30.05.2014 Views

Border Security Matters May 2014

Border Security Matters, the newsletter of BORDERPOL, The World Border Organization

Border Security Matters, the newsletter of BORDERPOL, The World Border Organization

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Border</strong> <strong>Security</strong><br />

<strong>Matters</strong> Vol:<br />

<strong>May</strong> <strong>2014</strong><br />

Welcome<br />

Thomas Tass, Executive Director,<br />

BORDERPOL<br />

At BORDERPOL we are always<br />

monitoring events that impact<br />

on the border security and<br />

traveler/migration management<br />

community. Some of these<br />

are highlighted via our social<br />

media channel at Twitter. Our<br />

members are remarkably well<br />

tuned into the geopolitical and<br />

economic environment which<br />

evolves at speeds which change<br />

sometimes on a daily basis.<br />

Since the last issue of BSM we<br />

have major crisis in West Africa, Ukraine, North Korea and Brazil.<br />

None of which are related directly to each other but all of which<br />

have an impact on the border security community.<br />

Our mission is to make borders that not only protect the global<br />

community but also one that connects that same community in<br />

a safe and effective manner, all the while ensuring that people,<br />

goods and services are not “inappropriately” processed by the<br />

various national and regional “systems”.<br />

The aforementioned paragraph has great relevance to<br />

member readers who join us at our workshops, or attend<br />

our annual Congress meetings because they are involved in<br />

border management programs from government frontline<br />

law enforcement to industry developers involved in high tech<br />

creativity. As we prepare for second half of <strong>2014</strong> BORDERPOL like<br />

no other border organization is working to bring solutions to old<br />

and new challenges.<br />

The key topics for discussion in the coming months will include<br />

these questions:<br />

What is the impact of the economic recovery on border security?<br />

Contents<br />

Agency News 2 - 7<br />

BORDERPOL Workshop <strong>May</strong> <strong>2014</strong> 8 - 9<br />

World BORDERPOL Congress <strong>2014</strong> 10 - 13<br />

Securing Africa’s <strong>Border</strong>s: learning lessons 14 - 15<br />

from London 2012<br />

Port <strong>Security</strong>: The Front Line 16 - 17<br />

Industry News 18 - 22<br />

News and updates form the Secretariat 23 - 24<br />

Is terrorism morphing into something different and is it<br />

identifiable?<br />

Ukraine?<br />

Should the EU continue to export its IBM program?<br />

These are heady times for the world’s border organizations.<br />

BORDERPOL recognizes this and continues to meet the<br />

challenges via our motto “we extend our fame through our<br />

deeds”.<br />

SAVE THE DATES<br />

3rd World BORDERPOL Congress<br />

9th-11th December <strong>2014</strong><br />

Budapest, Hungary<br />

www.world-borderpol-congress.com<br />

Is there such a thing as data and privacy protection at the<br />

border?<br />

What are the “special” relationships between countries when it<br />

comes to trusted traveler programs?<br />

What is the next high tech solution that will help manage<br />

migration and refugee flows?<br />

Where does South America fit into the global border paradigm?<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 1


BORDERPOL Workshop:<br />

20-21 <strong>May</strong> <strong>2014</strong>, Budapest, Hungary<br />

BORDERPOL held its latest workshop in Budapest on 20-21<br />

<strong>May</strong> on “The International Organised Crime Global Threat, and<br />

Challenges facing <strong>Border</strong> <strong>Security</strong> Management”.<br />

opportunity to benefit from general membership and being<br />

part of the border management community.<br />

Individual Entry Level Membership at just $35 (CAN) includes:<br />

- BORDERPOL membership certificate<br />

- BORDERPOL pin/badge<br />

- BORDERPOL membership card<br />

- <strong>Border</strong> <strong>Security</strong> <strong>Matters</strong> - quarterly newsletter of BORDERPOL<br />

This entry level General Membership provides basic<br />

membership benefits, plus the opportunity to ‘pay-as-you-go’<br />

for additional BORDERPOL services, such as training courses<br />

and workshop/conference delegate access at membership<br />

rates.<br />

For further details at to download the Membership Application<br />

Form visit www.borderpol.org<br />

Hosted by the Chief Commissioner of the Hungarian police,<br />

in association with the Vice President of the National Public<br />

Service University in Budapest, the Workshop was chaired by<br />

Col. Geza Horvath, Director of International Law Enforcement<br />

Center.<br />

The objectives of the conference were to examine current<br />

trends in the modus operandi of international criminals; to<br />

consider how information and intelligence can shared across<br />

different types of border (eg Schengen, EU and External<br />

<strong>Border</strong>s) to interdict international criminals; to examine<br />

how the mitigation of international crime might practically<br />

be implemented by border agencies; and to examine the<br />

technology and systems available to government agencies to<br />

counter the threat of international organised crime.<br />

Further details of the Workshop can be found on page XX.<br />

BORDERPOL Launch ‘General<br />

Membership’ category<br />

As part of BORDERPOL’s strategy to remain open to all<br />

areas of the border management community, and encourage<br />

the development of younger operation level personnel,<br />

BORDERPOL has announced a new entry level General<br />

Membership.<br />

Designed to appeal to border management/security<br />

professionals who have a desire to develop their knowledge<br />

and skills, and to share experiences with like-minded border<br />

management community around the world, to enhance future<br />

career opportunities, the General Membership offers key basic<br />

benefits at low affordability, especially for the emerging markets<br />

of Africa, Asia and the Middle East.<br />

BORDERPOL offers the individual border police/agent the<br />

International <strong>Border</strong> <strong>Security</strong> Forum<br />

<strong>Border</strong> <strong>Security</strong> Threats from the<br />

Mediterranean Region<br />

June 2-4, <strong>2014</strong>, Malta<br />

The International <strong>Border</strong> <strong>Security</strong> Forum series founded<br />

by the German Marshall Fund of the United States in 2011,<br />

has since worked to address security issues through a<br />

variety of workshops, study tours, briefings and research<br />

projects allowing participants to build a strong network<br />

through which best practice standards can be developed.<br />

The forum has established itself as an event that provides<br />

a neutral, open platform for dialogue between regional<br />

and transatlantic border security officials and experts. By<br />

focusing on the most vital border security dangers, the<br />

forum creates a common non-partisan space for a debate,<br />

which is especially important due to the political complexity<br />

of some of the regions. It brings people with different<br />

perspectives and backgrounds together in order to work<br />

jointly on solutions that can improve the situation of border<br />

security.<br />

As the International <strong>Border</strong> <strong>Security</strong> Forum further<br />

develops, it is important to expand the understanding of<br />

border security by addressing timely topics and arising<br />

threats. One region where a number of ongoing and<br />

potential threats to border security currently exist is the<br />

Mediterranean Basin. In an area where the Middle East,<br />

North Africa, and Southern Europe collide, the mixture<br />

of cultures, religions, political systems, and ideals pose<br />

possible opportunities for disagreement.<br />

The International <strong>Border</strong> <strong>Security</strong> Forum is an objective<br />

institution that has the potential to provide council and<br />

inspire the change. The Mediterranean workshop, in the<br />

framework of the forum, will gather in one room decision<br />

makers as well as military and security experts for a<br />

creative and open discussion where the main regional<br />

border security threats will be identified and assessed. The<br />

adequate precaution measures and combat tactics, both in<br />

terms of armament and technology will also be proposed.<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 2


Canada Hosts Meeting on Immigration<br />

and <strong>Border</strong> Management<br />

A meeting on immigration and border management in<br />

Quebec city has been hosted by Canadian Citizenship and<br />

Immigration Minister Chris Alexander and Minister of Public<br />

Safety and Emergency Preparedness Stephen Blaney.<br />

In the meeting, leaders from Canada, the US, the UK,<br />

Australia, and New Zealand have discussed collective<br />

immigration and border management issues.<br />

“We are working with our international partners to ensure<br />

that our borders remain open gateways to freedom and<br />

prosperity, but closed barriers to criminals, terrorists and<br />

other threats,” said Minister Blaney.<br />

All the attendees shared their experience and expertise on a<br />

range of topics and explored the possibility of collaborating<br />

on immigration and security issues in the meeting. The<br />

meeting included the following initiatives:<br />

• Encouraging participating countries to use fingerprints<br />

and digital photographs to screen immigration applicants;<br />

• Improving strategic information sharing to help countries<br />

facilitate genuine travellers; and<br />

• Enhancing the security and efficiency of border services<br />

Source: http://www.migrationexpert.com<br />

India’s Prime Minister Narendra Modi<br />

pledges strengthening of border<br />

management<br />

Prime Minister Modi is planning some important border<br />

visits. BJP sources said a strong internal security regime is<br />

one of Modi’s poll-time pledges and strengthening border<br />

management is an integral part of it.<br />

Modi is also giving enough indication of his priorities.<br />

“There has been a growing spate of LAC violations by<br />

Pakistan army which actively pushes in terrorists through<br />

the border in Kashmir. Modi has been critical of the weak<br />

response of the previous government and his visit will be to<br />

impress on field commanders that they need not fear being<br />

tough,” the BJP leader said.<br />

Both army and BSF commanders have been previously<br />

hamstrung by instructions from the top to avoid any kind<br />

of escalation.<br />

“But our government will authorise field commanders to<br />

take appropriate counter-measures or else the morale of<br />

the troops suffer,” the BJP leader said.<br />

“We don’t want to start a war but we want to impress on<br />

the Pakistan military that their aggression will come at a<br />

high cost. The higher headquarters can always control an<br />

escalation but unless the field units hit back, the enemy will<br />

always be encouraged to create mischief.”<br />

On the border with China, Modi will try to familiarise<br />

himself with the terrain and how effective the new <strong>Border</strong><br />

Defence Cooperation Agreement (BDCA) with China has<br />

been in checking LAC violations.<br />

“Modi seeks very good relations with China but the border<br />

is a problem and he wants to address rather than avoid the<br />

issue,” the BJP leader said.<br />

He said Modi and his core team does not consider the<br />

border with Bangladesh as a ‘live’ (China) or a ‘hostile’<br />

(Pakistan) border but one where the border forces of the<br />

two nations are largely on friendly terms, especially after<br />

the regime change in Dhaka six years ago.<br />

His message to border forces guarding Bangladesh would<br />

be to dialogue and seek more cooperation from the<br />

neighbouring country to prevent illegal migration, human<br />

trafficking, smuggling and movement of terrorists.<br />

“We know the Hasina government is more than willing to<br />

cooperate on all these issues as these are common threats<br />

and problems we share. The situation on the border with<br />

Bangladesh is one of lax border management and not one<br />

of hostility. Modi wants to change that but through mutual<br />

cooperation,” said the BJP leader.<br />

He said Modi would also seek to push the state<br />

governments to be more alert on border management and<br />

coordination between state police and BSF will be a priority.<br />

Source: http://bdnews24.com<br />

Director General Discusses Migration<br />

Governance in China<br />

“The planned visit will boost the morale of our forces and<br />

also send a signal that India will be tough in dealing with<br />

violations of Line of Actual Control,” said a senior BJP leader<br />

close to Modi.<br />

By restricting his visit to the border with Pakistan and China,<br />

IOM’s Director General, Ambassador William Lacy Swing<br />

meets with President XI Jinping of P.R. China during the<br />

Fourth Summit of Heads of State of the Conference on<br />

Interaction and Confidence Building Measures in Asia<br />

(CICA), held in Shanghai, on 21st <strong>May</strong> <strong>2014</strong>. © IOM @<strong>2014</strong><br />

ZOOM<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 3


IOM Director General William Lacy Swing, on a visit to<br />

the People’s Republic of China, has called for increased<br />

efforts to combat people smuggling and trafficking, and for<br />

strengthening of border management efforts.<br />

Standard, which aims to facilitate professional, effective and<br />

customer-friendly immigration service and management.<br />

At the launch in Beijing of the Chinese version of IOM’s<br />

latest World Migration Report, attended by senior<br />

government officials, embassies and media, Ambassador<br />

Swing heard how China is seeking to work more closely<br />

with other countries to deal with challenges posed by<br />

changing migration patterns, including an overall increase<br />

in the number of migrants.<br />

He noted that IOM has been helping Chinese ministries<br />

by providing expertise and cutting-edge technology for<br />

migration management.<br />

Ambassador Swing is continuing his meetings this week in<br />

Beijing with the Ministry of Foreign Affairs, where he plans<br />

to further expand the bilateral relationship with China and<br />

broaden areas of cooperation.<br />

Source: http://www.iom.int<br />

Addressing the fourth Conference on Interaction and<br />

Confidence Building Measures in Asia (CICA) in Shanghai,<br />

Ambassador Swing noted CICA’s efforts to ensure peace<br />

and security and its work towards the elimination of<br />

irregular migration in a country where internal migration is<br />

equal to the number of international migrants worldwide.<br />

“Only by recognizing migrants’ rights and thinking about<br />

their well-being can migration be used for a country’s<br />

development,” said Swing.<br />

Chinese President Xi Jinping, one of several presidents<br />

attending the conference, welcomed IOM’s statement and<br />

expressed his appreciation of IOM’s efforts in managing<br />

international migration.<br />

During his visit to China, Director General Swing also<br />

gave the keynote speech at the International Forum of<br />

Immigration Inspection, hosted by the Ministry of Public<br />

<strong>Security</strong> in Shenzhen.<br />

The meeting was attended by senior officials from over 30<br />

countries and international organizations with the objective<br />

of strengthening international cooperation on migration<br />

management.<br />

The forum adopted a common Immigration Inspection<br />

Viet Nam Acts against People<br />

Smuggling<br />

A two-day national workshop on counter-smuggling<br />

policy is taking place in Hanoi this week, organized by<br />

the Vietnamese Ministry of Public <strong>Security</strong> – Immigration<br />

(MPSI), in cooperation with IOM.<br />

Funded by the Government of Canada, the workshop aims<br />

to enhance the capacity of Vietnamese government officials<br />

to formulate and implement effective counter-smuggling<br />

policies within the context of mixed migration flows.<br />

Participants at the workshop are discussing efforts to<br />

develop effective policies to prevent and combat people<br />

smuggling. International anti-smuggling experts from<br />

IOM, the UN Office on Drugs and Crime and the Regional<br />

Support Office of the Bali Process are working with 50<br />

migration and law enforcement officials from MPSI and<br />

the <strong>Border</strong> Guards, looking at relevant international and<br />

regional strategies to counter human smuggling within the<br />

broader context of migration management.<br />

“This workshop is an important step towards addressing<br />

people smuggling more effectively,” says IOM Viet Nam<br />

Have you joined BORDERPOL yet?<br />

• Political clout and civic leadership<br />

• Professional development and training<br />

• Make connections<br />

• Industry information and resources<br />

• Professional consultancy and advice<br />

We Extend Our Fame by Our Deeds<br />

Membership Enquiries:<br />

secretariat@borderpol.org<br />

www.borderpol.org


Chief of Mission Florian Forster. “Viet Nam has undertaken<br />

great efforts to fight human trafficking over the last<br />

decade, but addressing people smuggling has become an<br />

additional challenge.”<br />

The national workshop is part of a regional effort to<br />

enhance capacity and cooperation in Southeast Asia to<br />

prevent and combat people smuggling.<br />

People smuggling has seen a steep rise over recent<br />

decades and today accounts for a significant portion<br />

of irregular migration around the world. Unlike human<br />

trafficking, it does not necessarily involve exploitation,<br />

coercion or violation of human rights; yet it often<br />

exposes migrants to vulnerable situations and the risk of<br />

subsequent exploitation.<br />

In recent years Viet Nam has seen worrying signs of<br />

irregular migration flows: cases were reported where<br />

criminal networks have used Viet Nam as a destination,<br />

source, and transit country for people smuggling, with final<br />

destinations as far away as North America, Europe and<br />

Australia.<br />

“Successful anti-smuggling work requires a balanced<br />

approach: between the protection of migrants and<br />

developing the regulatory and procedural framework to<br />

detect, investigate and prosecute those perpetrating the<br />

crime of human smuggling,” says Forster.<br />

Source: http://www.iom.int/<br />

The European Center For Information<br />

Policy and <strong>Security</strong> ECIPS stress its<br />

concerns about raising tension in<br />

Ukraine <strong>Border</strong>s<br />

The European Center For Information Policy and <strong>Security</strong>’s<br />

Ukraine <strong>Security</strong> Assessment Report <strong>2014</strong> “ Which are the<br />

actors in the actual Ukrainian scenario according to the<br />

Putin political moves ? “ ECIPS stressed the future risk and<br />

bring emphases on the Russian “Hidden” agenda. The plan<br />

B of Putin as set out in the report indicates that indeed,<br />

many delegations could be misled to missing the point and<br />

the legal strategy followed by Putin to gain control over<br />

Ukraine.<br />

The design of new<br />

ethnic and territorial<br />

annexation to Russia has<br />

been prepared for many<br />

years, eased by the last<br />

Ukrainian Presidencies,<br />

openly sympathetic to<br />

Moscow. The same armed<br />

forces, the special units<br />

of the Ukrainian SBU were trained by the FSB the former<br />

KGB that has all the tactical information to control the city’s<br />

infrastructure, such as maps of the government buildings,<br />

those easily conquered by pro-Russians armed groups.<br />

Put the squeeze on without squeezing in.<br />

Baron ® G58 ISR. Intelligence. Surveillance. Reconnaissance. Defense and law enforcement agencies around the world are able to rely on<br />

the Beechcraft Baron G58 ISR. The aircraft is capable of six-hour missions. Equally important, it has a large cabin, air conditioning and high<br />

dispatch reliability. Fitted with a state-of-the-art surveillance camera, recording and data link systems, and police/military communications,<br />

the Baron G58 ISR provides the surveillance/intelligence you need for court evidence, or to prosecute the target.<br />

U.S. and the Americas +1.316.676.0800 | EMEA +44(0) 1244.893.851 | Asia-Pacifi c +65.6423.0321 | Beechcraft.com<br />

©<strong>2014</strong> Beechcraft Corporation. All rights reserved. Beechcraft and King Air are the registered trademarks of Beechcraft Corporation.


Intelligence indicates that the presence of both intelligence<br />

and counter agencies are heavily felt on the ground<br />

collecting RTI (Real Time Information)at the same time. It is<br />

estimated that as much as 300 or more CI operators from<br />

different agencies could be on the ground at the moment<br />

as a pre-9th <strong>May</strong> <strong>2014</strong> precaution or derogative means<br />

playing the Cold War game all over again<br />

The President of the ECIPS, Ricardo Baretzky strained that<br />

what he called the “ Putin Syndrome” will have far reaching<br />

implications to both, the European economical and security<br />

risk to the EU in the future. One of the Important issues are<br />

the <strong>Border</strong>s in Ukraine that are used to bring visitors from<br />

Russia to assist local pro - Russian protest. ECIPS said that is<br />

shows a lack of Ukrainian border control since most of the<br />

fighters assisting pro - Russian are veterans from external<br />

sources such as paid veterans that fought Afghan.<br />

The report lays out the origin of the present Pro- Russian<br />

groups and the organized warfare associated with external<br />

veterans. Baretzky said that, the EU is undermining the<br />

strategy put in place and this could send a long term<br />

massage that the legal framework put in place allows for<br />

land to be stolen by using the laws of the International legal<br />

framework.<br />

To undermine the Putin’s project there are nationalists,<br />

sustained by the former Ukrainians rebels who fought<br />

the war in Chechnya against the Russians and part of the<br />

Red Army veterans who fought in Afghanistan, is vastly<br />

underestimated. To these, some pro-Yanukovych groups<br />

must be added, mercenaries paid by the former president<br />

, coming from the ranks of former military personnel sent<br />

to Afghanistan, too, and never really part of the Ukrainian<br />

society and therefore at the mercy of whoever pays them<br />

the most and who can guarantee a future for their families.<br />

They are people between 40 and 60 years old, well trained (<br />

as demonstrated by the numerous video and photographic<br />

evidence available on the net ) and with a great des<br />

ire for redemption. They do not respond to Putin but to<br />

Yanukovych: rely on the former president, now “ guarded<br />

guest “ of Russia, because native of those regions. Thehistory<br />

of Yanukovych deserves a separate mention: he is a criminal<br />

with two convictions for armed robbery suddenly canceled in<br />

conjunction with his political rise,corresponding to a possible<br />

“ affiliation “ to the Soviet before and then Russian security<br />

apparatus. He is not sympathetic to Putin, but at the moment<br />

he is the classic lesser evil. Putin, however , holds another<br />

wildcard to treat, in the event of failure of the military option,<br />

with the EU and NATO: the request for presidential elections<br />

invalidation in Ukraine. In recent days, in fact, we have<br />

witnessed the withdrawal of all the presidential candidates<br />

from the South East of Ukraine. If things go badly for Russian<br />

interests, Putin could ask for the invalidation of the election<br />

because there are no pro-Russian candidate at the election.<br />

The report also indicated Putin holds another wildcard to<br />

treat , in the event of failure of the military option , with the<br />

EU and NATO and that would result more than likely to the<br />

request for presidential elections invalidation in Ukraine<br />

based on the lack of a Pro - Russian candidate. According<br />

to AGC this could have far reaching implications and spark<br />

things even more.<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

The report cites the use of the “Human Shields” where<br />

women and children, who live in nearby regions and cities<br />

that are paid the equivalent of 40 Euros per person to stand<br />

between the Ukrainian tanks and the pro-Russian militias.<br />

A copy of the free report is available on http://ecips.<br />

eu/0605014TSD.pdf.<br />

CYBERPOL warns of new potential cyber<br />

threats to border security<br />

CYBERPOL, the International Cyber-<strong>Security</strong> Organization<br />

(ICSO) managed by the ECIPS announced that there is<br />

an urgent need for cross-border data exchange after the<br />

Malaysian 370 incident. It said that borders are not adequate<br />

shielded from hackers that are exploiting the using of<br />

international space during transits to conduct cyber-hacking.<br />

Most airports have Wi-Fi installed and today almost all<br />

international airports provide free Wi-Fi connection to all<br />

transit passengers. What is most alarming is that according<br />

to a research no data transfer<br />

monitoring at any airport and<br />

at the same time, there is no<br />

package filtering or collection<br />

of data done, making it the<br />

perfect place for international<br />

sabotage or crime syndicates.<br />

Highflyers can literally stay<br />

on the run without any trace<br />

whilst this vulnerability is<br />

being exploited.<br />

CYBERPOL CIB UNIT (Criminal investigation Unit) has<br />

propped an independent investigation into the risk and<br />

have said that Airport security globally has to be steppedup<br />

and that that airliners are not free of this potential<br />

threat. CYBERPOL specializes in researching and identifying<br />

of International Cyber Crimes (ICC), cyber-threats and<br />

global trends in the contemporary cyber world brining<br />

law enforcement together and working towards a global<br />

platform for the establishment of a legal framework.<br />

CYBERPOL recently issued an alert that cyber attack virus<br />

such as the Snake Virus from Russia could become very<br />

problematic and posed a huge cyber threat to both national<br />

security and defense. It seems that this alerts falls on deaf<br />

ears since on the 13 of <strong>May</strong> <strong>2014</strong>, the Belgian foreign affairs<br />

office came under the snake virus attack. ECIPS issued a<br />

warning last year that cyber crime and cyber attacks is on the<br />

rise and again repeated its concerns at the African Counter<br />

Terrorism summit held in London in February this year. It<br />

is estimated that as much as 97% of all computers will be<br />

under some kind of cyber attack during <strong>2014</strong>. There is great<br />

concerns of the companies who develop internet security<br />

solutions but never seems the crack it. Are they perhaps the<br />

problem to the perpetuating issue by developing a drug with<br />

a short lifetime and thus we get the cold over and over?<br />

Cyberpol said that the lack of a proper cyber crime database<br />

makes it the perfect breeding solution for cyber criminals.<br />

The need for cross-border data sharing and integration<br />

www.borderpol.org page 6


within the EU has never been more important than now.<br />

Some experts believe that it only a matter of time before<br />

critical infrastructures around the EU are effected and<br />

damaged by means of a cyber-attack. The European Union<br />

faces many challenges and for some institutions it might<br />

already be too late to resolve their cyber-security risks due<br />

to several critical problems such as lack of financing and<br />

the decline of state revenues in the EU.<br />

CYBERPOL confirmed that 87% of all computer were<br />

hacked during 2013 and border parole is not excused<br />

from these threats. It also said that more than 70% of the<br />

Hacking reported globally were untraceable. That raises<br />

the questions that if VPN’s (virtual private networks) were<br />

used, it would be impossible for any airport to have seen<br />

any data transferred when their WIFI might have been used.<br />

was flight 370 perhaps hacked in a similar way ?<br />

Japan gives US1 million in support<br />

to support a Ugandan border<br />

management project<br />

The project is to last 9 months and will be implemented<br />

by the Ministry of Internal Affairs and the International<br />

Organization for Migration (IOM)<br />

Japanese Ambassador to Uganda Junzo Fujita underscored<br />

the need to improve border management in Uganda<br />

and the region. “Since the world has become borderless,<br />

a threat to one means a threat to all. In other worlds,<br />

vulnerable borders in Uganda can even affect Japan,” he<br />

said.<br />

Ugandan Minister of State James Baba noted: “Although<br />

Uganda is a peaceful and stable country, there are many<br />

border challenges that we have to solve. With an improved<br />

border management through a coordinated multi-agency<br />

approach we will come up with solutions.”<br />

East Africa is a volatile region, facing numerous challenges<br />

from political, military and economic instability. This has<br />

placed great strain on Uganda’s border management,<br />

exposing its borders to irregular movements, transnational<br />

crime and the movement of terrorists.<br />

Uganda is a landlocked country and its national borders<br />

are particularly difficult to manage. It shares an estimated<br />

2,698km border with South Sudan, Kenya, Tanzania,<br />

Rwanda and the Democratic Republic of Congo (DRC.)<br />

Cross border challenges include trafficking in persons and<br />

smuggling of precious materials, which often fuel conflicts.<br />

Uganda has more than forty border crossing points and<br />

few of them have the equipment to electronically register<br />

a machine-readable passport. The country also needs basic<br />

travel document verification equipment, staff training,<br />

communication systems and transport to conduct a greater<br />

number of border patrols.<br />

4th-5th March 2015<br />

The Hague, Netherlands<br />

www.personnel-protection.com<br />

For exhibting and sponsorship queries<br />

please contact:<br />

Tony Kingham<br />

Exhibit Sales Director<br />

T: +44 (0) 208 144 5934<br />

M: +44 (0)7827 297465<br />

E: tony.kingham@worldsecurity-index.com<br />

For conference queries contact:<br />

Neil Walker<br />

T: +44 (0) 7725 318601<br />

E: neilw@torchmarketing.co.uk<br />

SAVE THE DATES<br />

If you travel abroad for your work, or if you are responsible for your team that travels<br />

or works abroad, are you aware of the legal implications surrounding duty of care for<br />

travelling personnel?<br />

Understand the increasing threats faced by international travellers on duty/employed<br />

by companies operating abroad, and what you can do to prepare for the possibilities at<br />

Personnel Protection & Safety Europe.<br />

Media Partners:<br />

Supporting Organisations:<br />

Owned & Organised by:


BORDERPOL’s <strong>May</strong> Workshop in Budapest<br />

Report by by Zagon Csaba<br />

As part of the our central aim of facilitating cross function and cross border cooperation<br />

Col. Zoltán Szabó, director of BORDERPOL European Secretariat Office<br />

organised workshop in Budapest, Hungary, on 20-21 <strong>May</strong>, <strong>2014</strong> arranged a with a<br />

general theme of “The International Organised Crime Global Threat, and Challenges<br />

facing <strong>Border</strong> <strong>Security</strong> Management”.<br />

The aim behind the workshop were to<br />

examine current trends in the modus<br />

operandi of international cross border<br />

crime, to consider how exchange of<br />

information and intelligence may affect<br />

the law enforcement cooperation,<br />

to examine how the mitigation of<br />

international crime might practically<br />

be implemented by border agencies,<br />

as well as to follow technology and<br />

systems developments available to<br />

government agencies to counter the<br />

threat of international organised crime.<br />

It involved all sectors of border<br />

community with professionals from<br />

immigration services, the border police<br />

and enforcement, customs, multiagency<br />

means for international law<br />

enforcement cooperation,<br />

police and home affairs<br />

attachés, intergovernmental<br />

agencies, NGOs, independent<br />

consultants, academic<br />

researchers, and university<br />

lecturers. Attendees were<br />

also drawn from a wide range<br />

of nationalities including<br />

Canada, the United Kingdom,<br />

France and several countries<br />

from the region of Eastern<br />

and Central Europe such as<br />

Hungary, Romania, Slovakia<br />

and Turkey. Delegates from<br />

key international organisations<br />

concerning the topic, such as<br />

the Interpol, the Europol, OSCE, SELEC,<br />

DCAF, IOM, and ICMPD were also<br />

attended.<br />

Following the opening speech of Col.<br />

Zoltán Szabó and Mr Thomas Tass,<br />

executive director of BORDERPOL,<br />

Brig. Gen. dr. Gábor Kovács, vicepresident<br />

of the National University<br />

of Public Service welcomed workshop<br />

participants on behalf of the host<br />

institute. The workshop, moderated<br />

by police Col. Géza Horváth, director<br />

of the International Law Enforcement<br />

Cooperation Centre, dealt with a wide<br />

range of subjects and concerns so<br />

here are just a few of the views and<br />

comments of some of the participants.<br />

The keynote speech, titled “Organised<br />

Prof. Péter Tálas, director of the Institute of Strategic and Defence<br />

Studies of the Public Service University,<br />

Crime as a Global Challenge” was<br />

held by the director of the Institute of<br />

Strategic and Defence Studies of the<br />

Public Service University, Prof. Péter<br />

Tálas. He pointed out the relations<br />

between security studies and organised<br />

crime according to the modern concept<br />

of security. In his analysis, both the<br />

global and the European effects of<br />

the phenomenon were illustrated by<br />

figures, which supported a complex<br />

threat assessment of the security policy<br />

expert. He raised the attention to the<br />

effects of globalisation, development of<br />

communication tools, the acceleration<br />

of mass traffic and transport systems,<br />

the integration and the technological<br />

developments -- all of these changes<br />

increased the vulnerability of the<br />

societies and made even more difficult<br />

to comply with the challenges of<br />

organised crime.<br />

Dr. Szandra Windt, senior researcher of<br />

the National Institute of Criminology<br />

analysed the characteristics of crossborder<br />

crimes in Hungary. She drafted<br />

a landscape with especial focus of<br />

illegal migration and trafficking in<br />

human beings. She concluded that the<br />

level of trafficking or/and smuggling<br />

can be reduced by working on the<br />

variables, and the actions taken should<br />

be harmonised, global and agreed on<br />

by several countries cooperating to<br />

achieve a common goal. Every weak<br />

link in the network would be used an<br />

opportunity by the criminals.<br />

Lt. Col. József Nahalkó, head<br />

of International Department of<br />

the Counterterrorism Centre<br />

of Hungary discussed certain<br />

aspects that lead to hostage<br />

situations abroad. He provided<br />

insight view in the difficulties<br />

his law enforcement agency<br />

is facing in those countries<br />

where such serious insults with<br />

Hungarian citizens were taken<br />

place in the recent years.<br />

Mr Didier Clergeot, operations<br />

coordinator of the Interpol<br />

demonstrated the respective<br />

priorities of the International<br />

Police Organisation, and their<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 8


efforts with the integrated border management task force.<br />

They already collected rich experiences in law enforcement<br />

officer training in the border security sector. He also<br />

emphasised the additional values that Interpol’s criminal<br />

databases can provide for the front line officers through<br />

specialised IT solutions.<br />

Mr Christian Painsipp, analyst at O1 InfoHub of the Europol<br />

described the<br />

EU institute’s<br />

key role in<br />

coordination<br />

and support<br />

of the joint<br />

efforts of<br />

the member<br />

states against<br />

organised<br />

crime and<br />

terrorism.<br />

He reviewed<br />

Europol’s area<br />

of mandate<br />

and the most<br />

successful<br />

services and<br />

solutions they can provide to the beneficiary agencies.<br />

Lt.Col. Gábor Liczkai, Hungarian police liaison officer<br />

delegated to the Southeast European Law Enforcement<br />

Center (SELEC) presented on the successful law enforcement<br />

cooperation in the region. The coordinative means of SELEC,<br />

its criminal sector specific task forces and the international<br />

operations together lead to the results that prove the<br />

capabilities of the organisation. SELEC has developed a<br />

strategic analyst capacity that also supports the fight against<br />

cross border crime.<br />

Jon Trumble, customs and border advisor of OSCE<br />

discussed the<br />

organisation’s<br />

experiences<br />

f r o m<br />

Central Asia<br />

concerning<br />

the difficulties<br />

in border<br />

demarcation,<br />

the serious<br />

consequences<br />

of corruption<br />

and the<br />

economic loss<br />

occurred by<br />

inadequate<br />

b o r d e r<br />

management.<br />

Ms Veronika Goncharova from ICMPD briefed on their<br />

experiences on border security building projects.<br />

Col. Mircea-Marius Negrut, Romanian police attaché<br />

presented on the Romanian police response to the<br />

challenges of organised crime, and analysed the recent<br />

trends and particularities. He mentioned that in many<br />

aspects, the trends in the organised crime sectors are<br />

very similar in Romania and in Hungary, and in the region<br />

in general, that was in line with the presentations on the<br />

drug and migration related situation held by Messers Máté<br />

Hárshegyi and Gábor Balog, experts from the Hungarian<br />

National Bureau of Investigation. Mr Miklós Gáspár, lecturer<br />

of the National University of Public Service informed on the<br />

recent developments in law enforcement officer training in<br />

criminal intelligence and analysis and how it would serve the<br />

increasing needs for experts.<br />

Mr Orhan Cerci, 2nd degree chief superintendent of the<br />

Turkish National Police analysed the Syrian crisis from<br />

the migration point of view. He demonstrated certain law<br />

enforcement aspects of the circulation of foreign fighters<br />

in the region and the measures Turkish authorities have<br />

implemented respectively. Messers Robert Hommen<br />

and Laurens Schreuders from the Royal Netherlands<br />

Marechaussee that is a law enforcement arm of the military<br />

services in the country, analysed the situation in trafficking<br />

and exploitation of human beings and the relevant crime<br />

sector. They pointed out the relevance of profiling and<br />

highlighted certain risk indicators that would help in the<br />

identification of the victims.<br />

Lt.Col. Ágnes Németh, head of crime prevention of the<br />

Hungarian Police raised the attention to the crime prevention<br />

and victim protection of the topic. She reported several<br />

successful results in the cooperation with their foreign<br />

partners, but also indicated the strong needs for further<br />

efforts. An independent expert, dr. Katalin Szomor drafted<br />

a picture in her presentation on the NGOs operating in the<br />

migrant and victim protection sector.<br />

Sponsors presentations closed the event where Beechcraft<br />

illustrated the huge developments in airborne technologies<br />

may be used for law enforcement and especially border<br />

security purposes. Representative of Fercom Systems<br />

Ltd. and Konasoft Ltd. provided a cross-cutting picture of<br />

their company’s equipment developments to assist border<br />

patrolling and enforcement.<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 9


3 rd World BORDERPOL Congress<br />

9 th -11 th December <strong>2014</strong><br />

Kempinksi Corvinus Hotel, Budapest, Hungary<br />

www.world-borderpol-congress.com<br />

for the border management and security industry<br />

Following the resounding success of the 2nd World<br />

BORDERPOL Congress in London, which brought together<br />

the world’s senior policy makers, practitioners and players,<br />

the 3rd World BORDERPOL Congress is delighted to be<br />

moving to Budapest, Hungary, to continue to develop<br />

and enhance international co-operation and collaboration<br />

amongst the border management and security industry.<br />

The 3rd World BORDERPOL Congress will provide a<br />

platform for the world’s border protection forces and<br />

agencies to discuss and debate the current and future<br />

issues and challenges facing the border management,<br />

security and migration management sectors.<br />

Controlling and managing international borders in the<br />

21st Century continues to challenge the border control<br />

and immigration agencies around the world. It is generally<br />

agreed that in a globalised world borders should be as<br />

open as possible, but threats continue to remain in ever<br />

evolving circumstances and situations.<br />

Advancements in technology are assisting in the battle to<br />

maintain safe and secure international travel. The border<br />

security professional still remains the front line against<br />

these threats.<br />

The World BORDERPOL Congress is the only multijurisdictional<br />

transnational platform where the border<br />

protection, management and security industry policymakers<br />

and practitioners convene annually to discuss<br />

the international challenges faced in protecting not only<br />

one’s own country’s borders, but those of neighbours and<br />

friends.<br />

A high level conference delivering discussions and<br />

debate on policies, implementation and technology that<br />

contributes towards successful border management and<br />

security.<br />

Neil Walker, Director Programs & Events<br />

BORDERPOL<br />

Email: neil.walker@borderpol.org<br />

Register online at<br />

www.world-borderpol-congress.com<br />

Greater closed workshops for agency discussions<br />

As part of the evolving developments at the World<br />

BORDERPOL Congress, this years World BORDERPOL<br />

Congress will see greater ‘agency only’ workshops for<br />

closed discussions and development of actions points,<br />

throughout the two day congress.<br />

Ensure you attend the 3rd World BORDERPOL Congress on<br />

9th-11th December in Budapest, Hungary and participate<br />

in this great industry gathering, for the opportunity to<br />

develop unique working collaborations for a better way of<br />

working and international cooperation of border agencies.<br />

You will be able to come away with enhanced knowledge<br />

and understanding, new working relationships with<br />

international colleagues and an action plan for future<br />

border protection and collaboration.<br />

Further information is detailed later in this newsletter and<br />

to pre-register your interest please contact Neil Walker,<br />

Director Programs & Events, at neil.walker@borderpol.org.<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 10


Topics of Discussion<br />

Migration Movement Challenges from Human<br />

Trafficking to Illegal Migration - A global overview<br />

Although there are no precise figures, it is estimated there<br />

are over 20 million illegal migrants worldwide. A further<br />

20 million people are believed to be enslaved in human<br />

trafficking today. According to the U.S. Department of<br />

Health and Human Services, “After drug dealing, trafficking<br />

of humans is tied with arms dealing as the second-largest<br />

criminal industry in the world.”<br />

There is not a country on earth that is not affected by<br />

migration movement challenges, whether as a transition<br />

point or final destination. It requires a global solution.<br />

<strong>Border</strong> Surveillance Techniques and Systems<br />

<strong>Border</strong> surveillance is one of the biggest challenges<br />

facing our border security agencies. Many land borders,<br />

with no physical barriers, provide easy access routes for<br />

criminal activities and illegal border crossings, whilst many<br />

coastlines are relatively unprotected outside major ports.<br />

What are the latest border surveillance techniques and<br />

systems available from UAVs to ground based systems?<br />

What are the legalities behind the use and collection/<br />

sharing of information and how can systems be integrated<br />

into existing operations to ensure interoperability and<br />

enhanced border protection? How can open architecture<br />

systems be successfully integrated with legacy systems?<br />

Crime across borders, crime at the border<br />

Cross border criminal activities remains the mainstay of<br />

activities for border agencies, whether it is from human<br />

trafficking or illegal trade/narcotics. Criminal gangs move<br />

to increasingly brash and innovative techniques to establish<br />

new systems/channels to facilitate their cross border<br />

criminal activities, including cyber attacks on the movement<br />

of personal data of travellers. What are the latest challenges<br />

facing border agencies, from the front line and beyond to<br />

the unexpected internal facilitators?<br />

Adopting to the changing environment: what border<br />

security administrations must do to remain effective<br />

Managed migration/traveler movements constantly are<br />

buffeted by economic, social and even environmental<br />

changes. Auto responses to itinerant movements due<br />

to war or natural disasters are in the “tool kits” of<br />

governments. States can invoke the support of national<br />

and international agencies to establish temporary legal<br />

and physical accommodations for displaced persons as a<br />

consequence of war, international crisis or natural disasters.<br />

These are usually of short to medium duration and follow<br />

a well-worn legal and operational paths. However, are<br />

border administrations really prepared to adapt to strategic<br />

changes in their operational environment? Regionalization<br />

of sovereign jurisdictions, globalization of trade and<br />

commerce, changing migration patterns as well as new<br />

technologies available to make borders “smarter” are<br />

challenges rarely debated and discussed.<br />

Setting International Standards in IBM<br />

Good ethics, best practice, education and standardisation<br />

of practices and procedures ensures any agency delivers<br />

greater and more efficient results in enhanced integrated<br />

border management. If there was closer consistency<br />

between agency operations in the standards, policies and<br />

procedures, this would facilitate inter-agency cooperation<br />

and sharing of relevant information to enhance upstream<br />

detection.<br />

With many agencies implementing IBM, how do we set<br />

common practices and standards to assist in cross-agency<br />

cooperation for enhancing collaboration and information<br />

sharing? Who should set the standard and what are<br />

minimum standards for effective border management?<br />

Improving and facilitating the legitimate movement of<br />

people and goods: what technologies and standards are<br />

missing?<br />

<strong>Security</strong> versus Facilitation - Crossing the border now<br />

takes longer and is more complex than it was 50 years<br />

ago. Is technology actually making border procedures<br />

more efficient or just making the process more expensive<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 11


In the e-age of documents what is the life expectancy<br />

of the passport booklet?<br />

Is the paper passport capable of providing the necessary<br />

security features and safety mechanisms for detection<br />

and identification of fraudulent use and criminal activity?<br />

Should technology be embraced to assist with traveler<br />

identity management and is it possible to set a target date<br />

to the end the reign of paper passports?<br />

Closed Agency Only Workshops<br />

Travel and other document fraud: who are behind<br />

today’s activities and how do we share information in<br />

existence to identify and monitor?”<br />

for everyone? Since very few actual terrorists have been<br />

interdicted by national border control organizations at the<br />

borders where to go forward with border security/traveler<br />

screening? What are the latest technologies and future<br />

technological developments that can enhance clearance<br />

and mobility, from the fast moving business traveller or the<br />

legitimate refugee to legitimate goods and traffic?<br />

Should exit controls be reintroduced universally,<br />

regardless of the cost? Is one exit control anothers<br />

entry control?<br />

With today’s ease of on-line booking and check-in, which<br />

can be accomplished by anyone in any country, passports<br />

rarely get checked or seen until the passenger boards the<br />

plane/vessel. Although baggage security checks may be<br />

conducted on exit, many current exit control procedures do<br />

not verify the legitimacy of the traveller with the passport<br />

document. Are we absolutely certain that all travellers<br />

through the gates are who they say they are? Should exit<br />

controls be universally introduced, regardless of the cost,<br />

to mitigate traveller fraud identity? ICAO mandated Face<br />

as the biometric to be included in all eTravel Documents,<br />

verified using the PKI Registry, so that every state would be<br />

able to read it and detect fraudulent use of the document.<br />

What are the pros and cons of other means open to border<br />

authorities - API, iAPI, PNR analysis, Interpol i24/7 data etc -<br />

and how does the concept of global interoperability extend<br />

to data acquisition and analysis?<br />

Who are the organisations behind the fraudulent use of<br />

travel and other documents. Systems are not foolproofand<br />

can be circumvented due to gaps in the workflow that can<br />

be exploited. How can agencies better share and access<br />

existing information for enhancing travel security?<br />

Trends in trafficking drugs, people, counterfeit goods<br />

What are the latest and developing trends in cross border<br />

criminal activities, that substantially damage and harm<br />

a country’s/region’s security. How can intelligence and<br />

information be shared to enhance upstream collaboration<br />

in the fight against organised criminal activities.<br />

Inter-Agency Co-operation and Information Sharing -<br />

Why the return to information silo’s and how to tackle<br />

systemic non-cooperation practices”<br />

After the revelations of allies spying on allies, the WikiLeaks<br />

scandals of 2013 it can be reliably assumed that varying<br />

degrees of intergovernmental and interagency trust has<br />

been eroded. With this in mind Is it possible to get early<br />

warnings of emerging events around the world? Should a<br />

body like BORDERPOL provide forecasts of future societal<br />

and economic events that impact on the border security<br />

community? With so much information already available<br />

how to separate the wheat from the chaff? The need to<br />

repair this is necessary if likeminded bodies are to work<br />

together in the future.<br />

Register online at www.world-borderpol-congress.com<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 9


Closed Agency Only Pre-Registration<br />

In order to attend the Closed Agency Only Workshops<br />

you must represent your federal government and preregistration<br />

is a requirements.<br />

To pre-register your interest please contact Neil Walker,<br />

Director Programs & Events, at neil.walker@borderpol.org.<br />

<strong>2014</strong> World BORDERPOL Congress<br />

Registration Now Open<br />

You can now register your place at the 3rd World<br />

BORDERPOL Congress directly at the event website<br />

www.world-borderpol-congress.com, alternately request<br />

a registration form from BORDERPOL Director Programs &<br />

Events, Neil Walker at neil.walker@borderpol.org.<br />

Ensure your presence at the 3rd World BORDERPOL<br />

Congress - Save the Dates – 9th – 11th December <strong>2014</strong>,<br />

Budapest, Hungary.<br />

Special Delegate Offer for <strong>Border</strong><br />

Agencies<br />

BORDERPOL aim to me the attendance to the World<br />

BORDERPOL Congress as simple and cost effective<br />

as possible for border agencies, forces and related<br />

government agencies.<br />

To learn more about the Agencies Special Delegate Offer<br />

please contact the BORDERPOL Events Director, Neil Walker<br />

at neil.walker@borderpol.org.<br />

Why Attend the World BORDERPOL<br />

Congress<br />

Your attendance to the World BORDERPOL Congress will<br />

ensure you are up-to-date on the lastest issues, policies<br />

and challenges facing the world’s border management,<br />

protection and security forces.<br />

Sharing your experiences, ideas and issues with your<br />

international colleagues will enable you to collaborate,<br />

co-operate and work together to create a more harmonsed<br />

network<br />

You will also gain an insight in to what the future holds<br />

for the management of migration and refugee movement,<br />

as well as systems and technologies employed in fighting<br />

illegal border activities, including drug and people<br />

traffikking.<br />

• High level Congress with leading industry speakers and<br />

professionals<br />

• Learn from experiences and challenges from the world’s<br />

border agencies<br />

• Gain insight into national, regional and global policy and<br />

border agency developments<br />

• Constructive debate, educational opportunities and<br />

cooperation advocacy<br />

• Share ideas and facilitate in valuable inter-agency<br />

cooperation<br />

• Exhibition showcasing leading technologies and products<br />

• Networking events and opportunities<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 13


Securing Africa’s <strong>Border</strong>s: learning lessons from London 2012<br />

Here, John Baker, Head of Global Operations for the National <strong>Security</strong> and Resilience Consortium and<br />

Michael Fuller MBE, Director at SCC Global Ltd, examine the current border threats across Sub-Saharan<br />

Africa and consider how the UK’s Olympic legacy may hold the key to a significant part of the solution.<br />

Sub-Saharan Africa is, geographically,<br />

the area of the continent of Africa<br />

that lies south of the Sahara Desert.<br />

Politically, it consists of all African<br />

countries that are fully or partially<br />

located south of the Sahara (excluding<br />

Sudan). It contrasts with North Africa,<br />

which is considered a part of the Arab<br />

world. Somalia, Djibouti, Comoros and<br />

Mauritania are geographically part of<br />

Sub-Saharan Africa, but also part of the<br />

Arab world.<br />

The Sahel is the transitional zone<br />

between the Sahara and the tropical<br />

savanna (the Sudan region) and forestsavanna<br />

mosaic to the south.<br />

The ongoing international operation<br />

regarding the kidnap of over two<br />

hundred girls from their school in<br />

Nigeria by Boko Haram and recent<br />

attacks in Kenya and Cameroon<br />

highlight to the world the porous<br />

nature of borders across this region<br />

and the urgent need to utilise tried<br />

and tested operational and strategic<br />

planning expertise honed over decades<br />

to mitigate the threats arising from this<br />

as far as is possible.<br />

Nigeria shares 773km of border stretch<br />

with Benin, 87km with Chad and then an<br />

entire stretch of 1049km with Niger and<br />

1690km with Cameroon. The Nigeria<br />

Immigration Service (NIS) announced<br />

there are over 1480 illegal routes into<br />

Nigeria through these porous borders.<br />

This level of border insecurity recently<br />

cost the Comptroller-General of the<br />

NIS her job, and Interior Minister<br />

Abba Moro has acknowledged the<br />

seriousness of the crisis. Unfortunately,<br />

not much has been done about it;<br />

and certainly, whatever is being done<br />

is not being done nearly fast enough<br />

or with sufficient tenacity given the<br />

implications for the wider battle with<br />

terrorism.<br />

The Olympic legacy – lessons learned<br />

The 2012 London Olympics were<br />

fashioned in the face of a harsh and<br />

real terrorist threat. In the previous<br />

decade both 9/11 and 7/7 indicated to<br />

the world that there were now no limits<br />

to what the terrorist was prepared<br />

to do. It reconfigured the thinking<br />

underpinning planning against threat<br />

and focused the minds of the United<br />

Kingdom and its security professionals<br />

as the world prepared to descend upon<br />

the capital.<br />

The years of designing and making<br />

ready the National Olympic Coordination<br />

Centre (NOCC) as a national<br />

decision support architecture was a<br />

challenging process. However, the four<br />

key learning points from that task are<br />

as applicable today to the mitigation<br />

of the Sub-Saharan border threats as<br />

they were to the planning of the 2012<br />

Games.<br />

The first learning point concerns the<br />

cultural hurdles that must be overcome<br />

if integrated and interoperable multiagency<br />

crisis planning and response<br />

is to be designed and implemented<br />

effectively.<br />

In the UK we have extraordinarily<br />

capable emergency services and<br />

supporting agencies. The evidence<br />

from 2012 suggests that the roles<br />

of each of those organisations are<br />

not as well understood by all as they<br />

could be. A collective understanding<br />

of the strategic value and necessity<br />

of the NOCC, and the value it would<br />

add to operational commanders, was<br />

developed early during its design. From<br />

the security partners’ perspective, there<br />

had to be a mutual benefit to being in<br />

the NOCC as a partner agency – a kind<br />

of symbiotic relationship. Being able<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

to articulate these benefits through<br />

progressively assured stakeholder<br />

engagement led to the collaborative<br />

identification of user requirements<br />

and secured buy-in from a very wide<br />

stakeholder community.<br />

The second learning point is ‘robust<br />

simplicity’. The project was courted<br />

by industry offering complex (and<br />

costly) IT architectures and decisionsupport<br />

solutions. The robust and<br />

detailed requirements-capture process<br />

demonstrated that this was not<br />

necessary and that existing securityaccredited<br />

IT systems and broadband<br />

connectivity, allowing agencies to reach<br />

back to their parent organisations,<br />

offered an entirely apposite level of ICT<br />

infrastructure. However, and of critical<br />

importance, the business continuity<br />

planning and Service Level Agreements<br />

that support IT and power systems<br />

must match the required levels of 24/7<br />

ICT capability.<br />

The third learning point brings us to<br />

procedural and structural design. A<br />

100-day operation cannot be sustained<br />

without robust processes and structures<br />

in place. Designing the NOCC with a<br />

current operations team and a future<br />

plans team, coupled with the associated<br />

standard operating procedures for their<br />

operation and information-handling,<br />

was paramount. This somewhat<br />

militaristic approach took time to<br />

adapt to, but provided a clear division<br />

www.borderpol.org page 14


of responsibility across the NOCC’s<br />

leadership team, supporting national<br />

contingency planning and helping to<br />

create a nationally consistent look and<br />

feel to safety and security operations.<br />

The fourth and final key learning<br />

point deals with the training and<br />

readiness regime required. With more<br />

than 400 people to train, a plethora<br />

of organisations to inform and a<br />

Games-wide exercising schedule to<br />

support, the NOCC training strategy<br />

commenced 20 months before the<br />

start of the Torch Relay. NOCC liaison<br />

staff training began a year in advance,<br />

comprising a progressive approach to<br />

designing the roles, developing the<br />

individual, developing the team and<br />

operating collectively with Games<br />

delivery partners as a unified national<br />

security co-ordination capability. So,<br />

training, testing and readiness were<br />

designed, undertaken and delivered<br />

in a wholly integrated manner, with<br />

interoperability at the very core.<br />

• Working with border communities<br />

and traditional rulers to create a<br />

broad-based coalition against border<br />

insecurity. This may also include<br />

increasing awareness of cross-border<br />

security threats within the community,<br />

community development programmes<br />

and even improving the extent of<br />

rural electrification, which would also<br />

increase the efficacy of night-time<br />

patrols.<br />

• Increasing oversight of security forces<br />

posted to the border.<br />

• Improving the effectiveness of crossborder<br />

partnerships established to<br />

tackle common problems by ensuring<br />

strong, consistent and sincere<br />

cooperation at the political level.<br />

Land border security is fundamental to<br />

achieving key national security goals.<br />

However, the borders themselves<br />

are not the problem as they are an<br />

important means of facilitating trade<br />

investment and cultural and familial<br />

exchanges.<br />

The London 2012 Olympic legacy<br />

offers Sub-Saharan Africa the a<br />

readily deployable opportunity for<br />

practical, relevant and state-of-the-art<br />

knowledge and technology transfer on<br />

any issue relating to national security<br />

needs and border and internal threats.<br />

Dr William Tasong, President,<br />

Africa <strong>Border</strong> <strong>Security</strong> and Business<br />

Development at the National <strong>Security</strong><br />

& Resilience Consortium (NS&RC), said:<br />

“With regard to Sub-Saharan border<br />

security, given the stakes involved,<br />

any initiatives implemented across<br />

Africa to improve border security must<br />

generate a proportionate return on the<br />

investment made in training, equipment<br />

and planning. The Olympic legacy team<br />

proved that utilising existing capability<br />

saved money and made sense.<br />

“The task of securing entire border<br />

lengths is so immense that there have<br />

to be difficult decisions made on how<br />

to divide tasks, concentrate resources<br />

and which issues to prioritise.<br />

“However, applying the principle<br />

of knowledge transfer through the<br />

experiences of those involved in<br />

such detailed Olympic planning must<br />

make sense and be financially viable.<br />

Along with upgrading border security<br />

plans, there needs to be a means of<br />

monitoring success, based on clearly<br />

defined metrics.”<br />

Summary<br />

In general, improved border security<br />

will involve analysing the task in detail:<br />

• Improving the training of border<br />

officials and equipping them with<br />

the tools required to tackle modern<br />

security challenges.<br />

Join the world leader in providing information on defence<br />

and security contract opportunities in the UK, Europe and Globally<br />

Access opportunities in:<br />

Homeland<br />

<strong>Security</strong><br />

Visit: www.dcicontracts.com or Call: 0845 270 7092<br />

✔<br />

✔<br />

✔<br />

Aerospace<br />

What’s included in your DCI Subscription:<br />

The largest defence and security related<br />

tenders and awards database in Europe<br />

Bespoke Live Alert service<br />

Dedicated Research Team monitoring over<br />

2000 sources globally<br />

Humanitarian Aid<br />

Aviation<br />

(including<br />

airports)<br />

ANNUAL SUBSCRIPTIONS FROM ONLY £235<br />

✔<br />

✔<br />

✔<br />

✔<br />

Dedicated Customer Account Manager<br />

support<br />

24/7 personalised search<br />

Flag and save contracts<br />

UK MOD<br />

Counter<br />

Terrorism<br />

Emergency<br />

Services<br />

Latest defence and security procurement<br />

intelligence<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 15


Port <strong>Security</strong>: The Front Line<br />

Once upon a time commercial ports only had to deal with three key threats on a daily basis - theft,<br />

damage to goods and stowaways all of which have the potential to cause considerable financial damage<br />

to stakeholders but were identifiable and manageable. The contemporary port is subject to a far<br />

wider range of threats including the possibility of terrorist attack and has to respond accordingly while<br />

managing and responding to a plethora of local, national and international legislative requirements.<br />

The diversity of responses, systems and processes to tackle each separate threat combined with the<br />

demands of compliancy has made the job of the Port Facility <strong>Security</strong> Officer (PFSO) onerous to the<br />

point of breaking.<br />

<strong>Security</strong> expert and former Chairman of the <strong>Security</strong> Development Board Rotterdam Port, Henk<br />

van Unnik, explains how a lack of cohesion has resulted in the current scenario and that a solution<br />

to the problem has been developed through the <strong>Security</strong> UPgrade for PORTs (SUPPORT) research<br />

& development project which is part-funded by the European Commision’s FP7 <strong>Security</strong> Research<br />

Programme. He explains how the appropriate management of resources can be co-ordinated and<br />

deployed to improve efficiency, effectiveness and port security.<br />

relaxation of border security between<br />

mainland-European countries in 1995,<br />

there are still major variations between<br />

different facilities. Some of this can be<br />

attributed to experience, some is driven<br />

by national or regional culture but some<br />

is due to the way legislation has been<br />

applied.<br />

With 90% of EU’s external trade and<br />

40% of internal trade transported by<br />

ship, the contemporary sea port is a vital<br />

cog in the massive machine that is 21st<br />

Century commerce. Unsurprisingly, port<br />

infrastructure and the 3.5 billion tonnes<br />

of freight that flows through EU facilities<br />

are vital to maintaining both global<br />

and individual countries’ economic<br />

wellbeing.<br />

The potential threats to port security<br />

come on many different levels from a<br />

range of groups and individuals with<br />

very different aims and objectives. Theft,<br />

fraud, corruption, drugs trafficking<br />

and people trafficking are all major<br />

issues for port security, especially when<br />

their motivation can be traced back to<br />

organised crime or terrorist groups.<br />

The combination of sophisticated<br />

organised crime, the heightened risk of<br />

terrorist activity and the ongoing threat<br />

of low level crime ensures that ports<br />

are under threat 24 hours per day, 365<br />

days per year. Well organised criminal<br />

gangs now have access to enough<br />

money, knowledge and skills to develop<br />

considerably more complex modus<br />

operandi. Where in the past, criminal<br />

organisations would use bribery or<br />

extortion to secure access, information<br />

or control of a particular shipment,<br />

recently there has been a move to bypass<br />

the human element and hijack the<br />

technology. Recent events at a Northern<br />

European port have demonstrated<br />

how easily a fully automated logistics<br />

chain can be manipulated if security is<br />

breached. Rather than having to run<br />

the risk of ‘stealing’ a container and<br />

getting through port security, or leaving<br />

a trail of names or addresses that can<br />

be followed up by law-enforcement<br />

agencies later, cybercrime ensures that<br />

all the key physical checks appear 100%<br />

legitimate at the dock gate, but can be<br />

wiped clean electronically, removing all<br />

trace. Faced with such innovative and<br />

complex criminal activity, port security<br />

needs to raise its game.<br />

While the baseline level of port security<br />

has certainly improved since the<br />

The legislation that defines port<br />

security is the International Maritime<br />

Organisation’s (IMO) International Ship<br />

and Port facility <strong>Security</strong> code (ISPS)<br />

which, in turn, is part of the Safety of Life<br />

at Sea (SOLAS) regulations. Developed<br />

in the aftermath of the September 11th<br />

terrorist attacks, the ISPS regulates<br />

security on-board ships, as well as<br />

inside ports and terminals which receive<br />

seagoing vessels on international<br />

voyages. The ethos of the ISPS code<br />

is very preventive and includes a<br />

requirement for both vulnerability<br />

and threat assessments to be carried<br />

out. Risks and vulnerabilities are very<br />

different when considering a container,<br />

bulk or passenger terminal and so<br />

all assessments must be specific and<br />

bespoke. The ISPS code also specifies<br />

a basic security framework including<br />

monitoring and controlling access,<br />

monitoring the activities of people and<br />

cargo, the preparation of specific ship<br />

and Port Facility <strong>Security</strong> Plans and the<br />

appointment of Ship <strong>Security</strong> Officers<br />

and a Port Facility <strong>Security</strong> Officer<br />

(PFSO).<br />

Across the European Union (EU), the<br />

ISPS code is supported by European<br />

Commission Directive 725. While<br />

identical to the ISPS code in content<br />

and a mandatory piece of pan-European<br />

legislation, Directive 725 only requires<br />

member states to achieve a particular<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 16


esult without dictating the means of<br />

achieving that outcome. Consequently,<br />

the ISPS code was implemented by<br />

21 EU countries, each in a different<br />

way without any homogenisation of<br />

approach or standardisation. Although<br />

the European Maritime Safety Agency<br />

(EMSA), FRONTEX and EUROPOL all<br />

touch upon port security, they have no<br />

executive powers and there is currently<br />

no Europe-wide framework. Without a<br />

Pan-European Federal Agency like the<br />

U.S. Department of Homeland <strong>Security</strong>,<br />

the European Union has no power to<br />

compel member states to work together<br />

or to follow prescriptive guidelines and<br />

individual ports work in isolation with<br />

commercially-driven secrecy, thwarting<br />

the sharing of intelligence or bestpractice.<br />

Although responsibility rests with a<br />

variety of ministries or other government<br />

agencies across Europe, the burden<br />

of compliance and implementation of<br />

the ISPS code has been passed down<br />

to the individual terminal operators.<br />

This produces an interesting paradox<br />

as commercial companies whose<br />

aim is to make a profit to serve their<br />

board or shareholders are being made<br />

responsible for an activity that does not<br />

necessarily deliver any business benefit.<br />

Not surprisingly, enhanced security<br />

beyond that required to protect day to<br />

day business operations are often not<br />

high on Terminal Operator’s agendas,<br />

especially when national authorities do<br />

not have the power to force them to<br />

invest in such security measures. Despite<br />

the best efforts of regularity authorities,<br />

port security too often promises much<br />

and delivers little.<br />

Because of the very nature of a port<br />

facility with huge volumes of vehicle<br />

and cargo movements in and out each<br />

day, the level of security that can be<br />

physically implemented will always be<br />

a balance between risk and commercial<br />

reality. In this context the role of the Port<br />

Facility <strong>Security</strong> Officer (PFSO) is key to<br />

ensuring this fine balance is maintained.<br />

Providing a framework to assist the PFSO<br />

is a major element of the EU’s <strong>Security</strong><br />

UPgrade for PORTs (SUPPORT) project<br />

(http://www.supportproject.info/)<br />

which is part-funded by the EC’s FP7<br />

Research & Technological Development<br />

Programme. It is a collaboration of<br />

twenty European organisations whose<br />

focus is to raise the current level of<br />

port security. The SUPPORT project’s<br />

main objectives are to deliver ‘validated’<br />

generic port security management<br />

models (capturing reusable state-ofthe-art<br />

and best practices) that can<br />

be customised for specific ports; and<br />

training and open standards based tools<br />

to aid security upgrade in EU ports.<br />

SUPPORT integrates legacy port systems<br />

with new surveillance and information<br />

management systems. It efficiently<br />

supports the complexity of a real port<br />

environment though an integrated,<br />

holistic approach. This ensures an<br />

improved level of security, while<br />

reducing the associated administrative<br />

burden on the port.<br />

Amongst the partners are a number of<br />

ports that have been selected to represent<br />

typical, but different operations.<br />

Starting from the perspective of the<br />

partner port operations, the project has<br />

identified key security gaps and has<br />

produced generic models describing<br />

measures to maintain or augment the<br />

efficient and secure operation of these<br />

ports. Communication and decision<br />

support tools incorporating semantic<br />

technologies have been developed,<br />

accessible to all the port security<br />

stakeholders.<br />

Full scale demonstrators have been<br />

organised in representative EU ports<br />

(Gothenburg, Lisbon and Piraeus) and<br />

augmented with a broader evaluation<br />

programme by members of a European<br />

Ports <strong>Security</strong> Forum. SUPPORT solutions<br />

include policy and standardisations<br />

proposals and training that can be used<br />

by any EU port to efficiently enhance its<br />

security level.<br />

One of SUPPORT’s key outputs is the<br />

Port <strong>Security</strong> Management System<br />

(PSMS) (http://www.mypsms.com/).<br />

The PSMS is designed to help PFSOs<br />

to upgrade their security systems by<br />

empowering them with knowledge.<br />

It provides information, skills and<br />

methodologies that enable them to<br />

maintain, evaluate and upgrade their<br />

security measures and create security<br />

awareness without major investment.<br />

The PSMS also delivers outputs in the<br />

form of graphics that can be used to<br />

reinforce security threats and potential<br />

mitigation measures in presentations to<br />

managers or boards of directors.<br />

The whole PSMS package comprises<br />

five elements including a maturity<br />

module designed to enable security<br />

professionals to review and upgrade<br />

security plans to address terrorist<br />

threats; a corporate security module<br />

which addresses crime risks such as loss<br />

events, related to corporate processes<br />

and procedures; an e-learning education<br />

and examination module based on<br />

best practices of ISPS related maritime<br />

security educations including drills<br />

and exercises; a sharing and decision<br />

support module which enables security<br />

professionals to supervise facilities via<br />

the internet and to collaborate on a<br />

local, national or global scale and an<br />

Authorised Economic Operator (AEO)<br />

security self-assessment module which<br />

provides a system to reach compliancy<br />

and submit AEO application.<br />

The pressure of balancing commercial<br />

realities and security threats will<br />

certainly persist as long as current<br />

legislation remains placing the burden<br />

of investment and compliance on<br />

terminal operators. There is a school<br />

of thought that suggests the status<br />

quo will remain until a major terrorist<br />

incident takes place in a European<br />

port facility. However, with access to<br />

SUPPORT’s Port <strong>Security</strong> Management<br />

System (PSMS), PFSOs now have the<br />

tools to assess the situation, advise their<br />

management team and make the right<br />

decision, whatever the security threat<br />

might be.<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 17


New system for detecting<br />

radiological threats revealed<br />

A new system designed to better detect radiological threats<br />

by being more precise in distinguishing their radiation<br />

signature from natural backgrounds, is being trialed at<br />

customs organizations across Europe.<br />

The Modular Detection System for Special Nuclear Material<br />

(MODES_SNM) eases the operational burden associated with<br />

the expensive process of investigating the many “everyday”<br />

sources of benign radiation such as cat litter, fertilizer, ceramic<br />

tiles and even Brazil nuts.<br />

The MODES_SNM system, the first of its type in the<br />

world to combine fast and thermal neutron detection, is<br />

the result of a pan-European R&D effort, funded by the<br />

European Commission under its FP7 framework program,<br />

that developed and integrated technologies originating<br />

in fundamental science research conducted at places like<br />

CERN, the European Laboratory for Nuclear Research near<br />

Geneva. It has already undergone rigorous tests at the<br />

European Commission’s Joint Research Centre and the Port<br />

of Rotterdam, and is now being tested by the Irish tax and<br />

customs administration.<br />

As part of the recent tests the system has been used to<br />

verify that parked containers do not contain threats such as<br />

uranium, plutonium, or radiological components for “dirty<br />

bombs”.<br />

technology for testing by end users across Europe.“<br />

t Systems launched today TREASURES, an unattended<br />

ground sensors (UGS) system for intelligence gathering, force<br />

and border protection and enhanced situational awareness,<br />

enhancing a short and efficient sensor-to-shooter cycle in<br />

encountering the enemy;<br />

TREASURES, a cutting-edge, small, lightweight system,<br />

offers short deployment time and low maintenance. It is a<br />

flexible system, enabling easy integration with third-party<br />

sensors, subsystems and C4I systems. Containing ingenious<br />

and modular system components, TREASURES is comprised<br />

of a variety of advanced sensors, communication and control<br />

components. TREASURES detects, classifies and tracks human<br />

and vehicular targets, in real time, on any terrain and in all<br />

weather conditions. The system uses a broad network of “inhouse”<br />

developed sensor clusters, with intelligent dedicated<br />

communication, breakthrough sensing technologies<br />

and data analysis capabilities. Since all the sensors are<br />

developed in house at Elbit Systems, their connectivity in one<br />

communication network maximizes the performance of each<br />

sensor.<br />

EU R&D Project to<br />

Demonstrate Unique<br />

Technologies to Help Improve<br />

Port <strong>Security</strong><br />

Practical results from the SUPPORT (<strong>Security</strong> UPgrade for<br />

PORTS) project, co-ordinated by BMT Group Ltd and partfunded<br />

by the European Commission’s FP7 <strong>Security</strong> Research<br />

Programme was demonstrated to key stakeholders at Stena<br />

Line’s ferry terminals starting at Masthuggskajen in the Port of<br />

Gothenburg on the 7th and 8th <strong>May</strong> <strong>2014</strong>.<br />

Comprising a collaboration of 21 European organisations,<br />

SUPPORT integrates legacy port systems with new surveillance<br />

and information management systems. It efficiently supports<br />

the complexity of a real port environment through a more<br />

integrated, holistic approach. This ensures an improved level of<br />

security, while reducing the administrative burden on the port.<br />

A unique advantage of the MODES_SNM system – which<br />

is modular and mission configurable - is its ability to<br />

identify materials surrounding a potential threat object. This<br />

information is of high value, as it can allow operators to<br />

exclude the possibility of a detected plutonium source being<br />

a “ready-to-go” nuclear weapon. Furthermore, the MODES_<br />

SNM system is more sustainable than current systems, as it<br />

does not use 3He, the expensive raw material that is typically<br />

used in most neutron detection systems.<br />

Michael Doherty, detection technology expert with the Irish<br />

tax and customs administration said “ The MODES_SNM<br />

project unites specialists from a number of fields ranging<br />

from customs to nuclear physics. In the space of just 2 years,<br />

MODES_SNM has been able to deliver the latest cutting edge<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 18


Guests attending the event were given the opportunity to be<br />

part of a live demonstration which included the automatic<br />

detection and tracking of a number of divers, swimmers and<br />

small crafts. Based on a system of subsea and surface sensors<br />

including hydrophones, Infra-Red cameras, video cameras<br />

and radars, the Sea Side Intrusion Detection System (SSID)<br />

developed by FOI, the Swedish Defence Research Agency.<br />

Sören Jägerhök, Research Director at FOI comments: “The<br />

SSID will provide tools for the detection of intruders who<br />

attempt to enter a ship’s berth on the surface or under water.<br />

The aim of the demonstration is to show what an affordable<br />

peace time system for commercial organisations would look<br />

like, as opposed to a military sensor system that is developed<br />

with war time repressive actions as options in mind.”<br />

On land video content analysis solutions, developed<br />

by consortium partner, INRIA, a French public research<br />

body dedicated to digital science and technology was<br />

also demonstrated. Through the use of decision support<br />

algorithms, these solutions which integrate with the SSID,<br />

as well as information fusion tools will prompt Port <strong>Security</strong><br />

Operators of any suspicious patterns in surveillance and<br />

administrative data, providing a more consistent and timely<br />

detection of any anomalies that may be a security threat.<br />

The demonstration included a showcase of the Port <strong>Security</strong><br />

Management System (PSMS), an interactive, real time dynamic<br />

web-based dashboard that will help maritime and logistics<br />

professionals assess and improve overall port security. The<br />

first tool of its kind, PSMS incorporates an up-to-date, selfassessment<br />

guide to enable maritime security practitioners to<br />

successfully upgrade their corporate security. The dashboard<br />

has been tested in various European Cities including Brussels,<br />

Dublin, Gothenburg, Lisbon and Rotterdam, with more than<br />

25 security, port security and IT experts from seven countries<br />

providing feedback and counsel.<br />

New Technology Contraband<br />

Detection Equipment on the<br />

market<br />

First is the Xpose® “New Technology” Hand Held<br />

Miniature Contraband Detector<br />

The Xpose indicates the difference in density between<br />

contraband (drugs, explosives, weapons, currency, etc.) and<br />

the object in which the contraband is hidden – This unit<br />

has many unique features such as graphing capability and<br />

connection to a computer and various accessories. Using<br />

our software “Xpose Tools” The last 100 scans are saved in<br />

memory and may be downloaded to a computer, with date<br />

& time stamps. Various accessories are available with more<br />

in development.<br />

Also new is the Sasrad Contraband Enforcement Kit (CEK)®<br />

The CEK is a kit of leading edge equipment for cargo<br />

Inspection and highway interdiction including the tools<br />

required for inspecting freight, vehicles, boats and planes.<br />

Each kit contains the Lightweight LED “everything-in-the<br />

handle” articulating Fiberscope plus a range of small tools<br />

and instruments which are required for daily operational<br />

use. Other fiberscopes are available for inspecting small<br />

closed areas and even vehicle tires without letting the<br />

air out. Available in Basic or Enhanced combinations of<br />

equipment this kit is the complete answer to contraband<br />

search, and detection.<br />

The first and only fiberscope which can be repaired in<br />

the field – 6mm diameter articulating Fiberscopes with 2<br />

or 4 way articulation of the tip, Tungsten Braid or Non-<br />

Conductive covering, 6mm diameter up to 5.0m in length.<br />

Other lengths and diameters available on request. Other<br />

Fiberscopes are available for IED/SWAT applications with<br />

channels for introducing working/handling tools including<br />

microphone, magnetic retriever and grasper.<br />

Heathrow Airport Install CEM’s<br />

emerald Intelligent Access<br />

Terminal<br />

As one of the world’s busiest airports, serving over 184<br />

destinations across 80 countries, Heathrow Airport needs a<br />

reliable device to ensure the highest levels of security as well<br />

as increasing operational efficiency.<br />

Heathrow Airport is using emerald to control critical paths<br />

and restricted zones that are permanently manned by security<br />

personnel. emerald will provide security staff with a clear,<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 19


the high performance technology, required when protecting<br />

people, events, infrastructure and facilities from the threat of<br />

criminal and terrorist activities.<br />

VISOR-C is a complete system – “ready to deploy”. Although<br />

VISOR-C is small, light and quick to deploy and operate, the<br />

system produces high quality images and includes all the<br />

operator tools needed to easily examine the underside of<br />

vehicles quickly and efficiently.<br />

VISOR-C uses the same proprietary software as other Visor<br />

Systems Limited products. It processes the image frames<br />

from each of the system cameras, to produce a clear<br />

‘compositeimage’ in less than 2 seconds after a vehicle has<br />

passed over the system.<br />

visual, colour image indicating the card status i.e. access<br />

denied or access granted. emerald will also enhance security<br />

at Heathrow’s Campus area where all cargo, staff and crew<br />

are processed before gaining access to the airside area. This<br />

is a critical part of Heathrow’s security operation where the<br />

highest level of security is required.<br />

CEM Systems has been working with Heathrow Airport<br />

for over 20 years securing all five terminals with AC2000<br />

Airport; CEM’s aviation specific access control and security<br />

management system. AC2000 Airport provides Heathrow<br />

Airport with a flexible and customisable security solution to<br />

meet their unique and growing security requirements.<br />

CEM also provides over 4000 readers from the CEM S600<br />

range and a number of S3030 portable readers for airport<br />

roaming security.<br />

Adding to the existing range of hardware, emerald is now<br />

installed in the Heathrow ID centre and the Campus area. “As<br />

an intelligent device emerald goes beyond securing premises;<br />

it empowers users, improves overall business needs and<br />

increases operational efficiency” said Andrew Fulton, Senior<br />

Director of Global Sales, CEM Systems.<br />

Visor Systems Limited<br />

launches the VISOR-C compact<br />

Under-Vehicle Surveillance<br />

System<br />

Visor Systems Limited has developed the VISOR-C UVSS<br />

following customer demand for a compact version of their<br />

successful, high performance, colour multi-camera technology,<br />

currently employed in the original VISOR-P ‘portable’ and<br />

VISOR-S ‘static’ under-vehicle surveillance systems.<br />

Police, border control, law enforcement agencies and private<br />

security organisations have all been requesting a compact,<br />

portable version for specific types of checkpoint operation,<br />

where the majority of vehicles to be processed are cars and<br />

vans.<br />

However, these organisations have stated the need to retain<br />

In-keeping with the original VISOR philosophy, none of the<br />

image data is lost due to image compression or during the<br />

assembly of the composite-image so, when the Operator<br />

inspects the displayed image and decides that further detailed<br />

examination is required s/he simply clicks on the area of<br />

interest to review the individual frame in detail at its native<br />

resolution – there is no loss of resolution.<br />

VISOR-C, along with its sister products and bespoke solution<br />

capability, allows Visor Systems Limited to provide a high<br />

performance solution for virtually all under vehicle surveillance<br />

system needs.<br />

Cognitec Brings Specialized<br />

Face Recognition Technology<br />

to <strong>Border</strong> Control Market<br />

Cognitec responds to high demand for fast, accurate face<br />

recognition solutions at border control points by introducing<br />

a new product that combines smart hardware for image<br />

acquisition with market-leading software for verification<br />

processes.<br />

FaceVACS-Entry is ready for integration into electronic gates<br />

(eGates) which provide travelers with electronic passports<br />

(ePassports) the option to pass through automatic passport<br />

checks. After a person enters the gate, the system detects the<br />

person’s face, adjusts the position of the cameras according<br />

to the person’s height and then captures frontal images. The<br />

software instantly verifies the live images against biometric<br />

photos stored in passports, other ID documents and/or facial<br />

image databases.<br />

Cognitec has optimized the system to ensure efficiency and<br />

ease of use for travelers while capturing best-quality images<br />

that guarantee high verification accuracy, thus fully complying<br />

with guidelines set by the European <strong>Border</strong> Police (Frontex).<br />

A proprietary sensor, able to distinguish between human<br />

faces and artifacts like printed images and masks, detects<br />

presentation attacks.<br />

“Cognitec has developed pioneering face recognition<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 20


technology for border control solutions since the inception<br />

of our company. We are proud to bring another innovation<br />

to airports and other ports of entry that will improve the<br />

overall traveler experience and safety,” says Alfredo Herrera,<br />

Managing Director of Cognitec.<br />

In August 2013, the company announced its participation<br />

in the EasyPASS project that will supply eGates to passport<br />

control areas at all major German airports, following a contract<br />

award by the German <strong>Border</strong> Police. All EasyPASS gates will be<br />

equipped with FaceVACS-Entry.<br />

Cognitec’s Video Screening<br />

and Analytics Technology<br />

Receives Algorithm and<br />

Functionality Upgrades<br />

Cognitec Systems Version 5.2 of FaceVACS-VideoScan, for<br />

real-time face recognition in video streams and anonymous<br />

people analytics. The upgraded version includes Cognitec’s<br />

latest face recognition algorithm B8 and major system<br />

upgrades that respond to the growing number of use cases<br />

the technology can support.<br />

FaceVACS-VideoScan performs anonymous facial analysis over<br />

time to compute statistical<br />

information about people<br />

count, demographics and<br />

movement, and to detect<br />

frequent visitors and crowds.<br />

The software’s adaptable<br />

analysis and reporting<br />

capabilities best support<br />

operations management<br />

and marketing departments<br />

as they make facility design<br />

and staffing decisions, or<br />

plan advertising content and<br />

placement.<br />

Real-time identity checks<br />

against image databases<br />

allow users to find known persons. <strong>Security</strong> teams are able<br />

to detect unwanted or banned persons within their facility,<br />

while sales or service staff can receive a notification to attend<br />

to valued customers. The upgraded version allows users to<br />

filter and acknowledge such notifications, and quickly find all<br />

appearances of a person within a given time window.<br />

FaceVACS-VideoScan 5.2 also features improved usability and<br />

user interface design, better integration of various camera<br />

models and corresponding camera controls, enhanced<br />

configuration options, and support for RTSP/H264 monitoring<br />

streams.<br />

The Homeland Defense and <strong>Security</strong> Database<br />

World<strong>Security</strong>-Index.com is the only global<br />

homeland security directory published in<br />

English, Arabic and Spanish on the web and<br />

in CD network format.<br />

The Global <strong>Security</strong> Portal<br />

Advertise on World<strong>Security</strong>-Index.com<br />

from only £515 for 12 months<br />

Contact info@worldsecurity-index.com for details<br />

or call +44 (0) 208 144 5934.


Hosted by:<br />

incorporating Critical Information<br />

Infrastructure Protection<br />

4 th -5 th March 2015<br />

The Hague, Netherlands<br />

www.cipre-expo.com<br />

Convene; Converse; Collaborate<br />

CALL FOR PAPERS<br />

Abstract submittal deadline - 30th June <strong>2014</strong><br />

The ever changing nature of threats, whether natural through<br />

climate change, or man-made through terrorism activities, either<br />

physical or cyber attacks, means the need to continually review<br />

and update policies, practices and technologies to meet these<br />

growing demands.<br />

Critical Infrastructure Protection and Resilience Europe brings<br />

together leading stakeholders from industry, operators, agencies<br />

and governments to debate and collaborate on securing Europe’s<br />

critical infrastructure.<br />

For further details and to submit your abstract visit<br />

www.cipre-expo.com<br />

How to Exhibit<br />

To discuss exhibiting and sponsorship<br />

opportunities and your involvement with<br />

Critical Infrastructure Protection & Resilience<br />

Europe please contact:<br />

Tony Kingham - Exhibit Sales Director<br />

T: +44 (0) 208 144 5934<br />

M: +44 (0)7827 297465<br />

E: tony.kingham@worldsecurity-index.com<br />

Paul Gloc - Exhibit Sales Manager<br />

T: +44 (0) 7786 270820<br />

E: paulg@torchmarketing.co.uk<br />

Gain access to leading decision makers from corporate and government establishments<br />

tasked with Critical Infrastructure Protection and Resilience.<br />

Supporting Organisations:<br />

Media Partners:


News and updates from the Secretariat<br />

It can be reported:<br />

BORDERPOL activities since the 2nd Congress have focused on the strategic<br />

development and delivery programs. <strong>Border</strong> issues in eastern Europe, Central Asia<br />

and West Africa due to changing geo-political events in these regions have attracted<br />

our attention. At the same time expansion of our membership at the individual,<br />

agency and corporate level has remained a priority.<br />

With respect to scheduled programs the first of these initiatives was delivered in<br />

Budapest Hungary on <strong>May</strong> 20th. The European Secretariat working in consultation<br />

with the host government police and border agencies as well with as corporate<br />

sponsors Beechcraft, Fercom and Konosoft produced a memorable and outstanding<br />

two day event. The workshop focused on organized crime and its impact on border<br />

security at the global level.<br />

As is usual for BORDERPOL events we brought together an excellent cross section<br />

of practitioners, policymakers and academics that were intimately involved in the<br />

discussions. Once again the event highlighted the ability of our management team<br />

in London and Budapest to meet the challenges of bringing together a large and<br />

diverse group. The next event in the <strong>2014</strong>/15 series of BORDERPOL workshops<br />

will take place in Helsinki Finland in September. Readers are invited to contact Mr.<br />

Neil Walker the Director of Programs and Events for instructions on how to join the<br />

workshop in Finland.<br />

Follow ‘BORDERPOL’<br />

on Twitter for the latest<br />

world border security<br />

news.<br />

To keep up to date with<br />

event developments<br />

join the ‘World<br />

BORDERPOL Congress’<br />

on LinkedIn.<br />

www.borderpol.org<br />

Members of the Executive Committee of the Management Board also held its annual<br />

meeting in Budapest on <strong>May</strong> 23rd at the office of the European Secretariat. The<br />

Board agreed to introduce a new basic membership program for serving and retired<br />

officials. It also decided to develop a global online educational program for border<br />

security officials that would otherwise not have access to such information. The Board<br />

welcomed Mr. Louis – Lyonel Voiron, General Secretary of the World Anti Illicit Traffic<br />

Organization to the Board. Mr. Voiron brings new strategies and experiences to the<br />

BORDERPOL team.<br />

The summer tourist season will soon begin in the countries in the northern<br />

hemisphere. From July to September border security and travel/migration agencies<br />

and services are busy at the airports, seaports and border crossing stations.<br />

BORDERPOL salutes the hard working men and woman of all the border agencies<br />

and services that ensure that their nation’s borders not only protect but connect<br />

people and places in a safe and effective manner.<br />

During this same period most intergovernmental bodies go into “hiatus mode” as the<br />

delivery of non-scheduled programs and services is quite limited due to holidays. Our<br />

secretariats will maintain services for members during this period but will like our IGO<br />

colleagues we will return to usual operational programs in September.<br />

To all our members, readers and supporters we wish you a safe and memorable<br />

summer!<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 23


News and updates from the Secretariat<br />

It can be reported:<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org<br />

www.borderpol-event.org<br />

Press releases, newsletters and similar media/publicity announcements<br />

regarding BORDERPOL events and programs will be delivered though the UK<br />

Administration Centre. Please contact Neil Walker neil.walker@borderpol.org or<br />

Tony Kingham tony.kingham@worldsecurity-index.com regarding these items.<br />

Editorial:<br />

Tony Kingham, KNM Media<br />

E: tony.kingham@worldsecurity-index.com<br />

Contributing Editorial:<br />

Neil Walker, Torch Marketing<br />

E: neilw@torchmarketing.co.uk<br />

Design, Marketing & Production:<br />

Neil Walker, Torch Marketing<br />

E: neilw@torchmarketing.co.uk<br />

Advertising Sales &<br />

World BORDERPOL Congress<br />

Exhibition Sales:<br />

Paul Gloc<br />

T: +44 (0) 7786 270820<br />

E: paulg@borderpol-event.org<br />

Membership Enquiries:<br />

Thomas Tass, BORDERPOL<br />

T: +1 509 278 1660<br />

E: secretariat@borderpol.org<br />

BSM Subscriptions:<br />

Neil Walker, Torch Marketing<br />

E: neilw@torchmarketing.co.uk<br />

3 rd World BORDERPOL Congress<br />

9 th -11 th December <strong>2014</strong><br />

Kempinski Corvinus Hotel, Budapest, Hungary<br />

Online Registration Now Open -<br />

Early Bird Deadline - 9 th October <strong>2014</strong><br />

Register your place at the World BORDERPOL Congress today and save<br />

with the Early Bird delegate rate.<br />

Are you interested in attending the World BORDERPOL Congress?<br />

The 3rd World BORDERPOL Congress registration is now open and will see the<br />

annual gathering of the worlds border protection and management agencies,<br />

practitioners and policy-makers.<br />

See page 9 to 12 for further details of the Congress<br />

programme .<br />

Copyright of BORDERPOL, Torch<br />

Marketing and KNM Media.<br />

Early Bird Discounts for delegates is currently<br />

available. Visit www.world-borderpol-congress.com<br />

for further details and to register online.<br />

Neil Walker, Events Director, BORDERPOL<br />

Email: neil.walker@borderpol.org<br />

<strong>Border</strong> <strong>Security</strong> <strong>Matters</strong><br />

www.borderpol.org page 24


3 rd World BORDERPOL Congress<br />

9 th -11 th December <strong>2014</strong><br />

Budapest, Hungary<br />

Enhancing Cooperation for Smarter <strong>Border</strong><br />

Management.<br />

Register today and benefit from Early Bird Discounts<br />

The World BORDERPOL Congress is the only multi-jurisdictional transnational<br />

platform where the border protection, management and security industry policymakers<br />

and practitioners convene annually to discuss the international challenges<br />

faced in protecting not only one’s own country’s borders, but those of neighbours<br />

and friends.<br />

We look forward to welcoming you to the wonderful city of Budapest, Hungary<br />

in December <strong>2014</strong> for the next gathering of border and migration management<br />

professionals.<br />

For congress programme and registration visit<br />

www.world-borderpol-congress.com<br />

Owned & Organized by: Supported by: Media Partners:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!