30.06.2014 Views

World Security Report June 2014

For the latest news, features, essential analysis and comment on security, counter-terrorism, international affairs, warfare and defence

For the latest news, features, essential analysis and comment on security, counter-terrorism, international affairs, warfare and defence

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

For the latest news, features, essential analysis and comment on security, counter-terrorism, international affairs, warfare and defence<br />

<strong>June</strong> <strong>2014</strong><br />

Subscribe Here<br />

The importance of the Internet<br />

infrastructure for every day life.<br />

Port <strong>Security</strong>: The Front Line<br />

Threat Detection and Recognition<br />

Industry News<br />

www.world-borderpol-congress.com<br />

www.cipre-expo.com<br />

www.personnel-protection.com


EDITORIAL<br />

3 rd <strong>World</strong> BORDERPOL Congress<br />

9 th -11 th December <strong>2014</strong><br />

Budapest, Hungary<br />

www.world-borderpol-congress.com<br />

Connecting and Protecting<br />

The <strong>World</strong> BORDERPOL Congress is the only multi-jurisdictional transnational<br />

platform where the border protection, management and security industry policymakers<br />

and practitioners convene annually to discuss the international challenges<br />

faced in protecting not only one’s own country’s borders, but those of neighbours and<br />

friends.<br />

The 3rd <strong>World</strong> BORDERPOL Congress will provide a platform for the world’s border<br />

protection forces and agencies to discuss and debate the current and future issues<br />

and challenges facing the border management, security and migration management<br />

sectors.<br />

We look forward to welcoming you to the wonderful city of Budapest, Hungary<br />

in December <strong>2014</strong> for the next gathering of border and migration management<br />

professionals.<br />

For further details and to submit your abstract visit www.world-borderpol-congress.com<br />

To discuss exhibiting and sponsorship opportunities and your involvement with the<br />

<strong>World</strong> BORDERPOL Congress <strong>2014</strong> please contact:<br />

Tony Kingham<br />

Exhibit Sales Director<br />

T: +44 (0) 208 144 5934<br />

M: +44 (0)7827 297465<br />

E: tony.kingham@worldsecurity-index.com<br />

Paul Gloc (UK & Europe)<br />

T: +44 (0) 7786 270820<br />

E: paulg@torchmarketing.co.uk<br />

Denne Johnson (Americas)<br />

T: +1 918 863 9792<br />

E: dennej@torchmarketing.co.uk<br />

When your staff are<br />

travelling, have you taken<br />

“all reasonable care” of their<br />

safety and security?<br />

Since the last issue of WSR was published,<br />

I am pleased to say we have launched<br />

our latest event, Personnel Protection and<br />

Safety Europe. The reason being, whilst<br />

governments around the world, quite rightly,<br />

spend a great deal of time, effort and money<br />

focussing on keeping the travelling public<br />

safe from attacks by terrorists, the simple<br />

truth is that when travelling we are far more<br />

likely to come to harm as a victim of crime, an<br />

accident or some sort of health emergency!<br />

In fact, if you travel enough, whether it is for<br />

business or pleasure, you are likely to have been<br />

a victim of one or the other, or like me, all three!<br />

I am amazed at how many companies routinely send their personnel off all<br />

over the world without giving their safety a second thought. It concerned me<br />

so much, that back in the day when I ran an international sales department,<br />

I took it upon myself to run travel safety awareness training sessions for my<br />

own staff, which promptly stopped when I left.<br />

What makes it more surprising is that all companies are aware of their ‘Duty<br />

of Care’ to their employees, yet when their staff travel and are at their most<br />

vulnerable, little is done in terms of systems, procedures, equipment or<br />

training to prepare them for what, for some of them at least, is inevitable.<br />

In the litigious world we live in, with the “no win no fee” lawyers, the legal<br />

and financial consequences of not taking “all reasonable care” could be<br />

considerable and for smaller companies potentially disastrous!<br />

So what is “all reasonable care”?<br />

Well that’s something the courts will ultimately decide but at the very least<br />

there should be procedures in place to assess travel risks and to deal with<br />

an emergency when it arises. Over and above that, it could be argued that<br />

some sort of training should be given routinely to staff that travel regularly<br />

and that smart phones and apps offer all sorts of possibilities for tracking<br />

employees movements, provide alerts, emergency panic numbers at<br />

“reasonable” cost! For bigger companies, more comprehensive measures<br />

may be deemed “reasonable”!<br />

What is sure is that companies that do not take “all reasonable care”, do so<br />

at their own risk!<br />

www.worldsecurity-index.com<br />

Editorial:<br />

Tony Kingham<br />

E: tony.kingham@worldsecurityindex.com<br />

Contributing Editorial:<br />

Neil Walker<br />

E: neilw@torchmarketing.co.uk<br />

Design, Marketing & Production:<br />

Neil Walker<br />

E: neilw@torchmarketing.co.uk<br />

Advertising Sales:<br />

Tony Kingham<br />

T: +44 (0) 208 144 5934<br />

M: +44 (0)7827 297465<br />

E: tony.kingham@worldsecurityindex.com<br />

Paul Gloc (UK & Europe)<br />

T: +44 (0) 7786 270820<br />

E: paulg@torchmarketing.co.uk<br />

Denne Johnson (Americas)<br />

T: +1 918 863 9792<br />

E: dennej@torchmarketing.co.uk<br />

Subscriptions:<br />

Tony Kingham<br />

E: tony.kingham@worldsecurityindex.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> is<br />

a bi-monthly electronic,<br />

fully accessible e-news<br />

service distributed to 38,000<br />

organisations globally. It tracks<br />

the full range of problems<br />

and threats faced by today’s<br />

governments, armed and security<br />

forces and civilian services and<br />

looks at how they are dealing<br />

with them. It is a prime source of<br />

online information and analysis<br />

on security, counter-terrorism,<br />

international affairs, warfare and<br />

defence.<br />

Co-organisers:<br />

Supporting Organisations:<br />

Media Partners:<br />

Tony Kingham<br />

Editor<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong><br />

Copyright of KNM Media and<br />

Torch Marketing.<br />

www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 3


CYBER SECURITY<br />

CYBER SECURITY<br />

The<br />

importance<br />

of the<br />

Internet<br />

infrastructure<br />

for every day<br />

life.<br />

Every day we read about the single digital market, the importance of a free and open Internet and the need of<br />

trust and security in electronic communications networks. The Internet is an assumed, and for specific services<br />

critical, component of everyday life but yet we still have to develop methodologies to fully assess what are the most<br />

important components from a national and international perspective and how they are structured. This is important<br />

not only in the short term to understand our dependencies on network connectivity but also in the long term to<br />

properly focus efforts for enhancing the resilience of data communication networks.<br />

The Internet infrastructure<br />

is the backbone of the<br />

information society but as<br />

it has become clear in the recent<br />

news, different threats, both<br />

technical and geopolitical, can<br />

hamper its availability. Citizens<br />

expect national authorities and<br />

operators to be fully aware of the<br />

possible interdependencies and<br />

put in place all possible measures<br />

to ensure the security and<br />

resilience of their communications.<br />

To build trust and secure the<br />

future of the information society,<br />

answering the following questions<br />

is becoming increasingly<br />

important:<br />

• What is the Internet today,<br />

how is it organized, what can<br />

we understand from its current<br />

structure, which are the most<br />

important components of it?<br />

• What is a critical service, network<br />

or component in today Internet<br />

infrastructure and how can we<br />

define what is national and what is<br />

cross-border?<br />

• What assets and services are<br />

vulnerable and what happens<br />

to critical services if they are<br />

disrupted?<br />

• How can we enhance security<br />

and resilience of the Internet<br />

interconnections?<br />

Understanding the complexity<br />

of the most complex network<br />

humanity created is a challenging<br />

task. The Internet in 30 years<br />

has changed the way we work,<br />

communicate and interact as<br />

a society and we are still at the<br />

very beginning of this societal<br />

revolution.<br />

It is essential that we are fully<br />

aware of our dependency on<br />

the infrastructure and how it is<br />

organized in each country. This can<br />

also be useful to understand if part<br />

of the assets, belonging to Critical<br />

Infrastructure (CIs), should be<br />

treated with higher requirements<br />

of security and resilience and<br />

the role they play for the global<br />

coherence of the Internet. Any<br />

assessment should be done<br />

from a Critical Information<br />

Infrastructure Protection<br />

(CIIP) perspective and should<br />

involve the Internet operational<br />

community in fostering the<br />

security and resilience of public<br />

communication networks and<br />

in general for the benefit of the<br />

entire Internet. Moreover having<br />

such an understanding could help<br />

every country in establishing a<br />

constructive dialogue with Internet<br />

operators and participate in the<br />

multi-stakeholder discussion on<br />

how to maintain the Internet<br />

globally secure and resilient.<br />

1 Challenges<br />

Every component of the Internet<br />

layers has its own vulnerabilities<br />

and represents a topic of study.<br />

For example<br />

• Physical infrastructure – cable<br />

systems and submarine cables are<br />

critical as well as the dependency<br />

on power supply 1 . Moreover<br />

communications can be tapped or<br />

targeted by specific attacks.<br />

• Hardware – In all the incidents<br />

regarding availability reported to<br />

ENISA in 2012 2 , hardware failure<br />

was the most common cause.<br />

• Software and Protocols – bugs<br />

in protocol implementation and<br />

exploitation of vulnerabilities<br />

as in traffic hijacks are realistic<br />

scenarios.<br />

Looking at the different<br />

components of the infrastructure,<br />

both at physical and at logical<br />

level, the following lists can be<br />

considered as an example<br />

of an initial set of threats that<br />

should be covered in an all<br />

hazard approach (Table 2):<br />

In recent times there have<br />

been several incidents that<br />

can be used as an example<br />

of the threats to which the<br />

infrastructure is vulnerable<br />

(see list below). While these<br />

incidents didn’t affect the<br />

Internet at a global scale<br />

or European scale, the<br />

effects on a local scale<br />

were rather noticeable or<br />

underline the persistence of<br />

known vulnerabilities. They<br />

therefore serve as a reminder<br />

that while the Internet at global<br />

level can be considered resilient,<br />

it cannot be taken for granted<br />

that this is also true for the local<br />

part of the Internet infrastructure<br />

serving a particular region, or<br />

country or involved in a targeted<br />

attack. Even disputes between<br />

private, non-State actors can have<br />

important effects on the local<br />

Internet infrastructure.<br />

Different causes of incidents can<br />

affect the different components:<br />

• Natural disasters and cable<br />

Table 2 – Threats to the physical and logical infrastructure<br />

cuts can affect the connectivity to<br />

specific areas 3 :<br />

• Attempts to block one country’s<br />

connectivity via physical 4 and<br />

network 5 disruption can have<br />

cascading consequences for<br />

Internet users even in another<br />

country due to the cross border<br />

nature of interconnections<br />

• Misconfigurations 6 can cause<br />

temporary and involuntary traffic<br />

reroutes<br />

• Large attacks 7 to specific services<br />

can have repercussions and create<br />

congestion<br />

• BGP hijacks or man in the<br />

middle attacks 8 and attacks to the<br />

DNS infrastructure 9 can be used to<br />

transparently reroute and intercept<br />

traffic or black hole it for a certain<br />

destination 10<br />

2 ENISA Efforts for the security<br />

and resilience of communication<br />

networks<br />

ENISA, the European Union<br />

Agency for Network and<br />

Information <strong>Security</strong> has studied<br />

the resilience of Internet<br />

infrastructure in Europe since<br />

2010, paying attention to both<br />

the technical and organizational<br />

components. The goal is to<br />

provide Member States with<br />

frameworks and resources to<br />

better secure and ensure the<br />

resilience of their networks. The<br />

“Inter-X: Resilience of the Internet<br />

Interconnection Ecosystem 11 “<br />

study was the first step ENISA<br />

took towards studying this area in<br />

2010. In 2011, it was followed up<br />

with a study assessing technical<br />

(e.g. logical, physical, application<br />

layers, replication and diversity of<br />

services and data, data centres),<br />

peering and transit e.g. Service<br />

Level Agreements (SLAs), as well<br />

as market, policy and regulatory<br />

4 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 5


CYBER SECURITY<br />

CYBER SECURITY<br />

issues.<br />

In 2013, ENISA released<br />

“Understanding the importance<br />

of the Internet Infrastructure<br />

in Europe” 12 continuing<br />

further its work in this area.<br />

The goal of this report is to<br />

foster security and resilience<br />

of the Internet infrastructure in<br />

Europe with particular attention<br />

to critical assets and cross<br />

border interdependencies<br />

and work together with<br />

Internet operational actors to<br />

maintain the Internet globally<br />

coherent, secure and resilient.<br />

The report contains several<br />

recommendations for Member<br />

States, providers of critical<br />

services and European Internet<br />

operational actors:<br />

• Member States should develop<br />

a national overview of the Internet<br />

infrastructure - Using the step by<br />

step guidelines proposed in the<br />

study, Member States are invited<br />

to develop an insight of the<br />

current infrastructure, the Critical<br />

Infrastructure interdependencies<br />

and have a baseline for future<br />

developments.<br />

• Member States should adopt<br />

a standardized methodology<br />

for the identification of Critical<br />

Information Infrastructure assets<br />

and services - In order to correctly<br />

assess the criticality of specific<br />

assets and services, Member<br />

States should be able to adopt<br />

a common methodology for<br />

the identification of Critical<br />

Information Infrastructures.<br />

• Member States should adopt<br />

specific physical infrastructure<br />

guidelines - Any research should<br />

always take under consideration<br />

the physical component and<br />

provide a holistic overview of<br />

the system. When looking at<br />

the physical infrastructure more<br />

specific guidelines should be also<br />

developed.<br />

• Critical services providers should<br />

develop requirements<br />

for high availability<br />

interconnections<br />

for critical services<br />

- During the<br />

discussion with<br />

operators, it was<br />

underlined that if<br />

providers of critical<br />

services consider<br />

some connectivity<br />

relationships as<br />

critical, they should<br />

require for these<br />

interconnections<br />

higher level<br />

of availability,<br />

integrity and confidentiality<br />

in order to enhance the<br />

security and resilience of these<br />

communications.<br />

• National and European<br />

bodies and cyber security<br />

agencies should engage the<br />

Internet community - Due to<br />

the multi-stakeholder nature<br />

of the Internet, we propose<br />

national and European<br />

bodies and cyber security<br />

agencies (active in the area<br />

of security and resilience of<br />

communication networks) to<br />

engage in a dialogue with<br />

the Internet community and the<br />

private sector.<br />

• European Commission and<br />

Member States should foster<br />

research on infrastructure security<br />

and resilience - The more we rely<br />

on electronic communication<br />

networks to build the future<br />

European information society,<br />

the more EU and Member State<br />

should foster research in this<br />

field. Moreover more research<br />

on vulnerabilities of the core<br />

components of the global Internet<br />

Infrastructure such as DNS and<br />

BGP is needed.<br />

• European Internet operational<br />

actors should share information<br />

about incidents affecting physical<br />

and logical infrastructure -<br />

European Internet operational<br />

actors are invited to share<br />

information on incident affecting<br />

physical and logical infrastructure<br />

and use it to develop good<br />

practices for the benefit of the<br />

entire community.<br />

In <strong>2014</strong> ENISA will follow up the<br />

2013 report with the following<br />

actions:<br />

• focusing on the identification<br />

of CIIs assets and services,<br />

physical and logical infrastructure<br />

vulnerabilities, procurement<br />

guidelines for CIIs operators and<br />

cross border cooperation<br />

• developing a threat landscape<br />

of the physical and logical layer of<br />

the Internet infrastructure<br />

• fostering the ENISA’s Internet<br />

infrastructure security and<br />

resilience reference group<br />

which aims to gather subject<br />

matter experts<br />

from the Internet<br />

operators’ community,<br />

Cybersecurity<br />

agencies, NRAs,<br />

contingency agencies<br />

and infrastructure<br />

security and resilience<br />

experts.<br />

The goal is to develop<br />

infrastructure security<br />

and resilience not<br />

only for securing<br />

European citizens but<br />

also the entire Internet.<br />

The Internet is an<br />

ordinary component<br />

of everyday life and<br />

considering news regarding<br />

recent threats, it is important to<br />

assess the current situation and<br />

ensure the security and resilience<br />

of citizens’ communications.<br />

Moreover, future scenarios<br />

such as the Internet of Things 13 ,<br />

Interconnected Mobility 14 and<br />

Smart city 15 are at their very<br />

beginning and are built on<br />

these same communication<br />

networks. In this respect, every<br />

citizen is a potential Internet<br />

user as far as a service relies<br />

on an Internet connection. For<br />

these reasons ENISA believes<br />

that is important to investigate<br />

how the interconnections are<br />

structured and understand what<br />

is critical in order to focus efforts.<br />

Communication networks are the<br />

building blocks of the information<br />

society and it is clear that the<br />

absence of knowledge regarding<br />

the underlying infrastructure could<br />

severely hamper not only securing<br />

current communications but also<br />

the preparing for future threat<br />

scenarios.<br />

1<br />

ENISA (2013), Power Supply Dependencies in the Electronic Communications Sector<br />

2<br />

ENISA (2013), Annual Incident <strong>Report</strong>s 2012 - Analysis of Article 13a annual incident reports, 2013<br />

3<br />

Massive Flooding Damages Several NYC Data Centers http://www.datacenterknowledge.com/archives/2012/10/30/majorflooding-nyc-data-centers/<br />

4<br />

Mediterranean Cable Disruption as Seen in RIPEstat https://labs.ripe.net/Members/mirjam/mediterranean-cable-disruption-asseen-in-ripestat<br />

5<br />

Dainotti, A., Squarcella, C., Aben, E., Claffy, K. C., Chiesa, M., Russo, M., & Pescapé, A. (2011). ‘Analysis of country-wide Internet<br />

outages caused by censorship’. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (pp.<br />

1-18). ACM<br />

6<br />

YouTube Hijacking: A RIPE NCC RIS case study http://www.ripe.net/Internet-coordination/news/industry-developments/youtubehijacking-a-ripe-ncc-ris-case-study<br />

7<br />

ENISA (<strong>2014</strong>) Large scale UDP attacks: the <strong>2014</strong> trend and how to face it https://www.enisa.europa.eu/publications/flash-notes/<br />

large-scale-udp-attacks-the-<strong>2014</strong>-trend-and-how-to-face-it<br />

8<br />

Cowie, J, (2013) The New Threat: Targeted Internet Traffic Misdirection http://www.renesys.com/2013/11/mitm-Internet-hijacking/<br />

9<br />

Google’s Public DNS intercepted in Turkey http://googleonlinesecurity.blogspot.in/<strong>2014</strong>/03/googles-public-dns-intercepted-inturkey.html<br />

10<br />

Toonk, A. (2013) Accidentally Stealing the Internet http://www.bgpmon.net/accidentally-stealing-the-Internet/<br />

11<br />

ENISA (2010) https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/interx/report<br />

12<br />

ENISA (2013) Understanding the importance of the Internet Infrastructure in Europe - Guidelines for enhancing the Resilience of<br />

eCommunication Networks http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/<br />

guidelines-for-enhancing-the-resilience-of-ecommunication-networks<br />

13<br />

Digital agenda for Europe http://ec.europa.eu/digital-agenda/en/internet-things<br />

14<br />

Vision of an interconnected Europe http://ec.europa.eu/news/transport/110328_en.htm<br />

15<br />

Smart Cities and Communities http://ec.europa.eu/eip/smartcities/<br />

6 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 7


PORT SECURITY<br />

PORT SECURITY<br />

Port<br />

<strong>Security</strong>:<br />

The Front<br />

Line<br />

Once upon a time commercial ports only had to deal with three key threats on a daily basis - theft, damage to goods<br />

and stowaways all of which have the potential to cause considerable financial damage to stakeholders but were<br />

identifiable and manageable. The contemporary port is subject to a far wider range of threats including the possibility<br />

of terrorist attack and has to respond accordingly while managing and responding to a plethora of local, national<br />

and international legislative requirements. The diversity of responses, systems and processes to tackle each separate<br />

threat combined with the demands of compliancy has made the job of the Port Facility <strong>Security</strong> Officer (PFSO)<br />

onerous to the point of breaking.<br />

<strong>Security</strong> expert and former Chairman of the <strong>Security</strong> Development Board Rotterdam Port, Henk van Unnik, explains<br />

how a lack of cohesion has resulted in the current scenario and that a solution to the problem has been developed<br />

through the <strong>Security</strong> UPgrade for PORTs (SUPPORT) research & development project which is part-funded by the<br />

European Commision’s FP7 <strong>Security</strong> Research Programme. He explains how the appropriate management of<br />

resources can be co-ordinated and deployed to improve efficiency, effectiveness and port security.<br />

With 90% of EU’s<br />

external trade and<br />

40% of internal<br />

trade transported by ship, the<br />

contemporary sea port is a vital<br />

cog in the massive machine<br />

that is 21st Century commerce.<br />

Unsurprisingly, port infrastructure<br />

and the 3.5 billion tonnes of<br />

freight that flows through EU<br />

facilities are vital to maintaining<br />

both global and individual<br />

countries’ economic wellbeing.<br />

The potential threats to port<br />

security come on many different<br />

levels from a range of groups<br />

and individuals with very different<br />

aims and objectives. Theft, fraud,<br />

corruption, drugs trafficking and<br />

people trafficking are all major<br />

issues for port security, especially<br />

when their motivation can be<br />

traced back to organised crime or<br />

terrorist groups. The combination<br />

of sophisticated organised crime,<br />

the heightened risk of terrorist<br />

activity and the ongoing threat<br />

of low level crime ensures that<br />

ports are under threat 24 hours<br />

per day, 365 days per year. Well<br />

Henk van<br />

Unnik,<br />

Chairman,<br />

<strong>Security</strong><br />

Development<br />

Board<br />

Rotterdam<br />

Port<br />

organised criminal gangs now<br />

have access to enough money,<br />

knowledge and skills to develop<br />

considerably more complex<br />

modus operandi. Where in the<br />

past, criminal organisations would<br />

use bribery or extortion to secure<br />

access, information or control of<br />

a particular shipment, recently<br />

there has been a move to bypass<br />

the human element and hijack<br />

the technology. Recent events<br />

at a Northern European port<br />

have demonstrated how easily<br />

a fully automated logistics chain<br />

can be manipulated if security is<br />

breached. Rather than having to<br />

run the risk of ‘stealing’ a container<br />

and getting through port security,<br />

or leaving a trail of names or<br />

addresses that can be followed up<br />

by law-enforcement agencies later,<br />

cybercrime ensures that all the<br />

key physical checks appear 100%<br />

legitimate at the dock gate, but<br />

can be wiped clean electronically,<br />

removing all trace. Faced with<br />

such innovative and complex<br />

criminal activity, port security<br />

needs to raise its game.<br />

While the baseline level of port<br />

security has certainly improved<br />

since the relaxation of border<br />

security between mainland-<br />

European countries in 1995, there<br />

are still major variations between<br />

different facilities. Some of this can<br />

be attributed to experience, some<br />

is driven by national or regional<br />

culture but some is due to the way<br />

legislation has been applied.<br />

The legislation that defines<br />

port security is the International<br />

Maritime Organisation’s (IMO)<br />

International Ship and Port facility<br />

<strong>Security</strong> code (ISPS) which, in turn,<br />

is part of the Safety of Life at Sea<br />

(SOLAS) regulations. Developed<br />

in the aftermath of the September<br />

11th terrorist attacks, the ISPS<br />

regulates security on-board<br />

ships, as well as inside ports and<br />

terminals which receive seagoing<br />

vessels on international voyages.<br />

The ethos of the ISPS code is<br />

very preventive and includes a<br />

requirement for both vulnerability<br />

SUPPORT<br />

integrates<br />

legacy port<br />

systems<br />

with new<br />

surveillance<br />

and<br />

information<br />

management<br />

systems<br />

and threat assessments to<br />

be carried out. Risks and<br />

vulnerabilities are very different<br />

when considering a container,<br />

bulk or passenger terminal and so<br />

all assessments must be specific<br />

and bespoke. The ISPS code<br />

also specifies a basic security<br />

framework including monitoring<br />

and controlling access, monitoring<br />

the activities of people and cargo,<br />

the preparation of specific ship<br />

and Port Facility <strong>Security</strong> Plans<br />

and the appointment of Ship<br />

<strong>Security</strong> Officers and a Port Facility<br />

<strong>Security</strong> Officer (PFSO).<br />

Across the European Union (EU),<br />

the ISPS code is supported by<br />

European Commission Directive<br />

725. While identical to the ISPS<br />

code in content and a mandatory<br />

piece of pan-European legislation,<br />

Directive 725 only requires<br />

member states to achieve a<br />

particular result without dictating<br />

the means of achieving that<br />

outcome. Consequently, the<br />

ISPS code was implemented<br />

by 21 EU countries, each in<br />

a different way without any<br />

homogenisation of approach<br />

or standardisation. Although<br />

the European Maritime Safety<br />

Agency (EMSA), FRONTEX and<br />

EUROPOL all touch upon port<br />

security, they have no executive<br />

powers and there is currently no<br />

Europe-wide framework. Without<br />

a Pan-European Federal Agency<br />

like the U.S. Department of<br />

Homeland <strong>Security</strong>, the European<br />

Union has no power to compel<br />

member states to work together<br />

or to follow prescriptive guidelines<br />

and individual ports work in<br />

isolation with commercially-driven<br />

secrecy, thwarting the sharing of<br />

intelligence or best-practice.<br />

Although responsibility rests with<br />

a variety of ministries or other<br />

government agencies across<br />

Europe, the burden of compliance<br />

and implementation of the ISPS<br />

code has been passed down to<br />

the individual terminal operators.<br />

This produces an interesting<br />

paradox as commercial companies<br />

whose aim is to make a profit to<br />

serve their board or shareholders<br />

are being made responsible for an<br />

activity that does not necessarily<br />

deliver any business benefit. Not<br />

surprisingly, enhanced security<br />

beyond that required to protect<br />

day to day business operations<br />

are often not high on Terminal<br />

Operator’s agendas, especially<br />

when national authorities do not<br />

have the power to force them to<br />

invest in such security measures.<br />

Despite the best efforts of<br />

regularity authorities, port security<br />

too often promises much and<br />

delivers little.<br />

Because of the very nature of a<br />

port facility with huge volumes<br />

of vehicle and cargo movements<br />

in and out each day, the level of<br />

security that can be physically<br />

implemented will always be<br />

a balance between risk and<br />

commercial reality. In this context<br />

the role of the Port Facility <strong>Security</strong><br />

Officer (PFSO) is key to ensuring<br />

this fine balance is maintained.<br />

Providing a framework to assist<br />

8 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 9


PORT SECURITY<br />

PORT SECURITY<br />

the PFSO is a major element<br />

of the EU’s <strong>Security</strong> UPgrade<br />

for PORTs (SUPPORT) project<br />

(www.supportproject.info)<br />

which is part-funded by the EC’s<br />

FP7 Research & Technological<br />

Development Programme. It is a<br />

collaboration of twenty European<br />

organisations whose focus is to<br />

raise the current level of port<br />

security. The SUPPORT project’s<br />

main objectives are to deliver<br />

‘validated’ generic port security<br />

management models (capturing<br />

reusable state-of-the-art and best<br />

practices) that can be customised<br />

for specific ports; and training and<br />

open standards based tools to aid<br />

security upgrade in EU ports.<br />

SUPPORT integrates legacy port<br />

systems with new surveillance<br />

and information management<br />

systems. It efficiently supports<br />

the complexity of a real port<br />

environment though an<br />

integrated, holistic approach.<br />

This ensures an improved level<br />

of security, while reducing the<br />

associated administrative burden<br />

on the port.<br />

Amongst the partners are a<br />

number of ports that have been<br />

selected to represent typical, but<br />

different operations. Starting from<br />

the perspective of the partner<br />

port operations, the project has<br />

identified key security gaps and<br />

has produced generic models<br />

describing measures to maintain<br />

or augment the efficient and<br />

secure operation of these ports.<br />

Communication and decision<br />

support tools incorporating<br />

semantic technologies have been<br />

developed, accessible to all the<br />

port security stakeholders.<br />

Full scale demonstrators have<br />

been organised in representative<br />

EU ports (Gothenburg, Lisbon and<br />

Piraeus) and augmented with a<br />

broader evaluation programme<br />

by members of a European<br />

Ports <strong>Security</strong> Forum. SUPPORT<br />

solutions include policy and<br />

standardisations proposals and<br />

training that can be used by any<br />

EU port to efficiently enhance its<br />

security level.<br />

One of SUPPORT’s key outputs<br />

is the Port <strong>Security</strong> Management<br />

System (PSMS) (www.mypsms.<br />

com). The PSMS is designed to<br />

help PFSOs to upgrade their<br />

security systems by empowering<br />

them with knowledge. It<br />

provides information, skills and<br />

methodologies that enable<br />

them to maintain, evaluate and<br />

upgrade their security measures<br />

and create security awareness<br />

without major investment. The<br />

PSMS also delivers outputs in the<br />

form of graphics that can be used<br />

to reinforce security threats and<br />

potential mitigation measures<br />

in presentations to managers or<br />

boards of directors.<br />

The whole PSMS package<br />

comprises five elements including<br />

a maturity module designed to<br />

enable security professionals<br />

to review and upgrade security<br />

plans to address terrorist threats; a<br />

corporate security module which<br />

addresses crime risks such as<br />

loss events, related to corporate<br />

processes and procedures;<br />

an e-learning education and<br />

examination module based on<br />

best practices of ISPS related<br />

maritime security educations<br />

including drills and exercises; a<br />

sharing and decision support<br />

module which enables security<br />

professionals to supervise<br />

facilities via the internet and to<br />

collaborate on a local, national or<br />

global scale and an Authorised<br />

Economic Operator (AEO)<br />

security self-assessment module<br />

which provides a system to reach<br />

compliancy and submit AEO<br />

application.<br />

The pressure of balancing<br />

commercial realities and security<br />

threats will certainly persist as<br />

long as current legislation remains<br />

placing the burden of investment<br />

and compliance on terminal<br />

operators. There is a school of<br />

thought that suggests the status<br />

quo will remain until a major<br />

terrorist incident takes place in a<br />

European port facility. However,<br />

with access to SUPPORT’s Port<br />

<strong>Security</strong> Management System<br />

(PSMS), PFSOs now have the tools<br />

to assess the situation, advise their<br />

management team and make<br />

the right decision, whatever the<br />

security threat might be.<br />

Hosted by:<br />

Convene; Converse; Collaborate<br />

The ever changing nature of threats, whether natural through<br />

climate change, or man-made through terrorism activities, either<br />

physical or cyber attacks, means the need to continually review<br />

and update policies, practices and technologies to meet these<br />

growing demands.<br />

The European Union is developing its policy on critical<br />

infrastructures in relation to the European Programme for Critical<br />

Infrastructure Protection (“EPCIP”) which considers measures<br />

that will enhance, where necessary, the level of protection of<br />

certain infrastructures against external threats.<br />

Critical Infrastructure Protection and Resilience Europe brings<br />

together leading stakeholders from industry, operators, agencies<br />

and governments to debate and collaborate on securing Europe’s<br />

critical infrastructure.<br />

For further details visit www.cipre-expo.com<br />

incorporating Critical Information<br />

Infrastructure Protection<br />

4 th -5 th March 2015<br />

The Hague, Netherlands<br />

www.cipre-expo.com<br />

How to Exhibit<br />

To discuss exhibiting and sponsorship<br />

opportunities and your involvement with<br />

Critical Infrastructure Protection & Resilience<br />

Europe please contact:<br />

Tony Kingham - Exhibit Sales Director<br />

T: +44 (0) 208 144 5934<br />

M: +44 (0)7827 297465<br />

E: tony.kingham@worldsecurity-index.com<br />

Paul Gloc (UK & Europe)<br />

T: +44 (0) 7786 270820<br />

E: paulg@torchmarketing.co.uk<br />

Denne Johnson (Americas)<br />

T: +1 918 863 9792<br />

E: dennej@torchmarketing.co.uk<br />

Gain access to leading decision makers from corporate and government establishments<br />

tasked with Critical Infrastructure Protection and Resilience.<br />

Owned & Organised by: Hosted by:<br />

Supporting Organisations: Media Partners:<br />

10 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com


TRANSPORT SECURITY<br />

TRANSPORT SECURITY<br />

Threat<br />

Detection<br />

and<br />

Recognition<br />

Trucks, trains, ships and oil rigs are all potential targets for criminal organisations<br />

Organisations that own, use or transport high value assets recognise the need to protect their goods and employees,<br />

especially when they are at their most vulnerable - when in remote or isolated situations, at night and when operating<br />

alone. By their very nature, trucks, trains, ships and oil rigs are all potential targets for criminal organisations.<br />

Furthermore, monitoring systems, early warning and deterrent technology have not been available to address this<br />

need at a remotely affordable cost. As a result, there has been an uneasy acceptance that in certain parts of the world,<br />

piracy, hijacking or theft are facts of commercial life. However, a refusal to accept this situation has helped to push this<br />

issue to the top of the EU agenda.<br />

Maria Andersson, at FOI, the Swedish Defence Research Agency and Technical Co-ordinator for ARENA explains the<br />

challenges in protecting high value assets on both land and at sea. She describes how the basis for a solution to the<br />

problem has been developed through the ARENA (Architecture for Recognition of thrEats to mobile assets using<br />

Networks of Affordable sensors) research & development project which is part-funded by the European Commission’s<br />

FP7 <strong>Security</strong> Research Programme. Dr. Andersson explains how the generic surveillance system that has been<br />

developed could provide robust, proactive threat detection and recognition, while being able to differentiate between<br />

real threats and false alarms across a range of environments using an affordable system of sensors.<br />

Pirates, highwaymen and train<br />

robbers may all sound faintly<br />

quaint and old fashioned, but<br />

anyone involved in the transport<br />

industry will tell you that their<br />

modern counterparts are as<br />

big a threat as they ever were.<br />

There is every sign that they will<br />

remain so, as long as goods<br />

and vehicles remain vulnerable<br />

when on the move and isolated.<br />

While the threat looms large, the<br />

technology installed on vehicles to<br />

detect potential security breaches<br />

remains crude in comparison to<br />

that now becoming available for<br />

static deployment.<br />

A ship, a lorry or a train is often<br />

highly secure while in a port or<br />

depot, being physically protected<br />

and under close surveillance, but<br />

once outside they are a relatively<br />

soft target for bands of organised<br />

and often dangerous criminals.<br />

The theft of high value, high risk<br />

products in transit cost businesses<br />

over €8.2 billion a year, according<br />

to recent European Union figures.<br />

Since the terrorist attacks on New<br />

York on September 11th 2001 the<br />

threat of terrorism has also loomed<br />

large over the transport sector.<br />

Oil rigs’ isolation means they face<br />

similar threats.<br />

Terror organisations may engage<br />

in theft to fund their operations or<br />

they may see it as an end in itself,<br />

potentially disrupting, destroying<br />

or capturing vehicles containing<br />

hazardous or dangerous materials<br />

such as chemical liquids, gas,<br />

or radioactive material. After<br />

the September 11th attacks the<br />

United Nations agreed proposals<br />

to enhance the security of<br />

dangerous goods in transport.<br />

Terror organisations have<br />

demonstrated their willingness<br />

to target mass transportation<br />

networks along with other areas of<br />

critical infrastructure.<br />

Over 70 per cent of all goods<br />

transported in the EU are<br />

transported using road haulage, a<br />

transport method which carries<br />

one of the highest risks of being<br />

victim of criminal activity. Truck<br />

thieves generally steal the whole<br />

vehicle or break into trailers to<br />

take the contents, sometimes<br />

cutting panels and causing other<br />

costly damage to gain access.<br />

Drivers too are vulnerable to<br />

attack and theft. The most<br />

common place for a truck to<br />

be attacked is at an unguarded<br />

parking lot while the driver is<br />

asleep. Large cities, like London<br />

and Madrid are the biggest hot<br />

spots, but countries like Belgium<br />

also have a problem. In the UK<br />

alone, 324,000 crimes were<br />

recorded against the transport<br />

and storage sector in 2012.<br />

The threat is equally pressing at<br />

sea as it is on land. Modern day<br />

piracy has presented a significant<br />

challenge since civil war broke<br />

out in Somalia in the early 1990s<br />

with an upsurge in recent years<br />

posing a threat to critical maritime<br />

infrastructure. There were no<br />

fewer than 49 piracy incidents in<br />

the first quarter of <strong>2014</strong> according<br />

to the International Maritime<br />

Bureau (IMB), an offshoot of<br />

the International Chamber of<br />

Commerce focussed on fighting<br />

maritime crime. Two of these<br />

vessels were hijacked, 37 boarded<br />

and five fired on board. Five more<br />

attempted attacks were reported.<br />

There were 12 reports off the<br />

Africa’s west<br />

coast, including<br />

the hijacking of<br />

two vessels with<br />

39 crew taken<br />

hostage and two<br />

kidnapped.<br />

<strong>Security</strong> on the<br />

move<br />

The impossibility<br />

of securing all<br />

main roads, rivers<br />

and open seas means the ships,<br />

trucks and trains they convey need<br />

to be equipped to detect threats<br />

themselves. Advance warning<br />

offers the chance to evade, deter<br />

or repel an intruder.<br />

A European Commissionbacked<br />

research project called<br />

ARENA, short for Architecture<br />

for Recognition of thrEats to<br />

mobile assets using Networks of<br />

Affordable sensors, has attempted<br />

to deliver a solution which could<br />

work in a wide range of transport<br />

scenarios. There are currently<br />

no affordable early warning or<br />

deterrent technologies to address<br />

the threat.<br />

FOI, the Swedish Defence<br />

Research Agency, co-ordinated<br />

the seven-strong research<br />

partnership drawn from five EU<br />

countries. FOI’s partners were:<br />

Leading international maritime<br />

design and engineering company,<br />

BMT Group; ITTI, an IT company<br />

from Poland; hi-tech firm SAFRAN<br />

Sagem Défense Sécurité of<br />

France; electronic security<br />

company SAFRAN MORPHO,<br />

the Netherlands Organisation for<br />

Applied Scientific Research (TNO);<br />

and the University of Reading, in<br />

the UK.<br />

The project is coming to a close<br />

next month at the end of its threeyear<br />

lifespan. Over that time the<br />

project sought to investigate a<br />

system applicable to a range of<br />

different deployments: stationary<br />

platforms relative to the land, such<br />

as a truck or train stop; stationary<br />

platforms relative to the sea, such<br />

as ships in port or oil rigs; mobile<br />

platforms relative to land, such<br />

as trucks or trains in transit; and<br />

mobile platforms relative to the<br />

sea, such as ships at sea or oil rig<br />

support vessels.<br />

Its research built on existing<br />

work on the surveillance of<br />

public spaces. No new sensor<br />

development was done. Instead,<br />

the team focussed on exploiting<br />

existing, low-cost sensor<br />

technologies like visual and<br />

infra-red video, acoustic sensors,<br />

seismic sensors and radar. It also<br />

built on other work, such as the<br />

Integrated Mobile <strong>Security</strong> Kit<br />

where a multi-sensor surveillance<br />

system is installed in a van<br />

which can be brought to public<br />

space when needed. Another<br />

contributing technology, known as<br />

ADABTS (Automatic Detection of<br />

Abnormal Behaviour and Threats<br />

in crowded Spaces), addresses<br />

automatic detection of abnormal<br />

human behaviour that might<br />

signal crime is afoot. And another,<br />

called SECTRONIC, is a 24-hour<br />

small area surveillance system for<br />

maritime application.<br />

ARENA also aimed to minimise<br />

nuisance the system might<br />

cause if it were to go off for no<br />

reason. Humans are naturally<br />

good at putting together lots<br />

of fragmentary information and<br />

12 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 13


TRANSPORT SECURITY<br />

INDUSTRY NEWS<br />

signals and spotting what is a<br />

threat and what is not. Machines<br />

on the other hand are not.<br />

The ARENA system combined<br />

complementary sensors to reduce<br />

false alarm rates. The threatdetection<br />

task was also broken<br />

down into four interconnected<br />

steps: object detection, object<br />

tracking; event recognition; and<br />

threat recognition. The fewer the<br />

bystanders to the vehicle, the<br />

easier the system could interpret<br />

what is going on, meaning that it<br />

would be easier to detect a threat<br />

in a quiet railway siding than when<br />

standing by a busy platform. For<br />

the same reason, trains may, on<br />

the whole, prove easier to protect<br />

than trucks, which often park in<br />

places where there is innocent<br />

foot traffic.<br />

The project also tackled the<br />

sensitive legal and ethical issues<br />

involved in surveillance and<br />

electronic security, particularly<br />

those revolving around privacy. It<br />

will be crucial to have the consent<br />

of the driver for any camera<br />

system which secures a vehicle<br />

on the basis of facial recognition.<br />

Facial recognition cameras were<br />

only used in the cab of a vehicle,<br />

so presented no challenge in<br />

respect of the privacy of passersby.<br />

ARENA’s innovative combination<br />

of existing surveillance technology<br />

provides autonomous monitoring<br />

The Homeland Defense and <strong>Security</strong> Database<br />

and situational awareness of the<br />

environment surrounding critical<br />

mobile assets, alerting personnel<br />

to threats. In achieving this goal<br />

it has the potential to fill the<br />

yawning security gap between<br />

harbours, depots and garages,<br />

currently a cash cow for criminals<br />

and potentially a loophole<br />

exploited by terrorists.<br />

There has been an uneasy<br />

acceptance that piracy, hijacking<br />

and thefts are facts of commercial<br />

life, particularly when trading in<br />

some parts of the world. But a<br />

growing refusal to accept this<br />

situation has helped to put the<br />

issue to the top of the EU agenda.<br />

ARENA may signal the beginning<br />

of a fundamental shift in the<br />

balance of power away from<br />

criminals, improving the safety of<br />

transport personnel and ultimately,<br />

cutting costs for everyone.<br />

Delta R Detection – Is this the magic bullet for airport security screening?<br />

In the aftermath of 911<br />

increasingly rigorous<br />

screening procedures<br />

have struggled to keep<br />

with the high demand at<br />

airport security and parcel<br />

screening checkpoints.<br />

What was needed was an<br />

automated high speed<br />

detection technologies that<br />

can process large volumes<br />

and be implemented with<br />

little or no need for human<br />

intervention.<br />

Working with experts in<br />

materials and computer<br />

science from the University<br />

of Florida Delta R<br />

Detection has developed a<br />

highly adaptable detection<br />

platform for sensing<br />

dangerous chemicals on<br />

the surface of objects. This<br />

technology has successfully<br />

been applied to rapidly<br />

scan baggage and cargo<br />

for explosives.<br />

This fully automated, high<br />

speed system solves the<br />

“needle in the haystack”<br />

problem of detecting<br />

explosives for the air<br />

transportation, parcel<br />

and cargo industries. The<br />

combination of sensitivity<br />

and high throughput<br />

makes the system ideal<br />

for baggage and parcel<br />

screening.<br />

The Delta R Detection<br />

automated carry-on<br />

baggage scanner can<br />

be placed directly in line<br />

with any existing x-ray<br />

machines. It uses a non<br />

invasive optical sampling<br />

technique to detect trace<br />

quantities of explosives.<br />

Luggage is simply placed<br />

on to the conveyer belt<br />

the way it would be at<br />

an existing checkpoint<br />

but it is simultaneously<br />

scanned for microscopic<br />

amounts of explosive. It<br />

plugs directly into existing<br />

infrastructure with no need<br />

for an additional operator<br />

and scans every carry-on<br />

bag for trace quantities of a<br />

broad range of explosives<br />

with a low false positive<br />

rate without increasing<br />

wait time at security check<br />

points<br />

Dr. Thierry Dubroca,<br />

CEO Delta R Detection<br />

said, “We have used the<br />

scientific discovery from<br />

the University of Florida<br />

to build a fully functioning<br />

prototype (currently<br />

being demonstrated at<br />

Schipol Airport, in The<br />

Netherlands). Using<br />

ultra violet spectroscopy<br />

we can now identify<br />

unique signatures of<br />

explosives. For example<br />

we can now detect sub<br />

microns grams of TNT<br />

on the surface of bags<br />

and parcels. Our current<br />

OD<strong>Security</strong> sells 3 SOTER Through-Body Scanners to Hong Kong<br />

Correctional Services<br />

prototype automatically<br />

detects explosives thanks<br />

to a custom designed<br />

software.”<br />

Dr Esen Yuksel, Research<br />

Scientist, University of<br />

California said, “We<br />

have designed a unique<br />

software for this low level<br />

of detection. With our<br />

high speed computing<br />

techniques and state of the<br />

art classification algorithms<br />

we are able to provide very<br />

low false alarm rates at very<br />

high speeds. We will have<br />

the ability to upgrade our<br />

software to detect future<br />

terrorist threats.<br />

Delta R Detection plan<br />

to turn the prototype to<br />

a product by bringing<br />

the hardware sensor and<br />

optical component to meet<br />

larger customers needs,<br />

such as higher sensitivity,<br />

and speed.<br />

<strong>World</strong><strong>Security</strong>-Index.com is the only global<br />

homeland security directory published in<br />

English, Arabic and Spanish on the web and<br />

Advertise on <strong>World</strong><strong>Security</strong>-Index.com<br />

in CD network format.<br />

from only £515 for 12 months<br />

Contact info@worldsecurity-index.com for details<br />

14 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> or call +44 www.worldsecurity-index.com<br />

(0) 208 144 5934.<br />

The Global <strong>Security</strong> Portal<br />

Netherlands based<br />

security manufacturer,<br />

OD<strong>Security</strong> has sold 3<br />

units of the SOTER RS<br />

Through Body Scanner<br />

to the Hong Kong<br />

Correctional Services,<br />

CSD (Correctional Services<br />

Department) for use in<br />

drug interdiction within a<br />

number of high security<br />

custodial establishments.<br />

The use of Through<br />

Body Scanners in prisons<br />

is regarded as the<br />

most effective way of<br />

www.worldsecurity-index.com<br />

countering the smuggling<br />

of items such as drugs,<br />

mobile phones, weapons<br />

and other contraband<br />

material without<br />

subjecting inmates and<br />

visitors to intrusive body<br />

searchers.<br />

The SOTER RS is a low<br />

dosage full body scanner<br />

which combines ultra low<br />

radiation with maximum<br />

visibility, for use at airports<br />

and prisons. Within<br />

seconds the SOTER RS<br />

reveals hidden items, such<br />

as weapons or narcotics,<br />

diamonds, or any stolen<br />

or smuggled goods. It<br />

doesn’t even have to be<br />

metal. The SOTER shows<br />

a clear difference between<br />

human tissue and other<br />

materials, even ingested<br />

or camouflaged items will<br />

be shown.<br />

The scanners will increase<br />

the level of security<br />

operations previously<br />

possible through the use<br />

of conventional metal<br />

detectors. Non metallic<br />

objects hidden under<br />

clothes, in natural cavities<br />

or within the human<br />

body cannot be detected<br />

by conventional metal<br />

detectors and typically,<br />

these non-detectable<br />

items, such as narcotics,<br />

explosives, precious<br />

stones, plastic weapons,<br />

or other contraband,<br />

can only otherwise be<br />

detected by highly<br />

intrusive total body<br />

searches.<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 15


INDUSTRY NEWS<br />

INDUSTRY NEWS<br />

Smiths Detection Wins USD 17.6 (SAR<br />

65.9) Million Order from Key Saudi<br />

Arabian <strong>Security</strong> Establishment<br />

Smiths Detection has won a<br />

USD 17.6 (SAR 65.9) million<br />

contract to supply a range<br />

of advanced equipment to<br />

one of the key Government<br />

security institutions in Saudi<br />

Arabia.<br />

The order includes<br />

HCVG high energy cargo<br />

screening system; CIP 300<br />

Car Inspection Portal; HI-<br />

SCAN 6040aTix explosives<br />

detection X-ray system;<br />

and IONSCAN 500DT and<br />

SABRE 5000 explosive<br />

and trace detection<br />

systems. Smiths Detection<br />

will also train the Saudi<br />

entity’s staff as part of the<br />

agreement. The identity<br />

of the institution cannot<br />

be revealed for security<br />

Ophir Optics launches two new products for Homeland <strong>Security</strong><br />

At this year’s Eurosatory<br />

exhibition, Ophir<br />

Optics launched two<br />

new infrared imaging<br />

optics for homeland<br />

security and defence<br />

applications.<br />

The SupIR 15-60 mm<br />

is a super-compact,<br />

motorized, continuous<br />

zoom lens designed<br />

especially for lightweight<br />

reasons.<br />

Edward Christie, Managing<br />

Director - Smiths Detection<br />

Middle East, said: “Saudi<br />

Arabia is a key market<br />

for us in the Middle East<br />

and we are thrilled to start<br />

our collaboration with a<br />

key Government entity.<br />

This is an exceptional<br />

opportunity to demonstrate<br />

the effectiveness of Smiths<br />

Detection products for<br />

critical premises. It shows<br />

that wherever there is<br />

the need for identifying a<br />

combination of chemical,<br />

biological, radiological,<br />

nuclear and explosives<br />

threats, we can provide<br />

the complete solution and<br />

training.”<br />

BAE Systems joins ‘big data’<br />

research to boost Australia’s<br />

national security<br />

BAE Systems has become<br />

an industry partner of<br />

the $88 million ‘big data’<br />

Cooperative Research<br />

Centre (CRC).<br />

The Data to Decisions<br />

CRC will start 1 July <strong>2014</strong><br />

to research and develop<br />

tools that seek to maximise<br />

the benefits of ‘big data’<br />

for Australia’s defence and<br />

national security sector.<br />

BAE Systems will<br />

contribute $1 million and<br />

in-kind support over the life<br />

of the five-year program.<br />

Mr Kim Scott, BAE<br />

Systems Australia Director<br />

– Business Development<br />

and Land & Integrated<br />

Systems, said “investing in<br />

the latest technology will<br />

be necessary to provide<br />

timely and accurate<br />

intelligence in the future”.<br />

“Big data comes from<br />

many sources at an<br />

alarming velocity, volume<br />

and variety, which makes<br />

it difficult to analyse using<br />

current technologies. Large<br />

amounts of text, images<br />

systems like minicopters<br />

and micro<br />

UAVs. The diffractionlimited<br />

optical design<br />

is optimized for<br />

LWIR sensors up to<br />

640x480 pixels and<br />

resolution down to<br />

17 micron pixel size.<br />

It has a ruggedized<br />

structure to assure<br />

performance is<br />

maintained in<br />

and audio are rapidly<br />

generated all the time<br />

through digital processes<br />

and social media,” said Mr<br />

Scott.<br />

Advances in technology<br />

allow BAE Systems to<br />

piece together disparate<br />

data and present it in an<br />

easy-to-use format for<br />

decision makers.<br />

The Data to Decisions<br />

CRC’s research will inform<br />

the Company’s integrated<br />

systems and software<br />

development programs to<br />

deliver data analytics, highspeed<br />

distribution and<br />

secure sharing for Defence<br />

and security customers.<br />

The CRC is funded partly<br />

by the Commonwealth<br />

through a grant, and<br />

partly through cash and<br />

in-kind contributions from<br />

defence, industry and<br />

university participants. The<br />

national headquarters is in<br />

South Australia with teams<br />

in Victoria and New South<br />

Wales.<br />

harsh environmental<br />

conditions and high shock<br />

environments.<br />

The SupIR 2.6mm is ideal<br />

for situational awareness<br />

and surveillance<br />

applications. These highperformance<br />

lenses can<br />

support LWIR sensors up<br />

to 1024x768 pixels, with<br />

resolution down to 12<br />

micron pixels.<br />

Stratech’s iVACS to deploy 30 more systems to the Middle East<br />

Singapore company<br />

Stratech Systems has<br />

announced that it is to<br />

deploy another 30 or more<br />

of its iVACS® intelligent<br />

Vehicle Access Control<br />

Systems in the Middle East.<br />

At least 25 iVACS will be<br />

deployed in a Smart City<br />

Project for one of the<br />

prominent capital cities in<br />

the Middle East. It will be<br />

part of a <strong>Security</strong> Program<br />

designed to establish a<br />

fully integrated security<br />

solution for a diversity<br />

of onshore, coastal and<br />

offshore critical assets<br />

across the customer’s<br />

mainland.<br />

This coincides with the<br />

worldwide trend of<br />

increasing take up rates<br />

for such systems. Previous<br />

orders for iVACS used to<br />

involve just a handful of<br />

units each, but nowadays,<br />

relatively large orders such<br />

as this are becoming more<br />

common.<br />

A new tool in the fight against the VBIED<br />

British company e2v<br />

have developed the<br />

RF Safe Stop system,<br />

a vehicle immobilising<br />

system designed to bring<br />

vehicles of all types to a<br />

halt using a blast of high<br />

power magnetrons. It uses<br />

the pulse to disrupt the<br />

electronics of the target<br />

vehicle to stop the<br />

engine.<br />

The system can<br />

be mounted<br />

on vehicles,<br />

such as an<br />

SUV, or in fixed<br />

installations,<br />

such as vehicle<br />

checkpoints<br />

at critical<br />

infrastructure<br />

buildings and<br />

facilities.<br />

Combined with traffic<br />

management barriers the<br />

system would an invaluable<br />

tool in the battle to prevent<br />

Vehicle Bourne Improvised<br />

Explosive Devices (VBIED’s).<br />

One of the most deadly<br />

and effective tools in the<br />

terrorist arsenal!<br />

e2v have developed<br />

iVACS® screens vehicle<br />

undercarriages for<br />

potential security threats<br />

such as IEDs – improvised<br />

explosive devices. Stratech<br />

under vehicle surveillance<br />

system, is capable of<br />

“intelligent” inspection<br />

of vehicle undercarriages,<br />

demonstration hardware<br />

with proven effects for<br />

engine stopping and<br />

disruption by utilising<br />

e2v’s patented switching<br />

products in conjunction with<br />

high power magnetrons,<br />

and carefully packaging<br />

these with appropriate<br />

antennas. This design<br />

and provides alerts when<br />

suspicious foreign objects<br />

or abnormalities are<br />

detected. iVACS® also<br />

performs identification<br />

screening for the driver and<br />

passengers in the vehicle<br />

using biometrics providing<br />

a comprehensive solution<br />

at screening checkpoints.<br />

The system is also Network<br />

enabled, which is very<br />

useful for large, networked<br />

deployments such as Smart<br />

City Projects or secure<br />

facilities with multiple<br />

entrances and exits.<br />

Networking the system<br />

means that multiple secure<br />

facilities and command<br />

and control of these secure<br />

facilities can share their<br />

databases.<br />

approach has resulted in a<br />

flexible solution which can<br />

be rapidly adapted to suit<br />

specific customer needs<br />

and achieve optimum<br />

performance.<br />

The system is also being<br />

trialled for boats and even<br />

helicopters.<br />

16 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 17


INDUSTRY NEWS<br />

INDUSTRY NEWS<br />

New innovations in physical<br />

protection from Technocover<br />

Technocover has<br />

introduced a series of<br />

innovations across its<br />

UltraSecure range of<br />

LPCB approved security<br />

equipment, billed as<br />

the next generation<br />

of intelligent physical<br />

protection.<br />

The company has been<br />

working with clients and<br />

technology suppliers to<br />

advance the functionality<br />

of its high security doors,<br />

enclosures, access covers<br />

and associated products to<br />

support strategic security<br />

and operational efficiency<br />

on the critical national<br />

infrastructure (CNI) site.<br />

New state-of-the-art access<br />

control offers scope to<br />

integrate UltraSecure<br />

equipment with central<br />

access management of<br />

multiple sites. Options<br />

include fob, keypad<br />

and radio-frequency<br />

identification (RFID)<br />

activated locks, with<br />

features such as personnel<br />

ID and hierarchical access<br />

control, failsafe or failsecure<br />

functions, and timed access<br />

features.<br />

Also new is an 8 point<br />

wheel lock for UltraSecure<br />

Sentinel doors, plus LCD<br />

privacy glass viewing<br />

panels, switching from<br />

frosted to clear. An<br />

innovative padlock<br />

with solenoid control is<br />

now available on new<br />

UltraSecure doors or for<br />

retrofitting to existing units.<br />

Simplifying sitework and<br />

project management<br />

is a new generation<br />

of UltraSecure kiosks,<br />

delivered ready-assembled<br />

and fitted out with M&E<br />

services for fast installation<br />

and easy connection to<br />

mains power. They come<br />

with factory-fitted access<br />

control data exchanges,<br />

vision panels, lighting,<br />

heating and ventilation<br />

services, plus an aesthetic<br />

new lining made from<br />

environmentally friendly,<br />

premium recycled HDPE<br />

plastic (also available<br />

on other UltraSecure<br />

products).<br />

Advances in horizontal<br />

access include an<br />

UltraSecure roof access<br />

hatch with remote control<br />

of opening/closing via<br />

a motorised actuator.<br />

The latest UltraSecure<br />

flush fitting access cover<br />

incorporates a<br />

3-tier design<br />

with inspection<br />

hatch, fall<br />

arrest system<br />

and anticontamination<br />

features for<br />

underground<br />

tanks and<br />

storage.<br />

ADANI launches new integrated<br />

door access full body scanner<br />

ADANI has officially<br />

launched the new Conpass<br />

DA integrated double door<br />

access full body scanner.<br />

The Conpass DA (Door<br />

Access) offers an integrated<br />

access control solution<br />

which has the capacity<br />

to detect a wide range<br />

of organic and inorganic<br />

objects concealed under<br />

clothing, in bags or hidden<br />

in the anatomical cavities<br />

of inspected individuals.<br />

The product is one of<br />

the latest and most<br />

advanced versions of the<br />

internationally successful<br />

ADANI Conpass full body<br />

scanner. The Conpass<br />

DA has the following<br />

unique features which<br />

highlight its advantages<br />

as a tool for enhancing<br />

security: Discrete selective<br />

scanning of visitors and<br />

staff; Opportunity to<br />

hold a suspect inside the<br />

booth; Remote operation;<br />

Bulletproof construction<br />

option; Integrated 2<br />

way communication and<br />

internal CCTV option<br />

The system can be<br />

integrated into existing<br />

entrance infrastructure<br />

and access control system.<br />

Therefore providing<br />

maximum effectiveness<br />

and improving efficiency<br />

of operational procedures<br />

of the security checkpoint.<br />

This model of full body<br />

scanner is designed to<br />

be used at VIP facilities,<br />

military bases, critical<br />

infrastructure sites and any<br />

other applications where<br />

there is a need for the<br />

highest level of security<br />

and visitor inspection.<br />

The advanced technology<br />

used in Conpass<br />

makes screening<br />

safe for operators<br />

and individuals<br />

being scanned. All<br />

Conpass systems<br />

are compliant with<br />

ANSI 43.17-2009<br />

regulations and that<br />

justifies its use for<br />

general public.<br />

Simon Lyster,<br />

Managing Director, ADANI<br />

Limited said ”The demand<br />

for more complete<br />

personnel screening<br />

solutions is increasing in<br />

a variety of markets as a<br />

result of a mixture of events<br />

and the realization by the<br />

enforcement agencies<br />

that the technology exists<br />

to safely screen for a<br />

wide range of banned<br />

and dangerous items.<br />

The ADANI Conpass DA<br />

offers a unique capability<br />

for discreetly scanning<br />

individuals entering sites<br />

where there is an issue of<br />

contraband smuggling or<br />

a constant security threat.<br />

At ADANI, we have always<br />

been proud of the fact<br />

that we offer a flexible<br />

approach to meeting the<br />

customer’s needs.”<br />

Axis announces full-featured fixed<br />

network cameras with WDR in HDTV<br />

1080p<br />

Axis Communications<br />

introduces new additions<br />

to its successful AXIS Q16<br />

Series. The latest cameras<br />

offer a number of new<br />

capabilities including<br />

wide dynamic range (Axis’<br />

WDR-Forensic Capture*),<br />

Lightfinder, HDTV 1080p<br />

resolution, electronic image<br />

stabilization and shock<br />

detection.<br />

“Airport, train station,<br />

government and perimeter<br />

protection are some<br />

examples of situations<br />

where image quality<br />

is critical to minimize<br />

investigation times and<br />

to protect assets – even<br />

if the lighting situation is<br />

extremely difficult,” says<br />

Erik Frännlid, Axis’ Director<br />

of Product Management.<br />

”The new AXIS Q1615<br />

cameras not only offer full<br />

HD resolution but also<br />

automatically switch settings<br />

between high dynamic<br />

scenes and Lightfinder<br />

mode, ensuring all details<br />

are captured in dark and<br />

bright areas at the same<br />

time. The new cameras are<br />

also our first fixed cameras<br />

to provide 50/60 frames per<br />

seconds in HDTV 1080p<br />

resolution. This is twice the<br />

normal frame rate, which<br />

allows the cameras to even<br />

better record smooth video<br />

when people or vehicles are<br />

moving fast.”<br />

In addition to the ability<br />

to seamlessly transition<br />

between WDR, Forensic<br />

Capture and Lightfinder<br />

mode, the indoor AXIS<br />

Q1615 and the outdoorready<br />

AXIS Q1615-E<br />

offer several image<br />

processing features to<br />

enhance image usability,<br />

such as barrel distortion<br />

correction, electronic image<br />

stabilization for steady<br />

images in an environment<br />

with tough vibrations. In<br />

addition, the fixed cameras<br />

also support high profile in<br />

H.264 and enhanced Max<br />

Bit Rate controllers which<br />

assure that the bandwidth<br />

remains within the defined<br />

limits.<br />

International Procurement Services<br />

announce the completion of contract<br />

to an unspecified European Police<br />

Force, with a total contract worth in<br />

excess of 500,000 GBP<br />

The contract to supply<br />

a complete range<br />

of countermeasure<br />

equipment and training<br />

includes OSCOR Green,<br />

ORION 2.4 NLJD and<br />

TALAN.<br />

The OSCOR GREEN<br />

Spectrum Analyser can<br />

detect illicit eavesdropping<br />

signals, perform site<br />

surveys for communication<br />

systems, conduct radio<br />

frequency emissions<br />

analysis and investigate<br />

misuse of the RF spectrum.<br />

It can be connected to<br />

remotely, enabling the<br />

operator to monitor away<br />

from the equipment and<br />

data files collected can be<br />

saved to external devices<br />

offering the ability to<br />

export data and produce<br />

reports on activity.<br />

The ORION 2.4 Non<br />

Linear Junction Detector<br />

is latest completely<br />

new lightweight version<br />

weighing just 1.4kg (3lbs)<br />

will detect the presence of<br />

electronics as small as SIM<br />

cards or mobile phones,<br />

regardless of whether<br />

the electronics target is<br />

radiating,<br />

hard wired,<br />

or even<br />

turned off.<br />

The Talan<br />

Telephone<br />

Line<br />

Analyser is<br />

the most<br />

recent<br />

state-ofthe-art<br />

Digital<br />

Telephone<br />

Line<br />

Analyser. It<br />

has been<br />

designed<br />

to detect<br />

illicit taps and bugs on<br />

either analogue or digital<br />

telephone lines. With new<br />

enhancements built into<br />

the software interface,<br />

users can also now test<br />

internet protocols (IP)<br />

packet traffic on voice-over<br />

Internet Protocol (VoIP)<br />

phones and systems,<br />

define advanced filtering<br />

options, and data can now<br />

be stored and exported to<br />

USB or Flash as data files<br />

for analysis or reporting<br />

purposes.<br />

18 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 19


INDUSTRY NEWS<br />

INDUSTRY NEWS<br />

Real-Time HD Video Stabiliser: Taming a harsh visual environment<br />

Real-time video stabilisers<br />

are critical for applications<br />

such as UAV guidance and<br />

surveillance, where camera<br />

shake from an unsteady<br />

platform would otherwise<br />

render the video unusable.<br />

The traditional mechanical<br />

approach of stabilising<br />

video, by physically moving<br />

the optics or the sensor, is<br />

expensive and bulky with<br />

performance deteriorating<br />

as image magnification<br />

increases. In contrast,<br />

digital electronic stabilisers<br />

are much smaller, lighter,<br />

considerably more power<br />

efficient and operate<br />

robustly, irrespective of<br />

magnification.<br />

Saab signs contract to provide maintenance support for the electronic security<br />

system for the Southern Queensland Correctional Centre<br />

Defence and security<br />

company Saab has<br />

received a contract to<br />

provide the planned and<br />

corrective maintenance<br />

and capital expenditure<br />

works for the electronic<br />

security system for<br />

the 300 bed Southern<br />

Truly high performance,<br />

high-definition (HD) realtime<br />

video stabilisation<br />

has been an elusive<br />

technology because, until<br />

recently, it has required<br />

the processing power of<br />

a small super computer<br />

to implement. The<br />

market needs a single chip<br />

solution that can operate<br />

robustly in extremely harsh<br />

environments using only a<br />

few watts of power.<br />

RFEL has created a<br />

solution in the form of an<br />

electronic video stabiliser<br />

that continuously processes<br />

over a billion bits of<br />

information every second<br />

and tracks the movements<br />

of several hundred<br />

independent image<br />

regions every video frame.<br />

This software also includes<br />

intelligent processing to<br />

Queensland Correctional<br />

Centre. The contract has<br />

a total value of MSEK<br />

166.<br />

Located near Gatton<br />

in the Lockyer Valley<br />

and opened in January<br />

2012, the 300-bed<br />

counter poor illumination,<br />

bland scene content and<br />

extraneous movements,<br />

such as the swaying<br />

of trees, which would<br />

otherwise compromise<br />

robustness.<br />

This state-of-the-art,<br />

real-time, HD video<br />

stabiliser IP is suitable for<br />

compact, lightweight,<br />

and low power hardware<br />

platforms. The solution<br />

is capable of adapting<br />

to its environment and<br />

can be optimised to<br />

the application, while<br />

supporting a diverse range<br />

of cameras. It can be<br />

implemented into a range<br />

of low power hardware<br />

platforms, including RFEL<br />

products, which have<br />

been proven in a range<br />

Southern Queensland<br />

Correctional Centre is<br />

the State’s newest prison.<br />

The electronic security<br />

system was originally<br />

installed by Saab in the<br />

centre and has been<br />

under comprehensive<br />

maintenance since the<br />

of demanding real world<br />

applications.<br />

This Video Processing<br />

Solution can be combined<br />

with other IP and run on<br />

RFEL’s HALO platform,<br />

which can combine<br />

several key functions that<br />

add value to the user,<br />

including, video scaling,<br />

image stabilisation, fusion,<br />

contrast enhancement,<br />

Picture in Picture overlay<br />

and correction of lens<br />

distortion.<br />

One core functionality,<br />

providing image fusion<br />

between two sensors is<br />

completely different from<br />

simple image blending.<br />

RFEL’s state-of-the-art<br />

fusion algorithm processes<br />

the images captured by<br />

two sensors, generally<br />

from different wavelengths,<br />

and is able to maintain<br />

the best attributes from<br />

both input images for the<br />

resulting output. This, in<br />

combination with image<br />

stabilisation, provides the<br />

user with the best view<br />

possible for informed<br />

decisions.<br />

facility opened. The<br />

system provides an<br />

integrated surveillance<br />

picture and total control<br />

of security sensors and<br />

locks within the prison<br />

environment.<br />

Operation Henry to be rolled out across 9 regions of England<br />

Operation Henry is a<br />

campaign to crack down<br />

on the supply of illicit<br />

tobacco in nine regions in<br />

England.<br />

In a partnership between<br />

the Trading Standards<br />

Institute (TSI) HM Revenue<br />

and Customs (HMRC local<br />

council authorities and<br />

Wagtail UK, a substantial<br />

amount genuine tobacco<br />

and cigarettes, counterfeit<br />

tobacco and cigarettes and<br />

Shisha tobacco.<br />

Operation Henry, runs from<br />

April through September<br />

<strong>2014</strong>, and aims to crack<br />

down on the supply of<br />

illicit tobacco across nine<br />

regions in England. Each<br />

region receives eight days<br />

of dog detection provided<br />

by Wagtail UK and funded<br />

by the Department of<br />

Health. The Operation is<br />

managed TSI.<br />

This partnership allows<br />

The new HoverMast-100 from Sky Sapience, in Israel, could prove a real<br />

winner with border guards, CIP and security personnel the world over.<br />

The HoverMast-100 is<br />

a tethered Unmanned<br />

Aerial Vehicle (UAV)<br />

which means it<br />

combines all the obvious<br />

advantages of a UAV<br />

without the associated<br />

problems, such as civil<br />

certification, launch,<br />

recovery and training.<br />

It is simply launched at<br />

the press of a button,<br />

deploys to a height of 50<br />

meters and is recovered<br />

in the same way.<br />

It can be installed<br />

and launched from<br />

trading standards officers<br />

to identify illicit tobacco<br />

‘hot spots’ by combining<br />

intelligence from HMRC<br />

and trading standards.<br />

Leon Livermore, chief<br />

executive of TSI, said: “This<br />

partnership is one more<br />

example of how trading<br />

standards works with the<br />

private and public sector<br />

to protect consumers and<br />

support legal business<br />

practices. Through this<br />

partnership, trading<br />

standards has a unique<br />

opportunity to share<br />

information and develop<br />

intelligence with the aim of<br />

taking illicit tobacco off the<br />

streets.”<br />

‘HMRC works closely<br />

with other enforcement<br />

agencies to crack down<br />

on illicit tobacco in<br />

the UK,’ said Richard<br />

Las, deputy director of<br />

Criminal Investigation<br />

for the HMRC. ‘Seizing<br />

illicit product is only one<br />

most small service<br />

vehicles, such as<br />

pick-up trucks, UGVs,<br />

even boats. The<br />

HoverMast is ideal<br />

for border patrol,<br />

homeland security<br />

and civilian security<br />

missions.<br />

The system is<br />

comprised of an<br />

aerial platform, base<br />

unit, and external<br />

power source, all of<br />

which are compact<br />

and lightweight. The<br />

aerodynamic platform<br />

is produced from<br />

of the tools used; the<br />

focus is on using a range<br />

of interventions, from<br />

penalties to prosecutions,<br />

to encourage compliance<br />

and maximise deterrent.<br />

Partnership working with<br />

Trading Standards is vital in<br />

order to share intelligence<br />

and collaborate on<br />

joint exercises such as<br />

Operation Henry to<br />

target those areas with<br />

the highest levels of illicit<br />

tobacco activity.’<br />

“Those involved in dealing<br />

in illegal tobacco may<br />

be encouraging people,<br />

including children to smoke<br />

by providing a cheap<br />

source. The detection<br />

dogs can find tobacco<br />

and cigarettes even if<br />

hidden in the most unlikely<br />

places. Offenders need<br />

to know that they will<br />

face consequences if they<br />

choose to deal in these<br />

illegal products.”<br />

advanced composite<br />

materials impregnable<br />

to water and dust.<br />

In fact, the entire<br />

system complies with<br />

international standard<br />

IP65. It hovers 50 meters<br />

above the host vehicle<br />

with the help of two main<br />

rotors that give it its main<br />

thrust and four smaller<br />

side rotors, used for<br />

guidance and additional<br />

thrust.<br />

Its stability in winds of<br />

up to 25 kn is achieved<br />

by the use of separate<br />

subsystems working >><br />

20 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 21


INDUSTRY NEWS<br />

INDUSTRY NEWS<br />

>> in tandem.<br />

The aerial platform is<br />

secured to the base unit<br />

via a cable which serves as<br />

a power supply and data<br />

link. A silenced generator<br />

powers the system<br />

enabling continuous 24/7<br />

operation. The machine<br />

itself is relatively quiet<br />

and passive; emitting<br />

no electronic signals. It<br />

should be emphasized<br />

again that as the<br />

HoverMast is tethered, it<br />

is not bound by any of the<br />

air control regulations that<br />

bind standard unmanned<br />

vehicles.<br />

The system can host a<br />

wide range of payloads.<br />

It can host any payload<br />

weighing up to 6 kg,<br />

including CCD/IR cameras,<br />

radars, laser designators,<br />

4th-5th March 2015<br />

The Hague, Netherlands<br />

www.personnel-protection.com<br />

For exhibting and sponsorship queries<br />

please contact:<br />

Tony Kingham<br />

Exhibit Sales Director<br />

T: +44 (0) 208 144 5934<br />

M: +44 (0)7827 297465<br />

E: tony.kingham@worldsecurity-index.com<br />

For conference queries contact:<br />

Neil Walker<br />

T: +44 (0) 7725 318601<br />

E: neilw@torchmarketing.co.uk<br />

relays, cellular antennas,<br />

and hyperspectral<br />

sensors. Additionally, it<br />

can receive COMINT and<br />

ELINT. With the ability<br />

to operate on land and<br />

at sea, even while the<br />

vehicle is in motion, the<br />

HoverMast-100 enables<br />

target detection, location,<br />

and identification as well<br />

as autonomous tracking.<br />

Target coordinates<br />

and video images<br />

are transmitted within<br />

seconds and without the<br />

need of an experienced<br />

operator via its wide<br />

band communication link,<br />

relaying critical data to<br />

selected recipients in real<br />

time.<br />

The HoverMast is already<br />

in operation with the Israeli<br />

Defense Force.<br />

CALL FOR PAPERS<br />

Abstract Submittal Deadline - 31st July <strong>2014</strong><br />

Submit your abstract online at www.personnel-protection.com<br />

If you travel abroad for your work, or if you are responsible for your team that travels<br />

or works abroad, are you aware of the legal implications surrounding duty of care for<br />

travelling personnel?<br />

Understand the increasing threats faced by international travellers on duty/employed<br />

by companies operating abroad, and what you can do to prepare for the possibilities at<br />

Personnel Protection & Safety Europe.<br />

Media Partners:<br />

Police in Chennai have implemented<br />

‘Face Recognition’ in a Crowd<br />

system<br />

The Police in Chennai have<br />

positioned themselves<br />

at the forefront of Smart<br />

City Surveillance having<br />

implemented iOmniscient’s<br />

Face Recognition in a<br />

Crowd system in a part of<br />

this city, the sixth largest in<br />

India.<br />

The system installed in the<br />

T. Nagar Market enables<br />

the police to recognize<br />

people of interest outdoors<br />

in a totally uncontrolled<br />

environment and to track<br />

them as they show up on<br />

different cameras.<br />

Mr. Senthil<br />

Manickavasagam, M.D.<br />

Supporting Organisations:<br />

of Mars Electronics<br />

who implemented the<br />

system said, “The main<br />

requirement from the<br />

electronic surveillance<br />

used for public safety<br />

was that it must function<br />

in a difficult outdoor<br />

environment. We faced<br />

a big problem with this.<br />

The many technologies<br />

we tried from Russia, USA<br />

and Europe worked well<br />

when used in a controlled<br />

setting indoors, but in the<br />

practical crowded scene<br />

of an Indian marketplace,<br />

nothing worked. Then we<br />

implemented iOmniscient’s<br />

system.”<br />

Defendec releases HD Camera for situational awareness platform Smartdec<br />

Defendec have released a<br />

new high capability camera<br />

module for situational<br />

awareness platform<br />

Smartdec at Eurosatory<br />

<strong>2014</strong>, bringing significant<br />

improvements to its system<br />

for users in the field.<br />

Smartdec, the defense<br />

and security company’s<br />

flagship product, uses a<br />

network of small wireless<br />

cameras linked to motion<br />

sensors that send visual<br />

confirmation to end users<br />

in a matter of seconds.<br />

The system upgrades<br />

provide a HD picture<br />

with a HDR capability,<br />

increase the speed of<br />

image transmission and<br />

alarm arrival time and<br />

increase the distance of<br />

the detectors from the<br />

main bridge enhancing<br />

the system’s overall<br />

effectiveness.<br />

The Smartdec system<br />

consists of a series of small,<br />

lightweight, and easily<br />

camouflaged detectors<br />

that are equipped with a<br />

camera and long-lasting<br />

batteries, a communication<br />

base unit, and the control<br />

center. When movement is<br />

sensed, the detector sends<br />

a visual confirmation to the<br />

control center. There the<br />

image can be analyzed,<br />

and border patrols can<br />

determine whether or not<br />

to send patrols to inspect<br />

the area.<br />

Smartdec can be up and<br />

running in just two minutes<br />

without any additional<br />

training needed. The<br />

cameras are designed to<br />

be deployed in remote<br />

and rugged terrain where<br />

it is difficult to conduct foot<br />

patrols. The cameras are<br />

programmed to<br />

only recognize<br />

human<br />

and vehicle<br />

infiltrations.<br />

False alarms<br />

for wild animals<br />

have been<br />

eliminated.<br />

This feature<br />

prevents from<br />

wasting time on<br />

nuisance calls. The system<br />

can be operational for<br />

years with only one battery<br />

charge cycle making it<br />

almost maintenance free.<br />

Smartdec’s equipment<br />

is completely wireless so<br />

additional infrastructure<br />

investments are<br />

unnecessary.<br />

The detectors are<br />

connected to the GSM<br />

phone network, which<br />

means that most major<br />

towns and cities are<br />

covered. In countries where<br />

GSM coverage is spotty, a<br />

local radio network bridge<br />

can be set up to connect<br />

the cameras to the control<br />

center.<br />

“Smartdec offers border<br />

guard and critical<br />

infrastructure<br />

companies<br />

struggling<br />

with limited<br />

personnel<br />

and budget<br />

resources<br />

an effective<br />

situational<br />

awareness<br />

platform<br />

solution to put an end<br />

to vandalism, human<br />

trafficking, narcotics<br />

smuggling, and other<br />

nefarious activities,” said<br />

Jaanus Tamm, CEO of<br />

Defendec Ltd. “Smartdec<br />

is truly a unique product<br />

that is operational around<br />

the world, and it is<br />

improving remote areas<br />

security every day.”<br />

Since the initial rollout<br />

of the system in 2010,<br />

Smartdec has been<br />

securing borders along<br />

the European Union’s<br />

eastern front, Asia and the<br />

Caribbean. The system has<br />

been proven to help stop<br />

international smuggling,<br />

illegal trafficking, and<br />

acts of sabotage making<br />

it the technology of<br />

choice among border<br />

guards around the<br />

world. Smartdec is also<br />

operational in the critical<br />

infrastructure sector<br />

making the protection<br />

of assets in remote areas<br />

much easier.<br />

Morpho Upgrades Dutch ID<br />

Documents for Greater <strong>Security</strong><br />

Working closely with<br />

the Dutch government,<br />

Morpho (Safran)<br />

leveraged its experience<br />

and expertise to develop<br />

highly secure biometric<br />

travel documents and<br />

identity cards integrating<br />

cutting-edge technology.<br />

With new, innovative<br />

security features and<br />

a validity of 10 years,<br />

the latest generation<br />

identification documents<br />

will provide greater<br />

protection against<br />

document fraud.<br />

The ID card and travel<br />

document datapage<br />

now feature Morpho’s<br />

patented Stereo Laser<br />

Image (SLI® technology,<br />

a three-dimensional<br />

image reproducing<br />

the document holder’s<br />

portrait). Designed to<br />

check the authenticity<br />

of the primary image,<br />

this innovative security<br />

feature helps prevent<br />

photo falsification. For<br />

additional security, a laser<br />

perforated number (TLN<br />

- Tilted Laser Number),<br />

visible when tilted against<br />

the light, will be located<br />

on the primary image of<br />

each document.<br />

22 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com www.worldsecurity-index.com<br />

<strong>World</strong> <strong>Security</strong> <strong>Report</strong> - 23


EVENT CALENDAR<br />

July <strong>2014</strong><br />

14-20<br />

Farnborough Airshow, UK<br />

www.farnborough.com<br />

16-18<br />

Asia Defence & <strong>Security</strong>, Manila, Philippines<br />

www.adas.ph<br />

22-23<br />

RSA Conference Asia Pacific & Japan, Singapore<br />

www.rsaconference.com/events/ap14<br />

August <strong>2014</strong><br />

20-22<br />

Secutech Vietnam, Ho Chi Minh City, Vietnam<br />

www.secutechvietnam.com/<br />

27-29<br />

Safety & <strong>Security</strong> Asia, Singapore<br />

www.safetysecurityasia.com.sg<br />

September <strong>2014</strong><br />

9-11<br />

General Police Equipment Exhibition & Conference<br />

(GPEC), Leipzig, Germany<br />

gpec.de<br />

22-25<br />

SPIE <strong>Security</strong> + Defence, Amsterdam, Netherlands<br />

spie.org<br />

24-25<br />

Emergency Services Show, UK<br />

www.emergencyuk.com<br />

29-2 Oct<br />

ASIS International, USA<br />

www.asisonline.org<br />

October <strong>2014</strong><br />

8-9<br />

Cyber <strong>Security</strong> Expo, London, UK<br />

www.ipexpo.co.uk/<br />

9-10<br />

<strong>World</strong> Cities Conference, London, UK<br />

www.worldcitiesconference.com<br />

21<br />

SC Congress, New York, USA<br />

congress.scmagazine.com<br />

To have your event listed please email details to<br />

the editor tony.kingham@worldsecurity-index.com<br />

November <strong>2014</strong><br />

4-6<br />

14th Annual AAAE/TSA/DHS Aviation <strong>Security</strong><br />

Summit, USA<br />

www.aaae.org<br />

9-12<br />

3rd Homeland <strong>Security</strong> Show <strong>2014</strong>, USA<br />

December <strong>2014</strong><br />

9-11<br />

3rd <strong>World</strong> BORDERPOL Congress, Hungary<br />

www.world-borderpol-congress.com<br />

January 2015<br />

18-20<br />

Intersec Middle East, Dubai<br />

www.intersecexpo.com<br />

March 2015<br />

4-5<br />

Critical Infrastructure Protection & Resilience<br />

Europe, The Hague, Netherlands<br />

www.cipre-expo.com<br />

4-5<br />

Personnel Protection & Safety Europe, The Hague,<br />

Netherlands<br />

www.personnel-protection.com<br />

24 - <strong>World</strong> <strong>Security</strong> <strong>Report</strong> www.worldsecurity-index.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!