www.counterterrorbusiness.com | ISSUE 19
NEWS: GLOBAL TERRORISM DATABASE REVEALS 10 MOST LETHAL TERRORIST ORGANISATIONS
EMERGENCY SERVICES
How a cyber criminal can bring a nation to its knees
PROTECTING CRITICAL SERVICES
CYBER SECURITY
DEFENCEBORDER SECURITY
News:
MoD signs
£3.5bn armoured
vehicle deal p63
THE BUSINESS MAGAZINE FOR DEFENCE
Eurosatory 2014
preview
p67
How rigorous are the security checks of air cargo?
SECURING AIR FREIGHT
CARGO SECURITY
The security challenges for aviation, maritime, rail and commercial transportation explored
TRANSPORT SECURITY EXPO
EVENT PREVIEW
Asset LabelsPlastic & Metal Security SealsC-TPAT Metal Bolt Security Seals
Tamper Evident Bags
3 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
Comm
entCOUNTER TERROR BUSINESS
An increasing threatwww.counterterrorbusiness.com | ISSUE 19
NEWS: GLOBAL TERRORISM DATABASE REVEALS 10 MOST LETHAL TERRORIST ORGANISATIONS
EMERGENCY SERVICES
How a cyber criminal can bring a nation to its knees
PROTECTING CRITICAL SERVICES
CYBER SECURITY
DEFENCEBORDER SECURITY
News:
MoD signs
£3.5bn armoured
vehicle deal p63
THE BUSINESS MAGAZINE FOR DEFENCE
Eurosatory 2014
preview
p67
How rigorous are the security checks of air cargo?
SECURING AIR FREIGHT
CARGO SECURITY
The security challenges for aviation, maritime, rail and commercial transportation explored
TRANSPORT SECURITY EXPO
EVENT PREVIEW
Following mounting concerns over the dangers posed by Islamic State (IS) terrorists, the UK’s threat level now stands at ’severe’ for the first time since 2007, when extremists were suspected of an attempt to bomb Glasgow Airport and London’s West End.
Counter terrorism officials have so far said they are not aware of any specific or imminent plot to attack Britain, but the brutal and barbaric execution of US journalists James Foley and Steven Sotloff by ‘Jihadi John’, who appears to speak with a London or South East accent, sent a sickly message to the world that the UK is a fertile breeding ground for religious extremism. Clearly, much more needs to be done at home to understand and counter this.
As we go to press, Prime Minister David Cameron is attending the NATO Summit in Wales, where he ruled out paying a ransom for a British hostage, threatened in the latest horrifying video to be aired chillingly through social media. It is worrying that while efforts to restrict the finances of terrorist organisations have seen some success in the past, IS appears to have developed an economy in Syria and Iraq, with reports suggesting that the extremist group is making up to £600,000 a day from oil sales and ransoms.
Addressing Parliament, Cameron spoke of a ‘forensic focus’ needed to prevent people from travelling abroad. New anti-terror measures are expected to be agreed by all parties shortly (see page 7).
As with Iraq and Syria, the situation in the Ukraine has led to calls being made for certain NATO member countries to increase their defence spending. Only four countries (US, UK, Estonia and Greece) meet NATO’s defence spending target of two per cent of GDP. NATO’s outgoing secretary general, Anders Fogh Rasmussen, issued a financial rallying call: “We have lived in a relatively quiet security environment, but the crisis in Ukraine as well as what we’re now seeing in Syria Iraq and North Africa is a wake-up call. You can compare it with insurance. Now the premium has gone up because of this unstable security environment and that’s why we need more defence investments in the coming years.”
Danny Wright
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
If you would like to receive 4 issues of Counter Terror Business magazine for £80 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET.Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:
P ONLINE P IN PRINT P MOBILE P FACE TO FACE
www.counterterrorbusiness.com
© 2014 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541
PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk
EDITORIAL DIRECTOR Danny Wright EDITOR Angela Pisanu EDITORIAL ASSISTANT Arthur Walsh PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Vickie Hopkins, Charlotte Cassar REPRODUCTION & PRINT Argent Media
Sponsors include:
www.armouredvehiclesevents.com | Tel: +44 (0)20 7368 9737 | Email: [email protected]
Join the World’s Premier Armoured Vehicles
Conference SeriesThe longest running global conference series dedicated
to the armoured vehicles community Benefit from unique networking, information-sharing and benchmarking opportunities, as
well as potential business exchanges.
15% discount for Counter Terror
Business subscribers. Please enquire for more information
Eastern Europe30 September – 1 October 2014, Warsaw, Poland
• SupportedbythePolishMoD • BringingtogethertheUkrainian,Hungarian, Lithuanian,EstonianandMoldovanMoDsto discussongoingmodernisationprojectsand howbesttoadapttothecurrentthreat environmentarmouredvehicleseasterneurope.com/CTB
“A very good, well organized meeting place for military and non-military people to exchange ideas. It’s the place to go for up to date trends in the defence business.”Director,Polish MoD
“A very informative event giving visibility into a changing market space.” VP of Business Development, Land Systems, Alcoa Defense
“The perfect opportunity to get a clear idea about the future development of vehicles. The conference was well balanced with operational environment approach and technical solutions for operational demands.” Land Forces Development Branch, Czech Republic MoD
Africa19 - 20 November 2014, Addis Ababa, Ethiopia
• ConsideredtheAfricanmechanised community’sAnnualGeneralMeeting • Sharelessonslearnedandbestpracticein currentmechanisedrequirements,capabilities andprogrammesfromTanzania,Kenya, ZambiaandtheAfricanUnion
armouredvehiclesafrica.com/CTB
XV26-29 January 2015, London, UK
• Featuringkeynotepresentationsfromthe DefenceSecretary-theRtHonMichael Fallon-andMinisterforDefenceEquipment, Support&Technology-MrPhilipDunneMP • Bringingtogethertheinternational communitytodebateandshareknowledge ofthekeyglobalprogrammes
internationalarmouredvehicles.com/CTB
INTERNATIONAL ARMOURED RESERVISTS SYMPOSIUM
17 - 19 October 2014, Bovington, Dorset, UK
•ManagedbytheRoyalWessexYeomanry (RWxY) • Supportsthedevelopmentofthinking behindReservistuseofglobalground manoeuvreplatforms,focusingonboth theoreticalandappliedaspectsof capability
armouredreservists.com/CTB
IAV Portfolio advert 210x297.indd 1 22/08/2014 12:35
Sponsors include:
www.armouredvehiclesevents.com | Tel: +44 (0)20 7368 9737 | Email: [email protected]
Join the World’s Premier Armoured Vehicles
Conference SeriesThe longest running global conference series dedicated
to the armoured vehicles community Benefit from unique networking, information-sharing and benchmarking opportunities, as
well as potential business exchanges.
15% discount for Counter Terror
Business subscribers. Please enquire for more information
Eastern Europe30 September – 1 October 2014, Warsaw, Poland
• SupportedbythePolishMoD • BringingtogethertheUkrainian,Hungarian, Lithuanian,EstonianandMoldovanMoDsto discussongoingmodernisationprojectsand howbesttoadapttothecurrentthreat environmentarmouredvehicleseasterneurope.com/CTB
“A very good, well organized meeting place for military and non-military people to exchange ideas. It’s the place to go for up to date trends in the defence business.”Director,Polish MoD
“A very informative event giving visibility into a changing market space.” VP of Business Development, Land Systems, Alcoa Defense
“The perfect opportunity to get a clear idea about the future development of vehicles. The conference was well balanced with operational environment approach and technical solutions for operational demands.” Land Forces Development Branch, Czech Republic MoD
Africa19 - 20 November 2014, Addis Ababa, Ethiopia
• ConsideredtheAfricanmechanised community’sAnnualGeneralMeeting • Sharelessonslearnedandbestpracticein currentmechanisedrequirements,capabilities andprogrammesfromTanzania,Kenya, ZambiaandtheAfricanUnion
armouredvehiclesafrica.com/CTB
XV26-29 January 2015, London, UK
• Featuringkeynotepresentationsfromthe DefenceSecretary-theRtHonMichael Fallon-andMinisterforDefenceEquipment, Support&Technology-MrPhilipDunneMP • Bringingtogethertheinternational communitytodebateandshareknowledge ofthekeyglobalprogrammes
internationalarmouredvehicles.com/CTB
INTERNATIONAL ARMOURED RESERVISTS SYMPOSIUM
17 - 19 October 2014, Bovington, Dorset, UK
•ManagedbytheRoyalWessexYeomanry (RWxY) • Supportsthedevelopmentofthinking behindReservistuseofglobalground manoeuvreplatforms,focusingonboth theoreticalandappliedaspectsof capability
armouredreservists.com/CTB
IAV Portfolio advert 210x297.indd 1 22/08/2014 12:35
Contents
CONTENTS13
37
17
27
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
5 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
07 CTB NEWS New counter terror law plans outlined by David Cameron; ISIL controlling area the size of Britain, says US counter terror director 13 TERRORISM TRENDS Former CIA intelligence analyst Mat Burrows examines the wider issues shaping unrest in the Middle East 17 BORDER SECURITY The 3rd World BORDERPOL Congress takes place 9-11 December 2014 in Budapest, Hungary and brings together leaders of the world’s border security 20 COUNTER TERRORISM Paul Easter MBE outlines the difficulties Western powers have faced in attempting to build democratic nations in the Middle East 23 IP EXPO IP EXPO Europe, held on 8-9 October 2014, is Europe’s leading cloud and IT infrastructure event
25 CYBER SECURITY EXPO Cyber Security EXPO 2014 on 8-9 October at London’s ExCel offers visitors the chance to learn about the key issues
27 CYBER SECURITY: DoS ATTACKS Amar Singh of ISACA reports on the damage denial of service (DoS) attacks can do and offers advice on how to protect your organisation
33 CYBER SECURITY: CRITICAL NATIONAL INFRASTRUCTURE Mike Gillespie highlights why those that protect the UK’s critical national infrastructure need to anticipate threats and monitor the supply chain 37 TRANSPORT SECURITY EXPO Visitors to this December’s Transport Security Expo will discuss the challenges transport operators face in maintaining high security levels 43 CARGO SECURITY With 26 million tonnes of goods transported by air every year, the security of airborne cargo is of paramount importance, writes the BSIA 49 EMERGENCY SERVICES SHOW Taking place at the NEC Birmingham on 24-25 September, the Emergency Services Show will be relevant to those involved in counter terrorism 55 COMMERCIAL UAV SHOW The Commercial UAV Show on 21-22 October at London’s Olympia will allow visitors to exchange key insights on the unmanned aerial vehicle market 59 COUNTER TERRORISM To counter the threat of ISIS, the UK must help to create a new, legitimate order
Counter Terror Business www.counterterrorbusiness.com
65 DEFENCE NEWSMoD signs £3.5bn armoured vehicle deal with General Dynamics; Defence Sectretary condemns Russian role asUkraine calls to be made a member of NATO
67 EUROSATORY 2014June’s Eurosatory event in Paris showcased the newest developments in defence and security
ISSUE 9 Turn to page 63 for the latest defence
business news and features
THE BUSINESS MAGAZINE FOR DEFENCE
67
43
ADS.indd 1 8/13/2013 3:15:56 PM
New counter terror law plans outlined by Cameron following increasing threat from IS extemists
COUNTER TERROR LEGISLATION
Addressing parliament before the NATO Summit in Wales, Prime Minister David Cameron announced a range of measures to combat the growing threat of Islamic State extremism. The plans, which will be drawn up on a cross-party basis, will discuss the changes including the introduction of new powers to seize the passports of suspected terrorists at UK borders. Following the release of despicable videos which depict the two brutal executions of journalists James Foley and Steven Sotloff, the latest threat to execute a British national appears to come from a terrorist with an English accent, dubbed ‘Jihadi John’ (pictured in the story below) by the media. Foreign Secretary Phillip Hammond said analysis of the footage of both murders has concluded it is genuine and features the same masked militant, who speaks with a distinctive London or south-east accent. IS militants have seized large areas of Syria and Iraq and have been condemned for the mass slaughter of religious minorities in the region, including Iraqi Christians and the Yazidi community. Cameron told MPs he thought it was “abhorrent” British citizens had “declared their allegiance” to groups like Islamic State. He restated the UK’s backing for US airstrikes against Islamic State militants in Iraq and said he would not rule out participation in similar action in the future. The UK’s terror threat level was raised to ‘severe’ from “substantial” at the
end of August. The new alert level rates the risk of an attack on the UK “highly likely”, although Home Secretary Theresa May said there was no evidence to suggest one was “imminent”.
This level of threat has been used twice before – in 2006 after the discovery of liquid bombs aimed at airliners, and then the following year when extremists attempted to bomb Glasgow Airport and London’s West End. Developments in the Middle East over recent months had major implications for the UK’s security, with 500 British nationals estimated to have travelled to Iraq and Syria to fight on behalf of Islamic State and other militant groups. Cameron mentioned a “forensic focus” was needed in order to deal with British jihadists returning to the UK from conflict zones.
“We have also stepped up our operational response, with a fivefold increase in Syria-related arrests and the removal of
PROPOSED CHANGES Legislation will be drawn up to give the police statutory powers to confiscate the passports of suspect terrorists at UK borders
The UK will challenge any attempt by the courts to water down these powers
Plans to block suspected British terrorists from returning to the UK will be drawn up on a “cross-party basis”
Terrorism prevention and investigation measures (Tpims) will be extended, to include the power to relocate suspects
Terrorists will be required to undergo de-radicalisation programmes
Airlines will be forced to hand over more information about passengers travelling to and from conflict zones
CTB New
s
28,000 pieces of extremist material from the internet this year alone, including 46 ISIL-related videos,” he said. Elsewhere in Europe, a French law to seize passports is being fast-tracked through parliament, and the government is ramping up arrests of increasingly young teenagers making plans for jihad. Over the past week, US Secretary of State John Kerry and other administration officials have reached out to leaders from Australia, the UAE, Jordan, Qatar, Saudi Arabia, Italy and Israel to discuss how to combat the Islamic State.
Social networks start clampdown on ‘terror posts’Following the posting of the beheading of American journalists James Foley and Steven Sotloff, and by the Islamic State of Iraq and the Levant (ISIL), analysts are pointing to the emerging role of social media in the tactics and response to terrorism.The Los Angeles Times reports that as social media platforms such as Facebook, YouTube, Twitter, and Instagram have all become a staple of everyday Western lifestyles, these avenues have also become more interesting for terrorists to exploit to advance their goals.“Social media is at the heart of their jihad,” said Steve Stalinsky, the executive director of the Middle East Media Research Institute.As was the case with the Foley execution video, the use of posting on these platforms is meant to instill fear, attract the eyes of those who might be recruited, and raise money through awareness. Three of those large social media companies – YouTube, Twitter, and Facebook – are choosing to remove extreme examples of violence and terror. Users are also
incorporating campaigns to filter and not give terrorists the upper hand with digital coverage. Once the shocking James Foley video began to circulate, YouTube blocked it, arguing the company prevents the posting of videos on many subjects, such as weapons construction and violence.“YouTube has clear policies that prohibit content like gratuitous violence, hate speech and incitement to commit violent acts,” said a company spokesperson. “We also terminate any account registered by a member of a designated Foreign Terrorist Organisation and used in an official capacity to further its interests.”Twitter and Facebook users also aimed to curb the sharing of the video out of respect for the victims and prevent ISIS from gaining notoriety. The hashtag “#ISISMediaBlackout quickly began to trend on both services.Facebook reports that it has “teams around the world” that are reviewing content related to the Foley beheading, and in certain cases
SOCIAL MEDIA
leading to the company is removing the posts. These companies admit, however, that curbing free speech and screening violent and hateful content does involve walking a fine line. “The problem is that the boundary is hard to define,” said Marvin Ammori, a First Amendment scholar and a fellow at the New America Foundation.
READ MORE: tinyurl.com/pu9m2e4
READ MORE: tinyurl.com/q5tckew
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
7 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
New! Ultra-
lightweight
combi tools for
tactical cutting
& spreading
• Compact design:
Easy to add to your kit
• Extremely lightweight:
Easy to carry and handle
• Ready for use with
integrated hydraulic
hand pump
• Suited for tactical
operations
• Choice between models
HCT 5111 ST (highest
spreading force) and
HCT 5117 ST (highest
spreading distance)
Watch the video:
Holmatro | Special Tactics equipment
[email protected] | www.holmatro.com
New! Ultra-
lightweight
combi tools for
tactical cutting
& spreading
• Compact design:
Easy to add to your kit
• Extremely lightweight:
Easy to carry and handle
• Ready for use with
integrated hydraulic
hand pump
• Suited for tactical
operations
• Choice between models
HCT 5111 ST (highest
spreading force) and
HCT 5117 ST (highest
spreading distance)
Watch the video:
Holmatro | Special Tactics equipment
[email protected] | www.holmatro.com
CTB New
s
COUNTER TERROR CONTRACTS
NEWS IN BRIEFPublic appeal to identify potential terror suspectsAssistant Commissioner Mark Rowley, the UK’s head of counter terrorism, has appealed to the public to help identify people who have travelled to Syria or are showing signs of being radicalised. Rowley made his appeal after the murder of US journalist James Foley in Syria. London and the West Midlands have seen the biggest growth in Syria-related investigations.
Dstl seeking new counter terrorism and security supplier baseFollowing the successful pilot of a new commercial framework for research contracts known as R-Cloud (Research Cloud), the Defence Science and Technology Laboratory (Dstl) is now seeking suppliers within the area of Counter Terrorism and Security (CT&S). This is the second of nine capability areas to offer research opportunities through R-Cloud, which provides easy-to-use, direct access to current and future research requirements. Further roll out, across Dstl’s other capability areas, is expected over the coming months. Suppliers working in the area of Counter Terrorism and Security can apply to be part of R-Cloud via the Defence Contracts Online (DCO) pre-qualification portal from
3 September until 1 October 2014. If successful, suppliers will then be considered for future R-Cloud CT&S research contract opportunities with mini-competitions being run where suppliers will be invited to express interest and tender for different tasks. Dstl’s R-Cloud Project Manager, Neil Higson, said: “R-Cloud will eventually provide a commercial marketplace for research opportunities across the spectrum of Dstl’s capability areas, with a contracting mechanism that will significantly help expedite the placement of research contracts and broaden the supplier base.”.
MI5 unearths IRA leaksThe Irish Herald has revealed that a major security alert was sparked when a rogue officer passed on key information from a garda station to a senior IRA figure via text message. It is understood that no further action will be taken in the case as the officer is the subject of investigations into separate serious offences. According to the Herald, he joined the force within the last decade at a time when background checks were not as scrupulous as they are now. The Herald understands that the information passed on involved the names of the detained suspects and how long they were being questioned for by detectives. Justice Minister Frances Fitzgerald has described the incident as ‘disturbing’.
All 43 police forces in England and Wales have signed up to the ‘Best Use of Stop and Search’ scheme, which is designed to contribute to a significant reduction in the overall use of stop and search. 24 police forces will implement two key elements immediately, which are: Increase transparency by recording all outcomes of stop and search and whether there is a connection between the grounds for the search and the outcome, and; Restrict the use of Section 60 ‘no suspicion’ powers. Already used only when necessary, under this scheme a chief officer must make the decision whether to authorise the use of such powers. That officer must reasonably believe that violence ‘will’ rather than ‘may’ take place, as it stands now. By November, all 43 forces will have implemented all aspects of the scheme,
including: Giving members of the public the opportunity to observe stop and search in practice, and; A community complaints trigger, so the police must explain to the public how stop and search powers are being used after a large volume of complaints.
Police take up scheme to reduce Stop and Search instances
COUNTER TERROR POLICING
According to the latest intelligence from the United States, the Islamic State of Iraq and the Levant (Isil) controls an area the size of Britain. Matthew Olsen, the director of the national counter terrorism centre, put forward a detailed public assessment of the terrorist organsation, adding that Isil commands some 10,000 armed fighters and is taking in approximately £600,000 million a day from oil sales and ransoms. “IS views itself as the new leader of the global Jihadist movement,” said Olsen, who went on to describe the British problem of foreign fighters as “substantially more
significant in terms of numbers” than the American one, noting that around 500 Britons are believed to have gone to Syria. Olsen explained what the US believes to be the three factors which explain Isil’s rapid growth: the weakness of the Iraqi and Syrian governments; its “complex and adaptive” battlefield strategy; and its ambition to be a world leader in jihad. He added: “IS threatens to outpace al-Qaeda as the dominant voice of influence in the global extremist movement.”
ISIL controlling area the size of Britain, says US counter terror director
ISLAMIC STATE THREAT
READ MORE: tinyurl.com/nacdnur
Prevent not working says Muslim CouncilThe Muslim Council of Britain’s deputy secretary general Harun Khan has said that Prevent, part of the Government’s anti-terrorism strategy, has failed. Prevent seeks to lessen the influence of extremism, but Khan told BBC Radio 5 live that the strategy was having a “negative impact”. Work carried out as part of Prevent includes stopping “apologists for terrorism” coming to the UK, supporting community campaigns which oppose extremism and mentoring for individuals who are “at risk of being drawn into terrorist activity”. Khan said: “Most young people are seeing this as a target on them and the institutions they associate with,” adding that many felt they would be viewed by authorities as potential terrorists if they went to mosques or joined other organised Muslim groups.
READ MORE: tinyurl.com/no4qzrg
READ MORE: tinyurl.com/mdrmso2
READ MORE: tinyurl.com/no4qzrg
READ MORE: tinyurl.com/l7qtryr
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
9 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
QU
ALI
TY
DE
SIG
N •
QU
ALI
TY
MAT
ER
IALS
• c
as
t s
tan
da
rd
(U
K g
ov
er
nm
en
t e
nd
or
se
d)
DMS Protective Equipment Ltd Lingen Road, Ludlow Business Park, Ludlow, Shropshire SY8 1XD. United Kingdom
Tel: +44 (0)1584 874679 Fax: +44 (0)1584 876013 Email: [email protected]
Blunt Trauma ProtectionTested and certified to uk government (CAST) standard
Solo ShieldsBespoke specification available
Scorpion Interlock ShieldsPublic Order Batons
003
FM 56364BS.EN.ISO 9001:2000
DMS Scorpion ad:Layout 1 25/09/2013 17:10 Page 1
QU
ALI
TY
DE
SIG
N •
QU
ALI
TY
MAT
ER
IALS
• c
as
t s
tan
da
rd
(U
K g
ov
er
nm
en
t e
nd
or
se
d)
DMS Protective Equipment Ltd Lingen Road, Ludlow Business Park, Ludlow, Shropshire SY8 1XD. United Kingdom
Tel: +44 (0)1584 874679 Fax: +44 (0)1584 876013 Email: [email protected]
Blunt Trauma ProtectionTested and certified to uk government (CAST) standard
Solo ShieldsBespoke specification available
Scorpion Interlock ShieldsPublic Order Batons
003
FM 56364BS.EN.ISO 9001:2000
DMS Scorpion ad:Layout 1 25/09/2013 17:10 Page 1
The majority of terrorist attacks occurring in 2013 remained isolated in just a few countries, according to the Global Terrorism Database, which is generated by the National Consortium for the Study of Terrorism and Responses to Terrorism (START) based at the University of Maryland. In 2013, 11,952 terrorist attacks resulted in 22,178 fatalities (including perpetrator deaths) and 37,529 injuries across 91 countries. More than half of all attacks (54 per cent), fatalities (61 per cent) and injuries (69 per cent) occurred in just three countries: Iraq, Pakistan and Afghanistan.
ATTACK LETHALITYBy wide margins, the highest number of fatalities (7,046), attacks (2,852) and injuries (15,736) took place in Iraq. The average lethality of attacks in Iraq was 34 percent higher than the global average and 30 percent higher than the 2012 average in Iraq. “It is important to note that increases in terrorism in 2013 were geographically concentrated in many of the same places which saw high levels of political violence in 2012,” said Gary LaFree, START Director and professor of Criminology and Criminal Justice. “The list of countries that experienced the most attacks remained virtually unchanged over the past two years-terrorism is generally getting worse in the places where it has been bad for several years.”While terrorism remained heavily concentrated in the same parts of the world, the countries within those regions experienced some notable changes. In 2013, total attacks increased for Iraq, Pakistan, the Philippines, Syria, Egypt, Libya and
Lebanon; and decreased for Nigeria and Turkey. The most lethal single attack in 2013 took place in September in Nigeria when members of Boko Haram set up illegal checkpoints and killed 142 civilians. Despite the devastating attack at the Boston Marathon on April 15, 2013, which killed three and wounded more than 200, U.S. citizens remained comparatively safe from terrorism. Worldwide, 17 US civilians were killed by terrorist attacks in 2013 (including contractors), which is .07 per cent of all terrorism fatalities in 2013. According to LaFree: “These results confirm long-term regional trends that show rising
numbers of attacks in the Middle East, North Africa and South
Asia and diminishing numbers of attacks in North America
and Western Europe.”
PERPETRATOR GROUPSInformation about the perpetrator group responsible was reported for 33 percent of terrorist
attacks in 2013. Although al-Qaida central
has only been responsible for two known attacks since 2008
(both in 2011), seven of the 10 deadliest terrorist groups in the world are affiliated to some extent with the organization. These include the Taliban, Islamic State of Iraq and the Levant/al-Qaida in Iraq, Boko Haram, al-Shabaab, Tehrik-e Taliban Pakistan, al-Nusrah Front, and al-Qaida in the Arabian Peninsula. With the addition of nearly 12,000 terrorist attacks in 2013, the database now includes more than 125,000 events dating back to 1970 and remains the most comprehensive unclassified database of terrorist attacks around the world.
CTB New
s
DOWNLOAD THE FULL GTD DATASET tinyurl.com/pka9pwh
10 MOST LETHAL TERRORIST ORGANISATIONS, 2013
Group Fatalities
Taliban* 2718
Islamic State of Iraq and the Levant/Al-Qaida in Iraq*
1868
Boko Haram* 1731
Al-Shabaab* 735
Tehrik-i-Taliban Pakistan (TTP)* 710
Al-Nusrah Front* 707
Lashkar-e-Jhangvi 404
Al-Qaida in the Arabian Peninsula (AQAP)* 368
David Yau Yau Militia 194
New People’s Army (NPA) 156
*al-Qaida affiliated
10 COUNTRIES WITH THE MOST TERRORIST ATTACKS, 2013
Country Attacks Fatalities
Iraq 2852 7046
Pakistan 2212 2891
Afghanistan 1443 3697
India 690 464
Philippines 652 432
Thailand 477 253
Yemen 424 622
Nigeria 341 2003
Somalia 331 641
Egypt 315 243
In 2013,
11,952 terrorist
attacks resulted
in 22,178 fatalities
(including perpetrator
deaths) and 37,529
injuries across
91 countries
Global Terrorism Database suggests 2013 terrorist attacks ‘isolated to just a few countries’
GLOBAL TERRORISM
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
11 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
Written by M
atthew J. Burrow
s
It’s hard not to be panicky about the terrorist threat these days. We’ve seen a terrorist group take over a large chunk of Iraq and impose a brutal regime. There’s no end in sight to the Syrian civil war and little hope of reuniting the country. Extremist forces are increasingly taking over the opposition to the Bashar al-Assad regime. In Afghanistan, as the deadline approaches for NATO’s withdrawal, Taliban forces are staging a comeback. Europe is particularly threatened by the return of EU citizens who have been fighting with radical al-Qaida-lined groups in Syria, according to Gilles de Kerchove, the EU counterterrorism coordinator. The US head of National Counterterrorism Center, Matthew G. Olsen, also warned about “wider array of
threats in a greater variety of locations across the Middle East and around the world.” What happened to the global war on terrorism (GWT) and Western determination after 9/11 to put an end to terrorism once and for all?
A SHIFTING THREATUntil August 2013, I was employed by the CIA, authoring the National Intelligence Council’s long range analysis – what is called ‘global trends’ – which is briefed to the US President at the start of his administration. In compiling my book I’ve gone back to evaluate those forecasts. The first global trends report I did was for the Bush Administration three years after 9/11, when the global war on terror was in full swing. Hopes were high in and out of government that terrorism could be defeated. I was far less sanguine: “The key factors show no signs of abating over the next 15 years. The revival of Muslim identity will create a framework for the spread of radical Islamic
ideology both inside and outside the Middle East, including Western Europe, Southeast Asia and Central Asia.” The press played up the fact that while the administration contended “Iraq was an integral part of US efforts to combat terrorism,” the report I authored warned that Iraq was providing terrorists with “a training ground, a recruitment ground, the opportunity for enhancing technical skills.” One of my global scenarios in the work was of a caliphate, which got right many of features of ISIS, including its breakaway from al-Qa’ida. In the 2008 edition I talked about al-Qa’ida breaking up – almost three years before
Osama bin Laden’s takedown. Past terrorist waves usually saw the group originating it – in this case core al-Qa’ida – breaking up midway through the cycle. The violence does not cease and could actually increase, but the splintered survivors are more locally focused. The threat is now from the splinter groups, some of which are more capable than I or others originally anticipated as shown by the rapid ISIS gains in Iraq. In the recent words of General Clapper, director of National Intelligence, “the terrorist threat is not diminishing. It is spreading globally and it is morphing more and more into so-called franchises.” Oddly, in the wake of the Western failures in Iraq and Afghanistan, the pendulum is now swinging away from any intervention. If, God forbid, another 9/11-like attack occurred today, I think the US could well turn its back on the Middle East, albeit after lobbing a few missiles into the group held
responsible. The attempt this time would be to harden borders, restricting inflows into the US homeland. No war on terrorism, but instead Fortress America. Clapper’s worries that US intelligence capabilities have been hurt by a “perfect storm” of “lost intelligence sources” because of Snowden and “significant budget cuts” could also favour a posture of more defence than offence.
WIDER ISSUES IN THE REGIONBoth extremist reactions – sins of commission and those of omission – ignore the broader context and tend to treat terrorism as a standalone. It’s no accident that the Middle East – where the terrorist threat is the greatest – has lagged most other regions (except Africa) in exploiting globalisation’s opportunities. In many Middle East and North Africa countries, higher educational attainment correlates with rising joblessness. The social contract that held states together has frayed. It’s been some time since Arab governments could “co-opt the educated youth into what used to be a relatively well paid civil service,” according to the UN’s Arab development reports. Governments everywhere have to be smarter to succeed. In the Middle East, the challenges are even greater because of the many religious and ethnic splits that were never overcome by Arab nationalism. From the beginning of my work on global trends, I strove to weave terrorism into a wider tapestry. That’s also the reason why I focus on the multiple factors that are coming together to produce revolutionary change. Back after 9/11 when terrorism was everything in foreign policy, the global trends reports drew policymaker attention to other challenges facing the US, such as the rise of China and the downsides of rapid globalization. Even before the E
GLOBAL TRENDS
BACK TO THE FUTURE ON TERRORISMFormer CIA intelligence analyst Mat Burrows looks at global terrorism trends in his new book The Future Declassified. Here he examines the wider issues shaping unrest in the Middle East
Terrorism Trends
The drift toward a region-wide conflict pitting Saudi Arabia against Iran and its allies is a recipe for more widespread violence and chaos, so creating the breeding grounds for terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
13 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
Adve
rtise
men
t Fea
ture
Scanna has an extensive reputation for the design of robust defence and security x-ray products and is a contractor for x-ray equipment for National and International EOD agencies in the UK, USA and many other NATO countries. Scanna’s high resolution x-ray systems are designed to be as rugged, compact and lightweight as possible and provide a fast, safe and highly effective method of investigating suspect packages, IEDs, vehicles and cargo as well as for special operations and countersurveillance.
STRAIGHTFORWARD AND FLEXIBLEX-ray investigations need to be set up and completed within a very short timeframe and multiple operators may often share a system, but in different scenarios. Scanna x-ray systems are straightforward and intuitive for anyone to use with both direct (DR) and indirect (CR) x-ray imaging technologies. This multiple x-ray technology capability gives operators a wide range of choice across the board of speed, size, image quality and cost. The latest lightweight cable free x-ray image plates weigh just a few grams and are completely flat and flexible, letting you get an x-ray almost anywhere you need to. At the same time, these thin plates are available in multiple sizes and have the ability to be used in wide ranging combinations and configurations to cover larger areas. Small A4 size plates are ideal for use in confined areas such as wall or ceiling cavities or to check an item placed very close to a wall,
whilst using multiple longer length plates would be more suited for looking into vehicle panels and for pinpoint cargo scanning.
FAST DEPLOYMENTFor users who require more speed, Scanna offers rapid direct-to-laptop x-ray systems where the x-ray can be placed, fired and viewed in just a few seconds. The big advantage of the Scanna solution is that all systems come in a single case, operate on battery, and utilise safe pulsed x-ray generators that are interchangeable between direct and indirect imaging systems. The same powerful SCANVIEW software features are common across all systems to reduce operatortraining requirements.
X-RAY FOR EVENT SECURITYOne sector of the security community that has already seen the benefits of utilising portable x-ray equipment is event security where Scanna x-ray solutions were acquired and used by the Brazilian government and police for security search and investigation in support of the recent 2014 FIFA World Cup. These will continue to be used to secure future large events including the Brazil olympics in 2016.
X-RAY FOR AVIATION SECURITYWithin the transport security sector aviation security support teams in Australasia rely on Scanna x-ray equipment as a backup to the normal police response to ensure that incidents involving suspicious baggage can be cleared as quickly and efficiently as possible in order to minimise any disruption to passengers,
flights and crucial airport operations. Here, as in most territories, Scanna equipment is supported by local in-country distribution agents with military and EOD backgrounds who understand the specific needs of their user groups to provide operational advice, expertise and service support.
X-RAY FOR VEHICLE SCREENINGOne innovative application for portable x-ray is where large vehicles are prescreened by fixed vehicle screening x-ray systems. In some cases the larger vehicle screening systems are not set up to x-ray the bottom portion of the vehicle and in these situations a portable system can be invaluable for checking blindspots around the chassis, wheels and wheel arches. For customs applications small flexible x-ray plates can be used for close up detailed checks of dashboards and seats for concealed drugs and other contraband.
X-RAY FOR COUNTERSURVEILLANCEGovernments have traditionally been at the forefront of protecting themselves against the loss of important confidential and private information through espionage techniques. With the emergence of global markets and global competition, businesses are now a prime target of espionage as criminal efforts to obtain trade secrets and intellectual property proliferate. Intelligence agencies and TSCM teams are increasingly making use of portable x-ray technology as part of their standard counter surveillance toolkit to ensure that facilities are free from listening/recording devices and to analyse any finds.
PRISONSMobile phones, drugs, sim cards, batteries and weapons are all prohibited items in prisons but they continue to find their way into these facilities and into the hands of inmates. Portable x-ray equipment is deployed within the prison sector for cell searches so that any prohibited items concealed within furniture, electronic gaming devices, toiletries, clothing and shoes can quickly be detected and confiscated.
POSTAL X-RAY SYSTEMSScanna is also the manufacturer of the world leading SCANMAX brand of postal security x-ray cabinets. As well as being a known, reliable and safe detection technique for finding postal bombs, cutting devices and white powder letters, Scanmax x-ray chambers are also used in forensic laboratories for component analysis and within the prison sector for detecting drugs concealed in inmate mail.
FURTHER INFORMATIONContact: Kirstine Wilson+44 (0)207 355 [email protected]
ESSENTIAL TOOLS FOR INSIDE INVESTIGATIONScanna, a leading manufacturer of portable x-ray systems for IED identification showcases its capabilities at the TRANSEC show
COUNTER TERROR BUSINESS MAGAZINE | Issue 1914
2008 financial crisis, economic insecurity was growing in Middle America, for example, which the reports highlighted. Some of those broad trends favored terrorism and we stressed them in the analysis. Increasing individual empowerment meant individuals and small groups would have greater access to lethal weaponry. The use of bio or nuclear weapons someday by terrorists is not far-fetched. Cybercrime is a lot more common today than cyberterrorism, but it’s probably just a matter of time. I saw it as equally wrong to hype the terrorist threat then as it is to downplay it now. A broader perspective helps policymakers gauge terrorism’s relative importance in the vast panoply of US global interests.
HOW SHOULD THE WEST RESPOND?What particularly worries me now is the rapid collapse of the nation-state in Iraq and Syria, essentially leaving a huge safe haven at the core of the Middle East. The operating space for terrorists has increased immensely. We are back to pre-9/11 when al-Qa’ida had free reign in Afghanistan, but the area
is much larger. Just how rapid was the collapse of Arab Spring hopes and resurgence in authoritarianism in Egypt, Turkey and the Gulf was also a bit of a surprise. The growing suppression of opposition in those countries makes for fertile ground for extremism and even terrorism. It’s clear the terrorist threat is rising, but we should take care, too, to learn from past mistakes. First, we need to avoid the panic. In re-reading some of the writings by US terrorist experts in the aftermath of 9/11, there was a sense of terrorism as an unstoppable tsunami: “now that the World Trade Center is gone, Grand Central Station at rush hour would be an obvious target for Manhattan. Coordinated attacks on shopping malls, tourist attractions, casinos, schools, churches and synagogues, and sports events also are possible.” If there is a consoling factor, it is that terrorists tend to be too harsh and brutal, which eventually alienates their own supporters. But it will take time for the disaffection to grow
to the point of threatening, for example, the caliphate’s hold in Sunni areas in Iraq. Combatting potential attacks in US and Europe must be priority, counteracting just the symptoms won’t get at the root causes. Don’t get me wrong. I don’t see the US or Europe militarily intervening on a big scale. But, we need to be more active than we are, especially in stopping the regional conflagration from growing. Getting Iran and Saudi Arabia to sit down and start mending ties would be a start if we are to stem the escalation of current tensions into all-out war in the Middle East. Ramping up the pressure on the Shia government in Baghdad to draw the Sunnis back in is essential to combatting ISIS. Although naïve perhaps about chances for a near term settlement, Secretary Kerry is right about trying to keep a peace process alive between Israel and the Palestinians. Most importantly, the US and Europe need to work together on a global plan for economic development of the Middle East. The Chinese recently offered to go in on some joint infrastructure projects in Africa with the US, why not a global effort in the Middle East. I have no illusions the terrorist threat will decrease immediately even if we managed all these things, but it could put them on the back foot.
PREPARING TO ADAPTScenarios are a big part of plotting out the
future. They can be good or bad, but the point is that we need to get used to
the future being radically different from the present, not just
a linear projection. I can see areas where there may be a qualitative leap forward unimaginable to most today. For instance, we could see the elimination of most extreme poverty in our lifetime. But I can
also see where things could go seriously wrong,
and the Middle East and terrorism are in that category.
The drift toward a region-wide conflict pitting Saudi Arabia against Iran and its allies is a recipe for more widespread violence and chaos, so creating the breeding grounds for terrorism. In my book, I play out the logical conclusion of such continued Sunni-Shia conflict and it is predictably disastrous for all of us. The US and Europe have more than enough to occupy ourselves; publics are more than apathetic – they want to stay out. However, this is no time for leaders to put their heads in the sand.
The Future Declassified: Megatrends That Will Undo the World Unless We Take Action by Mathew Burrows is published by Palgrave Mamcillan
FURTHER INFORMATIONtinyurl.com/qefeujk
Terrorism Trends
GLOBAL TRENDS
Europe
is particularly
threatened by the
return of EU citizens
who have been
fighting with radical
al-Qaida-lined
groups in Syria
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
15 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
21-22 APRIL 2015 | OLYMPIA LONDON
INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLDINTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLDINTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLDINTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD
WWW.COUNTERTERROREXPO.COM/CTB1
The leading international event dedicated to mitigating the threat of terrorism• Meet 8,500+ attendees from Europe and globally• Showcase your products and services to visitors with real purchasing power• Meet new customers and further establish relationships with existing ones• Launch new products and services on a global platform
Contact us to discuss becoming an exhibitor at Counter Terror Expo: T: +44 (0) 20 7384 7942 E: [email protected]: +44 (0) 20 7384 7837 E: [email protected]
Book your
stand to
day
Organised byFollow us onCo-located with Strategic Media Partner
75032.003_CTX03A_Advert_A4_Counter Terror Business_2015_v2.indd 1 15/08/2014 09:30
21-22 APRIL 2015 | OLYMPIA LONDON
INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLDINTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLDINTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLDINTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD
WWW.COUNTERTERROREXPO.COM/CTB1
The leading international event dedicated to mitigating the threat of terrorism• Meet 8,500+ attendees from Europe and globally• Showcase your products and services to visitors with real purchasing power• Meet new customers and further establish relationships with existing ones• Launch new products and services on a global platform
Contact us to discuss becoming an exhibitor at Counter Terror Expo: T: +44 (0) 20 7384 7942 E: [email protected]: +44 (0) 20 7384 7837 E: [email protected]
Book your
stand to
day
Organised byFollow us onCo-located with Strategic Media Partner
75032.003_CTX03A_Advert_A4_Counter Terror Business_2015_v2.indd 1 15/08/2014 09:30
The operation of today’s, border security, traveller and migration management community is being stressed by geopolitical, social and economic events. Our world is fully interdependent, and it is becoming ever more challenging to find solutions which include the utilisation of border services and agencies to protect nations. As the crisis in Eastern Europe escalates, economic sanctions and travel bans are increasing, being employed by both the EU and Russia, as well as their allies. Border services are front-line responders for monitoring these sanctions and bans.As the Ebola virus spreads within and beyond West Africa, travel bans and possible quarantine measures are being put into place. Border services are now front-line responders for monitoring these bans and for detecting travellers who may be infected. As the post-World War 1 borders of Iraq evaporate and a new entity known as Islamic State of Iraq and the Levant emerges, hundreds of thousands of persons are being displaced and are fleeing the region. Border services are now front-line responders for monitoring, recording and directing the movement of these people, most of whom will be refugees.
TRACKING AND MONITORINGAs the United States deals with an unprecedented and clearly well-orchestrated movement of tens of thousands of people – mostly children and adolescents from Central America – arriving at its border with Mexico, its border services are monitoring, detaining and caring for these people in unprecedented numbers. As China, the world’s most populous nation, develops a formidable navy and air force and is posed to succeed the United States as the world’s number one economy, it is flexing its economic and political muscle in Asia and beyond. Border services everywhere are now being pressed to be front-line responders monitoring the import and export of strategic goods and services to and from China. Since the end of the Cold War, there has been a deeply-held belief within the developed world that political and economic integration is the best way to improve global security and avoid potential conflict everywhere. This has created a paradox: the interdependent the world is supposed to make it less likely that extreme conflict between nations or groups of nations will occur. This very interdependence makes it imperative E
As the Ebola virus spreads within and beyond West Africa, travel bans and quarantine measures are being put into place. Border services are now front-line responders for monitoring these bans and for detecting travellers who may be infected
EVENT PREVIEW
KEEPING BORDERS SAFEThe 3rd World BORDERPOL Congress, taking place 9-11 December 2014 in Budapest, Hungary, brings together leaders of the world’s border security establishments to discuss some of the latest challenges facing our borders and the agencies tasked with protecting and managing them
Borderpol CongressTHE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
17 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
BLOK
MESH
P O L M I L ® I S AD I V I S I O N O F
UK LIMITED
Tel: 01376 332591www.polmilfence.com
Specialists in the Design, Manufacture, Hire andSale of On-Ground Temporary Security Fencing
POLMIL® STANDARD FENCE
MODULAR FLEXIBLE DESIGN
POLMIL® ON-GROUND HOARDING
POLMIL® PAS 68 RATED(Test Reports on Request)
POLMIL® AIRPORT APPROVED
POLMIL® MOB ATTACK TESTED
NATIONWIDE INSTALLATION
ON-GROUNDTEMPORARY
SECURITY FENCING
See us onStand Number
C46 at OlympiaDecember 2-3
POLMIL A4 ADVERT 07.2014_Layout 1 02/07/14 17:42 Page 1
that nations cooperate, communicate and consult with one another in a multi-jurisdictional and inter-disciplinary manner.
BORDER SECURITY LEADERSThe 3rd World BORDERPOL Congress, taking place 9-11 December 2014 in Budapest, Hungary, brings together the like-minded leaders of the world’s border security establishments, to contribute to making the world a safer place and discuss some of the latest issues and challenges facing our borders and agencies tasked with protecting and managing them. The opening keynote presentation will be taken by Col dr Gizella Vas, Head of Hungarian Border Policing Unit, Hungarian National Police. This high level, high profile senior border official present will deliver an opening keynote presentation, setting the scene and tone of discussion at this years gathering of border agencies and agencies at the border. The Congress programme includes situational overviews in the opening plenary ‘Migration Movement Challenges from Human Trafficking to Illegal Migration – A global overview’ that will see a series of presentations including the new Director General of Immigration, Ministry of Law and Human Rights, Republic of Indonesia and David Alania, Chief Officer. Police Captain. Border Patrol, Ministry of Internal Affairs, GeorgiaThis years Congress will see panel discussions on ‘Adopting to the changing environment: what border security administrations must do to remain effective’ and ‘In the e-age of documents what is the life expectancy of the passport booklet?’, with senior officials
from organisations including the Singapore Immigration & Checkpoints Authority, International Organisation for Migration, Royal Netherlands Marechaussee and INTERPOL.Other interesting discussions include ‘Should exit controls be reintroduced universally? If so, how do we best share the necessary information across multiple agencies and stakeholders?’ and ‘Setting International Standards in IBM’. The full Congress programme can be found at www.world-borderpol-congress.com, with the latest line up of speakers and participating agencies and organisations.
HOSTED BY HUNGARIAN MINISTRY OF INTERIOR AND NATIONAL POLICEThe World BORDERPOL Congress is being hosted by the Hungarian Ministry of Interior and Hungarian National Police, confirming their official support for this year’s Congress being held in Hungary on the 9th to the 11th of December at the Kempinski Corvinus Hotel Budapest. The World BORDERPOL Congress brings together like minded leaders of the worlds border security establishments to contribute to making the world a safer place, through the continual development and maintenance of the three Cs , that is cooperation, communication and consultation. In our totally interdependent world finding solutions to protect national interests are becoming more and more challenging.The Ministry of Interior and Hungarian National Police are supporting and will be actively participating in the 3rd World BORDERPOL Congress, encouraging nations to cooperate, communicate
and consult with one another, in these challenging times for border security. BORDERPOL has enjoyed a long and fruitful relationship with the Hungarian border management community and Budapest is the home of the BORDERPOL European Secretariat. BORDERPOL is inviting the industry to Budapest, Hungary to join the largest gathering of border agencies and agencies at the border to discuss and debate how working and collaborating with international partners can improve border security for us all.
FURTHER INFORMATIONwww.world-borderpol-congress.com
Bord
erpo
l Con
gres
s
EVENT PREVIEW
Latest confirmed speakers
Clarence Yeo, Commissioner, Immigration & Checkpoints Authority, Singapore
Ralph Markert, Assistant Director, International Partnerships & Development, INTERPOL
Dr Ahmed Alzahrani, Project Manager, Ministry Of Interior, Kingdom of Saudi Arabia
David Alania, Chief officer. Police captain. Border Patrol, Ministry of Internal Affair, Georgia
Cephas Makunike, Zimbabwe Revenue Authority
Ioan Buda, Director General, Romanian Border Police
Director General of Immigration, Ministry of Law and Human Rights, Republic of Indonesia
Mr. Muhamad Anil Shah Abdullah, Director for Police Services, Assistant Commissioner of Police, ASEANAPOL
Ms Angiolelli-Mayer, Project Manager Passenger Facilitation, IATA, Switzerland
Andrus Oovel, Head of the Border Security Programme and Chairman of International Advisory Board for Border Security, Democratic Control of Armed Forces (DCAF), Switzerland
Commodore Vasan Seshadri (ret’d), Head Strategy and Security Studies, Center for Asia Studies, India
Ricardo Bn Baretzky, President, European Centre for Information Policy & Security, Belgium
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
COUNTER TERROR BUSINESS MAGAZINE | Issue 1918
BLOK
MESH
P O L M I L ® I S AD I V I S I O N O F
UK LIMITED
Tel: 01376 332591www.polmilfence.com
Specialists in the Design, Manufacture, Hire andSale of On-Ground Temporary Security Fencing
POLMIL® STANDARD FENCE
MODULAR FLEXIBLE DESIGN
POLMIL® ON-GROUND HOARDING
POLMIL® PAS 68 RATED(Test Reports on Request)
POLMIL® AIRPORT APPROVED
POLMIL® MOB ATTACK TESTED
NATIONWIDE INSTALLATION
ON-GROUNDTEMPORARY
SECURITY FENCING
See us onStand Number
C46 at OlympiaDecember 2-3
POLMIL A4 ADVERT 07.2014_Layout 1 02/07/14 17:42 Page 1
The current rise of Islamic extremism is neither a new phenomenon nor a surprising one. A thousand years ago, the Nazari Isma’ili sect (later known as the ‘Assassins’) spread terror during a 200-year campaign, murdering Crusaders and Muslims to further their political ends. Their first leader established a stronghold in north-west Iran where he recruited, radicalised and trained operatives to murder and terrorise according to his political requirement. There are clear parallels with the rise of the Sunni Islamic group
al-Qaida from its strongholds in Afghanistan and its campaigns against both secular and Islamic targets. Thirteen years later, the ‘fellow travellers’ of the Islamic State (IS) dominate a broad swathe of Syria and Iraq with their bastardised version of Wahhabism. In the modern era, operations by the US and its allies have cost trillions (the US estimates its Global War on Terror (GWOT) cost $3.7 trillion in the decade after 9/11) and have resulted in the deaths in combat zones of over 600,000 civilians and combatants.
However, the various theatres of the GWOT are now characterised by failing states and a rise of Islamic extremism, for which the West must bear much of the responsibility. Despite the many years of combat operations in Iraq and Afghanistan, neither state can be described as stable or democratic, and both interventions are being described, not least by RUSI, as strategic failures. They have been beset by a number of mistakes.
NO CLEAR END-STATEAs a consequence of the West having no objectives following Saddam’s removal, ill-conceived policies such as Deba’athification occurred. Its goal was to remove the Ba’ath Party influence in Iraq’s new political framework. By sacking any public servant with Ba’ath Party membership, the policy dismantled the extant security structure. It moved the former elite to the bottom of the social ladder and removed those competent to provide public services such as electricity, sanitation and governance. As a consequence, Deba’athification: catalysed the initial insurgency; increased disaffection amongst the general population at the lack of basic services and governance; and hamstrung any indigenous capability to treat either problem.
TRACKING THE RISE OF THE ISLAMIC STATESecurity consultant Paul Easter MBE outlines the difficulties Western powers have faced in attempting to build democratic nations in the Middle East, and calls for strategic thinking
Coun
ter T
erro
rism
Despite
the many years
of combat
operations in Iraq
and Afghanistan,
neither state
can be described
as stable or
democratic
WESTERN INTERVENTION
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
COUNTER TERROR BUSINESS MAGAZINE | Issue 1920
Similarly, the West’s intervention in Libya allowed militarily weak anti-Gaddifi forces to overthrow a 42-year despotic regime. Once again, no real effort was applied after the intervention to secure an effective security apparatus or to lay locally acceptable foundations for future political institutions. Now, militias have the balance of power, and the democratic government resides in Tobruk due to Tripoli being held by extremists. As neither side is being militarily decisive, Libya is slipping further into instability. In Syria, the civil war has killed over 200,000. Again, Western intervention did not decisively tip the balance of military power and has only prolonged the conflict. It has also allowed the rise of IS in the spaces not governed by the Syrian state.
SHORT-TERMISMEleven and thirteen years (Iraq and Afghanistan respectively) are very short periods to expect countries with no generational history of democracy to field successful democratic institutions. Previous interventions such as colonial rule in India
took generations to achieve a change that can be regarded as long lasting. Iraqi and Afghan democracies remain as elusive as ever.Despite enormous investments in equipment and training, the Iraqi Army has shown little robustness to deal with internal or external threats, proving wholly incapable to defeat the poorly trained insurgents from IS. This bodes badly for the similarly trained Afghan troops in their expected conflict with the Taliban post US drawdown.
MIRROR–IMAGINGWe all view the world through ‘us’-coloured lenses, believing others will behave as we would in their shoes. Western governments are particularly guilty of this bias, expecting those previously ruled by non-democratic models to embrace democracy like a Western audience. As a result, the recent efforts to impose democracies have largely been failures. While in the West dictatorships and other autocratic regimes are viewed with suspicion, they remain a valid model for some parts of the world. Strong autocratic regimes have held otherwise volatile states together for decades.
Yugoslavia, Iraq, and Libya are all examples. Indeed, the oft-heard cry that Iraq is better off without Saddam is difficult to argue persuasively. For example, it is estimated 800,000 have died in Iraq since 2003, and this figure exceeds the estimates for the whole of Saddam’s 24-year grip on power. ‘Our’ democracy has patently not brought stability to Iraq and Afghanistan, and, without a strong external unifying stimulus in Libya, it is likely to fail there too. IN CONCLUSIONTo conclude, Western interventions in the last twenty years have been categorised by: a lack of clear end-state objectives or a viable means to achieve them; a lack of real politick for state structures and government; and a wholly unrealistic timeframe. As a consequence, most states that have been subject to Western interventions are now ‘anocracies’, the disastrous halfway house between dictatorship and democracy. This chaotic void is when a state is at its most lawless and when groups such as IS flourish. It is ironic that despite one of the principal aims of the GWOT being to remove such groups, it has in fact made them stronger than ever. These are not smug observations with the benefit of hindsight. These are largely repeated observations from recent and earlier history. There is still much thinking to be done at the grand strategic level.
Counter Terrorism
The various theatres of the Global War on Terror are now characterised by failing states and a rise of Islamic extremism, for which the West must bear much of the responsibility
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
21 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
phoenixdatacom.com/GOV-MODphone: +44(0)1296 397711
YOUR HIGH-TECHNOLOGY CYBER-SECURITY PARTNERWITH SECURITY-CLEARED TECHNICAL STAFF
CyberLab FOR DEMOS ON-DEMAND AT IPEXPOEXPERIENCE OUR VIRTUAL
C
M
Y
CM
MY
CY
CMY
K
phoenix-datacom-print-file-August-2014.pdf 1 22/08/2014 11:56
IP EXPO Europe, held on 8-9 October 2014, is Europe’s leading cloud and IT infrastructure event. Designed for professionals across the whole spectrum of IT roles, it is the definitive event to view brand new technologies, and through exclusive keynote presentations, gain fresh insights from the leading thinkers in IT. With cloud, mobility, security, analytics, infrastructure and datacentre technologies all under one roof, IP EXPO Europe covers everything needed to run IT for a successful enterprise. Each year, IP EXPO Europe has seen an increase in attendees, with a large percentage of 2013 attendees coming from Government and public sector, a figure that is expected to rise dramatically for 2014. The show provides an opportunity to join visionary thinkers from Government and the public sector to identify key issues and trends in the market. Located at the ExCel centre, London, for 2014, IP EXPO Europe will this year feature two brand new co-located events, Cyber Security EXPO and Data Centre EXPO, designed to address the new developments and trends in these critical areas. With over 300 exhibitors from the likes of Microsoft, VMware, IBM and Schneider Electric, the show will feature demonstrations and presentations which cover every facet of IT infrastructure, including the cloud, data
centres and the latest solutions to combat cyber-crime. IP EXPO Europe is this year’s must visit event for all IT specialists. The opening keynote speech will be delivered by Sir Tim Berners-Lee, inventor of the World Wide Web, who TIME magazine included in its ‘Top 100 Most Important People of the 20th Century’. Sir Tim will outline his vision for the 2050 Web and how organisations will use it to gain competitive advantage in future. Berners-Lee will also offer his insight into business strategies for innovation and the creation of markets through digital channels.
CLOUD PROOF INFRASTRUCTURECloud provision for the public sector, particularly ‘digital by default’, has become a central theme for discussion. Since the G-Cloud framework was deployed, there has been a commitment from the Government to build competitive digital services which fit public sector business needs. In a time of expanding cloud service options and growing citizen expectations of instant mobile access to information and services, it has never been more important for the public sector to ensure all public sector services are available online. Not only will IP EXPO Europe provide the latest information from leading thinkers, system integrator and service providers,
it will also bring into play insight from the Government. In particular, Government’s chief technology officer (CTO) Liam Maxwell who is well known for his commitment to IT reform within the public sector and most notably the driving force behind ‘digital by default’ will be speaking at IP EXPO Europe.
GOING ELECTRONIC The benefits of back-office efficiencies have been recognised and increasingly promoted since the Gershon Efficiency Review. Major efficiencies could be achieved as a result of electronic procurement and specifically electronic invoicing. It is not surprising then that the UK government has been aligned with the deadlines set up by the European Commission which make e-invoicing in procurement mandatory from 2016 with the aim of making it the predominant method by 2020. Compared to the rest of Europe, the UK is slightly behind with the Nordics leading the way. Since 1 February 2005, for example, all government institutions in Denmark can only accept invoices in electronic format. Ultimately, e-invoicing could save taxpayers billions of pounds, enable the government to tap into new markets and help secure payments more quickly. If we take Denmark alone, each minute saved in invoice processing of the public sector’s 15 million invoices equals to €12 million in savings. If 10 minutes are saved for each invoice, Denmark could attain savings in the region of €120 million per year. Advocates of e-invoicing point at clear examples of best practice and have estimated that the complete roll out by the UK government could result in economic benefits of £22-£28 billion a year in comparison with modest levels of investment. With such solid figures and bad debt losses incurred by European companies at an unprecedented high of €350 billion, it is no surprise that the UK public sector is under mounting pressure to embrace e-invoicing.With late payment of bills remaining a serious concern for SMEs despite the improving economy, governments in Europe are enlisting the adoption of e-invoicing as one of the solutions. This is in conjunction with major and widespread legislative changes. As demonstrated by earlier adoption, e-invoicing leads to faster payments as it reduces the amount of time wasted whilst the invoice is in the post, it shrinks the likelihood of customers claiming they have not received the invoice or that it must be lost in the post while speeding up potential complaints. The programme at IP EXPO Europe 2014 will explore the issues surrounding ‘digital by default’ in the public and private sector, giving insight into the options available to public sector organisations, in addition to examining the benefits and barriers of G-Cloud.
FURTHER INFORMATIONwww.ipexpo.co.uk
EVENT PREVIEW
SHOWCASING ADVANCES IN IT INFRASTRUCTUREIP EXPO Europe 2014 on 8-9 October at London’s ExCel brings together some of the leading minds in cloud and IT. Counter Terror Business takes a look at some of this year’s main attractions
IP Expo
phoenixdatacom.com/GOV-MODphone: +44(0)1296 397711
YOUR HIGH-TECHNOLOGY CYBER-SECURITY PARTNERWITH SECURITY-CLEARED TECHNICAL STAFF
CyberLab FOR DEMOS ON-DEMAND AT IPEXPOEXPERIENCE OUR VIRTUAL
C
M
Y
CM
MY
CY
CMY
K
phoenix-datacom-print-file-August-2014.pdf 1 22/08/2014 11:56
23 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
www.everbridge.co.uk/transportation 0800 0350081
A SINGLE PLATFORM WITH ONE INTERFACE FOR EVERY TYPE OF CRITICAL COMMUNICATION NEED
SITUATIONAL INTELLIGENCE & SOCIAL MEDIA
EMERGENCYNOTIFICATION
MOBILE STAFFMANAGEMENT
vocal.indd 1 8/29/2014 7:11:13 AM
Recognize AND Analyze
Is she a known suspect?
How often was she here this month?
When, where did she enter?
Is she an authorized employee?
How old is she?
www.cognitec.com • [email protected]
Premier face recognition technology for real-time video screening and anonymous people analytics
Has she been here before with another suspect?
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
COUNTER TERROR BUSINESS MAGAZINE | Issue 1924
In a world where everything to everyone is connected through hundreds of thousands of access points, it is becoming incredibly difficult for us to protect sensitive information from falling into the hands of cyber criminals. It is crucial that companies and the government alike have the right safeguards in place to protect their data from cyber criminals who may wish to access this type of information to cause serious harm to the UK’s critical infrastructure. In order to properly safeguard this information, we need to understand the huge scale of enterprises that make up the government’s supply chain. From small businesses to huge conglomerates, all of the UK government’s supply chain is sending highly sensitive information via many channels. In particular, the complex supply chain that links the UK government’s critical infrastructure. The danger here is that if hackers can access information anywhere in the supply chain, there is potential for our critical infrastructure such as power grids and hospitals to be vulnerable to attack. This could then have a catastrophic effect on vital services, from interfering with a patient’s surgery to gaining control of nuclear facilities.
THE THREAT OF CYBER TERRORISM Therefore, unsurprisingly, cyber threats have shot to the top of the UK government and international agenda. In particular, in recent years due to high profile leaks cyber security has become a thorny issue for governments and businesses worldwide. There is no doubting that all this connectivity delivers overwhelming benefits to society, yet the cyber threat represents a very real and tangible danger to all of us on a daily basis. Unfortunately, there is no quick fix and we cannot eliminate the threat completely as cyber criminals will always be keen to exploit the system for their own gain – whether that be politically, economically or personally motivated. However, the most worrying of these concerns, from both a government and citizen perspective which often receives much media speculation, is that of state or privately sponsored terrorism. From criminal gangs to ethnic extremists many believe these groups with the right technical knowledge could pose a huge risk to our critical infrastructure
and cause major damage
to society. Enterprises,
particularly those within the
government’s critical infrastructure supply chain must be clear on their security protocol and understand how to best protect themselves from potential attack.
PROTECTING THE SUPPLY CHAIN This July saw the publication of a plan for 2014-15 by the Government Digital Service (GDS), to commit to open standards to better connect suppliers with the government and achieve the goal of ‘digital by default’ – driving service delivery to digital platforms across government and public sector. Government initiatives such as this are opening the communication channel between government and suppliers, wherever that business may be in the chain. This is a huge step in the right direction and will allow government and businesses alike to better collaborate and ensure that all access points within the system are secure. As a series of keynotes, high profile individuals such as Mikko Hypponen, Chief Research Officer at F-Secure, Andrey Nikishin, Head of Future Technologies Projects at Kaspersky Lab, Bruce Schneier, Chief Technology Officer, CO3 and Edward Lucas, senior editor at The Economist will
be sharing their knowledge and expertise in this area at Cyber Security EXPO in October. At the event they will be discussing how the world is changing, whether cyber terrorism is a real or over-exaggerated threat and how best to protect the enterprise from attack. The discussions will include how to build a defence strategy that works and how big data is a useful weapon in the defence of the cyber threat. Furthermore, the conference will debate information security in the age of social media, discussing the security implications of social media when manipulated by hackers and cyber criminals for personal or political gain.
A MAJOR EVENTCyber Security EXPO will be co-located with IP EXPO Europe at London’s ExCeL in October. Over 300 exhibitors will cover every facet of IT infrastructure, including the cloud, data centres and the latest solutions to combat growing cyber crime. With a massive 16,000 square metres of exhibition space – a 15 per cent increase on last year’s event – this year’s exhibition is a must visit for all IT specialists. Under one roof, this year’s brand new integrated events mean that every professional can gain the insight and advice they seek. This year, the exhibition will include IP EXPO Europe, Data Centre EXPO and Cyber Security EXPO.
FURTHER INFORMATIONwww.ipexpo.co.uk
EVENT PREVIEW
CYBER SECURITY IN A NON-STOP ECONOMYThe effective safeguarding of public sector data is more vital than ever. Cyber Security EXPO 2014 on 8-9 October at London’s ExCel offers visitors the chance to learn about the key issues
Cyber Security
From
small to large
businesses,
the UK government’s
supply chain
is sending highly
sensitive information
via many
channels
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
25 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
Written by Am
ar Singh, chair, ISACA Security Advisory Group
A denial of service attack can have a major impact on services offered internally like the email or file directories and external services including government information and payment portals. A worrying trend flagged up in research by RAND Corporation is that anyone can rent a 24hr DoS attack for a meagre sum of US$50. Mimicking the capitalist economies, the service is sometimes offered with a money back guarantee if it does not work.
CYBER RETALIATION2013 saw the world’s first known instance of a commercial cyber retaliation, more commonly called a CTT or Cyber Tit for Tat, that resulted in a tangible impact on the global internet. Spamhaus, an international non-profit organisation that tracks the Internet’s spam operators, had recently blacklisted an internet hosting organisation based in Netherlands, called Cyberbunker. Their reasons included the allegations that Cyberbunker was openly hosting known spammers amongst other cyber vandals. As a result, there was a gradual loss of internet traffic to Cyberbunker, to which, it is alleged, the Netherlands based company retaliated. In short, Spamhaus was
targeted by a Denial of Service attack of a magnitude that had never before been seen. During that period significant portions of the Internet were affected, emails were delayed (in some cases severely), major websites were very slow or not loading at all, and internet banking was unavailable to many. Luckily for everyone, the internet did not grind to a complete halt.
THE BASICSThe primary objective of a denial of service attack is to deny access to critical resources. These resources can be external as in websites, payment portals or internal resources including directory services like active directory, email systems and corporate networks. It is important to point out that DoS attacks can be both internal and external. External DoS attacks make it to the media headlines primarily because they are external as in, the unavailability of a public facing website or email service.
Internal DoS attacks can sometimes have a greater impact but these attacks don’t often make it to the headlines. For example, the simple act of users unable to login and use their computers for a prolonged period of time is a Denial of Service in action, deliberate or not.
DoS & DDoS: THE DIFFERENCE
DoS stands for Denial of Service and DDoS stands for Distributed Denial of Service. The impact of a distributed attack is often far greater than a regular DoS attack. It must
be noted that in many instances both terms are
used interchangeably. For an analogy of a DoS
attack, imagine an attacker taking a single hammer and attempting
to break a tempered glass. The attacker would have to spend a great deal of time and effort to break it. It would be like one single computer attempting to attack E
MOUNTING A RESPONSE TO THE DIGITAL HIJACK THREATAmar Singh of international IT governance association ISACA reports on the damage denial of service (DoS) attacks can do and shares advice on how organisations can protect themselves
Cyber Security
DoS ATTACKS
The primary
objective of a
DoS attack is to deny
access to critical
resources such
as websites, payment
portals or internal
resources
27 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
With a conference, exhibition and evening entertainment there is plenty to choose from. Visit the website and download the full programme today.
www.terrapinn.com//uavctb
THE UNMANNED HERO
Andy CashmoreStation CommanderWest Midlands Fire Service
Chris RainfordWatch CommanderGreater Manchester Fire and Rescue Service
Cpl. Byron CharbonneauUAS Coordinator: D-DivisionRoyal Canadian Mounted Police
The unmanned hero: UAVs role in protecting the public
Sergeant Simon LuckGatwick Airport Community Safety TeamSussex Police
Dawn HucksonPolice Search AdvisorSussex Police
Examining demand for future payload technology: End user Case studies
Sergeant John OverendTactical Planning UnitStaffordshire Police
What can you learn from global UAV use across the world? An insight into UAV achievements from a variety of countries
21-22 October 2014Level 2, Olympia, London, UK
Unmanned Aerial Vehicles (UAVs) have been recruited by the emergency services as an additional and advanced tool in a variety of operations such as; search and rescue missions, crowd control, border patrol and accident investigations.
The Commercial UAV show brings together current and future UAV end users with manufacturers and service providers and drive innovation in the commercial UAV universe.
Key sessions for emergency services to attend:
The Commercial UAV EU 2014 AD 210-297.indd 1 01/07/2014 10:07
With a conference, exhibition and evening entertainment there is plenty to choose from. Visit the website and download the full programme today.
www.terrapinn.com/uavctb
CMO_CTB19 - FP.indd 1 02/09/2014 10:12
With a conference, exhibition and evening entertainment there is plenty to choose from. Visit the website and download the full programme today.
www.terrapinn.com//uavctb
THE UNMANNED HERO
Andy CashmoreStation CommanderWest Midlands Fire Service
Chris RainfordWatch CommanderGreater Manchester Fire and Rescue Service
Cpl. Byron CharbonneauUAS Coordinator: D-DivisionRoyal Canadian Mounted Police
The unmanned hero: UAVs role in protecting the public
Sergeant Simon LuckGatwick Airport Community Safety TeamSussex Police
Dawn HucksonPolice Search AdvisorSussex Police
Examining demand for future payload technology: End user Case studies
Sergeant John OverendTactical Planning UnitStaffordshire Police
What can you learn from global UAV use across the world? An insight into UAV achievements from a variety of countries
21-22 October 2014Level 2, Olympia, London, UK
Unmanned Aerial Vehicles (UAVs) have been recruited by the emergency services as an additional and advanced tool in a variety of operations such as; search and rescue missions, crowd control, border patrol and accident investigations.
The Commercial UAV show brings together current and future UAV end users with manufacturers and service providers and drive innovation in the commercial UAV universe.
Key sessions for emergency services to attend:
The Commercial UAV EU 2014 AD 210-297.indd 1 01/07/2014 10:07
With a conference, exhibition and evening entertainment there is plenty to choose from. Visit the website and download the full programme today.
www.terrapinn.com/uavctb
CMO_CTB19 - FP.indd 1 02/09/2014 10:12
your website with an electronic hammer denying your legitimate users access For an analogy of a DDoS attack, imagine the attacker paying 10 friends to take the same hammer and attack the glass at the same time. Not only will the glass break faster but the impact of the damage may be greater than a single hammer attack. The attacker hijacks 10 thousand computers scattered around the internet and uses the same hammer, this time multiplied by 10 thousand, to attack your website denying your legitimate users access.
THE THREAT OF INTERNET OF THINGSUntil recently an attacker would hijack thousands of vulnerable computers on the internet to launch a DDoS attack. These vulnerable computers include all types of computers including laptops, desktops or office email servers. Now imagine the same attacker being able to hijack your fridge, smartphone, tablet and a million other of these devices and commandeer an even more catastrophic attack to your website. This is possible and we are already starting to see these Internet of Things (IoT) devices being used as accessories to DDoS attacks.
UNDERSTANDING THE ATTACKERSUnderstanding the attacker and the motivation that drives these attacks is crucial to building the appropriate protection and detection mechanisms. ISACA describes four main types of attackers: unsophisticated opportunists; sophisticated individuals who attack specific targets; those engaged in criminal or corporate espionage; state sponsored advanced attackers. A fifth category could be referred to as insiders, or ‘privileged attackers’. Although technically, this type of attacker can be slotted into any one of the above four categories, it deserves its own classification as very often it is the employee or groups of them that end up causing the biggest disruption and damage to the business. Reasons range from bribery, job dissatisfaction or loss of employment. The privileged attacker is a special kind of attacker as he/she is well versed with the culture, the technology, the technical architecture and most importantly has the explicit trust of his/her employers. In addition, in almost all instances this privileged user has the administrative user details including passwords to all the critical systems and that is why this type of user is also sometimes called the ‘god user’ or ‘superuser’. The motivation of an attacker can be divided into five categories: grievance; crime; hacktivism; espionage and warfare.
THE LOGIC BEHIND CHOOSING A TARGETIn a realm that has no boundaries and no governance framework there can be several reasons that an organisation falls victim to a DoS attack, ranging from the insider, equipped with sufficient knowledge and awareness of the technical landscape, who has an axe to
grind with the management, to the malicious criminal or nation sponsored element that have significant funding, highly skilled and able manpower and the luxury of time to launch targeted or opportunistic attacks. Consider this example. In the past, a denial of service for a business would normally mean having its windows smashed by a bored teenager. That same teenager could muster his friends and break multiple shop windows via a distributed denial of service. Importantly there was and still is physical effort involved in breaking glass and the resulting chaos and loss of business is localised. Today, that same teenager, in many cases working alone, can cause global mayhem, affect the livelihoods of millions of people, deny critical services to hundreds of thousands of people – all from the comfort of their bedroom. If he or she is clever they could develop or produce the program (the equivalent of a stone) themselves. If they have spare change, say a few hundred dollars, the teen could procure a ready made program that guarantees mass destruction.
HOW TO DoSA DoS, in comparison to other more sophisticated attacks, is relatively easy to carry out. Worryingly, DoS and DDoS tools are readily available in what is a thriving underground market for cyber attack tools.In an insider DoS attack, the IT System administrator literally pulls the plug on your email servers and deletes all the files and the backups, meaning all your data is inaccessible or gone. Alternatively, the system administrators permanently delete the authentication infrastructure in your organisation so that no one can log in. A website is the window into the world of commerce, services and information. An outsider DoS attack can deny access to
legitimate users of the site. Some examples of the impact of a DoS attack include: an NHS or surgery website not being able to accept doctors appointments; the site to renew car tax becomes inaccessible resulting in thousands of drivers with expired tax discs; and a council site accepting payments for parking charges is very slow causing many customers who are trying to pay for their fines to try again and again. This further slows the site and more customers cannot pay their fines.
PROTECTION MECHANISMSWhen I visit my clients the first thing I ask is, “How are you protecting against a DoS attack?” There is confusion on most faces and sometimes, the techie amongst them is bold
enough to ask why I bring up DoS before the other more sophisticated attacks like advanced malware attacks (also wrongly called APTs). My answer is that DoS attacks are a nuisance, a waste of effort and skill and in most cases not something that any organisation’s IT teams should have to spend their time dealing with.
BUILDING THE CASESurprising as it sounds, there can be a positive angle to DoS attacks. You see, most people understand the concept and have at some point in their career seen and felt the impact of either an internal or external denial of service. That makes it easy to obtain finance and project board approval, at least in my experience. The case is, in most cases, very straightforward, especially when it comes to building a case for external protection. Not having DoS protection means that your payment or service portal could be inaccessible for several hours, if not days, affecting bottom line, reputation and brand image. In some cases, someone may lose their job for not including this attack vector in their protection strategy.
STOP THEM FROM REACHING YOUI have a very strong opinion when it comes to outsourcing security. However, when it comes to protecting against external DoS and more importantly a DDoS I strongly recommend utilising the services of an established outsourcer. The established firms have the wherewithal to absorb these large scale attacks, and can stop attacks at source. A DoS attack is one of the few tangible forms of attacks that visibly affects employee and customer facing assets like authentication and websites. This material impact often leads organizations to spend
unnecessary financial, human and technical resources in mitigation strategies. The regular recommendations of carrying out a risk assessment and threat modelling apply but consider DoS attacks as a nuisance and annoyance more than an advanced threat.
Your assets will be DoS(ed) as they say and if you are a government body that is involved in an international or local conflict the likelihood of an attack is even greater. It is my recommendation that, unless there are specific reasons, organisations consider offloading the protection from this threat by a strategically outsourced agreement.
FURTHER INFORMATIONwww.isaca.org.uk
If you are a government body that is involved in an international or local conflict, the likelihood of an attack is high
Cyber Security
DoS ATTACKS
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
29 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
The Senior Management team of the Security Industry E Magazine have announced the deserving recipients of the annually presented, Supplier to Industry Award for 2014 as global company, Infranor. The Award recognises the Infranor’s dedication to supplying an evolving industry with the latest in cutting edge product solutions within the slotted and slotless motor sector. On receiving the Award, Infranor’s managing director Adrian Hazelwood commented: “It is rewarding for our company to be recognised by our customers and the market place in general. For us the result of our hard work must always be a happy customer, however it is very special to be recognised by an industry journal as our effort, time and the financial
investment we make to improve motor reliability, performance and flexibility that a continuously changing market needs is often un-noticed. This award is a result of pure teamwork, our customers trust us to find a solution and we use our expertise within our Motor and Drive factories to not only meet but in most instances surpass the customers’ needs and desires. For me to receive the award on behalf of a dedicated team that stretches across the globe is very satisfying, it confirms that our business model, work ethic and skill sets are correct.” Many design engineers working in the field of motion control are familiar with slotless motor designs, but may wonder if these specialised motors signifcantly improve machine performance. In many
cases, they can. Slotless motors offer more torque per frame size, produce more power, run smoother and achieve higher speeds than their slotted counter parts. A closer look at the technology follows, plus realistic tips on evaluating whether or not your application could benefit from slotless motor.
SLOTTED SERVOMOTOR CONSTRUCTIONA traditional slotted brushless servomotor has a stator made of stamped metal sections called laminations that are stacked to form teeth. Wire is wrapped around these teeth; when current flows in the wire, an electric magnet is created in the stator. Permanent magnets are fixed to the rotor. As in slotted motors the permanent magnets in slotless servomotors are fixed to the rotor. However, a slotless stator is built without teeth. Motor windings are wrapped around a temporary mould and then encapsulated to keep them in place. Eliminating the teeth yields many benefits.
APPLICATION BENEFITS FOR SLOTLESS MOTORSHigher torque is beneficial for most applications. More torque usually means higher acceleration and greater machine output. Additional torque also means that a smaller motor may be used, which can save money. A motor that can run fast may be the obvious choice for high speed applications such as centrifuges. But faster speeds can also help reduce overall machine cost and help
AWARD WINNING SLOTTED AND SLOTLESS MOTORSInfranor recognised for its dedication to supplying the latest in cutting edge solutions in the slotted and slotless motor sector
Adve
rtise
men
t Fea
ture
COUNTER TERROR BUSINESS MAGAZINE | Issue 1930
increase machine output. If the machine’s mechanics can handle higher speeds a faster move time is possible. If gear reduction can be selected to optimise torque at higher speed a smaller motor can be used, therefore saving money and weight. Additional power may also eliminate costly secondary mechanics that can shorten machine life and escalate maintenance. These motors have been used in Ordinance in feed systems as well as Linear and Rotational positioning systems, giving the product high torque and speed with modular construction and zero cogging all within a compact size.
DRAWBACKS OF SLOTLESS MOTORSDespite their benefits slotless motors have their drawbacks and are therefore not suited to every application. For any given
size, slotless motors generally have larger diameter rotors, and because rotor inertia increases with the rotors diameter, inertia can increase significantly. Consider an application where load inertia is very low compared to motor inertia and high acceleration is required. In this instance, a slotted motor may be able to accelerate faster than a slotless one. If the slotless motor’s additional torque cannot compensate for the higher torque required to accelerate the system. A slotless motor may also be difficult to manufacture. The motor manufacturer may need to develop customer winding equipment because standard equipment does not do the job. If the choice is made to encapsulate the motor windings in resin to enhance performance and create a more rugged motor, the motor manufacturer must have significant experience with resin materials and the potting process itself. These manufacturing challenges could increase the cost for both manufacturer and end user. Infranor’s success in precision markets has
been strengthened by the successful launch of the Xtrafors Prime series of zero cogging servomotors. These motors offer the latest technology in slotless design. These have been used in Ordinance in feed systems as well as Linear and Rotational positioning systems, giving the product high torque and speed with modular construction and zero cogging all within a compact size. The Xtrafors Prime series is just one of the many exciting ranges of servomotors that are designed and manufactured in Europe and available from any of the global Infranor sales and engineering teams. When asked about Infranor’s future developments, Adrian Hazelwood went on to say: “We must be very conscious that the steps we take forwards with technology is also plug and play with our current offering and
solutions we provide, or at least be a minimum of application disturbance for our customers. We hate the word obsolescence and work hard to avoid it. We must also be aware of the world’s weakening material resources as we continue to develop, and as such new magnet, housing and winding technologies are at the forefront of our R&D. Ongoing developments are many and also in varying fields which is incredibly exciting as they all have their own exacting demands and challenges. We should remain customer focused and market driven. We can only ask our customers to watch this space as there are new core products close to release. As a manufacturer of bespoke solutions in servo motors and servo drives each day is amazing as another customer product is designed, developed, prototyped or shipped.”
FURTHER INFORMATIONFor further information about this award winning company,email enquiries to [email protected] or call 0208 144 2152.
Advertisement Feature
Many design engineers working in the field of motion control are familiar with slotless motor designs, but may wonder if these specialised motors signifcantly improve machine performance
Slotless benefits
Grinding: Smooth motor motion (generated by slotless motors) is imperative as the cogging affected, can produce an undesirable finish on final parts.
Battery Powered Designs: The higher efficiency and potentially smaller size of slotless motors extends operation.
31 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
Adve
rtise
men
t Fea
ture
Once considered an alternative telephony solution, VOIP technology – in particular SIP Trunking (a common method used to connect IP-PBX systems to service providers) and SIP based unified communications is now becoming mainstream technology. It is used by a number of businesses due to its superior calling features, next generation messaging and competitive pricing. However, businesses are often unaware that calls made over the public internet are vulnerable to remote listening-in unless they are strongly encrypted. Many business leaders do not fully appreciate that VOIP phone calls can be a high risk interception, having been sold a telephone communication system that is ostensibly cheaper and superior, but is not protected by call encryption.
THE BOTTOM LINE Unless your telephony provider can confirm call encryption, any calls made over the internet must be considered insecure. This makes eavesdropping a very real business threat. During the course of a telephone call, sensitive information may be divulged either in spoken voice or in the DTMF tones to signal key presses. Your conversations
about business operations, research and development processes and findings, mergers and acquisitions activity, staff and customer data and financial status may be at risk. “At VOIP.co.uk we identified that security had been overlooked in the world of internet telephony. Business leaders and managers do not want to spend valuable time managing their telephone system and worrying about call encryption. Our Customers rely on our SIP Encrypt Service to protect their confidential phone calls, giving them the peace of mind to focus on their core business.“ says Adam Crisp, CTO at VOIP.co.uk.
COMPLIANCE The Payment Card Industry is concerned with IP telephony hacking for obvious reasons and has issued industry standards to ensure that merchants do not put cardholders at risk. If cardholder payments are made via the phone, businesses are mandated by law to adhere to the Payment Card Industry Data Security Standards (PCI DSS). PCI DSS protects against the loss of cardholder data and covers the storage (call recordings), transmission (voice calls or DMTF digits) and processing of card information. If the connection is provided over the internet or
even a private circuit where your service provider can’t warrant against leakage of data, it is crucial that this connection is strongly encrypted to protect cardholder data. SIP Encrypt by VOIP.co.uk has been fully audited and the company has been accredited as a PCI DSS Level 1 service provider. VOIP.co.uk’s SAFEGateway is a simple solution for merchants and contact centres who are required by the banks to prove that their telephony complies with industry standards.
CALL SECURITY FOR EVERY ORGANISATIONIrrespective of business size or sector, whether card payments are accepted or not, chief information security officers and IT managers must take steps to ensure that their customers, employees, products, patients, research and financial status remain fully protected from remote access wiretapping. Visit Voip.co.uk’s stand at the Cyber Security Expo on 8th and 9th October 2014 at ExCeL London.
FURTHER INFORMATIONTel: +44 (0)1869 [email protected]
IP TELEPHONY
SECURE INTERNET TELEPHONY SIMPLIFIEDOnline attacks and phone hacking have dominated recent headlines, from sophisticated high level attacks to small-time opportunists looking for quick financial gain. Adam Crisp, chief technology officer at VOIP.co.uk explains the risks to the telephony industry and looks at possible solutions
SAFEGateway from VOIP.co.uk
Fully penetration tested, this device is included as part of the service and is easily deployed at your site and encrypts all calls to our network. The SAFEgateway protects your business against eavesdropping or unsolicited call recording allowing you to:
Protect critical business information
Reduce risk and protect your confidential data
Comply with Payment Card Industry standards
Ensure data privacy and protect intellectual property
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
COUNTER TERROR BUSINESS MAGAZINE | Issue 1932
Written by M
ike Gillespie, director for cyber strategy and research, the Security Institute
Our world, including our critical national infrastructure (CNI), faces rapidly evolving threats and a constantly shifting threat landscape. We have a level of maturity in handling some of the threat and risk from the physical world, but our ability to handle the threat from cyberspace is still developing and nations are becoming increasingly aware of the attraction of these critical services as targets. The threat to CNI has to be treated holistically as the threat itself is holistic. Bringing a region or nation to its knees from the other side of the world is no longer the stuff of spy movies or fiction novels. It is possible to disable critical national functions without any physical interaction with the site, plant or system you are attacking. The use of malware means that it can evolve and spread, this is what we saw with Stuxnet; originally designed to attack centrifuges in Iranian nuclear reactors, it evolved and ended up going wild, affecting many more networks and systems than it was initially
designed to do. Technology is increasingly networked and this greater connectivity means an increased array of threat sources coming through the cyber vector. INCREASINGLY VULNERABLE
This trend toward the interconnectedness of
everything looks set to grow rather than decline,
and therefore our attitude to threat needs to become more holistic in nature as that is how the threat landscape is evolving. There are
relatively high levels of legacy technology
still in use and this is a contributory factor to the
threat – not all technology was built with the ‘Internet
Of Things’ in mind and this can make it very challenging to secure and maintain securely. For instance anything running on Windows XP will be unsupported, so if it has been used as a platform for any CNI systems this constitutes a major vulnerability. The problem is that
systems can take a very long time to develop and by the time they reach implementation they could actually be obsolete. So really, it is a perfect threat storm for CNI. Let’s look at SCADA systems. The term ‘Supervisory Control and Data Acquisition Systems’ usually refers to centralised systems that monitor and control entire sites, or complexes of systems spread out over large areas that could mean a plant like a nuclear reactor plant or a satellite or an entire country. These are in common use throughout CNI as they are integral to the efficient running of these sites but they are also vulnerable if not properly secured and if you have a determined insider the threat increases dramatically.
HIDDEN TARGETSIt isn’t just the direct threat that needs to be considered; the eventual compromise of the system could actually come from somewhere in the supply chain. Smaller organisations frequently become initial targets but with the criminal’s gaze actually directed toward the larger organisation or more valuable data elsewhere in the chain. Targeting a smaller supplier may offer a much softer target as a launch point. When you think about the UK, more than 95 per cent of our businesses are SMEs and the Government actively courts SMEs to be Government suppliers through frameworks like G-Cloud. If these are suppliers into our CNI and have less than robust security strategies in E
The Security Institute’s Mike Gillespie highlights why those that protect the UK’s critical national infrastructure need to anticipate threats and monitor the technological supply chain
Cyber Security
PROTECTING SERVICES FROM CYBER ATTACKS
It is
possible to
disable critical
national functions
without any interaction
with the site, plant
or system you are
attacking
CRITICAL NATIONAL INFRASTRUCTURE
33 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
place they could be exploited and become an attack vector. Also manufacturers in the supply chain may pose an unintended threat as in general, manufacturers of technology increasingly they are distancing and absolving themselves of responsibility toward creating a secure product in the first place. Add to that the compartmentalisation of modern manufacturing techniques, whereby components of an item could have come from several different suppliers and be
assembled in a totally different region or country and you begin to see the issue more clearly. A good example of this could be the iPhone – some components of the iPhone are actually manufactured by Samsung, presumably in between lawsuits with Apple. So, another key question to be factored into the cyber resilience strategy would have to be, where are you actually buying your tech from? Consider a recent incident in which some Microsoft motherboards were factory issued with built in malware.
INSIDER THREATSSo, the supply chain is increasingly complex and strangulated. Before any piece of technology gets anywhere near any particular area of our CNI, it could have been compromised. All of this is without the human threat, or ‘insider threat’. Insider threat doesn’t have to be malicious, it can come from someone forgetting or avoiding a piece of essential protocol, either through sloppiness and poor training or through genuine mistake.
Obviously there are the malicious insiders who are very determined, potentially knowledgeable and highly motivated. This might be ideological, financial or political motivation. Stuxnet for instance, which was introduced to the Iranian nuclear centrifuges by a USB drive, has been variously attributed to different state sponsored cyber-attack programs.
FURTHER INFORMATIONwww.security-institute.org
Cybe
r Sec
urity
CRITICAL NATIONAL INFRASTRUCTURE
If suppliers into our CNI have less than robust security strategies in place they could be exploited and become an attack vector
The UK’s national infrastructure
The UK’s national infrastructure is defined by the Government as: “those facilities, systems, sites and networks necessary for the functioning of the country and the delivery of the essential services upon which daily life in the UK depends.” The national infrastructure is categorised into nine sectors: communications; emergency services; energy; financial services; food; government; health; transport; and water. Infrastructure is categorised according to its value or “criticality” and the impact of its loss. This categorisation is done using the Government “Criticality Scale”, which assigns categories for different degrees of severity of impact. The Criticality Scale includes three impact dimensions: impact on delivery of the nation’s essential services; economic impact (arising from loss of essential service) and impact on life (arising from loss of essential service).
Plan Design Enable www.atkinsglobal.com/security
Securing strategic advantage
Protecting your organisation from security breaches is not simply a matter of building high fences and implementing the latest firewall and virus checker. Effective security means protecting the businesses’ critical assets in a way that doesn’t inhibit doing business. Understanding what is critical requires a link to be created between security and your business objectives.
By doing this and considering security from an holistic perspective joining physical, personnel and systems security allows you to focus spend on what is most important and brings your business competitive advantage by implementing the most cost effective approach to deliver on your objectives.
Atkins helps clients to secure their strategic advantage by:
• Identifying what is critical to your business• Striking the right balance between security and accessibility of the
key business functions• Creating a safe environment to do business • Reducing risk and vulnerability• Balancing spend on security to get best value from the investment you
make in protecting your business.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
COUNTER TERROR BUSINESS MAGAZINE | Issue 1934
Written by Roger Cum
ming, technical director, Atkins Security
Modern society relies on complex infrastructures, both physical and cyber, for all aspects of daily life. Designers can rely upon a wealth of advice about how to make them resilient to known types of attacks. However, a country’s infrastructure can last for many years and it is impossible to know with accuracy what kind of threats it may need to withstand over its lifetime. Furthermore, the threat can change far more quickly than any defensive postures and adding these retrospectively is invariably expensive. How do those designing the infrastructure build-in protection against threats that they cannot accurately predict? Here are three strategic guidelines that should shape the design process.
WIDER CONTEXTThe first guideline is that the design needs to take place against a wider context, for example a national security strategy or plan that is set by a higher authority (normally the national government). The planning for all types of infrastructure should consider a wide range of potential risks. Underpinning this should be a comprehensive set of relationships between the infrastructure owners and the relevant government agencies that are responsible for assessing security threats and disseminating advice about how to mitigate them. Infrastructure owners must work with these agencies to address any relevant threats; they cannot do this by themselves.
IMPACT DRIVENThe second guideline is that the focus of the design should be on minimising the impact of a hostile event. There is a considerable body of knowledge about how to protect against a terrorist attack or hostile cyber incident. It is essential that designers and architects engage early with security practitioners to understand the impact that a catastrophic event might have on the infrastructure. All too often designers focus on the likelihood of an attack, rather than on what impact it would have and this approach is less likely to produce a design that is capable of withstanding changes to the threat landscape.
HOLISTIC APPROACHThe third of the strategic guidelines is taking an holistic approach. Modern infrastructures rely upon complex technologies that are the interface between the physical and cyber worlds and are known by the collective term Industrial Control Systems. They enable water, gas and electricity to flow; make trains run safely;
improve business productivity; and support domestic and leisure activities. Like all computers, Control Systems can be vulnerable to cyber attack. They can’t just be turned off or rebooted – the focus is on continuous availability rather than confidentiality. The increasingly complex interdependency between the physical and logical elements can be seen in many other areas, including ones with a security function such as access control and CCTV systems. These are now controlled across communications that themselves may
be vulnerable to cyber attack. This could result in sound physical protection measures being compromised in some way. Any holistic approach must also include the people who use the physical and cyber measures in an organisation – that means the whole workforce, not just security practitioners. STRUCTURESecurity functions that are organised in silos are inefficient and obstruct the identification and mitigation of risk. The governance of all security functions should be structured to support an holistic approach. Having different reporting or line management chains for different security functions will stretch channels of communication and introduce potential gaps from which greater risk will emerge.
Effective security starts at the top of the organisation and should be embedded throughout it by a culture in which the day to day activities of everyone contribute effortlessly towards shared protective security objectives. The approach proposed here also makes easier the identification of new threats as they emerge. This is particularly important in the cyber environment where change is a constant factor. Building defences based only on a consideration of a threat that
can change more rapidly than they can be reconfigured will not lead to a secure cyber infrastructure. Only by understanding what is critical to their operations can infrastructure designers and owners start to build physical and cyber systems that can remain resilient in the face of diverse threats.
GETTING THEREThe three guiding principles of considering a wider context; being impact driven; and taking an holistic approach may be easy to say yet much more difficult to achieve. It is vital to get things right from the start and have security considered at the beginning of the design stage, not as a post-build ‘add-on’. Designing-in security must be the philosophy of the future. L
FURTHER INFORMATIONwww.atkinsglobal.com/security
A country’s infrastructure can last for many years and it is impossible to know with accuracy what kind of threats it may need to withstand over its lifetime. How do designers build-in protection against threats that they cannot predict?
LOOKING INTO THE FUTUREThreats, design and predicting the future: “Designing-in” security for critical infrastructure
Advertisement Feature
SECURITY
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
35
Transport Security Expo is the major global exhibition and conference where security manufacturers, systems integrators and distributors connect in a uniquely focused environment with security buyers and policy makers for aviation, maritime, rail and commercial transportation. Last year’s event was the most impressive Transport Security Expo to date, breaking all previous records with 3,866 total attendees, from 88 countries. Transport Security Expo 2014 at London’s Olympia now ups the ante enormously. With an expected 4,500 visitors and 150 exhibitors the event unveils a major suite of initiatives for this market; a package of information and inspiration that make it the go-to destination this 2-3 December. ADS, the trade organisation representing the UK aerospace, defence, security and space industries is the event’s strategic partner. Bob Rose from ADS said “We are pleased to confirm our partnership with Transport Security Expo 2014. The transport security sector has seen considerable growth, both domestically and internationally and ADS members have been at the forefront of this success. Transport Security Expo provides the perfect opportunity
for the sector to come together and share the latest innovations and expertise and the inclusion this year of Major Events Security will only reinforce the expo as a must-attend for the security industry in the UK.”
MARITIME SECURITYLast year’s Maritime Security Conference was a sell-out success and this year will be bigger and even better. The conference will start by honing in on the Port and all of the issues Port operators, owners and security officers face including a focus on physical security, cyber security, information security, supply chain, business continuity, human factors, sabotage and serious crime. Next on the agenda is the issue of protecting vessels and crew against acts of piracy on the seas and also keeping cargo safe end-to-end
across the entire supply chain.The 2014 programme shows an
impressive line-up of worldwide opinion leaders such as:
Gary Skjoldmose-Porter from the United Nations Office on Drugs
and Crime (UNODC); Commodore Arian Minderhoud from the Allied Maritime Command; and Dimitrios Souxes at INTERPOL.
AVIATION SECURITY CONFERENCEThe two-day conference on aviation security brings over 300 aviation security practitioners together to share and debate latest thinking on keeping our airports, planes, people and freight secure. It attracts authorities, owners/management as well as heads, managers and directors of security from the aviation arena. Topics include the risks and threats to aviation, improving the passenger experience, and the technology supporting innovation. E
SECURE MOVEMENT OF PEOPLE AND
GOODSThrough an extensive programme of workshops, an in-depth
conference, and a world-class exhibition, visitors to Transport Security Expo will immerse
themselves in the challenges transport operators face in
maintaining high levels of security
Transport Security Expo
EVENT PREVIEW
The Secure
Transportation
Conference is new
for 2014 and covers
the everyday secure
transportation of
people, goods and
high-value
assets
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
37 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
Rapiscan Systems - the Leading Provider of Security Screening Solutions
Security. Performance. Value. When it comes to your security needs, Rapiscan Systems understands the environment in which you operate — and knows how to protect it.
With the broadest range of products for aviation security, border protection, perimeter security and personnel screening, we provide comprehensive, fully-integrated security solutions.
And with over 15 years experience, global expertise and a world class service and support network, we have the proven capability to meet your most demanding requirements – on time and on budget.
To learn more or to schedule a demonstration, contact us at +44 (0) 870-7774301 (EMEA), +1 310-978-1457 (Americas), or +65 6846 3511 (AsiaPac).
[email protected] • www.rapiscansystems.com ONE COMPANY – TOTAL SECURITY
Rapiscan Systems - General Ad A4 AMEND.indd 1 02/09/2014 10:32
Rapiscan Systems - the Leading Provider of Security Screening Solutions
Security. Performance. Value. When it comes to your security needs, Rapiscan Systems understands the environment in which you operate — and knows how to protect it.
With the broadest range of products for aviation security, border protection, perimeter security and personnel screening, we provide comprehensive, fully-integrated security solutions.
And with over 15 years experience, global expertise and a world class service and support network, we have the proven capability to meet your most demanding requirements – on time and on budget.
To learn more or to schedule a demonstration, contact us at +44 (0) 870-7774301 (EMEA), +1 310-978-1457 (Americas), or +65 6846 3511 (AsiaPac).
[email protected] • www.rapiscansystems.com ONE COMPANY – TOTAL SECURITY
Rapiscan Systems - General Ad A4 AMEND.indd 1 02/09/2014 10:32
The 2014 programme shows an impressive line-up of worldwide opinion leaders such as David Trembaczowski-Ryder from the Airports Council International Europe (ACI EUROPE); Ron Louwerse from Schiphol Group; and Johnnie Müller at Copenhagen International Airport.
RAIL SECURITY CONFERENCEThe attendees to this conference include transport police, government authorities, owners, operators and heads of security, who face an enormous challenge in securing mass transit systems. With millions of passengers in transit, implementing enhanced security whilst not reducing throughput is a critical balance.On top of this the threat posed not only from terrorism but also serious organised crime, cyber, sabotage, cable theft and also the challenge of suicide is a vast task. The Rail Security Conference is the annual gathering place for opinion leaders cross networks and also across the globe to gather and share insight, best practice and practical know-how. Leading speakers to headline this conference include Mark Babington of the PTEG Safety and Security Group;
and Superintendent David Roney, Counter Terrorism Lead at British Transport Police.
SECURE TRANSPORTATION CONFERENCEThe Secure Transportation Conference is new for 2014 and covers the everyday secure transportation of people, goods and high-value assets across the commercial world. It will cover the protection of high value assets, hazardous materials transport, protection and security for high-net-worth individuals, and VIPS, and vulnerability mitigation in secure transportation. The programme is packed full of top-level speakers focusing on key issues, including Phil Wright from Brink’s Global Services and Chairman of the Cash and Valuables in Transit Section, BSI; and William Brown, National Security Adviser at Arts Council England.
MAJOR EVENTS TRANSPORT SECURITY CONFERENCEFollowing 2012’s successful Olympics, London is a global centre of expertise major event security. This
new conference aims to help professionals charged with devising and implementing security plans for major events for transport security find the solutions, ideas and know-how required to deliver robust security strategies. The interlinked and complementary worlds of transport and major events are now reflected at this high-level conference delivering, for the first time, a platform for expertise and shared insight into this globally significant sector. From mega events such as Royal Weddings, the Olympics and World Summits to major music festivals, sporting events and political rallies, somewhere in the world there are teams of specialists planning the investment and management of those events’ security requirements, specifically in transportation. This conference will be relevant for operational, strategic tactical and strategic management
and includes speakers such as:Shuna Mayes, Head of the
Commonwealth Games Safety and Security Unit from the
Scottish Government; and Tim Cutbill from the London Fire Brigade.
TECHNOLOGY WORKSHOPSThe free to attend technology workshops
provide the low-down on the latest equipment,
approaches and capabilities to pre-empt and manage security
risks across aviation, maritime, public transport and secure transportation. Presented by companies with expertise in developing and delivering security products and solutions, the workshops aim to offer insight as well as practical information to help attendees keep up to date with the latest tech on the market, and new releases, that will help ensure our transportation networks, and major events, remain safe & secure. Day one will cover perimeter security; CCTV & video analytics; screening, scanning & detection. Day two will cover surveillance, comms & tracking; secure transportation; and integrated security.
LIVE DEMONSTRATION AREAThe Live Demo Theatre will allow visitors to see real-life incidents unfold on stage and see how expert teams manage a range of scenarios. Be prepared for the mob that tries to spoil the show as they descend on the Live Demo Theatre. Observe the team who manages the situation safely and securely capturing the evidence as they go on body worn cameras beamed to the main screen. Come and see how the experts carry out the critical search of a venue to ensure it is made safe prior to the opening of a major event or in the situation of a suspect package being alerted to security. Ever wondered how our heroic bomb disposal teams inspect and remove potential E
Transport Security Expo
EVENT PREVIEW
The Rail
Security
Conference is the
gathering place for
opinion leaders across
the globe to gather
and share
insight and best
practice
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
39 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
Tran
spor
t Sec
urity
Exp
o
EVENT PREVIEW
Transport Security Expo 2014 showcases a magnificent line-up of the world’s leading armoured vehicle manufacturers
Recognize AND Analyze
Is she a known suspect?
How often was she here this month?
When, where did she enter?
Is she an authorized employee?
How old is she?
www.cognitec.com • [email protected]
Premier face recognition technology for real-time video screening and anonymous people analytics
Has she been here before with another suspect?
IEDs, including the use of high-tech ROVs (Remote Operated Vehicles)? Take a close up look in The Live Demo Theatre. We all recognise the serious threat and potentially devastating consequences of a cyber-attack, especially concerning a passenger aircraft, train or a ship, but what does a cyber-attack actually look like? A hacker and a laptop will come on to the stage to demonstrate how to bypass the most secure of firewalls.
INNOVATIONS HUBThe introduction of the Innovations Hub reflects the requirement for government, industry and academia to look to the future at what next generation security will look like both in terms of transportation and major Events.The Innovations Hub will showcase tomorrow’s world technologies being developed to address future challenges for security including major events around the world such as Tokyo 2020 Olympics and beyond. The Centre for Applied Science and Technology (CAST) within the Home Office is the government’s lead department for research and development in security and together with industry and academia are inspirational in major innovation. The innovation hub offers visitors a unique
opportunity to see a range of next generation equipment and software in its R&D phase.
SECURITY VEHICLE ZONETransport Security Expo 2014 showcases a magnificent line up of the world’s leading manufacturers for armoured vehicles to protect high net worth people, celebrities, diplomats and cash in transit. With the vehicles live on display, visitors will be able to climb in and compare the best of class from some of the leading manufacturers. The Armoured Vehicle Zone will also feature in the live demonstration programme, so watch out for the critical role they’ll play in protecting President Obama, following an attempted hijack inside the show.
HOSTED BUYER PROGRAMMEThe Hosted Buyer Programme is a very important component of the show. It provides top-level buyers an opportunity to meet with leading exhibitors of their choice through a series of pre-arranged, face-to-face meetings. Qualified buyers will
attend the show as guests. They will receive a number of privileges including a free conference pass, complimentary travel and/or accommodation and many other VIP benefits.Participation is free of charge – subject to our qualifying criteria. If you buy, specify or recommend transport security related products or services, either in the UK or overseas; you could be eligible to attend as a Hosted Buyer.
Buyers are typically individuals that are charged with reviewing the best security solutions within the aviation, maritime, public transport and supply chain markets.
GAIN CPDOnce again the 2014 event promises a truly compelling and comprehensive itinerary of CPD accredited content, making a visit to Transport Security Expo not just a valuable learning experience but also an extremely rewarding contribution to your Continuing Professional Development. L
FURTHER INFORMATIONwww.transec.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
COUNTER TERROR BUSINESS MAGAZINE | Issue 1940
RC-ARINC_AIM_Airports2014.pdf 1 03/07/2014 15:50
RC-ARINC_AIM_Airports2014.pdf 1 03/07/2014 15:50
Written by Jam
es Kelly, chief executive of the British Security Industry Association
Surprisingly, prior to 9/11, only ten per cent of passenger luggage checked into US airports was screened for bombs and explosives. Ten years later, we’ve all become accustomed to removing our shoes and limiting the amount of liquid we carry as we pass through airport security. But what of the cargo that often accompanies us on our journeys? Is this, too, subject to the same rigorous security checks?
PASSENGER AND CARGO PLANESIn the UK, around 60 per cent of air freight is carried in passenger planes, with the rest transported on specialist cargo planes. Whilst passenger baggage is subject to inspection by x-ray, only a small amount of air cargo is checked in the same way. In addition, the variation of cargo security rules from country to country can create significant variation in the checks that have been carried out on cargo originating from outside the UK. Airlines themselves are obliged to meet their own government’s regulations, but some airlines go beyond these, including
British Airways, which screens all air cargo travelling on its passenger planes. Courier firm, TNT, also claims to x-ray all packages that pass through its UK depots. Despite this thorough approach, the fast-moving nature of air cargo, as well as its diversity (the majority of air cargo is made up of an eclectic mix of high-value electronics, engineering and machine parts, pharmaceuticals, fruit and vegetables, but can also include scrap metal and cars) means that thorough scanning of every item simply isn’t possible. With that in mind, the security of the airport as a whole must be a primary consideration to avoid compromising the security of the cargo often stored within large airport compounds in preparation for dispatch. British
Security Industry Association (BSIA) members have a growing portfolio of implementing high-security solutions at airports around the
world, including Heathrow, Gatwick and Cork as well as transport
hubs further afield, such as Vancouver and Hong Kong.
AN EYE ON PERSONNELMonitoring the passage of personnel in and around an airport site is a critical element in
ensuring the security of freight and cargo, when
it is stored in compounds awaiting loading. During the
development of Heathrow’s newest Terminal 5, it was immediately recognised
that the site required a proven, fully integrated IP solution that would not only provide 24/7 critical security but would also aid in the efficient flow of 30 million passengers a year. E
A HOLISTIC APPROACH TO AIR CARGO SECURITYWith 26 million tonnes of goods transported by air every year, the security of airborne cargo is of paramount importance against a backdrop of international terrorism. James Kelly, Chief Executive of the British Security Industry Association investigates how the aviation sector is responding to ever-evolving security challenges
Cargo Security
AIR FREIGHT
Whilst
passenger
baggage is subject
to inspection by
x-ray, only a small
amount of air cargo
is checked in the
same way
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
43 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
Carg
o Se
curit
y
Maple have been providing innovative and practical security solutions for the protection of commercial vehicles and goods in transit for 40 years. Our sophisticated security solutions are designed specifically to combat existing and emerging trends in cargo crime, with a commitment to stay one step ahead of organised, commercial vehicle crime. From high specification pneumatic locking systems to remote access control functionality, with Maple, no one comes close.
Call +44 (0)161 429 1580Visit www.maplefleetservices.co.uk
@MapleSecurity
Commercial Vehicle Security Solutions & Protection of Goods in Transit
Picture the scene; You’ve collected your cargo, signed the manifest and hit the road. After four hours continuous driving you arrive at a truck-stop, only to find the seal is broken on your load area doors and half your cargo is missing…but how could that have happened if you never stopped? This is no hypothetical situation, it’s a scenario playing out with all too common regularity across Europe. What started as seemingly tall tales about cargo mysteriously disappearing during transit is now recognised as a very serious and quickly emerging threat. It’s difficult to pinpoint the exact dates, but it’s thought the first reports originate from Romania in 2008. What is certain however, is that incidents are now on the rise. Despite sounding like a scene straight from the latest Hollywood Blockbuster, attacks, dubbed the ‘Romanian MO’, feature a criminal gang closely following a truck, whilst an individual climbs onto the back and passes cargo back to the pursuing vehicle. Perhaps unsurprisingly, reports suggest that thieves willing to take such high-risks are far from opportunistic. Attacks are invariably centred around lucrative cargo such as
tobacco, pharmaceuticals and electronics. The problem is also spreading – the isolated and sporadic cases dating back to 2008 have now been replaced by more widespread activity; German police in North-Rhine Westphalia have recorded more than 50+ incidents in the 12-month period between March 2012-13. It’s no coincidence that demand in more sophisticated commercial vehicle security systems has risen over the past 2-3 years. Maple has been quick to respond, developing their unique IQ range of products to aid operators in their bid to combat the rising threat of cargo crime. The Maple IQ range of products allows operators to tailor systems around their own requirements. The heavy-duty slamlock ensures
that when doors are closed they’re always locked and sealed, while equipment is installed internally for optimum security. Further reassurance and functionality is provided via the powerful access control platform, enabling operators to remotely lockdown vehicles from anywhere in the world, temporarily preventing access even to authorised persons. In the unlikely event that a would-be-
thief manages to overcome the robust physical security, automatic door open notifications are sent to pre-selected personnel. Criminal gangs are methodical and targeted exploiting any vulnerability in the supply chain they can identify. As this latest threat proves it’s more important than ever that operators protect themselves and their business. Contact Maple to discuss your requirements and review the security of your fleet.
FURTHER INFORMATIONContact Paul Nunn+44 (0)161 429 1580paul.nunn@maplefleetservices.co.ukwww.maplefleetservices.co.uk
Combat the rising threat of cargo crime with Maple’s unique IQ range of vehicle security products
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
COUNTER TERROR BUSINESS MAGAZINE | Issue 1944
In this example, the BSIA member company’s powerful and fully-integrated system is the industry’s only airport specific access control system and can be customised to meet the unique and ever changing needs of airports over time. The flexibility and high quality offered by the BSIA member was a key factor in its suitability for T5, in particular the facility for integration of the access control system with other security elements, including CCTV.
A HOLISTIC APPROACHA holistic approach to airport security, based on risk profiles and international best practice, is also at the heart of the UK Government’s plans to modernise the regulatory regime for airport security to bring it into line with better regulation principles, promote innovation and efficiency, while ensuring the best possible passenger experience. In 2011, the Government consulted on its proposals to achieve such modernisation through what it terms as an outcome-focused, risk-based approach (OFRB). This approach enables each responsible organisation to develop its own security management system, building on international risk management best practice. Responses to the consultation – published in the Government’s consultation response in 2012 – revealed that aviation industry stakeholders
and interested organisations agreed that the proposed solution was appropriate for aviation security, with respondents particularly welcoming the flexibility it enables for each responsible organisation to develop its own security management system building on international risk management best practice. On publication of the results of this consultation, the Government set out its plan to roll out the security management system approach over the next three to five years, starting with a pilot programme beginning at London City Airport.
PILOT SCHEMESRecognising that the full benefits of OFRB – in particular a high degree of flexibility for
operators in the design of security processes – will require changes to European legislation, the UK Government has recognised the need to use the pilot schemes to build the evidence base necessary to engage with European legislators to make the case for change. In the meantime, with security remaining at the top of the agenda for airport operators and freight companies around the world, the sharing of best practice and continued technological innovation are at the heart of ensuring that this fast-moving, challenging area of the global transport network remains as safe and secure as possible. L
FURTHER INFORMATION www.bsia.co.uk
AIR FREIGHT
Cargo Security
A holistic approach to airport security, based on risk profiles and international best practice, is also at the heart of the UK Government’s plans to modernise the regulatory regime for airport security to bring it into line with better regulation principles, promote innovation and efficiency, while ensuring the best passenger experience
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
45 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
For military personnel and emergency responders, every second counts when dealing with chemical/biological attacks or incidents. First responders and military organisations typically are the first to arrive to remediate challenges and ensure public safety at both natural and man-made disasters. These teams never know the kind of situation they will find, from areas with high concentrations of radiation to poisonous gas which is why military services around the world already rely on RAE Systems by Honeywell’s highly sensitive PID, multi-gas and radiation sensors to provide greater confidence in their decision making process when encountering the unknown. RAPIDLY DEPLOYABLE THREAT DETECTIONRAE Systems by Honeywell’s recently introduced ProRAE Guardian Real-time Wireless Safety System allows first responders to set up a rapidly deployable, secure wireless threat detection system that
encompasses a broad range of RAE Systems by Honeywell and approved third-party monitors to detect and track:Toxic Industrial Chemicals (TICs/TIMs); flammable gases and vapours; Chemical Warfare Agents (CWA); radiation; meteorological conditions; GPS-based location information; MultiRAE PRO Multi-Threat Monitor. Response teams are then able to share data over the internet in order to facilitate better assessment, mutual response and potential evacuation. Data collected at a site where nerve gas or toxic industrial chemicals are released can also be accessed securely in real-time by any authorised user located anywhere in the world, such as global experts in incident remediation. COMPLETE SYSTEMRAE Systems by Honeywell’s MultiRAE PRO Wireless Portable Multi-Threat Monitor
for Radiation and Chemical Detection is just one example of the numerous RAE Systems by Honeywell detectors that can seamlessly integrate into the ProRAE Guardian Wireless Safety System.
INDUSTRY FIRSTThe MultiRAE Pro is the industry’s first wireless multi-threat detection tool that combines continuous monitoring capabilities for gamma radiation, volatile organic compounds (VOCs) down to parts-per-billion level, toxic combustible gases and oxygen, with Man Down Alarm functionality in one highly portable instrument. Certified to meet the military performance standard MIL-STD-810F, the MultiRAE Pro can be configured with 30
intelligent sensors (including ppb and ppm PID, NDIR, and exotics such as
ammonia, chlorine, formaldehyde, and phosgene) to fully meet the monitoring needs of applications such as HazMat response, CBRN / TIC / TIM detection, EOD, homeland security and civil defence.
Organisations are looking for systems and solutions to enhance safety in hazardous situations and enable faster response times. RAE Systems by Honeywell’s ProRAE Guardian Real Time Wireless Safety System and wireless detection products answer this demand and fulfil a critical need for real-time data access and the
sharing of life critical information.
ABOUT RAE SYSTEMS BY HONEYWELLRAE Systems by Honeywell is a leading global provider of rapidly deployable, multi-sensor chemical and radiation detection networks for national security and industrial applications. The company delivers the most advanced wireless gas and radiation detection solutions for anytime, anywhere access to toxic and combustible gases, and radiation detection information to increase safety of national defence teams, emergency responders and the public. L
FURTHER INFORMATIONContact: Peter BarrattTel: +44 [0] 1202 [email protected]
ADVERTISEMENT FEATURE
REAL-TIME WIRELESS GAS AND RADIATION DETECTIONMilitary services around the world rely on RAE Systems by Honeywell’s highly sensitive PID, multi-gas and radiation sensors to provide greater confidence in their decision making process when encountering the unknown
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
47 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
CQC’s Fibrelight Safety Products
Fibrelight Rod Stretcher: The Fibrelight Rod Stretcher is lightweight and can be swiftly deployed from the compact carrying bag.
The Rod Stretcher offers a rigid support for the casualty that can be easily carried between a team. The stretcher is fully adjustable to accom-modate a wide range of sizes and will securely contain a casualty for a vertical or horizontal lift. The Stretcher can be fitted with floats enabling it to be used for water rescues.
The stretchers compact nature enables it to be easily stowed in anemergency vehicle or cabinet and carried to the scene of the emergency.
Dimensions: -
• Length - 1.65m • Diameter - 175mm • Weight - 6 kgs
Fibrelight Recovery Cradle:The SOLAS approved Fibrelight Cradle is a maritime recovery system that can be operated by a single crewmember. The Cradle can also serve as a boarding ladder, scramble net and stretcher.
The Fibrelight Cradle is lighter, more compact, and more versatile than any comparable devices. The cradle requires only regular inspections and minimal maintenance every three years. The cradle can be easily rolled and stowed.
The Fibrelight Recovery Cradle is primarily designed for use by rescue craft, rigid inflatables and ship lifeboats and marinas, however it can have multiple other uses.
It forms both a robust scramble net as well as a temporary stretcher for immediate casualty evacuation. Fibrelight Cradles are available in lengths of 2, 3, 4 and 5 metres and are 1.3 metres wide. The Cradles are amazingly lightweight, a 3 metre cradle weights as little as 5 kilograms.
Fibrelight StructureAll the Fibrelight products are manufactured using re-enforcing rods of Carbon Fibre that are enclosed within tubular webbing with flanges. When fitted and sewn at right angles between the double thickness pockets of a second webbing an incredibly strong structure is created.
Patent Numbers: -GB - 2451127, Patent Application no:- US 12/669084. Europe - EP2178743
SOLAS APPROVAL CRADLE - SAS S100150/M1
t: +44 (0)1271 345678 e: [email protected] w: www.cqc.co.uk
If you are interested in CQC’s Fibrelight products please either scan this QR code or contact us on the detail below.
Visitors to this year’s Emergency Services Show will not only be able to see and handle the latest PPE and equipment in the exhibition, but also hear user feedback from police colleagues and CBRN specialists in the new free-to-attend seminars. Taking place at the NEC Birmingham on 24-25 September, the Emergency Services Show will feature two seminar theatres: Innovation & Technology and Interoperability & Collaboration. The Innovation and Technology programme includes sessions of relevance to counter terror professionals and will cover the latest developments in PPE, Body Worn Video (BWV) and mobile communications.
SPEAKERSSpeakers include Inspector Tony Price of Leicestershire Constabulary and Malcolm Peattie, specialist advisor at the Police CBRN Centre. The Interoperability & Collaboration seminars, developed in partnership with the Joint Emergency Services Interoperability Programme (JESIP), will include case studies presented by category 1 and 2 responders and examine the future role of Local Resilience
Forums. The full seminar programmes will be published on the event website. Now in its ninth year, the annual Emergency Services Show is particularly relevant to those involved in helping the UK to combat, respond to and recover from increasingly unpredictable acts of terrorism, from armed attacks through to chemical, biological, radiological and nuclear (CBRN) threats. It comprises an indoor and outdoor exhibition showcasing the latest vehicles, equipment and technology, as well as an Emergency Response Zone featuring over 80 support responders, voluntary sector partners and NGOs. Here is a look at some stands that will be of particular interest to visitors. Over the course of the show, a team of experienced cross-capability officers
representing CBRN(E) including Detection, Identification and Monitoring (DIM), will be available to speak to visitors.
RADIATION PROTECTIONThe military, emergency services and civil defence agencies have unique requirements for radiation protection of personnel and the public. James Fisher Nuclear (JFN) products for these markets cover a wide range of requirements. These vary from personal electronic dosimetry to allow for the monitoring of personnel doses in live time, to portal monitors for both vehicles and persons to enhance the surveillance capabilities at entrances and exits of key facilities, transport hubs or events. The range also covers hand held search and frisk probes which can be used to locate, detect, identify and classify radioactive material.
MASS CASUALTY TRAININGExhibitor, Amputees in Action, is an agency which provides amputee actors and special effects. It took part in London Fire Brigade’s largest and most comprehensive exercises in its history this May: a three-day exercise based
around a plane crash in the capital. It was a unique opportunity for the blue light services to work together effectively to practice the life-saving skills that would be used should a major incident ever occur in the capital. Over 100 volunteers from a university paramedic course and actors from Amputees in Action played the part of ‘casualties’ to provide a realistic mass casualty environment for the emergency service personnel taking part.
SURVEILLANCE EQUIPMENT SUPPLIERSSurveillance equipment suppliers include Edesix, Excelerate Technology, Pinnacle Response and Reveal Media. Body Worn Video (BWV) and other wearable technology remains high on the agenda and visitors will be able to see the latest cameras and discuss E
EVENT PREVIEW
ADVANCED DEFENCE KIT AT EMERGENCY SERVICES SHOWNow in its ninth year, the Emergency Services Show is particularly relevant to those involved in helping the UK to combat, respond to and recover from increasingly unpredictable acts of terrorism, from armed attacks through to chemical, biological, radiological and nuclear threats
Emergency Services Show
The Emergency Planning Society
As well as exhibiting at the Emergency Services Show, the Emergency Planning Society will be co-locating its AGM at the NEC on 24 September and its annual conference (featuring national and international speakers) at the NEC on 25 September.
Over the course of the show, a team of experienced cross-capability officers representing CBRN(E) including Detection, Identification and Monitoring (DIM), will be available
CQC’s Fibrelight Safety Products
Fibrelight Rod Stretcher: The Fibrelight Rod Stretcher is lightweight and can be swiftly deployed from the compact carrying bag.
The Rod Stretcher offers a rigid support for the casualty that can be easily carried between a team. The stretcher is fully adjustable to accom-modate a wide range of sizes and will securely contain a casualty for a vertical or horizontal lift. The Stretcher can be fitted with floats enabling it to be used for water rescues.
The stretchers compact nature enables it to be easily stowed in anemergency vehicle or cabinet and carried to the scene of the emergency.
Dimensions: -
• Length - 1.65m • Diameter - 175mm • Weight - 6 kgs
Fibrelight Recovery Cradle:The SOLAS approved Fibrelight Cradle is a maritime recovery system that can be operated by a single crewmember. The Cradle can also serve as a boarding ladder, scramble net and stretcher.
The Fibrelight Cradle is lighter, more compact, and more versatile than any comparable devices. The cradle requires only regular inspections and minimal maintenance every three years. The cradle can be easily rolled and stowed.
The Fibrelight Recovery Cradle is primarily designed for use by rescue craft, rigid inflatables and ship lifeboats and marinas, however it can have multiple other uses.
It forms both a robust scramble net as well as a temporary stretcher for immediate casualty evacuation. Fibrelight Cradles are available in lengths of 2, 3, 4 and 5 metres and are 1.3 metres wide. The Cradles are amazingly lightweight, a 3 metre cradle weights as little as 5 kilograms.
Fibrelight StructureAll the Fibrelight products are manufactured using re-enforcing rods of Carbon Fibre that are enclosed within tubular webbing with flanges. When fitted and sewn at right angles between the double thickness pockets of a second webbing an incredibly strong structure is created.
Patent Numbers: -GB - 2451127, Patent Application no:- US 12/669084. Europe - EP2178743
SOLAS APPROVAL CRADLE - SAS S100150/M1
t: +44 (0)1271 345678 e: [email protected] w: www.cqc.co.uk
If you are interested in CQC’s Fibrelight products please either scan this QR code or contact us on the detail below.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
49 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
C
M
Y
CM
MY
CY
CMY
K
experiences with end-users in the exhibition. Pinnacle Response will be showcasing the PR5 Body Worn Video Camera, launched in October last year and recently supplied to Avon and Somerset Constabulary along with Sussex, Northamptonshire and Surrey Police. Meanwhile on the Reveal Media stand visitors will be able to find out more about the London Metropolitan Police Service (MPS) year-long, 500 camera BWV pilot. Despite the MPS initiative being hailed as the biggest pilot in the world, a number
of UK Police forces have already trialled and rolled out hundreds of Reveal’s body worn cameras across their force and now operate with BWV as “business as usual”. In addition, 11 boroughs in the
MPS have been using Reveal’s body cameras for a number of years.
WHAT ELSE IS ON?Other exhibiting organisations of particular interest to counter-terror professionals include: Babcock Critical Services; Bluecher; British Association of Public Safety Communications Officials; Fire Service College; Home Office ESMCP; Institute of Civil Protection & Emergency Management; National Ambulance Resilience Unit (NARU); National Ballistics Intelligence Service; National Chemical
Emergency Centre; Joint Emergency Services Operability Programme (JESIP);
Public Health England; Training 4 Resilience; UK Government Decontamination Services, and the Tactical Training Centre. The NEC is physically linked to Birmingham International Station and Birmingham Airport and is directly accessible from the UK motorway network. Parking
for visitors and exhibitors will remain free of charge. Coaches will
run from Birmingham International Station to the exhibition halls. L
FURTHER INFORMATIONwww.emergencyuk.com
Emergency Services Show
EVENT PREVIEW
The annual Emergency Services Show is particularly relevant to those involved in helping the UK to combat acts of terrorism
Blue lights lift barriers. Who are YOU selling to?
Disposing of ex blue light and security vehicles? Be sure they are properly de-commissioned and only offered to verified motor trade professionals.
Call The Fleet Auction Group now on 01530 833535.
The Fleet Auction Group Ltd, Brindley Road, Stephenson Industrial Estate, Coalville, Leicestershire, LE67 3HG Tel. 01530 833535 Fax. 01530 813425Email: [email protected] www.fleetauctiongroup.com
Don’t let a terrorist’s dream become your worst nightmare
Blue light advert CT 14/10/13 10:14 Page 1
C
M
Y
CM
MY
CY
CMY
K
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
51 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
The Emergency Services Show - Covering the entire spectrum of the Emergency Services
“If you're looking for the latestbluelight knowledgethis is the Show to attend.”
rmingham | 24-25 September 2014 | www.emergencyuk.com | NEC | Birmingham | 24-25 September 2014 | www.emergencyuk.com | NEC | Birmingham | 24-25 September 2014 | www.emerge
With over 400 key suppliers of kit and services waiting to meet you, along with free seminars, workshops and
demonstrations, The Emergency Services Show is the only event you need to attend this year. Register for FREE visitor
entry at www.emergencyuk.com. See you in September!
Free visitor entry at www.emergencyuk.com
FREE PARKINGfor all visitors thanks to Follow us on twitter
@emergencyukshow #ESS2014
Event Supporters
ESS14generalA4.qxp_Layout 1 05/08/2014 10:38 Page 1
The Emergency Services Show - Covering the entire spectrum of the Emergency Services
“If you're looking for the latestbluelight knowledgethis is the Show to attend.”
rmingham | 24-25 September 2014 | www.emergencyuk.com | NEC | Birmingham | 24-25 September 2014 | www.emergencyuk.com | NEC | Birmingham | 24-25 September 2014 | www.emerge
With over 400 key suppliers of kit and services waiting to meet you, along with free seminars, workshops and
demonstrations, The Emergency Services Show is the only event you need to attend this year. Register for FREE visitor
entry at www.emergencyuk.com. See you in September!
Free visitor entry at www.emergencyuk.com
FREE PARKINGfor all visitors thanks to Follow us on twitter
@emergencyukshow #ESS2014
Event Supporters
ESS14generalA4.qxp_Layout 1 05/08/2014 10:38 Page 1
While it is possible to purchase consumer-grade equipment and place it in a ruggedised case, do you really want to rely on a compromised solution when life and death could be in the balance? Military and counter terror operations are, quite literally, the front line, where equipment failure is not an option. In such situations, relying on the same hardware that a civilian would use for emails, photos and web browsing could put missions – and lives – at risk. LATEST TECHNOLOGYGetac has total ownership of the design and manufacture of its rugged mobile computing solutions. Its products use the latest technology, materials and manufacturing processes, ensuring every component is fully ruggedised. Getac’s hardware is designed to perform in critical working environments reliably at the highest performance. Placing consumer
hardware in a rugged case may be a seemingly cost-effective alternative, but by definition, that case is designed to be opened – which means it comes with an inherent vulnerability creating a high risk of failure. Getac rugged computers are designed with separate GPS and 3G/4G modems with separate antennas to ensure independent performance in applications requiring both functions simultaneously. Most consumer technology offer a single modem for both functions, resulting in reduced performance under the same conditions. It’s also important to have access to a range of form factors to meet the field challenge – be that a fully rugged server for a Forward Operating Base, or a secure tablet for defence scenarios. MARKET LEADING FEATURESFor a balance of portability and power, the Getac V110 convertible notebook tablet offers an 11.6” high-definition screen, the latest Intel® 4th generation Haswell processing technology and LTE compatibility. Additional market-leading features include
Getac’s new 3D aerial technology (enabling fast download/upload speeds), dedicated SiRFstarIV™ GPS (offering faster positioning and improved accuracy) and dual hot-swap battery (providing 8-10 hours’ operating time). It is one of the world’s thinnest and lightest devices of its type in the world, yet is also MIL-STD-810G and IP65 rated, meaning it incorporates military-grade ruggedisation without compromise on performance. For more demanding applications where server capability is required, the X500-G2 Rugged Mobile Server offers users the ability to deploy a mobile rugged server to the field giving instant server capability at the start of operations. MIL-STD-810G certified and IP65 rated, the X500-G2 offers as standard a large 15.6” QuadraClear® display (800nits) which provides enhanced screen readability under sunlight and graphic capability in outdoor environments. Powered by the Intel® Core™ i7 vPro™ processor with 32GB RAM and 500GB storage, multiple applications can be
run simultaneously without compromising on performance. RAID expansion is possible, holding up to five shock-protected disk drives, offering up to five terabytes of storage. Secure encryption solutions are available from Becrypt and Viasat. PORTABILITYFor those applications where portability is crucial, Getac’s Z710 7” Android rugged tablet, built with Becrypt’s Titan II encryption platform, provides a fully secure system that can support a range of applications that defence markets can use with confidence. Aimed at sectors that require a fully rugged mobile device, the Z710 weighs just 800g, with a battery that gives more than 10 hours of operational time. It is a fully integrated device, which includes a 1D/2D barcode reader and an advanced GPS technology (SiRFstarIV™) accurate to 1.5 metres. The hardware is supported by Becrypt’s secure software Titan, which ensures that all device application and user data is protected with FIPS 140-2 compliant encryption. Administrators also have complete control,
so they can create separate encrypted user accounts or personas, enforce strong authentication, and manage different application and device policies - all of which reduce support and maintenance overheads. The Z710 Titan is currently undergoing trials with Northrop Grumman, indicating the serious potential of the device to revolutionise field operations. L FURTHER INFORMATIONIf you would like to discuss any aspect of your rugged computing requirements, call 01952 207 221, e-mail: [email protected] or visit www.getac.co.uk
Getac rugged computers are designed with separate GPS and 3G/4G modems with separate antennas to ensure independent performance in applications requiring both functions simultaneously
ADVERTISEMENT FEATURE
RUGGED AT EVERY LEVELGetac provides rugged computing solutions for demanding professionals in extreme environments
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
53 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
when image matters
Professional Unmanned Aerial Vehicle Operators
Surveys Assessments InspectionsCorporate Member
MRL Eye LimitedAlfred House
RopewalkKnottingley
West YorkshireWF11 9AL
United Kingdom +44 (0) 1977 622000
www.mrleye.com
MRL Eye_CTB19 - FP.indd 1 03/09/2014 14:54
when image matters
Professional Unmanned Aerial Vehicle Operators
Surveys Assessments InspectionsCorporate Member
MRL Eye LimitedAlfred House
RopewalkKnottingley
West YorkshireWF11 9AL
United Kingdom +44 (0) 1977 622000
www.mrleye.com
MRL Eye_CTB19 - FP.indd 1 03/09/2014 14:54
The Commercial UAV Show 2014 will be the largest global gathering of the commercial and civil UAV (unmanned aerial vehicle) universe. With 1,500 attendees, more than 70 exhibitors and over 80 speakers, this free event will provide its audiences with crucial insights into this emerging market and enable them to hear first-hand from both industry and end user organisations who are leading the way in this exciting space. They will come to learn from a range of case studies presented in five theatres about how people in many sectors are saving money and achieving vast increases in productivity and reliability through careful application of UAV systems and technology. They will learn how almost anyone with significant scale or expanse of facilities or infrastructure can benefit from a UAV system. Visitors to the show will benefit from a number of key features. Key speakers at the show include: Cpl. Byron Charbonneau, RCMP forensic collision
reconstructionist, Royal Canadian Mounted Police; Nicolas Pollet, head of UAS Project, SNCF; Barnaby Wiegland, marine specialist, project development directorate, EDF Energy Plc; and Professor Simon Blackmore, head of engineering, Harper Adams University.
ON-FLOOR SEMINARS Those attending the Commercial UAV Show’s Technical seminar will experience two jam-packed days of UAV manufacturer and end user presentations, case studies, displays and audience Q&As. The seminar programme is comprised of 20 minute speaking sessions carefully sculpted to provide attendees with a direct insight into current and future successful commercial UAV operations, the latest UAV technologies,
future plans for regulation and a sneak peak at some of the high quality data captured by a variety of
unmanned platforms. With speaker participation
from a mix of industry innovators and service
providers as well as content from successful UAV end users, visitors
will be able to make new contacts and access pioneering projects that will help benefit your own organisation.
END USER ZONE The end user zone allows attendees not only to meet with UAV manufacturers on the exhibition floor but crucially, to learn about successful cross-sector UAV projects that are happening right now from UAV end users at their individual exhibition booths. Allowing those attendees with ‘exhibition only’ passes to still be able E
EVENT PREVIEW
FLYING THE FLAG FOR THE GLOBAL UAV MARKETThe Commercial UAV Show 2014 on 21-22 October at London’s Olympia represents a unique opportunity for industry leaders to exchange key insights on the unmanned aerial vehicle market
Comm
ercial UAV Show
Case studies will show how people are saving money and achieving vast increases in productivity through the use of UAV systems
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
55 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
to learn about current commercial UAV operations and how this emerging technology is helping a multitude of companies to reach their various industry-specific organisational goals. The end user zone will be especially educational for those attendees who are still in the exploration stage of understanding the various cost-benefit and operational efficiencies that UAVs can offer. Current end-user exhibitors include SNCF and BBC World Service.
CHARITY ZONE The Commercial UAV Show 2014 attendees can now meet with attending global charities in the exhibition Charity Zone. Part of The Commercial UAV Show’s message is to help raise awareness and further promote how UAVs are making a positive difference to charity missions across the world. UAVs are being increasingly utilised in environmental, animal welfare and humanitarian missions and the Charity Zone has been created to support the cause of several international Charities who have adopted UAV technology to aid their missions and make a positive impact to the world we live in. Join organisations like Wildlife Air Service, Open relief, Conservationdrones.org and Medair at the Charity Zone to find out more.
KEYNOTE SPEECHThe opening keynote address on commercial UAV application will be taken by Mike Rickett, Deputy Senior Vice-President of Selex ES. This session will analyse the current development of a commercial market for UAVs and critically analyse the future short-term potential for the commercial UAV market. It will give a manufacturer perspective on the promising roles of UAVs in the commercial universe, and compare and contrast commercial end user requirements across different market verticals. Following the keynote, there will be an end user showcase, looking at which market across the industry sectors has the most potential need for UAV use and which markets are currently using commercial UAVs successfully. Speakers include Prof Simon Blackmore, Head of Engineering at Harper Adams University; Thomas Hannen, Senior Innovations Producer at the BBC; and David Edem, Head of Business Technology at Tullow Oil. AFTERNOON SESSIONThe afternoon session looks at the myth of the danger drone: Overcoming misconceptions about UAV use. It will examine how safe certified platforms and pilots are and demonstrate the full range of critical considerations that are addressed when commencing UAV flights. It will also discuss the importance of separating professional UAV use and capabilities from the hobbyist community and finding answers to platform durability across differing contexts and operational tasks. Following the presentation, there will be mini showcases from Jonathan Ledgard, Director at The Swiss Federal Institute of Technology; Dr Peter Enderlein, Senior Marine Science Engineer at the British Antarctic Survey; and Serge Wich, Co-founder of ConservationDrones. L
FURTHER INFORMATIONwww.terrapinn.com/uav
Comm
ercial UAV Show
EVENT PREVIEW
The end user zone allows attendees not only to meet with UAV manufacturers on the exhibition floor but crucially, to learn about successful cross-sector UAV projects that are happening right now from UAV end users at their individual exhibition booths
Ultra high performing, extremely compact UAS LiDAR sensor
NEW RIEGL VUX®-1
www.riegl.com
RIEGL LMS GmbH, Austria | RIEGL USA Inc. | RIEGL Japan Ltd. | RIEGL China Ltd.
ULS
Introducing the World´s first survey-grade UAS laser scanner!
The VUX®-1 is a compact and lightweight laser scanner for unmanned aerial missions.| weight approx. 3.6 kg | accuracy 10 mm | up to 550 kHz PRR | long measurement range | up to 200 scans/sec | 330° field of view | echo digitization & online waveform processing | multipletarget capability | multiple time around processing | parallel scan lines | various IMU integration options | internal data storage 240 GByte | data storage on external USB devices | integrated LAN-TCP/IP inter-face | flexible, easy system installation
RIEGL offers a whole family of proven Airborne Laser Scanner Systems & Engines for every purpose:LMS-Q1560 Dual Channel, High Performance, Fully Integrated Airborne LiDAR Scanning SystemLMS-Q780 & LMS-Q680i High Altitude, High Speed Airborne Scanner EnginesVQ-820-G Topo-Hydrographic Airborne Scanner Engine VQ-480i & VQ-480-U Compact & Lightweight Airborne Scan-ner Engines, for helicopters & UAS
other types on request
Introducing the World´s first survey-grade UAS laser scanner!Introducing the World´s Introducing the World´s Introducing the World´s Introducing the World´s
FOV330°
field of view (FOV) up to 330°
VUX®-1 mounted on UAS, e.g. Flying-Cam 3.0 SARAH
© F
lyin
g-C
am
compact and lightweight
3.6 kg
10 cm0 cm 20 cm 30 cm
October 21-22, 2014London | UKBooth #37
Meet us at
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
57 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
Manual and Automatic Shop Front Systems Access Systems Commercial Residential
Bi-Folding Door Systems Fire Exits Curtain Walling Louvre Systems Service Contracts Panic Bars fitted
CALL US NOW ON: 01274 876178AMP Access Systems, Unit 5-6, West End Mills, Brick Street, Cleckheaton, BD19 [email protected]
With a team of people made up of experienced design and service people we can offer a complete package when it comes to access systems.
We are happy to discuss any bespoke requirements that you may have. If you think that we can be of service to your business, please call or email us today.
accesssystems
EDM SALES, SERVICE AND SUPPORT
Service Contracts Avai lable Breakdown Service Available Spare Parts Available Cal ibration and Testing Avai lable
CALL US NOW ON: 01274 876178 Advanced Machining Products Limited, Unit 7, West End Mills, Brick Street, Cleckheaton, BD19 5EH www.advancedmachiningproducts.com [email protected]
Here at Advanced Machining Products we have got over 100 years combined experience in the sale, service and support of EDM and wire EDM machines. Most types of machines can be supported including bespoke equipment from aged manufacturers. Specialising in the following machine types:
JSEDM Joemars Mecrode Agie FANUC Wire EDM Vectstar Eroda Transtec Amchem Sparcatron
We also offer the following new machines: Fast Hole EDM Drilling Machines STEM Drilling Machines ECM Machines PECM Machines Laser Drilling Machines Advanced Monitoring Systems with
Profile Logging
With a team of people made up of experienced design and service engineers we can offer a complete package when it comes to EDM and ECM technology. We are happy to discuss any bespoke requirements that you may have. If you think that we can be of service to your business please call or email us today.
EB304N
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
COUNTER TERROR BUSINESS MAGAZINE | Issue 1958
Written by Richard Barrett CM
G O
BE, associate fellow, Counter Terrorism
, The Royal United Services Institute
ISIS threatens long-term disorder across the Middle East. The UK does not need draconian legislation at home, but strong diplomacy and co-operation with its partners in the region to help them achieve long-term stability.Within the space of a week in August, both Prime Minister David Cameron and Home Secretary Theresa May commented on the threat posed to British national security by the self-styled Islamic State, and in particular by its British members. The home secretary estimated the number of British citizens who had travelled to join ISIS or other terrorist organisations in Iraq and Syria as ‘at least 500’.
PREVENTING RADICALISATIONThe recent beheading of US journalist Jim Foley, apparently by a British male, and the comments of former ISIS hostages that they were guarded by three violent British members of the group, certainly suggest that more should be done to prevent extremist radicalisation in Britain and its possible consequences both here or overseas. But as Raffaello Pantucci pointed out here on 21 August, the direct
threat from ISIS to the United Kingdom is currently more assumed than proven. The prime minister described ISIS as ‘an exceptionally dangerous terrorist movement’ that would ‘target us on the streets of Britain’ as soon as it was strong enough to do so. In similar vein, the home secretary wrote of the ‘very deadly threat we face from terrorism at home and abroad’, and their headline policy prescriptions largely reflected the premise that if ISIS had yet to attack us, it was only a matter of time before it did. Beneath the flurry of interrupted holidays and calls for immediate action, amplified subsequently by London Mayor Boris Johnson’s proposal to upend the presumption of innocence in legal proceedings against anyone travelling to Syria, both the prime minister and the home secretary show a more
measured approach than their dramatic language might suggest. David Cameron rightly points out that in order to deal with ISIS, one needs to understand the true nature of the threat it poses. This is a threat not to the United Kingdom, but rather to the established order – or disorder – in the Middle East.
PENETRATING SOCIETYISIS is an insurgent group that uses terrorist tactics to soften up its targets and intimidate its opponents prior to mounting a more conventional armed assault. Its car bombs and suicide bombers are more effective and easier to aim than long-range artillery fire. These tactics not only spread fear but also suggest that ISIS has secretly penetrated deep into local society. Assassinations achieve
the same effect, as well as removing key opposition figures. These terrorist
tactics are of course exportable, but for now, ISIS deploys them
to conquer territory, not to avenge or stimulate attacks from outside. Its objectives are local and the ‘poisonous ideology’ that worries the prime minister merely cloaks a desire for power.
As the Prime Minister points out, the new
Iraqi government will therefore be the most critical element
in the effort to defeat ISIS, and E
To counter the threat of ISIS, the UK must help regional partners to create a new, legitimate order, says Richard Barrett CMG OBE, Associate Fellow, Counter Terrorism at the The Royal United Services Institute (RUSI)
Counter Terrorism
A LEGITIMATE NEW ORDER TO COMBAT ISIS THREAT
“..These
terrorist tactics
are of course
exportable, but for
now, ISIS deploys
them to conquer
territory..”
COUNTER TERROR STRATEGY
59 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
Copper & Optic Terminations LtdCopper & Optic Terminations Ltd specialise in sub contract Electronic wiring, cable and fibre optic assembly and test for the military, defence, aerospace, medical, mining and professional electronics industries.
We aim to provide a world class customer service by offering our customers on time deliveries of products to the highest possible quality standards, in-line with our BS EN ISO9001:2008/AS9100 REV C accreditation.
Quality PolicyIt is the Company policy to provide all customers products that are fit for their intended purpose and conform to customer and relevant regulatory requirements. Our policy is to exceed all customers’ expectations for:
QUALITY OF PRODUCTS • CUSTOMER SERVICE • DELIVERY
Management CommitmentTo acheive these goals Copper & Optic shall adhere to these principles:
• Understanding the customer’s requirements in full• Communicate with the customer at all times• Communicate the goals to all Copper & Optic employees• Implementation of a continuous improvement philosophy• Implementation of a quality system that helps the business
Copper & Optic Terminations LtdUnit 1, Stone Road Business Park,
55 stone Road, Stoke on Trent, Staffordshire ST4 6SRt: +44(0)1782 275810 e: [email protected]
www.copperandoptic.com
Services• Cable assemblies and cable harnesses• Copper and fibre optics• Rack, panel or cubicle assembly• Turnkey product management for complex assemblies• PCA and PCB assemblies• ESD Area• Electronic modules• Testing using Dit-mco circuit analyser, Dynalab ATE, ATE Cirris
• Attention to detail• Build standard control• High quality standards • Own developed integrated computer database • Quality customer service • Rapid response
Counter Terrorism
apart from encouraging it to take action that reduces crucial Sunni tribal support for ISIS, the UK must help persuade other countries in the region, which he lists as Saudi Arabia, Qatar, the UAE, Egypt, Turkey and ‘perhaps’ Iran to take action as well. I would strongly urge him to remove the ‘perhaps’ before Iran, because it is only this group of countries as a whole that can plot a path for the future of the Middle East.
FEEDING OFF LACK OF GOVERNANCEISIS feeds off the growing sectarianism in the region; the widespread mismanagement of government; the lack of governance; the education systems that do nothing to foster tolerance or even a reasoned approach to learning; the primitive understanding of the value and role of women in society; the crimping of freedoms of expression and assembly, and the widespread failure to encourage political debate. It is a region in need of serious change, and if change only comes on the back of the horrors perpetrated by ISIS, at least its actions will have led to something more than mere death and destruction.
The UK may now be a middling power, but it still has some influence in the Middle East. The Prime Minister writes of the tools at his disposal as ‘aid, diplomacy, [and] our military prowess’, and while he might like to tone down the emphasis on military means, which have produced rather mixed results, aid in the form of capacity building and diplomacy are both sorely needed, especially the latter. But one of the reasons that the UK still has influence is the perception that it operates according to a sensible mix of pragmatism and idealism. Its system of government, imperfect as it is in so many ways, takes as given many of the attributes that seem so unattainable for all but the ruling cliques of Middle Eastern states.
UNNECESSARY LEGISLATIONThis is why we will do ourselves no favours, either at home or abroad, if we allow the graphic image of ‘a terrorist state on the shores of the Mediterranean’, to use the prime minister’s words, to take us still further down the road towards harsh and unnecessary legislation aimed at an as yet ill-defined threat. Confiscating passports and stripping
people of their citizenship may be necessary in some cases, as may arresting returnees from Iraq and Syria, but these measures are not going to stop people going or wanting to go. In her article, the Home Secretary makes a robust appeal for ‘the legal powers we need to prevail’ against terrorism, but she also emphasises the effort her department is making to understand and address the reasons why people raised in Britain should want to join groups in Syria and Iraq that make no secret of their brutality and intolerance. This is where the real work lies, and just by making a genuine effort in this direction, the government will do more to counter the appeal of ISIS than any amount of arrests and exclusions. It will also increase the UK’s ability and legitimacy to make suggestions to its overseas partners in the Middle East as to how they might promote longer-term stability in their troubled region. L
FURTHER INFORMATIONwww.rusi.org
In her article, the Home Secretary makes a robust appeal for ‘the legal powers we need to prevail’ against terrorism, but she also emphasises the effort her department is making to understand and address the reasons why people raised in Britain should want to join groups in Syria and Iraq that make no secret of their brutality and intolerance. This is where the real work lies
About the authorRichard Barrett CMG OBE is an Associate Fellow, Counter Terrorism at the The Royal United Services Institute (RUSI) is an independent think tank engaged in cutting edge defence and security research. Founded in 1831 by the Duke of Wellington, RUSI embodies nearly two centuries of forward thinking, free discussion and careful reflection on defence and security matters.
This article was first published on the RUSI website at www.rusi.org
COUNTER TERROR STRATEGY
Copper & Optic Terminations LtdCopper & Optic Terminations Ltd specialise in sub contract Electronic wiring, cable and fibre optic assembly and test for the military, defence, aerospace, medical, mining and professional electronics industries.
We aim to provide a world class customer service by offering our customers on time deliveries of products to the highest possible quality standards, in-line with our BS EN ISO9001:2008/AS9100 REV C accreditation.
Quality PolicyIt is the Company policy to provide all customers products that are fit for their intended purpose and conform to customer and relevant regulatory requirements. Our policy is to exceed all customers’ expectations for:
QUALITY OF PRODUCTS • CUSTOMER SERVICE • DELIVERY
Management CommitmentTo acheive these goals Copper & Optic shall adhere to these principles:
• Understanding the customer’s requirements in full• Communicate with the customer at all times• Communicate the goals to all Copper & Optic employees• Implementation of a continuous improvement philosophy• Implementation of a quality system that helps the business
Copper & Optic Terminations LtdUnit 1, Stone Road Business Park,
55 stone Road, Stoke on Trent, Staffordshire ST4 6SRt: +44(0)1782 275810 e: [email protected]
www.copperandoptic.com
Services• Cable assemblies and cable harnesses• Copper and fibre optics• Rack, panel or cubicle assembly• Turnkey product management for complex assemblies• PCA and PCB assemblies• ESD Area• Electronic modules• Testing using Dit-mco circuit analyser, Dynalab ATE, ATE Cirris
• Attention to detail• Build standard control• High quality standards • Own developed integrated computer database • Quality customer service • Rapid response
61 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
Your Global Partner for Servo Technology & Design.
[email protected] www.infranor.com +44(0)208 144 2152
Specialists in Servo Motors, Servo Drives, Systems and Bespoke Engineering.
Infranor (cogging)_DB 7 - FP.indd 1 07/04/2014 11:03
Defence New
s
DEFENCE SPENDINGNEWS IN BRIEF
Australia to become ‘enhanced’ NATO partnerAustralian foreign minister Julie Bishop says the country will accept a formal invitation to become an enhanced partner in NATO, but will maintain autonomy in deciding the extent and character of involvement in future Nato-led operations. Australia’s relationship with Nato strengthened substantially over the past decade due to participation in the International Security Assistance Force in Afghanistan.
Martitime dispute leads Japan to increase defence spendJapan’s defence ministry has made its biggest ever budget request, amid severe tensions with China over a maritime dispute in the East China Sea. The ministry is seeking 5.05 trillion yen (£29.4bn; $48.7bn) for the year – a 3.5 per cent rise. If approved, it would mark the third year the defence budget had been increased.
SNP’s proposed defence policy criticisedFormer deputy supreme allied commander in Europe General Sir Richard Shirreff has criticised the defence policies in the Scottish government’s White Paper, calling them “amateurish” and “dangerous”. Sir Richard said: “Nothing I have seen or heard persuades me that Scotland’s safety or security would be enhanced one iota if it became a separate country.”
MoD signs £3.5bn armoured vehicle deal with General DynamicsThe Ministry of Defence (MoD) has awarded General Dynamics a contract to deliver 589 SCOUT Specialist Vehicle (SV) platforms to the British Army to provide essential capability to the Armoured Cavalry. The platforms, consisting of six variants, will be delivered to the British Army between 2017 and 2024, alongside the provision of initial in-service support and training, and will serve at the heart of the Armoured Infantry Brigade structure. This contract safeguards or creates up to 1,300 jobs across the programme’s UK supply chain, with 300 of these at General Dynamics UK’s Oakdale site. SCOUT SV represents the future of Armoured Fighting Vehicles (AFV) for the British Army, providing best-in-class protection and survivability, reliability and mobility and all-weather intelligence, surveillance, target acquisition and recognition (ISTAR) capabilities. Its range of variants will allow the British Army to conduct sustained, expeditionary, full-spectrum and network-enabled operations with a reduced logistics footprint.
SCOUT SV can operate in combined-arms and multinational situations across a wide-range of future operating environments. Prime Minister David Cameron said: “I’m delighted that on the eve of the NATO Summit, we can announce the biggest single contract for AFVs for the British Army since the 1980s. These new vehicles are testament to the world class engineering skills in South Wales and across the UK, helping to create the Army’s first fully digitalised armoured vehicles. Not
only will they be crucial in helping to keep Britain safe, they will also underpin nearly 1,300 jobs across the UK and showcase the strength of the UK’s highly skilled defence sector. With the second largest defence budget in NATO, meeting NATO’s two per cent of GDP spending target and investing in new capabilities to deal with the emerging threats we are ensuring Britain’s national security, staying at the forefront of the global race and providing leadership within NATO.” Secretary of State for Defence, the Rt Hon Michael Fallon MP said: “This multi-billion pound contract is fantastic news for our soldiers in providing them with the most technologically advanced and versatile AFVs to overcome future threats. This is the biggest single order placed by the MoD for armoured vehicles for around 30 years and is an important part of the investment we are making to keep Britain safe. It is also excellent news for the supply chain of this state-of-the-art vehicle and will sustain 1,300 engineering jobs across the UK in key defence industries.” Kevin Connell, Vice President General Dynamics UK – Land Systems, said: “We are delighted that the UK MoD has awarded us this important contract. SCOUT SV provides essential capability to the British Army to allow it to dominate the battle space for years to come and it secures thousands of jobs right across the UK for at least the next decade. General Dynamics UK and our partners have worked hard over the last four years to develop a world-leading vehicle, and we will maintain that same work ethic to deliver 589 SCOUT SV platforms to the British Army on-time and on-budget.” SCOUT SV has been developed at General Dynamics UK’s AFV design and engineering centre in Oakdale, South Wales, maintaining the UK’s sovereign expertise in this important capability.
A400M makes maiden flightThe first Airbus A400M new generation airlifter has made its maiden flight. The aircraft is the first of 22 ordered by the UK and will be available for delivery by end September. Edward “Ed” Strongman, who captained the flight, said: “Its combination of true tactical capability with strategic range will be an enormous contributor to future air mobility in the RAF.”
SCOUT SV provides best-in-class protection and survivability, reliability and
mobility and all-weather intelligence, surveillance,
target acquisition and recognition (ISTAR)
capabilities
Your Global Partner for Servo Technology & Design.
[email protected] www.infranor.com +44(0)208 144 2152
Specialists in Servo Motors, Servo Drives, Systems and Bespoke Engineering.
Infranor (cogging)_DB 7 - FP.indd 1 07/04/2014 11:03
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
63 Issue 9 | DEFENCE BUSINESS MAGAZINE
Defence Sectretary condemns Russian role as Ukraine calls to be made a member of NATO
UKRAINE CONFLICT
Foreign Secretary Philip Hammond has condemned Russia for its role in the Ukraine crisis, claiming the country had “chosen the role of pariah, rather than partner.” In a September speech Hammond called on the international community to demonstrate a political will to prevent future attacks on Nato member nations and their allies. A recent Washington Post leader criticised the organisation for its failure to act in the region, saying it “still shrinks from scrapping a 17-year-old agreement with Russia not to establish permanent bases in Central and Eastern Europe even though Moscow is flagrantly violating its own European commitments.” While Ukraine is not currently one of the 28 countries in Nato, Hammond spoke of anxieties felt in Eastern members such as Poland and the Baltic states that they could face being the target of Moscow’s expansionist strategies. The Ukrainian government has called to be made a member of the alliance, a move which would require it to move a clause in the constitution which forbids the country from joining any military bloc. Hammond said: “If we lack, or are perceived to lack, the political will to respond – and to do so quickly – the credibility of that
commitment to collective defence will be undermined, and the very fabric of this, most successful of alliances, will unravel.” “So we have to be clear with Russia, in particular, that while we support a political resolution to the situation in Eastern Ukraine, there is a red line around Nato member states themselves that cannot be crossed.” His speech came as the Ministry of Defence announced plans for a military exercise in the city of Lviv in western
Ukraine involving around 30 British troops. An MoD spokesperson said: “A small troop of Light Dragoons are expected to participate in Exercise Rapid Trident, a routine and small-scale international exercise, in Ukraine [this September].” Emphasising that the exercise would be a peaceful one, Julian Brazier, defence minister for Reserves, said: “These exercises are reminding people that these are our allies within Nato.”
RADAR SYSTEMSNAVY plans refresh of navigation radar portfolioThe Ministry of Defence (MoD) has set out plans for the fleet-wide recapitalisation of the navigation radar systems fitted to Royal Navy ships and submarines. The project is intended to replace the current RN and RFA navigation radar inventory. Existing in-service systems comprise the Kelvin Hughes Radar Type 1007 I-band radar, the Northrop Grumman Sperry Marine Radar Type 1008 E/F-band radar, and the Raytheon Radar Type 1047 I-band and Radar Type 1048 E/F-band radars. In a 27 August contract notice, the MoD’s Defence Equipment and Support (DE&S) arm’s Communications and Situational Awareness team said that the scope of the NRP would include primary navigation radars (I-band), secondary navigation radars (E/F-band), and compact I-band radars.
Work is underway at BAE Systems to give aircraft human-like ‘skin’, enabling the detection of injury or damage and the ability to ‘feel’ the world around them. Engineers at BAE’s Advanced Technology Centre are investigating a ‘smart skin’ concept which could be embedded with tens of thousands of micro-sensors. When applied to an aircraft, this will enable it to sense wind speed, temperature, physical strain and movement, far more accurately than current sensor technology allows. The concept will enable aircraft to continually monitor their health, reporting back on potential problems before they become significant. This would reduce
the need for regular check-ups on the ground and parts could be replaced in a timely manner, increasing the efficiency of aircraft maintenance, the availability of the plane and improving safety. tTny sensors or ‘motes’ can be less than 1mm squared. Collectively, the sensors would have their own power source and when paired with the appropriate software, be able to communicate in much the same way that human skin sends signals to the brain.
Aircraft ‘Smart Skin’ concept detects injury
AIRCRAFT TECHNOLOGY
A resource for key stages 1 to 4 has been launched to educate children about the work of the UK armed forces. The new initiative aims to inform and educate both schoolchildren and teachers about the work of the British armed forces. The resource, hosted from its own website, covers students from the ages of 5 to 16 and is designed to be used as part of teaching in English, history and citizenship lessons. The project explores key questions that students might have about the armed forces. These range from why we have the armed forces, their history and their work in the present day, to first-hand accounts of what it is like to work in the Royal Navy, British Army and Royal Air Force.A diverse range of people have contributed to bringing the learning resource to life. Imam Asim Hafiz, Islamic religious advisor to the armed forces, drew
on his experience of ‘building bridges across communities and working to bring peace’ whilst serving in Afghanistan. Historian Dan Snow wrote the introduction to ‘The Armed Forces in our History’ section, focusing on the wars that have ‘shaped our world’. The Minister of State for Defence Personnel, Welfare and Veterans, Anna Soubry, said:“The role our armed forces play in the security of our country is as vital as ever, supported by peacekeeping and humanitarian work carried out right across the world. With the centenary of the start of the First World War this year, the teaching pack offers an excellent opportunity for people to learn more about the breadth of our armed forces past, present and future.”The teaching pack contains interactive links, video and audio.
MoD launches new armed forces learning resource
EDUCATION
Defence New
s
READ MORE: tinyurl.com/lowah2x
READ MORE: tinyurl.com/q73nfam
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
65 Issue 9 | DEFENCE BUSINESS MAGAZINE
Eurosatory 2014, the Land and Air-land Defence and Security Exhibition was held in Paris from 16-20 June this summer. The international scale of this event was underlined by the presence of six new countries as exhibitors – Argentina, Colombia, Hong Kong, Iraq, Japan and Panama. This year’s event met the expectations of many professionals and governmental players. Over the course of this year’s show, the exhibition confirmed its well-established
pre-eminence in the areas of homeland security, civil security and company safety, with the presence of many visitors and delegations involved in those sectors. Several interior ministry entities were also
in attendance, as well as a high proportion of exhibitors (over
50 per cent) offering various security solutions.
EXHIBITORSPresenting a wide selection of materials and systems on show, an unrivalled
number of exhibitors and the widest exhibition area, Eurosatory maintains its position as the international leader and appears as the major event for new products and innovations. Year on year, Eurosatory builds on its comprehensive coverage of the Land and Air-Land Defence and Security industries, continuing to position itself as the event of reference within the industry. This year’s Defence and Security exhibitions saw the first unveiling of a number of vehicles (over 250, around two thirds of which were armoured vehicles), armed systems and anti-aircraft warfare systems of all categories, as well as featuring a number of additional product categories.
ROBOTICS AND DRONE TECHNOLOGYAmong more than sixty ground robots exhibited this year, Eurosatory previewed two heavy robotics systems of between eight and 20 tonnes in a demonstration of their operational capabilities. In addition, no fewer than 75 drone systems were featured at the show, from the smallest models weighing only a few grammes to next-generation HALE unmanned aerial vehicles (UAVs). In the area of personal protection equipment, a majority of major manufacturers from around the world were present, exhibiting products like bulletproof and stab-resistant vests, E
EVENT REVIEW
MISSION ACCOMPLISHED AT EUROSATORY 2014June’s Eurosatory event in Paris showcased the newest developments in defence and security, spanning a range of technological and operational solutions. Here are some highlights
Eurosatory
The exhibition
confirmed its
preeminence in
the areas of
homeland security,
civil security and
company
safety
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
67 Issue 9 | DEFENCE BUSINESS MAGAZINE
More Than Just A Monitor
Ultrasound, video laryngoscope & new algorithmsare the first of many new capabilities to be introduced*
TM TM
Tempus Pro:• Has the longest
battery life (over 10 3/4 hoursmonitoring allparameters)**;
• Is the most compact;• Is the most durable
& rugged vital signsmonitor available.
Easy & intuitive data collection & sharing; soon to incorporate user configurable summary record of care
& the newly adopted joint TCCC card*
The Only Field – Upgradable Transport MonitorThat You Can Change as Needs & Technologies Evolve
Call us now for more information:Tel: +44 (0) 1256 362400
or e-mail: [email protected] A 0214 Tempus Pro and More Than Just a Monitor are trademarks of Remote Diagnostic Technologies Ltd © Remote Diagnostic Technologies Ltd 2014.* Pending FDA & CE Mark ** Default display brightness, ECG, SpO2, ETCO2, IP x 2, temp x 2 and NIBP every 15 minutes. Subject to conditions of storage and use, times are approximate.
www.rdtltd.com
Tempus_Pro_Feb_2014_Advert_2_Layout 1 19/02/2014 08:19 Page 1
More Than Just A Monitor
Ultrasound, video laryngoscope & new algorithmsare the first of many new capabilities to be introduced*
TM TM
Tempus Pro:• Has the longest
battery life (over 10 3/4 hoursmonitoring allparameters)**;
• Is the most compact;• Is the most durable
& rugged vital signsmonitor available.
Easy & intuitive data collection & sharing; soon to incorporate user configurable summary record of care
& the newly adopted joint TCCC card*
The Only Field – Upgradable Transport MonitorThat You Can Change as Needs & Technologies Evolve
Call us now for more information:Tel: +44 (0) 1256 362400
or e-mail: [email protected] A 0214 Tempus Pro and More Than Just a Monitor are trademarks of Remote Diagnostic Technologies Ltd © Remote Diagnostic Technologies Ltd 2014.* Pending FDA & CE Mark ** Default display brightness, ECG, SpO2, ETCO2, IP x 2, temp x 2 and NIBP every 15 minutes. Subject to conditions of storage and use, times are approximate.
www.rdtltd.com
Tempus_Pro_Feb_2014_Advert_2_Layout 1 19/02/2014 08:19 Page 1
CBRND (Chemical, biological, radiological and nuclear defense) equipment and an exhaustive range of innovative solutions suitable for use in extreme situations.
AERONAUTIC SURVEILLANCEThe domain of ground surveillance by all types of aircraft (drones, aerostats, helicopters) is growing in importance to match satellite surveillance. A huge number of new industrial solutions revealed at the show represents a growing trend. Eurosatory has become the point of reference for the optics industry, showing everything from complete systems to constituent materials and highly developed new technologies suitable for all budgets. Satellite and terrestrial communications systems featured heavily at the event, with a large choice for technology deployable in military and civilian situations. The show provided a comprehensive array of logistics equipment suitable for deployment, with polyvalent solutions for civilian and military installations (tents, shelters, food preparation, sanitation and energy). These products are applicable in a number of services, for example transport and security. What’s more, Eurosatory has become the leading exhibition for energy products that are sustainable, renewable and durable, increasingly important in the world of alternative fuel vehicles. This year the show offered the greatest variety in terms of equipment that can be used in crowd control while bringing down the risk of fatality. With more than 450 new products revealed, in 2014 Eurosatory proved once more that its unrivalled reputation for showcasing the greatest offering in Land/Air defence and security is well deserved. L
FURTHER INFORMATIONwww.eurosatory.com
EurosatoryEVENT REVIEW
Eurosatory 2014 in numbers
1,507 exhibitors from 59 countries
70 per cent international exhibitors
4 International organizations: NATO, NAMFI, NAMSA, EUMS
175, 964m² of indoor and outdoor exhibiting space
55,786 professional visitors from 143 countries
172 official delegations from 87 countries
176 Eurosatory Guests from 36 countries
707 journalists from the 5 continents
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
69 Issue 9 | DEFENCE BUSINESS MAGAZINE
Adve
rtise
rs In
dex
ADVERTISERS INDEXThe publishers accept no responsibility for errors or omissions in this free service
Advanced Machining Products 58Arinc 42Atkins 34, 35Blokn Mesh UK 19Broden Media 49, 51Clarion Events 16CMO 28Cognitec Systems 40Copper and Optic Termination 60CQC 48Cross Match Technologies 6DMS Protective Equipment 10Fleet Auction Group 51Frontier Pitts 45Garnett Keeler Public 53Guava International 41Hesco Bastion IBCHolmatro – Special Tactics 8Honeywell Analytics 46Imago Techmedia 23Infranor 20, 31, 62
Intelligence-Sec 26IQPC International 4Maple 44MRL Eye 54Phoenix Datacom 22Rapiscan Systems 38Remote Diagnostic 68Reveal Media 12Riegl Laser 57Scanna Msc 14South Midland 66Tata Steel OBCThe Mercian Labels Group IFCThermacore Europe 64Trizo Electonics Assembly 70Vector Command 50Vocal 24Voip.co.uk 32Vulcan UAV 56Zaun 36
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
DEFENCE BUSINESS MAGAZINE | Issue 970
Asset LabelsPlastic & Metal Security SealsC-TPAT Metal Bolt Security Seals
Tamper Evident Bags
Tata Steel Projects’ Security & Defence Team specialises in Hostile Vehicle Mitigation (HVM) measures.
Our HVM range is extensively tested against the PAS 68 standard and includes both Temporary/ Redeployable Systems and Permanent Systems, both of which offer a high degree of protection against deliberate collision, blast, ballistics and forced attack.
Ideal for major events or changing sites Temporary/ Redeployable HVM Systems are surface mounted and so can be deployed rapidly without the need for surface preparation. The products include:• Walling suitable for large perimeters that can be easily combined with anti-
mob fencing, CCTV • Surface Mounted Bollard systems which provide protection against vehicle
incursion but also allow a high degree of pedestrian permeability• Pedestrian Portals which can direct pedestrians to gaps in impermeable
barriers where screening can be set-up• Vehicular Gate systems of varying configurations tested up to 16m clear width
Our permanent HVM Systems include:• Various bollard systems• Low Walling systems which offer blast, ballistic and HVM protection and can
blend in the urban streetscape• High Walling Systems which have been tested against extreme collision,
mechanical attack and large blast threats
For more information contact:T: +44 (0) 1904 454600 E: [email protected]
PARTNERSHIPS BUILT UPON RELIABILITY AND INNOVATION