+ All Categories
Home > Documents > Counter Terror Business 19

Counter Terror Business 19

Date post: 03-Apr-2016
Category:
Upload: psi-media
View: 229 times
Download: 7 times
Share this document with a friend
Description:
The business magazine for security technology
Popular Tags:
72
www.counterterrorbusiness.com | ISSUE 19 NEWS: GLOBAL TERRORISM DATABASE REVEALS 10 MOST LETHAL TERRORIST ORGANISATIONS EMERGENCY SERVICES How a cyber criminal can bring a nation to its knees PROTECTING CRITICAL SERVICES CYBER SECURITY DEFENCE BORDER SECURITY News: MoD signs £3.5bn armoured vehicle deal p63 THE BUSINESS MAGAZINE FOR DEFENCE Eurosatory 2014 preview p67 How rigorous are the security checks of air cargo? SECURING AIR FREIGHT CARGO SECURITY The security challenges for aviation, maritime, rail and commercial transportation explored TRANSPORT SECURITY EXPO EVENT PREVIEW
Transcript
Page 1: Counter Terror Business 19

www.counterterrorbusiness.com | ISSUE 19

NEWS: GLOBAL TERRORISM DATABASE REVEALS 10 MOST LETHAL TERRORIST ORGANISATIONS

EMERGENCY SERVICES

How a cyber criminal can bring a nation to its knees

PROTECTING CRITICAL SERVICES

CYBER SECURITY

DEFENCEBORDER SECURITY

News:

MoD signs

£3.5bn armoured

vehicle deal p63

THE BUSINESS MAGAZINE FOR DEFENCE

Eurosatory 2014

preview

p67

How rigorous are the security checks of air cargo?

SECURING AIR FREIGHT

CARGO SECURITY

The security challenges for aviation, maritime, rail and commercial transportation explored

TRANSPORT SECURITY EXPO

EVENT PREVIEW

Page 2: Counter Terror Business 19

Asset LabelsPlastic & Metal Security SealsC-TPAT Metal Bolt Security Seals

Tamper Evident Bags

Page 3: Counter Terror Business 19

3 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Comm

entCOUNTER TERROR BUSINESS

An increasing threatwww.counterterrorbusiness.com | ISSUE 19

NEWS: GLOBAL TERRORISM DATABASE REVEALS 10 MOST LETHAL TERRORIST ORGANISATIONS

EMERGENCY SERVICES

How a cyber criminal can bring a nation to its knees

PROTECTING CRITICAL SERVICES

CYBER SECURITY

DEFENCEBORDER SECURITY

News:

MoD signs

£3.5bn armoured

vehicle deal p63

THE BUSINESS MAGAZINE FOR DEFENCE

Eurosatory 2014

preview

p67

How rigorous are the security checks of air cargo?

SECURING AIR FREIGHT

CARGO SECURITY

The security challenges for aviation, maritime, rail and commercial transportation explored

TRANSPORT SECURITY EXPO

EVENT PREVIEW

Following mounting concerns over the dangers posed by Islamic State (IS) terrorists, the UK’s threat level now stands at ’severe’ for the first time since 2007, when extremists were suspected of an attempt to bomb Glasgow Airport and London’s West End.

Counter terrorism officials have so far said they are not aware of any specific or imminent plot to attack Britain, but the brutal and barbaric execution of US journalists James Foley and Steven Sotloff by ‘Jihadi John’, who appears to speak with a London or South East accent, sent a sickly message to the world that the UK is a fertile breeding ground for religious extremism. Clearly, much more needs to be done at home to understand and counter this.

As we go to press, Prime Minister David Cameron is attending the NATO Summit in Wales, where he ruled out paying a ransom for a British hostage, threatened in the latest horrifying video to be aired chillingly through social media. It is worrying that while efforts to restrict the finances of terrorist organisations have seen some success in the past, IS appears to have developed an economy in Syria and Iraq, with reports suggesting that the extremist group is making up to £600,000 a day from oil sales and ransoms.

Addressing Parliament, Cameron spoke of a ‘forensic focus’ needed to prevent people from travelling abroad. New anti-terror measures are expected to be agreed by all parties shortly (see page 7).

As with Iraq and Syria, the situation in the Ukraine has led to calls being made for certain NATO member countries to increase their defence spending. Only four countries (US, UK, Estonia and Greece) meet NATO’s defence spending target of two per cent of GDP. NATO’s outgoing secretary general, Anders Fogh Rasmussen, issued a financial rallying call: “We have lived in a relatively quiet security environment, but the crisis in Ukraine as well as what we’re now seeing in Syria Iraq and North Africa is a wake-up call. You can compare it with insurance. Now the premium has gone up because of this unstable security environment and that’s why we need more defence investments in the coming years.”

Danny Wright

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

If you would like to receive 4 issues of Counter Terror Business magazine for £80 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET.Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:

P ONLINE P IN PRINT P MOBILE P FACE TO FACE

www.counterterrorbusiness.com

© 2014 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk

EDITORIAL DIRECTOR Danny Wright EDITOR Angela Pisanu EDITORIAL ASSISTANT Arthur Walsh PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Vickie Hopkins, Charlotte Cassar REPRODUCTION & PRINT Argent Media

Page 4: Counter Terror Business 19

Sponsors include:

www.armouredvehiclesevents.com | Tel: +44 (0)20 7368 9737 | Email: [email protected]

Join the World’s Premier Armoured Vehicles

Conference SeriesThe longest running global conference series dedicated

to the armoured vehicles community Benefit from unique networking, information-sharing and benchmarking opportunities, as

well as potential business exchanges.

15% discount for Counter Terror

Business subscribers. Please enquire for more information

Eastern Europe30 September – 1 October 2014, Warsaw, Poland

• SupportedbythePolishMoD • BringingtogethertheUkrainian,Hungarian, Lithuanian,EstonianandMoldovanMoDsto discussongoingmodernisationprojectsand howbesttoadapttothecurrentthreat environmentarmouredvehicleseasterneurope.com/CTB

“A very good, well organized meeting place for military and non-military people to exchange ideas. It’s the place to go for up to date trends in the defence business.”Director,Polish MoD

“A very informative event giving visibility into a changing market space.” VP of Business Development, Land Systems, Alcoa Defense

“The perfect opportunity to get a clear idea about the future development of vehicles. The conference was well balanced with operational environment approach and technical solutions for operational demands.” Land Forces Development Branch, Czech Republic MoD

Africa19 - 20 November 2014, Addis Ababa, Ethiopia

• ConsideredtheAfricanmechanised community’sAnnualGeneralMeeting • Sharelessonslearnedandbestpracticein currentmechanisedrequirements,capabilities andprogrammesfromTanzania,Kenya, ZambiaandtheAfricanUnion

armouredvehiclesafrica.com/CTB

XV26-29 January 2015, London, UK

• Featuringkeynotepresentationsfromthe DefenceSecretary-theRtHonMichael Fallon-andMinisterforDefenceEquipment, Support&Technology-MrPhilipDunneMP • Bringingtogethertheinternational communitytodebateandshareknowledge ofthekeyglobalprogrammes

internationalarmouredvehicles.com/CTB

INTERNATIONAL ARMOURED RESERVISTS SYMPOSIUM

17 - 19 October 2014, Bovington, Dorset, UK

•ManagedbytheRoyalWessexYeomanry (RWxY) • Supportsthedevelopmentofthinking behindReservistuseofglobalground manoeuvreplatforms,focusingonboth theoreticalandappliedaspectsof capability

armouredreservists.com/CTB

IAV Portfolio advert 210x297.indd 1 22/08/2014 12:35

Page 5: Counter Terror Business 19

Sponsors include:

www.armouredvehiclesevents.com | Tel: +44 (0)20 7368 9737 | Email: [email protected]

Join the World’s Premier Armoured Vehicles

Conference SeriesThe longest running global conference series dedicated

to the armoured vehicles community Benefit from unique networking, information-sharing and benchmarking opportunities, as

well as potential business exchanges.

15% discount for Counter Terror

Business subscribers. Please enquire for more information

Eastern Europe30 September – 1 October 2014, Warsaw, Poland

• SupportedbythePolishMoD • BringingtogethertheUkrainian,Hungarian, Lithuanian,EstonianandMoldovanMoDsto discussongoingmodernisationprojectsand howbesttoadapttothecurrentthreat environmentarmouredvehicleseasterneurope.com/CTB

“A very good, well organized meeting place for military and non-military people to exchange ideas. It’s the place to go for up to date trends in the defence business.”Director,Polish MoD

“A very informative event giving visibility into a changing market space.” VP of Business Development, Land Systems, Alcoa Defense

“The perfect opportunity to get a clear idea about the future development of vehicles. The conference was well balanced with operational environment approach and technical solutions for operational demands.” Land Forces Development Branch, Czech Republic MoD

Africa19 - 20 November 2014, Addis Ababa, Ethiopia

• ConsideredtheAfricanmechanised community’sAnnualGeneralMeeting • Sharelessonslearnedandbestpracticein currentmechanisedrequirements,capabilities andprogrammesfromTanzania,Kenya, ZambiaandtheAfricanUnion

armouredvehiclesafrica.com/CTB

XV26-29 January 2015, London, UK

• Featuringkeynotepresentationsfromthe DefenceSecretary-theRtHonMichael Fallon-andMinisterforDefenceEquipment, Support&Technology-MrPhilipDunneMP • Bringingtogethertheinternational communitytodebateandshareknowledge ofthekeyglobalprogrammes

internationalarmouredvehicles.com/CTB

INTERNATIONAL ARMOURED RESERVISTS SYMPOSIUM

17 - 19 October 2014, Bovington, Dorset, UK

•ManagedbytheRoyalWessexYeomanry (RWxY) • Supportsthedevelopmentofthinking behindReservistuseofglobalground manoeuvreplatforms,focusingonboth theoreticalandappliedaspectsof capability

armouredreservists.com/CTB

IAV Portfolio advert 210x297.indd 1 22/08/2014 12:35

Contents

CONTENTS13

37

17

27

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

5 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

07 CTB NEWS New counter terror law plans outlined by David Cameron; ISIL controlling area the size of Britain, says US counter terror director 13 TERRORISM TRENDS Former CIA intelligence analyst Mat Burrows examines the wider issues shaping unrest in the Middle East 17 BORDER SECURITY The 3rd World BORDERPOL Congress takes place 9-11 December 2014 in Budapest, Hungary and brings together leaders of the world’s border security 20 COUNTER TERRORISM Paul Easter MBE outlines the difficulties Western powers have faced in attempting to build democratic nations in the Middle East 23 IP EXPO IP EXPO Europe, held on 8-9 October 2014, is Europe’s leading cloud and IT infrastructure event

25 CYBER SECURITY EXPO Cyber Security EXPO 2014 on 8-9 October at London’s ExCel offers visitors the chance to learn about the key issues

27 CYBER SECURITY: DoS ATTACKS Amar Singh of ISACA reports on the damage denial of service (DoS) attacks can do and offers advice on how to protect your organisation

33 CYBER SECURITY: CRITICAL NATIONAL INFRASTRUCTURE Mike Gillespie highlights why those that protect the UK’s critical national infrastructure need to anticipate threats and monitor the supply chain 37 TRANSPORT SECURITY EXPO Visitors to this December’s Transport Security Expo will discuss the challenges transport operators face in maintaining high security levels 43 CARGO SECURITY With 26 million tonnes of goods transported by air every year, the security of airborne cargo is of paramount importance, writes the BSIA 49 EMERGENCY SERVICES SHOW Taking place at the NEC Birmingham on 24-25 September, the Emergency Services Show will be relevant to those involved in counter terrorism 55 COMMERCIAL UAV SHOW The Commercial UAV Show on 21-22 October at London’s Olympia will allow visitors to exchange key insights on the unmanned aerial vehicle market 59 COUNTER TERRORISM To counter the threat of ISIS, the UK must help to create a new, legitimate order

Counter Terror Business www.counterterrorbusiness.com

65 DEFENCE NEWSMoD signs £3.5bn armoured vehicle deal with General Dynamics; Defence Sectretary condemns Russian role asUkraine calls to be made a member of NATO

67 EUROSATORY 2014June’s Eurosatory event in Paris showcased the newest developments in defence and security

ISSUE 9 Turn to page 63 for the latest defence

business news and features

THE BUSINESS MAGAZINE FOR DEFENCE

67

43

Page 6: Counter Terror Business 19

ADS.indd 1 8/13/2013 3:15:56 PM

Page 7: Counter Terror Business 19

New counter terror law plans outlined by Cameron following increasing threat from IS extemists

COUNTER TERROR LEGISLATION

Addressing parliament before the NATO Summit in Wales, Prime Minister David Cameron announced a range of measures to combat the growing threat of Islamic State extremism. The plans, which will be drawn up on a cross-party basis, will discuss the changes including the introduction of new powers to seize the passports of suspected terrorists at UK borders. Following the release of despicable videos which depict the two brutal executions of journalists James Foley and Steven Sotloff, the latest threat to execute a British national appears to come from a terrorist with an English accent, dubbed ‘Jihadi John’ (pictured in the story below) by the media. Foreign Secretary Phillip Hammond said analysis of the footage of both murders has concluded it is genuine and features the same masked militant, who speaks with a distinctive London or south-east accent. IS militants have seized large areas of Syria and Iraq and have been condemned for the mass slaughter of religious minorities in the region, including Iraqi Christians and the Yazidi community. Cameron told MPs he thought it was “abhorrent” British citizens had “declared their allegiance” to groups like Islamic State. He restated the UK’s backing for US airstrikes against Islamic State militants in Iraq and said he would not rule out participation in similar action in the future. The UK’s terror threat level was raised to ‘severe’ from “substantial” at the

end of August. The new alert level rates the risk of an attack on the UK “highly likely”, although Home Secretary Theresa May said there was no evidence to suggest one was “imminent”.

This level of threat has been used twice before – in 2006 after the discovery of liquid bombs aimed at airliners, and then the following year when extremists attempted to bomb Glasgow Airport and London’s West End. Developments in the Middle East over recent months had major implications for the UK’s security, with 500 British nationals estimated to have travelled to Iraq and Syria to fight on behalf of Islamic State and other militant groups. Cameron mentioned a “forensic focus” was needed in order to deal with British jihadists returning to the UK from conflict zones.

“We have also stepped up our operational response, with a fivefold increase in Syria-related arrests and the removal of

PROPOSED CHANGES Legislation will be drawn up to give the police statutory powers to confiscate the passports of suspect terrorists at UK borders

The UK will challenge any attempt by the courts to water down these powers

Plans to block suspected British terrorists from returning to the UK will be drawn up on a “cross-party basis”

Terrorism prevention and investigation measures (Tpims) will be extended, to include the power to relocate suspects

Terrorists will be required to undergo de-radicalisation programmes

Airlines will be forced to hand over more information about passengers travelling to and from conflict zones

CTB New

s

28,000 pieces of extremist material from the internet this year alone, including 46 ISIL-related videos,” he said. Elsewhere in Europe, a French law to seize passports is being fast-tracked through parliament, and the government is ramping up arrests of increasingly young teenagers making plans for jihad. Over the past week, US Secretary of State John Kerry and other administration officials have reached out to leaders from Australia, the UAE, Jordan, Qatar, Saudi Arabia, Italy and Israel to discuss how to combat the Islamic State.

Social networks start clampdown on ‘terror posts’Following the posting of the beheading of American journalists James Foley and Steven Sotloff, and by the Islamic State of Iraq and the Levant (ISIL), analysts are pointing to the emerging role of social media in the tactics and response to terrorism.The Los Angeles Times reports that as social media platforms such as Facebook, YouTube, Twitter, and Instagram have all become a staple of everyday Western lifestyles, these avenues have also become more interesting for terrorists to exploit to advance their goals.“Social media is at the heart of their jihad,” said Steve Stalinsky, the executive director of the Middle East Media Research Institute.As was the case with the Foley execution video, the use of posting on these platforms is meant to instill fear, attract the eyes of those who might be recruited, and raise money through awareness. Three of those large social media companies – YouTube, Twitter, and Facebook – are choosing to remove extreme examples of violence and terror. Users are also

incorporating campaigns to filter and not give terrorists the upper hand with digital coverage. Once the shocking James Foley video began to circulate, YouTube blocked it, arguing the company prevents the posting of videos on many subjects, such as weapons construction and violence.“YouTube has clear policies that prohibit content like gratuitous violence, hate speech and incitement to commit violent acts,” said a company spokesperson. “We also terminate any account registered by a member of a designated Foreign Terrorist Organisation and used in an official capacity to further its interests.”Twitter and Facebook users also aimed to curb the sharing of the video out of respect for the victims and prevent ISIS from gaining notoriety. The hashtag “#ISISMediaBlackout quickly began to trend on both services.Facebook reports that it has “teams around the world” that are reviewing content related to the Foley beheading, and in certain cases

SOCIAL MEDIA

leading to the company is removing the posts. These companies admit, however, that curbing free speech and screening violent and hateful content does involve walking a fine line. “The problem is that the boundary is hard to define,” said Marvin Ammori, a First Amendment scholar and a fellow at the New America Foundation.

READ MORE: tinyurl.com/pu9m2e4

READ MORE: tinyurl.com/q5tckew

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

7 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 8: Counter Terror Business 19

New! Ultra-

lightweight

combi tools for

tactical cutting

& spreading

• Compact design:

Easy to add to your kit

• Extremely lightweight:

Easy to carry and handle

• Ready for use with

integrated hydraulic

hand pump

• Suited for tactical

operations

• Choice between models

HCT 5111 ST (highest

spreading force) and

HCT 5117 ST (highest

spreading distance)

Watch the video:

Holmatro | Special Tactics equipment

[email protected] | www.holmatro.com

Page 9: Counter Terror Business 19

New! Ultra-

lightweight

combi tools for

tactical cutting

& spreading

• Compact design:

Easy to add to your kit

• Extremely lightweight:

Easy to carry and handle

• Ready for use with

integrated hydraulic

hand pump

• Suited for tactical

operations

• Choice between models

HCT 5111 ST (highest

spreading force) and

HCT 5117 ST (highest

spreading distance)

Watch the video:

Holmatro | Special Tactics equipment

[email protected] | www.holmatro.com

CTB New

s

COUNTER TERROR CONTRACTS

NEWS IN BRIEFPublic appeal to identify potential terror suspectsAssistant Commissioner Mark Rowley, the UK’s head of counter terrorism, has appealed to the public to help identify people who have travelled to Syria or are showing signs of being radicalised. Rowley made his appeal after the murder of US journalist James Foley in Syria. London and the West Midlands have seen the biggest growth in Syria-related investigations.

Dstl seeking new counter terrorism and security supplier baseFollowing the successful pilot of a new commercial framework for research contracts known as R-Cloud (Research Cloud), the Defence Science and Technology Laboratory (Dstl) is now seeking suppliers within the area of Counter Terrorism and Security (CT&S). This is the second of nine capability areas to offer research opportunities through R-Cloud, which provides easy-to-use, direct access to current and future research requirements. Further roll out, across Dstl’s other capability areas, is expected over the coming months. Suppliers working in the area of Counter Terrorism and Security can apply to be part of R-Cloud via the Defence Contracts Online (DCO) pre-qualification portal from

3 September until 1 October 2014. If successful, suppliers will then be considered for future R-Cloud CT&S research contract opportunities with mini-competitions being run where suppliers will be invited to express interest and tender for different tasks. Dstl’s R-Cloud Project Manager, Neil Higson, said: “R-Cloud will eventually provide a commercial marketplace for research opportunities across the spectrum of Dstl’s capability areas, with a contracting mechanism that will significantly help expedite the placement of research contracts and broaden the supplier base.”.

MI5 unearths IRA leaksThe Irish Herald has revealed that a major security alert was sparked when a rogue officer passed on key information from a garda station to a senior IRA figure via text message. It is understood that no further action will be taken in the case as the officer is the subject of investigations into separate serious offences. According to the Herald, he joined the force within the last decade at a time when background checks were not as scrupulous as they are now. The Herald understands that the information passed on involved the names of the detained suspects and how long they were being questioned for by detectives. Justice Minister Frances Fitzgerald has described the incident as ‘disturbing’.

All 43 police forces in England and Wales have signed up to the ‘Best Use of Stop and Search’ scheme, which is designed to contribute to a significant reduction in the overall use of stop and search. 24 police forces will implement two key elements immediately, which are: Increase transparency by recording all outcomes of stop and search and whether there is a connection between the grounds for the search and the outcome, and; Restrict the use of Section 60 ‘no suspicion’ powers. Already used only when necessary, under this scheme a chief officer must make the decision whether to authorise the use of such powers. That officer must reasonably believe that violence ‘will’ rather than ‘may’ take place, as it stands now. By November, all 43 forces will have implemented all aspects of the scheme,

including: Giving members of the public the opportunity to observe stop and search in practice, and; A community complaints trigger, so the police must explain to the public how stop and search powers are being used after a large volume of complaints.

Police take up scheme to reduce Stop and Search instances

COUNTER TERROR POLICING

According to the latest intelligence from the United States, the Islamic State of Iraq and the Levant (Isil) controls an area the size of Britain. Matthew Olsen, the director of the national counter terrorism centre, put forward a detailed public assessment of the terrorist organsation, adding that Isil commands some 10,000 armed fighters and is taking in approximately £600,000 million a day from oil sales and ransoms. “IS views itself as the new leader of the global Jihadist movement,” said Olsen, who went on to describe the British problem of foreign fighters as “substantially more

significant in terms of numbers” than the American one, noting that around 500 Britons are believed to have gone to Syria. Olsen explained what the US believes to be the three factors which explain Isil’s rapid growth: the weakness of the Iraqi and Syrian governments; its “complex and adaptive” battlefield strategy; and its ambition to be a world leader in jihad. He added: “IS threatens to outpace al-Qaeda as the dominant voice of influence in the global extremist movement.”

ISIL controlling area the size of Britain, says US counter terror director

ISLAMIC STATE THREAT

READ MORE: tinyurl.com/nacdnur

Prevent not working says Muslim CouncilThe Muslim Council of Britain’s deputy secretary general Harun Khan has said that Prevent, part of the Government’s anti-terrorism strategy, has failed. Prevent seeks to lessen the influence of extremism, but Khan told BBC Radio 5 live that the strategy was having a “negative impact”. Work carried out as part of Prevent includes stopping “apologists for terrorism” coming to the UK, supporting community campaigns which oppose extremism and mentoring for individuals who are “at risk of being drawn into terrorist activity”. Khan said: “Most young people are seeing this as a target on them and the institutions they associate with,” adding that many felt they would be viewed by authorities as potential terrorists if they went to mosques or joined other organised Muslim groups.

READ MORE: tinyurl.com/no4qzrg

READ MORE: tinyurl.com/mdrmso2

READ MORE: tinyurl.com/no4qzrg

READ MORE: tinyurl.com/l7qtryr

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

9 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 10: Counter Terror Business 19

QU

ALI

TY

DE

SIG

N •

QU

ALI

TY

MAT

ER

IALS

• c

as

t s

tan

da

rd

(U

K g

ov

er

nm

en

t e

nd

or

se

d)

DMS Protective Equipment Ltd Lingen Road, Ludlow Business Park, Ludlow, Shropshire SY8 1XD. United Kingdom

Tel: +44 (0)1584 874679 Fax: +44 (0)1584 876013 Email: [email protected]

Blunt Trauma ProtectionTested and certified to uk government (CAST) standard

Solo ShieldsBespoke specification available

Scorpion Interlock ShieldsPublic Order Batons

003

FM 56364BS.EN.ISO 9001:2000

DMS Scorpion ad:Layout 1 25/09/2013 17:10 Page 1

Page 11: Counter Terror Business 19

QU

ALI

TY

DE

SIG

N •

QU

ALI

TY

MAT

ER

IALS

• c

as

t s

tan

da

rd

(U

K g

ov

er

nm

en

t e

nd

or

se

d)

DMS Protective Equipment Ltd Lingen Road, Ludlow Business Park, Ludlow, Shropshire SY8 1XD. United Kingdom

Tel: +44 (0)1584 874679 Fax: +44 (0)1584 876013 Email: [email protected]

Blunt Trauma ProtectionTested and certified to uk government (CAST) standard

Solo ShieldsBespoke specification available

Scorpion Interlock ShieldsPublic Order Batons

003

FM 56364BS.EN.ISO 9001:2000

DMS Scorpion ad:Layout 1 25/09/2013 17:10 Page 1

The majority of terrorist attacks occurring in 2013 remained isolated in just a few countries, according to the Global Terrorism Database, which is generated by the National Consortium for the Study of Terrorism and Responses to Terrorism (START) based at the University of Maryland. In 2013, 11,952 terrorist attacks resulted in 22,178 fatalities (including perpetrator deaths) and 37,529 injuries across 91 countries. More than half of all attacks (54 per cent), fatalities (61 per cent) and injuries (69 per cent) occurred in just three countries: Iraq, Pakistan and Afghanistan.

ATTACK LETHALITYBy wide margins, the highest number of fatalities (7,046), attacks (2,852) and injuries (15,736) took place in Iraq. The average lethality of attacks in Iraq was 34 percent higher than the global average and 30 percent higher than the 2012 average in Iraq. “It is important to note that increases in terrorism in 2013 were geographically concentrated in many of the same places which saw high levels of political violence in 2012,” said Gary LaFree, START Director and professor of Criminology and Criminal Justice. “The list of countries that experienced the most attacks remained virtually unchanged over the past two years-terrorism is generally getting worse in the places where it has been bad for several years.”While terrorism remained heavily concentrated in the same parts of the world, the countries within those regions experienced some notable changes. In 2013, total attacks increased for Iraq, Pakistan, the Philippines, Syria, Egypt, Libya and

Lebanon; and decreased for Nigeria and Turkey. The most lethal single attack in 2013 took place in September in Nigeria when members of Boko Haram set up illegal checkpoints and killed 142 civilians. Despite the devastating attack at the Boston Marathon on April 15, 2013, which killed three and wounded more than 200, U.S. citizens remained comparatively safe from terrorism. Worldwide, 17 US civilians were killed by terrorist attacks in 2013 (including contractors), which is .07 per cent of all terrorism fatalities in 2013. According to LaFree: “These results confirm long-term regional trends that show rising

numbers of attacks in the Middle East, North Africa and South

Asia and diminishing numbers of attacks in North America

and Western Europe.”

PERPETRATOR GROUPSInformation about the perpetrator group responsible was reported for 33 percent of terrorist

attacks in 2013. Although al-Qaida central

has only been responsible for two known attacks since 2008

(both in 2011), seven of the 10 deadliest terrorist groups in the world are affiliated to some extent with the organization. These include the Taliban, Islamic State of Iraq and the Levant/al-Qaida in Iraq, Boko Haram, al-Shabaab, Tehrik-e Taliban Pakistan, al-Nusrah Front, and al-Qaida in the Arabian Peninsula. With the addition of nearly 12,000 terrorist attacks in 2013, the database now includes more than 125,000 events dating back to 1970 and remains the most comprehensive unclassified database of terrorist attacks around the world.

CTB New

s

DOWNLOAD THE FULL GTD DATASET tinyurl.com/pka9pwh

10 MOST LETHAL TERRORIST ORGANISATIONS, 2013

Group Fatalities

Taliban* 2718

Islamic State of Iraq and the Levant/Al-Qaida in Iraq*

1868

Boko Haram* 1731

Al-Shabaab* 735

Tehrik-i-Taliban Pakistan (TTP)* 710

Al-Nusrah Front* 707

Lashkar-e-Jhangvi 404

Al-Qaida in the Arabian Peninsula (AQAP)* 368

David Yau Yau Militia 194

New People’s Army (NPA) 156

*al-Qaida affiliated

10 COUNTRIES WITH THE MOST TERRORIST ATTACKS, 2013

Country Attacks Fatalities

Iraq 2852 7046

Pakistan 2212 2891

Afghanistan 1443 3697

India 690 464

Philippines 652 432

Thailand 477 253

Yemen 424 622

Nigeria 341 2003

Somalia 331 641

Egypt 315 243

In 2013,

11,952 terrorist

attacks resulted

in 22,178 fatalities

(including perpetrator

deaths) and 37,529

injuries across

91 countries

Global Terrorism Database suggests 2013 terrorist attacks ‘isolated to just a few countries’

GLOBAL TERRORISM

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

11 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 12: Counter Terror Business 19
Page 13: Counter Terror Business 19

Written by M

atthew J. Burrow

s

It’s hard not to be panicky about the terrorist threat these days. We’ve seen a terrorist group take over a large chunk of Iraq and impose a brutal regime. There’s no end in sight to the Syrian civil war and little hope of reuniting the country. Extremist forces are increasingly taking over the opposition to the Bashar al-Assad regime. In Afghanistan, as the deadline approaches for NATO’s withdrawal, Taliban forces are staging a comeback. Europe is particularly threatened by the return of EU citizens who have been fighting with radical al-Qaida-lined groups in Syria, according to Gilles de Kerchove, the EU counterterrorism coordinator. The US head of National Counterterrorism Center, Matthew G. Olsen, also warned about “wider array of

threats in a greater variety of locations across the Middle East and around the world.” What happened to the global war on terrorism (GWT) and Western determination after 9/11 to put an end to terrorism once and for all?

A SHIFTING THREATUntil August 2013, I was employed by the CIA, authoring the National Intelligence Council’s long range analysis – what is called ‘global trends’ – which is briefed to the US President at the start of his administration. In compiling my book I’ve gone back to evaluate those forecasts. The first global trends report I did was for the Bush Administration three years after 9/11, when the global war on terror was in full swing. Hopes were high in and out of government that terrorism could be defeated. I was far less sanguine: “The key factors show no signs of abating over the next 15 years. The revival of Muslim identity will create a framework for the spread of radical Islamic

ideology both inside and outside the Middle East, including Western Europe, Southeast Asia and Central Asia.” The press played up the fact that while the administration contended “Iraq was an integral part of US efforts to combat terrorism,” the report I authored warned that Iraq was providing terrorists with “a training ground, a recruitment ground, the opportunity for enhancing technical skills.” One of my global scenarios in the work was of a caliphate, which got right many of features of ISIS, including its breakaway from al-Qa’ida. In the 2008 edition I talked about al-Qa’ida breaking up – almost three years before

Osama bin Laden’s takedown. Past terrorist waves usually saw the group originating it – in this case core al-Qa’ida – breaking up midway through the cycle. The violence does not cease and could actually increase, but the splintered survivors are more locally focused. The threat is now from the splinter groups, some of which are more capable than I or others originally anticipated as shown by the rapid ISIS gains in Iraq. In the recent words of General Clapper, director of National Intelligence, “the terrorist threat is not diminishing. It is spreading globally and it is morphing more and more into so-called franchises.” Oddly, in the wake of the Western failures in Iraq and Afghanistan, the pendulum is now swinging away from any intervention. If, God forbid, another 9/11-like attack occurred today, I think the US could well turn its back on the Middle East, albeit after lobbing a few missiles into the group held

responsible. The attempt this time would be to harden borders, restricting inflows into the US homeland. No war on terrorism, but instead Fortress America. Clapper’s worries that US intelligence capabilities have been hurt by a “perfect storm” of “lost intelligence sources” because of Snowden and “significant budget cuts” could also favour a posture of more defence than offence.

WIDER ISSUES IN THE REGIONBoth extremist reactions – sins of commission and those of omission – ignore the broader context and tend to treat terrorism as a standalone. It’s no accident that the Middle East – where the terrorist threat is the greatest – has lagged most other regions (except Africa) in exploiting globalisation’s opportunities. In many Middle East and North Africa countries, higher educational attainment correlates with rising joblessness. The social contract that held states together has frayed. It’s been some time since Arab governments could “co-opt the educated youth into what used to be a relatively well paid civil service,” according to the UN’s Arab development reports. Governments everywhere have to be smarter to succeed. In the Middle East, the challenges are even greater because of the many religious and ethnic splits that were never overcome by Arab nationalism. From the beginning of my work on global trends, I strove to weave terrorism into a wider tapestry. That’s also the reason why I focus on the multiple factors that are coming together to produce revolutionary change. Back after 9/11 when terrorism was everything in foreign policy, the global trends reports drew policymaker attention to other challenges facing the US, such as the rise of China and the downsides of rapid globalization. Even before the E

GLOBAL TRENDS

BACK TO THE FUTURE ON TERRORISMFormer CIA intelligence analyst Mat Burrows looks at global terrorism trends in his new book The Future Declassified. Here he examines the wider issues shaping unrest in the Middle East

Terrorism Trends

The drift toward a region-wide conflict pitting Saudi Arabia against Iran and its allies is a recipe for more widespread violence and chaos, so creating the breeding grounds for terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

13 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 14: Counter Terror Business 19

Adve

rtise

men

t Fea

ture

Scanna has an extensive reputation for the design of robust defence and security x-ray products and is a contractor for x-ray equipment for National and International EOD agencies in the UK, USA and many other NATO countries. Scanna’s high resolution x-ray systems are designed to be as rugged, compact and lightweight as possible and provide a fast, safe and highly effective method of investigating suspect packages, IEDs, vehicles and cargo as well as for special operations and countersurveillance.

STRAIGHTFORWARD AND FLEXIBLEX-ray investigations need to be set up and completed within a very short timeframe and multiple operators may often share a system, but in different scenarios. Scanna x-ray systems are straightforward and intuitive for anyone to use with both direct (DR) and indirect (CR) x-ray imaging technologies. This multiple x-ray technology capability gives operators a wide range of choice across the board of speed, size, image quality and cost. The latest lightweight cable free x-ray image plates weigh just a few grams and are completely flat and flexible, letting you get an x-ray almost anywhere you need to. At the same time, these thin plates are available in multiple sizes and have the ability to be used in wide ranging combinations and configurations to cover larger areas. Small A4 size plates are ideal for use in confined areas such as wall or ceiling cavities or to check an item placed very close to a wall,

whilst using multiple longer length plates would be more suited for looking into vehicle panels and for pinpoint cargo scanning.

FAST DEPLOYMENTFor users who require more speed, Scanna offers rapid direct-to-laptop x-ray systems where the x-ray can be placed, fired and viewed in just a few seconds. The big advantage of the Scanna solution is that all systems come in a single case, operate on battery, and utilise safe pulsed x-ray generators that are interchangeable between direct and indirect imaging systems. The same powerful SCANVIEW software features are common across all systems to reduce operatortraining requirements.

X-RAY FOR EVENT SECURITYOne sector of the security community that has already seen the benefits of utilising portable x-ray equipment is event security where Scanna x-ray solutions were acquired and used by the Brazilian government and police for security search and investigation in support of the recent 2014 FIFA World Cup. These will continue to be used to secure future large events including the Brazil olympics in 2016.

X-RAY FOR AVIATION SECURITYWithin the transport security sector aviation security support teams in Australasia rely on Scanna x-ray equipment as a backup to the normal police response to ensure that incidents involving suspicious baggage can be cleared as quickly and efficiently as possible in order to minimise any disruption to passengers,

flights and crucial airport operations. Here, as in most territories, Scanna equipment is supported by local in-country distribution agents with military and EOD backgrounds who understand the specific needs of their user groups to provide operational advice, expertise and service support.

X-RAY FOR VEHICLE SCREENINGOne innovative application for portable x-ray is where large vehicles are prescreened by fixed vehicle screening x-ray systems. In some cases the larger vehicle screening systems are not set up to x-ray the bottom portion of the vehicle and in these situations a portable system can be invaluable for checking blindspots around the chassis, wheels and wheel arches. For customs applications small flexible x-ray plates can be used for close up detailed checks of dashboards and seats for concealed drugs and other contraband.

X-RAY FOR COUNTERSURVEILLANCEGovernments have traditionally been at the forefront of protecting themselves against the loss of important confidential and private information through espionage techniques. With the emergence of global markets and global competition, businesses are now a prime target of espionage as criminal efforts to obtain trade secrets and intellectual property proliferate. Intelligence agencies and TSCM teams are increasingly making use of portable x-ray technology as part of their standard counter surveillance toolkit to ensure that facilities are free from listening/recording devices and to analyse any finds.

PRISONSMobile phones, drugs, sim cards, batteries and weapons are all prohibited items in prisons but they continue to find their way into these facilities and into the hands of inmates. Portable x-ray equipment is deployed within the prison sector for cell searches so that any prohibited items concealed within furniture, electronic gaming devices, toiletries, clothing and shoes can quickly be detected and confiscated.

POSTAL X-RAY SYSTEMSScanna is also the manufacturer of the world leading SCANMAX brand of postal security x-ray cabinets. As well as being a known, reliable and safe detection technique for finding postal bombs, cutting devices and white powder letters, Scanmax x-ray chambers are also used in forensic laboratories for component analysis and within the prison sector for detecting drugs concealed in inmate mail.

FURTHER INFORMATIONContact: Kirstine Wilson+44 (0)207 355 [email protected]

ESSENTIAL TOOLS FOR INSIDE INVESTIGATIONScanna, a leading manufacturer of portable x-ray systems for IED identification showcases its capabilities at the TRANSEC show

COUNTER TERROR BUSINESS MAGAZINE | Issue 1914

Page 15: Counter Terror Business 19

2008 financial crisis, economic insecurity was growing in Middle America, for example, which the reports highlighted. Some of those broad trends favored terrorism and we stressed them in the analysis. Increasing individual empowerment meant individuals and small groups would have greater access to lethal weaponry. The use of bio or nuclear weapons someday by terrorists is not far-fetched. Cybercrime is a lot more common today than cyberterrorism, but it’s probably just a matter of time. I saw it as equally wrong to hype the terrorist threat then as it is to downplay it now. A broader perspective helps policymakers gauge terrorism’s relative importance in the vast panoply of US global interests.

HOW SHOULD THE WEST RESPOND?What particularly worries me now is the rapid collapse of the nation-state in Iraq and Syria, essentially leaving a huge safe haven at the core of the Middle East. The operating space for terrorists has increased immensely. We are back to pre-9/11 when al-Qa’ida had free reign in Afghanistan, but the area

is much larger. Just how rapid was the collapse of Arab Spring hopes and resurgence in authoritarianism in Egypt, Turkey and the Gulf was also a bit of a surprise. The growing suppression of opposition in those countries makes for fertile ground for extremism and even terrorism. It’s clear the terrorist threat is rising, but we should take care, too, to learn from past mistakes. First, we need to avoid the panic. In re-reading some of the writings by US terrorist experts in the aftermath of 9/11, there was a sense of terrorism as an unstoppable tsunami: “now that the World Trade Center is gone, Grand Central Station at rush hour would be an obvious target for Manhattan. Coordinated attacks on shopping malls, tourist attractions, casinos, schools, churches and synagogues, and sports events also are possible.” If there is a consoling factor, it is that terrorists tend to be too harsh and brutal, which eventually alienates their own supporters. But it will take time for the disaffection to grow

to the point of threatening, for example, the caliphate’s hold in Sunni areas in Iraq. Combatting potential attacks in US and Europe must be priority, counteracting just the symptoms won’t get at the root causes. Don’t get me wrong. I don’t see the US or Europe militarily intervening on a big scale. But, we need to be more active than we are, especially in stopping the regional conflagration from growing. Getting Iran and Saudi Arabia to sit down and start mending ties would be a start if we are to stem the escalation of current tensions into all-out war in the Middle East. Ramping up the pressure on the Shia government in Baghdad to draw the Sunnis back in is essential to combatting ISIS. Although naïve perhaps about chances for a near term settlement, Secretary Kerry is right about trying to keep a peace process alive between Israel and the Palestinians. Most importantly, the US and Europe need to work together on a global plan for economic development of the Middle East. The Chinese recently offered to go in on some joint infrastructure projects in Africa with the US, why not a global effort in the Middle East. I have no illusions the terrorist threat will decrease immediately even if we managed all these things, but it could put them on the back foot.

PREPARING TO ADAPTScenarios are a big part of plotting out the

future. They can be good or bad, but the point is that we need to get used to

the future being radically different from the present, not just

a linear projection. I can see areas where there may be a qualitative leap forward unimaginable to most today. For instance, we could see the elimination of most extreme poverty in our lifetime. But I can

also see where things could go seriously wrong,

and the Middle East and terrorism are in that category.

The drift toward a region-wide conflict pitting Saudi Arabia against Iran and its allies is a recipe for more widespread violence and chaos, so creating the breeding grounds for terrorism. In my book, I play out the logical conclusion of such continued Sunni-Shia conflict and it is predictably disastrous for all of us. The US and Europe have more than enough to occupy ourselves; publics are more than apathetic – they want to stay out. However, this is no time for leaders to put their heads in the sand.

The Future Declassified: Megatrends That Will Undo the World Unless We Take Action by Mathew Burrows is published by Palgrave Mamcillan

FURTHER INFORMATIONtinyurl.com/qefeujk

Terrorism Trends

GLOBAL TRENDS

Europe

is particularly

threatened by the

return of EU citizens

who have been

fighting with radical

al-Qaida-lined

groups in Syria

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

15 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 16: Counter Terror Business 19

21-22 APRIL 2015 | OLYMPIA LONDON

INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLDINTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLDINTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLDINTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD

WWW.COUNTERTERROREXPO.COM/CTB1

The leading international event dedicated to mitigating the threat of terrorism• Meet 8,500+ attendees from Europe and globally• Showcase your products and services to visitors with real purchasing power• Meet new customers and further establish relationships with existing ones• Launch new products and services on a global platform

Contact us to discuss becoming an exhibitor at Counter Terror Expo: T: +44 (0) 20 7384 7942 E: [email protected]: +44 (0) 20 7384 7837 E: [email protected]

Book your

stand to

day

Organised byFollow us onCo-located with Strategic Media Partner

75032.003_CTX03A_Advert_A4_Counter Terror Business_2015_v2.indd 1 15/08/2014 09:30

Page 17: Counter Terror Business 19

21-22 APRIL 2015 | OLYMPIA LONDON

INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLDINTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLDINTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLDINTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD

WWW.COUNTERTERROREXPO.COM/CTB1

The leading international event dedicated to mitigating the threat of terrorism• Meet 8,500+ attendees from Europe and globally• Showcase your products and services to visitors with real purchasing power• Meet new customers and further establish relationships with existing ones• Launch new products and services on a global platform

Contact us to discuss becoming an exhibitor at Counter Terror Expo: T: +44 (0) 20 7384 7942 E: [email protected]: +44 (0) 20 7384 7837 E: [email protected]

Book your

stand to

day

Organised byFollow us onCo-located with Strategic Media Partner

75032.003_CTX03A_Advert_A4_Counter Terror Business_2015_v2.indd 1 15/08/2014 09:30

The operation of today’s, border security, traveller and migration management community is being stressed by geopolitical, social and economic events. Our world is fully interdependent, and it is becoming ever more challenging to find solutions which include the utilisation of border services and agencies to protect nations. As the crisis in Eastern Europe escalates, economic sanctions and travel bans are increasing, being employed by both the EU and Russia, as well as their allies. Border services are front-line responders for monitoring these sanctions and bans.As the Ebola virus spreads within and beyond West Africa, travel bans and possible quarantine measures are being put into place. Border services are now front-line responders for monitoring these bans and for detecting travellers who may be infected. As the post-World War 1 borders of Iraq evaporate and a new entity known as Islamic State of Iraq and the Levant emerges, hundreds of thousands of persons are being displaced and are fleeing the region. Border services are now front-line responders for monitoring, recording and directing the movement of these people, most of whom will be refugees.

TRACKING AND MONITORINGAs the United States deals with an unprecedented and clearly well-orchestrated movement of tens of thousands of people – mostly children and adolescents from Central America – arriving at its border with Mexico, its border services are monitoring, detaining and caring for these people in unprecedented numbers. As China, the world’s most populous nation, develops a formidable navy and air force and is posed to succeed the United States as the world’s number one economy, it is flexing its economic and political muscle in Asia and beyond. Border services everywhere are now being pressed to be front-line responders monitoring the import and export of strategic goods and services to and from China. Since the end of the Cold War, there has been a deeply-held belief within the developed world that political and economic integration is the best way to improve global security and avoid potential conflict everywhere. This has created a paradox: the interdependent the world is supposed to make it less likely that extreme conflict between nations or groups of nations will occur. This very interdependence makes it imperative E

As the Ebola virus spreads within and beyond West Africa, travel bans and quarantine measures are being put into place. Border services are now front-line responders for monitoring these bans and for detecting travellers who may be infected

EVENT PREVIEW

KEEPING BORDERS SAFEThe 3rd World BORDERPOL Congress, taking place 9-11 December 2014 in Budapest, Hungary, brings together leaders of the world’s border security establishments to discuss some of the latest challenges facing our borders and the agencies tasked with protecting and managing them

Borderpol CongressTHE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

17 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 18: Counter Terror Business 19

BLOK

MESH

P O L M I L ® I S AD I V I S I O N O F

UK LIMITED

Tel: 01376 332591www.polmilfence.com

Specialists in the Design, Manufacture, Hire andSale of On-Ground Temporary Security Fencing

POLMIL® STANDARD FENCE

MODULAR FLEXIBLE DESIGN

POLMIL® ON-GROUND HOARDING

POLMIL® PAS 68 RATED(Test Reports on Request)

POLMIL® AIRPORT APPROVED

POLMIL® MOB ATTACK TESTED

NATIONWIDE INSTALLATION

ON-GROUNDTEMPORARY

SECURITY FENCING

See us onStand Number

C46 at OlympiaDecember 2-3

POLMIL A4 ADVERT 07.2014_Layout 1 02/07/14 17:42 Page 1

that nations cooperate, communicate and consult with one another in a multi-jurisdictional and inter-disciplinary manner.

BORDER SECURITY LEADERSThe 3rd World BORDERPOL Congress, taking place 9-11 December 2014 in Budapest, Hungary, brings together the like-minded leaders of the world’s border security establishments, to contribute to making the world a safer place and discuss some of the latest issues and challenges facing our borders and agencies tasked with protecting and managing them. The opening keynote presentation will be taken by Col dr Gizella Vas, Head of Hungarian Border Policing Unit, Hungarian National Police. This high level, high profile senior border official present will deliver an opening keynote presentation, setting the scene and tone of discussion at this years gathering of border agencies and agencies at the border. The Congress programme includes situational overviews in the opening plenary ‘Migration Movement Challenges from Human Trafficking to Illegal Migration – A global overview’ that will see a series of presentations including the new Director General of Immigration, Ministry of Law and Human Rights, Republic of Indonesia and David Alania, Chief Officer. Police Captain. Border Patrol, Ministry of Internal Affairs, GeorgiaThis years Congress will see panel discussions on ‘Adopting to the changing environment: what border security administrations must do to remain effective’ and ‘In the e-age of documents what is the life expectancy of the passport booklet?’, with senior officials

from organisations including the Singapore Immigration & Checkpoints Authority, International Organisation for Migration, Royal Netherlands Marechaussee and INTERPOL.Other interesting discussions include ‘Should exit controls be reintroduced universally? If so, how do we best share the necessary information across multiple agencies and stakeholders?’ and ‘Setting International Standards in IBM’. The full Congress programme can be found at www.world-borderpol-congress.com, with the latest line up of speakers and participating agencies and organisations.

HOSTED BY HUNGARIAN MINISTRY OF INTERIOR AND NATIONAL POLICEThe World BORDERPOL Congress is being hosted by the Hungarian Ministry of Interior and Hungarian National Police, confirming their official support for this year’s Congress being held in Hungary on the 9th to the 11th of December at the Kempinski Corvinus Hotel Budapest. The World BORDERPOL Congress brings together like minded leaders of the worlds border security establishments to contribute to making the world a safer place, through the continual development and maintenance of the three Cs , that is cooperation, communication and consultation. In our totally interdependent world finding solutions to protect national interests are becoming more and more challenging.The Ministry of Interior and Hungarian National Police are supporting and will be actively participating in the 3rd World BORDERPOL Congress, encouraging nations to cooperate, communicate

and consult with one another, in these challenging times for border security. BORDERPOL has enjoyed a long and fruitful relationship with the Hungarian border management community and Budapest is the home of the BORDERPOL European Secretariat. BORDERPOL is inviting the industry to Budapest, Hungary to join the largest gathering of border agencies and agencies at the border to discuss and debate how working and collaborating with international partners can improve border security for us all.

FURTHER INFORMATIONwww.world-borderpol-congress.com

Bord

erpo

l Con

gres

s

EVENT PREVIEW

Latest confirmed speakers

Clarence Yeo, Commissioner, Immigration & Checkpoints Authority, Singapore

Ralph Markert, Assistant Director, International Partnerships & Development, INTERPOL

Dr Ahmed Alzahrani, Project Manager, Ministry Of Interior, Kingdom of Saudi Arabia

David Alania, Chief officer. Police captain. Border Patrol, Ministry of Internal Affair, Georgia

Cephas Makunike, Zimbabwe Revenue Authority

Ioan Buda, Director General, Romanian Border Police

Director General of Immigration, Ministry of Law and Human Rights, Republic of Indonesia

Mr. Muhamad Anil Shah Abdullah, Director for Police Services, Assistant Commissioner of Police, ASEANAPOL

Ms Angiolelli-Mayer, Project Manager Passenger Facilitation, IATA, Switzerland

Andrus Oovel, Head of the Border Security Programme and Chairman of International Advisory Board for Border Security, Democratic Control of Armed Forces (DCAF), Switzerland

Commodore Vasan Seshadri (ret’d), Head Strategy and Security Studies, Center for Asia Studies, India

Ricardo Bn Baretzky, President, European Centre for Information Policy & Security, Belgium

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Issue 1918

Page 19: Counter Terror Business 19

BLOK

MESH

P O L M I L ® I S AD I V I S I O N O F

UK LIMITED

Tel: 01376 332591www.polmilfence.com

Specialists in the Design, Manufacture, Hire andSale of On-Ground Temporary Security Fencing

POLMIL® STANDARD FENCE

MODULAR FLEXIBLE DESIGN

POLMIL® ON-GROUND HOARDING

POLMIL® PAS 68 RATED(Test Reports on Request)

POLMIL® AIRPORT APPROVED

POLMIL® MOB ATTACK TESTED

NATIONWIDE INSTALLATION

ON-GROUNDTEMPORARY

SECURITY FENCING

See us onStand Number

C46 at OlympiaDecember 2-3

POLMIL A4 ADVERT 07.2014_Layout 1 02/07/14 17:42 Page 1

Page 20: Counter Terror Business 19

The current rise of Islamic extremism is neither a new phenomenon nor a surprising one. A thousand years ago, the Nazari Isma’ili sect (later known as the ‘Assassins’) spread terror during a 200-year campaign, murdering Crusaders and Muslims to further their political ends. Their first leader established a stronghold in north-west Iran where he recruited, radicalised and trained operatives to murder and terrorise according to his political requirement. There are clear parallels with the rise of the Sunni Islamic group

al-Qaida from its strongholds in Afghanistan and its campaigns against both secular and Islamic targets. Thirteen years later, the ‘fellow travellers’ of the Islamic State (IS) dominate a broad swathe of Syria and Iraq with their bastardised version of Wahhabism. In the modern era, operations by the US and its allies have cost trillions (the US estimates its Global War on Terror (GWOT) cost $3.7 trillion in the decade after 9/11) and have resulted in the deaths in combat zones of over 600,000 civilians and combatants.

However, the various theatres of the GWOT are now characterised by failing states and a rise of Islamic extremism, for which the West must bear much of the responsibility. Despite the many years of combat operations in Iraq and Afghanistan, neither state can be described as stable or democratic, and both interventions are being described, not least by RUSI, as strategic failures. They have been beset by a number of mistakes.

NO CLEAR END-STATEAs a consequence of the West having no objectives following Saddam’s removal, ill-conceived policies such as Deba’athification occurred. Its goal was to remove the Ba’ath Party influence in Iraq’s new political framework. By sacking any public servant with Ba’ath Party membership, the policy dismantled the extant security structure. It moved the former elite to the bottom of the social ladder and removed those competent to provide public services such as electricity, sanitation and governance. As a consequence, Deba’athification: catalysed the initial insurgency; increased disaffection amongst the general population at the lack of basic services and governance; and hamstrung any indigenous capability to treat either problem.

TRACKING THE RISE OF THE ISLAMIC STATESecurity consultant Paul Easter MBE outlines the difficulties Western powers have faced in attempting to build democratic nations in the Middle East, and calls for strategic thinking

Coun

ter T

erro

rism

Despite

the many years

of combat

operations in Iraq

and Afghanistan,

neither state

can be described

as stable or

democratic

WESTERN INTERVENTION

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Issue 1920

Page 21: Counter Terror Business 19

Similarly, the West’s intervention in Libya allowed militarily weak anti-Gaddifi forces to overthrow a 42-year despotic regime. Once again, no real effort was applied after the intervention to secure an effective security apparatus or to lay locally acceptable foundations for future political institutions. Now, militias have the balance of power, and the democratic government resides in Tobruk due to Tripoli being held by extremists. As neither side is being militarily decisive, Libya is slipping further into instability. In Syria, the civil war has killed over 200,000. Again, Western intervention did not decisively tip the balance of military power and has only prolonged the conflict. It has also allowed the rise of IS in the spaces not governed by the Syrian state.

SHORT-TERMISMEleven and thirteen years (Iraq and Afghanistan respectively) are very short periods to expect countries with no generational history of democracy to field successful democratic institutions. Previous interventions such as colonial rule in India

took generations to achieve a change that can be regarded as long lasting. Iraqi and Afghan democracies remain as elusive as ever.Despite enormous investments in equipment and training, the Iraqi Army has shown little robustness to deal with internal or external threats, proving wholly incapable to defeat the poorly trained insurgents from IS. This bodes badly for the similarly trained Afghan troops in their expected conflict with the Taliban post US drawdown.

MIRROR–IMAGINGWe all view the world through ‘us’-coloured lenses, believing others will behave as we would in their shoes. Western governments are particularly guilty of this bias, expecting those previously ruled by non-democratic models to embrace democracy like a Western audience. As a result, the recent efforts to impose democracies have largely been failures. While in the West dictatorships and other autocratic regimes are viewed with suspicion, they remain a valid model for some parts of the world. Strong autocratic regimes have held otherwise volatile states together for decades.

Yugoslavia, Iraq, and Libya are all examples. Indeed, the oft-heard cry that Iraq is better off without Saddam is difficult to argue persuasively. For example, it is estimated 800,000 have died in Iraq since 2003, and this figure exceeds the estimates for the whole of Saddam’s 24-year grip on power. ‘Our’ democracy has patently not brought stability to Iraq and Afghanistan, and, without a strong external unifying stimulus in Libya, it is likely to fail there too. IN CONCLUSIONTo conclude, Western interventions in the last twenty years have been categorised by: a lack of clear end-state objectives or a viable means to achieve them; a lack of real politick for state structures and government; and a wholly unrealistic timeframe. As a consequence, most states that have been subject to Western interventions are now ‘anocracies’, the disastrous halfway house between dictatorship and democracy. This chaotic void is when a state is at its most lawless and when groups such as IS flourish. It is ironic that despite one of the principal aims of the GWOT being to remove such groups, it has in fact made them stronger than ever. These are not smug observations with the benefit of hindsight. These are largely repeated observations from recent and earlier history. There is still much thinking to be done at the grand strategic level.

Counter Terrorism

The various theatres of the Global War on Terror are now characterised by failing states and a rise of Islamic extremism, for which the West must bear much of the responsibility

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

21 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 22: Counter Terror Business 19

phoenixdatacom.com/GOV-MODphone: +44(0)1296 397711

YOUR HIGH-TECHNOLOGY CYBER-SECURITY PARTNERWITH SECURITY-CLEARED TECHNICAL STAFF

CyberLab FOR DEMOS ON-DEMAND AT IPEXPOEXPERIENCE OUR VIRTUAL

C

M

Y

CM

MY

CY

CMY

K

phoenix-datacom-print-file-August-2014.pdf 1 22/08/2014 11:56

Page 23: Counter Terror Business 19

IP EXPO Europe, held on 8-9 October 2014, is Europe’s leading cloud and IT infrastructure event. Designed for professionals across the whole spectrum of IT roles, it is the definitive event to view brand new technologies, and through exclusive keynote presentations, gain fresh insights from the leading thinkers in IT. With cloud, mobility, security, analytics, infrastructure and datacentre technologies all under one roof, IP EXPO Europe covers everything needed to run IT for a successful enterprise. Each year, IP EXPO Europe has seen an increase in attendees, with a large percentage of 2013 attendees coming from Government and public sector, a figure that is expected to rise dramatically for 2014. The show provides an opportunity to join visionary thinkers from Government and the public sector to identify key issues and trends in the market. Located at the ExCel centre, London, for 2014, IP EXPO Europe will this year feature two brand new co-located events, Cyber Security EXPO and Data Centre EXPO, designed to address the new developments and trends in these critical areas. With over 300 exhibitors from the likes of Microsoft, VMware, IBM and Schneider Electric, the show will feature demonstrations and presentations which cover every facet of IT infrastructure, including the cloud, data

centres and the latest solutions to combat cyber-crime. IP EXPO Europe is this year’s must visit event for all IT specialists. The opening keynote speech will be delivered by Sir Tim Berners-Lee, inventor of the World Wide Web, who TIME magazine included in its ‘Top 100 Most Important People of the 20th Century’. Sir Tim will outline his vision for the 2050 Web and how organisations will use it to gain competitive advantage in future. Berners-Lee will also offer his insight into business strategies for innovation and the creation of markets through digital channels.

CLOUD PROOF INFRASTRUCTURECloud provision for the public sector, particularly ‘digital by default’, has become a central theme for discussion. Since the G-Cloud framework was deployed, there has been a commitment from the Government to build competitive digital services which fit public sector business needs. In a time of expanding cloud service options and growing citizen expectations of instant mobile access to information and services, it has never been more important for the public sector to ensure all public sector services are available online. Not only will IP EXPO Europe provide the latest information from leading thinkers, system integrator and service providers,

it will also bring into play insight from the Government. In particular, Government’s chief technology officer (CTO) Liam Maxwell who is well known for his commitment to IT reform within the public sector and most notably the driving force behind ‘digital by default’ will be speaking at IP EXPO Europe.

GOING ELECTRONIC The benefits of back-office efficiencies have been recognised and increasingly promoted since the Gershon Efficiency Review. Major efficiencies could be achieved as a result of electronic procurement and specifically electronic invoicing. It is not surprising then that the UK government has been aligned with the deadlines set up by the European Commission which make e-invoicing in procurement mandatory from 2016 with the aim of making it the predominant method by 2020. Compared to the rest of Europe, the UK is slightly behind with the Nordics leading the way. Since 1 February 2005, for example, all government institutions in Denmark can only accept invoices in electronic format. Ultimately, e-invoicing could save taxpayers billions of pounds, enable the government to tap into new markets and help secure payments more quickly. If we take Denmark alone, each minute saved in invoice processing of the public sector’s 15 million invoices equals to €12 million in savings. If 10 minutes are saved for each invoice, Denmark could attain savings in the region of €120 million per year. Advocates of e-invoicing point at clear examples of best practice and have estimated that the complete roll out by the UK government could result in economic benefits of £22-£28 billion a year in comparison with modest levels of investment. With such solid figures and bad debt losses incurred by European companies at an unprecedented high of €350 billion, it is no surprise that the UK public sector is under mounting pressure to embrace e-invoicing.With late payment of bills remaining a serious concern for SMEs despite the improving economy, governments in Europe are enlisting the adoption of e-invoicing as one of the solutions. This is in conjunction with major and widespread legislative changes. As demonstrated by earlier adoption, e-invoicing leads to faster payments as it reduces the amount of time wasted whilst the invoice is in the post, it shrinks the likelihood of customers claiming they have not received the invoice or that it must be lost in the post while speeding up potential complaints. The programme at IP EXPO Europe 2014 will explore the issues surrounding ‘digital by default’ in the public and private sector, giving insight into the options available to public sector organisations, in addition to examining the benefits and barriers of G-Cloud.

FURTHER INFORMATIONwww.ipexpo.co.uk

EVENT PREVIEW

SHOWCASING ADVANCES IN IT INFRASTRUCTUREIP EXPO Europe 2014 on 8-9 October at London’s ExCel brings together some of the leading minds in cloud and IT. Counter Terror Business takes a look at some of this year’s main attractions

IP Expo

phoenixdatacom.com/GOV-MODphone: +44(0)1296 397711

YOUR HIGH-TECHNOLOGY CYBER-SECURITY PARTNERWITH SECURITY-CLEARED TECHNICAL STAFF

CyberLab FOR DEMOS ON-DEMAND AT IPEXPOEXPERIENCE OUR VIRTUAL

C

M

Y

CM

MY

CY

CMY

K

phoenix-datacom-print-file-August-2014.pdf 1 22/08/2014 11:56

23 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 24: Counter Terror Business 19

www.everbridge.co.uk/transportation 0800 0350081

A SINGLE PLATFORM WITH ONE INTERFACE FOR EVERY TYPE OF CRITICAL COMMUNICATION NEED

SITUATIONAL INTELLIGENCE & SOCIAL MEDIA

EMERGENCYNOTIFICATION

MOBILE STAFFMANAGEMENT

vocal.indd 1 8/29/2014 7:11:13 AM

Recognize AND Analyze

Is she a known suspect?

How often was she here this month?

When, where did she enter?

Is she an authorized employee?

How old is she?

www.cognitec.com • [email protected]

Premier face recognition technology for real-time video screening and anonymous people analytics

Has she been here before with another suspect?

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Issue 1924

Page 25: Counter Terror Business 19

In a world where everything to everyone is connected through hundreds of thousands of access points, it is becoming incredibly difficult for us to protect sensitive information from falling into the hands of cyber criminals. It is crucial that companies and the government alike have the right safeguards in place to protect their data from cyber criminals who may wish to access this type of information to cause serious harm to the UK’s critical infrastructure. In order to properly safeguard this information, we need to understand the huge scale of enterprises that make up the government’s supply chain. From small businesses to huge conglomerates, all of the UK government’s supply chain is sending highly sensitive information via many channels. In particular, the complex supply chain that links the UK government’s critical infrastructure. The danger here is that if hackers can access information anywhere in the supply chain, there is potential for our critical infrastructure such as power grids and hospitals to be vulnerable to attack. This could then have a catastrophic effect on vital services, from interfering with a patient’s surgery to gaining control of nuclear facilities.

THE THREAT OF CYBER TERRORISM Therefore, unsurprisingly, cyber threats have shot to the top of the UK government and international agenda. In particular, in recent years due to high profile leaks cyber security has become a thorny issue for governments and businesses worldwide. There is no doubting that all this connectivity delivers overwhelming benefits to society, yet the cyber threat represents a very real and tangible danger to all of us on a daily basis. Unfortunately, there is no quick fix and we cannot eliminate the threat completely as cyber criminals will always be keen to exploit the system for their own gain – whether that be politically, economically or personally motivated. However, the most worrying of these concerns, from both a government and citizen perspective which often receives much media speculation, is that of state or privately sponsored terrorism. From criminal gangs to ethnic extremists many believe these groups with the right technical knowledge could pose a huge risk to our critical infrastructure

and cause major damage

to society. Enterprises,

particularly those within the

government’s critical infrastructure supply chain must be clear on their security protocol and understand how to best protect themselves from potential attack.

PROTECTING THE SUPPLY CHAIN This July saw the publication of a plan for 2014-15 by the Government Digital Service (GDS), to commit to open standards to better connect suppliers with the government and achieve the goal of ‘digital by default’ – driving service delivery to digital platforms across government and public sector. Government initiatives such as this are opening the communication channel between government and suppliers, wherever that business may be in the chain. This is a huge step in the right direction and will allow government and businesses alike to better collaborate and ensure that all access points within the system are secure. As a series of keynotes, high profile individuals such as Mikko Hypponen, Chief Research Officer at F-Secure, Andrey Nikishin, Head of Future Technologies Projects at Kaspersky Lab, Bruce Schneier, Chief Technology Officer, CO3 and Edward Lucas, senior editor at The Economist will

be sharing their knowledge and expertise in this area at Cyber Security EXPO in October. At the event they will be discussing how the world is changing, whether cyber terrorism is a real or over-exaggerated threat and how best to protect the enterprise from attack. The discussions will include how to build a defence strategy that works and how big data is a useful weapon in the defence of the cyber threat. Furthermore, the conference will debate information security in the age of social media, discussing the security implications of social media when manipulated by hackers and cyber criminals for personal or political gain.

A MAJOR EVENTCyber Security EXPO will be co-located with IP EXPO Europe at London’s ExCeL in October. Over 300 exhibitors will cover every facet of IT infrastructure, including the cloud, data centres and the latest solutions to combat growing cyber crime. With a massive 16,000 square metres of exhibition space – a 15 per cent increase on last year’s event – this year’s exhibition is a must visit for all IT specialists. Under one roof, this year’s brand new integrated events mean that every professional can gain the insight and advice they seek. This year, the exhibition will include IP EXPO Europe, Data Centre EXPO and Cyber Security EXPO.

FURTHER INFORMATIONwww.ipexpo.co.uk

EVENT PREVIEW

CYBER SECURITY IN A NON-STOP ECONOMYThe effective safeguarding of public sector data is more vital than ever. Cyber Security EXPO 2014 on 8-9 October at London’s ExCel offers visitors the chance to learn about the key issues

Cyber Security

From

small to large

businesses,

the UK government’s

supply chain

is sending highly

sensitive information

via many

channels

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

25 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 26: Counter Terror Business 19
Page 27: Counter Terror Business 19

Written by Am

ar Singh, chair, ISACA Security Advisory Group

A denial of service attack can have a major impact on services offered internally like the email or file directories and external services including government information and payment portals. A worrying trend flagged up in research by RAND Corporation is that anyone can rent a 24hr DoS attack for a meagre sum of US$50. Mimicking the capitalist economies, the service is sometimes offered with a money back guarantee if it does not work.

CYBER RETALIATION2013 saw the world’s first known instance of a commercial cyber retaliation, more commonly called a CTT or Cyber Tit for Tat, that resulted in a tangible impact on the global internet. Spamhaus, an international non-profit organisation that tracks the Internet’s spam operators, had recently blacklisted an internet hosting organisation based in Netherlands, called Cyberbunker. Their reasons included the allegations that Cyberbunker was openly hosting known spammers amongst other cyber vandals. As a result, there was a gradual loss of internet traffic to Cyberbunker, to which, it is alleged, the Netherlands based company retaliated. In short, Spamhaus was

targeted by a Denial of Service attack of a magnitude that had never before been seen. During that period significant portions of the Internet were affected, emails were delayed (in some cases severely), major websites were very slow or not loading at all, and internet banking was unavailable to many. Luckily for everyone, the internet did not grind to a complete halt.

THE BASICSThe primary objective of a denial of service attack is to deny access to critical resources. These resources can be external as in websites, payment portals or internal resources including directory services like active directory, email systems and corporate networks. It is important to point out that DoS attacks can be both internal and external. External DoS attacks make it to the media headlines primarily because they are external as in, the unavailability of a public facing website or email service.

Internal DoS attacks can sometimes have a greater impact but these attacks don’t often make it to the headlines. For example, the simple act of users unable to login and use their computers for a prolonged period of time is a Denial of Service in action, deliberate or not.

DoS & DDoS: THE DIFFERENCE

DoS stands for Denial of Service and DDoS stands for Distributed Denial of Service. The impact of a distributed attack is often far greater than a regular DoS attack. It must

be noted that in many instances both terms are

used interchangeably. For an analogy of a DoS

attack, imagine an attacker taking a single hammer and attempting

to break a tempered glass. The attacker would have to spend a great deal of time and effort to break it. It would be like one single computer attempting to attack E

MOUNTING A RESPONSE TO THE DIGITAL HIJACK THREATAmar Singh of international IT governance association ISACA reports on the damage denial of service (DoS) attacks can do and shares advice on how organisations can protect themselves

Cyber Security

DoS ATTACKS

The primary

objective of a

DoS attack is to deny

access to critical

resources such

as websites, payment

portals or internal

resources

27 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 28: Counter Terror Business 19

With a conference, exhibition and evening entertainment there is plenty to choose from. Visit the website and download the full programme today.

www.terrapinn.com//uavctb

THE UNMANNED HERO

Andy CashmoreStation CommanderWest Midlands Fire Service

Chris RainfordWatch CommanderGreater Manchester Fire and Rescue Service

Cpl. Byron CharbonneauUAS Coordinator: D-DivisionRoyal Canadian Mounted Police

The unmanned hero: UAVs role in protecting the public

Sergeant Simon LuckGatwick Airport Community Safety TeamSussex Police

Dawn HucksonPolice Search AdvisorSussex Police

Examining demand for future payload technology: End user Case studies

Sergeant John OverendTactical Planning UnitStaffordshire Police

What can you learn from global UAV use across the world? An insight into UAV achievements from a variety of countries

21-22 October 2014Level 2, Olympia, London, UK

Unmanned Aerial Vehicles (UAVs) have been recruited by the emergency services as an additional and advanced tool in a variety of operations such as; search and rescue missions, crowd control, border patrol and accident investigations.

The Commercial UAV show brings together current and future UAV end users with manufacturers and service providers and drive innovation in the commercial UAV universe.

Key sessions for emergency services to attend:

The Commercial UAV EU 2014 AD 210-297.indd 1 01/07/2014 10:07

With a conference, exhibition and evening entertainment there is plenty to choose from. Visit the website and download the full programme today.

www.terrapinn.com/uavctb

CMO_CTB19 - FP.indd 1 02/09/2014 10:12

Page 29: Counter Terror Business 19

With a conference, exhibition and evening entertainment there is plenty to choose from. Visit the website and download the full programme today.

www.terrapinn.com//uavctb

THE UNMANNED HERO

Andy CashmoreStation CommanderWest Midlands Fire Service

Chris RainfordWatch CommanderGreater Manchester Fire and Rescue Service

Cpl. Byron CharbonneauUAS Coordinator: D-DivisionRoyal Canadian Mounted Police

The unmanned hero: UAVs role in protecting the public

Sergeant Simon LuckGatwick Airport Community Safety TeamSussex Police

Dawn HucksonPolice Search AdvisorSussex Police

Examining demand for future payload technology: End user Case studies

Sergeant John OverendTactical Planning UnitStaffordshire Police

What can you learn from global UAV use across the world? An insight into UAV achievements from a variety of countries

21-22 October 2014Level 2, Olympia, London, UK

Unmanned Aerial Vehicles (UAVs) have been recruited by the emergency services as an additional and advanced tool in a variety of operations such as; search and rescue missions, crowd control, border patrol and accident investigations.

The Commercial UAV show brings together current and future UAV end users with manufacturers and service providers and drive innovation in the commercial UAV universe.

Key sessions for emergency services to attend:

The Commercial UAV EU 2014 AD 210-297.indd 1 01/07/2014 10:07

With a conference, exhibition and evening entertainment there is plenty to choose from. Visit the website and download the full programme today.

www.terrapinn.com/uavctb

CMO_CTB19 - FP.indd 1 02/09/2014 10:12

your website with an electronic hammer denying your legitimate users access For an analogy of a DDoS attack, imagine the attacker paying 10 friends to take the same hammer and attack the glass at the same time. Not only will the glass break faster but the impact of the damage may be greater than a single hammer attack. The attacker hijacks 10 thousand computers scattered around the internet and uses the same hammer, this time multiplied by 10 thousand, to attack your website denying your legitimate users access.

THE THREAT OF INTERNET OF THINGSUntil recently an attacker would hijack thousands of vulnerable computers on the internet to launch a DDoS attack. These vulnerable computers include all types of computers including laptops, desktops or office email servers. Now imagine the same attacker being able to hijack your fridge, smartphone, tablet and a million other of these devices and commandeer an even more catastrophic attack to your website. This is possible and we are already starting to see these Internet of Things (IoT) devices being used as accessories to DDoS attacks.

UNDERSTANDING THE ATTACKERSUnderstanding the attacker and the motivation that drives these attacks is crucial to building the appropriate protection and detection mechanisms. ISACA describes four main types of attackers: unsophisticated opportunists; sophisticated individuals who attack specific targets; those engaged in criminal or corporate espionage; state sponsored advanced attackers. A fifth category could be referred to as insiders, or ‘privileged attackers’. Although technically, this type of attacker can be slotted into any one of the above four categories, it deserves its own classification as very often it is the employee or groups of them that end up causing the biggest disruption and damage to the business. Reasons range from bribery, job dissatisfaction or loss of employment. The privileged attacker is a special kind of attacker as he/she is well versed with the culture, the technology, the technical architecture and most importantly has the explicit trust of his/her employers. In addition, in almost all instances this privileged user has the administrative user details including passwords to all the critical systems and that is why this type of user is also sometimes called the ‘god user’ or ‘superuser’. The motivation of an attacker can be divided into five categories: grievance; crime; hacktivism; espionage and warfare.

THE LOGIC BEHIND CHOOSING A TARGETIn a realm that has no boundaries and no governance framework there can be several reasons that an organisation falls victim to a DoS attack, ranging from the insider, equipped with sufficient knowledge and awareness of the technical landscape, who has an axe to

grind with the management, to the malicious criminal or nation sponsored element that have significant funding, highly skilled and able manpower and the luxury of time to launch targeted or opportunistic attacks. Consider this example. In the past, a denial of service for a business would normally mean having its windows smashed by a bored teenager. That same teenager could muster his friends and break multiple shop windows via a distributed denial of service. Importantly there was and still is physical effort involved in breaking glass and the resulting chaos and loss of business is localised. Today, that same teenager, in many cases working alone, can cause global mayhem, affect the livelihoods of millions of people, deny critical services to hundreds of thousands of people – all from the comfort of their bedroom. If he or she is clever they could develop or produce the program (the equivalent of a stone) themselves. If they have spare change, say a few hundred dollars, the teen could procure a ready made program that guarantees mass destruction.

HOW TO DoSA DoS, in comparison to other more sophisticated attacks, is relatively easy to carry out. Worryingly, DoS and DDoS tools are readily available in what is a thriving underground market for cyber attack tools.In an insider DoS attack, the IT System administrator literally pulls the plug on your email servers and deletes all the files and the backups, meaning all your data is inaccessible or gone. Alternatively, the system administrators permanently delete the authentication infrastructure in your organisation so that no one can log in. A website is the window into the world of commerce, services and information. An outsider DoS attack can deny access to

legitimate users of the site. Some examples of the impact of a DoS attack include: an NHS or surgery website not being able to accept doctors appointments; the site to renew car tax becomes inaccessible resulting in thousands of drivers with expired tax discs; and a council site accepting payments for parking charges is very slow causing many customers who are trying to pay for their fines to try again and again. This further slows the site and more customers cannot pay their fines.

PROTECTION MECHANISMSWhen I visit my clients the first thing I ask is, “How are you protecting against a DoS attack?” There is confusion on most faces and sometimes, the techie amongst them is bold

enough to ask why I bring up DoS before the other more sophisticated attacks like advanced malware attacks (also wrongly called APTs). My answer is that DoS attacks are a nuisance, a waste of effort and skill and in most cases not something that any organisation’s IT teams should have to spend their time dealing with.

BUILDING THE CASESurprising as it sounds, there can be a positive angle to DoS attacks. You see, most people understand the concept and have at some point in their career seen and felt the impact of either an internal or external denial of service. That makes it easy to obtain finance and project board approval, at least in my experience. The case is, in most cases, very straightforward, especially when it comes to building a case for external protection. Not having DoS protection means that your payment or service portal could be inaccessible for several hours, if not days, affecting bottom line, reputation and brand image. In some cases, someone may lose their job for not including this attack vector in their protection strategy.

STOP THEM FROM REACHING YOUI have a very strong opinion when it comes to outsourcing security. However, when it comes to protecting against external DoS and more importantly a DDoS I strongly recommend utilising the services of an established outsourcer. The established firms have the wherewithal to absorb these large scale attacks, and can stop attacks at source. A DoS attack is one of the few tangible forms of attacks that visibly affects employee and customer facing assets like authentication and websites. This material impact often leads organizations to spend

unnecessary financial, human and technical resources in mitigation strategies. The regular recommendations of carrying out a risk assessment and threat modelling apply but consider DoS attacks as a nuisance and annoyance more than an advanced threat.

Your assets will be DoS(ed) as they say and if you are a government body that is involved in an international or local conflict the likelihood of an attack is even greater. It is my recommendation that, unless there are specific reasons, organisations consider offloading the protection from this threat by a strategically outsourced agreement.

FURTHER INFORMATIONwww.isaca.org.uk

If you are a government body that is involved in an international or local conflict, the likelihood of an attack is high

Cyber Security

DoS ATTACKS

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

29 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 30: Counter Terror Business 19

The Senior Management team of the Security Industry E Magazine have announced the deserving recipients of the annually presented, Supplier to Industry Award for 2014 as global company, Infranor. The Award recognises the Infranor’s dedication to supplying an evolving industry with the latest in cutting edge product solutions within the slotted and slotless motor sector. On receiving the Award, Infranor’s managing director Adrian Hazelwood commented: “It is rewarding for our company to be recognised by our customers and the market place in general. For us the result of our hard work must always be a happy customer, however it is very special to be recognised by an industry journal as our effort, time and the financial

investment we make to improve motor reliability, performance and flexibility that a continuously changing market needs is often un-noticed. This award is a result of pure teamwork, our customers trust us to find a solution and we use our expertise within our Motor and Drive factories to not only meet but in most instances surpass the customers’ needs and desires. For me to receive the award on behalf of a dedicated team that stretches across the globe is very satisfying, it confirms that our business model, work ethic and skill sets are correct.” Many design engineers working in the field of motion control are familiar with slotless motor designs, but may wonder if these specialised motors signifcantly improve machine performance. In many

cases, they can. Slotless motors offer more torque per frame size, produce more power, run smoother and achieve higher speeds than their slotted counter parts. A closer look at the technology follows, plus realistic tips on evaluating whether or not your application could benefit from slotless motor.

SLOTTED SERVOMOTOR CONSTRUCTIONA traditional slotted brushless servomotor has a stator made of stamped metal sections called laminations that are stacked to form teeth. Wire is wrapped around these teeth; when current flows in the wire, an electric magnet is created in the stator. Permanent magnets are fixed to the rotor. As in slotted motors the permanent magnets in slotless servomotors are fixed to the rotor. However, a slotless stator is built without teeth. Motor windings are wrapped around a temporary mould and then encapsulated to keep them in place. Eliminating the teeth yields many benefits.

APPLICATION BENEFITS FOR SLOTLESS MOTORSHigher torque is beneficial for most applications. More torque usually means higher acceleration and greater machine output. Additional torque also means that a smaller motor may be used, which can save money. A motor that can run fast may be the obvious choice for high speed applications such as centrifuges. But faster speeds can also help reduce overall machine cost and help

AWARD WINNING SLOTTED AND SLOTLESS MOTORSInfranor recognised for its dedication to supplying the latest in cutting edge solutions in the slotted and slotless motor sector

Adve

rtise

men

t Fea

ture

COUNTER TERROR BUSINESS MAGAZINE | Issue 1930

Page 31: Counter Terror Business 19

increase machine output. If the machine’s mechanics can handle higher speeds a faster move time is possible. If gear reduction can be selected to optimise torque at higher speed a smaller motor can be used, therefore saving money and weight. Additional power may also eliminate costly secondary mechanics that can shorten machine life and escalate maintenance. These motors have been used in Ordinance in feed systems as well as Linear and Rotational positioning systems, giving the product high torque and speed with modular construction and zero cogging all within a compact size.

DRAWBACKS OF SLOTLESS MOTORSDespite their benefits slotless motors have their drawbacks and are therefore not suited to every application. For any given

size, slotless motors generally have larger diameter rotors, and because rotor inertia increases with the rotors diameter, inertia can increase significantly. Consider an application where load inertia is very low compared to motor inertia and high acceleration is required. In this instance, a slotted motor may be able to accelerate faster than a slotless one. If the slotless motor’s additional torque cannot compensate for the higher torque required to accelerate the system. A slotless motor may also be difficult to manufacture. The motor manufacturer may need to develop customer winding equipment because standard equipment does not do the job. If the choice is made to encapsulate the motor windings in resin to enhance performance and create a more rugged motor, the motor manufacturer must have significant experience with resin materials and the potting process itself. These manufacturing challenges could increase the cost for both manufacturer and end user. Infranor’s success in precision markets has

been strengthened by the successful launch of the Xtrafors Prime series of zero cogging servomotors. These motors offer the latest technology in slotless design. These have been used in Ordinance in feed systems as well as Linear and Rotational positioning systems, giving the product high torque and speed with modular construction and zero cogging all within a compact size. The Xtrafors Prime series is just one of the many exciting ranges of servomotors that are designed and manufactured in Europe and available from any of the global Infranor sales and engineering teams. When asked about Infranor’s future developments, Adrian Hazelwood went on to say: “We must be very conscious that the steps we take forwards with technology is also plug and play with our current offering and

solutions we provide, or at least be a minimum of application disturbance for our customers. We hate the word obsolescence and work hard to avoid it. We must also be aware of the world’s weakening material resources as we continue to develop, and as such new magnet, housing and winding technologies are at the forefront of our R&D. Ongoing developments are many and also in varying fields which is incredibly exciting as they all have their own exacting demands and challenges. We should remain customer focused and market driven. We can only ask our customers to watch this space as there are new core products close to release. As a manufacturer of bespoke solutions in servo motors and servo drives each day is amazing as another customer product is designed, developed, prototyped or shipped.”

FURTHER INFORMATIONFor further information about this award winning company,email enquiries to [email protected] or call 0208 144 2152.

Advertisement Feature

Many design engineers working in the field of motion control are familiar with slotless motor designs, but may wonder if these specialised motors signifcantly improve machine performance

Slotless benefits

Grinding: Smooth motor motion (generated by slotless motors) is imperative as the cogging affected, can produce an undesirable finish on final parts.

Battery Powered Designs: The higher efficiency and potentially smaller size of slotless motors extends operation.

31 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 32: Counter Terror Business 19

Adve

rtise

men

t Fea

ture

Once considered an alternative telephony solution, VOIP technology – in particular SIP Trunking (a common method used to connect IP-PBX systems to service providers) and SIP based unified communications is now becoming mainstream technology. It is used by a number of businesses due to its superior calling features, next generation messaging and competitive pricing. However, businesses are often unaware that calls made over the public internet are vulnerable to remote listening-in unless they are strongly encrypted. Many business leaders do not fully appreciate that VOIP phone calls can be a high risk interception, having been sold a telephone communication system that is ostensibly cheaper and superior, but is not protected by call encryption.

THE BOTTOM LINE Unless your telephony provider can confirm call encryption, any calls made over the internet must be considered insecure. This makes eavesdropping a very real business threat. During the course of a telephone call, sensitive information may be divulged either in spoken voice or in the DTMF tones to signal key presses. Your conversations

about business operations, research and development processes and findings, mergers and acquisitions activity, staff and customer data and financial status may be at risk. “At VOIP.co.uk we identified that security had been overlooked in the world of internet telephony. Business leaders and managers do not want to spend valuable time managing their telephone system and worrying about call encryption. Our Customers rely on our SIP Encrypt Service to protect their confidential phone calls, giving them the peace of mind to focus on their core business.“ says Adam Crisp, CTO at VOIP.co.uk.

COMPLIANCE The Payment Card Industry is concerned with IP telephony hacking for obvious reasons and has issued industry standards to ensure that merchants do not put cardholders at risk. If cardholder payments are made via the phone, businesses are mandated by law to adhere to the Payment Card Industry Data Security Standards (PCI DSS). PCI DSS protects against the loss of cardholder data and covers the storage (call recordings), transmission (voice calls or DMTF digits) and processing of card information. If the connection is provided over the internet or

even a private circuit where your service provider can’t warrant against leakage of data, it is crucial that this connection is strongly encrypted to protect cardholder data. SIP Encrypt by VOIP.co.uk has been fully audited and the company has been accredited as a PCI DSS Level 1 service provider. VOIP.co.uk’s SAFEGateway is a simple solution for merchants and contact centres who are required by the banks to prove that their telephony complies with industry standards.

CALL SECURITY FOR EVERY ORGANISATIONIrrespective of business size or sector, whether card payments are accepted or not, chief information security officers and IT managers must take steps to ensure that their customers, employees, products, patients, research and financial status remain fully protected from remote access wiretapping. Visit Voip.co.uk’s stand at the Cyber Security Expo on 8th and 9th October 2014 at ExCeL London.

FURTHER INFORMATIONTel: +44 (0)1869 [email protected]

IP TELEPHONY

SECURE INTERNET TELEPHONY SIMPLIFIEDOnline attacks and phone hacking have dominated recent headlines, from sophisticated high level attacks to small-time opportunists looking for quick financial gain. Adam Crisp, chief technology officer at VOIP.co.uk explains the risks to the telephony industry and looks at possible solutions

SAFEGateway from VOIP.co.uk

Fully penetration tested, this device is included as part of the service and is easily deployed at your site and encrypts all calls to our network. The SAFEgateway protects your business against eavesdropping or unsolicited call recording allowing you to:

Protect critical business information

Reduce risk and protect your confidential data

Comply with Payment Card Industry standards

Ensure data privacy and protect intellectual property

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Issue 1932

Page 33: Counter Terror Business 19

Written by M

ike Gillespie, director for cyber strategy and research, the Security Institute

Our world, including our critical national infrastructure (CNI), faces rapidly evolving threats and a constantly shifting threat landscape. We have a level of maturity in handling some of the threat and risk from the physical world, but our ability to handle the threat from cyberspace is still developing and nations are becoming increasingly aware of the attraction of these critical services as targets. The threat to CNI has to be treated holistically as the threat itself is holistic. Bringing a region or nation to its knees from the other side of the world is no longer the stuff of spy movies or fiction novels. It is possible to disable critical national functions without any physical interaction with the site, plant or system you are attacking. The use of malware means that it can evolve and spread, this is what we saw with Stuxnet; originally designed to attack centrifuges in Iranian nuclear reactors, it evolved and ended up going wild, affecting many more networks and systems than it was initially

designed to do. Technology is increasingly networked and this greater connectivity means an increased array of threat sources coming through the cyber vector. INCREASINGLY VULNERABLE

This trend toward the interconnectedness of

everything looks set to grow rather than decline,

and therefore our attitude to threat needs to become more holistic in nature as that is how the threat landscape is evolving. There are

relatively high levels of legacy technology

still in use and this is a contributory factor to the

threat – not all technology was built with the ‘Internet

Of Things’ in mind and this can make it very challenging to secure and maintain securely. For instance anything running on Windows XP will be unsupported, so if it has been used as a platform for any CNI systems this constitutes a major vulnerability. The problem is that

systems can take a very long time to develop and by the time they reach implementation they could actually be obsolete. So really, it is a perfect threat storm for CNI. Let’s look at SCADA systems. The term ‘Supervisory Control and Data Acquisition Systems’ usually refers to centralised systems that monitor and control entire sites, or complexes of systems spread out over large areas that could mean a plant like a nuclear reactor plant or a satellite or an entire country. These are in common use throughout CNI as they are integral to the efficient running of these sites but they are also vulnerable if not properly secured and if you have a determined insider the threat increases dramatically.

HIDDEN TARGETSIt isn’t just the direct threat that needs to be considered; the eventual compromise of the system could actually come from somewhere in the supply chain. Smaller organisations frequently become initial targets but with the criminal’s gaze actually directed toward the larger organisation or more valuable data elsewhere in the chain. Targeting a smaller supplier may offer a much softer target as a launch point. When you think about the UK, more than 95 per cent of our businesses are SMEs and the Government actively courts SMEs to be Government suppliers through frameworks like G-Cloud. If these are suppliers into our CNI and have less than robust security strategies in E

The Security Institute’s Mike Gillespie highlights why those that protect the UK’s critical national infrastructure need to anticipate threats and monitor the technological supply chain

Cyber Security

PROTECTING SERVICES FROM CYBER ATTACKS

It is

possible to

disable critical

national functions

without any interaction

with the site, plant

or system you are

attacking

CRITICAL NATIONAL INFRASTRUCTURE

33 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 34: Counter Terror Business 19

place they could be exploited and become an attack vector. Also manufacturers in the supply chain may pose an unintended threat as in general, manufacturers of technology increasingly they are distancing and absolving themselves of responsibility toward creating a secure product in the first place. Add to that the compartmentalisation of modern manufacturing techniques, whereby components of an item could have come from several different suppliers and be

assembled in a totally different region or country and you begin to see the issue more clearly. A good example of this could be the iPhone – some components of the iPhone are actually manufactured by Samsung, presumably in between lawsuits with Apple. So, another key question to be factored into the cyber resilience strategy would have to be, where are you actually buying your tech from? Consider a recent incident in which some Microsoft motherboards were factory issued with built in malware.

INSIDER THREATSSo, the supply chain is increasingly complex and strangulated. Before any piece of technology gets anywhere near any particular area of our CNI, it could have been compromised. All of this is without the human threat, or ‘insider threat’. Insider threat doesn’t have to be malicious, it can come from someone forgetting or avoiding a piece of essential protocol, either through sloppiness and poor training or through genuine mistake.

Obviously there are the malicious insiders who are very determined, potentially knowledgeable and highly motivated. This might be ideological, financial or political motivation. Stuxnet for instance, which was introduced to the Iranian nuclear centrifuges by a USB drive, has been variously attributed to different state sponsored cyber-attack programs.

FURTHER INFORMATIONwww.security-institute.org

Cybe

r Sec

urity

CRITICAL NATIONAL INFRASTRUCTURE

If suppliers into our CNI have less than robust security strategies in place they could be exploited and become an attack vector

The UK’s national infrastructure

The UK’s national infrastructure is defined by the Government as: “those facilities, systems, sites and networks necessary for the functioning of the country and the delivery of the essential services upon which daily life in the UK depends.” The national infrastructure is categorised into nine sectors: communications; emergency services; energy; financial services; food; government; health; transport; and water. Infrastructure is categorised according to its value or “criticality” and the impact of its loss. This categorisation is done using the Government “Criticality Scale”, which assigns categories for different degrees of severity of impact. The Criticality Scale includes three impact dimensions: impact on delivery of the nation’s essential services; economic impact (arising from loss of essential service) and impact on life (arising from loss of essential service).

Plan Design Enable www.atkinsglobal.com/security

Securing strategic advantage

Protecting your organisation from security breaches is not simply a matter of building high fences and implementing the latest firewall and virus checker. Effective security means protecting the businesses’ critical assets in a way that doesn’t inhibit doing business. Understanding what is critical requires a link to be created between security and your business objectives.

By doing this and considering security from an holistic perspective joining physical, personnel and systems security allows you to focus spend on what is most important and brings your business competitive advantage by implementing the most cost effective approach to deliver on your objectives.

Atkins helps clients to secure their strategic advantage by:

• Identifying what is critical to your business• Striking the right balance between security and accessibility of the

key business functions• Creating a safe environment to do business • Reducing risk and vulnerability• Balancing spend on security to get best value from the investment you

make in protecting your business.

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Issue 1934

Page 35: Counter Terror Business 19

Written by Roger Cum

ming, technical director, Atkins Security

Modern society relies on complex infrastructures, both physical and cyber, for all aspects of daily life. Designers can rely upon a wealth of advice about how to make them resilient to known types of attacks. However, a country’s infrastructure can last for many years and it is impossible to know with accuracy what kind of threats it may need to withstand over its lifetime. Furthermore, the threat can change far more quickly than any defensive postures and adding these retrospectively is invariably expensive. How do those designing the infrastructure build-in protection against threats that they cannot accurately predict? Here are three strategic guidelines that should shape the design process.

WIDER CONTEXTThe first guideline is that the design needs to take place against a wider context, for example a national security strategy or plan that is set by a higher authority (normally the national government). The planning for all types of infrastructure should consider a wide range of potential risks. Underpinning this should be a comprehensive set of relationships between the infrastructure owners and the relevant government agencies that are responsible for assessing security threats and disseminating advice about how to mitigate them. Infrastructure owners must work with these agencies to address any relevant threats; they cannot do this by themselves.

IMPACT DRIVENThe second guideline is that the focus of the design should be on minimising the impact of a hostile event. There is a considerable body of knowledge about how to protect against a terrorist attack or hostile cyber incident. It is essential that designers and architects engage early with security practitioners to understand the impact that a catastrophic event might have on the infrastructure. All too often designers focus on the likelihood of an attack, rather than on what impact it would have and this approach is less likely to produce a design that is capable of withstanding changes to the threat landscape.

HOLISTIC APPROACHThe third of the strategic guidelines is taking an holistic approach. Modern infrastructures rely upon complex technologies that are the interface between the physical and cyber worlds and are known by the collective term Industrial Control Systems. They enable water, gas and electricity to flow; make trains run safely;

improve business productivity; and support domestic and leisure activities. Like all computers, Control Systems can be vulnerable to cyber attack. They can’t just be turned off or rebooted – the focus is on continuous availability rather than confidentiality. The increasingly complex interdependency between the physical and logical elements can be seen in many other areas, including ones with a security function such as access control and CCTV systems. These are now controlled across communications that themselves may

be vulnerable to cyber attack. This could result in sound physical protection measures being compromised in some way. Any holistic approach must also include the people who use the physical and cyber measures in an organisation – that means the whole workforce, not just security practitioners. STRUCTURESecurity functions that are organised in silos are inefficient and obstruct the identification and mitigation of risk. The governance of all security functions should be structured to support an holistic approach. Having different reporting or line management chains for different security functions will stretch channels of communication and introduce potential gaps from which greater risk will emerge.

Effective security starts at the top of the organisation and should be embedded throughout it by a culture in which the day to day activities of everyone contribute effortlessly towards shared protective security objectives. The approach proposed here also makes easier the identification of new threats as they emerge. This is particularly important in the cyber environment where change is a constant factor. Building defences based only on a consideration of a threat that

can change more rapidly than they can be reconfigured will not lead to a secure cyber infrastructure. Only by understanding what is critical to their operations can infrastructure designers and owners start to build physical and cyber systems that can remain resilient in the face of diverse threats.

GETTING THEREThe three guiding principles of considering a wider context; being impact driven; and taking an holistic approach may be easy to say yet much more difficult to achieve. It is vital to get things right from the start and have security considered at the beginning of the design stage, not as a post-build ‘add-on’. Designing-in security must be the philosophy of the future. L

FURTHER INFORMATIONwww.atkinsglobal.com/security

A country’s infrastructure can last for many years and it is impossible to know with accuracy what kind of threats it may need to withstand over its lifetime. How do designers build-in protection against threats that they cannot predict?

LOOKING INTO THE FUTUREThreats, design and predicting the future: “Designing-in” security for critical infrastructure

Advertisement Feature

SECURITY

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

35

Page 36: Counter Terror Business 19
Page 37: Counter Terror Business 19

Transport Security Expo is the major global exhibition and conference where security manufacturers, systems integrators and distributors connect in a uniquely focused environment with security buyers and policy makers for aviation, maritime, rail and commercial transportation. Last year’s event was the most impressive Transport Security Expo to date, breaking all previous records with 3,866 total attendees, from 88 countries. Transport Security Expo 2014 at London’s Olympia now ups the ante enormously. With an expected 4,500 visitors and 150 exhibitors the event unveils a major suite of initiatives for this market; a package of information and inspiration that make it the go-to destination this 2-3 December. ADS, the trade organisation representing the UK aerospace, defence, security and space industries is the event’s strategic partner. Bob Rose from ADS said “We are pleased to confirm our partnership with Transport Security Expo 2014. The transport security sector has seen considerable growth, both domestically and internationally and ADS members have been at the forefront of this success. Transport Security Expo provides the perfect opportunity

for the sector to come together and share the latest innovations and expertise and the inclusion this year of Major Events Security will only reinforce the expo as a must-attend for the security industry in the UK.”

MARITIME SECURITYLast year’s Maritime Security Conference was a sell-out success and this year will be bigger and even better. The conference will start by honing in on the Port and all of the issues Port operators, owners and security officers face including a focus on physical security, cyber security, information security, supply chain, business continuity, human factors, sabotage and serious crime. Next on the agenda is the issue of protecting vessels and crew against acts of piracy on the seas and also keeping cargo safe end-to-end

across the entire supply chain.The 2014 programme shows an

impressive line-up of worldwide opinion leaders such as:

Gary Skjoldmose-Porter from the United Nations Office on Drugs

and Crime (UNODC); Commodore Arian Minderhoud from the Allied Maritime Command; and Dimitrios Souxes at INTERPOL.

AVIATION SECURITY CONFERENCEThe two-day conference on aviation security brings over 300 aviation security practitioners together to share and debate latest thinking on keeping our airports, planes, people and freight secure. It attracts authorities, owners/management as well as heads, managers and directors of security from the aviation arena. Topics include the risks and threats to aviation, improving the passenger experience, and the technology supporting innovation. E

SECURE MOVEMENT OF PEOPLE AND

GOODSThrough an extensive programme of workshops, an in-depth

conference, and a world-class exhibition, visitors to Transport Security Expo will immerse

themselves in the challenges transport operators face in

maintaining high levels of security

Transport Security Expo

EVENT PREVIEW

The Secure

Transportation

Conference is new

for 2014 and covers

the everyday secure

transportation of

people, goods and

high-value

assets

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

37 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 38: Counter Terror Business 19

Rapiscan Systems - the Leading Provider of Security Screening Solutions

Security. Performance. Value. When it comes to your security needs, Rapiscan Systems understands the environment in which you operate — and knows how to protect it.

With the broadest range of products for aviation security, border protection, perimeter security and personnel screening, we provide comprehensive, fully-integrated security solutions.

And with over 15 years experience, global expertise and a world class service and support network, we have the proven capability to meet your most demanding requirements – on time and on budget.

To learn more or to schedule a demonstration, contact us at +44 (0) 870-7774301 (EMEA), +1 310-978-1457 (Americas), or +65 6846 3511 (AsiaPac).

[email protected] • www.rapiscansystems.com ONE COMPANY – TOTAL SECURITY

Rapiscan Systems - General Ad A4 AMEND.indd 1 02/09/2014 10:32

Page 39: Counter Terror Business 19

Rapiscan Systems - the Leading Provider of Security Screening Solutions

Security. Performance. Value. When it comes to your security needs, Rapiscan Systems understands the environment in which you operate — and knows how to protect it.

With the broadest range of products for aviation security, border protection, perimeter security and personnel screening, we provide comprehensive, fully-integrated security solutions.

And with over 15 years experience, global expertise and a world class service and support network, we have the proven capability to meet your most demanding requirements – on time and on budget.

To learn more or to schedule a demonstration, contact us at +44 (0) 870-7774301 (EMEA), +1 310-978-1457 (Americas), or +65 6846 3511 (AsiaPac).

[email protected] • www.rapiscansystems.com ONE COMPANY – TOTAL SECURITY

Rapiscan Systems - General Ad A4 AMEND.indd 1 02/09/2014 10:32

The 2014 programme shows an impressive line-up of worldwide opinion leaders such as David Trembaczowski-Ryder from the Airports Council International Europe (ACI EUROPE); Ron Louwerse from Schiphol Group; and Johnnie Müller at Copenhagen International Airport.

RAIL SECURITY CONFERENCEThe attendees to this conference include transport police, government authorities, owners, operators and heads of security, who face an enormous challenge in securing mass transit systems. With millions of passengers in transit, implementing enhanced security whilst not reducing throughput is a critical balance.On top of this the threat posed not only from terrorism but also serious organised crime, cyber, sabotage, cable theft and also the challenge of suicide is a vast task. The Rail Security Conference is the annual gathering place for opinion leaders cross networks and also across the globe to gather and share insight, best practice and practical know-how. Leading speakers to headline this conference include Mark Babington of the PTEG Safety and Security Group;

and Superintendent David Roney, Counter Terrorism Lead at British Transport Police.

SECURE TRANSPORTATION CONFERENCEThe Secure Transportation Conference is new for 2014 and covers the everyday secure transportation of people, goods and high-value assets across the commercial world. It will cover the protection of high value assets, hazardous materials transport, protection and security for high-net-worth individuals, and VIPS, and vulnerability mitigation in secure transportation. The programme is packed full of top-level speakers focusing on key issues, including Phil Wright from Brink’s Global Services and Chairman of the Cash and Valuables in Transit Section, BSI; and William Brown, National Security Adviser at Arts Council England.

MAJOR EVENTS TRANSPORT SECURITY CONFERENCEFollowing 2012’s successful Olympics, London is a global centre of expertise major event security. This

new conference aims to help professionals charged with devising and implementing security plans for major events for transport security find the solutions, ideas and know-how required to deliver robust security strategies. The interlinked and complementary worlds of transport and major events are now reflected at this high-level conference delivering, for the first time, a platform for expertise and shared insight into this globally significant sector. From mega events such as Royal Weddings, the Olympics and World Summits to major music festivals, sporting events and political rallies, somewhere in the world there are teams of specialists planning the investment and management of those events’ security requirements, specifically in transportation. This conference will be relevant for operational, strategic tactical and strategic management

and includes speakers such as:Shuna Mayes, Head of the

Commonwealth Games Safety and Security Unit from the

Scottish Government; and Tim Cutbill from the London Fire Brigade.

TECHNOLOGY WORKSHOPSThe free to attend technology workshops

provide the low-down on the latest equipment,

approaches and capabilities to pre-empt and manage security

risks across aviation, maritime, public transport and secure transportation. Presented by companies with expertise in developing and delivering security products and solutions, the workshops aim to offer insight as well as practical information to help attendees keep up to date with the latest tech on the market, and new releases, that will help ensure our transportation networks, and major events, remain safe & secure. Day one will cover perimeter security; CCTV & video analytics; screening, scanning & detection. Day two will cover surveillance, comms & tracking; secure transportation; and integrated security.

LIVE DEMONSTRATION AREAThe Live Demo Theatre will allow visitors to see real-life incidents unfold on stage and see how expert teams manage a range of scenarios. Be prepared for the mob that tries to spoil the show as they descend on the Live Demo Theatre. Observe the team who manages the situation safely and securely capturing the evidence as they go on body worn cameras beamed to the main screen. Come and see how the experts carry out the critical search of a venue to ensure it is made safe prior to the opening of a major event or in the situation of a suspect package being alerted to security. Ever wondered how our heroic bomb disposal teams inspect and remove potential E

Transport Security Expo

EVENT PREVIEW

The Rail

Security

Conference is the

gathering place for

opinion leaders across

the globe to gather

and share

insight and best

practice

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

39 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 40: Counter Terror Business 19

Tran

spor

t Sec

urity

Exp

o

EVENT PREVIEW

Transport Security Expo 2014 showcases a magnificent line-up of the world’s leading armoured vehicle manufacturers

Recognize AND Analyze

Is she a known suspect?

How often was she here this month?

When, where did she enter?

Is she an authorized employee?

How old is she?

www.cognitec.com • [email protected]

Premier face recognition technology for real-time video screening and anonymous people analytics

Has she been here before with another suspect?

IEDs, including the use of high-tech ROVs (Remote Operated Vehicles)? Take a close up look in The Live Demo Theatre. We all recognise the serious threat and potentially devastating consequences of a cyber-attack, especially concerning a passenger aircraft, train or a ship, but what does a cyber-attack actually look like? A hacker and a laptop will come on to the stage to demonstrate how to bypass the most secure of firewalls.

INNOVATIONS HUBThe introduction of the Innovations Hub reflects the requirement for government, industry and academia to look to the future at what next generation security will look like both in terms of transportation and major Events.The Innovations Hub will showcase tomorrow’s world technologies being developed to address future challenges for security including major events around the world such as Tokyo 2020 Olympics and beyond. The Centre for Applied Science and Technology (CAST) within the Home Office is the government’s lead department for research and development in security and together with industry and academia are inspirational in major innovation. The innovation hub offers visitors a unique

opportunity to see a range of next generation equipment and software in its R&D phase.

SECURITY VEHICLE ZONETransport Security Expo 2014 showcases a magnificent line up of the world’s leading manufacturers for armoured vehicles to protect high net worth people, celebrities, diplomats and cash in transit. With the vehicles live on display, visitors will be able to climb in and compare the best of class from some of the leading manufacturers. The Armoured Vehicle Zone will also feature in the live demonstration programme, so watch out for the critical role they’ll play in protecting President Obama, following an attempted hijack inside the show.

HOSTED BUYER PROGRAMMEThe Hosted Buyer Programme is a very important component of the show. It provides top-level buyers an opportunity to meet with leading exhibitors of their choice through a series of pre-arranged, face-to-face meetings. Qualified buyers will

attend the show as guests. They will receive a number of privileges including a free conference pass, complimentary travel and/or accommodation and many other VIP benefits.Participation is free of charge – subject to our qualifying criteria. If you buy, specify or recommend transport security related products or services, either in the UK or overseas; you could be eligible to attend as a Hosted Buyer.

Buyers are typically individuals that are charged with reviewing the best security solutions within the aviation, maritime, public transport and supply chain markets.

GAIN CPDOnce again the 2014 event promises a truly compelling and comprehensive itinerary of CPD accredited content, making a visit to Transport Security Expo not just a valuable learning experience but also an extremely rewarding contribution to your Continuing Professional Development. L

FURTHER INFORMATIONwww.transec.com

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Issue 1940

Page 41: Counter Terror Business 19
Page 42: Counter Terror Business 19

RC-ARINC_AIM_Airports2014.pdf 1 03/07/2014 15:50

Page 43: Counter Terror Business 19

RC-ARINC_AIM_Airports2014.pdf 1 03/07/2014 15:50

Written by Jam

es Kelly, chief executive of the British Security Industry Association

Surprisingly, prior to 9/11, only ten per cent of passenger luggage checked into US airports was screened for bombs and explosives. Ten years later, we’ve all become accustomed to removing our shoes and limiting the amount of liquid we carry as we pass through airport security. But what of the cargo that often accompanies us on our journeys? Is this, too, subject to the same rigorous security checks?

PASSENGER AND CARGO PLANESIn the UK, around 60 per cent of air freight is carried in passenger planes, with the rest transported on specialist cargo planes. Whilst passenger baggage is subject to inspection by x-ray, only a small amount of air cargo is checked in the same way. In addition, the variation of cargo security rules from country to country can create significant variation in the checks that have been carried out on cargo originating from outside the UK. Airlines themselves are obliged to meet their own government’s regulations, but some airlines go beyond these, including

British Airways, which screens all air cargo travelling on its passenger planes. Courier firm, TNT, also claims to x-ray all packages that pass through its UK depots. Despite this thorough approach, the fast-moving nature of air cargo, as well as its diversity (the majority of air cargo is made up of an eclectic mix of high-value electronics, engineering and machine parts, pharmaceuticals, fruit and vegetables, but can also include scrap metal and cars) means that thorough scanning of every item simply isn’t possible. With that in mind, the security of the airport as a whole must be a primary consideration to avoid compromising the security of the cargo often stored within large airport compounds in preparation for dispatch. British

Security Industry Association (BSIA) members have a growing portfolio of implementing high-security solutions at airports around the

world, including Heathrow, Gatwick and Cork as well as transport

hubs further afield, such as Vancouver and Hong Kong.

AN EYE ON PERSONNELMonitoring the passage of personnel in and around an airport site is a critical element in

ensuring the security of freight and cargo, when

it is stored in compounds awaiting loading. During the

development of Heathrow’s newest Terminal 5, it was immediately recognised

that the site required a proven, fully integrated IP solution that would not only provide 24/7 critical security but would also aid in the efficient flow of 30 million passengers a year. E

A HOLISTIC APPROACH TO AIR CARGO SECURITYWith 26 million tonnes of goods transported by air every year, the security of airborne cargo is of paramount importance against a backdrop of international terrorism. James Kelly, Chief Executive of the British Security Industry Association investigates how the aviation sector is responding to ever-evolving security challenges

Cargo Security

AIR FREIGHT

Whilst

passenger

baggage is subject

to inspection by

x-ray, only a small

amount of air cargo

is checked in the

same way

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

43 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 44: Counter Terror Business 19

Carg

o Se

curit

y

Maple have been providing innovative and practical security solutions for the protection of commercial vehicles and goods in transit for 40 years. Our sophisticated security solutions are designed specifically to combat existing and emerging trends in cargo crime, with a commitment to stay one step ahead of organised, commercial vehicle crime. From high specification pneumatic locking systems to remote access control functionality, with Maple, no one comes close.

Call +44 (0)161 429 1580Visit www.maplefleetservices.co.uk

@MapleSecurity

Commercial Vehicle Security Solutions & Protection of Goods in Transit

Picture the scene; You’ve collected your cargo, signed the manifest and hit the road. After four hours continuous driving you arrive at a truck-stop, only to find the seal is broken on your load area doors and half your cargo is missing…but how could that have happened if you never stopped? This is no hypothetical situation, it’s a scenario playing out with all too common regularity across Europe. What started as seemingly tall tales about cargo mysteriously disappearing during transit is now recognised as a very serious and quickly emerging threat. It’s difficult to pinpoint the exact dates, but it’s thought the first reports originate from Romania in 2008. What is certain however, is that incidents are now on the rise. Despite sounding like a scene straight from the latest Hollywood Blockbuster, attacks, dubbed the ‘Romanian MO’, feature a criminal gang closely following a truck, whilst an individual climbs onto the back and passes cargo back to the pursuing vehicle. Perhaps unsurprisingly, reports suggest that thieves willing to take such high-risks are far from opportunistic. Attacks are invariably centred around lucrative cargo such as

tobacco, pharmaceuticals and electronics. The problem is also spreading – the isolated and sporadic cases dating back to 2008 have now been replaced by more widespread activity; German police in North-Rhine Westphalia have recorded more than 50+ incidents in the 12-month period between March 2012-13. It’s no coincidence that demand in more sophisticated commercial vehicle security systems has risen over the past 2-3 years. Maple has been quick to respond, developing their unique IQ range of products to aid operators in their bid to combat the rising threat of cargo crime. The Maple IQ range of products allows operators to tailor systems around their own requirements. The heavy-duty slamlock ensures

that when doors are closed they’re always locked and sealed, while equipment is installed internally for optimum security. Further reassurance and functionality is provided via the powerful access control platform, enabling operators to remotely lockdown vehicles from anywhere in the world, temporarily preventing access even to authorised persons. In the unlikely event that a would-be-

thief manages to overcome the robust physical security, automatic door open notifications are sent to pre-selected personnel. Criminal gangs are methodical and targeted exploiting any vulnerability in the supply chain they can identify. As this latest threat proves it’s more important than ever that operators protect themselves and their business. Contact Maple to discuss your requirements and review the security of your fleet.

FURTHER INFORMATIONContact Paul Nunn+44 (0)161 429 1580paul.nunn@maplefleetservices.co.ukwww.maplefleetservices.co.uk

Combat the rising threat of cargo crime with Maple’s unique IQ range of vehicle security products

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Issue 1944

Page 45: Counter Terror Business 19

In this example, the BSIA member company’s powerful and fully-integrated system is the industry’s only airport specific access control system and can be customised to meet the unique and ever changing needs of airports over time. The flexibility and high quality offered by the BSIA member was a key factor in its suitability for T5, in particular the facility for integration of the access control system with other security elements, including CCTV.

A HOLISTIC APPROACHA holistic approach to airport security, based on risk profiles and international best practice, is also at the heart of the UK Government’s plans to modernise the regulatory regime for airport security to bring it into line with better regulation principles, promote innovation and efficiency, while ensuring the best possible passenger experience. In 2011, the Government consulted on its proposals to achieve such modernisation through what it terms as an outcome-focused, risk-based approach (OFRB). This approach enables each responsible organisation to develop its own security management system, building on international risk management best practice. Responses to the consultation – published in the Government’s consultation response in 2012 – revealed that aviation industry stakeholders

and interested organisations agreed that the proposed solution was appropriate for aviation security, with respondents particularly welcoming the flexibility it enables for each responsible organisation to develop its own security management system building on international risk management best practice. On publication of the results of this consultation, the Government set out its plan to roll out the security management system approach over the next three to five years, starting with a pilot programme beginning at London City Airport.

PILOT SCHEMESRecognising that the full benefits of OFRB – in particular a high degree of flexibility for

operators in the design of security processes – will require changes to European legislation, the UK Government has recognised the need to use the pilot schemes to build the evidence base necessary to engage with European legislators to make the case for change. In the meantime, with security remaining at the top of the agenda for airport operators and freight companies around the world, the sharing of best practice and continued technological innovation are at the heart of ensuring that this fast-moving, challenging area of the global transport network remains as safe and secure as possible. L

FURTHER INFORMATION www.bsia.co.uk

AIR FREIGHT

Cargo Security

A holistic approach to airport security, based on risk profiles and international best practice, is also at the heart of the UK Government’s plans to modernise the regulatory regime for airport security to bring it into line with better regulation principles, promote innovation and efficiency, while ensuring the best passenger experience

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

45 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 46: Counter Terror Business 19
Page 47: Counter Terror Business 19

For military personnel and emergency responders, every second counts when dealing with chemical/biological attacks or incidents. First responders and military organisations typically are the first to arrive to remediate challenges and ensure public safety at both natural and man-made disasters. These teams never know the kind of situation they will find, from areas with high concentrations of radiation to poisonous gas which is why military services around the world already rely on RAE Systems by Honeywell’s highly sensitive PID, multi-gas and radiation sensors to provide greater confidence in their decision making process when encountering the unknown. RAPIDLY DEPLOYABLE THREAT DETECTIONRAE Systems by Honeywell’s recently introduced ProRAE Guardian Real-time Wireless Safety System allows first responders to set up a rapidly deployable, secure wireless threat detection system that

encompasses a broad range of RAE Systems by Honeywell and approved third-party monitors to detect and track:Toxic Industrial Chemicals (TICs/TIMs); flammable gases and vapours; Chemical Warfare Agents (CWA); radiation; meteorological conditions; GPS-based location information; MultiRAE PRO Multi-Threat Monitor. Response teams are then able to share data over the internet in order to facilitate better assessment, mutual response and potential evacuation. Data collected at a site where nerve gas or toxic industrial chemicals are released can also be accessed securely in real-time by any authorised user located anywhere in the world, such as global experts in incident remediation. COMPLETE SYSTEMRAE Systems by Honeywell’s MultiRAE PRO Wireless Portable Multi-Threat Monitor

for Radiation and Chemical Detection is just one example of the numerous RAE Systems by Honeywell detectors that can seamlessly integrate into the ProRAE Guardian Wireless Safety System.

INDUSTRY FIRSTThe MultiRAE Pro is the industry’s first wireless multi-threat detection tool that combines continuous monitoring capabilities for gamma radiation, volatile organic compounds (VOCs) down to parts-per-billion level, toxic combustible gases and oxygen, with Man Down Alarm functionality in one highly portable instrument. Certified to meet the military performance standard MIL-STD-810F, the MultiRAE Pro can be configured with 30

intelligent sensors (including ppb and ppm PID, NDIR, and exotics such as

ammonia, chlorine, formaldehyde, and phosgene) to fully meet the monitoring needs of applications such as HazMat response, CBRN / TIC / TIM detection, EOD, homeland security and civil defence.

Organisations are looking for systems and solutions to enhance safety in hazardous situations and enable faster response times. RAE Systems by Honeywell’s ProRAE Guardian Real Time Wireless Safety System and wireless detection products answer this demand and fulfil a critical need for real-time data access and the

sharing of life critical information.

ABOUT RAE SYSTEMS BY HONEYWELLRAE Systems by Honeywell is a leading global provider of rapidly deployable, multi-sensor chemical and radiation detection networks for national security and industrial applications. The company delivers the most advanced wireless gas and radiation detection solutions for anytime, anywhere access to toxic and combustible gases, and radiation detection information to increase safety of national defence teams, emergency responders and the public. L

FURTHER INFORMATIONContact: Peter BarrattTel: +44 [0] 1202 [email protected]

ADVERTISEMENT FEATURE

REAL-TIME WIRELESS GAS AND RADIATION DETECTIONMilitary services around the world rely on RAE Systems by Honeywell’s highly sensitive PID, multi-gas and radiation sensors to provide greater confidence in their decision making process when encountering the unknown

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

47 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 48: Counter Terror Business 19

CQC’s Fibrelight Safety Products

Fibrelight Rod Stretcher: The Fibrelight Rod Stretcher is lightweight and can be swiftly deployed from the compact carrying bag.

The Rod Stretcher offers a rigid support for the casualty that can be easily carried between a team. The stretcher is fully adjustable to accom-modate a wide range of sizes and will securely contain a casualty for a vertical or horizontal lift. The Stretcher can be fitted with floats enabling it to be used for water rescues.

The stretchers compact nature enables it to be easily stowed in anemergency vehicle or cabinet and carried to the scene of the emergency.

 

Dimensions: -

• Length - 1.65m • Diameter - 175mm • Weight - 6 kgs

 

Fibrelight Recovery Cradle:The SOLAS approved Fibrelight Cradle is a maritime recovery system that can be operated by a single crewmember. The Cradle can also serve as a boarding ladder, scramble net and stretcher.

The Fibrelight Cradle is lighter, more compact, and more versatile than any comparable devices. The cradle requires only regular inspections and minimal maintenance every three years. The cradle can be easily rolled and stowed.

The Fibrelight Recovery Cradle is primarily designed for use by rescue craft, rigid inflatables and ship lifeboats and marinas, however it can have multiple other uses.

It forms both a robust scramble net as well as a temporary stretcher for immediate casualty evacuation. Fibrelight Cradles are available in lengths of 2, 3, 4 and 5 metres and are 1.3 metres wide. The Cradles are amazingly lightweight, a 3 metre cradle weights as little as 5 kilograms.

Fibrelight StructureAll the Fibrelight products are manufactured using re-enforcing rods of Carbon Fibre that are enclosed within tubular webbing with flanges. When fitted and sewn at right angles between the double thickness pockets of a second webbing an incredibly strong structure is created.

Patent Numbers: -GB - 2451127, Patent Application no:- US 12/669084. Europe - EP2178743

SOLAS APPROVAL CRADLE - SAS S100150/M1

t: +44 (0)1271 345678 e: [email protected] w: www.cqc.co.uk

If you are interested in CQC’s Fibrelight products please either scan this QR code or contact us on the detail below.

Page 49: Counter Terror Business 19

Visitors to this year’s Emergency Services Show will not only be able to see and handle the latest PPE and equipment in the exhibition, but also hear user feedback from police colleagues and CBRN specialists in the new free-to-attend seminars. Taking place at the NEC Birmingham on 24-25 September, the Emergency Services Show will feature two seminar theatres: Innovation & Technology and Interoperability & Collaboration. The Innovation and Technology programme includes sessions of relevance to counter terror professionals and will cover the latest developments in PPE, Body Worn Video (BWV) and mobile communications.

SPEAKERSSpeakers include Inspector Tony Price of Leicestershire Constabulary and Malcolm Peattie, specialist advisor at the Police CBRN Centre. The Interoperability & Collaboration seminars, developed in partnership with the Joint Emergency Services Interoperability Programme (JESIP), will include case studies presented by category 1 and 2 responders and examine the future role of Local Resilience

Forums. The full seminar programmes will be published on the event website. Now in its ninth year, the annual Emergency Services Show is particularly relevant to those involved in helping the UK to combat, respond to and recover from increasingly unpredictable acts of terrorism, from armed attacks through to chemical, biological, radiological and nuclear (CBRN) threats. It comprises an indoor and outdoor exhibition showcasing the latest vehicles, equipment and technology, as well as an Emergency Response Zone featuring over 80 support responders, voluntary sector partners and NGOs. Here is a look at some stands that will be of particular interest to visitors. Over the course of the show, a team of experienced cross-capability officers

representing CBRN(E) including Detection, Identification and Monitoring (DIM), will be available to speak to visitors.

RADIATION PROTECTIONThe military, emergency services and civil defence agencies have unique requirements for radiation protection of personnel and the public. James Fisher Nuclear (JFN) products for these markets cover a wide range of requirements. These vary from personal electronic dosimetry to allow for the monitoring of personnel doses in live time, to portal monitors for both vehicles and persons to enhance the surveillance capabilities at entrances and exits of key facilities, transport hubs or events. The range also covers hand held search and frisk probes which can be used to locate, detect, identify and classify radioactive material.

MASS CASUALTY TRAININGExhibitor, Amputees in Action, is an agency which provides amputee actors and special effects. It took part in London Fire Brigade’s largest and most comprehensive exercises in its history this May: a three-day exercise based

around a plane crash in the capital. It was a unique opportunity for the blue light services to work together effectively to practice the life-saving skills that would be used should a major incident ever occur in the capital. Over 100 volunteers from a university paramedic course and actors from Amputees in Action played the part of ‘casualties’ to provide a realistic mass casualty environment for the emergency service personnel taking part.

SURVEILLANCE EQUIPMENT SUPPLIERSSurveillance equipment suppliers include Edesix, Excelerate Technology, Pinnacle Response and Reveal Media. Body Worn Video (BWV) and other wearable technology remains high on the agenda and visitors will be able to see the latest cameras and discuss E

EVENT PREVIEW

ADVANCED DEFENCE KIT AT EMERGENCY SERVICES SHOWNow in its ninth year, the Emergency Services Show is particularly relevant to those involved in helping the UK to combat, respond to and recover from increasingly unpredictable acts of terrorism, from armed attacks through to chemical, biological, radiological and nuclear threats

Emergency Services Show

The Emergency Planning Society

As well as exhibiting at the Emergency Services Show, the Emergency Planning Society will be co-locating its AGM at the NEC on 24 September and its annual conference (featuring national and international speakers) at the NEC on 25 September.

Over the course of the show, a team of experienced cross-capability officers representing CBRN(E) including Detection, Identification and Monitoring (DIM), will be available

CQC’s Fibrelight Safety Products

Fibrelight Rod Stretcher: The Fibrelight Rod Stretcher is lightweight and can be swiftly deployed from the compact carrying bag.

The Rod Stretcher offers a rigid support for the casualty that can be easily carried between a team. The stretcher is fully adjustable to accom-modate a wide range of sizes and will securely contain a casualty for a vertical or horizontal lift. The Stretcher can be fitted with floats enabling it to be used for water rescues.

The stretchers compact nature enables it to be easily stowed in anemergency vehicle or cabinet and carried to the scene of the emergency.

 

Dimensions: -

• Length - 1.65m • Diameter - 175mm • Weight - 6 kgs

 

Fibrelight Recovery Cradle:The SOLAS approved Fibrelight Cradle is a maritime recovery system that can be operated by a single crewmember. The Cradle can also serve as a boarding ladder, scramble net and stretcher.

The Fibrelight Cradle is lighter, more compact, and more versatile than any comparable devices. The cradle requires only regular inspections and minimal maintenance every three years. The cradle can be easily rolled and stowed.

The Fibrelight Recovery Cradle is primarily designed for use by rescue craft, rigid inflatables and ship lifeboats and marinas, however it can have multiple other uses.

It forms both a robust scramble net as well as a temporary stretcher for immediate casualty evacuation. Fibrelight Cradles are available in lengths of 2, 3, 4 and 5 metres and are 1.3 metres wide. The Cradles are amazingly lightweight, a 3 metre cradle weights as little as 5 kilograms.

Fibrelight StructureAll the Fibrelight products are manufactured using re-enforcing rods of Carbon Fibre that are enclosed within tubular webbing with flanges. When fitted and sewn at right angles between the double thickness pockets of a second webbing an incredibly strong structure is created.

Patent Numbers: -GB - 2451127, Patent Application no:- US 12/669084. Europe - EP2178743

SOLAS APPROVAL CRADLE - SAS S100150/M1

t: +44 (0)1271 345678 e: [email protected] w: www.cqc.co.uk

If you are interested in CQC’s Fibrelight products please either scan this QR code or contact us on the detail below.

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

49 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 50: Counter Terror Business 19

C

M

Y

CM

MY

CY

CMY

K

Page 51: Counter Terror Business 19

experiences with end-users in the exhibition. Pinnacle Response will be showcasing the PR5 Body Worn Video Camera, launched in October last year and recently supplied to Avon and Somerset Constabulary along with Sussex, Northamptonshire and Surrey Police. Meanwhile on the Reveal Media stand visitors will be able to find out more about the London Metropolitan Police Service (MPS) year-long, 500 camera BWV pilot. Despite the MPS initiative being hailed as the biggest pilot in the world, a number

of UK Police forces have already trialled and rolled out hundreds of Reveal’s body worn cameras across their force and now operate with BWV as “business as usual”. In addition, 11 boroughs in the

MPS have been using Reveal’s body cameras for a number of years.

WHAT ELSE IS ON?Other exhibiting organisations of particular interest to counter-terror professionals include: Babcock Critical Services; Bluecher; British Association of Public Safety Communications Officials; Fire Service College; Home Office ESMCP; Institute of Civil Protection & Emergency Management; National Ambulance Resilience Unit (NARU); National Ballistics Intelligence Service; National Chemical

Emergency Centre; Joint Emergency Services Operability Programme (JESIP);

Public Health England; Training 4 Resilience; UK Government Decontamination Services, and the Tactical Training Centre. The NEC is physically linked to Birmingham International Station and Birmingham Airport and is directly accessible from the UK motorway network. Parking

for visitors and exhibitors will remain free of charge. Coaches will

run from Birmingham International Station to the exhibition halls. L

FURTHER INFORMATIONwww.emergencyuk.com

Emergency Services Show

EVENT PREVIEW

The annual Emergency Services Show is particularly relevant to those involved in helping the UK to combat acts of terrorism

Blue lights lift barriers. Who are YOU selling to?

Disposing of ex blue light and security vehicles? Be sure they are properly de-commissioned and only offered to verified motor trade professionals.

Call The Fleet Auction Group now on 01530 833535.

The Fleet Auction Group Ltd, Brindley Road, Stephenson Industrial Estate, Coalville, Leicestershire, LE67 3HG Tel. 01530 833535 Fax. 01530 813425Email: [email protected] www.fleetauctiongroup.com

Don’t let a terrorist’s dream become your worst nightmare

Blue light advert CT 14/10/13 10:14 Page 1

C

M

Y

CM

MY

CY

CMY

K

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

51 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 52: Counter Terror Business 19

The Emergency Services Show - Covering the entire spectrum of the Emergency Services

“If you're looking for the latestbluelight knowledgethis is the Show to attend.”

rmingham | 24-25 September 2014 | www.emergencyuk.com | NEC | Birmingham | 24-25 September 2014 | www.emergencyuk.com | NEC | Birmingham | 24-25 September 2014 | www.emerge

With over 400 key suppliers of kit and services waiting to meet you, along with free seminars, workshops and

demonstrations, The Emergency Services Show is the only event you need to attend this year. Register for FREE visitor

entry at www.emergencyuk.com. See you in September!

Free visitor entry at www.emergencyuk.com

FREE PARKINGfor all visitors thanks to Follow us on twitter

@emergencyukshow #ESS2014

Event Supporters

ESS14generalA4.qxp_Layout 1 05/08/2014 10:38 Page 1

Page 53: Counter Terror Business 19

The Emergency Services Show - Covering the entire spectrum of the Emergency Services

“If you're looking for the latestbluelight knowledgethis is the Show to attend.”

rmingham | 24-25 September 2014 | www.emergencyuk.com | NEC | Birmingham | 24-25 September 2014 | www.emergencyuk.com | NEC | Birmingham | 24-25 September 2014 | www.emerge

With over 400 key suppliers of kit and services waiting to meet you, along with free seminars, workshops and

demonstrations, The Emergency Services Show is the only event you need to attend this year. Register for FREE visitor

entry at www.emergencyuk.com. See you in September!

Free visitor entry at www.emergencyuk.com

FREE PARKINGfor all visitors thanks to Follow us on twitter

@emergencyukshow #ESS2014

Event Supporters

ESS14generalA4.qxp_Layout 1 05/08/2014 10:38 Page 1

While it is possible to purchase consumer-grade equipment and place it in a ruggedised case, do you really want to rely on a compromised solution when life and death could be in the balance? Military and counter terror operations are, quite literally, the front line, where equipment failure is not an option. In such situations, relying on the same hardware that a civilian would use for emails, photos and web browsing could put missions – and lives – at risk. LATEST TECHNOLOGYGetac has total ownership of the design and manufacture of its rugged mobile computing solutions. Its products use the latest technology, materials and manufacturing processes, ensuring every component is fully ruggedised. Getac’s hardware is designed to perform in critical working environments reliably at the highest performance. Placing consumer

hardware in a rugged case may be a seemingly cost-effective alternative, but by definition, that case is designed to be opened – which means it comes with an inherent vulnerability creating a high risk of failure. Getac rugged computers are designed with separate GPS and 3G/4G modems with separate antennas to ensure independent performance in applications requiring both functions simultaneously. Most consumer technology offer a single modem for both functions, resulting in reduced performance under the same conditions. It’s also important to have access to a range of form factors to meet the field challenge – be that a fully rugged server for a Forward Operating Base, or a secure tablet for defence scenarios. MARKET LEADING FEATURESFor a balance of portability and power, the Getac V110 convertible notebook tablet offers an 11.6” high-definition screen, the latest Intel® 4th generation Haswell processing technology and LTE compatibility. Additional market-leading features include

Getac’s new 3D aerial technology (enabling fast download/upload speeds), dedicated SiRFstarIV™ GPS (offering faster positioning and improved accuracy) and dual hot-swap battery (providing 8-10 hours’ operating time). It is one of the world’s thinnest and lightest devices of its type in the world, yet is also MIL-STD-810G and IP65 rated, meaning it incorporates military-grade ruggedisation without compromise on performance. For more demanding applications where server capability is required, the X500-G2 Rugged Mobile Server offers users the ability to deploy a mobile rugged server to the field giving instant server capability at the start of operations. MIL-STD-810G certified and IP65 rated, the X500-G2 offers as standard a large 15.6” QuadraClear® display (800nits) which provides enhanced screen readability under sunlight and graphic capability in outdoor environments. Powered by the Intel® Core™ i7 vPro™ processor with 32GB RAM and 500GB storage, multiple applications can be

run simultaneously without compromising on performance. RAID expansion is possible, holding up to five shock-protected disk drives, offering up to five terabytes of storage. Secure encryption solutions are available from Becrypt and Viasat. PORTABILITYFor those applications where portability is crucial, Getac’s Z710 7” Android rugged tablet, built with Becrypt’s Titan II encryption platform, provides a fully secure system that can support a range of applications that defence markets can use with confidence. Aimed at sectors that require a fully rugged mobile device, the Z710 weighs just 800g, with a battery that gives more than 10 hours of operational time. It is a fully integrated device, which includes a 1D/2D barcode reader and an advanced GPS technology (SiRFstarIV™) accurate to 1.5 metres. The hardware is supported by Becrypt’s secure software Titan, which ensures that all device application and user data is protected with FIPS 140-2 compliant encryption. Administrators also have complete control,

so they can create separate encrypted user accounts or personas, enforce strong authentication, and manage different application and device policies - all of which reduce support and maintenance overheads. The Z710 Titan is currently undergoing trials with Northrop Grumman, indicating the serious potential of the device to revolutionise field operations. L FURTHER INFORMATIONIf you would like to discuss any aspect of your rugged computing requirements, call 01952 207 221, e-mail: [email protected] or visit www.getac.co.uk

Getac rugged computers are designed with separate GPS and 3G/4G modems with separate antennas to ensure independent performance in applications requiring both functions simultaneously

ADVERTISEMENT FEATURE

RUGGED AT EVERY LEVELGetac provides rugged computing solutions for demanding professionals in extreme environments

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

53 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 54: Counter Terror Business 19

when image matters

Professional Unmanned Aerial Vehicle Operators

Surveys Assessments InspectionsCorporate Member

MRL Eye LimitedAlfred House

RopewalkKnottingley

West YorkshireWF11 9AL

United Kingdom +44 (0) 1977 622000

www.mrleye.com

MRL Eye_CTB19 - FP.indd 1 03/09/2014 14:54

Page 55: Counter Terror Business 19

when image matters

Professional Unmanned Aerial Vehicle Operators

Surveys Assessments InspectionsCorporate Member

MRL Eye LimitedAlfred House

RopewalkKnottingley

West YorkshireWF11 9AL

United Kingdom +44 (0) 1977 622000

www.mrleye.com

MRL Eye_CTB19 - FP.indd 1 03/09/2014 14:54

The Commercial UAV Show 2014 will be the largest global gathering of the commercial and civil UAV (unmanned aerial vehicle) universe. With 1,500 attendees, more than 70 exhibitors and over 80 speakers, this free event will provide its audiences with crucial insights into this emerging market and enable them to hear first-hand from both industry and end user organisations who are leading the way in this exciting space. They will come to learn from a range of case studies presented in five theatres about how people in many sectors are saving money and achieving vast increases in productivity and reliability through careful application of UAV systems and technology. They will learn how almost anyone with significant scale or expanse of facilities or infrastructure can benefit from a UAV system. Visitors to the show will benefit from a number of key features. Key speakers at the show include: Cpl. Byron Charbonneau, RCMP forensic collision

reconstructionist, Royal Canadian Mounted Police; Nicolas Pollet, head of UAS Project, SNCF; Barnaby Wiegland, marine specialist, project development directorate, EDF Energy Plc; and Professor Simon Blackmore, head of engineering, Harper Adams University.

ON-FLOOR SEMINARS Those attending the Commercial UAV Show’s Technical seminar will experience two jam-packed days of UAV manufacturer and end user presentations, case studies, displays and audience Q&As. The seminar programme is comprised of 20 minute speaking sessions carefully sculpted to provide attendees with a direct insight into current and future successful commercial UAV operations, the latest UAV technologies,

future plans for regulation and a sneak peak at some of the high quality data captured by a variety of

unmanned platforms. With speaker participation

from a mix of industry innovators and service

providers as well as content from successful UAV end users, visitors

will be able to make new contacts and access pioneering projects that will help benefit your own organisation.

END USER ZONE The end user zone allows attendees not only to meet with UAV manufacturers on the exhibition floor but crucially, to learn about successful cross-sector UAV projects that are happening right now from UAV end users at their individual exhibition booths. Allowing those attendees with ‘exhibition only’ passes to still be able E

EVENT PREVIEW

FLYING THE FLAG FOR THE GLOBAL UAV MARKETThe Commercial UAV Show 2014 on 21-22 October at London’s Olympia represents a unique opportunity for industry leaders to exchange key insights on the unmanned aerial vehicle market

Comm

ercial UAV Show

Case studies will show how people are saving money and achieving vast increases in productivity through the use of UAV systems

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

55 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 56: Counter Terror Business 19
Page 57: Counter Terror Business 19

to learn about current commercial UAV operations and how this emerging technology is helping a multitude of companies to reach their various industry-specific organisational goals. The end user zone will be especially educational for those attendees who are still in the exploration stage of understanding the various cost-benefit and operational efficiencies that UAVs can offer. Current end-user exhibitors include SNCF and BBC World Service.

CHARITY ZONE The Commercial UAV Show 2014 attendees can now meet with attending global charities in the exhibition Charity Zone. Part of The Commercial UAV Show’s message is to help raise awareness and further promote how UAVs are making a positive difference to charity missions across the world. UAVs are being increasingly utilised in environmental, animal welfare and humanitarian missions and the Charity Zone has been created to support the cause of several international Charities who have adopted UAV technology to aid their missions and make a positive impact to the world we live in. Join organisations like Wildlife Air Service, Open relief, Conservationdrones.org and Medair at the Charity Zone to find out more.

KEYNOTE SPEECHThe opening keynote address on commercial UAV application will be taken by Mike Rickett, Deputy Senior Vice-President of Selex ES. This session will analyse the current development of a commercial market for UAVs and critically analyse the future short-term potential for the commercial UAV market. It will give a manufacturer perspective on the promising roles of UAVs in the commercial universe, and compare and contrast commercial end user requirements across different market verticals. Following the keynote, there will be an end user showcase, looking at which market across the industry sectors has the most potential need for UAV use and which markets are currently using commercial UAVs successfully. Speakers include Prof Simon Blackmore, Head of Engineering at Harper Adams University; Thomas Hannen, Senior Innovations Producer at the BBC; and David Edem, Head of Business Technology at Tullow Oil. AFTERNOON SESSIONThe afternoon session looks at the myth of the danger drone: Overcoming misconceptions about UAV use. It will examine how safe certified platforms and pilots are and demonstrate the full range of critical considerations that are addressed when commencing UAV flights. It will also discuss the importance of separating professional UAV use and capabilities from the hobbyist community and finding answers to platform durability across differing contexts and operational tasks. Following the presentation, there will be mini showcases from Jonathan Ledgard, Director at The Swiss Federal Institute of Technology; Dr Peter Enderlein, Senior Marine Science Engineer at the British Antarctic Survey; and Serge Wich, Co-founder of ConservationDrones. L

FURTHER INFORMATIONwww.terrapinn.com/uav

Comm

ercial UAV Show

EVENT PREVIEW

The end user zone allows attendees not only to meet with UAV manufacturers on the exhibition floor but crucially, to learn about successful cross-sector UAV projects that are happening right now from UAV end users at their individual exhibition booths

Ultra high performing, extremely compact UAS LiDAR sensor

NEW RIEGL VUX®-1

www.riegl.com

RIEGL LMS GmbH, Austria | RIEGL USA Inc. | RIEGL Japan Ltd. | RIEGL China Ltd.

ULS

Introducing the World´s first survey-grade UAS laser scanner!

The VUX®-1 is a compact and lightweight laser scanner for unmanned aerial missions.| weight approx. 3.6 kg | accuracy 10 mm | up to 550 kHz PRR | long measurement range | up to 200 scans/sec | 330° field of view | echo digitization & online waveform processing | multipletarget capability | multiple time around processing | parallel scan lines | various IMU integration options | internal data storage 240 GByte | data storage on external USB devices | integrated LAN-TCP/IP inter-face | flexible, easy system installation

RIEGL offers a whole family of proven Airborne Laser Scanner Systems & Engines for every purpose:LMS-Q1560 Dual Channel, High Performance, Fully Integrated Airborne LiDAR Scanning SystemLMS-Q780 & LMS-Q680i High Altitude, High Speed Airborne Scanner EnginesVQ-820-G Topo-Hydrographic Airborne Scanner Engine VQ-480i & VQ-480-U Compact & Lightweight Airborne Scan-ner Engines, for helicopters & UAS

other types on request

Introducing the World´s first survey-grade UAS laser scanner!Introducing the World´s Introducing the World´s Introducing the World´s Introducing the World´s

FOV330°

field of view (FOV) up to 330°

VUX®-1 mounted on UAS, e.g. Flying-Cam 3.0 SARAH

© F

lyin

g-C

am

compact and lightweight

3.6 kg

10 cm0 cm 20 cm 30 cm

October 21-22, 2014London | UKBooth #37

Meet us at

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

57 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 58: Counter Terror Business 19

Manual and Automatic Shop Front Systems Access Systems Commercial Residential

Bi-Folding Door Systems Fire Exits Curtain Walling Louvre Systems Service Contracts Panic Bars fitted

CALL US NOW ON: 01274 876178AMP Access Systems, Unit 5-6, West End Mills, Brick Street, Cleckheaton, BD19 [email protected]

With a team of people made up of experienced design and service people we can offer a complete package when it comes to access systems.

We are happy to discuss any bespoke requirements that you may have. If you think that we can be of service to your business, please call or email us today.

accesssystems

EDM SALES, SERVICE AND SUPPORT

Service Contracts Avai lable Breakdown Service Available Spare Parts Available Cal ibration and Testing Avai lable

CALL US NOW ON: 01274 876178 Advanced Machining Products Limited, Unit 7, West End Mills, Brick Street, Cleckheaton, BD19 5EH www.advancedmachiningproducts.com [email protected]

Here at Advanced Machining Products we have got over 100 years combined experience in the sale, service and support of EDM and wire EDM machines. Most types of machines can be supported including bespoke equipment from aged manufacturers. Specialising in the following machine types:

JSEDM Joemars Mecrode Agie FANUC Wire EDM Vectstar Eroda Transtec Amchem Sparcatron

We also offer the following new machines: Fast Hole EDM Drilling Machines STEM Drilling Machines ECM Machines PECM Machines Laser Drilling Machines Advanced Monitoring Systems with

Profile Logging

With a team of people made up of experienced design and service engineers we can offer a complete package when it comes to EDM and ECM technology. We are happy to discuss any bespoke requirements that you may have. If you think that we can be of service to your business please call or email us today.

EB304N

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR BUSINESS MAGAZINE | Issue 1958

Page 59: Counter Terror Business 19

Written by Richard Barrett CM

G O

BE, associate fellow, Counter Terrorism

, The Royal United Services Institute

ISIS threatens long-term disorder across the Middle East. The UK does not need draconian legislation at home, but strong diplomacy and co-operation with its partners in the region to help them achieve long-term stability.Within the space of a week in August, both Prime Minister David Cameron and Home Secretary Theresa May commented on the threat posed to British national security by the self-styled Islamic State, and in particular by its British members. The home secretary estimated the number of British citizens who had travelled to join ISIS or other terrorist organisations in Iraq and Syria as ‘at least 500’.

PREVENTING RADICALISATIONThe recent beheading of US journalist Jim Foley, apparently by a British male, and the comments of former ISIS hostages that they were guarded by three violent British members of the group, certainly suggest that more should be done to prevent extremist radicalisation in Britain and its possible consequences both here or overseas. But as Raffaello Pantucci pointed out here on 21 August, the direct

threat from ISIS to the United Kingdom is currently more assumed than proven. The prime minister described ISIS as ‘an exceptionally dangerous terrorist movement’ that would ‘target us on the streets of Britain’ as soon as it was strong enough to do so. In similar vein, the home secretary wrote of the ‘very deadly threat we face from terrorism at home and abroad’, and their headline policy prescriptions largely reflected the premise that if ISIS had yet to attack us, it was only a matter of time before it did. Beneath the flurry of interrupted holidays and calls for immediate action, amplified subsequently by London Mayor Boris Johnson’s proposal to upend the presumption of innocence in legal proceedings against anyone travelling to Syria, both the prime minister and the home secretary show a more

measured approach than their dramatic language might suggest. David Cameron rightly points out that in order to deal with ISIS, one needs to understand the true nature of the threat it poses. This is a threat not to the United Kingdom, but rather to the established order – or disorder – in the Middle East.

PENETRATING SOCIETYISIS is an insurgent group that uses terrorist tactics to soften up its targets and intimidate its opponents prior to mounting a more conventional armed assault. Its car bombs and suicide bombers are more effective and easier to aim than long-range artillery fire. These tactics not only spread fear but also suggest that ISIS has secretly penetrated deep into local society. Assassinations achieve

the same effect, as well as removing key opposition figures. These terrorist

tactics are of course exportable, but for now, ISIS deploys them

to conquer territory, not to avenge or stimulate attacks from outside. Its objectives are local and the ‘poisonous ideology’ that worries the prime minister merely cloaks a desire for power.

As the Prime Minister points out, the new

Iraqi government will therefore be the most critical element

in the effort to defeat ISIS, and E

To counter the threat of ISIS, the UK must help regional partners to create a new, legitimate order, says Richard Barrett CMG OBE, Associate Fellow, Counter Terrorism at the The Royal United Services Institute (RUSI)

Counter Terrorism

A LEGITIMATE NEW ORDER TO COMBAT ISIS THREAT

“..These

terrorist tactics

are of course

exportable, but for

now, ISIS deploys

them to conquer

territory..”

COUNTER TERROR STRATEGY

59 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 60: Counter Terror Business 19

Copper & Optic Terminations LtdCopper & Optic Terminations Ltd specialise in sub contract Electronic wiring, cable and fibre optic assembly and test for the military, defence, aerospace, medical, mining and professional electronics industries.

We aim to provide a world class customer service by offering our customers on time deliveries of products to the highest possible quality standards, in-line with our BS EN ISO9001:2008/AS9100 REV C accreditation.

Quality PolicyIt is the Company policy to provide all customers products that are fit for their intended purpose and conform to customer and relevant regulatory requirements. Our policy is to exceed all customers’ expectations for:

QUALITY OF PRODUCTS • CUSTOMER SERVICE • DELIVERY

Management CommitmentTo acheive these goals Copper & Optic shall adhere to these principles:

• Understanding the customer’s requirements in full• Communicate with the customer at all times• Communicate the goals to all Copper & Optic employees• Implementation of a continuous improvement philosophy• Implementation of a quality system that helps the business

Copper & Optic Terminations LtdUnit 1, Stone Road Business Park,

55 stone Road, Stoke on Trent, Staffordshire ST4 6SRt: +44(0)1782 275810 e: [email protected]

www.copperandoptic.com

Services• Cable assemblies and cable harnesses• Copper and fibre optics• Rack, panel or cubicle assembly• Turnkey product management for complex assemblies• PCA and PCB assemblies• ESD Area• Electronic modules• Testing using Dit-mco circuit analyser, Dynalab ATE, ATE Cirris

• Attention to detail• Build standard control• High quality standards • Own developed integrated computer database • Quality customer service • Rapid response

Page 61: Counter Terror Business 19

Counter Terrorism

apart from encouraging it to take action that reduces crucial Sunni tribal support for ISIS, the UK must help persuade other countries in the region, which he lists as Saudi Arabia, Qatar, the UAE, Egypt, Turkey and ‘perhaps’ Iran to take action as well. I would strongly urge him to remove the ‘perhaps’ before Iran, because it is only this group of countries as a whole that can plot a path for the future of the Middle East.

FEEDING OFF LACK OF GOVERNANCEISIS feeds off the growing sectarianism in the region; the widespread mismanagement of government; the lack of governance; the education systems that do nothing to foster tolerance or even a reasoned approach to learning; the primitive understanding of the value and role of women in society; the crimping of freedoms of expression and assembly, and the widespread failure to encourage political debate. It is a region in need of serious change, and if change only comes on the back of the horrors perpetrated by ISIS, at least its actions will have led to something more than mere death and destruction.

The UK may now be a middling power, but it still has some influence in the Middle East. The Prime Minister writes of the tools at his disposal as ‘aid, diplomacy, [and] our military prowess’, and while he might like to tone down the emphasis on military means, which have produced rather mixed results, aid in the form of capacity building and diplomacy are both sorely needed, especially the latter. But one of the reasons that the UK still has influence is the perception that it operates according to a sensible mix of pragmatism and idealism. Its system of government, imperfect as it is in so many ways, takes as given many of the attributes that seem so unattainable for all but the ruling cliques of Middle Eastern states.

UNNECESSARY LEGISLATIONThis is why we will do ourselves no favours, either at home or abroad, if we allow the graphic image of ‘a terrorist state on the shores of the Mediterranean’, to use the prime minister’s words, to take us still further down the road towards harsh and unnecessary legislation aimed at an as yet ill-defined threat. Confiscating passports and stripping

people of their citizenship may be necessary in some cases, as may arresting returnees from Iraq and Syria, but these measures are not going to stop people going or wanting to go. In her article, the Home Secretary makes a robust appeal for ‘the legal powers we need to prevail’ against terrorism, but she also emphasises the effort her department is making to understand and address the reasons why people raised in Britain should want to join groups in Syria and Iraq that make no secret of their brutality and intolerance. This is where the real work lies, and just by making a genuine effort in this direction, the government will do more to counter the appeal of ISIS than any amount of arrests and exclusions. It will also increase the UK’s ability and legitimacy to make suggestions to its overseas partners in the Middle East as to how they might promote longer-term stability in their troubled region. L

FURTHER INFORMATIONwww.rusi.org

In her article, the Home Secretary makes a robust appeal for ‘the legal powers we need to prevail’ against terrorism, but she also emphasises the effort her department is making to understand and address the reasons why people raised in Britain should want to join groups in Syria and Iraq that make no secret of their brutality and intolerance. This is where the real work lies

About the authorRichard Barrett CMG OBE is an Associate Fellow, Counter Terrorism at the The Royal United Services Institute (RUSI) is an independent think tank engaged in cutting edge defence and security research. Founded in 1831 by the Duke of Wellington, RUSI embodies nearly two centuries of forward thinking, free discussion and careful reflection on defence and security matters.

This article was first published on the RUSI website at www.rusi.org

COUNTER TERROR STRATEGY

Copper & Optic Terminations LtdCopper & Optic Terminations Ltd specialise in sub contract Electronic wiring, cable and fibre optic assembly and test for the military, defence, aerospace, medical, mining and professional electronics industries.

We aim to provide a world class customer service by offering our customers on time deliveries of products to the highest possible quality standards, in-line with our BS EN ISO9001:2008/AS9100 REV C accreditation.

Quality PolicyIt is the Company policy to provide all customers products that are fit for their intended purpose and conform to customer and relevant regulatory requirements. Our policy is to exceed all customers’ expectations for:

QUALITY OF PRODUCTS • CUSTOMER SERVICE • DELIVERY

Management CommitmentTo acheive these goals Copper & Optic shall adhere to these principles:

• Understanding the customer’s requirements in full• Communicate with the customer at all times• Communicate the goals to all Copper & Optic employees• Implementation of a continuous improvement philosophy• Implementation of a quality system that helps the business

Copper & Optic Terminations LtdUnit 1, Stone Road Business Park,

55 stone Road, Stoke on Trent, Staffordshire ST4 6SRt: +44(0)1782 275810 e: [email protected]

www.copperandoptic.com

Services• Cable assemblies and cable harnesses• Copper and fibre optics• Rack, panel or cubicle assembly• Turnkey product management for complex assemblies• PCA and PCB assemblies• ESD Area• Electronic modules• Testing using Dit-mco circuit analyser, Dynalab ATE, ATE Cirris

• Attention to detail• Build standard control• High quality standards • Own developed integrated computer database • Quality customer service • Rapid response

61 Issue 19 | COUNTER TERROR BUSINESS MAGAZINE

Page 62: Counter Terror Business 19

Your Global Partner for Servo Technology & Design.

[email protected] www.infranor.com +44(0)208 144 2152

Specialists in Servo Motors, Servo Drives, Systems and Bespoke Engineering.

Infranor (cogging)_DB 7 - FP.indd 1 07/04/2014 11:03

Page 63: Counter Terror Business 19

Defence New

s

DEFENCE SPENDINGNEWS IN BRIEF

Australia to become ‘enhanced’ NATO partnerAustralian foreign minister Julie Bishop says the country will accept a formal invitation to become an enhanced partner in NATO, but will maintain autonomy in deciding the extent and character of involvement in future Nato-led operations. Australia’s relationship with Nato strengthened substantially over the past decade due to participation in the International Security Assistance Force in Afghanistan.

Martitime dispute leads Japan to increase defence spendJapan’s defence ministry has made its biggest ever budget request, amid severe tensions with China over a maritime dispute in the East China Sea. The ministry is seeking 5.05 trillion yen (£29.4bn; $48.7bn) for the year – a 3.5 per cent rise. If approved, it would mark the third year the defence budget had been increased.

SNP’s proposed defence policy criticisedFormer deputy supreme allied commander in Europe General Sir Richard Shirreff has criticised the defence policies in the Scottish government’s White Paper, calling them “amateurish” and “dangerous”. Sir Richard said: “Nothing I have seen or heard persuades me that Scotland’s safety or security would be enhanced one iota if it became a separate country.”

MoD signs £3.5bn armoured vehicle deal with General DynamicsThe Ministry of Defence (MoD) has awarded General Dynamics a contract to deliver 589 SCOUT Specialist Vehicle (SV) platforms to the British Army to provide essential capability to the Armoured Cavalry. The platforms, consisting of six variants, will be delivered to the British Army between 2017 and 2024, alongside the provision of initial in-service support and training, and will serve at the heart of the Armoured Infantry Brigade structure. This contract safeguards or creates up to 1,300 jobs across the programme’s UK supply chain, with 300 of these at General Dynamics UK’s Oakdale site. SCOUT SV represents the future of Armoured Fighting Vehicles (AFV) for the British Army, providing best-in-class protection and survivability, reliability and mobility and all-weather intelligence, surveillance, target acquisition and recognition (ISTAR) capabilities. Its range of variants will allow the British Army to conduct sustained, expeditionary, full-spectrum and network-enabled operations with a reduced logistics footprint.

SCOUT SV can operate in combined-arms and multinational situations across a wide-range of future operating environments. Prime Minister David Cameron said: “I’m delighted that on the eve of the NATO Summit, we can announce the biggest single contract for AFVs for the British Army since the 1980s. These new vehicles are testament to the world class engineering skills in South Wales and across the UK, helping to create the Army’s first fully digitalised armoured vehicles. Not

only will they be crucial in helping to keep Britain safe, they will also underpin nearly 1,300 jobs across the UK and showcase the strength of the UK’s highly skilled defence sector. With the second largest defence budget in NATO, meeting NATO’s two per cent of GDP spending target and investing in new capabilities to deal with the emerging threats we are ensuring Britain’s national security, staying at the forefront of the global race and providing leadership within NATO.” Secretary of State for Defence, the Rt Hon Michael Fallon MP said: “This multi-billion pound contract is fantastic news for our soldiers in providing them with the most technologically advanced and versatile AFVs to overcome future threats. This is the biggest single order placed by the MoD for armoured vehicles for around 30 years and is an important part of the investment we are making to keep Britain safe. It is also excellent news for the supply chain of this state-of-the-art vehicle and will sustain 1,300 engineering jobs across the UK in key defence industries.” Kevin Connell, Vice President General Dynamics UK – Land Systems, said: “We are delighted that the UK MoD has awarded us this important contract. SCOUT SV provides essential capability to the British Army to allow it to dominate the battle space for years to come and it secures thousands of jobs right across the UK for at least the next decade. General Dynamics UK and our partners have worked hard over the last four years to develop a world-leading vehicle, and we will maintain that same work ethic to deliver 589 SCOUT SV platforms to the British Army on-time and on-budget.” SCOUT SV has been developed at General Dynamics UK’s AFV design and engineering centre in Oakdale, South Wales, maintaining the UK’s sovereign expertise in this important capability.

A400M makes maiden flightThe first Airbus A400M new generation airlifter has made its maiden flight. The aircraft is the first of 22 ordered by the UK and will be available for delivery by end September. Edward “Ed” Strongman, who captained the flight, said: “Its combination of true tactical capability with strategic range will be an enormous contributor to future air mobility in the RAF.”

SCOUT SV provides best-in-class protection and survivability, reliability and

mobility and all-weather intelligence, surveillance,

target acquisition and recognition (ISTAR)

capabilities

Your Global Partner for Servo Technology & Design.

[email protected] www.infranor.com +44(0)208 144 2152

Specialists in Servo Motors, Servo Drives, Systems and Bespoke Engineering.

Infranor (cogging)_DB 7 - FP.indd 1 07/04/2014 11:03

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

63 Issue 9 | DEFENCE BUSINESS MAGAZINE

Page 64: Counter Terror Business 19
Page 65: Counter Terror Business 19

Defence Sectretary condemns Russian role as Ukraine calls to be made a member of NATO

UKRAINE CONFLICT

Foreign Secretary Philip Hammond has condemned Russia for its role in the Ukraine crisis, claiming the country had “chosen the role of pariah, rather than partner.” In a September speech Hammond called on the international community to demonstrate a political will to prevent future attacks on Nato member nations and their allies. A recent Washington Post leader criticised the organisation for its failure to act in the region, saying it “still shrinks from scrapping a 17-year-old agreement with Russia not to establish permanent bases in Central and Eastern Europe even though Moscow is flagrantly violating its own European commitments.” While Ukraine is not currently one of the 28 countries in Nato, Hammond spoke of anxieties felt in Eastern members such as Poland and the Baltic states that they could face being the target of Moscow’s expansionist strategies. The Ukrainian government has called to be made a member of the alliance, a move which would require it to move a clause in the constitution which forbids the country from joining any military bloc. Hammond said: “If we lack, or are perceived to lack, the political will to respond – and to do so quickly – the credibility of that

commitment to collective defence will be undermined, and the very fabric of this, most successful of alliances, will unravel.” “So we have to be clear with Russia, in particular, that while we support a political resolution to the situation in Eastern Ukraine, there is a red line around Nato member states themselves that cannot be crossed.” His speech came as the Ministry of Defence announced plans for a military exercise in the city of Lviv in western

Ukraine involving around 30 British troops. An MoD spokesperson said: “A small troop of Light Dragoons are expected to participate in Exercise Rapid Trident, a routine and small-scale international exercise, in Ukraine [this September].” Emphasising that the exercise would be a peaceful one, Julian Brazier, defence minister for Reserves, said: “These exercises are reminding people that these are our allies within Nato.”

RADAR SYSTEMSNAVY plans refresh of navigation radar portfolioThe Ministry of Defence (MoD) has set out plans for the fleet-wide recapitalisation of the navigation radar systems fitted to Royal Navy ships and submarines. The project is intended to replace the current RN and RFA navigation radar inventory. Existing in-service systems comprise the Kelvin Hughes Radar Type 1007 I-band radar, the Northrop Grumman Sperry Marine Radar Type 1008 E/F-band radar, and the Raytheon Radar Type 1047 I-band and Radar Type 1048 E/F-band radars. In a 27 August contract notice, the MoD’s Defence Equipment and Support (DE&S) arm’s Communications and Situational Awareness team said that the scope of the NRP would include primary navigation radars (I-band), secondary navigation radars (E/F-band), and compact I-band radars.

Work is underway at BAE Systems to give aircraft human-like ‘skin’, enabling the detection of injury or damage and the ability to ‘feel’ the world around them. Engineers at BAE’s Advanced Technology Centre are investigating a ‘smart skin’ concept which could be embedded with tens of thousands of micro-sensors. When applied to an aircraft, this will enable it to sense wind speed, temperature, physical strain and movement, far more accurately than current sensor technology allows. The concept will enable aircraft to continually monitor their health, reporting back on potential problems before they become significant. This would reduce

the need for regular check-ups on the ground and parts could be replaced in a timely manner, increasing the efficiency of aircraft maintenance, the availability of the plane and improving safety. tTny sensors or ‘motes’ can be less than 1mm squared. Collectively, the sensors would have their own power source and when paired with the appropriate software, be able to communicate in much the same way that human skin sends signals to the brain.

Aircraft ‘Smart Skin’ concept detects injury

AIRCRAFT TECHNOLOGY

A resource for key stages 1 to 4 has been launched to educate children about the work of the UK armed forces. The new initiative aims to inform and educate both schoolchildren and teachers about the work of the British armed forces. The resource, hosted from its own website, covers students from the ages of 5 to 16 and is designed to be used as part of teaching in English, history and citizenship lessons. The project explores key questions that students might have about the armed forces. These range from why we have the armed forces, their history and their work in the present day, to first-hand accounts of what it is like to work in the Royal Navy, British Army and Royal Air Force.A diverse range of people have contributed to bringing the learning resource to life. Imam Asim Hafiz, Islamic religious advisor to the armed forces, drew

on his experience of ‘building bridges across communities and working to bring peace’ whilst serving in Afghanistan. Historian Dan Snow wrote the introduction to ‘The Armed Forces in our History’ section, focusing on the wars that have ‘shaped our world’. The Minister of State for Defence Personnel, Welfare and Veterans, Anna Soubry, said:“The role our armed forces play in the security of our country is as vital as ever, supported by peacekeeping and humanitarian work carried out right across the world. With the centenary of the start of the First World War this year, the teaching pack offers an excellent opportunity for people to learn more about the breadth of our armed forces past, present and future.”The teaching pack contains interactive links, video and audio.

MoD launches new armed forces learning resource

EDUCATION

Defence New

s

READ MORE: tinyurl.com/lowah2x

READ MORE: tinyurl.com/q73nfam

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

65 Issue 9 | DEFENCE BUSINESS MAGAZINE

Page 66: Counter Terror Business 19
Page 67: Counter Terror Business 19

Eurosatory 2014, the Land and Air-land Defence and Security Exhibition was held in Paris from 16-20 June this summer. The international scale of this event was underlined by the presence of six new countries as exhibitors – Argentina, Colombia, Hong Kong, Iraq, Japan and Panama. This year’s event met the expectations of many professionals and governmental players. Over the course of this year’s show, the exhibition confirmed its well-established

pre-eminence in the areas of homeland security, civil security and company safety, with the presence of many visitors and delegations involved in those sectors. Several interior ministry entities were also

in attendance, as well as a high proportion of exhibitors (over

50 per cent) offering various security solutions.

EXHIBITORSPresenting a wide selection of materials and systems on show, an unrivalled

number of exhibitors and the widest exhibition area, Eurosatory maintains its position as the international leader and appears as the major event for new products and innovations. Year on year, Eurosatory builds on its comprehensive coverage of the Land and Air-Land Defence and Security industries, continuing to position itself as the event of reference within the industry. This year’s Defence and Security exhibitions saw the first unveiling of a number of vehicles (over 250, around two thirds of which were armoured vehicles), armed systems and anti-aircraft warfare systems of all categories, as well as featuring a number of additional product categories.

ROBOTICS AND DRONE TECHNOLOGYAmong more than sixty ground robots exhibited this year, Eurosatory previewed two heavy robotics systems of between eight and 20 tonnes in a demonstration of their operational capabilities. In addition, no fewer than 75 drone systems were featured at the show, from the smallest models weighing only a few grammes to next-generation HALE unmanned aerial vehicles (UAVs). In the area of personal protection equipment, a majority of major manufacturers from around the world were present, exhibiting products like bulletproof and stab-resistant vests, E

EVENT REVIEW

MISSION ACCOMPLISHED AT EUROSATORY 2014June’s Eurosatory event in Paris showcased the newest developments in defence and security, spanning a range of technological and operational solutions. Here are some highlights

Eurosatory

The exhibition

confirmed its

preeminence in

the areas of

homeland security,

civil security and

company

safety

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

67 Issue 9 | DEFENCE BUSINESS MAGAZINE

Page 68: Counter Terror Business 19

More Than Just A Monitor

Ultrasound, video laryngoscope & new algorithmsare the first of many new capabilities to be introduced*

TM TM

Tempus Pro:• Has the longest

battery life (over 10 3/4 hoursmonitoring allparameters)**;

• Is the most compact;• Is the most durable

& rugged vital signsmonitor available.

Easy & intuitive data collection & sharing; soon to incorporate user configurable summary record of care

& the newly adopted joint TCCC card*

The Only Field – Upgradable Transport MonitorThat You Can Change as Needs & Technologies Evolve

Call us now for more information:Tel: +44 (0) 1256 362400

or e-mail: [email protected] A 0214 Tempus Pro and More Than Just a Monitor are trademarks of Remote Diagnostic Technologies Ltd © Remote Diagnostic Technologies Ltd 2014.* Pending FDA & CE Mark ** Default display brightness, ECG, SpO2, ETCO2, IP x 2, temp x 2 and NIBP every 15 minutes. Subject to conditions of storage and use, times are approximate.

www.rdtltd.com

Tempus_Pro_Feb_2014_Advert_2_Layout 1 19/02/2014 08:19 Page 1

Page 69: Counter Terror Business 19

More Than Just A Monitor

Ultrasound, video laryngoscope & new algorithmsare the first of many new capabilities to be introduced*

TM TM

Tempus Pro:• Has the longest

battery life (over 10 3/4 hoursmonitoring allparameters)**;

• Is the most compact;• Is the most durable

& rugged vital signsmonitor available.

Easy & intuitive data collection & sharing; soon to incorporate user configurable summary record of care

& the newly adopted joint TCCC card*

The Only Field – Upgradable Transport MonitorThat You Can Change as Needs & Technologies Evolve

Call us now for more information:Tel: +44 (0) 1256 362400

or e-mail: [email protected] A 0214 Tempus Pro and More Than Just a Monitor are trademarks of Remote Diagnostic Technologies Ltd © Remote Diagnostic Technologies Ltd 2014.* Pending FDA & CE Mark ** Default display brightness, ECG, SpO2, ETCO2, IP x 2, temp x 2 and NIBP every 15 minutes. Subject to conditions of storage and use, times are approximate.

www.rdtltd.com

Tempus_Pro_Feb_2014_Advert_2_Layout 1 19/02/2014 08:19 Page 1

CBRND (Chemical, biological, radiological and nuclear defense) equipment and an exhaustive range of innovative solutions suitable for use in extreme situations.

AERONAUTIC SURVEILLANCEThe domain of ground surveillance by all types of aircraft (drones, aerostats, helicopters) is growing in importance to match satellite surveillance. A huge number of new industrial solutions revealed at the show represents a growing trend. Eurosatory has become the point of reference for the optics industry, showing everything from complete systems to constituent materials and highly developed new technologies suitable for all budgets. Satellite and terrestrial communications systems featured heavily at the event, with a large choice for technology deployable in military and civilian situations. The show provided a comprehensive array of logistics equipment suitable for deployment, with polyvalent solutions for civilian and military installations (tents, shelters, food preparation, sanitation and energy). These products are applicable in a number of services, for example transport and security. What’s more, Eurosatory has become the leading exhibition for energy products that are sustainable, renewable and durable, increasingly important in the world of alternative fuel vehicles. This year the show offered the greatest variety in terms of equipment that can be used in crowd control while bringing down the risk of fatality. With more than 450 new products revealed, in 2014 Eurosatory proved once more that its unrivalled reputation for showcasing the greatest offering in Land/Air defence and security is well deserved. L

FURTHER INFORMATIONwww.eurosatory.com

EurosatoryEVENT REVIEW

Eurosatory 2014 in numbers

1,507 exhibitors from 59 countries

70 per cent international exhibitors

4 International organizations: NATO, NAMFI, NAMSA, EUMS

175, 964m² of indoor and outdoor exhibiting space

55,786 professional visitors from 143 countries

172 official delegations from 87 countries

176 Eurosatory Guests from 36 countries

707 journalists from the 5 continents

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

69 Issue 9 | DEFENCE BUSINESS MAGAZINE

Page 70: Counter Terror Business 19

Adve

rtise

rs In

dex

ADVERTISERS INDEXThe publishers accept no responsibility for errors or omissions in this free service

Advanced Machining Products 58Arinc 42Atkins 34, 35Blokn Mesh UK 19Broden Media 49, 51Clarion Events 16CMO 28Cognitec Systems 40Copper and Optic Termination 60CQC 48Cross Match Technologies 6DMS Protective Equipment 10Fleet Auction Group 51Frontier Pitts 45Garnett Keeler Public 53Guava International 41Hesco Bastion IBCHolmatro – Special Tactics 8Honeywell Analytics 46Imago Techmedia 23Infranor 20, 31, 62

Intelligence-Sec 26IQPC International 4Maple 44MRL Eye 54Phoenix Datacom 22Rapiscan Systems 38Remote Diagnostic 68Reveal Media 12Riegl Laser 57Scanna Msc 14South Midland 66Tata Steel OBCThe Mercian Labels Group IFCThermacore Europe 64Trizo Electonics Assembly 70Vector Command 50Vocal 24Voip.co.uk 32Vulcan UAV 56Zaun 36

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

DEFENCE BUSINESS MAGAZINE | Issue 970

Page 71: Counter Terror Business 19

Asset LabelsPlastic & Metal Security SealsC-TPAT Metal Bolt Security Seals

Tamper Evident Bags

Page 72: Counter Terror Business 19

Tata Steel Projects’ Security & Defence Team specialises in Hostile Vehicle Mitigation (HVM) measures.

Our HVM range is extensively tested against the PAS 68 standard and includes both Temporary/ Redeployable Systems and Permanent Systems, both of which offer a high degree of protection against deliberate collision, blast, ballistics and forced attack.

Ideal for major events or changing sites Temporary/ Redeployable HVM Systems are surface mounted and so can be deployed rapidly without the need for surface preparation. The products include:• Walling suitable for large perimeters that can be easily combined with anti-

mob fencing, CCTV • Surface Mounted Bollard systems which provide protection against vehicle

incursion but also allow a high degree of pedestrian permeability• Pedestrian Portals which can direct pedestrians to gaps in impermeable

barriers where screening can be set-up• Vehicular Gate systems of varying configurations tested up to 16m clear width

Our permanent HVM Systems include:• Various bollard systems• Low Walling systems which offer blast, ballistic and HVM protection and can

blend in the urban streetscape• High Walling Systems which have been tested against extreme collision,

mechanical attack and large blast threats

For more information contact:T: +44 (0) 1904 454600 E: [email protected]

PARTNERSHIPS BUILT UPON RELIABILITY AND INNOVATION


Recommended