Border Security Matters May 2014

torchmktg

Border Security Matters, the newsletter of BORDERPOL, The World Border Organization

Border Security

Matters Vol:

May 2014

Welcome

Thomas Tass, Executive Director,

BORDERPOL

At BORDERPOL we are always

monitoring events that impact

on the border security and

traveler/migration management

community. Some of these

are highlighted via our social

media channel at Twitter. Our

members are remarkably well

tuned into the geopolitical and

economic environment which

evolves at speeds which change

sometimes on a daily basis.

Since the last issue of BSM we

have major crisis in West Africa, Ukraine, North Korea and Brazil.

None of which are related directly to each other but all of which

have an impact on the border security community.

Our mission is to make borders that not only protect the global

community but also one that connects that same community in

a safe and effective manner, all the while ensuring that people,

goods and services are not “inappropriately” processed by the

various national and regional “systems”.

The aforementioned paragraph has great relevance to

member readers who join us at our workshops, or attend

our annual Congress meetings because they are involved in

border management programs from government frontline

law enforcement to industry developers involved in high tech

creativity. As we prepare for second half of 2014 BORDERPOL like

no other border organization is working to bring solutions to old

and new challenges.

The key topics for discussion in the coming months will include

these questions:

What is the impact of the economic recovery on border security?

Contents

Agency News 2 - 7

BORDERPOL Workshop May 2014 8 - 9

World BORDERPOL Congress 2014 10 - 13

Securing Africa’s Borders: learning lessons 14 - 15

from London 2012

Port Security: The Front Line 16 - 17

Industry News 18 - 22

News and updates form the Secretariat 23 - 24

Is terrorism morphing into something different and is it

identifiable?

Ukraine?

Should the EU continue to export its IBM program?

These are heady times for the world’s border organizations.

BORDERPOL recognizes this and continues to meet the

challenges via our motto “we extend our fame through our

deeds”.

SAVE THE DATES

3rd World BORDERPOL Congress

9th-11th December 2014

Budapest, Hungary

www.world-borderpol-congress.com

Is there such a thing as data and privacy protection at the

border?

What are the “special” relationships between countries when it

comes to trusted traveler programs?

What is the next high tech solution that will help manage

migration and refugee flows?

Where does South America fit into the global border paradigm?

Border Security Matters

www.borderpol.org page 1


BORDERPOL Workshop:

20-21 May 2014, Budapest, Hungary

BORDERPOL held its latest workshop in Budapest on 20-21

May on “The International Organised Crime Global Threat, and

Challenges facing Border Security Management”.

opportunity to benefit from general membership and being

part of the border management community.

Individual Entry Level Membership at just $35 (CAN) includes:

- BORDERPOL membership certificate

- BORDERPOL pin/badge

- BORDERPOL membership card

- Border Security Matters - quarterly newsletter of BORDERPOL

This entry level General Membership provides basic

membership benefits, plus the opportunity to ‘pay-as-you-go’

for additional BORDERPOL services, such as training courses

and workshop/conference delegate access at membership

rates.

For further details at to download the Membership Application

Form visit www.borderpol.org

Hosted by the Chief Commissioner of the Hungarian police,

in association with the Vice President of the National Public

Service University in Budapest, the Workshop was chaired by

Col. Geza Horvath, Director of International Law Enforcement

Center.

The objectives of the conference were to examine current

trends in the modus operandi of international criminals; to

consider how information and intelligence can shared across

different types of border (eg Schengen, EU and External

Borders) to interdict international criminals; to examine

how the mitigation of international crime might practically

be implemented by border agencies; and to examine the

technology and systems available to government agencies to

counter the threat of international organised crime.

Further details of the Workshop can be found on page XX.

BORDERPOL Launch ‘General

Membership’ category

As part of BORDERPOL’s strategy to remain open to all

areas of the border management community, and encourage

the development of younger operation level personnel,

BORDERPOL has announced a new entry level General

Membership.

Designed to appeal to border management/security

professionals who have a desire to develop their knowledge

and skills, and to share experiences with like-minded border

management community around the world, to enhance future

career opportunities, the General Membership offers key basic

benefits at low affordability, especially for the emerging markets

of Africa, Asia and the Middle East.

BORDERPOL offers the individual border police/agent the

International Border Security Forum

Border Security Threats from the

Mediterranean Region

June 2-4, 2014, Malta

The International Border Security Forum series founded

by the German Marshall Fund of the United States in 2011,

has since worked to address security issues through a

variety of workshops, study tours, briefings and research

projects allowing participants to build a strong network

through which best practice standards can be developed.

The forum has established itself as an event that provides

a neutral, open platform for dialogue between regional

and transatlantic border security officials and experts. By

focusing on the most vital border security dangers, the

forum creates a common non-partisan space for a debate,

which is especially important due to the political complexity

of some of the regions. It brings people with different

perspectives and backgrounds together in order to work

jointly on solutions that can improve the situation of border

security.

As the International Border Security Forum further

develops, it is important to expand the understanding of

border security by addressing timely topics and arising

threats. One region where a number of ongoing and

potential threats to border security currently exist is the

Mediterranean Basin. In an area where the Middle East,

North Africa, and Southern Europe collide, the mixture

of cultures, religions, political systems, and ideals pose

possible opportunities for disagreement.

The International Border Security Forum is an objective

institution that has the potential to provide council and

inspire the change. The Mediterranean workshop, in the

framework of the forum, will gather in one room decision

makers as well as military and security experts for a

creative and open discussion where the main regional

border security threats will be identified and assessed. The

adequate precaution measures and combat tactics, both in

terms of armament and technology will also be proposed.

Border Security Matters

www.borderpol.org page 2


Canada Hosts Meeting on Immigration

and Border Management

A meeting on immigration and border management in

Quebec city has been hosted by Canadian Citizenship and

Immigration Minister Chris Alexander and Minister of Public

Safety and Emergency Preparedness Stephen Blaney.

In the meeting, leaders from Canada, the US, the UK,

Australia, and New Zealand have discussed collective

immigration and border management issues.

“We are working with our international partners to ensure

that our borders remain open gateways to freedom and

prosperity, but closed barriers to criminals, terrorists and

other threats,” said Minister Blaney.

All the attendees shared their experience and expertise on a

range of topics and explored the possibility of collaborating

on immigration and security issues in the meeting. The

meeting included the following initiatives:

• Encouraging participating countries to use fingerprints

and digital photographs to screen immigration applicants;

• Improving strategic information sharing to help countries

facilitate genuine travellers; and

• Enhancing the security and efficiency of border services

Source: http://www.migrationexpert.com

India’s Prime Minister Narendra Modi

pledges strengthening of border

management

Prime Minister Modi is planning some important border

visits. BJP sources said a strong internal security regime is

one of Modi’s poll-time pledges and strengthening border

management is an integral part of it.

Modi is also giving enough indication of his priorities.

“There has been a growing spate of LAC violations by

Pakistan army which actively pushes in terrorists through

the border in Kashmir. Modi has been critical of the weak

response of the previous government and his visit will be to

impress on field commanders that they need not fear being

tough,” the BJP leader said.

Both army and BSF commanders have been previously

hamstrung by instructions from the top to avoid any kind

of escalation.

“But our government will authorise field commanders to

take appropriate counter-measures or else the morale of

the troops suffer,” the BJP leader said.

“We don’t want to start a war but we want to impress on

the Pakistan military that their aggression will come at a

high cost. The higher headquarters can always control an

escalation but unless the field units hit back, the enemy will

always be encouraged to create mischief.”

On the border with China, Modi will try to familiarise

himself with the terrain and how effective the new Border

Defence Cooperation Agreement (BDCA) with China has

been in checking LAC violations.

“Modi seeks very good relations with China but the border

is a problem and he wants to address rather than avoid the

issue,” the BJP leader said.

He said Modi and his core team does not consider the

border with Bangladesh as a ‘live’ (China) or a ‘hostile’

(Pakistan) border but one where the border forces of the

two nations are largely on friendly terms, especially after

the regime change in Dhaka six years ago.

His message to border forces guarding Bangladesh would

be to dialogue and seek more cooperation from the

neighbouring country to prevent illegal migration, human

trafficking, smuggling and movement of terrorists.

“We know the Hasina government is more than willing to

cooperate on all these issues as these are common threats

and problems we share. The situation on the border with

Bangladesh is one of lax border management and not one

of hostility. Modi wants to change that but through mutual

cooperation,” said the BJP leader.

He said Modi would also seek to push the state

governments to be more alert on border management and

coordination between state police and BSF will be a priority.

Source: http://bdnews24.com

Director General Discusses Migration

Governance in China

“The planned visit will boost the morale of our forces and

also send a signal that India will be tough in dealing with

violations of Line of Actual Control,” said a senior BJP leader

close to Modi.

By restricting his visit to the border with Pakistan and China,

IOM’s Director General, Ambassador William Lacy Swing

meets with President XI Jinping of P.R. China during the

Fourth Summit of Heads of State of the Conference on

Interaction and Confidence Building Measures in Asia

(CICA), held in Shanghai, on 21st May 2014. © IOM @2014

ZOOM

Border Security Matters

www.borderpol.org page 3


IOM Director General William Lacy Swing, on a visit to

the People’s Republic of China, has called for increased

efforts to combat people smuggling and trafficking, and for

strengthening of border management efforts.

Standard, which aims to facilitate professional, effective and

customer-friendly immigration service and management.

At the launch in Beijing of the Chinese version of IOM’s

latest World Migration Report, attended by senior

government officials, embassies and media, Ambassador

Swing heard how China is seeking to work more closely

with other countries to deal with challenges posed by

changing migration patterns, including an overall increase

in the number of migrants.

He noted that IOM has been helping Chinese ministries

by providing expertise and cutting-edge technology for

migration management.

Ambassador Swing is continuing his meetings this week in

Beijing with the Ministry of Foreign Affairs, where he plans

to further expand the bilateral relationship with China and

broaden areas of cooperation.

Source: http://www.iom.int

Addressing the fourth Conference on Interaction and

Confidence Building Measures in Asia (CICA) in Shanghai,

Ambassador Swing noted CICA’s efforts to ensure peace

and security and its work towards the elimination of

irregular migration in a country where internal migration is

equal to the number of international migrants worldwide.

“Only by recognizing migrants’ rights and thinking about

their well-being can migration be used for a country’s

development,” said Swing.

Chinese President Xi Jinping, one of several presidents

attending the conference, welcomed IOM’s statement and

expressed his appreciation of IOM’s efforts in managing

international migration.

During his visit to China, Director General Swing also

gave the keynote speech at the International Forum of

Immigration Inspection, hosted by the Ministry of Public

Security in Shenzhen.

The meeting was attended by senior officials from over 30

countries and international organizations with the objective

of strengthening international cooperation on migration

management.

The forum adopted a common Immigration Inspection

Viet Nam Acts against People

Smuggling

A two-day national workshop on counter-smuggling

policy is taking place in Hanoi this week, organized by

the Vietnamese Ministry of Public Security – Immigration

(MPSI), in cooperation with IOM.

Funded by the Government of Canada, the workshop aims

to enhance the capacity of Vietnamese government officials

to formulate and implement effective counter-smuggling

policies within the context of mixed migration flows.

Participants at the workshop are discussing efforts to

develop effective policies to prevent and combat people

smuggling. International anti-smuggling experts from

IOM, the UN Office on Drugs and Crime and the Regional

Support Office of the Bali Process are working with 50

migration and law enforcement officials from MPSI and

the Border Guards, looking at relevant international and

regional strategies to counter human smuggling within the

broader context of migration management.

“This workshop is an important step towards addressing

people smuggling more effectively,” says IOM Viet Nam

Have you joined BORDERPOL yet?

• Political clout and civic leadership

• Professional development and training

• Make connections

• Industry information and resources

• Professional consultancy and advice

We Extend Our Fame by Our Deeds

Membership Enquiries:

secretariat@borderpol.org

www.borderpol.org


Chief of Mission Florian Forster. “Viet Nam has undertaken

great efforts to fight human trafficking over the last

decade, but addressing people smuggling has become an

additional challenge.”

The national workshop is part of a regional effort to

enhance capacity and cooperation in Southeast Asia to

prevent and combat people smuggling.

People smuggling has seen a steep rise over recent

decades and today accounts for a significant portion

of irregular migration around the world. Unlike human

trafficking, it does not necessarily involve exploitation,

coercion or violation of human rights; yet it often

exposes migrants to vulnerable situations and the risk of

subsequent exploitation.

In recent years Viet Nam has seen worrying signs of

irregular migration flows: cases were reported where

criminal networks have used Viet Nam as a destination,

source, and transit country for people smuggling, with final

destinations as far away as North America, Europe and

Australia.

“Successful anti-smuggling work requires a balanced

approach: between the protection of migrants and

developing the regulatory and procedural framework to

detect, investigate and prosecute those perpetrating the

crime of human smuggling,” says Forster.

Source: http://www.iom.int/

The European Center For Information

Policy and Security ECIPS stress its

concerns about raising tension in

Ukraine Borders

The European Center For Information Policy and Security’s

Ukraine Security Assessment Report 2014 “ Which are the

actors in the actual Ukrainian scenario according to the

Putin political moves ? “ ECIPS stressed the future risk and

bring emphases on the Russian “Hidden” agenda. The plan

B of Putin as set out in the report indicates that indeed,

many delegations could be misled to missing the point and

the legal strategy followed by Putin to gain control over

Ukraine.

The design of new

ethnic and territorial

annexation to Russia has

been prepared for many

years, eased by the last

Ukrainian Presidencies,

openly sympathetic to

Moscow. The same armed

forces, the special units

of the Ukrainian SBU were trained by the FSB the former

KGB that has all the tactical information to control the city’s

infrastructure, such as maps of the government buildings,

those easily conquered by pro-Russians armed groups.

Put the squeeze on without squeezing in.

Baron ® G58 ISR. Intelligence. Surveillance. Reconnaissance. Defense and law enforcement agencies around the world are able to rely on

the Beechcraft Baron G58 ISR. The aircraft is capable of six-hour missions. Equally important, it has a large cabin, air conditioning and high

dispatch reliability. Fitted with a state-of-the-art surveillance camera, recording and data link systems, and police/military communications,

the Baron G58 ISR provides the surveillance/intelligence you need for court evidence, or to prosecute the target.

U.S. and the Americas +1.316.676.0800 | EMEA +44(0) 1244.893.851 | Asia-Pacifi c +65.6423.0321 | Beechcraft.com

©2014 Beechcraft Corporation. All rights reserved. Beechcraft and King Air are the registered trademarks of Beechcraft Corporation.


Intelligence indicates that the presence of both intelligence

and counter agencies are heavily felt on the ground

collecting RTI (Real Time Information)at the same time. It is

estimated that as much as 300 or more CI operators from

different agencies could be on the ground at the moment

as a pre-9th May 2014 precaution or derogative means

playing the Cold War game all over again

The President of the ECIPS, Ricardo Baretzky strained that

what he called the “ Putin Syndrome” will have far reaching

implications to both, the European economical and security

risk to the EU in the future. One of the Important issues are

the Borders in Ukraine that are used to bring visitors from

Russia to assist local pro - Russian protest. ECIPS said that is

shows a lack of Ukrainian border control since most of the

fighters assisting pro - Russian are veterans from external

sources such as paid veterans that fought Afghan.

The report lays out the origin of the present Pro- Russian

groups and the organized warfare associated with external

veterans. Baretzky said that, the EU is undermining the

strategy put in place and this could send a long term

massage that the legal framework put in place allows for

land to be stolen by using the laws of the International legal

framework.

To undermine the Putin’s project there are nationalists,

sustained by the former Ukrainians rebels who fought

the war in Chechnya against the Russians and part of the

Red Army veterans who fought in Afghanistan, is vastly

underestimated. To these, some pro-Yanukovych groups

must be added, mercenaries paid by the former president

, coming from the ranks of former military personnel sent

to Afghanistan, too, and never really part of the Ukrainian

society and therefore at the mercy of whoever pays them

the most and who can guarantee a future for their families.

They are people between 40 and 60 years old, well trained (

as demonstrated by the numerous video and photographic

evidence available on the net ) and with a great des

ire for redemption. They do not respond to Putin but to

Yanukovych: rely on the former president, now “ guarded

guest “ of Russia, because native of those regions. Thehistory

of Yanukovych deserves a separate mention: he is a criminal

with two convictions for armed robbery suddenly canceled in

conjunction with his political rise,corresponding to a possible

“ affiliation “ to the Soviet before and then Russian security

apparatus. He is not sympathetic to Putin, but at the moment

he is the classic lesser evil. Putin, however , holds another

wildcard to treat, in the event of failure of the military option,

with the EU and NATO: the request for presidential elections

invalidation in Ukraine. In recent days, in fact, we have

witnessed the withdrawal of all the presidential candidates

from the South East of Ukraine. If things go badly for Russian

interests, Putin could ask for the invalidation of the election

because there are no pro-Russian candidate at the election.

The report also indicated Putin holds another wildcard to

treat , in the event of failure of the military option , with the

EU and NATO and that would result more than likely to the

request for presidential elections invalidation in Ukraine

based on the lack of a Pro - Russian candidate. According

to AGC this could have far reaching implications and spark

things even more.

Border Security Matters

The report cites the use of the “Human Shields” where

women and children, who live in nearby regions and cities

that are paid the equivalent of 40 Euros per person to stand

between the Ukrainian tanks and the pro-Russian militias.

A copy of the free report is available on http://ecips.

eu/0605014TSD.pdf.

CYBERPOL warns of new potential cyber

threats to border security

CYBERPOL, the International Cyber-Security Organization

(ICSO) managed by the ECIPS announced that there is

an urgent need for cross-border data exchange after the

Malaysian 370 incident. It said that borders are not adequate

shielded from hackers that are exploiting the using of

international space during transits to conduct cyber-hacking.

Most airports have Wi-Fi installed and today almost all

international airports provide free Wi-Fi connection to all

transit passengers. What is most alarming is that according

to a research no data transfer

monitoring at any airport and

at the same time, there is no

package filtering or collection

of data done, making it the

perfect place for international

sabotage or crime syndicates.

Highflyers can literally stay

on the run without any trace

whilst this vulnerability is

being exploited.

CYBERPOL CIB UNIT (Criminal investigation Unit) has

propped an independent investigation into the risk and

have said that Airport security globally has to be steppedup

and that that airliners are not free of this potential

threat. CYBERPOL specializes in researching and identifying

of International Cyber Crimes (ICC), cyber-threats and

global trends in the contemporary cyber world brining

law enforcement together and working towards a global

platform for the establishment of a legal framework.

CYBERPOL recently issued an alert that cyber attack virus

such as the Snake Virus from Russia could become very

problematic and posed a huge cyber threat to both national

security and defense. It seems that this alerts falls on deaf

ears since on the 13 of May 2014, the Belgian foreign affairs

office came under the snake virus attack. ECIPS issued a

warning last year that cyber crime and cyber attacks is on the

rise and again repeated its concerns at the African Counter

Terrorism summit held in London in February this year. It

is estimated that as much as 97% of all computers will be

under some kind of cyber attack during 2014. There is great

concerns of the companies who develop internet security

solutions but never seems the crack it. Are they perhaps the

problem to the perpetuating issue by developing a drug with

a short lifetime and thus we get the cold over and over?

Cyberpol said that the lack of a proper cyber crime database

makes it the perfect breeding solution for cyber criminals.

The need for cross-border data sharing and integration

www.borderpol.org page 6


within the EU has never been more important than now.

Some experts believe that it only a matter of time before

critical infrastructures around the EU are effected and

damaged by means of a cyber-attack. The European Union

faces many challenges and for some institutions it might

already be too late to resolve their cyber-security risks due

to several critical problems such as lack of financing and

the decline of state revenues in the EU.

CYBERPOL confirmed that 87% of all computer were

hacked during 2013 and border parole is not excused

from these threats. It also said that more than 70% of the

Hacking reported globally were untraceable. That raises

the questions that if VPN’s (virtual private networks) were

used, it would be impossible for any airport to have seen

any data transferred when their WIFI might have been used.

was flight 370 perhaps hacked in a similar way ?

Japan gives US1 million in support

to support a Ugandan border

management project

The project is to last 9 months and will be implemented

by the Ministry of Internal Affairs and the International

Organization for Migration (IOM)

Japanese Ambassador to Uganda Junzo Fujita underscored

the need to improve border management in Uganda

and the region. “Since the world has become borderless,

a threat to one means a threat to all. In other worlds,

vulnerable borders in Uganda can even affect Japan,” he

said.

Ugandan Minister of State James Baba noted: “Although

Uganda is a peaceful and stable country, there are many

border challenges that we have to solve. With an improved

border management through a coordinated multi-agency

approach we will come up with solutions.”

East Africa is a volatile region, facing numerous challenges

from political, military and economic instability. This has

placed great strain on Uganda’s border management,

exposing its borders to irregular movements, transnational

crime and the movement of terrorists.

Uganda is a landlocked country and its national borders

are particularly difficult to manage. It shares an estimated

2,698km border with South Sudan, Kenya, Tanzania,

Rwanda and the Democratic Republic of Congo (DRC.)

Cross border challenges include trafficking in persons and

smuggling of precious materials, which often fuel conflicts.

Uganda has more than forty border crossing points and

few of them have the equipment to electronically register

a machine-readable passport. The country also needs basic

travel document verification equipment, staff training,

communication systems and transport to conduct a greater

number of border patrols.

4th-5th March 2015

The Hague, Netherlands

www.personnel-protection.com

For exhibting and sponsorship queries

please contact:

Tony Kingham

Exhibit Sales Director

T: +44 (0) 208 144 5934

M: +44 (0)7827 297465

E: tony.kingham@worldsecurity-index.com

For conference queries contact:

Neil Walker

T: +44 (0) 7725 318601

E: neilw@torchmarketing.co.uk

SAVE THE DATES

If you travel abroad for your work, or if you are responsible for your team that travels

or works abroad, are you aware of the legal implications surrounding duty of care for

travelling personnel?

Understand the increasing threats faced by international travellers on duty/employed

by companies operating abroad, and what you can do to prepare for the possibilities at

Personnel Protection & Safety Europe.

Media Partners:

Supporting Organisations:

Owned & Organised by:


BORDERPOL’s May Workshop in Budapest

Report by by Zagon Csaba

As part of the our central aim of facilitating cross function and cross border cooperation

Col. Zoltán Szabó, director of BORDERPOL European Secretariat Office

organised workshop in Budapest, Hungary, on 20-21 May, 2014 arranged a with a

general theme of “The International Organised Crime Global Threat, and Challenges

facing Border Security Management”.

The aim behind the workshop were to

examine current trends in the modus

operandi of international cross border

crime, to consider how exchange of

information and intelligence may affect

the law enforcement cooperation,

to examine how the mitigation of

international crime might practically

be implemented by border agencies,

as well as to follow technology and

systems developments available to

government agencies to counter the

threat of international organised crime.

It involved all sectors of border

community with professionals from

immigration services, the border police

and enforcement, customs, multiagency

means for international law

enforcement cooperation,

police and home affairs

attachés, intergovernmental

agencies, NGOs, independent

consultants, academic

researchers, and university

lecturers. Attendees were

also drawn from a wide range

of nationalities including

Canada, the United Kingdom,

France and several countries

from the region of Eastern

and Central Europe such as

Hungary, Romania, Slovakia

and Turkey. Delegates from

key international organisations

concerning the topic, such as

the Interpol, the Europol, OSCE, SELEC,

DCAF, IOM, and ICMPD were also

attended.

Following the opening speech of Col.

Zoltán Szabó and Mr Thomas Tass,

executive director of BORDERPOL,

Brig. Gen. dr. Gábor Kovács, vicepresident

of the National University

of Public Service welcomed workshop

participants on behalf of the host

institute. The workshop, moderated

by police Col. Géza Horváth, director

of the International Law Enforcement

Cooperation Centre, dealt with a wide

range of subjects and concerns so

here are just a few of the views and

comments of some of the participants.

The keynote speech, titled “Organised

Prof. Péter Tálas, director of the Institute of Strategic and Defence

Studies of the Public Service University,

Crime as a Global Challenge” was

held by the director of the Institute of

Strategic and Defence Studies of the

Public Service University, Prof. Péter

Tálas. He pointed out the relations

between security studies and organised

crime according to the modern concept

of security. In his analysis, both the

global and the European effects of

the phenomenon were illustrated by

figures, which supported a complex

threat assessment of the security policy

expert. He raised the attention to the

effects of globalisation, development of

communication tools, the acceleration

of mass traffic and transport systems,

the integration and the technological

developments -- all of these changes

increased the vulnerability of the

societies and made even more difficult

to comply with the challenges of

organised crime.

Dr. Szandra Windt, senior researcher of

the National Institute of Criminology

analysed the characteristics of crossborder

crimes in Hungary. She drafted

a landscape with especial focus of

illegal migration and trafficking in

human beings. She concluded that the

level of trafficking or/and smuggling

can be reduced by working on the

variables, and the actions taken should

be harmonised, global and agreed on

by several countries cooperating to

achieve a common goal. Every weak

link in the network would be used an

opportunity by the criminals.

Lt. Col. József Nahalkó, head

of International Department of

the Counterterrorism Centre

of Hungary discussed certain

aspects that lead to hostage

situations abroad. He provided

insight view in the difficulties

his law enforcement agency

is facing in those countries

where such serious insults with

Hungarian citizens were taken

place in the recent years.

Mr Didier Clergeot, operations

coordinator of the Interpol

demonstrated the respective

priorities of the International

Police Organisation, and their

Border Security Matters

www.borderpol.org page 8


efforts with the integrated border management task force.

They already collected rich experiences in law enforcement

officer training in the border security sector. He also

emphasised the additional values that Interpol’s criminal

databases can provide for the front line officers through

specialised IT solutions.

Mr Christian Painsipp, analyst at O1 InfoHub of the Europol

described the

EU institute’s

key role in

coordination

and support

of the joint

efforts of

the member

states against

organised

crime and

terrorism.

He reviewed

Europol’s area

of mandate

and the most

successful

services and

solutions they can provide to the beneficiary agencies.

Lt.Col. Gábor Liczkai, Hungarian police liaison officer

delegated to the Southeast European Law Enforcement

Center (SELEC) presented on the successful law enforcement

cooperation in the region. The coordinative means of SELEC,

its criminal sector specific task forces and the international

operations together lead to the results that prove the

capabilities of the organisation. SELEC has developed a

strategic analyst capacity that also supports the fight against

cross border crime.

Jon Trumble, customs and border advisor of OSCE

discussed the

organisation’s

experiences

f r o m

Central Asia

concerning

the difficulties

in border

demarcation,

the serious

consequences

of corruption

and the

economic loss

occurred by

inadequate

b o r d e r

management.

Ms Veronika Goncharova from ICMPD briefed on their

experiences on border security building projects.

Col. Mircea-Marius Negrut, Romanian police attaché

presented on the Romanian police response to the

challenges of organised crime, and analysed the recent

trends and particularities. He mentioned that in many

aspects, the trends in the organised crime sectors are

very similar in Romania and in Hungary, and in the region

in general, that was in line with the presentations on the

drug and migration related situation held by Messers Máté

Hárshegyi and Gábor Balog, experts from the Hungarian

National Bureau of Investigation. Mr Miklós Gáspár, lecturer

of the National University of Public Service informed on the

recent developments in law enforcement officer training in

criminal intelligence and analysis and how it would serve the

increasing needs for experts.

Mr Orhan Cerci, 2nd degree chief superintendent of the

Turkish National Police analysed the Syrian crisis from

the migration point of view. He demonstrated certain law

enforcement aspects of the circulation of foreign fighters

in the region and the measures Turkish authorities have

implemented respectively. Messers Robert Hommen

and Laurens Schreuders from the Royal Netherlands

Marechaussee that is a law enforcement arm of the military

services in the country, analysed the situation in trafficking

and exploitation of human beings and the relevant crime

sector. They pointed out the relevance of profiling and

highlighted certain risk indicators that would help in the

identification of the victims.

Lt.Col. Ágnes Németh, head of crime prevention of the

Hungarian Police raised the attention to the crime prevention

and victim protection of the topic. She reported several

successful results in the cooperation with their foreign

partners, but also indicated the strong needs for further

efforts. An independent expert, dr. Katalin Szomor drafted

a picture in her presentation on the NGOs operating in the

migrant and victim protection sector.

Sponsors presentations closed the event where Beechcraft

illustrated the huge developments in airborne technologies

may be used for law enforcement and especially border

security purposes. Representative of Fercom Systems

Ltd. and Konasoft Ltd. provided a cross-cutting picture of

their company’s equipment developments to assist border

patrolling and enforcement.

Border Security Matters

www.borderpol.org page 9


3 rd World BORDERPOL Congress

9 th -11 th December 2014

Kempinksi Corvinus Hotel, Budapest, Hungary

www.world-borderpol-congress.com

for the border management and security industry

Following the resounding success of the 2nd World

BORDERPOL Congress in London, which brought together

the world’s senior policy makers, practitioners and players,

the 3rd World BORDERPOL Congress is delighted to be

moving to Budapest, Hungary, to continue to develop

and enhance international co-operation and collaboration

amongst the border management and security industry.

The 3rd World BORDERPOL Congress will provide a

platform for the world’s border protection forces and

agencies to discuss and debate the current and future

issues and challenges facing the border management,

security and migration management sectors.

Controlling and managing international borders in the

21st Century continues to challenge the border control

and immigration agencies around the world. It is generally

agreed that in a globalised world borders should be as

open as possible, but threats continue to remain in ever

evolving circumstances and situations.

Advancements in technology are assisting in the battle to

maintain safe and secure international travel. The border

security professional still remains the front line against

these threats.

The World BORDERPOL Congress is the only multijurisdictional

transnational platform where the border

protection, management and security industry policymakers

and practitioners convene annually to discuss

the international challenges faced in protecting not only

one’s own country’s borders, but those of neighbours and

friends.

A high level conference delivering discussions and

debate on policies, implementation and technology that

contributes towards successful border management and

security.

Neil Walker, Director Programs & Events

BORDERPOL

Email: neil.walker@borderpol.org

Register online at

www.world-borderpol-congress.com

Greater closed workshops for agency discussions

As part of the evolving developments at the World

BORDERPOL Congress, this years World BORDERPOL

Congress will see greater ‘agency only’ workshops for

closed discussions and development of actions points,

throughout the two day congress.

Ensure you attend the 3rd World BORDERPOL Congress on

9th-11th December in Budapest, Hungary and participate

in this great industry gathering, for the opportunity to

develop unique working collaborations for a better way of

working and international cooperation of border agencies.

You will be able to come away with enhanced knowledge

and understanding, new working relationships with

international colleagues and an action plan for future

border protection and collaboration.

Further information is detailed later in this newsletter and

to pre-register your interest please contact Neil Walker,

Director Programs & Events, at neil.walker@borderpol.org.

Border Security Matters

www.borderpol.org page 10


Topics of Discussion

Migration Movement Challenges from Human

Trafficking to Illegal Migration - A global overview

Although there are no precise figures, it is estimated there

are over 20 million illegal migrants worldwide. A further

20 million people are believed to be enslaved in human

trafficking today. According to the U.S. Department of

Health and Human Services, “After drug dealing, trafficking

of humans is tied with arms dealing as the second-largest

criminal industry in the world.”

There is not a country on earth that is not affected by

migration movement challenges, whether as a transition

point or final destination. It requires a global solution.

Border Surveillance Techniques and Systems

Border surveillance is one of the biggest challenges

facing our border security agencies. Many land borders,

with no physical barriers, provide easy access routes for

criminal activities and illegal border crossings, whilst many

coastlines are relatively unprotected outside major ports.

What are the latest border surveillance techniques and

systems available from UAVs to ground based systems?

What are the legalities behind the use and collection/

sharing of information and how can systems be integrated

into existing operations to ensure interoperability and

enhanced border protection? How can open architecture

systems be successfully integrated with legacy systems?

Crime across borders, crime at the border

Cross border criminal activities remains the mainstay of

activities for border agencies, whether it is from human

trafficking or illegal trade/narcotics. Criminal gangs move

to increasingly brash and innovative techniques to establish

new systems/channels to facilitate their cross border

criminal activities, including cyber attacks on the movement

of personal data of travellers. What are the latest challenges

facing border agencies, from the front line and beyond to

the unexpected internal facilitators?

Adopting to the changing environment: what border

security administrations must do to remain effective

Managed migration/traveler movements constantly are

buffeted by economic, social and even environmental

changes. Auto responses to itinerant movements due

to war or natural disasters are in the “tool kits” of

governments. States can invoke the support of national

and international agencies to establish temporary legal

and physical accommodations for displaced persons as a

consequence of war, international crisis or natural disasters.

These are usually of short to medium duration and follow

a well-worn legal and operational paths. However, are

border administrations really prepared to adapt to strategic

changes in their operational environment? Regionalization

of sovereign jurisdictions, globalization of trade and

commerce, changing migration patterns as well as new

technologies available to make borders “smarter” are

challenges rarely debated and discussed.

Setting International Standards in IBM

Good ethics, best practice, education and standardisation

of practices and procedures ensures any agency delivers

greater and more efficient results in enhanced integrated

border management. If there was closer consistency

between agency operations in the standards, policies and

procedures, this would facilitate inter-agency cooperation

and sharing of relevant information to enhance upstream

detection.

With many agencies implementing IBM, how do we set

common practices and standards to assist in cross-agency

cooperation for enhancing collaboration and information

sharing? Who should set the standard and what are

minimum standards for effective border management?

Improving and facilitating the legitimate movement of

people and goods: what technologies and standards are

missing?

Security versus Facilitation - Crossing the border now

takes longer and is more complex than it was 50 years

ago. Is technology actually making border procedures

more efficient or just making the process more expensive

Border Security Matters

www.borderpol.org page 11


In the e-age of documents what is the life expectancy

of the passport booklet?

Is the paper passport capable of providing the necessary

security features and safety mechanisms for detection

and identification of fraudulent use and criminal activity?

Should technology be embraced to assist with traveler

identity management and is it possible to set a target date

to the end the reign of paper passports?

Closed Agency Only Workshops

Travel and other document fraud: who are behind

today’s activities and how do we share information in

existence to identify and monitor?”

for everyone? Since very few actual terrorists have been

interdicted by national border control organizations at the

borders where to go forward with border security/traveler

screening? What are the latest technologies and future

technological developments that can enhance clearance

and mobility, from the fast moving business traveller or the

legitimate refugee to legitimate goods and traffic?

Should exit controls be reintroduced universally,

regardless of the cost? Is one exit control anothers

entry control?

With today’s ease of on-line booking and check-in, which

can be accomplished by anyone in any country, passports

rarely get checked or seen until the passenger boards the

plane/vessel. Although baggage security checks may be

conducted on exit, many current exit control procedures do

not verify the legitimacy of the traveller with the passport

document. Are we absolutely certain that all travellers

through the gates are who they say they are? Should exit

controls be universally introduced, regardless of the cost,

to mitigate traveller fraud identity? ICAO mandated Face

as the biometric to be included in all eTravel Documents,

verified using the PKI Registry, so that every state would be

able to read it and detect fraudulent use of the document.

What are the pros and cons of other means open to border

authorities - API, iAPI, PNR analysis, Interpol i24/7 data etc -

and how does the concept of global interoperability extend

to data acquisition and analysis?

Who are the organisations behind the fraudulent use of

travel and other documents. Systems are not foolproofand

can be circumvented due to gaps in the workflow that can

be exploited. How can agencies better share and access

existing information for enhancing travel security?

Trends in trafficking drugs, people, counterfeit goods

What are the latest and developing trends in cross border

criminal activities, that substantially damage and harm

a country’s/region’s security. How can intelligence and

information be shared to enhance upstream collaboration

in the fight against organised criminal activities.

Inter-Agency Co-operation and Information Sharing -

Why the return to information silo’s and how to tackle

systemic non-cooperation practices”

After the revelations of allies spying on allies, the WikiLeaks

scandals of 2013 it can be reliably assumed that varying

degrees of intergovernmental and interagency trust has

been eroded. With this in mind Is it possible to get early

warnings of emerging events around the world? Should a

body like BORDERPOL provide forecasts of future societal

and economic events that impact on the border security

community? With so much information already available

how to separate the wheat from the chaff? The need to

repair this is necessary if likeminded bodies are to work

together in the future.

Register online at www.world-borderpol-congress.com

Border Security Matters

www.borderpol.org page 9


Closed Agency Only Pre-Registration

In order to attend the Closed Agency Only Workshops

you must represent your federal government and preregistration

is a requirements.

To pre-register your interest please contact Neil Walker,

Director Programs & Events, at neil.walker@borderpol.org.

2014 World BORDERPOL Congress

Registration Now Open

You can now register your place at the 3rd World

BORDERPOL Congress directly at the event website

www.world-borderpol-congress.com, alternately request

a registration form from BORDERPOL Director Programs &

Events, Neil Walker at neil.walker@borderpol.org.

Ensure your presence at the 3rd World BORDERPOL

Congress - Save the Dates – 9th – 11th December 2014,

Budapest, Hungary.

Special Delegate Offer for Border

Agencies

BORDERPOL aim to me the attendance to the World

BORDERPOL Congress as simple and cost effective

as possible for border agencies, forces and related

government agencies.

To learn more about the Agencies Special Delegate Offer

please contact the BORDERPOL Events Director, Neil Walker

at neil.walker@borderpol.org.

Why Attend the World BORDERPOL

Congress

Your attendance to the World BORDERPOL Congress will

ensure you are up-to-date on the lastest issues, policies

and challenges facing the world’s border management,

protection and security forces.

Sharing your experiences, ideas and issues with your

international colleagues will enable you to collaborate,

co-operate and work together to create a more harmonsed

network

You will also gain an insight in to what the future holds

for the management of migration and refugee movement,

as well as systems and technologies employed in fighting

illegal border activities, including drug and people

traffikking.

• High level Congress with leading industry speakers and

professionals

• Learn from experiences and challenges from the world’s

border agencies

• Gain insight into national, regional and global policy and

border agency developments

• Constructive debate, educational opportunities and

cooperation advocacy

• Share ideas and facilitate in valuable inter-agency

cooperation

• Exhibition showcasing leading technologies and products

• Networking events and opportunities

Border Security Matters

www.borderpol.org page 13


Securing Africa’s Borders: learning lessons from London 2012

Here, John Baker, Head of Global Operations for the National Security and Resilience Consortium and

Michael Fuller MBE, Director at SCC Global Ltd, examine the current border threats across Sub-Saharan

Africa and consider how the UK’s Olympic legacy may hold the key to a significant part of the solution.

Sub-Saharan Africa is, geographically,

the area of the continent of Africa

that lies south of the Sahara Desert.

Politically, it consists of all African

countries that are fully or partially

located south of the Sahara (excluding

Sudan). It contrasts with North Africa,

which is considered a part of the Arab

world. Somalia, Djibouti, Comoros and

Mauritania are geographically part of

Sub-Saharan Africa, but also part of the

Arab world.

The Sahel is the transitional zone

between the Sahara and the tropical

savanna (the Sudan region) and forestsavanna

mosaic to the south.

The ongoing international operation

regarding the kidnap of over two

hundred girls from their school in

Nigeria by Boko Haram and recent

attacks in Kenya and Cameroon

highlight to the world the porous

nature of borders across this region

and the urgent need to utilise tried

and tested operational and strategic

planning expertise honed over decades

to mitigate the threats arising from this

as far as is possible.

Nigeria shares 773km of border stretch

with Benin, 87km with Chad and then an

entire stretch of 1049km with Niger and

1690km with Cameroon. The Nigeria

Immigration Service (NIS) announced

there are over 1480 illegal routes into

Nigeria through these porous borders.

This level of border insecurity recently

cost the Comptroller-General of the

NIS her job, and Interior Minister

Abba Moro has acknowledged the

seriousness of the crisis. Unfortunately,

not much has been done about it;

and certainly, whatever is being done

is not being done nearly fast enough

or with sufficient tenacity given the

implications for the wider battle with

terrorism.

The Olympic legacy – lessons learned

The 2012 London Olympics were

fashioned in the face of a harsh and

real terrorist threat. In the previous

decade both 9/11 and 7/7 indicated to

the world that there were now no limits

to what the terrorist was prepared

to do. It reconfigured the thinking

underpinning planning against threat

and focused the minds of the United

Kingdom and its security professionals

as the world prepared to descend upon

the capital.

The years of designing and making

ready the National Olympic Coordination

Centre (NOCC) as a national

decision support architecture was a

challenging process. However, the four

key learning points from that task are

as applicable today to the mitigation

of the Sub-Saharan border threats as

they were to the planning of the 2012

Games.

The first learning point concerns the

cultural hurdles that must be overcome

if integrated and interoperable multiagency

crisis planning and response

is to be designed and implemented

effectively.

In the UK we have extraordinarily

capable emergency services and

supporting agencies. The evidence

from 2012 suggests that the roles

of each of those organisations are

not as well understood by all as they

could be. A collective understanding

of the strategic value and necessity

of the NOCC, and the value it would

add to operational commanders, was

developed early during its design. From

the security partners’ perspective, there

had to be a mutual benefit to being in

the NOCC as a partner agency – a kind

of symbiotic relationship. Being able

Border Security Matters

to articulate these benefits through

progressively assured stakeholder

engagement led to the collaborative

identification of user requirements

and secured buy-in from a very wide

stakeholder community.

The second learning point is ‘robust

simplicity’. The project was courted

by industry offering complex (and

costly) IT architectures and decisionsupport

solutions. The robust and

detailed requirements-capture process

demonstrated that this was not

necessary and that existing securityaccredited

IT systems and broadband

connectivity, allowing agencies to reach

back to their parent organisations,

offered an entirely apposite level of ICT

infrastructure. However, and of critical

importance, the business continuity

planning and Service Level Agreements

that support IT and power systems

must match the required levels of 24/7

ICT capability.

The third learning point brings us to

procedural and structural design. A

100-day operation cannot be sustained

without robust processes and structures

in place. Designing the NOCC with a

current operations team and a future

plans team, coupled with the associated

standard operating procedures for their

operation and information-handling,

was paramount. This somewhat

militaristic approach took time to

adapt to, but provided a clear division

www.borderpol.org page 14


of responsibility across the NOCC’s

leadership team, supporting national

contingency planning and helping to

create a nationally consistent look and

feel to safety and security operations.

The fourth and final key learning

point deals with the training and

readiness regime required. With more

than 400 people to train, a plethora

of organisations to inform and a

Games-wide exercising schedule to

support, the NOCC training strategy

commenced 20 months before the

start of the Torch Relay. NOCC liaison

staff training began a year in advance,

comprising a progressive approach to

designing the roles, developing the

individual, developing the team and

operating collectively with Games

delivery partners as a unified national

security co-ordination capability. So,

training, testing and readiness were

designed, undertaken and delivered

in a wholly integrated manner, with

interoperability at the very core.

• Working with border communities

and traditional rulers to create a

broad-based coalition against border

insecurity. This may also include

increasing awareness of cross-border

security threats within the community,

community development programmes

and even improving the extent of

rural electrification, which would also

increase the efficacy of night-time

patrols.

• Increasing oversight of security forces

posted to the border.

• Improving the effectiveness of crossborder

partnerships established to

tackle common problems by ensuring

strong, consistent and sincere

cooperation at the political level.

Land border security is fundamental to

achieving key national security goals.

However, the borders themselves

are not the problem as they are an

important means of facilitating trade

investment and cultural and familial

exchanges.

The London 2012 Olympic legacy

offers Sub-Saharan Africa the a

readily deployable opportunity for

practical, relevant and state-of-the-art

knowledge and technology transfer on

any issue relating to national security

needs and border and internal threats.

Dr William Tasong, President,

Africa Border Security and Business

Development at the National Security

& Resilience Consortium (NS&RC), said:

“With regard to Sub-Saharan border

security, given the stakes involved,

any initiatives implemented across

Africa to improve border security must

generate a proportionate return on the

investment made in training, equipment

and planning. The Olympic legacy team

proved that utilising existing capability

saved money and made sense.

“The task of securing entire border

lengths is so immense that there have

to be difficult decisions made on how

to divide tasks, concentrate resources

and which issues to prioritise.

“However, applying the principle

of knowledge transfer through the

experiences of those involved in

such detailed Olympic planning must

make sense and be financially viable.

Along with upgrading border security

plans, there needs to be a means of

monitoring success, based on clearly

defined metrics.”

Summary

In general, improved border security

will involve analysing the task in detail:

• Improving the training of border

officials and equipping them with

the tools required to tackle modern

security challenges.

Join the world leader in providing information on defence

and security contract opportunities in the UK, Europe and Globally

Access opportunities in:

Homeland

Security

Visit: www.dcicontracts.com or Call: 0845 270 7092




Aerospace

What’s included in your DCI Subscription:

The largest defence and security related

tenders and awards database in Europe

Bespoke Live Alert service

Dedicated Research Team monitoring over

2000 sources globally

Humanitarian Aid

Aviation

(including

airports)

ANNUAL SUBSCRIPTIONS FROM ONLY £235





Dedicated Customer Account Manager

support

24/7 personalised search

Flag and save contracts

UK MOD

Counter

Terrorism

Emergency

Services

Latest defence and security procurement

intelligence

Border Security Matters

www.borderpol.org page 15


Port Security: The Front Line

Once upon a time commercial ports only had to deal with three key threats on a daily basis - theft,

damage to goods and stowaways all of which have the potential to cause considerable financial damage

to stakeholders but were identifiable and manageable. The contemporary port is subject to a far

wider range of threats including the possibility of terrorist attack and has to respond accordingly while

managing and responding to a plethora of local, national and international legislative requirements.

The diversity of responses, systems and processes to tackle each separate threat combined with the

demands of compliancy has made the job of the Port Facility Security Officer (PFSO) onerous to the

point of breaking.

Security expert and former Chairman of the Security Development Board Rotterdam Port, Henk

van Unnik, explains how a lack of cohesion has resulted in the current scenario and that a solution

to the problem has been developed through the Security UPgrade for PORTs (SUPPORT) research

& development project which is part-funded by the European Commision’s FP7 Security Research

Programme. He explains how the appropriate management of resources can be co-ordinated and

deployed to improve efficiency, effectiveness and port security.

relaxation of border security between

mainland-European countries in 1995,

there are still major variations between

different facilities. Some of this can be

attributed to experience, some is driven

by national or regional culture but some

is due to the way legislation has been

applied.

With 90% of EU’s external trade and

40% of internal trade transported by

ship, the contemporary sea port is a vital

cog in the massive machine that is 21st

Century commerce. Unsurprisingly, port

infrastructure and the 3.5 billion tonnes

of freight that flows through EU facilities

are vital to maintaining both global

and individual countries’ economic

wellbeing.

The potential threats to port security

come on many different levels from a

range of groups and individuals with

very different aims and objectives. Theft,

fraud, corruption, drugs trafficking

and people trafficking are all major

issues for port security, especially when

their motivation can be traced back to

organised crime or terrorist groups.

The combination of sophisticated

organised crime, the heightened risk of

terrorist activity and the ongoing threat

of low level crime ensures that ports

are under threat 24 hours per day, 365

days per year. Well organised criminal

gangs now have access to enough

money, knowledge and skills to develop

considerably more complex modus

operandi. Where in the past, criminal

organisations would use bribery or

extortion to secure access, information

or control of a particular shipment,

recently there has been a move to bypass

the human element and hijack the

technology. Recent events at a Northern

European port have demonstrated

how easily a fully automated logistics

chain can be manipulated if security is

breached. Rather than having to run

the risk of ‘stealing’ a container and

getting through port security, or leaving

a trail of names or addresses that can

be followed up by law-enforcement

agencies later, cybercrime ensures that

all the key physical checks appear 100%

legitimate at the dock gate, but can be

wiped clean electronically, removing all

trace. Faced with such innovative and

complex criminal activity, port security

needs to raise its game.

While the baseline level of port security

has certainly improved since the

The legislation that defines port

security is the International Maritime

Organisation’s (IMO) International Ship

and Port facility Security code (ISPS)

which, in turn, is part of the Safety of Life

at Sea (SOLAS) regulations. Developed

in the aftermath of the September 11th

terrorist attacks, the ISPS regulates

security on-board ships, as well as

inside ports and terminals which receive

seagoing vessels on international

voyages. The ethos of the ISPS code

is very preventive and includes a

requirement for both vulnerability

and threat assessments to be carried

out. Risks and vulnerabilities are very

different when considering a container,

bulk or passenger terminal and so

all assessments must be specific and

bespoke. The ISPS code also specifies

a basic security framework including

monitoring and controlling access,

monitoring the activities of people and

cargo, the preparation of specific ship

and Port Facility Security Plans and the

appointment of Ship Security Officers

and a Port Facility Security Officer

(PFSO).

Across the European Union (EU), the

ISPS code is supported by European

Commission Directive 725. While

identical to the ISPS code in content

and a mandatory piece of pan-European

legislation, Directive 725 only requires

member states to achieve a particular

Border Security Matters

www.borderpol.org page 16


esult without dictating the means of

achieving that outcome. Consequently,

the ISPS code was implemented by

21 EU countries, each in a different

way without any homogenisation of

approach or standardisation. Although

the European Maritime Safety Agency

(EMSA), FRONTEX and EUROPOL all

touch upon port security, they have no

executive powers and there is currently

no Europe-wide framework. Without a

Pan-European Federal Agency like the

U.S. Department of Homeland Security,

the European Union has no power to

compel member states to work together

or to follow prescriptive guidelines and

individual ports work in isolation with

commercially-driven secrecy, thwarting

the sharing of intelligence or bestpractice.

Although responsibility rests with a

variety of ministries or other government

agencies across Europe, the burden

of compliance and implementation of

the ISPS code has been passed down

to the individual terminal operators.

This produces an interesting paradox

as commercial companies whose

aim is to make a profit to serve their

board or shareholders are being made

responsible for an activity that does not

necessarily deliver any business benefit.

Not surprisingly, enhanced security

beyond that required to protect day to

day business operations are often not

high on Terminal Operator’s agendas,

especially when national authorities do

not have the power to force them to

invest in such security measures. Despite

the best efforts of regularity authorities,

port security too often promises much

and delivers little.

Because of the very nature of a port

facility with huge volumes of vehicle

and cargo movements in and out each

day, the level of security that can be

physically implemented will always be

a balance between risk and commercial

reality. In this context the role of the Port

Facility Security Officer (PFSO) is key to

ensuring this fine balance is maintained.

Providing a framework to assist the PFSO

is a major element of the EU’s Security

UPgrade for PORTs (SUPPORT) project

(http://www.supportproject.info/)

which is part-funded by the EC’s FP7

Research & Technological Development

Programme. It is a collaboration of

twenty European organisations whose

focus is to raise the current level of

port security. The SUPPORT project’s

main objectives are to deliver ‘validated’

generic port security management

models (capturing reusable state-ofthe-art

and best practices) that can

be customised for specific ports; and

training and open standards based tools

to aid security upgrade in EU ports.

SUPPORT integrates legacy port systems

with new surveillance and information

management systems. It efficiently

supports the complexity of a real port

environment though an integrated,

holistic approach. This ensures an

improved level of security, while

reducing the associated administrative

burden on the port.

Amongst the partners are a number of

ports that have been selected to represent

typical, but different operations.

Starting from the perspective of the

partner port operations, the project has

identified key security gaps and has

produced generic models describing

measures to maintain or augment the

efficient and secure operation of these

ports. Communication and decision

support tools incorporating semantic

technologies have been developed,

accessible to all the port security

stakeholders.

Full scale demonstrators have been

organised in representative EU ports

(Gothenburg, Lisbon and Piraeus) and

augmented with a broader evaluation

programme by members of a European

Ports Security Forum. SUPPORT solutions

include policy and standardisations

proposals and training that can be used

by any EU port to efficiently enhance its

security level.

One of SUPPORT’s key outputs is the

Port Security Management System

(PSMS) (http://www.mypsms.com/).

The PSMS is designed to help PFSOs

to upgrade their security systems by

empowering them with knowledge.

It provides information, skills and

methodologies that enable them to

maintain, evaluate and upgrade their

security measures and create security

awareness without major investment.

The PSMS also delivers outputs in the

form of graphics that can be used to

reinforce security threats and potential

mitigation measures in presentations to

managers or boards of directors.

The whole PSMS package comprises

five elements including a maturity

module designed to enable security

professionals to review and upgrade

security plans to address terrorist

threats; a corporate security module

which addresses crime risks such as loss

events, related to corporate processes

and procedures; an e-learning education

and examination module based on

best practices of ISPS related maritime

security educations including drills

and exercises; a sharing and decision

support module which enables security

professionals to supervise facilities via

the internet and to collaborate on a

local, national or global scale and an

Authorised Economic Operator (AEO)

security self-assessment module which

provides a system to reach compliancy

and submit AEO application.

The pressure of balancing commercial

realities and security threats will

certainly persist as long as current

legislation remains placing the burden

of investment and compliance on

terminal operators. There is a school

of thought that suggests the status

quo will remain until a major terrorist

incident takes place in a European

port facility. However, with access to

SUPPORT’s Port Security Management

System (PSMS), PFSOs now have the

tools to assess the situation, advise their

management team and make the right

decision, whatever the security threat

might be.

Border Security Matters

www.borderpol.org page 17


New system for detecting

radiological threats revealed

A new system designed to better detect radiological threats

by being more precise in distinguishing their radiation

signature from natural backgrounds, is being trialed at

customs organizations across Europe.

The Modular Detection System for Special Nuclear Material

(MODES_SNM) eases the operational burden associated with

the expensive process of investigating the many “everyday”

sources of benign radiation such as cat litter, fertilizer, ceramic

tiles and even Brazil nuts.

The MODES_SNM system, the first of its type in the

world to combine fast and thermal neutron detection, is

the result of a pan-European R&D effort, funded by the

European Commission under its FP7 framework program,

that developed and integrated technologies originating

in fundamental science research conducted at places like

CERN, the European Laboratory for Nuclear Research near

Geneva. It has already undergone rigorous tests at the

European Commission’s Joint Research Centre and the Port

of Rotterdam, and is now being tested by the Irish tax and

customs administration.

As part of the recent tests the system has been used to

verify that parked containers do not contain threats such as

uranium, plutonium, or radiological components for “dirty

bombs”.

technology for testing by end users across Europe.“

t Systems launched today TREASURES, an unattended

ground sensors (UGS) system for intelligence gathering, force

and border protection and enhanced situational awareness,

enhancing a short and efficient sensor-to-shooter cycle in

encountering the enemy;

TREASURES, a cutting-edge, small, lightweight system,

offers short deployment time and low maintenance. It is a

flexible system, enabling easy integration with third-party

sensors, subsystems and C4I systems. Containing ingenious

and modular system components, TREASURES is comprised

of a variety of advanced sensors, communication and control

components. TREASURES detects, classifies and tracks human

and vehicular targets, in real time, on any terrain and in all

weather conditions. The system uses a broad network of “inhouse”

developed sensor clusters, with intelligent dedicated

communication, breakthrough sensing technologies

and data analysis capabilities. Since all the sensors are

developed in house at Elbit Systems, their connectivity in one

communication network maximizes the performance of each

sensor.

EU R&D Project to

Demonstrate Unique

Technologies to Help Improve

Port Security

Practical results from the SUPPORT (Security UPgrade for

PORTS) project, co-ordinated by BMT Group Ltd and partfunded

by the European Commission’s FP7 Security Research

Programme was demonstrated to key stakeholders at Stena

Line’s ferry terminals starting at Masthuggskajen in the Port of

Gothenburg on the 7th and 8th May 2014.

Comprising a collaboration of 21 European organisations,

SUPPORT integrates legacy port systems with new surveillance

and information management systems. It efficiently supports

the complexity of a real port environment through a more

integrated, holistic approach. This ensures an improved level of

security, while reducing the administrative burden on the port.

A unique advantage of the MODES_SNM system – which

is modular and mission configurable - is its ability to

identify materials surrounding a potential threat object. This

information is of high value, as it can allow operators to

exclude the possibility of a detected plutonium source being

a “ready-to-go” nuclear weapon. Furthermore, the MODES_

SNM system is more sustainable than current systems, as it

does not use 3He, the expensive raw material that is typically

used in most neutron detection systems.

Michael Doherty, detection technology expert with the Irish

tax and customs administration said “ The MODES_SNM

project unites specialists from a number of fields ranging

from customs to nuclear physics. In the space of just 2 years,

MODES_SNM has been able to deliver the latest cutting edge

Border Security Matters

www.borderpol.org page 18


Guests attending the event were given the opportunity to be

part of a live demonstration which included the automatic

detection and tracking of a number of divers, swimmers and

small crafts. Based on a system of subsea and surface sensors

including hydrophones, Infra-Red cameras, video cameras

and radars, the Sea Side Intrusion Detection System (SSID)

developed by FOI, the Swedish Defence Research Agency.

Sören Jägerhök, Research Director at FOI comments: “The

SSID will provide tools for the detection of intruders who

attempt to enter a ship’s berth on the surface or under water.

The aim of the demonstration is to show what an affordable

peace time system for commercial organisations would look

like, as opposed to a military sensor system that is developed

with war time repressive actions as options in mind.”

On land video content analysis solutions, developed

by consortium partner, INRIA, a French public research

body dedicated to digital science and technology was

also demonstrated. Through the use of decision support

algorithms, these solutions which integrate with the SSID,

as well as information fusion tools will prompt Port Security

Operators of any suspicious patterns in surveillance and

administrative data, providing a more consistent and timely

detection of any anomalies that may be a security threat.

The demonstration included a showcase of the Port Security

Management System (PSMS), an interactive, real time dynamic

web-based dashboard that will help maritime and logistics

professionals assess and improve overall port security. The

first tool of its kind, PSMS incorporates an up-to-date, selfassessment

guide to enable maritime security practitioners to

successfully upgrade their corporate security. The dashboard

has been tested in various European Cities including Brussels,

Dublin, Gothenburg, Lisbon and Rotterdam, with more than

25 security, port security and IT experts from seven countries

providing feedback and counsel.

New Technology Contraband

Detection Equipment on the

market

First is the Xpose® “New Technology” Hand Held

Miniature Contraband Detector

The Xpose indicates the difference in density between

contraband (drugs, explosives, weapons, currency, etc.) and

the object in which the contraband is hidden – This unit

has many unique features such as graphing capability and

connection to a computer and various accessories. Using

our software “Xpose Tools” The last 100 scans are saved in

memory and may be downloaded to a computer, with date

& time stamps. Various accessories are available with more

in development.

Also new is the Sasrad Contraband Enforcement Kit (CEK)®

The CEK is a kit of leading edge equipment for cargo

Inspection and highway interdiction including the tools

required for inspecting freight, vehicles, boats and planes.

Each kit contains the Lightweight LED “everything-in-the

handle” articulating Fiberscope plus a range of small tools

and instruments which are required for daily operational

use. Other fiberscopes are available for inspecting small

closed areas and even vehicle tires without letting the

air out. Available in Basic or Enhanced combinations of

equipment this kit is the complete answer to contraband

search, and detection.

The first and only fiberscope which can be repaired in

the field – 6mm diameter articulating Fiberscopes with 2

or 4 way articulation of the tip, Tungsten Braid or Non-

Conductive covering, 6mm diameter up to 5.0m in length.

Other lengths and diameters available on request. Other

Fiberscopes are available for IED/SWAT applications with

channels for introducing working/handling tools including

microphone, magnetic retriever and grasper.

Heathrow Airport Install CEM’s

emerald Intelligent Access

Terminal

As one of the world’s busiest airports, serving over 184

destinations across 80 countries, Heathrow Airport needs a

reliable device to ensure the highest levels of security as well

as increasing operational efficiency.

Heathrow Airport is using emerald to control critical paths

and restricted zones that are permanently manned by security

personnel. emerald will provide security staff with a clear,

Border Security Matters

www.borderpol.org page 19


the high performance technology, required when protecting

people, events, infrastructure and facilities from the threat of

criminal and terrorist activities.

VISOR-C is a complete system – “ready to deploy”. Although

VISOR-C is small, light and quick to deploy and operate, the

system produces high quality images and includes all the

operator tools needed to easily examine the underside of

vehicles quickly and efficiently.

VISOR-C uses the same proprietary software as other Visor

Systems Limited products. It processes the image frames

from each of the system cameras, to produce a clear

‘compositeimage’ in less than 2 seconds after a vehicle has

passed over the system.

visual, colour image indicating the card status i.e. access

denied or access granted. emerald will also enhance security

at Heathrow’s Campus area where all cargo, staff and crew

are processed before gaining access to the airside area. This

is a critical part of Heathrow’s security operation where the

highest level of security is required.

CEM Systems has been working with Heathrow Airport

for over 20 years securing all five terminals with AC2000

Airport; CEM’s aviation specific access control and security

management system. AC2000 Airport provides Heathrow

Airport with a flexible and customisable security solution to

meet their unique and growing security requirements.

CEM also provides over 4000 readers from the CEM S600

range and a number of S3030 portable readers for airport

roaming security.

Adding to the existing range of hardware, emerald is now

installed in the Heathrow ID centre and the Campus area. “As

an intelligent device emerald goes beyond securing premises;

it empowers users, improves overall business needs and

increases operational efficiency” said Andrew Fulton, Senior

Director of Global Sales, CEM Systems.

Visor Systems Limited

launches the VISOR-C compact

Under-Vehicle Surveillance

System

Visor Systems Limited has developed the VISOR-C UVSS

following customer demand for a compact version of their

successful, high performance, colour multi-camera technology,

currently employed in the original VISOR-P ‘portable’ and

VISOR-S ‘static’ under-vehicle surveillance systems.

Police, border control, law enforcement agencies and private

security organisations have all been requesting a compact,

portable version for specific types of checkpoint operation,

where the majority of vehicles to be processed are cars and

vans.

However, these organisations have stated the need to retain

In-keeping with the original VISOR philosophy, none of the

image data is lost due to image compression or during the

assembly of the composite-image so, when the Operator

inspects the displayed image and decides that further detailed

examination is required s/he simply clicks on the area of

interest to review the individual frame in detail at its native

resolution – there is no loss of resolution.

VISOR-C, along with its sister products and bespoke solution

capability, allows Visor Systems Limited to provide a high

performance solution for virtually all under vehicle surveillance

system needs.

Cognitec Brings Specialized

Face Recognition Technology

to Border Control Market

Cognitec responds to high demand for fast, accurate face

recognition solutions at border control points by introducing

a new product that combines smart hardware for image

acquisition with market-leading software for verification

processes.

FaceVACS-Entry is ready for integration into electronic gates

(eGates) which provide travelers with electronic passports

(ePassports) the option to pass through automatic passport

checks. After a person enters the gate, the system detects the

person’s face, adjusts the position of the cameras according

to the person’s height and then captures frontal images. The

software instantly verifies the live images against biometric

photos stored in passports, other ID documents and/or facial

image databases.

Cognitec has optimized the system to ensure efficiency and

ease of use for travelers while capturing best-quality images

that guarantee high verification accuracy, thus fully complying

with guidelines set by the European Border Police (Frontex).

A proprietary sensor, able to distinguish between human

faces and artifacts like printed images and masks, detects

presentation attacks.

“Cognitec has developed pioneering face recognition

Border Security Matters

www.borderpol.org page 20


technology for border control solutions since the inception

of our company. We are proud to bring another innovation

to airports and other ports of entry that will improve the

overall traveler experience and safety,” says Alfredo Herrera,

Managing Director of Cognitec.

In August 2013, the company announced its participation

in the EasyPASS project that will supply eGates to passport

control areas at all major German airports, following a contract

award by the German Border Police. All EasyPASS gates will be

equipped with FaceVACS-Entry.

Cognitec’s Video Screening

and Analytics Technology

Receives Algorithm and

Functionality Upgrades

Cognitec Systems Version 5.2 of FaceVACS-VideoScan, for

real-time face recognition in video streams and anonymous

people analytics. The upgraded version includes Cognitec’s

latest face recognition algorithm B8 and major system

upgrades that respond to the growing number of use cases

the technology can support.

FaceVACS-VideoScan performs anonymous facial analysis over

time to compute statistical

information about people

count, demographics and

movement, and to detect

frequent visitors and crowds.

The software’s adaptable

analysis and reporting

capabilities best support

operations management

and marketing departments

as they make facility design

and staffing decisions, or

plan advertising content and

placement.

Real-time identity checks

against image databases

allow users to find known persons. Security teams are able

to detect unwanted or banned persons within their facility,

while sales or service staff can receive a notification to attend

to valued customers. The upgraded version allows users to

filter and acknowledge such notifications, and quickly find all

appearances of a person within a given time window.

FaceVACS-VideoScan 5.2 also features improved usability and

user interface design, better integration of various camera

models and corresponding camera controls, enhanced

configuration options, and support for RTSP/H264 monitoring

streams.

The Homeland Defense and Security Database

WorldSecurity-Index.com is the only global

homeland security directory published in

English, Arabic and Spanish on the web and

in CD network format.

The Global Security Portal

Advertise on WorldSecurity-Index.com

from only £515 for 12 months

Contact info@worldsecurity-index.com for details

or call +44 (0) 208 144 5934.


Hosted by:

incorporating Critical Information

Infrastructure Protection

4 th -5 th March 2015

The Hague, Netherlands

www.cipre-expo.com

Convene; Converse; Collaborate

CALL FOR PAPERS

Abstract submittal deadline - 30th June 2014

The ever changing nature of threats, whether natural through

climate change, or man-made through terrorism activities, either

physical or cyber attacks, means the need to continually review

and update policies, practices and technologies to meet these

growing demands.

Critical Infrastructure Protection and Resilience Europe brings

together leading stakeholders from industry, operators, agencies

and governments to debate and collaborate on securing Europe’s

critical infrastructure.

For further details and to submit your abstract visit

www.cipre-expo.com

How to Exhibit

To discuss exhibiting and sponsorship

opportunities and your involvement with

Critical Infrastructure Protection & Resilience

Europe please contact:

Tony Kingham - Exhibit Sales Director

T: +44 (0) 208 144 5934

M: +44 (0)7827 297465

E: tony.kingham@worldsecurity-index.com

Paul Gloc - Exhibit Sales Manager

T: +44 (0) 7786 270820

E: paulg@torchmarketing.co.uk

Gain access to leading decision makers from corporate and government establishments

tasked with Critical Infrastructure Protection and Resilience.

Supporting Organisations:

Media Partners:


News and updates from the Secretariat

It can be reported:

BORDERPOL activities since the 2nd Congress have focused on the strategic

development and delivery programs. Border issues in eastern Europe, Central Asia

and West Africa due to changing geo-political events in these regions have attracted

our attention. At the same time expansion of our membership at the individual,

agency and corporate level has remained a priority.

With respect to scheduled programs the first of these initiatives was delivered in

Budapest Hungary on May 20th. The European Secretariat working in consultation

with the host government police and border agencies as well with as corporate

sponsors Beechcraft, Fercom and Konosoft produced a memorable and outstanding

two day event. The workshop focused on organized crime and its impact on border

security at the global level.

As is usual for BORDERPOL events we brought together an excellent cross section

of practitioners, policymakers and academics that were intimately involved in the

discussions. Once again the event highlighted the ability of our management team

in London and Budapest to meet the challenges of bringing together a large and

diverse group. The next event in the 2014/15 series of BORDERPOL workshops

will take place in Helsinki Finland in September. Readers are invited to contact Mr.

Neil Walker the Director of Programs and Events for instructions on how to join the

workshop in Finland.

Follow ‘BORDERPOL’

on Twitter for the latest

world border security

news.

To keep up to date with

event developments

join the ‘World

BORDERPOL Congress’

on LinkedIn.

www.borderpol.org

Members of the Executive Committee of the Management Board also held its annual

meeting in Budapest on May 23rd at the office of the European Secretariat. The

Board agreed to introduce a new basic membership program for serving and retired

officials. It also decided to develop a global online educational program for border

security officials that would otherwise not have access to such information. The Board

welcomed Mr. Louis – Lyonel Voiron, General Secretary of the World Anti Illicit Traffic

Organization to the Board. Mr. Voiron brings new strategies and experiences to the

BORDERPOL team.

The summer tourist season will soon begin in the countries in the northern

hemisphere. From July to September border security and travel/migration agencies

and services are busy at the airports, seaports and border crossing stations.

BORDERPOL salutes the hard working men and woman of all the border agencies

and services that ensure that their nation’s borders not only protect but connect

people and places in a safe and effective manner.

During this same period most intergovernmental bodies go into “hiatus mode” as the

delivery of non-scheduled programs and services is quite limited due to holidays. Our

secretariats will maintain services for members during this period but will like our IGO

colleagues we will return to usual operational programs in September.

To all our members, readers and supporters we wish you a safe and memorable

summer!

Border Security Matters

www.borderpol.org page 23


News and updates from the Secretariat

It can be reported:

Border Security Matters

www.borderpol.org

www.borderpol-event.org

Press releases, newsletters and similar media/publicity announcements

regarding BORDERPOL events and programs will be delivered though the UK

Administration Centre. Please contact Neil Walker neil.walker@borderpol.org or

Tony Kingham tony.kingham@worldsecurity-index.com regarding these items.

Editorial:

Tony Kingham, KNM Media

E: tony.kingham@worldsecurity-index.com

Contributing Editorial:

Neil Walker, Torch Marketing

E: neilw@torchmarketing.co.uk

Design, Marketing & Production:

Neil Walker, Torch Marketing

E: neilw@torchmarketing.co.uk

Advertising Sales &

World BORDERPOL Congress

Exhibition Sales:

Paul Gloc

T: +44 (0) 7786 270820

E: paulg@borderpol-event.org

Membership Enquiries:

Thomas Tass, BORDERPOL

T: +1 509 278 1660

E: secretariat@borderpol.org

BSM Subscriptions:

Neil Walker, Torch Marketing

E: neilw@torchmarketing.co.uk

3 rd World BORDERPOL Congress

9 th -11 th December 2014

Kempinski Corvinus Hotel, Budapest, Hungary

Online Registration Now Open -

Early Bird Deadline - 9 th October 2014

Register your place at the World BORDERPOL Congress today and save

with the Early Bird delegate rate.

Are you interested in attending the World BORDERPOL Congress?

The 3rd World BORDERPOL Congress registration is now open and will see the

annual gathering of the worlds border protection and management agencies,

practitioners and policy-makers.

See page 9 to 12 for further details of the Congress

programme .

Copyright of BORDERPOL, Torch

Marketing and KNM Media.

Early Bird Discounts for delegates is currently

available. Visit www.world-borderpol-congress.com

for further details and to register online.

Neil Walker, Events Director, BORDERPOL

Email: neil.walker@borderpol.org

Border Security Matters

www.borderpol.org page 24


3 rd World BORDERPOL Congress

9 th -11 th December 2014

Budapest, Hungary

Enhancing Cooperation for Smarter Border

Management.

Register today and benefit from Early Bird Discounts

The World BORDERPOL Congress is the only multi-jurisdictional transnational

platform where the border protection, management and security industry policymakers

and practitioners convene annually to discuss the international challenges

faced in protecting not only one’s own country’s borders, but those of neighbours

and friends.

We look forward to welcoming you to the wonderful city of Budapest, Hungary

in December 2014 for the next gathering of border and migration management

professionals.

For congress programme and registration visit

www.world-borderpol-congress.com

Owned & Organized by: Supported by: Media Partners:

More magazines by this user
Similar magazines