Sie sind auf Seite 1von 84

www.counterterrorbusiness.

com | ISSUE 22

IN THE NEWS: UNITED STATES FREEDOM ACT TO REFORM GOVERNMENT SURVEILLANCE POWERS

DSEI 2015

SAFE CITIES

SECURITY

TERRORIST RECRUITMENT

CONTROLLING
THE INTERNET

Will the Extremism Bill help tackle


online enrolment?
COUNTER TERRORISM

COUNTERING
RADICALISATION
With traditional approaches for preventing
terrorism failing, is it time to take a new approach?

UK
News: antee
r
ua
must g defence
m
u
m
mini ding p73
n
e
p
s
NCE

ZINE

AGA
ESS M

EFE
FOR D

USIN
THE B

DSEI
review
2015 p 7
p7

COUNTER TERROR BUSINESS

Should we reverse the


current strategies to counter
radicalisation?

www.counterterrorbusiness.com | ISSUE 22

IN THE NEWS: UNITED STATES FREEDOM ACT TO REFORM GOVERNMENT SURVEILLANCE POWERS

DSEI 2015

SAFE CITIES

Comment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

SECURITY

Unfortunately, violent extremism can no longer


be considered a rarity. It affects an increasing
number of the global population.
TERRORIST RECRUITMENT

CONTROLLING
THE INTERNET

Will the Extremism Bill help tackle


online enrolment?
COUNTER TERRORISM

COUNTERING
RADICALISATION
With traditional approaches for preventing
terrorism failing, is it time to take a new approach?

UK
News: ntee
ara
must gu defence
um
minim ing p73
spend
CE

ZINE

FOR DEFEN

ESS MAGA

THE BUSIN

Some would suggest that current approaches to prevent terrorism remain


somewhat unsuccessful. University professor and author Hamed El-Said takes
the issue back to its roots and argues that reversing current strategies may be
a more successful method to countering radicalisation. Read more on page 11.

DSEI
view
2015 pre
p77

The surge in recruitment to radical groups is a serious concern for the UK which
has been emphasised by events earlier this year, where young British citizens
travelled to Syria to fight next to and support Islamic State. This particular
problem needs action in the fifth domain the internet. On page 15 Paul Stokes
highlights how data analytics can help assist in countering online recruitment.
Following Januarys terrorist attacks in Paris, the French Capital has
witnessed a steep rise in the Global Alerts Dashboard, an online mapping
and data portal which categorises locations at extreme risk of terrorist
threat. On page 19, Jason McGeown of Verisk Maplecroft analyses
global urban centres that are deemed risky and how organisations can
enhance risk management capabilities through digital platforms.
Will the current Government commit to spend two per cent of GDP on the
military? As well as US defence secretary Ashton Carter, the question is
being asked by various Tory MPs and former heads of NATO. See Defence
News on page 73. Also, the UKs biggest display of military exhibition takes
place at Londons ExCeL Centre on 15-18 September. Check out a sneak
preview to the DSEI show on page 77. More to come in our next issue.

P ONLINE P IN PRINT P MOBILE P FACE TO FACE


If you would like to receive 4 issues of Counter Terror Business
magazine for 100 a year, please contact Public Sector
Information, 226 High Road, Loughton, Essex IG10 1ET.
Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:

www.counterterrorbusiness.com
PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk
EDITORIAL DIRECTOR Danny Wright EDITOR Angela Pisanu EDITORIAL ASSISTANTS Michael Lyons, Sian Nagle, Tommy Newell
PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone
ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Vickie Hopkins, Charlotte Cassar
REPRODUCTION & PRINT Argent Media

2015 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted
in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written
permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot
be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

CONTENTS
11

07 CTB NEWS

New Investigatory Powers Bill, Swedish


terror suspect trial collapses, and
the Safe Schools Declaration

11 COUNTER TERRORISM

University professor Hamed El-Said shares


his thoughts on the issue that traditional
approaches to fighting terrorism are
not working, and instead argues that
countering radicalisation in the first place is
a better approach to the problem

15

15 TERRORIST RECRUITMENT
The British Security Industry Associations
James Kelly discusses the importance of
civil aviation security and how airports
ensure the safety of staff and passengers

19 TERRORIST MAPS

Jason McGeon of global risk analytics


Verisk Maplecroft examines the new Global
Alerts Dashboard (GAD), in which 64 cities
are categorised as in extreme risk

23 INTERNATIONAL AFFAIRS

33

With oil and gas prospects in East


Africa flourishing, the regions potential
security risks can be seen as a barrier to
international business. Tony Stead argues
that with the appropriate risk scoping
and planning, conducting business in East
Africa can be viable and profitable

27 CYBER SECURITY

Professor Mike Jackson, IT and cyber


security expert at Birmingham City
Universitys Business School, examines the
proposed Investigatory Powers Bill and
asks what this means for public privacy

Contents

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

33 SAFE CITIES

Geoff Zeidler, past chair of the British


Security Industry Association, discusses
the topic of Safe Cities and the work
thats currently underway to develop best
practice in London

37 PERIMETER SECURITY

Criminals are not afraid of using extreme


force or explosives when entering a
building or site. Security products that
protect such perimeters must meet strict
standards urges Stephen Munden

45 IFSEC PREVIEW

The global security industry will gather


at the ExCeL in London this June for
three days of innovation, expertise and
inspiration at IFSEC International 2015

55 EMERGENCY SERVICES

With over 400 exhibitors and over


5,500 visitors attending this event, the
Emergency Services Show is one of the key
events for anyone involved in emergency
planning, response or recovery

59 SECURITY THREATS

The Security Institutes David Thorp


examines the modern days evolving
security threats and how the security
professions relationship with the public
can be affected

65 FORENSICS

Forensics Europe Expo on 21-22 April


hosted a conference programme in
collaboration with the Chartered Society
of Forensic Sciences, showcasing for all
those involved in the forensic sector

37
59

75

THE

INES

SM
AGA
Z

INE

73 DEFENCE
NEWS

MOD invests 80 million in helicopter


training equipment; UK involvement in
Allied Shield Balticexercises

77 DSEI 2015

Defence and security through


partnershipand co-operation is the theme
for the worlds largest land, sea and air

Counter Terror Business

BUS

FOR

DEF

ENC

defence
ISS
Turn t UE 12
and security
for th o page 7
exhibition
e la
3
for trade
businetest defenc
professionals
e
and fess news
and military
a
t
ures
experts
from around
the world, which
takes place at ExCeL
London from 15-18 September 2015

www.counterterrorbusiness.com
Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

Control your comfort

OUTSIDE 35 C
HUMIDITY 90%

22

Inside

PROVIDED BY
HEINEN & HOPMAN

As an international leader in our own field of air


conditioning and heating, Heinen & Hopman is used to
working with yards around the world. At the same time,
our global network of local subsidiaries and aftersales
centres make us an ideal partner for navy vessels that
criss-cross the oceans.

www.heinenhopman.com
Follow us on:

We also understand the stringent operational


requirements of such vessels and the need for innovative
design. The result is a suberb interior environment and
optimum support wherever the corvettes may sail.
www.greenmanifest.info

ANTI-TERROR LEGISLATION

Investigatory Powers Bill under


scrutiny as Liberty goes to High Court
The Investigatory Powers Bill was
announced in the Queens Speech on
27May, which plans to modernise the
law on tracking communications data.
Under the proposed bill, police and
intelligence agencies will have more wide
ranging capabilities to monitor online and
social media use, as well as more powers for
the bulk interception of communications.
Security and intelligence agencies are
concerned that encryption facilities around
many online communications are now
so advanced that they cannot intercept
messages. Under the new bill, messaging
services such as WhatsApp and Snapchat
will be required to release information
relating to suspects under investigation.
The Home Office says the Investigatory
Powers Bill will better equip law enforcement
and intelligence agencies to meet their
key operational requirements, and address
the gap in these agencies ability to build
intelligence and evidence where subjects
of interest, suspects and vulnerable
people have communicated online.
A similar bill, named the snoopers
charter by critics, was previously blocked
by former coalition partners the Liberal
Democrats. The new legislation faces
thesame criticism, with former Deputy
Prime Minister Nick Clegg speaking out
against it. Clegg has warned British Citizens
that their fundamental rights will be
threatened by the bill, which he describes
as a turbo-charged snoopers charter.
Ministers promise to provide for appropriate
oversight arrangements and safeguards,
but there is no immediate detail on how
the complex web of intelligence and
surveillance commissioners and parliamentary
oversight might be strengthened.
Meanwhile, human rights movement Liberty,
along with Conservative MP David Davis
and Labours Tom Watson, are using the
Human Rights Act to challenge the Data

Retention and Investigatory Powers Act


(DRIPA) 2014, which allows the Home
Secretary to order communications companies
to retain all communications data for 12
months. No link with the prevention or
detection of serious crime is required. It
catches the communications of everyone in
the UK including the emails, calls, texts and
web activity of MPs, journalists, lawyers,
doctors and other communications that
may be confidential or privileged.
Liberty is arguing that DRIPA is incompatible
with the Human Rights Act in particular
Article 8 of the European Convention on
Human Rights, the right to respect for private
and family life as well as with Articles 7
and 8 of the EU Charter of Fundamental
Rights, respect for private and family
life and protection of personal data.
Tom Watson, MP for West Bromwich East,
said: The governments decision to use
emergency powers to enable it to spy on
citizens shows the rights of the individual need
to be strengthened to ensure the state cant
act with impunity. Even MPs are powerless
to prevent such powers being enacted.
The Human Rights Act allows us to
challenge those powers in the courts but
the Tory government is intent on tearing
up the Act and doing away with the
limited legal protection it affords. It is vital
that we fight for it to be retained.
Liberty says it does not dispute the role of
communications data in solving and preventing
crime, but does not believe that justifies
the costly and lengthy mass retention of
records of those who are not involved in such
investigations. Liberty is calling for prior judicial
authorisation and a requirement that data is
only retained as part of investigations into
serious crime and to prevent death and injury.
The powers within Section 1 of DRIP are
described as
READ MORE:
extraordinarily
tinyurl.com/nrwagtl
wide.

DIPLOMACY

Blairs gives up on Middle East role


Former PM Tony Blair has resigned his
position as Middle East peace envoy - a
position he took almost immediately after
leaving Downing Street in 2007 and has
held for nearly eight years. Blairs role was
as a special representative for the UN, US,
EU and Russia in Middle East peace talks.
His performance in the role had been criticised
and his resignation comes at a time when
hopes of negotiations between Israel and
the Palestinians are at an all time low.
Blair, 64, is now set to become the chairman
of an organisation that will attempt to
combat anti-semitism and racism in Europe.

The former Prime


Minister will join the
European Council
on Tolerance and
Reconciliation, which
has campaigned
for tougher laws on
extremism.
Chris Doyle, director
of the Council for
Arab-British Understanding described Blairs
resignation
READ MORE:
as long
tinyurl.com/q97zemu
overdue.

USA Freedom Act to


reform government
surveillance powers

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

After a lapse in US surveillance


powers on Monday 1 June, US
congress have passed the USA
Freedom Act, reinstating surveillance
powers for US intelligence agencies,
but with reforms limiting the
governments bulk collection of data.
The USA Freedom Act will replace
the USA Patriot Act, a national
security policy that was put in place
following the events of 11 September,
2001, and is the first major overhaul
of government surveillance policy
since the widespread collection of
data was exposed by whistleblower
Edward Snowden in 2013.
The bill passed on a 67-32 vote,
and will bring an end to the bulk
collection of Americans phone
records. Now records must be held
by telecommunications companies,
not on government servers, and
can only be released with a court
order for specific information.
There will be a six month transition
period where data storage will be
moved from government servers
to those of private companies.
Some key parts of the USA Patriot
Act have been retained in the new
bill, including the monitoring of
lone wolf suspects not linked
to known terror groups and the
ability to monitor travel and
business records of individuals.
The passing of the bill comes
after the USA Patriot Act expired
at 12:01 on 1 June, when senate
failed to reach a majority vote on an
extension, effectively stopping all
government surveillance powers.
Republican presidential candidate
Rand Paul vocally condemned the
bulk collection of data and threw up
procedural road blocks to prevent
an extension of the USA Patriot Act
before it expired on 1 June. He said:
We are not collecting the information
of spies. We are not collecting the
information of terrorists. We are
collecting all American citizens
records all of the time This is what
we fought the revolution over.
Republican Senate Leader Mitch
Connell, who has backed Pauls
presidential campaign, led the
opposition to the Freedom Act, not
wanting to place any restrictions on
US surveillance powers.
President Obama signed the bill into
law shortly after the majority vote
on Tuesday 2 June. In statement he
said he was gratified that Congress
has finally moved forward with
this sensible reform legislation.
READ MORE:
tinyurl.com/nef5n95

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

New! Ultralightweight
combi tools for
tactical cutting
& spreading
Compact design:
Easy to add to your kit
Extremely lightweight:
Easy to carry and handle
Ready for use with
integrated hydraulic
hand pump
Suited for tactical
operations
Choice between models
HCT 5111 ST (highest
spreading force) and
HCT 5117 ST (highest
spreading distance)
Watch the video:

Holmatro | Special Tactics equipment


tactical@holmatro.com | www.holmatro.com

CYBER SECURITY

Cyber security breaches for


businesses on the increase
The Information Security Breaches Survey
2015, published by Digital Economy
Minister Ed Vaizey on 2 June, shows
the scale and cost of security breaches
for business has nearly doubled.
The average cost for big business now starts
at 1.45 million, up from 600,000 in 2014,
while an online security breach for a small
or medium sized business can now reach as
high as 310,800, up from 115,000 in 2014.
The research also found that nearly nine
out of ten large organisations surveyed
suffered some form of security breach and
despite an increase in staff awareness
training, people are still just as likely to cause
a security breach as a virus or malicious
software. Additionally, the survey showed a
drop in organisations who increased their
information security spending, with fewer
expecting to increase spending in the future.
These findings have prompted the
government to urge businesses to take
action against the cost of cyber security
breaches. Ed Vaizey said: The UKs digital
economy is strong and growing, which is
why British businesses remain an attractive
target for cyber-attack and the cost is

rising dramatically. Businesses that take


this threat seriously are not only protecting
themselves and their customers data
but securing a competitive advantage.
I would urge businesses of all sizes to make
use of the help and guidance available from
government and take up the
Cyber
READ MORE:
Essentials
tinyurl.com/prcjxbw
Scheme.

Safe Schools Declaration aims to stop terror attack on schools

More than 30 countries have signed up for the Safe Schools Declaration, which aims to stop
war and terror attacks deliberately targeting schools and educational facilities.
The Global Coalition to Protect Eduction from Attack (GCPEA) held a conference on
29May in Oslo, Norway, during which over 30 countries signed up to the declaration, which
pledges to adopt The Guidelines for Protecting Schools and Universities from Military
Use during Armed Conflict. Countries who have signed the declaration want to protect
both students and teachers from deliberate attacks and establish protected status for
schoolbuildings, so they cannot be used as barracks or for any other military purposes. The
declaration comes after attacks on a school in Peshawar Pakistan last December, where 132
students and nine teachers died. The GCPEA also report that schools in at least 70 countries
have been attacked between 2009 and 2014. READ MORE: tinyurl.com/of6nqp7

COUNTER-TERRORISM

Terror-related arrests at all time high


In 2014, terror-related arrests in England,
Wales and Scotland reached record
levelswith 338 people recorded as having
been held, Scotland Yard has reported.
Metropolitan Police assistant commissioner
Mark Rowley has said that more than half of
those arrests held connections with terrorism
in Syria, with police estimating that over 700
potential terror suspects are thought to have
travelled to Syria. Rowley also suggested that
nearly half of those are now back in the UK.
The number of terror-related arrests was up
from 2013/2014 where there was 254 arrests,
which equates to an increase of about a third.
It is believed that more than 100 people are
awaiting trial for terrorism-related charges.
Police have stated concerns of an emerging
trend, as from last years arrests, 56 were
related to suspects under the age 20.

These arrests were the results of offences


ranging from fundraising for extremist
causes to plotting terrorist attacks.
Rowley said: There is no doubt of
the horrific nature of the offences being
committedoverseas. The influence
of those who wish to bring similar
violence to the streets of the UK has
been an increasing threat here.
Prime Minister David Cameron recently said
that he planned new legislation to tackle
the spread of extremist views, saying it was
designed mainly to confront head-on the
poisonous Islamist extremistideology.
The United Nations estimates that more than
25,000 foreign fighters, from 100 different
nations, have
READ MORE:
joined militant
tinyurl.com/ljkugoc
groups in Syria.

LEGAL

Gildo cleared
after government
refuses to disclose
operational details

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

Swedish terror suspect Bherlin Gildo, 37, has


been formerly cleared after his lawyers argued
British intelligence agencies were supporting
the same Syrian opposition groups he was.
Gildo was accused of attending a terrorist
training camp and receiving weapons
training in 2012 and 2013, as well as
possessing information likely to be useful
to a terrorist. He was arrested at Heathrow
airport under Schedule 7 of the 2000
Terrorism Act when was travelling from
Copenhagen to Manilla to meet his wife.
The trial collapsed at the Old Bailey
after the government refused to disclose
sensitive information. Gildos lawyers
argued that British intelligence agencies
were supporting the same Syrian opposition
as Gildo from 2012-13. They also claimed
the agencies were party to a secret
operation providing weapons to Syrian
groups, including the Free Syrian Army.
After the collapse of the case, Gildos
solicitor Gareth Pierce said:There is a
fair amount of documentation that arms
were being taken out of Libya via Qatar
and Turkey and trucked through into
Syria to the resistance and the same from
Croatia and taken through Jordan.
Given that there is a reasonable basis for
believing that the British were themselves
involved in the supply of arms, it would be an
utter hypocrisy to prosecute someone who
has been involved in the armed resistance.
The prosecutor said the decision to drop
charges in the case had no bearing
on other
READ MORE:
Syriarelated
tinyurl.com/qyo3g8g
trials in the UK.

China counter terror laws


cause international alarm

Chinese draft laws on security,


counterterrorism and non-governmental
organisations have moved implementation
this week constituted a further and more
serious threat to freedom of religion and
expression and deepens repression in
an already restrictive political climate,
International Campaign For Tibet
hassaid. The new measures, which
have caused alarm in the international
community, broaden the reach of the
Party state still further, contracting
the space for civil society, according
to the pro-Tibet campaign group.
Together with the National Security
Law that is expected to be implemented
this year, the proposed counter-terror law
outlines a counter-terrorism structure
with vast discretionary powers.
READ MORE: tinyurl.com/nehcsp7

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

FROM
COUNTERING
TOPREVENTING
TERRORISM

Written by Hamed El-Said

DE-RADICALISATION

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

University professor and author Hamed El-Said shares his


thoughts on why traditional approaches to fighting terrorism
are not working, arguing that countering radicalisation in the
first place is a better approach to the problem
Violent extremism, otherwise known
asterrorism, is no longer a rarity. According
to a recent report by the Institute for Peace
and Economics, the number of countries that
have not suffered from a terrorist attack has
declined from 111 countries in 2004 to only
75 in 2014. While the severity, extent and
motivations behind such attacks
often vary, there is no question
that terrorism has become
a global phenomenon
affecting most of the
worlds societies.
Not only societies,
but also businesses
are, and have been
affected directly and
indirectly by terrorism.
The 9/11 attacks, for
example, have cost more
than $5 billion in terms of
losses related to direct physical
damages, supply chain disruptions,
and interruptions to the international airline
industry and tourism.
A new study of 18 Western European
countries reveals that each additional
transnational terrorist attack has
reduced their economic growth by 0.4

per cent point a year. The World Bankin


its 2011 World Development Report
wentfurther to acknowledge that terrorist
attacks in one region can impose
costs all through global markets.
The disruption of Libyan oil supply following
the beginning of the uprising in that country
in 2011, when international oil prices
jumped by 15 per cent overnight,
is a good example. The same
World Bank Report adds
that todays businesses
regard terrorism as a
major challenge to their
operations in the areas
where they function,
and that attempts to
contain it have become
more unpredictable,
extremely costly though
necessary for the profitability
and survival of the firm.

The
war on s
a
terror hnt on
lia
been re military
a hard hat focuses
ht
approace symptoms
on th nores the
and ig e itself
diseas

FAILED EFFORTS TO
COUNTER TERRORISM
These facts and statistics are alarming,
given that we spent more than 15 years
of relentless efforts to counter terrorism.
There is a consensus across the board that

policies and approaches have not only failed


to prevent or even undermine terrorism,
but they have instead aggravated the
phenomenon and made the problem worse.
This consensus has recently been summed-up
by the United Nations Secretary General,
Ban Ki-Moon, while addressing the Institute
of DEtudes Politiques DE Paris on April 29,
2015, when he stated that today, violent
extremism is a growing and global threat.
WAR ON TERROR
The failure lies in our misconceived strategy
employed after and since the 9/11 attacks.
Known as the war on terror, this strategy
has been overwhelmingly reliant on a
hardmilitary approach that focuses on the
symptoms and ignores the disease itself.
Asthe anthropologist Scott Atran recently told
the UN Security Councils Ministerial Debate
on The Role of Youth in Countering Violent
Extremism and Promoting Peace: Unless we
understand these powerful cultural forces that
radicalise the youth into violent extremism,
we will fail to address the threat. When,
asnow, the focus is on military solutions and
police interdiction, matters have already gone
waytoo far. If that focus remains, we lose the
coming generation. E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

11

DE-RADICALISATION
The war on terror approach has had
another indirect but not less damaging
implications. Sweeping definitions of terrorism
have invariably justified violations of long
established international norms, human rights,
and freedom of expression in the name of
security. As Mr. Ban Ki-moon warned during
a summit hosted by the United States on
countering violent extremism last February
in Washington D.C: Governments should
not use the fight against terrorism and
extremism as a pretext to attack ones critics.
In many parts of the world, legitimate
actions of opposition groups, includingcivil
society organisations and human
rightsdefenders have been criminalised in the
name of countering terrorism. Through such
actions we have provided violent extremists
seeking to recruit youth into their violent
organisations with the very ammunition they
need. This goes along way towards explaining
the migration of more than 25,000 foreign
fighters from more than 100 countries around
the world to join the Islamic State or ISIL
since the beginning of the upheavals in the
Arab World war in early 2011. At least 6,000
of those foreign fighters come from Western
Europe, where the motivation for joining such
a terrorist group remains little understood.

REVERSING CURRENT STRATEGIES
There is a need to reverse our current
strategies if we are to win the fight against
terrorism. First and for most, there is a
need to restore trust, legitimacy, respect for
international law and human rights, freedom
of expression, and, above all, the promotion

About the author


Individuals do not join violent extremism
because they are nihilists: lack of
opportunities, decent jobs, high quality
education, combined with the presence of
oppression, corruption, injustices and little
regard for human dignity breed radicalisation
and extremism that lead to terrorism.
Turkey provides important lessons here. In
addition to billions of dollars, the pursuit of
a purely military approach to the Kurdish
problem cost Turkey more than 35,000
innocent lives in the 1990s alone. That is an
average of 3,500 fatalities every year.
The realisation that terrorism was a
Turkish problem not simply a Kurdish one,
led to the introduction of a comprehensive
and successful economic reform programme
that reduced poverty and inequalities,
created decent jobs, and improved the
living standards of all Turkish citizens in
all regions. This was accompanied by a
democratisation process that protected
civil society, prevented torture inside
andoutside prison walls, and madehuman
rights integrity a constitutional right,
not a privilege. The upshot has been
the diminishing of a terrorism threat
to levels that no longer occupies
thedaily lives of the average citizen.
UNDERSTANDING YOUTH
45 per cent of the world population is youth,
the very same group most targeted by violent
organisations. In some Muslim majority states,
this ratio exceeds 65 per cent. Youth need
not be seen as a threat. They possess energy
and ideas, they are increasingly networked,

Only United Nations Member States can ensure


the implementation of the Secretary Generals
new Action Plan to prevent violet extremism,
which will send a clear message that not only is
terrorism unacceptable in all its manifestation;
but that they are also genuinely taking practical
steps to prevent and combat it
of good governance. Mr. Ban Ki-moon was
right when he stated: Military operations
are crucial to confront real threats. But
bullets are not the silver bullet. Missiles
may kill terrorists, but good governance
kills terrorism. We must remember that.
We need to understand better the conditions
that conduce individuals to radicalise to a
point of committing or attempting to commit
terrorism. Continuing to ramp up security
measures in response to terror threats
misses the point. It might prevent an attack
or two. It might also stop and detain an
individual from joining a terrorist organisation
abroad. However, this does little to explain
whyindividuals radicalise in the first place.

and are a source of important solutions. They


are the future engine of change. As Professor
Atran advised the Security Council last month,
there is a need to provide the youth with
programmes that offer them something that
makes them dream of a life of significance, a
positive and achievable personal dream, and
the chance to create their own local initiatives.
Engagement with community and
itskey members is a powerful instrument
in building a society that is resilient
toviolent extremist ideologies, aware
of its dangers and risks, and capable
ofbuilding and maintaining bonds
and trustful relationships. Programmes
thatpromote community engagement and

Hamed El-Said is a
Chair and Professor of
International Business
and International Political
Economy at the Manchester
MetropolitanUniversity.

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

He is the author of
New Approaches
to Countering
Terrorism. He is
also an advisor
to the United
Nations Counter
Terrorism
Implementation
Task Force
(UNCTITF).
All opinions
however
expressed in
this article
reflect those of the
authors alone.

participation, debates and discussion of


all sorts of problems must be encouraged.
Communities must also be empowered to
find solutions for their problems, including
problems related to violent extremism.
THE PRIVATE SECTORS ROLE
Finally, there is an important role forthe
private sector in reducing violent extremism
and risks associated with it. This can
take the shape of direct action (lobbying
governments to improve human rights
and reduce corruption) or indirectly
(through creating jobs and supporting
domestic smallsize firms).
They can also operate alone or with other
stakeholders to achieve these objectives.
In short, what is needed is a move away
from our current reactionary approach that
relies on countering to preventing violent
extremism. These elements of this new
prevention strategy are already being
debated seriously inside the United Nations.
Mr Ban Ki-moon himself publicly declared
that he is in the process of developing a
comprehensive Plan of Action to Prevent
Violent Extremism that will seek to
engage and empower youth. Some of the
elements of this plan have already been
discussed here. They include the protection
of human rights and civil liberties, reducing
corruption, promoting goodgovernance and
fostering a culture of peace by deploying
weapons of mass instruction instead
of weapons of mass destruction.
Only Member States however can ensure
the implementation of the Secretary
Generals new Action Plan, which will send
a clear message that not only is terrorism
unacceptable in all its manifestation; but
that they are also genuinely taking practical
steps to prevent and combat it. L

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

13

INNOVATION WITHOUT
COMPROMISE

T800

Fully Rugged Tablet

Wheres
your office?
MOD/Cpl David Rose

Contact us:

Visit us @
STAND

Getac UK Ltd
Mitac House, Nedge Hill,
Telford, TF3 3AH, UK
E: Sales-Getac-UK@getac.com
T: +44 (0)1952 207200

S9
207

www.getac.com

DATA ANALYTICS

FIGHTING CRIME
IN THE FIFTH DOMAIN

New powers to control the fifth domain


the internet and its associated online
communities, are being proposed in the UK.
The other core domains air, sea, land and
space are all closely regulated because
of the impact they have on our lives. The
internet has no such controls and has
become a hunting ground for extremists
as they seek to exploit the vulnerable and
entice them to train in terrorist activities.
Now, the government is exercising its newly
elected unilateral power and pushing ahead
with the Extremism Bill, which would give
heightened strength to the police in criminal

Written by Paul Stokes

Paul Stokes reviews the impact of the Extremism Bill revealed in the Queens speech and explains
how data analytics can tackle the online recruitment of foreign fighters

Terrorist Recruitment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

The s
wer
new po ow the
ll
would a examine
o
police t onversions
online cforms such
on plat itter and
as Tw book
Face

investigations and oblige


social networks to supply
detailed, traceable activity
logs for anyone suspected
of acting outside the law.

TACKLING RADICALISATION
The Bill was outlined in the Queens Speech
to Parliament on 27 May and reintroduced
plans to tackle radicalisation and the
rapid spread of terrorist recruitment. The
purpose, the government says, is to unite
our country and keep you and your family
safe by tackling all forms of extremism andto

combat groupsand
individuals who
reject our values
and promote
messages of hate.
If the proposals become
law, the police will be
able to obtain court orders
for public telecommunications providers
torelease internet search records and other
communications data on demand. These
powers would allow the police to examine the
online conversations of suspected extremists
on platforms such as Twitter and Facebook. E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

15

w.emergencyuk.com | NEC | Birmingham | 23-24 September 2015 | www.emergencyuk.com | NEC | Birmingham | 23-24 September 2015 | www.emergencyuk.com | NEC | Birmingham | 2

Where collaboration
meets innovation

A unique event for anyone who works in the emergency services


Come along to the Show on 23rd and 24th September at the NEC, Birmingham to:
See and handle the latest equipment, kit, vehicles and technology
Receive training in the latest rescue and lifesaving techniques
Network with other blue light services and rescue organisations
Gain a deeper understanding of the support available from voluntary sector partners
Register for free entry today at www.emergencyuk.com

IF YOU HELP OTHERS IN AN EMERGENCY YOU SHOULD BE AT THE EMERGENCY SERVICES SHOW
Thanks to our Show supporters

DATA ANALYTICS
REACHING OUT
The government has been rightly concerned
about the increasing radicalisation of young
people and the ease and speed at which
terrorists are infiltrating ordinary communities
to exploit vulnerable people. Alarmingly, those
choosing to become foreign fighters are not
part of organised criminal gangs; thanks
tosocial media, terrorist groups now reach
ordinary individuals everywhere.
Social networks have created a
multibilliondollar industry and allowed us
to share experiences much more widely than
previous generations. But they can have a dark
side. The platforms have long been misused
by bullies and child abusers but they are
also now being employed very successfully
by media savvy extremists. Potential recruits
are aggressively targeted, particularly people
with violent backgrounds, the very young
and those with mental health issues, the
Metropolitan Police Service has said. Jihadis
are thought to be sending up to 100,000
Twitter messages a day to plot terrorism.
Withno single controlling authority and no
rule book, social media is the new Wild West.
The reach and radicalisation by ISIS is
growing not just in the UK but acrossthe
globe in fact, the total number of
foreign fighters inside Syria and Iraq
has now exceeded 20,000. The Islamic
States is employing expert use of social
media to recruit and radicalise youth
from around the world creating a new
generation of digital native extremists.
A CHANGE IN MINDSET
Modern, cyber warfare requires a change
in mindset and legal toolkit as we see
a swing from traditional, ground-based
crime to the online environment. Its been
a rapid shift and needs an equally rapid
reaction from governments. Fortunately,
an increasing number are starting to
recognise that the internet has become
that fifth domain and that, while clearly
doing much good, it needs boundaries.
The Extremism Bill offers a controlled
approach and not a universal right
to know for the police, which should
provide some reassurance of its limitations
in terms of surveillance while allowing
police greater access to the data that
will illuminate genuinely at-risk areas.

THE LAW
Law enforcement agencies need to be able
to access online communications to prevent
those exploiting social media to recruit and
radicalise youth. Monitoring suspicious
behaviour does of course itself need to be
done with clear guidance and strict legal
oversight but it does still need to be possible.
The new law would require internet service
providers to keep a detailed, traceable log of
individual activity in case it is requested in an
investigation. However, without the resources
to analyse such vast amounts of data,

Terrorist Recruitment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

The government is exercising its newly-elected


unilateral power and pushing ahead with the
Extremism Bill, which would give heightened
strength to the police in criminal investigations
and oblige social networks to supply detailed,
traceable activity logs for anyone suspected of
acting outside the law
investigators could struggle to see a change.
The volume and variety of data long ago
reached such complexity and scale that only
technology can truly handle it and maximise
its value. In fact, law enforcement and
intelligence operations are, increasingly, a
data analytics challenge. There is so much
data from so many sources that it takes some
seriously clever algorithms to spot the links
between seemingly unconnected pieces of
data or detect anomalous relationships.
New advances in crime analytics can
connect different data types and uncover
people, entities, patterns, locations and
relationships of interest. In addition, it
can scrutinise unstructured data like text
documents and social media posts, recognising
words and phrases as entities that can
be analysed and linked automatically.

that target the vulnerable but moreover,


assists in discounting individuals who
are not persons of interest. Working from
known extremists out to a wider network,
agencies can ensure they do not breach
the privacy or civil liberties of citizens who
are connected but not a threat or at risk.
Extremist groups use increasingly
sophisticated technology means to
support their activities. Governments
and law enforcement agencies must
constantly upgrade their own technical
capability to meet this challenge.
With the right technological support,
the new legislation will enable law
enforcement agencies to access the right
information at the right time with reliable
results. Information that could protect a
child, save lives or defend a border. L

CRIME ANALYTICS
The latest crime analytics techniques
such as link analysis, social network
analysis and anomaly detection can help
focus investigators attention on the
right persons early on. This is critical in
identifying at-risk young people before
they leave home to train to fight.
Analytics software helps law enforcement
agents disrupt recruitment networks

Paul Stokes is COO of Wynyard Group, a


market leader in serious crime fighting
software used globally by intelligence,
investigations and information security
operations in justice and law enforcement,
national security, financial services
and critical national infrastructure.
FURTHER INFORMATION
tinyurl.com/otovdgl

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

17

LIMITED VISIBILITY IS AS
GOOD AS NO VISIBILITY
If you cant see everything thats happening on your
network, you can never be completely confident youre not
already under attack.
To truly protect your network, the ability to see into even
its darkest corners is vital Gigamons Unified Visibility
Fabric delivers 100% visibility and security solutions that
scale to handle any threats to your critical data, now and
into the future.

Gigamons network security solutions put the


power back in your hands.

TEL: 01344 859 870

www.gigamon.com/security

LOOK CLOSER. GO FURTHER.

RISK ANALYTICS

Written by Jason McGeon, Head of Communications, Verisk Maplecroft

The new Global Alerts Dashboard categorises 64 cities at


extreme risk to terrorist attacks

Terrorist Maps

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

RISK ANALYTICS

A MECHANISM
FOR MONITORING
GLOBAL TERROR

the ranking. Over this period, the countrys


capital, Baghdad, suffered 380 terrorist
attacks resulting in 1,141 deaths and 3,654
wounded, making it the worlds highest risk
urban centre, followed by Mosul, Al Ramadi,
Baqubah, Kirkuk and Al Hillah.
Outside of Iraq, other capital cities rated
extreme risk include Kabul, Afghanistan (13th
in the most at risk ranking), Mogadishu,
Somalia (14th), Sanaa, Yemen (19th) and
Tripoli, Libya (48th). However, with investment
limited in conflict and post-conflict locations,
it is the risk posed by terrorism in the primary
cities of strategic economies, such as Egypt,
Israel, Kenya, Nigeria and Pakistan that has
the potential to threaten business
andsupply chain continuity.
Principal Analyst at
Verisk Maplecroft,
Charlotte Ingham, said:
Anestimated 80
per cent of global
GDPis generated
from cities.
Visibility of the
subnational
differences in
terrorism levels
should be an imperative
for multinational
organisations looking to E

New research assesses 1,300 of the worlds commercial hubs and


urban centres and reveals that terrorist attacks pose an extreme
risk to businesses in the capital cities of 12 countries. Jason
McGeon of global risk analytics Verisk Maplecroft examines the
new Global Alerts Dashboard (GAD), in which 64 cities are
Paris
categorised as in extreme risk

According to new research released by


Verisk Maplecroft, which assesses 1,300 of
theworlds most important commercial hubs
and urban centres, terrorist attacks pose an
extreme risk to populations and businesses
in the capital cities of 12 countries, including
the strategic markets of Egypt, Israel, Kenya,
Nigeria and Pakistan.
In Verisk Maplecrofts new Global Alerts
Dashboard (GAD), 64 cities are categorised
as in extreme risk. GAD is an online mapping

and data portal that logs


and analyses every reported
terrorism incident down to
levels of 100m worldwide.
Based on the intensity
and frequency of attacks
in the 12 months following
February 2014, combined
with the number and severity
of incidents in the previous
five years, six cities in Iraq top

has
nced
experie steepest
the
one of the ranking,
rises in g the severity
n
reflecti he terrorist
ry
of t
n Janua
i
k
c
a
t
t
a
2015

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

19

ONE UNIFIED DEFENSE


AGAINST CYBER ATTACKERS
Todays cyber attacks are targeted, sophisticated and focused on acquiring your most sensitive
information. They also go undetected by traditional security technology. Organizations need to
reimagine security and adopt a Continuous Threat Protection model. This means having the ability
to detect threats in real-time and reduce time to respond, thereby preventing or minimizing
business impact. The FireEye Platform provides a multi-faceted approach to security detect,
prevent, analyze, respond.
DETECT
Signature-less and multi-ow virtual
machine based approach that leverages
superior threat intelligence

PREVENT
Multi-vector inline known and
unknown threat prevention

ANALYZE
Containment, forensics investigation
and kill chain reconstruction

RESPOND
Remediation support and
threat intelligence to recover
and improve risk posture

www.FireEye.com
2015 FireEye, Inc. All rights reserved. FireEye is a registered
trademark of FireEye, Inc. All other brands, products, or service
names may be trademarks or service marks of their respective
owners.

RISK ANALYTICS
understand and price the risks to assets,
employees and supply chains.

latter of which has moved from medium to


high risk over the last quarter.

ISLAMIC INSURGENCIES IN AFRICA


As Africas largest economy, Nigerias roleas
a commercial hub is central to economic
growth across the region. However, due
tothe activities of Islamist group Boko Haram
and a surge in violence in the lead up to the
March election, 13 out of the 24 Nigerian
cities included in the assessment experienced
a significant increase in the intensity and
frequency of terrorist attacks compared to the
previous quarter. The risk level in Abuja (18th),
Nigerias capital, has remained consistent,
but it is rated among the top two per cent of
GADs most at risk cities. Over the reporting
period, Abuja suffered four attacks which
resulted in 117 deaths.
While Boko Haram will remain the dominant
terrorist threat in Nigeria, Verisk Maplecroft
believes there is a possibility of hostilities
resuming in the Niger Delta following the
election of Mohammed Buhari. The amnesty
protecting members of the militant group
Movement for the Emancipation of the Niger
Delta (MEND) is due to lapse and without
successful negotiations this could mean
disruption to the countrys vital oil industry, in
addition to attacks on key cities in the south
east of the country.
The only other sub-Saharan capital to appear
in the extreme risk category is Nairobi
(57th), East Africas prime commercial centre,
which has witnessed an upsurge in attacks by
Islamist militant group al Shabaab. Over the
reporting period 184 people have been killed
or wounded in Nairobi in six separate attacks.
The impact of terrorism on the countrys
main commercial hubs of Nairobi and
Mombasa (82nd) has been particularly harmful
to investor confidence. In addition, the tourist
trade has declined by 7.4 per cent costing the
country an estimated US $73m.

PARIS ATTACK REFLECTS RISK
According to Verisk Maplecroft, Paris (97th
and high risk) has experienced one of the
steepest rises in the ranking, reflecting the
severity of the terrorist attack in January 2015
that left 17 people dead. The risk level in Paris
is representative of a wider trend for Western
countries, including Belgium, Canada and
Australia, where the level of risk in key urban
centres is substantially higher than elsewhere
in the country, in part due to the significant PR
value attached to such high profile targets by
militant Islamist groups.
This contrasts sharply with a number of
developing economies, including Nigeria,
Thailand, Philippines, Colombia and India,
where the risk of terrorist attacks is highest in
rural areas. This also remains the case in Egypt
where large-scale attacks remain focused in
the Sinai Peninsula. However, the data reflects
increased risks in the countrys two main
commercial centres, Cairo (45th and extreme
risk) and Alexandria (76th and high risk), the

ALEXANDRIA CASE STUDY


An increase in the frequency and intensity of
terrorism incidents in Alexandria has seen the
citys score plunge from medium risk in Q1
2015, to high risk in Q2 2015. This sudden
and sharp increase in risk creates a significant
challenge for international investors in Egypts
second city and major trade hub.
Understanding the drivers of this acute
increase in risk is critical for businesses to
make informed decisions about protecting
their people, assets and supply chains. Analysis
of the risk at both the country and individual
city level can help businesses make strategic
investment decisions, while more granular
event based data can give greater clarity
when making operational decisions. Using the
interactive GAD, clients can find information
about the risks facing their operations down to
street level and create powerful analytics and
visualisations to facilitate risk mitigation.
A geo-spatial investigation of the 12 month
2015 Q1 time frame and the 12 month
2015 Q2 time frame for Alexandria shows a
significant increase in the number of attacks
from two - 30 respectively and an increase in
the number of casualties from nine 40.

Terrorist Maps

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

Muslim Brotherhood affiliated groups which


have historically targeted police forces in
isolation are branching out and targeting
commercial interests to put more pressure on
the government. The acceptance of civilian
casualties is a by-product of this shift in modus
operandi and could signal the start of a more
turbulent period for Alexandria.
The sharp rise in terrorism risk in Alexandria
between the Q1 and Q2 city scores is driven
by an increase in incidents and casualties
across the city. What this simple assessment
masks however is the apparent change in
tactics for terrorist groups. For businesses
operating in the city, historically keeping
away from areas of protest would likely have
limited their exposure to physical risk as
much of the terrorist violence was directed
against tools of the state. The shift now to
targeting commercial enterprises and civilian
infrastructure makes managing terrorism risks
more complex.
AN INTEGRATED SECURITY SOLUTION
Powered by eight years of data, the web
based platform provides organisations with
an instant, cost effective solution that will
aid strategic decision making over current
investments, supply chain continuity, market
entry or risk pricing. The dashboard is an

The dashboard enables multinational companies


to pinpoint current threats, identify emerging
trends and monitor risks, giving them the insight
they need to make risk-adjusted decisions across
the entire operational and supply chain universe
A more detailed analysis of the data reveals a
sharp rise in the number of terrorist incidents
from January 2015. The rise in attacks follows
a national trend in attacks around the
anniversary of the January uprising against
Hosni Mubarak. Investigating past this point
reveals an upward trend in the number of
casualties in the Q2 reporting period which
continues to a spike in March 2015.
The fact the spike in casualties does not
correspond to the peak in attacks indicates a
change in terror tactics during the time frame.
Nearly two thirds of all attacks in January
targeted police forces, however, this fell to 40
per cent in March 2015, while the proportion
of attacks on civilians rose to 60 per cent.
The shift towards softer civilian targets
in March included an IED attack on a
supermarket, three banks, a telecoms business
and a fire station. The data therefore reveals
two separate attack patterns: one cluster
of attacks against police forces around the
anniversary of the 2011 uprising, and a
separate group of attacks against commercial
enterprises with civilian casualties from
February to March. There is the potential that

operational solution that pinpoints, tracks and


alerts disruptions, such as natural hazards,
corporate security threats, terrorism and piracy,
as well as pressures to corporate reputation
from complicity in human rights abuses.
It features up-to-date analytics on emerging
security developments and historic trends at
the global, national and sub-national level.
These trends shape the security of businesses
day-to-day operating environment. Activate
filters within the tool to define the type of data
or analysis needed per site and the frequency
you would like to receive qualified alerts.
It also enhances risk management capabilities
by integrating corporate information with global
security data, which is collated, verified and
categorised by a team of experts. Risk outputs
can be viewed by live data feeds, email alerts,
spreadsheet, online scorecards, risk matrices for
issues and individual incidents. It is augmented
by high performance mapping technology,
which offers compelling visualisations down to
street level. L
FURTHER INFORMATION
www.maplecroft.com

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

21

YOUR FOCUS.
OUR RING SIGHT.
BOTH PERFECT.

Ring Sights has been in the business of


design and manufacture of the finest
quality optical equipment since 1976.
Nearly forty years on and with highly
skilled leadership, dedicated teams of

expert staff and a massive amount of


investment, the company now offers
state of the art production facilities and
are the world leaders in research, design
and manufacture of unit power sights for
the military.

Ring Sights Defence Group Ltd


+44 (0)8700 422260 info@ringsights.com
www.ringsights.com

GLOBAL SECURITY

EAST AFRICA: KNOWING THE


RISKS AND OPPORTUNITIES

The development of 3D seismic exploration


capability combined with ever advancing
engineering technology brings gas finds and
oil prospects in the East Africa footprint of
Uganda, Kenya, Tanzania and Mozambique,
in excess of those found in Qatar.
Key players from the worlds energy
sector are positioning to assist respective
nations to realise, refine and market their
natural resource, bringing global experience
gained from the challenging technical
and physical environments of the North
Sea, Brazil and Kazakhstan, where such
challenges have proven to be fertile learning
platforms for the engineering community.
POTENTIAL RISKS
Africa is a large, diverse and formidable
continent consisting of 54 countries. The region
is often considered volatile due to a range
of factors including tribal, political, health,
geographic, migration and environmental.

Discoveries of mineral wealth oil, diamonds


and water have been sighted burdens
rather than assets, are often identified as
the root cause of historical conflicts.
There are many risks to
operational security. Recent
events in Africa highlight
loss of life and hostility
by ongoing Boko Harem
activity in Nigeria, the
In Amenas terrorist
attack in Algeria (2013)
by Al Qaeda (AQ)
linked terrorists and the
Westgate attack in Kenya
(2013) by Al Shabaab.
2015 has seen further Al
Shabaab atrocities, one killing
over 140 students in Kenya.
Stability and security across Africa is
often presented as unsafe or as a reason
which prohibits international operations. But

to put this in context, the UK has had its fair


share of terrorism since the late 1960s the
Lockerbie bombing in 1988 killed 259 and the
London bombings in 2005 killed 56.
Regional dynamics in Africa
are fluid and have changed
significantly over the past
decade. More recently
in the North, the Arab
Spring had a dramatic
impact which toppled
governments. The
previous safe regions
of the 1990s of Libya,
Egypt and Tunisia are,
in the eyes of many
insurance companies, no-go
areas today. The Central
African Republic (CAR) is yet
another hostile zone, as is Syria.
Noting such events, one can begin to realise
the challenges faced within the continent

Key p
from th layers
energy e worlds
position sector are
respect ing to assist
iv
realisea e nations to
nd
their na market
tu
resourc ral
e

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

Written by Tony Stead, Africa Risk & Security Specialist

While oil and gas prospects in East Africa are flourishing, the areas potential security risks
can be seen as a barrier to international business. But with the appropriate risk scoping and
planning, conducting business in East Africa can be viable and profitable, argues Tony Stead

International Affairs

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

23

THE GAME CHANGERS IN TRACKING!

WINNER

SECURITY INDUSTRY E MAGAZINE

Tracker Solutions Award for 2014/15

-NO CABLES - NO NONSENSE-

A NEW BREED OF TRACKING

www.hunterglobaltracking.com

FIND US

info@hunterglobaltracking.com
CALL: CH+41792555042 / UK+447791324551

GLOBAL SECURITY
where porous borders, inconsistent police
or military forces and poor communications
add further challenges for governments
who may lack transparency or legitimacy in
the eyes of the international community.
TERROR INCIDENTS
The In Amenas and Westgate incidents
highlighted inadequate government
responses to terror attacks, which arguably
caused greater damage and loss of life than
theysaved. Responses seemed ill conceived,
ill prepared and ill advised. Military gunships
were used to attack the Algerian base, with
media footage showing uncoordinated firing
at seemingly any person that moved.
In Kenya, media showed soldiers cowering
outside the shopping centre, latterly there

can be challenging and a common oversight


within the energy sector is the oft-seen
defaulting to Health and Safety (H&S) leaders
to scope and manage in hostile environments.
The flaw in this model is that H&S models
may only scope risks within the parameter
of any given site on a compliance basis,
meaning the likes of Westgate, In Amanas
or the Arab Spring would be unlikely to be
considered in any risk scoping exercise.
There are other incidences where I have
witnessed engineering project managers
leading the preparation for an Africa
operation, with absolutely no regional
insight or input other than technical
engineering knowledge. The consequences
of such oversight can be fatal. I would
recommend employing the services

The region is often considered volatile due


to a range of factors including tribal, political,
geographic and environmental. Discoveries of
mineral wealth have been sighted burdens rather
than assets, are often identified as the root cause
of historical conflicts
was footage of government forces carrying
bags of looted goods and stepping over
dead civilian bodies inside the shopping
centre. Libya, Tunisia and Nigeria government
forces have also responded poorly to hostile
events in respective countries. The common
thread forms that Forces being poorly
trained, equipped and paid are unlikely to
provide appropriate emergency response.
A 2015 snapshot finds evidence that Al
Shabaab are actively recruiting in Kenya. In
Libya, the militia numbers continue to grow
as the country grows deeper and deeper
in to lawlessness, with AQ or Islamic State
(IS) affiliated groups now deeply rooted
in the North East. South West Libya is
believed to be active training grounds for
collaborating banditry, including Hamas,
IS and AQ as the military tourism model
previously witnessed across Afghanistan,
Chechnya and the Balkans reappears.
PLANNING & PREVENTION
This is the context from which operational
planning begins. With the appropriate risk
scoping and planning, Africa operations can
not only be a viable business option, but
brings the added bonus of assisting developing
nations. Training opportunities, supporting
international partners and developing
local skills through determined, committed
andcourageous learning programmes,
provide learning and engagement forums
for all stakeholders to grow and benefit.
Morally, Africa offers wonderful opportunities
where all stakeholders can win.
Planning for operations in such environments

of an experienced Africa hand for the


scoping of any operation, as well as an
academically qualified individual who
considers action to be taken if the worst
possible what if should ever occur.
Risk scoping may include bordering
regions where, due to porous and unpoliced
borders, local conflicts can quickly
escalate to be international. Examples
of cross border incursions include recent
Somali attacks in Kenya. Poorly paid
government forces are unlikely to risktheir
lives in the face of armed conflict.
Companies should avoid overloading
H&S professionals who may be unfamiliar
or unsighted with African cultures
andtrends and instead utilise experienced
risk and security professionals who
have operational experience in Africa.

CONTINGENCY PLANNING
An excellent example of contingency planning
in action was Tullows ability to extract trapped
employees and their family from within the
Westgate shopping centre as the terror siege
was ongoing. Private security teams (ex UK
military) extracted employees and other
shoppers quietly and efficiently days before
government forces entered the building.
Police incidents of expat harassment on
fabricated charges can bring significant
financial reward to corrupt officers. Yet, if one
pays, it endorses a successful business model
for the culprit. I encountered this in many
countries and, in Angola, started recording all
such incidents and providing monthly reports
to the British Ambassador who in turn passed

to the Angolan government with the message


that such harassment was preventing the
international community from helping Angola.
After a few months, the incidences decreased.
Physical threat scoping should consider the
ease of access to weaponry in Africa and the
unpredictability factor where, 9 times out of
10, a road or junction may be safe, yet on
the 10th visit an aggrieved local (or police)
with an AK47 may be attracted to your shiny
expat 4x4 vehicle. How does one handle the
situation? A swift move for the handbrake
or to remove seatbelt may be perceived as
reaching for a weapon. Nervousness may
stall the vehicle, giving the perception of
attempted escape. Such scenarios should be
considered and drivers trained accordingly
including with anti-hijack and first aid skills.
One should be prepared for the significant
cultural differences between working in
the West and working in Africa. Locally, the
daymay start when the sun rises and ends
when it sets. Additionally, priorities may differ
and tribal hierarchies are incredibly significant.
Hotels and support services also differ
in quality and ability and a number of
questions need to be considered, such
as Does your travel company check on
food hygiene practices? Are fire exits
padlocked closed for security, or is therea
clear route for escape? How capable is
the local fire service, can their hose or
ladder reach above the 3rd floor?

International Affairs

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

MOVING FORWARD
The points I have detailed above are not
show-stoppers, far from it, they are platforms
from which contingency and operational
plans can evolve. We now have a baseline
to develop corporate and training plans
which can grow and engage within local
communities. Consider within plans that,
unlike the West, it is not viable to rely upon
local national government forces for support,
therefore organisations must develop
individual robust and workable plans.
Where new-build complexes are being
developed, safe rooms, fire-fighting and
escapes along with practical security and
protection methods should be considered and
information relating to building infrastructure
should be protected; both In Amenas and
Westgate attacks benefited from insider
knowledge. Engage local communities
withsecurity, fire-fighting and medical training
and extend corporate facilities to support
the community should a local emergency
arise. Local engagement is key to success.
Having worked across perhaps a quarter
of Africa on and off for roughly 15 years,I
encourage organisations to overcome
their fears and seek to develop business
opportunities. Companies that scope
well and understand the challenges will
undoubtedly reap business reward. Bringing
organisations to Africa can lead to growth,
developments and benefits at all levels
from community to government.

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

25

Reduce your
online security risk.
Protecting online identities
must be a priority. With Sedicii,
personal information is
never revealed.

Secure authentication is vital, but it must also be convenient.


Dont fall victim to identity theft!
Sedicii ensures total control. With Sedicii it is easy to be safe.
With Sedicii, personal information never leaves the browser. Never sent. Never stored.
Anywhere. Ever. Sedicii authentication works with all forms of user credentials.
In fact, with Sedicii, an organisation no longer holds user passwords at all, therefore reducing
risk. The service can be used for logging in to networks and websites, authenticating securely to
contact centres, authorising payments and all of this is done using a single, consistent interface.
The system can also support biometrics.
Mutli-factor authentication includes: hand / fingerprint recognition; ASCII via
keyboard; smartphone / tablet log-ins; credit / debit card authentication;
face / retina scanning; hardware tokens; and voiceprint.
With Sedicii multi-factor authentication, the user doesnt have to share their password
withanyone.

Make Sedicii Authentication your Single Sign-On.


Sedicii Limited
2F Techhub, 207 Old St, London EC1V 9NR
Phone: +44 20 8144 8279
Email: contactus@sedicii.com
Online: www.sedicii.com
Twitter: @GBRSedicii

IS EVERYONE A SUSPECT?

Written by Professor Mike Jackson, IT and Cyber Security expert at Birmingham City Universitys Business School

MONITORING POWERS

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

Professor Mike Jackson, IT and cyber security expert at Birmingham City Universitys Business School,
examines the proposed Investigatory Powers Bill and asks what this means for public privacy
The Queens Speech announced new monitoring
powers to tackle terrorism. This proposed
bill entitled the Investigatory Powers Bill
has its roots in the Communication Data Bill
(nicknamed the Snoopers Charter) which
the government intended to introduce in the
2012-13 Parliamentary session. The Snoopers
Charter was eventually dropped due to
opposition from the Liberal Democrats. The
details of the new bill are not fully known
as yet but it is believed that it will give the
police and security forces even greater powers
than those set out in the 2012 draft.
What will almost certainly appear in the
new bill is the requirement for Internet Service
Providers (ISPs) and mobile phone operators
to record the activities of subscribers. A record
of texts, emails and phone call will be held
for at least a year. This rule will apply to all

subscribers and not just those who


might be under suspicion of
terrorist activity. The advantage
of this is obvious because
it will ensure that when
the security forces have
identified one suspect they
can also check out other
people who have had
contact with that individual.
Mobile phone operators and
ISPs will need to invest in the
infrastructure to support this
requirement and will inevitably
pass these costs on to consumers.

to encrypt messages so that

third parties (who may


The
f
potentially be criminals)
o
s
l
i
a
det
cannot intercept
e
r
a
bill
w
and read them. The
e
n
t
e
u
h
t
b
n
w
problem for the
o
n
k
government is that
not yet lieved that
e
this also makes
b
e
c
s
i
it i
e pol
h
t
the content of the
e
v
i
g
it will curity forces messages unavailable
to the security forces.
and se greater
A
possible solution
n
eve
is to legislate against
s
r
e
w
po
the use of encryption

ENCRYPTION
Another area the bill is likely to address is
encryption. A number of apps allow users

which is so complex that


it prevents government bodies
breaking it. The problem with this approach
is that if the security forces can break the
encryption then hackers will as well. E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

27

MONITORING POWERS

PREVENTING TERRORISM
The government will justify the impositionof
these powers as a means of preventing
terrorism and ensuring the security of the
country. There will be opposition from
a number of groups who are concerned
that UK citizens will be losing their right
to privacy. In the past this has always
come from left leaning organisations.
Recently, however is clear that right of
centre figures such as Rand Paul are seeing
laws like this as evidence that the nanny
state is interfering too much in peoples
lives. Senator Paul successfully blocked
the extension of the Patriot Act which
was regarded as the USs equivalent of
the Snoopers Charter. Subsequently, an
actknown as the Freedom Act which grants
the government more limitedpowers
than those set out in the Patriot Act
has been passed by the US congress.
Unless the Conservative Party contains
a significant number of MPs who have
views which coincide with Senator
Pauls, the Home Secretary should not
experience any problems in steering the
Investigatory Powers Bill through the
House of Commons. Although the Liberal
Democrats have indicated they mightoppose
it, it is not clear that Labour would.
The proverbial man or woman on the
Clapham omnibus would tend to side with
the assertion that the proposals are necessary
for the protection of the country and do
not cause too great a threat to the privacy
of the individual. The general assumption
would be that people who have nothing to
hide have nothing to fear from this bill.

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

The public may accept the bill not understanding


what the associated loss of privacy may mean.
However, the UK may have to follow the US in
ditching a bill which grants the administration
overarching powers in favour of one which takes
more account of the individuals rights to privacy
A QUESTION OF PRIVACY
And yet there is evidence that the general
public can be greatly exercised about privacy
under certain circumstances. Nobody would
dispute the fact that the number of people
harmed on our roads in a year greatly exceeds
the number subjected to terrorist activity. It
might therefore be supposed that a device
which could significantly reduce the number
of road casualties would be enthusiastically
welcomed. Such a device would be fitted into
a car and the vehicle owners expense and its
purpose would be to inform the police every
time the vehicle driver exceeded the speed
limit. Could such a device be constructed?
Yes, almost certainly. Would it contribute to
the reduction of accidents on the road? Yes,
almost certainly. Would it be accepted by the
general public? No, almost certainly not.
The British have shown that they have
no concerns about breaches of privacy
which might occur due to the use of CCTV
surveillance cameras. The Daily Telegraph
reported in 2013 that there was a CCTV
camera for each eleven people in the
population. Surveys have shown that UK

citizens, in contrast to those in other European


countries, think that this is a goodthing.
So the camera is highly regarded. Except
when its a speed camera. Speed cameras
are widely reviled and cited as examples of
the nanny state in action. They are seen as
invaders of privacy. This is despite the fact that
everyone acknowledges that these cameras
only catch individuals that break the law.
The point is that privacy does matter
tocitizens but only in certain contexts. The
protests about the way the Investigatory
Powers Bill invades privacy which come from
organisations such as Liberty and the Open
Rights Group need to be taken seriously.
The public may initially accept the bill not
understanding what the associated loss of
privacy may mean. In the future, however,
the UK may have to follow the path taken
in the United States of ditching a bill which
grants the administration overarching powers
in favour of one which takes more account
of the individuals rights to privacy. L
FURTHER INFORMATION
www.bcu.ac.uk

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

29

ARE YOU CYBER RESILIENT?


95% of organisations are being routinely compromised, dont
become another statistic.
cybX is a unique cyber training, exercising and validation capability that enables a full spectrum
of cyber attacks to be technically replicated and for business consequence management to be
rapidly developed and tested in a safe and secure environment. cybX enables organisations to
take a board room to server room approach, to:
Integrating cyber resilience into wider enterprise risk management and governance
Objective assessments of business risks resulting from different cyber attacks
Developing and delivering a roadmap for a business driven cyber resilience capability
Investing in the development of high value cyber security teams

For more information visit: www.cybx.org


or Call: +44 (0) 1347 825196

Cyber Security; cybX


@cybx_org

CYBER SECURITY

DEVELOPING
ORGANISATIONAL
CYBER RESILIENCE

Organisations are under virtually constant online attack. Theft of


customer data, intellectual property and sensitive information is
increasingly common. How quickly can you respond?
Digital transformation is one of the key
agendas for government, CNI and for
enterprises in general. However as individual
enterprises, government, the economy and
society become increasingly hyper-connected
and data dependent the risks from cyber
attack and not just technical failure rise. These
risks arise from many different potential
actors, but the consistent theme is the
difficulty with attribution and therefore the
low risk to the attackers. The insidious effects
of the combined criminal, espionage, sabotage
and subversive cyber activities undermine
trust, making traditional security approaches
less effective.
An alternative way is to integrate essential
physical and IT security disciplines into a
more holistic organisational cyber resilience
approach, based upon the recent British
Standard Guidance on Organisational
Resilience (BS 65000) and sponsored by the
Cabinet Office. It provides a framework based
upon three foundations of: vision and goals;
leadership and culture; and governance and
accountability, with an iterative six stage
process. To understand how developing
organisational cyber resilience into a core
process is both achievable and essential it
is first important to understand what digital
transformation, organisational resilience (OR)
and agility mean. Second, how when these
are combined effectively together under a
framework such as BS 65000 they become the
means to driving the economic growth and
delivery of better services.
DIGITISATION
Digitisation has many aspects, but in simple
terms it is the combined networking effects
of increasing amounts of connectivity linking
data, devices and people. This creates a value
chain that enables people and enterprises to
be more agile in their information exploitation
through developing shared understanding
and collaboration to continually improve
and innovate. We are currently in an era of
exponential increases in digitisation due to
combined effects of various technologies
which are all maturing and becoming hyperconnected. To provide an insight into the
increasing hyper-connectivity scale of this
some global figures will help.

By the end of 2014 there were nearly seven


billion mobile subscriptions, nearly one for
every person on earth. The worlds stock of
data is forecast to double every two years,
after increasing 2,000 per cent between 20002012; and the number of internet-connected
devices reached over eight billion in 2012 and
forecasted to reach between one - ten trillion
by 2025, at least 140 sensors for every person
on the planet. This makes data and the ability
to be able to exploit it to drive innovation the
new currency in an increasingly complex and
dynamic global economy and societies.
BS 65000 describes OR as the ability of
an organisation to anticipate, prepare for,
respond and adapt to incremental change

and sudden disruptions in order to survive


and prosper. It therefore follows from an
understanding of digital transformation that
this brings both incremental, but increasingly
disruptive change, hence the digital agenda
as part of almost all government and CNI
strategies. The good news is this is that the
digital transformation required to prosper
from digitisation are also those required to
survive. It ultimately is developing a more
agile enterprise, which has the DNA to be
responsive, robust, flexible and adaptable.
DIGITAL TRANSFORMATION
Digital transformation means cutting across
traditional internal and external stovepipes, to
develop mutual trust, shared understanding,
communications and collaboration, to enable
better decision making and actions. This
means putting people, with the right skills,
enabled by the data and the right channels of
communication and communities of interest

at the centre of both digital transformation


and cyber resilience. By implication flattening
and widening the connections between
senior decision makers, managers and staff
in all functions, to cyber security and IT
specialists. Arguably improving engagement
of employees, often another aspect of
transformation agendas.
The exponential increases in complexity
and dynamic nature of digitisation, inevitably
leads to rapidly changing technology and
ways of working, based upon data sharing
and collaboration. This inevitably constantly
creates new vulnerabilities and exploits for
cyber-attacks. The assumption must therefore
be that some attacks will be successful and so
the organisation must be resilient enough to
withstand the shock and surprise of an attack
as the effects manifest themselves in different
ways. This can be achieved by using an agile
approach based upon structured the situation
based experiential learning for individuals
and organisational development, which BS
65000 includes. By investing in this board
room to server room approach developing
different skills, processes and structures
dynamically, whilst being underpinned by
essential information assurance, organisations
can develop a more agile cyber resilience
capability. In this way boards, senior executives
and whole enterprises will elevate and
integrate cyber resilience, including security
into a core business process.

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

In conclusion, a highly digital enterprise


that is cyber resilient is more agile than a
less resilient one, therefore better able to
exploit the opportunities of an increasingly
hyper-connected environment. This agility,
or the DNA of organisations to be
responsive, robust and flexible is enabled
through digitisation, or the fusion of digital
technologies, data and new structures
exploited by people with additional skills and
changed culture.
There is an interdependent relationship
between digital transformation and
organisational cyber resilience, without
recognising the two and driving the skills and
culture to support them, then both digitisation
initiatives and cyber security will be less
effective an exponentially increasingly complex
and dynamic hyper-connected world. L
FURTHER INFORMATION
www.cybx.org

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

31

CITY CENTRES

COLLABORATION
KEY TO ENSURING
SAFER CITIES

Geoff Zeidler, immediate past chair of the British Security


Industry Association, who leads the Police and Security (PaS)
Initiative, discusses the topic of Safe Cities and the work thats
currently underway to develop best practice in London
As venues for large-scale events, and often
the target for protests, riots and terrorist
attacks, modern cities face changing security
threats. In todays increasingly interconnected
world, cloud-based services and the Internet
of Things are increasing cities reliance on
technology, often leaving them increasingly
vulnerable to security threats and breaches.
Leading the way in utilising smart city
technology in the UK is Glasgow, which
has spent 24m over the past two years
ontransforming the city into a world-leading
city of the future. Now, the city benefits
from self-adjusting street lights, wireless

high-definition CCTV, automatically-adjusting


traffic lights to reduce traffic and bottlenecks
and dedicated apps to highlight walking
tours, cycle routes and points of interest.
A DEVELOPING THREAT
For these smart cities, where the local
infrastructure from traffic lights to utilities
is largely automated and networked,
security vulnerability is especially apparent,
and is a problem not just in the UK but
on a global scale. In an interview with
the New York Times, the United States
security expert Cesar Cerrudo revealed

A FRESH APPROACH
Collaboration and joined-up thinking between
police and the private security industry is
key to ensuring the long-term safety and
security of British cities, and building a closer
relationship between the two is the focus of a
new project being developed across London.
The Police and Security (PaS) Group
Initiative was launched at Londons City
Hall in December 2014, with the aim of
becoming a critical friend to the Met Police
in developing mutually effective collaboration
with the private sector. The key pillars
to this activity include building effective
collaboration, overcoming barriers and sharing
best practice between the Metropolitan
Police, private security suppliers, existing
crime reduction partnerships and local
businesses. Partners involved in the project
include the Metropolitan Police, the British
Security Industry Association, London First,
the Security Industry Authority and the City
Security and Resilience Networks (CSARN).
So what is PaS and what can it achieve?
The list of attendees and presentations
at its launch on 1 December at City Hall
gavean indication. It was attended by the
MPS regional borough Senior Points of
Contact(SPOC)s for business crime, and a
wide range of both private security providers
and security managers who together
represent the Private Security capability
in London, all of which have potential
to collaborate closely with the police.
There were statements of intent and

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

Written by Geoff Zeidler, Immediate Past Chair, the British Security Industry Association

that through weaknesses such as software


bugs and lack of encryption, he has found
ways to control traffic lights, tweak speedlimit signs and alter traffic sensors.
Closer to home, Network Rail has
acknowledged the threat to its new hightech signalling system, following a warning
by Government advisor, Professor David
Stupples, who claims that the new system
which dictates critical safety information
and will eventually control all of Britains
trains could leave the rail network
exposed to cyber-attacks and potentially
allow hackers to cause a serious crash.
Commenting on the increasing risk to cities
from cyber-attack, Mike ONeill, Chairman
of the British Security Industry Associations
Specialist Services Section, said: The key
challenge that strikes me is that with the
drive for connectivity and interconnectivity
comes a lot more vulnerability. [Threats
could come from] hackers terrorist groups
or government actors and their proxies,
who may be seeking to cause asymmetric
confusion. If you think about a city that has
interconnectivity, the vulnerability is huge,
so that is one of the things I think we need
to be much more aware of going forward.
So, with modern cities facing a growing
number of threats, what can those
responsible for safety and security do
toprepare and protect our urban centres?

City Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

33

CASE STUDY

ANIXTER PARTNERS WITH MULTINATIONAL TECH CONSULTANT


TO HELP SECURE A LARGE CITY

S U M M A R Y
Customer
Multinational technology and consulting corporation

Challenge
Citywide-surveillance solution

Solution
READY!SM Deployment
READY!SM Camera

Results
tight implementation timeline
Met
of waste at the job site
Reduction
Improved adaptability for future upgrades

READY!SM Deployment
Services by Anixter
map our distribution
and Supply Chain Solutions to the
construction or deployment process of
any technology project. We combine
sourcing, inventory management, kitting,
labeling, packaging and deployment
services to simplify and address the
material management challenges at the
job site(s). READY! Deployment Services
by Anixter will help you improve the speed
to deployment, lower your total cost of
deployment and deliver your product
This project called for:
READY!SM Camera
is a kit that includes
CAMERA
the camera, lens,
housing and ancillary products to
complete the installation.

About Anixter: anixter.com/aboutus


Legal Statement: anixter.com/legalstatement
12S0057X00 2013 Anixter Inc. 11/13

Customer Challenge

In light of security challenges around the globe, cities are under increased pressure to provide a safe
environment for their businesses and residents. Forward-thinking municipalities are proactively taking
steps to assure they are doing everything possible to maintain the security of their citizens while not
encroaching on the aspects that make city life appealing to residents and corporations alike.
Leveraging its strength in public sector technology solutions, a multination technology and consulting
company secured an assignment to develop and implement a security system for a major metropolitan
city. The challenge: not just deploy surveillance cameras throughout the citys business districtone of the
largest in the U.S.but also seamlessly integrate them into the recent beautification efforts without
sacrificing security.
The company turned to an alliance partner, Anixter, for assistance with the complex infrastructure required.

Program Scope

The citys goals for the program were to increase security, increase visibility with their 9-1-1 call center,
make its businesses and citizens safer, provide surveillance to prevent problems before they occurred and
help with its disaster readiness program. Given their expertise in the communications and security field,
Anixter provided the technology proof of concept required for the project. After reviewing Anixters
proposal, the citys participating divisions, including the Mayors Office, eagerly gave the green light to
move forward, but with an important caveat. Since the work was being done in the citys business district,
the actual installation of the cameras and necessary infrastructure could only take place between 7 p.m.
and 5 a.m. to minimize the impact on business.

Anixter Solution

Anixter and the company worked together to specify the products necessary to meet the security project
requirements. To fulfill the products specified, the company developed customized housings that
contained the necessary infrastructure to make the cameras work and included key components such as
Ethernet ports and wireless access points. The company chose Anixter not only for its technical expertise,
but also for its ability to serve as a single source for all the required infrastructure products.

Program Results

Within a few days of installation, the cameras went online. Despite being operational for just under a
year, the security system is already paying big dividends. Recently, the city held a disaster readiness drill
that demonstrated the systems ability to provide more eyes on the street than if it was relying on the
police force alone.
To date, the city is pleased with how the system is working. In fact, Anixter has already assisted in
deploying additional cameras in other high traffic areas throughout the city including sports stadiums,
museums, parks and other popular city attractions. In all, some 1,500 cameras are planned to be
installed as additional Homeland Security funds, which are the citys primary source of funding for the
program, become available.
This highly visible video surveillance project combined Anixters breadth of technical expertise in
infrastructure and security products and Anixters READY!SM Deployment Services with the companys
design expertise. At the end of the day, Anixter was able to deliver a unique, customized solution to the
city and its customer on time and on budget.
Working on such a high profile project requires the expertise and professionalism that we have come to
count on from Anixter, said a Technology Solutions Architect at the company. More than just a partner, in
many ways they operate as an extension of our technology adoption area by anticipating our needs and
providing sensible, cost-effective solution.

Anixter Inc. World Headquarters


2301 Patriot Boulevard
Glenview, Illinois 60026
224.521.8000

Anixter, EMEA Headquarters


Inspired, Easthampstead Road,
Bracknell, Berkshire,
RG12 1YQ UK

www.anixter.com/solutions/security | anixteremea@anixter.com

Products. Technology. Services. Delivered Globally.

CITY CENTRES

commitment from the Deputy Mayor and


Commander Simon Letchford, who leads
on Business Crime for the MPS, speaking
on behalf of Deputy Commissioner Craig
Mackey. Commander Letchford said: The
Metropolitan Police Service has a strong
track record for delivering policing and
security at major events in London, which
is one of the safest capital cities in the
world. Effective partnership working is key
and we are committed to furtherimproving
the way we work with the private security
industry to build uponthis success.
This initiative provides practical
measures aimed at improving the
working relationship between the police
and private security, whilesharing good
practice across London to reduce crime
and keep London safe forall those who
live, visit and work in the capital.
This project builds upon the growing
trend for police and industry partnerships
that has developed in the past few years.
With a focus on training, Project Griffin was
the first significant engagement between
the police and the private security sector,
whilst more recently, the London 2012
Olympic and Paralympic Games prompted
further demand for collaboration.
The Games were the catalyst for
the CrossSector Safety and Security
Communications Project (CSSC), which was
developed to cascade vital security and safety

City Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

in 2012 between the Metropolitan Police


Service and the private security sector. The
PaS Project will provide a focal point for
engagement for building on what works.
Having established itself as a business-led
initiative designed to simplify and improve
collaboration, coordination, communication,
trust and feedback between the police and
private sector, the PaS Group Initiative
launched an initial consultation in January
2015 to gauge the perceptions of all
organisations involved in operational
collaboration, to ensure that PaS focused on
the most important issues. The consultation
received 197 responses, which came from a
broad set of participants, and both the results
and the next steps that PaS will take are due
to be launched within the coming weeks.
Another initial step taken by the Group
was to map existing local and national
collaboration projects to improve coordination
and identify best practice. Although currently
focused on the London area, there is scope
for the PaS Initiative to expand to other
cities across the UK, facilitating a nationwide
network of communication and best practice,
essential in empowering cities to prepare
and protect themselves against the
growing security risks they fact.
Following the initial
consultation, PaS has
now established three
key workstreams,
focused on Effective
Collaboration, Information
& Communications and
Standards & Training,
which are seeking to
provide better clarity and
simple guidance in these areas.
Theproject has also benefited
from fantastic support from the Met
Police Business Hub, who are starting to
publish a regular newsletter to subscribers.
It is the PaS Initiatives core aim that
building effective collaboration will contribute
significantly towards creating a safer and
more secure London, and that the blueprint
created in the nations capital might
subsequently be rolled out across the UK.

Joined g
kin
up thin lice and
n po
betweevate security
the pri ry is key to
indust the safety
g
ensurin ecurity of
and s cities
British

information across
the capital in real
time. The CSSC project
has become a lasting
legacy of the Games
and is still in operation
today, whilst its format was
successfully replicated for the
Glasgow 2014 Commonwealth Games.

BUILDING ON OLYMPIC SUCCESS


Following the Olympics, consideration was
given by the BSIA and the Met Police to
coordinating a longer-term programme for
collaboration, however this received added
impetus following the publication in summer
2014 of the Mayor of Londons Office for
Policing and Crime (MOPAC)s Business Crime
Strategy, which calls for police, businesses,
local authorities and others to work together
to build confidence to prevent and cut
business crime. Setting out clear, deliverable
plans to achieve this is a key requirement
of the Business Crime Strategy, an objective
that is mirrored by the PaS Initiative itself.
The Business Crime Strategy is based
around requirements from all parties,
known within the strategy as the key
asks. Londons Deputy Mayor for Policing
and Crime, Stephen Greenhalgh, said:
My ask of businesses under the MOPAC
Business Crime Strategy is to build on the
legacy of the excellent relationships built

GETTING INVOLVED
Any interested parties can find out more
or register to participate in the Police
& Security Group, or receive regular
updates, by going to: www.bsia.co.uk
Visitors to IFSEC International 2015 (ExCeL,
London, 16 18 June 2015) can visit the
Safe Cities Academy to hear Geoff Zeidler
speak on The Police and Security Initiative:
Collaboration to Increase Public Safety
and Reduce Crime (Wednesday 17 June,
11:00). Mike ONeill will also be speaking
on 17th June from 15:00 on Security Risk
Management Strategies for Safer Cities.
FURTHER INFORMATION
www.bsia.co.uk

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

35

Safetyflex Barriers, are the next generation of


Anti-terrorist and Anti Ram bollards,
barriers and crash fences
Designed to protect key infrastructure
around the world, from vehicle terrorist
attack, and criminal ram raid activities.
We secure the most key sites in the UK
including:
n
n
n
n
n

London Olympic games


Financial centres
Data centres
Shopping centres
Military & Nuclear Facilities

Safetyflex Barriers
Boston Place Foleshill, Coventry CV6 5NN
t: +44 (0)24 76 664911 f: +44 (0)24 76 663020
w: www.safetyflexbarriers.com
e: info@safetyflexbarriers.com
e: us@safetyflexbarriers.com

PRODUCT STANDARDS

PERIMETER
SECURITY ASSURANCE

With the number of PSSA Verified products


steadily increasing, the PSSA Verification
Scheme has been extended to include the
installation of perimeter security products.
When the Perimeter Security Suppliers
Association was founded, with a key objective
of raising industry standards, the founder
members allocated much of the Associations
resources to the development of a Product
Verification Scheme. Such is the commitment
of PSSA members to the Associations
objectives that participation in the Verification
Scheme has now become a mandatory
condition for continuing PSSA membership.
Leading suppliers, including Cova Security
Gates, Frontier Pitts, Geoquip Worldwide,
Marshalls Street Furniture and Zaun, have
submitted a growing number of their products
for Verification. Since these companies already
possess accredited ISO 9001 certification and
their products have been successfully tested
to vehicle impact test standards or other
standards, often with the oversight of CPNI,
an obvious question is why theadditional

Written by Stephen Munden, PSSA Verification Scheme manager

Criminals are not afraid of using extreme force or explosives when entering a building or site, which
is why the security products that protect such perimeters must meet strict standards
and be installed correctly, urges Stephen Munden

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

With r
be
the numerified
V
of PSSAincreasing,
s
productA Verification
the PSS now includes
Scheme stallation of voluntarily. Not only
the in ter security does this mean that they
must keep their products
perime ducts
in line with the latest
pro

Verification?
Part of the answer lies
in differentiation and the
desire of these companies
to demonstrate a higher level
of achievement, which in turn
of course engenders greater trust and
confidence in their products, compared
with those who make unsubstantiated
claims. However, another part of the answer
is the need to continually improve and
adapt their businesses and their products
and services to meet the requirements
of the markets that they serve.
RAISING INDUSTRY STANDARDS
The PSSA Verification Scheme, unlike
conventional compliance audits to specific
management system or product standards,
takes a more forward looking approach.
A keyrequirement of the scheme is that
participants maintain a register of all
external regulations and standards with
which theymust comply or have adopted

national and international


standards but they are also
well placed to adopt new standards or
additional criteria as they become available.
The scheme also verifies not only that the
products being provided are of the same
performance as those originally tested but
also that suppliers claims in marketing
literature are backed up with evidence of
their products having been tested to confirm
compliance. By reference to PSSA certificates
specifiers, buyers and users are assured
that the products have been independently
assessed and can see exactly what standards
and regulations the product meets.
INSTALLATION
As those familiar with CPNI guidance on
Operational Requirements for Hostile Vehicle
Mitigation will know, the product E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

37

Case Study

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

Xtralis - Innovative and reliable pioneers in life safety


and security for early threat detection
Xtralis is the leading global provider
of powerful solutions for very early
and reliable detection, remote video
verification, and rapid, effective
response to smoke, gas and security
threats. The companys technologies
prevent disasters by giving users
time to respond before life, critical
infrastructure or business continuity is
compromised. Xtralis protect high-value
and irreplaceable assets belonging to the
worlds top governments and businesses.
Xtralis has been a pioneer in life safety
and security for more than 30years. The
company is the worlds largest manufacturer
of very early warning aspirating smoke
detection (ASD) systems, including VESDA,
the worlds No. 1 ASD brand,and developed
the industrys first video motion detection
technologies. With more than 230 patents
(granted or pending) and numerousfirsts
and innovations in its technology portfolio,
Xtralis leads the market in very early
warningfire detection(VEWFD) and integrated
security solutions, includingperimeter,
intrusion detection, multi-site and
enterprise security and traffic detection.
Xtralis solutions protect; 90 per cent

of multi-national fire and security OEMs


distribute Xtralis solutions, 80 per cent of
semiconductor manufacturing facilities
are protected by Xtralis and 80 per cent
of the global top 10 telecom providers
prevent downtime with Xtralis.
Over 70 per cent of the top 30 data
centres and 50 per cent of data centres
globally and 60 per cent of new airport
construction uses Xtralis. Xtralis solutions
protect approximately 50 per cent of
new metro and subway construction, and
more than 50,000 Xtralis traffic detectors
reduce vehicle congestion & accidents.
Headquartered in Dublin, Ireland, Xtralis
serves more than 60,000 customer sites in
100 countriesthrough a worldwide network
of more than 400 certified partners.
Xtralis manufactures life safety and security
solutions using targeted Six Sigma techniques

and design reliability analysis, and it


has been certified by more than 35
regulatory agencies worldwide. Because
of its expertise in fire science and
security, Xtralis works closely with these
organisations to continually enhance or
develop new international standards.
The award-winning Xtralis portfolio
includes: VESDA-E VEWFD Aspirating Smoke
Detection(ASD), VESDAAspirating Smoke
Detection (ASD), Industrial VESDA VLI ASD
for Industrial Applications, VESDA ECO Gas
Detection & Environmental Monitoring and
ICAM Flexible Aspirating Smoke Detection.
The portfolio also includes OSID Open-area
Smoke Detection, ADPROPerimeter and
Intrusion DetectionSolutions and HeiTel
Remote Monitoring and CMS Solutions.
Xtralis technology is available through
distribution partners such as Norbain, Fire
Suppression, ICS, Haes, ADI Gardner, G4S
& Pro Vision. To see how Xtralis could
help you with a preventative approach,
call Amanda on the details below.
FURTHER INFORMATION
Tel: 01442 206 408
www.xtralis.com

Award Winning Intelligent


Perimeter Protection
The most secure PIR solution on the market...in every way possible!

Reliable perimeter
protection anywhere.
Fully wireless solution for
remote locations delivers
drastic installation & labor
cost savings.
Complete wireless installation
available communication & power
NO TRENCHING!
NO CONDUIT!
NO CABLING!
Alarm and fault reports are transmitted
wirelessly
Intelligent power management with
battery & solar power options:

Installations have
never been this easy.
iCommission. One-man
commissioning and
maintenance.
One person can commission and
maintain the detectors
Quickest, easiest, most accurate
solution to set-up on the market
Perform a simple walk-test in the
detection zone
iCommission is a vertical axis
alignment tool
ADPRO iCommission application is
available on tablets and smartphones

2 years battery life with Alkaline


and 5 years with Lithium
Battery life time extension via
solar panel

Eliminate creep zone


with 360PROtect.
Provide maximum tamper protection
with 360PROtect - eliminate all creep
zones
360PROtect is an additional sensor
built into ALL PRO E-detectors to
cover the area from up to 3.2 feet
around the pole/wall up to 26.2 feet in
front of it
All zones alarm separately into Video
Central Platinum via a RS485 bus,
operators can quickly identify which
zone is alarming and visually verify w
ith a camera
Detection for attempted surface
mount removal, masking, & twisting
Universal cable managed bracket with
tamper switch for added vandal
protection
Advanced 3D-tamper detection signals
an alarm if detector alignment is altered
Up to 4 meters (13 feet) mounting
height to minimize the risk of vandalism

www.xtra
www
www.xtralis.com
w.xtralis com

38

COUNTER TERROR BUSINESS MAGAZINE | Issue 22

Solution simplifies installation design,


no need for overlapping corners

Detect more with less!


Extend your perimeter
protection to 220 meters
with one detector and save
up to 65% in installation &
operating costs.
Worlds first 220 meter curtain PIR
Reduces the number of poles,
detectors, and cabling required for
an installation
Superior detection performance and
accurate zones (up to 7 with two
detectors pointed towards each
other) to precisely enable cameras
to provide visual verification
Achieve double-knock protection
Up to 40% cost savings in comparison to other Outdoor PIR systems

PRODUCT STANDARDS

As those familiar with


CPNIguidance on Operational
Requirements for Hostile
VehicleMitigation will know,
theproduct system itself is only one
component of ensuring that the
desired security capability has been
achieved. Another critical element is
the installation

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

solutions for a safer world

system itself is only one component of ensuring that the desired


security capability has been achieved. Another critical element is the
installation of the product system at the site for which it is intended.
This key operation often goes without independent assurance and is
therefore at risk from contractors without the necessary security skills
to install the products as intended by their suppliers. For this reason,
the PSSA has introduced an installation module to its scheme.
The first company to achieve certification for installation under the
Scheme was Binns Fencing Limited. Adam Binns, managing director,
explains why he made the decision to participate in the PSSA Verification
Scheme. Being involved in the industry for over 75 years, we have
been looking for the right scheme to give the end user peace of mind
that the installation they receive has been installed correctly.
Whilst there are other schemes around,they do not focus
on the installation as a package. The PSSA Verification
Schemeensures that systems are in place and processes are
carried out throughout the company to the installation itself.
Both the head office assessment and the on-site installation
assessment concentrate on the important details,where other
schemes which are not fencing focussed can miss out.
INTEGRATED APPROACH
As Adam points out the scheme treats installation assessment
as a package. This starts with thinking contextually, defining
andunderstanding the legal, industry and customer requirements
against which a performance specification can be developed. The
scheme insists on evidence of application of operational requirements,
as advocated by CPNI, and now incorporated in several standards and
associated guidance. It is only after the security capability has been
fully understood that product and service components can be specified.
This is where the knowledge and skills of companies comes to bear by
working with clients to obtain the best fencing system and ensuring
that it is installed so that it can deliver the intended security capability.
NEXT STEPS
New standards are being developed all the time, both in response
to changing threats and technological changes. For example,
PSSA participated in the recently published BS 65000 Guidance
on Organizational Resilience and is monitoring development of
ISO 34001 Security Management System. It is also taking part
in more product-related standards development, such as the
revision of BS 1722 Fences and BSI PAS 170 Vehiclesecurity
barriers Non-vehicle low energy impact testing.
Procurers of PSSA verified products and services can
therefore be assured that because of the adaptive assessment
methodology, products and services bearing the PSSA Verification
Mark willbe informed by the latest standards and legal
requirements, whilst ensuring that they are fit for purpose. L
FURTHER INFORMATION
www.pssasecurity.org

Remote Control and Monitoring


Healds Hydra is a revolutionary new intelligent remote control and
monitoring system, designed to simplify and streamline interaction
with automated roadblockers and bollards whilst adding more
remote functionality and advanced security.
The Hydra is available as an option with any Heald automated
product and allows access via tablet app, mobile phone or PC. All
connections are via existing cutting edge secure protocols with the
Hydra system developed in house at Heald.

Northfield, Atwick Road, Hornsea


East Yorkshire HU18 1EL
Tel: 01964 53 58 58 | sales@heald.uk.com
www.heald.uk.com

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

39

R BEAUTY.
INNER STRENGTH. OUTE
mean

ong, it doesnt
furniture needs to be str
of
ce
pie
a
se
cau
be
t
Jus
planters and seating
. Our specialist bollards,
it cant be beautiful too
ces. And because
ate stunning outdoor spa
integrate perfectly to cre
gy and crash-tested to
olo
hn
tec
our RhinoGuard
by
ed
en
gth
en
str
yre
the
n as well.
vide excellent protectio
PAS 68 standard, they pro
or spaces, choose
enjoyable and safe outdo
So if you want to create
ure from Marshalls.
Protective Street Furnit
IT
LL 0870 990 7504 OR VIS
TO FIND OUT MORE , CA
EET-FURNITURE
TR
L/S
CIA
ER
MM
/CO
.UK
WW W.MARSHALLS.CO

PERIMETER SAFETY

PROTECTING PEOPLE, PLACES


AND INFRASTRUCTURE
Marshalls is a complete external landscaping, interior design,
paving and flooring products business from planning
and engineering to guidance and delivery

Perimeter safety has never been higher on


the agenda. With the threat of terrorism and
the incredibly emotive subject of protecting
people, places and infrastructure at an all
time high there is a real responsibility for both
the specifier and end client to fulfil their duty
of care towards all using the building and
ensure that its environs are protected against
potential threat. Here Marshalls explains the
fine line specifiers must tread in meeting
safety standards, without compromising the
aesthetics of the building.
All buildings where large public crowds
may gather are under threat; from banks and
financial institutions where high volumes of
people work, to leisure parks, transport hubs
and airports, hotels, stadia and public squares,
there is a need to protect those using and
congregating in these places from the threat
of attack.
In the past, building protection has tended
towards concrete, iron and barbed wire
systems. It is widely recognised today that
these have an extremely brutalising effect on
the urban environment and in recent years
good design practice has stood firm on the
use of perimeter bollards: they should be kept
to a minimum. With the statutory requirement
to mitigate vehicular damage to buildings,
and the raised awareness among the general
public of the risks to safety, there is however
a need to incorporate protective street
furniture into many specifications, without
compromising on aesthetics or exacerbating
the sense of fear and unrest that goes hand in
hand with this emotive issue.
When specified thoughtfully, street furniture
ranging from bollards to post & rail, planters,
seating and litter bins provide an effective

method of protecting a space without


compromising on aesthetics, whether this is
the pedestrian access to a building, a public
walkway or a vehicle-free urban area. With
careful planning, protective street furniture
will act both as a deterrent and prevention
against access by vehicles at high-speed with
the intention of causing large-scale damage,
without blocking pedestrian access. BSI PAS 68
is the standard in place to address the needs
of those who specify protective street furniture
for this purpose.
This Publicly Available Specification (PAS)
has been prepared to address the needs of
organisations that require assurance that
the vehicle security barriers they specify
will provide the required level of impact
resistance. BSI PAS 68 specifies a performance
classification for vehicle security barriers
and their foundations, when subjected to a
horizontal impact. Through specifying products
successfully tested to BSI PAS 68, informed
and proportionate security decisions can be
made, in line with individual site requirements.
VEHICLE SECURITY BARRIERS
Many systems are considered suitable for
use as vehicle security barriers. As their
characteristics differ in both function and
form, a comparative means of assessing their
performance is required. PAS 68 identifies
impact test methods, tolerances, vehicle type
and vehicle performance: all criteria that
need to be met in order to conform to the
requirements.
Selecting a bollard for example that
features a steel core will go some way to
ensuring the product meets the specification
criteria for perimeter protection. For instance,

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

products with a RhinoGuard core have been


independently tested by MIRA, proving they
fulfil the demands of PAS 68. Differing levels
of performance are available and the specifier
needs to consider what level of impact the
bollards must resist; for instance a 1.5 tonne
vehicle travelling at 30 mph, or a 2.5 tonne
vehicle travelling at 40 mph. These criteria will
be based on a number of factors such as the
location of the building, the type of vehicle
access and the surrounding road layout.
PUBLIC AWARENESS
It could be argued that, while functionality is
of prime importance, the installation of large
cumbersome street furniture on the periphery
of a carefully designed building might devalue
the architectural aesthetic. Combined with
this, the overall issue of security and public
safety is a highly contentious one with CCTV
in particular often being viewed in a negative
light.
However, with all these systems it is the
careful balance between the subtle and the
overt, the seen and the unseen, that ensures
the desired level of public awareness is
achieved, without raising alarm or causing
undue public anxiety. There are a number
of factors at play: from the message an
organisation wishes to send to its staff and
visitors - that it cares about their safety and
is doing the right thing - to the legal duty of
care and the regulatory pressures under which
it operates. Selecting a PAS 68 successfully
tested street furniture range that has inner
strength, outer beauty will ensure that both
the security and the aesthetic requirements
are met without exacerbating street clutter.
GEO from Marshalls, for example, is a popular
specification choice for urban realm projects
that marries contemporary design with high
quality materials to achieve a design that
blends with both modern and traditional
settings.
Security, public safety and a duty of care
cannot always be fulfilled through the
selection of stock specification products. PAS
68 is a highly regulated standard and ensuring
that relevant products are tested in line with
this benchmark will provide peace of mind. In
addition, it is vital to consider the effect of the
security measures on the building and those
using it opting for a product where design
and cohesion with other elements of the urban
realm have been addressed will help to ensure
that perimeter security is provided in a subtle,
yet effective way protecting people, places and
infrastructure. L
FURTHER INFORMATION
www.marshalls.co.uk/pas68

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

41

Advertisement Feature
Written by Chris Primley, Zaun

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

SECURITY INTEGRATION

SECURITY INTEGRATION
BECOMES VIRAL

The ever increasing integration of human, physical and electronic security measures is gathering
pace on the crest of a technological tidal wave, an ever-evolving terror threat, government
demands and the day-to-day expectations of consumers, argues Chris Primley of Zaun
I watched my wife doing our weekly food shop
on her phone from the comfort of a coffee
shop the other day and perversely thought
how far security integration had come and
how far it may yet go in the next year or two.
Her expectations, and those of consumers
in general, that we should all be able to run
our lives from a single personal electronic
interface is one of the drivers of progress, as is
the advancement of technology and the everevolving terrorist threat and government and
legislators expectations flowing from that.
Many advances in the areas of sensors,
encryption and intelligent video tied to
access control have been made as a direct
result of requirements published by the
US Department of Homeland Security.
Meanwhile the UKs Centre for the
Protection of National Infrastructure (CPNI)
held its first manufacturers training day a
few months ago on a new Cyber Assurance
of Physical Security Systems standard. CPNIs
advice covers physical, personnel and cyber
security and information assurance and how
best to integrate these physical, human and
electronic elements to maximum effect.
Rapid technological development and
the increased adoption of internet-based
services throughout business and society
as a whole have also led to an increased
expectation of, and ability in, unifying systems.
PHYSICAL SECURITY TECHNOLOGY
So the security market now demands more
joined-up physical security technology, with
integration of security fencing and lighting,
access control, PIDs and intruder alarms, CCTV
and video analytics and guard patrols and
security control rooms now commonplace.
In the search for greater security
control, enhanced employee safety and
operational cost savings, some businesses
have taken it further by integrating
fire-fighting systems, building services
controls such as lighting, air conditioning
and lifts, and even business information
systems and human resource records.
In such cases, the various facets work
directly together to improve the overall
management of a facility and make it
considerably simpler and more efficient.
This has been facilitated through the
development of systems and software that are
capable of administering and simplifying the
operators task of running multiple functions

42

COUNTER TERROR BUSINESS MAGAZINE | Issue 22

from a single portal, and with the advent


of more standardised and open protocols.
But, for all of the fantastic fancy stuff that is
now possible, we need to get back to basics and
do only what is necessary and cost-effective.
Which involves asking the time-honoured basic
security questions: what asset base are we
trying to protect physical, human, intellectual
and even reputational; what risks do or might

they face of damage, theft or sabotage; and


who or what might pose these risks and
how might they carry out their threats?
Only when we match the particular threat
on the particular asset with theparticular
risk can we design the most effective
mitigation solution and then integrate
pre-existing security measures with
thenew to make it all work in tandem.

GREATER INTEGRATION
If an alarm is triggered, video can
automatically be sent to mobile phones,
PDAs, laptops or other devices so that
security can decide how best to respond.
Integrated video and alarms systems can
help immediately target security breaches
so that any 24-hour onsite patrol can react
quickly and prevent property loss, or worse.
Access control systems can be programmed
to lock certain areas of the facility to
confine any search for the perpetrator.
Often a fire alarm is the first system to
activate. In a modern integrated system this
can alert a control room and if necessary
escalate the warning automatically to the
emergency services, letting them know
who is on site before they arrive and
even any special medical needs. CCTV
can also be used to see if people are
trapped or areas are potentially dangerous
before emergency services arrive and
without putting their lives at risk.
In short, the greater the integration,
the better able everyone is to build
more effective security plans and
architectures, respond more quickly and
appropriately to security threats and
breaches and ultimately protect people
and property better than ever. L

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

FURTHER INFORMATION
www.zaun.co.uk

NBA integrated with electronics for Tory conference


The National Barrier Asset (NBA) was established in 2004 to give UK police forces the capability to deploy temporary
security barriers to protect high profile locations or temporary events, such as political conferences, from vehicle borne
attacks. The size of the NBA was tripled in 2008 and expanded again four years later to meet growing demand.
The Home Office owns the NBA while Sussex Police
acts as the lead force for a framework agreement
involving all police forces and all government
departments, agencies and public bodies.
It includes a stock of TATA Bi-Steel products and Zaun
security fencing which has been deployed at the G8 Summit
in Northern Ireland in 2012, the NATO Conference in South
Wales last September, and for the first time overseas at the
Nuclear Security Summit in The Hague in March 2013.
It is also rolled out each year for the major party
political conference season. In the autumn of 2014
Zaun used the Conservative Party Conference as
an opportunity to demonstrate the possibilities
offered by integrating CCTV with the fencing.
Electronic security developer and manufacturer
EyeLynx,which is now part of the Zaun group, used its
SharpView solution and integrated i-LIDS approved video
analytics with Pharos Rapid Deployment CCTV on the fencing.
They created a rapid deployment CCTV tower with
embedded cabling and an integrated power cabinet
in the post base to enable quick and easy on-site
deployment without the need for heavy machinery. The
whole set-upwas completely wire free with no external
connections required. With Harper Chalice PIDs now
integrated too, it means Zaun has a total perimeter security
solution specifically designed for temporary events.

They deployed two such towers each with a full


HD1080pPTZ camera and adjoining wide-view
slave cameras throughout the four days of the
Tory conferenceatthe International Convention
Centre in Birmingham last September, helping to
demonstrate how to reduce furtherthenumber of
officers needed to police events of this nature.
Only the master unit needs a SIM card, which provides
remote connectivity over wireless 3G or 4G to beamvideo
intelligence to a workstation or mobile device intowhich
anyone authorised can dial to view live footage, or
rewind and replay from any of the cameras.
Pharos records HD1080p video 24/7 and whenever
a PID is activated or a potential intruder approaches
too close to the fence, the system sends a snapshot
alert to the control centre for visual verification or
even to assigned personal mobile devices, such as the
police chief or nearest constable to the breach.
West Midlands Police hailed the integration of
themost advanced electronics and top end CCTV as
an add-on to the existing physical perimeter security
provided by the NBA as a great success.
They said not only did it enable them to reduce
thenumber of police needed to secure the event,
andtherefore the cost, but also it helped better cover
specific strategic positions on the perimeter.

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

43

PANASONIC TRUE 4K VIDEO


SURVEILLANCE CAMERAS
THE EVIDENCE IS CLEAR
WV-SFV781L ULTRA HIGH DEFINITION CAMERA IS THE
PERFECT COMBINATION OF POWERFUL 4K IMAGING
TECHNOLOGY AND RESILIENT CRAFTSMANSHIP
POWERFUL
-

4K ultra high definition for crystal clear monitoring and surveillance


12mp high sensitivity sensor for 4K camera
Ultrawide optical 6x zoom lens for perfect distance shots
Smart depth of field, VIQS (variable image quality
on specified area) technology and motion detection
- Smart infrared led equipped to take pictures at 0 LX
- Low sensitivity with 0.3lux at colour mode
- 30fps at 4K resolution (3,840 x 2,160)

RESILIENT
-

Vandal-resistant mechanism (IK10)


HLC (high light compensation) technology reduces strong light
Fog compensation function
Dehumidification device
IP66 rated water and dust resistant (compatible with IEC60529)

COME AND SEE OUR 4K CAMERAS ALONGSIDE PANASONICS


TOTAL SECURITY SOLUTIONS AT IFSEC, BOOTH G1000
TO FIND OUT MORE, VISIT:
business.panasonic.co.uk/security-solutions
OR CALL: +44 (0) 2070226530

EVENT PREVIEW

THE EVENT THAT LETS


INNOVATION LEAD THE WAY

IFSEC International

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

The global security industry will gather at the ExCeL in London this June for three days of
innovation, expertise and inspiration at IFSEC International 2015

2015 has already seen major incidences


that have tested the security industry across
the globe and as threats continue to evolve
IFSEC International has a crucial part to
play in keeping the industry abreast of the
latest technologies, developments and best
practices. Taking place at ExCeL London IFSEC
International 2015 will run from 16-18 June.
IFSEC International has been at
theheart of the security industry for over
40 years and this year it will continue
to showcase the future of the industry
alongside truly groundbreaking content.
HIGHLIGHTING INNOVATION
A core theme running across IFSEC
International this year is innovation.

IFSEC t
na
has bee of the
rt
the heandustry for
i
security0 years and
over 4 ontinue
confirmed to participate,
will c ase the
the Innovation Arena
c
will showcase back
to show of the
to
back innovation
e
futur try
from across the industry
s
indu
throughout the three days.

Having conducted a
significant amount
of research following
the 2014 edition of
the show, a key topic
that both exhibitors and
visitors kept coming back to
was the opportunity to see genuine
innovation across the show floor.
With this in mind IFSEC International
will launch a brand new zone within the
show this June, the Innovation Arena in
association with leading industry title,
Benchmark Magazine. The new theatre will
host a series of 10 minute pitches from the
Benchmark Innovation Awards finalists.
With nearly 40 different companies already

Organisations such as Panasonic,


Bosch Security, Vidicore, UTC Fire &
Security and Secure Logiq, to name a few
will give a short presentation about their
shortlisted product and then open the floor to
questions. This exciting new format provides
visitors to IFSEC International a detailed look
at those products that are delivering a real
benefit to end users, integrators and installers.
Gerry Dunphy, Event Director for IFSEC
International, said: This year we really E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

45

EVENT PREVIEW
wanted to put new products, the latest
technology and most importantly innovation
at the very core of IFSEC International, the
introduction of the Innovation Arena and
the expansion of the Innovation Trail really
highlights this. We are really excited to be
shining a light on all the great advances
that are currently being made within this
industry and look forward to celebrating
and showcasing these in June.
THE INNOVATION TRAIL
Running alongside the Innovation Arena
is the IFSEC International Innovation Trail
which will help visitors easily access the
new technologies that have come to market
that will be featured at the show this year.
Highlights of the Innovation Trail include
the NICE Suspect Search, a patent-pending
video analytics tool that quickly locates and
retraces the movements of a suspect, lost
child, or other person of interest within a
video surveillance network. Video footage
from different cameras and time frames can
be reviewed in just minutes, as thesystem
automatically filters out 95 per cent of
irrelevant images. In addition to achieving
faster response times, organisations

1 chainsaw protective textile, Avertic Pro+.


This warp-knitted textile uses the worlds
strongest fibre designed to withstand break-in
attempts when heavy duty tools are used.
Finally, Smanos launch K1, the ultimate
home automation and security centre
combining butler and guard functions into a
stack of aesthetically pleasing round discs.
The discs come with aluminium frames
and texturized plastic surfaces, suitable for
everyday use. This smart home technology
uses intuitive operation, gesture-based
password protection and self-learning
capability to ensure the connected home
is both affordable and easy to use.
Gerry Dunphy said: Following our move
in 2014 to Londons ExCeL we conducted
a significant amount of research and one
of the key themes that kept coming up is
everyone wanted to see genuine innovation
on the show floor. We are delighted to
incorporate the Innovation Trail once again
and we have some really exciting products
and technology to showcase this year.
With so many new products within
the Innovation Trail, IFSEC International
really will provide a one-stop shop for
our installer community to get their

The Inspirational Speaker Series will host leading


businesswoman Baroness Karren Brady CBE, the
worlds greatest explorer Sir Ranulph Fiennes
OBE and international cycling superstar Sir Chris
Hoy MBE across the three days
are able to restore normal operations
quicker following a security breach.
The RISCO HandyApp is the first smartphone
application dedicated to supporting the sales
and installation activities of professional
security installers. The app allows installers
working with RISCO products to increase
their efficiency and sales potential by
providing access to everything they need
for a smooth installation. Through the app,
installers can gain access to manuals, use
power consumption calculators and even
share user guides or sales materials with
customers or colleagues. Installers can also
extend product warranties and seamlessly
open a service request by phone or email
through the dedicated support area.
IFSEC International will also be displaying
the latest in camera systems including Arecont
Vision next generation panoramic cameras,
the 5MP SurroundVideo with Arecont Visions
proprietary STELLAR Low Light Technology, and
the 12MP SurroundVideo with Wide Dynamic
Range (WDR). Both panoramic cameras also
feature motorized lenses for easy set-up, and
over a 50 per cent increase in frame rate
versus current SurroundVideo cameras.
Engtex AB will showcase its highly advanced
textile Avertic Armour, developed from the No.

hands on the latest technology.


All these new products, plus many more, will
make up this years Innovation Trail at IFSEC
International 2015, helping visitors to easily
access the new technologies that have come
to market. Visitors will also be able tospeak
to leading suppliers that are shaking up
theindustry with new services, experts will
be on hand to answer any questions and
demo all the latest products on their stands.
SAFE CITIES
A popular education platform that will
return in 2015 is Safe Cities, a stream at
IFSEC International which will focus on the
protection of larger urban areas, critical
national infrastructure and business continuity.
Suited for senior and strategic personnel
responsible for the protection of major assets
within a city, Safe Cities will provide high
level thought leadership sessions to provide
more insight into this fast growing concept.
Safe Cities utilises a multi-agency approach,
led by the government to protect the
population, the infrastructure and a citys
economy against the threat of terrorism,
criminal activity and natural disasters.
City authorities are under enormous
pressure to cope with common, expected

and unexpected security threats. The


planning to counteract or to minimise such
threats, such as disaster management
plans and business continuity initiatives,
are increasingly making local authorities
important stakeholders in promoting
national security, a role that historically has
been limited to the central government.
With a focus on four key areas - the
citys infrastructure, cyber security, counter
terrorism, and public order the Safe
Cities conference and exhibition will
provide education, solution and technology
providers for global governments, public
sector officials and companies to secure
their cities from threats and attack.
Safe Cities is an integral part of IFSEC
International 2015. Driven by education
from leading experts in the field and
leading technology and solution providers
showcasing the latest innovations, Safe Cities
is dedicated to the security requirements
of a city rather than the individual
component parts that make up the city.
Discovering how to protect vital
international cities and hubs from attack,
with a key focus on business continuity
and resilience, this area will showcase
companies and industry pioneers who have
the expertise, experience and knowledge
to guide governments and industry to
plan for the protection of their cities.
Networked technologies and current trends
all feature heavily in the Safe Cities Seminar
Theatre, exclusively sponsored by Eaton.

IFSEC International

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

EXCLUSIVE PARTNERSHIPS
This year IFSEC International will
alsoincorporate two new partnerships
into Safe Cities, the first is with HyperCat,
a leading consortium of major technology
developers who are driving the standards of
interoperability and they will be discussing
their HyperCatCity Initiative at Safe Cities.
The second exclusive partnership for Safe
Cities is with Euralarm, the association that
represents the electronic fire and security
industry, who will run their own dedicated
half-day conference called Smart Cities: Digital
Solutions to Keeping Citizens Safe and Secure.
The education programme at IFSEC
International also incorporates the Keynote
and Convergence Theatre; here leading
players from across the security industry will
debate the latest issues in cyber security or
accesscontrol along with case studies and
panel discussions around the state of the nation.
Sessions within this theatre include Jim
McHale, Managing Director, Owner and
Founder of Memoori Business Intelligence
Ltd who will present on the Internet of Things
in Buildings (BIoT) and the part security will
play in this. Additionally, a Crossrail case study
from Tony Pearson, Senior Consultant at Exova
Warrington Fire Consulting and Chris Stevens
a Director from SIDOS UK will highlight the fire
safety, engineering and security elements on
the project. E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

47

Today, a simple passport is never enough...


That is why we at Rockwell Collins continue to
develop and implement a range of security
products to help you protect your border.
From biographics and biometric capture to
automated gates we can ensure your countrys
physical border stays secure.
Our ARINC security suite of border
management solutions, incorporating API,
iAPI and PNR, are trusted globally to help
strengthen security around the world.

Learn more at:


rockwellcollins.com/arinc/
airports

2015 Rockwell Collins. All rights reserved.

rockwellcollins.com

IFSEC International

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

EVENT PREVIEW

IT & CYBER SECURITY


The IT & Cyber Security area represents the
ever changing landscape of the security
industrys primary sectors physical security,
video surveillance, access control, and intruder
alarms. These areas have either moved
from analogue to digital transmission and
control, or are in the process of doing so.
Online crime costs the UK economy between
18 billion and 27 billion a year according
to the National Audit Office (NAO).
A secure cyberspace is of immense
importance for the UK. In 2010, UKs
Internetbased economy stood at 121billion,
the biggest proportion recorded for a G20
country. The UK was also ranked first based
on its ability to resist cyber attacks.
Despite this cyber attacks featured among
the top four threats to the UK economy in
2010, while, in 2011, the number of online
assaults globally reached one billion. The
Internet presents great opportunities for
economic growth and improvement in
public services but its potential is also being
increasingly exploited by malicious agents.
In the Convergence Theatre, Dan Solomon
of Optimal Risk Management and Mike
ONeill, Chairman of BSIAs Specialist Services
Section, will take a session on the current
and emerging cyber threats. They will discuss
the need for robust countermeasures and
the importance of upskilling IT professionals
to meet evolving cyber threats.
Jim McHale, founder of Memoori Business
Intelligence, will present on the Internet
of Things in Buildings (BIoT) and the part
security will play in this. He will look
at the current status of the Internet of
Things in Buildings and how it contrasts
with our vision for a future BIoT. There
will also be a cyber security master class
from David Emm from Kaspersky Lab UK,
who will review the threat landscape
in 2015, assess the malware evolution
and give predictions for the future.

Lucas Hirschegger

Another highlight in the theatre will be


a cyber security master class from David
Emm from Kaspersky Lab UK, in this
session he will review the threat landscape
in 2015, assess the malware evolution
and give predictions for the future.
The third education theatre within IFSEC
International is the Security Solutions Theatre
will run seminars around best-practice for
the installation, compliance, testing and
future proofing of security systems.Key
sessions not to miss include a seminar on
intelligent surveillance led by Will Lloyd
from BRE Global, tips on how to save money
with smart tools by Jim Swift from BB7,
and Roland Muller from Siemens Building
Technologies will be sharing his knowledge
on installing wireless applications.
Additionally, the Tavcom Training Theatre
will provide bespoketraining from the leading
training provider Tavcom, on CCTV, IP, access
control, intruder alarms and much more.

Recent events like the diamond heist at Brussels


International Airport have illustrated the
importance of strong perimeter protection and
other physical security solutions
VIDEO SURVEILLANCE
Covering all aspects of video surveillance
and intruder alarms, this dedicated product
area will feature the very latest products
and services in the industry, including video
surveillance, central control rooms, and the
innovations with high definition technology.
Other products on display include ANPR, IP
cameras, remote surveillance, thermal imaging,
video analytics, intruder alarm systems,
detectors, keypads and control panels to
protect your perimeters from outside threats.
INTEGRATED SECURITY
To have an efficient and effective security
system, youll want to ensure your systems
are integrated. At IFSEC well be focusing
on how to ensure systems are integrated,
so that each product doesnt work in
isolation. This purpose built area will provide
you with access to providers whose jobit
is to ensure that each area of security is
integrated and managed effectively.
Securing assets is a major focus for
international businesses and collaborative
efforts between security and IT managers
are more and more commonplace when
it comes to protecting both buildings and
the equipment within them. Key to this is
access control. Driven by rising concerns
over public and private sector safety, the

access control market is set to be worth


a substantial $8.6 billion by 2018.
At IFSEC International, visitors can
discoverthe key trends in this security
market sector and learn about the latest
techniques that will help ensure your
organisation develops a fully integrated
access control solution. Leading
international companies will be showcasing
their products including: door entry
systems, smartcard technology, timeand
attendance software, biometrics and
intelligent building management systems.
PERIMETER PROTECTION &
PHYSICAL SECURITY
Recent events like the diamond heist at
Brussels International Airport have illustrated
the importance of strong perimeter protection
and other physical security solutions. Due
to the heightened threat in todays world,
the importance of protecting property and
assets is paramount to all security strategies.
The Physical Security & Perimeter
Protection area allows visitors to see a
range of products in physical security, such
as perimeter protection, locking systems,
safes and more, while theeducation
programme willenable visitors to
learn casestudies and best practice to
ensuresuccess. E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

49

Meet Q
ua
at IFSE ntum
C 2015
,
stand B
700

info.uk@quantum.com | +44 (0)1344 353500

EVENT PREVIEW

Suited for senior and strategic personnel


responsible for the protection of major assets
within a city, Safe Cities will provide high level
thought leadership sessions to provide more
insight into this fast growing concept
NEW ADDITIONS FOR 2015
In 2015, IFSEC International will also
introduce some great new additions to
some old favourites; the Gadget Zone
will join the Security & Fire Installer Live
feature. Research highlighted that visitors
want to get hands on with the products
before they buy and this will provide
theperfect opportunity to try out the biggest
andlatest range of products in one place.
Along with the new Gadget Zone,
Security & Fire Installer Live will also
incorporate the Toolshed in partnership
with Anglia Tools, the Fire & Security Jobs
Bar, the NSI Expertise Hub and Engineers
of Tomorrow, amongst other activities.
Finally, in 2015 IFSEC International launches
its Inspirational Speaker Series with three
high-profile personalities covering the
sports,
business and extreme
adventure
Abloy_Security_Ad_Feb2015-2.pdf
1 16/02/2015
09:14:21
worlds, each of the keynote speakers
have reached the pinnacle of their careers

and will share their expertise and unique


experiences with the IFSEC audience. In its
inaugural year the Inspirational Speaker
Series will host leading businesswoman
Baroness Karren Brady CBE, the worlds
greatest explorer Sir Ranulph Fiennes OBE
and international cycling superstar Sir
Chris Hoy MBE across the three days.
Karren Brady is widely known as Lord
Alan Sugars aide on The Apprentice and
is also known as the first lady of football.
Karrenbecame Managing Director of
Birmingham City at the age of 23, is now
Vice Chairman of West Ham and is one ofthe
UKs best known business personalities.
Karren will be using her phenomenal
experience in leadership in a session at IFSEC
designed to help you drive your strategic
performance forward.
Often described as the Worlds Greatest
Living Explorer, Ranulph Fiennes was the first
person to reach both North and South Poles

by foot. He has broken records by completing


seven marathons on seven continents in
seven days and has climbed the North Face
of the Eiger. He has extensive experience in
large scale fund raising, team building and
performing under pressure. Be inspired and
motivated by his story at IFSEC in June.
Eleven time World Champion and winner
of six Olympic golds, Sir Chris Hoy will be
joining Brady and Fiennes at IFSEC in June.
Find out how, through the pain of training
and the euphoria winning, Chris maintains
focus and keeps the team moving forward.

IFSEC International

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

PROTECTION & MANAGEMENT SERIES


IFSEC International will once again be
presented as part of UBM EMEAs Protection
& Management Series. The Protection &
Management Series encompasses five major
shows in related marketplaces covering safety,
service management, facilities, security and
fire, the overall ethos of the series is about
protecting and managing buildings and
places of work, along with the people and
information within those places of work. L

Tuesday 16 June 10:00 hrs - 17:00 hrs


Wednesday 17 June 10:00 hrs - 17:00 hrs
Thursday 18 June 10:00 hrs - 16:00 hrs
FURTHER INFORMATION
www.ifsec.co.uk

When door
security has
to work
For a more secure world

www.abloy.co.uk

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

51

40,000 BUYERS AND BUSINESS PARTNERS

@IFSEC #IFSEC2015

Access to leading global technology,


solutions and knowledge to
enable security excellence

Photo courtesy of: Crossrail

16-18 June 2015, ExCeL London

3 Hear from industry leaders on how we are securing our cities at the
Safe Cities Theatre
3 Meet international thought leaders at the Euralarm conference
3 Pre-book meetings with your preferred suppliers through the
Global Meetings Programme
3 Get all your security solutions, education and training in one place

REGISTER FOR YOUR 2015 BADGE TODAY


at www.ifsec.co.uk/ad1
Supported by

The global stage


for security
innovation and
expertise at
ExCeL London,
16-18 June 2015
Organised by

SSAIB

INTRUSION DETECTION

INTELLIGENT
MICROWAVE
PERIMETER
SECURITY

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

Based in Northern Ireland, Sensurity are specialists in Digital


Microwave Intrusion Detection, aiming to deliver government
level Intrusion Detection to commercial and industrial sectors
Sensurity, founded in 2012, was established to
commercialise unique research carried out by
Queen University Belfast. This has culminated
in Sensuritys Flagship product HALO, which is
the companys first product to market.
Historically, microwave based PID systems
were heavily restricted in their application.
The analogue based systems require sterile
sites, wide and flat installation areas, with
no standing water or vegetation within
the detection area. The technical advances
pioneered at Queens University Belfast and
refined by Sensurity allow the HALO system
to be uniquely flexible in its application,
circumventing these restrictions and ensuring
its reliable operation in very challenging
environments.
The requirement for Perimeter Intrusion
Detection Systems (PIDS) are expected to grow
at a steady pace. This increase will be driven by
the escalating spend in developing countries,
growing security risks, improvements in
technology and infrastructure investment
from emerging economies. The significance of
perimeter security has increased, as the world
is not becoming any safer to live. Any attack
or mishap at critical infrastructures, or any
other building or public place can lead to great
economic and human losses.
THE HALO
Sensurity challenges the preconceptions of
Microwave PIDS set within the industry. Firstly,
the HALO system uses a planar patch array
antenna, which generates a non-symmetrical
beam delivering three times the vertical
detection coverage than competing systems
using parabolic dishes. Secondly, the radio
frequency used by HALO is C-Band 5.8 GHz,
which is a lower frequency than that used in
other systems. This ensures that the system
will operate in all weather conditions without
the typical interference from precipitation.
This combined approach produces a
much wider and taller beam, which would
be problematic for traditional analogue
microwave systems. However, due to
HALOs ground up digital design it proves

advantageous. The taller, wider beam and


lower frequency results in the complete cross
section of the intrusion target being visible
to the system for a longer period of time.
This extra time allows additional information
to be captured and allows HALOs on-board
analytics processor to look for known
signature types and react accordingly. For
instance, the cross-sectional signature of a
small animal is substantially different from a
human, therefore the HALO system can choose
not to alarm on intrusions by small animals
while still alarming on human breaches. This
level of intelligence ensures that Sensurity
systems have the highest possible probability

microwave systems have an area of weakness


immediately above and below each node
caused by the attenuation pattern of the
microwave beam. This means that for
complete installation coverage they need to
be overlapped. With HALO this issue has been
solved by incorporating active IR sensors top
and bottom. A pair of HALO nodes ensures
100 per cent detection across a volumetric
area, up to 200m long, 4m high and between
1m and 6m in width.
Due to a recent increase in business activity,
Sensuritys head office has relocated to larger
premises, giving extra capacity to help drive
the innovation, technology and research. The

Due to a recent increase in business activity,


Sensuritys head office has relocated to larger
premises, giving extra capacity to help drive the
innovation, technology and research
of detection (PD) at 99 per cent while reducing
the false and nuisance alarm rate.
Using its on-board analytics, a HALO system
self-calibrates and learns its environment
on installation, and no laborious set up is
required. The system will account for height
difference in the terrain, fence lines or hedges
in close proximity, overhanging vegetation
and other environmental factors. The
analytics engine will filter out repeated noise
interference caused by tree branches moving
in the wind, or the vibration of a fence line. It
also continually learns of slow change to the
environment. For example grass or vegetation
growing or pooling floodwater within the
detection zone will not cause false alarms.
DRIVING THE INNOVATION
Another unique benefit of HALO is that
it can be installed back to back in a tight
linear configuration which allows it to be
close to fences or hedge lines requiring
much less installation space. Traditional

business has gone from strength to strength


in recent times, allowing Sensurity to take a
product that once had a limited market and
open up new, and versatile markets for this
technology.
Noel McKenna, CEO, said: Understanding
the requirements of governments and critical
infrastructure sites, we see the need for the
same exacting, selective and genuine alert
performance to be available to the wider
market. The emergence of the new band of
soft targets that, if disrupted, would have
severe impact on daily lives of everyone in
the UK and Europe including distribution,
retail, food production to name but a few, its
a sensitive time to be in any industry. I am
delighted to have the opportunity to be part of
Sensurity at this early stage and support this
user community with our current intelligent
security product HALO. L
FURTHER INFORMATION
www.sensurity.com

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

53

Emergency Services

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

EVENT PREVIEW

THE EMERGENCY
SERVICES SHOW

With over 400 exhibitors and over 5,500 visitors attending this event, the Emergency Services
Show is one of the key events for anyone involved in emergency planning, response or recovery
As the nature of terrorist threats continues
to evolve, often taking unpredictable turns,
so does the role of the counter terror
professional. Innovative ways of working,
new skills and increasingly sophisticated
equipment are required to effectively
protect the public. Keeping abreast of all
the developments and support available can
be a real challenge, but one very efficient
way to update your knowledge is to attend
this years Emergency Services Show.
The Emergency Services Show provides
an interactive showcase for key resilience
organisations and training providers.
Organisers of The Emergency Services
Show have confirmed that the two-day event
held at the NEC in Birmingham last year
attracted a record number of 5,680 visitors.
That represented the eighth consecutive
year-on-year increase in visitor growth

and a six per cent increase since the event


relocated to the NEC in Birmingham.
SEMINAR CONTENT
A new seminar theatre dedicated to training
will feature at The Emergency Services Show
2015. Free to attend, the new seminars
will be led by experts who run specialist
courses for emergency services personnel,
and will expand the offering of free learning
opportunities already available to visitors.
The growing exhibition for emergency

responders has already attracted many of


the most respected training providers in
the industry including the Tactical Training
Centre, NHS Ambulance Service First Aid
Training consortia (NASFAT), Fire Training
Group, PGI Training, Ferno, University
of St Andrews, Coventry University and
London Metropolitan University.
Organisers will also be running seminar
programmes on multi-agency working and
innovation (successfully launched at the 2014
event), as well as the popular College of

From strategic planners and first responders to


the manufacturers and suppliers of equipment
used by leading professionals, the show brings
together everyone involved in an emergency
Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

55

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

56

COUNTER TERROR BUSINESS MAGAZINE | Issue 22

EVENT PREVIEW
Paramedic CPD Workshops. Meanwhile the
indoor and outdoor exhibition will feature
over 400 companies and organisations*,
some of whom will run workshops and
live demonstrations on their own stands.
John Halfpenny, policing skills trainer, West
Mercia and Warwickshire Police described
last years show as an invaluable and
enjoyable chance to network and appreciate
the challenges, strengths and capabilities of
partner agencies in the emergency services
and support organisations or responders
while Mark Atton, ERA head of defence called
it a great one stop shop for emergency
services capability, intelligence and expertise.
With something new around every corner,
The Emergency Services Show provides a
unique opportunity for emergency responders
to learn, network and progress their careers.
It is also a showcase for the best examples
of industry collaboration and innovation.
Event director David Brown said:
Theexhibition halls will be buzzing with
knowledge and expertise and we urge

Resilience programme of Chief Fire Officers


Association (CFOA) is designed to strengthen
the nations ability to handle emergencies and
crises through the delivery of a co-ordinated
response to a range of serious, significant or
catastrophic incidents that have wide spread
impacts or are of national significance.
The National Ambulance Resilience Unit
(NARU) works with ambulance trusts to
support the development of properly trained,
equipped and prepared ambulance responders
to deal with hazardous or difficult situations,
particularly mass casualty incidents that
represent a significant risk to public health.
NARU, working with the Department of
Health, also assists withthe effective national
coordination and implementation of the prehospital health response to government policies
that are designed to improve civil contingencies
and national resilience across England.
The Emergency Planning Society has become
the driving force in the world of resilience
since its creation in 1993. Through regular
consultation with the government it provides

The Tactical Training Centre is a unique


firearms and multifunctional training facility,
working for and with the community, protecting
people. It provides UK curriculum compliant
training to the police, other law enforcement
agencies, blue light services and the military.
It delivers firearms, training, coaching as well as
advanced medical training
officers of all ranks, across all emergency
services, to take full advantage.
THE EMERGENCY RESPONSE ZONE
Aimed at developing relationships and
partnerships between voluntary organisations
and the blue light services, the Emergency
Response Zone is a networking focus
of the exhibition and will feature many
new exhibitors this year including Fire
Brigades Union, Arson Prevention Forum,
CFB Risk Management, South Western
Ambulance Service NHS Foundation
Trust and Road Safety GB Academy.
There will be around 70 companies, charities
and other organisations exhibiting in this area
alone ensuring a wealth of opportunities to
share and catch up with new developments.
Companies within the Emergency Response
Zone all have stand numbers prefixed
with Z for easy identification, and are
all located together within Hall 18.
RESILIENCE ORGANISATIONS
The UKs Fire and Rescue sector remains at
the forefront in terms of emergency planning,
response and recovery, and the National

a voice for its members to influence change


at the highest level. Members come from all
areas of the resilience profession and the
society provides a forum through its extensive
network of regional branches to share
experiences and disseminate good practice.
The Institute of Civil Protection & Emergency
Management (ICPEM) brings together
emergency professionals and academics in
order to provide an informed and influential
voice on all aspects of civil protection
and emergency management. It gives
members the opportunity to network with
practitioners and academics in the fields of
civil protection, emergency management,
resilience and associated disciplines.
The National Inter-Agency Liaison Officers
(NILO) was originally initiated within the
Fire & Rescue Services and it has now been
extended to all responding agencies. The
aim of the NILO role is to provide a cadre
of officers especially trained to ensure
cooperation between agencies responding
to a terrorist related or public order event.
The qualification is partially gained by
way of an eight-day course delivered at the
Fire Service College. This then is combined

with extensive periods of in-house training


and working alongside partner agencies to
ensure familiarity of partner requirements.
The resultant qualified officer has now
been adopted as a standard byAmbulance
Trusts, as well as some other contributing
agencies, to provide a fully multi-functional
adviser to Gold & Silver Commanders.
Personnel from the Joint Emergency
Services Interoperability Programme (JESIP)
and Emergency Services Collaboration
Working Group will also be available
to talk to visitors about co-operation
across the emergency services.

Emergency Services

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

TRAINING PROVIDERS
The Tactical Training Centre is a unique
firearms and multifunctional training facility,
working for and with the community,
protecting people. It provides UK curriculum
compliant training to the police, other law
enforcement agencies, blue light services
and the military. It delivers firearms, training,
coaching as well as advanced medical training.
Training4Resilience acknowledges that the
first step to becoming resilient is through
training and preparation. A recent project
of interest to counter terror professionals is
the School of Resilience and Emergency
Response: a collaboration between the Fire
Service College and Training 4 Resilience to
create an establishment for the delivery of
true wide spectrum multi-agency training; as
well as providing the capability to undertake
vertical training within individual agencies and
organisations to improve the overall skillsbase
and civil contingencies arrangements.
Mabway offers realistic training scenarios,
managed role-play services, security
protection and reality-based training.
The Emergency Planning College
deliversCabinet Office-approved emergency
planning and crisis management training
including real-time simulation exercises. It
also provides a central forum for knowledge
sharing and focuses on multi-agency
working, disseminating best practice
nationally and internationally to enhance
worldwide resilience against natural disasters,
major incidents and malicious attack.
WHERE AND WHEN?
The Emergency Services Show takes place
at the NEC in Halls 17 and 18 and outdoor
event area on the 23 and 24 September. It is
physically linked to Birmingham International
Airport and Birmingham International Station
with direct access to UK motorway network
and free visitor and exhibitor parking.
Suppliers of equipment of interest to counter
terror professionals including PPE, surveillance,
communications, first aid, IT and clean-up and
recovery services will be covered in the August
issue of Counter Terror Business together with
details of the free seminar programmes.
FURTHER INFORMATION
www.emergencyuk.com

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

57

Case Study

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

ISSEE - Consulting services in national security and


counter-terrorism to sovereign and commercial clients
Terrorism is designed to strike fear into
the hearts and minds of the population.
As terrorist organisations look to increase
an attack impact they are turning to
all means of mass transport to deliver
that terror. There have been noteworthy
examples in the past using planes, trains
and buses to target large numbers of the
public. This will continue and attacks will
vary from the simple to the very complex.
Governments responsible for protecting
their nation find that the requirement to
provide highly trained responders, capable
of dealing with the full terrorist arsenal
without excessive disruption to daily activity
or damage to property, becomes more
and more expensive and time consuming.
Maintaining skills acquired during training
is equally as important and a challenge,
particularly during periods of inactivity.
A sound counter terrorism development
philosophy is based on the overarching
strategic aim of building long-term
sustainable capability within an organisation
or nation. Underpinning this, the current
indigenous capability often requires a
transformational process to deliver a
revised, increasingly effective response.

A fully capable counter terrorism training


and services provider must be able to deliver
all these disciplines with confidence and
credibility. ISSEE is a world class capability
development provider. Its experience of
designing and operating intelligence-led
databases, investigating explosives and
ammunition incidents and its partnerships with
Portsmouth Universitys forensics department,
and several valued equipment providers, add
significantly to its training capability. ISSEE
continues to grow exponentially at its new

TRAINING

QUALIFICATIONS

DISPOSALS

Oxfordshire location. It delivers an expanded


portfolio of training courses, seminars and
conferences using staff predominantly drawn
from the UK MOD and the UK Metropolitan
Police Counter Terrorism arena. All have
extensive experience of operations in
urban and rural areas, cities and transport
infrastructure. The ISSEE pool of expertise is
rightly considered to be second to none.
Many commercial organisations claim
world-class status delivering training and
services to governments. ISSEE makes that
claim and will back it up through external
verification and accreditation of its training by
respected third party qualification awarding
bodies. Its training is measured against the
UK National Occupational Standards (NOS)
for Explosives and Search Occupations.
As a member of the both the UK Standards
Setting Board for the NOS and the Institute
of Explosives Engineers, ISSEE is an ideal
choice of a Capability Development partner
who can be trusted to provide the solution or
service to meet the most demanding threat.
FURTHER INFORMATION
Tel: + 44 (0) 1608 678382
www.issee.co.uk

CONSULTANCY

MENTORING

CONNECT WITH US:

/ISSEEUK
@ISSEEUK

PROFESSIONAL TRAINING AND QUALIFICATIONS IN ALL ASPECTS OF


COUNTER-TERRORISM, EXPLOSIVES & SECURITY TRAINING
Centre for Homeland Security
Talbot Hall
Tel: +44 (0) 1608 678382
Heythrop Park, Enstone
Email: admin@issee.co.uk
Oxfordshire, OX7 5UE
Web: www.issee.co.uk
United Kingdom

58

COUNTER TERROR BUSINESS MAGAZINE | Issue 22

SECURITY THREATS

Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

Written by David Thorp, managing director, the Security Institute

TIME TO ESTABLISH
A DIALOGUE WITH
THE PUBLIC?

The Security Institutes David Thorp examines todays


evolving security threats and how they affect the
security professions relationship with the public
Most members of the public have formed
robust opinions about security and the impact
it has on the micro level of their day-to-day
lives and on the macro level of national and
global threats. For a profession that seeks,
above all else, to serve the public and keep
them safe we should therefore enjoy a
robust and questioning relationship with the
general public, our ultimate end-users. Yet
there is little systematic research into public

on a par with respected disciplines like


medicine, the law or architecture. We miss the
opportunity to encourage young people into
the profession by failing to create awareness
of the intellectual challenges presented by
delivering security, or giving them a clear
insight into how it works. Furthermore, much
of what we within the profession
claim as an understanding of
public attitudes is based on
assumption rather than
rigorous interrogation
and analysis.

ed
Increas hreat
ft
levels o rrorism
from te e have
MEDIA AND
and crimin greater
THE PUBLIC
d
One of the key conduits
e
l
t
l
a
resu
hysic
p
to the general public
n
o
g
n
of course is through the
spendi curity by
media. In certain cases
se
s
t
en
it might be claimed that
governm
the media plays a large part

attitudes in areas such


as counter-terrorism,
cyber security, critical
infrastructure, invasive
technologies, organised
crime, ideologies, privatisation
of services, and so on.
As such we run the risk of failing to
garner public support for security; of failing
to present security as a professional discipline

in leading public opinion and


in shaping the policy responses that
ensue. From the professions point of view
then, a greater level of E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

59

Case Study

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

Radar technology meets operational needs with


Kelvin Hughes security and surveillance solutions
The security threats that governments and
other organisations face across the world
are evolving all the time both in terms
of targets and tactics. Whether controlling
borders, protecting CNI perimeters or
undertaking mobile surveillance, one thing
is certain. To meet the threats, you need to
maintain the very best situational awareness.
In order to meet changing security
challenges, technological development has
to be at the service of changing operational
requirements and budgetary pressures. For
example, the applications of conventional
radar technology had for many years
been either limited in their effectiveness
or far too expensive for anything other
than multi-million dollar projects.
As the nature of the security threat
changed, however, it became increasingly
clear there was a need for a radar system
that was both highly effective and
demonstrably affordable. The approach
taken by Kelvin Hughes in responding to
that need led to the development of the
companys SharpEye radar deployed on
their single mast solution, which integrates
advanced electro-optical technology.
With its pioneering, solid state technology,
SharpEye does not require maintenance

and provides low through life costs. The SxV


variant is a lightweight and compact security
radar system rendering it easily deployable.
Moreover, with its capacity to operate in
user-selectable X-Band frequencies and its
pulse compression and Doppler processing
of radar returns, SharpEye provides far
better suppression of clutter (caused, for
example, by adverse weather conditions)
and resistance to interference and jamming,
than other radars, ensuring the detection
and identification of the real threats.
The single mast solution is compact

and lightweight, enabling deployment in


multiple situations with a SharpEye SxV
radar, through mast pan tilt drive and
an electro-optical camera capability. A
critical infrastructure location surrounded
by a fence line can be protected with
360 degree radar and cameracoverage
either from a central single mast or at
optimum positions on the fence line.
For border patrols, radar and camera
can be mounted on a retractable single
mastfitted to a vehicle, enabling surveillance
to be conducted over a very wide area.
The key point here is the application of
technology to operational need. When
combined with the companys intuitive
CxEye control and display software, it
is possible to integrate the information
from multiple sensors into a single
displayand also feed into C2 or C4I systems
ensuring complete interoperability.
In other words, when the technology is
placed at the service of operational need, a
truly mobile situational awareness capability
can be made available, affordably.
FURTHER INFORMATION
Tel: +44 19 9280 5200
www.kelvinhughes.com

RADAR BASED SECURITY


EXTEND YOUR VISION
SxV X-Band Radar Integrated Electro-Optical Sensors
CxEye Display & Interface Single Mast Solution

surveillance@kelvinhughes.com
www.kelvinhughes.com
kelvinhughes

Kelvin Hughes Advert.indd 1

60

COUNTER TERROR BUSINESS MAGAZINE | Issue 22

SITUATIONAL INTELLIGENCE, THE WORLD OVER

5/11/2015 2:55:58 PM

SECURITY THREATS
engagement with the media and through
them the public would provide concrete
evidence of how the public perceives and
understands threats which will enable the
profession to develop effective communication
strategies for its dealings with the public.
And the security profession certainly
does have a strong basis for establishing a
meaningful dialogue with the public. One of
the words we use within the profession is
convergence, yet this means nothing to the
man or woman in the street. What they do
understand are specific threats that impact
on them and it should be possible to use
any of the risk areas below as the basis for
the kind of conversations that will transform
our relationships with the public at large.
CYBER SECURITY
Cyber security is something constantly
encountered by everyone and represents
the epitome of a target-rich environment;
individuals, organisations and government
institutions must negotiate a daily obstacle
course to avoid damaging attacks on
theintegrity of their data, their businesses
and their lives. Increasingly threats will
betargeted and customised. Cyber
security will be engaged in a perpetual
battle where it is either one step ahead or
one step behind the latest threats. Cyber
security brings risk into every home.
PHYSICAL WORLD THREATS
Physical world threats that have emerged
within the 21st Century are the proliferation
of affordable advanced technology,
theincreasing diversity of threats and the
globalisation of security threats. These
three have combined to make the world a
much smaller place than it was, with those
seeking to harm us often capable of doing
so hidden from our eyes and acting from
great distances. This represents a permanent
change to the nature of risk and requires
responses that the public must buy into.
Increased levels of threat from terrorism and
crime have resulted in greater spending on

physical security by governments. Alongside


this, governments are enacting legislation and
regulations which demand increased security
levels which further drive the adoption of
physical security across public, industrial and
business organisations. Some of this can be
intrusive in its application. We need the public
to appreciate what needs to be done and why.
The pressure on security professionals
operating in this environment of enhanced
and continuous risk will be enormous.
The bureaucratic constraints of their roles
will become increasingly challenging.
There will be new security frameworks to
operate within, an increasing burden of
legislation and regulation to be assimilated,
which will inevitably increase reporting
and compliance requirements rather than
lead directly to physical improvements in
security delivery. Effective support structures
will need to be built to enable security
professionals to continue to function
effectively. Put simply, we need all the
help and understanding we can get.
Managing the inevitable
convergence of these threats is
a complex challenge for the
security professional and the
support they will need from
professional bodies like
the Security Institute and
from education providers is
likely to increase in equal
proportion. But above all,
the profession will need the
understanding and support of
the public. A successful business
always listens and responds to
its customers. Security cannot afford
to be seen negatively by the public as a
necessary evil imposed upon them and must
instead be welcomed as a positive enabler
in their lives. A process that allows them
and their loved ones peaceable enjoyment
of all that our societies have to offer. L

Security Institute
Annual Conference
& Exhibition

Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

The Security Institute will be


hosting its annual conference and
exhibition, called the Security
Century, on 22 September
atthe Thistle Hotel in Marble
Arch,London.

This year the conference will focus
on how the practice of security
hasbeen transformed in the first
fifteen years of the 21st Century.
It will look at how technology
is enabling us to monitor and
modify behaviours and how the
accumulation of vast amounts
of personal data is allowing us
to drill down and identify trends
that enable effective security
interventions. It will look at how
the willingness of people to allow
their personal privacy to erode
is giving us behavioural
insights that are of
immense practical
value and how the
interconnected
nature of
society helps us
to spot security
threats and
address them
effectively.
The legislative
framework is
arguably more
favourable to security
interventions now than
it has ever been; regulation has
taken a number of steps forward
and the professionalisation of the
industry continues at a steady
pace. The outsourcing of security
from the public to the private
sector seems to begathering
speed, with all the opportunities
and challenges this entails.
Education is becoming an
increasingly important element
within the profession and we
are starting to see young people
attracted to a career in security in
greater numbers than ever.
The conference this year will
examine the changes that have
taken place to get us to where we
are today and critically review them.
Cyber security and digital threats
will be amongst the many key
challenges over the next five years,
as will the diversity of threats and
the need for integrated approaches
for dealing with them.
Visit www.security-institute.org
for further information on the
conference and exhibition.

l
Physica
world have
s that
menace in the 21st
d
emergey include the
Centur ng diversity
i
increas obalisation
and gl ecurity
of s
threats

FURTHER INFORMATION
www.security-institute.org

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

61

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

Abloy_Security_Ad_Feb2015-2.pdf 1 16/02/2015 09:14:21

Alert
C

CM

MY

CY

CMY

When door
security has
to work

For a more secure world

62

COUNTER TERROR BUSINESS MAGAZINE | Issue 22

www.abloy.co.uk

SECURITY SYSTEMS

CREATING ALERTS
THROUGH INNOVATION

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

Whether its protecting vital utilities such as water networks or providing


high-tech but easy to use security for large shopping centres, Alert Innovation
is a recognised industry leader in UK counter-terrorism security systems

record activity and analyse the data collected


which is relayed to South Staffs control centre.
The software is designed to manage out
false alarms which again save considerable
operative and management time, and
ultimately costs.

Alert Innovation is a UK-based company with


decades of experience in software innovation,
hardware design, manufacturing, installation
and maintenance. And its proud of its strong
track record of providing quality, high-tech
security solutions for a wide range of clients.
In particular its First Alert and Shop Alert
systems offer unrivalled peace of mind for
utility companies and large retail outlets.
FIRST ALERT
The need to protect the UKs water supply
has never been greater. First Alert is a Home
Office (CPNI) approved system which provides
unique intruder-detection way above the
standard commercial application. It delivers
dependable, fast-acting response to security
breaches, even in the most challenging of
environments. Importantly, it also meets
Association of Chief Police Officers (ACPO)
guidelines to achieve a guaranteed police
response. Providing a false-alarm free system
capable of Sequential Confirmation on an
average commercial building is reasonably
straightforward - on a reservoir its far more
challenging.
However, the First Alert system is a
respected, proven, robust and effective
solution that has been installed across
many of the UKs most inhospitable and
environmentally challenging utility sites. Most
recently First Alert successfully completed the
installation of CPNI-approved and EN50131

compliant electronic hatch protection


systems at 14 underground drinking water
reservoir sites across the Midlands for South
Staffs Water. First Alert won the 27 month
contract following competitive tender, and in
addition to the installation, provides ongoing
maintenance and proactive false alarm
management support.
Kate Wilkes, Resilience and Security Manager
at South Staffs Water, said: First Alerts
approach to our project was very refreshing,
from being awarded the tender right through
to the system going live and beyond. There
were a number of unforeseen challenges that
could have potentially incurred additional
costs but this was factored in by First Alert so
we havent had any nasty surprises.
Established twenty-years ago, the First Alert
product, developed and manufactured by
Alert Innovation, has drawn on its extensive
experience from the retail and manufacturing
sectors to create cutting-edge water facility
protection solutions. When the company first
entered the water facilities sector it initially
partnered with Cambridge Water to develop
intelligent security systems that could be
fitted to existing telemetry infrastructure. In
addition to providing more exacting data First
Alerts systems are extremely reliable and
achieve considerable cost savings as new and
expensive cabling is not necessary.
The systems use sophisticated sensors
supported by a bespoke software package to

SHOP ALERT
Shop Alert provides the ability to communicate
instantly with retail units and has become the
tool of choice for the management of many
shopping centres throughout the UK.
It offers speedy, secure and robust majorincident management but most importantly
its easy to use. There are huge challenges
facing owners and managers of crowded
places in co-ordinating their resources in
the event of a major incident such as a
terrorist attack. The dreadful scenes in the
Nairobi shopping centre in Kenya heightened
awareness of the possibility of a firearms
terrorist-attack in a UK shopping centre.
So the ability to provide bespoke and
detailed instructionsinstantlyto the till point
of each individual retailer greatly improves
the flow of information for managing safe and
effective evacuation.
The increased use of IP networks in shopping
centres, and the introduction of the all-new
Shop Alert 20 20 touch screen keypad, has
also enabled the system to evolve with a new
suite of apps with real operational, marketing
and enhanced-security benefits. Whilst
not compromising the proven operational
simplicity that has been the cornerstone of its
success, Shop Alert 20 20 provides a platform
for the provision of tailored solutions to a
whole new range of security, operational,
marketing and commercial requirements.
Unlike most of the cellular, smartphonebased communication systems, Shop Alert
cannot be turned off, run out of charge, be
left at home, lost, stolen, leave with an exemployee, affected by poor coverage or turned
off in a bomb-threat situation. It also cant
forward sensitive communication to social
media sites via the same device.
When an emergency communication system is
susceptible to all these scenarios, then can it
really be classed as smart?
Shop Alert is a simple, speedy, secure and
robust major-incident management system. L
FURTHER INFORMATION
www.alertinnovation.co.uk

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

63

foster+freeman
IMPROVING THE QUALITY OF FORENSIC EVIDENCE

Forensic level inspection systems


to counter the serious terrorist
threat caused by the rampant
use of counterfeit & stolen travel
documents.
During recent years a number of high profile
terrorist attacks have involved the use of fake
and/or stolen passports.
Foster + Freeman systems provide a comprehensive
solution for the verification of passports and ID
cards, the detection of alterations and counterfeits,
and the inspection of standard and advanced
security features.
Existing customers include airports, security forces,
immigration controls, banks, police & government
forensic laboratories worldwide.

fosterfreeman.com

Visit fosterfreeman.com to find out more about our


complete range of document examination solutions,
from frontline scanners to forensic inspection systems

Foster+Freeman Ltd | Tel:+44 (0)1386 768 050 | email: sales@fosterfreeman.com

EVENT REVIEW

A FIELD DAY
FOR FORENSIC
PROFESSIONALS

Forensics Europe Expo 2015 at Olympia, Londonfurther


cemented its position as the premierinternational exhibition and
conference for the entire forensic sector and supply chain
This years show ran alongside Counter
Terror Expo and Ambition the EPRR show.
Nearly 2,000 attendees from the public and
private sectors made the visit to see the
latest in forensics solutions and investigative
techniques. There was a significant increase
in private sector representation, with fraud
and digital forensics professionals from the
likes of Yahoo, Deloitte, JP Morgan, BT, IBM,
RBS and Blackberry to name just a few of
those who made the visit. There was also
significant representation from Police
forces from across the UK as well
asoverseas.
The exhibition featured
over 80 exhibiting
companies showcasing
some of the latest
technology available
forlabs, digital
and crime scene
investigations. Highlights

included Cellebrites UFED Touch Ultimate a


mobile phone data extraction tool, made famous
for its use on the BBC drama The Fall the kit
is widely used by law enforcement authorities
throughout the world to extract data from
mobile phones during criminal investigations.
There were several product launches,
including Amped Softwares launch of
Authenticate, a software package for forensic
image authentication and tamper detection
on digital photos. The software can determine
whether the image is unaltered or
has been manipulated with
photoediting software which
means it may not be accepted
as evidence. In addition,
the camera ballistics
in Authenticate can
determine which specific
device not just a make
or model was used to
generate the image.

nal
Additio was
is
emphasn digital
o
placed , looking at
s
forensic ts of mobile
elemen , computer
phone cs to help
forensi serious
solve e
crim

CRIME SCENE TO COURT ROOM


Running alongside the exhibition was the
high-level conference, run in partnership with
the Chartered Society of Forensics Sciences.
The conference promised to take delegates
on a forensic Journey, from Crime Scene to
the Court Room. The conference programme
ran as a single stream, split into key areas of
forensics including Forensic Investigations and
Innovations, Forensic Labs and Analysis and
Digital Forensic Investigations.
Several leading industry thought leaders
spoke at the conference. Jan Garvin, Executive
Director, Law Enforcement & Emergency
Services Video Association (LEVA) and John
Kennedy, Head of Digital Forensics, Key
Forensic Services looked at Digital Video
evidence in their session. They provided
insights to some challenging cases where
forensic video analysis provided investigators
with valuable leads in the early part of the
investigation, culminating in early arrests and
the presentation of powerful evidence before
the Jury.
Kristiina Reed, Barrister, 6 Pump Court
Chambers, explored the role of the expert
witness in the court room. One of the
areas covered were the changes in the law
governing expert witnesses, which included
expert witnesses involved in legal proceedings
no longer enjoying protection from liability
fornegligence.

Forensics Europe Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

DIGITAL FORENSICS
With increasing concerns about Cyber
Terrorism and crime, digital forensics was
one of the cornerstones of the conference.
Large multi-national organisations are finding
themselves increasingly in the E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

65

FPA Fire and Forensic Investigation Services


The Fire Protection Association offers a range of specialised Fire and Forensic Investigation Services.

Post-loss investigation,
fire reconstruction & investigation
Our new fire testing facilities, combined with our experienced technical

staff makes the FPA one of the UKs leading fire testing establishments,

incorporating post loss investigation, fire reconstruction and fire investigation,


utilising our extensive range of measurement and data capture instruments.

We are also able to support our investigations and experiments with thermal
imaging, video and photographic evidence.

For more information, email technical@thefpa.co.uk

Fire Expert Witness


Our expert fire witnesses can provide a variety of services should a dispute
arise in relation to events surrounding a fire or the design of fire safety

measures. We are able to assess evidence and provide expert opinion in

either civil or criminal court. Acting independently or as part of a specialist


team we can assist in determining the origin and cause of a fire.

For more information, email technical@thefpa.co.uk

Level 5 Certificate in Fire Investigation


This in-depth course identifies the roles within fire investigation, the legal
powers and responsibilities involved, the importance of audit trails and

exhibits. Using our purpose built facility the FPA is able to offer a realistic
environment to set up a variety of fire scenarios. Expert fire investigators

and barristers-at-law provide an extensive range of fire investigation training


capabilities and expertise to complement the world class practical facilities.

For more information, email training@thefpa.co.uk

If youd like to discuss in detail the options open to you,


call us on 01608 812 500 or visit our website www.thefpa.co.uk
THE UKs NATIONAL FIRE SAFETY ORGANISATION
Protecting people, property, business and the environment

EVENT REVIEW
cross-hairs of criminals. James Campbell,
Cyber Threat & Detection Response at
PriceWaterhouseCoopers, discussed how
multinational companies should best prepare
themselves. He highlighted what an intrusion
looks like, how to identify cyber-attacks and
how quickly an attack can escalate.
Forensics Europe Expo also ran alongside
two co-located events, Counter Terror Expo
and Ambition the emergency preparedness
response and resilience event. The decision
to co-locate the events reflects the growing
importance of multi-discipline forums, whereby
professionals involved in law enforcement,
security and emergency planning come
together to explore the wider issues faced.
Counter Terror Expos Cyber Threat Intelligence
theatre served to provide a 360 degree view
of the threat faced, whilst many topics in
the Forensics Conference explored how to
investigate such incidents should they occur.
Rob Lozowski, event manager said of FEE
2015: The event exceeded all expectations,
we saw a record amount of visitors come
through the doors and crucially exhibitors
met the right people meaning real business
was being done on their stands. Weve got
lots of exciting developments lined up for the
2016 edition of the show which we will be
announcing over the coming months.
FORENSIC SEMINARS
The expo hosted a free-toattend complete
seminar theatre programme running
throughout the two days of the show.
The programme was carefully constructed
to demonstrate the latest case studies
and showcase the latest products and
services available to the market.As a
visitor, this proved to be a must attend
opportunity to help compare and contrast
top international suppliers and to cross
share knowledge between sectors that
may not normally meet under one roof.
Day one opened with a seminar
by Steve Graham on digital imaging
capture processing and outputs. Graham,
Investigations Managerat the Health and
Safety Laboratory, explained how laser
scanning can uncover how events leading
to an accident may have unfolded, and
commented on the development of remote
aerial video and toxicological monitoring.
Following this, Dr Sabine Altermann, from
LECO Europe, addressed the detection of
legal highs and other drugs of abuse, whilst
in the afternoon Mick Gardiner, of Gardiner
Associates Training & Research, shed some
light on fire investigation training and
accreditation. The second day consisted of
Microsystemations Paul Baxter speaking
on the future of mobile forensics, Amped
Softwares Martino Jerian discussing image
and video tampering detection and Gary
Howard, Managing Director at Complete
Forensics C.I.C, presenting on forensic science.
Forensic science is all over the TV, from
Sherlock through to CSI Miami. The world

is flooded with flashy marketing from


the best drama writers in the word. The
people who watch these programs want to
work in the sector and are being pushed
into courses that are not accepted by
employers. Those roles that traditionally
did not require a degree to start are now
attracting graduates pushing non graduates
out of the marketplace. Whats the answer?
Vocational training or more graduates? Gary
Howards session explored the options
available and informed delegates on how
forensic science is an attractive choice.
THE FORENSIC JOURNEY
Forensic Investigations are at the beginning
of a forensic journey and were explored to
see how forensic science is used by law
enforcement professionals and forensic
military professionals when a serious
crime scene unveils. Understanding how a
crime scene is looked at and how evidence
is collected and taken in is crucial for
professionals within law enforcement,
laboratory specialists and criminal lawyers
working within the next stage of the process.

the complicated scenario of vehicle forensics,


which is a process that yields a myriad
of data potentially helpful to all kinds of
investigations, from law enforcement cases, to
insurance fraud, to accident reconstruction.
Many newer vehicles (generally 2008 and
newer) are equipped with an infotainment
system. Drivers will often sync their
smartphone to that infotainment system
to charge the phone, to make Bluetooth
calls, or to have access to their music. In the
background, these systems are sucking in
all types of personal user data. Depending
on the system, this recoverable data can
include device IDs, call logs, text messages,
contacts, emails, and even photos. Berla
highlighted that a very important note should
be made that if a phone has accepted the
trusted certificate from the vehicle, any
phone data transferred to the infotainment
system can be recovered, even if the phone
itself hasa passcode. This is helpful to
investigators who do not have access to the
passcode, but do have access to the vehicle.
The system records the serial number of any
device connected to it (phones, media players,

Forensics Europe Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

James Campbell, Cyber Threat & Detection


Response at PriceWaterhouseCoopers,
highlighted what an intrusion looks like, how to
identify cyber-attacks and how quickly an attack
can escalate
Forensics Europe Expo will host a free to
attend session featuring a Live Crime Scene to
help you learn in an interactive way.
Following on from when evidence is
collected and transported to the appropriate
place, the event targeted exploring the latest
innovations available to analyse evidence,
including lab analysis. Prior to the evidence
being used in a criminal matter, all evidence
is analysed to the highest degree. Forensics
Europe Expo staged senior experts within
forensic analysis and allowed them to share
their latest findings and recommend best
available techniques. Understanding how the
evidence is collected and analysed is crucial
to professionals working within the law sector
to help build a much more solid case in court.
For 2015, additional emphasis was placed
on the world of digital forensics, looking
at elements of mobile phone, computer
and general system forensics to help
solve serious crime. With the rise of crime
carried out with the use of the internet,
visitors learned about the best available
systems to stop hackers, ways to monitor all
activity and how they can use the devices
to provide evidence in the court room.
VEHICLE FORENSICS
Berla were one of the most prominent
exhibitors at this years show and explained

USB drives, SD Cards, etc), providing another


link between a suspect and their property.
If an infotainment system has navigation,
GPS data can be acquired as well. The
examiner will be able to view trackpoints,
tracklogs, saved locations, previous
destinations, and active/inactive routes. Events
are another critical piece of information.
Some of the events that are recoverable
include doors opening/closing, lights
turning on/off, Bluetooth connections, Wi-Fi
connections, USB connections, odometer
readings, GPS time syncs and more.
Berla then explained how this evidence
is accompanied by geolocation data and
timestamps, which is an incredibly helpful
feature. It allows investigators to paint a
detailed picture that shows exactly what
happened in an accident or crime.
LOOKING TO NEXT YEAR
Forensics Europe Expo 2016 will take
place between 19-20 April 2016 in
Olympia, London. The 2016 event promises
to be bigger and better with over 100
global exhibitors showcasing their latest
innovations to an audience of senior buyers
andspecifiers.L
FURTHER INFORMATION
www.forensicseuropeexpo.com

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

67

An Excelitas Technologies Company

Global Presence...
...Far Reaching Capabilities
Image intensified sights
Thermal sights
Fused sights
Defence modules
Avionic optical displays
Tactical infra red
Space applications
Integrated logistic support

Qioptiq
phone: +44 (0)1745 588000
www.qioptiq.com
FOR THE LATEST INFORMATION
VISIT:

www.qioptiq.com

PHOTONIC PRODUCTS

OPTICAL EXPERTISE
ENABLES MISSION
SUCCESS TIME AFTER TIME

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

Qioptiq designs and manufactures photonic products and solutions that serve a wide range of
markets and applications including defense and aerospace, and research and development
Qioptiq, an Excelitas Technologies
company, designs and manufactures
photonic products and solutions that
serve a wide range of markets and
applications in the areas of medical and
life sciences, industrial manufacturing,
defence and aerospace, and RandD.
Innovation has long been recognised to
be a key attribute of the success of Qioptiq
along with highly skilled and motivated
engineers and designers who are customer
focused. With world-class capability
in design, coupled with international
award winning technical achievement,
Qioptiq has demonstrated repeatedly an
ability to convert technical innovation
into producible cost-effective designs.

NEW PRODUCT DEVELOPMENT
Where the war-fighter is concerned Qioptiq
has long recognised that new product
development is crucial in maintaining the
capability of a decisive fighting force. For
the Special Operations element of that
force ensuring mission success through
innovative technology applications is
vital especially as operations shift from
Afghanistan and previously Iraq to new
territory and an adaptive evolving enemy.
To stay ahead constant innovation, research
and technology is important, allowing engineers
to consider the challenges of tomorrow and
respond through an innovative approach. With a
number of potentially revolutionary capabilities
emerging as key enabling technologies the
roadmap for Surveillance, Target Acquisition
and Engagement is becoming increasingly
interesting - with significant enhancements
in sighting system capability through
technology evolution and deeper integration.
Craig Taylor, Marketing Communications,
Defence and Aerospace, Qioptiq, commented:
Capturing new technological developments
and successfully exploiting them is not a
new concept. However, what is important is
constantly considering new opportunities and
adapting our approach. In a changing market,
whats important for our customers is our
ability to deliver world-leading products that
are effective, efficient and adaptable. In an
environment of constrained defence spending,
cost effectiveness is also a key consideration.

Financial constraints in any industry mean


time and money allocated for product design
and development come under pressure.
However the Special Forces community
still need to procure new and specialised
equipment as they seek to source gamechanging technology. Qioptiq therefore has
an important role to play in continuing to
push the boundaries of Weapon Sights and
Surveillance Equipment for end-users with
some significant product and technology
development activity coming to fruition.
Its widely recognised that modern small
arms weapon systems are incredibly accurate
and reliable, and that the challenge is being
able to DRI the target 24 hours a day, through
all weathers and battlefield conditions, with
users under physical and cognitive pressure.
Sighting Systems need to be easy to use,
effective through all weathers and provide
the ability to detect targets at the maximum
range possible in order to prepare the User
for the next course of action. The challenge
for Qioptiq is to provide all of this capability
to the User in a package (or suite) that is
easy to use and easily configurable for role
/ mission requirements, whilst remaining
affordable and having the potential to
endure a service life of 10-15 years.
Steve Rickard, Qioptiq Business and
Product Development manager Qioptiq
are totally committed to reducing the size
weight and power burden placed on the
end user developing the battle winning
equipment, while maintaining affordability.
We will continue to develop, push forward
and challenge the boundaries to ensure
we always stay one step ahead
When considering soldier and vehicle
systems, one is likely to find high performance
optics from Qioptiq enabling thermal weapon
sights (TWS), observation and targeting sights,
night vision goggles (NVG), remote weapon
stations (RWS), drivers vision enhancement
(DVE), situational awareness (SA), laser
designators, eyepieces, helmet mounted
displays (HMDs), fire control, and laser range
finders (LRF). In tactical missile systems one
finds advanced domes from Qioptiq in a wide
range of materials including ALON, Spinel,
Sapphire, MgF2, ZnS, Cleartran, Silicon, and
Germanium with complex geometries. missile

warning and targeting systems are enabled


by Qioptiq High performance optical systems
for IR and ultraviolet missile warners (MWS),
IR countermeasures (IRCM), IRST, targeting
pods -along with precision long-range zoom
modules for border-surveillance, UAV and
maritime applications in surveillance systems.
Qioptiq provides solutions to meet the
individual requirements of its customers.
Outstanding expertise has earned the company
a worldwide reputation for innovation
and excellence. Qioptiq has a complete inhouse capability to process the full range of
optical materials and to design, fabricate,
polish, coat, and mount optical elements.

A FLEXIBLE APPROACH
A flexible approach during design is matched
with the capability across the visible to IR
wavebands, providing integrated optical
solutions with any sensor technology currently
available. With a combination of dynamic
engineering, manufacturing expertise,
motivation and reputation, Qioptiq has the
total capability to provide some of the most
innovative and focused optical solutions to
todays technological challenges. This strategic
approach has made Qioptiq the preferred
choice for a wide variety of prime contractors
and military establishments around the world.
From boots on the ground to eyes in the
sky Qioptiq capabilities are enabling mission
critical systems and platforms in some of the
harshest environments on the planet. L
FURTHER INFORMATION
www.qioptiq.com

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

69

DEFEND PROTECT SECURE

Copyright HESCO 2015

hesco.com

RAPIDLY
DEPLOYABLE
AND READILY
AVAILABLE

UTILISING MILITARY
EXPERTISE TO
DEFEND BORDERS
AND PROTECT
PEOPLE AND ASSETS

When selecting the appropriate


solutions for defending border
lines and creating managed
access points, there are many
uncontrollable variables to
contend with; from location and
time constraints to the safety
of personnel.

GROUNDWORK

Add to this the complexity and


diversity of threats; the continuous
risk to national security and array
of unpredictable challenges;
its imperative you have the
confidence that your chosen
solutions are up to the demand.

For perimeter protection, HESCO


TERRABLOCKTM is a rapidly deployable,
ground mounted security barrier.
Available at three and four meter
heights, this hostile vehicle mitigation
solution doesnt require foundations
and can stop a 6,800kg vehicle attack
travelling at 40mph. With no digging and
no concrete, TERRABLOCK is as easy to
remove as it is to install.

With Hesco, you can stand strong


in the knowledge that your
countrys borders are protected by
the best.

Rapid perimeter protection can often


require extensive groundwork, relying on
embedded foundations to absorb impact
of an attack. These systems can become
costly and time consuming, especially
when covering vast areas of harsh
ground or desert.

Groundwork can also be an issue


when creating sentry observation
points. Combining extruded alloy
components and renowned HESCO
Defensive units, our Elevated
Sangars extend platforms to over
three meters above the ground
and provide observation decks for
security personnel.
LOGISTICS
When faced with creating miles of
ballistic protection, HESCO RAIDTM is
able to deploy over 1,000 feet of 2.2
meter tall blast mitigation barrier in
under 60 seconds.
RAID utilizes a specially designed
and engineered ISO container,
with purposely designed release

GROUND MOUNTED BORDER


CONTROL AND STRUCTURES
mechanism to allow rapid
deployment of pre-joined standard
or recoverable units, able to cover
undulating ground and create
curves and corners.
Unused barrier can be secured in
the container and stored for later
use, and an empty ISO container
can be transformed into storage
shelters using a combination of
HESCO MIL units and our Light
Weight Bunker Roof.
PERSONNEL PROTECTION
Hesco Accommodation Bunkers
(HAB) have been developed
to offer a safe haven to those
located in remote and austere
locations. HABs provide enhanced

ballistic protection from indirect fire


and side walls are made of specifically
engineered Concertainer units, offering
proven protection from weapons
systems up to and including large
mortar rounds. A specifically engineered
roof structure is provided to combat
the effects of indirect fire weapons
and using specially engineered lining
kits HABs can be transformed into
a hygienic base for medical use, all
without compromising on security and
protection.
CHECKPOINTS
HESCO Guard Post Kit is delivered
on a single pallet for ease of storage
and transport, and enabling the quick
construction of checkpoints. For

personal protection against ballistic


threats, HESCO Ballistic Inserts
provide low visibility, ballistic
resistant body plates, engineered
to be lighter and thinner without
compromise on protection and
designed for active shooter
situations.

Find out more about our solutions


and services.
Email: info@hesco.com
Call: 0113 248 6633
Online: www.hesco.com

INNOVATION WITHOUT
COMPROMISE

T800

Fully Rugged Tablet

Wheres
your office?
MOD/Cpl David Rose

Contact us:

Visit us @
STAND

Getac UK Ltd
Mitac House, Nedge Hill,
Telford, TF3 3AH, UK
E: Sales-Getac-UK@getac.com
T: +44 (0)1952 207200

S9
207

www.getac.com

STRATEGIC DEFENCE REVIEW

Britain warned it must commit to


two per cent GDP defence spend
Britain has been warned by a number of
defence experts, senior Tory MPs and the US
that it must commit to the NATO target for
minimum defence spending of two per cent of
GDP. The Conservative party manifesto didnot
include a pledge to meet the two per cent
target, instead opting to postpone the decision
until a spending review later in the year.
In a foreword to the latest UK National Defence
Association report, former RAF head Sir Michael
Graydon addressed David Cameron, saying
that the Prime Minister must commit to the
minimum spending target. He wrote: The Prime
Minister has now an opportunity to do what he
and the other major party leaders felt unable
todo in this election campaign, namely to repair
the damage done to our defence andsecurity
in recent years and to our reputation as a
serious contributor to world security.
He can start immediately, by endorsing
the House of Commons defence committee
report of 17 March this year Rethinking defence to meet new threats,
and in a simple statement make good his
commitment to the NATO minimum of
two per cent of GDP. It is an opportunity
which any prime minister who aspires to be
remembered as a statesman should take.
Julian Lewis, a senior Conservative MP
and candidate to be the chairman of the
defence select committee, shared Graydons
concerns regarding defence spending.
Lewis described the current spending as a
scandal, condemning the fact that the
UK is struggling to reach the two per cent
minimum when it should be exceeding it.
Colonel Richard Benyon and Bob Stewart,
two Tory MPs also running for the position
of chairman, have also voiced concerns
over the governments failure to commit
to a minimum spending target.
Benyon claims that Britain will not be
prepared to address the threats it faces
without meeting the target, he said: I think
that we have to look at one of the most
dangerous scenarios our country and its
interests have been in for a very long time.
There is a crescent of instability from North
Africa, through the Middle East and up to
Eastern Europe and its border with Russia.
We have made a virtue of the fact we
are currently spending the Nato minimum
threshold of two per cent of GDP. I do not
see how we can address the threats we
face without sticking to that figure.
Stewart has warned that not meeting the target
could damage Britains special relationship
with the US. His concerns stem from the head of
the US Army and US President Barack Obama
urging Cameron to commit to the spending
target, fearing that by not committing the
UK are setting a damaging example to other
European countries. Additionally, US defence
secretary Ashton Carter has said Britain will be
diminished if it fails to commit to the target and
risks becoming disengaged from the World.

UK forces take part in NATO


Allied Shield Baltic exercises

Prime Minister
David Cameron

DB News

THE BUSINESS MAGAZINE FOR DEFENCE www.defencebusiness.net

UK Royal Navy and Army units


will join thousands of personnel
from NATO member and partner
nations, collectively named Allied
Shield, to participate in four joint
military exercises in June 2015.
The Allied Shield exercises will
take place in Eastern Europe and
the Baltic states, with the UK taking
part in two of the four exercises,
Baltops and Saber Strike.
Baltops is a US led maritime and
amphibious warfare exercise taking
place in the Baltic sea around Poland. It
will begin on 5 June and involve 4500
personnel, 47 ships, and 49 aircraft
from 17 nations. The Royal Navy will
deploy HMS Ocean, a helicopter carrier,
and HMS Iron Duke, a Type 23 frigate.
The exercise is designed to practice a
range of capabilities, including antisurface, anti-air and anti-submarine
warfare, mine countermeasures,
and amphibious landings.
Exercise Saber Strike will be
conducted on land in Poland and the
Baltic states of Lithuania, Latvia and
Estonia. The exercise is also US led
and will see 3000 personnel conduct
joint infantry and close air support
exercises. The British Army will supply
around 170 soldiers for the exercise,
due to take place on 8 June.
The participation of British forces
in the Allied Shield exercises is
part of the UKs contribution to
NATOs Assurance Measures,
established May 2014 as a part of
the NATO Readiness Action Plan.
READ MORE:

tinyurl.com/mw744zy

US Defence Secretary
Ashton Carter

Carter told BBC Britain: My message to my


colleagues in London like to all the other
capitals of the Nato countries is to stick to the
pledge they all made, which was if they were
below two per cent to achieve three per cent.
Britain has always had an independent
ability to express itself and basically
punch above its weight. Id hate to see
that go away because I think its a great
loss tothe world when a country of that
much history and standing takes actions
which seem to indicate disengagement.
We need an engaged United Kingdom.
Former NATO general secretary Anders Fogh
Rasmussen has also spoken out, telling BBC
Radio 4 that he is confident Britain will not
drop below the NATO minimum, after Cameron
showed support
for the target
READ MORE:
tinyurl.com/mw744zy
in the past.

Medical advances save


over 500 troops from
lifethreatening injuries
New research suggests improvements
to care have saved an estimated 572
British troops from injuries in the Iraq
and Afghanistan conflicts which the
NHS would deem as life threatening.
38 actually survived injuries which the
NHS would consider un-survivable.
It is believed that advancements in
the speed of helicopter evacuations,
field-hospital equipment and the skill
of British surgeons and nurses have
greatly improved survival rates in the
military across the two campaigns.
Conducted by Navy Surgeons
and academics at the University
of Birmingham, it is the first
study to examine survival in UK
troopsduring the sustained period
of combat over the last decade.
READ MORE:

tinyurl.com/oukvz2y

Issue 12 | DEFENCE BUSINESS MAGAZINE

73

Rangemaster Precision Arms Limited and RPA Systems Limited are two
British companies dedicated to providing the best Small Arms products in
the world. We have recently introduced the new ULTRA series of 7.62mm
x 51 and .338. Both these chassis systems incorporate our prize winning
Quadlock action and utilises the optimum technology to ensure supreme
accuracy and durability.
Rangemaster has also recently
redesigned its well-respected
50 cal Heavy Sniper Rifle. We have
successfully maintained the accuracy
and low level of recoil, whilst achieving
a general redesign to save weight.
We have successfully introduced a
12.7x108 Soviet Ammunition version
of our rifle.
RPA Systems Limited has recently introduced a new range
of lightweight tripods for both Small Arms and Laser
Targeting, incorporating RolaTube.
We have additionally secured funding from the European
Community Grant Scheme to enable our company to
commence manufacturing precision
rifle and gun barrels.

See you at DSEI 2015 Stand N6-376


Website: www.rangemasterprecisionarms.com
Email: info@rangemasterprecisionarms.com
NCAGE KB612

SATELLITE COMMUNICATIONS

MILITARY SPENDING

USAF approves SpaceX


for US military launches

Poland increases
spending to meet
NATO target

The US Air Force has certified the private


company SpaceX, founded by entrepreneur
Elon Musk, to launch military and spy
satellites, after two years of intensive reviews.
This move opens up the market which has
been a monopoly for a joint venture between
Boeing and Lockheed Martin until now.
Musk said the decision was an important
step toward bringing competition to
national security space launch.
The US military has been relying on
Russian built engines for space launches,
which US lawmakers have outlawed from
2019 for launches. The certification of
the SpaceX Falcon 9 rocket will provide
a viable alternative ahead of the ban.
Air Force Secretary Deborah Lee James
said: This is a very important milestone
for the air force and the Department of
Defense SpaceXs emergence as a viable
commercial launch provider provides the
opportunity to compete launch services
for the first time in almost a decade.
Space X could have a chance to

Poland will increase its defence budget by


18 per cent, achieving the NATO minimum
spending target of two per cent of GDP.
The Polish Parliament agreed to meet
NATOs target from 2016 onwards, with
a large majority vote of 402-2.
Currently only America, Britain, Estonia
and Greece meet the two per cent of GDP
target, with Britain not yet committing
to meet the target until 2016.
The decision has been influenced by
Russias actions in Ukraine and a lack of
US military presence in the country.
Defence consultant Marek Matraszek said:
Other countries in Nato benefit from the
presence of US troops, so feel less of a need
to increase their budgets, Poland doesnt have
the security of a permanent US presence.
He added: Fundamentally what the
government is trying to do is give Poland the
assets to in the worst case scenario hold
off Russia until
READ MORE:
Nato forces can
tinyurl.com/qz9hewa
be deployed.

bid for the militaries new GPS


satellite
READ MORE:
launches as early
tinyurl.com/puqv8rb
as July 2015.

AIRCRAFT

DB News

THE BUSINESS MAGAZINE FOR DEFENCE www.defencebusiness.net

IRAQ

British forces
continue air
strikes in Iraq

MOD invests 80 million in


helicopter training equipment
The Ministry of Defence (MOD) is investing
80 million in new helicopter simulator
equipment to help train the Royal Air Force
(RAF) and Royal Navy pilots and rear crews.
The equipment will allow personnel to
train in a realistic operating environment,
enabling them to repeatedly practice
manoeuvres and procedures safely.
As a part of the 80 million investment,
a 51 million contract was signed with
Lockheed Martin to support Chinook Mk 6
training. The Chinook 6 simulator will be
based at RAF Odiham in Hampshire and
housed in a purpose built facility. It will
include two flight deck simulators as well
as a rear deck training device and a suite
of computer based training facilities.
A further 29 million has been awarded
to AgustaWestland to provide Merlin Mk

4/4a aircrew Synthetic Training Devices,


which will be located at the RNAS Yeovilton
in Somerset, the main operating base
for the Merlin Mk 4/4a helicopters.
Air Vice-Marshal Julian Young, Director
Helicopters at the MODs Defence
Equipment and Support organisation,
said: Simulation is a solution that, when
blended with live flying events, provides the
optimum individual and team-level training.
Although it can never replace live training
fully, being able to create a wide variety of
training scenarios and operating settings
can provide a more challenging, safer
and controllable environment to help our
forces practice in a way that is essential
to effective
READ MORE:
mission
tinyurl.com/puqv8rb
preparation.

British military forces have continued to play


a significant role supporting the Iraqi forces
fighting ISIL terrorists, providing extensive
training programmes and launching air strikes.
On 24 May, a Reaper destroyed an
ISIL armoured vehicle that was in close
combat with Iraqi forces in the west of
the country. Reapers then provided
surveillance support to four successful
strikes by coalition aircraft on ISIL buildings
and a bulldozer packed with explosives.
In the same area, on 22 May, a Reaper
successfully engaged terrorists, preventing
the burying of improvised explosive
devices next to a road and supported
a strike on an building held by ISIL.
In addition to air strikes, a team of British
military instructors are making progress
training Iraqi and Kurdish troops to meet the
threat of improvised explosive devices. These
devices have become a common weapon
used by ISIL, which are left as booby-traps and
impact the day-to-day lives of Iraqi civilians.

READ MORE:

tinyurl.com/mdz9b6v

Issue 12 | DEFENCE BUSINESS MAGAZINE

75

PERSONAL
RECONNAISSANCE
SYSTEM

PD-100 Black Hornet PRS


is the smallest operational
unmanned system in the world
and has been used extensively in
combat operations by NATO forces
over the past few years. The system is
described by its users as a Game
Changer and a Life Saver,
and has created a new
standard and class for the
smallest UAS.

DSEI 2015

THE BUSINESS MAGAZINE FOR DEFENCE www.defencebusiness.net

to that posed by the lone wolf. There has


never been a greater need for an integrated
approach to the acquisition and deployment of
defence and security assets in the land, air and
maritime environments and to the rationale
that guides them. DSEI 2015 will provide a
platform that meets all these imperatives.

EVENT PREVIEW

THE EVENT
FOR DEFENCE
PROFESSIONALS

Whil
major ne
market ew
emerge s have
is still a d, Europe
player i significant
n
procuredefence
m
and sup ent
ply

Defence and security through partnership and co-operation will be


an over arching theme of DSEI 2015, the flagship event for the
defence and security community taking place this September
Defence and Security Equipment International
(DSEI) is the worlds largest land, sea and
air defence and security exhibition. The
event, which takes place at ExCeL London
from 15-18 September 2015, will feature a
record 1,500 exhibitors providing a global
showcase of innovation, seminar theatres
offering free educations sessions and over
40 international pavilions. There will also
be an impressive display of waterborne and
unmanned system demonstrations, as well

COMMUNITY
DSEI attracts the largest international
community from defence and security
sectors. The last event, which was held in
2013, attracted over 32,000 visitors, 156
programmed delegations from 56 countries
and over 2,800 global VIPs who met with
1,489 exhibitors from 54 countries. The 2015
event is being planned as a forum where
top figures from established and emerging
nations in the defence community will
be invited to describe how co-operation,
ranging from joint operations to strategic
alliances, is transforming the ability to
counter threats to peace and security.
Many delegates use their attendance at DSEI
to hold bilateral and multi-lateral talks and
some choose to share their views more widely,
providing valuable insights into matters of
global concern. DSEIs truly international
scope enables companies and individuals to
build relationships, forge partnerships and
access new markets by bringing key
countries and entire geographical
regions as well as specialist
sectors all in one place.
The event is expected to
host over40 dedicated
pavilions which will host
international exhibitions
with 39 countries
being represented.
This year Latvia,
Lithuania, Poland,
Malaysia and Greece
will be making their debut
with others returning to do
business in a global market.
DSEI event director Duncan
Reid explained why, at a time when Asia,
the Middle East and South America are
expanding their defence and security
capabilities, a European based show will
be the appropriate venue for this important
debate. He said: While major new markets
have emerged, Europe is still a significant
player in defence and security procurement
and supply. It is also a highly important
engine for the development of the key
technologies that are increasingly being
adopted by emerging markets via technology
transfer and licensing agreements.
He continued: The effectiveness of
combined operations is demonstrated by
the complementary nature of DSEI and
Eurosatory, mirroring the Franco-British
drive towards a Combined Joint Task Force.
Both events cover land systems and security,
however, DSEI also includes the air and
maritimedimensions. Both events are truly

as land, air and naval vehicle displays.


The theme Defence and security through
partnership and co-operation has
been chosen as it brings together the
entiredefence and security industry to
source the latest equipment and systems
and develop international relationships.
Rear Admiral Simon Williams, Chairman of
DSEI organisers, Clarion Defence and Security,
said: The threats to world order today are
diverse and range from high tech cyber-attack

Issue 12 | DEFENCE BUSINESS MAGAZINE

77

Highlights Police & Military


3-27x56 PM II High Power
Winner of the extreme long range competition of the US Special
Operations Command. Since 2012 in use with the US SOCOM.

US SOCOM

Visit us
booth #N6/373

3-20x50 PM II Ultra Short


The ultimate short new DMR solution for optimal use with
a backpacked red dot sight.

5-20x50 PM II Ultra Short


With a length of less than 30 cm, the shortest sniper scope ever built.

1-8x24 PM II ShortDot DMR

The perfect solution for urban application.


Currently in testing on the G28 by the German Armed Forces.

1.5-8x26 PM II ShortDot

The revolutionary new ShortDot scope with a 34 mm tube for longer


range targeting without limitations.

5-25x56 PM II PSR
Winner of the Precision Sniper Rie Program of the US SOCOM. Since 2011, Schmidt & Bender
has supplied the Special Operations Forces of the Army, Navy, Air Force & Marines.

3-12x50 PM II USMC
Winner of the 2-year quality and endurance test by the U.S.
Marine Corps. In use with the U.S. Marine Corps since 2005.

3-20x50 PM II DMR

The 3-20x50 PM II DMR has been in use with the German Armed Forces since 2011.

Precision makes the difference!


For more product or dealer information visit: www.schmidt-bender.com or simply scan the QR-code
Schmidt & Bender GmbH & Co. KG | Am Groacker 42 | D 35444 Biebertal, Germany | Phone: +49 (0) 6409 - 8115 - 0 | info@schmidt-bender.de | www.schmidt-bender.com

EVENT PREVIEW
international, taking place in alternate
years and each attracting attendees from
well over 100 countries. Visitors from 121
nations attended DSEI 2013. They included
representatives of key Asian economies such
as India, Japan and Korea, big spending
Middle Eastern nations, such as Qatar,
Saudi Arabia and UAE, and Latin American
countries with major defence and security
commitments Brazil, Chile and Colombia.
He concluded: DSEI and Eurosatory
are a very powerful combination, often
reaching those parts of the world where
regional tensions can inhibit attendance
at local defence and security events.
SECURITY
The global defence and security sectors needs
are in continuous evolution as new threats to
national security have to be countered, new
markets are emerging and new capabilities
are being developed. This need for military and

security forces around the world to procure


platforms, systems and equipment that meet
operational and budgetary imperatives is
highlighted by the continued growth of DSEI.
Security has become firmly established as
the fourth pillar of DSEI. The2015 event will
see focus on critical areas of security, such as
biometrics, cyber warfare, CBRN and counter
terrorism. There will also be a Security and
Special Forces zone with briefings by leading
experts and capability demonstrations. Major
suppliers who will be exhibiting include BAE
Systems Applied Intelligence, CISCO, Cobham,
Fujitsu, Lockheed Martin and Smiths Detection.
Lt Gen Mark Poffley, Commander Force
Development and Capability said: Recent
events have highlighted the need for an
integrated and persistent security response
across a wide spectrum of operations.
The British Army is reconfiguring to meet
thechallenges of the contemporary security
environment. An important part of this

The global defence and security sectors


needs are in continuous evolution as new
threats to national security have to be
countered, new markets are emerging and
new capabilities are being developed

DSEI 2015

THE BUSINESS MAGAZINE FOR DEFENCE www.defencebusiness.net

adjustment is establishing a close relationship


with its industrial partners, seeking out
innovative and relevant solutions as part
of the Defence Growth Partnership and
exploiting mutually beneficial agendas to
defeat those who threaten our security.
ZONES
DSEI will have a layout which will be
dominated by themed zones, making the
event easier to navigate and facilitate
specified networking opportunities. The
zones include: Land Zone, Air Zone, Naval
Zone, Security & Special ForcesZone,
Unmanned Zone, MedicalInnovation Zone,
Cyber, Communications, Tri-Service, and the
Electronic Warfare zone, hosted by the AOC.
The Land Zone is the largest zone at DSEI
and features the land theatre for insight into
thefuture of the internationalland sector.
With prime contractors to niche specialist
suppliers, the Land Zonedemonstrates
the latest platforms from major vehicle
manufacturers and suppliers in the defence
industry. Suppliers included Iveco,MBDA,
Nexter,Pearson Engineering, Renault
Defence,Selex ES and Streit group.
The Air Zone offers a dedicated air theatre and
an increased static vehicle display.DSEIs air
component is expandingto address the frontline
operational requirements and support functions
available to the aerospace sector. The

Issue 12 | DEFENCE BUSINESS MAGAZINE

79

For fur ther information contact:


Tablet Technologies Ltd
0844 5678 789
info@tablettechnologies.com

EVENT PREVIEW

DSEI 2015

THE BUSINESS MAGAZINE FOR DEFENCE www.defencebusiness.net

Zone includes a capability area dedicated to


the aerospace supply chain; a comprehensive
seminar programme reinforcing the shows
broader themes of procurement, training,
export maximisation and SME support; and
an outdoor static display area to provide the
aerospace industry with a forum in which to
showcase the latest innovations to existing
and prospective international customers.
Air Vice-Marshal Malcolm Brecht, Chief of
Staff Air Capability, said: DSEI 2015 enables
us to highlight themes that will influence
future UK air capability, and we will continue
to pursue the excellent opportunity that
DSEI 2015 provides to engage in highlevel
industry briefings and bilaterals.
NAVEL ZONE
The proximity of the Royal Victoria Dock
enables DSEI to assign a Navel Zone which
will play host to a range of vessels, from
warships to high speed craft. It also includes
anexpanded marina and indepth scenarios
to showcase related products, technologies
and services. This zone will provided a
valuable platform for the demonstration
of new systems and equipment from
the UKs innovative maritime sector.
2015 is set to welcome more visiting
warships than ever before at DSEI,
showcasing a greater range of capabilities.
The dock provides a valuable platform for
demostrations of new systems and equipment
from the UKs innovative maritime sector.
Visiting Naval Ships at DSEI 2013 included
German Braunschweig Class corvette FGS
Magdeburg; Dutch Holland Class corvette
HNLMS Groningen; and Swedish Mine Counter
Measure Vesels HSwMS Vinga and Ulvo.
SECURITY & SPECIAL FORCES
Thededicated Security & Special Forces
Zone showcases security equipment and
systems tocounter prioritythreats, such
as cyber attacks and terrorism,as well as
an enlarged special forces and tactical
equipment area. Thenew Security & Special
Forces Zone centralises the security sectors
expertise with a bespoke community in
order to increase networking opportunities
for both exhibitors and visitors.
Within the Security & Special Forces
Zone, products and services ranging from
security & special forces training, tactical
equipment, perimeter security covert &
overt surveillance & camera equipment
and PPE, with exhibitors including EXPO,
Henriksen, Kershaw, KNK Limited, Safe
Tactics, SphereVision and Taskmasters.
The Unmanned Zone will offer
demonstrations from Unmanned Aerial
Vehicles (UAVs) and Unmanned Ground
Vehicles. The Zone was successfully launched
in 2011 and since then a series of stakeholders
have increased their support, including
the Association for Unmanned Vehicle
Systems International (AUVSI). The result
is a vastly augmented Unmanned Zone.

The Medical Innovation Zone will demonstrate


the latest advances in clinical care from point
of injury or illness through the entiretreatment
pathway to rehabilitation. Today the UKs
Armed Forces have to be equipped and
trained to deal with a broad spectrum of
operations, including humanitarian work,
disaster reliefand reconstruction. The Medical
InnovationZone features an originalmedical
seminar programme, addressing the very latest
topics, from NATO co-operation, adopting
best practices from Afghanistan, to keeping
the military fit, successful rehabilitation,
pre-hospital care, developments in Platinum
5trauma care and key innovations which
have stemmed from recent military research.

CONFERENCES AND SEMINARS
DSEI is staging four conferences focused on
the future of maritime, medical, and motorcraft
technology. These DSEI Strategic Conferences
will take place on Monday 14 September
2015, the day before the exhibition opens.
The conferences will be open to the entire
international defence and security community.
Throughout the four days of the event, DSEI
2015 will offer seven seminar and briefing
programmes dedicated to global partnerships,
land, naval, air, unmanned, security and
medical innovation. Through a series of
panel debates, keynote sessions and live
demonstrations, top level speakers from senior
domestic/international military and leading
industry stakeholders will share their thoughts
on the latest future capabilities, technologies
and innovations and procurement updates.
For 2015, DSEI is introducing a seventh
theatre to its seminar programme. The Global
Partnerships theatre is dedicated to exploring
key growth markets, export opportunities and
global supply chain best practice, making
it an internationally focused platform.

DSEI event director, Duncan Reid said:


DSEI attracts a top quality audience of
more than 30,000 visitors to ExCeL London.
We are focused on growing this number
for DSEI 2015 and are targeting 100
official delegations, reinforcing the events
position as the global hub of defence and
security expertise. The expanded scope of
the preDSEI conferences will provide a
valuable additional opportunity for visitors
to learn about and discuss developments
within three crucial areas of technology.
REGISTRATION
Registration for DSEI 2015 is now live,
and until 30 June, it is possible to register
at the lowest rate available of 30 + VAT.
From 1 July, the rate will increase, and then
continue to rise towards the start of the
event, so it really pays to book your ticket
early. Registering in advance will aid the
verification process. DSEI is a secure event,
so all registrations must be verified and this
procedure will be thorough. The new DSEI
Community, due to go live soon, enables
registered visitors to book in meetings
with exhibitors; early registration means
that you will have a wider selection of
exhibitor and a better choice of time. As
well as registering early, you can arrange
your travel plans ahead of time by taking
advantage of the preferential rates offered
by DSEIs Concierge Service, Zibrant. To make
your DSEI 2015 experience run smoothly,
Zibrant have selected different facilities
that you may need during your stay in
London. These recommendations range
from accommodation to theatre bookings,
Oyster cards and mobile phone rental.
FURTHER INFORMATION
www.dsei.co.uk

Issue 12 | DEFENCE BUSINESS MAGAZINE

81

Advertisers Index

THE BUSINESS MAGAZINE FOR DEFENCE www.defencebusiness.net

Award Winning Intelligent


Perimeter Protection
The most secure PIR solution on the market...in every way possible!

Reliable perimeter
protection anywhere.
Fully wireless solution for
remote locations delivers
drastic installation & labor
cost savings.
Complete wireless installation
available communication & power
NO TRENCHING!
NO CONDUIT!
NO CABLING!
Alarm and fault reports are transmitted
wirelessly
Intelligent power management with
battery & solar power options:

Installations have
never been this easy.
iCommission. One-man
commissioning and
maintenance.
One person can commission and
maintain the detectors
Quickest, easiest, most accurate
solution to set-up on the market
Perform a simple walk-test in the
detection zone
iCommission is a vertical axis
alignment tool
ADPRO iCommission application is
available on tablets and smartphones

2 years battery life with Alkaline


and 5 years with Lithium
Battery life time extension via
solar panel

Eliminate creep zone


with 360PROtect.
Provide maximum tamper protection
with 360PROtect - eliminate all creep
zones
360PROtect is an additional sensor
built into ALL PRO E-detectors to
cover the area from up to 3.2 feet
around the pole/wall up to 26.2 feet in
front of it
All zones alarm separately into Video
Central Platinum via a RS485 bus,
operators can quickly identify which
zone is alarming and visually verify w
ith a camera
Detection for attempted surface
mount removal, masking, & twisting
Universal cable managed bracket with
tamper switch for added vandal
protection
Advanced 3D-tamper detection signals
an alarm if detector alignment is altered
Up to 4 meters (13 feet) mounting
height to minimize the risk of vandalism

www.xtra
www
www.xtralis.com
w.xtralis com

Solution simplifies installation design,


no need for overlapping corners

Detect more with less!


Extend your perimeter
protection to 220 meters
with one detector and save
up to 65% in installation &
operating costs.
Worlds first 220 meter curtain PIR
Reduces the number of poles,
detectors, and cabling required for
an installation
Superior detection performance and
accurate zones (up to 7 with two
detectors pointed towards each
other) to precisely enable cameras
to provide visual verification
Achieve double-knock protection
Up to 40% cost savings in comparison to other Outdoor PIR systems

ADVERTISERS INDEX

The publishers accept no responsibility for errors or omissions in this free service
Air & Ground
56
Alert Innovation
63
Anixter International
34
APM Group
32
Arinc 48
Assa Abloy
51
Blue Zulu Marketing
IBC
Broden Media
16
BSIA 12
CEA 4
Cop Security
46
Cybx (Serco)
30, 31
Dosarrest Internet Security
28
Fire Eye
20
Foster + Freeman
64
Frontier Pitts
56
Garnett Keeler Public
Relations
14
Gigamon 18
Heald 39
Heinan Hopman
6
Hesco Bastion
70, 71
Holmatro Rescue
8

82

DEFENCE BUSINESS MAGAZINE | Issue 12

Honeywell 10
Hunter Global
24
ISSEE 58
Iveco BC
Kelvin Hughes
60
Marshalls
40, 41
Panasonic 44
Prox Dynamics
76
Qioptiq
68, 69
Quantum Corporation
50
Rangemaster Precision Arms
74
Ring Sights Defence
22
Safety Flex Barriers
36
Schmidt & Bender GmbH
78
Sedicii Innovations
26
Sensurity 53
Tablet Technologies
80
Terrafix 54
The FPA
66
The Mercian Labels Group
IFC
UBM Information
52
Xtralis UK
38
Zaun
42, 43

ONLINE DELEGATE AND VISITOR REGISTRATION NOW OPEN


Book by 31 July 2015 to save on delegate fees.
Reduced rates for public sector attendees
3-DAY CONFERENCE
Hear from more than 75 international speakers in a topical and interactive
programme covering current and future use of biometric technology in
government and commercial applications
Presentations and panel sessions cover:
Identity management in the digital world
Data protection, privacy and mobility
Law enforcement, forensic and military
applications
Data retention in law enforcement
ID at the borders and the future of travel
Biometrics in developing economies
Customer authentication
Mobility, payments and secure
authentication
Liveness detection discussion
Research, innovation and technology
developments

#biometrics2015
#biometricslive

FREE EXHIBITION
AND SEMINARS

Biometrics Live
14-15 October 2015

View the technologies and meet with the


suppliers and integrators of biometric
solutions for identity management,
authentication and security.

Wednesday 14 October:
09.00-17.00
Thursday 15 October:
09.00-16.00

Organised by:

www.biometricsandidentity.com

In partnership with:

MPV

A protected environment
for every mission.

Iveco DVs range of Multirole Vehicles, Tactical and Logistic Trucks


and Armoured Fighting Vehicles covers the full spectrum of on- and
off-road military requirements and represents a well thought through,
comprehensive and effective response to the needs of the military
customer. Iveco recognises that this needs change in response to
the evolving operational environment, developing doctrine and changing threat. As a part of the companys commitment to our custo-

Iveco S.p.A. Defence Vehicles


I-39100 Bolzano - via Volta, 6
+390471905111 - dvdbzcom@iveco.com

mers needs, we aim to identify or anticipate at an early stage how


requirements are likely to develop.
As a result, the whole product range is subjected to a continuous
development process. Evolving needs are fed back to Engineering,
who in turn develop a steady stream of enhancements in terms of
payload, mobility and protection. Where necessary, complete new
vehicle families are developed.

Iveco Defence Vehicles UK


Iveco House, Station Road - Watford
WD17 1SR Hertfordshire +44 1923259728

Das könnte Ihnen auch gefallen