Counter Terror Business 22

  • Upload
    john

  • View
    220

  • Download
    0

Embed Size (px)

Citation preview

  • 7/26/2019 Counter Terror Business 22

    1/84

    COUNTER TERRORISM

    www.counterterrorbusiness.com | ISSUE 22

    IN THE NEWS: UNITED STATES FREEDOM ACT TO REFORM GOVERNMENT SURVEILLANCE POWERS

    SECURITYDSEI 2015 SAFE CITIES

    News:UK

    mustguarant

    ee

    minimumdefe

    nce

    spendingp73

    THEBUSI

    NESSMAG

    AZINEFO

    RDEFENC

    E

    DSEI

    2015preview

    p77

    With traditional approaches for preventingterrorism failing, is it time to take a new approach?

    COUNTERINGRADICALISATION

    Will the Extremism Bill help tackleonline enrolment?

    CONTROLLINGTHE INTERNET

    TERRORIST RECRUITMENT

  • 7/26/2019 Counter Terror Business 22

    2/84

  • 7/26/2019 Counter Terror Business 22

    3/84

    3Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

    CommentCOUNTER TERROR BUSINESS

    Should we reverse thecurrent strategies to counter

    radicalisation?

    COUNTER TERRORISM

    www.counterterrorbusiness.com | ISSUE 22

    IN THE NEWS: UNITED STATES FREEDOM ACT TO REFORM GOVERNMENT SURVEILLANCE POWERS

    SECURITYDSEI 2015 SAFE CITIES

    News:UK

    mustguarant

    ee

    minimumdefe

    nce

    spending p73

    THEBUS

    INESSMA

    GAZINE

    FORDEFE

    NCE

    DSEI

    2015preview

    p77

    With traditional approaches for preventingterrorism failing, is it time to take a new approach?

    COUNTERINGRADICALISATION

    Will the Extremism Bill help tackleonline enrolment?

    CONTROLLINGTHE INTERNET

    TERRORIST RECRUITMENT

    Unfortunately, violent extremism can no longerbe considered a rarity. It affects an increasingnumber of the global population.

    Some would suggest that current approaches to prevent terrorism remainsomewhat unsuccessful. University professor and author Hamed El-Said takesthe issue back to its roots and argues that reversing current strategies may bea more successful method to countering radicalisation. Read more on page 11.

    The surge in recruitment to radical groups is a serious concern for the UK whichhas been emphasised by events earlier this year, where young British citizenstravelled to Syria to fight next to and support Islamic State. This particularproblem needs action in the fifth domain the internet. On page 15 Paul Stokeshighlights how data analytics can help assist in countering online recruitment.

    Following Januarys terrorist attacks in Paris, the French Capital haswitnessed a steep rise in the Global Alerts Dashboard, an online mappingand data portal which categorises locations at extreme risk of terroristthreat. On page 19, Jason McGeown of Verisk Maplecroft analysesglobal urban centres that are deemed risky and how organisations canenhance risk management capabilities through digital platforms.

    Will the current Government commit to spend two per cent of GDP on themilitary? As well as US defence secretary Ashton Carter, the question isbeing asked by various Tory MPs and former heads of NATO. See DefenceNews on page 73. Also, the UKs biggest display of military exhibition takesplace at Londons ExCeL Centre on 15-18 September. Check out a sneakpreview to the DSEI show on page 77. More to come in our next issue.

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    If you would like to receive 4 issues of Counter Terror Businessmagazine for 100 a year, please contact Public SectorInformation, 226 High Road, Loughton, Essex IG10 1ET.Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:

    ONLINE IN PRINT MOBILE FACE TO FACE

    www.counterterrorbusiness.com

    2015 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmittedin any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior writtenpermission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannotbe held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

    PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk

    EDITORIAL DIRECTOR Danny WrightEDITORAngela Pisanu EDITORIAL ASSISTANTSMichael Lyons, Sian Nagle, Tommy Newell

    PRODUCTION EDITORRichard Gooding PRODUCTION CONTROLJacqueline Lawford,Jo Golding WEB PRODUCTIONReiss MaloneADVERTISEMENT SALESRachael McGahern, Chris Jones PUBLISHER Sally Brockman

    ADMINISTRATIONVictoria Leftwich, Vickie Hopkins, Charlotte CassarREPRODUCTION & PRINTArgent Media

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    3Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    4/84

  • 7/26/2019 Counter Terror Business 22

    5/84

    Contents

    CONTENTS11

    37

    15

    33

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    5Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

    07CTB NEWSNew Investigatory Powers Bill, Swedishterror suspect trial collapses, andthe Safe Schools Declaration

    11COUNTER TERRORISM

    University professor Hamed El-Said shareshis thoughts on the issue that traditionalapproaches to fighting terrorism arenot working, and instead argues thatcountering radicalisation in the first place isa better approach to the problem

    15TERRORIST RECRUITMENTThe British Security Industry AssociationsJames Kelly discusses the importance ofcivil aviation security and how airportsensure the safety of staff and passengers

    19TERRORIST MAPSJason McGeon of global risk analyticsVerisk Maplecroft examines the new GlobalAlerts Dashboard (GAD), in which 64 citiesare categorised as in extreme risk

    23INTERNATIONAL AFFAIRSWith oil and gas prospects in EastAfrica flourishing, the regions potentialsecurity risks can be seen as a barrier tointernational business. Tony Stead arguesthat with the appropriate risk scopingand planning, conducting business in EastAfrica can be viable and profitable

    27CYBER SECURITYProfessor Mike Jackson, IT and cybersecurity expert at Birmingham CityUniversitys Business School, examines theproposed Investigatory Powers Bill andasks what this means for public privacy

    33SAFE CITIESGeoff Zeidler, past chair of the BritishSecurity Industry Association, discussesthe topic of Safe Cities and the workthats currently underway to develop bestpractice in London

    37PERIMETER SECURITYCriminals are not afraid of using extremeforce or explosives when entering abuilding or site. Security products thatprotect such perimeters must meet strictstandards urges Stephen Munden

    45IFSEC PREVIEWThe global security industry will gatherat the ExCeL in London this June forthree days of innovation, expertise andinspiration at IFSEC International 2015

    55EMERGENCY SERVICESWith over 400 exhibitors and over5,500 visitors attending this event, theEmergency Services Show is one of the keyevents for anyone involved in emergencyplanning, response or recovery

    59SECURITY THREATSThe Security Institutes David Thorpexamines the modern days evolvingsecurity threats and how the securityprofessions relationship with the publiccan be affected

    65FORENSICSForensics Europe Expo on 21-22 Aprilhosted a conference programme incollaboration with the Chartered Societyof Forensic Sciences, showcasing for allthose involved in the forensic sector

    Counter Terror Business www.counterterrorbusiness.com

    73DEFENCENEWSMOD invests 80 million in helicoptertraining equipment; UK involvement inAllied Shield Baltic exercises

    77DSEI 2015Defence and security throughpartnership and co-operation is the themefor the worlds largest land, sea and air

    defenceand securityexhibitionfor tradeprofessionalsand militaryexpertsfrom aroundthe world, whichtakes place at ExCeLLondon from 15-18 September 2015

    ISSUE12Turntopage73forthelatestdefence

    businessnewsandfeatures

    THEBUSINESSMAGAZINEFORDEFENCE

    75

    59

  • 7/26/2019 Counter Terror Business 22

    6/84

    Control your comfort

    www.greenmanifest.info

    22C

    Inside

    OUTSIDE

    HUMIDITY

    PROVIDED BY

    HEINEN & HOPMAN

    35 C

    90%

    As an international leader in our own field of air

    conditioningand heating, Heinen & Hopman is used toworking with yards around the world. At the same time,

    our global network of local subsidiaries and aftersalescentres make us an ideal partner for navy vessels that

    criss-cross the oceans.

    We also understand the stringent operational

    requirements of such vessels and the need for innovativedesign. The result is a suberb interior environment andoptimum support wherever the corvettes may sail.

    www.heinenhopman.com

    Follow us on:

  • 7/26/2019 Counter Terror Business 22

    7/84

    CTBNews

    DIPLOMACY

    USA Freedom Act toreform governmentsurveillance powers

    After a lapse in US surveillancepowers on Monday 1 June, UScongress have passed the USAFreedom Act, reinstating surveillance

    powers for US intelligence agencies,but with reforms limiting thegovernments bulk collection of data. The USA Freedom Act will replacethe USA Patriot Act, a nationalsecurity policy that was put in placefollowing the events of 11 September,2001, and is the first major overhaulof government surveillance policysince the widespread collection ofdata was exposed by whistleblowerEdward Snowden in 2013. The bill passed on a 67-32 vote,and will bring an end to the bulkcollection of Americans phone

    records. Now records must be heldby telecommunications companies,not on government servers, andcan only be released with a courtorder for specific information.There will be a six month transitionperiod where data storage will bemoved from government serversto those of private companies. Some key parts of the USA PatriotAct have been retained in the newbill, including the monitoring oflone wolf suspects not linkedto known terror groups and theability to monitor travel and

    business records of individuals. The passing of the bill comesafter the USA Patriot Act expiredat 12:01 on 1 June, when senatefailed to reach a majority vote on anextension, effectively stopping allgovernment surveillance powers.

    Republican presidential candidateRand Paul vocally condemned thebulk collection of data and threw upprocedural road blocks to preventan extension of the USA Patriot Actbefore it expired on 1 June. He said:We are not collecting the informationof spies. We are not collecting the

    information of terrorists. We arecollecting all American citizensrecords all of the time This is whatwe fought the revolution over.

    Republican Senate Leader MitchConnell, who has backed Paulspresidential campaign, led theopposition to the Freedom Act, notwanting to place any restrictions onUS surveillance powers.President Obama signed the bill intolaw shortly after the majority voteon Tuesday 2 June. In statement hesaid he was gratified that Congresshas finally moved forward with

    this sensible reform legislation.

    Blairs gives up on Middle East roleFormer PM Tony Blair has resigned hisposition as Middle East peace envoy - aposition he took almost immediately afterleaving Downing Street in 2007 and hasheld for nearly eight years. Blairs role wasas a special representative for the UN, US,EU and Russia in Middle East peace talks.His performance in the role had been criticisedand his resignation comes at a time whenhopes of negotiations between Israel and

    the Palestinians are at an all time low. Blair, 64, is now set to become the chairmanof an organisation that will attempt tocombat anti-semitism and racism in Europe.

    The former PrimeMinister will join theEuropean Councilon Tolerance andReconciliation, whichhas campaignedfor tougher laws onextremism.Chris Doyle, directorof the Council for

    Arab-British Understanding described Blairsresignationas longoverdue.

    The Investigatory Powers Bill wasannounced in the Queens Speech on27 May, which plans to modernise thelaw on tracking communications data. Under the proposed bill, police andintelligence agencies will have more wideranging capabilities to monitor online andsocial media use, as well as more powers forthe bulk interception of communications. Security and intelligence agencies areconcerned that encryption facilities aroundmany online communications are nowso advanced that they cannot interceptmessages. Under the new bill, messagingservices such as WhatsApp and Snapchatwill be required to release informationrelating to suspects under investigation. The Home Office says the InvestigatoryPowers Bill will better equip law enforcementand intelligence agencies to meet theirkey operational requirements, and addressthe gap in these agencies ability to buildintelligence and evidence where subjectsof interest, suspects and vulnerablepeople have communicated online. A similar bill, named the snooperscharter by critics, was previously blockedby former coalition partners the LiberalDemocrats. The new legislation facesthe same criticism, with former DeputyPrime Minister Nick Clegg speaking outagainst it. Clegg has warned British Citizens

    that their fundamental rights will bethreatened by the bill, which he describesas a turbo-charged snoopers charter. Ministers promise to provide for appropriateoversight arrangements and safeguards,but there is no immediate detail on howthe complex web of intelligence andsurveillance commissioners and parliamentaryoversight might be strengthened. Meanwhile, human rights movement Liberty,along with Conservative MP David Davisand Labours Tom Watson, are using theHuman Rights Act to challenge the Data

    Retention and Investigatory Powers Act(DRIPA) 2014, which allows the HomeSecretary to order communications companiesto retain all communications data for 12months. No link with the prevention ordetection of serious crime is required. Itcatches the communications of everyone inthe UK including the emails, calls, texts andweb activity of MPs, journalists, lawyers,doctors and other communications thatmay be confidential or privileged. Liberty is arguing that DRIPA is incompatiblewith the Human Rights Act in particularArticle 8 of the European Convention onHuman Rights, the right to respect for privateand family life as well as with Articles 7and 8 of the EU Charter of FundamentalRights, respect for private and familylife and protection of personal data. Tom Watson, MP for West Bromwich East,said: The governments decision to useemergency powers to enable it to spy oncitizens shows the rights of the individual needto be strengthened to ensure the state cantact with impunity. Even MPs are powerlessto prevent such powers being enacted. The Human Rights Act allows us tochallenge those powers in the courts butthe Tory government is intent on tearingup the Act and doing away with thelimited legal protection it affords. It is vitalthat we fight for it to be retained.

    Liberty says it does not dispute the role ofcommunications data in solving and preventingcrime, but does not believe that justifiesthe costly and lengthy mass retention ofrecords of those who are not involved in suchinvestigations. Liberty is calling for prior judicialauthorisation and a requirement that data isonly retained as part of investigations intoserious crime and to prevent death and injury. The powers within Section 1 of DRIP aredescribed asextraordinarilywide.

    Investigatory Powers Bill underscrutiny as Liberty goes to High Court

    ANTI-TERROR LEGISLATION

    READ MORE:tinyurl.com/nrwagtl

    READ MORE:tinyurl.com/nef5n95

    READ MORE:tinyurl.com/q97zemu

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    7Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    8/84

    New! Ultra-

    lightweight

    combi tools for

    tactical cutting

    & spreading

    Compact design:

    Easy to add to your kit

    Extremely lightweight:

    Easy to carry and handle

    Ready for use with

    integrated hydraulic

    hand pump

    Suited for tactical

    operations

    Choice between models

    HCT 5111 ST (highest

    spreading force) and

    HCT 5117 ST (highest

    spreading distance)

    Watch the video:

    Holmatro | Special Tactics equipment

    [email protected] |www.holmatro.com

  • 7/26/2019 Counter Terror Business 22

    9/84

    rising dramatically. Businesses that takethis threat seriously are not only protectingthemselves and their customers databut securing a competitive advantage.

    I would urge businesses of all sizes to makeuse of the help and guidance available fromgovernment and take up theCyberEssentialsScheme.

    In 2014, terror-related arrests in England,Wales and Scotland reached recordlevels with 338 people recorded as havingbeen held, Scotland Yard has reported. Metropolitan Police assistant commissionerMark Rowley has said that more than half ofthose arrests held connections with terrorismin Syria, with police estimating that over 700potential terror suspects are thought to havetravelled to Syria. Rowley also suggested thatnearly half of those are now back in the UK. The number of terror-related arrests was upfrom 2013/2014 where there was 254 arrests,which equates to an increase of about a third.It is believed that more than 100 people are

    awaiting trial for terrorism-related charges. Police have stated concerns of an emergingtrend, as from last years arrests, 56 wererelated to suspects under the age 20.

    Cyber security breaches forbusinesses on the increase

    CYBER SECURITY

    The Information Security Breaches Survey2015, published by Digital EconomyMinister Ed Vaizey on 2 June, showsthe scale and cost of security breachesfor business has nearly doubled.

    The average cost for big business now startsat 1.45 million, up from 600,000 in 2014,while an online security breach for a smallor medium sized business can now reach ashigh as 310,800, up from 115,000 in 2014.

    The research also found that nearly nineout of ten large organisations surveyedsuffered some form of security breach anddespite an increase in staff awarenesstraining, people are still just as likely to causea security breach as a virus or malicioussoftware. Additionally, the survey showed adrop in organisations who increased theirinformation security spending, with fewerexpecting to increase spending in the future.

    These findings have prompted thegovernment to urge businesses to takeaction against the cost of cyber securitybreaches. Ed Vaizey said: The UKs digitaleconomy is strong and growing, which iswhy British businesses remain an attractivetarget for cyber-attack and the cost is

    CTBNews

    READ MORE:tinyurl.com/ljkugoc

    Terror-related arrests at all time highCOUNTER-TERRORISM

    Swedish terror suspect Bherlin Gildo, 37, hasbeen formerly cleared after his lawyers arguedBritish intelligence agencies were supportingthe same Syrian opposition groups he was.

    Gildo was accused of attending a terroristtraining camp and receiving weaponstraining in 2012 and 2013, as well aspossessing information likely to be usefulto a terrorist. He was arrested at Heathrowairport under Schedule 7 of the 2000Terrorism Act when was travelling fromCopenhagen to Manilla to meet his wife.

    The trial collapsed at the Old Baileyafter the government refused to disclosesensitive information. Gildos lawyersargued that British intelligence agencieswere supporting the same Syrian oppositionas Gildo from 2012-13. They also claimedthe agencies were party to a secretoperation providing weapons to Syriangroups, including the Free Syrian Army.

    After the collapse of the case, Gildossolicitor Gareth Pierce said:There is afair amount of documentation that armswere being taken out of Libya via Qatarand Turkey and trucked through intoSyria to the resistance and the same fromCroatia and taken through Jordan.

    Given that there is a reasonable basis forbelieving that the British were themselvesinvolved in the supply of arms, it would be anutter hypocrisy to prosecute someone whohas been involved in the armed resistance.

    The prosecutor said the decision to dropcharges in the case had no bearingon otherSyria-relatedtrials in the UK.

    READ MORE:tinyurl.com/prcjxbw

    Gildo clearedafter governmentrefuses to discloseoperational details

    LEGAL

    These arrests were the results of offencesranging from fundraising for extremistcauses to plotting terrorist attacks. Rowley said: There is no doubt ofthe horrific nature of the offences beingcommitted overseas. The influenceof those who wish to bring similarviolence to the streets of the UK hasbeen an increasing threat here. Prime Minister David Cameron recently saidthat he planned new legislation to tacklethe spread of extremist views, saying it wasdesigned mainly to confront head-on thepoisonous Islamist extremist ideology. The United Nations estimates that more than

    25,000 foreign fighters, from 100 differentnations, havejoined militantgroups in Syria.

    READ MORE:tinyurl.com/qyo3g8g

    Safe Schools Declarationaims to stop terror attack on schoolsMore than 30 countries have signed up for the Safe Schools Declaration, which aims to stopwar and terror attacks deliberately targeting schools and educational facilities.

    The Global Coalition to Protect Eduction from Attack (GCPEA) held a conference on29 May in Oslo, Norway, during which over 30 countries signed up to the declaration, whichpledges to adopt The Guidelines for Protecting Schools and Universities from MilitaryUse during Armed Conflict. Countries who have signed the declaration want to protectboth students and teachers from deliberate attacks and establish protected status forschool buildings, so they cannot be used as barracks or for any other military purposes. Thedeclaration comes after attacks on a school in Peshawar Pakistan last December, where 132students and nine teachers died. The GCPEA also report that schools in at least 70 countrieshave been attacked between 2009 and 2014. READ MORE: tinyurl.com/of6nqp7

    China counter terror lawscause international alarmChinese draft laws on security,counter-terrorism and non-governmentalorganisations have moved implementationthis week constituted a further and moreserious threat to freedom of religion andexpression and deepens repression inan already restrictive political climate,International Campaign For Tibethas said. The new measures, whichhave caused alarm in the internationalcommunity, broaden the reach of theParty state still further, contractingthe space for civil society, accordingto the pro-Tibet campaign group. Together with the National SecurityLaw that is expected to be implementedthis year, the proposed counter-terror lawoutlines a counter-terrorism structurewith vast discretionary powers.

    READ MORE: tinyurl.com/nehcsp7

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    9Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    10/84

  • 7/26/2019 Counter Terror Business 22

    11/84

    Written

    byH

    am

    edEl-S

    aid

    Violent extremism, otherwise knownas terrorism, is no longer a rarity. Accordingto a recent report by the Institute for Peaceand Economics, the number of countries thathave not suffered from a terrorist attack hasdeclined from 111 countries in 2004 to only75 in 2014. While the severity, extent andmotivations behind such attacksoften vary, there is no questionthat terrorism has become

    a global phenomenonaffecting most of theworlds societies. Not only societies,but also businessesare, and have beenaffected directly andindirectly by terrorism.The 9/11 attacks, forexample, have cost morethan $5 billion in terms oflosses related to direct physicaldamages, supply chain disruptions,and interruptions to the international airlineindustry and tourism.

    A new study of 18 Western Europeancountries reveals that each additionaltransnational terrorist attack hasreduced their economic growth by 0.4

    per cent point a year. The World Bank inits 2011 World Development Reportwent further to acknowledge that terroristattacks in one region can imposecosts all through global markets. The disruption of Libyan oil supply followingthe beginning of the uprising in that country

    in 2011, when international oil pricesjumped by 15 per cent overnight,

    is a good example. The same

    World Bank Report addsthat todays businessesregard terrorism as amajor challenge to theiroperations in the areaswhere they function,and that attempts tocontain it have become

    more unpredictable,extremely costly though

    necessary for the profitabilityand survival of the firm.

    FAILED EFFORTS TOCOUNTER TERRORISM

    These facts and statistics are alarming,given that we spent more than 15 yearsof relentless efforts to counter terrorism.There is a consensus across the board that

    policies and approaches have not only failedto prevent or even undermine terrorism,but they have instead aggravated thephenomenon and made the problem worse.This consensus has recently been summed-upby the United Nations Secretary General,Ban Ki-Moon, while addressing the Instituteof DEtudes Politiques DE Paris on April 29,2015, when he stated that today, violentextremism is a growing and global threat.

    WAR ON TERRORThe failure lies in our misconceived strategyemployed after and since the 9/11 attacks.Known as the war on terror, this strategyhas been overwhelmingly reliant on ahard-military approach that focuses on thesymptoms and ignores the disease itself.As the anthropologist Scott Atran recently toldthe UN Security Councils Ministerial Debateon The Role of Youth in Countering ViolentExtremism and Promoting Peace: Unless weunderstand these powerful cultural forces thatradicalise the youth into violent extremism,we will fail to address the threat. When,

    as now, the focus is on military solutions andpolice interdiction, matters have already goneway too far. If that focus remains, we lose thecoming generation.

    FROMCOUNTERINGTO PREVENTING

    TERRORISM

    CounterTerrorism

    University professor and author Hamed El-Said shares histhoughts on why traditional approaches to fighting terrorismare not working, arguing that countering radicalisation in the

    first place is a better approach to the problem

    DE-RADICALISATION

    The

    waron

    terrorhas

    beenrelianton

    ahard-military

    approachthatfo

    cuses

    onthesymptom

    s

    andignoresthe

    diseaseitself

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    11Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    12/84

  • 7/26/2019 Counter Terror Business 22

    13/84

    CounterTerrorism

    The war on terror approach has hadanother indirect but not less damagingimplications. Sweeping definitions of terrorismhave invariably justified violations of longestablished international norms, human rights,and freedom of expression in the name ofsecurity. As Mr. Ban Ki-moon warned duringa summit hosted by the United States oncountering violent extremism last Februaryin Washington D.C: Governments shouldnot use the fight against terrorism andextremism as a pretext to attack ones critics.

    In many parts of the world, legitimateactions of opposition groups, including civilsociety organisations and humanrights defenders have been criminalised in thename of countering terrorism. Through suchactions we have provided violent extremistsseeking to recruit youth into their violentorganisations with the very ammunition theyneed. This goes along way towards explainingthe migration of more than 25,000 foreignfighters from more than 100 countries aroundthe world to join the Islamic State or ISILsince the beginning of the upheavals in theArab World war in early 2011. At least 6,000of those foreign fighters come from WesternEurope, where the motivation for joining sucha terrorist group remains little understood.REVERSING CURRENT STRATEGIESThere is a need to reverse our currentstrategies if we are to win the fight againstterrorism. First and for most, there is a

    need to restore trust, legitimacy, respect forinternational law and human rights, freedomof expression, and, above all, the promotion

    of good governance. Mr. Ban Ki-moon wasright when he stated: Military operationsare crucial to confront real threats. Butbullets are not the silver bullet. Missilesmay kill terrorists, but good governancekills terrorism. We must remember that. We need to understand better the conditionsthat conduce individuals to radicalise to apoint of committing or attempting to committerrorism. Continuing to ramp up securitymeasures in response to terror threatsmisses the point. It might prevent an attack

    or two. It might also stop and detain anindividual from joining a terrorist organisationabroad. However, this does little to explainwhy individuals radicalise in the first place.

    Individuals do not join violent extremismbecause they are nihilists: lack ofopportunities, decent jobs, high qualityeducation, combined with the presence ofoppression, corruption, injustices and littleregard for human dignity breed radicalisationand extremism that lead to terrorism.Turkey provides important lessons here. Inaddition to billions of dollars, the pursuit ofa purely military approach to the Kurdishproblem cost Turkey more than 35,000innocent lives in the 1990s alone. That is anaverage of 3,500 fatalities every year.

    The realisation that terrorism was aTurkish problem not simply a Kurdish one,led to the introduction of a comprehensiveand successful economic reform programmethat reduced poverty and inequalities,created decent jobs, and improved theliving standards of all Turkish citizens inall regions. This was accompanied by ademocratisation process that protectedcivil society, prevented torture insideand outside prison walls, and made humanrights integrity a constitutional right,not a privilege. The upshot has beenthe diminishing of a terrorism threatto levels that no longer occupiesthe daily lives of the average citizen.

    UNDERSTANDING YOUTH45 per cent of the world population is youth,the very same group most targeted by violentorganisations. In some Muslim majority states,

    this ratio exceeds 65 per cent. Youth neednot be seen as a threat. They possess energyand ideas, they are increasingly networked,

    and are a source of important solutions. Theyare the future engine of change. As ProfessorAtran advised the Security Council last month,there is a need to provide the youth withprogrammes that offer them something thatmakes them dream of a life of significance, apositive and achievable personal dream, andthe chance to create their own local initiatives.

    Engagement with community andits key members is a powerful instrumentin building a society that is resilientto violent extremist ideologies, aware

    of its dangers and risks, and capableof building and maintaining bondsand trustful relationships. Programmesthat promote community engagement and

    participation, debates and discussion ofall sorts of problems must be encouraged.Communities must also be empowered tofind solutions for their problems, includingproblems related to violent extremism.

    THE PRIVATE SECTORS ROLEFinally, there is an important role for the

    private sector in reducing violent extremismand risks associated with it. This cantake the shape of direct action (lobbyinggovernments to improve human rightsand reduce corruption) or indirectly(through creating jobs and supportingdomestic small-size firms).

    They can also operate alone or with otherstakeholders to achieve these objectives.In short, what is needed is a move awayfrom our current reactionary approach thatrelies on countering to preventing violentextremism. These elements of this newprevention strategy are already beingdebated seriously inside the United Nations.

    Mr Ban Ki-moon himself publicly declaredthat he is in the process of developing acomprehensive Plan of Action to PreventViolent Extremism that will seek toengage and empower youth. Some of theelements of this plan have already beendiscussed here. They include the protectionof human rights and civil liberties, reducingcorruption, promoting good governance andfostering a culture of peace by deployingweapons of mass instruction insteadof weapons of mass destruction.

    Only Member States however can ensurethe implementation of the SecretaryGenerals new Action Plan, which will send

    a clear message that not only is terrorismunacceptable in all its manifestation; butthat they are also genuinely taking practicalsteps to prevent and combat it.

    DE-RADICALISATIONAbout the author

    Hamed El-Said is aChair and Professor ofInternational Businessand International PoliticalEconomy at the Manchester

    Metropolitan University.He is the author ofNew Approachesto CounteringTerrorism. He isalso an advisorto the UnitedNations CounterTerrorismImplementationTask Force(UNCTITF).

    All opinionshowever

    expressed inthis articlereflect those of theauthors alone.

    Only United Nations Member States can ensurethe implementation of the Secretary Generalsnew Action Plan to prevent violet extremism,which will send a clear message that not only isterrorism unacceptable in all its manifestation;but that they are also genuinely taking practical

    steps to prevent and combat it

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    13Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    14/84

    Wheresyour office?

    MOD/Cpl David Rose

    Contact us:

    Getac UK Ltd

    Mitac House, Nedge Hill,Telford, TF3 3AH, UK

    E: [email protected]: +44 (0)1952 207200 www.getac.com

    Visit us @

    STAND

    S9207

    INNOVATION WITHOUT

    COMPROMISE

    T800Fully Rugged Tablet

  • 7/26/2019 Counter Terror Business 22

    15/84

    Written

    byP

    aul

    Stoke

    s

    New powers to control the fifth domain the internet and its associated onlinecommunities, are being proposed in the UK.The other core domains air, sea, land andspace are all closely regulated becauseof the impact they have on our lives. Theinternet has no such controls and hasbecome a hunting ground for extremistsas they seek to exploit the vulnerable andentice them to train in terrorist activities.

    Now, the government is exercising its newlyelected unilateral power and pushing aheadwith the Extremism Bill, which would giveheightened strength to the police in criminal

    investigations and obligesocial networks to supplydetailed, traceable activitylogs for anyone suspectedof acting outside the law.TACKLING RADICALISATIONThe Bill was outlined in the Queens Speechto Parliament on 27 May and reintroducedplans to tackle radicalisation and the

    rapid spread of terrorist recruitment. Thepurpose, the government says, is to uniteour country and keep you and your familysafe by tackling all forms of extremism and to

    combat groups andindividuals whoreject our values

    and promotemessages of hate.

    If the proposals becomelaw, the police will be

    able to obtain court ordersfor public telecommunications providersto release internet search records and other

    communications data on demand. Thesepowers would allow the police to examine theonline conversations of suspected extremistson platforms such as Twitter and Facebook.

    DATA ANALYTICS

    FIGHTING CRIMEIN THE FIFTH DOMAINPaul Stokes reviews the impact of the Extremism Bill revealed in the Queens speech and explainshow data analytics can tackle the online recruitment of foreign fighters

    TerroristRecruitment

    The

    newpowerswoulda

    llowthe

    policetoexam

    ine

    onlineconversi

    ons

    onplatformss

    uch

    asTwitterand

    Facebook

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    15Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    16/84

    IF YOU HELP OTHERS IN AN EMERGENCY YOU SHOULD BE AT THE EMERGENCY SERVICES SHOW

    rgencyuk.com | NEC | Birmingham | 23-24 September 2015 | www.emergencyuk.com | NEC | Birmingham | 23-24 September 2015 | www.emergencyuk.com | NEC | Birmingham |

    Where collaborationmeets innovation

    A unique event for anyone who works in the emergency services

    Come along to the Show on 23rd and 24th September at the NEC, Birmingham to:

    See and handle the latest equipment, kit, vehicles and technology

    Receive training in the latest rescue and lifesaving techniques

    Network with other blue light services and rescue organisations

    Gain a deeper understanding of the support available from voluntary sector partners

    Register for free entry today at www.emergencyuk.com

    Thanks to our Show supporters

  • 7/26/2019 Counter Terror Business 22

    17/84

    REACHING OUTThe government has been rightly concernedabout the increasing radicalisation of youngpeople and the ease and speed at whichterrorists are infiltrating ordinary communitiesto exploit vulnerable people. Alarmingly, thosechoosing to become foreign fighters are notpart of organised criminal gangs; thanksto social media, terrorist groups now reachordinary individuals everywhere. Social networks have created amulti-billion-dollar industry and allowed usto share experiences much more widely thanprevious generations. But they can have a darkside. The platforms have long been misusedby bullies and child abusers but they arealso now being employed very successfullyby media savvy extremists. Potential recruitsare aggressively targeted, particularly peoplewith violent backgrounds, the very youngand those with mental health issues, theMetropolitan Police Service has said. Jihadisare thought to be sending up to 100,000Twitter messages a day to plot terrorism.With no single controlling authority and norule book, social media is the new Wild West. The reach and radicalisation by ISIS isgrowing not just in the UK but across theglobe in fact, the total number offoreign fighters inside Syria and Iraqhas now exceeded 20,000. The IslamicStates is employing expert use of socialmedia to recruit and radicalise youthfrom around the world creating a new

    generation of digital native extremists.

    A CHANGE IN MINDSETModern, cyber warfare requires a changein mindset and legal toolkit as we seea swing from traditional, ground-basedcrime to the online environment. Its beena rapid shift and needs an equally rapidreaction from governments. Fortunately,an increasing number are starting torecognise that the internet has becomethat fifth domain and that, while clearlydoing much good, it needs boundaries. The Extremism Bill offers a controlledapproach and not a universal right

    to know for the police, which shouldprovide some reassurance of its limitationsin terms of surveillance while allowingpolice greater access to the data thatwill illuminate genuinely at-risk areas.THE LAWLaw enforcement agencies need to be ableto access online communications to preventthose exploiting social media to recruit andradicalise youth. Monitoring suspiciousbehaviour does of course itself need to bedone with clear guidance and strict legaloversight but it does still need to be possible.The new law would require internet service

    providers to keep a detailed, traceable log ofindividual activity in case it is requested in aninvestigation. However, without the resourcesto analyse such vast amounts of data,

    investigators could struggle to see a change.The volume and variety of data long agoreached such complexity and scale that onlytechnology can truly handle it and maximiseits value. In fact, law enforcement andintelligence operations are, increasingly, adata analytics challenge. There is so muchdata from so many sources that it takes someseriously clever algorithms to spot the linksbetween seemingly unconnected pieces ofdata or detect anomalous relationships.

    New advances in crime analytics canconnect different data types and uncoverpeople, entities, patterns, locations andrelationships of interest. In addition, itcan scrutinise unstructured data like textdocuments and social media posts, recognisingwords and phrases as entities that canbe analysed and linked automatically.

    CRIME ANALYTICSThe latest crime analytics techniquessuch as link analysis, social networkanalysis and anomaly detection can helpfocus investigators attention on theright persons early on. This is critical in

    identifying at-risk young people beforethey leave home to train to fight. Analytics software helps law enforcementagents disrupt recruitment networks

    that target the vulnerable but moreover,assists in discounting individuals whoare not persons of interest. Working fromknown extremists out to a wider network,agencies can ensure they do not breachthe privacy or civil liberties of citizens whoare connected but not a threat or at risk. Extremist groups use increasinglysophisticated technology means tosupport their activities. Governmentsand law enforcement agencies must

    constantly upgrade their own technicalcapability to meet this challenge. With the right technological support,the new legislation will enable lawenforcement agencies to access the rightinformation at the right time with reliableresults. Information that could protect achild, save lives or defend a border.

    Paul Stokes is COO of Wynyard Group, amarket leader in serious crime fightingsoftware used globally by intelligence,investigations and information securityoperations in justice and law enforcement,national security, financial services

    and critical national infrastructure.

    FURTHER INFORMATIONtinyurl.com/otovdgl

    TerroristRecruitment

    DATA ANALYTICS

    The government is exercising its newly-electedunilateral power and pushing ahead with theExtremism Bill, which would give heightenedstrength to the police in criminal investigationsand oblige social networks to supply detailed,

    traceable activity logs for anyone suspected ofacting outside the law

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    17Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    18/84

    www.gigamon.com/security

    LOOK CLOSER. GO FURTHER.

    TEL: 01344 859 870

    Gigamons network security solutions put thepower back in your hands.

    LIMITED VISIBILITY IS AS

    GOOD AS NO VISIBILITY

    If you cant see everything thats happening on your

    network, you can never be completely confident youre notalready under attack.

    To truly protect your network, the ability to see into even

    its darkest corners is vital Gigamons Unified Visibility

    Fabric delivers 100% visibility and security solutions that

    scale to handle any threats to your critical data, now and

    into the future.

  • 7/26/2019 Counter Terror Business 22

    19/84

    Written

    byJasonM

    cGeon

    ,H

    eadof

    C

    omm

    unica

    tion

    s,VeriskM

    aple

    croft

    According to new research released byVerisk Maplecroft, which assesses 1,300 ofthe worlds most important commercial hubsand urban centres, terrorist attacks pose anextreme risk to populations and businessesin the capital cities of 12 countries, includingthe strategic markets of Egypt, Israel, Kenya,

    Nigeria and Pakistan.In Verisk Maplecrofts new Global Alerts

    Dashboard (GAD), 64 cities are categorisedas in extreme risk. GAD is an online mapping

    and data portal that logsand analyses every reportedterrorism incident down tolevels of 100m worldwide.Based on the intensityand frequency of attacksin the 12 months following

    February 2014, combinedwith the number and severityof incidents in the previousfive years, six cities in Iraq top

    the ranking. Over this period, the countryscapital, Baghdad, suffered 380 terroristattacks resulting in 1,141 deaths and 3,654wounded, making it the worlds highest riskurban centre, followed by Mosul, Al Ramadi,Baqubah, Kirkuk and Al Hillah.

    Outside of Iraq, other capital cities ratedextreme risk include Kabul, Afghanistan (13thin the most at risk ranking), Mogadishu,Somalia (14th), Sanaa, Yemen (19th) andTripoli, Libya (48th). However, with investmentlimited in conflict and post-conflict locations,

    it is the risk posed by terrorism in the primarycities of strategic economies, such as Egypt,Israel, Kenya, Nigeria and Pakistan that has

    the potential to threaten businessand supply chain continuity.

    Principal Analyst atVerisk Maplecroft,

    Charlotte Ingham, said:An estimated 80per cent of globalGDP is generatedfrom cities.Visibility of thesub-nationaldifferences in

    terrorism levelsshould be an imperative

    for multinationalorganisations looking to

    RISK ANALYTICS

    A MECHANISMFOR MONITORINGGLOBAL TERROR

    TerroristMaps

    New research assesses 1,300 of the worlds commercial hubs and

    urban centres and reveals that terrorist attacks pose an extremerisk to businesses in the capital cities of 12 countries. JasonMcGeon of global risk analytics Verisk Maplecroft examines thenew Global Alerts Dashboard (GAD), in which 64 cities arecategorised as in extreme risk

    RISK ANALYTICS

    Parishas

    experienced

    oneofthestee

    pest

    risesintherank

    ing,

    reflectingthese

    verity

    ofthete

    rrorist

    attackinJanuary

    2015

    The new Global Alerts Dashboard categorises 64 cities atextreme risk to terrorist attacks

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    19Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    20/84

    www.FireEye.com 2015 FireEye, Inc. All rights reserved. FireEye is a registered

    trademark of FireEye, Inc. All other brands, products, or service

    names may be trademarks or service marks of their respective

    owners.

    ONEUNIFIEDDEFENSE

    AGAINST CYBER ATTACKERS

    DETECT

    Signature-less and multi-flow virtualmachine based approach that leverages

    superior threat intelligence

    PREVENT

    Multi-vector inline known and

    unknown threat prevention

    ANALYZE

    Containment, forensics investigation

    and kill chain reconstruction

    RESPOND

    Remediation support and

    threat intelligence to recover

    and improve risk posture

    Todays cyber attacks are targeted, sophisticated and focused on acquiring your most sensitiveinformation. They also go undetected by traditional security technology. Organizations need to

    reimagine security and adopt a Continuous Threat Protection model. This means having the ability

    to detect threats in real-time and reduce time to respond, thereby preventing or minimizing

    business impact. The FireEye Platform provides a multi-faceted approach to security detect,

    prevent, analyze, respond.

    Todays cyber attacks are targeted, sophisticated and focused on acquiring your most sensitiveinformation. They also go undetected by traditional security technology. Organizations need to

    reimagine security and adopt a Continuous Threat Protection model. This means having the ability

    to detect threats in real-time and reduce time to respond, thereby preventing or minimizing

    business impact. The FireEye Platform provides a multi-faceted approach to security detect,

    prevent, analyze, respond.

  • 7/26/2019 Counter Terror Business 22

    21/84

    understand and price the risks to assets,employees and supply chains.

    ISLAMIC INSURGENCIES IN AFRICAAs Africas largest economy, Nigerias role asa commercial hub is central to economicgrowth across the region. However, dueto the activities of Islamist group Boko Haramand a surge in violence in the lead up to theMarch election, 13 out of the 24 Nigeriancities included in the assessment experienceda significant increase in the intensity andfrequency of terrorist attacks compared to theprevious quarter. The risk level in Abuja (18th),Nigerias capital, has remained consistent,but it is rated among the top two per cent ofGADs most at risk cities. Over the reportingperiod, Abuja suffered four attacks whichresulted in 117 deaths. While Boko Haram will remain the dominantterrorist threat in Nigeria, Verisk Maplecroftbelieves there is a possibility of hostilitiesresuming in the Niger Delta following theelection of Mohammed Buhari. The amnestyprotecting members of the militant groupMovement for the Emancipation of the NigerDelta (MEND) is due to lapse and withoutsuccessful negotiations this could meandisruption to the countrys vital oil industry, inaddition to attacks on key cities in the southeast of the country.

    The only other sub-Saharan capital to appearin the extreme risk category is Nairobi(57th), East Africas prime commercial centre,

    which has witnessed an upsurge in attacks byIslamist militant group al Shabaab. Over thereporting period 184 people have been killedor wounded in Nairobi in six separate attacks.

    The impact of terrorism on the countrysmain commercial hubs of Nairobi andMombasa (82nd) has been particularly harmfulto investor confidence. In addition, the touristtrade has declined by 7.4 per cent costing thecountry an estimated US $73m.PARIS ATTACK REFLECTS RISKAccording to Verisk Maplecroft, Paris (97thand high risk) has experienced one of thesteepest rises in the ranking, reflecting the

    severity of the terrorist attack in January 2015that left 17 people dead. The risk level in Parisis representative of a wider trend for Westerncountries, including Belgium, Canada andAustralia, where the level of risk in key urbancentres is substantially higher than elsewherein the country, in part due to the significant PRvalue attached to such high profile targets bymilitant Islamist groups.

    This contrasts sharply with a number ofdeveloping economies, including Nigeria,Thailand, Philippines, Colombia and India,where the risk of terrorist attacks is highest inrural areas. This also remains the case in Egyptwhere large-scale attacks remain focused in

    the Sinai Peninsula. However, the data reflectsincreased risks in the countrys two maincommercial centres, Cairo (45th and extremerisk) and Alexandria (76th and high risk), the

    latter of which has moved from medium tohigh risk over the last quarter.

    ALEXANDRIA CASE STUDYAn increase in the frequency and intensity ofterrorism incidents in Alexandria has seen thecitys score plunge from medium risk in Q12015, to high risk in Q2 2015. This suddenand sharp increase in risk creates a significantchallenge for international investors in Egyptssecond city and major trade hub. Understanding the drivers of this acuteincrease in risk is critical for businesses tomake informed decisions about protectingtheir people, assets and supply chains. Analysisof the risk at both the country and individualcity level can help businesses make strategicinvestment decisions, while more granularevent based data can give greater claritywhen making operational decisions. Using theinteractive GAD, clients can find informationabout the risks facing their operations down tostreet level and create powerful analytics andvisualisations to facilitate risk mitigation.

    A geo-spatial investigation of the 12 month2015 Q1 time frame and the 12 month2015 Q2 time frame for Alexandria shows asignificant increase in the number of attacksfrom two - 30 respectively and an increase inthe number of casualties from nine 40.

    A more detailed analysis of the data reveals asharp rise in the number of terrorist incidentsfrom January 2015. The rise in attacks followsa national trend in attacks around theanniversary of the January uprising againstHosni Mubarak. Investigating past this pointreveals an upward trend in the number of

    casualties in the Q2 reporting period whichcontinues to a spike in March 2015.The fact the spike in casualties does not

    correspond to the peak in attacks indicates achange in terror tactics during the time frame.Nearly two thirds of all attacks in Januarytargeted police forces, however, this fell to 40per cent in March 2015, while the proportionof attacks on civilians rose to 60 per cent. The shift towards softer civilian targetsin March included an IED attack on asupermarket, three banks, a telecoms businessand a fire station. The data therefore revealstwo separate attack patterns: one clusterof attacks against police forces around the

    anniversary of the 2011 uprising, and aseparate group of attacks against commercialenterprises with civilian casualties fromFebruary to March. There is the potential that

    Muslim Brotherhood affiliated groups whichhave historically targeted police forces inisolation are branching out and targetingcommercial interests to put more pressure onthe government. The acceptance of civiliancasualties is a by-product of this shift in modusoperandi and could signal the start of a moreturbulent period for Alexandria.

    The sharp rise in terrorism risk in Alexandriabetween the Q1 and Q2 city scores is drivenby an increase in incidents and casualtiesacross the city. What this simple assessmentmasks however is the apparent change intactics for terrorist groups. For businessesoperating in the city, historically keepingaway from areas of protest would likely havelimited their exposure to physical risk asmuch of the terrorist violence was directedagainst tools of the state. The shift now totargeting commercial enterprises and civilianinfrastructure makes managing terrorism risksmore complex.

    AN INTEGRATED SECURITY SOLUTIONPowered by eight years of data, the webbased platform provides organisations withan instant, cost effective solution that willaid strategic decision making over currentinvestments, supply chain continuity, marketentry or risk pricing. The dashboard is an

    operational solution that pinpoints, tracks andalerts disruptions, such as natural hazards,corporate security threats, terrorism and piracy,as well as pressures to corporate reputationfrom complicity in human rights abuses. It features up-to-date analytics on emergingsecurity developments and historic trends at

    the global, national and sub-national level.These trends shape the security of businessesday-to-day operating environment. Activatefilters within the tool to define the type of dataor analysis needed per site and the frequencyyou would like to receive qualified alerts. It also enhances risk management capabilitiesby integrating corporate information with globalsecurity data, which is collated, verified andcategorised by a team of experts. Risk outputscan be viewed by live data feeds, email alerts,spreadsheet, online scorecards, risk matrices forissues and individual incidents. It is augmentedby high performance mapping technology,which offers compelling visualisations down to

    street level.

    FURTHER INFORMATIONwww.maplecroft.com

    TerroristMaps

    RISK ANALYTICS

    The dashboard enables multinational companies

    to pinpoint current threats, identify emergingtrends and monitor risks, giving them the insightthey need to make risk-adjusted decisions acrossthe entire operational and supply chain universe

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    21Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    22/84

    Ring Sights Defence Group Ltd+44 (0)8700 422260 [email protected]

    www.ringsights.com

    YOUR FOCUS.

    OUR RING SIGHT.BOTH PERFECT.

    Ring Sights has been in the business ofdesign and manufacture of the finest

    quality optical equipment since 1976.

    Nearly forty years on and with highly

    skilled leadership, dedicated teams of

    expert staff and a massive amount ofinvestment, the company now offers

    state of the art production facilities and

    are the world leaders in research, design

    and manufacture of unit power sights for

    the military.

  • 7/26/2019 Counter Terror Business 22

    23/84

    The development of 3D seismic explorationcapability combined with ever advancingengineering technology brings gas finds andoil prospects in the East Africa footprint ofUganda, Kenya, Tanzania and Mozambique,in excess of those found in Qatar. Key players from the worlds energysector are positioning to assist respectivenations to realise, refine and market theirnatural resource, bringing global experiencegained from the challenging technicaland physical environments of the NorthSea, Brazil and Kazakhstan, where suchchallenges have proven to be fertile learningplatforms for the engineering community.

    POTENTIAL RISKSAfrica is a large, diverse and formidablecontinent consisting of 54 countries. The regionis often considered volatile due to a rangeof factors including tribal, political, health,

    geographic, migration and environmental.

    Discoveries of mineral wealth oil, diamondsand water have been sighted burdensrather than assets, are often identified asthe root cause of historical conflicts.

    There are many risks tooperational security. Recentevents in Africa highlightloss of life and hostilityby ongoing Boko Haremactivity in Nigeria, theIn Amenas terroristattack in Algeria (2013)by Al Qaeda (AQ)linked terrorists and theWestgate attack in Kenya(2013) by Al Shabaab.2015 has seen further AlShabaab atrocities, one killingover 140 students in Kenya.Stability and security across Africa isoften presented as unsafe or as a reason

    which prohibits international operations. But

    to put this in context, the UK has had its fairshare of terrorism since the late 1960s theLockerbie bombing in 1988 killed 259 and the

    London bombings in 2005 killed 56.Regional dynamics in Africa

    are fluid and have changedsignificantly over the past

    decade. More recentlyin the North, the ArabSpring had a dramaticimpact which toppledgovernments. Theprevious safe regionsof the 1990s of Libya,Egypt and Tunisia are,

    in the eyes of manyinsurance companies, no-go

    areas today. The CentralAfrican Republic (CAR) is yet

    another hostile zone, as is Syria.Noting such events, one can begin to realise

    the challenges faced within the continent

    EAST AFRICA: KNOWING THERISKS AND OPPORTUNITIESWhile oil and gas prospects in East Africa are flourishing, the areas potential security riskscan be seen as a barrier to international business. But with the appropriate risk scoping andplanning, conducting business in East Africa can be viable and profitable, argues Tony Stead

    Keyplayersfromtheworldsenergysectorarepositioningtoassistrespectivenationstorealiseandmarkettheirnaturalresource

    Written

    byTon

    yStead,AfricaRisk

    &Security

    Specialist

    InternationalAffairs

    GLOBAL SECURITY

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    23Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    24/84

    T H E GAME CH ANGE RS IN T RACKING!

    -NO CABLES - NO NONSENSE-

    A NEW BREED OF TRACKING

    WINNERSEC URI TY I ND USTRY E MAGAZI NE

    Tracker Solutions Award for 2014/15

    FIND US

    [email protected]

    CALL: CH+41792555042 / UK+447791324551

  • 7/26/2019 Counter Terror Business 22

    25/84

    where porous borders, inconsistent policeor military forces and poor communicationsadd further challenges for governmentswho may lack transparency or legitimacy inthe eyes of the international community.

    TERROR INCIDENTSThe In Amenas and Westgate incidentshighlighted inadequate governmentresponses to terror attacks, which arguablycaused greater damage and loss of life thanthey saved. Responses seemed ill conceived,ill prepared and ill advised. Military gunshipswere used to attack the Algerian base, withmedia footage showing uncoordinated firingat seemingly any person that moved. In Kenya, media showed soldiers coweringoutside the shopping centre, latterly there

    was footage of government forces carryingbags of looted goods and stepping overdead civilian bodies inside the shopping

    centre. Libya, Tunisia and Nigeria governmentforces have also responded poorly to hostileevents in respective countries. The commonthread forms that Forces being poorlytrained, equipped and paid are unlikely toprovide appropriate emergency response. A 2015 snapshot finds evidence that AlShabaab are actively recruiting in Kenya. InLibya, the militia numbers continue to growas the country grows deeper and deeperin to lawlessness, with AQ or Islamic State(IS) affiliated groups now deeply rootedin the North East. South West Libya isbelieved to be active training grounds forcollaborating banditry, including Hamas,

    IS and AQ as the military tourism modelpreviously witnessed across Afghanistan,Chechnya and the Balkans reappears.

    PLANNING & PREVENTIONThis is the context from which operationalplanning begins. With the appropriate riskscoping and planning, Africa operations cannot only be a viable business option, butbrings the added bonus of assisting developingnations. Training opportunities, supportinginternational partners and developinglocal skills through determined, committedand courageous learning programmes,provide learning and engagement forums

    for all stakeholders to grow and benefit.Morally, Africa offers wonderful opportunitieswhere all stakeholders can win. Planning for operations in such environments

    can be challenging and a common oversightwithin the energy sector is the oft-seendefaulting to Health and Safety (H&S) leadersto scope and manage in hostile environments.The flaw in this model is that H&S modelsmay only scope risks within the parameterof any given site on a compliance basis,meaning the likes of Westgate, In Amanasor the Arab Spring would be unlikely to beconsidered in any risk scoping exercise. There are other incidences where I havewitnessed engineering project managersleading the preparation for an Africaoperation, with absolutely no regionalinsight or input other than technicalengineering knowledge. The consequencesof such oversight can be fatal. I wouldrecommend employing the services

    of an experienced Africa hand for thescoping of any operation, as well as anacademically qualified individual who

    considers action to be taken if the worstpossible what if should ever occur. Risk scoping may include borderingregions where, due to porous and unpolicedborders, local conflicts can quicklyescalate to be international. Examplesof cross border incursions include recentSomali attacks in Kenya. Poorly paidgovernment forces are unlikely to risk theirlives in the face of armed conflict. Companies should avoid overloadingH&S professionals who may be unfamiliaror unsighted with African culturesand trends and instead utilise experiencedrisk and security professionals who

    have operational experience in Africa.CONTINGENCY PLANNINGAn excellent example of contingency planningin action was Tullows ability to extract trappedemployees and their family from within theWestgate shopping centre as the terror siegewas ongoing. Private security teams (ex UKmilitary) extracted employees and othershoppers quietly and efficiently days beforegovernment forces entered the building. Police incidents of expat harassment onfabricated charges can bring significantfinancial reward to corrupt officers. Yet, if onepays, it endorses a successful business model

    for the culprit. I encountered this in manycountries and, in Angola, started recording allsuch incidents and providing monthly reportsto the British Ambassador who in turn passed

    to the Angolan government with the messagethat such harassment was preventing theinternational community from helping Angola.After a few months, the incidences decreased. Physical threat scoping should consider theease of access to weaponry in Africa and theunpredictability factor where, 9 times out of10, a road or junction may be safe, yet onthe 10th visit an aggrieved local (or police)with an AK47 may be attracted to your shinyexpat 4x4 vehicle. How does one handle thesituation? A swift move for the handbrakeor to remove seatbelt may be perceived asreaching for a weapon. Nervousness maystall the vehicle, giving the perception ofattempted escape. Such scenarios should beconsidered and drivers trained accordinglyincluding with anti-hijack and first aid skills. One should be prepared for the significantcultural differences between working inthe West and working in Africa. Locally, theday may start when the sun rises and endswhen it sets. Additionally, priorities may differand tribal hierarchies are incredibly significant. Hotels and support services also differin quality and ability and a number ofquestions need to be considered, suchas Does your travel company check onfood hygiene practices? Are fire exitspadlocked closed for security, or is there aclear route for escape? How capable isthe local fire service, can their hose orladder reach above the 3rd floor?

    MOVING FORWARDThe points I have detailed above are notshow-stoppers, far from it, they are platformsfrom which contingency and operationalplans can evolve. We now have a baselineto develop corporate and training planswhich can grow and engage within localcommunities. Consider within plans that,unlike the West, it is not viable to rely uponlocal national government forces for support,therefore organisations must developindividual robust and workable plans. Where new-build complexes are beingdeveloped, safe rooms, fire-fighting andescapes along with practical security and

    protection methods should be considered andinformation relating to building infrastructureshould be protected; both In Amenas andWestgate attacks benefited from insiderknowledge. Engage local communitieswith security, fire-fighting and medical trainingand extend corporate facilities to supportthe community should a local emergencyarise. Local engagement is key to success. Having worked across perhaps a quarterof Africa on and off for roughly 15 years, Iencourage organisations to overcometheir fears and seek to develop businessopportunities. Companies that scopewell and understand the challenges will

    undoubtedly reap business reward. Bringingorganisations to Africa can lead to growth,developments and benefits at all levelsfrom community to government.

    InternationalAffairs

    GLOBAL SECURITY

    The region is often considered volatile dueto a range of factors including tribal, political,geographic and environmental. Discoveries ofmineral wealth have been sighted burdens ratherthan assets, are often identified as the root causeof historical conflicts

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    25Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    26/84

    Reduce youronline security risk.

    Protecting online identitiesmust be a priority. With Sedicii,

    personal information isnever revealed.

    Secure authentication is vital, but it must also be convenient.Dont fall victim to identity theft!Sedicii ensures total control. With Sedicii it is easy to be safe.

    With Sedicii, personal information never leaves the browser. Never sent. Never stored.Anywhere. Ever. Sedicii authentication works with all forms of user credentials.

    In fact, with Sedicii, an organisation no longer holds user passwords at all, therefore reducingrisk. The service can be used for logging in to networks and websites, authenticating securely tocontact centres, authorising payments and all of this is done using a single, consistent interface.The system can also support biometrics.

    Mutli-factor authentication includes: hand / ngerprint recognition; ASCII viakeyboard; smartphone / tablet log-ins; credit / debit card authentication;

    face / retina scanning; hardware tokens; and voiceprint.

    With Sedicii multi-factor authentication, the user doesnt have to share their passwordwith anyone.

    Make Sedicii Authentication your Single Sign-On.

    Sedicii Limited

    2F Techhub, 207 Old St, London EC1V 9NR

    Phone: +44 20 8144 8279Email: [email protected]:www.sedicii.comTwitter: @GBRSedicii

  • 7/26/2019 Counter Terror Business 22

    27/84

    Written

    byProfe

    ssorMik

    eJackson

    ,IT

    andCyber

    Security

    ex

    pert

    atBirmin

    gh

    am

    City

    Un

    iversitysB

    usinessSchool

    The Queens Speech announced new monitoringpowers to tackle terrorism. This proposedbill entitled the Investigatory Powers Billhas its roots in the Communication Data Bill(nicknamed the Snoopers Charter) whichthe government intended to introduce in the2012-13 Parliamentary session. The SnoopersCharter was eventually dropped due toopposition from the Liberal Democrats. Thedetails of the new bill are not fully knownas yet but it is believed that it will give thepolice and security forces even greater powersthan those set out in the 2012 draft. What will almost certainly appear in thenew bill is the requirement for Internet Service

    Providers (ISPs) and mobile phone operatorsto record the activities of subscribers. A recordof texts, emails and phone call will be heldfor at least a year. This rule will apply to all

    subscribers and not just those whomight be under suspicion ofterrorist activity. The advantageof this is obvious becauseit will ensure that whenthe security forces haveidentified one suspect theycan also check out otherpeople who have hadcontact with that individual.Mobile phone operators andISPs will need to invest in theinfrastructure to support thisrequirement and will inevitablypass these costs on to consumers.

    ENCRYPTIONAnother area the bill is likely to address isencryption. A number of apps allow users

    to encrypt messages so thatthird parties (who maypotentially be criminals)

    cannot interceptand read them. Theproblem for thegovernment is thatthis also makesthe content of themessages unavailable

    to the security forces.A possible solution

    is to legislate againstthe use of encryption

    which is so complex that

    it prevents government bodiesbreaking it. The problem with this approachis that if the security forces can break theencryption then hackers will as well.

    MONITORING POWERS

    IS EVERYONE A SUSPECT?Professor Mike Jackson, IT and cyber security expert at Birmingham City Universitys Business School,examines the proposed Investigatory Powers Bill and asks what this means for public privacy

    CyberSecurity

    Thedetails

    of

    thenewbillare

    notyetknown

    but

    itisbelievedth

    at

    itwillgivethe

    police

    andsecurityfo

    rces

    evengreater

    powers

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    27Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    28/84

  • 7/26/2019 Counter Terror Business 22

    29/84

    The public may accept the bill not understandingwhat the associated loss of privacy may mean.

    However, the UK may have to follow the US inditching a bill which grants the administrationoverarching powers in favour of one which takesmore account of the individuals rights to privacy

    CyberSecurity

    PREVENTING TERRORISMThe government will justify the imposition ofthese powers as a means of preventingterrorism and ensuring the security of the

    country. There will be opposition froma number of groups who are concernedthat UK citizens will be losing their rightto privacy. In the past this has alwayscome from left leaning organisations.Recently, however is clear that right ofcentre figures such as Rand Paul are seeinglaws like this as evidence that the nannystate is interfering too much in peopleslives. Senator Paul successfully blockedthe extension of the Patriot Act whichwas regarded as the USs equivalent ofthe Snoopers Charter. Subsequently, anact known as the Freedom Act which grantsthe government more limited powers

    than those set out in the Patriot Acthas been passed by the US congress. Unless the Conservative Party containsa significant number of MPs who haveviews which coincide with SenatorPauls, the Home Secretary should notexperience any problems in steering theInvestigatory Powers Bill through theHouse of Commons. Although the LiberalDemocrats have indicated they might opposeit, it is not clear that Labour would.

    The proverbial man or woman on theClapham omnibus would tend to side withthe assertion that the proposals are necessaryfor the protection of the country and do

    not cause too great a threat to the privacyof the individual. The general assumptionwould be that people who have nothing tohide have nothing to fear from this bill.

    A QUESTION OF PRIVACYAnd yet there is evidence that the generalpublic can be greatly exercised about privacyunder certain circumstances. Nobody woulddispute the fact that the number of peopleharmed on our roads in a year greatly exceedsthe number subjected to terrorist activity. It

    might therefore be supposed that a devicewhich could significantly reduce the numberof road casualties would be enthusiasticallywelcomed. Such a device would be fitted intoa car and the vehicle owners expense and itspurpose would be to inform the police everytime the vehicle driver exceeded the speedlimit. Could such a device be constructed?Yes, almost certainly. Would it contribute tothe reduction of accidents on the road? Yes,almost certainly. Would it be accepted by thegeneral public? No, almost certainly not. The British have shown that they haveno concerns about breaches of privacywhich might occur due to the use of CCTV

    surveillance cameras. The Daily Telegraphreported in 2013 that there was a CCTVcamera for each eleven people in thepopulation. Surveys have shown that UK

    citizens, in contrast to those in other Europeancountries, think that this is a good thing.So the camera is highly regarded. Exceptwhen its a speed camera. Speed camerasare widely reviled and cited as examples ofthe nanny state in action. They are seen asinvaders of privacy. This is despite the fact that

    everyone acknowledges that these camerasonly catch individuals that break the law. The point is that privacy does matterto citizens but only in certain contexts. Theprotests about the way the InvestigatoryPowers Bill invades privacy which come fromorganisations such as Liberty and the OpenRights Group need to be taken seriously.The public may initially accept the bill notunderstanding what the associated loss ofprivacy may mean. In the future, however,the UK may have to follow the path takenin the United States of ditching a bill whichgrants the administration overarching powersin favour of one which takes more account

    of the individuals rights to privacy.

    FURTHER INFORMATIONwww.bcu.ac.uk

    MONITORING POWERS

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    29Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    30/84

    ARE YOU CYBER RESILIENT?

    95% of organisations are being routinely compromised, dont

    become another statistic.

    cybX is a unique cyber training, exercising and validation capability that enables a full spectrum

    of cyber attacks to be technically replicated and for business consequence management to berapidly developed and tested in a safe and secure environment. cybX enables organisations to

    take a board room to server roomapproach, to:

    Integrating cyber resilience into wider enterprise risk management and governance

    Objective assessments of business risks resulting from different cyber attacks

    Developing and delivering a roadmap for a business driven cyber resilience capability

    Investing in the development of high value cyber security teams

    For more information visit: www.cybx.orgorCall: +44 (0) 1347 825196

    Cyber Security; cybX

    @cybx_org

  • 7/26/2019 Counter Terror Business 22

    31/84

    Digital transformation is one of the keyagendas for government, CNI and forenterprises in general. However as individualenterprises, government, the economy andsociety become increasingly hyper-connectedand data dependent the risks from cyberattack and not just technical failure rise. Theserisks arise from many different potentialactors, but the consistent theme is thedifficulty with attribution and therefore thelow risk to the attackers. The insidious effectsof the combined criminal, espionage, sabotageand subversive cyber activities underminetrust, making traditional security approachesless effective.

    An alternative way is to integrate essentialphysical and IT security disciplines into amore holistic organisational cyber resilience

    approach, based upon the recent BritishStandard Guidance on OrganisationalResilience (BS 65000) and sponsored by theCabinet Office. It provides a framework basedupon three foundations of: vision and goals;leadership and culture; and governance andaccountability, with an iterative six stageprocess. To understand how developingorganisational cyber resilience into a coreprocess is both achievable and essential itis first important to understand what digitaltransformation, organisational resilience (OR)and agility mean. Second, how when theseare combined effectively together under aframework such as BS 65000 they become the

    means to driving the economic growth anddelivery of better services.

    DIGITISATIONDigitisation has many aspects, but in simpleterms it is the combined networking effectsof increasing amounts of connectivity linkingdata, devices and people. This creates a valuechain that enables people and enterprises tobe more agile in their information exploitationthrough developing shared understandingand collaboration to continually improveand innovate. We are currently in an era ofexponential increases in digitisation due tocombined effects of various technologies

    which are all maturing and becoming hyper-connected. To provide an insight into theincreasing hyper-connectivity scale of thissome global figures will help.

    By the end of 2014 there were nearly sevenbillion mobile subscriptions, nearly one forevery person on earth. The worlds stock ofdata is forecast to double every two years,after increasing 2,000 per cent between 2000-2012; and the number of internet-connecteddevices reached over eight billion in 2012 andforecasted to reach between one - ten trillionby 2025, at least 140 sensors for every personon the planet. This makes data and the abilityto be able to exploit it to drive innovation thenew currency in an increasingly complex anddynamic global economy and societies.

    BS 65000 describes OR as the ability ofan organisation to anticipate, prepare for,respond and adapt to incremental change

    and sudden disruptions in order to surviveand prosper. It therefore follows from anunderstanding of digital transformation that

    this brings both incremental, but increasinglydisruptive change, hence the digital agendaas part of almost all government and CNIstrategies. The good news is this is that thedigital transformation required to prosperfrom digitisation are also those required tosurvive. It ultimately is developing a moreagile enterprise, which has the DNA to beresponsive, robust, flexible and adaptable.

    DIGITAL TRANSFORMATIONDigital transformation means cutting acrosstraditional internal and external stovepipes, todevelop mutual trust, shared understanding,communications and collaboration, to enable

    better decision making and actions. Thismeans putting people, with the right skills,enabled by the data and the right channels ofcommunication and communities of interest

    at the centre of both digital transformationand cyber resilience. By implication flatteningand widening the connections betweensenior decision makers, managers and staffin all functions, to cyber security and ITspecialists. Arguably improving engagementof employees, often another aspect oftransformation agendas.

    The exponential increases in complexityand dynamic nature of digitisation, inevitablyleads to rapidly changing technology andways of working, based upon data sharingand collaboration. This inevitably constantlycreates new vulnerabilities and exploits forcyber-attacks. The assumption must thereforebe that some attacks will be successful and sothe organisation must be resilient enough towithstand the shock and surprise of an attackas the effects manifest themselves in differentways. This can be achieved by using an agileapproach based upon structured the situationbased experiential learning for individualsand organisational development, which BS65000 includes. By investing in this boardroom to server room approach developingdifferent skills, processes and structuresdynamically, whilst being underpinned byessential information assurance, organisationscan develop a more agile cyber resiliencecapability. In this way boards, senior executivesand whole enterprises will elevate andintegrate cyber resilience, including securityinto a core business process.

    In conclusion, a highly digital enterprisethat is cyber resilient is more agile than aless resilient one, therefore better able to

    exploit the opportunities of an increasinglyhyper-connected environment. This agility,or the DNA of organisations to beresponsive, robust and flexible is enabledthrough digitisation, or the fusion of digitaltechnologies, data and new structuresexploited by people with additional skills andchanged culture.

    There is an interdependent relationshipbetween digital transformation andorganisational cyber resilience, withoutrecognising the two and driving the skills andculture to support them, then both digitisationinitiatives and cyber security will be lesseffective an exponentially increasingly complex

    and dynamic hyper-connected world.

    FURTHER INFORMATIONwww.cybx.org

    CYBER SECURITY

    DEVELOPING

    ORGANISATIONALCYBER RESILIENCEOrganisations are under virtually constant online attack. Theft ofcustomer data, intellectual property and sensitive information isincreasingly common. How quickly can you respond?

    AdvertisementFeature

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    31Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    32/84

  • 7/26/2019 Counter Terror Business 22

    33/84

    As venues for large-scale events, and oftenthe target for protests, riots and terroristattacks, modern cities face changing securitythreats. In todays increasingly interconnectedworld, cloud-based services and the Internetof Things are increasing cities reliance ontechnology, often leaving them increasinglyvulnerable to security threats and breaches.

    Leading the way in utilising smart citytechnology in the UK is Glasgow, which

    has spent 24m over the past two yearson transforming the city into a world-leadingcity of the future. Now, the city benefitsfrom self-adjusting street lights, wireless

    high-definition CCTV, automatically-adjustingtraffic lights to reduce traffic and bottlenecksand dedicated apps to highlight walkingtours, cycle routes and points of interest.

    A DEVELOPING THREATFor these smart cities, where the localinfrastructure from traffic lights to utilities is largely automated and networked,security vulnerability is especially apparent,

    and is a problem not just in the UK buton a global scale. In an interview withthe New York Times, the United Statessecurity expert Cesar Cerrudo revealed

    that through weaknesses such as softwarebugs and lack of encryption, he has foundways to control traffic lights, tweak speed-limit signs and alter traffic sensors.

    Closer to home, Network Rail hasacknowledged the threat to its new high-tech signalling system, following a warningby Government advisor, Professor DavidStupples, who claims that the new system which dictates critical safety informationand will eventually control all of Britainstrains could leave the rail networkexposed to cyber-attacks and potentiallyallow hackers to cause a serious crash.

    Commenting on the increasing risk to citiesfrom cyber-attack, Mike ONeill, Chairmanof the British Security Industry AssociationsSpecialist Services Section, said: The keychallenge that strikes me is that with thedrive for connectivity and interconnectivity comes a lot more vulnerability. [Threatscould come from] hackers terrorist groupsor government actors and their proxies,who may be seeking to cause asymmetricconfusion. If you think about a city that hasinterconnectivity, the vulnerability is huge,so that is one of the things I think we needto be much more aware of going forward.

    So, with modern cities facing a growingnumber of threats, what can thoseresponsible for safety and security doto prepare and protect our urban centres?

    A FRESH APPROACH

    Collaboration and joined-up thinking betweenpolice and the private security industry iskey to ensuring the long-term safety andsecurity of British cities, and building a closerrelationship between the two is the focus of anew project being developed across London.

    The Police and Security (PaS) GroupInitiative was launched at Londons CityHall in December 2014, with the aim ofbecoming a critical friend to the Met Policein developing mutually effective collaborationwith the private sector. The key pillarsto this activity include building effectivecollaboration, overcoming barriers and sharingbest practice between the Metropolitan

    Police, private security suppliers, existingcrime reduction partnerships and localbusinesses. Partners involved in the projectinclude the Metropolitan Police, the BritishSecurity Industry Association, London First,the Security Industry Authority and the CitySecurity and Resilience Networks (CSARN). So what is PaS and what can it achieve?The list of attendees and presentationsat its launch on 1 December at City Hallgave an indication. It was attended by theMPS regional borough Senior Points ofContact (SPOC)s for business crime, and awide range of both private security providersand security managers who together

    represent the Private Security capabilityin London, all of which have potentialto collaborate closely with the police.There were statements of intent and

    COLLABORATIONKEY TO ENSURINGSAFER CITIESGeoff Zeidler, immediate past chair of the British Security

    Industry Association, who leads the Police and Security (PaS)Initiative, discusses the topic of Safe Cities and the work thatscurrently underway to develop best practice in London

    CITY CENTRES

    Written

    byGeoffZ

    eidler,Imm

    edia

    teP

    astCh

    air,

    theBritish

    SecurityIn

    dustryA

    ssociation

    CitySecurity

    THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com

    33Issue 22 |COUNTER TERROR BUSINESS MAGAZINE

  • 7/26/2019 Counter Terror Business 22

    34/84

    CASE STUDY

    ANIXTER PARTNERS WITH MULTINATIONAL TECH CONSULTANT

    TO HELP SECURE A LARGE CITY

    Products. Technology. Services. Delivered Globally.

    S U M M A R Y

    CustomerMultinational technology and consulting corporation

    Challenge

    Solution

    READY!SMDeployment

    READY!SMCamera

    Results

    Met tight implementation timeline

    Reduction of waste at the job site

    Improved adaptability for future upgrades

    Citywide-surveillance solution

    Customer ChallengeIn light of security challenges around the globe, cities are under increased pressure to provide a safe

    environment for their businesses and residents. Forward-thinking municipalities are proactively taking

    steps to assure they are doing everything possible to maintain the security of their citizens while not

    encroaching on the aspects that make city life appealing to residents and corporations alike.

    Leveraging its strength in public sector technology solutions, a multination technology and consulting

    company secured an assignment to develop and implement a s