Upload
john
View
220
Download
0
Embed Size (px)
Citation preview
7/26/2019 Counter Terror Business 22
1/84
COUNTER TERRORISM
www.counterterrorbusiness.com | ISSUE 22
IN THE NEWS: UNITED STATES FREEDOM ACT TO REFORM GOVERNMENT SURVEILLANCE POWERS
SECURITYDSEI 2015 SAFE CITIES
News:UK
mustguarant
ee
minimumdefe
nce
spendingp73
THEBUSI
NESSMAG
AZINEFO
RDEFENC
E
DSEI
2015preview
p77
With traditional approaches for preventingterrorism failing, is it time to take a new approach?
COUNTERINGRADICALISATION
Will the Extremism Bill help tackleonline enrolment?
CONTROLLINGTHE INTERNET
TERRORIST RECRUITMENT
7/26/2019 Counter Terror Business 22
2/84
7/26/2019 Counter Terror Business 22
3/84
3Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
CommentCOUNTER TERROR BUSINESS
Should we reverse thecurrent strategies to counter
radicalisation?
COUNTER TERRORISM
www.counterterrorbusiness.com | ISSUE 22
IN THE NEWS: UNITED STATES FREEDOM ACT TO REFORM GOVERNMENT SURVEILLANCE POWERS
SECURITYDSEI 2015 SAFE CITIES
News:UK
mustguarant
ee
minimumdefe
nce
spending p73
THEBUS
INESSMA
GAZINE
FORDEFE
NCE
DSEI
2015preview
p77
With traditional approaches for preventingterrorism failing, is it time to take a new approach?
COUNTERINGRADICALISATION
Will the Extremism Bill help tackleonline enrolment?
CONTROLLINGTHE INTERNET
TERRORIST RECRUITMENT
Unfortunately, violent extremism can no longerbe considered a rarity. It affects an increasingnumber of the global population.
Some would suggest that current approaches to prevent terrorism remainsomewhat unsuccessful. University professor and author Hamed El-Said takesthe issue back to its roots and argues that reversing current strategies may bea more successful method to countering radicalisation. Read more on page 11.
The surge in recruitment to radical groups is a serious concern for the UK whichhas been emphasised by events earlier this year, where young British citizenstravelled to Syria to fight next to and support Islamic State. This particularproblem needs action in the fifth domain the internet. On page 15 Paul Stokeshighlights how data analytics can help assist in countering online recruitment.
Following Januarys terrorist attacks in Paris, the French Capital haswitnessed a steep rise in the Global Alerts Dashboard, an online mappingand data portal which categorises locations at extreme risk of terroristthreat. On page 19, Jason McGeown of Verisk Maplecroft analysesglobal urban centres that are deemed risky and how organisations canenhance risk management capabilities through digital platforms.
Will the current Government commit to spend two per cent of GDP on themilitary? As well as US defence secretary Ashton Carter, the question isbeing asked by various Tory MPs and former heads of NATO. See DefenceNews on page 73. Also, the UKs biggest display of military exhibition takesplace at Londons ExCeL Centre on 15-18 September. Check out a sneakpreview to the DSEI show on page 77. More to come in our next issue.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
If you would like to receive 4 issues of Counter Terror Businessmagazine for 100 a year, please contact Public SectorInformation, 226 High Road, Loughton, Essex IG10 1ET.Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:
ONLINE IN PRINT MOBILE FACE TO FACE
www.counterterrorbusiness.com
2015 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmittedin any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior writtenpermission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannotbe held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541
PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk
EDITORIAL DIRECTOR Danny WrightEDITORAngela Pisanu EDITORIAL ASSISTANTSMichael Lyons, Sian Nagle, Tommy Newell
PRODUCTION EDITORRichard Gooding PRODUCTION CONTROLJacqueline Lawford,Jo Golding WEB PRODUCTIONReiss MaloneADVERTISEMENT SALESRachael McGahern, Chris Jones PUBLISHER Sally Brockman
ADMINISTRATIONVictoria Leftwich, Vickie Hopkins, Charlotte CassarREPRODUCTION & PRINTArgent Media
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
3Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
4/84
7/26/2019 Counter Terror Business 22
5/84
Contents
CONTENTS11
37
15
33
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
5Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
07CTB NEWSNew Investigatory Powers Bill, Swedishterror suspect trial collapses, andthe Safe Schools Declaration
11COUNTER TERRORISM
University professor Hamed El-Said shareshis thoughts on the issue that traditionalapproaches to fighting terrorism arenot working, and instead argues thatcountering radicalisation in the first place isa better approach to the problem
15TERRORIST RECRUITMENTThe British Security Industry AssociationsJames Kelly discusses the importance ofcivil aviation security and how airportsensure the safety of staff and passengers
19TERRORIST MAPSJason McGeon of global risk analyticsVerisk Maplecroft examines the new GlobalAlerts Dashboard (GAD), in which 64 citiesare categorised as in extreme risk
23INTERNATIONAL AFFAIRSWith oil and gas prospects in EastAfrica flourishing, the regions potentialsecurity risks can be seen as a barrier tointernational business. Tony Stead arguesthat with the appropriate risk scopingand planning, conducting business in EastAfrica can be viable and profitable
27CYBER SECURITYProfessor Mike Jackson, IT and cybersecurity expert at Birmingham CityUniversitys Business School, examines theproposed Investigatory Powers Bill andasks what this means for public privacy
33SAFE CITIESGeoff Zeidler, past chair of the BritishSecurity Industry Association, discussesthe topic of Safe Cities and the workthats currently underway to develop bestpractice in London
37PERIMETER SECURITYCriminals are not afraid of using extremeforce or explosives when entering abuilding or site. Security products thatprotect such perimeters must meet strictstandards urges Stephen Munden
45IFSEC PREVIEWThe global security industry will gatherat the ExCeL in London this June forthree days of innovation, expertise andinspiration at IFSEC International 2015
55EMERGENCY SERVICESWith over 400 exhibitors and over5,500 visitors attending this event, theEmergency Services Show is one of the keyevents for anyone involved in emergencyplanning, response or recovery
59SECURITY THREATSThe Security Institutes David Thorpexamines the modern days evolvingsecurity threats and how the securityprofessions relationship with the publiccan be affected
65FORENSICSForensics Europe Expo on 21-22 Aprilhosted a conference programme incollaboration with the Chartered Societyof Forensic Sciences, showcasing for allthose involved in the forensic sector
Counter Terror Business www.counterterrorbusiness.com
73DEFENCENEWSMOD invests 80 million in helicoptertraining equipment; UK involvement inAllied Shield Baltic exercises
77DSEI 2015Defence and security throughpartnership and co-operation is the themefor the worlds largest land, sea and air
defenceand securityexhibitionfor tradeprofessionalsand militaryexpertsfrom aroundthe world, whichtakes place at ExCeLLondon from 15-18 September 2015
ISSUE12Turntopage73forthelatestdefence
businessnewsandfeatures
THEBUSINESSMAGAZINEFORDEFENCE
75
59
7/26/2019 Counter Terror Business 22
6/84
Control your comfort
www.greenmanifest.info
22C
Inside
OUTSIDE
HUMIDITY
PROVIDED BY
HEINEN & HOPMAN
35 C
90%
As an international leader in our own field of air
conditioningand heating, Heinen & Hopman is used toworking with yards around the world. At the same time,
our global network of local subsidiaries and aftersalescentres make us an ideal partner for navy vessels that
criss-cross the oceans.
We also understand the stringent operational
requirements of such vessels and the need for innovativedesign. The result is a suberb interior environment andoptimum support wherever the corvettes may sail.
www.heinenhopman.com
Follow us on:
7/26/2019 Counter Terror Business 22
7/84
CTBNews
DIPLOMACY
USA Freedom Act toreform governmentsurveillance powers
After a lapse in US surveillancepowers on Monday 1 June, UScongress have passed the USAFreedom Act, reinstating surveillance
powers for US intelligence agencies,but with reforms limiting thegovernments bulk collection of data. The USA Freedom Act will replacethe USA Patriot Act, a nationalsecurity policy that was put in placefollowing the events of 11 September,2001, and is the first major overhaulof government surveillance policysince the widespread collection ofdata was exposed by whistleblowerEdward Snowden in 2013. The bill passed on a 67-32 vote,and will bring an end to the bulkcollection of Americans phone
records. Now records must be heldby telecommunications companies,not on government servers, andcan only be released with a courtorder for specific information.There will be a six month transitionperiod where data storage will bemoved from government serversto those of private companies. Some key parts of the USA PatriotAct have been retained in the newbill, including the monitoring oflone wolf suspects not linkedto known terror groups and theability to monitor travel and
business records of individuals. The passing of the bill comesafter the USA Patriot Act expiredat 12:01 on 1 June, when senatefailed to reach a majority vote on anextension, effectively stopping allgovernment surveillance powers.
Republican presidential candidateRand Paul vocally condemned thebulk collection of data and threw upprocedural road blocks to preventan extension of the USA Patriot Actbefore it expired on 1 June. He said:We are not collecting the informationof spies. We are not collecting the
information of terrorists. We arecollecting all American citizensrecords all of the time This is whatwe fought the revolution over.
Republican Senate Leader MitchConnell, who has backed Paulspresidential campaign, led theopposition to the Freedom Act, notwanting to place any restrictions onUS surveillance powers.President Obama signed the bill intolaw shortly after the majority voteon Tuesday 2 June. In statement hesaid he was gratified that Congresshas finally moved forward with
this sensible reform legislation.
Blairs gives up on Middle East roleFormer PM Tony Blair has resigned hisposition as Middle East peace envoy - aposition he took almost immediately afterleaving Downing Street in 2007 and hasheld for nearly eight years. Blairs role wasas a special representative for the UN, US,EU and Russia in Middle East peace talks.His performance in the role had been criticisedand his resignation comes at a time whenhopes of negotiations between Israel and
the Palestinians are at an all time low. Blair, 64, is now set to become the chairmanof an organisation that will attempt tocombat anti-semitism and racism in Europe.
The former PrimeMinister will join theEuropean Councilon Tolerance andReconciliation, whichhas campaignedfor tougher laws onextremism.Chris Doyle, directorof the Council for
Arab-British Understanding described Blairsresignationas longoverdue.
The Investigatory Powers Bill wasannounced in the Queens Speech on27 May, which plans to modernise thelaw on tracking communications data. Under the proposed bill, police andintelligence agencies will have more wideranging capabilities to monitor online andsocial media use, as well as more powers forthe bulk interception of communications. Security and intelligence agencies areconcerned that encryption facilities aroundmany online communications are nowso advanced that they cannot interceptmessages. Under the new bill, messagingservices such as WhatsApp and Snapchatwill be required to release informationrelating to suspects under investigation. The Home Office says the InvestigatoryPowers Bill will better equip law enforcementand intelligence agencies to meet theirkey operational requirements, and addressthe gap in these agencies ability to buildintelligence and evidence where subjectsof interest, suspects and vulnerablepeople have communicated online. A similar bill, named the snooperscharter by critics, was previously blockedby former coalition partners the LiberalDemocrats. The new legislation facesthe same criticism, with former DeputyPrime Minister Nick Clegg speaking outagainst it. Clegg has warned British Citizens
that their fundamental rights will bethreatened by the bill, which he describesas a turbo-charged snoopers charter. Ministers promise to provide for appropriateoversight arrangements and safeguards,but there is no immediate detail on howthe complex web of intelligence andsurveillance commissioners and parliamentaryoversight might be strengthened. Meanwhile, human rights movement Liberty,along with Conservative MP David Davisand Labours Tom Watson, are using theHuman Rights Act to challenge the Data
Retention and Investigatory Powers Act(DRIPA) 2014, which allows the HomeSecretary to order communications companiesto retain all communications data for 12months. No link with the prevention ordetection of serious crime is required. Itcatches the communications of everyone inthe UK including the emails, calls, texts andweb activity of MPs, journalists, lawyers,doctors and other communications thatmay be confidential or privileged. Liberty is arguing that DRIPA is incompatiblewith the Human Rights Act in particularArticle 8 of the European Convention onHuman Rights, the right to respect for privateand family life as well as with Articles 7and 8 of the EU Charter of FundamentalRights, respect for private and familylife and protection of personal data. Tom Watson, MP for West Bromwich East,said: The governments decision to useemergency powers to enable it to spy oncitizens shows the rights of the individual needto be strengthened to ensure the state cantact with impunity. Even MPs are powerlessto prevent such powers being enacted. The Human Rights Act allows us tochallenge those powers in the courts butthe Tory government is intent on tearingup the Act and doing away with thelimited legal protection it affords. It is vitalthat we fight for it to be retained.
Liberty says it does not dispute the role ofcommunications data in solving and preventingcrime, but does not believe that justifiesthe costly and lengthy mass retention ofrecords of those who are not involved in suchinvestigations. Liberty is calling for prior judicialauthorisation and a requirement that data isonly retained as part of investigations intoserious crime and to prevent death and injury. The powers within Section 1 of DRIP aredescribed asextraordinarilywide.
Investigatory Powers Bill underscrutiny as Liberty goes to High Court
ANTI-TERROR LEGISLATION
READ MORE:tinyurl.com/nrwagtl
READ MORE:tinyurl.com/nef5n95
READ MORE:tinyurl.com/q97zemu
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
7Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
8/84
New! Ultra-
lightweight
combi tools for
tactical cutting
& spreading
Compact design:
Easy to add to your kit
Extremely lightweight:
Easy to carry and handle
Ready for use with
integrated hydraulic
hand pump
Suited for tactical
operations
Choice between models
HCT 5111 ST (highest
spreading force) and
HCT 5117 ST (highest
spreading distance)
Watch the video:
Holmatro | Special Tactics equipment
[email protected] |www.holmatro.com
7/26/2019 Counter Terror Business 22
9/84
rising dramatically. Businesses that takethis threat seriously are not only protectingthemselves and their customers databut securing a competitive advantage.
I would urge businesses of all sizes to makeuse of the help and guidance available fromgovernment and take up theCyberEssentialsScheme.
In 2014, terror-related arrests in England,Wales and Scotland reached recordlevels with 338 people recorded as havingbeen held, Scotland Yard has reported. Metropolitan Police assistant commissionerMark Rowley has said that more than half ofthose arrests held connections with terrorismin Syria, with police estimating that over 700potential terror suspects are thought to havetravelled to Syria. Rowley also suggested thatnearly half of those are now back in the UK. The number of terror-related arrests was upfrom 2013/2014 where there was 254 arrests,which equates to an increase of about a third.It is believed that more than 100 people are
awaiting trial for terrorism-related charges. Police have stated concerns of an emergingtrend, as from last years arrests, 56 wererelated to suspects under the age 20.
Cyber security breaches forbusinesses on the increase
CYBER SECURITY
The Information Security Breaches Survey2015, published by Digital EconomyMinister Ed Vaizey on 2 June, showsthe scale and cost of security breachesfor business has nearly doubled.
The average cost for big business now startsat 1.45 million, up from 600,000 in 2014,while an online security breach for a smallor medium sized business can now reach ashigh as 310,800, up from 115,000 in 2014.
The research also found that nearly nineout of ten large organisations surveyedsuffered some form of security breach anddespite an increase in staff awarenesstraining, people are still just as likely to causea security breach as a virus or malicioussoftware. Additionally, the survey showed adrop in organisations who increased theirinformation security spending, with fewerexpecting to increase spending in the future.
These findings have prompted thegovernment to urge businesses to takeaction against the cost of cyber securitybreaches. Ed Vaizey said: The UKs digitaleconomy is strong and growing, which iswhy British businesses remain an attractivetarget for cyber-attack and the cost is
CTBNews
READ MORE:tinyurl.com/ljkugoc
Terror-related arrests at all time highCOUNTER-TERRORISM
Swedish terror suspect Bherlin Gildo, 37, hasbeen formerly cleared after his lawyers arguedBritish intelligence agencies were supportingthe same Syrian opposition groups he was.
Gildo was accused of attending a terroristtraining camp and receiving weaponstraining in 2012 and 2013, as well aspossessing information likely to be usefulto a terrorist. He was arrested at Heathrowairport under Schedule 7 of the 2000Terrorism Act when was travelling fromCopenhagen to Manilla to meet his wife.
The trial collapsed at the Old Baileyafter the government refused to disclosesensitive information. Gildos lawyersargued that British intelligence agencieswere supporting the same Syrian oppositionas Gildo from 2012-13. They also claimedthe agencies were party to a secretoperation providing weapons to Syriangroups, including the Free Syrian Army.
After the collapse of the case, Gildossolicitor Gareth Pierce said:There is afair amount of documentation that armswere being taken out of Libya via Qatarand Turkey and trucked through intoSyria to the resistance and the same fromCroatia and taken through Jordan.
Given that there is a reasonable basis forbelieving that the British were themselvesinvolved in the supply of arms, it would be anutter hypocrisy to prosecute someone whohas been involved in the armed resistance.
The prosecutor said the decision to dropcharges in the case had no bearingon otherSyria-relatedtrials in the UK.
READ MORE:tinyurl.com/prcjxbw
Gildo clearedafter governmentrefuses to discloseoperational details
LEGAL
These arrests were the results of offencesranging from fundraising for extremistcauses to plotting terrorist attacks. Rowley said: There is no doubt ofthe horrific nature of the offences beingcommitted overseas. The influenceof those who wish to bring similarviolence to the streets of the UK hasbeen an increasing threat here. Prime Minister David Cameron recently saidthat he planned new legislation to tacklethe spread of extremist views, saying it wasdesigned mainly to confront head-on thepoisonous Islamist extremist ideology. The United Nations estimates that more than
25,000 foreign fighters, from 100 differentnations, havejoined militantgroups in Syria.
READ MORE:tinyurl.com/qyo3g8g
Safe Schools Declarationaims to stop terror attack on schoolsMore than 30 countries have signed up for the Safe Schools Declaration, which aims to stopwar and terror attacks deliberately targeting schools and educational facilities.
The Global Coalition to Protect Eduction from Attack (GCPEA) held a conference on29 May in Oslo, Norway, during which over 30 countries signed up to the declaration, whichpledges to adopt The Guidelines for Protecting Schools and Universities from MilitaryUse during Armed Conflict. Countries who have signed the declaration want to protectboth students and teachers from deliberate attacks and establish protected status forschool buildings, so they cannot be used as barracks or for any other military purposes. Thedeclaration comes after attacks on a school in Peshawar Pakistan last December, where 132students and nine teachers died. The GCPEA also report that schools in at least 70 countrieshave been attacked between 2009 and 2014. READ MORE: tinyurl.com/of6nqp7
China counter terror lawscause international alarmChinese draft laws on security,counter-terrorism and non-governmentalorganisations have moved implementationthis week constituted a further and moreserious threat to freedom of religion andexpression and deepens repression inan already restrictive political climate,International Campaign For Tibethas said. The new measures, whichhave caused alarm in the internationalcommunity, broaden the reach of theParty state still further, contractingthe space for civil society, accordingto the pro-Tibet campaign group. Together with the National SecurityLaw that is expected to be implementedthis year, the proposed counter-terror lawoutlines a counter-terrorism structurewith vast discretionary powers.
READ MORE: tinyurl.com/nehcsp7
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
9Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
10/84
7/26/2019 Counter Terror Business 22
11/84
Written
byH
am
edEl-S
aid
Violent extremism, otherwise knownas terrorism, is no longer a rarity. Accordingto a recent report by the Institute for Peaceand Economics, the number of countries thathave not suffered from a terrorist attack hasdeclined from 111 countries in 2004 to only75 in 2014. While the severity, extent andmotivations behind such attacksoften vary, there is no questionthat terrorism has become
a global phenomenonaffecting most of theworlds societies. Not only societies,but also businessesare, and have beenaffected directly andindirectly by terrorism.The 9/11 attacks, forexample, have cost morethan $5 billion in terms oflosses related to direct physicaldamages, supply chain disruptions,and interruptions to the international airlineindustry and tourism.
A new study of 18 Western Europeancountries reveals that each additionaltransnational terrorist attack hasreduced their economic growth by 0.4
per cent point a year. The World Bank inits 2011 World Development Reportwent further to acknowledge that terroristattacks in one region can imposecosts all through global markets. The disruption of Libyan oil supply followingthe beginning of the uprising in that country
in 2011, when international oil pricesjumped by 15 per cent overnight,
is a good example. The same
World Bank Report addsthat todays businessesregard terrorism as amajor challenge to theiroperations in the areaswhere they function,and that attempts tocontain it have become
more unpredictable,extremely costly though
necessary for the profitabilityand survival of the firm.
FAILED EFFORTS TOCOUNTER TERRORISM
These facts and statistics are alarming,given that we spent more than 15 yearsof relentless efforts to counter terrorism.There is a consensus across the board that
policies and approaches have not only failedto prevent or even undermine terrorism,but they have instead aggravated thephenomenon and made the problem worse.This consensus has recently been summed-upby the United Nations Secretary General,Ban Ki-Moon, while addressing the Instituteof DEtudes Politiques DE Paris on April 29,2015, when he stated that today, violentextremism is a growing and global threat.
WAR ON TERRORThe failure lies in our misconceived strategyemployed after and since the 9/11 attacks.Known as the war on terror, this strategyhas been overwhelmingly reliant on ahard-military approach that focuses on thesymptoms and ignores the disease itself.As the anthropologist Scott Atran recently toldthe UN Security Councils Ministerial Debateon The Role of Youth in Countering ViolentExtremism and Promoting Peace: Unless weunderstand these powerful cultural forces thatradicalise the youth into violent extremism,we will fail to address the threat. When,
as now, the focus is on military solutions andpolice interdiction, matters have already goneway too far. If that focus remains, we lose thecoming generation.
FROMCOUNTERINGTO PREVENTING
TERRORISM
CounterTerrorism
University professor and author Hamed El-Said shares histhoughts on why traditional approaches to fighting terrorismare not working, arguing that countering radicalisation in the
first place is a better approach to the problem
DE-RADICALISATION
The
waron
terrorhas
beenrelianton
ahard-military
approachthatfo
cuses
onthesymptom
s
andignoresthe
diseaseitself
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
11Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
12/84
7/26/2019 Counter Terror Business 22
13/84
CounterTerrorism
The war on terror approach has hadanother indirect but not less damagingimplications. Sweeping definitions of terrorismhave invariably justified violations of longestablished international norms, human rights,and freedom of expression in the name ofsecurity. As Mr. Ban Ki-moon warned duringa summit hosted by the United States oncountering violent extremism last Februaryin Washington D.C: Governments shouldnot use the fight against terrorism andextremism as a pretext to attack ones critics.
In many parts of the world, legitimateactions of opposition groups, including civilsociety organisations and humanrights defenders have been criminalised in thename of countering terrorism. Through suchactions we have provided violent extremistsseeking to recruit youth into their violentorganisations with the very ammunition theyneed. This goes along way towards explainingthe migration of more than 25,000 foreignfighters from more than 100 countries aroundthe world to join the Islamic State or ISILsince the beginning of the upheavals in theArab World war in early 2011. At least 6,000of those foreign fighters come from WesternEurope, where the motivation for joining sucha terrorist group remains little understood.REVERSING CURRENT STRATEGIESThere is a need to reverse our currentstrategies if we are to win the fight againstterrorism. First and for most, there is a
need to restore trust, legitimacy, respect forinternational law and human rights, freedomof expression, and, above all, the promotion
of good governance. Mr. Ban Ki-moon wasright when he stated: Military operationsare crucial to confront real threats. Butbullets are not the silver bullet. Missilesmay kill terrorists, but good governancekills terrorism. We must remember that. We need to understand better the conditionsthat conduce individuals to radicalise to apoint of committing or attempting to committerrorism. Continuing to ramp up securitymeasures in response to terror threatsmisses the point. It might prevent an attack
or two. It might also stop and detain anindividual from joining a terrorist organisationabroad. However, this does little to explainwhy individuals radicalise in the first place.
Individuals do not join violent extremismbecause they are nihilists: lack ofopportunities, decent jobs, high qualityeducation, combined with the presence ofoppression, corruption, injustices and littleregard for human dignity breed radicalisationand extremism that lead to terrorism.Turkey provides important lessons here. Inaddition to billions of dollars, the pursuit ofa purely military approach to the Kurdishproblem cost Turkey more than 35,000innocent lives in the 1990s alone. That is anaverage of 3,500 fatalities every year.
The realisation that terrorism was aTurkish problem not simply a Kurdish one,led to the introduction of a comprehensiveand successful economic reform programmethat reduced poverty and inequalities,created decent jobs, and improved theliving standards of all Turkish citizens inall regions. This was accompanied by ademocratisation process that protectedcivil society, prevented torture insideand outside prison walls, and made humanrights integrity a constitutional right,not a privilege. The upshot has beenthe diminishing of a terrorism threatto levels that no longer occupiesthe daily lives of the average citizen.
UNDERSTANDING YOUTH45 per cent of the world population is youth,the very same group most targeted by violentorganisations. In some Muslim majority states,
this ratio exceeds 65 per cent. Youth neednot be seen as a threat. They possess energyand ideas, they are increasingly networked,
and are a source of important solutions. Theyare the future engine of change. As ProfessorAtran advised the Security Council last month,there is a need to provide the youth withprogrammes that offer them something thatmakes them dream of a life of significance, apositive and achievable personal dream, andthe chance to create their own local initiatives.
Engagement with community andits key members is a powerful instrumentin building a society that is resilientto violent extremist ideologies, aware
of its dangers and risks, and capableof building and maintaining bondsand trustful relationships. Programmesthat promote community engagement and
participation, debates and discussion ofall sorts of problems must be encouraged.Communities must also be empowered tofind solutions for their problems, includingproblems related to violent extremism.
THE PRIVATE SECTORS ROLEFinally, there is an important role for the
private sector in reducing violent extremismand risks associated with it. This cantake the shape of direct action (lobbyinggovernments to improve human rightsand reduce corruption) or indirectly(through creating jobs and supportingdomestic small-size firms).
They can also operate alone or with otherstakeholders to achieve these objectives.In short, what is needed is a move awayfrom our current reactionary approach thatrelies on countering to preventing violentextremism. These elements of this newprevention strategy are already beingdebated seriously inside the United Nations.
Mr Ban Ki-moon himself publicly declaredthat he is in the process of developing acomprehensive Plan of Action to PreventViolent Extremism that will seek toengage and empower youth. Some of theelements of this plan have already beendiscussed here. They include the protectionof human rights and civil liberties, reducingcorruption, promoting good governance andfostering a culture of peace by deployingweapons of mass instruction insteadof weapons of mass destruction.
Only Member States however can ensurethe implementation of the SecretaryGenerals new Action Plan, which will send
a clear message that not only is terrorismunacceptable in all its manifestation; butthat they are also genuinely taking practicalsteps to prevent and combat it.
DE-RADICALISATIONAbout the author
Hamed El-Said is aChair and Professor ofInternational Businessand International PoliticalEconomy at the Manchester
Metropolitan University.He is the author ofNew Approachesto CounteringTerrorism. He isalso an advisorto the UnitedNations CounterTerrorismImplementationTask Force(UNCTITF).
All opinionshowever
expressed inthis articlereflect those of theauthors alone.
Only United Nations Member States can ensurethe implementation of the Secretary Generalsnew Action Plan to prevent violet extremism,which will send a clear message that not only isterrorism unacceptable in all its manifestation;but that they are also genuinely taking practical
steps to prevent and combat it
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
13Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
14/84
Wheresyour office?
MOD/Cpl David Rose
Contact us:
Getac UK Ltd
Mitac House, Nedge Hill,Telford, TF3 3AH, UK
E: [email protected]: +44 (0)1952 207200 www.getac.com
Visit us @
STAND
S9207
INNOVATION WITHOUT
COMPROMISE
T800Fully Rugged Tablet
7/26/2019 Counter Terror Business 22
15/84
Written
byP
aul
Stoke
s
New powers to control the fifth domain the internet and its associated onlinecommunities, are being proposed in the UK.The other core domains air, sea, land andspace are all closely regulated becauseof the impact they have on our lives. Theinternet has no such controls and hasbecome a hunting ground for extremistsas they seek to exploit the vulnerable andentice them to train in terrorist activities.
Now, the government is exercising its newlyelected unilateral power and pushing aheadwith the Extremism Bill, which would giveheightened strength to the police in criminal
investigations and obligesocial networks to supplydetailed, traceable activitylogs for anyone suspectedof acting outside the law.TACKLING RADICALISATIONThe Bill was outlined in the Queens Speechto Parliament on 27 May and reintroducedplans to tackle radicalisation and the
rapid spread of terrorist recruitment. Thepurpose, the government says, is to uniteour country and keep you and your familysafe by tackling all forms of extremism and to
combat groups andindividuals whoreject our values
and promotemessages of hate.
If the proposals becomelaw, the police will be
able to obtain court ordersfor public telecommunications providersto release internet search records and other
communications data on demand. Thesepowers would allow the police to examine theonline conversations of suspected extremistson platforms such as Twitter and Facebook.
DATA ANALYTICS
FIGHTING CRIMEIN THE FIFTH DOMAINPaul Stokes reviews the impact of the Extremism Bill revealed in the Queens speech and explainshow data analytics can tackle the online recruitment of foreign fighters
TerroristRecruitment
The
newpowerswoulda
llowthe
policetoexam
ine
onlineconversi
ons
onplatformss
uch
asTwitterand
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
15Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
16/84
IF YOU HELP OTHERS IN AN EMERGENCY YOU SHOULD BE AT THE EMERGENCY SERVICES SHOW
rgencyuk.com | NEC | Birmingham | 23-24 September 2015 | www.emergencyuk.com | NEC | Birmingham | 23-24 September 2015 | www.emergencyuk.com | NEC | Birmingham |
Where collaborationmeets innovation
A unique event for anyone who works in the emergency services
Come along to the Show on 23rd and 24th September at the NEC, Birmingham to:
See and handle the latest equipment, kit, vehicles and technology
Receive training in the latest rescue and lifesaving techniques
Network with other blue light services and rescue organisations
Gain a deeper understanding of the support available from voluntary sector partners
Register for free entry today at www.emergencyuk.com
Thanks to our Show supporters
7/26/2019 Counter Terror Business 22
17/84
REACHING OUTThe government has been rightly concernedabout the increasing radicalisation of youngpeople and the ease and speed at whichterrorists are infiltrating ordinary communitiesto exploit vulnerable people. Alarmingly, thosechoosing to become foreign fighters are notpart of organised criminal gangs; thanksto social media, terrorist groups now reachordinary individuals everywhere. Social networks have created amulti-billion-dollar industry and allowed usto share experiences much more widely thanprevious generations. But they can have a darkside. The platforms have long been misusedby bullies and child abusers but they arealso now being employed very successfullyby media savvy extremists. Potential recruitsare aggressively targeted, particularly peoplewith violent backgrounds, the very youngand those with mental health issues, theMetropolitan Police Service has said. Jihadisare thought to be sending up to 100,000Twitter messages a day to plot terrorism.With no single controlling authority and norule book, social media is the new Wild West. The reach and radicalisation by ISIS isgrowing not just in the UK but across theglobe in fact, the total number offoreign fighters inside Syria and Iraqhas now exceeded 20,000. The IslamicStates is employing expert use of socialmedia to recruit and radicalise youthfrom around the world creating a new
generation of digital native extremists.
A CHANGE IN MINDSETModern, cyber warfare requires a changein mindset and legal toolkit as we seea swing from traditional, ground-basedcrime to the online environment. Its beena rapid shift and needs an equally rapidreaction from governments. Fortunately,an increasing number are starting torecognise that the internet has becomethat fifth domain and that, while clearlydoing much good, it needs boundaries. The Extremism Bill offers a controlledapproach and not a universal right
to know for the police, which shouldprovide some reassurance of its limitationsin terms of surveillance while allowingpolice greater access to the data thatwill illuminate genuinely at-risk areas.THE LAWLaw enforcement agencies need to be ableto access online communications to preventthose exploiting social media to recruit andradicalise youth. Monitoring suspiciousbehaviour does of course itself need to bedone with clear guidance and strict legaloversight but it does still need to be possible.The new law would require internet service
providers to keep a detailed, traceable log ofindividual activity in case it is requested in aninvestigation. However, without the resourcesto analyse such vast amounts of data,
investigators could struggle to see a change.The volume and variety of data long agoreached such complexity and scale that onlytechnology can truly handle it and maximiseits value. In fact, law enforcement andintelligence operations are, increasingly, adata analytics challenge. There is so muchdata from so many sources that it takes someseriously clever algorithms to spot the linksbetween seemingly unconnected pieces ofdata or detect anomalous relationships.
New advances in crime analytics canconnect different data types and uncoverpeople, entities, patterns, locations andrelationships of interest. In addition, itcan scrutinise unstructured data like textdocuments and social media posts, recognisingwords and phrases as entities that canbe analysed and linked automatically.
CRIME ANALYTICSThe latest crime analytics techniquessuch as link analysis, social networkanalysis and anomaly detection can helpfocus investigators attention on theright persons early on. This is critical in
identifying at-risk young people beforethey leave home to train to fight. Analytics software helps law enforcementagents disrupt recruitment networks
that target the vulnerable but moreover,assists in discounting individuals whoare not persons of interest. Working fromknown extremists out to a wider network,agencies can ensure they do not breachthe privacy or civil liberties of citizens whoare connected but not a threat or at risk. Extremist groups use increasinglysophisticated technology means tosupport their activities. Governmentsand law enforcement agencies must
constantly upgrade their own technicalcapability to meet this challenge. With the right technological support,the new legislation will enable lawenforcement agencies to access the rightinformation at the right time with reliableresults. Information that could protect achild, save lives or defend a border.
Paul Stokes is COO of Wynyard Group, amarket leader in serious crime fightingsoftware used globally by intelligence,investigations and information securityoperations in justice and law enforcement,national security, financial services
and critical national infrastructure.
FURTHER INFORMATIONtinyurl.com/otovdgl
TerroristRecruitment
DATA ANALYTICS
The government is exercising its newly-electedunilateral power and pushing ahead with theExtremism Bill, which would give heightenedstrength to the police in criminal investigationsand oblige social networks to supply detailed,
traceable activity logs for anyone suspected ofacting outside the law
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
17Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
18/84
www.gigamon.com/security
LOOK CLOSER. GO FURTHER.
TEL: 01344 859 870
Gigamons network security solutions put thepower back in your hands.
LIMITED VISIBILITY IS AS
GOOD AS NO VISIBILITY
If you cant see everything thats happening on your
network, you can never be completely confident youre notalready under attack.
To truly protect your network, the ability to see into even
its darkest corners is vital Gigamons Unified Visibility
Fabric delivers 100% visibility and security solutions that
scale to handle any threats to your critical data, now and
into the future.
7/26/2019 Counter Terror Business 22
19/84
Written
byJasonM
cGeon
,H
eadof
C
omm
unica
tion
s,VeriskM
aple
croft
According to new research released byVerisk Maplecroft, which assesses 1,300 ofthe worlds most important commercial hubsand urban centres, terrorist attacks pose anextreme risk to populations and businessesin the capital cities of 12 countries, includingthe strategic markets of Egypt, Israel, Kenya,
Nigeria and Pakistan.In Verisk Maplecrofts new Global Alerts
Dashboard (GAD), 64 cities are categorisedas in extreme risk. GAD is an online mapping
and data portal that logsand analyses every reportedterrorism incident down tolevels of 100m worldwide.Based on the intensityand frequency of attacksin the 12 months following
February 2014, combinedwith the number and severityof incidents in the previousfive years, six cities in Iraq top
the ranking. Over this period, the countryscapital, Baghdad, suffered 380 terroristattacks resulting in 1,141 deaths and 3,654wounded, making it the worlds highest riskurban centre, followed by Mosul, Al Ramadi,Baqubah, Kirkuk and Al Hillah.
Outside of Iraq, other capital cities ratedextreme risk include Kabul, Afghanistan (13thin the most at risk ranking), Mogadishu,Somalia (14th), Sanaa, Yemen (19th) andTripoli, Libya (48th). However, with investmentlimited in conflict and post-conflict locations,
it is the risk posed by terrorism in the primarycities of strategic economies, such as Egypt,Israel, Kenya, Nigeria and Pakistan that has
the potential to threaten businessand supply chain continuity.
Principal Analyst atVerisk Maplecroft,
Charlotte Ingham, said:An estimated 80per cent of globalGDP is generatedfrom cities.Visibility of thesub-nationaldifferences in
terrorism levelsshould be an imperative
for multinationalorganisations looking to
RISK ANALYTICS
A MECHANISMFOR MONITORINGGLOBAL TERROR
TerroristMaps
New research assesses 1,300 of the worlds commercial hubs and
urban centres and reveals that terrorist attacks pose an extremerisk to businesses in the capital cities of 12 countries. JasonMcGeon of global risk analytics Verisk Maplecroft examines thenew Global Alerts Dashboard (GAD), in which 64 cities arecategorised as in extreme risk
RISK ANALYTICS
Parishas
experienced
oneofthestee
pest
risesintherank
ing,
reflectingthese
verity
ofthete
rrorist
attackinJanuary
2015
The new Global Alerts Dashboard categorises 64 cities atextreme risk to terrorist attacks
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
19Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
20/84
www.FireEye.com 2015 FireEye, Inc. All rights reserved. FireEye is a registered
trademark of FireEye, Inc. All other brands, products, or service
names may be trademarks or service marks of their respective
owners.
ONEUNIFIEDDEFENSE
AGAINST CYBER ATTACKERS
DETECT
Signature-less and multi-flow virtualmachine based approach that leverages
superior threat intelligence
PREVENT
Multi-vector inline known and
unknown threat prevention
ANALYZE
Containment, forensics investigation
and kill chain reconstruction
RESPOND
Remediation support and
threat intelligence to recover
and improve risk posture
Todays cyber attacks are targeted, sophisticated and focused on acquiring your most sensitiveinformation. They also go undetected by traditional security technology. Organizations need to
reimagine security and adopt a Continuous Threat Protection model. This means having the ability
to detect threats in real-time and reduce time to respond, thereby preventing or minimizing
business impact. The FireEye Platform provides a multi-faceted approach to security detect,
prevent, analyze, respond.
Todays cyber attacks are targeted, sophisticated and focused on acquiring your most sensitiveinformation. They also go undetected by traditional security technology. Organizations need to
reimagine security and adopt a Continuous Threat Protection model. This means having the ability
to detect threats in real-time and reduce time to respond, thereby preventing or minimizing
business impact. The FireEye Platform provides a multi-faceted approach to security detect,
prevent, analyze, respond.
7/26/2019 Counter Terror Business 22
21/84
understand and price the risks to assets,employees and supply chains.
ISLAMIC INSURGENCIES IN AFRICAAs Africas largest economy, Nigerias role asa commercial hub is central to economicgrowth across the region. However, dueto the activities of Islamist group Boko Haramand a surge in violence in the lead up to theMarch election, 13 out of the 24 Nigeriancities included in the assessment experienceda significant increase in the intensity andfrequency of terrorist attacks compared to theprevious quarter. The risk level in Abuja (18th),Nigerias capital, has remained consistent,but it is rated among the top two per cent ofGADs most at risk cities. Over the reportingperiod, Abuja suffered four attacks whichresulted in 117 deaths. While Boko Haram will remain the dominantterrorist threat in Nigeria, Verisk Maplecroftbelieves there is a possibility of hostilitiesresuming in the Niger Delta following theelection of Mohammed Buhari. The amnestyprotecting members of the militant groupMovement for the Emancipation of the NigerDelta (MEND) is due to lapse and withoutsuccessful negotiations this could meandisruption to the countrys vital oil industry, inaddition to attacks on key cities in the southeast of the country.
The only other sub-Saharan capital to appearin the extreme risk category is Nairobi(57th), East Africas prime commercial centre,
which has witnessed an upsurge in attacks byIslamist militant group al Shabaab. Over thereporting period 184 people have been killedor wounded in Nairobi in six separate attacks.
The impact of terrorism on the countrysmain commercial hubs of Nairobi andMombasa (82nd) has been particularly harmfulto investor confidence. In addition, the touristtrade has declined by 7.4 per cent costing thecountry an estimated US $73m.PARIS ATTACK REFLECTS RISKAccording to Verisk Maplecroft, Paris (97thand high risk) has experienced one of thesteepest rises in the ranking, reflecting the
severity of the terrorist attack in January 2015that left 17 people dead. The risk level in Parisis representative of a wider trend for Westerncountries, including Belgium, Canada andAustralia, where the level of risk in key urbancentres is substantially higher than elsewherein the country, in part due to the significant PRvalue attached to such high profile targets bymilitant Islamist groups.
This contrasts sharply with a number ofdeveloping economies, including Nigeria,Thailand, Philippines, Colombia and India,where the risk of terrorist attacks is highest inrural areas. This also remains the case in Egyptwhere large-scale attacks remain focused in
the Sinai Peninsula. However, the data reflectsincreased risks in the countrys two maincommercial centres, Cairo (45th and extremerisk) and Alexandria (76th and high risk), the
latter of which has moved from medium tohigh risk over the last quarter.
ALEXANDRIA CASE STUDYAn increase in the frequency and intensity ofterrorism incidents in Alexandria has seen thecitys score plunge from medium risk in Q12015, to high risk in Q2 2015. This suddenand sharp increase in risk creates a significantchallenge for international investors in Egyptssecond city and major trade hub. Understanding the drivers of this acuteincrease in risk is critical for businesses tomake informed decisions about protectingtheir people, assets and supply chains. Analysisof the risk at both the country and individualcity level can help businesses make strategicinvestment decisions, while more granularevent based data can give greater claritywhen making operational decisions. Using theinteractive GAD, clients can find informationabout the risks facing their operations down tostreet level and create powerful analytics andvisualisations to facilitate risk mitigation.
A geo-spatial investigation of the 12 month2015 Q1 time frame and the 12 month2015 Q2 time frame for Alexandria shows asignificant increase in the number of attacksfrom two - 30 respectively and an increase inthe number of casualties from nine 40.
A more detailed analysis of the data reveals asharp rise in the number of terrorist incidentsfrom January 2015. The rise in attacks followsa national trend in attacks around theanniversary of the January uprising againstHosni Mubarak. Investigating past this pointreveals an upward trend in the number of
casualties in the Q2 reporting period whichcontinues to a spike in March 2015.The fact the spike in casualties does not
correspond to the peak in attacks indicates achange in terror tactics during the time frame.Nearly two thirds of all attacks in Januarytargeted police forces, however, this fell to 40per cent in March 2015, while the proportionof attacks on civilians rose to 60 per cent. The shift towards softer civilian targetsin March included an IED attack on asupermarket, three banks, a telecoms businessand a fire station. The data therefore revealstwo separate attack patterns: one clusterof attacks against police forces around the
anniversary of the 2011 uprising, and aseparate group of attacks against commercialenterprises with civilian casualties fromFebruary to March. There is the potential that
Muslim Brotherhood affiliated groups whichhave historically targeted police forces inisolation are branching out and targetingcommercial interests to put more pressure onthe government. The acceptance of civiliancasualties is a by-product of this shift in modusoperandi and could signal the start of a moreturbulent period for Alexandria.
The sharp rise in terrorism risk in Alexandriabetween the Q1 and Q2 city scores is drivenby an increase in incidents and casualtiesacross the city. What this simple assessmentmasks however is the apparent change intactics for terrorist groups. For businessesoperating in the city, historically keepingaway from areas of protest would likely havelimited their exposure to physical risk asmuch of the terrorist violence was directedagainst tools of the state. The shift now totargeting commercial enterprises and civilianinfrastructure makes managing terrorism risksmore complex.
AN INTEGRATED SECURITY SOLUTIONPowered by eight years of data, the webbased platform provides organisations withan instant, cost effective solution that willaid strategic decision making over currentinvestments, supply chain continuity, marketentry or risk pricing. The dashboard is an
operational solution that pinpoints, tracks andalerts disruptions, such as natural hazards,corporate security threats, terrorism and piracy,as well as pressures to corporate reputationfrom complicity in human rights abuses. It features up-to-date analytics on emergingsecurity developments and historic trends at
the global, national and sub-national level.These trends shape the security of businessesday-to-day operating environment. Activatefilters within the tool to define the type of dataor analysis needed per site and the frequencyyou would like to receive qualified alerts. It also enhances risk management capabilitiesby integrating corporate information with globalsecurity data, which is collated, verified andcategorised by a team of experts. Risk outputscan be viewed by live data feeds, email alerts,spreadsheet, online scorecards, risk matrices forissues and individual incidents. It is augmentedby high performance mapping technology,which offers compelling visualisations down to
street level.
FURTHER INFORMATIONwww.maplecroft.com
TerroristMaps
RISK ANALYTICS
The dashboard enables multinational companies
to pinpoint current threats, identify emergingtrends and monitor risks, giving them the insightthey need to make risk-adjusted decisions acrossthe entire operational and supply chain universe
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
21Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
22/84
Ring Sights Defence Group Ltd+44 (0)8700 422260 [email protected]
www.ringsights.com
YOUR FOCUS.
OUR RING SIGHT.BOTH PERFECT.
Ring Sights has been in the business ofdesign and manufacture of the finest
quality optical equipment since 1976.
Nearly forty years on and with highly
skilled leadership, dedicated teams of
expert staff and a massive amount ofinvestment, the company now offers
state of the art production facilities and
are the world leaders in research, design
and manufacture of unit power sights for
the military.
7/26/2019 Counter Terror Business 22
23/84
The development of 3D seismic explorationcapability combined with ever advancingengineering technology brings gas finds andoil prospects in the East Africa footprint ofUganda, Kenya, Tanzania and Mozambique,in excess of those found in Qatar. Key players from the worlds energysector are positioning to assist respectivenations to realise, refine and market theirnatural resource, bringing global experiencegained from the challenging technicaland physical environments of the NorthSea, Brazil and Kazakhstan, where suchchallenges have proven to be fertile learningplatforms for the engineering community.
POTENTIAL RISKSAfrica is a large, diverse and formidablecontinent consisting of 54 countries. The regionis often considered volatile due to a rangeof factors including tribal, political, health,
geographic, migration and environmental.
Discoveries of mineral wealth oil, diamondsand water have been sighted burdensrather than assets, are often identified asthe root cause of historical conflicts.
There are many risks tooperational security. Recentevents in Africa highlightloss of life and hostilityby ongoing Boko Haremactivity in Nigeria, theIn Amenas terroristattack in Algeria (2013)by Al Qaeda (AQ)linked terrorists and theWestgate attack in Kenya(2013) by Al Shabaab.2015 has seen further AlShabaab atrocities, one killingover 140 students in Kenya.Stability and security across Africa isoften presented as unsafe or as a reason
which prohibits international operations. But
to put this in context, the UK has had its fairshare of terrorism since the late 1960s theLockerbie bombing in 1988 killed 259 and the
London bombings in 2005 killed 56.Regional dynamics in Africa
are fluid and have changedsignificantly over the past
decade. More recentlyin the North, the ArabSpring had a dramaticimpact which toppledgovernments. Theprevious safe regionsof the 1990s of Libya,Egypt and Tunisia are,
in the eyes of manyinsurance companies, no-go
areas today. The CentralAfrican Republic (CAR) is yet
another hostile zone, as is Syria.Noting such events, one can begin to realise
the challenges faced within the continent
EAST AFRICA: KNOWING THERISKS AND OPPORTUNITIESWhile oil and gas prospects in East Africa are flourishing, the areas potential security riskscan be seen as a barrier to international business. But with the appropriate risk scoping andplanning, conducting business in East Africa can be viable and profitable, argues Tony Stead
Keyplayersfromtheworldsenergysectorarepositioningtoassistrespectivenationstorealiseandmarkettheirnaturalresource
Written
byTon
yStead,AfricaRisk
&Security
Specialist
InternationalAffairs
GLOBAL SECURITY
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
23Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
24/84
T H E GAME CH ANGE RS IN T RACKING!
-NO CABLES - NO NONSENSE-
A NEW BREED OF TRACKING
WINNERSEC URI TY I ND USTRY E MAGAZI NE
Tracker Solutions Award for 2014/15
FIND US
CALL: CH+41792555042 / UK+447791324551
7/26/2019 Counter Terror Business 22
25/84
where porous borders, inconsistent policeor military forces and poor communicationsadd further challenges for governmentswho may lack transparency or legitimacy inthe eyes of the international community.
TERROR INCIDENTSThe In Amenas and Westgate incidentshighlighted inadequate governmentresponses to terror attacks, which arguablycaused greater damage and loss of life thanthey saved. Responses seemed ill conceived,ill prepared and ill advised. Military gunshipswere used to attack the Algerian base, withmedia footage showing uncoordinated firingat seemingly any person that moved. In Kenya, media showed soldiers coweringoutside the shopping centre, latterly there
was footage of government forces carryingbags of looted goods and stepping overdead civilian bodies inside the shopping
centre. Libya, Tunisia and Nigeria governmentforces have also responded poorly to hostileevents in respective countries. The commonthread forms that Forces being poorlytrained, equipped and paid are unlikely toprovide appropriate emergency response. A 2015 snapshot finds evidence that AlShabaab are actively recruiting in Kenya. InLibya, the militia numbers continue to growas the country grows deeper and deeperin to lawlessness, with AQ or Islamic State(IS) affiliated groups now deeply rootedin the North East. South West Libya isbelieved to be active training grounds forcollaborating banditry, including Hamas,
IS and AQ as the military tourism modelpreviously witnessed across Afghanistan,Chechnya and the Balkans reappears.
PLANNING & PREVENTIONThis is the context from which operationalplanning begins. With the appropriate riskscoping and planning, Africa operations cannot only be a viable business option, butbrings the added bonus of assisting developingnations. Training opportunities, supportinginternational partners and developinglocal skills through determined, committedand courageous learning programmes,provide learning and engagement forums
for all stakeholders to grow and benefit.Morally, Africa offers wonderful opportunitieswhere all stakeholders can win. Planning for operations in such environments
can be challenging and a common oversightwithin the energy sector is the oft-seendefaulting to Health and Safety (H&S) leadersto scope and manage in hostile environments.The flaw in this model is that H&S modelsmay only scope risks within the parameterof any given site on a compliance basis,meaning the likes of Westgate, In Amanasor the Arab Spring would be unlikely to beconsidered in any risk scoping exercise. There are other incidences where I havewitnessed engineering project managersleading the preparation for an Africaoperation, with absolutely no regionalinsight or input other than technicalengineering knowledge. The consequencesof such oversight can be fatal. I wouldrecommend employing the services
of an experienced Africa hand for thescoping of any operation, as well as anacademically qualified individual who
considers action to be taken if the worstpossible what if should ever occur. Risk scoping may include borderingregions where, due to porous and unpolicedborders, local conflicts can quicklyescalate to be international. Examplesof cross border incursions include recentSomali attacks in Kenya. Poorly paidgovernment forces are unlikely to risk theirlives in the face of armed conflict. Companies should avoid overloadingH&S professionals who may be unfamiliaror unsighted with African culturesand trends and instead utilise experiencedrisk and security professionals who
have operational experience in Africa.CONTINGENCY PLANNINGAn excellent example of contingency planningin action was Tullows ability to extract trappedemployees and their family from within theWestgate shopping centre as the terror siegewas ongoing. Private security teams (ex UKmilitary) extracted employees and othershoppers quietly and efficiently days beforegovernment forces entered the building. Police incidents of expat harassment onfabricated charges can bring significantfinancial reward to corrupt officers. Yet, if onepays, it endorses a successful business model
for the culprit. I encountered this in manycountries and, in Angola, started recording allsuch incidents and providing monthly reportsto the British Ambassador who in turn passed
to the Angolan government with the messagethat such harassment was preventing theinternational community from helping Angola.After a few months, the incidences decreased. Physical threat scoping should consider theease of access to weaponry in Africa and theunpredictability factor where, 9 times out of10, a road or junction may be safe, yet onthe 10th visit an aggrieved local (or police)with an AK47 may be attracted to your shinyexpat 4x4 vehicle. How does one handle thesituation? A swift move for the handbrakeor to remove seatbelt may be perceived asreaching for a weapon. Nervousness maystall the vehicle, giving the perception ofattempted escape. Such scenarios should beconsidered and drivers trained accordinglyincluding with anti-hijack and first aid skills. One should be prepared for the significantcultural differences between working inthe West and working in Africa. Locally, theday may start when the sun rises and endswhen it sets. Additionally, priorities may differand tribal hierarchies are incredibly significant. Hotels and support services also differin quality and ability and a number ofquestions need to be considered, suchas Does your travel company check onfood hygiene practices? Are fire exitspadlocked closed for security, or is there aclear route for escape? How capable isthe local fire service, can their hose orladder reach above the 3rd floor?
MOVING FORWARDThe points I have detailed above are notshow-stoppers, far from it, they are platformsfrom which contingency and operationalplans can evolve. We now have a baselineto develop corporate and training planswhich can grow and engage within localcommunities. Consider within plans that,unlike the West, it is not viable to rely uponlocal national government forces for support,therefore organisations must developindividual robust and workable plans. Where new-build complexes are beingdeveloped, safe rooms, fire-fighting andescapes along with practical security and
protection methods should be considered andinformation relating to building infrastructureshould be protected; both In Amenas andWestgate attacks benefited from insiderknowledge. Engage local communitieswith security, fire-fighting and medical trainingand extend corporate facilities to supportthe community should a local emergencyarise. Local engagement is key to success. Having worked across perhaps a quarterof Africa on and off for roughly 15 years, Iencourage organisations to overcometheir fears and seek to develop businessopportunities. Companies that scopewell and understand the challenges will
undoubtedly reap business reward. Bringingorganisations to Africa can lead to growth,developments and benefits at all levelsfrom community to government.
InternationalAffairs
GLOBAL SECURITY
The region is often considered volatile dueto a range of factors including tribal, political,geographic and environmental. Discoveries ofmineral wealth have been sighted burdens ratherthan assets, are often identified as the root causeof historical conflicts
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
25Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
26/84
Reduce youronline security risk.
Protecting online identitiesmust be a priority. With Sedicii,
personal information isnever revealed.
Secure authentication is vital, but it must also be convenient.Dont fall victim to identity theft!Sedicii ensures total control. With Sedicii it is easy to be safe.
With Sedicii, personal information never leaves the browser. Never sent. Never stored.Anywhere. Ever. Sedicii authentication works with all forms of user credentials.
In fact, with Sedicii, an organisation no longer holds user passwords at all, therefore reducingrisk. The service can be used for logging in to networks and websites, authenticating securely tocontact centres, authorising payments and all of this is done using a single, consistent interface.The system can also support biometrics.
Mutli-factor authentication includes: hand / ngerprint recognition; ASCII viakeyboard; smartphone / tablet log-ins; credit / debit card authentication;
face / retina scanning; hardware tokens; and voiceprint.
With Sedicii multi-factor authentication, the user doesnt have to share their passwordwith anyone.
Make Sedicii Authentication your Single Sign-On.
Sedicii Limited
2F Techhub, 207 Old St, London EC1V 9NR
Phone: +44 20 8144 8279Email: [email protected]:www.sedicii.comTwitter: @GBRSedicii
7/26/2019 Counter Terror Business 22
27/84
Written
byProfe
ssorMik
eJackson
,IT
andCyber
Security
ex
pert
atBirmin
gh
am
City
Un
iversitysB
usinessSchool
The Queens Speech announced new monitoringpowers to tackle terrorism. This proposedbill entitled the Investigatory Powers Billhas its roots in the Communication Data Bill(nicknamed the Snoopers Charter) whichthe government intended to introduce in the2012-13 Parliamentary session. The SnoopersCharter was eventually dropped due toopposition from the Liberal Democrats. Thedetails of the new bill are not fully knownas yet but it is believed that it will give thepolice and security forces even greater powersthan those set out in the 2012 draft. What will almost certainly appear in thenew bill is the requirement for Internet Service
Providers (ISPs) and mobile phone operatorsto record the activities of subscribers. A recordof texts, emails and phone call will be heldfor at least a year. This rule will apply to all
subscribers and not just those whomight be under suspicion ofterrorist activity. The advantageof this is obvious becauseit will ensure that whenthe security forces haveidentified one suspect theycan also check out otherpeople who have hadcontact with that individual.Mobile phone operators andISPs will need to invest in theinfrastructure to support thisrequirement and will inevitablypass these costs on to consumers.
ENCRYPTIONAnother area the bill is likely to address isencryption. A number of apps allow users
to encrypt messages so thatthird parties (who maypotentially be criminals)
cannot interceptand read them. Theproblem for thegovernment is thatthis also makesthe content of themessages unavailable
to the security forces.A possible solution
is to legislate againstthe use of encryption
which is so complex that
it prevents government bodiesbreaking it. The problem with this approachis that if the security forces can break theencryption then hackers will as well.
MONITORING POWERS
IS EVERYONE A SUSPECT?Professor Mike Jackson, IT and cyber security expert at Birmingham City Universitys Business School,examines the proposed Investigatory Powers Bill and asks what this means for public privacy
CyberSecurity
Thedetails
of
thenewbillare
notyetknown
but
itisbelievedth
at
itwillgivethe
police
andsecurityfo
rces
evengreater
powers
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
27Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
28/84
7/26/2019 Counter Terror Business 22
29/84
The public may accept the bill not understandingwhat the associated loss of privacy may mean.
However, the UK may have to follow the US inditching a bill which grants the administrationoverarching powers in favour of one which takesmore account of the individuals rights to privacy
CyberSecurity
PREVENTING TERRORISMThe government will justify the imposition ofthese powers as a means of preventingterrorism and ensuring the security of the
country. There will be opposition froma number of groups who are concernedthat UK citizens will be losing their rightto privacy. In the past this has alwayscome from left leaning organisations.Recently, however is clear that right ofcentre figures such as Rand Paul are seeinglaws like this as evidence that the nannystate is interfering too much in peopleslives. Senator Paul successfully blockedthe extension of the Patriot Act whichwas regarded as the USs equivalent ofthe Snoopers Charter. Subsequently, anact known as the Freedom Act which grantsthe government more limited powers
than those set out in the Patriot Acthas been passed by the US congress. Unless the Conservative Party containsa significant number of MPs who haveviews which coincide with SenatorPauls, the Home Secretary should notexperience any problems in steering theInvestigatory Powers Bill through theHouse of Commons. Although the LiberalDemocrats have indicated they might opposeit, it is not clear that Labour would.
The proverbial man or woman on theClapham omnibus would tend to side withthe assertion that the proposals are necessaryfor the protection of the country and do
not cause too great a threat to the privacyof the individual. The general assumptionwould be that people who have nothing tohide have nothing to fear from this bill.
A QUESTION OF PRIVACYAnd yet there is evidence that the generalpublic can be greatly exercised about privacyunder certain circumstances. Nobody woulddispute the fact that the number of peopleharmed on our roads in a year greatly exceedsthe number subjected to terrorist activity. It
might therefore be supposed that a devicewhich could significantly reduce the numberof road casualties would be enthusiasticallywelcomed. Such a device would be fitted intoa car and the vehicle owners expense and itspurpose would be to inform the police everytime the vehicle driver exceeded the speedlimit. Could such a device be constructed?Yes, almost certainly. Would it contribute tothe reduction of accidents on the road? Yes,almost certainly. Would it be accepted by thegeneral public? No, almost certainly not. The British have shown that they haveno concerns about breaches of privacywhich might occur due to the use of CCTV
surveillance cameras. The Daily Telegraphreported in 2013 that there was a CCTVcamera for each eleven people in thepopulation. Surveys have shown that UK
citizens, in contrast to those in other Europeancountries, think that this is a good thing.So the camera is highly regarded. Exceptwhen its a speed camera. Speed camerasare widely reviled and cited as examples ofthe nanny state in action. They are seen asinvaders of privacy. This is despite the fact that
everyone acknowledges that these camerasonly catch individuals that break the law. The point is that privacy does matterto citizens but only in certain contexts. Theprotests about the way the InvestigatoryPowers Bill invades privacy which come fromorganisations such as Liberty and the OpenRights Group need to be taken seriously.The public may initially accept the bill notunderstanding what the associated loss ofprivacy may mean. In the future, however,the UK may have to follow the path takenin the United States of ditching a bill whichgrants the administration overarching powersin favour of one which takes more account
of the individuals rights to privacy.
FURTHER INFORMATIONwww.bcu.ac.uk
MONITORING POWERS
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
29Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
30/84
ARE YOU CYBER RESILIENT?
95% of organisations are being routinely compromised, dont
become another statistic.
cybX is a unique cyber training, exercising and validation capability that enables a full spectrum
of cyber attacks to be technically replicated and for business consequence management to berapidly developed and tested in a safe and secure environment. cybX enables organisations to
take a board room to server roomapproach, to:
Integrating cyber resilience into wider enterprise risk management and governance
Objective assessments of business risks resulting from different cyber attacks
Developing and delivering a roadmap for a business driven cyber resilience capability
Investing in the development of high value cyber security teams
For more information visit: www.cybx.orgorCall: +44 (0) 1347 825196
Cyber Security; cybX
@cybx_org
7/26/2019 Counter Terror Business 22
31/84
Digital transformation is one of the keyagendas for government, CNI and forenterprises in general. However as individualenterprises, government, the economy andsociety become increasingly hyper-connectedand data dependent the risks from cyberattack and not just technical failure rise. Theserisks arise from many different potentialactors, but the consistent theme is thedifficulty with attribution and therefore thelow risk to the attackers. The insidious effectsof the combined criminal, espionage, sabotageand subversive cyber activities underminetrust, making traditional security approachesless effective.
An alternative way is to integrate essentialphysical and IT security disciplines into amore holistic organisational cyber resilience
approach, based upon the recent BritishStandard Guidance on OrganisationalResilience (BS 65000) and sponsored by theCabinet Office. It provides a framework basedupon three foundations of: vision and goals;leadership and culture; and governance andaccountability, with an iterative six stageprocess. To understand how developingorganisational cyber resilience into a coreprocess is both achievable and essential itis first important to understand what digitaltransformation, organisational resilience (OR)and agility mean. Second, how when theseare combined effectively together under aframework such as BS 65000 they become the
means to driving the economic growth anddelivery of better services.
DIGITISATIONDigitisation has many aspects, but in simpleterms it is the combined networking effectsof increasing amounts of connectivity linkingdata, devices and people. This creates a valuechain that enables people and enterprises tobe more agile in their information exploitationthrough developing shared understandingand collaboration to continually improveand innovate. We are currently in an era ofexponential increases in digitisation due tocombined effects of various technologies
which are all maturing and becoming hyper-connected. To provide an insight into theincreasing hyper-connectivity scale of thissome global figures will help.
By the end of 2014 there were nearly sevenbillion mobile subscriptions, nearly one forevery person on earth. The worlds stock ofdata is forecast to double every two years,after increasing 2,000 per cent between 2000-2012; and the number of internet-connecteddevices reached over eight billion in 2012 andforecasted to reach between one - ten trillionby 2025, at least 140 sensors for every personon the planet. This makes data and the abilityto be able to exploit it to drive innovation thenew currency in an increasingly complex anddynamic global economy and societies.
BS 65000 describes OR as the ability ofan organisation to anticipate, prepare for,respond and adapt to incremental change
and sudden disruptions in order to surviveand prosper. It therefore follows from anunderstanding of digital transformation that
this brings both incremental, but increasinglydisruptive change, hence the digital agendaas part of almost all government and CNIstrategies. The good news is this is that thedigital transformation required to prosperfrom digitisation are also those required tosurvive. It ultimately is developing a moreagile enterprise, which has the DNA to beresponsive, robust, flexible and adaptable.
DIGITAL TRANSFORMATIONDigital transformation means cutting acrosstraditional internal and external stovepipes, todevelop mutual trust, shared understanding,communications and collaboration, to enable
better decision making and actions. Thismeans putting people, with the right skills,enabled by the data and the right channels ofcommunication and communities of interest
at the centre of both digital transformationand cyber resilience. By implication flatteningand widening the connections betweensenior decision makers, managers and staffin all functions, to cyber security and ITspecialists. Arguably improving engagementof employees, often another aspect oftransformation agendas.
The exponential increases in complexityand dynamic nature of digitisation, inevitablyleads to rapidly changing technology andways of working, based upon data sharingand collaboration. This inevitably constantlycreates new vulnerabilities and exploits forcyber-attacks. The assumption must thereforebe that some attacks will be successful and sothe organisation must be resilient enough towithstand the shock and surprise of an attackas the effects manifest themselves in differentways. This can be achieved by using an agileapproach based upon structured the situationbased experiential learning for individualsand organisational development, which BS65000 includes. By investing in this boardroom to server room approach developingdifferent skills, processes and structuresdynamically, whilst being underpinned byessential information assurance, organisationscan develop a more agile cyber resiliencecapability. In this way boards, senior executivesand whole enterprises will elevate andintegrate cyber resilience, including securityinto a core business process.
In conclusion, a highly digital enterprisethat is cyber resilient is more agile than aless resilient one, therefore better able to
exploit the opportunities of an increasinglyhyper-connected environment. This agility,or the DNA of organisations to beresponsive, robust and flexible is enabledthrough digitisation, or the fusion of digitaltechnologies, data and new structuresexploited by people with additional skills andchanged culture.
There is an interdependent relationshipbetween digital transformation andorganisational cyber resilience, withoutrecognising the two and driving the skills andculture to support them, then both digitisationinitiatives and cyber security will be lesseffective an exponentially increasingly complex
and dynamic hyper-connected world.
FURTHER INFORMATIONwww.cybx.org
CYBER SECURITY
DEVELOPING
ORGANISATIONALCYBER RESILIENCEOrganisations are under virtually constant online attack. Theft ofcustomer data, intellectual property and sensitive information isincreasingly common. How quickly can you respond?
AdvertisementFeature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
31Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
32/84
7/26/2019 Counter Terror Business 22
33/84
As venues for large-scale events, and oftenthe target for protests, riots and terroristattacks, modern cities face changing securitythreats. In todays increasingly interconnectedworld, cloud-based services and the Internetof Things are increasing cities reliance ontechnology, often leaving them increasinglyvulnerable to security threats and breaches.
Leading the way in utilising smart citytechnology in the UK is Glasgow, which
has spent 24m over the past two yearson transforming the city into a world-leadingcity of the future. Now, the city benefitsfrom self-adjusting street lights, wireless
high-definition CCTV, automatically-adjustingtraffic lights to reduce traffic and bottlenecksand dedicated apps to highlight walkingtours, cycle routes and points of interest.
A DEVELOPING THREATFor these smart cities, where the localinfrastructure from traffic lights to utilities is largely automated and networked,security vulnerability is especially apparent,
and is a problem not just in the UK buton a global scale. In an interview withthe New York Times, the United Statessecurity expert Cesar Cerrudo revealed
that through weaknesses such as softwarebugs and lack of encryption, he has foundways to control traffic lights, tweak speed-limit signs and alter traffic sensors.
Closer to home, Network Rail hasacknowledged the threat to its new high-tech signalling system, following a warningby Government advisor, Professor DavidStupples, who claims that the new system which dictates critical safety informationand will eventually control all of Britainstrains could leave the rail networkexposed to cyber-attacks and potentiallyallow hackers to cause a serious crash.
Commenting on the increasing risk to citiesfrom cyber-attack, Mike ONeill, Chairmanof the British Security Industry AssociationsSpecialist Services Section, said: The keychallenge that strikes me is that with thedrive for connectivity and interconnectivity comes a lot more vulnerability. [Threatscould come from] hackers terrorist groupsor government actors and their proxies,who may be seeking to cause asymmetricconfusion. If you think about a city that hasinterconnectivity, the vulnerability is huge,so that is one of the things I think we needto be much more aware of going forward.
So, with modern cities facing a growingnumber of threats, what can thoseresponsible for safety and security doto prepare and protect our urban centres?
A FRESH APPROACH
Collaboration and joined-up thinking betweenpolice and the private security industry iskey to ensuring the long-term safety andsecurity of British cities, and building a closerrelationship between the two is the focus of anew project being developed across London.
The Police and Security (PaS) GroupInitiative was launched at Londons CityHall in December 2014, with the aim ofbecoming a critical friend to the Met Policein developing mutually effective collaborationwith the private sector. The key pillarsto this activity include building effectivecollaboration, overcoming barriers and sharingbest practice between the Metropolitan
Police, private security suppliers, existingcrime reduction partnerships and localbusinesses. Partners involved in the projectinclude the Metropolitan Police, the BritishSecurity Industry Association, London First,the Security Industry Authority and the CitySecurity and Resilience Networks (CSARN). So what is PaS and what can it achieve?The list of attendees and presentationsat its launch on 1 December at City Hallgave an indication. It was attended by theMPS regional borough Senior Points ofContact (SPOC)s for business crime, and awide range of both private security providersand security managers who together
represent the Private Security capabilityin London, all of which have potentialto collaborate closely with the police.There were statements of intent and
COLLABORATIONKEY TO ENSURINGSAFER CITIESGeoff Zeidler, immediate past chair of the British Security
Industry Association, who leads the Police and Security (PaS)Initiative, discusses the topic of Safe Cities and the work thatscurrently underway to develop best practice in London
CITY CENTRES
Written
byGeoffZ
eidler,Imm
edia
teP
astCh
air,
theBritish
SecurityIn
dustryA
ssociation
CitySecurity
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com
33Issue 22 |COUNTER TERROR BUSINESS MAGAZINE
7/26/2019 Counter Terror Business 22
34/84
CASE STUDY
ANIXTER PARTNERS WITH MULTINATIONAL TECH CONSULTANT
TO HELP SECURE A LARGE CITY
Products. Technology. Services. Delivered Globally.
S U M M A R Y
CustomerMultinational technology and consulting corporation
Challenge
Solution
READY!SMDeployment
READY!SMCamera
Results
Met tight implementation timeline
Reduction of waste at the job site
Improved adaptability for future upgrades
Citywide-surveillance solution
Customer ChallengeIn light of security challenges around the globe, cities are under increased pressure to provide a safe
environment for their businesses and residents. Forward-thinking municipalities are proactively taking
steps to assure they are doing everything possible to maintain the security of their citizens while not
encroaching on the aspects that make city life appealing to residents and corporations alike.
Leveraging its strength in public sector technology solutions, a multination technology and consulting
company secured an assignment to develop and implement a s