30.06.2014 Views

World Security Report June 2014

For the latest news, features, essential analysis and comment on security, counter-terrorism, international affairs, warfare and defence

For the latest news, features, essential analysis and comment on security, counter-terrorism, international affairs, warfare and defence

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

For the latest news, features, essential analysis and comment on security, counter-terrorism, international affairs, warfare and defence<br />

<strong>June</strong> <strong>2014</strong><br />

Subscribe Here<br />

The importance of the Internet<br />

infrastructure for every day life.<br />

Port <strong>Security</strong>: The Front Line<br />

Threat Detection and Recognition<br />

Industry News<br />

www.world-borderpol-congress.com<br />

www.cipre-expo.com<br />

www.personnel-protection.com


EDITORIAL<br />

3 rd <strong>World</strong> BORDERPOL Congress<br />

9 th -11 th December <strong>2014</strong><br />

Budapest, Hungary<br />

www.world-borderpol-congress.com<br />

Connecting and Protecting<br />

The <strong>World</strong> BORDERPOL Congress is the only multi-jurisdictional transnational<br />

platform where the border protection, management and security industry policymakers<br />

and practitioners convene annually to discuss the international challenges<br />

faced in protecting not only one’s own country’s borders, but those of neighbours and<br />

friends.<br />

The 3rd <strong>World</strong> BORDERPOL Congress will provide a platform for the world’s border<br />

protection forces and agencies to discuss and debate the current and future issues<br />

and challenges facing the border management, security and migration management<br />

sectors.<br />

We look forward to welcoming you to the wonderful city of Budapest, Hungary<br />

in December <strong>2014</strong> for the next gathering of border and migration management<br />

professionals.<br />

For further details and to submit your abstract visit www.world-borderpol-congress.com<br />

To discuss exhibiting and sponsorship opportunities and your involvement with the<br />

<strong>World</strong> BORDERPOL Congress <strong>2014</strong> please contact:<br />

Tony Kingham<br />

Exhibit Sales Director<br />

T: +44 (0) 208 144 5934<br />

M: +44 (0)7827 297465<br />

E: tony.kingham@worldsecurity-index.com<br />

Paul Gloc (UK & Europe)<br />

T: +44 (0) 7786 270820<br />

E: paulg@torchmarketing.co.uk<br />

Denne Johnson (Americas)<br />

T: +1 918 863 9792<br />

E: dennej@torchmarketing.co.uk<br />

When your staff are<br />

travelling, have you taken<br />

“all reasonable care” of their<br />

safety and security?<br />

Since the last issue of WSR was published,<br />

I am pleased to say we have launched<br />

our latest event, Personnel Protection and<br />

Safety Europe. The reason being, whilst<br />

governments around the world, quite rightly,<br />

spend a great deal of time, effort and money<br />

focussing on keeping the travelling public<br />

safe from attacks by terrorists, the simple<br />

truth is that when travelling we are far more<br />

likely to come to harm as a victim of crime, an<br />

accident or some sort of health emergency!<br />

In fact, if you travel enough, whether it is for<br />

business or pleasure, you are likely to have been<br />

a victim of one or the other, or like me, all three!<br />

I am amazed at how many companies routinely send their personnel off all<br />

over the world without giving their safety a second thought. It concerned me<br />

so much, that back in the day when I ran an international sales department,<br />

I took it upon myself to run travel safety awareness training sessions for my<br />

own staff, which promptly stopped when I left.<br />

What makes it more surprising is that all companies are aware of their ‘Duty<br />

of Care’ to their employees, yet when their staff travel and are at their most<br />

vulnerable, little is done in terms of systems, procedures, equipment or<br />

training to prepare them for what, for some of them at least, is inevitable.<br />

In the litigious world we live in, with the “no win no fee” lawyers, the legal<br />

and financial consequences of not taking “all reasonable care” could be<br />

considerable and for smaller companies potentially disastrous!<br />

So what is “all reasonable care”?<br />

Well that’s something the courts will ultimately decide but at the very least<br />

there should be procedures in place to assess travel risks and to deal with<br />

an emergency when it arises. Over and above that, it could be argued that<br />

some sort of training should be given routinely to staff that travel regularly<br />

and that smart phones and apps offer all sorts of possibilities for tracking<br />

employees movements, provide alerts, emergency panic numbers at<br />

“reasonable” cost! For bigger companies, more comprehensive measures<br />

may be deemed “reasonable”!<br />

What is sure is that companies that do not take “all reasonable care”, do so<br />

at their own risk!<br />

www.worldsecurity-index.com<br />

Editorial:<br />

Tony Kingham<br />

E: tony.kingham@worldsecurityindex.com<br />

Contributing Editorial:<br />

Neil Walker<br />

E: neilw@torchmarketing.co.uk<br />

Design, Marketing & Production:<br />

Neil Walker<br />

E: neilw@torchmarketing.co.uk<br />

Advertising Sales:<br />

Tony Kingham<br />

T: +44 (0) 208 144 5934<br />

M: +44 (0)7827 297465<br />

E: tony.kingham@worldsecurityindex.com<br />

Paul Gloc (UK & Europe)<br />

T: +44 (0) 7786 270820<br />

E: paulg@torchmarketing.co.uk<br />

Denne Johnson (Americas)<br />

T: +1 918 863 9792<br />

E: dennej@torchmarketing.co.uk<br />

Subscriptions:<br />

Tony Kingham<br />

E: tony.kingham@worldsecurityindex.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> is<br />

a bi-monthly electronic,<br />

fully accessible e-news<br />

service distributed to 38,000<br />

organisations globally. It tracks<br />

the full range of problems<br />

and threats faced by today’s<br />

governments, armed and security<br />

forces and civilian services and<br />

looks at how they are dealing<br />

with them. It is a prime source of<br />

online information and analysis<br />

on security, counter-terrorism,<br />

international affairs, warfare and<br />

defence.<br />

Co-organisers:<br />

Supporting Organisations:<br />

Media Partners:<br />

Tony Kingham<br />

Editor<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong><br />

Copyright of KNM Media and<br />

Torch Marketing.<br />

www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 3


CYBER SECURITY<br />

CYBER SECURITY<br />

The<br />

importance<br />

of the<br />

Internet<br />

infrastructure<br />

for every day<br />

life.<br />

Every day we read about the single digital market, the importance of a free and open Internet and the need of<br />

trust and security in electronic communications networks. The Internet is an assumed, and for specific services<br />

critical, component of everyday life but yet we still have to develop methodologies to fully assess what are the most<br />

important components from a national and international perspective and how they are structured. This is important<br />

not only in the short term to understand our dependencies on network connectivity but also in the long term to<br />

properly focus efforts for enhancing the resilience of data communication networks.<br />

The Internet infrastructure<br />

is the backbone of the<br />

information society but as<br />

it has become clear in the recent<br />

news, different threats, both<br />

technical and geopolitical, can<br />

hamper its availability. Citizens<br />

expect national authorities and<br />

operators to be fully aware of the<br />

possible interdependencies and<br />

put in place all possible measures<br />

to ensure the security and<br />

resilience of their communications.<br />

To build trust and secure the<br />

future of the information society,<br />

answering the following questions<br />

is becoming increasingly<br />

important:<br />

• What is the Internet today,<br />

how is it organized, what can<br />

we understand from its current<br />

structure, which are the most<br />

important components of it?<br />

• What is a critical service, network<br />

or component in today Internet<br />

infrastructure and how can we<br />

define what is national and what is<br />

cross-border?<br />

• What assets and services are<br />

vulnerable and what happens<br />

to critical services if they are<br />

disrupted?<br />

• How can we enhance security<br />

and resilience of the Internet<br />

interconnections?<br />

Understanding the complexity<br />

of the most complex network<br />

humanity created is a challenging<br />

task. The Internet in 30 years<br />

has changed the way we work,<br />

communicate and interact as<br />

a society and we are still at the<br />

very beginning of this societal<br />

revolution.<br />

It is essential that we are fully<br />

aware of our dependency on<br />

the infrastructure and how it is<br />

organized in each country. This can<br />

also be useful to understand if part<br />

of the assets, belonging to Critical<br />

Infrastructure (CIs), should be<br />

treated with higher requirements<br />

of security and resilience and<br />

the role they play for the global<br />

coherence of the Internet. Any<br />

assessment should be done<br />

from a Critical Information<br />

Infrastructure Protection<br />

(CIIP) perspective and should<br />

involve the Internet operational<br />

community in fostering the<br />

security and resilience of public<br />

communication networks and<br />

in general for the benefit of the<br />

entire Internet. Moreover having<br />

such an understanding could help<br />

every country in establishing a<br />

constructive dialogue with Internet<br />

operators and participate in the<br />

multi-stakeholder discussion on<br />

how to maintain the Internet<br />

globally secure and resilient.<br />

1 Challenges<br />

Every component of the Internet<br />

layers has its own vulnerabilities<br />

and represents a topic of study.<br />

For example<br />

• Physical infrastructure – cable<br />

systems and submarine cables are<br />

critical as well as the dependency<br />

on power supply 1 . Moreover<br />

communications can be tapped or<br />

targeted by specific attacks.<br />

• Hardware – In all the incidents<br />

regarding availability reported to<br />

ENISA in 2012 2 , hardware failure<br />

was the most common cause.<br />

• Software and Protocols – bugs<br />

in protocol implementation and<br />

exploitation of vulnerabilities<br />

as in traffic hijacks are realistic<br />

scenarios.<br />

Looking at the different<br />

components of the infrastructure,<br />

both at physical and at logical<br />

level, the following lists can be<br />

considered as an example<br />

of an initial set of threats that<br />

should be covered in an all<br />

hazard approach (Table 2):<br />

In recent times there have<br />

been several incidents that<br />

can be used as an example<br />

of the threats to which the<br />

infrastructure is vulnerable<br />

(see list below). While these<br />

incidents didn’t affect the<br />

Internet at a global scale<br />

or European scale, the<br />

effects on a local scale<br />

were rather noticeable or<br />

underline the persistence of<br />

known vulnerabilities. They<br />

therefore serve as a reminder<br />

that while the Internet at global<br />

level can be considered resilient,<br />

it cannot be taken for granted<br />

that this is also true for the local<br />

part of the Internet infrastructure<br />

serving a particular region, or<br />

country or involved in a targeted<br />

attack. Even disputes between<br />

private, non-State actors can have<br />

important effects on the local<br />

Internet infrastructure.<br />

Different causes of incidents can<br />

affect the different components:<br />

• Natural disasters and cable<br />

Table 2 – Threats to the physical and logical infrastructure<br />

cuts can affect the connectivity to<br />

specific areas 3 :<br />

• Attempts to block one country’s<br />

connectivity via physical 4 and<br />

network 5 disruption can have<br />

cascading consequences for<br />

Internet users even in another<br />

country due to the cross border<br />

nature of interconnections<br />

• Misconfigurations 6 can cause<br />

temporary and involuntary traffic<br />

reroutes<br />

• Large attacks 7 to specific services<br />

can have repercussions and create<br />

congestion<br />

• BGP hijacks or man in the<br />

middle attacks 8 and attacks to the<br />

DNS infrastructure 9 can be used to<br />

transparently reroute and intercept<br />

traffic or black hole it for a certain<br />

destination 10<br />

2 ENISA Efforts for the security<br />

and resilience of communication<br />

networks<br />

ENISA, the European Union<br />

Agency for Network and<br />

Information <strong>Security</strong> has studied<br />

the resilience of Internet<br />

infrastructure in Europe since<br />

2010, paying attention to both<br />

the technical and organizational<br />

components. The goal is to<br />

provide Member States with<br />

frameworks and resources to<br />

better secure and ensure the<br />

resilience of their networks. The<br />

“Inter-X: Resilience of the Internet<br />

Interconnection Ecosystem 11 “<br />

study was the first step ENISA<br />

took towards studying this area in<br />

2010. In 2011, it was followed up<br />

with a study assessing technical<br />

(e.g. logical, physical, application<br />

layers, replication and diversity of<br />

services and data, data centres),<br />

peering and transit e.g. Service<br />

Level Agreements (SLAs), as well<br />

as market, policy and regulatory<br />

4 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 5


CYBER SECURITY<br />

CYBER SECURITY<br />

issues.<br />

In 2013, ENISA released<br />

“Understanding the importance<br />

of the Internet Infrastructure<br />

in Europe” 12 continuing<br />

further its work in this area.<br />

The goal of this report is to<br />

foster security and resilience<br />

of the Internet infrastructure in<br />

Europe with particular attention<br />

to critical assets and cross<br />

border interdependencies<br />

and work together with<br />

Internet operational actors to<br />

maintain the Internet globally<br />

coherent, secure and resilient.<br />

The report contains several<br />

recommendations for Member<br />

States, providers of critical<br />

services and European Internet<br />

operational actors:<br />

• Member States should develop<br />

a national overview of the Internet<br />

infrastructure - Using the step by<br />

step guidelines proposed in the<br />

study, Member States are invited<br />

to develop an insight of the<br />

current infrastructure, the Critical<br />

Infrastructure interdependencies<br />

and have a baseline for future<br />

developments.<br />

• Member States should adopt<br />

a standardized methodology<br />

for the identification of Critical<br />

Information Infrastructure assets<br />

and services - In order to correctly<br />

assess the criticality of specific<br />

assets and services, Member<br />

States should be able to adopt<br />

a common methodology for<br />

the identification of Critical<br />

Information Infrastructures.<br />

• Member States should adopt<br />

specific physical infrastructure<br />

guidelines - Any research should<br />

always take under consideration<br />

the physical component and<br />

provide a holistic overview of<br />

the system. When looking at<br />

the physical infrastructure more<br />

specific guidelines should be also<br />

developed.<br />

• Critical services providers should<br />

develop requirements<br />

for high availability<br />

interconnections<br />

for critical services<br />

- During the<br />

discussion with<br />

operators, it was<br />

underlined that if<br />

providers of critical<br />

services consider<br />

some connectivity<br />

relationships as<br />

critical, they should<br />

require for these<br />

interconnections<br />

higher level<br />

of availability,<br />

integrity and confidentiality<br />

in order to enhance the<br />

security and resilience of these<br />

communications.<br />

• National and European<br />

bodies and cyber security<br />

agencies should engage the<br />

Internet community - Due to<br />

the multi-stakeholder nature<br />

of the Internet, we propose<br />

national and European<br />

bodies and cyber security<br />

agencies (active in the area<br />

of security and resilience of<br />

communication networks) to<br />

engage in a dialogue with<br />

the Internet community and the<br />

private sector.<br />

• European Commission and<br />

Member States should foster<br />

research on infrastructure security<br />

and resilience - The more we rely<br />

on electronic communication<br />

networks to build the future<br />

European information society,<br />

the more EU and Member State<br />

should foster research in this<br />

field. Moreover more research<br />

on vulnerabilities of the core<br />

components of the global Internet<br />

Infrastructure such as DNS and<br />

BGP is needed.<br />

• European Internet operational<br />

actors should share information<br />

about incidents affecting physical<br />

and logical infrastructure -<br />

European Internet operational<br />

actors are invited to share<br />

information on incident affecting<br />

physical and logical infrastructure<br />

and use it to develop good<br />

practices for the benefit of the<br />

entire community.<br />

In <strong>2014</strong> ENISA will follow up the<br />

2013 report with the following<br />

actions:<br />

• focusing on the identification<br />

of CIIs assets and services,<br />

physical and logical infrastructure<br />

vulnerabilities, procurement<br />

guidelines for CIIs operators and<br />

cross border cooperation<br />

• developing a threat landscape<br />

of the physical and logical layer of<br />

the Internet infrastructure<br />

• fostering the ENISA’s Internet<br />

infrastructure security and<br />

resilience reference group<br />

which aims to gather subject<br />

matter experts<br />

from the Internet<br />

operators’ community,<br />

Cybersecurity<br />

agencies, NRAs,<br />

contingency agencies<br />

and infrastructure<br />

security and resilience<br />

experts.<br />

The goal is to develop<br />

infrastructure security<br />

and resilience not<br />

only for securing<br />

European citizens but<br />

also the entire Internet.<br />

The Internet is an<br />

ordinary component<br />

of everyday life and<br />

considering news regarding<br />

recent threats, it is important to<br />

assess the current situation and<br />

ensure the security and resilience<br />

of citizens’ communications.<br />

Moreover, future scenarios<br />

such as the Internet of Things 13 ,<br />

Interconnected Mobility 14 and<br />

Smart city 15 are at their very<br />

beginning and are built on<br />

these same communication<br />

networks. In this respect, every<br />

citizen is a potential Internet<br />

user as far as a service relies<br />

on an Internet connection. For<br />

these reasons ENISA believes<br />

that is important to investigate<br />

how the interconnections are<br />

structured and understand what<br />

is critical in order to focus efforts.<br />

Communication networks are the<br />

building blocks of the information<br />

society and it is clear that the<br />

absence of knowledge regarding<br />

the underlying infrastructure could<br />

severely hamper not only securing<br />

current communications but also<br />

the preparing for future threat<br />

scenarios.<br />

1<br />

ENISA (2013), Power Supply Dependencies in the Electronic Communications Sector<br />

2<br />

ENISA (2013), Annual Incident <strong>Report</strong>s 2012 - Analysis of Article 13a annual incident reports, 2013<br />

3<br />

Massive Flooding Damages Several NYC Data Centers http://www.datacenterknowledge.com/archives/2012/10/30/majorflooding-nyc-data-centers/<br />

4<br />

Mediterranean Cable Disruption as Seen in RIPEstat https://labs.ripe.net/Members/mirjam/mediterranean-cable-disruption-asseen-in-ripestat<br />

5<br />

Dainotti, A., Squarcella, C., Aben, E., Claffy, K. C., Chiesa, M., Russo, M., & Pescapé, A. (2011). ‘Analysis of country-wide Internet<br />

outages caused by censorship’. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (pp.<br />

1-18). ACM<br />

6<br />

YouTube Hijacking: A RIPE NCC RIS case study http://www.ripe.net/Internet-coordination/news/industry-developments/youtubehijacking-a-ripe-ncc-ris-case-study<br />

7<br />

ENISA (<strong>2014</strong>) Large scale UDP attacks: the <strong>2014</strong> trend and how to face it https://www.enisa.europa.eu/publications/flash-notes/<br />

large-scale-udp-attacks-the-<strong>2014</strong>-trend-and-how-to-face-it<br />

8<br />

Cowie, J, (2013) The New Threat: Targeted Internet Traffic Misdirection http://www.renesys.com/2013/11/mitm-Internet-hijacking/<br />

9<br />

Google’s Public DNS intercepted in Turkey http://googleonlinesecurity.blogspot.in/<strong>2014</strong>/03/googles-public-dns-intercepted-inturkey.html<br />

10<br />

Toonk, A. (2013) Accidentally Stealing the Internet http://www.bgpmon.net/accidentally-stealing-the-Internet/<br />

11<br />

ENISA (2010) https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/interx/report<br />

12<br />

ENISA (2013) Understanding the importance of the Internet Infrastructure in Europe - Guidelines for enhancing the Resilience of<br />

eCommunication Networks http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/<br />

guidelines-for-enhancing-the-resilience-of-ecommunication-networks<br />

13<br />

Digital agenda for Europe http://ec.europa.eu/digital-agenda/en/internet-things<br />

14<br />

Vision of an interconnected Europe http://ec.europa.eu/news/transport/110328_en.htm<br />

15<br />

Smart Cities and Communities http://ec.europa.eu/eip/smartcities/<br />

6 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 7


PORT SECURITY<br />

PORT SECURITY<br />

Port<br />

<strong>Security</strong>:<br />

The Front<br />

Line<br />

Once upon a time commercial ports only had to deal with three key threats on a daily basis - theft, damage to goods<br />

and stowaways all of which have the potential to cause considerable financial damage to stakeholders but were<br />

identifiable and manageable. The contemporary port is subject to a far wider range of threats including the possibility<br />

of terrorist attack and has to respond accordingly while managing and responding to a plethora of local, national<br />

and international legislative requirements. The diversity of responses, systems and processes to tackle each separate<br />

threat combined with the demands of compliancy has made the job of the Port Facility <strong>Security</strong> Officer (PFSO)<br />

onerous to the point of breaking.<br />

<strong>Security</strong> expert and former Chairman of the <strong>Security</strong> Development Board Rotterdam Port, Henk van Unnik, explains<br />

how a lack of cohesion has resulted in the current scenario and that a solution to the problem has been developed<br />

through the <strong>Security</strong> UPgrade for PORTs (SUPPORT) research & development project which is part-funded by the<br />

European Commision’s FP7 <strong>Security</strong> Research Programme. He explains how the appropriate management of<br />

resources can be co-ordinated and deployed to improve efficiency, effectiveness and port security.<br />

With 90% of EU’s<br />

external trade and<br />

40% of internal<br />

trade transported by ship, the<br />

contemporary sea port is a vital<br />

cog in the massive machine<br />

that is 21st Century commerce.<br />

Unsurprisingly, port infrastructure<br />

and the 3.5 billion tonnes of<br />

freight that flows through EU<br />

facilities are vital to maintaining<br />

both global and individual<br />

countries’ economic wellbeing.<br />

The potential threats to port<br />

security come on many different<br />

levels from a range of groups<br />

and individuals with very different<br />

aims and objectives. Theft, fraud,<br />

corruption, drugs trafficking and<br />

people trafficking are all major<br />

issues for port security, especially<br />

when their motivation can be<br />

traced back to organised crime or<br />

terrorist groups. The combination<br />

of sophisticated organised crime,<br />

the heightened risk of terrorist<br />

activity and the ongoing threat<br />

of low level crime ensures that<br />

ports are under threat 24 hours<br />

per day, 365 days per year. Well<br />

Henk van<br />

Unnik,<br />

Chairman,<br />

<strong>Security</strong><br />

Development<br />

Board<br />

Rotterdam<br />

Port<br />

organised criminal gangs now<br />

have access to enough money,<br />

knowledge and skills to develop<br />

considerably more complex<br />

modus operandi. Where in the<br />

past, criminal organisations would<br />

use bribery or extortion to secure<br />

access, information or control of<br />

a particular shipment, recently<br />

there has been a move to bypass<br />

the human element and hijack<br />

the technology. Recent events<br />

at a Northern European port<br />

have demonstrated how easily<br />

a fully automated logistics chain<br />

can be manipulated if security is<br />

breached. Rather than having to<br />

run the risk of ‘stealing’ a container<br />

and getting through port security,<br />

or leaving a trail of names or<br />

addresses that can be followed up<br />

by law-enforcement agencies later,<br />

cybercrime ensures that all the<br />

key physical checks appear 100%<br />

legitimate at the dock gate, but<br />

can be wiped clean electronically,<br />

removing all trace. Faced with<br />

such innovative and complex<br />

criminal activity, port security<br />

needs to raise its game.<br />

While the baseline level of port<br />

security has certainly improved<br />

since the relaxation of border<br />

security between mainland-<br />

European countries in 1995, there<br />

are still major variations between<br />

different facilities. Some of this can<br />

be attributed to experience, some<br />

is driven by national or regional<br />

culture but some is due to the way<br />

legislation has been applied.<br />

The legislation that defines<br />

port security is the International<br />

Maritime Organisation’s (IMO)<br />

International Ship and Port facility<br />

<strong>Security</strong> code (ISPS) which, in turn,<br />

is part of the Safety of Life at Sea<br />

(SOLAS) regulations. Developed<br />

in the aftermath of the September<br />

11th terrorist attacks, the ISPS<br />

regulates security on-board<br />

ships, as well as inside ports and<br />

terminals which receive seagoing<br />

vessels on international voyages.<br />

The ethos of the ISPS code is<br />

very preventive and includes a<br />

requirement for both vulnerability<br />

SUPPORT<br />

integrates<br />

legacy port<br />

systems<br />

with new<br />

surveillance<br />

and<br />

information<br />

management<br />

systems<br />

and threat assessments to<br />

be carried out. Risks and<br />

vulnerabilities are very different<br />

when considering a container,<br />

bulk or passenger terminal and so<br />

all assessments must be specific<br />

and bespoke. The ISPS code<br />

also specifies a basic security<br />

framework including monitoring<br />

and controlling access, monitoring<br />

the activities of people and cargo,<br />

the preparation of specific ship<br />

and Port Facility <strong>Security</strong> Plans<br />

and the appointment of Ship<br />

<strong>Security</strong> Officers and a Port Facility<br />

<strong>Security</strong> Officer (PFSO).<br />

Across the European Union (EU),<br />

the ISPS code is supported by<br />

European Commission Directive<br />

725. While identical to the ISPS<br />

code in content and a mandatory<br />

piece of pan-European legislation,<br />

Directive 725 only requires<br />

member states to achieve a<br />

particular result without dictating<br />

the means of achieving that<br />

outcome. Consequently, the<br />

ISPS code was implemented<br />

by 21 EU countries, each in<br />

a different way without any<br />

homogenisation of approach<br />

or standardisation. Although<br />

the European Maritime Safety<br />

Agency (EMSA), FRONTEX and<br />

EUROPOL all touch upon port<br />

security, they have no executive<br />

powers and there is currently no<br />

Europe-wide framework. Without<br />

a Pan-European Federal Agency<br />

like the U.S. Department of<br />

Homeland <strong>Security</strong>, the European<br />

Union has no power to compel<br />

member states to work together<br />

or to follow prescriptive guidelines<br />

and individual ports work in<br />

isolation with commercially-driven<br />

secrecy, thwarting the sharing of<br />

intelligence or best-practice.<br />

Although responsibility rests with<br />

a variety of ministries or other<br />

government agencies across<br />

Europe, the burden of compliance<br />

and implementation of the ISPS<br />

code has been passed down to<br />

the individual terminal operators.<br />

This produces an interesting<br />

paradox as commercial companies<br />

whose aim is to make a profit to<br />

serve their board or shareholders<br />

are being made responsible for an<br />

activity that does not necessarily<br />

deliver any business benefit. Not<br />

surprisingly, enhanced security<br />

beyond that required to protect<br />

day to day business operations<br />

are often not high on Terminal<br />

Operator’s agendas, especially<br />

when national authorities do not<br />

have the power to force them to<br />

invest in such security measures.<br />

Despite the best efforts of<br />

regularity authorities, port security<br />

too often promises much and<br />

delivers little.<br />

Because of the very nature of a<br />

port facility with huge volumes<br />

of vehicle and cargo movements<br />

in and out each day, the level of<br />

security that can be physically<br />

implemented will always be<br />

a balance between risk and<br />

commercial reality. In this context<br />

the role of the Port Facility <strong>Security</strong><br />

Officer (PFSO) is key to ensuring<br />

this fine balance is maintained.<br />

Providing a framework to assist<br />

8 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 9


PORT SECURITY<br />

PORT SECURITY<br />

the PFSO is a major element<br />

of the EU’s <strong>Security</strong> UPgrade<br />

for PORTs (SUPPORT) project<br />

(www.supportproject.info)<br />

which is part-funded by the EC’s<br />

FP7 Research & Technological<br />

Development Programme. It is a<br />

collaboration of twenty European<br />

organisations whose focus is to<br />

raise the current level of port<br />

security. The SUPPORT project’s<br />

main objectives are to deliver<br />

‘validated’ generic port security<br />

management models (capturing<br />

reusable state-of-the-art and best<br />

practices) that can be customised<br />

for specific ports; and training and<br />

open standards based tools to aid<br />

security upgrade in EU ports.<br />

SUPPORT integrates legacy port<br />

systems with new surveillance<br />

and information management<br />

systems. It efficiently supports<br />

the complexity of a real port<br />

environment though an<br />

integrated, holistic approach.<br />

This ensures an improved level<br />

of security, while reducing the<br />

associated administrative burden<br />

on the port.<br />

Amongst the partners are a<br />

number of ports that have been<br />

selected to represent typical, but<br />

different operations. Starting from<br />

the perspective of the partner<br />

port operations, the project has<br />

identified key security gaps and<br />

has produced generic models<br />

describing measures to maintain<br />

or augment the efficient and<br />

secure operation of these ports.<br />

Communication and decision<br />

support tools incorporating<br />

semantic technologies have been<br />

developed, accessible to all the<br />

port security stakeholders.<br />

Full scale demonstrators have<br />

been organised in representative<br />

EU ports (Gothenburg, Lisbon and<br />

Piraeus) and augmented with a<br />

broader evaluation programme<br />

by members of a European<br />

Ports <strong>Security</strong> Forum. SUPPORT<br />

solutions include policy and<br />

standardisations proposals and<br />

training that can be used by any<br />

EU port to efficiently enhance its<br />

security level.<br />

One of SUPPORT’s key outputs<br />

is the Port <strong>Security</strong> Management<br />

System (PSMS) (www.mypsms.<br />

com). The PSMS is designed to<br />

help PFSOs to upgrade their<br />

security systems by empowering<br />

them with knowledge. It<br />

provides information, skills and<br />

methodologies that enable<br />

them to maintain, evaluate and<br />

upgrade their security measures<br />

and create security awareness<br />

without major investment. The<br />

PSMS also delivers outputs in the<br />

form of graphics that can be used<br />

to reinforce security threats and<br />

potential mitigation measures<br />

in presentations to managers or<br />

boards of directors.<br />

The whole PSMS package<br />

comprises five elements including<br />

a maturity module designed to<br />

enable security professionals<br />

to review and upgrade security<br />

plans to address terrorist threats; a<br />

corporate security module which<br />

addresses crime risks such as<br />

loss events, related to corporate<br />

processes and procedures;<br />

an e-learning education and<br />

examination module based on<br />

best practices of ISPS related<br />

maritime security educations<br />

including drills and exercises; a<br />

sharing and decision support<br />

module which enables security<br />

professionals to supervise<br />

facilities via the internet and to<br />

collaborate on a local, national or<br />

global scale and an Authorised<br />

Economic Operator (AEO)<br />

security self-assessment module<br />

which provides a system to reach<br />

compliancy and submit AEO<br />

application.<br />

The pressure of balancing<br />

commercial realities and security<br />

threats will certainly persist as<br />

long as current legislation remains<br />

placing the burden of investment<br />

and compliance on terminal<br />

operators. There is a school of<br />

thought that suggests the status<br />

quo will remain until a major<br />

terrorist incident takes place in a<br />

European port facility. However,<br />

with access to SUPPORT’s Port<br />

<strong>Security</strong> Management System<br />

(PSMS), PFSOs now have the tools<br />

to assess the situation, advise their<br />

management team and make<br />

the right decision, whatever the<br />

security threat might be.<br />

Hosted by:<br />

Convene; Converse; Collaborate<br />

The ever changing nature of threats, whether natural through<br />

climate change, or man-made through terrorism activities, either<br />

physical or cyber attacks, means the need to continually review<br />

and update policies, practices and technologies to meet these<br />

growing demands.<br />

The European Union is developing its policy on critical<br />

infrastructures in relation to the European Programme for Critical<br />

Infrastructure Protection (“EPCIP”) which considers measures<br />

that will enhance, where necessary, the level of protection of<br />

certain infrastructures against external threats.<br />

Critical Infrastructure Protection and Resilience Europe brings<br />

together leading stakeholders from industry, operators, agencies<br />

and governments to debate and collaborate on securing Europe’s<br />

critical infrastructure.<br />

For further details visit www.cipre-expo.com<br />

incorporating Critical Information<br />

Infrastructure Protection<br />

4 th -5 th March 2015<br />

The Hague, Netherlands<br />

www.cipre-expo.com<br />

How to Exhibit<br />

To discuss exhibiting and sponsorship<br />

opportunities and your involvement with<br />

Critical Infrastructure Protection & Resilience<br />

Europe please contact:<br />

Tony Kingham - Exhibit Sales Director<br />

T: +44 (0) 208 144 5934<br />

M: +44 (0)7827 297465<br />

E: tony.kingham@worldsecurity-index.com<br />

Paul Gloc (UK & Europe)<br />

T: +44 (0) 7786 270820<br />

E: paulg@torchmarketing.co.uk<br />

Denne Johnson (Americas)<br />

T: +1 918 863 9792<br />

E: dennej@torchmarketing.co.uk<br />

Gain access to leading decision makers from corporate and government establishments<br />

tasked with Critical Infrastructure Protection and Resilience.<br />

Owned & Organised by: Hosted by:<br />

Supporting Organisations: Media Partners:<br />

10 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com


TRANSPORT SECURITY<br />

TRANSPORT SECURITY<br />

Threat<br />

Detection<br />

and<br />

Recognition<br />

Trucks, trains, ships and oil rigs are all potential targets for criminal organisations<br />

Organisations that own, use or transport high value assets recognise the need to protect their goods and employees,<br />

especially when they are at their most vulnerable - when in remote or isolated situations, at night and when operating<br />

alone. By their very nature, trucks, trains, ships and oil rigs are all potential targets for criminal organisations.<br />

Furthermore, monitoring systems, early warning and deterrent technology have not been available to address this<br />

need at a remotely affordable cost. As a result, there has been an uneasy acceptance that in certain parts of the world,<br />

piracy, hijacking or theft are facts of commercial life. However, a refusal to accept this situation has helped to push this<br />

issue to the top of the EU agenda.<br />

Maria Andersson, at FOI, the Swedish Defence Research Agency and Technical Co-ordinator for ARENA explains the<br />

challenges in protecting high value assets on both land and at sea. She describes how the basis for a solution to the<br />

problem has been developed through the ARENA (Architecture for Recognition of thrEats to mobile assets using<br />

Networks of Affordable sensors) research & development project which is part-funded by the European Commission’s<br />

FP7 <strong>Security</strong> Research Programme. Dr. Andersson explains how the generic surveillance system that has been<br />

developed could provide robust, proactive threat detection and recognition, while being able to differentiate between<br />

real threats and false alarms across a range of environments using an affordable system of sensors.<br />

Pirates, highwaymen and train<br />

robbers may all sound faintly<br />

quaint and old fashioned, but<br />

anyone involved in the transport<br />

industry will tell you that their<br />

modern counterparts are as<br />

big a threat as they ever were.<br />

There is every sign that they will<br />

remain so, as long as goods<br />

and vehicles remain vulnerable<br />

when on the move and isolated.<br />

While the threat looms large, the<br />

technology installed on vehicles to<br />

detect potential security breaches<br />

remains crude in comparison to<br />

that now becoming available for<br />

static deployment.<br />

A ship, a lorry or a train is often<br />

highly secure while in a port or<br />

depot, being physically protected<br />

and under close surveillance, but<br />

once outside they are a relatively<br />

soft target for bands of organised<br />

and often dangerous criminals.<br />

The theft of high value, high risk<br />

products in transit cost businesses<br />

over €8.2 billion a year, according<br />

to recent European Union figures.<br />

Since the terrorist attacks on New<br />

York on September 11th 2001 the<br />

threat of terrorism has also loomed<br />

large over the transport sector.<br />

Oil rigs’ isolation means they face<br />

similar threats.<br />

Terror organisations may engage<br />

in theft to fund their operations or<br />

they may see it as an end in itself,<br />

potentially disrupting, destroying<br />

or capturing vehicles containing<br />

hazardous or dangerous materials<br />

such as chemical liquids, gas,<br />

or radioactive material. After<br />

the September 11th attacks the<br />

United Nations agreed proposals<br />

to enhance the security of<br />

dangerous goods in transport.<br />

Terror organisations have<br />

demonstrated their willingness<br />

to target mass transportation<br />

networks along with other areas of<br />

critical infrastructure.<br />

Over 70 per cent of all goods<br />

transported in the EU are<br />

transported using road haulage, a<br />

transport method which carries<br />

one of the highest risks of being<br />

victim of criminal activity. Truck<br />

thieves generally steal the whole<br />

vehicle or break into trailers to<br />

take the contents, sometimes<br />

cutting panels and causing other<br />

costly damage to gain access.<br />

Drivers too are vulnerable to<br />

attack and theft. The most<br />

common place for a truck to<br />

be attacked is at an unguarded<br />

parking lot while the driver is<br />

asleep. Large cities, like London<br />

and Madrid are the biggest hot<br />

spots, but countries like Belgium<br />

also have a problem. In the UK<br />

alone, 324,000 crimes were<br />

recorded against the transport<br />

and storage sector in 2012.<br />

The threat is equally pressing at<br />

sea as it is on land. Modern day<br />

piracy has presented a significant<br />

challenge since civil war broke<br />

out in Somalia in the early 1990s<br />

with an upsurge in recent years<br />

posing a threat to critical maritime<br />

infrastructure. There were no<br />

fewer than 49 piracy incidents in<br />

the first quarter of <strong>2014</strong> according<br />

to the International Maritime<br />

Bureau (IMB), an offshoot of<br />

the International Chamber of<br />

Commerce focussed on fighting<br />

maritime crime. Two of these<br />

vessels were hijacked, 37 boarded<br />

and five fired on board. Five more<br />

attempted attacks were reported.<br />

There were 12 reports off the<br />

Africa’s west<br />

coast, including<br />

the hijacking of<br />

two vessels with<br />

39 crew taken<br />

hostage and two<br />

kidnapped.<br />

<strong>Security</strong> on the<br />

move<br />

The impossibility<br />

of securing all<br />

main roads, rivers<br />

and open seas means the ships,<br />

trucks and trains they convey need<br />

to be equipped to detect threats<br />

themselves. Advance warning<br />

offers the chance to evade, deter<br />

or repel an intruder.<br />

A European Commissionbacked<br />

research project called<br />

ARENA, short for Architecture<br />

for Recognition of thrEats to<br />

mobile assets using Networks of<br />

Affordable sensors, has attempted<br />

to deliver a solution which could<br />

work in a wide range of transport<br />

scenarios. There are currently<br />

no affordable early warning or<br />

deterrent technologies to address<br />

the threat.<br />

FOI, the Swedish Defence<br />

Research Agency, co-ordinated<br />

the seven-strong research<br />

partnership drawn from five EU<br />

countries. FOI’s partners were:<br />

Leading international maritime<br />

design and engineering company,<br />

BMT Group; ITTI, an IT company<br />

from Poland; hi-tech firm SAFRAN<br />

Sagem Défense Sécurité of<br />

France; electronic security<br />

company SAFRAN MORPHO,<br />

the Netherlands Organisation for<br />

Applied Scientific Research (TNO);<br />

and the University of Reading, in<br />

the UK.<br />

The project is coming to a close<br />

next month at the end of its threeyear<br />

lifespan. Over that time the<br />

project sought to investigate a<br />

system applicable to a range of<br />

different deployments: stationary<br />

platforms relative to the land, such<br />

as a truck or train stop; stationary<br />

platforms relative to the sea, such<br />

as ships in port or oil rigs; mobile<br />

platforms relative to land, such<br />

as trucks or trains in transit; and<br />

mobile platforms relative to the<br />

sea, such as ships at sea or oil rig<br />

support vessels.<br />

Its research built on existing<br />

work on the surveillance of<br />

public spaces. No new sensor<br />

development was done. Instead,<br />

the team focussed on exploiting<br />

existing, low-cost sensor<br />

technologies like visual and<br />

infra-red video, acoustic sensors,<br />

seismic sensors and radar. It also<br />

built on other work, such as the<br />

Integrated Mobile <strong>Security</strong> Kit<br />

where a multi-sensor surveillance<br />

system is installed in a van<br />

which can be brought to public<br />

space when needed. Another<br />

contributing technology, known as<br />

ADABTS (Automatic Detection of<br />

Abnormal Behaviour and Threats<br />

in crowded Spaces), addresses<br />

automatic detection of abnormal<br />

human behaviour that might<br />

signal crime is afoot. And another,<br />

called SECTRONIC, is a 24-hour<br />

small area surveillance system for<br />

maritime application.<br />

ARENA also aimed to minimise<br />

nuisance the system might<br />

cause if it were to go off for no<br />

reason. Humans are naturally<br />

good at putting together lots<br />

of fragmentary information and<br />

12 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 13


TRANSPORT SECURITY<br />

INDUSTRY NEWS<br />

signals and spotting what is a<br />

threat and what is not. Machines<br />

on the other hand are not.<br />

The ARENA system combined<br />

complementary sensors to reduce<br />

false alarm rates. The threatdetection<br />

task was also broken<br />

down into four interconnected<br />

steps: object detection, object<br />

tracking; event recognition; and<br />

threat recognition. The fewer the<br />

bystanders to the vehicle, the<br />

easier the system could interpret<br />

what is going on, meaning that it<br />

would be easier to detect a threat<br />

in a quiet railway siding than when<br />

standing by a busy platform. For<br />

the same reason, trains may, on<br />

the whole, prove easier to protect<br />

than trucks, which often park in<br />

places where there is innocent<br />

foot traffic.<br />

The project also tackled the<br />

sensitive legal and ethical issues<br />

involved in surveillance and<br />

electronic security, particularly<br />

those revolving around privacy. It<br />

will be crucial to have the consent<br />

of the driver for any camera<br />

system which secures a vehicle<br />

on the basis of facial recognition.<br />

Facial recognition cameras were<br />

only used in the cab of a vehicle,<br />

so presented no challenge in<br />

respect of the privacy of passersby.<br />

ARENA’s innovative combination<br />

of existing surveillance technology<br />

provides autonomous monitoring<br />

The Homeland Defense and <strong>Security</strong> Database<br />

and situational awareness of the<br />

environment surrounding critical<br />

mobile assets, alerting personnel<br />

to threats. In achieving this goal<br />

it has the potential to fill the<br />

yawning security gap between<br />

harbours, depots and garages,<br />

currently a cash cow for criminals<br />

and potentially a loophole<br />

exploited by terrorists.<br />

There has been an uneasy<br />

acceptance that piracy, hijacking<br />

and thefts are facts of commercial<br />

life, particularly when trading in<br />

some parts of the world. But a<br />

growing refusal to accept this<br />

situation has helped to put the<br />

issue to the top of the EU agenda.<br />

ARENA may signal the beginning<br />

of a fundamental shift in the<br />

balance of power away from<br />

criminals, improving the safety of<br />

transport personnel and ultimately,<br />

cutting costs for everyone.<br />

Delta R Detection – Is this the magic bullet for airport security screening?<br />

In the aftermath of 911<br />

increasingly rigorous<br />

screening procedures<br />

have struggled to keep<br />

with the high demand at<br />

airport security and parcel<br />

screening checkpoints.<br />

What was needed was an<br />

automated high speed<br />

detection technologies that<br />

can process large volumes<br />

and be implemented with<br />

little or no need for human<br />

intervention.<br />

Working with experts in<br />

materials and computer<br />

science from the University<br />

of Florida Delta R<br />

Detection has developed a<br />

highly adaptable detection<br />

platform for sensing<br />

dangerous chemicals on<br />

the surface of objects. This<br />

technology has successfully<br />

been applied to rapidly<br />

scan baggage and cargo<br />

for explosives.<br />

This fully automated, high<br />

speed system solves the<br />

“needle in the haystack”<br />

problem of detecting<br />

explosives for the air<br />

transportation, parcel<br />

and cargo industries. The<br />

combination of sensitivity<br />

and high throughput<br />

makes the system ideal<br />

for baggage and parcel<br />

screening.<br />

The Delta R Detection<br />

automated carry-on<br />

baggage scanner can<br />

be placed directly in line<br />

with any existing x-ray<br />

machines. It uses a non<br />

invasive optical sampling<br />

technique to detect trace<br />

quantities of explosives.<br />

Luggage is simply placed<br />

on to the conveyer belt<br />

the way it would be at<br />

an existing checkpoint<br />

but it is simultaneously<br />

scanned for microscopic<br />

amounts of explosive. It<br />

plugs directly into existing<br />

infrastructure with no need<br />

for an additional operator<br />

and scans every carry-on<br />

bag for trace quantities of a<br />

broad range of explosives<br />

with a low false positive<br />

rate without increasing<br />

wait time at security check<br />

points<br />

Dr. Thierry Dubroca,<br />

CEO Delta R Detection<br />

said, “We have used the<br />

scientific discovery from<br />

the University of Florida<br />

to build a fully functioning<br />

prototype (currently<br />

being demonstrated at<br />

Schipol Airport, in The<br />

Netherlands). Using<br />

ultra violet spectroscopy<br />

we can now identify<br />

unique signatures of<br />

explosives. For example<br />

we can now detect sub<br />

microns grams of TNT<br />

on the surface of bags<br />

and parcels. Our current<br />

OD<strong>Security</strong> sells 3 SOTER Through-Body Scanners to Hong Kong<br />

Correctional Services<br />

prototype automatically<br />

detects explosives thanks<br />

to a custom designed<br />

software.”<br />

Dr Esen Yuksel, Research<br />

Scientist, University of<br />

California said, “We<br />

have designed a unique<br />

software for this low level<br />

of detection. With our<br />

high speed computing<br />

techniques and state of the<br />

art classification algorithms<br />

we are able to provide very<br />

low false alarm rates at very<br />

high speeds. We will have<br />

the ability to upgrade our<br />

software to detect future<br />

terrorist threats.<br />

Delta R Detection plan<br />

to turn the prototype to<br />

a product by bringing<br />

the hardware sensor and<br />

optical component to meet<br />

larger customers needs,<br />

such as higher sensitivity,<br />

and speed.<br />

<strong>World</strong><strong>Security</strong>-Index.com is the only global<br />

homeland security directory published in<br />

English, Arabic and Spanish on the web and<br />

Advertise on <strong>World</strong><strong>Security</strong>-Index.com<br />

in CD network format.<br />

from only £515 for 12 months<br />

Contact info@worldsecurity-index.com for details<br />

14 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> or call +44 www.worldsecurity-index.com<br />

(0) 208 144 5934.<br />

The Global <strong>Security</strong> Portal<br />

Netherlands based<br />

security manufacturer,<br />

OD<strong>Security</strong> has sold 3<br />

units of the SOTER RS<br />

Through Body Scanner<br />

to the Hong Kong<br />

Correctional Services,<br />

CSD (Correctional Services<br />

Department) for use in<br />

drug interdiction within a<br />

number of high security<br />

custodial establishments.<br />

The use of Through<br />

Body Scanners in prisons<br />

is regarded as the<br />

most effective way of<br />

www.worldsecurity-index.com<br />

countering the smuggling<br />

of items such as drugs,<br />

mobile phones, weapons<br />

and other contraband<br />

material without<br />

subjecting inmates and<br />

visitors to intrusive body<br />

searchers.<br />

The SOTER RS is a low<br />

dosage full body scanner<br />

which combines ultra low<br />

radiation with maximum<br />

visibility, for use at airports<br />

and prisons. Within<br />

seconds the SOTER RS<br />

reveals hidden items, such<br />

as weapons or narcotics,<br />

diamonds, or any stolen<br />

or smuggled goods. It<br />

doesn’t even have to be<br />

metal. The SOTER shows<br />

a clear difference between<br />

human tissue and other<br />

materials, even ingested<br />

or camouflaged items will<br />

be shown.<br />

The scanners will increase<br />

the level of security<br />

operations previously<br />

possible through the use<br />

of conventional metal<br />

detectors. Non metallic<br />

objects hidden under<br />

clothes, in natural cavities<br />

or within the human<br />

body cannot be detected<br />

by conventional metal<br />

detectors and typically,<br />

these non-detectable<br />

items, such as narcotics,<br />

explosives, precious<br />

stones, plastic weapons,<br />

or other contraband,<br />

can only otherwise be<br />

detected by highly<br />

intrusive total body<br />

searches.<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 15


INDUSTRY NEWS<br />

INDUSTRY NEWS<br />

Smiths Detection Wins USD 17.6 (SAR<br />

65.9) Million Order from Key Saudi<br />

Arabian <strong>Security</strong> Establishment<br />

Smiths Detection has won a<br />

USD 17.6 (SAR 65.9) million<br />

contract to supply a range<br />

of advanced equipment to<br />

one of the key Government<br />

security institutions in Saudi<br />

Arabia.<br />

The order includes<br />

HCVG high energy cargo<br />

screening system; CIP 300<br />

Car Inspection Portal; HI-<br />

SCAN 6040aTix explosives<br />

detection X-ray system;<br />

and IONSCAN 500DT and<br />

SABRE 5000 explosive<br />

and trace detection<br />

systems. Smiths Detection<br />

will also train the Saudi<br />

entity’s staff as part of the<br />

agreement. The identity<br />

of the institution cannot<br />

be revealed for security<br />

Ophir Optics launches two new products for Homeland <strong>Security</strong><br />

At this year’s Eurosatory<br />

exhibition, Ophir<br />

Optics launched two<br />

new infrared imaging<br />

optics for homeland<br />

security and defence<br />

applications.<br />

The SupIR 15-60 mm<br />

is a super-compact,<br />

motorized, continuous<br />

zoom lens designed<br />

especially for lightweight<br />

reasons.<br />

Edward Christie, Managing<br />

Director - Smiths Detection<br />

Middle East, said: “Saudi<br />

Arabia is a key market<br />

for us in the Middle East<br />

and we are thrilled to start<br />

our collaboration with a<br />

key Government entity.<br />

This is an exceptional<br />

opportunity to demonstrate<br />

the effectiveness of Smiths<br />

Detection products for<br />

critical premises. It shows<br />

that wherever there is<br />

the need for identifying a<br />

combination of chemical,<br />

biological, radiological,<br />

nuclear and explosives<br />

threats, we can provide<br />

the complete solution and<br />

training.”<br />

BAE Systems joins ‘big data’<br />

research to boost Australia’s<br />

national security<br />

BAE Systems has become<br />

an industry partner of<br />

the $88 million ‘big data’<br />

Cooperative Research<br />

Centre (CRC).<br />

The Data to Decisions<br />

CRC will start 1 July <strong>2014</strong><br />

to research and develop<br />

tools that seek to maximise<br />

the benefits of ‘big data’<br />

for Australia’s defence and<br />

national security sector.<br />

BAE Systems will<br />

contribute $1 million and<br />

in-kind support over the life<br />

of the five-year program.<br />

Mr Kim Scott, BAE<br />

Systems Australia Director<br />

– Business Development<br />

and Land & Integrated<br />

Systems, said “investing in<br />

the latest technology will<br />

be necessary to provide<br />

timely and accurate<br />

intelligence in the future”.<br />

“Big data comes from<br />

many sources at an<br />

alarming velocity, volume<br />

and variety, which makes<br />

it difficult to analyse using<br />

current technologies. Large<br />

amounts of text, images<br />

systems like minicopters<br />

and micro<br />

UAVs. The diffractionlimited<br />

optical design<br />

is optimized for<br />

LWIR sensors up to<br />

640x480 pixels and<br />

resolution down to<br />

17 micron pixel size.<br />

It has a ruggedized<br />

structure to assure<br />

performance is<br />

maintained in<br />

and audio are rapidly<br />

generated all the time<br />

through digital processes<br />

and social media,” said Mr<br />

Scott.<br />

Advances in technology<br />

allow BAE Systems to<br />

piece together disparate<br />

data and present it in an<br />

easy-to-use format for<br />

decision makers.<br />

The Data to Decisions<br />

CRC’s research will inform<br />

the Company’s integrated<br />

systems and software<br />

development programs to<br />

deliver data analytics, highspeed<br />

distribution and<br />

secure sharing for Defence<br />

and security customers.<br />

The CRC is funded partly<br />

by the Commonwealth<br />

through a grant, and<br />

partly through cash and<br />

in-kind contributions from<br />

defence, industry and<br />

university participants. The<br />

national headquarters is in<br />

South Australia with teams<br />

in Victoria and New South<br />

Wales.<br />

harsh environmental<br />

conditions and high shock<br />

environments.<br />

The SupIR 2.6mm is ideal<br />

for situational awareness<br />

and surveillance<br />

applications. These highperformance<br />

lenses can<br />

support LWIR sensors up<br />

to 1024x768 pixels, with<br />

resolution down to 12<br />

micron pixels.<br />

Stratech’s iVACS to deploy 30 more systems to the Middle East<br />

Singapore company<br />

Stratech Systems has<br />

announced that it is to<br />

deploy another 30 or more<br />

of its iVACS® intelligent<br />

Vehicle Access Control<br />

Systems in the Middle East.<br />

At least 25 iVACS will be<br />

deployed in a Smart City<br />

Project for one of the<br />

prominent capital cities in<br />

the Middle East. It will be<br />

part of a <strong>Security</strong> Program<br />

designed to establish a<br />

fully integrated security<br />

solution for a diversity<br />

of onshore, coastal and<br />

offshore critical assets<br />

across the customer’s<br />

mainland.<br />

This coincides with the<br />

worldwide trend of<br />

increasing take up rates<br />

for such systems. Previous<br />

orders for iVACS used to<br />

involve just a handful of<br />

units each, but nowadays,<br />

relatively large orders such<br />

as this are becoming more<br />

common.<br />

A new tool in the fight against the VBIED<br />

British company e2v<br />

have developed the<br />

RF Safe Stop system,<br />

a vehicle immobilising<br />

system designed to bring<br />

vehicles of all types to a<br />

halt using a blast of high<br />

power magnetrons. It uses<br />

the pulse to disrupt the<br />

electronics of the target<br />

vehicle to stop the<br />

engine.<br />

The system can<br />

be mounted<br />

on vehicles,<br />

such as an<br />

SUV, or in fixed<br />

installations,<br />

such as vehicle<br />

checkpoints<br />

at critical<br />

infrastructure<br />

buildings and<br />

facilities.<br />

Combined with traffic<br />

management barriers the<br />

system would an invaluable<br />

tool in the battle to prevent<br />

Vehicle Bourne Improvised<br />

Explosive Devices (VBIED’s).<br />

One of the most deadly<br />

and effective tools in the<br />

terrorist arsenal!<br />

e2v have developed<br />

iVACS® screens vehicle<br />

undercarriages for<br />

potential security threats<br />

such as IEDs – improvised<br />

explosive devices. Stratech<br />

under vehicle surveillance<br />

system, is capable of<br />

“intelligent” inspection<br />

of vehicle undercarriages,<br />

demonstration hardware<br />

with proven effects for<br />

engine stopping and<br />

disruption by utilising<br />

e2v’s patented switching<br />

products in conjunction with<br />

high power magnetrons,<br />

and carefully packaging<br />

these with appropriate<br />

antennas. This design<br />

and provides alerts when<br />

suspicious foreign objects<br />

or abnormalities are<br />

detected. iVACS® also<br />

performs identification<br />

screening for the driver and<br />

passengers in the vehicle<br />

using biometrics providing<br />

a comprehensive solution<br />

at screening checkpoints.<br />

The system is also Network<br />

enabled, which is very<br />

useful for large, networked<br />

deployments such as Smart<br />

City Projects or secure<br />

facilities with multiple<br />

entrances and exits.<br />

Networking the system<br />

means that multiple secure<br />

facilities and command<br />

and control of these secure<br />

facilities can share their<br />

databases.<br />

approach has resulted in a<br />

flexible solution which can<br />

be rapidly adapted to suit<br />

specific customer needs<br />

and achieve optimum<br />

performance.<br />

The system is also being<br />

trialled for boats and even<br />

helicopters.<br />

16 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 17


INDUSTRY NEWS<br />

INDUSTRY NEWS<br />

New innovations in physical<br />

protection from Technocover<br />

Technocover has<br />

introduced a series of<br />

innovations across its<br />

UltraSecure range of<br />

LPCB approved security<br />

equipment, billed as<br />

the next generation<br />

of intelligent physical<br />

protection.<br />

The company has been<br />

working with clients and<br />

technology suppliers to<br />

advance the functionality<br />

of its high security doors,<br />

enclosures, access covers<br />

and associated products to<br />

support strategic security<br />

and operational efficiency<br />

on the critical national<br />

infrastructure (CNI) site.<br />

New state-of-the-art access<br />

control offers scope to<br />

integrate UltraSecure<br />

equipment with central<br />

access management of<br />

multiple sites. Options<br />

include fob, keypad<br />

and radio-frequency<br />

identification (RFID)<br />

activated locks, with<br />

features such as personnel<br />

ID and hierarchical access<br />

control, failsafe or failsecure<br />

functions, and timed access<br />

features.<br />

Also new is an 8 point<br />

wheel lock for UltraSecure<br />

Sentinel doors, plus LCD<br />

privacy glass viewing<br />

panels, switching from<br />

frosted to clear. An<br />

innovative padlock<br />

with solenoid control is<br />

now available on new<br />

UltraSecure doors or for<br />

retrofitting to existing units.<br />

Simplifying sitework and<br />

project management<br />

is a new generation<br />

of UltraSecure kiosks,<br />

delivered ready-assembled<br />

and fitted out with M&E<br />

services for fast installation<br />

and easy connection to<br />

mains power. They come<br />

with factory-fitted access<br />

control data exchanges,<br />

vision panels, lighting,<br />

heating and ventilation<br />

services, plus an aesthetic<br />

new lining made from<br />

environmentally friendly,<br />

premium recycled HDPE<br />

plastic (also available<br />

on other UltraSecure<br />

products).<br />

Advances in horizontal<br />

access include an<br />

UltraSecure roof access<br />

hatch with remote control<br />

of opening/closing via<br />

a motorised actuator.<br />

The latest UltraSecure<br />

flush fitting access cover<br />

incorporates a<br />

3-tier design<br />

with inspection<br />

hatch, fall<br />

arrest system<br />

and anticontamination<br />

features for<br />

underground<br />

tanks and<br />

storage.<br />

ADANI launches new integrated<br />

door access full body scanner<br />

ADANI has officially<br />

launched the new Conpass<br />

DA integrated double door<br />

access full body scanner.<br />

The Conpass DA (Door<br />

Access) offers an integrated<br />

access control solution<br />

which has the capacity<br />

to detect a wide range<br />

of organic and inorganic<br />

objects concealed under<br />

clothing, in bags or hidden<br />

in the anatomical cavities<br />

of inspected individuals.<br />

The product is one of<br />

the latest and most<br />

advanced versions of the<br />

internationally successful<br />

ADANI Conpass full body<br />

scanner. The Conpass<br />

DA has the following<br />

unique features which<br />

highlight its advantages<br />

as a tool for enhancing<br />

security: Discrete selective<br />

scanning of visitors and<br />

staff; Opportunity to<br />

hold a suspect inside the<br />

booth; Remote operation;<br />

Bulletproof construction<br />

option; Integrated 2<br />

way communication and<br />

internal CCTV option<br />

The system can be<br />

integrated into existing<br />

entrance infrastructure<br />

and access control system.<br />

Therefore providing<br />

maximum effectiveness<br />

and improving efficiency<br />

of operational procedures<br />

of the security checkpoint.<br />

This model of full body<br />

scanner is designed to<br />

be used at VIP facilities,<br />

military bases, critical<br />

infrastructure sites and any<br />

other applications where<br />

there is a need for the<br />

highest level of security<br />

and visitor inspection.<br />

The advanced technology<br />

used in Conpass<br />

makes screening<br />

safe for operators<br />

and individuals<br />

being scanned. All<br />

Conpass systems<br />

are compliant with<br />

ANSI 43.17-2009<br />

regulations and that<br />

justifies its use for<br />

general public.<br />

Simon Lyster,<br />

Managing Director, ADANI<br />

Limited said ”The demand<br />

for more complete<br />

personnel screening<br />

solutions is increasing in<br />

a variety of markets as a<br />

result of a mixture of events<br />

and the realization by the<br />

enforcement agencies<br />

that the technology exists<br />

to safely screen for a<br />

wide range of banned<br />

and dangerous items.<br />

The ADANI Conpass DA<br />

offers a unique capability<br />

for discreetly scanning<br />

individuals entering sites<br />

where there is an issue of<br />

contraband smuggling or<br />

a constant security threat.<br />

At ADANI, we have always<br />

been proud of the fact<br />

that we offer a flexible<br />

approach to meeting the<br />

customer’s needs.”<br />

Axis announces full-featured fixed<br />

network cameras with WDR in HDTV<br />

1080p<br />

Axis Communications<br />

introduces new additions<br />

to its successful AXIS Q16<br />

Series. The latest cameras<br />

offer a number of new<br />

capabilities including<br />

wide dynamic range (Axis’<br />

WDR-Forensic Capture*),<br />

Lightfinder, HDTV 1080p<br />

resolution, electronic image<br />

stabilization and shock<br />

detection.<br />

“Airport, train station,<br />

government and perimeter<br />

protection are some<br />

examples of situations<br />

where image quality<br />

is critical to minimize<br />

investigation times and<br />

to protect assets – even<br />

if the lighting situation is<br />

extremely difficult,” says<br />

Erik Frännlid, Axis’ Director<br />

of Product Management.<br />

”The new AXIS Q1615<br />

cameras not only offer full<br />

HD resolution but also<br />

automatically switch settings<br />

between high dynamic<br />

scenes and Lightfinder<br />

mode, ensuring all details<br />

are captured in dark and<br />

bright areas at the same<br />

time. The new cameras are<br />

also our first fixed cameras<br />

to provide 50/60 frames per<br />

seconds in HDTV 1080p<br />

resolution. This is twice the<br />

normal frame rate, which<br />

allows the cameras to even<br />

better record smooth video<br />

when people or vehicles are<br />

moving fast.”<br />

In addition to the ability<br />

to seamlessly transition<br />

between WDR, Forensic<br />

Capture and Lightfinder<br />

mode, the indoor AXIS<br />

Q1615 and the outdoorready<br />

AXIS Q1615-E<br />

offer several image<br />

processing features to<br />

enhance image usability,<br />

such as barrel distortion<br />

correction, electronic image<br />

stabilization for steady<br />

images in an environment<br />

with tough vibrations. In<br />

addition, the fixed cameras<br />

also support high profile in<br />

H.264 and enhanced Max<br />

Bit Rate controllers which<br />

assure that the bandwidth<br />

remains within the defined<br />

limits.<br />

International Procurement Services<br />

announce the completion of contract<br />

to an unspecified European Police<br />

Force, with a total contract worth in<br />

excess of 500,000 GBP<br />

The contract to supply<br />

a complete range<br />

of countermeasure<br />

equipment and training<br />

includes OSCOR Green,<br />

ORION 2.4 NLJD and<br />

TALAN.<br />

The OSCOR GREEN<br />

Spectrum Analyser can<br />

detect illicit eavesdropping<br />

signals, perform site<br />

surveys for communication<br />

systems, conduct radio<br />

frequency emissions<br />

analysis and investigate<br />

misuse of the RF spectrum.<br />

It can be connected to<br />

remotely, enabling the<br />

operator to monitor away<br />

from the equipment and<br />

data files collected can be<br />

saved to external devices<br />

offering the ability to<br />

export data and produce<br />

reports on activity.<br />

The ORION 2.4 Non<br />

Linear Junction Detector<br />

is latest completely<br />

new lightweight version<br />

weighing just 1.4kg (3lbs)<br />

will detect the presence of<br />

electronics as small as SIM<br />

cards or mobile phones,<br />

regardless of whether<br />

the electronics target is<br />

radiating,<br />

hard wired,<br />

or even<br />

turned off.<br />

The Talan<br />

Telephone<br />

Line<br />

Analyser is<br />

the most<br />

recent<br />

state-ofthe-art<br />

Digital<br />

Telephone<br />

Line<br />

Analyser. It<br />

has been<br />

designed<br />

to detect<br />

illicit taps and bugs on<br />

either analogue or digital<br />

telephone lines. With new<br />

enhancements built into<br />

the software interface,<br />

users can also now test<br />

internet protocols (IP)<br />

packet traffic on voice-over<br />

Internet Protocol (VoIP)<br />

phones and systems,<br />

define advanced filtering<br />

options, and data can now<br />

be stored and exported to<br />

USB or Flash as data files<br />

for analysis or reporting<br />

purposes.<br />

18 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 19


INDUSTRY NEWS<br />

INDUSTRY NEWS<br />

Real-Time HD Video Stabiliser: Taming a harsh visual environment<br />

Real-time video stabilisers<br />

are critical for applications<br />

such as UAV guidance and<br />

surveillance, where camera<br />

shake from an unsteady<br />

platform would otherwise<br />

render the video unusable.<br />

The traditional mechanical<br />

approach of stabilising<br />

video, by physically moving<br />

the optics or the sensor, is<br />

expensive and bulky with<br />

performance deteriorating<br />

as image magnification<br />

increases. In contrast,<br />

digital electronic stabilisers<br />

are much smaller, lighter,<br />

considerably more power<br />

efficient and operate<br />

robustly, irrespective of<br />

magnification.<br />

Saab signs contract to provide maintenance support for the electronic security<br />

system for the Southern Queensland Correctional Centre<br />

Defence and security<br />

company Saab has<br />

received a contract to<br />

provide the planned and<br />

corrective maintenance<br />

and capital expenditure<br />

works for the electronic<br />

security system for<br />

the 300 bed Southern<br />

Truly high performance,<br />

high-definition (HD) realtime<br />

video stabilisation<br />

has been an elusive<br />

technology because, until<br />

recently, it has required<br />

the processing power of<br />

a small super computer<br />

to implement. The<br />

market needs a single chip<br />

solution that can operate<br />

robustly in extremely harsh<br />

environments using only a<br />

few watts of power.<br />

RFEL has created a<br />

solution in the form of an<br />

electronic video stabiliser<br />

that continuously processes<br />

over a billion bits of<br />

information every second<br />

and tracks the movements<br />

of several hundred<br />

independent image<br />

regions every video frame.<br />

This software also includes<br />

intelligent processing to<br />

Queensland Correctional<br />

Centre. The contract has<br />

a total value of MSEK<br />

166.<br />

Located near Gatton<br />

in the Lockyer Valley<br />

and opened in January<br />

2012, the 300-bed<br />

counter poor illumination,<br />

bland scene content and<br />

extraneous movements,<br />

such as the swaying<br />

of trees, which would<br />

otherwise compromise<br />

robustness.<br />

This state-of-the-art,<br />

real-time, HD video<br />

stabiliser IP is suitable for<br />

compact, lightweight,<br />

and low power hardware<br />

platforms. The solution<br />

is capable of adapting<br />

to its environment and<br />

can be optimised to<br />

the application, while<br />

supporting a diverse range<br />

of cameras. It can be<br />

implemented into a range<br />

of low power hardware<br />

platforms, including RFEL<br />

products, which have<br />

been proven in a range<br />

Southern Queensland<br />

Correctional Centre is<br />

the State’s newest prison.<br />

The electronic security<br />

system was originally<br />

installed by Saab in the<br />

centre and has been<br />

under comprehensive<br />

maintenance since the<br />

of demanding real world<br />

applications.<br />

This Video Processing<br />

Solution can be combined<br />

with other IP and run on<br />

RFEL’s HALO platform,<br />

which can combine<br />

several key functions that<br />

add value to the user,<br />

including, video scaling,<br />

image stabilisation, fusion,<br />

contrast enhancement,<br />

Picture in Picture overlay<br />

and correction of lens<br />

distortion.<br />

One core functionality,<br />

providing image fusion<br />

between two sensors is<br />

completely different from<br />

simple image blending.<br />

RFEL’s state-of-the-art<br />

fusion algorithm processes<br />

the images captured by<br />

two sensors, generally<br />

from different wavelengths,<br />

and is able to maintain<br />

the best attributes from<br />

both input images for the<br />

resulting output. This, in<br />

combination with image<br />

stabilisation, provides the<br />

user with the best view<br />

possible for informed<br />

decisions.<br />

facility opened. The<br />

system provides an<br />

integrated surveillance<br />

picture and total control<br />

of security sensors and<br />

locks within the prison<br />

environment.<br />

Operation Henry to be rolled out across 9 regions of England<br />

Operation Henry is a<br />

campaign to crack down<br />

on the supply of illicit<br />

tobacco in nine regions in<br />

England.<br />

In a partnership between<br />

the Trading Standards<br />

Institute (TSI) HM Revenue<br />

and Customs (HMRC local<br />

council authorities and<br />

Wagtail UK, a substantial<br />

amount genuine tobacco<br />

and cigarettes, counterfeit<br />

tobacco and cigarettes and<br />

Shisha tobacco.<br />

Operation Henry, runs from<br />

April through September<br />

<strong>2014</strong>, and aims to crack<br />

down on the supply of<br />

illicit tobacco across nine<br />

regions in England. Each<br />

region receives eight days<br />

of dog detection provided<br />

by Wagtail UK and funded<br />

by the Department of<br />

Health. The Operation is<br />

managed TSI.<br />

This partnership allows<br />

The new HoverMast-100 from Sky Sapience, in Israel, could prove a real<br />

winner with border guards, CIP and security personnel the world over.<br />

The HoverMast-100 is<br />

a tethered Unmanned<br />

Aerial Vehicle (UAV)<br />

which means it<br />

combines all the obvious<br />

advantages of a UAV<br />

without the associated<br />

problems, such as civil<br />

certification, launch,<br />

recovery and training.<br />

It is simply launched at<br />

the press of a button,<br />

deploys to a height of 50<br />

meters and is recovered<br />

in the same way.<br />

It can be installed<br />

and launched from<br />

trading standards officers<br />

to identify illicit tobacco<br />

‘hot spots’ by combining<br />

intelligence from HMRC<br />

and trading standards.<br />

Leon Livermore, chief<br />

executive of TSI, said: “This<br />

partnership is one more<br />

example of how trading<br />

standards works with the<br />

private and public sector<br />

to protect consumers and<br />

support legal business<br />

practices. Through this<br />

partnership, trading<br />

standards has a unique<br />

opportunity to share<br />

information and develop<br />

intelligence with the aim of<br />

taking illicit tobacco off the<br />

streets.”<br />

‘HMRC works closely<br />

with other enforcement<br />

agencies to crack down<br />

on illicit tobacco in<br />

the UK,’ said Richard<br />

Las, deputy director of<br />

Criminal Investigation<br />

for the HMRC. ‘Seizing<br />

illicit product is only one<br />

most small service<br />

vehicles, such as<br />

pick-up trucks, UGVs,<br />

even boats. The<br />

HoverMast is ideal<br />

for border patrol,<br />

homeland security<br />

and civilian security<br />

missions.<br />

The system is<br />

comprised of an<br />

aerial platform, base<br />

unit, and external<br />

power source, all of<br />

which are compact<br />

and lightweight. The<br />

aerodynamic platform<br />

is produced from<br />

of the tools used; the<br />

focus is on using a range<br />

of interventions, from<br />

penalties to prosecutions,<br />

to encourage compliance<br />

and maximise deterrent.<br />

Partnership working with<br />

Trading Standards is vital in<br />

order to share intelligence<br />

and collaborate on<br />

joint exercises such as<br />

Operation Henry to<br />

target those areas with<br />

the highest levels of illicit<br />

tobacco activity.’<br />

“Those involved in dealing<br />

in illegal tobacco may<br />

be encouraging people,<br />

including children to smoke<br />

by providing a cheap<br />

source. The detection<br />

dogs can find tobacco<br />

and cigarettes even if<br />

hidden in the most unlikely<br />

places. Offenders need<br />

to know that they will<br />

face consequences if they<br />

choose to deal in these<br />

illegal products.”<br />

advanced composite<br />

materials impregnable<br />

to water and dust.<br />

In fact, the entire<br />

system complies with<br />

international standard<br />

IP65. It hovers 50 meters<br />

above the host vehicle<br />

with the help of two main<br />

rotors that give it its main<br />

thrust and four smaller<br />

side rotors, used for<br />

guidance and additional<br />

thrust.<br />

Its stability in winds of<br />

up to 25 kn is achieved<br />

by the use of separate<br />

subsystems working >><br />

20 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 21


INDUSTRY NEWS<br />

INDUSTRY NEWS<br />

>> in tandem.<br />

The aerial platform is<br />

secured to the base unit<br />

via a cable which serves as<br />

a power supply and data<br />

link. A silenced generator<br />

powers the system<br />

enabling continuous 24/7<br />

operation. The machine<br />

itself is relatively quiet<br />

and passive; emitting<br />

no electronic signals. It<br />

should be emphasized<br />

again that as the<br />

HoverMast is tethered, it<br />

is not bound by any of the<br />

air control regulations that<br />

bind standard unmanned<br />

vehicles.<br />

The system can host a<br />

wide range of payloads.<br />

It can host any payload<br />

weighing up to 6 kg,<br />

including CCD/IR cameras,<br />

radars, laser designators,<br />

4th-5th March 2015<br />

The Hague, Netherlands<br />

www.personnel-protection.com<br />

For exhibting and sponsorship queries<br />

please contact:<br />

Tony Kingham<br />

Exhibit Sales Director<br />

T: +44 (0) 208 144 5934<br />

M: +44 (0)7827 297465<br />

E: tony.kingham@worldsecurity-index.com<br />

For conference queries contact:<br />

Neil Walker<br />

T: +44 (0) 7725 318601<br />

E: neilw@torchmarketing.co.uk<br />

relays, cellular antennas,<br />

and hyperspectral<br />

sensors. Additionally, it<br />

can receive COMINT and<br />

ELINT. With the ability<br />

to operate on land and<br />

at sea, even while the<br />

vehicle is in motion, the<br />

HoverMast-100 enables<br />

target detection, location,<br />

and identification as well<br />

as autonomous tracking.<br />

Target coordinates<br />

and video images<br />

are transmitted within<br />

seconds and without the<br />

need of an experienced<br />

operator via its wide<br />

band communication link,<br />

relaying critical data to<br />

selected recipients in real<br />

time.<br />

The HoverMast is already<br />

in operation with the Israeli<br />

Defense Force.<br />

CALL FOR PAPERS<br />

Abstract Submittal Deadline - 31st July <strong>2014</strong><br />

Submit your abstract online at www.personnel-protection.com<br />

If you travel abroad for your work, or if you are responsible for your team that travels<br />

or works abroad, are you aware of the legal implications surrounding duty of care for<br />

travelling personnel?<br />

Understand the increasing threats faced by international travellers on duty/employed<br />

by companies operating abroad, and what you can do to prepare for the possibilities at<br />

Personnel Protection & Safety Europe.<br />

Media Partners:<br />

Police in Chennai have implemented<br />

‘Face Recognition’ in a Crowd<br />

system<br />

The Police in Chennai have<br />

positioned themselves<br />

at the forefront of Smart<br />

City Surveillance having<br />

implemented iOmniscient’s<br />

Face Recognition in a<br />

Crowd system in a part of<br />

this city, the sixth largest in<br />

India.<br />

The system installed in the<br />

T. Nagar Market enables<br />

the police to recognize<br />

people of interest outdoors<br />

in a totally uncontrolled<br />

environment and to track<br />

them as they show up on<br />

different cameras.<br />

Mr. Senthil<br />

Manickavasagam, M.D.<br />

Supporting Organisations:<br />

of Mars Electronics<br />

who implemented the<br />

system said, “The main<br />

requirement from the<br />

electronic surveillance<br />

used for public safety<br />

was that it must function<br />

in a difficult outdoor<br />

environment. We faced<br />

a big problem with this.<br />

The many technologies<br />

we tried from Russia, USA<br />

and Europe worked well<br />

when used in a controlled<br />

setting indoors, but in the<br />

practical crowded scene<br />

of an Indian marketplace,<br />

nothing worked. Then we<br />

implemented iOmniscient’s<br />

system.”<br />

Defendec releases HD Camera for situational awareness platform Smartdec<br />

Defendec have released a<br />

new high capability camera<br />

module for situational<br />

awareness platform<br />

Smartdec at Eurosatory<br />

<strong>2014</strong>, bringing significant<br />

improvements to its system<br />

for users in the field.<br />

Smartdec, the defense<br />

and security company’s<br />

flagship product, uses a<br />

network of small wireless<br />

cameras linked to motion<br />

sensors that send visual<br />

confirmation to end users<br />

in a matter of seconds.<br />

The system upgrades<br />

provide a HD picture<br />

with a HDR capability,<br />

increase the speed of<br />

image transmission and<br />

alarm arrival time and<br />

increase the distance of<br />

the detectors from the<br />

main bridge enhancing<br />

the system’s overall<br />

effectiveness.<br />

The Smartdec system<br />

consists of a series of small,<br />

lightweight, and easily<br />

camouflaged detectors<br />

that are equipped with a<br />

camera and long-lasting<br />

batteries, a communication<br />

base unit, and the control<br />

center. When movement is<br />

sensed, the detector sends<br />

a visual confirmation to the<br />

control center. There the<br />

image can be analyzed,<br />

and border patrols can<br />

determine whether or not<br />

to send patrols to inspect<br />

the area.<br />

Smartdec can be up and<br />

running in just two minutes<br />

without any additional<br />

training needed. The<br />

cameras are designed to<br />

be deployed in remote<br />

and rugged terrain where<br />

it is difficult to conduct foot<br />

patrols. The cameras are<br />

programmed to<br />

only recognize<br />

human<br />

and vehicle<br />

infiltrations.<br />

False alarms<br />

for wild animals<br />

have been<br />

eliminated.<br />

This feature<br />

prevents from<br />

wasting time on<br />

nuisance calls. The system<br />

can be operational for<br />

years with only one battery<br />

charge cycle making it<br />

almost maintenance free.<br />

Smartdec’s equipment<br />

is completely wireless so<br />

additional infrastructure<br />

investments are<br />

unnecessary.<br />

The detectors are<br />

connected to the GSM<br />

phone network, which<br />

means that most major<br />

towns and cities are<br />

covered. In countries where<br />

GSM coverage is spotty, a<br />

local radio network bridge<br />

can be set up to connect<br />

the cameras to the control<br />

center.<br />

“Smartdec offers border<br />

guard and critical<br />

infrastructure<br />

companies<br />

struggling<br />

with limited<br />

personnel<br />

and budget<br />

resources<br />

an effective<br />

situational<br />

awareness<br />

platform<br />

solution to put an end<br />

to vandalism, human<br />

trafficking, narcotics<br />

smuggling, and other<br />

nefarious activities,” said<br />

Jaanus Tamm, CEO of<br />

Defendec Ltd. “Smartdec<br />

is truly a unique product<br />

that is operational around<br />

the world, and it is<br />

improving remote areas<br />

security every day.”<br />

Since the initial rollout<br />

of the system in 2010,<br />

Smartdec has been<br />

securing borders along<br />

the European Union’s<br />

eastern front, Asia and the<br />

Caribbean. The system has<br />

been proven to help stop<br />

international smuggling,<br />

illegal trafficking, and<br />

acts of sabotage making<br />

it the technology of<br />

choice among border<br />

guards around the<br />

world. Smartdec is also<br />

operational in the critical<br />

infrastructure sector<br />

making the protection<br />

of assets in remote areas<br />

much easier.<br />

Morpho Upgrades Dutch ID<br />

Documents for Greater <strong>Security</strong><br />

Working closely with<br />

the Dutch government,<br />

Morpho (Safran)<br />

leveraged its experience<br />

and expertise to develop<br />

highly secure biometric<br />

travel documents and<br />

identity cards integrating<br />

cutting-edge technology.<br />

With new, innovative<br />

security features and<br />

a validity of 10 years,<br />

the latest generation<br />

identification documents<br />

will provide greater<br />

protection against<br />

document fraud.<br />

The ID card and travel<br />

document datapage<br />

now feature Morpho’s<br />

patented Stereo Laser<br />

Image (SLI® technology,<br />

a three-dimensional<br />

image reproducing<br />

the document holder’s<br />

portrait). Designed to<br />

check the authenticity<br />

of the primary image,<br />

this innovative security<br />

feature helps prevent<br />

photo falsification. For<br />

additional security, a laser<br />

perforated number (TLN<br />

- Tilted Laser Number),<br />

visible when tilted against<br />

the light, will be located<br />

on the primary image of<br />

each document.<br />

22 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 23


EVENT CALENDAR<br />

July <strong>2014</strong><br />

14-20<br />

Farnborough Airshow, UK<br />

www.farnborough.com<br />

16-18<br />

Asia Defence & <strong>Security</strong>, Manila, Philippines<br />

www.adas.ph<br />

22-23<br />

RSA Conference Asia Pacific & Japan, Singapore<br />

www.rsaconference.com/events/ap14<br />

August <strong>2014</strong><br />

20-22<br />

Secutech Vietnam, Ho Chi Minh City, Vietnam<br />

www.secutechvietnam.com/<br />

27-29<br />

Safety & <strong>Security</strong> Asia, Singapore<br />

www.safetysecurityasia.com.sg<br />

September <strong>2014</strong><br />

9-11<br />

General Police Equipment Exhibition & Conference<br />

(GPEC), Leipzig, Germany<br />

gpec.de<br />

22-25<br />

SPIE <strong>Security</strong> + Defence, Amsterdam, Netherlands<br />

spie.org<br />

24-25<br />

Emergency Services Show, UK<br />

www.emergencyuk.com<br />

29-2 Oct<br />

ASIS International, USA<br />

www.asisonline.org<br />

October <strong>2014</strong><br />

8-9<br />

Cyber <strong>Security</strong> Expo, London, UK<br />

www.ipexpo.co.uk/<br />

9-10<br />

<strong>World</strong> Cities Conference, London, UK<br />

www.worldcitiesconference.com<br />

21<br />

SC Congress, New York, USA<br />

congress.scmagazine.com<br />

To have your event listed please email details to<br />

the editor tony.kingham@worldsecurity-index.com<br />

November <strong>2014</strong><br />

4-6<br />

14th Annual AAAE/TSA/DHS Aviation <strong>Security</strong><br />

Summit, USA<br />

www.aaae.org<br />

9-12<br />

3rd Homeland <strong>Security</strong> Show <strong>2014</strong>, USA<br />

December <strong>2014</strong><br />

9-11<br />

3rd <strong>World</strong> BORDERPOL Congress, Hungary<br />

www.world-borderpol-congress.com<br />

January 2015<br />

18-20<br />

Intersec Middle East, Dubai<br />

www.intersecexpo.com<br />

March 2015<br />

4-5<br />

Critical Infrastructure Protection & Resilience<br />

Europe, The Hague, Netherlands<br />

www.cipre-expo.com<br />

4-5<br />

Personnel Protection & Safety Europe, The Hague,<br />

Netherlands<br />

www.personnel-protection.com<br />

24 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!