PG. 4 Pg. 19 Pg. 29SOUTH AFRICA PAVILION AT INTERSEC 2014: PREVIEW

Page 2: Security Africa Magazine issue 1

THE SINGLE-SOURCE SOLUTION FOR ALL YOUR TRANSMISSION PRODUCTS

Only One Company Can Put All The Pieces Together

No Matter What You Need to Transmit, ComNet has Your Solution with the Industry’s Most Complete Line of Transmission Equipment

Fiber Optic, Wireless or COAX/UTP

› Fiber Optic Audio, Video & Data

› Fiber Optic EthernetManaged Ethernet Switches and Media Converters with or without PoE+

› CopperLine® Extenders Ethernet over UTP/COAX Distance Extenders

› NetWave® Wireless EthernetPoint-to-Point and Point-to-Multipoint

› Free Design Center Application Support

› Pre & Post Sale Technical Support

www.comnet.net

[email protected]

+44 (0)113 307 6400

Intersec | Stand S1-631C | 19 – 21 January 2014 IFSEC Int’l | Stand F825 | 17 - 19 June 2014

Fiber Optic Copper Video Data Audio Wireless Ethernet

Page 3: Security Africa Magazine issue 1

07Bold Communications: Wireless Network Solu-

tion Bold Communications and Kenya Risk come together to deliver a fully equipped alarm monitoring centre.

17AMG: Surveillance Securi-ty Upgrade Amg And Ibam

Systems completes Sharjah Sahara Mall Security upgrade.

23Lumidigm: Biometrics in Vaccine Delivery Systems

Lumidigm announces that its mul-tispectral imaging fingerprint sensors, as part of a solution supplied in part-nership with Fulcrum Biometrics are helping to stop vaccine waste for the millions of Africans not yet vaccinated.

29 Event Preview: Intersec 2014 set for record edition:

Growth driven by burgeoning safety, fire protection and security industries upgrade

32Cem Systems: Access Control

Emerald™ from CEM Systems is the evolution of the traditional access control reader.

41Janus Fire Systems: Gas Turbine Fire Protection

Janus Fire Systems looking at gas turbine fire protection in depth.

36 Hainsworth: Personal Protective Equipment

Featuring Hainsworth® TITAN (PPE) - bringing a new level of fire safety to the firefighter.

04African Renaissance? What are the prospects for the

Security industry in Africa? Security Africa Magazine surveys recent devel-opments in the resurgent economies of the continent.

09Infrastructure: Ethiopia Tuesday, 5 November, 2013

saw the start of the construction of a 20 km road flanking the old city of Harar to Jijiga.

11Infrastructure: Zimbabwe Less than three months after

Robert Mugabe was sworn into office as President, the Zimbabwe Gov-ernment and the China Export and Import Bank signed a US$319 million loan agreement for the expansion of Kariba South hydro power project.

13Conflict Minerals Armed groups earn hundreds of mil-

lions of dollars every year by trading conflict minerals. Gold, tin, tantalum, tungsten (the “3 T’s”), are in great demand. What are the facts?

16Surveillance: After Westgate As investigators

and forensic scientists sift through the rubble of the Westgate mall in Nairo-bi, Kenya, in search of answers to the numerous questions that surround the 21 September 2013 attack, even more questions are starting to emerge.

21Biometrics: Airport Secu-rity Biometric technology is

the new standard in industrial security and access control and is being used the world over in all areas of air travel, says IDtek MD Julian Thorrold.

26Morse Watchman: Key Control Fernando Pires of

Morse Watchmans discusses the future of key control and security in a digital future.

38Oil & Gas: Nigerian Investment News. Probe of Oil

Dealers’ $6.8 Billion Scandal; a country rich in oil supply but heavily reliant on imports? Security Africa investigates.

ContentsInside News Editorial

Page 4: Security Africa Magazine issue 1

SecurityAfrica December 2013 3

INTRODUCTION

Welcome to the inaugural edition of the Security Africa print magazine, partner to our successful online edition. The editorial team at Security Africa is delighted to

bring you this new platform, addressing exciting developments for the Security Industry in the African continent.

As a recent report by the African Development Bank (AfDB) shows, one third of African countries are showing growth rates in their GDP of more than 6%. This is a spectacular figure when one considers that the European Union has only just moved out of recession, with a growth rate 0.3% for the second quarter of 2013.

The AfDB points to other important statistics: the development of an emerging African middle-class and a decline since 2005 in the number of people living below the poverty line from 51% to 39%.

Of course, this does not mean that the region is experiencing no challenges. The African continent is vast, and poor infrastructure continues to hinder progress, although this is starting to change. The most important driver of the new prospects for Africa has been the five-fold increase in foreign investment since 2000. World economies are recognising the

clear economic advantages of being part of the change, with Japan recently pledging $32 billion in development support, including $6.5 billion in support for infrastructure.

These are exciting times indeed. The sheer scale of investment in times of transition points to a clear growth market for the Security Industry. A rapidly changing economy means a requirement for security around logistics, warehousing and transportation; upgrading of airports and seaport security; security for new commercial enterprises and an expanding hi-tech security demand.

We look forward to keeping our readers updated with these and other developments. One thing is certain: the Security sector will be called upon to provide crucial skills, technology and expertise to this changing continent.

Advertising SalesBen [email protected]

Editorial & PrJudith [email protected]

Design & AnalyticsAlex [email protected]

AccountsSue [email protected]

Judith AdeleEditor

Introduction

Page 5: Security Africa Magazine issue 1

4

FEATURE

SecurityAfrica December 2013

What are the prospects for the Security industry in Africa? Security Africa Magazine surveys recent developments in the resurgent economies of the continent to find

that the security and fire industries will have a crucial role to play in growing prosperity.

The International Monetary Fund has projected that during the next five years, 10 of the 20 fastest growing economies will be in Sub-Saharan Africa, and two will be in North Africa. The top five countries globally with the greatest potential for growth are Rwanda, Liberia, Cambodia, Zambia and the Gambia according to Courtier’s annual research based on the Global Competitiveness Index produced by the World Economic Forum.

Of course, the continent as a whole is not without significant problems. There are countries which still score very low on basic requirements and efficiency. The potential is there, but it’s not just the rate of growth but the quality that is important for Africa’s long-term potential to be realised.

The World Bank’s provisional figures showed that higher commodity prices, increasing investment and a general pick-up in the world economy should boost Africa’s growth to more than 5% over the next three years. By comparison, Global GDP was only set to grow by an average of 2.4% this year (2013), and Europe has only moved out of recession in the last quarter.

FEATURE

Judi

th A

dele

Security industry a key player in Africa’s economic Renaissance

Page 6: Security Africa Magazine issue 1

SecurityAfrica December 2013 5

FEATURE

With a projection that 50% of households – 128 million people – will have income to spare on commodities, the potential for the development of consumer-based industries is clear.

As leading World Bank economist Punam Chuhan-Pole states, ‘if properly harnessed to unleash their full potential, these trends hold the promise of more growth, much less poverty, and accelerating shared prosperity for African countries in the foreseeable future’.

With China and India scrambling for business in Kenya and Tanzania, Japan fighting to win contracts for infrastructure projects in South Africa and Ghana wrestling with its new oil wealth, there is no doubt that sub-Saharan Africa is attracting international attention from investors.

As the focus shifts from a traditional dependency on minerals to infrastructure developments and new consumer industries, the key to competitiveness will be security. Escalating political tensions and civil unrest in North African countries and the Middle East demonstrate the importance of the role of the security industry in providing stable investment environments. Investment across Africa will only be fully attractive when sub-Saharan countries are seen to be coping with issues of security, fire and surveillance through the implementation of well-designed products and systems.

The weaknesses in the continent have been spelled out by the IMF and the World Bank: many countries still suffer from unrest. Security issues are particularly important in the oil rich countries of West Africa. In South Africa, labour unrest has been a cause for disruption in the mining industry and the threat of piracy to commerce and to the expanding tourism industry has to be contained if the region is to meet its potential. There is a growing demand for projects that create efficient solutions to Access control, civil ID, surveillance and recognition and verification systems. A key issue for investors is government stability and strong democratic systems. Biometric technology has already been used around the world to counter electoral fraud and this will increasingly be the case for Africa, following on from the successful example of Ghana’s 2012 election.

Page 7: Security Africa Magazine issue 1

6

FEATURE

SecurityAfrica December 2013

McKinsey Global Institute projects that at least four groups of industries – consumer facing, agriculture, resources and infrastructure – together could generate as much as 2.6 trillion dollars in revenue annually by 2020 for the African continent, an increase of 1trillion dollars from 2010. McKinsey stresses that early entry into the continent brings major advantages and opportunities, for example, the ability to create markets, establish brands, shape industry structures, influence customer preferences and establish long-term relationships. With a projection that 50% of households – 128 million people – will have income to spare on commodities, the potential for the development of consumer-based industries is clear. The increased demand for recognition and verification systems and mobile biometrics will be exponential.

But as consumerism develops, so does the requirement to monitor crime in countries where there are still large income inequalities. Angola’s police force is in the process of installing surveillance cameras in its cities to help with public security. The national

police spokesperson has also outlined plans to install cameras at various points along the country’s highways. Projects to tackle the problem of developing the communications infrastructure in Angola will also increase demand for surveillance systems to counter new threats. The surveillance exercise has been started in the capital city of Luanda because of its high population and crime rate. Of Angola’s growing population of over 20 million, one third lives in the capital. While the city continues to bloom with luxury developments a need to demonstrate security will be of paramount importance. The African Renaissance has not only begun economically, but the continent is also about to take a great leap forward technologically, in its race to create solutions to the problems of corruption and crime that have held back the region’s financial and industrial expansion. The Security and Fire industries will play a crucial role in the success of this new chapter in Africa’s development – with profitable new markets emerging along the way. SA

Page 8: Security Africa Magazine issue 1

SecurityAfrica December 2013 7

Kenya Risk Consultants Limited is a leading security solutions specialist providing maritime security, close protection and investigation services throughout East Africa and beyond.

Based on the coast in Mombasa, their expertise is utilised not just for passenger and cargo vessels in a high risk area of the Indian Ocean, but also for blue chip companies, hotels, industrial manufacturers, and the oil and gas sector, across a broad range of security and logistical services.

To deliver and commission a fully equipped alarm monitoring centre, Kenya Risk turned to another security industry expert, Bold Communications. Bold is an independent software development and projects company based in the UK and providing security monitoring solutions in Europe, the Middle East and Africa. Bold solutions may be found in many different types of control rooms - for example, retailers, universities, banks, hospitals, police and military, in addition to commercial alarm and video receiving centres. The scope of monitoring solutions which Bold deliver range from single campus security projects, for example, hospitals, through to many thousands of remote and dispersed sites.

Specialist monitoring expertiseFor the Kenyan project, Bold’s specialist experience working in many different regions was particularly useful when it came to dealing with the challenges raised by the local communications network infrastructure. The well-established PSTN and IP signalling methods commonly used in Europe were not a viable option for the Kenyan market. Bold and Kenya Risk worked together to develop a reliable wireless network solution which has now been deployed for a growing base of commercial, industrial and domestic

users. On alarm activation, signalling through to the alarm receiving centre enables the control room operators to immediately contact keyholders and to mobilize security services where required for an effective response. All incidents are logged, together with false alarms if any, and subscribers can receive emailed reports detailing all activity relating to their site.

Bold Gemini multi-protocol platform Any industry standard alarm panel can be received and handled in Bold Gemini as well as a wide range of CCTV systems, lone worker and access control solutions. Interoperability between the different installed security technologies generates a far more effective response at the management level. This provides for services such alarm verification, identifying “nearest to” resources and validating automated access transactions.

Where custom software development is needed, for example, a proprietary security product is required as a component of an overall project, Bold provides a design and development service. As integration specialists, Bold has significant experience of delivering complex security monitoring solutions, combining event signalling from diverse systems with situational data to generate an effective workflow response. At the control room workstation, event and alarm handling is made clear and simple by the use of a common interface which guides the operator through a series of response tasks.

The monitoring challengeThe greatest challenge in setting up a new control room is to find a platform which works effectively across all relevant product groups, including existing legacy

Bold Gemini monitoring for KenyaRisk

security news

Page 9: Security Africa Magazine issue 1

products as well as new technology as it comes into the market. This is achieved in Gemini by maintaining a comprehensive interface library deployed across a wide and diversified user base. Third party product interface design is based on continuous functionality enhancement and doesn’t just stop at making a connection between disparate technologies. User feedback informs design and development strategy, creating a real partnership rather than a simple customer and supplier relationship.

Also important is the need to identify appropriate methods of signalling and communications is also essential, as well as constantly improving operational efficiency, reducing total ownership costs and, not least, making it all easy to use for the system operator. As the operator is usually the most expensive resource within the control room, intelligent event filtering and automation plays an important role in achieving a return on investment.

Securing the dataAccess to the data in the Gemini system and default user settings are controlled by means of creating custom user profiles. These profiles are used to define exactly what an operator may or may not view and change. With a comprehensive event log and audit trail, all user, signalling and data activity is recorded. Automated system reporting supports full activity supervision enabling a fast response to situations where there may be communications or equipment faults.

Managing riskGemini incorporates consideration of the risks posed by security and safety alerts at every point within its design. The result is a solution which not only allows those risks to be confronted and managed, but to do so in a way which fits the individual needs of the user.

Kenya Risk’s CEO, Niklas B Rogers, commented, “Bold provided a very comprehensive monitoring solution which closely matched our requirements and handled the whole project with great speed and efficiency. The Gemini system does exactly what we need at the moment but importantly it also offers the capability to expand our range of security monitoring services in the future. Our operators are very positive about using the software which is well thought out and easy to use.” SA

About Bold CommunicationsBold Communications is a UK company providing open platform security monitoring solutions. Bold Gemini is widely used in alarm and video receiving centres in the UK, Europe and the Middle East.

The company also specialises in alarm communications products, with a range of PSTN, ISDN, GSM and IP alarm receivers. Bold provides a unique 24/7 technical support service to alarm receiving clients, which include commercial and corporate central stations, universities and colleges, local authorities and NHS institutions.

For additional information, please visit www.boldcommunications.co.uk

About KenyaRiskKenyaRisk offer reliable and effective security solutions, security consultancy services and maritime security solutions in East Africa and beyond. With a firm foundation and experience in Africa, KenyaRisk delivers tailored solutions based on client requirements and regional expertise.

Services include security and logistics consultancy and solutions on land and sea, as well as a variety of related services and anti terrorism training. KenyaRisk has the capabilities to act effectively and decisively when it matters most.

For additional information, please visit www.kenyarisk.com

Useful linksBold Communications Contact

Brian Kelly, MD T: +44 (0) 1925 713224 E: [email protected]

Page 10: Security Africa Magazine issue 1

SecurityAfrica December 2013 9

Tuesday, 5 November, 2013 saw the start of the construction of a 20 km road flanking the old city of Harar to Jijiga. "The contractor has finished all of the preparations and has started the construction

of the road," Samson Wondimu, communication director at the Ethiopian Road Authority, said. "Based on the contract, we expect the completion of the road within two years."

Ethiopian road infrastructure has been experiencing fast growth over the last decades due to huge public investment in the sector. The ERA maintains that expansion in the sector is essential to fuel the fast paced continuous economic growth the nation has achieved for a little less than a decade.

The need for the new 13m-wide road arose from problems seen in transportation within the city, as well as with passing traffic. The existing Harar road is curvy and steep, located 526km from the capital, and experiences traffic jams due to its narrowness and status as the main thoroughfare of the city.

The new road will encircle the ancient city – one of the main tourist destinations in the country and a UNESCO World Heritage site since 2006 – and will, in essence, function as a ring road. The project is part of the ERA's fourth Road Sector Development Programme (RSDP), which aims to boost road coverage across the country.In the performance report the Authority released on 1 November, 2013, road coverage in Ethiopia was said to have reached 85,966 km at the end of the last fiscal year. This shows an increase from the 26,550 km that existed in 1997. Three decades ago the length of roads in Ethiopia was 18,000 km. Asphalt roads in particular rose from 3,708 km to 11,301 km. So far, the ERA has spent 142.1 billion Br in total over the past 16 years ofthe programme.

The project was awarded to Gemshu Beyene Construction Plc – a grade one contractor – for 360 million Br. Enyi Construction had placed a bid against Gemshu for this construction. The consultant for the Ethiopian Roads Authority (ERA) is Core Consulting Engineers Plc.

In line with one of the goals of the ERA during this phase – to raise the participation of local contractors and consultants in federal road projects – both companies involved in this project are local.

Contractors normally have three months from the official start of the project to mobilise resources, such as trucks, before starting construction. Gemshu has finalised all of those preparations already, however, and started the work, according to Gemshu Beyene, the general manager of the contracting company.

The company has previously worked on the 280 km Dire Dawa to Dawale road, Afar gravel road maintenance and the 76.6 km Bima to Matsberi asphalt road in Tigray regional state. Although road projects in the country have often been delayed, the contractor is confident it can complete its task in the agreed time.

"We are currently building an 86km asphalt road from Bima to Feyel Wuha in Tigray regional state, and a 47km road from Mehal Meda to Alem Ketam in Amhara regional state," Gemshu said.

His firm will deliver its latest project on schedule, Gemshu insisted, as it has finished its previous projects on or ahead of time. SA

Ethiopia: new ring road for Harar UNESCO World Heritage site

Elen

i Kal

uINFRASTRUCTURE

Page 11: Security Africa Magazine issue 1

•Designed to fit alongside a variety of third party systemsmeaning you don’t have to replace all your software.

•Contains all the functionality you would expect from a command and control system.

•Monitors incidents and resources efficiently.

•Enables dynamic and attribute based mobilising.

To find out more or arrange ademonstration:

(0) 1455 826 400email: [email protected]: www.3tcsoftware.com

Guardian Command

Looking for a high performanceCommand and Control System witha low lifetime cost?

Next generation mobilising

3tc GuardianComm_SecAfrica advert_Layout 1 20/11/2013 14:36 Page 1

Page 12: Security Africa Magazine issue 1

SecurityAfrica December 2013 11CONTACT [email protected]

27th & 28th February, Lancaster London Hotel

Conference & Exhibition

AfricA Security & counter-terroriSmSummit 2014

Organised by:

New Developments and Technologies in African Security and Counter-Terror

Extensive Networking

Opportunities with Military, Police

and Government Ministries!

AFriCAn SpEAkErS:

cHiLiKA SimfuKWe, Head of INTERPOL Regional Bureau, SARPCCO

Senior rePreSentAtiVe, Financial Intelligence Centre, GHANA

ABioLA ABimBoLA-SuLAimAn, Security Manager, WEST AFRICAN GAS PIPELINE COMPANY LIMITED

nyenK SuBAH, Airport Security Manager, ROBERTS INTERNATIONAL AIRPORT LIBERIA

intErnAtiOnAL SpEAkErS:

rePreSentAtiVe, THE NATIONAL COUNTER TERRORISM SECURITY OFFICE (NACTSO), UK

ricArDo BAron BAretZKy, President, THE EUROPEAN CENTRE FOR INFORMATION POLICY AND SECURITY (ECIPS)

tony SmitH, CBE, Former Director, UK BORDER FORCE

SerGei BoeKe, Research Fellow, THE INTERNATIONAL CENTRE FOR COUNTER-TERRORISM

ALeX VineS, OBE, Research Director, Area Studies and International Law; and Head of Africa Programme, CHATHAM HOUSE

SAmueL LinAreS, Director, INDUSTRIAL CYBERSECURITY CENTRE,

mAHmouD yASSin, Lead Systems & Security Eng, Data Center Group, Information Technology Department, NATIONAL BANK OF ABU DHABI

AnDreW eVrVinG, Former Head of Counter-Terrorism GCHQ

feLiX nKunDABAGenZi, Strategic Analyst, Coordination Unit for Threat Analysis, OCAM

pLuS mAny mOrE tO bE AnnOunCEd:

• Preparing for the Increasing Terror Threat• Military Communications Technology Overview• Cyber Security - The Future threat to

Governments and Military Institutions• African Crime and Security – The Key Issues• Strategies and Technologies for Riot Control

• Securing Cities - On the Ground Scenarios• The Role of the Police in a Democracy and

the Use of Technology in Policing • Border Security: The Case for

International Co-operation• Airport Security Technologies for 2014 and beyond

WHO ATTENDS?• Ministers of Defence

• Ministers of Interior

• Police Officials

• Security Officials

• Armed Forces

• Law enforcement Specialists

• International Specialists

WHY ATTEND:DISCOVER the latest developments and security challenges facing African nations.

LEARN from the key decision makers driving Africa’s Security development.

ENGAGE with your key audience at the exhibition and exclusive networking evening.

Let us know which companies you would like to meet and we will do our best to bring them to the event to introduce them to you

(Business Match Making Service is for event sponsors/exhibitors only)

DePuty miniSter, MINISTRY OF DEFENCE, GHANA

reAr ADmirAL Geoffery BieKro, CHIEF OF NAvAL STAFF, GHANA

iSSAc mAGAGuLA, NATIONAL COMMISSIONER, ROYAL SWAZILAND POLICE

H.e. eDWArD turAy, HIGH COMMISSIONER, SIERRA LEONE HIGH COMMISSION

ABDuLmenAm tunSi, TECHNICAL ATTACHé, LIBYAN MINISTRY OF INTERIOR AFFAIRS

Lt. GenerAL (rtD) nJuKi mWAniKi, FORMER ARMY COMMANDER, KENYAN ARMY

FEAturing OvEr 35 tOp LEvEL SpEAkErS inCLuding:

KEY TOPICS COvERED:

REGISTER NOW TO AVOID DISAPPOINTMENT

Africa S&CT 2014 A4 Ad.indd 1 20/11/2013 09:54

Zimbabwe ‘Looks East’ for Kariba Dam Expansion Less than three months after Robert Mugabe was sworn into office as President, the Zimbabwe Government and the China Export and Import

Bank signed a US$319 million loan agreement for the expansion of Kariba South hydro power project.

“Under this arrangement, the bank will provide funding amounting to US$319.5 million – representing 90 percent of the total project cost – while Government, through the Zimbabwe Power Company, will finance the 10 per cent balance amounting to US$35.4 million,” Minister Chinamasa said. The loan will attract annual interest of 2 per cent and has a repayment period of 20 years.

The project is expected to add 300 megawatts to the national grid, a development set to ease power outages. Zimbabwe produces about 1,200 MW of electricity but peak demand is 2,200 MW.

“This should go a long way in reducing power outages. ... For us the energy deficit has hamstrung the growth of our economy,” Mr Chinamasa said.

With Zanu-PF’s indigenisation law – a policy to acquire 51 per cent ownership of 1,100 foreign-controlled companies operating in the country – two of the largest platinum producers, Anglo American Platinum and Impala Platinum Holdings, have already had to sell majority shares in their local operations.

The deal with China is a continuation of the “Look East” policy Zimbabwe adopted after falling out with Western powers. China was a strong supporter of Zimbabwe’s independence struggle against white minority rule. Finance Minister Patrick Chinamasa signed on behalf of the Government, while China Exim Bank vice president Mr Zhu Hongjie represented the bank.

The two countries strengthened ties after the European Union (EU) and US imposed sanctions on President Robert Mugabe and his inner-circle following Zimbabwe’s 2002 elections. In March, the EU suspended sanctions against 81 officials and eight firms in Zimbabwe. The decision followed peaceful referendum on a new constitution which expands civil liberties in Zimbabwe organised by a coalition government.Speaking through an interpreter, Mr Zhu said the signing of the loan agreement signified a major breakthrough in addressing power shortages in the country.

The loan would be used for such services as engineering, procurement of equipment and actual construction to be done by the winning bidder, a Chinese firm called Sino-Hydro.The firm has an option of sub-constructing building of the two units that would add 300 megawatts to the national grid. SA

Zimbabwe ‘Looks East’ for Kariba Dam expansion Ja

cob

Godd

enINFRASTRUCTURE

Page 13: Security Africa Magazine issue 1

CONTACT [email protected]

27th & 28th February, Lancaster London Hotel

Conference & Exhibition

AfricA Security & counter-terroriSmSummit 2014

Organised by:

New Developments and Technologies in African Security and Counter-Terror

Extensive Networking

Opportunities with Military, Police

and Government Ministries!

AFriCAn SpEAkErS:

cHiLiKA SimfuKWe, Head of INTERPOL Regional Bureau, SARPCCO

Senior rePreSentAtiVe, Financial Intelligence Centre, GHANA

ABioLA ABimBoLA-SuLAimAn, Security Manager, WEST AFRICAN GAS PIPELINE COMPANY LIMITED

nyenK SuBAH, Airport Security Manager, ROBERTS INTERNATIONAL AIRPORT LIBERIA

intErnAtiOnAL SpEAkErS:

rePreSentAtiVe, THE NATIONAL COUNTER TERRORISM SECURITY OFFICE (NACTSO), UK

ricArDo BAron BAretZKy, President, THE EUROPEAN CENTRE FOR INFORMATION POLICY AND SECURITY (ECIPS)

tony SmitH, CBE, Former Director, UK BORDER FORCE

SerGei BoeKe, Research Fellow, THE INTERNATIONAL CENTRE FOR COUNTER-TERRORISM

ALeX VineS, OBE, Research Director, Area Studies and International Law; and Head of Africa Programme, CHATHAM HOUSE

SAmueL LinAreS, Director, INDUSTRIAL CYBERSECURITY CENTRE,

mAHmouD yASSin, Lead Systems & Security Eng, Data Center Group, Information Technology Department, NATIONAL BANK OF ABU DHABI

AnDreW eVrVinG, Former Head of Counter-Terrorism GCHQ

feLiX nKunDABAGenZi, Strategic Analyst, Coordination Unit for Threat Analysis, OCAM

pLuS mAny mOrE tO bE AnnOunCEd:

• Preparing for the Increasing Terror Threat• Military Communications Technology Overview• Cyber Security - The Future threat to

Governments and Military Institutions• African Crime and Security – The Key Issues• Strategies and Technologies for Riot Control

• Securing Cities - On the Ground Scenarios• The Role of the Police in a Democracy and

the Use of Technology in Policing • Border Security: The Case for

International Co-operation• Airport Security Technologies for 2014 and beyond

WHO ATTENDS?• Ministers of Defence

• Ministers of Interior

• Police Officials

• Security Officials

• Armed Forces

• Law enforcement Specialists

• International Specialists

WHY ATTEND:DISCOVER the latest developments and security challenges facing African nations.

LEARN from the key decision makers driving Africa’s Security development.

ENGAGE with your key audience at the exhibition and exclusive networking evening.

Let us know which companies you would like to meet and we will do our best to bring them to the event to introduce them to you

(Business Match Making Service is for event sponsors/exhibitors only)

DePuty miniSter, MINISTRY OF DEFENCE, GHANA

reAr ADmirAL Geoffery BieKro, CHIEF OF NAvAL STAFF, GHANA

iSSAc mAGAGuLA, NATIONAL COMMISSIONER, ROYAL SWAZILAND POLICE

H.e. eDWArD turAy, HIGH COMMISSIONER, SIERRA LEONE HIGH COMMISSION

ABDuLmenAm tunSi, TECHNICAL ATTACHé, LIBYAN MINISTRY OF INTERIOR AFFAIRS

Lt. GenerAL (rtD) nJuKi mWAniKi, FORMER ARMY COMMANDER, KENYAN ARMY

FEAturing OvEr 35 tOp LEvEL SpEAkErS inCLuding:

KEY TOPICS COvERED:

REGISTER NOW TO AVOID DISAPPOINTMENT

Africa S&CT 2014 A4 Ad.indd 1 20/11/2013 09:54

Page 14: Security Africa Magazine issue 1

SecurityAfrica December 2013 13

FEATURE

East Africa: conflict minerals – the race for certification of `clean’ minerals.

Armed groups earn hundreds of millions of dollars every year by trading conflict minerals. Gold, tin, tantalum, tungsten (the “3 T’s”), are mined in eastern Congo and are used in all consumer

electronics products. Government troops and militias fight to control the mines, whilst civilians , men women and children, suffer the consequences of armed conflict. As international awareness of the brutality to workers has grown international companies have wanted assur-ance that their products are using minerals which are conflict/free.

Locals in mining communities are forced to take part in the illicit mining economy. Money earned from the sale of conflict minerals is used for personal profit and to further violent causes and terrorist groups. Minerals are smuggled out of Congo through neighboring countries, then shipped to smelters around the world for refinement. Once minerals are processed in this way, it’s difficult to trace their origin. Conflict minerals easily make their way to the U.S. and all over the world in consumer products.

Large consumer electronics Companies like Apple, Intel and Hewlett-Packard are now carefully monitoring where their minerals come from. In addition a section of the Dodd-Frank Wall Street Reform and Consumer Protection Act requires companies from the Democratic Republic of the Congo to inform the Security and Exchange Commission how they ensure conflict minerals are not being used.

One of the problems with these measures is that some companies take a hands-off approach and instruct suppliers to avoid buying from the Congo area altogether. This may help cut off armed groups but it leaves the mining communities in the Congo behind. Certification processes are a viable solution but a recent report by Enough Project, has stressed the urgency of the race for clean minerals. Enough Project Senior Policy Analyst Sasha Lezhnev said:

“Minerals can be a boon for peace in Congo and the region, not a conflict curse. But if Rwanda, Congo, and regional states do not take urgent steps to complete the mineral certification process in the next few months, multinational companies may stop purchasing many minerals from the region that cannot credibly be certified as conflict-free. ‘

Tremendous strides have been made in recent years to cut the conflict minerals trade in eastern Congo. In the past four years, governments, nonprofits, and private sector actors in Africa, the U.S., and Europe have built regulatory frameworks and stimulated the global market for responsibly sourced minerals.

Additionally, a certification process, under the International Conference on the Great Lakes Region, or ICGLR, was established to ensure that minerals sold and exported from the Great Lakes region do not fund conflicts. Progress on reforming supply chains and demilitarizing mines has addressed many negative elements of the conflict minerals trade, as armed groups are much less present in mines.

The ICGLR certification process requires four components: mine inspection and traceability, a regional mineral tracking database, audits, and

Page 15: Security Africa Magazine issue 1

14

FEATURE

SecurityAfrica December 2013

independent monitoring. The key components of accountability—auditing and independent monitoring—lack operational mechanisms to ensure that minerals are fully certified. Existing “bag and tag” systems, used by tin and tantalum industries sourcing in Rwanda and in some locations in Congo, have been a brave first step but do not provide full conflict-free assurance because of the lack of the independent oversight mechanisms of the ICGLR certification process

Progress in certifying minerals from the Great Lakes region as conflict-free is at a crossroads. States are starting to issue certificates for easy-to-certify mines using ad hoc measures, but interim steps will not work for all mines. Rwanda issued its first conflict-free certificate on November 6, and Congo plans to begin issuing certificates for mines and exporters soon.

Critical gaps in the minerals certification process in eastern Congo, Rwanda, and the surrounding region threaten to undo the development of a clean minerals trade in Central Africa, argues a new Enough Project report released this month. Minerals certification, a key component in building a transparent regional minerals trade, faces setbacks that could hinder global market access for minerals extractors, traders, and exporters in

the Great Lakes region, unless regional governments implement the process. The report, “Coming Clean: A Proposal for Getting Conflict Minerals Certification Back on Track” is based on recent field research in the region.

Enough Project Field Consultant Aaron Hall, said:“Certification is the most critical component of the entire conflict-free minerals system. If minerals from the Great Lakes region cannot be certified as conflict-free, then efforts to trace and audit become moot. Without functioning regional audits or an Independent Mineral Chain Auditor, minerals cannot be credibly certified according to regional and international standards.”

The report calls on the U.S., E.U., and World Bank to focus energies on helping to complete the ICGLR certification process. These measures include setting a deadline for Rwanda, Congo, and the ICGLR to meet the four components of the certification process and formalizing interim measures to certify minerals to meet international standards. If the Great Lakes states fail to meet these standards, they may be deemed non-compliant with international due diligence standards.The report also recommends that the World Bank and/or electronics companies should help digitize the traceability system in Congo, so that data is transparent, and that the U.S. and E.U. should urge Rwanda to publish minerals production data as soon as possible. Finally, the U.S. and E.U. should offer incentives to source fully certified minerals from the region, such as offering a high-level award for companies that help build a clean trade and purchasing clean minerals. SA

If minerals from the Great Lakes region cannot be certified as conflict-free, then efforts to trace and audit become moot.

Judith Adele

Page 16: Security Africa Magazine issue 1

Axis Communications’ AcademyBuilding your strengths in network video

Axis Communications’ Academy - the global learning center for network video

Your customers and your success depend on you having the most up-to-date, comprehen-sive knowledge in the industry. Axis Commu-nications’ Academy makes it easy to stay one step ahead — putting network video know-ledge right at your fingertips.

The Academy gives you a wealth of information to help you build your strengths through every part of your chain — from interactive system design tools, practical “how-to” guides and

specialized webinars to registration for class-room-based training and certification. And it’s available anytime, anywhere, in your language from Axis’ own highly-trained Academy staff.

When your knowledge source is the company that invented network video and continually sets the standard for innovation in the industry, rest assured customers will recognize your expertise — driving more business to your door.

Get the Axis picture. Stay one step ahead.Visit www.axis.com/academy

axis_ad_acad_build_secafrica_a4_en_1311.indd 1 12/11/2013 2:26:42 PM

Page 17: Security Africa Magazine issue 1

16SecurityAfrica December 2013

Axis Communications’ AcademyBuilding your strengths in network video

Axis Communications’ Academy - the global learning center for network video

Your customers and your success depend on you having the most up-to-date, comprehen-sive knowledge in the industry. Axis Commu-nications’ Academy makes it easy to stay one step ahead — putting network video know-ledge right at your fingertips.

The Academy gives you a wealth of information to help you build your strengths through every part of your chain — from interactive system design tools, practical “how-to” guides and

specialized webinars to registration for class-room-based training and certification. And it’s available anytime, anywhere, in your language from Axis’ own highly-trained Academy staff.

When your knowledge source is the company that invented network video and continually sets the standard for innovation in the industry, rest assured customers will recognize your expertise — driving more business to your door.

Get the Axis picture. Stay one step ahead.Visit www.axis.com/academy

axis_ad_acad_build_secafrica_a4_en_1311.indd 1 12/11/2013 2:26:42 PM

After Westgate. How to make the best use of surveillance systems

As investigators and forensic scientists sift through the rubble of the Westgate mall in Nairobi, Kenya, in search of answers to the numerous questions that surround the 21 September 2013

attack, even more questions are starting to emerge. The most important of these is how the four gunmen managed to evade Kenya’s intelligence services, had unlimited access to such an important facility and man-aged to take on the security agencies for four days.

67 people died and hundreds more were injured in the Westgate Mall when 4 armed members of Al-Shabab raided the popular shopping mall in (Nairobi) in September. Philip Smerkovitz, managing director of TeleEye surveillance system emphasised that it is doubtful that security cameras would prevent a well- planned attack such as the one at Westgate but that a remote TeleEye surveillance system would have provided, `Critical intelligence on the description and actions of the terrorists….via live streaming to law enforcements and military units.’

One key question is whether it is best to keep cameras out of the eyes of criminals to lessen problems with vandalism and theft. Latest technologies can offer high resistance housing and toughened poly carbonate covers which lessen the possibility of interference. But discrete surveillance systems have the disadvantage of negating the deterrent effect.

Key to efficient systems is identifying the specific site requirements and deploying the most appropriate

Judi

th A

dele

technology for different areas of the site. It is crucial to ensure that monitors are out of reach of vandals but that their presence is evident. Although decoys can confuse criminals they run the risk of leaving areas unmonitored and as security cameras become more affordable deployment will increase.

Shopping centers use bullet and domed shaped security cameras to keep a watchful eye on the mall. Bullet cameras are easy to see and are used most often in parking lots. Domed shaped security cameras are found within the walkways, stores and the food courts. Domed shaped cameras are not easy to detect unless you look for them. These cameras also make it impossible to tell which way the camera is pointing. Domed shaped cameras feature dark colored glass that prevents the camera being seen.

Cameras with wide angles are used to monitor large areas. The housing on bullet cameras located outdoors is made to withstand severe weather or tampering. Pan, tilt and zoom cameras make it easy for security to change the cameras angle to get a better view of a particular area.

Security experts classify shopping malls as soft targets because you have a large group of people entering and exiting the building through multiple locations. This kind of environment makes it easy for a gunman to enter and exit the building quickly. This also makes the people who are shopping vulnerable and at risk.Since most shopping malls use security guards to constantly monitor their CCTV security cameras, it is important that employees understand how to recognize criminal behavior while monitoring the live video.

After Westgate, the necessity for shopping mall security departments to train and prepare for any kind of emergency, whether shooting, bomb threat or hostage situation is paramount. Surveillance is only one part of the process. The response of outside agencies such as the police and armed forces is of paramount importance but the latest surveillance technology custom designed for their specific location, well trained staff to survey cameras and follow procedures and excellent communication with other agencies should greatly improve the response to any future attack. SA

Judi

th A

dele

security news

Page 18: Security Africa Magazine issue 1

SecurityAfrica December 2013 17

AMG Systems, the British manufacturer of sophisticated Megapixel cameras and CCTV transmission technology, and Systems Integrator IBAM Systems have completed a vastly

enhanced security system within Sharjah’s 250-store Sahara Mall in the UAE.

The new system greatly improves the link speed between receiver and transmitter, making it almost instantaneous after power up. In a high profile shopping facility like Sharjah Sahara Mall, the enhancement of security and surveillance systems plays a key role in maintaining vibrant and expansive operations. AMG’s equipment is built to a high-quality specification; the whole subrack and housing of the products gives the solution a high class visual appearance. Liz George, Project Manager at IBAM Systems, found the new system very simple to install compared to locally available fibre transmitters. She said, “The high level of support we received from the AMG team was unexpected and very welcome. I would personally recommend their support and solutions to other Systems Integrators and for any of our future projects requiring fibre solutions.”

AMG Systems’ collaboration with IBAM Systems has allowed IBAM to significantly expand and upgrade the security and Public Address infrastructure in the

Sahara Mall. In total, there are now 160 cameras throughout the entire complex, 27 of which feature PTZ. For Public Address, the system is divided into multiple zones to provide targeted announcements to different areas. Mustafa Shibu, Sales Manager at IBAM Systems, has been impressed by the capacity of the new infrastructure. He explained, “Areas covered by the new camera systems include parking lots, walkways, and entrances and enable us to ensure the safety of the clients and staff of the 250 stores now housed within the complex.”

Originally set up as a provider of telecom equipment throughout the MEA Region, IBAM has since expanded its operations to cover safety, security, building automation/management systems. The company has executed numerous commercial, healthcare, hospitality, military and residential projects in the UAE.

Leona Hayes, Business Development Manager Middle East, at AMG Group, says, “Our collaboration with IBAM Systems on this large-scale prestigious expansion project went very smoothly. The successful integration of our fibre-based products solidifies the position of IBAM Systems within the region while also increasing exposure of the AMG brand in the important Middle East market.”

AMG and Ibam Systems Completes Sharjah Sahara Mall Security Upgrade AMG Systems’ fiber optic transmission system and receivers form core of new network

security news

Page 19: Security Africa Magazine issue 1

18SecurityAfrica December 2013

About IBAM SystemsIBAM Systems started operation in 1992 supplying telecom equipment in Dubai, before becoming incorporated into a Limited Liability Company as part of an expansion strategy in 2002. Subsequently, IBAM expanded its product portfolio to include voice/data networking products and security systems. Today, the company’s operations include the complete range of safety, security and building automation/management systems. Ibam provides end to end solutions for the Low Voltage (LV) and Extra Low Voltage (ELV) systems. This includes support for design, sales & marketing, installation & commissioning, project management, service and support and training to clients, government departments, oil field companies, hotels, consultants, and various other clients and contractors.

The company’s team of experienced engineers and technicians offers a comprehensive range of services including design support, supply, testing, commissioning, and training. IBAM has executed a number of commercial and residential projects in the UAE.. In addition to the UAE market, IBAM has been supplying equipment to other Middle East and Africa (MEA) countries.

About AMGAMG is a leading global provider of video and communication transmission solutions designed for CCTV surveillance operations in transport, public, government and military sector. AMG also manufactures a range of IP Cameras and NVR Products under the AMG-Panogenics brand. AMG Transmission Solutions offers a full range of transmission technologies including multimode and singlemode video, data and audio fibre optic transmission systems; single & multi-channel unshielded twisted pair (UTP) links for video, data & audio; multi-port Ethernet switches for the transmission of IP based solutions over fibre, and both analogue and digital wireless products for the transmission of video & data. As a result AMG transmission solutions have been successfully implemented in many high profile projects throughout the world. Projects include supplying the transmission system for the UK’s NRTS project and the security and surveillance of the Museum of Islamic Art in Doha, Qatar. AMG Transmission Solutions and AMG-Panogenics are brand names of AMG Systems Ltd.

More information can be found on: www.amgsystems.com

Contact Vibeke Ulmann / Catalyst CommunicationsTel: +44 (0) 845 226 3036 Mob: +44 (0) 7717 866 194 Email: [email protected]

security news

Page 20: Security Africa Magazine issue 1

SecurityAfrica December 2013 19

Biometric authentication forms a key sector in the security industry, with a crucial role to play in ensuring that commercial installations of all kinds – company premises, airports and ports –

remain secure. These functions are an important part of the African security market, but biometrics has other applications that are central to specific problems of development faced across the continent.

Africa is the second largest continent in the world, with huge natural resources. Despite unprecedented growth in the last decade, underdevelopment still hinders many countries, with poor healthcare widely recognised as an enduring problem. Catholic Health Services (CHS) of Namibia have implemented a biometric software solution developed by M2SYS Technology called Bio-SnapON™ to address problems associated with improving healthcare in regions where identifying and tracking patients can be a challenge. The award-winning firm, M2SYS, has developed a wide range of biometric software solutions and biometric readers for identity management.

In CHS’s enrollment process, patients scanned their finger on a fingerprint reader to give a print that would be used for future identification. Patients were asked for additional information, such as a digital picture, driver’s license, and contact details. Once enrolled, this information could be retrieved with a single fingerprint scan. Cases exist where the incorrect substitution of a single letter in a patient’s name has led to confusion and even mistreatment. In tightening up procedures around patient identification, advances in biometric authentication are making a clear contribution to the battle against disease in Africa, creating efficiencies and saving lives.

However, healthcare is only one area in which improvements must be made to boost Africa’s prospects for economic renaissance. Biometrics has been applied in another vital area of the continent’s development –

electoral reform and democratic participation. Economic stability in Africa requires political stability, but in much of the region trust in democracy is still being established. It is still common for defeated parties in Africa to contest the results of elections, with claims of electoral fraud and vote-rigging sometimes leading to violence.

Biometric authentication technology has been recognised as crucial to creating an open and transparent electoral system, reducing political upheaval and fostering trust in the deomcratic process. Already the Electoral Commission have introduced biometric technology to assist elections in Sierra Leone, DRC, Nigeria, Zambia, Malawi, Rwanda, Senegal, Somaliland and Ghana. And despite criticisms, it looks as if other countries will follow. Biometric smart ID cards, worth 40 million US dollars, are being issued by the government of Mauritius to everyone over the age of 18.

The 2012 election in Ghana has been widely heralded as a success, with biometric authentication playing a crucial role. A Biometric Voter Registration (BVR) system was successfully installed as well as Biometric Verification of Voters (BVV) in the 26,000 polling stations across the country, making it possible to identify 13 million voters over two days of polling. Adam Vrankulj, editor of Biometricupdate.com, states that this is a record identification figure, with India holding the previous record for verifying around 3.5 million people. The biometric electoral systems are estimated to have cost approximately 263 million Ghana Cedis ($146 million). Haruna Iddrisu, Ghana’s Minister of Communication, has approved the experiment with BVR and BVV, stating that he is confident the technology will be a central part of the country’s electoral system for the future. SA

Biometrics for Africa – healthcare and electoral reform

BIOMETRICS

Page 21: Security Africa Magazine issue 1

FC_Series S EN 210x297.indd 1 22/11/13 14:40

Page 22: Security Africa Magazine issue 1

SecurityAfrica December 2013 21

Biometric technology improves airport security

Biometric technology is the new standard in industrial security and access control and is being used the world over in all areas of air travel, says IDtek MD Julian Thorrold.

Earlier this year, electronic risk management technology solution provider, IDtek, completed the installation of a fingerprint biometric technology system at OR Tambo International Airport.

“The biometric technology will enforce security and increase physical access control reliability, while minimising personnel access to restricted working areas of the airport,” Thorrold comments.

IDtek was awarded a contract by Airports Company South Africa to install the biometric finger- print technology in the Air Traffic Navigation Control Department at OR Tambo.

“Fingerprint technology has been around for many years, making it the most advanced technology available. It outshines other biometric technologies, including iris scanning, voice recog- nition, two-dimensional or three- dimensional face recognition, hand size, vein scan and signature identification. Fingerprint technology is also the only biometric technology that provides a low enough cost point,” states Thorrold.

A biometrical fingerprint device can handle up to 48 000 fingerprints. The device verifies the identity of an employee in a system secured beside the access point or door.

The installation of the biometric technology at the Johannesburg airport is designed to enhance safety and secure the access of 600 employees. The system also follows aviation security mandates set by the International Civil Aviation Organisation (ICAO).“The ICAO imposes the same standards on airports in developing countries in Africa where there isn’t always the financial means to ensure compliance,” says Thorrold.

The escalation of international terrorism has led to the global tightening of airport security, particularly by controlling and monitoring the movement of airport staff, travellers and visitors, a report by Hightech Security Solutions reveals.

This has led to international bodies establishing protocols and efficient security standards procedures at international airports. Thorrold states, “The main players who have been instrumental in rapidly advancing biometrics standards over the past two years include the US and Canadian governments, with the September 11, 2001 terrorist attacks playing a significant role.”

The biometric technology systems installed by IDtek at OR Tambo were first introduced at Roissy Charles de Gaulle Airport and at Orly Airport, in Paris, in 2003. Sagem Morpho, which manufactured the systems, was later commissioned by the French government to install a voluntary biometric passenger identification system that is designed to ensure that the same passenger who checks in luggage is the same person who boards the aircraft.

Sagem Morpho’s biometric technology security systems have been applied in both governmental and business institutions. In the local security sector, Sagem has provided biometrical identification systems to the South African Police Service and the Department of Social Development, while IDtek has installed the technology at Nationwide’s head office in Rivonia. SA

BIOMETRICS

Page 23: Security Africa Magazine issue 1

www.airlive.com

Page 24: Security Africa Magazine issue 1

SecurityAfrica December 2013 23

Lumidigm today announced that its multispectral imaging fingerprint sensors, as part of a solution supplied in partnership with Fulcrum Biometrics (San Antonio, Texas), are helping to stop vaccine

waste for the millions of Africans who have not yet been vaccinated.

Until now, the vaccine delivery system has been hampered by ineffective tracking and reporting and, consequently, millions of young children are not being vaccinated and an estimated 2.5m born this year will die before the age of five. The delivery model in many parts of Africa depends on a multitude of healthcare workers who serve very large and remote areas. When there are no vaccination records to consult, many patients are re-immunised unnecessarily, others are simply missed and a finite supply of vaccine is wasted.

Unfortunately, without a proper and reliable means of identification, vaccine wastage rates are higher than 50 per cent in some of the most challenging geographies. VaxTrac is solving this problem with a biometric vaccination registry that is operated and managed in the field with low-cost mobile devices. Adult and child patients are identified in the registry with fingerprint sensors from Lumidigm. Returning patients can pull up their vaccination records with the touch of a finger allowing the healthcare worker to deliver appropriate care.

“With our VaxTrac system leveraging Lumidigm fingerprint sensors, we have been able to improve immunisation tracking which allows us to reduce waste so that we can vaccinate more people and save lives,” asserts Mark Thomas, executive director of VaxTrac, a non-profit organisation supported by The Bill and Melinda Gates Foundation, among others. “We started evaluating Lumidigm sensors in 2012.

Since the skin of children, especially young children, can be very malleable, we knew from experience that conventional biometric technologies that need a finger pressed against the device do not work. The ability that Lumidigm offers to pull fingerprint images from deeper layers produces images less susceptible to distortion and allows us to track vaccinations accurately.”

Multispectral imaging is a sophisticated technology specifically developed to overcome the fingerprint capture problems that conventional imaging systems have in less-than-ideal conditions. This more effective technology is based on the use of multiple spectrums of light and advanced optical techniques to extract unique fingerprint characteristics from both the surface and subsurface of the skin. That subsurface capability is important because the fingerprint ridges seen on the surface of the finger have their foundation beneath the surface of the skin, in the capillary beds and other sub-dermal structures.

Biometrics in Healthcare

BIOMETRICS

Page 25: Security Africa Magazine issue 1

24SecurityAfrica December 2013

SA

About VaxTracVaxTrac’s mission is to provide developing countries with the technologies and services they need to maximise the effectiveness of their vaccination programmes. VaxTrac envisions a world where every child, regardless of background, has equal access to life-saving vaccines.

About LumidigmLumidigm Inc., a global leader in authentication solutions is dedicated to enabling convenient, secure, and reliable identification of people, products and credentials. Developed with “real world” performance as a priority, Lumidigm’s multispectral imaging technology, innovative software and biometric fingerprint sensors allow customers to know “who” or “what” to a high degree of certainty. Lumidigm and its strategic partners have met challenging authentication requirements in markets such as banking, healthcare, entertainment, and government services. The Lumidigm Advantage is also suitable for industrial, commercial, and transportation applications. Lumidigm is headquartered in Albuquerque, New Mexico.

“Being able to quickly read every patient’s fingerprints, no matter how problematic, in all types of conditions, from extremely dry to wet, is vital to this program,” emphasises Bill Spence, Lumidigm vice president of sales-North America, Europe and Australia. “Biometric authentication has reduced the waste of vaccine dramatically, helping so many more people get vaccinated.”

The biometric vaccine registry also enables real-time reporting for streamlined supply-chain management, further reducing waste.

The first in-country deployment of the Lumidigm fingerprint sensors was in March, 2013. The units are now in Kenya, Uganda and Benin with the largest deployment in 40 clinics throughout Zambia.

Community healthcare workers are trained to use the biometric vaccine delivery system. The simple, user-friendly system was especially developed for workers with limited literacy. With the biometric VaxTrac system, expensive, specialised training is not necessary for vaccine delivery in remote areas.

“My favourite part is to see the shock on healthcare workers’ faces after their first scan of another person’s fingerprint,” Thomas adds. “The patient is identified instantly and all their vaccination information is available on the computer screen in an intuitive graphic interface. Workers know immediately what vaccines to administer and which doses are not needed and may be reserved for other citizens.” SA

BIOMETRICS

Page 26: Security Africa Magazine issue 1
Page 27: Security Africa Magazine issue 1

26SecurityAfrica December 2013

Entering the digitalFernando Pires of Morse Watchmans discusses the future of key control and security in a digital future.

At one time, keys were kept in boxes or drawers with little to no control over who had access to any given key. Even as security systems entered the digital, and then the networked world,

key control continued to exist separately from other system components and business operations. But as key control is one of the main components of effective access control and overall risk mitigation, it is essential for it to be part of an integrated system. Fortunately, technology developments and new products have made it possible to integrate key control as part of a facility’s networked security system.

Key management systems can reinforce access control policies that are already in place and can also help to reduce the costs that are associated with lost keys or unmanaged access. It’s also important to know that it is never too late – or too early – to implement a key control and management plan as part of an overall physical security strategy.

Key control is especially important for end-user markets such as casinos and gaming, correctional facilities, healthcare institutions, hospitality businesses, multi-family buildings and educational facilities. It is also a critical function for anyone overseeing security at conference centers, government agencies, control rooms, automotive businesses and corporate buildings. These users always need

FEATURE

Page 28: Security Africa Magazine issue 1

SecurityAfrica December 2013 27

FEATURE

to know who has possession of a key and when it was taken. They are markets that have in common a need for complete control over their keys, with a system that seamlessly manages and monitors keys and that interoperates with access control and other security systems. However, key control can and should also be applied to all businesses, at any size, because of the measurable benefits of enhanced security, convenience, increased staff productivity and accountability.

Today, the most advanced key management solutions have open protocols to enable connectivity to access control and other systems provided by a range of integration partners. A system can be connected to edge devices via RS-0232 or networked via Ethernet. Critical information about key control can now be communicated across multiple systems, enabling additional security actions to be taken. For example, a user who has taken a specific key can be denied egress from the facility until the key is returned – and selected management can be alerted via email if a key has notbeen returned on time.

A key control system with programmable software can enable system managers to establish permission levels for each user, as identified by an assignable PIN

(Personal Identification Number) code that the user enters on a keypad, with additional access options such as biometric readers available to add another level of security. Managers can monitor data from any desktop connected to the network. Advanced software can run activity reports, sort activities based on various criteria, view and print reports, etc. System managers can generate practical management reports, which trace key movements by time, date and user code, with audit trail reports to indicate the time and date of each key accessed by a user for a given time parameter.

Physical changes in a facility may also increase the need for a key control system. For instance, a closet that may have once been used only for storing office supplies may now be used for holding more valuable items and should be locked. In some cases, convenience for the security staff can even be substantially increased. For example, changes implemented over the LAN are effective immediately which can help prevent incidents such as denying access to keys to recently terminated employees. The network connectivity of the system also allows management to remotely release any key, adding to the convenience and inherent safety provided by a key control and management solution.

Building on their widespread use and popularity as a security management tool, key control systems’ functionality has been expanded to include custom

Page 29: Security Africa Magazine issue 1

28

FEATURE

SecurityAfrica December 2013

All these advanced capabilities can revolutionize the function of key control, transforming it from its historical role as a separate function into its rightful place as a critical component of a cutting-edge security system.

modules and lockers that can accommodate plastic card keys or other valuable items. Lockers, available in various configurations, can be used for storing credit cards, small firearms, cell phones, two-way radios, laptop computers, tablets, cash trays and so on, and can be managed as efficiently as keys in key control systems.

Locker modules can easily be incorporated into existing key control systems or configured as stand-alone asset management systems. Their operation is identical to a key management system in that only pre-authorized users can access items in the lockers. Items can be

returned to any open locker for convenience, and systems can be set up as a personal storage space for one or multiple users. The systems are also engineered to alert security management in case of an incident. An open door, the use of force to gain access, a power failure or even the misuse of the keypad will trigger an alarm and record the event in the log file.

Both key control and asset management systems can be customized with features that help the organization maintain the highest levels of security within their specific industry. To that end, additional security features are available to help maintain the integrity of the system. For example, where protection of the key and asset cabinet itself is mission-critical, installation of a remote access device provides an additional layer of protection by enabling the locker system to be placed in a secure room. A second individual’s PIN input and verification is then required in order for an authorized employee to access the contents of a locker. Many of these features are vital contributors to the maintenance of compliance standards for state or federal regulations as well.

All these advanced capabilities can revolutionize the function of key control, transforming it from its historical role as a separate function into its rightful place as a critical component of a cutting-edge security system. SA

Page 30: Security Africa Magazine issue 1

SecurityAfrica December 2013 29

Intersec 2014 set for record edition:growth driven by burgeoning safety, fire protection and security industries upgrade

AXIS Communications, Samsung Techwin and Tyco International* along with 150 exhibitors making their regional debut.

According to Ahmed Pauwels, CEO of Epoc Messe Frankfurt, the continued success of Intersec is being driven by the rapid development of the safety and security industry regionally. “Across the Middle East authorities are improving security infrastructure, enhancing policing and crime fighting capability and concentrating on maintaining a peaceful environment. Furthermore, with the renewed vigour in the construction sector and an increase in projects at finishing stage, demand within the private sector also continues to rise. This all makes the region a high-priority market for international manufacturers and suppliers.”

“Intersec continues to work closely with local authorities and regional players to better reflect the needs of the region onto the international stage,” Pauwels added.

Intersec 2013 featured products and services from 990 exhibitors spread out over 39,000 sqm across ten halls of the Dubai International Convention and Exhibition Centre. The event attracted 21,549 trade visitors, buyers and industry professionals from as many as 116 countries, making it the most international trade event of its kind in the world.

Safety, fire protection and security remain high on the priority lists of governments and corporate companies worldwide given the current uncertain scenario in many parts of the world. The Middle

East region, replete with its crucial reserves of oil and natural gas, and boasting some of the fastest growing economies within its ranks, is being viewed as a vitally important part of the world by the global safety, security and fire protection industries.

This emphasis on greater security is felt in many ways including growing expenditure on security infrastructure, equipment and personnel by regional authorities as well as an increasing awareness in society about the importance of maintaining a safe and secure environment.

Given all this, it’s not really surprising that Epoc Messe Frankfurt, organiser of Intersec, the region’s safety, security, fire protection and policing trade and networking exhibition, is expecting the 2014 edition to be the biggest yet.

With over 80% of exhibition space already sold out, Intersec 2014 looks set to break all previous records in terms of both participation and attendance. Already all of the world’s ten largest security companies have confirmed attendance, including Honeywell Security, Bosch Security Systems, ASSA ABLOY, FLIR Systems,

PREVIEW: INTERSEC

Page 31: Security Africa Magazine issue 1

30SecurityAfrica December 2013

As with previous years, Intersec 2014 will comprise of four main focus areas: Commercial Security & Information Security; Safety & Health; Fire & Rescue and Homeland Security & Policing.

The Commercial & Information Security section includes control & surveillance equipment, access control, monitoring & recording systems, and information security. This is the largest product section of the exhibition and features key names such as Assa Abloy, Axis, Bosch, CP Plus, Harco and Honeywell Security.

The Fire & Rescue section, the fastest growing segment, covers products and services within fire prevention & protection, firefighting equipment, emergency alarm & warning systems and rescue equipment. Within the Fire & Rescue section prominent companies including Bristol/Corodex, Draeger, DuPont, Naffco, Sffeco, Siemens and Underwriter Laboratories will be participating.

Safety & Health includes Personal Protection Equipment (PPE), environmental protection at work, safety at work equipment and health at work. This section regularly features key industry names including Ansell, Karam Safety and Safetix.

Homeland Security & Policing focuses on armour protection, perimeter security, forensic science and laboratory equipment, physical security, detection and disposal equipment, optics, electronics, as well as specialised training and consulting for government entities. This area is of particular interest to governmental agencies and includes Dubai Police, UAE Civil Defence as well as private companies such as Al Fajer, Gatekeeper Security, Macneille, Madoors Systems, Nedaa and Streit Group.

On the sidelines of Intersec 2014 will be a full complement of fringe events and features including the popular Intersec conference programme and the outdoor demo area. Intersec is part of Messe Frankfurt’s global network of security trade fairs, which also include Secutech India, Secutech in Taiwan, Secutech Thailand, Intersec Buenos Aires, Secutech Vietnam and Seguriexpo Buenos Aires.

*a&s 2012 Security Industry Report

Intersec has played a major role in the last 15 years in reflecting the security industry worldwide. The exhibition and conference combines a strong international profile, with a huge regional impact. Intersec 2013 featured 21,549 trade visitors and showcased the latest technologies and apparatus in Commercial Security & Information Security, Aviation, Homeland Security & Policing, Fire & Rescue and Safety & Health.

The next edition of Intersec will take place from 19 – 21 January 2014, at the Dubai International Convention and Exhibition Centre.

Messe Frankfurt is one of the world’s leading trade show organisers, with 536.9 million euros in sales and 1,833 active employees worldwide. The Messe Frankfurt Group has a global network of 28 subsidiaries and approx. 50 international Sales Partners, giving it a presence for its customers in more than 150 countries. Events “made by Messe Frankfurt” take place at more than 30 locations around the globe. In 2012, Messe Frankfurt organised 109 trade fairs, of which more than half took place outside Germany. The portfolio of events for Epoc Messe Frankfurt in Dubai includes Automechanika Dubai, Beautyworld Middle East, Hardware+Tools Middle East, Intersec, Light Middle East, Materials Handling Middle East, Paperworld Middle East and Playworld Middle East. SA

Show profile

Company profile

PREVIEW: INTERSEC

Page 32: Security Africa Magazine issue 1

Pre-register your visit online before 15th January 2014 and have the chance to WIN a GoPro Hero3 camera. www.intersecexpo.com/ad3

Scan & discover the products

As a vital part of Intersec, Commercial Security & Information Security is the show’s largest section, with 550+ of more than 1000 total exhibitors!

January 19 – 21, 2014

Dubai, UAE

www.intersecexpo.comIM

PORTANT

MOST

MOST

RELE

VANT

MOST

IMPACTFUL

GROWIN

G

FASTEST

Online registration also gives you access to the new Business Matchmaking Program, where you can find the exhibitors that matter to your business to contact them and schedule meetings before the show.

Page 33: Security Africa Magazine issue 1

32SecurityAfrica December 2013

Pre-register your visit online before 15th January 2014 and have the chance to WIN a GoPro Hero3 camera. www.intersecexpo.com/ad3

Scan & discover the products

As a vital part of Intersec, Commercial Security & Information Security is the show’s largest section, with 550+ of more than 1000 total exhibitors!

January 19 – 21, 2014

Dubai, UAE

www.intersecexpo.com

IMPORTANT

MOST

MOST

RELE

VANT

MOST

IMPACTFUL

GROWIN

G

FASTEST

Online registration also gives you access to the new Business Matchmaking Program, where you can find the exhibitors that matter to your business to contact them and schedule meetings before the show.

Security intelligence at the edge

Emerald™ from CEM Systems is the evolution of the traditional access control reader. With its sophisticated design and innovative LCD touch screen, emerald offers advanced access

control reader functionality, integrated Voice over IP (VoIP) Intercom and a range of remote server based applications. With all this functionality built into one powerful device, emerald is more than a reader… it is an Intelligent Access Terminal, available for any site that requires the highest level of security and increased business efficiency.

What makes emerald unique?As the next generation of CEM Systems Ethernet edge devices, emerald is revolutionising the security industry. Its unique features include:

> Custom LCD touch screen A bright, 4.3” LCD touch sensitive screen with hardened glass, that displays predefined messages and icons to cardholders depending on their privileges. With hardened glass and an anti-glare coating, it is durable enough to be used both indoors and outdoors and is IP 65 rated.

> IP reader & controllerWith advanced IP reader and controller functionality in one device, emerald communicates directly to the AC2000 host server using Ethernet connectivity, removing the need for an additional controller in the system design. The terminal has a large internal database enabling it to operate in offline mode should communications be temporarily lost with the host server.

TECHNOLOGY

Page 34: Security Africa Magazine issue 1

SecurityAfrica December 2013 33

> Integrated VoIP intercom Utilising an in-built weather resistant microphone and speaker, emerald provides fully integrated audio intercom functionality at the door, enabling two-way communication between users and security personnel.

> Remote Applications Remote Applications are web based applications and services hosted on the AC2000 central database server and accessed directly at the door. They display critical system information and also allow maintenance engineers to diagnose and test locally.

> Access with emerald Remote Applications Remote Applications access data that resides on the CEM AC2000 database, acting as a security intelligence point available to users assigned to a specific remote applications group. It is important to note that only those with the correct access can use the Remote Applications. To heighten security the user should swipe their card and enter a unique PIN before gaining access. Remote Applications display real time security information and statistics such as card status, scheduled visitors, top system alarms and most recent alarms on the terminal. Additional applications include ‘First and Last Swipes’, that can be used for time and attendance purposes, ‘Card Details’, for individuals to determine such things as card expiry date, and ‘Change PIN’, that allows users to proactively change their own PIN without contacting the system operator. The user must first enter their old PIN before they can change to a new PIN.

Central Bank of Nigeria secured by CEM SystemsCentral Bank of Nigeria (CBN) uses the CEM AC2000 SE (Standard Edition) access control and security management system to secure its premises across Nigeria. The systems have been supplied by CEM Approved Reseller Pentagon Distribution. The Central Bank of Nigeria (CBN) is charged by the Federal Republic of Nigeria with the overall control and administration of the monetary and financial sector

policies of the Federal Government.

“CEM AC2000 SE was chosen because it is a powerful and fully integrated security management system, offering powerful access control, alarm processing, photo badging, power management and integration to third party systems” said Edward Van Trotsenburg Export Manager, Pentagon . “CEM are also able to provide fully integrated biometric solutions with the S610f fingerprint reader. This means that CBN can efficiently increase security levels at required areas.”

AC2000 SE provides an advanced level of integration using industry standard interfaces to link to third party systems. CBN required the AC2000 system to integrate with Bosch video interface in order to control both video and access via one solution.

CEM intelligent hardware is also used throughout CBN. This includes S610e readers giving the site full off-line validation and decision making at point of entry even when host communication is not available. S3030 portable readers were also deployed for mobile security and random security checks within the building. SA

Contact detailsTel: +44 (0) 28 9045 6767Email: [email protected] www.cemsys.com

TECHNOLOGY

Page 35: Security Africa Magazine issue 1

34SecurityAfrica December 2013

Fire and SafetyA warm welcome to our Launch Print edition of Security Africa Magazine, which will include a regular Fire & Safety section in the final third of the magazine. We welcome editorials from fire experts and leading industry figures for future additions covering such topics as:

> Fire safety> Oil & Gas news> Passive and active fire protection> Detection & alarms> Firefighting methods, vehicles & equipment> Fire engineering> Personal protection equipment> Fire suppression technology> Industry experts’ case studies

In this edition we will be covering fire safety equipment, courtesy of Hainsworth Ltd, reporting on the latest developments in the Nigerian oil & gas scandal and highlighting gas turbine fire protection with an editorial from Janus Fire.

FIRE news

Page 36: Security Africa Magazine issue 1
Page 37: Security Africa Magazine issue 1

36SecurityAfrica December 2013

Janus Fire Systems: Gas Turbine Fire Protection

Combustion Turbines used for power generation typically contain five separate areas requiring fire protection: Accessory Compartment, Elec-trical Control and Switchgear Areas, Fuel Pump

or metering Cubicle, Turbine Compartment, and Generator. Protection of the Accessory Compartment, Electrical Control and Switchgear Areas, and the Fuel Pump/ metering skids each present unique character-istics of protection.

For the turbine compartment, the most common fire risk is a failure of the fuel system or leakage of the lubrication oil. The turbine casing reaches very high temperatures larger machines with heavier casings cool slowly when shut down. The auto-ignition temperature for fuel oil is approximately 494°F and approximately 700°F for lubricating oil, while the external temperatures of the casing or combustion chamber reach 850°F–900°F, well above auto-ignition temperatures of fuel or lubricating oils. Should the fuel or lubricating oil come in contact with hot surfaces it can ignite. Often unattended or not accessible to traditional fire fighting methods, fixed special hazard systems are the most logical method to effect total extinguishment.

Cool down timeA significant consideration in gas turbine protection is the time duration for exposed hot surfaces to cool below the ignition temperature of the fuel. The actual temperatures attained and the cool down time depend upon operating conditions. Greater loads or output, result in higher gas temperatures driving the load. Therefore, maximum surface temperatures are developed when operating at maximum load with high ambient air temperatures.

Emergency shutdown for fire extinguishing requires an immediate fuel cut off after the load is removed so that the turbine slows quickly reducing airflow through the machine. Under emergency shutdown conditions, there is no time for internal cooling, thus the exposed surfaces will not cool as quickly. Testing has determined that the cooling effect provided by carbon dioxide during suppression is minimal; maintenance of CO-2 concentration reduces the chance of re-ignition.

Carbon dioxideCarbon dioxide has been an accepted method of combustion turbine fire protection of gas turbines for over 50 years. For over 30 years, members of staff at Janus Fire Systems have worked with major manufacturers of Combustion Turbines. Turbine manufacturers have chosen carbon dioxide as their first line of defense due to its reasonable cost, excellent performance and global availability.

Environmental and safety concernsCarbon dioxide has a net zero effect on global warming because the amount of carbon dioxide discharged is equal to the amount removed from the atmosphere during the manufacturing process. Low and High Pressure CO2 systems can be upgraded to NFPA 12 2011 guidelines improving the safety of operators and maintenance staff. As units are upgraded fire protection systems should not be ignored. Improvements in system designs can help insure reliability, safety as well as insuring unit availability for quick start-ups. With over 90 years of collective experience in protecting gas turbines, the staff at Janus Fire Systems can provide solutions for Combustion Turbine Fire Protection. SA

FIRE news

Page 38: Security Africa Magazine issue 1

1102 Rupcich Drive, Crown Point, IN 46307 • +1 219-663-1600 • www.janusfiresystems.com

Engineered Fire Protection Solutions

Clean Agent Fire Extinguishing Systems • 3M™ Novec™ 1230 Fire Protection Fluid • Lo

w Pre

ssure

and

Hig

h Pressure C

O2 • Alarm

& Detection • Air Sampling Detection • Water Mist •

Foam

500 psi NOVEC 1230

Improved Flow Characteristics

Call for Information

Page 39: Security Africa Magazine issue 1

38SecurityAfrica December 2013

1102 Rupcich Drive, Crown Point, IN 46307 • +1 219-663-1600 • www.janusfiresystems.com

Engineered Fire Protection Solutions

Clean Agent Fire Extinguishing Systems • 3M™ Novec™ 1230 Fire Protection Fluid • Lo

w Pre

ssure

and

Hig

h Pressure C

O2 • Alarm

& Detection • Air Sampling Detection • Water Mist •

Foam

500 psi NOVEC 1230

Improved Flow Characteristics

Call for Information

The House of Representatives has ordered an immediate investigation into a multibillion dollar scheme used by the Nigerian National Petroleum Corporation NNPC, in connivance with Swiss oil

dealers, to take nearly $7 billion from Nigeria in alleged fraudulent payments.

Although Nigeria is the leading crude oil producer of the continent, life expectancy and school attendance for the 173 million citizens of this West African state is nevertheless below the average for South Saharan countries. The lack of its own refining capacity forces crude oil-rich Nigeria to import gasoline, kerosene and heating oil. This paradoxical import business is heavily subsidised.

The resolution followed a motion by Abiodun Abudu-Balogun, who drew attention to a Berne Declaration report, a Swiss non-governmental advocacy organisation, released on 4 November, 2013, detailing how the NNPC and the Swiss oil trading companies allegedly duped the country of over $6.8 billion.The report details the various methods employed by Nigerian and foreign fuel importers, such as creating offshore subsidiaries referred to as “letterbox companies”, ship-to-ship transfer to create untraceable paperwork, payment of subsidy money to phantom and non-existing importers, and partnering with politically

exposed fraudsters to defraud the country from 2009 and 2011.

The Berne Declaration has described the Nigerian oil scam as the greatest fraud Africa has ever known, and the report specifically listed Vitol and Trafigura Commodity Trading Firms (NNPC partners) in the shady deals, saying Nigeria loses billions of dollars as large volumes of oil are exported far below the market prices. Through NNPC partnership with Vitol (the largest oil trader in Switzerland) and Trafigura (the third largest), described as “operational and financial black boxes”, billions of naira that should have accrued to the government are wired to Bermuda where the joint venture is established.

“(We are) worried by the sharp practices and deals in NNPC crude oil allocations to local refineries, which are not utilized, but sold fraudulently at knock-down prices to Geneva-based companies through letter box companies by SWAP arrangements,” Abiodun Abudu-Balogun said.

The profit generated by these entities escapes State coffers, first, because no taxation in Bermuda is paid, since the tax on profits is zero. Vitol and Trafigura alone took respectively 13.44 per cent and 13.49 per cent of Nigerian crude oil exports in 2011 for a cumulative

Nigeria: probe of oil dealers’ $6.8 billion scandal

Mike Rock

AFRICA NEWS

Page 40: Security Africa Magazine issue 1

SecurityAfrica December 2013 39

value of 6.7 billion dollars.

The Berne Declaration notes that more than half of Nigerian crude oil exports pass through Switzerland and that Nigeria is the only major producing company that sells 100 per cent of its crude oil to private traders, rather than marketing it itself and benefiting from the resulting added value.

The Nigerian House of Representatives said that it was “alarmed” by the report and would expect an investigation to be concluded within four weeks. The House committees on petroleum (upstream), petroleum (downstream) and justice are to carry out the probe and report to the House within the stated four-week period.The House of Representatives has carried out repeated investigations into the activities of the NNPC in the past, with most of the outcomes either left unimplemented by the president, or enmeshed in allegation of inducement of some lawmakers. The most outstanding of the House inquiries was the investigation into how the NNPC and other organs of the ministry of petroleum allowed a multibillion fuel subsidy scam to fester for years, draining Nigeria of more than 2 trillion naira.In the House report in 2012, the Minister of Petroleum, Diezani Alison-Madueke, was indicted alongside top officials of the NNPC. The House recommended their removal and prosecution.

The officials have remained untouched at their posts, even after a follow-up investigation ordered by President Goodluck Jonathan failed to exonerate them of complicity in the extensive fraud.

The NNPC issued a denial on Sunday of the new report’s findings, calling it “bogus, and containing inaccurate and poorly researched data, which defied common

sense and verifiable evidence on the ground in Nigeria”.“For instance, how can close observers of the Nigerian oil and gas industry say that the process leading to the award of Term Contract for lifting of Nigeria’s crude is shrouded in mystery?” Tumini Green, the Acting Group General Manager (public affairs) of NNPC said at a news conference on Sunday, according to the News Agency of Nigeria.

“It is common knowledge that the call for tender for this contract is periodically published by almost all the newspapers in Nigeria via paid advert placements by the NNPC,” he added.

The Berne Declaration Report has recommended three steps towards eliminating similar practice:Publication of payments by commodity traders to governments in order to make it harder for government officials to embezzle funds derived from commodities.Swiss traders must be required by law to carry out greater due diligence on their business partners and on the precise origins of the commodities in which they trade.

A public register of beneficial owners in order that the identities of those behind the Nigerian post box companies in Geneva are visible to help clarify any suspicions of corruption. The British government announced at the end of October this year that it plans to create a public register of ultimate beneficial owners, the first country ever to take such a step. At the same time, the government also made known its intention to implement the EU transparency regulations in the commodity sector next year. SA

AFRICA NEWS

Page 41: Security Africa Magazine issue 1

Saving lives is what we do best. Protecting property is our passion.

With an instinct to protect, you can depend on Apollo to deliver the right re detection solutions, whatever the

application. Working with our trusted global partners, we provide cutting-edge technology to meet the demands of

even the most challenging environments.

INSTINCT TO

PROTECT

A mother polar bear will either look for a den or construct one for her cubs, providing insulation and protecting them from predators in the rst critical months of their lives.

+44 (0)23 9249 [email protected]

To view all of our product ranges visit: www.apollo- re.co.uk/instinct

FIRE DETECTION SOLUTIONS TO PROTECT LIVES AND PROPERTY.

210x297mm - 10Year.indd 1 26/09/2013 15:25

Page 42: Security Africa Magazine issue 1

SecurityAfrica December 2013 41

Innovation helps Hainsworth stay ahead

It is 13 years since Hainsworth launched Hainsworth® TITAN which helped to take firefighters’ personal protective equipment (PPE) to a new level. TITAN, which formed part of the company’s patented

TI-technologyTM, saw the emergence of garments with increased breathability for greater heat stress manage-ment, allowing firefighters to become more aware of the environment in which they were operating.

While the launch of TITAN in 2000 was an important milestone in the development of PPE, for Hainsworth it was simply the latest innovation in an association with firefighters stretching back more than 100 years.By the turn of the 21st century, Hainsworth was already established as a global leader in textile development, manufacture and application helping to protect fire service personnel around the world from the potentially devastating effects of heat and flame.

Since 2000, the challenges facing firefighters have intensified and global news stories such as the 9/11 Twin Towers attacks in the United States, the July 2005 bombings in London and other similar incidents have raised awareness of the demands placed on our emergency services.

Throughout this period, Hainsworth has continued to listen to those on the frontline and innovate to ensure that the PPE they wear prepares them for all potential scenarios.

These innovations have included the introduction of Hainsworth® REPEL in 2002, the latest in finishing technology offering durable protection against hazardous chemicals without the need to re-impregnate after every wash. It is designed to provide the first line of defence against chemicals which may be encountered by firefighters or riot police.

FIRE news

Page 43: Security Africa Magazine issue 1

42SecurityAfrica December 2013

Two years later, in 2004, Hainsworth® ATLAS was launched into the market, offering the ultimate in heat and flame protection. Designed to be breathable, comfortable and minimise the effects of heat stress, it is robust enough to withstand the rigours of modern firefighting.

Further innovation came in 2007 with the introduction of Hainsworth® METIS – a 175gsm lightweight solution to be used in conjunction with quilted thermal barriers.Last year saw the company launch ECO-DRY. ECO-DRY offers a range of base layer solutions incorporating the benefits of wool to provide firefighters with optimum protection and the highest levels of comfort.

Wool is a highly complex fibre offering a myriad of benefits, all from a renewable and sustainable source. It is naturally hygroscopic, meaning it can hold 33% of its weight in moisture before feeling damp and naturally regulates the absorption/evaporation of this moisture keeping a steady microclimate next to the skin. The result is that the wearer feels cool, dry and comfortable.Hainsworth innovation has sat alongside the many changes and updates to PPE standards affecting fire services in different parts of the world during the past 25 years.

Many of these were triggered by the King’s Cross station tragedy in London in 1987 which claimed the lives of 31 people.

This tragedy brought about a wholesale review of the PPE worn by firefighters in the UK who, until this time, were still arriving at emergencies wearing heavy woollen tunics.

With the publication of the EU Directive on PPE in 1989,

the PPE market in the EU was opened and harmonised and gave rise to the creation of European Standards. This led to the introduction of European Standard EN 469 “Protective Clothing for Firefighters”, which enshrined in law the need for garments to undergo a number of tests to ensure they provided adequate protection against both radiant and convective heat. In addition, they must also meet the requirements for resistance against water penetration and tearing.

Standards have continued to be updated in Europe, Australia, North America, Africa and elsewhere and any innovation needs to reflect such changes.

Every product developed by Hainsworth is subject to the most stringent levels of testing in our own accredited laboratory and the design of fabrics is influenced hugely by the environment in which a firefighter operates and how the garments will be worn.

During recent months, Hainsworth has spent time looking closely at how the company, its technologies and products and the PPE industry itself have evolved over the past 40 years.

As a result, Hainsworth® TECHNOLOGY has been created, under which sit three principal strands – TITAN, ECO-DRY and ADVANTAGE. In simple terms, TITAN is concerned with outershell systems, ECO-DRY is about the linings that sit next to the skin driving comfort and sweat management, while ADVANTAGE covers our many finishing technologies and product enhancements.Customers and partners will hear more about Hainsworth® TECHNOLOGY over the coming months.Continuing to underpin everything are Hainsworth’s core messages, namely that its protective fabrics deliver design that saves; protection that shows; and quality that lasts. SA

For more information please visit: www.protectsyou.co.uk

Hainsworth’s core messages: design that saves; protection that shows; and quality that lasts.

FIRE news

Page 44: Security Africa Magazine issue 1

SecurityAfrica December 2013 43

EVENTS

Renowned as the region’s largest and most comprehensive trade and networking exhibition for the Security and Safety industries, Intersec 2014 offers you a unique spectrum of products from the fields of Commercial Security, Information Security, Fire & Rescue, Safety & Health, Homeland Security and Policing.

Intersec 2014 is under the patronage of HH Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum. For the 2014 edition more than 1,000 exhibitors from more than 54 countries are expected.

Intersec is far more than a successful meeting platform. This is where new projects and partnerships are initiated, where visionary objectives are conceived and implemented.

The high number of international trade visitors explains why Intersec is of unique value to all the target groups in the Security & Safety industry. Interest in new technical solutions is growing to a greater extent than previously experienced, releasing tremendous sales and turnover potential.

Exploit the opportunities available to you to make contact with all the players in the global marketplace.

www.intersecexpo.com

FIREX International is the leading event for every professional involved in fire protection, prevention and detection, offering a comprehensive selection of the latest thought-leadership alongside the best networking in the industry. With 14,000+ visitors, comparing and contrasting a range of innovative fire safety solutions from 140+ major manufacturers, alongside hearing the most on-topic discussions in the 120+ hours of free educational seminars, FIREX International is the place to attend to discover and determine the future of the industry.

www.firex.co.uk

Key Security& Fire Events 2014

Firex 2014 London 17-19 June 2014

Intersec 2014 Dubai 19-21 January 2014

Page 45: Security Africa Magazine issue 1

44

EVENTS

SecurityAfrica December 2013

Montgomery West Africa is pleased to announce Securex West Africa 2014! It is the only show in the region that brings together the entire security supply chain by incorporating Cyber Security, Commercial & Homeland Security, Fire & Safety Security all under one roof. Securex West Africa 2014 provides a unique platform for all in the security supply chain to engage, educate and showcase the latest trends and solutions. The shifting security landscape and newly emerging threats requires West African countries to formulate national security strategies and frameworks that share common approaches and address security concerns. Packed to the brim with products, services, networking opportunities and educational content – you simply cannot afford to miss Securex West Africa 2014. The 2013 show attracted over 1700 visitors from the government, trade and end-user market, all eager to seek innovative products and meet new suppliers.

www.securexwestafrica.com

With over 40 years’ experience in this market, expertise is tantamount in the IFSEC offering, not just in the UK, but globally. With global events taking place year round as well as a dedicated online community portal and leading awards programme, we can help you access the audience you’re looking to target. With the latest in security innovation, alongside the dedicated OSH Focus, for safety & health solutions and the FIREX Pavilion, for all fire prevention requirements, IFSEC South Africa will offer the full package of end-to-end protection and management solutions over 3 days.As a country diagnosed as a ‘High Growth Market’ by UK Trade & Investment (UKTI), South Africa offers a wealth of opportunity for suppliers to the security industry looking to reach the purchasers in this region’s highly lucrative markets. With one of the highest output growth rates globally, the investment in the country’s infrastructure, alongside its rapid growth, make this the perfect time to enter this market.

http://www.ifsecsa.com

Securex West AfricaNigeria 18–19 March 2014

IFSEC South Africa 2014 Johannesburg 13-15 May 2014

Page 46: Security Africa Magazine issue 1
Page 47: Security Africa Magazine issue 1