World Security Report June 2014
For the latest news, features, essential analysis and comment on security, counter-terrorism, international affairs, warfare and defence
For the latest news, features, essential analysis and comment on security, counter-terrorism, international affairs, warfare and defence
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
For the latest news, features, essential analysis and comment on security, counter-terrorism, international affairs, warfare and defence<br />
<strong>June</strong> <strong>2014</strong><br />
Subscribe Here<br />
The importance of the Internet<br />
infrastructure for every day life.<br />
Port <strong>Security</strong>: The Front Line<br />
Threat Detection and Recognition<br />
Industry News<br />
www.world-borderpol-congress.com<br />
www.cipre-expo.com<br />
www.personnel-protection.com
EDITORIAL<br />
3 rd <strong>World</strong> BORDERPOL Congress<br />
9 th -11 th December <strong>2014</strong><br />
Budapest, Hungary<br />
www.world-borderpol-congress.com<br />
Connecting and Protecting<br />
The <strong>World</strong> BORDERPOL Congress is the only multi-jurisdictional transnational<br />
platform where the border protection, management and security industry policymakers<br />
and practitioners convene annually to discuss the international challenges<br />
faced in protecting not only one’s own country’s borders, but those of neighbours and<br />
friends.<br />
The 3rd <strong>World</strong> BORDERPOL Congress will provide a platform for the world’s border<br />
protection forces and agencies to discuss and debate the current and future issues<br />
and challenges facing the border management, security and migration management<br />
sectors.<br />
We look forward to welcoming you to the wonderful city of Budapest, Hungary<br />
in December <strong>2014</strong> for the next gathering of border and migration management<br />
professionals.<br />
For further details and to submit your abstract visit www.world-borderpol-congress.com<br />
To discuss exhibiting and sponsorship opportunities and your involvement with the<br />
<strong>World</strong> BORDERPOL Congress <strong>2014</strong> please contact:<br />
Tony Kingham<br />
Exhibit Sales Director<br />
T: +44 (0) 208 144 5934<br />
M: +44 (0)7827 297465<br />
E: tony.kingham@worldsecurity-index.com<br />
Paul Gloc (UK & Europe)<br />
T: +44 (0) 7786 270820<br />
E: paulg@torchmarketing.co.uk<br />
Denne Johnson (Americas)<br />
T: +1 918 863 9792<br />
E: dennej@torchmarketing.co.uk<br />
When your staff are<br />
travelling, have you taken<br />
“all reasonable care” of their<br />
safety and security?<br />
Since the last issue of WSR was published,<br />
I am pleased to say we have launched<br />
our latest event, Personnel Protection and<br />
Safety Europe. The reason being, whilst<br />
governments around the world, quite rightly,<br />
spend a great deal of time, effort and money<br />
focussing on keeping the travelling public<br />
safe from attacks by terrorists, the simple<br />
truth is that when travelling we are far more<br />
likely to come to harm as a victim of crime, an<br />
accident or some sort of health emergency!<br />
In fact, if you travel enough, whether it is for<br />
business or pleasure, you are likely to have been<br />
a victim of one or the other, or like me, all three!<br />
I am amazed at how many companies routinely send their personnel off all<br />
over the world without giving their safety a second thought. It concerned me<br />
so much, that back in the day when I ran an international sales department,<br />
I took it upon myself to run travel safety awareness training sessions for my<br />
own staff, which promptly stopped when I left.<br />
What makes it more surprising is that all companies are aware of their ‘Duty<br />
of Care’ to their employees, yet when their staff travel and are at their most<br />
vulnerable, little is done in terms of systems, procedures, equipment or<br />
training to prepare them for what, for some of them at least, is inevitable.<br />
In the litigious world we live in, with the “no win no fee” lawyers, the legal<br />
and financial consequences of not taking “all reasonable care” could be<br />
considerable and for smaller companies potentially disastrous!<br />
So what is “all reasonable care”?<br />
Well that’s something the courts will ultimately decide but at the very least<br />
there should be procedures in place to assess travel risks and to deal with<br />
an emergency when it arises. Over and above that, it could be argued that<br />
some sort of training should be given routinely to staff that travel regularly<br />
and that smart phones and apps offer all sorts of possibilities for tracking<br />
employees movements, provide alerts, emergency panic numbers at<br />
“reasonable” cost! For bigger companies, more comprehensive measures<br />
may be deemed “reasonable”!<br />
What is sure is that companies that do not take “all reasonable care”, do so<br />
at their own risk!<br />
www.worldsecurity-index.com<br />
Editorial:<br />
Tony Kingham<br />
E: tony.kingham@worldsecurityindex.com<br />
Contributing Editorial:<br />
Neil Walker<br />
E: neilw@torchmarketing.co.uk<br />
Design, Marketing & Production:<br />
Neil Walker<br />
E: neilw@torchmarketing.co.uk<br />
Advertising Sales:<br />
Tony Kingham<br />
T: +44 (0) 208 144 5934<br />
M: +44 (0)7827 297465<br />
E: tony.kingham@worldsecurityindex.com<br />
Paul Gloc (UK & Europe)<br />
T: +44 (0) 7786 270820<br />
E: paulg@torchmarketing.co.uk<br />
Denne Johnson (Americas)<br />
T: +1 918 863 9792<br />
E: dennej@torchmarketing.co.uk<br />
Subscriptions:<br />
Tony Kingham<br />
E: tony.kingham@worldsecurityindex.com<br />
<strong>World</strong> <strong>Security</strong> <strong>Report</strong> is<br />
a bi-monthly electronic,<br />
fully accessible e-news<br />
service distributed to 38,000<br />
organisations globally. It tracks<br />
the full range of problems<br />
and threats faced by today’s<br />
governments, armed and security<br />
forces and civilian services and<br />
looks at how they are dealing<br />
with them. It is a prime source of<br />
online information and analysis<br />
on security, counter-terrorism,<br />
international affairs, warfare and<br />
defence.<br />
Co-organisers:<br />
Supporting Organisations:<br />
Media Partners:<br />
Tony Kingham<br />
Editor<br />
<strong>World</strong> <strong>Security</strong> <strong>Report</strong><br />
Copyright of KNM Media and<br />
Torch Marketing.<br />
www.worldsecurity-index.com<br />
<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 3
CYBER SECURITY<br />
CYBER SECURITY<br />
The<br />
importance<br />
of the<br />
Internet<br />
infrastructure<br />
for every day<br />
life.<br />
Every day we read about the single digital market, the importance of a free and open Internet and the need of<br />
trust and security in electronic communications networks. The Internet is an assumed, and for specific services<br />
critical, component of everyday life but yet we still have to develop methodologies to fully assess what are the most<br />
important components from a national and international perspective and how they are structured. This is important<br />
not only in the short term to understand our dependencies on network connectivity but also in the long term to<br />
properly focus efforts for enhancing the resilience of data communication networks.<br />
The Internet infrastructure<br />
is the backbone of the<br />
information society but as<br />
it has become clear in the recent<br />
news, different threats, both<br />
technical and geopolitical, can<br />
hamper its availability. Citizens<br />
expect national authorities and<br />
operators to be fully aware of the<br />
possible interdependencies and<br />
put in place all possible measures<br />
to ensure the security and<br />
resilience of their communications.<br />
To build trust and secure the<br />
future of the information society,<br />
answering the following questions<br />
is becoming increasingly<br />
important:<br />
• What is the Internet today,<br />
how is it organized, what can<br />
we understand from its current<br />
structure, which are the most<br />
important components of it?<br />
• What is a critical service, network<br />
or component in today Internet<br />
infrastructure and how can we<br />
define what is national and what is<br />
cross-border?<br />
• What assets and services are<br />
vulnerable and what happens<br />
to critical services if they are<br />
disrupted?<br />
• How can we enhance security<br />
and resilience of the Internet<br />
interconnections?<br />
Understanding the complexity<br />
of the most complex network<br />
humanity created is a challenging<br />
task. The Internet in 30 years<br />
has changed the way we work,<br />
communicate and interact as<br />
a society and we are still at the<br />
very beginning of this societal<br />
revolution.<br />
It is essential that we are fully<br />
aware of our dependency on<br />
the infrastructure and how it is<br />
organized in each country. This can<br />
also be useful to understand if part<br />
of the assets, belonging to Critical<br />
Infrastructure (CIs), should be<br />
treated with higher requirements<br />
of security and resilience and<br />
the role they play for the global<br />
coherence of the Internet. Any<br />
assessment should be done<br />
from a Critical Information<br />
Infrastructure Protection<br />
(CIIP) perspective and should<br />
involve the Internet operational<br />
community in fostering the<br />
security and resilience of public<br />
communication networks and<br />
in general for the benefit of the<br />
entire Internet. Moreover having<br />
such an understanding could help<br />
every country in establishing a<br />
constructive dialogue with Internet<br />
operators and participate in the<br />
multi-stakeholder discussion on<br />
how to maintain the Internet<br />
globally secure and resilient.<br />
1 Challenges<br />
Every component of the Internet<br />
layers has its own vulnerabilities<br />
and represents a topic of study.<br />
For example<br />
• Physical infrastructure – cable<br />
systems and submarine cables are<br />
critical as well as the dependency<br />
on power supply 1 . Moreover<br />
communications can be tapped or<br />
targeted by specific attacks.<br />
• Hardware – In all the incidents<br />
regarding availability reported to<br />
ENISA in 2012 2 , hardware failure<br />
was the most common cause.<br />
• Software and Protocols – bugs<br />
in protocol implementation and<br />
exploitation of vulnerabilities<br />
as in traffic hijacks are realistic<br />
scenarios.<br />
Looking at the different<br />
components of the infrastructure,<br />
both at physical and at logical<br />
level, the following lists can be<br />
considered as an example<br />
of an initial set of threats that<br />
should be covered in an all<br />
hazard approach (Table 2):<br />
In recent times there have<br />
been several incidents that<br />
can be used as an example<br />
of the threats to which the<br />
infrastructure is vulnerable<br />
(see list below). While these<br />
incidents didn’t affect the<br />
Internet at a global scale<br />
or European scale, the<br />
effects on a local scale<br />
were rather noticeable or<br />
underline the persistence of<br />
known vulnerabilities. They<br />
therefore serve as a reminder<br />
that while the Internet at global<br />
level can be considered resilient,<br />
it cannot be taken for granted<br />
that this is also true for the local<br />
part of the Internet infrastructure<br />
serving a particular region, or<br />
country or involved in a targeted<br />
attack. Even disputes between<br />
private, non-State actors can have<br />
important effects on the local<br />
Internet infrastructure.<br />
Different causes of incidents can<br />
affect the different components:<br />
• Natural disasters and cable<br />
Table 2 – Threats to the physical and logical infrastructure<br />
cuts can affect the connectivity to<br />
specific areas 3 :<br />
• Attempts to block one country’s<br />
connectivity via physical 4 and<br />
network 5 disruption can have<br />
cascading consequences for<br />
Internet users even in another<br />
country due to the cross border<br />
nature of interconnections<br />
• Misconfigurations 6 can cause<br />
temporary and involuntary traffic<br />
reroutes<br />
• Large attacks 7 to specific services<br />
can have repercussions and create<br />
congestion<br />
• BGP hijacks or man in the<br />
middle attacks 8 and attacks to the<br />
DNS infrastructure 9 can be used to<br />
transparently reroute and intercept<br />
traffic or black hole it for a certain<br />
destination 10<br />
2 ENISA Efforts for the security<br />
and resilience of communication<br />
networks<br />
ENISA, the European Union<br />
Agency for Network and<br />
Information <strong>Security</strong> has studied<br />
the resilience of Internet<br />
infrastructure in Europe since<br />
2010, paying attention to both<br />
the technical and organizational<br />
components. The goal is to<br />
provide Member States with<br />
frameworks and resources to<br />
better secure and ensure the<br />
resilience of their networks. The<br />
“Inter-X: Resilience of the Internet<br />
Interconnection Ecosystem 11 “<br />
study was the first step ENISA<br />
took towards studying this area in<br />
2010. In 2011, it was followed up<br />
with a study assessing technical<br />
(e.g. logical, physical, application<br />
layers, replication and diversity of<br />
services and data, data centres),<br />
peering and transit e.g. Service<br />
Level Agreements (SLAs), as well<br />
as market, policy and regulatory<br />
4 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />
<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 5
CYBER SECURITY<br />
CYBER SECURITY<br />
issues.<br />
In 2013, ENISA released<br />
“Understanding the importance<br />
of the Internet Infrastructure<br />
in Europe” 12 continuing<br />
further its work in this area.<br />
The goal of this report is to<br />
foster security and resilience<br />
of the Internet infrastructure in<br />
Europe with particular attention<br />
to critical assets and cross<br />
border interdependencies<br />
and work together with<br />
Internet operational actors to<br />
maintain the Internet globally<br />
coherent, secure and resilient.<br />
The report contains several<br />
recommendations for Member<br />
States, providers of critical<br />
services and European Internet<br />
operational actors:<br />
• Member States should develop<br />
a national overview of the Internet<br />
infrastructure - Using the step by<br />
step guidelines proposed in the<br />
study, Member States are invited<br />
to develop an insight of the<br />
current infrastructure, the Critical<br />
Infrastructure interdependencies<br />
and have a baseline for future<br />
developments.<br />
• Member States should adopt<br />
a standardized methodology<br />
for the identification of Critical<br />
Information Infrastructure assets<br />
and services - In order to correctly<br />
assess the criticality of specific<br />
assets and services, Member<br />
States should be able to adopt<br />
a common methodology for<br />
the identification of Critical<br />
Information Infrastructures.<br />
• Member States should adopt<br />
specific physical infrastructure<br />
guidelines - Any research should<br />
always take under consideration<br />
the physical component and<br />
provide a holistic overview of<br />
the system. When looking at<br />
the physical infrastructure more<br />
specific guidelines should be also<br />
developed.<br />
• Critical services providers should<br />
develop requirements<br />
for high availability<br />
interconnections<br />
for critical services<br />
- During the<br />
discussion with<br />
operators, it was<br />
underlined that if<br />
providers of critical<br />
services consider<br />
some connectivity<br />
relationships as<br />
critical, they should<br />
require for these<br />
interconnections<br />
higher level<br />
of availability,<br />
integrity and confidentiality<br />
in order to enhance the<br />
security and resilience of these<br />
communications.<br />
• National and European<br />
bodies and cyber security<br />
agencies should engage the<br />
Internet community - Due to<br />
the multi-stakeholder nature<br />
of the Internet, we propose<br />
national and European<br />
bodies and cyber security<br />
agencies (active in the area<br />
of security and resilience of<br />
communication networks) to<br />
engage in a dialogue with<br />
the Internet community and the<br />
private sector.<br />
• European Commission and<br />
Member States should foster<br />
research on infrastructure security<br />
and resilience - The more we rely<br />
on electronic communication<br />
networks to build the future<br />
European information society,<br />
the more EU and Member State<br />
should foster research in this<br />
field. Moreover more research<br />
on vulnerabilities of the core<br />
components of the global Internet<br />
Infrastructure such as DNS and<br />
BGP is needed.<br />
• European Internet operational<br />
actors should share information<br />
about incidents affecting physical<br />
and logical infrastructure -<br />
European Internet operational<br />
actors are invited to share<br />
information on incident affecting<br />
physical and logical infrastructure<br />
and use it to develop good<br />
practices for the benefit of the<br />
entire community.<br />
In <strong>2014</strong> ENISA will follow up the<br />
2013 report with the following<br />
actions:<br />
• focusing on the identification<br />
of CIIs assets and services,<br />
physical and logical infrastructure<br />
vulnerabilities, procurement<br />
guidelines for CIIs operators and<br />
cross border cooperation<br />
• developing a threat landscape<br />
of the physical and logical layer of<br />
the Internet infrastructure<br />
• fostering the ENISA’s Internet<br />
infrastructure security and<br />
resilience reference group<br />
which aims to gather subject<br />
matter experts<br />
from the Internet<br />
operators’ community,<br />
Cybersecurity<br />
agencies, NRAs,<br />
contingency agencies<br />
and infrastructure<br />
security and resilience<br />
experts.<br />
The goal is to develop<br />
infrastructure security<br />
and resilience not<br />
only for securing<br />
European citizens but<br />
also the entire Internet.<br />
The Internet is an<br />
ordinary component<br />
of everyday life and<br />
considering news regarding<br />
recent threats, it is important to<br />
assess the current situation and<br />
ensure the security and resilience<br />
of citizens’ communications.<br />
Moreover, future scenarios<br />
such as the Internet of Things 13 ,<br />
Interconnected Mobility 14 and<br />
Smart city 15 are at their very<br />
beginning and are built on<br />
these same communication<br />
networks. In this respect, every<br />
citizen is a potential Internet<br />
user as far as a service relies<br />
on an Internet connection. For<br />
these reasons ENISA believes<br />
that is important to investigate<br />
how the interconnections are<br />
structured and understand what<br />
is critical in order to focus efforts.<br />
Communication networks are the<br />
building blocks of the information<br />
society and it is clear that the<br />
absence of knowledge regarding<br />
the underlying infrastructure could<br />
severely hamper not only securing<br />
current communications but also<br />
the preparing for future threat<br />
scenarios.<br />
1<br />
ENISA (2013), Power Supply Dependencies in the Electronic Communications Sector<br />
2<br />
ENISA (2013), Annual Incident <strong>Report</strong>s 2012 - Analysis of Article 13a annual incident reports, 2013<br />
3<br />
Massive Flooding Damages Several NYC Data Centers http://www.datacenterknowledge.com/archives/2012/10/30/majorflooding-nyc-data-centers/<br />
4<br />
Mediterranean Cable Disruption as Seen in RIPEstat https://labs.ripe.net/Members/mirjam/mediterranean-cable-disruption-asseen-in-ripestat<br />
5<br />
Dainotti, A., Squarcella, C., Aben, E., Claffy, K. C., Chiesa, M., Russo, M., & Pescapé, A. (2011). ‘Analysis of country-wide Internet<br />
outages caused by censorship’. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (pp.<br />
1-18). ACM<br />
6<br />
YouTube Hijacking: A RIPE NCC RIS case study http://www.ripe.net/Internet-coordination/news/industry-developments/youtubehijacking-a-ripe-ncc-ris-case-study<br />
7<br />
ENISA (<strong>2014</strong>) Large scale UDP attacks: the <strong>2014</strong> trend and how to face it https://www.enisa.europa.eu/publications/flash-notes/<br />
large-scale-udp-attacks-the-<strong>2014</strong>-trend-and-how-to-face-it<br />
8<br />
Cowie, J, (2013) The New Threat: Targeted Internet Traffic Misdirection http://www.renesys.com/2013/11/mitm-Internet-hijacking/<br />
9<br />
Google’s Public DNS intercepted in Turkey http://googleonlinesecurity.blogspot.in/<strong>2014</strong>/03/googles-public-dns-intercepted-inturkey.html<br />
10<br />
Toonk, A. (2013) Accidentally Stealing the Internet http://www.bgpmon.net/accidentally-stealing-the-Internet/<br />
11<br />
ENISA (2010) https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/interx/report<br />
12<br />
ENISA (2013) Understanding the importance of the Internet Infrastructure in Europe - Guidelines for enhancing the Resilience of<br />
eCommunication Networks http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/<br />
guidelines-for-enhancing-the-resilience-of-ecommunication-networks<br />
13<br />
Digital agenda for Europe http://ec.europa.eu/digital-agenda/en/internet-things<br />
14<br />
Vision of an interconnected Europe http://ec.europa.eu/news/transport/110328_en.htm<br />
15<br />
Smart Cities and Communities http://ec.europa.eu/eip/smartcities/<br />
6 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />
<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 7
PORT SECURITY<br />
PORT SECURITY<br />
Port<br />
<strong>Security</strong>:<br />
The Front<br />
Line<br />
Once upon a time commercial ports only had to deal with three key threats on a daily basis - theft, damage to goods<br />
and stowaways all of which have the potential to cause considerable financial damage to stakeholders but were<br />
identifiable and manageable. The contemporary port is subject to a far wider range of threats including the possibility<br />
of terrorist attack and has to respond accordingly while managing and responding to a plethora of local, national<br />
and international legislative requirements. The diversity of responses, systems and processes to tackle each separate<br />
threat combined with the demands of compliancy has made the job of the Port Facility <strong>Security</strong> Officer (PFSO)<br />
onerous to the point of breaking.<br />
<strong>Security</strong> expert and former Chairman of the <strong>Security</strong> Development Board Rotterdam Port, Henk van Unnik, explains<br />
how a lack of cohesion has resulted in the current scenario and that a solution to the problem has been developed<br />
through the <strong>Security</strong> UPgrade for PORTs (SUPPORT) research & development project which is part-funded by the<br />
European Commision’s FP7 <strong>Security</strong> Research Programme. He explains how the appropriate management of<br />
resources can be co-ordinated and deployed to improve efficiency, effectiveness and port security.<br />
With 90% of EU’s<br />
external trade and<br />
40% of internal<br />
trade transported by ship, the<br />
contemporary sea port is a vital<br />
cog in the massive machine<br />
that is 21st Century commerce.<br />
Unsurprisingly, port infrastructure<br />
and the 3.5 billion tonnes of<br />
freight that flows through EU<br />
facilities are vital to maintaining<br />
both global and individual<br />
countries’ economic wellbeing.<br />
The potential threats to port<br />
security come on many different<br />
levels from a range of groups<br />
and individuals with very different<br />
aims and objectives. Theft, fraud,<br />
corruption, drugs trafficking and<br />
people trafficking are all major<br />
issues for port security, especially<br />
when their motivation can be<br />
traced back to organised crime or<br />
terrorist groups. The combination<br />
of sophisticated organised crime,<br />
the heightened risk of terrorist<br />
activity and the ongoing threat<br />
of low level crime ensures that<br />
ports are under threat 24 hours<br />
per day, 365 days per year. Well<br />
Henk van<br />
Unnik,<br />
Chairman,<br />
<strong>Security</strong><br />
Development<br />
Board<br />
Rotterdam<br />
Port<br />
organised criminal gangs now<br />
have access to enough money,<br />
knowledge and skills to develop<br />
considerably more complex<br />
modus operandi. Where in the<br />
past, criminal organisations would<br />
use bribery or extortion to secure<br />
access, information or control of<br />
a particular shipment, recently<br />
there has been a move to bypass<br />
the human element and hijack<br />
the technology. Recent events<br />
at a Northern European port<br />
have demonstrated how easily<br />
a fully automated logistics chain<br />
can be manipulated if security is<br />
breached. Rather than having to<br />
run the risk of ‘stealing’ a container<br />
and getting through port security,<br />
or leaving a trail of names or<br />
addresses that can be followed up<br />
by law-enforcement agencies later,<br />
cybercrime ensures that all the<br />
key physical checks appear 100%<br />
legitimate at the dock gate, but<br />
can be wiped clean electronically,<br />
removing all trace. Faced with<br />
such innovative and complex<br />
criminal activity, port security<br />
needs to raise its game.<br />
While the baseline level of port<br />
security has certainly improved<br />
since the relaxation of border<br />
security between mainland-<br />
European countries in 1995, there<br />
are still major variations between<br />
different facilities. Some of this can<br />
be attributed to experience, some<br />
is driven by national or regional<br />
culture but some is due to the way<br />
legislation has been applied.<br />
The legislation that defines<br />
port security is the International<br />
Maritime Organisation’s (IMO)<br />
International Ship and Port facility<br />
<strong>Security</strong> code (ISPS) which, in turn,<br />
is part of the Safety of Life at Sea<br />
(SOLAS) regulations. Developed<br />
in the aftermath of the September<br />
11th terrorist attacks, the ISPS<br />
regulates security on-board<br />
ships, as well as inside ports and<br />
terminals which receive seagoing<br />
vessels on international voyages.<br />
The ethos of the ISPS code is<br />
very preventive and includes a<br />
requirement for both vulnerability<br />
SUPPORT<br />
integrates<br />
legacy port<br />
systems<br />
with new<br />
surveillance<br />
and<br />
information<br />
management<br />
systems<br />
and threat assessments to<br />
be carried out. Risks and<br />
vulnerabilities are very different<br />
when considering a container,<br />
bulk or passenger terminal and so<br />
all assessments must be specific<br />
and bespoke. The ISPS code<br />
also specifies a basic security<br />
framework including monitoring<br />
and controlling access, monitoring<br />
the activities of people and cargo,<br />
the preparation of specific ship<br />
and Port Facility <strong>Security</strong> Plans<br />
and the appointment of Ship<br />
<strong>Security</strong> Officers and a Port Facility<br />
<strong>Security</strong> Officer (PFSO).<br />
Across the European Union (EU),<br />
the ISPS code is supported by<br />
European Commission Directive<br />
725. While identical to the ISPS<br />
code in content and a mandatory<br />
piece of pan-European legislation,<br />
Directive 725 only requires<br />
member states to achieve a<br />
particular result without dictating<br />
the means of achieving that<br />
outcome. Consequently, the<br />
ISPS code was implemented<br />
by 21 EU countries, each in<br />
a different way without any<br />
homogenisation of approach<br />
or standardisation. Although<br />
the European Maritime Safety<br />
Agency (EMSA), FRONTEX and<br />
EUROPOL all touch upon port<br />
security, they have no executive<br />
powers and there is currently no<br />
Europe-wide framework. Without<br />
a Pan-European Federal Agency<br />
like the U.S. Department of<br />
Homeland <strong>Security</strong>, the European<br />
Union has no power to compel<br />
member states to work together<br />
or to follow prescriptive guidelines<br />
and individual ports work in<br />
isolation with commercially-driven<br />
secrecy, thwarting the sharing of<br />
intelligence or best-practice.<br />
Although responsibility rests with<br />
a variety of ministries or other<br />
government agencies across<br />
Europe, the burden of compliance<br />
and implementation of the ISPS<br />
code has been passed down to<br />
the individual terminal operators.<br />
This produces an interesting<br />
paradox as commercial companies<br />
whose aim is to make a profit to<br />
serve their board or shareholders<br />
are being made responsible for an<br />
activity that does not necessarily<br />
deliver any business benefit. Not<br />
surprisingly, enhanced security<br />
beyond that required to protect<br />
day to day business operations<br />
are often not high on Terminal<br />
Operator’s agendas, especially<br />
when national authorities do not<br />
have the power to force them to<br />
invest in such security measures.<br />
Despite the best efforts of<br />
regularity authorities, port security<br />
too often promises much and<br />
delivers little.<br />
Because of the very nature of a<br />
port facility with huge volumes<br />
of vehicle and cargo movements<br />
in and out each day, the level of<br />
security that can be physically<br />
implemented will always be<br />
a balance between risk and<br />
commercial reality. In this context<br />
the role of the Port Facility <strong>Security</strong><br />
Officer (PFSO) is key to ensuring<br />
this fine balance is maintained.<br />
Providing a framework to assist<br />
8 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />
<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 9
PORT SECURITY<br />
PORT SECURITY<br />
the PFSO is a major element<br />
of the EU’s <strong>Security</strong> UPgrade<br />
for PORTs (SUPPORT) project<br />
(www.supportproject.info)<br />
which is part-funded by the EC’s<br />
FP7 Research & Technological<br />
Development Programme. It is a<br />
collaboration of twenty European<br />
organisations whose focus is to<br />
raise the current level of port<br />
security. The SUPPORT project’s<br />
main objectives are to deliver<br />
‘validated’ generic port security<br />
management models (capturing<br />
reusable state-of-the-art and best<br />
practices) that can be customised<br />
for specific ports; and training and<br />
open standards based tools to aid<br />
security upgrade in EU ports.<br />
SUPPORT integrates legacy port<br />
systems with new surveillance<br />
and information management<br />
systems. It efficiently supports<br />
the complexity of a real port<br />
environment though an<br />
integrated, holistic approach.<br />
This ensures an improved level<br />
of security, while reducing the<br />
associated administrative burden<br />
on the port.<br />
Amongst the partners are a<br />
number of ports that have been<br />
selected to represent typical, but<br />
different operations. Starting from<br />
the perspective of the partner<br />
port operations, the project has<br />
identified key security gaps and<br />
has produced generic models<br />
describing measures to maintain<br />
or augment the efficient and<br />
secure operation of these ports.<br />
Communication and decision<br />
support tools incorporating<br />
semantic technologies have been<br />
developed, accessible to all the<br />
port security stakeholders.<br />
Full scale demonstrators have<br />
been organised in representative<br />
EU ports (Gothenburg, Lisbon and<br />
Piraeus) and augmented with a<br />
broader evaluation programme<br />
by members of a European<br />
Ports <strong>Security</strong> Forum. SUPPORT<br />
solutions include policy and<br />
standardisations proposals and<br />
training that can be used by any<br />
EU port to efficiently enhance its<br />
security level.<br />
One of SUPPORT’s key outputs<br />
is the Port <strong>Security</strong> Management<br />
System (PSMS) (www.mypsms.<br />
com). The PSMS is designed to<br />
help PFSOs to upgrade their<br />
security systems by empowering<br />
them with knowledge. It<br />
provides information, skills and<br />
methodologies that enable<br />
them to maintain, evaluate and<br />
upgrade their security measures<br />
and create security awareness<br />
without major investment. The<br />
PSMS also delivers outputs in the<br />
form of graphics that can be used<br />
to reinforce security threats and<br />
potential mitigation measures<br />
in presentations to managers or<br />
boards of directors.<br />
The whole PSMS package<br />
comprises five elements including<br />
a maturity module designed to<br />
enable security professionals<br />
to review and upgrade security<br />
plans to address terrorist threats; a<br />
corporate security module which<br />
addresses crime risks such as<br />
loss events, related to corporate<br />
processes and procedures;<br />
an e-learning education and<br />
examination module based on<br />
best practices of ISPS related<br />
maritime security educations<br />
including drills and exercises; a<br />
sharing and decision support<br />
module which enables security<br />
professionals to supervise<br />
facilities via the internet and to<br />
collaborate on a local, national or<br />
global scale and an Authorised<br />
Economic Operator (AEO)<br />
security self-assessment module<br />
which provides a system to reach<br />
compliancy and submit AEO<br />
application.<br />
The pressure of balancing<br />
commercial realities and security<br />
threats will certainly persist as<br />
long as current legislation remains<br />
placing the burden of investment<br />
and compliance on terminal<br />
operators. There is a school of<br />
thought that suggests the status<br />
quo will remain until a major<br />
terrorist incident takes place in a<br />
European port facility. However,<br />
with access to SUPPORT’s Port<br />
<strong>Security</strong> Management System<br />
(PSMS), PFSOs now have the tools<br />
to assess the situation, advise their<br />
management team and make<br />
the right decision, whatever the<br />
security threat might be.<br />
Hosted by:<br />
Convene; Converse; Collaborate<br />
The ever changing nature of threats, whether natural through<br />
climate change, or man-made through terrorism activities, either<br />
physical or cyber attacks, means the need to continually review<br />
and update policies, practices and technologies to meet these<br />
growing demands.<br />
The European Union is developing its policy on critical<br />
infrastructures in relation to the European Programme for Critical<br />
Infrastructure Protection (“EPCIP”) which considers measures<br />
that will enhance, where necessary, the level of protection of<br />
certain infrastructures against external threats.<br />
Critical Infrastructure Protection and Resilience Europe brings<br />
together leading stakeholders from industry, operators, agencies<br />
and governments to debate and collaborate on securing Europe’s<br />
critical infrastructure.<br />
For further details visit www.cipre-expo.com<br />
incorporating Critical Information<br />
Infrastructure Protection<br />
4 th -5 th March 2015<br />
The Hague, Netherlands<br />
www.cipre-expo.com<br />
How to Exhibit<br />
To discuss exhibiting and sponsorship<br />
opportunities and your involvement with<br />
Critical Infrastructure Protection & Resilience<br />
Europe please contact:<br />
Tony Kingham - Exhibit Sales Director<br />
T: +44 (0) 208 144 5934<br />
M: +44 (0)7827 297465<br />
E: tony.kingham@worldsecurity-index.com<br />
Paul Gloc (UK & Europe)<br />
T: +44 (0) 7786 270820<br />
E: paulg@torchmarketing.co.uk<br />
Denne Johnson (Americas)<br />
T: +1 918 863 9792<br />
E: dennej@torchmarketing.co.uk<br />
Gain access to leading decision makers from corporate and government establishments<br />
tasked with Critical Infrastructure Protection and Resilience.<br />
Owned & Organised by: Hosted by:<br />
Supporting Organisations: Media Partners:<br />
10 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com
TRANSPORT SECURITY<br />
TRANSPORT SECURITY<br />
Threat<br />
Detection<br />
and<br />
Recognition<br />
Trucks, trains, ships and oil rigs are all potential targets for criminal organisations<br />
Organisations that own, use or transport high value assets recognise the need to protect their goods and employees,<br />
especially when they are at their most vulnerable - when in remote or isolated situations, at night and when operating<br />
alone. By their very nature, trucks, trains, ships and oil rigs are all potential targets for criminal organisations.<br />
Furthermore, monitoring systems, early warning and deterrent technology have not been available to address this<br />
need at a remotely affordable cost. As a result, there has been an uneasy acceptance that in certain parts of the world,<br />
piracy, hijacking or theft are facts of commercial life. However, a refusal to accept this situation has helped to push this<br />
issue to the top of the EU agenda.<br />
Maria Andersson, at FOI, the Swedish Defence Research Agency and Technical Co-ordinator for ARENA explains the<br />
challenges in protecting high value assets on both land and at sea. She describes how the basis for a solution to the<br />
problem has been developed through the ARENA (Architecture for Recognition of thrEats to mobile assets using<br />
Networks of Affordable sensors) research & development project which is part-funded by the European Commission’s<br />
FP7 <strong>Security</strong> Research Programme. Dr. Andersson explains how the generic surveillance system that has been<br />
developed could provide robust, proactive threat detection and recognition, while being able to differentiate between<br />
real threats and false alarms across a range of environments using an affordable system of sensors.<br />
Pirates, highwaymen and train<br />
robbers may all sound faintly<br />
quaint and old fashioned, but<br />
anyone involved in the transport<br />
industry will tell you that their<br />
modern counterparts are as<br />
big a threat as they ever were.<br />
There is every sign that they will<br />
remain so, as long as goods<br />
and vehicles remain vulnerable<br />
when on the move and isolated.<br />
While the threat looms large, the<br />
technology installed on vehicles to<br />
detect potential security breaches<br />
remains crude in comparison to<br />
that now becoming available for<br />
static deployment.<br />
A ship, a lorry or a train is often<br />
highly secure while in a port or<br />
depot, being physically protected<br />
and under close surveillance, but<br />
once outside they are a relatively<br />
soft target for bands of organised<br />
and often dangerous criminals.<br />
The theft of high value, high risk<br />
products in transit cost businesses<br />
over €8.2 billion a year, according<br />
to recent European Union figures.<br />
Since the terrorist attacks on New<br />
York on September 11th 2001 the<br />
threat of terrorism has also loomed<br />
large over the transport sector.<br />
Oil rigs’ isolation means they face<br />
similar threats.<br />
Terror organisations may engage<br />
in theft to fund their operations or<br />
they may see it as an end in itself,<br />
potentially disrupting, destroying<br />
or capturing vehicles containing<br />
hazardous or dangerous materials<br />
such as chemical liquids, gas,<br />
or radioactive material. After<br />
the September 11th attacks the<br />
United Nations agreed proposals<br />
to enhance the security of<br />
dangerous goods in transport.<br />
Terror organisations have<br />
demonstrated their willingness<br />
to target mass transportation<br />
networks along with other areas of<br />
critical infrastructure.<br />
Over 70 per cent of all goods<br />
transported in the EU are<br />
transported using road haulage, a<br />
transport method which carries<br />
one of the highest risks of being<br />
victim of criminal activity. Truck<br />
thieves generally steal the whole<br />
vehicle or break into trailers to<br />
take the contents, sometimes<br />
cutting panels and causing other<br />
costly damage to gain access.<br />
Drivers too are vulnerable to<br />
attack and theft. The most<br />
common place for a truck to<br />
be attacked is at an unguarded<br />
parking lot while the driver is<br />
asleep. Large cities, like London<br />
and Madrid are the biggest hot<br />
spots, but countries like Belgium<br />
also have a problem. In the UK<br />
alone, 324,000 crimes were<br />
recorded against the transport<br />
and storage sector in 2012.<br />
The threat is equally pressing at<br />
sea as it is on land. Modern day<br />
piracy has presented a significant<br />
challenge since civil war broke<br />
out in Somalia in the early 1990s<br />
with an upsurge in recent years<br />
posing a threat to critical maritime<br />
infrastructure. There were no<br />
fewer than 49 piracy incidents in<br />
the first quarter of <strong>2014</strong> according<br />
to the International Maritime<br />
Bureau (IMB), an offshoot of<br />
the International Chamber of<br />
Commerce focussed on fighting<br />
maritime crime. Two of these<br />
vessels were hijacked, 37 boarded<br />
and five fired on board. Five more<br />
attempted attacks were reported.<br />
There were 12 reports off the<br />
Africa’s west<br />
coast, including<br />
the hijacking of<br />
two vessels with<br />
39 crew taken<br />
hostage and two<br />
kidnapped.<br />
<strong>Security</strong> on the<br />
move<br />
The impossibility<br />
of securing all<br />
main roads, rivers<br />
and open seas means the ships,<br />
trucks and trains they convey need<br />
to be equipped to detect threats<br />
themselves. Advance warning<br />
offers the chance to evade, deter<br />
or repel an intruder.<br />
A European Commissionbacked<br />
research project called<br />
ARENA, short for Architecture<br />
for Recognition of thrEats to<br />
mobile assets using Networks of<br />
Affordable sensors, has attempted<br />
to deliver a solution which could<br />
work in a wide range of transport<br />
scenarios. There are currently<br />
no affordable early warning or<br />
deterrent technologies to address<br />
the threat.<br />
FOI, the Swedish Defence<br />
Research Agency, co-ordinated<br />
the seven-strong research<br />
partnership drawn from five EU<br />
countries. FOI’s partners were:<br />
Leading international maritime<br />
design and engineering company,<br />
BMT Group; ITTI, an IT company<br />
from Poland; hi-tech firm SAFRAN<br />
Sagem Défense Sécurité of<br />
France; electronic security<br />
company SAFRAN MORPHO,<br />
the Netherlands Organisation for<br />
Applied Scientific Research (TNO);<br />
and the University of Reading, in<br />
the UK.<br />
The project is coming to a close<br />
next month at the end of its threeyear<br />
lifespan. Over that time the<br />
project sought to investigate a<br />
system applicable to a range of<br />
different deployments: stationary<br />
platforms relative to the land, such<br />
as a truck or train stop; stationary<br />
platforms relative to the sea, such<br />
as ships in port or oil rigs; mobile<br />
platforms relative to land, such<br />
as trucks or trains in transit; and<br />
mobile platforms relative to the<br />
sea, such as ships at sea or oil rig<br />
support vessels.<br />
Its research built on existing<br />
work on the surveillance of<br />
public spaces. No new sensor<br />
development was done. Instead,<br />
the team focussed on exploiting<br />
existing, low-cost sensor<br />
technologies like visual and<br />
infra-red video, acoustic sensors,<br />
seismic sensors and radar. It also<br />
built on other work, such as the<br />
Integrated Mobile <strong>Security</strong> Kit<br />
where a multi-sensor surveillance<br />
system is installed in a van<br />
which can be brought to public<br />
space when needed. Another<br />
contributing technology, known as<br />
ADABTS (Automatic Detection of<br />
Abnormal Behaviour and Threats<br />
in crowded Spaces), addresses<br />
automatic detection of abnormal<br />
human behaviour that might<br />
signal crime is afoot. And another,<br />
called SECTRONIC, is a 24-hour<br />
small area surveillance system for<br />
maritime application.<br />
ARENA also aimed to minimise<br />
nuisance the system might<br />
cause if it were to go off for no<br />
reason. Humans are naturally<br />
good at putting together lots<br />
of fragmentary information and<br />
12 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />
<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 13
TRANSPORT SECURITY<br />
INDUSTRY NEWS<br />
signals and spotting what is a<br />
threat and what is not. Machines<br />
on the other hand are not.<br />
The ARENA system combined<br />
complementary sensors to reduce<br />
false alarm rates. The threatdetection<br />
task was also broken<br />
down into four interconnected<br />
steps: object detection, object<br />
tracking; event recognition; and<br />
threat recognition. The fewer the<br />
bystanders to the vehicle, the<br />
easier the system could interpret<br />
what is going on, meaning that it<br />
would be easier to detect a threat<br />
in a quiet railway siding than when<br />
standing by a busy platform. For<br />
the same reason, trains may, on<br />
the whole, prove easier to protect<br />
than trucks, which often park in<br />
places where there is innocent<br />
foot traffic.<br />
The project also tackled the<br />
sensitive legal and ethical issues<br />
involved in surveillance and<br />
electronic security, particularly<br />
those revolving around privacy. It<br />
will be crucial to have the consent<br />
of the driver for any camera<br />
system which secures a vehicle<br />
on the basis of facial recognition.<br />
Facial recognition cameras were<br />
only used in the cab of a vehicle,<br />
so presented no challenge in<br />
respect of the privacy of passersby.<br />
ARENA’s innovative combination<br />
of existing surveillance technology<br />
provides autonomous monitoring<br />
The Homeland Defense and <strong>Security</strong> Database<br />
and situational awareness of the<br />
environment surrounding critical<br />
mobile assets, alerting personnel<br />
to threats. In achieving this goal<br />
it has the potential to fill the<br />
yawning security gap between<br />
harbours, depots and garages,<br />
currently a cash cow for criminals<br />
and potentially a loophole<br />
exploited by terrorists.<br />
There has been an uneasy<br />
acceptance that piracy, hijacking<br />
and thefts are facts of commercial<br />
life, particularly when trading in<br />
some parts of the world. But a<br />
growing refusal to accept this<br />
situation has helped to put the<br />
issue to the top of the EU agenda.<br />
ARENA may signal the beginning<br />
of a fundamental shift in the<br />
balance of power away from<br />
criminals, improving the safety of<br />
transport personnel and ultimately,<br />
cutting costs for everyone.<br />
Delta R Detection – Is this the magic bullet for airport security screening?<br />
In the aftermath of 911<br />
increasingly rigorous<br />
screening procedures<br />
have struggled to keep<br />
with the high demand at<br />
airport security and parcel<br />
screening checkpoints.<br />
What was needed was an<br />
automated high speed<br />
detection technologies that<br />
can process large volumes<br />
and be implemented with<br />
little or no need for human<br />
intervention.<br />
Working with experts in<br />
materials and computer<br />
science from the University<br />
of Florida Delta R<br />
Detection has developed a<br />
highly adaptable detection<br />
platform for sensing<br />
dangerous chemicals on<br />
the surface of objects. This<br />
technology has successfully<br />
been applied to rapidly<br />
scan baggage and cargo<br />
for explosives.<br />
This fully automated, high<br />
speed system solves the<br />
“needle in the haystack”<br />
problem of detecting<br />
explosives for the air<br />
transportation, parcel<br />
and cargo industries. The<br />
combination of sensitivity<br />
and high throughput<br />
makes the system ideal<br />
for baggage and parcel<br />
screening.<br />
The Delta R Detection<br />
automated carry-on<br />
baggage scanner can<br />
be placed directly in line<br />
with any existing x-ray<br />
machines. It uses a non<br />
invasive optical sampling<br />
technique to detect trace<br />
quantities of explosives.<br />
Luggage is simply placed<br />
on to the conveyer belt<br />
the way it would be at<br />
an existing checkpoint<br />
but it is simultaneously<br />
scanned for microscopic<br />
amounts of explosive. It<br />
plugs directly into existing<br />
infrastructure with no need<br />
for an additional operator<br />
and scans every carry-on<br />
bag for trace quantities of a<br />
broad range of explosives<br />
with a low false positive<br />
rate without increasing<br />
wait time at security check<br />
points<br />
Dr. Thierry Dubroca,<br />
CEO Delta R Detection<br />
said, “We have used the<br />
scientific discovery from<br />
the University of Florida<br />
to build a fully functioning<br />
prototype (currently<br />
being demonstrated at<br />
Schipol Airport, in The<br />
Netherlands). Using<br />
ultra violet spectroscopy<br />
we can now identify<br />
unique signatures of<br />
explosives. For example<br />
we can now detect sub<br />
microns grams of TNT<br />
on the surface of bags<br />
and parcels. Our current<br />
OD<strong>Security</strong> sells 3 SOTER Through-Body Scanners to Hong Kong<br />
Correctional Services<br />
prototype automatically<br />
detects explosives thanks<br />
to a custom designed<br />
software.”<br />
Dr Esen Yuksel, Research<br />
Scientist, University of<br />
California said, “We<br />
have designed a unique<br />
software for this low level<br />
of detection. With our<br />
high speed computing<br />
techniques and state of the<br />
art classification algorithms<br />
we are able to provide very<br />
low false alarm rates at very<br />
high speeds. We will have<br />
the ability to upgrade our<br />
software to detect future<br />
terrorist threats.<br />
Delta R Detection plan<br />
to turn the prototype to<br />
a product by bringing<br />
the hardware sensor and<br />
optical component to meet<br />
larger customers needs,<br />
such as higher sensitivity,<br />
and speed.<br />
<strong>World</strong><strong>Security</strong>-Index.com is the only global<br />
homeland security directory published in<br />
English, Arabic and Spanish on the web and<br />
Advertise on <strong>World</strong><strong>Security</strong>-Index.com<br />
in CD network format.<br />
from only £515 for 12 months<br />
Contact info@worldsecurity-index.com for details<br />
14 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> or call +44 www.worldsecurity-index.com<br />
(0) 208 144 5934.<br />
The Global <strong>Security</strong> Portal<br />
Netherlands based<br />
security manufacturer,<br />
OD<strong>Security</strong> has sold 3<br />
units of the SOTER RS<br />
Through Body Scanner<br />
to the Hong Kong<br />
Correctional Services,<br />
CSD (Correctional Services<br />
Department) for use in<br />
drug interdiction within a<br />
number of high security<br />
custodial establishments.<br />
The use of Through<br />
Body Scanners in prisons<br />
is regarded as the<br />
most effective way of<br />
www.worldsecurity-index.com<br />
countering the smuggling<br />
of items such as drugs,<br />
mobile phones, weapons<br />
and other contraband<br />
material without<br />
subjecting inmates and<br />
visitors to intrusive body<br />
searchers.<br />
The SOTER RS is a low<br />
dosage full body scanner<br />
which combines ultra low<br />
radiation with maximum<br />
visibility, for use at airports<br />
and prisons. Within<br />
seconds the SOTER RS<br />
reveals hidden items, such<br />
as weapons or narcotics,<br />
diamonds, or any stolen<br />
or smuggled goods. It<br />
doesn’t even have to be<br />
metal. The SOTER shows<br />
a clear difference between<br />
human tissue and other<br />
materials, even ingested<br />
or camouflaged items will<br />
be shown.<br />
The scanners will increase<br />
the level of security<br />
operations previously<br />
possible through the use<br />
of conventional metal<br />
detectors. Non metallic<br />
objects hidden under<br />
clothes, in natural cavities<br />
or within the human<br />
body cannot be detected<br />
by conventional metal<br />
detectors and typically,<br />
these non-detectable<br />
items, such as narcotics,<br />
explosives, precious<br />
stones, plastic weapons,<br />
or other contraband,<br />
can only otherwise be<br />
detected by highly<br />
intrusive total body<br />
searches.<br />
<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 15
INDUSTRY NEWS<br />
INDUSTRY NEWS<br />
Smiths Detection Wins USD 17.6 (SAR<br />
65.9) Million Order from Key Saudi<br />
Arabian <strong>Security</strong> Establishment<br />
Smiths Detection has won a<br />
USD 17.6 (SAR 65.9) million<br />
contract to supply a range<br />
of advanced equipment to<br />
one of the key Government<br />
security institutions in Saudi<br />
Arabia.<br />
The order includes<br />
HCVG high energy cargo<br />
screening system; CIP 300<br />
Car Inspection Portal; HI-<br />
SCAN 6040aTix explosives<br />
detection X-ray system;<br />
and IONSCAN 500DT and<br />
SABRE 5000 explosive<br />
and trace detection<br />
systems. Smiths Detection<br />
will also train the Saudi<br />
entity’s staff as part of the<br />
agreement. The identity<br />
of the institution cannot<br />
be revealed for security<br />
Ophir Optics launches two new products for Homeland <strong>Security</strong><br />
At this year’s Eurosatory<br />
exhibition, Ophir<br />
Optics launched two<br />
new infrared imaging<br />
optics for homeland<br />
security and defence<br />
applications.<br />
The SupIR 15-60 mm<br />
is a super-compact,<br />
motorized, continuous<br />
zoom lens designed<br />
especially for lightweight<br />
reasons.<br />
Edward Christie, Managing<br />
Director - Smiths Detection<br />
Middle East, said: “Saudi<br />
Arabia is a key market<br />
for us in the Middle East<br />
and we are thrilled to start<br />
our collaboration with a<br />
key Government entity.<br />
This is an exceptional<br />
opportunity to demonstrate<br />
the effectiveness of Smiths<br />
Detection products for<br />
critical premises. It shows<br />
that wherever there is<br />
the need for identifying a<br />
combination of chemical,<br />
biological, radiological,<br />
nuclear and explosives<br />
threats, we can provide<br />
the complete solution and<br />
training.”<br />
BAE Systems joins ‘big data’<br />
research to boost Australia’s<br />
national security<br />
BAE Systems has become<br />
an industry partner of<br />
the $88 million ‘big data’<br />
Cooperative Research<br />
Centre (CRC).<br />
The Data to Decisions<br />
CRC will start 1 July <strong>2014</strong><br />
to research and develop<br />
tools that seek to maximise<br />
the benefits of ‘big data’<br />
for Australia’s defence and<br />
national security sector.<br />
BAE Systems will<br />
contribute $1 million and<br />
in-kind support over the life<br />
of the five-year program.<br />
Mr Kim Scott, BAE<br />
Systems Australia Director<br />
– Business Development<br />
and Land & Integrated<br />
Systems, said “investing in<br />
the latest technology will<br />
be necessary to provide<br />
timely and accurate<br />
intelligence in the future”.<br />
“Big data comes from<br />
many sources at an<br />
alarming velocity, volume<br />
and variety, which makes<br />
it difficult to analyse using<br />
current technologies. Large<br />
amounts of text, images<br />
systems like minicopters<br />
and micro<br />
UAVs. The diffractionlimited<br />
optical design<br />
is optimized for<br />
LWIR sensors up to<br />
640x480 pixels and<br />
resolution down to<br />
17 micron pixel size.<br />
It has a ruggedized<br />
structure to assure<br />
performance is<br />
maintained in<br />
and audio are rapidly<br />
generated all the time<br />
through digital processes<br />
and social media,” said Mr<br />
Scott.<br />
Advances in technology<br />
allow BAE Systems to<br />
piece together disparate<br />
data and present it in an<br />
easy-to-use format for<br />
decision makers.<br />
The Data to Decisions<br />
CRC’s research will inform<br />
the Company’s integrated<br />
systems and software<br />
development programs to<br />
deliver data analytics, highspeed<br />
distribution and<br />
secure sharing for Defence<br />
and security customers.<br />
The CRC is funded partly<br />
by the Commonwealth<br />
through a grant, and<br />
partly through cash and<br />
in-kind contributions from<br />
defence, industry and<br />
university participants. The<br />
national headquarters is in<br />
South Australia with teams<br />
in Victoria and New South<br />
Wales.<br />
harsh environmental<br />
conditions and high shock<br />
environments.<br />
The SupIR 2.6mm is ideal<br />
for situational awareness<br />
and surveillance<br />
applications. These highperformance<br />
lenses can<br />
support LWIR sensors up<br />
to 1024x768 pixels, with<br />
resolution down to 12<br />
micron pixels.<br />
Stratech’s iVACS to deploy 30 more systems to the Middle East<br />
Singapore company<br />
Stratech Systems has<br />
announced that it is to<br />
deploy another 30 or more<br />
of its iVACS® intelligent<br />
Vehicle Access Control<br />
Systems in the Middle East.<br />
At least 25 iVACS will be<br />
deployed in a Smart City<br />
Project for one of the<br />
prominent capital cities in<br />
the Middle East. It will be<br />
part of a <strong>Security</strong> Program<br />
designed to establish a<br />
fully integrated security<br />
solution for a diversity<br />
of onshore, coastal and<br />
offshore critical assets<br />
across the customer’s<br />
mainland.<br />
This coincides with the<br />
worldwide trend of<br />
increasing take up rates<br />
for such systems. Previous<br />
orders for iVACS used to<br />
involve just a handful of<br />
units each, but nowadays,<br />
relatively large orders such<br />
as this are becoming more<br />
common.<br />
A new tool in the fight against the VBIED<br />
British company e2v<br />
have developed the<br />
RF Safe Stop system,<br />
a vehicle immobilising<br />
system designed to bring<br />
vehicles of all types to a<br />
halt using a blast of high<br />
power magnetrons. It uses<br />
the pulse to disrupt the<br />
electronics of the target<br />
vehicle to stop the<br />
engine.<br />
The system can<br />
be mounted<br />
on vehicles,<br />
such as an<br />
SUV, or in fixed<br />
installations,<br />
such as vehicle<br />
checkpoints<br />
at critical<br />
infrastructure<br />
buildings and<br />
facilities.<br />
Combined with traffic<br />
management barriers the<br />
system would an invaluable<br />
tool in the battle to prevent<br />
Vehicle Bourne Improvised<br />
Explosive Devices (VBIED’s).<br />
One of the most deadly<br />
and effective tools in the<br />
terrorist arsenal!<br />
e2v have developed<br />
iVACS® screens vehicle<br />
undercarriages for<br />
potential security threats<br />
such as IEDs – improvised<br />
explosive devices. Stratech<br />
under vehicle surveillance<br />
system, is capable of<br />
“intelligent” inspection<br />
of vehicle undercarriages,<br />
demonstration hardware<br />
with proven effects for<br />
engine stopping and<br />
disruption by utilising<br />
e2v’s patented switching<br />
products in conjunction with<br />
high power magnetrons,<br />
and carefully packaging<br />
these with appropriate<br />
antennas. This design<br />
and provides alerts when<br />
suspicious foreign objects<br />
or abnormalities are<br />
detected. iVACS® also<br />
performs identification<br />
screening for the driver and<br />
passengers in the vehicle<br />
using biometrics providing<br />
a comprehensive solution<br />
at screening checkpoints.<br />
The system is also Network<br />
enabled, which is very<br />
useful for large, networked<br />
deployments such as Smart<br />
City Projects or secure<br />
facilities with multiple<br />
entrances and exits.<br />
Networking the system<br />
means that multiple secure<br />
facilities and command<br />
and control of these secure<br />
facilities can share their<br />
databases.<br />
approach has resulted in a<br />
flexible solution which can<br />
be rapidly adapted to suit<br />
specific customer needs<br />
and achieve optimum<br />
performance.<br />
The system is also being<br />
trialled for boats and even<br />
helicopters.<br />
16 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />
<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 17
INDUSTRY NEWS<br />
INDUSTRY NEWS<br />
New innovations in physical<br />
protection from Technocover<br />
Technocover has<br />
introduced a series of<br />
innovations across its<br />
UltraSecure range of<br />
LPCB approved security<br />
equipment, billed as<br />
the next generation<br />
of intelligent physical<br />
protection.<br />
The company has been<br />
working with clients and<br />
technology suppliers to<br />
advance the functionality<br />
of its high security doors,<br />
enclosures, access covers<br />
and associated products to<br />
support strategic security<br />
and operational efficiency<br />
on the critical national<br />
infrastructure (CNI) site.<br />
New state-of-the-art access<br />
control offers scope to<br />
integrate UltraSecure<br />
equipment with central<br />
access management of<br />
multiple sites. Options<br />
include fob, keypad<br />
and radio-frequency<br />
identification (RFID)<br />
activated locks, with<br />
features such as personnel<br />
ID and hierarchical access<br />
control, failsafe or failsecure<br />
functions, and timed access<br />
features.<br />
Also new is an 8 point<br />
wheel lock for UltraSecure<br />
Sentinel doors, plus LCD<br />
privacy glass viewing<br />
panels, switching from<br />
frosted to clear. An<br />
innovative padlock<br />
with solenoid control is<br />
now available on new<br />
UltraSecure doors or for<br />
retrofitting to existing units.<br />
Simplifying sitework and<br />
project management<br />
is a new generation<br />
of UltraSecure kiosks,<br />
delivered ready-assembled<br />
and fitted out with M&E<br />
services for fast installation<br />
and easy connection to<br />
mains power. They come<br />
with factory-fitted access<br />
control data exchanges,<br />
vision panels, lighting,<br />
heating and ventilation<br />
services, plus an aesthetic<br />
new lining made from<br />
environmentally friendly,<br />
premium recycled HDPE<br />
plastic (also available<br />
on other UltraSecure<br />
products).<br />
Advances in horizontal<br />
access include an<br />
UltraSecure roof access<br />
hatch with remote control<br />
of opening/closing via<br />
a motorised actuator.<br />
The latest UltraSecure<br />
flush fitting access cover<br />
incorporates a<br />
3-tier design<br />
with inspection<br />
hatch, fall<br />
arrest system<br />
and anticontamination<br />
features for<br />
underground<br />
tanks and<br />
storage.<br />
ADANI launches new integrated<br />
door access full body scanner<br />
ADANI has officially<br />
launched the new Conpass<br />
DA integrated double door<br />
access full body scanner.<br />
The Conpass DA (Door<br />
Access) offers an integrated<br />
access control solution<br />
which has the capacity<br />
to detect a wide range<br />
of organic and inorganic<br />
objects concealed under<br />
clothing, in bags or hidden<br />
in the anatomical cavities<br />
of inspected individuals.<br />
The product is one of<br />
the latest and most<br />
advanced versions of the<br />
internationally successful<br />
ADANI Conpass full body<br />
scanner. The Conpass<br />
DA has the following<br />
unique features which<br />
highlight its advantages<br />
as a tool for enhancing<br />
security: Discrete selective<br />
scanning of visitors and<br />
staff; Opportunity to<br />
hold a suspect inside the<br />
booth; Remote operation;<br />
Bulletproof construction<br />
option; Integrated 2<br />
way communication and<br />
internal CCTV option<br />
The system can be<br />
integrated into existing<br />
entrance infrastructure<br />
and access control system.<br />
Therefore providing<br />
maximum effectiveness<br />
and improving efficiency<br />
of operational procedures<br />
of the security checkpoint.<br />
This model of full body<br />
scanner is designed to<br />
be used at VIP facilities,<br />
military bases, critical<br />
infrastructure sites and any<br />
other applications where<br />
there is a need for the<br />
highest level of security<br />
and visitor inspection.<br />
The advanced technology<br />
used in Conpass<br />
makes screening<br />
safe for operators<br />
and individuals<br />
being scanned. All<br />
Conpass systems<br />
are compliant with<br />
ANSI 43.17-2009<br />
regulations and that<br />
justifies its use for<br />
general public.<br />
Simon Lyster,<br />
Managing Director, ADANI<br />
Limited said ”The demand<br />
for more complete<br />
personnel screening<br />
solutions is increasing in<br />
a variety of markets as a<br />
result of a mixture of events<br />
and the realization by the<br />
enforcement agencies<br />
that the technology exists<br />
to safely screen for a<br />
wide range of banned<br />
and dangerous items.<br />
The ADANI Conpass DA<br />
offers a unique capability<br />
for discreetly scanning<br />
individuals entering sites<br />
where there is an issue of<br />
contraband smuggling or<br />
a constant security threat.<br />
At ADANI, we have always<br />
been proud of the fact<br />
that we offer a flexible<br />
approach to meeting the<br />
customer’s needs.”<br />
Axis announces full-featured fixed<br />
network cameras with WDR in HDTV<br />
1080p<br />
Axis Communications<br />
introduces new additions<br />
to its successful AXIS Q16<br />
Series. The latest cameras<br />
offer a number of new<br />
capabilities including<br />
wide dynamic range (Axis’<br />
WDR-Forensic Capture*),<br />
Lightfinder, HDTV 1080p<br />
resolution, electronic image<br />
stabilization and shock<br />
detection.<br />
“Airport, train station,<br />
government and perimeter<br />
protection are some<br />
examples of situations<br />
where image quality<br />
is critical to minimize<br />
investigation times and<br />
to protect assets – even<br />
if the lighting situation is<br />
extremely difficult,” says<br />
Erik Frännlid, Axis’ Director<br />
of Product Management.<br />
”The new AXIS Q1615<br />
cameras not only offer full<br />
HD resolution but also<br />
automatically switch settings<br />
between high dynamic<br />
scenes and Lightfinder<br />
mode, ensuring all details<br />
are captured in dark and<br />
bright areas at the same<br />
time. The new cameras are<br />
also our first fixed cameras<br />
to provide 50/60 frames per<br />
seconds in HDTV 1080p<br />
resolution. This is twice the<br />
normal frame rate, which<br />
allows the cameras to even<br />
better record smooth video<br />
when people or vehicles are<br />
moving fast.”<br />
In addition to the ability<br />
to seamlessly transition<br />
between WDR, Forensic<br />
Capture and Lightfinder<br />
mode, the indoor AXIS<br />
Q1615 and the outdoorready<br />
AXIS Q1615-E<br />
offer several image<br />
processing features to<br />
enhance image usability,<br />
such as barrel distortion<br />
correction, electronic image<br />
stabilization for steady<br />
images in an environment<br />
with tough vibrations. In<br />
addition, the fixed cameras<br />
also support high profile in<br />
H.264 and enhanced Max<br />
Bit Rate controllers which<br />
assure that the bandwidth<br />
remains within the defined<br />
limits.<br />
International Procurement Services<br />
announce the completion of contract<br />
to an unspecified European Police<br />
Force, with a total contract worth in<br />
excess of 500,000 GBP<br />
The contract to supply<br />
a complete range<br />
of countermeasure<br />
equipment and training<br />
includes OSCOR Green,<br />
ORION 2.4 NLJD and<br />
TALAN.<br />
The OSCOR GREEN<br />
Spectrum Analyser can<br />
detect illicit eavesdropping<br />
signals, perform site<br />
surveys for communication<br />
systems, conduct radio<br />
frequency emissions<br />
analysis and investigate<br />
misuse of the RF spectrum.<br />
It can be connected to<br />
remotely, enabling the<br />
operator to monitor away<br />
from the equipment and<br />
data files collected can be<br />
saved to external devices<br />
offering the ability to<br />
export data and produce<br />
reports on activity.<br />
The ORION 2.4 Non<br />
Linear Junction Detector<br />
is latest completely<br />
new lightweight version<br />
weighing just 1.4kg (3lbs)<br />
will detect the presence of<br />
electronics as small as SIM<br />
cards or mobile phones,<br />
regardless of whether<br />
the electronics target is<br />
radiating,<br />
hard wired,<br />
or even<br />
turned off.<br />
The Talan<br />
Telephone<br />
Line<br />
Analyser is<br />
the most<br />
recent<br />
state-ofthe-art<br />
Digital<br />
Telephone<br />
Line<br />
Analyser. It<br />
has been<br />
designed<br />
to detect<br />
illicit taps and bugs on<br />
either analogue or digital<br />
telephone lines. With new<br />
enhancements built into<br />
the software interface,<br />
users can also now test<br />
internet protocols (IP)<br />
packet traffic on voice-over<br />
Internet Protocol (VoIP)<br />
phones and systems,<br />
define advanced filtering<br />
options, and data can now<br />
be stored and exported to<br />
USB or Flash as data files<br />
for analysis or reporting<br />
purposes.<br />
18 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />
<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 19
INDUSTRY NEWS<br />
INDUSTRY NEWS<br />
Real-Time HD Video Stabiliser: Taming a harsh visual environment<br />
Real-time video stabilisers<br />
are critical for applications<br />
such as UAV guidance and<br />
surveillance, where camera<br />
shake from an unsteady<br />
platform would otherwise<br />
render the video unusable.<br />
The traditional mechanical<br />
approach of stabilising<br />
video, by physically moving<br />
the optics or the sensor, is<br />
expensive and bulky with<br />
performance deteriorating<br />
as image magnification<br />
increases. In contrast,<br />
digital electronic stabilisers<br />
are much smaller, lighter,<br />
considerably more power<br />
efficient and operate<br />
robustly, irrespective of<br />
magnification.<br />
Saab signs contract to provide maintenance support for the electronic security<br />
system for the Southern Queensland Correctional Centre<br />
Defence and security<br />
company Saab has<br />
received a contract to<br />
provide the planned and<br />
corrective maintenance<br />
and capital expenditure<br />
works for the electronic<br />
security system for<br />
the 300 bed Southern<br />
Truly high performance,<br />
high-definition (HD) realtime<br />
video stabilisation<br />
has been an elusive<br />
technology because, until<br />
recently, it has required<br />
the processing power of<br />
a small super computer<br />
to implement. The<br />
market needs a single chip<br />
solution that can operate<br />
robustly in extremely harsh<br />
environments using only a<br />
few watts of power.<br />
RFEL has created a<br />
solution in the form of an<br />
electronic video stabiliser<br />
that continuously processes<br />
over a billion bits of<br />
information every second<br />
and tracks the movements<br />
of several hundred<br />
independent image<br />
regions every video frame.<br />
This software also includes<br />
intelligent processing to<br />
Queensland Correctional<br />
Centre. The contract has<br />
a total value of MSEK<br />
166.<br />
Located near Gatton<br />
in the Lockyer Valley<br />
and opened in January<br />
2012, the 300-bed<br />
counter poor illumination,<br />
bland scene content and<br />
extraneous movements,<br />
such as the swaying<br />
of trees, which would<br />
otherwise compromise<br />
robustness.<br />
This state-of-the-art,<br />
real-time, HD video<br />
stabiliser IP is suitable for<br />
compact, lightweight,<br />
and low power hardware<br />
platforms. The solution<br />
is capable of adapting<br />
to its environment and<br />
can be optimised to<br />
the application, while<br />
supporting a diverse range<br />
of cameras. It can be<br />
implemented into a range<br />
of low power hardware<br />
platforms, including RFEL<br />
products, which have<br />
been proven in a range<br />
Southern Queensland<br />
Correctional Centre is<br />
the State’s newest prison.<br />
The electronic security<br />
system was originally<br />
installed by Saab in the<br />
centre and has been<br />
under comprehensive<br />
maintenance since the<br />
of demanding real world<br />
applications.<br />
This Video Processing<br />
Solution can be combined<br />
with other IP and run on<br />
RFEL’s HALO platform,<br />
which can combine<br />
several key functions that<br />
add value to the user,<br />
including, video scaling,<br />
image stabilisation, fusion,<br />
contrast enhancement,<br />
Picture in Picture overlay<br />
and correction of lens<br />
distortion.<br />
One core functionality,<br />
providing image fusion<br />
between two sensors is<br />
completely different from<br />
simple image blending.<br />
RFEL’s state-of-the-art<br />
fusion algorithm processes<br />
the images captured by<br />
two sensors, generally<br />
from different wavelengths,<br />
and is able to maintain<br />
the best attributes from<br />
both input images for the<br />
resulting output. This, in<br />
combination with image<br />
stabilisation, provides the<br />
user with the best view<br />
possible for informed<br />
decisions.<br />
facility opened. The<br />
system provides an<br />
integrated surveillance<br />
picture and total control<br />
of security sensors and<br />
locks within the prison<br />
environment.<br />
Operation Henry to be rolled out across 9 regions of England<br />
Operation Henry is a<br />
campaign to crack down<br />
on the supply of illicit<br />
tobacco in nine regions in<br />
England.<br />
In a partnership between<br />
the Trading Standards<br />
Institute (TSI) HM Revenue<br />
and Customs (HMRC local<br />
council authorities and<br />
Wagtail UK, a substantial<br />
amount genuine tobacco<br />
and cigarettes, counterfeit<br />
tobacco and cigarettes and<br />
Shisha tobacco.<br />
Operation Henry, runs from<br />
April through September<br />
<strong>2014</strong>, and aims to crack<br />
down on the supply of<br />
illicit tobacco across nine<br />
regions in England. Each<br />
region receives eight days<br />
of dog detection provided<br />
by Wagtail UK and funded<br />
by the Department of<br />
Health. The Operation is<br />
managed TSI.<br />
This partnership allows<br />
The new HoverMast-100 from Sky Sapience, in Israel, could prove a real<br />
winner with border guards, CIP and security personnel the world over.<br />
The HoverMast-100 is<br />
a tethered Unmanned<br />
Aerial Vehicle (UAV)<br />
which means it<br />
combines all the obvious<br />
advantages of a UAV<br />
without the associated<br />
problems, such as civil<br />
certification, launch,<br />
recovery and training.<br />
It is simply launched at<br />
the press of a button,<br />
deploys to a height of 50<br />
meters and is recovered<br />
in the same way.<br />
It can be installed<br />
and launched from<br />
trading standards officers<br />
to identify illicit tobacco<br />
‘hot spots’ by combining<br />
intelligence from HMRC<br />
and trading standards.<br />
Leon Livermore, chief<br />
executive of TSI, said: “This<br />
partnership is one more<br />
example of how trading<br />
standards works with the<br />
private and public sector<br />
to protect consumers and<br />
support legal business<br />
practices. Through this<br />
partnership, trading<br />
standards has a unique<br />
opportunity to share<br />
information and develop<br />
intelligence with the aim of<br />
taking illicit tobacco off the<br />
streets.”<br />
‘HMRC works closely<br />
with other enforcement<br />
agencies to crack down<br />
on illicit tobacco in<br />
the UK,’ said Richard<br />
Las, deputy director of<br />
Criminal Investigation<br />
for the HMRC. ‘Seizing<br />
illicit product is only one<br />
most small service<br />
vehicles, such as<br />
pick-up trucks, UGVs,<br />
even boats. The<br />
HoverMast is ideal<br />
for border patrol,<br />
homeland security<br />
and civilian security<br />
missions.<br />
The system is<br />
comprised of an<br />
aerial platform, base<br />
unit, and external<br />
power source, all of<br />
which are compact<br />
and lightweight. The<br />
aerodynamic platform<br />
is produced from<br />
of the tools used; the<br />
focus is on using a range<br />
of interventions, from<br />
penalties to prosecutions,<br />
to encourage compliance<br />
and maximise deterrent.<br />
Partnership working with<br />
Trading Standards is vital in<br />
order to share intelligence<br />
and collaborate on<br />
joint exercises such as<br />
Operation Henry to<br />
target those areas with<br />
the highest levels of illicit<br />
tobacco activity.’<br />
“Those involved in dealing<br />
in illegal tobacco may<br />
be encouraging people,<br />
including children to smoke<br />
by providing a cheap<br />
source. The detection<br />
dogs can find tobacco<br />
and cigarettes even if<br />
hidden in the most unlikely<br />
places. Offenders need<br />
to know that they will<br />
face consequences if they<br />
choose to deal in these<br />
illegal products.”<br />
advanced composite<br />
materials impregnable<br />
to water and dust.<br />
In fact, the entire<br />
system complies with<br />
international standard<br />
IP65. It hovers 50 meters<br />
above the host vehicle<br />
with the help of two main<br />
rotors that give it its main<br />
thrust and four smaller<br />
side rotors, used for<br />
guidance and additional<br />
thrust.<br />
Its stability in winds of<br />
up to 25 kn is achieved<br />
by the use of separate<br />
subsystems working >><br />
20 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />
<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 21
INDUSTRY NEWS<br />
INDUSTRY NEWS<br />
>> in tandem.<br />
The aerial platform is<br />
secured to the base unit<br />
via a cable which serves as<br />
a power supply and data<br />
link. A silenced generator<br />
powers the system<br />
enabling continuous 24/7<br />
operation. The machine<br />
itself is relatively quiet<br />
and passive; emitting<br />
no electronic signals. It<br />
should be emphasized<br />
again that as the<br />
HoverMast is tethered, it<br />
is not bound by any of the<br />
air control regulations that<br />
bind standard unmanned<br />
vehicles.<br />
The system can host a<br />
wide range of payloads.<br />
It can host any payload<br />
weighing up to 6 kg,<br />
including CCD/IR cameras,<br />
radars, laser designators,<br />
4th-5th March 2015<br />
The Hague, Netherlands<br />
www.personnel-protection.com<br />
For exhibting and sponsorship queries<br />
please contact:<br />
Tony Kingham<br />
Exhibit Sales Director<br />
T: +44 (0) 208 144 5934<br />
M: +44 (0)7827 297465<br />
E: tony.kingham@worldsecurity-index.com<br />
For conference queries contact:<br />
Neil Walker<br />
T: +44 (0) 7725 318601<br />
E: neilw@torchmarketing.co.uk<br />
relays, cellular antennas,<br />
and hyperspectral<br />
sensors. Additionally, it<br />
can receive COMINT and<br />
ELINT. With the ability<br />
to operate on land and<br />
at sea, even while the<br />
vehicle is in motion, the<br />
HoverMast-100 enables<br />
target detection, location,<br />
and identification as well<br />
as autonomous tracking.<br />
Target coordinates<br />
and video images<br />
are transmitted within<br />
seconds and without the<br />
need of an experienced<br />
operator via its wide<br />
band communication link,<br />
relaying critical data to<br />
selected recipients in real<br />
time.<br />
The HoverMast is already<br />
in operation with the Israeli<br />
Defense Force.<br />
CALL FOR PAPERS<br />
Abstract Submittal Deadline - 31st July <strong>2014</strong><br />
Submit your abstract online at www.personnel-protection.com<br />
If you travel abroad for your work, or if you are responsible for your team that travels<br />
or works abroad, are you aware of the legal implications surrounding duty of care for<br />
travelling personnel?<br />
Understand the increasing threats faced by international travellers on duty/employed<br />
by companies operating abroad, and what you can do to prepare for the possibilities at<br />
Personnel Protection & Safety Europe.<br />
Media Partners:<br />
Police in Chennai have implemented<br />
‘Face Recognition’ in a Crowd<br />
system<br />
The Police in Chennai have<br />
positioned themselves<br />
at the forefront of Smart<br />
City Surveillance having<br />
implemented iOmniscient’s<br />
Face Recognition in a<br />
Crowd system in a part of<br />
this city, the sixth largest in<br />
India.<br />
The system installed in the<br />
T. Nagar Market enables<br />
the police to recognize<br />
people of interest outdoors<br />
in a totally uncontrolled<br />
environment and to track<br />
them as they show up on<br />
different cameras.<br />
Mr. Senthil<br />
Manickavasagam, M.D.<br />
Supporting Organisations:<br />
of Mars Electronics<br />
who implemented the<br />
system said, “The main<br />
requirement from the<br />
electronic surveillance<br />
used for public safety<br />
was that it must function<br />
in a difficult outdoor<br />
environment. We faced<br />
a big problem with this.<br />
The many technologies<br />
we tried from Russia, USA<br />
and Europe worked well<br />
when used in a controlled<br />
setting indoors, but in the<br />
practical crowded scene<br />
of an Indian marketplace,<br />
nothing worked. Then we<br />
implemented iOmniscient’s<br />
system.”<br />
Defendec releases HD Camera for situational awareness platform Smartdec<br />
Defendec have released a<br />
new high capability camera<br />
module for situational<br />
awareness platform<br />
Smartdec at Eurosatory<br />
<strong>2014</strong>, bringing significant<br />
improvements to its system<br />
for users in the field.<br />
Smartdec, the defense<br />
and security company’s<br />
flagship product, uses a<br />
network of small wireless<br />
cameras linked to motion<br />
sensors that send visual<br />
confirmation to end users<br />
in a matter of seconds.<br />
The system upgrades<br />
provide a HD picture<br />
with a HDR capability,<br />
increase the speed of<br />
image transmission and<br />
alarm arrival time and<br />
increase the distance of<br />
the detectors from the<br />
main bridge enhancing<br />
the system’s overall<br />
effectiveness.<br />
The Smartdec system<br />
consists of a series of small,<br />
lightweight, and easily<br />
camouflaged detectors<br />
that are equipped with a<br />
camera and long-lasting<br />
batteries, a communication<br />
base unit, and the control<br />
center. When movement is<br />
sensed, the detector sends<br />
a visual confirmation to the<br />
control center. There the<br />
image can be analyzed,<br />
and border patrols can<br />
determine whether or not<br />
to send patrols to inspect<br />
the area.<br />
Smartdec can be up and<br />
running in just two minutes<br />
without any additional<br />
training needed. The<br />
cameras are designed to<br />
be deployed in remote<br />
and rugged terrain where<br />
it is difficult to conduct foot<br />
patrols. The cameras are<br />
programmed to<br />
only recognize<br />
human<br />
and vehicle<br />
infiltrations.<br />
False alarms<br />
for wild animals<br />
have been<br />
eliminated.<br />
This feature<br />
prevents from<br />
wasting time on<br />
nuisance calls. The system<br />
can be operational for<br />
years with only one battery<br />
charge cycle making it<br />
almost maintenance free.<br />
Smartdec’s equipment<br />
is completely wireless so<br />
additional infrastructure<br />
investments are<br />
unnecessary.<br />
The detectors are<br />
connected to the GSM<br />
phone network, which<br />
means that most major<br />
towns and cities are<br />
covered. In countries where<br />
GSM coverage is spotty, a<br />
local radio network bridge<br />
can be set up to connect<br />
the cameras to the control<br />
center.<br />
“Smartdec offers border<br />
guard and critical<br />
infrastructure<br />
companies<br />
struggling<br />
with limited<br />
personnel<br />
and budget<br />
resources<br />
an effective<br />
situational<br />
awareness<br />
platform<br />
solution to put an end<br />
to vandalism, human<br />
trafficking, narcotics<br />
smuggling, and other<br />
nefarious activities,” said<br />
Jaanus Tamm, CEO of<br />
Defendec Ltd. “Smartdec<br />
is truly a unique product<br />
that is operational around<br />
the world, and it is<br />
improving remote areas<br />
security every day.”<br />
Since the initial rollout<br />
of the system in 2010,<br />
Smartdec has been<br />
securing borders along<br />
the European Union’s<br />
eastern front, Asia and the<br />
Caribbean. The system has<br />
been proven to help stop<br />
international smuggling,<br />
illegal trafficking, and<br />
acts of sabotage making<br />
it the technology of<br />
choice among border<br />
guards around the<br />
world. Smartdec is also<br />
operational in the critical<br />
infrastructure sector<br />
making the protection<br />
of assets in remote areas<br />
much easier.<br />
Morpho Upgrades Dutch ID<br />
Documents for Greater <strong>Security</strong><br />
Working closely with<br />
the Dutch government,<br />
Morpho (Safran)<br />
leveraged its experience<br />
and expertise to develop<br />
highly secure biometric<br />
travel documents and<br />
identity cards integrating<br />
cutting-edge technology.<br />
With new, innovative<br />
security features and<br />
a validity of 10 years,<br />
the latest generation<br />
identification documents<br />
will provide greater<br />
protection against<br />
document fraud.<br />
The ID card and travel<br />
document datapage<br />
now feature Morpho’s<br />
patented Stereo Laser<br />
Image (SLI® technology,<br />
a three-dimensional<br />
image reproducing<br />
the document holder’s<br />
portrait). Designed to<br />
check the authenticity<br />
of the primary image,<br />
this innovative security<br />
feature helps prevent<br />
photo falsification. For<br />
additional security, a laser<br />
perforated number (TLN<br />
- Tilted Laser Number),<br />
visible when tilted against<br />
the light, will be located<br />
on the primary image of<br />
each document.<br />
22 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />
<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 23
EVENT CALENDAR<br />
July <strong>2014</strong><br />
14-20<br />
Farnborough Airshow, UK<br />
www.farnborough.com<br />
16-18<br />
Asia Defence & <strong>Security</strong>, Manila, Philippines<br />
www.adas.ph<br />
22-23<br />
RSA Conference Asia Pacific & Japan, Singapore<br />
www.rsaconference.com/events/ap14<br />
August <strong>2014</strong><br />
20-22<br />
Secutech Vietnam, Ho Chi Minh City, Vietnam<br />
www.secutechvietnam.com/<br />
27-29<br />
Safety & <strong>Security</strong> Asia, Singapore<br />
www.safetysecurityasia.com.sg<br />
September <strong>2014</strong><br />
9-11<br />
General Police Equipment Exhibition & Conference<br />
(GPEC), Leipzig, Germany<br />
gpec.de<br />
22-25<br />
SPIE <strong>Security</strong> + Defence, Amsterdam, Netherlands<br />
spie.org<br />
24-25<br />
Emergency Services Show, UK<br />
www.emergencyuk.com<br />
29-2 Oct<br />
ASIS International, USA<br />
www.asisonline.org<br />
October <strong>2014</strong><br />
8-9<br />
Cyber <strong>Security</strong> Expo, London, UK<br />
www.ipexpo.co.uk/<br />
9-10<br />
<strong>World</strong> Cities Conference, London, UK<br />
www.worldcitiesconference.com<br />
21<br />
SC Congress, New York, USA<br />
congress.scmagazine.com<br />
To have your event listed please email details to<br />
the editor tony.kingham@worldsecurity-index.com<br />
November <strong>2014</strong><br />
4-6<br />
14th Annual AAAE/TSA/DHS Aviation <strong>Security</strong><br />
Summit, USA<br />
www.aaae.org<br />
9-12<br />
3rd Homeland <strong>Security</strong> Show <strong>2014</strong>, USA<br />
December <strong>2014</strong><br />
9-11<br />
3rd <strong>World</strong> BORDERPOL Congress, Hungary<br />
www.world-borderpol-congress.com<br />
January 2015<br />
18-20<br />
Intersec Middle East, Dubai<br />
www.intersecexpo.com<br />
March 2015<br />
4-5<br />
Critical Infrastructure Protection & Resilience<br />
Europe, The Hague, Netherlands<br />
www.cipre-expo.com<br />
4-5<br />
Personnel Protection & Safety Europe, The Hague,<br />
Netherlands<br />
www.personnel-protection.com<br />
24 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com