World Security Report June 2014


For the latest news, features, essential analysis and comment on security, counter-terrorism, international affairs, warfare and defence

For the latest news, features, essential analysis and comment on security, counter-terrorism, international affairs, warfare and defence

June 2014

Subscribe Here

The importance of the Internet

infrastructure for every day life.

Port Security: The Front Line

Threat Detection and Recognition

Industry News


3 rd World BORDERPOL Congress

9 th -11 th December 2014

Budapest, Hungary

Connecting and Protecting

The World BORDERPOL Congress is the only multi-jurisdictional transnational

platform where the border protection, management and security industry policymakers

and practitioners convene annually to discuss the international challenges

faced in protecting not only one’s own country’s borders, but those of neighbours and


The 3rd World BORDERPOL Congress will provide a platform for the world’s border

protection forces and agencies to discuss and debate the current and future issues

and challenges facing the border management, security and migration management


We look forward to welcoming you to the wonderful city of Budapest, Hungary

in December 2014 for the next gathering of border and migration management


For further details and to submit your abstract visit

To discuss exhibiting and sponsorship opportunities and your involvement with the

World BORDERPOL Congress 2014 please contact:

Tony Kingham

Exhibit Sales Director

T: +44 (0) 208 144 5934

M: +44 (0)7827 297465


Paul Gloc (UK & Europe)

T: +44 (0) 7786 270820


Denne Johnson (Americas)

T: +1 918 863 9792


When your staff are

travelling, have you taken

“all reasonable care” of their

safety and security?

Since the last issue of WSR was published,

I am pleased to say we have launched

our latest event, Personnel Protection and

Safety Europe. The reason being, whilst

governments around the world, quite rightly,

spend a great deal of time, effort and money

focussing on keeping the travelling public

safe from attacks by terrorists, the simple

truth is that when travelling we are far more

likely to come to harm as a victim of crime, an

accident or some sort of health emergency!

In fact, if you travel enough, whether it is for

business or pleasure, you are likely to have been

a victim of one or the other, or like me, all three!

I am amazed at how many companies routinely send their personnel off all

over the world without giving their safety a second thought. It concerned me

so much, that back in the day when I ran an international sales department,

I took it upon myself to run travel safety awareness training sessions for my

own staff, which promptly stopped when I left.

What makes it more surprising is that all companies are aware of their ‘Duty

of Care’ to their employees, yet when their staff travel and are at their most

vulnerable, little is done in terms of systems, procedures, equipment or

training to prepare them for what, for some of them at least, is inevitable.

In the litigious world we live in, with the “no win no fee” lawyers, the legal

and financial consequences of not taking “all reasonable care” could be

considerable and for smaller companies potentially disastrous!

So what is “all reasonable care”?

Well that’s something the courts will ultimately decide but at the very least

there should be procedures in place to assess travel risks and to deal with

an emergency when it arises. Over and above that, it could be argued that

some sort of training should be given routinely to staff that travel regularly

and that smart phones and apps offer all sorts of possibilities for tracking

employees movements, provide alerts, emergency panic numbers at

“reasonable” cost! For bigger companies, more comprehensive measures

may be deemed “reasonable”!

What is sure is that companies that do not take “all reasonable care”, do so

at their own risk!


Tony Kingham


Contributing Editorial:

Neil Walker


Design, Marketing & Production:

Neil Walker


Advertising Sales:

Tony Kingham

T: +44 (0) 208 144 5934

M: +44 (0)7827 297465


Paul Gloc (UK & Europe)

T: +44 (0) 7786 270820


Denne Johnson (Americas)

T: +1 918 863 9792



Tony Kingham


World Security Report is

a bi-monthly electronic,

fully accessible e-news

service distributed to 38,000

organisations globally. It tracks

the full range of problems

and threats faced by today’s

governments, armed and security

forces and civilian services and

looks at how they are dealing

with them. It is a prime source of

online information and analysis

on security, counter-terrorism,

international affairs, warfare and



Supporting Organisations:

Media Partners:

Tony Kingham


World Security Report

Copyright of KNM Media and

Torch Marketing.

World Security Report - 3





of the



for every day


Every day we read about the single digital market, the importance of a free and open Internet and the need of

trust and security in electronic communications networks. The Internet is an assumed, and for specific services

critical, component of everyday life but yet we still have to develop methodologies to fully assess what are the most

important components from a national and international perspective and how they are structured. This is important

not only in the short term to understand our dependencies on network connectivity but also in the long term to

properly focus efforts for enhancing the resilience of data communication networks.

The Internet infrastructure

is the backbone of the

information society but as

it has become clear in the recent

news, different threats, both

technical and geopolitical, can

hamper its availability. Citizens

expect national authorities and

operators to be fully aware of the

possible interdependencies and

put in place all possible measures

to ensure the security and

resilience of their communications.

To build trust and secure the

future of the information society,

answering the following questions

is becoming increasingly


• What is the Internet today,

how is it organized, what can

we understand from its current

structure, which are the most

important components of it?

• What is a critical service, network

or component in today Internet

infrastructure and how can we

define what is national and what is


• What assets and services are

vulnerable and what happens

to critical services if they are


• How can we enhance security

and resilience of the Internet


Understanding the complexity

of the most complex network

humanity created is a challenging

task. The Internet in 30 years

has changed the way we work,

communicate and interact as

a society and we are still at the

very beginning of this societal


It is essential that we are fully

aware of our dependency on

the infrastructure and how it is

organized in each country. This can

also be useful to understand if part

of the assets, belonging to Critical

Infrastructure (CIs), should be

treated with higher requirements

of security and resilience and

the role they play for the global

coherence of the Internet. Any

assessment should be done

from a Critical Information

Infrastructure Protection

(CIIP) perspective and should

involve the Internet operational

community in fostering the

security and resilience of public

communication networks and

in general for the benefit of the

entire Internet. Moreover having

such an understanding could help

every country in establishing a

constructive dialogue with Internet

operators and participate in the

multi-stakeholder discussion on

how to maintain the Internet

globally secure and resilient.

1 Challenges

Every component of the Internet

layers has its own vulnerabilities

and represents a topic of study.

For example

• Physical infrastructure – cable

systems and submarine cables are

critical as well as the dependency

on power supply 1 . Moreover

communications can be tapped or

targeted by specific attacks.

• Hardware – In all the incidents

regarding availability reported to

ENISA in 2012 2 , hardware failure

was the most common cause.

• Software and Protocols – bugs

in protocol implementation and

exploitation of vulnerabilities

as in traffic hijacks are realistic


Looking at the different

components of the infrastructure,

both at physical and at logical

level, the following lists can be

considered as an example

of an initial set of threats that

should be covered in an all

hazard approach (Table 2):

In recent times there have

been several incidents that

can be used as an example

of the threats to which the

infrastructure is vulnerable

(see list below). While these

incidents didn’t affect the

Internet at a global scale

or European scale, the

effects on a local scale

were rather noticeable or

underline the persistence of

known vulnerabilities. They

therefore serve as a reminder

that while the Internet at global

level can be considered resilient,

it cannot be taken for granted

that this is also true for the local

part of the Internet infrastructure

serving a particular region, or

country or involved in a targeted

attack. Even disputes between

private, non-State actors can have

important effects on the local

Internet infrastructure.

Different causes of incidents can

affect the different components:

• Natural disasters and cable

Table 2 – Threats to the physical and logical infrastructure

cuts can affect the connectivity to

specific areas 3 :

• Attempts to block one country’s

connectivity via physical 4 and

network 5 disruption can have

cascading consequences for

Internet users even in another

country due to the cross border

nature of interconnections

• Misconfigurations 6 can cause

temporary and involuntary traffic


• Large attacks 7 to specific services

can have repercussions and create


• BGP hijacks or man in the

middle attacks 8 and attacks to the

DNS infrastructure 9 can be used to

transparently reroute and intercept

traffic or black hole it for a certain

destination 10

2 ENISA Efforts for the security

and resilience of communication


ENISA, the European Union

Agency for Network and

Information Security has studied

the resilience of Internet

infrastructure in Europe since

2010, paying attention to both

the technical and organizational

components. The goal is to

provide Member States with

frameworks and resources to

better secure and ensure the

resilience of their networks. The

“Inter-X: Resilience of the Internet

Interconnection Ecosystem 11 “

study was the first step ENISA

took towards studying this area in

2010. In 2011, it was followed up

with a study assessing technical

(e.g. logical, physical, application

layers, replication and diversity of

services and data, data centres),

peering and transit e.g. Service

Level Agreements (SLAs), as well

as market, policy and regulatory

4 - World Security Report

World Security Report - 5




In 2013, ENISA released

“Understanding the importance

of the Internet Infrastructure

in Europe” 12 continuing

further its work in this area.

The goal of this report is to

foster security and resilience

of the Internet infrastructure in

Europe with particular attention

to critical assets and cross

border interdependencies

and work together with

Internet operational actors to

maintain the Internet globally

coherent, secure and resilient.

The report contains several

recommendations for Member

States, providers of critical

services and European Internet

operational actors:

• Member States should develop

a national overview of the Internet

infrastructure - Using the step by

step guidelines proposed in the

study, Member States are invited

to develop an insight of the

current infrastructure, the Critical

Infrastructure interdependencies

and have a baseline for future


• Member States should adopt

a standardized methodology

for the identification of Critical

Information Infrastructure assets

and services - In order to correctly

assess the criticality of specific

assets and services, Member

States should be able to adopt

a common methodology for

the identification of Critical

Information Infrastructures.

• Member States should adopt

specific physical infrastructure

guidelines - Any research should

always take under consideration

the physical component and

provide a holistic overview of

the system. When looking at

the physical infrastructure more

specific guidelines should be also


• Critical services providers should

develop requirements

for high availability


for critical services

- During the

discussion with

operators, it was

underlined that if

providers of critical

services consider

some connectivity

relationships as

critical, they should

require for these


higher level

of availability,

integrity and confidentiality

in order to enhance the

security and resilience of these


• National and European

bodies and cyber security

agencies should engage the

Internet community - Due to

the multi-stakeholder nature

of the Internet, we propose

national and European

bodies and cyber security

agencies (active in the area

of security and resilience of

communication networks) to

engage in a dialogue with

the Internet community and the

private sector.

• European Commission and

Member States should foster

research on infrastructure security

and resilience - The more we rely

on electronic communication

networks to build the future

European information society,

the more EU and Member State

should foster research in this

field. Moreover more research

on vulnerabilities of the core

components of the global Internet

Infrastructure such as DNS and

BGP is needed.

• European Internet operational

actors should share information

about incidents affecting physical

and logical infrastructure -

European Internet operational

actors are invited to share

information on incident affecting

physical and logical infrastructure

and use it to develop good

practices for the benefit of the

entire community.

In 2014 ENISA will follow up the

2013 report with the following


• focusing on the identification

of CIIs assets and services,

physical and logical infrastructure

vulnerabilities, procurement

guidelines for CIIs operators and

cross border cooperation

• developing a threat landscape

of the physical and logical layer of

the Internet infrastructure

• fostering the ENISA’s Internet

infrastructure security and

resilience reference group

which aims to gather subject

matter experts

from the Internet

operators’ community,


agencies, NRAs,

contingency agencies

and infrastructure

security and resilience


The goal is to develop

infrastructure security

and resilience not

only for securing

European citizens but

also the entire Internet.

The Internet is an

ordinary component

of everyday life and

considering news regarding

recent threats, it is important to

assess the current situation and

ensure the security and resilience

of citizens’ communications.

Moreover, future scenarios

such as the Internet of Things 13 ,

Interconnected Mobility 14 and

Smart city 15 are at their very

beginning and are built on

these same communication

networks. In this respect, every

citizen is a potential Internet

user as far as a service relies

on an Internet connection. For

these reasons ENISA believes

that is important to investigate

how the interconnections are

structured and understand what

is critical in order to focus efforts.

Communication networks are the

building blocks of the information

society and it is clear that the

absence of knowledge regarding

the underlying infrastructure could

severely hamper not only securing

current communications but also

the preparing for future threat



ENISA (2013), Power Supply Dependencies in the Electronic Communications Sector


ENISA (2013), Annual Incident Reports 2012 - Analysis of Article 13a annual incident reports, 2013


Massive Flooding Damages Several NYC Data Centers


Mediterranean Cable Disruption as Seen in RIPEstat


Dainotti, A., Squarcella, C., Aben, E., Claffy, K. C., Chiesa, M., Russo, M., & Pescapé, A. (2011). ‘Analysis of country-wide Internet

outages caused by censorship’. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (pp.

1-18). ACM


YouTube Hijacking: A RIPE NCC RIS case study


ENISA (2014) Large scale UDP attacks: the 2014 trend and how to face it



Cowie, J, (2013) The New Threat: Targeted Internet Traffic Misdirection


Google’s Public DNS intercepted in Turkey


Toonk, A. (2013) Accidentally Stealing the Internet


ENISA (2010)


ENISA (2013) Understanding the importance of the Internet Infrastructure in Europe - Guidelines for enhancing the Resilience of

eCommunication Networks



Digital agenda for Europe


Vision of an interconnected Europe


Smart Cities and Communities

6 - World Security Report

World Security Report - 7





The Front


Once upon a time commercial ports only had to deal with three key threats on a daily basis - theft, damage to goods

and stowaways all of which have the potential to cause considerable financial damage to stakeholders but were

identifiable and manageable. The contemporary port is subject to a far wider range of threats including the possibility

of terrorist attack and has to respond accordingly while managing and responding to a plethora of local, national

and international legislative requirements. The diversity of responses, systems and processes to tackle each separate

threat combined with the demands of compliancy has made the job of the Port Facility Security Officer (PFSO)

onerous to the point of breaking.

Security expert and former Chairman of the Security Development Board Rotterdam Port, Henk van Unnik, explains

how a lack of cohesion has resulted in the current scenario and that a solution to the problem has been developed

through the Security UPgrade for PORTs (SUPPORT) research & development project which is part-funded by the

European Commision’s FP7 Security Research Programme. He explains how the appropriate management of

resources can be co-ordinated and deployed to improve efficiency, effectiveness and port security.

With 90% of EU’s

external trade and

40% of internal

trade transported by ship, the

contemporary sea port is a vital

cog in the massive machine

that is 21st Century commerce.

Unsurprisingly, port infrastructure

and the 3.5 billion tonnes of

freight that flows through EU

facilities are vital to maintaining

both global and individual

countries’ economic wellbeing.

The potential threats to port

security come on many different

levels from a range of groups

and individuals with very different

aims and objectives. Theft, fraud,

corruption, drugs trafficking and

people trafficking are all major

issues for port security, especially

when their motivation can be

traced back to organised crime or

terrorist groups. The combination

of sophisticated organised crime,

the heightened risk of terrorist

activity and the ongoing threat

of low level crime ensures that

ports are under threat 24 hours

per day, 365 days per year. Well

Henk van








organised criminal gangs now

have access to enough money,

knowledge and skills to develop

considerably more complex

modus operandi. Where in the

past, criminal organisations would

use bribery or extortion to secure

access, information or control of

a particular shipment, recently

there has been a move to bypass

the human element and hijack

the technology. Recent events

at a Northern European port

have demonstrated how easily

a fully automated logistics chain

can be manipulated if security is

breached. Rather than having to

run the risk of ‘stealing’ a container

and getting through port security,

or leaving a trail of names or

addresses that can be followed up

by law-enforcement agencies later,

cybercrime ensures that all the

key physical checks appear 100%

legitimate at the dock gate, but

can be wiped clean electronically,

removing all trace. Faced with

such innovative and complex

criminal activity, port security

needs to raise its game.

While the baseline level of port

security has certainly improved

since the relaxation of border

security between mainland-

European countries in 1995, there

are still major variations between

different facilities. Some of this can

be attributed to experience, some

is driven by national or regional

culture but some is due to the way

legislation has been applied.

The legislation that defines

port security is the International

Maritime Organisation’s (IMO)

International Ship and Port facility

Security code (ISPS) which, in turn,

is part of the Safety of Life at Sea

(SOLAS) regulations. Developed

in the aftermath of the September

11th terrorist attacks, the ISPS

regulates security on-board

ships, as well as inside ports and

terminals which receive seagoing

vessels on international voyages.

The ethos of the ISPS code is

very preventive and includes a

requirement for both vulnerability



legacy port


with new






and threat assessments to

be carried out. Risks and

vulnerabilities are very different

when considering a container,

bulk or passenger terminal and so

all assessments must be specific

and bespoke. The ISPS code

also specifies a basic security

framework including monitoring

and controlling access, monitoring

the activities of people and cargo,

the preparation of specific ship

and Port Facility Security Plans

and the appointment of Ship

Security Officers and a Port Facility

Security Officer (PFSO).

Across the European Union (EU),

the ISPS code is supported by

European Commission Directive

725. While identical to the ISPS

code in content and a mandatory

piece of pan-European legislation,

Directive 725 only requires

member states to achieve a

particular result without dictating

the means of achieving that

outcome. Consequently, the

ISPS code was implemented

by 21 EU countries, each in

a different way without any

homogenisation of approach

or standardisation. Although

the European Maritime Safety

Agency (EMSA), FRONTEX and

EUROPOL all touch upon port

security, they have no executive

powers and there is currently no

Europe-wide framework. Without

a Pan-European Federal Agency

like the U.S. Department of

Homeland Security, the European

Union has no power to compel

member states to work together

or to follow prescriptive guidelines

and individual ports work in

isolation with commercially-driven

secrecy, thwarting the sharing of

intelligence or best-practice.

Although responsibility rests with

a variety of ministries or other

government agencies across

Europe, the burden of compliance

and implementation of the ISPS

code has been passed down to

the individual terminal operators.

This produces an interesting

paradox as commercial companies

whose aim is to make a profit to

serve their board or shareholders

are being made responsible for an

activity that does not necessarily

deliver any business benefit. Not

surprisingly, enhanced security

beyond that required to protect

day to day business operations

are often not high on Terminal

Operator’s agendas, especially

when national authorities do not

have the power to force them to

invest in such security measures.

Despite the best efforts of

regularity authorities, port security

too often promises much and

delivers little.

Because of the very nature of a

port facility with huge volumes

of vehicle and cargo movements

in and out each day, the level of

security that can be physically

implemented will always be

a balance between risk and

commercial reality. In this context

the role of the Port Facility Security

Officer (PFSO) is key to ensuring

this fine balance is maintained.

Providing a framework to assist

8 - World Security Report

World Security Report - 9



the PFSO is a major element

of the EU’s Security UPgrade

for PORTs (SUPPORT) project


which is part-funded by the EC’s

FP7 Research & Technological

Development Programme. It is a

collaboration of twenty European

organisations whose focus is to

raise the current level of port

security. The SUPPORT project’s

main objectives are to deliver

‘validated’ generic port security

management models (capturing

reusable state-of-the-art and best

practices) that can be customised

for specific ports; and training and

open standards based tools to aid

security upgrade in EU ports.

SUPPORT integrates legacy port

systems with new surveillance

and information management

systems. It efficiently supports

the complexity of a real port

environment though an

integrated, holistic approach.

This ensures an improved level

of security, while reducing the

associated administrative burden

on the port.

Amongst the partners are a

number of ports that have been

selected to represent typical, but

different operations. Starting from

the perspective of the partner

port operations, the project has

identified key security gaps and

has produced generic models

describing measures to maintain

or augment the efficient and

secure operation of these ports.

Communication and decision

support tools incorporating

semantic technologies have been

developed, accessible to all the

port security stakeholders.

Full scale demonstrators have

been organised in representative

EU ports (Gothenburg, Lisbon and

Piraeus) and augmented with a

broader evaluation programme

by members of a European

Ports Security Forum. SUPPORT

solutions include policy and

standardisations proposals and

training that can be used by any

EU port to efficiently enhance its

security level.

One of SUPPORT’s key outputs

is the Port Security Management

System (PSMS) (www.mypsms.

com). The PSMS is designed to

help PFSOs to upgrade their

security systems by empowering

them with knowledge. It

provides information, skills and

methodologies that enable

them to maintain, evaluate and

upgrade their security measures

and create security awareness

without major investment. The

PSMS also delivers outputs in the

form of graphics that can be used

to reinforce security threats and

potential mitigation measures

in presentations to managers or

boards of directors.

The whole PSMS package

comprises five elements including

a maturity module designed to

enable security professionals

to review and upgrade security

plans to address terrorist threats; a

corporate security module which

addresses crime risks such as

loss events, related to corporate

processes and procedures;

an e-learning education and

examination module based on

best practices of ISPS related

maritime security educations

including drills and exercises; a

sharing and decision support

module which enables security

professionals to supervise

facilities via the internet and to

collaborate on a local, national or

global scale and an Authorised

Economic Operator (AEO)

security self-assessment module

which provides a system to reach

compliancy and submit AEO


The pressure of balancing

commercial realities and security

threats will certainly persist as

long as current legislation remains

placing the burden of investment

and compliance on terminal

operators. There is a school of

thought that suggests the status

quo will remain until a major

terrorist incident takes place in a

European port facility. However,

with access to SUPPORT’s Port

Security Management System

(PSMS), PFSOs now have the tools

to assess the situation, advise their

management team and make

the right decision, whatever the

security threat might be.

Hosted by:

Convene; Converse; Collaborate

The ever changing nature of threats, whether natural through

climate change, or man-made through terrorism activities, either

physical or cyber attacks, means the need to continually review

and update policies, practices and technologies to meet these

growing demands.

The European Union is developing its policy on critical

infrastructures in relation to the European Programme for Critical

Infrastructure Protection (“EPCIP”) which considers measures

that will enhance, where necessary, the level of protection of

certain infrastructures against external threats.

Critical Infrastructure Protection and Resilience Europe brings

together leading stakeholders from industry, operators, agencies

and governments to debate and collaborate on securing Europe’s

critical infrastructure.

For further details visit

incorporating Critical Information

Infrastructure Protection

4 th -5 th March 2015

The Hague, Netherlands

How to Exhibit

To discuss exhibiting and sponsorship

opportunities and your involvement with

Critical Infrastructure Protection & Resilience

Europe please contact:

Tony Kingham - Exhibit Sales Director

T: +44 (0) 208 144 5934

M: +44 (0)7827 297465


Paul Gloc (UK & Europe)

T: +44 (0) 7786 270820


Denne Johnson (Americas)

T: +1 918 863 9792


Gain access to leading decision makers from corporate and government establishments

tasked with Critical Infrastructure Protection and Resilience.

Owned & Organised by: Hosted by:

Supporting Organisations: Media Partners:

10 - World Security Report







Trucks, trains, ships and oil rigs are all potential targets for criminal organisations

Organisations that own, use or transport high value assets recognise the need to protect their goods and employees,

especially when they are at their most vulnerable - when in remote or isolated situations, at night and when operating

alone. By their very nature, trucks, trains, ships and oil rigs are all potential targets for criminal organisations.

Furthermore, monitoring systems, early warning and deterrent technology have not been available to address this

need at a remotely affordable cost. As a result, there has been an uneasy acceptance that in certain parts of the world,

piracy, hijacking or theft are facts of commercial life. However, a refusal to accept this situation has helped to push this

issue to the top of the EU agenda.

Maria Andersson, at FOI, the Swedish Defence Research Agency and Technical Co-ordinator for ARENA explains the

challenges in protecting high value assets on both land and at sea. She describes how the basis for a solution to the

problem has been developed through the ARENA (Architecture for Recognition of thrEats to mobile assets using

Networks of Affordable sensors) research & development project which is part-funded by the European Commission’s

FP7 Security Research Programme. Dr. Andersson explains how the generic surveillance system that has been

developed could provide robust, proactive threat detection and recognition, while being able to differentiate between

real threats and false alarms across a range of environments using an affordable system of sensors.

Pirates, highwaymen and train

robbers may all sound faintly

quaint and old fashioned, but

anyone involved in the transport

industry will tell you that their

modern counterparts are as

big a threat as they ever were.

There is every sign that they will

remain so, as long as goods

and vehicles remain vulnerable

when on the move and isolated.

While the threat looms large, the

technology installed on vehicles to

detect potential security breaches

remains crude in comparison to

that now becoming available for

static deployment.

A ship, a lorry or a train is often

highly secure while in a port or

depot, being physically protected

and under close surveillance, but

once outside they are a relatively

soft target for bands of organised

and often dangerous criminals.

The theft of high value, high risk

products in transit cost businesses

over €8.2 billion a year, according

to recent European Union figures.

Since the terrorist attacks on New

York on September 11th 2001 the

threat of terrorism has also loomed

large over the transport sector.

Oil rigs’ isolation means they face

similar threats.

Terror organisations may engage

in theft to fund their operations or

they may see it as an end in itself,

potentially disrupting, destroying

or capturing vehicles containing

hazardous or dangerous materials

such as chemical liquids, gas,

or radioactive material. After

the September 11th attacks the

United Nations agreed proposals

to enhance the security of

dangerous goods in transport.

Terror organisations have

demonstrated their willingness

to target mass transportation

networks along with other areas of

critical infrastructure.

Over 70 per cent of all goods

transported in the EU are

transported using road haulage, a

transport method which carries

one of the highest risks of being

victim of criminal activity. Truck

thieves generally steal the whole

vehicle or break into trailers to

take the contents, sometimes

cutting panels and causing other

costly damage to gain access.

Drivers too are vulnerable to

attack and theft. The most

common place for a truck to

be attacked is at an unguarded

parking lot while the driver is

asleep. Large cities, like London

and Madrid are the biggest hot

spots, but countries like Belgium

also have a problem. In the UK

alone, 324,000 crimes were

recorded against the transport

and storage sector in 2012.

The threat is equally pressing at

sea as it is on land. Modern day

piracy has presented a significant

challenge since civil war broke

out in Somalia in the early 1990s

with an upsurge in recent years

posing a threat to critical maritime

infrastructure. There were no

fewer than 49 piracy incidents in

the first quarter of 2014 according

to the International Maritime

Bureau (IMB), an offshoot of

the International Chamber of

Commerce focussed on fighting

maritime crime. Two of these

vessels were hijacked, 37 boarded

and five fired on board. Five more

attempted attacks were reported.

There were 12 reports off the

Africa’s west

coast, including

the hijacking of

two vessels with

39 crew taken

hostage and two


Security on the


The impossibility

of securing all

main roads, rivers

and open seas means the ships,

trucks and trains they convey need

to be equipped to detect threats

themselves. Advance warning

offers the chance to evade, deter

or repel an intruder.

A European Commissionbacked

research project called

ARENA, short for Architecture

for Recognition of thrEats to

mobile assets using Networks of

Affordable sensors, has attempted

to deliver a solution which could

work in a wide range of transport

scenarios. There are currently

no affordable early warning or

deterrent technologies to address

the threat.

FOI, the Swedish Defence

Research Agency, co-ordinated

the seven-strong research

partnership drawn from five EU

countries. FOI’s partners were:

Leading international maritime

design and engineering company,

BMT Group; ITTI, an IT company

from Poland; hi-tech firm SAFRAN

Sagem Défense Sécurité of

France; electronic security


the Netherlands Organisation for

Applied Scientific Research (TNO);

and the University of Reading, in

the UK.

The project is coming to a close

next month at the end of its threeyear

lifespan. Over that time the

project sought to investigate a

system applicable to a range of

different deployments: stationary

platforms relative to the land, such

as a truck or train stop; stationary

platforms relative to the sea, such

as ships in port or oil rigs; mobile

platforms relative to land, such

as trucks or trains in transit; and

mobile platforms relative to the

sea, such as ships at sea or oil rig

support vessels.

Its research built on existing

work on the surveillance of

public spaces. No new sensor

development was done. Instead,

the team focussed on exploiting

existing, low-cost sensor

technologies like visual and

infra-red video, acoustic sensors,

seismic sensors and radar. It also

built on other work, such as the

Integrated Mobile Security Kit

where a multi-sensor surveillance

system is installed in a van

which can be brought to public

space when needed. Another

contributing technology, known as

ADABTS (Automatic Detection of

Abnormal Behaviour and Threats

in crowded Spaces), addresses

automatic detection of abnormal

human behaviour that might

signal crime is afoot. And another,

called SECTRONIC, is a 24-hour

small area surveillance system for

maritime application.

ARENA also aimed to minimise

nuisance the system might

cause if it were to go off for no

reason. Humans are naturally

good at putting together lots

of fragmentary information and

12 - World Security Report

World Security Report - 13



signals and spotting what is a

threat and what is not. Machines

on the other hand are not.

The ARENA system combined

complementary sensors to reduce

false alarm rates. The threatdetection

task was also broken

down into four interconnected

steps: object detection, object

tracking; event recognition; and

threat recognition. The fewer the

bystanders to the vehicle, the

easier the system could interpret

what is going on, meaning that it

would be easier to detect a threat

in a quiet railway siding than when

standing by a busy platform. For

the same reason, trains may, on

the whole, prove easier to protect

than trucks, which often park in

places where there is innocent

foot traffic.

The project also tackled the

sensitive legal and ethical issues

involved in surveillance and

electronic security, particularly

those revolving around privacy. It

will be crucial to have the consent

of the driver for any camera

system which secures a vehicle

on the basis of facial recognition.

Facial recognition cameras were

only used in the cab of a vehicle,

so presented no challenge in

respect of the privacy of passersby.

ARENA’s innovative combination

of existing surveillance technology

provides autonomous monitoring

The Homeland Defense and Security Database

and situational awareness of the

environment surrounding critical

mobile assets, alerting personnel

to threats. In achieving this goal

it has the potential to fill the

yawning security gap between

harbours, depots and garages,

currently a cash cow for criminals

and potentially a loophole

exploited by terrorists.

There has been an uneasy

acceptance that piracy, hijacking

and thefts are facts of commercial

life, particularly when trading in

some parts of the world. But a

growing refusal to accept this

situation has helped to put the

issue to the top of the EU agenda.

ARENA may signal the beginning

of a fundamental shift in the

balance of power away from

criminals, improving the safety of

transport personnel and ultimately,

cutting costs for everyone.

Delta R Detection – Is this the magic bullet for airport security screening?

In the aftermath of 911

increasingly rigorous

screening procedures

have struggled to keep

with the high demand at

airport security and parcel

screening checkpoints.

What was needed was an

automated high speed

detection technologies that

can process large volumes

and be implemented with

little or no need for human


Working with experts in

materials and computer

science from the University

of Florida Delta R

Detection has developed a

highly adaptable detection

platform for sensing

dangerous chemicals on

the surface of objects. This

technology has successfully

been applied to rapidly

scan baggage and cargo

for explosives.

This fully automated, high

speed system solves the

“needle in the haystack”

problem of detecting

explosives for the air

transportation, parcel

and cargo industries. The

combination of sensitivity

and high throughput

makes the system ideal

for baggage and parcel


The Delta R Detection

automated carry-on

baggage scanner can

be placed directly in line

with any existing x-ray

machines. It uses a non

invasive optical sampling

technique to detect trace

quantities of explosives.

Luggage is simply placed

on to the conveyer belt

the way it would be at

an existing checkpoint

but it is simultaneously

scanned for microscopic

amounts of explosive. It

plugs directly into existing

infrastructure with no need

for an additional operator

and scans every carry-on

bag for trace quantities of a

broad range of explosives

with a low false positive

rate without increasing

wait time at security check


Dr. Thierry Dubroca,

CEO Delta R Detection

said, “We have used the

scientific discovery from

the University of Florida

to build a fully functioning

prototype (currently

being demonstrated at

Schipol Airport, in The

Netherlands). Using

ultra violet spectroscopy

we can now identify

unique signatures of

explosives. For example

we can now detect sub

microns grams of TNT

on the surface of bags

and parcels. Our current

ODSecurity sells 3 SOTER Through-Body Scanners to Hong Kong

Correctional Services

prototype automatically

detects explosives thanks

to a custom designed


Dr Esen Yuksel, Research

Scientist, University of

California said, “We

have designed a unique

software for this low level

of detection. With our

high speed computing

techniques and state of the

art classification algorithms

we are able to provide very

low false alarm rates at very

high speeds. We will have

the ability to upgrade our

software to detect future

terrorist threats.

Delta R Detection plan

to turn the prototype to

a product by bringing

the hardware sensor and

optical component to meet

larger customers needs,

such as higher sensitivity,

and speed. is the only global

homeland security directory published in

English, Arabic and Spanish on the web and

Advertise on

in CD network format.

from only £515 for 12 months

Contact for details

14 - World Security Report or call +44

(0) 208 144 5934.

The Global Security Portal

Netherlands based

security manufacturer,

ODSecurity has sold 3

units of the SOTER RS

Through Body Scanner

to the Hong Kong

Correctional Services,

CSD (Correctional Services

Department) for use in

drug interdiction within a

number of high security

custodial establishments.

The use of Through

Body Scanners in prisons

is regarded as the

most effective way of

countering the smuggling

of items such as drugs,

mobile phones, weapons

and other contraband

material without

subjecting inmates and

visitors to intrusive body


The SOTER RS is a low

dosage full body scanner

which combines ultra low

radiation with maximum

visibility, for use at airports

and prisons. Within

seconds the SOTER RS

reveals hidden items, such

as weapons or narcotics,

diamonds, or any stolen

or smuggled goods. It

doesn’t even have to be

metal. The SOTER shows

a clear difference between

human tissue and other

materials, even ingested

or camouflaged items will

be shown.

The scanners will increase

the level of security

operations previously

possible through the use

of conventional metal

detectors. Non metallic

objects hidden under

clothes, in natural cavities

or within the human

body cannot be detected

by conventional metal

detectors and typically,

these non-detectable

items, such as narcotics,

explosives, precious

stones, plastic weapons,

or other contraband,

can only otherwise be

detected by highly

intrusive total body


World Security Report - 15



Smiths Detection Wins USD 17.6 (SAR

65.9) Million Order from Key Saudi

Arabian Security Establishment

Smiths Detection has won a

USD 17.6 (SAR 65.9) million

contract to supply a range

of advanced equipment to

one of the key Government

security institutions in Saudi


The order includes

HCVG high energy cargo

screening system; CIP 300

Car Inspection Portal; HI-

SCAN 6040aTix explosives

detection X-ray system;

and IONSCAN 500DT and

SABRE 5000 explosive

and trace detection

systems. Smiths Detection

will also train the Saudi

entity’s staff as part of the

agreement. The identity

of the institution cannot

be revealed for security

Ophir Optics launches two new products for Homeland Security

At this year’s Eurosatory

exhibition, Ophir

Optics launched two

new infrared imaging

optics for homeland

security and defence


The SupIR 15-60 mm

is a super-compact,

motorized, continuous

zoom lens designed

especially for lightweight


Edward Christie, Managing

Director - Smiths Detection

Middle East, said: “Saudi

Arabia is a key market

for us in the Middle East

and we are thrilled to start

our collaboration with a

key Government entity.

This is an exceptional

opportunity to demonstrate

the effectiveness of Smiths

Detection products for

critical premises. It shows

that wherever there is

the need for identifying a

combination of chemical,

biological, radiological,

nuclear and explosives

threats, we can provide

the complete solution and


BAE Systems joins ‘big data’

research to boost Australia’s

national security

BAE Systems has become

an industry partner of

the $88 million ‘big data’

Cooperative Research

Centre (CRC).

The Data to Decisions

CRC will start 1 July 2014

to research and develop

tools that seek to maximise

the benefits of ‘big data’

for Australia’s defence and

national security sector.

BAE Systems will

contribute $1 million and

in-kind support over the life

of the five-year program.

Mr Kim Scott, BAE

Systems Australia Director

– Business Development

and Land & Integrated

Systems, said “investing in

the latest technology will

be necessary to provide

timely and accurate

intelligence in the future”.

“Big data comes from

many sources at an

alarming velocity, volume

and variety, which makes

it difficult to analyse using

current technologies. Large

amounts of text, images

systems like minicopters

and micro

UAVs. The diffractionlimited

optical design

is optimized for

LWIR sensors up to

640x480 pixels and

resolution down to

17 micron pixel size.

It has a ruggedized

structure to assure

performance is

maintained in

and audio are rapidly

generated all the time

through digital processes

and social media,” said Mr


Advances in technology

allow BAE Systems to

piece together disparate

data and present it in an

easy-to-use format for

decision makers.

The Data to Decisions

CRC’s research will inform

the Company’s integrated

systems and software

development programs to

deliver data analytics, highspeed

distribution and

secure sharing for Defence

and security customers.

The CRC is funded partly

by the Commonwealth

through a grant, and

partly through cash and

in-kind contributions from

defence, industry and

university participants. The

national headquarters is in

South Australia with teams

in Victoria and New South


harsh environmental

conditions and high shock


The SupIR 2.6mm is ideal

for situational awareness

and surveillance

applications. These highperformance

lenses can

support LWIR sensors up

to 1024x768 pixels, with

resolution down to 12

micron pixels.

Stratech’s iVACS to deploy 30 more systems to the Middle East

Singapore company

Stratech Systems has

announced that it is to

deploy another 30 or more

of its iVACS® intelligent

Vehicle Access Control

Systems in the Middle East.

At least 25 iVACS will be

deployed in a Smart City

Project for one of the

prominent capital cities in

the Middle East. It will be

part of a Security Program

designed to establish a

fully integrated security

solution for a diversity

of onshore, coastal and

offshore critical assets

across the customer’s


This coincides with the

worldwide trend of

increasing take up rates

for such systems. Previous

orders for iVACS used to

involve just a handful of

units each, but nowadays,

relatively large orders such

as this are becoming more


A new tool in the fight against the VBIED

British company e2v

have developed the

RF Safe Stop system,

a vehicle immobilising

system designed to bring

vehicles of all types to a

halt using a blast of high

power magnetrons. It uses

the pulse to disrupt the

electronics of the target

vehicle to stop the


The system can

be mounted

on vehicles,

such as an

SUV, or in fixed


such as vehicle


at critical


buildings and


Combined with traffic

management barriers the

system would an invaluable

tool in the battle to prevent

Vehicle Bourne Improvised

Explosive Devices (VBIED’s).

One of the most deadly

and effective tools in the

terrorist arsenal!

e2v have developed

iVACS® screens vehicle

undercarriages for

potential security threats

such as IEDs – improvised

explosive devices. Stratech

under vehicle surveillance

system, is capable of

“intelligent” inspection

of vehicle undercarriages,

demonstration hardware

with proven effects for

engine stopping and

disruption by utilising

e2v’s patented switching

products in conjunction with

high power magnetrons,

and carefully packaging

these with appropriate

antennas. This design

and provides alerts when

suspicious foreign objects

or abnormalities are

detected. iVACS® also

performs identification

screening for the driver and

passengers in the vehicle

using biometrics providing

a comprehensive solution

at screening checkpoints.

The system is also Network

enabled, which is very

useful for large, networked

deployments such as Smart

City Projects or secure

facilities with multiple

entrances and exits.

Networking the system

means that multiple secure

facilities and command

and control of these secure

facilities can share their


approach has resulted in a

flexible solution which can

be rapidly adapted to suit

specific customer needs

and achieve optimum


The system is also being

trialled for boats and even


16 - World Security Report

World Security Report - 17



New innovations in physical

protection from Technocover

Technocover has

introduced a series of

innovations across its

UltraSecure range of

LPCB approved security

equipment, billed as

the next generation

of intelligent physical


The company has been

working with clients and

technology suppliers to

advance the functionality

of its high security doors,

enclosures, access covers

and associated products to

support strategic security

and operational efficiency

on the critical national

infrastructure (CNI) site.

New state-of-the-art access

control offers scope to

integrate UltraSecure

equipment with central

access management of

multiple sites. Options

include fob, keypad

and radio-frequency

identification (RFID)

activated locks, with

features such as personnel

ID and hierarchical access

control, failsafe or failsecure

functions, and timed access


Also new is an 8 point

wheel lock for UltraSecure

Sentinel doors, plus LCD

privacy glass viewing

panels, switching from

frosted to clear. An

innovative padlock

with solenoid control is

now available on new

UltraSecure doors or for

retrofitting to existing units.

Simplifying sitework and

project management

is a new generation

of UltraSecure kiosks,

delivered ready-assembled

and fitted out with M&E

services for fast installation

and easy connection to

mains power. They come

with factory-fitted access

control data exchanges,

vision panels, lighting,

heating and ventilation

services, plus an aesthetic

new lining made from

environmentally friendly,

premium recycled HDPE

plastic (also available

on other UltraSecure


Advances in horizontal

access include an

UltraSecure roof access

hatch with remote control

of opening/closing via

a motorised actuator.

The latest UltraSecure

flush fitting access cover

incorporates a

3-tier design

with inspection

hatch, fall

arrest system

and anticontamination

features for


tanks and


ADANI launches new integrated

door access full body scanner

ADANI has officially

launched the new Conpass

DA integrated double door

access full body scanner.

The Conpass DA (Door

Access) offers an integrated

access control solution

which has the capacity

to detect a wide range

of organic and inorganic

objects concealed under

clothing, in bags or hidden

in the anatomical cavities

of inspected individuals.

The product is one of

the latest and most

advanced versions of the

internationally successful

ADANI Conpass full body

scanner. The Conpass

DA has the following

unique features which

highlight its advantages

as a tool for enhancing

security: Discrete selective

scanning of visitors and

staff; Opportunity to

hold a suspect inside the

booth; Remote operation;

Bulletproof construction

option; Integrated 2

way communication and

internal CCTV option

The system can be

integrated into existing

entrance infrastructure

and access control system.

Therefore providing

maximum effectiveness

and improving efficiency

of operational procedures

of the security checkpoint.

This model of full body

scanner is designed to

be used at VIP facilities,

military bases, critical

infrastructure sites and any

other applications where

there is a need for the

highest level of security

and visitor inspection.

The advanced technology

used in Conpass

makes screening

safe for operators

and individuals

being scanned. All

Conpass systems

are compliant with

ANSI 43.17-2009

regulations and that

justifies its use for

general public.

Simon Lyster,

Managing Director, ADANI

Limited said ”The demand

for more complete

personnel screening

solutions is increasing in

a variety of markets as a

result of a mixture of events

and the realization by the

enforcement agencies

that the technology exists

to safely screen for a

wide range of banned

and dangerous items.

The ADANI Conpass DA

offers a unique capability

for discreetly scanning

individuals entering sites

where there is an issue of

contraband smuggling or

a constant security threat.

At ADANI, we have always

been proud of the fact

that we offer a flexible

approach to meeting the

customer’s needs.”

Axis announces full-featured fixed

network cameras with WDR in HDTV


Axis Communications

introduces new additions

to its successful AXIS Q16

Series. The latest cameras

offer a number of new

capabilities including

wide dynamic range (Axis’

WDR-Forensic Capture*),

Lightfinder, HDTV 1080p

resolution, electronic image

stabilization and shock


“Airport, train station,

government and perimeter

protection are some

examples of situations

where image quality

is critical to minimize

investigation times and

to protect assets – even

if the lighting situation is

extremely difficult,” says

Erik Frännlid, Axis’ Director

of Product Management.

”The new AXIS Q1615

cameras not only offer full

HD resolution but also

automatically switch settings

between high dynamic

scenes and Lightfinder

mode, ensuring all details

are captured in dark and

bright areas at the same

time. The new cameras are

also our first fixed cameras

to provide 50/60 frames per

seconds in HDTV 1080p

resolution. This is twice the

normal frame rate, which

allows the cameras to even

better record smooth video

when people or vehicles are

moving fast.”

In addition to the ability

to seamlessly transition

between WDR, Forensic

Capture and Lightfinder

mode, the indoor AXIS

Q1615 and the outdoorready

AXIS Q1615-E

offer several image

processing features to

enhance image usability,

such as barrel distortion

correction, electronic image

stabilization for steady

images in an environment

with tough vibrations. In

addition, the fixed cameras

also support high profile in

H.264 and enhanced Max

Bit Rate controllers which

assure that the bandwidth

remains within the defined


International Procurement Services

announce the completion of contract

to an unspecified European Police

Force, with a total contract worth in

excess of 500,000 GBP

The contract to supply

a complete range

of countermeasure

equipment and training

includes OSCOR Green,

ORION 2.4 NLJD and



Spectrum Analyser can

detect illicit eavesdropping

signals, perform site

surveys for communication

systems, conduct radio

frequency emissions

analysis and investigate

misuse of the RF spectrum.

It can be connected to

remotely, enabling the

operator to monitor away

from the equipment and

data files collected can be

saved to external devices

offering the ability to

export data and produce

reports on activity.

The ORION 2.4 Non

Linear Junction Detector

is latest completely

new lightweight version

weighing just 1.4kg (3lbs)

will detect the presence of

electronics as small as SIM

cards or mobile phones,

regardless of whether

the electronics target is


hard wired,

or even

turned off.

The Talan



Analyser is

the most






Analyser. It

has been


to detect

illicit taps and bugs on

either analogue or digital

telephone lines. With new

enhancements built into

the software interface,

users can also now test

internet protocols (IP)

packet traffic on voice-over

Internet Protocol (VoIP)

phones and systems,

define advanced filtering

options, and data can now

be stored and exported to

USB or Flash as data files

for analysis or reporting


18 - World Security Report

World Security Report - 19



Real-Time HD Video Stabiliser: Taming a harsh visual environment

Real-time video stabilisers

are critical for applications

such as UAV guidance and

surveillance, where camera

shake from an unsteady

platform would otherwise

render the video unusable.

The traditional mechanical

approach of stabilising

video, by physically moving

the optics or the sensor, is

expensive and bulky with

performance deteriorating

as image magnification

increases. In contrast,

digital electronic stabilisers

are much smaller, lighter,

considerably more power

efficient and operate

robustly, irrespective of


Saab signs contract to provide maintenance support for the electronic security

system for the Southern Queensland Correctional Centre

Defence and security

company Saab has

received a contract to

provide the planned and

corrective maintenance

and capital expenditure

works for the electronic

security system for

the 300 bed Southern

Truly high performance,

high-definition (HD) realtime

video stabilisation

has been an elusive

technology because, until

recently, it has required

the processing power of

a small super computer

to implement. The

market needs a single chip

solution that can operate

robustly in extremely harsh

environments using only a

few watts of power.

RFEL has created a

solution in the form of an

electronic video stabiliser

that continuously processes

over a billion bits of

information every second

and tracks the movements

of several hundred

independent image

regions every video frame.

This software also includes

intelligent processing to

Queensland Correctional

Centre. The contract has

a total value of MSEK


Located near Gatton

in the Lockyer Valley

and opened in January

2012, the 300-bed

counter poor illumination,

bland scene content and

extraneous movements,

such as the swaying

of trees, which would

otherwise compromise


This state-of-the-art,

real-time, HD video

stabiliser IP is suitable for

compact, lightweight,

and low power hardware

platforms. The solution

is capable of adapting

to its environment and

can be optimised to

the application, while

supporting a diverse range

of cameras. It can be

implemented into a range

of low power hardware

platforms, including RFEL

products, which have

been proven in a range

Southern Queensland

Correctional Centre is

the State’s newest prison.

The electronic security

system was originally

installed by Saab in the

centre and has been

under comprehensive

maintenance since the

of demanding real world


This Video Processing

Solution can be combined

with other IP and run on

RFEL’s HALO platform,

which can combine

several key functions that

add value to the user,

including, video scaling,

image stabilisation, fusion,

contrast enhancement,

Picture in Picture overlay

and correction of lens


One core functionality,

providing image fusion

between two sensors is

completely different from

simple image blending.

RFEL’s state-of-the-art

fusion algorithm processes

the images captured by

two sensors, generally

from different wavelengths,

and is able to maintain

the best attributes from

both input images for the

resulting output. This, in

combination with image

stabilisation, provides the

user with the best view

possible for informed


facility opened. The

system provides an

integrated surveillance

picture and total control

of security sensors and

locks within the prison


Operation Henry to be rolled out across 9 regions of England

Operation Henry is a

campaign to crack down

on the supply of illicit

tobacco in nine regions in


In a partnership between

the Trading Standards

Institute (TSI) HM Revenue

and Customs (HMRC local

council authorities and

Wagtail UK, a substantial

amount genuine tobacco

and cigarettes, counterfeit

tobacco and cigarettes and

Shisha tobacco.

Operation Henry, runs from

April through September

2014, and aims to crack

down on the supply of

illicit tobacco across nine

regions in England. Each

region receives eight days

of dog detection provided

by Wagtail UK and funded

by the Department of

Health. The Operation is

managed TSI.

This partnership allows

The new HoverMast-100 from Sky Sapience, in Israel, could prove a real

winner with border guards, CIP and security personnel the world over.

The HoverMast-100 is

a tethered Unmanned

Aerial Vehicle (UAV)

which means it

combines all the obvious

advantages of a UAV

without the associated

problems, such as civil

certification, launch,

recovery and training.

It is simply launched at

the press of a button,

deploys to a height of 50

meters and is recovered

in the same way.

It can be installed

and launched from

trading standards officers

to identify illicit tobacco

‘hot spots’ by combining

intelligence from HMRC

and trading standards.

Leon Livermore, chief

executive of TSI, said: “This

partnership is one more

example of how trading

standards works with the

private and public sector

to protect consumers and

support legal business

practices. Through this

partnership, trading

standards has a unique

opportunity to share

information and develop

intelligence with the aim of

taking illicit tobacco off the


‘HMRC works closely

with other enforcement

agencies to crack down

on illicit tobacco in

the UK,’ said Richard

Las, deputy director of

Criminal Investigation

for the HMRC. ‘Seizing

illicit product is only one

most small service

vehicles, such as

pick-up trucks, UGVs,

even boats. The

HoverMast is ideal

for border patrol,

homeland security

and civilian security


The system is

comprised of an

aerial platform, base

unit, and external

power source, all of

which are compact

and lightweight. The

aerodynamic platform

is produced from

of the tools used; the

focus is on using a range

of interventions, from

penalties to prosecutions,

to encourage compliance

and maximise deterrent.

Partnership working with

Trading Standards is vital in

order to share intelligence

and collaborate on

joint exercises such as

Operation Henry to

target those areas with

the highest levels of illicit

tobacco activity.’

“Those involved in dealing

in illegal tobacco may

be encouraging people,

including children to smoke

by providing a cheap

source. The detection

dogs can find tobacco

and cigarettes even if

hidden in the most unlikely

places. Offenders need

to know that they will

face consequences if they

choose to deal in these

illegal products.”

advanced composite

materials impregnable

to water and dust.

In fact, the entire

system complies with

international standard

IP65. It hovers 50 meters

above the host vehicle

with the help of two main

rotors that give it its main

thrust and four smaller

side rotors, used for

guidance and additional


Its stability in winds of

up to 25 kn is achieved

by the use of separate

subsystems working >>

20 - World Security Report

World Security Report - 21



>> in tandem.

The aerial platform is

secured to the base unit

via a cable which serves as

a power supply and data

link. A silenced generator

powers the system

enabling continuous 24/7

operation. The machine

itself is relatively quiet

and passive; emitting

no electronic signals. It

should be emphasized

again that as the

HoverMast is tethered, it

is not bound by any of the

air control regulations that

bind standard unmanned


The system can host a

wide range of payloads.

It can host any payload

weighing up to 6 kg,

including CCD/IR cameras,

radars, laser designators,

4th-5th March 2015

The Hague, Netherlands

For exhibting and sponsorship queries

please contact:

Tony Kingham

Exhibit Sales Director

T: +44 (0) 208 144 5934

M: +44 (0)7827 297465


For conference queries contact:

Neil Walker

T: +44 (0) 7725 318601


relays, cellular antennas,

and hyperspectral

sensors. Additionally, it

can receive COMINT and

ELINT. With the ability

to operate on land and

at sea, even while the

vehicle is in motion, the

HoverMast-100 enables

target detection, location,

and identification as well

as autonomous tracking.

Target coordinates

and video images

are transmitted within

seconds and without the

need of an experienced

operator via its wide

band communication link,

relaying critical data to

selected recipients in real


The HoverMast is already

in operation with the Israeli

Defense Force.


Abstract Submittal Deadline - 31st July 2014

Submit your abstract online at

If you travel abroad for your work, or if you are responsible for your team that travels

or works abroad, are you aware of the legal implications surrounding duty of care for

travelling personnel?

Understand the increasing threats faced by international travellers on duty/employed

by companies operating abroad, and what you can do to prepare for the possibilities at

Personnel Protection & Safety Europe.

Media Partners:

Police in Chennai have implemented

‘Face Recognition’ in a Crowd


The Police in Chennai have

positioned themselves

at the forefront of Smart

City Surveillance having

implemented iOmniscient’s

Face Recognition in a

Crowd system in a part of

this city, the sixth largest in


The system installed in the

T. Nagar Market enables

the police to recognize

people of interest outdoors

in a totally uncontrolled

environment and to track

them as they show up on

different cameras.

Mr. Senthil

Manickavasagam, M.D.

Supporting Organisations:

of Mars Electronics

who implemented the

system said, “The main

requirement from the

electronic surveillance

used for public safety

was that it must function

in a difficult outdoor

environment. We faced

a big problem with this.

The many technologies

we tried from Russia, USA

and Europe worked well

when used in a controlled

setting indoors, but in the

practical crowded scene

of an Indian marketplace,

nothing worked. Then we

implemented iOmniscient’s


Defendec releases HD Camera for situational awareness platform Smartdec

Defendec have released a

new high capability camera

module for situational

awareness platform

Smartdec at Eurosatory

2014, bringing significant

improvements to its system

for users in the field.

Smartdec, the defense

and security company’s

flagship product, uses a

network of small wireless

cameras linked to motion

sensors that send visual

confirmation to end users

in a matter of seconds.

The system upgrades

provide a HD picture

with a HDR capability,

increase the speed of

image transmission and

alarm arrival time and

increase the distance of

the detectors from the

main bridge enhancing

the system’s overall


The Smartdec system

consists of a series of small,

lightweight, and easily

camouflaged detectors

that are equipped with a

camera and long-lasting

batteries, a communication

base unit, and the control

center. When movement is

sensed, the detector sends

a visual confirmation to the

control center. There the

image can be analyzed,

and border patrols can

determine whether or not

to send patrols to inspect

the area.

Smartdec can be up and

running in just two minutes

without any additional

training needed. The

cameras are designed to

be deployed in remote

and rugged terrain where

it is difficult to conduct foot

patrols. The cameras are

programmed to

only recognize


and vehicle


False alarms

for wild animals

have been


This feature

prevents from

wasting time on

nuisance calls. The system

can be operational for

years with only one battery

charge cycle making it

almost maintenance free.

Smartdec’s equipment

is completely wireless so

additional infrastructure

investments are


The detectors are

connected to the GSM

phone network, which

means that most major

towns and cities are

covered. In countries where

GSM coverage is spotty, a

local radio network bridge

can be set up to connect

the cameras to the control


“Smartdec offers border

guard and critical




with limited


and budget


an effective




solution to put an end

to vandalism, human

trafficking, narcotics

smuggling, and other

nefarious activities,” said

Jaanus Tamm, CEO of

Defendec Ltd. “Smartdec

is truly a unique product

that is operational around

the world, and it is

improving remote areas

security every day.”

Since the initial rollout

of the system in 2010,

Smartdec has been

securing borders along

the European Union’s

eastern front, Asia and the

Caribbean. The system has

been proven to help stop

international smuggling,

illegal trafficking, and

acts of sabotage making

it the technology of

choice among border

guards around the

world. Smartdec is also

operational in the critical

infrastructure sector

making the protection

of assets in remote areas

much easier.

Morpho Upgrades Dutch ID

Documents for Greater Security

Working closely with

the Dutch government,

Morpho (Safran)

leveraged its experience

and expertise to develop

highly secure biometric

travel documents and

identity cards integrating

cutting-edge technology.

With new, innovative

security features and

a validity of 10 years,

the latest generation

identification documents

will provide greater

protection against

document fraud.

The ID card and travel

document datapage

now feature Morpho’s

patented Stereo Laser

Image (SLI® technology,

a three-dimensional

image reproducing

the document holder’s

portrait). Designed to

check the authenticity

of the primary image,

this innovative security

feature helps prevent

photo falsification. For

additional security, a laser

perforated number (TLN

- Tilted Laser Number),

visible when tilted against

the light, will be located

on the primary image of

each document.

22 - World Security Report

World Security Report - 23


July 2014


Farnborough Airshow, UK


Asia Defence & Security, Manila, Philippines


RSA Conference Asia Pacific & Japan, Singapore

August 2014


Secutech Vietnam, Ho Chi Minh City, Vietnam


Safety & Security Asia, Singapore

September 2014


General Police Equipment Exhibition & Conference

(GPEC), Leipzig, Germany


SPIE Security + Defence, Amsterdam, Netherlands


Emergency Services Show, UK

29-2 Oct

ASIS International, USA

October 2014


Cyber Security Expo, London, UK


World Cities Conference, London, UK


SC Congress, New York, USA

To have your event listed please email details to

the editor

November 2014


14th Annual AAAE/TSA/DHS Aviation Security

Summit, USA


3rd Homeland Security Show 2014, USA

December 2014


3rd World BORDERPOL Congress, Hungary

January 2015


Intersec Middle East, Dubai

March 2015


Critical Infrastructure Protection & Resilience

Europe, The Hague, Netherlands


Personnel Protection & Safety Europe, The Hague,


24 - World Security Report

More magazines by this user
Similar magazines