Now incorporating 112 Review, Community Safety Review & Military Review

Advanced IED defeat course and battle drills help save lives

CAMP ADDER, Iraq: All Soldiers are trained on various convoy operations before they deploy, even if they never step into an armored vehicle during their deployment.

Here at Camp Adder though, some Soldiers continue to hone their skills because it can save their lives.

"We're doing convoy lanes training," said Sgt 1st Class Robert Moore with the 121st Brigade Support Battalion. "It involves everything we would do in a convoy."

The battle drills include summoning medical evacuations, reacting to improvised explosive devices and vehicle recovery.

"We have to make sure we can get from point 'A' to point 'B,'" said 1st Lt. Jennifer Beatty, the convoy commander of "G" Platoon.

Beatty's job is twofold. Not only must she take command of a convoy of armored vehicles crossing Iraq, but she also has to make sure her Soldiers are up to speed on their weapons and equipment.

While everyone has a duty to perform, Beatty gets all of her Soldiers trained in every job they may encounter during the convoy.

"I make sure the Soldiers are cross-trained in special tasks and teams," she said.

If one person goes down, someone else might need to take charge, whether it is as a gunner, driver or medic.

Currently, "G" Platoon is practicing IED defeat, in which the Soldiers must react to roadside bombs.

As they drove through the training area their eyes watched for any signs of possible explosives.

Spotting a fluttering bag on the side of the road weighted down, with wires sticking out, the convoy stopped and called up a nine-line request to address possible unexploded ordinance.

Unfortunately for them, just because they saw it did not mean they would get out of the training to react to a disabled vehicle. As they passed by, a small explosion went off near one of the Mine Resistant Ambush Protected vehicles.

Air Force Staff Sgt. Tor Hvidsten, an explosive ordinance disposal specialist with the 407th Expeditionary Civil Engineer Squadron, and his team set up the explosives, placing a primary and secondary explosive to best mimic the attacks from insurgents.

"This way, they can feel the blast and react properly," Hvidsten said.

While not large enough to injure the Soldiers in the vehicles, it can be felt and heard by everyone.

"The explosive simulates the real thing," Moore said. "It gives off smoke and light and can disorientate you."

After the explosion, the convoy came upon Moore "wounded" and the MRAP disabled. Moving quickly, the various teams set to work. Some pulled security around the convoy; others rescued Moore from the vehicle and strapped him to a stretcher so they could carry him to their medical vehicle.

Once the wounded were secured, the tow bar was connected to the "damaged" vehicle and the platoon was ready to move again.

"I love this training," Beatty said. "It gives us an idea what to work on and what to sustain."

Sgt. Francin Horton

U.S. Looks to Defeat IEDs on Three Fronts

WASHINGTON, DC, USA: Defeating the terrorists’ weapon of choice is and will remain a priority for the Defense Department, Deputy Defense Secretary William J. Lynn III said recently.

Lynn spoke during a Pentagon ceremony where Army Lt. Gen. Thomas Metz stepped down as director of the Joint Improvised Explosive Device Defeat Organization and Army Lt. Gen. Michael Oates took up the charge.

The organization looks for ways to defeat terrorists using car bombs, roadside bombs, as well as suicide vests – all examples of improvised explosive devices. The bombs are the biggest killers of American service members in Iraq and Afghanistan. The weapon is a tactical device that has impacted the operational missions in both Iraq and Afghanistan.

“We must preclude the IED from impacting us strategically,” Metz said. “We cannot allow this weapon to influence the national-level decisions of our most senior leaders.”

“Under General's leadership, JIEDDO has moved forward on three lines of operation: attacking the networks that place IEDs, devising ways to defeat the device and training our forces to counter the threat,” Lynn said.
The organization – only four years old – is a model of rapid acquisition, Lynn said. Its military and civilian staff quickly finds and employs ideas and technologies that can help service members in harm’s way. The organization operates with the services and combatant commands in Afghanistan and Iraq, Lynn said.

The threat continues, Lynn said, noting that in October IEDs claimed the lives of 41 coalition soldiers in Afghanistan and one soldier in Iraq. The devices “are a clear and present danger,” the deputy secretary said.

And the enemy knows how to use the devices. “In Afghanistan we are up against a determined and clever foe who mastered the use of this deadly technology long before our forces set foot in the mountains of the Hindu Kush,” Lynn said.

The Soviets lost nearly 2,000 soldiers and 1,200 vehicles during their nine-year war in Afghanistan, the deputy secretary said.

“That IEDs have defeated another technologically advanced military in the very same place we fight now, only adds to the urgency of our mission,” Lynn said. “Our ability to project power in this world of asymmetric threats and to secure our population at home depends on JIEDDO’s success.”

Measuring success remains an issue for the organization. “We may never find a way to determine how many lives and limbs we are saving, how many warfighters return home with their eyesight and how many have avoided serious burns that would have left them in pain for the rest of their lives,” Metz said.

The departing general thanked his staff, citing their dedicated and professional service. He also told them he is proud of the work they did together and the record they have made. Metz said getting the organization made a permanent entity was the toughest challenge of his time.

Still, a number of challenges remain. “JIEDDO’s establishment is a mandate to bring us to the reality of the enemy we currently face,” Metz said. “Our role is to ensure that the fight we are currently in has a champion; one that can take prudent risks and rapidly respond to the warfighters’ needs.”

The organization has a transparent process in place to manage funds, “but if we add more and more layers of bureaucracy and thus time to get things done, we relinquish the initiative to the enemy,” Metz said. “The enemy is smart, innovative, agile, cunning and ruthless.”

Minimizing bureaucratic roadblocks will assist JIEDDO, Metz said, since the enemy operates in disregard of Defense Department contracting rules and budget cycles.

Oates thanked Metz “for looking out for our soldiers” and said he was proud and happy to be part of the organization. The incoming general also pledged to work with all to solve the very complex problem posed by improvised explosive devices.

Jim Garamone

Piracy on the High Seas

Piracy and how to deal with it

by Michael Smith (Veshengro)

The question is as to what approach shall be taken and my suggestion would be the one of times gone by. Some of my suggestions will be seen as controversial but...

While we may no longer be dealing when it comes to piracy and pirates on the high seas with pirates of the Caribbean and the likes of Black Beard & Co. piracy on the high seas is still a threat, and in certain sea areas more so than ever.

Merchant vessels are more vulnerable nowadays as merchant vessels and merchant mariners are no longer armed nor are they trained in the use of weapons and defensive methods, bar those of outrunning and outmaneuvering the pirates. The latter methods do not and cannot work as merchant shipt are way too cumbersome today.

We may need an urgent rethink there.

Nautilus, the seafarers union, are against arming vessels and crews and so do seem many sailors and masters but...

In addition to the fact that ships sail unarmed into harm's way we seem to have naval forces of certain nations reluctant to intervene when they see a hijack taking place, as in the case of the British couple who were seized with their yacht.

A Royal Navy vessel on patrol apparently witnessed the act but did nothing, claiming they were afraid to endanger the lives of the people on board the yacht. Are we really to believe that was the real concern or was it that they did not want to put their sailors in danger for but a small yacht?

In my opinion it is time that the maritime world would reconsider the option that was used against the pirates in the Caribbeans and go back to the ways we dealt with pirates in some centuries ago.

The French Navy and its Legion Marines seem to be able to deal with pirates much more effective. They do not mess about. They act.

When one heard the other day one of the British task force commander talk on the radio stating that it was difficult to get the pirates, as and when captured, in front of a court and hence there was little that could be done, if one would read between the lines, he basically told the pirates that they could go on without having much to fear.

What court is needed to deal with such pirates. The law of the sea was that a captain could act in such matters and it is time we went back to that way. Pirates would soon become a thing of the past, proper, if they would know that attacking a ship would be a 99% chance of going straight to Hell.

Presently, however, the business is thriving for them along the coast of Somalia and the Yemen, and other such places.

With the right attitude by all merchant shipping those people would think more than twice to attack a ship in order too capture it.

Pirates are criminals, but on the high seas, and no country's direct jurisdiction applies there bar the one of the ship attacked or the law of the seas.

Let us make it plain to the pirates that the law is that if you attack a ship you will be engaged in a fight that you will, more than likely, lose and if captured you will be tried by a court on board ship and the sentence is to be more likely than not death.

The “developed” world, who runs most merchant shipping, is too soft, however, and we have way too many back room lawyers telling us that the human rights of such thugs have to be respected.

A little change in attitude from the merchant marines and the outcome would b e a different one and piracy soon would be gone for good. They pirates would find another hobby.

Just some food for thought and a different perspective. It is a war out there with different rules that at home in the confines of the old Bailey.

© 2010

Safety measures protect ship from piracy

by Michael Smith (Veshengro)

MANAMA, Bahrain: On January 17, 2010 the Jamaica-flagged MV Miltiades (MV stand for motor vessel) came under attack and successfully deterred suspected pirates while transiting approximately 130 nautical miles southwest of Al Mukalla, Yemen.

The pirate skiff fired at the vessel with AK-47 rifles. The security team aboard the Miltiades fired red flares and the ship then took recommended evasive maneuvers to cause the skiff to break off the attack. No injuries or damages were reported aboard Miltiades.

Early detection of suspected attacks is the first line of defense against piracy, but other practices include using flares, out running attackers or using heavy wheel movements, use of non-lethal devices, such as netting, water hoses, electric fencing, wire and long-range acoustic devices. These practices have proven effective at deterring piracy.

"We continue to highlight the importance of preparation by the merchant mariners and the maritime industry," said Commodore Tim Lowe, deputy commander of the Combined Maritime Forces. "The efforts of the coalition naval forces deployed to the region are deterring and disrupting pirate attacks. However, when vessels have practiced self protection measures, the risk of being pirated has been greatly reduced."

Combined Maritime Forces (CMF), operating out of Bahrain, continues to urge mariners to employ defensive measures when transiting the Horn of Africa, Gulf of Aden and the Indian Ocean.

CMF patrols more than 2.5 million square miles of international waters to conduct both integrated and coordinated operations with a common purpose: to increase the security and prosperity of the region by working together for a better future. CMF is working to defeat terrorism, prevent piracy, reduce illegal trafficking of people and drugs, and promote the maritime environment as a safe place for mariners with legitimate business.

The problem with those recommeded actions are that often the pirates do not give up and what then. Also, in my opinion, some of the measures described aboive as recommended by the CMF command can, in fact, be dangerous. I know, so can arming vessels, they say.

© 2010

CONSERVATIVES' NATIONAL SECURITY PAPER 'IMPORTANT CONTRIBUTION' TO VITAL DEBATE

Security industry should be recognised - it protects the nation & its world-leading high-tech exports can also help lift UK out of recession

A|D|S, the UK's AeroSpace, Defence and Security trade organisation welcomed the publication of the Conservative Party's Green Paper on National Security "A Resilient Nation" at Chatham House as an important contribution to the national security debate.

Industrial capability is vital to tackling the security threats that the UK faces in partnership with the Government. To achieve this, it is important that the overall budget for defence and security is sustained for the long-term. The defence budget was 4.4 per cent of gross domestic product 20 years ago but it is now 2.3 per cent. This downward trend must be arrested if the UK is to remain at the top table of world affairs and retain its capability to protect its interests at home and abroad. Therefore, the Government of the day must invest adequately in the industrial technologies and solutions that are required for this task and should also recognise the contribution of the UK's defence and security industries in contributing to wealth creation and UK exports that can help move the country out of recession.

Ian Godden, Chairman of A|D|S, said: "We welcome the publication the Conservative Party green paper on national security and the attention that the Opposition is paying to the vital debate on how to protect our population. The paper is an important contribution to that debate.

"The UK security supply industry is a world-leader in high-technology development to keep our country and its population safe. Alongside this benefit to our safety, the industry is also well-placed to deliver a major boost to the flagging UK economy through exports of world-class technology to other countries who seek to protect their citizens too.

"The Conservatives Green Paper rightly acknowledges the broad range of strategic security risks that the country now faces. It also identifies the need for a more joined-up strategic approach on matters of national security and it is encouraging that the paper treats defence and security issues in an integrated way. In this context, the proposal to establish a National Security Council (NSC) is a significant development. If the NSC materialises under any Government A|D|S would encourage and welcome the representation of industry within the structures of the new body.

"It is encouraging that a Conservative Government would commit to engage industry in a sustained dialogue on strategy and policy development and that the strength of our defence and security industries' technology is recognised. We will continue to seek strong political leadership that recognises the contribution of industry in delivering National Security and on defence we believe that we can offer solutions to assist in the aim of improving the equipment procurement process. The UK Security and Resilience Industry Suppliers' Community (RISC) is already in place to ensure that strategic engagement between Government and industry on matters of National Security is coordinated and effective. Industry would encourage any future Government to maintain strong links with RISC as a useful conduit to industry."

Airliner bombing attempt emphasises need for vigilance in Counter Terrorism

The attempted downing of Northwest Airlines (NWA) flight 253 as it approached Detroit Metro airport on Christmas Day has exposed a fatal flaw in US intelligence gathering and dissemination and renewed calls for greater levels of information sharing amongst agencies nationally and internationally.

The incident has particular resonance for speakers and delegates at the forthcoming Counter Terror Expo conference and exhibition, due to be held 14-15 April 2010 in the National Hall at London Olympia.

Over two full days high level attendees will debate issues such as intelligence sharing and greater cross border cooperation in the fight against international terrorism.

“This incident is a text book example of how systemic failures and human factor issues conspired to allow a lone individual with direct links to al-Qaeda in the Arabian Peninsula to get far too close for comfort to achieving a goal of blowing up a passenger jet over a major United States city,” comments Peter Jones, Managing Director, Counter Terror Expo. “President Obama has ordered a full scale review of the incident in order to ensure it doesn’t happen in the foreseeable future. The lessons learned from this review will doubtless filter down and be subjected to peer review at this globally significant event.”

Counter Terror Expo brings the world’s leading thinkers in the arena together annually with those tasked with turning strategy into meaningful deliverables from across the globe. The event seeks to foster much closer ties between agencies tasked with preventing terrorist outrages and is actively supported by leading sponsors including Thales DLJ UK, Rapiscan Systems, EADS, Lockheed Martin, Smiths Detection, Panasonic, Bosch and others.

The event comprises an extensive high-level conference, multiple supporting specialist workshops and one of the biggest technology exhibitions of its kind in the world today.

Principal conference themes with particular importance in light of current events include Building Cooperation across Europe and Internationally to Combat Terrorism in the Current Climate; Cooperative Counter Terror Strategies with South East Asian Countries, Facilitating Transatlantic Action in Response to Terrorism and The Role of the United States in Countering the Changing Face of International Terrorism amongst others.

“When the system of intelligence gathering and information sharing fails in its primary role of protecting people against those who would wish to do us harm, it is vitally important that lessons from that failure are learned quickly. Counter Terror Expo is the internationally recognised forum enabling rapid dissemination of strategic countermeasures and exists to foster greater understanding of events that have occurred previously and how they can be avoided in the future,” concludes Peter Jones.

Counter Terror Expo will be held 14-15 April at the prestigious National Hall at London’s Olympia Conference and Exhibitions Centre.

<>

Creating uniform security across the police force

By Holly Sacks, Senior VP, Marketing and Corporate Strategy, HID Global

Identity and access management (IAM) continues to a huge challenge for police forces throughout the country. Enabling employees to quickly and securely access data and facilities has always been a high priority. The growing number of data sources now available to police is making it more critical than ever that the right people have access to the information they need, and that this data can be assessed and monitored in a secure way.

However, a legacy of disparate IT systems with little ability to work together means that this is no small undertaking. Police forces in different regions currently have different levels of access to different systems, each of which has its own IT platform and its own access control platform. The National Policing Improvement Agency (NPIA) has launched a review of IAM processes within the police force that is designed to bring these systems together in the best way possible. As a core part of the review, the NPIA is aiming to provide every police officer in the UK with a multi-application smart card that can combine logical and physical security.

The project focuses on authenticating the identity of officers and civilian staff who access police systems via a single user identity that can work across all police systems. With police increasingly accessing confidential data via mobile devices, in-car units and station-based PCs, the ability to safely access systems from any location will also cut costs incurred through travel while boosting the time available for frontline policing.

A nationally aligned smart card system would also reduce the IT and administrative costs associated with resetting forgotten usernames and passwords, and it would conserve man hours spent on these tasks. The police face constant demands to be a more visible presence on our streets and the ability to access IT systems with a single smart card minimises downtime spent on administrative tasks, and freeing up bobbies to get on the beat.

Another interesting potential application for smart card technology is in securely checking out firearms from a police station. Every time a police officer takes a weapon out of the police station, he or she has to show a warrant card to the person in charge of the armoury; that person will inspect the warrant card and sign a piece of paper; the paper is countersigned by the officer in charge; and only then does the requesting officer take receipt of the weapon. When the weapon is returned, the process is repeated. This kind of convoluted process is a prime example of one that could be handled electronically with a combination of radio frequency identification (RFID) tags on the firearms themselves, a contactless smart card for the officer and a contactless card smart reader at the checkout point.

As police forces across the country look to combine their logical (IT) security and physical access control into one multi-purpose system, there are several options open to them. The most basic form of secure access control is the magnetic stripe – or ‘mag-stripe’ – card, where magnetic data is stored on the back of the card. While mag-stripe cards are inexpensive to produce, they can be more costly in terms of maintenance. Magnetic stripe cards come in contact with the reader when inserted, and any debris that collects on the card inevitably ends up inside the reader and on its contact pins. They are also susceptible to magnetic interference and wear and tear: constant swiping through the card reader causes the stripe to deteriorate and eventually fail. This type of card is also extremely restricted in terms of its data storage capacity compared to that of smart cards, some of which now have up to 164K of memory.

But perhaps their biggest disadvantage is that they are very easy to clone. You can even buy a mag-stripe reader from a high-street store that will let you take data off one of these cards and use it to create an unlimited number of clones. This is clearly an unacceptable risk for the police force where officers have access to the personal details of criminals like terrorists and paedophiles. The consequences of this information being released into the public domain by someone with unauthorised access are easy to imagine.

A far more secure and flexible option is the new generation of contactless smart cards that use encryption and the internal computing power of a smart chip, reducing the risk of data being compromised or cards being duplicated. Contactless cards can offer three levels of security: single, dual or three-factor authentication. With single-factor authentication, using the card on its own will grant access to a system or open a door. Dual-factor authentication adds an extra level of security in the form of a PIN code. Three-factor authentication goes a step further, using a PIN code and an extra security measure such as a biometric scan. Contactless smart cards are traditionally used for physical access control and are now being adopted for logical access control as well.

The other advantage of contactless smart cards is the possibility for adding other applications such as contactless payments for the staff canteen, time and attendance records and authorised equipment check out.

As with all areas of the civil service, the cost of implementing and deploying a new, nationwide IAM system is a key consideration. However, the need to identify, authorise and authenticate users is a critical one. It’s clear that government and police see this drive as one that is definitely worthy of investment.

Portable and secure, contactless smart cards are fast becoming a valuable tool for safeguarding physical security and guaranteeing the privacy of sensitive electronic information across many sectors. When weighing up the costs of smart card technology against the benefits, it’s obvious that they can offer considerable value to the UK police force, saving time and money, protecting officers and civilian staff and safeguarding the public’s data.

HID Global is exhibiting at Infosecurity Europe 2010, the No. 1 industry event in Europe held on 27th – 29th April in its new venue Earl’s Court, London. The event provides an unrivalled free education programme, exhibitors showcasing new and emerging technologies and offering practical and professional expertise. For further information please visit www.infosec.co.uk

HID Global is the trusted source for secure identity solutions for millions of customers around the world. Recognised for robust quality, innovative designs and industry leadership, HID Global is the supplier of choice for OEMs, system integrators, and application developers serving a variety of markets, including physical and logical access control, card personalization, eGovernment, cashless payment and industry and logistics.

Article supplied by InfoSecurity PR

UK and US Outline Strategy for Counter-IED Military Operations

Taliban use “IEDs to try to undermine international willingness to stay the distance.”

Prime Minister Gordon Brown announced this month that the UK government would be investing an extra £150 million (€167.61 million, $240.17 million) in countering the improvised explosive device (IED) threat to military operations in Afghanistan. This will include an additional £10 million being put towards buying 400 hand-held mine detectors on top of the £12 million allocated earlier this year for new explosive disposal robots. There are now 30 of these in operation in Afghanistan.

Brown also outlined a package of longer-term investment in counter-IED capability, which will include setting up a new base in the UK for training and military operations intelligence in this area.

The prime minister added that he had agreed with President Karzai that Afghanistan would help troops on military operations to detect and dismantle IEDs.

This will include Afghan Armed Forces being trained to detect and disable IEDs, more local police on the ground and better intelligence from local people about the source of IED attacks.

Afghans will be encouraged not to harbor those planning explosive attacks on British soldiers, President Karzai assured the British prime minister.

Afghanistan's biggest problem, and that of the West doing something there, is President Karzai. This corrupt warlord, who the allies think can be manipulated to their ends, is what keeps and causes the people to support the Taliban, as is the case in many areas. President Karzai and his ilk, in fact, are the greatest obstacle to peace in Afghanistan.

Military Operations To Take Offensive

IEDs remain a huge threat to military operations as well as the lives of troops in Afghanistan. Explosives were responsible for the deaths of 124 of the 239 UK personnel killed in the conflict since it began in October 2001. Most of these were IEDs.

Senior figures from the British military, coalition countries and the UK's Ministry of Defence scientists and engineers met in July this year for a conference to discuss strategy and tactics in countering the IED threat during military operations.

"There has been an operational switch by the Taliban who are using IEDs to try to undermine international willingness to stay the distance to achieve our long-term objectives," noted vice-chief of the British defence staff General Sir Nicholas Houghton, at the briefing in July.

Military strategists said the tactic was to adopt an offensive stance in dealing with these threats. This means attacking the networks that produce and plant IEDs as well as developing protection against them.

Linking technology, training, tactics and procedures and intelligence will be key to undertaking military operations to unearth those who finance, create and conceal the bombs.

Furthermore, armed forces will analyse data gathered from recovered IED material and information from captured insurgents.

This, combined with surveillance records, will be used to build up an understanding of the process behind IEDs. It was agreed that the strategy for military operations must also be coordinated and integrated between coalition countries, whose communications networks must be able to talk to each other.

JIEDDO Specialist Teams

More recently, the US Joint Improvised Explosive Device Defeat Organization (JIEDDO) has provided battalion-level units deployed in Afghanistan with specialised counter-IED teams through its Tidal Sun pilot training initiative.

This involves training select groups of war fighters in IED forensics and technical intelligence, with the initial phase of the pilot involving 40 soldiers and Marines grouped in two teams of five or six specialists.

"Our goal is to create teams of counter-IED experts, where the IED is their dedicated focus and not a peripheral task. They won't be pulling gate guard duty on the side," said Marine Corps Colonel CJ Mahoney, JIEDDO Joint Center of Excellence chief of staff.

The pilot has involved experts from the UK Canada and Australia as well as explosive investigation experts from the US Bureau of Alcohol, Tobacco, Firearms and Explosives, the Defense Intelligence Agency, the Central Intelligence Agency and the National Ground Intelligence Center.

"What is unique about Tidal Sun is that it's a deliberate operation to bring together what we think are key analytical capabilities," added Command Sergeant Major Todd Burnett, JIEDDO's senior enlisted advisor.

"These teams will be able to pick up the pieces, find traces of explosive elements, find fingerprints and put their findings in a detailed analytical document," he continued.

They will examine "explosive signatures,” chemical traces and blast patterns to develop and overview of how an IED attack has unfolded. This information will then be analysed by the team and passed on to the relevant agencies for external study ahead of future military operations.

"We need to exploit all the information we can from an IED attack. Tidal Sun and the counter-IED teams enable us do that in a very robust, coherent and comprehensive way," Burnett concluded.

Without wishing to sound defeatist, the fact is that Afghanistan cannot be held and turned around into a western-style democracy. The forces of the British East India Company and later the British Army, the the Russians, have lost there.

Afghanistan is not Europe nor the USA nor even the Russia (or the former USSR). It is a tribal country where local warlords and others of that kind hold sway and democracy, the way it is being understood by the West will not work there.

The village councils are a sort and form of democracy but entirely different to the model that we are trying to impose on Afghanistan and because we are trying to impose something it is not going to work and our warriors are being killed.

A entirely different approach is required if we want to “pacify” Afghanistan.

© 2010

<>

Borderpol Calls For Intelligence Led Airline & Border Security

As governments worldwide scramble to respond to the so-called 'underpants bomber', Umar Farouk Abdulmutallab, who boarded airplanes freely from Lagos to Amsterdam to Detroit, BORDERPOL calls for the formation of international border organization to provide an international solution to an international problem.

So far, we have heard little from the US and UK beyond speeding up the use of body scanners at airports and prescribing who should be scanned. But are scanners the answer?

A basic fact is that that there were grounds for preventing Abdulmutallab from getting on to an aircraft in the first place, as he was by then on at least two watch lists; one in the US and one in Nigeria and probably in the UK as well. He had also had a visa request to visit the UK in May 2009 rejected by the UK Border Agency and, by the time he reached Amsterdam, he was flagged in the U.S. consular database as being presumptively ineligible for a visa due to having been nominated to the terrorist watch list.

So how did this happen?

It happened in part because, believe it or not, over eight years after 9/11 we have not even begun discussions on an internationally shared watch list which could be available to embassy staff, immigration officials, border police and airport security staff involved in implementing travel, aviation and border security. Nor do we have a well established standard for deciding the level of risk that is appropriate to accept for air travelers.

Stove-piping of information remains endemic among agencies, but it is far worse between countries and is, without doubt the weakest link in international cross border security.

Sometimes information sharing is a problem with legacy information systems, sometimes due to concerns about privacy and data protection. More often than not, however, the real problem is a lack of willingness on the part of politicians and government officials to find solutions to implement it.

BORDERPOL's view is, collectively, border and transportation officials, in cooperation with intelligence and law enforcement authorities, can do a far better job of prevention than we have done so far.

BORDERPOL continues to advocate the establishment of an international global extranet designed for sharing information on suspect individuals among border agencies of allied countries involved in border security.

Held by BORDERPOL as a trusted third party; basic information on suspect individuals such as name, date and place of birth, the reason they are on the list (e.g. visa rejection, Home Office, UK), photo and source, would be available to officers of those countries that have signed up to the scheme. The system would allow them to flag up suspect individuals either for further questioning or action, such as in this case, visa rejection or withdrawal.

It is true that the integration of intelligence was faulty in this case. But there were potential opportunities for border and transportation officials to use their discretion to prevent travel or at a minimum to undertake additional screening that might have resulted in detection of the explosives.

It is here that body scanners can play an important role in security, especially against unknown clandestine terrorists like Richard Reid, the shoe-bomber who was not on anyone's radar screen.

But the technology remains imperfect. The millimetre wave and back-scatter body scanners that have until now been advocated as best practice may not have identified the explosives carried by the 'underpants bomber.' Certainly scanners of this type would not have picked up explosives carried internally, the method used by Al Qaeda suicide bomber Abdullah Hassan Tali al-Asiri back in August 2009 in an attempt to blow up Prince Nayef of Saudi Arabia.

The through-body X-ray scanner, now in the news, will indeed pick up anything carried internally or externally. They are already in operation in some airports worldwide, targeting drug traffickers. But some may deem this method practical primarily for use on targeted individuals identified by other methods. Better technologies for explosives detection for mass people screening are currently not ready for effective deployment.

In addition to focusing on improvements in screening technology, we should be devoting more serious attention to overcoming obstacles to making better information available to border authorities.

There was opportunity to pick up Abdulmutallab as a potential threat, initially at the U.S. Embassy by authorities there; and subsequently at airports in Lagos and Amsterdam. Travel and transportation security officials should have been able to access intelligence information and combine this with other information, such as his ticket paid by cash, no checked luggage and seat position (bombers tend to request seats in the area of the fuel tanks, vis-a-vis Richard Reid the shoe bomber), to call for additional screening, if not no-fly status.

While this incident clearly calls for better integration of intelligence at the outset, it remains true that travel and transportation authorities must add additional layers of prevention. An integrated security system with effective information sharing, well motivated and trained staff, using good profiling and screening techniques, operating with the appropriate technology, will make a difference.

Border policing is not like other forms of policing. It requires a specialist organization like BORDERPOL that can provide the foundation for sharing information and facilitating the complex multilateral effort which will be required to dramatically increase the effectiveness of airline and cross border security with minimum intrusion to legitimate travelers.

Let's work together to incorporate the lessons we are already learning from another near miss and make the right decisions to prevent terrorist attacks in the future.

BORDERPOL

About half of UK's armored vehicles in Afghanistan considered unfit for operations

by Michael Smith (Veshengro)

About half of the armored vehicles used by the British Army in Afghanistan are unfit for operational usage according to figures published in the Daily Telegraph – surprise, NOT!

The “Snatch Land Rovers” in use in Afghanistan (and Iraq) have been proven to be useless in Northern Ireland already and still there we re sent to Afghanistan and Iraq, putting the lives and health of soldiers at risk.

The vehicles, ranging from lightly protected patrol models to more heavily protected MRAP (mine-resistant ambush protected) types, have either proven vulnerable to insurgent roadside bombs and the topography and climate of Afghanistan, or have been pulled from service due to the need for repairs and refurbishment.

Most prominent among these vehicles are the 6x6 Mastiff (a British-configured version of the U.S. Cougar MRAP) and the 4x4 Ridgback (also based on the Cougar, in the Category 1 model). These MRAPs were procured by the Ministry of Defence under UrgentOperational Requirement (UOR) contracts extended in late 2007 and 2008. The MoD has ordered somewhere in the range of 350 Mastiffs, with 271 so far having been delivered. Of these 271 units, only 134 are rated ready for operational duties by the Army. Regarding the lighter Ridgbacks, only 73 of the 118 units are considered serviceable at the present. The first Ridgbacks and Mastiff 2s (Mastiffs converted by UK-firm NP Aerospace to an advanced armored version) were deployed in Afghanistan in June 2009, begging the question as to how many units have atrophied either through climactic conditions or combat damage.

The British Ministry of Defence (MoD), for its part, argues that repairs and refurbishment are an obvious necessity for vehicles used in combat theaters as they ensure the safety of their operators. Under fire from all sides since 2006 due to the growing list of British casualties in Afghanistan which have stemmed from improper or insufficient kit, the MoD has rushed to provide improved armored vehicles (thus the Mastiff and Ridgback UOR orders) and has placed UOR orders for armored tactical support vehicles (the Coyote, Husky and Wolfhound).

The MoD has also withdrawn the highly-criticized Snatch Land Rovers from outside-of-base duties in Afghanistan, and this was about time too. The lightly-protected Snatch Land Rovers proved particularly vulnerable to insurgent IEDs (improvised explosive devices).

Public criticism focused on why vehicles originally designed and purchased for patrolling duties in Northern Ireland would be used for operations in vastly different circumstances in the Near East.

Scrambling to retain a light-patrol vehicle element for the Afghan and Iraqi theaters, the MoD pushed out an enhanced version of the original vehicle, the Snatch Vixen, in 2008. Some 150-200 Snatch Vixens were procured, though these also proved vulnerable to roadside bombs despite the additional armor and counter-IED measures installed.The MoD is now looking to place an urgent operational requirement order for 400 new Light Protected Patrol Vehicles (LPPVs) to replace the Snatch Land Rovers. Only 358 of the total 653 are in workable condition.

All told, the MoD claims to have invested GBP 1.3 billion ($2.07 billion) on armored vehicles for the British Army from 2007 through 2009.

It has to be said that the US Army Humvee (Hummer) vehicles have not done much better either as regards to IEDs, ever since they reduced the armor plating to make them lighter for air transportation to the areas of operation.

While tanks of the normal kind, so to speak, are a little too big for operations against insurgents where IEDs are a danger the vehicles that are deployed should, however, be armored in the same way as a MBT.

© 2010

<>

Police force computer misuse investigation "no surprise" to 3ami

Managing Director Tim Ellsmore says protective monitoring of police systems is necessary to uphold the laws of a digital network

Manchester, 7th January 2010 (Omarketing) – Reports that there have been more than 50 cases of misuse of the force's computers in the 13th largest police force in England, Wales and Northern Ireland over the last five years (http://bit.ly/8tMBsR) comes as no surprise to Tim Ellsmore, Managing Director of 3ami, a Manchester-based company that produces audit, compliance and control technology.

"With more than 239,000 police officers employed in the UK (http://bit.ly/5622Ub), as well as larger numbers of civilian staff, it's inevitable that human nature will rear its ugly head," said Ellsmore. "Our 3ami MAS software helps police management enforce the laws of their digital network and prevent this type of situation from causing embarrassment and the suspension or dismissal of otherwise good members of staff."

Ellsmore added, "I realise how hard police forces are working, and have been working, to make true data accountability a reality in the UK. I have seen their dedication in my many interactions with police forces looking to trial and purchase our Monitoring and Audit Systems (MAS). Police forces are beginning to realise the simple truth that you can't enforce the laws of a digital workplace without being able to police and protect that workplace--and that's where comprehensive computer activity monitoring and auditing comes in."

Ellsmore said the problem with those forces that do not fully monitor the activity on their computer networks is that they have no real way of knowing whether officers or civilian staff are misusing the data they have access to, forwarding that data to third parties or even using the network to conduct personal business when they should be working. There are also the issues of viruses and malware, as well as hacker attacks, attempting to subjugate data on the police computer network, for usually criminal means.

Ellsmore went on to explain that 3ami recently conducted a survey into senior police officers' concerns about data security at UK police forces. Ellsmore noted that the security required goes beyond controlling who has access to what data and at what times.

3ami's survey - conducted among senior police officers last year - found that all respondents were in favour of audit and controls on police computer resources. Ninety-six percent said they believed abuse and/or misuse of UK police systems occurred "frequently."

According to Ellsmore, the survey also found that inadequate staffing and the lack of an effective digital audit trail were the two biggest barriers to investigating police officers or staff members suspected of illegal or inappropriate computer activity. Ellsmore pointed out that both of these barriers could be mitigated--or removed altogether--with the effective use of a comprehensive computer activity monitoring and auditing package, such as 3ami.

"The Freedom of Information Act data released to the press this month suggests that more than 400 UK police officers and civilian staff have been dismissed or disciplined on the issue of computer misuse in the last five years," he said. "It's investigations like this that highlight the fact that installing effective audit and control software is now a no-brainer in financial terms, not to mention responsibility and accountability."

For more information: www.3ami.com

3ami Monitoring and Audit System (MAS) is a complete computer activity monitoring package that tracks all changes to hardware and software throughout an organisation's entire network(s) by capturing and securely storing records of all user activity - not just on the Internet but on every application, including email, word processing, spreadsheet applications, instant messaging and online. MAS monitors and audits police systems including ANPR (CLEARTONE BOF), PNC, Niche RMS, CORVUS and Quick Address (QAS). Even when other stand alone capability is already present, MAS coordinates and corroborates all systems to provide a comprehensive auditing framework.

Developed specifically for police forces, 3ami MAS makes true data accountability possible. 3ami MAS both proactively prevents inappropriate and/or illegal computer activity from occurring and reactively tells you - with certainty - not only who is responsible, but also the full breadth of such activity, when it does occur.

<>

Perimeter Security

Securing the physical perimeter

by Michael Smith (Veshengro)

The delay in movement will help decrease the chances of a c rime being successful, which is why perimeter security is so important.

Masking the world a safer place is not an easy task. The Axis of Evil that exists has brought home to all of the world what an unsafe and unpredictable environment we live in. The risks of such threats exist for all, be they high profile organizations, utility suppliers,, institutions, the civil service, or any large gathering of the general public.

When referring to the environment I am not talking about the natural one here. The security treats that come from the climate change and other environmental phenomena is a different story.

Crime, anti-social behavior, terrorism; these are factors which need to be taken into account in today's society when considering security requirements, be this for objects or subjects.

But they are all factors factors which can have their level of threat reduced by a common theme – the physical perimeter and its security.

Measures such as CCTV and others can be but viewed as a deterrent. Although they may be useful in catching the act of a crime on camera they will not, in actual fact, prevent the occurrence. While CCTV pictures may lead to an arrest and conviction, if we are talking about here about a crime, they cameras will not prevent a crime or an incursion. Only good proper perimeter security can do that; or make it as hard as possible for someone to penetrate the perimeter and this is the same in real live as in cyberspace.

The physical perimeter can be a wall, a fence or just an imaginary boundary; a line in the sand, so to speak, and securing this perimeter is different for each situation. And, we are dealing here about securing the perimeter and not, as yet, about defending it.

On a fixes base, so to speak, your perimeter is the perimeter fence and/or wall followed, if the base has buildings, by the walls of buildings, and here the option of securing the perimeter are the same as everywhere, from the wire of the fence to CCTV, sensors and guards.

In the open,in the field, your perimeter that has to be secured is a fluid one, and open and field here means field, forest, etc., and especially so if and when on the move. The same, as to a fluid perimeter, is also true in today's cyber operations. Securing such a fluid perimeter is a total different kettle of fish than that of securing a fixed perimeter and the rules of engagement are mobile and fluctuate. Each and every situation and area requires a different assessment and response.

Walls, whether for countries, as in the case of the Great Wall of China, walls of cities, and all the old towns did have them, to walls such as that that such as the one that was known as the “Berlin Wall” or the wall that Israel has built against the Palestinians, are one way of securing a perimeter and dependent on the attempted breach provide quite a solid defense.

Perimeter fences, with or without guard towers, and a great example for this is here the border that was between West Germany and the German Democratic Republic, is another protection, though not as difficult to penetrate as is a solid wall. Then again, a wall with no defenders is easier to penetrate than a good fence with mine fields and defenders.

The perimeter of a building are, generally, the outer walls of said building unless there is a fence and/or wall before one gets too the building proper, as, for instance, in t he case of the MI6 HQ in London.

The weak points of a building's perimeter are, generally, its doors and windows and the locks they are secured with. Someone who does not mind making a lot of noise, for instance, will be able to overcome most doors, windows and locks.

Cameras will be a deterrent but none as good as guards, especially if the latter are armed.

Security and defense of a perimeter, as can be seen, go hand-in-hand, to some degree, for locks, for instance, and metal shutters are security while also a defense.

Perimeter security, its requirements and the possibilities available differ according to the building, property, land area and topography of the same, and the way in which the premises are to be used.

When one thinks of the term perimeter security one is immediately drawn to fencing and manned security posts; however, when defined simply as the outermost boundary to entering your premises, it casts a different light on the term.

Perimeter security can mean securing the outer boundaries of a plot of land, the main entrance/exit doors to a building, or the entrance doors to a compartment within a shared building.

Depending on the particular situation and whatever form of attack premises are likely to experience, any delay in movement will help decrease the chance of such a crime being successful, which is why perimeter security if so very important.

On the move, as mentioned previously, your perimeter is fluid and your responses to that are too; a lot more so than at any fixed location.

In field operations, in whatever terrain, when working in a team, your perimeter security are your skirmishers. When traversing the same type of area alone then the entire ballgame changes and you are your own perimeter security and you set where your perimeter is and how you are going to, if necessary, defend it.

Wild animals of all kinds, and even domesticated ones, have an invisible set of perimeters around them. There is an outer one where they will either run or let you know, in no uncertain terms more often that now, that you have gone too far and better leave.

If the inner perimeter of wild animals gets crossed then most will attack, even the likes of rats and squirrels, as anyone who has ever cornered a rat will know.

If the animal is something rather larger and more dangerous, like a hippo or a lion then the danger of serious harm arises and one better takes heed before of the warnings.

As human s we too, theoretically, have such an unseen perimeter around us and with some people this one is a wider area than with others and in military and such kind of operations it is set by different criteria as in civilian life.

Often, however, the fact that some people drop their guard, so to speak, in civilian life and that they are not as observant as they might be if alone in a forest, especially at dark, they allow attacks to happen. Some people wear an, invisible to them, sign that says “I am a victim! Attack me.”

How many of those do those of us who can spot such signs see day in day out? Many, I can tell you, and they invariably wear headphones and listen to some kind of loud music and are totally oblivious to what is going on around them, even to a car approaching from behind let alone a person intent on harming them. It is scary, I tell you.

On the move, whether in the open field or in the city, you make your own perimeter which, as said, is fluid, to some degree, and you secure it. That means, open eyes, open ears and ideally some distance from other people, in order to give yourself enough reaction time in case of need.

© 2010
<>

AIRPORT SECURITY A UK STRENGTH TO BUILD ON, SAYS INDUSTRY

Complex situation with body scanners only part of the solution

A|D|S, the UK's AeroSpace, Defence and Security trade organisation commented Tuesday, 01/05/2009, on recent issues around aviation security following the failed attack on an aircraft over Detroit on Christmas Day.

Ian Godden, Chairman of A|D|S, said: "The UK is a world-leader in the high-tech security field given past experience in combating terrorism plus the innovative excellence of the industry in meeting these challenges. It is a trusted supplier globally, protecting citizens around the world and with the right Government advocacy and support this expertise can be exported to also boost the UK economy. Furthermore, provided with the right levels of investment, new technology will be more effective while becoming less intrusive.

"It must be remembered that full body scanners are only part of the solution. Other solutions, such as the detection of suicide bombers from distance using technology, blast mitigation engineering and behavioural science are also important elements of airport security. Intelligence will still be crucial, as will the right systems that can be provided by industry to process the information gathered quickly and accurately.

"We also fully recognise that privacy issues must be addressed and it is right that new security solutions that protect peoples' lives should be developed with these in mind."

<>

Credant says MoD laptop theft highlights dangers of lax crypto security

by Michael Smith (Veshengro)

Reports that the Ministry of Defense was investigating, in the second week of December 2009, the theft of a laptop – together with a security key used to decode the data on the notebook – is jaw-dropping in its apparent lack of common sense, says Credant Technologies, says Credant Technologies.

"It's one thing to have excellent encryption on a laptop, but it's entirely another to have the security key - presumably a USB stick or similar - located along with the machine," said Sean Glynn, the endpoint security specialist's product manager.

"This smacks of lax security on a scale that is breathtaking in its crassness. There is little or no point in having encryption on a portable device if the authentication key is stored with the machine," he added.

According to Glynn, this is the encryption equivalent of leaving yellow sticky notes detailing user passwords on the edge of a PC monitor, and then wondering why the machine's security is compromised.

Even if the computer is stored in a highly secure building, as appears to have been the case with the MoD laptop, there is still every chance that the machine can go walkabout, as rogue employees are rapidly becoming just as much a threat to the data of organizations as external hackers and malware, he explained.

Credant's product manager went on to say that the fact that the laptop was stolen from the MoD's headquarters in Whitehall, and appears to be one of several similar thefts from the building is extremely disappointing.

Thefts like this are little like the time when Scotland Yard lost basically all its typewriters from the typing pool to a service company (well, that's what it looked like when they walked past the security desk). Oh, how embarrassing but also, in the case of laptops and USB thumb drives, dangerous.

"If the MoD can't vet its own staff and stop these thefts happening – and also fail to implement an understanding of why and how security systems operate in its staff – then what hope is there for civilian organizations?," he said.

"To say I'm gob-smacked is an understatement. This is one of the worst lapses in government security since the infamous loss of the two child benefit disks containing the records of millions of UK citizens in late 2007 (http://bit.ly/8kyOhm)," he added.

I think gob-smacked must be an understatement and I cannot understand how people in organizations that are supposed to protect the security of the real can be so stupid, for that is the only word one can use here unless one would use “criminal negligent”, to do what they did here. How many more MoD laptops and PCs are thus “secured”, one can but wonder.

Also, it would appear that the security in civilian organizations is better than that at MoD and SIS for instance. I mean, let's face it: if you park your car somewhere in a street near that green building at Vauxhall Cross and leave a laptop on display you must be an MI6 agent.

Losses such as that, in the same way as the lost unencrypted USB drive in Colombia by a British agent (I will not prefix that with intelligence) that compromised an entire anti-drugs operation just should not happen and cannot be allowed to happen. Each and every times heads should roll, even when not literally.

For more on the MoD encrypted laptop fiasco: http://bit.ly/5L8yT7

For more on Credant Technologies: www.credant.com

© 2010
<>