Official Magazine of

MAY / JUNE 2018 www.worldsecurity-index.com

FEATURE: FEATURE: FEATURE: An Integrated Approach The Predator’s View: The World’s Biggest Marketplace Used in Nuclear Security Imperative for Critical Selling Internet Paralysing can be Adapted for Infrastructure Resilience DDOS Attacks Taken Down Protecting Critical National PAGE 14 PAGE 19 Infrastructure PAGE 9

COVER STORY Stopping Foreign Terrorist Fighters – can API and PNR play a part? Strategic Partner:

In Partnership with:

17th-19th July 2018 Including Cyber Security (CIIP) The Waterfront Hotel, Kuching, Sarawak, www.cip-asia.com

ONE-DAY SPECIALIZED TRAINING COURSE brought to you by:

further details at Developing resilient infrastructure www.cip-asia.com for a secure future Expert Speakers include: – Ir. Md Shah Nuri Md Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia Register Today for Early Bird Rates – Dato Dr Chai Khin Chung, Director, State Security Early Bird Deadline 17th June 2018 Unit, Sarawak, Malaysia – Franz-Josef Schneiders, Head of Division, Federal Register online at www.cip-asia.com/onlinereg Ministry of Transport and Digital Infrastructure, Germany The 3rd Critical Infrastructure Protection and Resilience Asia will bring together leading – Oliver Carlos G. Odulio, VP, Head of Asset stakeholders from industry, operators, agencies and governments to collaborate on Protection & Risk Management, PLDT Inc, securing Asia. Philippines – Elli Pagourtzi, Project Manager, Security for On behalf of the Organising Committee and co-hosts, the National Cyber Security Agency, Security Studies (KEMEA), Hellenic Ministry of CyberSecurity Malaysia and the State of Sarawak, you are invited to participate in the 3rd Critical Infrastructure Protection & Resilience Asia, taking place at The Waterfront Hotel, Interior, Greece Kuching, Sarawak, Malaysia on 17th-19th July 2018. – Sameer Sharma, Senior Advisor, BDT/International Telecommunication Union Southeast Asia has seen a rise in insurgency-related attacks and terrorist activities, – Sim Ko Sin, Vice President, ICT, Sarawak Energy, creating uncertainty and insecurity on critical national infrastructure. Malaysia – Munies Pillai, Director, Global E2C Pte Ltd and Climate change has also seen more extreme weather patterns, creating additional Senior Vice President of the Chartered International hazardous, unseasonal and unpredictable conditions and a severe strain on Institute of Security And Crisis Management infrastructure. – Senior Representative, Metropolitan Electricity The conference will look at developing existing national or international legal and Authority, Thailand technical frameworks, integrating good risk management, strategic planning and – Albert Chai, Managing Director, CISCO Systems implementation. Malaysia – Fazlan Abdullah, Head, Government Engagement, Register online at www.cip-asia.com/onlinereg International & Government Engagement Division, CyberSecurity Malaysia – Benjamin Ang, Senior Fellow & Head – Cyber, Leading the discussion on securing critical infrastructure Centre of Excellence for National Security (CENS) across ASEAN – Henry Ee, Chairman for Asia Chapter, Business Continuity Institute – Kenneth Chen, Managing Director, ASEAN, Gold Sponsor: Supported by: Media Partners: Symantec Asia Pacific, Singapore – JP Dunning, Principal Security Consultant, APAC Lead for Foundstone Services, McAfee, Australia – Ian Yip, Chief Technology Officer, Asia Pacific, McAfee, Australia Supporting Organisations: – Ir. V.R.Harindran, Sr. Custodian, I&C, Mechanical & Process Section, Group Technical Solutions, PETRONAS For full conference programme visit www.cip-asia.com

CIPRA2018 A4 Ad Reg May18.indd 1 22/05/2018 14:36:29 CONTENTS Strategic Partner:

In Partnership with:

17th-19th July 2018 Including Cyber Security (CIIP) The Waterfront Hotel, CONTENTS Kuching, Sarawak, Malaysia WORLD SECURITY REPORT www.cip-asia.com 5 Stopping Foreign Terrorist Fighters – can ONE-DAY API and PNR play a part? SPECIALIZED TRAINING COURSE Andrew Priestley takes a look at the impact API and PNR could brought to you by: have in identifying and stopping of foreign terrorist figters. further details at 9 An Integrated Approach Used in Nuclear Developing resilient infrastructure www.cip-asia.com Security can be Adapted for Protecting CNI Expert Speakers include: How the nuclear industry uses an approach to threat that for a secure future articulates the Design Basis Threat (DBT). – Ir. Md Shah Nuri Md Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia »»p.5 14 The Predator’s View Register Today for Early Bird Rates – Dato Dr Chai Khin Chung, Director, State Security Early Bird Deadline 17th June 2018 Unit, Sarawak, Malaysia – Franz-Josef Schneiders, Head of Division, Federal The Imperative for Critical Infrastructure Resilience. Register online at www.cip-asia.com/onlinereg Ministry of Transport and Digital Infrastructure, Germany 18 ASSOCIATION NEWS The 3rd Critical Infrastructure Protection and Resilience Asia will bring together leading – Oliver Carlos G. Odulio, VP, Head of Asset stakeholders from industry, operators, agencies and governments to collaborate on Protection & Risk Management, PLDT Inc, News and updates from the International Association of CIP securing Asia. Philippines Professionals. – Elli Pagourtzi, Project Manager, Security for On behalf of the Organising Committee and co-hosts, the National Cyber Security Agency, Security Studies (KEMEA), Hellenic Ministry of CyberSecurity Malaysia and the State of Sarawak, you are invited to participate in the 3rd Critical Infrastructure Protection & Resilience Asia, taking place at The Waterfront Hotel, Interior, Greece 19 World’s Biggest Marketplace Selling DDOS Kuching, Sarawak, Malaysia on 17th-19th July 2018. – Sameer Sharma, Senior Advisor, BDT/International Telecommunication Union Attacks Taken Down Southeast Asia has seen a rise in insurgency-related attacks and terrorist activities, – Sim Ko Sin, Vice President, ICT, Sarawak Energy, creating uncertainty and insecurity on critical national infrastructure. Malaysia With over 136 000 registered users and 4 million attacks, – Munies Pillai, Director, Global E2C Pte Ltd and Webstresser.org was considered the world’s biggest marketplace Climate change has also seen more extreme weather patterns, creating additional Senior Vice President of the Chartered International »»p.12 »»p.9 to hire DDoS Services. hazardous, unseasonal and unpredictable conditions and a severe strain on Institute of Security And Crisis Management infrastructure. – Senior Representative, Metropolitan Electricity 21 Security Technology, Protocols and People The conference will look at developing existing national or international legal and Authority, Thailand technical frameworks, integrating good risk management, strategic planning and – Albert Chai, Managing Director, CISCO Systems in Sync through Training implementation. Malaysia – Fazlan Abdullah, Head, Government Engagement, Today’s security plans include a wide variety of technology and Register online at www.cip-asia.com/onlinereg International & Government Engagement Division, techniques and require multiple levels of skill and knowledge for CyberSecurity Malaysia – Benjamin Ang, Senior Fellow & Head – Cyber, peak performance. Leading the discussion on securing critical infrastructure Centre of Excellence for National Security (CENS) across ASEAN – Henry Ee, Chairman for Asia Chapter, Business 23 AGENCY NEWs Continuity Institute – Kenneth Chen, Managing Director, ASEAN, Gold Sponsor: Media Partners: Supported by: A review of the latest news, views, stories, challenges and issues Symantec Asia Pacific, Singapore from enforcement agencies. – JP Dunning, Principal Security Consultant, APAC Lead for Foundstone Services, McAfee, Australia – Ian Yip, Chief Technology Officer, Asia Pacific, 26 industry news McAfee, Australia »»p.17 Supporting Organisations: – Ir. V.R.Harindran, Sr. Custodian, I&C, Mechanical Latest news, views and innovations from the industry. & Process Section, Group Technical Solutions, PETRONAS For full conference programme visit www.cip-asia.com

www.worldsecurity-index.com World Security Report - 3

CIPRA2018 A4 Ad Reg May18.indd 1 22/05/2018 14:36:29 www.worldsecurity-index.com

Editorial: Do we ever learn lessons Tony Kingham E: [email protected] from THE past? Contributing Editorial: Neil Walker E: [email protected]

During the 90’s and 00’s, in the post-cold war Design, Marketing & Production: Neil Walker world, politicians busied themselves talking about E: [email protected] the ‘new world order’, and consequently spending less and less on defence and security, cashing in Subscriptions: on the so-called ‘peace dividend’. Tony Kingham E: [email protected] Then 9/11 caused shockwaves around the world and was responded to with the ‘war on terror’. Indeed, it was in response to 9/11 that we World Security Report is a bi-monthly ourselves launched our own online news media electronic, fully accessible e-news service distributed to over 130,000 www.WorldSecurity-index.com in 2002. organisations globally. It tracks the full But throughout that period, I would continue to range of problems and threats faced bore anyone who would listen with warnings that by today’s governments, armed and security forces and civilian services and whilst terrorism was a dangerous menace that had looks at how they are dealing with them. to be confronted, the really big worries were still the old worries, primarily Russia. It is a prime source of online information I would argue that despite being a shadow of its former Soviet self and having and analysis on security, counter- terrorism, international affairs, warfare become a fledgling democracy; that democracy was only a fragile veneer which could and defence. be shattered at any time. And, that the Russian “Bear” still had huge teeth and fangs and a historical appetite for attacking its neighbours. Now we all know that western politicians can only see five years into the future, but what I found most disappointing during that period was that a whole generation of senior military leaders seemed to either share, or collude with the view that the old threats really were a thing of the past. Copyright of KNM Media and Torch Now 28 years on, we live in a world with a belligerent and resurgent Russia and Marketing. another old enemy lobbing missiles into the South China Sea. So, strangely, I now find myself worrying about the same thing, but in reverse. And that is, that as the so-called Caliphate collapses and operations against ISIS and Al Qaeda in Syria and Iraq wind down, that perhaps attention will shift away from terrorism and focus back on those bigger issues, the threats posed by Russia, North Korea and Iran, without properly finishing the job of defeating the terrorists and their perverse ideology. www.cip-asia.com As fighters disperse around the world and merge back into the societies they came from, they will exploit local grievances and reinvigorate local conflicts seeking to absorb these into their transnational ideology. We need to learn the lessons of the past and make sure we continue to devote enough resources to ensure that the battle against ISIS and AQ is ultimately won and not simply displaced, to be fought somewhere else. www.cipre-expo.com

Tony Kingham Editor www.ciprna-expo.com READ THE FULL VERSION The full version of World Security Report is available as a digital download at www.torchmarketing.co.uk/WSRMay18 www.world-border-congress.com NATIONAL SECURITY

Stopping Foreign Terrorist Fighters – can API and PNR play a part?

Andrew Priestley, Director of Agile Borders takes a look at the impact API and PNR could have in identifying and stopping of foreign terrorist figters across borders, and whether streamlining operations at airports can benefit national security away from airports.

I recently returned from a four- why the terrorist wasn’t identified in advance of them presenting week assignment in Central and stopped before they carried themselves at passport control. Asia where I was engaged by a out their attack. The United Nations PNR is the Passenger Name regional organisation to assist the has issued three resolutions Record, this is information which local authorities in developing mandating member states the government can request a roadmap to help with the implement API systems in the fight from airlines and relates to an implementation of an API system. against terrorism. individual’s booking details. PNR The authorities I was working with How useful is API and PNR in will contain information about other in Central Asia have a concern their identifying and stopping terrorists flights booked as part of the same country is being used to facilitate crossing borders when it is mainly journey, details about how and the return of Foreign Terrorist used at airports? when the ticket was bought and Fighters (FTFs) from terrorist the method of payment, and other training grounds. In the aftermath API is Advance Passenger information which can be very of terrorist attacks, attention is Information – the data airlines useful for identifying passengers always turned to the background collect from the machine-readable who may of interest to borders, of the perpetrator and whether or zone of passengers’ passports and and even intelligence not they travelled overseas to be other travel documents. This data agencies. trained in their deadly craft. If they is sent to the authorities before were, questions are always asked a passenger’s arrival at a border, API and PNR are very useful tools about how this was possible and allowing checks to take place in assisting with the management www.worldsecurity-index.com World Security Report - 5 NATIONAL SECURITY

of borders and are used in many countries around the world. According to the International Air Transport Association, IATA, around seventy countries globally have either implemented API or are in the process of doing so. Many countries are implementing or have plans to implement PNR.

Global terrorism is well organised and funded and has a lot of experience in moving people, money, and weapons across borders without detection. Most of this smuggling takes place at land borders. During a recent conversation a senior border suitable locations is that it allows Analytics tools compare passenger guard explained to me that a large passengers to be pre-screened data with watchlists of wanted section of his country’s border was prior to arrival. This means persons. Smart analytics tools use controlled by an infamous global each traveller can be checked fuzzy logic and smart matching terrorist organisation and that against a number of data sources techniques to suggest people who his focus was trying to overcome held by governments: Terrorist may be trying to avoid detection this issue. The airport border watchlists can be analysed, by changing their identity. Analytics was easy to manage as it was a criminal databases checked, tools are at the heart of API and 10-metre-long line painted on and the Interpol Stolen and Lost PNR projects, turning passenger the floor inside a building. This Travel Document database can be data into information, and border was well manned, located consulted. This is all well and good then potentially into actionable in a controlled environment, and as an attempt to stop travellers intelligence. traveller flow was determined who are using their own identities by the predictable arrival of A number of options are available and documents, but what happens international flights. How could to governments looking for such when a terrorist deliberately the use of passenger data improve tools: There are several companies attempts to hide their identity and the situation at his country’s land offering proven analytics systems uses a forged document? border? on a commercial basis. Some It is often simpler to change an of these use very advanced and Well the answer is that API is only existing identity rather than to complex matching techniques really of use if you can register assume a completely new one. to identify people who may be each traveller before they arrive at Many wanted travellers trying to trying to avoid detection and a border. It is difficult to collect and avoid detection base their false come with a price tag to match process API from people arriving identity on their genuine details, their capabilities and investment at checkpoints sporadically on sometimes changing their date of made in their development. foot or in private vehicles. There birth, misspelling their name, or Some governments are in the may be an opportunity to register perhaps changing their passport fortunate position of being able passengers on international bus number, in attempts to avoid to develop their own intelligence and train services. In this particular detection. Wanted persons who systems, the main benefit being scenario, of a an environmentally have changed their identity like that a system designed by the hostile mountain range with no this will not ordinarily show up organisation that will use it should official border crossing points, API when checking their passenger meet all requirements perfectly. and PNR is of little of no use. data against watchlists unless smart The downside of this approach is One of the key benefits of matching and analytics tools are that such systems are complex and good use of API and PNR at used.

6 - World Security Report www.worldsecurity-index.com NATIONAL SECURITY

Challenges to the accuracy of API arise when travellers check-in online and are travelling with hand luggage only. Many countries, including the UK, have removed physical exit checks for passengers departing their country. An identity check is made of a passenger before boarding a flight to ensure the name on the boarding pass matches the name on the travel document, but no attempt to collect or verify API is made. Travellers who check-in away from the airport and travel without hold luggage often encounter a border official for the first time on arrival at their destination. There could make take many years to perfect check, before being allowed to be errors in the accuracy of the and fine tune. There are a number proceed with their journey. The API they provided while checking of governments who donate vast majority of travellers are of in online; the travel document systems to other countries in an no interest to border authorities number could be incorrect – effort to increase global security, whatsoever. especially if the traveller has more some of these donated systems While API and PNR can be than one passport. The date of come with strings attached in the very useful tools in assisting birth and document expiry may be form of data sharing agreements authorities with proactive border incorrect. This may be easy to spot with the recipient of the system management, these data sets if someone’s date of birth is listed having to share passenger data may not be the silver bullet some as being an impossible date, such with the donor country. governments are expecting. Even as 30th February 1999 entered There are plenty of options to the most advanced analytic tools as 30/02/1999. Such an error consider when employing API and rely on accurate, good quality data would be less obvious if plausible PNR solutions in the fight against being delivered on time. If data entries had the month and the global terrorism, but are these contains errors, is not correctly day transposed, for example solutions which are deployed formatted, or is false, then no 03/02/2001 is 3rd February mainly at air borders really helping amount of analysis is going to yield 2001 according to international catch terrorists? Some will be useful results, to use a well-worn convention, but in some parts of caught travelling by air either phrase analytics is definitely a case the world this date could equally under their genuine or an assumed of ‘junk in – junk out’. be March 2nd 2001. People identity. Many will continue to try seeking to avoid detection may API is usually collected when a to travel avoiding the now heavily deliberately enter incorrect data. passenger checks in for a flight. If secured air borders chancing Validation of API is key to ensure this happens at a check-in desk at their luck at land and sea borders, accuracy of the data, some less an airport, the machine-readable sometimes crossing at recognised capable analytics tools may miss a zone of traveller’s passport or other entry and exit points, sometimes potential match against a watchlist. travel document is scanned and not. the data collected. As a result of Technology may be able to play API and PNR allow agencies the automatic reading of the travel a part in improving the accuracy working at the border to pre-screen document the data collected is of API. Most frequent travellers travellers before they arrive. This certain to be correct. Of course, make use of smart phones means that travellers who are the travel document needs to be and computers when checking not of interest can be processed genuine, but if it is, API collected in for flights. Some airlines very quickly on arrival by means by scanning the machine-readable are developing their mobile of a travel document and identity zone is accurate. applications to use the camera on www.worldsecurity-index.com World Security Report - 7 NATIONAL SECURITY a smartphone to read the travel this would add to the time taken to general, borders are easier to cross document, adding a greater level board an aircraft and would impact and safer as a result of knowing of certainty to the accuracy of the on the efficiency of airports and who is coming in advance of their data provided. airlines. arrival.

In order to improve accuracy of Online check-in has improved API and PNR allow border API for travellers whose travel efficiencies at the airport as the operations at airports to be documents are not scanned at number of travellers needing to streamlined, meaning more effort the airport or by a mobile device, queue to see a check-in agent can be made securing borders steps may be needed to ensure the has reduced dramatically. This away from airports. A few extra data being provided is accurate. A improvement in efficiency has border guards and customs agents swipe of each traveller’s document led to a potential issue for border freed up at every international at the departure gate could be security which needs to be airport might just make a difference introduced to ensure accuracy, but acknowledged and managed. In in the global fight against terrorism.

December 4th-6th, 2018 Orlando, Florida, USA

The ever changing nature of threats, whether natural through - Chemical Sector climate change, or man-made through terrorism activities, either - Commercial Facilities Sector physical or cyber attacks, means the need to continually review and update policies, practices and technologies to meet these - Communications Sector growing demands. - Critical Manufacturing Sector - Dams Sector - Defense Industrial Base Registration Now Open Sector th th Register today and benefitDecemb fromer 4Early-6 , Bird2018 delegate fees - Emergency Services Sector Orlando, Florida, USA For further details visit www.ciprna-expo.com/registration - Energy Sector - Financial Services Sector There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital - Food and Agriculture Sector to the United States that their incapacitation or destruction would - Government Facilities Sector have a debilitating effect on security, national economic security, - Healthcare and Public Health national public health or safety. Sector Critical Infrastructure Protection and Resilience Americas brings - Information Technology together leading stakeholders from industry, operators, agencies Sector and governments to debate and collaborate on securing America’s - Nuclear Reactors, Materials, critical infrastructure. and Waste Sector Join us in Orlando, Florida for the premier event for operators - Transportation Systems and government establishments tasked with the regions Critical Sector Infrastructure Protection and Resilience. - Water and Wastewater For more information visit www.ciprna-expo.com Systems Sector

To discuss exhibiting and sponsorship opportunities and your involvement contact: Paul Gloc Paul McPherson Sam Baird (UK and Rest of Europe) (Americas) (Germany, Austria, Switzerland, Israel) E: [email protected] E: [email protected] E: [email protected] T: +44 (0) 7786 270 820 T: +1-240-463-1700 T: +44 7770 237 646

Jerome Merite Annabel McQueen Vishal Mehta (France) (Benelux) (India) E: [email protected] E: [email protected] E: [email protected] T: +33 (0) 6 11 27 10 53 T: +44 20 8249 6152 T: +91 99 999 85 425

Leading the debate for securing Amercia’s critical infrastructure

Owned & Organised by: Supporting Organisations: Media Partners:

CIPRUS18 A5 Reg Advert.indd 1 22/05/2018 15:00:50 8 - World Security Report www.worldsecurity-index.com NUCLEAR SECURITY

An Integrated Approach Used in Nuclear Security can be Adapted for Protecting Critical National Infrastructure

If a serious incident were to occur, either through accident or deliberate malicious action, the consequences can have national and international effects, as can be seen from the incidents at Fukushima Daiichi (2011), Chernobyl (1986) and Three Mile Island (1979).

Thus, to help prevent malicious the Design Basis Threat (DBT); a mean the obvious, such as nuclear threats against the industry there national document developed by material (NM) and operational are international conventions, such the State for dutyholders, those reactors; nuclear power plants as the Convention for the Physical companies and organisations that or research reactors. It can also Protection of Nuclear Material own and operate nuclear facilities, involve the systems, structures and (CPPNM) and the United Nations need to design, operate and components (SSC) that maintain (UN) International Convention for maintain their Physical Protection the safety arrangements for the the Suppression of Acts of Nuclear System (PPS) to counter threats. NM, other radioactive materials Terrorism. Those conventions led Specific documents provide advice such as sources, and the computer to best relevant practice guidance and guidance on the development based systems important to safety published by the International and maintenance of the DBT; (CBSIS) and security (CBSISy). The Atomic Energy Agency (IAEA) in and issues such as countering cornerstone of every security plan their Nuclear Security Series (NSS). the Insider Threat, a challenging is the identification of Vital Areas Among the documents in the NSS subject relevant to all organisations at nuclear facilities. This activity are many that will be of value to all whatever their focus may be. is the backbone that indicates organisations that need to protect the potential amount of material All security departments need assets against threats. that could be subject to theft, to understand their assets that and the potential significance of The nuclear industry uses an need to be protected, and for the any unacceptable radiological approach to threat that articulates nuclear industry that does not just www.worldsecurity-index.com World Security Report - 9 NUCLEAR SECURITY consequences (URC) through the release of material. It is at this point, where security specialists need their safety colleagues, and those in plant or facility operations, to help in determining the assets to be protected.

The nuclear industry, to prevent nuclear material and other radioactive materials, from becoming a hazard to the public or environment, have three main specialist groups working towards that overall protection strategy; safety, security and safeguards; the Triple S.

The aims for the individual specialisms are:

- Safety is aimed at protecting workers and the public from the harmful effects of radiation (or chemicals or other hazards);

- Security is aimed at preventing malicious acts that might harm a nuclear facility (sabotage) or result in the loss (theft) of nuclear materials; and

- Safeguards are aimed at preventing the diversion of Nuclear Security or Security nuclear materials from a civil nuclear programme to Informed Nuclear Safety) approach nuclear weapons purposes. to asset identification, security The 3Ss share the same overall objectives of protection design and regulatory compliance. and use similar principles to achieve protection; Defence in Depth multiple barriers, defence in depth, decision analysis and consequence assessment. However, if they work Safety and Security both use predominantly in silos then compromises inevitably the concept of defence in depth occur for operations and costs are inevitably higher than to minimise the likelihood that necessary. the failure of one aspect of their preventative arrangements will However, as Safeguards is a uniquely nuclear lead to the compromise of an consideration it will not be addressed further in this article. asset; accident for safety and The practical integration of Safety and Security to deliver malicious action for security. This enhanced outcomes concept of defence in depth is shown in the bowtie diagram at The National Nuclear Laboratory (NNL), a Government Figure 1. Defence in depth can also Owned Commercially Operated (GOCO) company in be applied to the arrangements the United Kingdom that operates a number of unique to mitigate the potential national assets has employed a SINS (Safety Informed consequences of any failures; i.e. the emergency plans and counter- terrorism arrangements.

Security into Design

NNL are using an approach similar to that depicted in Figure 2 that identifies assets and potential radiological consequences, creates the design of the Physical Protection Systems (PPS) for the facility, and conducts the vulnerability assessment to determine whether the required security outcome is achieved. The system is iterative so that changes in inventory, arrangements, Figure 1: Preventative and Preparedness Controls as a Bowtie Diagram threats and vulnerabilities can be

10 - World Security Report www.worldsecurity-index.com NUCLEAR SECURITY adequately addressed to maintain cover radiological consequence modelling, radiological or achieve the desired situation. hazard analysis, Probabilistic Safety Assessment (PSA), Serious Accident Assessment (SAA), internal and external The expression Physical Protection hazards, and layout design all contribute to identifying Systems encompasses the potential Vital Areas. Many of the hazards requiring entirety of physical and technical protection are unique due to the nature of the asset security equipment, procedures, requiring protection, and based upon the material personnel security, cyber security properties, but the principles of protection are equivalent and information assurance, and to those for other sensitive assets. guarding and armed response forces. The design basis accidents for safety and the design basis threats (DBT) for security approaches in both specialisms This approach brings together the guide designers, practitioners and assessors to adequately best relevant practice promulgated consider those threats that may need to be countered. by the UK’s Centre for the Protection of National Infrastructure Safety and security both use a graded approach. (CPNI) in the form of Operational Requirements (OR), and the Office for Nuclear Regulation (ONR) Security Assessment Principles (SyAPs). The SyAPs consider security outcomes against the functions of Delay, Detection, Assessment, Control of Access and Insider Mitigation, and the individual security components of the OR can be reasonably effectively mapped onto those functions.

Using the approach in Figure 2 NNL have been using their security and safety specialists in a SINS team to aid a customer in developing their concept design 2nd-4th October 2018 for a new capability, and to create The Hague, Netherlands Site Security Plans for their own www.cipre-expo.com facilities to meet new regulatory guidance and confirm adequacy of REGISTER ONLINE TODAY their arrangements. Working together for enhancing security

The SINS approach has involved all Part of: specialists to work in a collegiate UN Member States need “to share information […] to prevent, protect, mitigate, investigate, respond to and recover from damage from manner, share professional terrorist attacks on critical infrastructure facilities, including through approaches to optimise outcomes joint training, and use or establishment of relevant communication or emergency warning networks.” and engage a learning attitude that has upskilled all those involved. Critical Infrastructure Protection and Resilience Europe brings together leading stakeholders from industry, operators, agencies and It has also delivered a strong governments to debate and collaborate on securing Europe’s critical evidence base to underpin the infrastructure. claims, argument and evidence For further details and latest developments visit www.cipre-expo.com approach towards meeting outcomes based regulation. Leading the debate for securing Safety and Security Synergies Europe’s critical infrastructure As previously mentioned nuclear security requires extensive safety Hosted by: Supporting Organisations: Media Partners: input for the identification of Vital Areas. Safety assessments skills

www.worldsecurity-index.com CIPRE2018 A5 CSW Ad.indd 1 World Security R22/05/2018eport 14:56:01- 11 NUCLEAR SECURITY

Control and Management efforts are organised and structured. Those arrangements are depicted schematically in the Bowtie diagram (Figure 1) with the aim of minimising the impact on the plant, people, public and environment. These are all considerations that need to be addressed by Critical National Infrastructure (CNI) facilities and organisations

The UK adopts a risk-based approach, enabling operators to ascertain the appropriate arrangements commensurate with the risk. As such approaches and methods used in the minimisation of impact for radiological consequence through ‘As Low As Reasonably Practicable’ (ALARP) practices in safety are commensurate with those used by security through the use of risk management practices to manage potential vulnerabilities identified through PPS evaluation activities.

Safety and security in the nuclear industry both encourage and embrace Advisory Missions and inspections; from the World Association of Nuclear Operators (WANO), Integrated Regulatory Review Service (IRRS) and Operational Safety Review Team (OSART) for safety; and from the International Physical Protection Advisory Service (IPPAS) for security.

Safety and security both attempt to foster positive cultures that identify and report problems and issues. Figure 2: An Approach to Asset Identification, Security Design and Vulnerability Assessment However the transparent and open communications of safety may conflict with the ‘need to know’ The relative importance of accident prevention and principles employed in security. mitigation measures is expressed in terms of the adverse Appropriate implementation of consequences for public and worker health. Likewise ‘need to know’ principle where the relative importance of security measures is directed consideration is given to what is towards preventing and limiting what are considered high ‘needed to be known’ can direct and low radiological consequence events. appropriate filtering and redaction Considerations on the speed of progress of an so that appropriate interactions incident are important when viewed from the different can occur without compromising perspectives, where for example security is trying to security of materials or information. counter a malicious attack, and safety is countering an For example, consequence accident. This influences how Prevention, Response, assessors do not need to know the

12 - World Security Report www.worldsecurity-index.com NUCLEAR SECURITY locations or means that material can be acquired by a perpetrator to undertake the assessment.

Thus, by fostering an approach that integrates both safety and security in a mutually supporting manner through peer-to-peer and other challenges of behaviours creates the opportunity for reinforcement of positive behaviours.

In summary, many of the principles and approaches used within nuclear security are directly transferable to other areas of the critical infrastructure, and the protection of high value assets.

Robert Rodger, Senior Technical Lead, National Nuclear Laboratory.

Jeremy Edwards, Technical Manager. Nuclear Security, CBRN and Resilience, National Nuclear Laboratory.

REFERENCE

www.worldsecurity-index.com World Security Report - 13 INFRASTRUCTURE SECURITY

The Predator’s View

Circa 1832, Prussian General and Military Theorist Carl Von Clausewitz noted : “War is not merely an act of policy but a true political instrument, a continuation of political intercourse carried on with other means.” Long before Clausewitz and to this day, adversaries have sought and seek to identify, corrupt, disrupt, degrade or destroy capacities that enable their foes to inflict their will and objectives.

America’s decades-long efforts eliminate any resistance within it. Fast forward to the Information Age. to protect, and with the February In 1943, a Norwegian hydrogen In the aftermath of Operation Desert 2013 publication of Presidential plant producing “heavy water” was Storm and America’s and her Allies’ Policy Directive 21, ensure “Critical attacked and destroyed by Allied stunning victory over Iraq’s Army (then Infrastructure Security and Resilience,” Saboteurs and a subsequent raid by the world’s fourth largest), the Chinese demands awareness, understanding 140 U.S. bombers. Not unlike Rome’s People’s Liberation Army initiated and appreciation of “the predator’s aqueducts, the plant was a Single a study that is captured in its 1998 view .” Adversaries see America, Point of Failure whose destruction publication, “Unrestricted Warfare.” Americans, and/or anything (and the subsequent sinking of The study concluded that information contributing to the nation’s safety, the Norsk, a ferry transporting the was the key to the American and Allied security, quality of life and future, as remaining inventory of heavy water) victory and offered means to neutralize legitimate targets. Given their inherent effectively terminated Nazi efforts to what could be termed “America’s capacities to both empower and inflict build an atomic bomb. Conversely, Nervous System.” As a result, the consequences, this is especially true Japanese failure to neutralize critical Chinese (and any predator engaged in of America’s interdependent critical infrastructures is evident in their cyber probes and attacks) understand infrastructures — cyber and physical. December 7, 1941 attack upon that it is no longer necessary to Pearl Harbor. While Japan scored physically destroy a technology-reliant The absence of understanding and a stunning tactical victory along nation to inflict its will upon it. appreciation of the predator’s view Battleship Row, its failure to attack has been evident throughout history. maintenance and fuel storage They have discovered a more In 410 AD, the Goths laid siege to facilities adjacent to it (then a Single antiseptic and efficient approach: Rome and captured it after identifying Point of Failure for the Pacific Fleet) Attack interdependent and cyber- aqueducts as a Single Point of Failure was a strategic blunder that greatly reliant critical infrastructures and whose degradation would halt the accelerated the demise of the produce consequences of potentially flow of water into the city and thereby Japanese Empire. unprecedented scope, intensity

14 - World Security Report www.worldsecurity-index.com INFRASTRUCTURE SECURITY

and duration and, in the process of doing so, degrade social cohesion — the heart of a nation’s ability to defend itself. From The Predator’s View, validating that approach is its recognition of a valuable contradiction: America’s rapidly increasing reliance on the Internet and supporting telecommunications capacities is significantly outpacing its ability to assure their availability and security. The predator’s conclusion: America is the most Internet-reliant nation on Earth and for whatever reason is creating the instrument of its demise, its own Achilles Heel — a Single Point of National Failure. Consistent with this reality, Former FBI Director James Comey has repeatedly and very correctly warned: “Cyber is not a thing — it’s a vector. ” Despite popular perception that the Internet it has evolved into an “Internet of Things,” the truth is it has There are numerous examples of recognize our apparent tolerance for become “The Internet of American predator success in walking their talk. infrastructure degradation and failure, Life.” As evident from near daily press Among them are: tendency to rationalize events and accounts, all manner of global cyber equate the absence of immediate 1. China’s aggressive behaviors in predators routinely and successfully consequence(s) with success in the Pacific and its version of the F-35, probe, map and attack the information preventing them. America’s most advanced stealth strike infrastructure that is “America’s fighter; The Predator’s View and the trajectory Nervous System.” The nation therefore of infrastructure preparedness has not now finds itself at the crossroads of 2. Russia’s employment of Cyber gone unrecognized. Over a decade Internet reliance and availability. Warfare in Georgia and the Ukraine; ago, in the midst of the continuing Any continuity professional will warn 3. Russian and/or Chinese attacks consequences of a long-predicted that it is both illogical and irresponsible against State Department and White failure of a critical infrastructure and to rely on something over which you House networks; and single point of community failure have limited or no control. While the in New Orleans, the Homeland term “lessons learned” is frequently 4. Secretary of State John Kerry’s Security Advisory Council’s (HSAC’s) used in America as a means of remarks: “It’s very likely Russia and review of Critical Infrastructure cognitively balancing catastrophic China are reading my e-mails. ” Protection programs resulted in its events, predators know the real metric formally recommending that the Through predators’ eyes, great reliance of a lesson learned is a change in Homeland Security Secretary make enables great consequence. The behavior and conditions at points Critical Infrastructure Resilience Predators View is long and patient. of actual or potential impact. From (CIR) the national goal . Three The Predator’s View, America has They perceive America as living in years ago, that goal was captured consistently produced only changes the moment rather than in the reality in Presidential Policy Directive-21 in rhetoric. Predators appreciate and continuity of time and history. “Critical Infrastructure Security and America’s use of terms like “Cyber While recognizing English is a very Resilience.” While these documents Pearl Harbor,” “New Normal,” and the flexible language, predators also see very clearly set the requirement, “Internet of Things.” They recognize in America’s rhetoric a homogenization progress in physically achieving CIR that such characterizations understate of otherwise incompatible terms. remains obscure at best. Operationally reality and are useful in pacifying the Specifically, its equation of iteration proven CIR mindsets, metrics, masses and slowing efforts to eliminate with innovation, process with progress, methodologies and technologies vectors otherwise increasingly activity with accomplishment, and have been and remain immediately capable of inflicting human, physical, rhetoric with results. From the nation’s available for implementation. economic and social consequences of habit of providing timely and accurate The decision to execute will unprecedented scope, intensity, and reporting of the effects of attacks herald and be the foundation of duration. on America’s Nervous System (its an advanced infrastructure and information infrastructure), predators www.worldsecurity-index.com World Security Report - 15 INFRASTRUCTURE SECURITY

Combined, the expertise and placement of InfraGard members throughout the nation advances the ability of the FBI and its federal partners to identify and address threats to America’s critical infrastructure(s), and identify infrastructure performance shortfalls and Single Points of Failure throughout the nation. InfraGard is also a key source of the timely, accurate and actionable information required to attain and sustain the security and operational resilience of America’s critical infrastructures — to include the creation of a Minimum Essential National Infrastructure that, true to its name, will (short of Global Armageddon) provide sufficient infrastructure capacities to sustain American life. In a nutshell, InfraGard meets the spirit, intent and letter of what Governor Tom Ridge, the first national preparedness culture that is single points of infrastructure failure are Department Homeland Security (DHS) performance-based, comprehensive, identified and eliminated, and (beyond Secretary, had in mind when he set nationally compatible, objectively information sharing) actionable, trust- the Department’s mission culture, measurable, achievable and building, question and answer-based created and led DHS’s execution of sustainable. Given increasing information exchange originates. the following maxim: “When America’s predator exploitation of the “vector” hometowns are secure, the homeland the Internet has become, achieving With 50,000+ members deployed will be secure.” and sustaining CIR is now the most in 84 communities throughout the Turning to CIR execution, Einstein fundamental and urgent of homeland nation, InfraGard Chapters work in is quoted as saying: “If you can’t and national security goals. concert with local FBI Field Offices and constitute America’s greatest explain it simply enough, you don’t Among others, President Ronald resource for achieving and sustaining understand it well enough.” Consistent Reagan captured the dangers of not CIR — and by extension — national with that truth, the objectively eradicating dangers: “Status quo you resilience. InfraGard members measurable and operationally know is Latin for the mess we are in represent infrastructure service proven CIR process is captured in the .” Given the above and far more, the providers, businesses, local and following Venn diagram: question remains: How does America state government agencies, clean-up “. . . the mess we are in?” academic institutions, emergency responders, faith- The good news is that despite the based organizations and current and rapidly mounting dangers state, local and federal law looming on its horizon, America enforcement agencies - all of has the experience (among others, which support the continuity of the Year 2000 Transition), ingenuity infrastructure operations in all and means to deal with existential 16 interdependent infrastructure threats to its cyber-reliant critical sectors. infrastructures. CIR is an advanced infrastructure preparedness condition InfraGard’s Sector Chief Program that is symbiotic with existing critical and Special Interest Groups at infrastructure sector organization, the local and national levels form protection and security programs. a network that provides proven CIR, like anything built to last, is experience and expertise in constructed and maintained from both sector and cross-sector issue CIR implementation requires the ground up. In this case, from identification and resolution, and in entities ranging from individuals and American communities, where the institutionalization of continuous businesses to communities, regions all interdependent infrastructure innovation and improvement in the and the nation to: operations naturally fuse and from protection, security and resilience of 1. Identify the cyber and physical where knowledgeable infrastructure the nation’s critical infrastructure(s). infrastructure capacities that are critical performance requirements are set,

16 - World Security Report www.worldsecurity-index.com INFRASTRUCTURE SECURITY

to their daily lives and operations; 4. Informs coherent investment in critical infrastructure (to include 2. Decide how long (time) any entity is creation of a Minimum Essential willing to be without what is critical to National Infrastructure); it; and 5. Creates an American Renaissance 3. Identify and/or create the adaptive - a culture and resulting actions that capacities required to deliver critical enables continuous infrastructure infrastructure capacities within the time innovation, investment and robust any entity is willing to be without them. job creation to modernize and make When implemented, CIR provides resilient America’s infrastructure for the “predictable provision of foundations and all they empower; The Predator’s View: The Imperative essential infrastructure products and for Critical Infrastructure Resilience and services and empowerment of By Jeff Gaynor, Colonel, U.S. Army 6. Builds national unity by enabling all (ret.) ,Former President, Chief essential functions© .” It is a proven, Americans to work simultaneously in pragmatic, risk-based, performance- Executive Officer and Director, Board their best interests and ultimately in the of Directors, InfraGard National driven, nationally comprehensive best interests of all. and compatible, achievable and Members Alliance sustainable infrastructure operating BOTTOM LINES: Sober recognition, Previously published in The Executive and preparedness standard. Its understanding and appreciation Journal of InfraGard San Diego achievement will leverage the power of The Predator’s View are the first (Volume 1, Issue 3). Copyright © inherent in America’s freedoms and steps in countering their objectives. 2016 InfraGard San Diego Members its citizens’ independence, innovative What Americans take for granted Alliance. Reprinted with permission spirit and technological supremacy. as things common to our everyday of InfraGard San Diego Members The continuous application of lives, predators of all stripes from the Alliance. resilience mindsets, improvement “lone wolf” to nation-states and their effected by always questioning allies, view as legitimate targets. The the status quo, its metric (time), question remains whether CIR will methodologies (illustration above), and be executed proactively and with innovations (e.g., cyber indications and precision or reactively and chaotically warning); will: in the wake of yet another otherwise preventable tragedy. 1. Balance a national preparedness culture that is currently heavily focused America has the responsibility and on response and recovery; and ability to correct its increasingly infrastructure-enabled and 2. as General Russel Honoré, Task consequence amplifying preparedness Force Katrina Commander, noted: trajectory. In the process of doing so, will get America to “. . . the left America will disrupt the designs of side [prevention and continuity of global predators, reclaim control of operations] of the event horizon.” its enablers, and build the foundation While time is the metric of resilience, for a safer, stronger and more it is no longer on America’s side. The secure nation for present and future critical infrastructure reliance culture generations. must be replaced with a critical Time is the metric of resilience, but it is infrastructure resilience culture that clearly no longer on America’s side. continuously: 1. Identifies and eliminates all single points of infrastructure failure; 2. Distorts “the predator’s view”; 3. Reduces infrastructure target values and the immediate and cascading consequences of attacks upon, or failures of, those targets regardless of cause;

www.worldsecurity-index.com World Security Report - 17 ASSOCIATION UPDATE

In the Age of Uncertainty We Need More Cooperation and Coordination

John Donlon Chairman International Association of CIP Professionals (IACIPP)

As we all know - we live in an age of uncertainty – we are We promote regional dialog by appointing 5 Regional continually facing new and unforeseen threats to our security. Directors including our latest appointment Professor Matthew Warren, as Regional Director for Australasia. The ever-changing nature of those threats, whether natural through climate change, or man – made through terrorism We have also established a communication network with activities, such as physical or cyber-attacks. regular email Newsletters and enjoy the support of the World Security Report This means that to be able to act quickly and effectively we have to continually review and update policies, practices and Last year we launched our global members extranet www. technologies to meet these ever-growing demands. IACIPP.net, a vital tool in supporting our community and facilitating the exchange of appropriate infrastructure related Critical infrastructure must be secure and able to withstand and information and maximise networking opportunities. rapidly recover from all hazards. The Association continues to develop and we have a number of Achieving this requires integration within the national activities we plan to deliver before Critical Infrastructure Protection preparedness systems across – Prevention – Protection – and Resilience Europe in October this year, these include: Mitigation - Response and Recovery. - Continuing to develop the range and scope of our Working It also requires sustainable Connectivity - Coordination - Groups. In particular around transport - energy - telecomms Cooperation and Communication between all those who are – cyber. involved within the world of CIP. - Producing a Digital Aide Memoir for CIP practitioners around As an association we continue do our best to facilitate this the world. process in a number of important ways. - Delivering some bespoke educational programmes around some generic threats such as Terrorism and Cyber and also By co-hosting key events around the world, including: some more specific areas such as Physical Security - Critical Infrastructure Protection and Resilience Asia - And of course, we want to continue to grow our membership (www.cip-asia.com) globally. - Critical Infrastructure Protection and Resilience Europe (www.cipre-expo.com) So, if you are involved in critical infrastructure protection, please - Critical Infrastructure Protection and Resilience North America don’t hesitate to get in touch via [email protected]. (www.ciprna-expo.com) The IACIPP Poll In addition to these events we also support other key events both Myself and our Eastern European Director, Robert Mikac In the last issue we asked you the following question. were delighted to have recently taken part in the 3rd edition Now see the answers... of the International Conference “CRITICAL INFRASTRUCTURE Where do you see cybersecurity certification of Operational PROTECTION FORUM – CIP FORUM III 2018 - Council of Technology’s (ICS / Scada) components fit best? the European Union Presidency 2019. Building Resilience 1. Defense 0% in European Critical Infrastructure”, which took place in Bucharest, at the Palace of the Parliament, between 24-25 of 2. Nuclear 0% April, 2018. 3. Energy 13% 4. Transport 6% The event was attended by more than 700 guests representing 5. Telecomms 6% 125 institutions from 29 countries. The conference benefited 6. All of them 69% from 71 speakers representing ministries, public authorities 7. None of them 0% and private institutions, under the aegis of 10 universities and Visit www.cip-association.org to see the latest poll. research institutes with expertise in the field.

18 - World Security Report www.worldsecurity-index.com CYBER SECURITY

World’s Biggest Marketplace Selling Internet Paralysing DDOS Attacks Taken Down

Webstresser.org sold Distributed Denial of Service attacks that could knock the internet offline for as little as EUR 15.00 a month

The administrators of the DDoS marketplace webstresser. Devastation for hire org were arrested on 24 April 2018 as a result of Operation Power Off, a complex investigation led by the Dutch In a DDoS attack enabled by such a service, the attacker Police and the UK’s National Crime Agency with the remotely controls connected devices to direct a large support of Europol and a dozen law enforcement agencies amount of traffic at a website or an online platform. from around the world. The administrators were located Whether this traffic eats up the website’s bandwidth, in the United Kingdom, Croatia, Canada and Serbia. overwhelms the server, or consumes other essential Further measures were taken against the top users of this resources, the end result of an unmitigated DDoS attack marketplace in the Netherlands, Italy, Spain, Croatia, the is the same: the victim website is either slowed down past United Kingdom, Australia, Canada and Hong Kong. The the point of usability, or it’s knocked completely offline, illegal service was shut down and its infrastructure seized in depriving users from essential online services. the Netherlands, the US and Germany. It used to be that in order to launch a DDoS attack, one Webstresser.org was considered the world’s biggest had to be pretty well versed in internet technology. That is marketplace to hire Distributed Denial of Service (DDoS) no longer the case. With webstresser.org, any registered services, with over 136 000 registered users and 4 user could pay a nominal fee using online payment million attacks measured by April 2018. The orchestrated systems or cryptocurrencies to rent out the use of stressers attacks targeted critical online services offered by banks, and booters. Fees on offer were as low as EUR 15.00 a government institutions and police forces, as well as victims month, thus allowing individuals with little to no technical in the gaming industry. knowledge to launch crippling DDoS attacks.

www.worldsecurity-index.com World Security Report - 19 CYBER SECURITY

“Stresser websites make How can DDoS attacks paralyse the internet powerful weapons in the hands of cybercriminals” said Jaap van Oss, Dutch Chairman of the Joint The criminal hires a Paid via popular DDoS attack service online payment Cybercrime Action Taskforce on the internet services and (J-CAT). “International law CRIMINAL cryptocurrencies enforcement will not tolerate these illegal services and will continue to pursue its admins and users. This joint operation is yet another successful example of the ongoing The DDoS service DDoS services claim launches the attack to be legal but they international effort against these using their own LAUNCH ATTACK are not destructive cyberattacks.” attacking infrastructure DDoS-FOR-HIRE SERVICE DDoS-ing is a crime

DDoS attacks are illegal. Many IT enthusiasts get involved in seemingly low-level fringe cybercrime activities, unaware of the consequences that such crimes carry. The penalties can be severe: if you conduct a DDoS attack, or INTERNET USERS make, supply or obtain stresser or The DDoS attack overloads the servers booter services, you could receive of essential internet a prison sentence, a fine or both. services and makes them inaccessible for NO ACCESS The individuals that become regular users involved in cybercrime often have a skill set that could be put to a positive use. Skills in coding, gaming, computer programming, International law enforcement cyber sweep cyber security or anything IT-related are in high demand and there are International police cooperation was central to the success many careers and opportunities of this investigation initiated by the Dutch National High available to anyone with an interest Tech Crime Unit and the UK National Crime Agency, as the in these areas. administrators, users, critical infrastructure and victims were scattered across the world.

Europol’s European Cybercrime Centre (EC3) and the Joint Cybercrime Action Taskforce (J-CAT) supported the investigation from the onset by facilitating the exchange of information between all partners. A command and coordination post was set up at Europol’s headquarters in The Hague on the action day.

“We have a trend where the sophistication of certain professional hackers to provide resources is allowing individuals – and not just experienced ones – to conduct DDoS attacks and other kind of malicious activities online”, said Steven Wilson, Head of Europol’s European Cybercrime Centre (EC3). “It’s a growing problem, and one we take very seriously. Criminals are very good at collaborating, victimising millions of users in a moment form anywhere in the world. We need to collaborate as good as them with our international partners to turn the table on these criminals and shut down their malicious cyberattacks.”

20 - World Security Report www.worldsecurity-index.com SECURITY TRAINING

Security Technology, Protocols and People in Sync through Training

Most of us admire the skill and ability of today’s racecar teams. Some of us may have even entertained becoming part of one. However, without first understanding how an open wheel car works and how every person, part and track affects the ride, it would be impossible to get anywhere. The same holds true for inspection technology, security protocols and the personnel responsible for implementing the plan. Today’s security plans include a wide variety of technology and techniques and require multiple levels of skill and knowledge for peak performance. Like a championship racecar team, each individual needs to know more than their part; and when they are all working in sync, the result is a winner.

Security has become paramount in As threats evolve, protocols change security plan, it becomes apparent that today’s infrastructure. Whether airports, and technology becomes more the more knowledge and experience stadiums, ports or border transit powerful and sophisticated the most they have the better they will perform. points, security plans include areas important component of a plan -- the Training is the key to successful managed by security staff, technology people -- must remain well informed security programs. Training personnel or a combination of both. In addition, and consistently up to date. to perform their duties, use their non-security staff need to aware of technology, understand the plan and Syncing up personnel and technology what look for and how to handle issues interact with the public takes the right if they arise. All of this happens amidst When considering the different types experience, the best message and the the public while not showing them of individuals employed in the security easiest delivery system. what’s under the hood. It’s a tall order industry and how they are to use Consider a volunteer at a world-class for any security plan to contain. their assigned technology within the www.worldsecurity-index.com World Security Report - 21 SECURITY TRAINING

event. It’s possible this volunteer is • Interaction and preparedness of the by experts in process, protocol and going to be checking tickets with a public engineering makes for varying levels of barcode scanner before the security education for each role. • Improved experience with security checkpoint at the entrance, directing technology Bundling these levels under one roof, fans to the nearest concession stand where the agency or company can and operating the VIP section during Current conditions: manage all personnel assists with the multi-day event. What does this Compartmentalized and confused keeping staff up to date with their person need to know about security? skills and allows new information to Ideally, training volunteers in general The public, although very aware of disseminate quickly. security techniques as well as their the kinds of security issues they may encounter today, expect that the specific duties would be a requirement, Modern training: Key questions but today also training volunteers agencies charged with providing on advanced security protocols and security are well informed and will Those responsible for implementing helping them understand how the know what to do if a problem were to security protocols have in the past, technology works gives them the tools manifest. Part of that contract with the focused on basic issues when to interact with the public and provide public is for all parts of a security plan purchasing training: time and costs. important information in the event of to come together and work in sync to Now is the time to be asking how your an emergency. mitigate and respond to threat events. training program can get beyond the The only acceptable answer is for basic and empower your personnel to At the parking lot or subway exit, the everyone to work together. obtain the right information to perform volunteer is the first interaction with at their best. the event. Fans at this point could be Knowledge is key: The benefit of informed about security protocols, comprehensive training By viewing training as a strategic contributor to a successful security and since volunteers are trained Security operations use many types plan, decision-makers should consider they are able to pass on appropriate of technology and situation changing these key questions when making the information. In addition, volunteers protocols in their plans. Training most effective investment on training: could explain what technology is used various personnel who need some and why. This gives fans a high-level knowledge of the technology to • How will proper security technology understanding of the security they those who require an expert level and protocol training increase our are experiencing and an awareness of of proficiency takes a specialized effectiveness? protocols to follow. approach. With online learning, • Is the training accessible for everyone coupled by in-person expertise, Another example where in our hierarchical structure? comprehensive personnel training everyone from a volunteer to a increases success of a security program technology systems operator can gain • Will my permanent personnel is at the border. At many entry points, the level of training necessary to make continually update their skills with multiple agencies are performing security successful. Training designed refresher courses? different duties. Different screening technology is available to assist personnel in discovering contraband or declaration errors. When all personnel are trained with at least a general knowledge of protocol at the entry point, there is less room for deviations and costly errors.

These two examples demonstrate how training, when combined with a comprehensive security protocol, can help:

• Overall efficiency and effectiveness of security operations

22 - World Security Report www.worldsecurity-index.com SECURITY TRAINING

• Do experts using real-world scenarios and skills of their personnel; training develop the training? has the potential, with the right vision, to be a critical component of the entire This is a different way of approaching security operation and enhance your decisions about training course end user experience. selection, and provides the opportunity to evolve personnel resources of many different security Author: Melissa Odegaard; Director, organizations. Ultimately, security Marketing; S2 Global; www. directors should be seeking training screeningsolution.com solutions that enhance the knowledge

EU plans to create a data base to enable EU countries to exchange non-EU citizens’ criminal records faster

The Civil Liberties addresses, fingerprints judges and police forces, related directive for which Committee approved plans and facial images (which, who currently often rely Parliament has already given on Thursday to create a new however, may only be used solely on data available from its negotiators a mandate. centralised data base on to confirm the identity of their own national criminal ECRIS was put in place third country nationals to a non-EU national who has record systems. in 2012 to exchange complement the European been identified based on Rapporteur Daniel Dalton information on criminal Criminal Records Information other data), and comply with (ECR, UK) said: “The convictions in the EU. System (ECRIS), which EU EU data security and data fast, reliable exchange of However, using the current countries already use to protection rules. information is key in the fight system to check the criminal exchange information on MEPs stressed that, in against crime at all levels. records of a non-EU citizen is previous convictions of EU addition to judges and This measure will close the cumbersome and inefficient. citizens. prosecutors, Europol, loophole allowing third According to the European The ECRIS Third Country Eurojust and the future country nationals to hide Commission, national National (TCN) system, will: European Public Prosecutor’s their criminal records, while authorities have used Office should also have protecting peoples’ rights information available in other - enable national authorities access to the ECRIS-TCN and information.” countries’ criminal records to establish quickly whether system. only in less than five percent any EU member state holds These negotiations, of conviction cases of third criminal records on a non-EU MEPs see this system an which can start as soon country nationals, between citizen important cross-border as Parliament as a whole 2010 and 2014. crime fighting tool for gives its green light, will - contain data such as names, European prosecutors, also include talks on a www.worldsecurity-index.com World Security Report - 23 AGENCY NEWS

Islamic State propaganda machine hit by law enforcement in coordinated takedown action

On 25 April 2018 law mobile application and web top-level domain registrars Since 2015 Amaq News enforcement authorities of infrastructure. This action abused by IS. Agency has been launching the European Union Member forced the propagandists its own software and has With this takedown action, States, Canada and the USA to build a more complex developed highly resilient targeting major IS-branded launched a joint action against and secure infrastructure to online infrastructure hosting. media outlets like Amaq, the so-called Islamic State prevent further disruption As of December 2017 the but also al-Bayan radio, (IS) propaganda machine from law enforcement. In entire range of IS propaganda Halumu and Nashir news, IS’s in order to severely disrupt June 2017 a second strike, led is available in at least nine capability to broadcast and their propaganda flow. The by the Spanish Guardia Civil different languages, as well publicise terrorist material has takedown operation was and supported by Europol as a wide range of online been compromised. coordinated by the European and the USA, targeted part of services, such as mailed Union Internet Referral Unit the news agency’s web assets Rob Wainwright, Executive newsletters and add-on (EU IRU) within the European and infrastructure. The servers Director of Europol, extensions for the most Counter Terrorism Centre seized by the Guardia Civil commented: ‘With this common browsers. (ECTC) at the Europol allowed for the identification ground-breaking operation Law enforcement agencies headquarters. of radicalised individuals in we have punched a big involved expect that the data more than 100 countries hole in the capability of IS to Led by the Belgian Federal retrieved as a result of the worldwide. spread propaganda online Prosecutor’s Office and with takedown will help to identify and radicalise young people the support of Eurojust, On 25-26 April 2018 a the administrators behind IS in Europe. I applaud the the operation involved simultaneous multinational media outlets and potentially determined and innovative authorities from Belgium, takedown, coordinated by radicalised individuals on work by Europol and its Bulgaria, Canada, France, Europol’s EU IRU and with European soil and beyond. partners to target a major part the Netherlands, Romania, the support of Eurojust of the international terrorist In the context of the EU the United Kingdom and the and the Belgian Federal threat prevalent in Europe Internet Forum, the EU IRU USA in a coordinated effort to Prosecutor, led to the seizure today.’ proactively monitors online hinder IS’s central capability of digital evidence by law propaganda activities of to broadcast terrorist material enforcement from Bulgaria Main mouthpiece of IS the listed jihadi terrorist for an undetermined period (Cybercrime Department organisations in the EU of time. in General Directorate Initially giving the impression on a daily basis, including Combatting Organised of an independent media The case started at the related websites, servers and Crime), France (SDAT-SDLC), outlet providing factual end of 2015 when Europol applications disseminating IS Romania (Directorate for information on IS, Amaq informed all EU Member propaganda. Countering Organised was used in 2016 to claim States about the rise of the the attacks in the Levant and Criminality – Terrorism Commissioner Julian King Amaq News Agency and all over the world, including Investigation Unit with the said: ‘This shows that by the technical resilience of the the attacks in Paris, Brussels, support of the Romanian working together we can terrorist online infrastructure. Barcelona and Berlin, and Intelligence Service), and the stamp out the poisonous Since then law enforcement more recently in Trèbes seizure of IS servers in the propaganda Da’esh has used agencies have, in a (France). Amaq News Agency Netherlands (Dutch National to fuel many of the recent continuous joint effort, taken is the main mouthpiece of Police – Internet Referral Unit terror attacks in Europe. For down the web assets of the IS. It was officially endorsed together with the Belgian too long the internet has media outlet. by the terrorist organisation Federal Judicial Police – East- been open to terrorists and in July 2017 and has since In August 2016, thanks Flanders), Canada and the those who seek to do us become the primary source to contributions from EU USA. Meanwhile, the United harm: those days are coming of information regarding Member States and non-EU Kingdom (Counter Terrorism to an end thanks to this type the remaining activities of IS countries, a first takedown Internet Referral Unit) took the of coordinated global work.’ worldwide. was launched against Amaq’s lead in the referral process of

24 - World Security Report www.worldsecurity-index.com AGENCY NEWS

Project Stadia brings together experts on sports event security

To achieve this, Project Stadia on this promise, in partnership accreditation procedures, and is mandated to organize with INTERPOL, we have command and coordination. expert group meetings on brought together experts the key themes of physical from all over the world along John Beattie, Stadium and security, legislation and with Qatari law enforcement facilities Director at Arsenal cybersecurity. officers to enable the transfer Football Club, said: “The of knowledge, experience expert group meeting on These meetings bring and share good practices to sports safety and security together global experts prepare us for 2022.” organized by INTERPOL’s With the safety and security from law enforcement, event Project Stadia brought of major events relying on organizing committees, The main objective of the together a number of effectively integrating people, government, the private 3rd Stadia Sports Safety experts who provide relevant technology and processes, sector, academia and civil and Security Expert Group knowledge and skills. The Project Stadia has brought society to explore state-of- meeting (23 ‒ 25 April) was resulting questions and together experts from law the-art research and analysis to shape best practices in key discussions will assist with enforcement, FIFA, venue and develop independent areas such as cooperation and security preparations in the operators, sporting clubs and recommendations for communications with public running of the 2022 World the private security sector planning and executing security, skills and training, Cup.” to shape solutions for this security arrangements for security challenge. major international sporting events. A core component of INTERPOL Project Stadia is to Col. Mohammed Majid create a Centre of Excellence Al-Sulaiti, Director of the to help INTERPOL member Security Department of countries in planning and Qatar’s Supreme Committee executing policing and for Delivery & Legacy, said: security preparations for major “In our bid to host the FIFA sporting events. World Cup we told the world to expect amazing. To deliver

INTERPOL and Banco do Brasil S/A sign cooperation agreement against cybercrime

The INTERPOL National to INTERPOL’s Global of information technology and intensifying cooperation Central Bureau (NCB) in Complex for Innovation solutions and strategic tools to with Banco do Brasil S/A in Brasilia and Banco do (IGCI) in Singapore to work prevent and fight cybercrime. the fight against cybercrime Brasil S/A have signed an alongside specialists from and in the development of The General-Director of the agreement for cooperation other technology and new security technologies. Mr. Brazilian , Mr. and information sharing to financial companies, as well Galloro pointed out that the Rogério Galloro – who is also tackle cybercrime. as with INTERPOL officers on agreement is an important a Delegate for the Americas secondment from member step for Brazil towards This public-private partnership, on INTERPOL’s Executive countries. expanding its activities on the which came into effect 7 Committee – highlighted the international scene. May 2018, aims to establish During the agreement importance of expanding a systematic exchange of ceremony at NCB Brasilia, data related to cyber threats the President of Banco do so as to enhance cyber Brasil S/A, Mr. Paulo Rogério security activities undertaken Caffarelli, applauded the by INTERPOL and its 192 agreement, emphasizing member countries. how the bank already works with the Brazilian Justice and As part of the agreement, Federal Police. The signing Banco do Brasil S/A will of the agreement will now second a representative trigger the development

www.worldsecurity-index.com World Security Report - 25 AGENCY NEWS

BT Joins Forces with EUROPOL to Build Safer Cyber Space

to help them expose and crime industry. Earlier this take action against the year, it became the first organised gangs of cyber telecommunications provider criminals lurking in the dark in the world to start sharing BT has signed a our capabilities and corners of the web. The information about malicious Memorandum of increase our effectiveness signing of today’s accord software and websites on a Understanding (MoU) with in preventing, prosecuting with Europol sees BT take large scale with other ISPs Europol to share knowledge and disrupting cybercrime. another significant step via a free online portal – the about major cyber threats Working co-operation of forward in making the internet Malware Information Sharing and attacks, as the two this type between Europol a safer place for consumers, Platform (MISP). Since the organisations reinforce their and industry is the most businesses and public sector platform was launched, BT’s efforts to create a safer cyber effective way in which we can bodies in the UK, Europe and worldwide team of more than space for citizens, businesses hope to secure cyberspace beyond.” 2,500 cyber security experts and governments. for European citizens and have so far helped to identify businesses. I am confident BT is committed to sharing and shared the details of The agreement, which that the high level of expertise its threat intelligence data more than 200,000 malicious was signed at Europol’s that BT bring will result in with industry partners and domains. The recipients of Headquarters in The Hague a significant benefit to our law enforcement agencies BT’s threat intelligence data in the Netherlands, provides Europe wide investigations.” such as Europol in a secure have then able to take the a framework for BT and and trusted way, as a means appropriate course of action Europol to exchange threat Kevin Brown, VP, BT Security of better protecting UK and to protect their customers intelligence data as well as Threat Intelligence, said: “As global customers from the and stakeholders against the information relating to cyber one of the world’s largest rapidly expanding cyber- specific threats identified. security trends, technical cyber security businesses, expertise and industry best we at BT have long held practice. the view that co-ordinated, cross border collaboration is Steven Wilson, Head key to stemming the global of Business, European cyber-crime epidemic. Cybercrime Centre (EC3), “We’re working with other said: “The signing of law enforcement agencies in this Memorandum of a similar vein to better share Understanding between cyber security intelligence, Europol and BT will improve expertise and best practice

Cybercrime Prevention: A Unified Message Towards Online Criminals

EU Member States, Europol and Information Security of the educational materials The EC3 organises the Third Parties and EU Agencies (ENISA), the EU Agency for produced. Cybercrime prevention Forum join forces to strengthen the Law Enforcement Training with the aim to facilitate Initiatives such as No More current cooperation model (CEPOL) and the EU Crime the cohesion of activities Ransom, Stop Child Abuse in the area of prevention Prevention Network (EUCPN) and campaigns, the sharing – Trace an Object, Say No and awareness as a way to in the fourth Cybercrime of existing materials, the to child sexual coercion and contribute to the reduction of Prevention and Awareness development of new ideas extortion and the European cybercrime. Forum to assess the status and and the exchange of best Money Mule Action, among further implementation of the practices. Ultimately, its Under the coordination others, were presented as current EU communication purpose is to enable a pan- of Europol’s European best practices of what can be strategy model. Initiated in European dialogue among Cybercrime Centre (EC3), law achieved through optimization 2015, the model aims to align all law enforcement entities enforcement representatives of human and financial the cybercrime prevention in the area of prevention and from 29 countries1 gathered resources, both at a national and awareness efforts among awareness, thus strengthening with delegates from the and an EU level. the EU Member States and the EU’s fight against EU Agency for Network to increase the effectiveness cybercrime.

26 - World Security Report www.worldsecurity-index.com INDUSTRY NEWS

Pre-screening visa-exempt travellers for increased security when travelling to Europe

Third country nationals cost 7 euros (Parliament higher or none) related in exceptional circumstances exempt from visa negotiators managed to information. may be invited for an requirements will have to waive the fee for travellers interview. The application will get an authorisation before under 18 and over 70 years automatically be checked Travellers should get a reply, travelling to the EU, under of age), and it will be valid against all relevant or a request for additional new rules approved on for three years, or until the databases, including the information, within 96 hours Wednesday by the Civil travel document expires. new ETIAS’ watch list from the moment of lodging Liberties Committee. The applicant will also (which, fed by Europol, the application. Thanks to MEPs backed, with 45 votes need to inform authorities will include suspects of amendments introduced by to 10, the informal deal of any convictions for terrorism or other serious Parliament, they will be able reached with EU ministers serious criminal offenses crimes), the Schengen to check the status of the establishing a new European (such as terrorism, sexual Information System, the application, via the webpage Travel and Authorisation exploitation of children, Entry/Exit System, as well as and mobile application. System (ETIAS). trafficking in human beings other Europol and Interpol Kinga Gál (EPP, HU), or drugs, murder and rape), databases to verify, among The system, which should Parliament’s rapporteur, about stays in specific war other issues, whether the be operational in 2021, will said: “I consider the ETIAS or conflict zones and of travel document used has allow for advanced checks extremely important for any prior administrative been reported lost or stolen on visa-free travellers and the security of EU citizens decisions requiring them to and whether the person is those considered to pose as there is no freedom leave a country, all over the wanted for arrest. a risk in terms of security, without security. Our aim last ten years. irregular migration or high If there are no hits, the was to create a system epidemic risk will be denied In the case of terrorist travel authorization will be which contributes to a more access. offences, the period will issued automatically (that secure Europe preventing extend to the previous is expected to be the case terrorism, illegal immigration Non-EU nationals who do twenty years, and additional for the vast majority of and epidemic risks, but not need a visa to enter the clarification on the date and applications). In case of one which won’t put an excessive Schengen area will have to country of the conviction will or several hits, or a positive burden on visa exempt fill in an electronic form prior be needed. reply to any of the questions citizens visiting the EU.” to their intended travel with on criminal records, trips to their personal data (including MEPs succeeded in The draft legislation will now conflict areas and orders name, date and place of removing all health- be put to a vote by plenary, to leave a country, the data birth, sex and nationality), related questions from scheduled in July. Once will be manually checked the application. They also formally adopted by the travel document information and the security, migration restricted the level of detail Council of Ministers, it will (validity, country of issue), or epidemic risk individually required on occupation (to be published in the Official home address and contact assessed. The applicant may job group) and education Journal. The aim is for it to information, and the be requested to provide (just primary, secondary, be operational in 2021. European country of first additional information, and intended entry. There are currently more than 60 countries and A dedicated public website territories whose nationals and an application for can travel visa-free to mobile devices will be set the EU. The Commission up, managed by eu-LISA expects a significant increase (the EU Agency for the in the number of visa- operational management of exempt travellers crossing large-scale IT systems in the the Schengen borders in area of freedom, security the coming years, from 30 and justice). million in 2014 to 39 million The travel authorisation will in 2020. www.worldsecurity-index.com World Security Report - 27 INDUSTRY NEWS

Disasters could cost Asia-Pacific region $160 billion per year by 2030, UN warns

Economic losses to disasters The low insurance coverage such as catastrophe risk Akhtar, Mami Mizutori, Head in Asia and the Pacific could has persisted in the region modelling, parametric of the UN Office for Disaster exceed $160 billion annually even though it has suffered insurance, a mix of traditional Risk Reduction (UNISDR), by 2030, the United Nations nearly $1.3 trillion in losses and global financial highlighted the importance development arm in the over the last 50 years. reinsurance, and concessional of both disaster risk financing region warned on Tuesday, insurance. and resources to reduce The result is that individuals, urging greater innovation in disaster risk to ensure businesses and Governments She also highlighted the disaster risk financing. resilient and sustainable are left to bear the role ESCAP – which spans development. The need is all the more staggering costs of natural a geographic region from pressing given that only calamities. And with extreme Turkey in the west to the tiny “At present, we need both eight per cent of region’s weather events increasing as Pacific island of Kiribati in the […] Let’s face it: when natural losses are insured, said the the region’s cities become east, and from Russia in the hazards hit, without these UN Economic and Social more crowded, the gap north to New Zealand in the mechanisms, we cannot cope Commission for Asia and the could widen. south – could play. with the aftermath,” she said. Pacific (ESCAP). “Business as usual is “The provision of a regional Ms. Mizutori, who is also the “The time for establishing unsustainable […] policy platform for building capacity Special Representative of solutions to these complex makers and financial as well as mutual trust the UN Secretary-General for emerging challenges is now,” strategists in both the public among countries is the key Disaster Risk Reduction, also underlined Shamshad Akhtar, and private sectors have to successful sovereign risk highlighted the importance the Executive Secretary of to work together,” said the pooling [and] ESCAP, whose national strategies to ESCAP, speaking at an event head of ESCAP. primary mandate is regional strengthen resilience and on financing for disaster risk cooperation, is well suited for mitigate natural hazard risks, In her remarks, Ms. Akhtar reduction in Asia-Pacific at this role,” said Ms. Akhtar. a call made in the Sendai outlined the opportunities the UN Headquarters, in Framework for Disaster Risk offered by recent innovations Speaking alongside Ms. New York. Reduction.

NEMOSYS-XRTM selected for high-end defence applications

EXAVISION has been range of optronic solutions night purposes. NEMOSYS- experience in designing selected by French integrated on a 2-axis XR™ has been developed video supervision systems integrators to provide Pan&Tilt, that comes with and designed to provide (linked to radar detection NEMOSYS-XRTM for a Full HD color camera, a customers with robust, and non-lethal effectors) military camps protection in Made in France cooled (Band easy to use and performing dedicated to sensitive area Africa and military airbase II MWIR) thermal camera, solution for critical protection as borders and surveillance and Counter- and complementary options infrastructure surveillance. coastal surveillance, military UAV projects in France. (GPS, DMC, LRF …) allowing camps protection, ports and long range observation and NEMOSYS-XR™ solution airports, petrochemical and NEMOSYS-XR™ is a modular surveillance for day and is the result of EXAVISION nuclear industries.

28 - World Security Report www.worldsecurity-index.com INDUSTRY NEWS

Changi Airport’s new Terminal 4 has already processed more than 1.5 million departing passengers using facial recognition systems from IDEMIA

In the context of soaring various steps required for world airport passenger passenger authentication and numbers (2016: up 6.3% identification, MorphoFace to 3.7 billion and 700 and MorphoWay (a fully new routes), the need for automated gate for both passenger identification and smart coupled with demanding boarding). safety standards is becoming ever more critical. Changi Airport was ranked the world’s top airport for In October last year Changi the fifth year in a row in Airport’s latest Terminal - 2017, and for the eighth Terminal 4 opened its doors time since the award was to the travelling public and first introduced in 2000. has already processed more T4 has been created to be than 1.5 million departing part of Changi’s FAST and passenger ID checks using its most innovate terminal passengers. Passengers are Seamless Travel program. facial recognition at all and can handle up to 16 processed using a system departure control points. The million passengers per year based on facial recognition Selected by Changi Airport in system includes a centralized increasing Changi’s overall from IDEMIA, enjoying 2015, IDEMIA has deployed platform used by airlines and annual capacity to 82 million a secure and innovative its MorphoPass Airport the airport to manage the passengers. seamless experience as Solution to automated

NATO wins the world’s largest live-fire cyber exercise

NATO has won the complex IT systems world’s largest live-fire while reporting incidents, cyber exercise, Locked managing crises and Shields 2018. After an making strategic decisions, intense competition from as well as solving digital 23 to 26 April, NATO’s forensics tasks, and “Blue team” of 30 cyber dealing with other defenders − led by the challenges. Altogether the NATO Communications exercise involved 4,000 and Information (NCI) virtualized systems and Agency − took the top more than 2,500 attacks. prize in Tallinn, Estonia. Cyber defence is part French and Czech teams of NATO’s core task of placed second and third, collective defence. In July respectively. In total networks,” said Kevin J. to respond in countering 2016, Allies recognised more than 1,000 experts Scheid, General Manager high-intensity attacks cyberspace as a domain of from nearly 30 nations of the NCI Agency. on a fictitious country’s operations in which NATO participated this year. IT systems and critical must defend itself as “This year’s exercise was infrastructure networks. “I could not be more even more realistic and effectively as it does in the proud of the success of certainly tougher than “Success in Locked Shields air, on land and at sea. The our cyber-team that once ever before and we are is not just about defending NATO Communications again demonstrated the incredibly proud of our your own networks – it is and Information Agency expertise of NATO’s NATO cyber defenders,” also about collaborating acquires, deploys and technology agency. said Ian West, Cyber closely with the other defends communications They are hard-working, Security Chief at the defending teams,” systems for NATO’s dedicated and ready NCI Agency. The drill explained Ian West. The political decision-makers 24/7 to defend NATO challenged the participants teams had to maintain and commands.

www.worldsecurity-index.com World Security Report - 29 INDUSTRY NEWS

UN-backed programme logs record high cocaine seizures at seaports in Latin America and the Caribbean

UN-trained law enforcement drugs, firearms, precursors, units have intercepted huge counterfeit medicines, wildlife shipments of illegal drugs species, smuggled goods being trafficked through and many others, he added. seaports this year, including 2.8 tons of cocaine at Brazil’s According to the UNODC, Port Santos, the largest such 18 operations have netted seizure in the port’s history more than 8.9 tons of drugs. These units are at the heart of of the world,s cargo. Most In addition, 18 containers The joint customs and police a joint programme launched carry licit goods, but some have been detained due to Port Control Units, work at in 2003 by the UN Office on are being used to smuggle intellectual property rights some of the world’s busiest Drugs and Crime (UNODC) drugs, weapons, and other violations. ports and are trained to and the World Customs illicit goods. So far, the Programme is combat smuggling of drugs, Organization. precursor chemicals, as well “The Container Control operational in 14 countries as merchandise breaching The aim is to train customs Programme has become one in Latin America and the intellectual property rights and law enforcement officials of the most effective and Caribbean, providing site and protected wildlife. in Latin America and the result-oriented programmes visits, technical assessments, Caribbean, and elsewhere, to worldwide,” said Tofik trainings, and other Recently, the Unit in Ecuador detect and disrupt the flow Murshudlu, UNODC’s Chief support to create long-term has seized two contaminated traffic of illicit goods, while of the Implementation enforcement structures in containers with over a tonne facilitating legitimate trade Support Section. select seaports. It is also of cocaine. Similarly, the Unit and raising State revenues. operational in Burkina in the Port of Callao in Brazil, The Programme also helps Faso, Cabo Verde, Ghana, interdicted a container with Every year, more than 720 Member States build Pakistan, Senegal, Togo and 1.5 tons of cocaine hidden million containers move capacities and expertise to Turkmenistan. inside. around the globe by sea, identify and seize suspicious transporting 90 per cent container shipments of

FLIR Launches Radar and Thermal Products for Border Patrol with the ability to detect both drones and land-based objects

FLIR Systems has announced location of small drones at the availability of three ranges of 2 miles and can products for use by global also detect vehicles and militaries and government people walking or crawling. agencies including border Both the R8SS-3D and the patrol agents. These R8SS, the latter of which products include two FLIR offers land detection only, Ranger® mid-range panel can detect over 500 threats radars, one with airborne and their exact locations drone and ground target simultaneously, and work detection, and the Recon® V within an existing data UltraLite thermal monocular. network. The R8SS series The products, unveiled mount to either a vehicle, at the Special Operations to armed services personnel. and forward-deployed surveillance tower, or Forces Industry Conference operations personnel. tripod, and allows for full The FLIR Ranger R8SS- (SOFIC) 2018 in Tampa, The R8SS-3D detects 360-degree surveillance, 3D and R8SS radars, part Florida, are part of FLIR’s both land and air objects, ensuring that threats within of FLIR Ranger family of Soldier Solutions family and such as micro-drones, and surveillance range are radars, offer mid-range demonstrate the company’s differentiates birds from detected. detection capability for commitment to deliver the drones. The Ranger R8SS- both fixed-based installation most advanced equipment 3D reports the altitude and

30 - World Security Report www.worldsecurity-index.com INDUSTRY NEWS

Barrett HF on surveillance boats in remote Chilean region

Barrett Communications antenna installed on the have recently supplied port side of the boat using a High Frequency (HF) radio specially designed mast and communications equipment a fixing plate.” for surveillance boats which The HF mobile station was operate in the remote and tested under hard and real environmentally challenging conditions and was able Aysen región in the South of to establish good quality Chile. communications to the The Aysen región in Chile, nearest port, the closest is not only remote but town, other stations within also very complicated the same region, and the with lake systems, islands, main station 1,700km away. and the uniformed police. external speaker and PTT mountains, rivers and were installed onto the port Mr José San Martín from extreme climatic conditions. The HF stations are used console, as requested by the Skytel Telecommunicaciones The Barrett authorised in offices, service vehicles, client. From the Barrett 2050 commented “We have dealer in this region, Skytel ambulances and also in transceiver, a control cable designed and installed a Telecommunicaciones surveillance and border was installed and channeled complete HF mobile station are present in this area in patrol boats. below the cabin’s deck to a on the surveillance boats, many organisations that are The mobile installation kit crew member seat, where and the crew can maintain critical to the community. for the Barrett 2050 HF the 4011 tuner was installed communications over the These organisations include Transceiver was installed in available space under the HF network throughout health care services, the inside the port console seat. From there a cable Chile.” aerodromes, the agricultural and the 2050’s detachable went through one of the and livestock service, the front panel along with the cabin walls to reach the HF national emergencies bureau

Transportation Security Administration Selects Unisys to Secure, Operate, Maintain and Protect Screening Equipment in U.S. Airports

Unisys Corporation announced Services blanket purchase Unisys will provide full lifecycle airports. it has been selected by agreement (BPA) within TSA’s application development and The Stealth security products the Transportation Security Security Technology Integrated operational support services deliver adaptive protection Administration (TSA) to Program (STIP). A joint effort to connect and integrate data through the application leverage an integrated by TSA’s Passenger Screening from up to 14,000 TSA security of microsegmentation package of Unisys Stealth® Program and Electronic equipment devices. technology across extended software and application Baggage Screening Program, The solution includes enterprises, securing users, services in developing, the Unisys implementation Stealth™ microsegmentation data, applications and implementing and maintaining provides a secure and scalable software to deliver a powerful systems from cyber threats. a suite of mission-critical platform to integrate data deployment model allowing Through the creation of applications that connect, from passenger and baggage TSA to securely connect and secure Communities of protect and integrate the screening equipment for real- manage all airport screening Interest, authorized users and agency’s security screening time threat awareness and risk equipment on the agency’s Internet of Things devices like equipment deployed at more assessment. global network. These TSA’s screening equipment than 400 U.S. airports. The BPA has a ceiling value screening devices perform engage in encrypted Stealth- The work will be performed of $250 million over five duties such as scanning enabled segments, cloaked under the single-award years and covers a one-year baggage and personnel to from external attackers and Domain Awareness Integrated base period followed by four ensure the safety of travelers protected from insider threats. Network (DOMAIN) Support option years. Under the BPA, entering and leaving U.S.

www.worldsecurity-index.com World Security Report - 31 INDUSTRY NEWS

New security innovation protected thousands at the recent London Marathon

The annual London Marathon quickly, so that the roads and making it ideal for use at the Guard System was deployed became the latest event to bridge could be reopened event as it did not create to protect thousands of receive the highest levels an hour after the marathon unnecessary distress to people at one of the country’s of protection from potential finished. As the system the public. It was manned largest and most popular vehicle attacks. does not need anchoring throughout the day and sporting events. We were to the ground, no damage saw huge crowds of people able to deploy and secure With over 35,000 runners was caused to the road or walking through the system, the whole square extremely on the start line on 22 April pavements when the system as well as pedestrians with quickly, and because of 2018, and thousands more was removed. prams, wheelchair users and the flexible configuration spectators gathered to cheer cyclists also able to pass and modular shape of on racers, an innovative The Surface Guard has through the barrier with ease. Surface Guard, it meant that roadblock system was been specifically designed obstacles weren’t an issue to deployed to safeguard in response to the surge Glenn Cooper, CEO of ATG manoeuvre around. against a possible vehicle of vehicle ramming attacks Access, said: “The need attack. that have taken place across for increased security at “Surface Guard is still a new Europe and has been tested temporary events has been innovation for the security Surface Guard, which was in accordance with the IWA heightened after the recent market in comparison developed by ATG Access, 14 crash test standard. It is surge in vehicle attacks across to traditional concrete the world’s leading designer capable of withstanding an Europe and further afield. blockades and national of road blocker, bollard and attack from a 7,200kg lorry It is now more crucial than barrier asset steel barricades. vehicle barrier systems, was travelling at 32 kph, and its ever that people feel secure We firmly believe that this installed on each side of lightweight modular design and protected when visiting solution will prevent further Parliament Square to protect makes it quick to install, public events, but solutions vehicle attacks, and will make the people at the event. transport and easy to store. used must cause minimal safeguarding the public at The system was deployed disruption to daily life to temporary events easier and The solution has been extremely quickly, with the prevent creating a ‘fortress more robust for organisers.” designed to complement team able to install the mentality’. existing street furniture and Since the launch of Surface system at each end of the blend into the background, “Our innovative Surface Guard, just eight months ago, square in just one hour, it has already been deployed keeping road closures, prior to protect numerous high to and during the event, to a profile events, including minimum. the official reopening of The Surface Guard being Motcomb Street in London, deployed at the London the popular Lord Mayor’s Marathon by StadiumTM show in London and multiple Premier League football Once the event finished, the stadiums and now the solution was removed just as London Marathon.

32 - World Security Report www.worldsecurity-index.com INDUSTRY NEWS

360 Vision Technology launches UK designed & manufactured INVICTUS Hybrid Ultra-Low-Light HD PTZ camera

360 Vision Technology video streaming and IP 2.4 Profile S integration. cameras, this design allows has recently launched control – without the Watching over intelligent the wiper blades constant, Invictus, a new range need for camera hardware illumination and Night even and uninterrupted of cost-effective, high- changes. Setting Presets during contact with the window performance, ruggedised periods of inactivity, an surface, keeping them clear Invictus achieves incredible PTZ cameras – aimed at advanced Low Power for 100% effective scene ultra low-light colour/mono the competitive midrange mode reduces power surveillance. imaging performance via CCTV camera sector. consumption by up to Available with on-board the choice of either the 50%, to control illumination recording options up to Bridging the divide latest 1/2.8” Sony StarVis, and power consumption 256GB, Invictus also draws between analogue and or 1/1.9” Sony Exmor R for use within low power on the field-proven 360 IP systems, and coupled (Ultra) best-in-class HD consumption sensitive Vision high-end ‘Predator’ to attractive pricing, camera modules, with applications. Invictus cameras have a choice of 20:1 or 30:1 camera range for its been designed to deliver a zoom. And providing Enhancing 24-hour construction from high highly competitive all-in- unobstructed scene operation, the new grade, hardened aluminium one PTZ camera package, imaging, Invictus views Invictus range is the only and stainless steel – aiming to provide a viable 360 degrees pan and 160 ruggedised all-in-one ensuring a rugged, durable alternative to low-cost degrees tilt, alleviating PTZ camera to offer both and compact camera. options. the viewing limitations IR and White-light high- An upright mounting associated with PTZ dome intensity illuminators design and full 360-degree Packed with high-end cameras. with an industry-leading continuous pan and the functionality, performance 200m illumination. Further ability to tilt above the and proven reliability, For flexibility of control, supporting optimum horizon, assure operators Invictus Dual Hybrid Invictus is compatible imaging, Invictus cameras an unobstructed view of functionality offers enables with a wide-range of employ the same proven targets above the camera’s installation within existing data protocols and VMS flat viewing window and horizontal installation analogue systems, or offerings, and features wiper system as used in height. stunning full 1080P HD industry leading ONVIF Predator. Unlike with dome

HENSOLDT has unveiled its Xpeller counter-UAV system for the first time in a compact and deployable version called “Xpeller Rapid”

The new configuration link between drone and combines a radar system, pilot or interferes with its a camera, radio detectors navigation. The modular and jammers. The system Xpeller system concept can either be integrated into allows customised solutions a vehicle or can be used to be created by combining in a transport container for individual devices from the rapid deployment. Thanks product family depending to sensor fusion, which is on customer requirements effected via a smart control and the local conditions. This software application, all way, the customer can select UAV-relevant signals are from a set of components detected with high precision and countermeasures. and extremely short reaction radar systems, cameras and its threat potential at ranges HENSOLDT also supports times are ensured. radio frequency detectors from a few hundred metres the development of as well as direction finders up to several kilometres. individual security concepts The modular Xpeller and jammers. Xpeller uses Based on real-time analyses offering consultancy and product family includes sensors to detect and of the control signals, a weak point analysis.. various sensors such as identify a drone and assess jammer then interrupts the

www.worldsecurity-index.com World Security Report - 33 PRODUCT FOCUS

Smiths Detection World Security Report

World Security Report is a bi-monthly electronic, fully accessible e-news service distributed to over 150,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, security and armed forces and civilian services and looks at how they are dealing with them. It aims to be a prime source of online information and analysis on security, counter- terrorism, international affairs and defence.

Smiths Detection Border Security Report

Border Security Report is the bi- monthly border management industry magazine delivering agency and industry news and developments, as well as more in-depth features and analysis to over 20,000 border agencies, agencies at the borders and industry professionals, policymakers and practitioners, worldwide.

Smiths Detection

advantages

Smiths Detection

advantages

www.defencell.com

34 - World Security Report www.worldsecurity-index.com EVENT CALENDAR

une 2018 5-7 InfoSecurity Europe London, UK www.infosecurityeurope.com

11-12 Transport Security & Safety Expo Washington DC, USA www.transportsecurityworld.com/events/tssx

11-15 EUROSATORY 2018 Paris, France To have your event listed please email details to www.eurosatory.com the editor [email protected]

19-21 IFSEC International 2018 London, UK August 2018 www.ifsec.events/international 16-18 Secutech Vietnam 25-27 Ho Chi Minh City, Vietnam Security Document World. www.secutechvietnam.com London, UK www.sdwexpo.com 29-31 Asia Risk & Resilience Conference Singapore July 2018 www.arrconference.com 17-19 Critical Infrastructure Protection & Resilience Asia Sarawak, Malaysia September 2018 www.cip-asia.com 25-27 Critical Infrastructure Protection & Resilience Europe 25-26 The Hague, Netherlands Latin America Security Congress www.cipre-expo.com Santiago, Chile www.isc2latamcongress.com December 2018 4-6 25-27 Critical Infrastructure Protection & Resilience North Australian Security Industry Association Exhibition & America Conference Florida, USA Melbourne, Australia www.ciprna-expo.com www.asial.com.au/events/category/security- conference-exhibition

35 - World Security Report www.worldsecurity-index.com An OSI Systems Company

Highly Trained People are a Critical Requirement for Effective Screening Operations

Security initiatives are better served when the people whom are responsible for the processes are highly trained.

S2 Global provides security training for governments and entities looking to maximize the potential of their personnel.

For more information contact Gary Heffner, Director of Training [email protected] +1 954-779-7102 www.screeningsolution.com BORDER SECURITY REPORT VOLUME 10 For the world’s border protection, management and security industry MAY / JUNE 2018 policy-makers and practitioners COVER STORY ICAO Releases FIRST Traveller Identification Programme (TRIP) Guide

SPECIAL REPORT AGENCY NEWS SHORT REPORT INDUSTRY NEWS

Transforming Passenger A global review of the UN Migration Agency, Latest news, views and Processing p.21 latest news and challenges DR Congo Government innovations from the from border agencies and Enhance Ebola Screenings industry. p.28 agencies at the border. p.18 at Border-crossings p.11 2 COMMENT

contacts Inter-agency and international co-operation on the border Editorial: Tony Kingham I’m pleased to report in this issue that tangible. Something like a password E: [email protected] the IOM, the UN Migration Agency, protected network, similar to a social and the World Customs Organization media platform like LinkedIn, but for Contributing Editorial: Neil Walker (WCO) have signed a Memorandum border agencies personnel only. It E: [email protected] of Understanding (MoU) to boost co- should be free to users and joined on operation in coordinated/integrated a purely voluntary basis. From there, Design, Marketing & Production: border management. just like social media, users can build Neil Walker relationships with other users and E: [email protected] At our own conference World Border agencies and start sharing experiences Security Congress in Madrid last and useful stuff like best practice Subscriptions: March, the calls for inter-agency and documents. Tony Kingham international co-operation was once E: [email protected] again a recurring theme, as it will no Over time, as the number of users doubt be in Casablanca next year, so grows, and trust grows, it can Border Security Report is a bi-monthly electronic magazine and is the border it nice to have something positive to metamorphize into something management industry magazine report. altogether more ambitious. delivering agency and industry news and But of course, whilst this is a welcome Maybe this MoU is the first step, but the developments, as well as more in-depth step in the right direction of inter- key is to get something started! features and analysis to over 20,000 agency and international co-operation, border agencies, agencies at the borders We even offered to do it ourselves as it is only that…...a step. Because as and industry professionals, policymakers part of World Border Security Congress. important as these two organisations and practitioners, worldwide. We have the platform and we even are, they are just two among hundreds started work, but without funding the of agencies working at borders project was halted. So, if there is an worldwide, and their remit is limited. organisation out there that wants to , border guards, help do something practical now to immigration officers, coastguards and promote border co-operation, drop us in some places the military all have a a line! role at the border. And the mix of these Tony Kingham national agencies and jurisdictions also Copyright of KNM Media and Torch Editor Marketing. varies from country to country. Add international agencies like Interpol, Europol, Frontex, Aseanapol and more, the complexity of border co-operation becomes obvious. So, in practical terms what READ THE FULL VERSION can be done. Well our The digital version of Border Security Report contains all suggestion is to start with the additional articles and news listed in the contents very modest ambitions page below. The full digital version is available for and build from there. download at Start with something www.world-border-congress.com/BSR

Border Security Report | May/June 2018 CONTENTS 3 CONTENTS BORDER SECURITY REPORT 5 icao TRIP Guide Released

ICAO is releasing the very first version of the ICAO Traveller Identification Programme (TRIP) Guide 8 AGENCY REPORTS

Latest news and reports reports from key agencies INTERPOL, OSCE, EUROPOL and the IOM. 12 ATAK situational awareness arrives at the border »»p.5 US CBP leads the way in combining USSOCOM software and consumer communications hardware to greatly increase agent safety and effectiveness. 18 AGENCY NEWS

A global review of the latest news, views, stories, challenges and issues from border agencies and agencies at the border. 23 transforming passenger processing

SITA report outlines how biometrics in identity management will transform passenger processing. »»p.8 »»p.18 25 World Border Security Congress

A review of the international border security community in Madrid, Spain on 20th-22nd March 2018. 28 industry news

Latest news, views and innovations from the industry.

»»p.17

Border Security Report | May/June 2018 4 SHORT REPORT

IOM, World Customs Organization to Boost Cooperation Towards Effective, Efficient and Responsible Border Management

On 8 May 2018, IOM, the UN Migration Agency, for greater efficiency over managing trade and travel and the World Customs Organization (WCO), an flows, while maintaining a balance with compliance intergovernmental organization based in Brussels, requirements. Coordinated border management is Belgium, signed a Memorandum of Understanding high on the Customs agenda and WCO has developed (MoU) to boost cooperation on issues of mutual interest, in this regard tools and instruments to support its in particular, those related to effective, efficient and implementation by Members, while involving national responsible border management. and international stakeholders.” This MoU offers the necessary framework for intensified The agreement will enhance the collaboration between cooperation between the two organizations. It opens IOM and WCO through coordinated activities and increased joint programming opportunities notably in elimination of unnecessary duplication, increased the field of coordinated/integrated border management, consultations, exchanges of information and documents as well as in the field of border management and for an effective cooperation and liaison between both development and trade. Organizations’ Secretariats or Regional Offices and Country missions. The MoU brings together two agencies with different but complementary mandates: While IOM focuses in its work The MoU encourages both organizations, within their on the well-being of migrants and the management of respective complementary mandates, to support border crossings by persons, WCO’s work is concerned their Member States to strengthen international, and with the management of the crossing of borders by intra-state cooperation between their national border goods and passengers. agencies, and exchange of information in thematic areas such as: i) border management; ii) sharing of The Memorandum was signed by William Lacy Swing, best practices in coordinated border management IOM Director General and Dr. Kunio Mikuriya, WCO policies, regulatory frameworks and administrative and Secretary General. institutional structures; iii) capacity building efforts; iv) “We see in our member states around the world great responsible data collection and information exchange interest in the cooperation topics covered in the MoU, with a focus on risk analysis and risk management; and v) especially in Africa, where the relationship between joint research. border management and development and trade has become a programming focus for many states, Regional Economic Communities (RECs) and the African Union (AU). IOM is already active in this field, for instance by supporting African states to introduce One Stop Border Posts (OSBPs),” said Ambassador Swing. The intensified cooperation between IOM and WCO strengthens the support the two organizations can give to Member States to further improve and modernize their border management, facilitate regular border crossings and exchange of goods and services across borders, support development, and better protect migrants. At the signing, Dr. Kunio Mikuriya stressed that “WCO encourages Customs administrations to adopt a coordinated approach with the various border agencies

Border Security Report | May/June 2018 SPECIAL REPORT 5

ICAO Traveller Identification Programme (TRIP) Guide released

ICAO is releasing the very first version In their traveller border control of the ICAO Traveller Identification arrangements, States seek to Programme (TRIP) Guide on Border maximise the economic, social and Control Management (BCM) to political benefits of travel while at the help States optimize their use of same time identifying and mitigating the available tools, systems, and risks and threats. The central concept applications. of the Guide is that BCM is most effective when the iterative process of identification of travellers and risk assessment is repeated as new

Border Security Report | May/June 2018 6 SPECIAL REPORT

information becomes available at each phase of the Traveller identification and risk assessment is repeated traveller journey: Pre-Departure, Pre-Arrival, Entry, Stay throughout the traveller journey as additional and Exit. information becomes available to the receiving/ The TRIP Strategy is a framework bringing together destination State elements of identification management to uniquely While States can be expected to have extensive identify travellers in order to enhance border security knowledge of their own citizens and residents, they rely and facilitation. The ICAO TRIP Guide on BCM is a on foreign data and information about the identity and product of the TRIP Strategy and thus focuses on the nationality of the citizens and residents of other States. border controls applied to travellers. The regulatory Therefore, the Standards and Recommended Practices framework of the Guide is found more prominently in (SARPs) and technical specifications published by ICAO the Annex 9 – Facilitation and in Doc 9303, Machine play a critical role in ensuring that travel documents Readable Travel Documents. issued by States contain standardised traveller identity information in a standardised machine readable format and that the identity information can be communicated in a standardised, interoperable way. The Guide further discusses contributions made by other United Nations (UN) agencies and international organisations to BCM. The Consolidated UN Security Council Sanctions List and INTERPOL Red Notices identify potential travellers of security and law enforcement concern to States. Checks against INTERPOL’s Stolen and Lost Travel Documents database are essential prior to relying on travel documents as evidence of identity. When applied in conjunction with its companion document, the Assessment Tool, the Guide can improve the traveller identification and risk assessment practice of States to achieve better security and facilitation outcomes in BCM. The Guide is intended for reference by States. It includes 13 technical topics describing and categorizing the The ICAO TRIP Guide on BCM is available at www.icao. Inspection Systems and Tools and Interoperable int/Security/FAL/TRIP/Pages/Publications.aspx. Applications that are used at specific or multiple phases To ask questions or communicate with the Facilitation of the traveller journey and each contribute, to different Section, States are invited to write to: [email protected]. degrees, to the identification of travellers and/or to traveller risk assessment. ICAO extends heartfelt thanks to individuals and organizations that have contributed to develop the content of the Guide: European Border and Agency (FRONTEX), ICAO Implementation and Capacity Building Working Group (ICBWG), ICAO New Technologies Working Group (NTWG), International Criminal Police Organization (INTERPOL), International Organization for Migration (IOM), Joint Regional Communication

Border Security Report | May/June 2018 SPECIAL REPORT 7

Centre (JRCC) of the Caribbean Community (CARICOM) Directorate (CTED), United Nations High Commissioner Implementing Agency for Crime and Security (IMPACS), for Refugees (UNHCR) and United Nations Office on Organisation for Eastern Caribbean States (OECS), Drugs and Crime (UNODC). United Nations Counter-Terrorism Committee Executive

WCO supports CITES national ivory action plans The WCO participated in the recent CITES National markets, and to help them combat the illegal trade Ivory Action Plan (NIAP) Meeting held in Maputo, in ivory. These NIAPs are developed in compliance Mozambique. with recommendations made by the CITES Standing Committee. Each Plan outlines the urgent measures On this occasion, as one of the five intergovernmental that a CITES Party commits to delivering – including member organizations making up the International legislative, enforcement and public awareness actions – Consortium on Combatting Illegal Wildlife Crime along with specified implementation time-frames and (ICCWC), the WCO (i) delivered a presentation on the milestones. role of Customs Risk Management in support of Illegal Wildlife Trade (IWT) enforcement operations and NIAPs; While the Plans follow a common structure of actions (ii) facilitated a session, in support of INTERPOL, relating with time-frames and milestones, each NIAP is unique. to criminal prosecutions; and (iii) led the discussions A Plan should identify the actions that are of highest by a working group dealing with cross-border and priority for a particular Party to help combat the international cooperation issues. illegal ivory trade, depending upon the Party’s own circumstances including its capacity-building needs, CITES NIAPs are practical tools under the CITES available resources, and the scale and nature of the Convention, used by a number of its Member states illegal trade, and whether the Party is a source, transit or to strengthen their controls on the ivory trade and destination country for illegally acquired ivory.

Border Security Report | May/June 2018 8 EUROPOL REPORT

8 Arrested for Smuggling Migrants to Germany in Lorries With the support of coordinated by Europol, to identify the key facilitators in Europol’s European the Western-Balkan region. Migrant Smuggling International police cooperation was central to the success Centre (EMSC), three of this investigation, initiated by the Munich regional individuals suspected office of the German Bundespolizei, as it soon became of facilitating large- clear that the facilitators were using several identities scale irregular migrant and rapidly changing their place of residence to evade smuggling to Germany justice. For example, one of the suspects located in Serbia have been arrested in was arrested on the basis of Romanian forensic data on a Romania, Serbia and German arrest warrant. The United Kingdom also arrested the United Kingdom a suspect using a different identity when crossing from on European arrest France to the United Kingdom. With the help of Europol, warrants in a covert which allowed for the timely sharing of information cross- strike on 8 May. border, the involved countries were able to identify the These arrests coincided with the arrests of 5 suspects in suspects, and subsequently arrest the criminals sending Serbia in a parallel investigation following several months lorries with hundreds of migrants to Germany. of joint operational work between the countries involved,

Toll Fraud - How Criminal Network Made Fortune Through Fraudulent Use of Counterfeit Fuel and Credit Cards Over the course of the three months of action of operation ANDREA, fuel card companies and one card scheme reported approximately 30 000 fraudulent transactions linked to counterfeit cards used to cross toll barriers in Spain and France. Law enforcement agencies then initiated investigations, on the basis of the information obtained, to identify the license plates of the involved vehicles, of which more than 600 were located in Spain only. 24 suspects have been arrested in Spain by the Spanish The investigation initiated by Spain allowed the identification National Police and the Guardia Civil in an international of the criminal group operating mainly in the Spanish region operation involving Spain and France and supported by of Catalonia, although the cards were also used on French Europol. The organised crime group was specialised in using highways. As a result of the cooperation between Europol, counterfeiting fuel and credit/debit cards to avoid paying toll the Fuel Industry Card Fraud Intelligence Bureau (FICFIB), the fees and in selling these cards to truck drivers and hauling Spanish authorities and the French Gendarmerie, 24 people companies. were arrested and 11 fraud cards factories were dismantled. Successful Counter-Terrorism Operation in Tenerife The Spanish National Police has arrested three men of The alleged jihadist, a 35 year-old Moroccan Moroccan nationality in San Isidro, Tenerife suspected of national, was recruited and radicalised by the recruiting and financing terrorism. The three arrestees, three arrestees, and eventually left for Syria respectively 27, 35 and 37 years old, were facilitating the in 2013. In 2015 the man returned to Tenerife, trip to Syria of a jihadist in order to join the terrorist group Al with severe battlefield injuries. Nusra. Al Nusra is a Salafist jihadist organisation fighting in the Syrian Civil War, with the aim of establishing an Islamic state in the country.

Border Security Report | May/June 2018 INTERPOL REPORT 9

People smugglers identified during INTERPOL border security operation

documents registered in the SLTD database. Among the hits were two individuals suspected of involvement in human trafficking and people smuggling activities in the region, and a Sri Lankan national who was the subject of a Red Notice from the UAE for misappropriation of funds. “The operation has helped enhance the efficiency of immigration officers in Bangladesh in screening travel documents and following up on potential hits,” said Mahbubur Rahman, Deputy Inspector General for Suspected people smugglers were identified during an Operations and Head of the National Central Bureau in INTERPOL-led border security operation in South Asia. Dhaka. Operation Mandala took place at five international airports “We appreciate the support of INTERPOL in securing our and one land border point in Bangladesh, Bhutan, Myanmar, country’s borders and will be extending this application to Nepal and Sri Lanka. Nearly 500,000 individuals were additional border points in the future,” he added. screened against INTERPOL’s nominal and Stolen Lost Travel Operation Mandala was held as part of INTERPOL’s Project Document (SLTD) databases during the operation. Relay, a Canadian-funded initiative to enhance migrant This resulted in multiple positive ‘hits’, including individuals smuggling capabilities in South Asia through training, subject to INTERPOL Red and Blue Notices and several travel improving systems and providing technical equipment..

Tackling human trafficking focus of INTERPOL training for Central Asia

An INTERPOL training course targeting human trafficking challenge. and migrant smuggling across Central Asia has concluded With illegal migration into Central Asia becoming an in the Uzbek capital. increasingly serious security threat in the region, improving The five-day event brought together law enforcement the exchange of police information and boosting the use experts from 14 Central Asian countries to learn the latest of tailored INTERPOL capabilities was central to the training investigative skills required to coordinate transnational programme. responses to the region’s trafficking and smuggling

Protecting cultural heritage across the Americas

Over the past decade, law enforcement agencies Illicit Trafficking in Stolen Cultural Property, organized by worldwide have seen a marked increase in the illicit INTERPOL in close collaboration with Argentina’s Federal trafficking of cultural objects. Police and Ministry of Security, aimed to boost the exchange of information and best practice in the region. With this in mind, some 100 international experts from 11 countries across the Americas have gathered to devise The event highlighted the need for increased a common strategy against the organized crime groups cooperation between law enforcement agencies and which are constantly looking to increase profits from this international organizations and featured presentations lucrative trade. from UNESCO, ICOM and the United Nations Security Council (UNSC) Monitoring Team linked to resolutions The three-day (17 – 19 April) Americas Conference on concerning ISIL, Al-Qaida and the Taliban.

Border Security Report | May/June 2018 10 OSCE REPORT

Specialized anti-trafficking training course for regional branches of police in Uzbekistan held in Urgench with OSCE support

The first forces was held in Urgench. in a series The course, organized by the OSCE Project Co-ordinator of training in Uzbekistan, brought together 25 participants courses from Khorezm, Bukhara and Navoiy regions, and the on anti- autonomous Republic of Karakalpakstan. trafficking for The training’s objective was to increase knowledge and develop police skills and attitudes to identify victims of investigators and operative agents of Uzbekistan police human trafficking and labour exploitation and refer them to the appropriate assistance. Management of Contemporary Security Systems focus of OSCE seminar in Podgorica The OSCE Mission to Montenegro and the Police practices to run a security department efficiently and Academy of Montenegro held a three-day seminar on the effectively. It addresses vital themes such as leadership management of contemporary security systems, police in management, employee relations, risk management, leadership qualities, in Podgorica. terrorism, information security, access control, investigations, substance abuse, workplace violence, and The Contemporary Security Management course is emergency management.. designed to provide relevant training on modern-day

Combating destruction of cultural heritage and trafficking in cultural property in Central Asian Region

five Central Asian participating States. “In recent years we have experienced a dramatic upsurge in the destruction and degradation of archaeological sites and in trafficking of cultural property in the OSCE area and beyond,” said Deputy Permanent Representative of Italy to the OSCE, Luca Fratini. “It has become evident that this kind of trafficking is deeply linked to transnational organized crime and corruption networks and the financing of terrorism. Combating the destruction of cultural heritage and trafficking in cultural property is a Practical measures to combat illicit cross-border priority of Italy which is currently chairing the OSCE” trafficking in cultural property in the Central Asian Region was the focus of a five-day regional workshop in Tashkent. Organized by the Border Security and Management Unit of the OSCE Transnational Threats Department, with the support of Italy, which is chairing the OSCE in 2018, and the OSCE Project Co-ordinator in Uzbekistan, the workshop was attended by 18 participants from relevant law enforcement services and ministries of culture of all

Border Security Report | May/June 2018 IOM REPORT 11

UN Migration Agency, DR Congo Government Enhance Ebola Screenings at Border-crossings

Borders (PNHF) in Kinshasa to 16 points of entry along the Democratic Republic of the Congo’s (DRC) borders. This deployment is part of an effort to prevent and control the outbreak of Ebola in the DRC, supporting the World Health Organization (WHO). The DRC Ministry of Health, which is leading the response, announced an outbreak in the Equateur Province on 8 May. In recent days, Ebola cases have been confirmed in larger urban areas, making the risk of the disease spreading further even greater, due to heavier density of population and higher population mobility. The essential deployment of these border health officials was made possible through USD 75,000 reallocation of funds from the Government of Japan and a release of IOM is supporting the deployment of teams of internal emergency funds totalling USD 100,000. Border epidemiologists and medical staff from the Ministry health officials will set up infection prevention and control of Health and the National Programme of Hygiene at measures at priority border crossings, travel routes and congregation points..

Over 700 Ghanaian Migrants Return Home with IOM Assistance

IOM in partnership with in Accra in what was the fourth charter flight organized the Government of Ghana by IOM through the EU-IOM Joint Initiative for Migrant and the Airport Authorities, Protection and Reintegration. facilitated the return home So far since June 2017, a total of 706 (661 men, 45 of 148 Ghanaians via charter women) Ghanaians stranded in Libya have been assisted from Libya. The group, to return home voluntarily. The majority (70 per cent) of which included four women the returnees are being returned from various detention and two children, arrived at centres in Libya, while the rest are from the cities. Kotoka International Airport

Support Belize Develop New Migration Policy

The Government of Belize and IOM, the UN Migration The latest data indicate that emigrants as a percentage of Agency, jointly held the launch of a National Migration and the Belizean population stand at 15 per cent, with the United Development Policy for Belize this week (16/05). States as the primary destination; while immigrants represent 15.3 per cent of the total population in the country, coming The development of the national policy will be led by the mainly from Central America. Government of Belize through a Steering Committee chaired by the Department of Immigration and Nationality Services. In developing the policy, the Government of Belize requested technical assistance from IOM in 2016; a steering committee was formulated in 2017 to work on drafting the policy framework and to ensure that the policy is aligned with the Government’s development strategy and national vision.

Border Security Report | May/June 2018 12 SPECIAL REPORT

ATAK situational awareness arrives at the border

US CBP leads the way in combining Border security is a dangerous law land that are more often than not USSOCOM software and consumer enforcement mission. Frequently completely devoid of any traditional communications hardware to executed in remote and austere communications networks, greatly increase agent safety and environments, border agents have establishing communications across effectiveness in austere environments to contend with rough terrain, agents is of utmost importance. Keywords: ATAK, Android Tactical extreme remoteness from external Assault Kit, goTenna, situational In the ongoing challenge to support, and the very real risk of life awareness. increase border agent security and threatening situations. operational effectiveness in the In these environments agents field, the US Customs and Border must depend on the support and Protection Agency (CBP) has turned operational intelligence provided to a toolkit directly sourced from by their team on the ground, Special Operations community – the however the very nature of where Android Tactical Assault Kit (ATAK). they are operating makes this very First fielded in 2010 during operations difficult due to the lack of effective in Afghanistan and Iraq, USSOCOM’s communications systems. Tasked ATAK platform has become the de with protecting vast expanses of facto situational awareness and

Border Security Report | May/June 2018 SPECIAL REPORT 13

user friendly interface over that map geospatial markers that team data. members are creating for their squads. Although the diversity of tools within Although this may sound like an ATAK are way too numerous to list incredibly simple set of features, out, at its core the platform is used to things we take for granted almost communicate 3 simple, but critical, every day with our Google Maps and types of information to its users: What’sApp, ATAK is a game changer for these field operators for a few First and foremost, there is blue force reasons. tracking. ATAK displays all users on its map allowing teams to have rapid Firstly, it offers significantly more visual confirmation of their position advanced map data, marker and the position of their teammates. accuracy, and other tools that are In the rough and vast expanses necessary when the task at hand covered by border security agents, isn’t finding your friend on a street the ability to know one’s location as corner, but possibly coordinating well as the location of their team is of actions which could result in life or utmost importance – not unlike a SOF death consequences. It is difficult team assaulting a target in a military to describe the gamut of features in operation. ATAK that make it so much more than command/control battlespace the commercial tools we see every Secondly, ATAK allows its users to management tool for not only SOF day, but its quick uptake across the quickly create markers and waypoints operators, but conventional military, US DoD, NATO partners, FBI, Secret and other points of interest for their and now civilian law enforcement as Service, CBP and many more attest to entire team. This could be something well. its criticality. as simple as a rally point to help Although the name and pedigree gather a team after a dispersed However what is perhaps the clearest may make the system sound like a operation, or something more critical differentiator of ATAK (aside from tool solely suited for war, the ATAK like marking a possible hostile actor its commercial availability, ease of platform is actually much less scary in a hidden position. Once again, use, and stability) is that unlike the and aggressive than it may appear although SOF teams might use this Google and other commercial tools, it when looking at its name (likely why tool for marking snipers and IEDs, is capable of operating in completely the civilian version is more often something border agents hopefully disconnected environments. called the Android Team Awareness do not have to encounter on a regular Although ATAK does have a server- Kit). ATAK can perhaps be best basis, at its core, the utility function is based system, it is also natively described as a combination of Google the same. Perhaps a border team uses integrated with the latest off-grid Maps with What’sApp. the tool to mark hidden groups of communications tools that allow Now this is definitely a simplification people or rally or observation points, tactical operators to continue to use of the capabilities within ATAK, but but the use case is functionally the these situational awareness features in roughly speaking this is accurate. same. places where they would traditionally expect to be completely disconnected The ATAK system is an Android Finally ATAK is also used to – remote and hostile locations - application which displays map data communicate commands back exactly where border agents need to and, more importantly, allows its users and forth via a straightforward operate. to communicate critical situational chat messaging tool which helps awareness data in a live, dynamic, and coordinate actions around the But as valuable as this ability to

Border Security Report | May/June 2018 14 SPECIAL REPORT

these radios provided the core of what was needed – situational awareness - and provided it at a radically lower size, weight, power, and cost than anything else around - $499 to give it a number. These practical advantages quickly caught the eye of DARPA and SOCOM who realized that the small bursts of data supported by the little consumer radio systems could successfully support the core functions within the ATAK platform. It couldn’t support everything feature within ATAK, but it supported the most important components of personnel tracking, map marking, and text. This led to a quick integration between the goTenna radios and ATAK which operate off-grid and without a server This all changed recently however soon saw the systems deployed with is, it is also one of the most difficult with the introduction of a new player SOF teams in combat in locations capabilities to practically field. in the tactical radio space, goTenna. as extensive as Iraq, Afghanistan, A small Brooklyn-based startup that Simply put, although ATAK can work Niger, and more – primarily as a originally focused on the recreational off-line with radios, the reality is tool to enable local partner forces hiking and skiing market, goTenna that traditional tactical radios are to interoperate with coalition forces started creating miniaturized radios astronomically expensive. Costing who could not provide them with for consumers to pair with their on average over $15,000 per unit, their restricted and expensive radio smartphones to allow them to text a digital tactical radio link, until systems. and track each other’s locations offline recently, has remained a capability As unique as SOF operations might while doing off-grid sports. only accessible to the most well be in their fine details, taking a funded of tier-1 SOF teams. CBP and What made goTenna radios unique was macro perspective shows that their many others knew and trusted the that they did not attempt to provide requirements are little different than capability of ATAK, but they simply broadband data communications like that of a border security team, or couldn’t afford the kind of investment other legacy systems. Instead, they even a crew of wildland firefighters. needed to meaningfully equip their focused solely on providing short-form Everyone needs to know where they agents in a way where they could trust burst data transmissions, sufficient for are, where their team is, the dangers/ and rely on the system. Although locations, markers, shapes, and text – objectives, and issue commands to some tests had been run using ATAK but no more, no less. What goTenna address those objectives. Its pretty on regular cellular connection, the got in return for its conservative simple, but its what is needed. reality was that the remote and approach to features was the creation What has resulted from this austere nature of border operations of a family of radio systems that can similarity in mission requirements necessitated an answer to the off- be best described as very practical and is that SOCOM software, consumer grid problem before ATAK or any accessible. A humble set of descriptors, smartphones, and a radio system other such platform could ever be but extremely meaningful. originally designed for hiking realistically operationally integrated. Although conservative in features, have suddenly come together to

Border Security Report | May/June 2018 SPECIAL REPORT 15

create a practically accessible and CBP’s creative efforts at enhancing operationally relevant situational agent situational awareness in awareness and command/control austere environments have drawn the system which can be had for just a few attention and support of its parent hundred dollars per agent – not tens agency in the US, the Department of thousands. of Homeland Security (DHS), which kicked off an APEX operational This is a game changer, and many evaluation program specifically outside of the military have taken designed to officially review the notice. power of the ATAK platform, and Seeing an opportunity to really move its supporting systems, for broader the needle in operational capabilities, deployment across the breadth of US in late 2017 CBP purchased roughly security forces. 1200 goTenna radios for a price tag As smartphones, goTenna, and ATAK that didn’t break $1MM. CBP was able are all EAR99 non-controlled systems to follow the lead of SOCOM’s foreign – this is a capability architecture operations to equip over a 20th of which any border security agency its for a cost that barely around the world should carefully registered a blip on its budget. look into.

East African Customs will work together to enhance border control through PGS Under the auspices of the WCO/JICA (Japan International Twenty (20) Customs officials from Burundi, Kenya, Cooperation Agency) Joint Project, to support trade Rwanda, Tanzania, and Uganda in addition to five (5) facilitation and border control in Africa, a Sub- Regional observers from Kenya Revenue Authority participated Awareness Raising Seminar on Programme Global Shield in this seminar. Each Customs administration shared (PGS) in East Africa was held in Nairobi, Kenya, from 15 its country presentation that included their efforts to 17 May 2018. This is the first activity of the enhanced in strengthening customs control at the borders, the border control component of the new Trade Facilitation level of cooperation between Customs and other law and Border Control project launched by the 5 Revenue enforcement agencies, and how they deal with explosive Authorities in East Africa. precursor chemicals and other components used to manufacture IEDs. Programme Global Shield is a multilateral WCO initiative, which aims at building the capacity of customs During the seminar, the WCO experts provided updates administrations to counter the illicit trafficking and on the WCO Security Project’s initiatives and shared diversion of chemicals and other components used by information about Customs role in border security, terrorists to manufacture improvised explosive devices technology deployment, and operational activities. The (IEDs). The Seminar aimed at raising awareness amongst Joint Improvised-Threat Defeat Organization’s briefing East African Customs of the threat posed by IEDs and set the scene in relation to the global harm and regional demonstrating ways how customs can contribute to perspective of IED use; while Japan Customs expert mitigating the threat. It also provided a platform for explained how advanced technologies can help Customs participants from East Africa to share their experiences, to efficiently identify chemicals. exchange and discuss best practices.

Border Security Report | May/June 2018 16 AMERIPOL REPORT

Visit of President of AMERIPOL to EUROPOL

The President of AMERIPOL, carried out a visit of knowledge and coordination with the Executive Director of EUROPOL, Rob Wainwright. Also participating in the visit was the Director of Horizontal Operational Services, Mrs. Julia VIEDMA and the Security Analyst and Head of Corporate Institutional Affairs of the European Union (G21) Ms. María ESPEGEL BETEGON. In his current role as President of the Community of Police of America, at the hearing, the President spoke about the need to have a greater participation and proactive impact of the members of the American Organization, in the fields related to the exchange of information, training programs existing and sponsored by the European Union, the possibility of opening new field offices of the European Agency in different police forces of our continent.

Government of Ecuador Awarded by Commissioner General

Merit award to the Commissioner General of the Federal Police, Manelich Castilla Craviotto, as a recognition of his effort to promote coordination to prevent transnational crimes between authorities of the American continent. Ambassador Arizaga Schmegel highlighted the exchange of information between authorities of different nations, to prevent and deal with global crimes such as human trafficking, drug trafficking or cybercrime; along with the formation of high-level commanders among the police of the continent, achievements reached by the Commissioner General of the Federal Police, during his tenure as President of the Community of Police of America (AMERIPOL). The Government of the President of the Republic of Ecuador, Lenín Moreno Garcés, awarded the Badge of Police

Gendarmeria Nacional Argentina Seize Total of 389 Kilos of Cocaine

Through a judicial investigation, a criminal organization the narcotic substance was achieved, which was replaced was formed, made up of citizens of Russian nationality by flour, destined for Moscow. Through international and naturalized Russians from Argentina, who collected collaboration with the federal service of a fluid and then transported cocaine hydrochloride in exchange of information achieving Russian security, the diplomatic pouches to Russia. From the field tasks and gendarmerie investigators maintained the detention of the analysis of the information, a controlled delivery of six (6) citizens of Russian nationality.

Border Security Report | May/June 2018 ASEANAPOL REPORT 17

ASEANAPOL Receives working visit from delegates from the Ministry of Public Security (MPS) of China

Jiang expressed that MPS of China regards ASEANAPOL a crucial counterpart in the region to combat transnational crime. He then conveyed his presentation on “Organised Transnational Telecom Fraudulent Crimes” which had clocked 610,000 cases filed in 2016 and incur RMB 17 billion loss in China itself. In his presentation, Guoli shared the current crime situation and trends; modus operandi of the crime; their success stories in Europe and ASEAN; problem and difficulties faced by the operation team; and later their proposal for further collaboration.

The ASEANAPOL Secretariat received a working visit After much discussion between the MPS delegates from delegates from the Ministry of Public Security and ASEANAPOL Secretariat, both parties agreed (MPS) of China led by Guoli Jiang, the Deputy Director to the need for collaboration to fight against such General of Criminal Investigation Department of MPS transnational crime in order to keep both region safe. and his two officers. They were warmly welcomed by The MPS of China will submit their proposal of “Joint the Executive Director (ED) of ASEANAPOL Secretariat, Operation and Mutual Legal Assistance in Combating Police Colonel Kenechanh Phommachack, Directors and Organised Transnational Telecom and Internet staffs. Fraudulent Crimes” to the secretariat for detailed discussion. Soon after the ED gave his welcoming remarks, Guoli INTERPOL Capacity Building and Training Directorate

During the meeting the delegate from Interpol Capacity Building and Training Directorates shared briefly on their respective roles and functions which mainly focus on capacity building, databases collection and operational activities that are on project basis. The delegate had also shared that they had understood through their visiting around the region that there was a keen interest in the forensic development as such they offered their assistance in helping ASEANAPOL Forensic Science Network (APFSN) committee in their A delegation of officers from the Interpol Capacity development on area such as the Disaster Victim Building and Training Directorates, based in Interpol Indentification (DVI) and Crime Scene Investigation Global Complex of Innovation (IGCI), made a courtesy (CSI). Executive Director, Police Colonel Kenechanh call to the ASEANAPOL Secretariat office. Executive Phommachack extended the appreciation for the Director, Police Colonel Kenechanh Phommachack support from Interpol delegate and he hopes for the together with the staff warmly recieved the delegation. success on this cooperation in the future to come.

Border Security Report | May/June 2018 18 AGENCY NEWS

Agency News and Updates

igrants must be – ultimately fails, Soeder believes The migrants had been staying in ‘repelled at border’ if Germany must resort to more drastic an improvised camp in a park in Mrefugee centers plan fails measures. Sarajevo, but authorities ordered them to be moved to a refugee center in Salakovac, near Mostar, some 100 kilometers south of the Bosnian igrants Transferred In capital. Bosnia After Hours- MLong Standoff Hundreds of migrants, mainly from Syria, Iraq, Afghanistan, Turkey, and North Africa, had camped in the park for nearly two months.

Germany must start turning potential asylum seekers back at its borders if a uarding EU external new refugee centers initiative championed border is cornerstone by federal authorities fails to work as Gof migration policy planned, the Bavarian Interior Ministry head said. Guarding the external borders of the Buses carrying 270 refugees and European Union is the cornerstone of “Uncontrolled immigration has already migrants from Sarajevo reached an migration policy and Frontex plays a fundamentally changed not only the asylum center in southern Bosnia- key role in that, Estonian President political architecture but also the security Herzegovina after an hours-long Kersti Kaljulaid said on Friday when situation in Germany in 2015. That should standoff between regional and visiting the European Border and not happen again,” Markus Soeder, the national authorities in the multiethnic Coast Guard Agency (Frontex) in Bavarian interior minister and a member Balkan state. Greece. of the Christian Social Union (CSU), told the Bild daily. More than 4,000 migrants have “Estonia values highly the work of entered Bosnia this year after Frontex in boosting the security of the If the new initiative – which is aimed at traffickers opened a route through EU’s external border and we have sent the creation of large refugee centers to Greece to Western Europe via Albania, our people and equipment to help with house all potential asylum seekers while Montenegro, Bosnia, and Croatia. that,” Kaljulaid said. their applications are being processed

Border Security Report | May/June 2018 AGENCY NEWS 19

Considering the size of its population, El Comercio on April 13, 2018 at Officials expect that number to jump in Estonia is the biggest contributor to the Colombian border spurred the coming months — outstripping the Frontex with officials of the Police and authorities from both countries to take nearly 20,000 who crossed last year in Board (PPA) as well as combined measures to strengthen Quebec — and are putting resources border guarding equipment, but the security and guarantee the safety in place to accommodate the influx. country is always open to consider of the area. Dissident members of doing more. the Revolutionary Armed Forces of The RCMP recently erected a semi- Colombia (FARC, in Spanish), whose permanent structure at Roxham Road, leader goes by the alias Guacho, where they process and screen asylum kidnapped the journalists three seekers. The Quebec government is order guards detain weeks earlier in Mataje parish, in the also pressuring Ottawa to send more Russian over Ecuadorean province of Esmeraldas. of the claimants elsewhere after they ‘informationB war’ on Poland are processed. The countries’ ministers of defense and Border guards have detained a woman military high command held a special suspected of helping wage a Russian meeting of the Binational Border “information war” against Poland and Commission on April 17th in Quito, ith Focus On Mexican who has a ban on entering the country, Ecuador. The meeting was called Border, Greater according to a report. under the cooperation mechanism SecurityW Threat Could Be known as 3+2, which provides From Canada The woman, who is a citizen of Russia grounds for meetings between the two and Cyprus, is to be expelled from nations’ Foreign Relations, Defense, Poland, public broadcaster Polish and Interior ministries. Radio’s IAR news agency reported on Friday. The authorities agreed to an increase in military and police operations, with The woman, named only as “Anastazja 24-hour operations in Esmeraldas Z”, worked to consolidate pro-Russian province and in Tumaco, Colombia. groups in Poland in order to challenge Polish government policy on historical issues and “replace it with a Russian Competing versions of what constitutes narrative,” according to IAR. ar-right groups, counter- a safe southern border with Mexico are protesters rally over at the center of a debate echoing from Fasylum seekers at Canada- Mexico City to Washington, D.C. — U.S. border and especially in the four border states olombia and Ecuador of California, Arizona, New Mexico and Increase Counter- Texas. And citing national security, terrorismC Operations along President Donald Trump recently Border signed an order to deploy the National Guard on the southern border, adding to an already substantial presence of personnel and technology there.

However, some argue that when it comes to the potential for terrorism, So far this year, more than 7,600 the security focus should be applied asylum seekers have crossed into equally to the Canada-U.S. border. Canada at unofficial ports of entry, the vast majority of them at Roxham There are about 16,000 border The killing of three journalists from Road, which is a short drive from patrol agents on the Mexican border. the Ecuadorean daily newspaper Lacolle. There are about 2,000 agents on the

Border Security Report | May/June 2018 20 AGENCY NEWS

Canadian border, which is twice as The majority of the nearly 700,000 long as Mexico’s. The U.S. Attorney Rohingya who escaped the violence for the District of Vermont, Christina settled in huge camps in Bangladesh but Nolan, says she’s concerned about a smaller number insisted on staying put the northern border.. in the buffer zone between the borders.

Myanmar had agreed in February to stop using loudspeakers to order the stranded ight Israeli Bedouin police and the Sriganganagar Muslims to leave the area immediately Arrested for Drug police arrested three people from and cross into Bangladesh. SmugglingE Over Egypt Border Punjab’sTarantaran district for their alleged involvement in smuggling in the border area. akistan Rangers make The accused have been identified as truce with BSF after Jasvindra Singh alias Sonu, Jagraj facingP heavy retaliation Singh alias Billa and Ratanbeer Singh alias Ratan. The joint team also recovered two sophisticated pistols and two cartridges. Eight Israeli Bedouin have been arrested — and some are being SP Harendra Mahavar said the team charged with espionage —for allegedly was working on some input and following vandalizing security cameras along the the leads the arrests were made. Egyptian border last month in a drug smuggling operation, police and the Shin Bet security service announced. yanmar orders Pakistani Rangers were forced to An Israel Defense Forces tank driver, Rohingya to leave broker peace after Border Security Sgt. Eliyahu Drori, was killed in April in Mtense border zone Forces pounded their bunkers an attempt to catch the suspects now and other installations across the under arrest. While pursuing them International Border (IB) in retaliation near the Egyptian border, his tank to prolonged shelling in Jammu and rolled down a ravine, causing a shell Kashmir to push infiltration of militants. inside the vehicle to ignite. Three other The unprovoked firing was also to soldiers were injured in the incident. undermine the central government suspending operations to reach out to The eight suspects, residents of the people of Jammu and Kashmir during Bedouin community of Bir Hadaj in the the ongoing Ramzan. northern Negev, were charged in Be’er Myanmar security forces have resumed Sheva District Court; some of them, loudspeaker broadcasts near its border A senior BSF officer, aware of with espionage. with Bangladesh ordering Rohingya developments in Kashmir, told ET Muslims to immediately leave a strip that two Rangers and 6 civilians were of no-man’s land between the two reported by the Pakistani media to countries. have died due to our targeted heavy hree arrested on charges fire and 26 were injured. The Rangers of smuggling arms, Around 6,000 refugees from the called up the BSF unit in Jammu Tdrugs from Pakistan persecuted minority have been camping Saturday and urged our troops to stop on the narrow stretch of land since fleeing firing, said sources in the paramilitary In a joint operation, the Border Security a brutal military crackdown in Myanmar’s force. Force, the intelligence unit of Rajasthan west last August.

Border Security Report | May/June 2018 AGENCY NEWS 21

order Police find 6 tudy of Indonesia-PNG phones in smuggler’s Border Security bodyB intended for jail S The field of international relations and security studies is among the most dynamic and challenging aspects of politics. Relationship between states depend on various factors such as politics, economic cooperation and socio-cultural partnerships. Despite the growing interdependency between states through the means of bilateral, multilateral or regionalism, security Israeli Border Police officers arrested issues have remained to play a an Arab attempting to cross the vital role in determining their level security fence in the Jerusalem area of cooperation and coexistence. for the second time. Only minutes This qualitative research entitled: before he was jailed in Ofer Prison Indonesia-PNG Border security, six cell phones were removed from underlines Indonesia and PNG’s his body that were allegedly intended She was turned over to Riverside foreign policy while addressing the to be smuggled to security prisoners. County law enforcement and now impacts of Papuan separatism on faces narcotic smuggling charges. the 750km border. The relationship Last Tuesday evening, a Nitzan of Indonesia and PNG has remained Brigade forward observer spotted a The woman’s vehicle was seized cordial and robust over the years, suspect climbing the security fence in and transported to a secure facility. however the existence of the Papuan the a-Ram area as he tried to cross The vehicle underwent a routine conflict has often threatened to into Israel illegally. A team of Border secondary search to ensure there destabilize mutual understandings Police officers directed to the site was no additional contraband inside between the parties. located the suspect who was arrested the vehicle. As a part of the secondary and transferred for interrogation, after search, and with the aid of a recently The findings specify that the issue which he was released and returned assigned National Guardsman, Border of Papuan separatism is one the to Judea and Samaria. Patrol agents conducted a thorough sensitive and complicated political visual and physical inspection. During and cultural problems of the modern Last night the observer again identified the search of the vehicle, a National era. The sensitivity that lies behind the suspect trying to pass over the Guardsman located 11 additional the Papuan separatism issue has security fence in an attempt to infiltrate bundles of suspected contraband that often caused difficulties to Indonesia into Israel illegally, and once again a was deeply concealed within the door and PNG policy makers. Border Border Police team was able to locate panels of the vehicle. Border Patrol policies are designed to obtain the and arrest the suspect. agents took custody of the bundles, state objectives; however, cultural it was field tested and was positively aspects have always benefited the validated as methamphetamine. third party (OPM) in their existence along the border. Subsequently, the ational Guard & Border The bundles added more than 13 Papuan autonomy has allowed for Patrol Team Up to pounds of methamphetamine to the the acknowledgment of Papuan’s UncoverN Hidden Meth seizure, which now totaled over 68 cultural rights. Moreover, the Papuan pounds with an estimated value of separatism has managed to gain U.S. Border Patrol (USBP) agents $206,000. The National Guardsmen support from many external parties. in San Diego Sector arrested a are not assigned to do immigration The growing participation of external 31-year-old woman on Interstate tasks, will not have direct contact parties have triggered internal security 15 for transporting 51 bundles of with illegal aliens, nor will they carry concern. This study indicates that methamphetamine inside her vehicle. weapons. the Papuan separatism issue will

Border Security Report | May/June 2018 22 AGENCY NEWS

remain to influence Indonesia-PNG an allegedly involved Border Force officers have teamed border security in the years to come. in shooting tasered by up with state police to hunt 50 The designing of border policies MBorder Patrol people in hiding after overstaying should focus and encourage more on visas they were given to attend the building trust as means of overcoming Commonwealth Games. misunderstanding. More cooperation between all relative authorities such Home Affairs Minister Peter Dutton as the CIQS is vital to maintain a good says officers have launched an and favorable a relationship. operation to find the athletes and officials who disappeared after the Gold Coast event last month.

hai troops seize record Border Patrol agents responded to About 250 people who came for the meth haul on Myanmar a call for assistance from the police event remain in Australia. Tborder department to help find someone involved in an apparent shooting. Thai soldiers have seized a massive haul of methamphetamine in Chiang Agents say they were able to find the order force officials Rai Province in northern Thailand vehicle in question and attempted to defend dawn raid on Sri smuggled through the Thai-Myanmar conduct a traffic stop. LankanB asylum seekers border. The driver then stopped in the middle An official from the border task of the road, got out of the car and force confirmed that the drug haul began to approach the agents. was seized late Friday while the soldiers were inspecting vehicles at Border Patrol says the suspect ignored a checkpoint on the road between agent’s commands and resisted being Doi Luang and Wiang Chiang Rung taken into custody. After a struggle, districts in Chiang Rai. agents used a taser on the man.

The official said the suspect tried to officials have drive away after seeing Thai troopers defended taking a Sri Lankan family manning a checkpoint but the vehicle olice, border cops hunt from their central Queensland home fell into a ditch. Commonwealth Games and placing them in immigration overstayersP detention 1,800km away. “The ditch was only 350 metres from the checkpoint. A total 7.8 million Tamils Priya and Nadesalingam and methamphetamine pills and 50 kilos their two Australian-born children were of ‘ice’ or crystal methamphetamine swept up in a dawn raid of their Biloela have been seized,” he said. home in early March. The couple are in detention in Melbourne with their two During a news conference in girls, three-year-old Kopika and baby Chiang Rai a day later, Thai military Tharunicaa, as they await a decision officials said the soldiers found 39 on whether they will be deported. fertilizer sacks containing 7.8 million State police forces will work with methamphetamine pills and 50 kilos Border Force officials to try and track The ABF commissioner, Michael of ‘ice’ or crystal methamphetamine 50 people believed to be in hiding Outram, was quizzed about the case inside the vehicle. after overstaying their Commonwealth during a Senate estimates hearing in Games visas. Canberra.

Border Security Report | May/June 2018 SPECIAL REPORT 23 transforming passenger processing

SITA report outlines how biometrics Biometric technology is emerging technology and SITA’s report explores in identity management will transform as the top solution for airlines and innovative ID management programs passenger processing. airports to automate identity checks that are transforming the travel amid rising passenger numbers. This experience today. In the future, is according to Biometrics for Better these will be more commonplace Travel: An ID Management Revolution, worldwide as 63% of airports and 43% a report published today by SITA. of airlines plan to invest in biometric It outlines how using biometrics to ID management solutions in the next check passenger’s identity will power three years. faster and more secure self-service processes at airports as passenger Sean Farrell, Director, Strategy & numbers are set to almost double to Innovation, SITA, said: “Across the 7.8 billion by 2036. world, airlines are required to check that passengers are who they say they Airlines and airports are already are and that they have the right travel investing in various forms of biometric documents. This is a fundamental

Border Security Report | May/June 2018 24 SPECIAL REPORT

element of securing the travel process which cannot be eliminated. With passenger numbers set to double by 2036, airlines and airports need to be able to move passengers through these checks as securely and quickly as possible. Efficient identity management is essential for better security while at the same time improving the passenger experience. Biometrics is the technology that can deliver this.”

The good news for airlines, airports and the various government agencies involved in passenger identity management, is that passengers are happy to use biometrics. This technology is becoming increasingly commonplace in people’s lives. For example, by 2020 more than 75% of smartphones will have fingerprint that integrates easily with their existing Biometrics for Better Travel: An ID sensors. This user acceptance can infrastructure – kiosks, bag drop, Management Revolution combines be seen among passengers too. SITA automated boarding gates. Moving SITA’s global research with reports that the majority of passengers to single token identity management commentary and cases studies from would definitely use biometrics on where passengers can simply use airports, airlines and global entities their next flight. their biometric, such as their face, at that are exploring and adopting every checkpoint on their journey will biometric technology to transform Farrell adds: “Passengers are ready speed passengers securely through the passenger experience. Those and want to use biometrics. The the airport.” featured include Brisbane Airport, easiest way for airlines and airports to British Airways, JetBlue and Orlando make this happen is to use technology SITA’s report outlines how airlines International Airport along with industry and airports must have a global perspectives from the International consensus on how to securely Airline Travel Association (IATA). resolve passenger identity issues as an integral part of For further details of SITA’s full report the next generation of self- - Biometrics for Better Travel: An ID service systems. All industry Management Revolution see www. stakeholders have a role to sita.aero/id play to harness technologies that can make the processes better, faster and more secure. The air transport industry must collaborate across all stakeholders and across the globe with governments to ensure scalability and interoperability across borders.

Border Security Report | May/June 2018 CONGRESS NEWS 25 the most engaging discussions in border management EVENT REVIEW

Over 230 delegates from 52 organisations and movement and countries participated in the 2018 return of foreign fighters. World Border Security Congress which took place in Madrid, Spain on Supported by the Spanish Ministry of 20th to 22nd March 2018, for 3 days Interior, National Police and Guardia of great discussions, meetings, Civil, support was also delivered workshops and networking for the by the Organisation for Security & global border security experts. Cooperation in Europe (OSCE), the European Association of Airport and The international border security Seaport Police (EAASP), the African 20th-22nd March 2018 community gathered to discuss Union Economic, Social and Cultural Madrid, Spain the challenges from mass refugee Council (AU-ECOSOCC), National www.world-border-congress.com movements across Europe, illegal Security & Resilience Consortium, economic migrants from Africa International Security Industry and Asia, threats from terrorist Organisation and International

Border Security Report | May/June 2018 26 CONGRESS NEWS

Security and Co-operation in Europe and the President of the European association of Airport and Seaport Police.

The keynote speakers on day one articulated the importance of Border Management activity internationally and the significant challenges, which Governments, Policy Makers and Law Enforcement Agencies face with increasing pressures in a difficult economic climate.

The task for the event was to explore the major issues that were common to so many nations and seek to share experiences and continue to develop border management resolutions and solutions. Association of CIP Professionals, Guardia Civil demonstrating the World Border With a global audience from 52 Security Congress remains the both giving an insight into the nations and nearly 250 participants premier multi-jurisdictional global developments, latest technologies and the conference was delighted to have platform where the border protection operations that help secure the airports received some excellent presentations policy-makers, management and of Spain and the Mediterranean Sea. from a broad range of distinguished and practitioners together with security experienced border related experts. industry professionals, convene to Conference Chairman Closing Alongside this, and importantly, there discuss the international challenges Notes on World Border Security were some exceptional discussions faced in protecting borders. Congress – Madrid 20th-22nd March and debates teasing out some of the 2018 more demanding areas of concern Many exciting, interesting and and addressing them from a range of informative presentations were given An excellent conference which perspectives, both from government from all parts of the world, giving a truly was described by a senior border and commercial positions. global perspective on the international specialist of one of the 52 nations challenges being faced. that were represented as, “a timely The congress was very fortunate and important event focusing on the to have significant support from the The delegation enjoyed two great site most challenging issues facing border Ministry of Interior in Madrid, the visits: management internationally” Spanish National Police and the Guardia Civil. The event was also - Madrid Barajas International Airport, The welcome session set the scene most fortunate to have the support of, courtesy of the Spanish National for the 3-day congress with an initial and speakers from, a wide range of Police; and opening address from the Chairman, international security organisations John Donlon QPM followed by inputs who have a focus on and around - EUROSUR Maritime Coordination from the International Organisation border management operations. Centre, courtesy of the Spnaish for Migration, the Organisation for Organisations such as:

Border Security Report | May/June 2018 CONGRESS NEWS 27

At last year’s congress we heard a lot about Drug Smuggling and the international initiatives in place to tackle the issues, but not so much this year. However, we heard a lot more about Human Trafficking, a growing trend which is truly a global concern, with some particularly good references demonstrating how easy it is to miss something if you are not looking for it.

Modern Day Slavery was also a topic of considerable discussion and some • Organisation for Security and figures that were quoted, in terms The Chair of the congress closed at the Cooperation in Europe (OSCE) of the amount of people in slavery, end of day 3, thanking the participants • International Organisation for estimated to be 45.8 million really for their active participation across Migration (IOM) drove home the extent of the issue. a wide range of discussions and • United Nations Office for Counter linked the fact that all who attended Terrorism There was some surprise that there were seeking new ways through • European Association of Airport and was not more focus on Cyber activity new challenges and treating those Seaport Police (EAASP) and its potential implications for border challenges as opportunities to do • UK Border Force management information systems things better in the future. • EU Border Assistance Mission in but no surprise at all that there was Libya (EUBAM-Libya) a continuing theme on Information • EUROPOL Sharing. Again this year there were • AFRIPOL some very positive comments from The 2019 World Border Security • African Union Europol on the progress that has been Congress will take place in Casablanca, made in this area over the last 12 Morocco on 19th-21st March 2019, This was a truly global conference months. co-hosted by the Moroccan Ministry seeking to address global border of Interior and Directorate General for issues and challenges and one which A number of presenters spoke of the Migration and Border Surveillance. highlighted the need for continued continuing need for cooperation and efforts in developing, national, regional coordination and a quote that was Further details can be viewed at www. and international; Coordination, used on more than one occasion world-border-congress.com. Cooperation and Communication. captured the way forward: “Alone we can only do so much, but together we There was, this year, a great deal can do so much more”. of focus on migration pressures and the need for nations borders to be; Ordered – Structured and Safe to assist the enormous amount of migrant movement at a time when the displacement of people is even greater now than any time since the second world war.

As predicted, terrorism continued to be topic of special interest with a number of speakers presenting on the significant challenges that we all face globally and are likely to face for many years to come.

Border Security Report | May/June 2018 28 INDUSTRY NEWS

minute, their unique iris integrated with an Gemalto’s Biometric scan is securely registered automated door barrier Authentication Technology with Colombia’s Border by INCOMELEC, SAS. After Management System a quick glance at the iris Aims to Revolutionize (BMS). When re-entering reader terminal, identity the country, previously is validated via a secure Automated Border Control in enrolled citizens simply digital process and the enter their national ID automatic doors swing Colombia number on a touchscreen open. Gemalto and INCOMELEC SAS, a Colombian partner, are transforming the immigration and VSD System Selected for border crossing in Colombia through biometric iris verification implemented by Migración Colombia, the Middle Eastern Military country’s border control agency. Border & Maritime Security Programme Cambridge Pixel’s Video Security Display (VSD) system has been selected as part of a military mobile protection programme in the Middle East, integrating multiple sensors (radar and cameras) to provide comprehensive and effective monitoring for a border and maritime security application.

This innovative solution queues, congested waiting was launched in February areas and travel weary with a pilot program citizens. “BIOMIG” mitigates at Bogota’s El Dorado these challenges while International Airport. complying with Colombia’s The Automated Border stringent border control Control (ABC), known security requirements. locally as “BIOMIG”, is The solution integrates benefiting both citizens a highly intuitive iris and border officials. recognition terminal that The project involves the “We are delighted that Gemalto’s ABC speeds allows swift long range supply of forty systems our Video Security Display identity authentication iris capture from 35 to 45 through Cambridge Pixel’s software has been and significantly reduces centimeters away. This Middle Eastern partner selected for this border bottlenecks in the eliminates physical contact - Defense Integrated and maritime security immigration process while with the terminal and Solutions Security Systems programme. The software maintaining strong security improves comfort and ease (DISS). Each system is has been designed to control for each traveler. of use. To use the service, equipped with multiple address a wide variety of A growing majority of Colombian citizens aged sensor interface hardware security and monitoring airport arrivals in Bogota – 12 and older only need and the VSD application requirements and will up to 60% - are Colombian to visit one of 30 BIOMIG software for deployment provide the end user citizens re-entering the enrollment stations at the on a mobile platform. with a highly flexible and country. This often results airport as they exit the David Johnson, CEO, powerful solution.” in long immigration country. In less than one Cambridge Pixel, said,

Border Security Report | May/June 2018 INDUSTRY NEWS 29

Blighter Surveillance Systems mobility wrapped with the thoughtful secure first sale into India design and reliability that are Crossmatch for its Blighter B400 series hallmarks,” noted John Hinmon, vice president E-scan micro Doppler ground transistor sensor for of marketing. “We offer surveillance radars superior outdoor and complete flexibility and bright ambient light mobility during in- Blighter Surveillance Systems, a British designer and performance and are not field identification and manufacturer of electronic-scanning (E-scan) radars impacted by tattooed or verification applications. and surveillance solutions, has secured its first sale stained fingers. The FAP Law enforcement, into India for its Blighter B400 series E-scan micro 60 format facilitates rapid border control and military users are not Doppler ground surveillance radars. fingerprint collection of non-cooperative subjects encumbered by power and those with large and communication cords, hands, yet stores easily in light sensitivity or hard to your pocket. use smaller platen formats – those hassles don’t exist “The NOMAD 60 Wireless with NOMAD.” Reader delivers true

DERMALOG: Market leader for biometric border control

The contract was awarded in Gwalior in November/ ”Made in Germany“ by system integrator Tata December 2016. The More travellers, shorter check-in times and increasing Power Company Limited Blighter radars will be cost pressure – in times of globalization, cross-border (Strategic Engineering deployed by Tata Power traffic is challenging authorities. The biometrics Division) following during 2018 as part of innovation leader DERMALOG offers efficient and Blighter’s success at the Indian Government’s secure solutions to these challenges. a radar/sensor trial Comprehensive Integrated organised by India’s border Border Management DERMALOG Identification Twelve states, including management organisation System (CIBMS). Systems GmbH, based in Singapore, Malaysia, Hamburg, offers state- Maldives, Cambodia, Crossmatch Receives FBI of-the-art biometric Algeria and Brunei, recognition systems to are already relying on Certifications for Mobile make airport checks DERMALOG’s solutions and other border to monitor their national NOMAD 60 Wireless controls more secure borders. The company’s and more efficient. fingerprint scanners are Fingerprint Reader Biometrics can make an also in use at German Crossmatch, has announced its mobile NOMAD 60 important contribution to airports and at border Wireless Reader received the FBI Appendix F and significantly speeding up crossings in Switzerland Mobile Identifcation FAP 60 certifications. and simplifying passenger and the Netherlands. handling, for example, This makes DERMALOG Representing the latest in NOMAD readers utilize by facial or fingerprint Europe’s leading provider fingerprinting technology, a capacitive thin-film recognition. of border control systems.

Border Security Report | May/June 2018 30 INDUSTRY NEWS

infrastructure or frequent aggregates and checks power outages need a against everything from mobile, infrastructure- Facebook data to police independent screening interviews to ensure solution to ensure authorities can follow up security and maintaining on suspicious characters processing flow. and clear innocent With 20 years of travelers with confidence. experience applying AI to Basis Technology has human language, Basis also developed a mobile Technology is developing screening device that can operate entirely The core of the the DERMALOG Self a comprehensive, two independently of power DERMALOG solution is Registration Kiosk and pronged solution for these or internet connection, a so-called Automated the DERMALOG Gate. modern border security providing authorities with Biometric Identification Equipped with latest issues. the flexibility needed to System (ABIS). The camera and scanner For high volume points of deal with less-than-ideal multimodal system cannot technology, travelers entry, Basis Technology border security situations. only match fingerprints can be checked fully is developing a modern but also additional automated. The portfolio screening solution that biometric features such as is complemented by facial or iris patterns. This video surveillance systems makes DERMALOG ABIS with integrated face A Unique Solution for much more reliable than recognition. If monitoring solutions that only check from the airspace is Effective Border Control one identifier. required, the DERMALOG Situation: Border crossings have been increasing technology can also be Especially for border in virtually every country year over year. The US control at airports, integrated in drones. handled nearly 400 Million travelers in 2017, while DERMALOG has developed the UK processed over 300 Million people and Australia process over 40 Million people. To add to A Border Technology Story the complexity, most countries support hundreds of ports of entry, including air, sea and land. In 2015, three students a Bethnal Green Academy with known terrorists connections flew without issue from London to Syria to marry ISIS fighters. Had the screening process need of an update. taken into account their Areas with heavy traffic online history or Scotland need a robust identity Yard’s records, their verification process that terrorist plot would have checks against more ended in the airport. than just a list of names. Two of these “Jihadi Brides” Online history and police are still unaccounted for. report data provide While healthy border insight into an individual’s protection is critical in profile—and are essential a global economy, the information to modern technology in use at many border screening. points of entry is in serious Areas with poor

Border Security Report | May/June 2018 INDUSTRY NEWS 31

The typical border should be speaking to enforcement agent has an investigative agent. minutes to determine Based on content stored if the person they are in their phone, Cellbrite admitting into their can scan images, video, country is a bad actor, and contacts, geo-locations, often it is based on the email, text and application stamps in their passport data to help border agents and whether they act or determine if a person look suspicious. has a suspicious digital Now imagine a new footprint – all within process: One where you minutes. The same data can scan their mobile analysis is made available for many operators. detection equipment with to the investigative agent phone within minutes This new digital panel ease and comfort. so they can ask formative and based on their digital comes in two distinct Combined with Teledyne questions to rapidly footprint, determine sizes. The FLATSCAN30 XS ICM’s unique constant determine the threat level. whether that person(s) enjoys a detection area potential X-ray sources of 30 in (76 cm) across, CP120B - CP160B and enabling scanning of large their reduced focal spot, Teledyne ICM release new objects in one single shot, the new FLATSCAN XS while the FLATSCAN15 scanners deliver sharp, range of extra slim and light XS is a reduced panel of clear and detailed images 15 in (38 cm) - perfectly of any object at high portable X-ray scanner fit for Teledyne ICM’s new speed. Teledyne ICM have released a new range of extra backpack solution. Flat In a crowded airport, or slim and light portable X-ray scanners for the security panel, generator, and at a busy checkpoint, market. Building on the success of its predecessor the tablet can easily fit into FLATSCAN XS scanners FLATSCAN range, the all-new FLATSCAN XS is a direct one single backpack, answer the needs of many response to the evolving portable X-ray market. enabling the end user to X-ray professional around carry this carbon-based the world. Experts in many fields X-ray solutions. With the such as EOD, customs and increasing use of EOD law enforcement agencies robots and the constant are constantly requiring weight of 80-lb (36-kg) lighter, more compact bomb suits, extra-light and ever more mobile equipment is a godsend

ADVERTISING SALES

Sam Baird Paul McPherson (UK, Germany, Austria, Switzerland, Israel & ROW) (Americas) E: [email protected] E: [email protected] T: +44 7770 237 646 T: +1-240-463-1700

Jerome Merite Isaac Shalev (France) (Israel) E: [email protected] E: [email protected] T: +33 (0) 6 11 27 10 53 T: +972 (3) 6882929

Border Security Report | May/June 2018 19th-21st March 2019 Casablanca, Morocco www.world-border-congress.com

Building Trust and Co-operation through Ministere de l’Interieur Discussion and Dialogue & Directeur de la Migration at de la Call for Papers Surveillance des Frontieres

Abstract Submittal Deadline - 31st July 2018 To discuss exhibiting and Submit your abstract online at www.world-border-congress.com sponsorship opportunities and your involvement please contact: Borders in the Maghreb are increasingly dangerous. Armed with tools designed for the pre–Arab Paul Gloc Spring environment, Morocco, Algeria and Tunisia face a complex new world of transnational actors (UK and Rest of World) that leverage borders for profit and for sanctuary. E: [email protected] T: +44 (0) 7786 270 820 The Arab Maghreb Union (AMU) was designed to deepen cooperation among the Maghreb states, buttress the region’s economy through greater interregional trade, enable the free movement of Paul McPherson people, and lay the groundwork for future political integration. However, the promise of an integrated (Americas) E: [email protected] Maghreb has not materialized, though the union still exists. T: +1-240-463-1700 The region is also a main thoroughfare for the West African human trafficking and migration route to Sam Baird Southern Europe, with access to Spanish soil and the EU border in the North African enclaves of Melilla (Germany, Austria, Switzerland & and Cueta, just a short journey from mainland Europe across the Meditteranean, whilst smuggling of Israel) arms and illegal goods across North Africa also adds pressure on the governments and border security E: [email protected] forces of the region. Annabel McQueen Advancements in technology are assisting in the battle to maintain safe and secure international travel (Benelux) and detect illigit goods and smuggling. The border security professional still remains the front line E: [email protected] T: +44 20 8249 6152 against these threats. Jerome Merite The World Border Security Congress is a high level 3 day event that will discuss and debate current and (France) future policies, implementation issues and challenges as well as new and developing technologies that E: [email protected] contribute towards safe and secure border and migration management. T: +33 (0) 6 11 27 10 53 We look forward to welcoming you to Casablanca, Morocco on 19th-21st March 2019 for the next Vishal Mehta gathering of border and migration management professionals. (India) E: [email protected] www.world-border-congress.com T: +91 99 999 85 425 for the international border management and security industry

Supported by: Media Partners:

WBSC2019 CFP A4 Advert.indd 1 21/05/2018 16:29:54