BSIA responds to cash courier shooting in London

Walthamstow shooting The trade body representing the private security industry in the UK has issued the following statement relating to the recent shooting of a cash-in-transit courier in Walthamstow, north-east London. The cash-in-transit courier was injured from the shooting ambush. James Kelly, chief executive of the British Security Industry Association (BSIA) said in a statement: Every day, cash-in-transit couriers perform a vital public service, transporting cash around the country and supporting banks, retailers and businesses by facilitating millions of financial transactions across the UK.

However, in doing so, they place themselves at risk of extreme violence, as today s incident sadly reminds us. Kelly goes on to point out that the number of attacks on cash-in-transit couriers remains at an all-time low. There were 76 injuries to cash-in-transit crew members, police and the wider public in 2016. However, the risk of violence and injury remains a very real threat to couriers. This is something that the private security industry together with its partners in police and government is continually working to reduce through initiatives like SaferCash, which shares intelligence about attacks and suspicious incidents between couriers and the police, continued Kelly. Our thoughts are with the injured courier and his family who have made a very personal sacrifice for the sake of our nation s economic security and we wish him a full and speedy recovery. The BSIA is a longstanding and valued partner of, and exhibitor at, IFSEC International, Europe s biggest fire and security trade show taking place 20-22 June 2017, London ExCeL. Get your free badge now. Take your security knowledge to the next level at IFSEC International 2017 Experts from across all areas of the industry will attend to share their expertise on critical topics on 20 22 June 2017.

Choose from over 80 hours of seminars to attend across four theatres, the Panasonic Security Management Theatre, TDSI Tavcom Training Theatre, Smart Theatre, Genetec Borders & Infrastructure Theatre.

Time is running out to get involved: Register today to avoid missing out

BSIA strengthens commitment to quality with ISO upgrade

ISO 9001:2015 The British Security Industry Association (BSIA) has passed an audit to achieve certification to the new ISO 9001:2015 quality standard. Revised in 2015 the standard aims to ensure quality management is integrated into an organisation s day-to-day operations. The standard covers all elements of business strategy, with continuous improvement, to meet customers needs.

Kirstie Anwyl-Hughes, quality manager at the BSIA, says: The revised ISO 9001 standard has introduced several new elements, such as a greater emphasis on risk-based thinking to reinforce the use of the management system as a governance tool and an emphasis on a greater involvement by the leadership team. To ensure compliance, the BSIA has had to undertake a comprehensive review of its entire quality management system. According to the British Standards Institution s website, the changes to ISO 9001 were made because business has changed radically since the last major revision in 2000 but one thing remains constant: to be successful, businesses have to adapt to meet the growing needs of customers. ISO was originally written with the customer in mind and that remains the priority for 9001. Important focus Anwyl-Hughes says raising quality standards in the security industry is an important focus of the BSIA, which expects its own members to be certified to a range of industry standards, including ISO 9001. As such, we are pleased to be leading the way in the adoption of the revised standard, she says. The BSIA through its new probationer membership scheme also provides advice and assistance to security companies wishing to obtain ISO 9001:2015. The BSIA represents the entire security industry and value chain, from CCTV to security guarding, to security equipment manufacturers and installers of electronic security systems that serve a range of industries and sectors. The BSIA is a longstanding and valued partner of, and exhibitor at, IFSEC International, Europe s biggest fire and security trade show taking place 20-22 June 2017, London ExCeL.

Get your free badge now. Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more. It is the perfect way to keep up to date, protect your business and enhance your career in the security industry. Click here to register your place now to join us at London Excel on 20 22 June 2017.

Businesses deploying drones must use certified operators, advises UAV training academy

Drone news Due to rising drone-related incidents and accidents, commercial organisations using unmanned aerial vehicles (UAVs) to perform tasks need to ensure they hire certified operators, according to UAVAir. UAVAir was prompted to issue the advice, after the Department for Transport, the Ministry of Defence and Sciencewise recently commissioned Kantar Public UK (formerly TNS BMRM), which provides research and consultancy to policy makers, to conduct a public dialogue on the current use of drones in the UK. The move is in response to growing number of reported drone-related incidents and accidents, such as the British Airways passenger jet that was hit by what was thought to be a UAV as it flew into Heathrow to land, in 2016.

S amus Kearns, chief instructor at UAVAir, which runs a Civil Aviation Authority (CAA)-approved training centre for drone operators, said: It is imperative that any business with a core ethos of reliability and responsibility understands the importance of hiring a fully certified drone operator to complete its drone-based missions. embedded content When undergoing training at UAVAir, pilots are tested for their cultural, theoretical and technical knowledge, to give them an in-depth understanding of how to operate a drone safely while respecting the laws of aviation. Failure to follow aviation rules can result in large fines and in some cases, legal action. In the UK, drones are governed by the CAA, and under its rules it is illegal for any pilot to operate a drone for commercial purposes without gaining certification from a CAA-approved drone training school. A safe, successful mission must be planned and executed thoroughly, understanding the individual complexities of each task. It is impossible to gain this experience and learn these skills without undergoing the training process prior to certification, Kearns added. As well as learning flight technique, pilots must prepare an operations manual in order to become a fully certified pilot. The manual includes information about each mission as well as the procedures to be followed to ensure a safe flight. More about UAVAir s Unmanned Aircraft Qualification can be found on the company s website.

The Drone Zone one again returns to IFSEC International in June for its 2017 edition. Brought to you in partnership with The UK Drone Show, the Drone Zone will feature demonstrations of drone and anti-drone technology from Yuneec, Dedrone, Hitachi and Magos. The Drone Zone will form part of Borders & Infrastructure Expo, a brand new show within IFSEC dedicated to the protection of borders and critical national infrastructure. Get your free badge for IFSEC 2017 now. Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more. It is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Private investigator PI

1. Entry requirements

There are no set entry requirements.

Experience working in an enforcement or investigative role, like with the police, armed forces or local authority, would be useful. If you want to be self-employed, you ll need the ability to run your own business and have some legal knowledge around information laws and data protection. A driving licence is usually essential for this type of work. The Association of British Investigators1 has more information about becoming a private investigator.

3. What you’ll do

Your cases could range from personal issues, like divorce, to company issues, like suspected theft. You ll normally do background research, which may involve asking questions and analysing information.

Your day-to-day duties might include:

  • monitoring people
  • fraud investigation (for example, for insurance or accident claims)
  • tracing missing people or pets
  • handling legal documents to people (process serving)
  • investigating commercial piracy (like copying software illegally)
  • background checks on employees


  1. ^ Association of British Investigators (

Putting smart sprinklers to the test

The debate around when and where sprinklers should be installed and if this should be mandated more widely is one of the most contentious in the fire industry. Approved Document B, which outlines the building regulations in force, only recommends that sprinklers are installed in warehouses larger than 20, 000 square metres. Earlier in the year James Dalton, director of general insurance at the Association of British Insurers (ABI), called for mandatory sprinklers in schools and care homes too.

Might the emergence of so-called smart sprinklers strengthen the stance of those advocating mandatory sprinklers in schools and warehouses? The traditional sprinkler that most readers will recognise hasn t changed in any substantive way in appearance or function since Hiram Stevens Maxim (also, ironically, the inventor of something antithetical to life safety systems, the machine gun) pioneered the first automatic fire sprinkler system in the late 19th century. The greater efficiency of modern distribution models has had the undesired consequence of making fire spread more efficiently too. Boxes of often highly flammable materials are now stacked as high as 24 metres in a bid to wring every last bit of value from warehouse square footage. Tightly packed mountains of stock serve as tinderboxes when a fire is started, so many warehouse owners have turned to sprinklers to minimise losses. But conventional sprinklers are no panacea for the challenges posed by huge warehouses with tall ceilings, as FM Global reported recently. If a fire begins at or near the base of a paper stack, the temperature at the ceiling level may not reach a sufficient temperature to activate until the fire has grown substantially and perhaps extended far beyond its original location, said the mutual insurance company in the recent article. The combination of high storage and potential fire spread, dubbed highly challenging fires (HCFs), demands a response that goes beyond the protection recommendations involving traditional sprinklers, notes Christopher Wieczorek, assistant vice president, research group manager for fire and explosion protection at FM Global. Researchers from FM Global, which provides loss prevention services to large organisations, considered the fact that sprinklers s greatest weakness appeared to be inseparable from its greatest strength: the detection and actuation mechanisms are shared.

This has yielded remarkably reliable and predictable responses to fire, but it is insufficient when fires are potentially at a great distance from the sprinkler, the report continued. Moreover, the distance involved increases the possibility that sprinkler activation might still be insufficient to substantially reduce a conflagration. In the age of smart tech, this should apparently now be surmountable, if sprinklers are activated by sensors that are positioned remotely from them. Such early stage detection has been dubbed simultaneous Monitoring, Assessment and Response Technology or SMART. This is indeed smart in the internet of things sense ie, computer chips process inputs from sensors, interpret the data and respond accordingly through a system of discharge devices. FM Global Research has conducted experiments in their Small Burn Lab with a range of fire sizes and locations. Yibing Xin, senior lead research scientist at FM Global, found that in a test of a 13 metre-tall roll paper storage, a traditional sprinkler did not activate until flames were at least 15 metres above the floor. Our SMART system activated when the flames were only 14 feet (4 meters) tall, he said. FM Global found that using more than one detector technology ideally one that detects temperature changes and another, the presence of smoke was the best way of detecting accurately and responding quickly.

It also cut the risk of false alarms and could triangulate the precise location of the fire more accurately than a single sensor. Xin said the tests had opened up the possibility of using different kinds of sensors or a network of sensors, perhaps one day including infrared and video image-based detection. Click here to find out more about FM Global s findings. Free download covering legal requirements for responsible persons under the FSO, courtesy of the IOSH, BIFM and USHA approved UK provider of health, safety and environmental information. Key features: A full breakdown of the Regulatory Reform (Fire Safety) Order 2005 The key actions when dealing with fire precautions & protection A complete guide to maintaining procedures and requirements within your organisation.

Download now

State surveillance | Liberty

State sanctioned surveillance against specific individuals takes place on a massive scale, using the broad and confusing framework created under the Regulation of Investigatory Powers Act 2000 (RIPA) which regulates the use of and access to surveillance by public bodies. This involves five types of different surveillance:

  1. Interception of communications e.g. listening to telephone calls, reading letters and emails
  2. Intrusive surveillance e.g. placing bugs and filming in private places
  3. Directed surveillance e.g. filming and covertly monitoring specific people generally in public places
  4. Use of covert human intelligence sources e.g. informants and undercover operatives
  5. Accessing communications data e.g. accessing the record (but not the content) of emails, telephone calls and websites visited.

Under RIPA hundreds of public bodies have access to the last three types of surveillance including over 470 local authorities. Surveillance can be authorised for a wide range of purposes which includes such vague purposes as preventing disorder or collecting tax.

Interception of communications and some types of intrusive surveillance are authorised by the Home Secretary and other types of surveillance are largely self-authorised. Liberty believes that RIPA must be reformed to ensure that intrusions into personal privacy are all properly authorised and comply with human rights principles of necessity and proportionality. The main changes we are calling for are:

  • Surveillance requests (including interception, acquisition of communications data, use of Covert Human Intelligence Sources etc) must be subject to prior judicial authorisation. There is growing consensus on the need for judicial not political warrantry.
  • No new Snoopers Charter powers to require communications companies to store more and more revealing types of our communications data. David Anderson warned that the case had not been made1.

    Only Russia requires service providers to routinely store the weblogs of all their customers.

  • Surveillance should be conducted only for a narrow range of tightly defined purposes i.e. investigation of serious crime and other legitimate objectives such as preventing risk to life instead of the vague and non-crime related purposes currently permitted e.g. for communications data.
  • All surveillance powers should be publicly disclosed and the safeguards and processes for authorisation set out in in primary legislation. This is not currently the case at least with regard to CNE aka hacking.
  • Improved redress mechanisms for those subject to unlawful surveillance the IPT should be overhauled and made more transparent with a right of appeal and an ability to make declarations of incompatibility and once an investigation has been completed, or once a person is no longer under any suspicion, he or she should be notified of the relevant surveillance unless there is a specific reason for maintaining secrecy.
  • The bar on the admissibility of intercept evidence, properly obtained, in criminal proceedings should be lifted. Why is this vital evidence not used to bring perpetrators to justice?
  • Legal and proportionate arrangements for the sharing of surveillance data should be agreed between the UK and foreign States, made publically available and incorporated into law.
  • Improvement of Mutual Legal Assistance Treaties (MLAT) the appropriate legal route for the UK authorities to obtain data from foreign tech firms should replace attempts to place extraterritorial obligations on overseas service providers.
  • Legislative protection against the breaking of encryption standards.
  • A targeted as opposed to blanket approach to communications data retention and interception.

Liberty s position on RIPA is set out in greater detail in this consultation response (PDF).2

In June 2013 the Snowden leaks revealed that GCHQ, the UK’s eavesdropping agency, is intercepting and processing billions of communications every day and sharing the information with the US. This includes recordings of phone calls, the content of email messages, entries on social media sites and the history of an internet user’s access to websites. All without public acknowledgement.

The project Tempora has been in existence since the beginning of 2012. The leaks also suggest that the US authorities have similarly breathtaking and direct access to global communications via the world s biggest internet companies. This secretive programme is known as PRISM and reports suggest that the UK also accesses this data. In May 2013 the Draft Communications Data Bill was notable by its absence from the Queen s Speech. It would have required internet and phone companies to retain records of our calls, emails, texts and web visits.

It now appears those who failed to make the case for the Draft Comms Bill already smuggled a more intrusive Snoopers Charter for blanket surveillance through the back door. Liberty has filed a claim against the British security services for their role in PRISM and Tempora. We will be lobbying and campaigning for urgent amendment to the outdated laws governing surveillance and an end to blanket surveillance of the population.


  1. ^ David Anderson warned that the case had not been made (
  2. ^ consultation response (PDF). (

CCTV Training – CCTV courses for SIA Licence

About the SIA CCTV course:

Obtaining the level 2 CCTV Training qualification is the first step towards obtaining an SIA Licence. If you are looking to work as a CCTV operator, this is the right qualification for you.

The SIA CCTV course runs over three days and is divided into three units:

At Get Licensed, you’ll find CCTV training in London, Leeds, Birmingham, Manchester, Belfast, Chelmsford, Milton Keynes and Cardiff. With so many locations and dozens of available training dates, you are sure to find a CCTV course that is suited to you.

Our CCTV training courses are extremely popular and spaces are limited.


Q: What is the aim of the CCTV course?

According to the British Security Industry Authority (BSIA), the UK has an estimated 5.9 million CCTV cameras.

The need for CCTV and CCTV Operators is dramatically on the rise and the need for quality Closed Circuit Television training is widespread. This SIA recognised three-day course is designed to teach you how to assist companies with their CCTV, as well as train you to be a proactive CCTV Operator.

Q: Who is the CCTV course for?

This course is for new entrants or other security personnel who would like to widen their skills and/or be eligible to apply for a CCTV Operator role in the private Security Industry.

Q: What are the benefits of this course?

Gaining this SIA recognised Level 2 Award in CCTV Operations (Public Space Surveillance) will give you the ability to apply for an SIA CCTV Operator licence. This will enable you to work as a CCTV Operator in the UK and make you more employable.

Q: How can I book the CCTV Operator course?

It s easy peasy.

You can either book online or you can book through our 24/7 customer service line on 0207 078 7259.

Q: When will I receive my CCTV Operator exam result?

Get Licensed are proud to provide you with a Fast Stream Results service for free when you book your CCTV Operator course with us. Receive your results within just 7 working days after the last exam date. Our aim is to notify you the same day the training provider sends us your results.

Your results will be available online and we ll also send you an SMS to inform you when your results are available.

Q: When will I receive my CCTV Operator certificate?

Certificate are dispatched within 4 weeks of course completion, you have the option to request secured certificate delivery when booking the course.

To read our full list of FAQ’s, click here1.

Book Now


  1. ^ click here (
  2. ^ Book Now (

Home automation: a guide to the smart home market

Home Automation: A Guide To The Smart Home Market

Everything you need to know about the home automation market, including national, regional and global growth rates, barriers to mass adoption, key players and the lowdown on the latest smart home devices and systems. embedded content Home automation: an introduction Home automation has come a long way since the 1960s when British racing driver Stirling Moss fitted his newly built House of the Future in London s Mayfair with the latest gadgets. The extension of commercial heating, ventilation and air conditioning (HVAC) controls into the residential market alongside smart lighting and security solutions has since revolutionised how home owners interact with domestic systems and appliances through an expanding combination of hardware, communication protocols and electronic interfaces.

Certainly, the use in domestic environments of IP cameras, motion detection hardware, door opening sensors and remote controls has surged, though from a low base. The ubiquity of wireless networks using Wi-Fi, Bluetooth and to a lesser extent ZigBee and Z-Wave in the home has also helped. They have provided the communications channel that devices, sensors and back-end software systems need to transmit, store and analyse the information collected. embedded content Security accounts for most demand among smart home users, with sales of connected cameras and remotely controlled door and window locks driving much usage. But the volume and diversity of deployments and applications is diverse, including connected white goods appliances (fridges, cookers, washing machines etc) alongside audio devices and entertainment hubs, lighting and heating controls, pet and baby monitors, and even products designed to automate the watering and monitoring of plant growth. Developments elsewhere may also have a galvanising affect, particularly the growth of the Internet of Things (IoT) which is forecast to connect over devices by 2020. This vast network of interlinked monitors, sensors, computers, controllers, switches and other industrial and consumer gadgets will collect and analyse information from systems as diverse as manufacturing, retail, transportation, automotive and agriculture. The considerable efforts being put into driving the IoT market by the likes of Cisco, Intel, IBM, Microsoft and other heavyweight information communications technology (ICT) companies will inevitably help to push home automation systems (a form of consumer IoT) into the spotlight. Challenges and barriers to mass adoption But while there is a strong feeling that the home automation industry stands on the brink of mass market adoption, significant barriers to its further development remain.

The lack of interoperability between so many different devices, protocols, networks and applications continues to undermine user confidence, for example. Home owners also find systems difficult to use, a problem exacerbated by those incompatibility issues and a general lack of familiarity with home automation in general. Though they have steadily fallen in price, home automation devices remain expensive and are likely to remain so until their popularity reaches a tipping point that will persuade large scale manufacturers to drive down costs further by producing equipment in higher volumes. Long device replacement cycles push suppliers to charge a premium for current deployments and make it difficult for them to build profitable businesses based on recurring revenue streams one reason why many seek to push consumers into managed services contracts wherever possible. Housebuilders are building smart heating controls and thermostats into new homes designed to give residents greater control over their energy costs, but retrofits on older properties remain more difficult and expensive and a thriving DIY market makes it difficult for professional installers to compete. The potential for cyber security breaches to cause disruption is finally starting to be recognised, if not necessarily addressed. But the biggest barrier is the technological fragmentation of the smart home ecosystem that involves so many different types of devices, networks and software systems, and needs them all to work together to deliver value to the house owner. embedded content Market adoption rates One analyst firm has gone so far as to predict that sales of home automation hardware, software and services will exceed US$78bn by 2022, with more conservative estimates forecasting US$20.78bn by 2020. As ever with analyst forecasts, there can be discrepancies of definition that tend to skew the numbers one way or another however, though research firm Gartner has predicted that the average home could contain as many as 500 smart devices by 2022.

Much of that turnover will continue to be driven by the larger population base of the US and China, followed by Japan ahead of Europe and the UK which are collectively yet to show the same levels of enthusiasm. Figures from Statista suggest that the number of smart homes in the US will grow from 4.6m households in 2015 to 24.5m by 2020 for example, compared to 400,000 growing to 3.3m in Japan and 300,000 increasing to 2.1m in China over the same period. Statista calculates Germany to be the single largest European market, with 300,000 smart homes last year growing to 2.4m by 2020 compared to 200,000 in the UK increasing to 1.5m in the same period. embedded content Key players in the smart home Research published by CBInsights earlier this year suggests that a lot of venture capitalist funding is going into home automation start-ups such as Nest Labs. These now fight for market share alongside established industrial automation companies which have moved into the home automation space (Honeywell International, GE, Legrand, Siemens, ABB and United Technologies Corporation, for example) but also home automation specialists such as Crestron Electronics, Savant and Control4. Technology giants such as Samsung, Google and Amazon are also coming to the fore, having spied parallel opportunities for mobile apps, devices and operating systems alongside information processing platforms that they can exploit. Flagship home automation products to date include the Nest smart home thermostats and cameras, Sonos music systems, GE s Z-Wave components and Samsung SmartThings Hub.

Amazon s Echo and Google s Home voice activated smarthubs are also driving usage by delivering Internet connected, multimedia gadgets that can also be used to control smart thermostats and other devices.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

Security & Fire Excellence Awards 2016: winners revealed

Security & Fire Excellence Awards 2016: Winners Revealed

Digital Barriers, Mitie Total Security Management and Assured Fire and Security were among the winners at this year s Security & Fire Excellence Awards. Compered once again by comedian Jimmy Carr, the Security & Fire Excellence Awards 2016 took place at London Hilton on Park Lane. The cheeky selfie with @jimmycarr @SecurityXAwards #photobomb #sorrynotsorry #randomphonephotos SecurityExAwards (@SecurityXAwards) November 24, 2016 Congratulations to the winners, who are listed in full below: The winners The Peter Greenwood Security Award (a Fire & Security Association (FSA) Award) Andy Gilmore of AAI Security The Ian Marsh Fire Award (a Fire & Security Association (FSA) Award) Chris Watts of Wavelength Associates Wilf Knight Award (sponsored by Security Institute) Tahia Zaidi, Cranfield University Inspiration in HR Award (sponsored by SSR Personnel) CIS Security International Achievement Award (sponsored by Hanwha Techwin Europe) Pilgrims/Harris Afghanistan Secure Communications Programme Best Deployment of Lone Worker Technology (sponsored by ASIS International UK Chapter) Mitie Total Security Management with Northumbrian Water Counter-Terrorism Innovation of the Year (Product, Service, Solution, Project etc.) (sponsored by Xtralis UK Ltd) Digital Barriers with ThruVis Great pic of Mitie s Jason Costello winning security manager of the year last week at the Sec Excellence awards @Mitie_TSM, @jimmycarr Stuart Bleazard (@stubred) November 29, 2016 Security Manager of the Year (sponsored by Axis Communications) Jason Costello, Security Manager, Mitie Total Security Management Security Consultancy of the Year (sponsored by ICTS UK & Ireland) CornerStone Independent Security Consultancy Event Security Team of the Year (sponsored by The Ghana Education Project (GEP)) FGH Security Ltd Passive Fire Innovation of the Year (Product, Service, Project etc.) (sponsored by ASFP) Hilti (Gt.

Britain) Ltd with Hilti CFS-D Cable disc Small to Medium Security Installer of the Year (sponsored by Hanwha Techwin Europe) 2020 Vision Systems Large Security Installer of the Year (sponsored by SecurityLink India) Universal Security Systems Access Control Product of the Year (Including Biometrics) (sponsored by First Response Group) Human Recognition Systems with MSite Touch Fingerprint Terminal Representing @Axis_NEur at @SecurityXAwards this week and collecting our award for the Q3709-PVE winning camera of the year #axisinnovates Shaun Southall (@shaunsouthall) November 25, 2016 CCTV Camera Equipment of the Year (sponsored by Swift Fire & Security) Axis Communications with AXIS Q3709-PVE ACS Champion of the Year (sponsored by First Response Group) ICTS UK & IRELAND Best Contribution to Standards in the Security Sector (sponsored by Swift Fire & Security) University of Portsmouth with Professional Doctorate in Security Risk Management Communication Product of the Year (sponsored by ISCE) SIRV by SIRV Systems CCTV System of the Year (Excluding Cameras and Lens) (sponsored by Western Digital) Qognify with VisionHub Corporate Social Responsibility Initiative of the Year (sponsored by IPSA) Dot Dot Dot Property Combined Security & Fire Solution of the Year (sponsored by FIREX International) Total Integrated Solutions Ltd with Smart Building Converged Infrastructure Customer Care Initiative of the Year (sponsored by Alarm Response & Keyholding Ltd) Assured Fire & Security Ltd Security Partnering Initiative of the Year (sponsored by Beyond Media Services and Revolution Events) Brunel University with Pace Security Services Ltd Security Project or Installation of the Year (sponsored by BSIA) SPIE with Securing Safety with Spend to Save Security Training Initiative of the Year (sponsored by Swift Fire & Security) Croma Vigilant with NHS Active Fire Innovation of the Year (Product, Service, Project etc.) (ponsored by The Scottish Fire and Rescue Service (SFRS)) Aico with Ei2110e Multi-Sensor Fire Alarm Intruder Alarm or Exterior Deterrent Product of the Year (sponsored by IFSEC International) Ontech Security S.L.

with Ontech s Wardiam Pro We are so delighted with winning Security Guarding Company of the Year @SecurityXAwards last night #TeamWJ #WJ25 Wilson James Limited (@WJ_Ltd) November 24, 2016 Security Guarding Company of the Year (sponsored by Over-C) Wilson James Judges Entries, which were judged solely on entry forms and supporting materials provided, were judged by an expert panel that included a who s who of influential security and fire professionals: Dr Alison Wakefield FSyI, Senior Lecturer in Security Risk Management, University of Portsmouth Andy Williams CPP FSyI, Head of Security, Nomura, Honorary Life President, Chapter 208 and Assistant Regional Vice President ASIS International, Region 9a Brett Lovegrove, Co-Founder and Director, TriTectus Ltd Chris Brogan, Partner, B & G Associates Chris Tomlinson, Senior Consultant, Arup Resilience, Security & Risk David Clark CPP, PCI PSP, Chapter Chairman, ASIS INTERNATIONAL UK Chapter David Sibert, Fire Safety and Integrated Risk Management Planning Advisor for the Fire Brigades Union Dawn Holmes MSC, CPP, Technical Security Specialist, Bloomberg Emma Shaw MBA CSyP FSyI FCMI, Managing Director, Esoteric Ltd Lieutenant Colonel Garry Evanson, Chairman, The Security Institute and Head of Security and Emergency Planning, Westminster Abbey Geoff Tate, Chairman, SSAIB Gerald Moor, CEO, The Inkerman Group Graham Bassett MSyI, FIRP, FInstSMM, Director, GBRUK Ltd Ian Fowler, Senior Consultant, Mott MacDonald Ltd James Kelly, Chief Executive, British Security Industry Association Leanne Salisbury, Director, Salisbury Consultancy Solutions Lynn Watts-Plumpkin, Certification Scheme Manager, Chamber Certification Assessment Services Ltd (CCAS) Mike Bluestone MA CSyP FSyI, Director, Corps Consult, Corps Security Mike Hurst FIRP MSyI, Managing Director , HJA Security and Fire Recruitment Nigel Stanley, Practice Director, Cyber Security, TUV Rheinland OpenSky Patrick Dealtry, Director, The Lone Working Group Ltd Peter French MBE , Certified Protection Professional and FSyl, CEO, SSR Personnel Rachel Griffin, Director, Suzy Lamplugh Trust Richard Jenkins, Chief Executive, NSI National Security Inspectorate Simon Ince, Senior Fire Consultant at BB7 Steve Emmins, Commercial Development, Universal Security Systems Limited Dr Vibhor Gupta, Technology Lead, ASIS UK Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

5 alarming terror trends and what they mean for counter-terror strategies

5 Alarming Terror Trends And What They Mean For Counter-terror Strategies

With Counter Terror Awareness Week upon us (courtesy of the National Counter Terrorism Security Office), we ve examined the latest trends in terror tactics and the changing nature of the amorphous global threat. For what they lack in resources compared to the states against which they pit themselves, terrorists must compensate with the element of surprise. Small wonder that terrorists who don t all take the same master s degree in how to be a terrorist aren t consistent in methods or targets, although trends do emerge as successful attacks inspire copycat plots.

Some attacks are more imaginative than others, often in inverse relation to the devastation caused. Being unpredictable is all too easy when potential targets are almost limitless, given that Islamic extremists essentially view society as a whole as the enemy. Any target any people (Muslims included), buildings or other infrastructure is fair game. When they re happy to sacrifice themselves too then they re not even constrained by the need of an escape route. Here are five trends in terrorism that have become apparent this year and the implications for counter-terror approaches. Wildfires in Israel Israel has been hit by a rash of wildfires since last Monday and several Israeli politicians including the Prime Minister Benjamin Netanyahu are proclaiming it a new terror tactic. This a major wave of arson Terrorism in every sense of the word, Naftali Bennett, leader of the Jewish Home party in the government said, according to Israeli media. Prime Minister Benjamin Netanyahu said that any fire caused by arson or incitement to arson is terrorism in every sense of the word, and we will treat it as such. Israeli police have arrested several Arabs on suspicion of arson.

Israel s Defense Minister Avigdor Lieberman says authorities have evidence that at least 17 cases of the 110 recorded outbreaks of fires, which have destroyed hundreds of homes and causing millions of dollars of damage were attributable to arson. Whether the arson if it even is arson can be defined properly as terror attacks, we don t know that would largely depend on the motives. Either way, I does alert security services within and beyond Israel to the prospect of a new form of environmental sabotage. Though terrorists favour major human casualties as it provides them a bigger psychological impact, train stations, shopping centres, sports stadia are well guarded, monitored by CCTV and so on. Forests, woods, agricultural holdings, on the other hand, would represent the soft underbelly. And while deaths from wildfires are rare and such attacks would lack the dramatic instant impact of a bomb or gun rampage, they are immensely destructive. Israeli health authorities said more than a hundred people had been treated for smoke inhalation and other injuries across the country, while Some 75,000 residents of Haifa were evacuated as whole neighborhoods were hit by the blazes. Should this prove to be a problem, it s hardly practical to guard every inch of the forest with people or cameras. More innovative solutions would be needed.

Far-right threat Pointing to our Burkean preference for evolution over revolution British thinkers have often considered their country to be better insulated against extreme ideologies of the left and right that convulsed continental Europe through the 30s and 40s. However, a rise in hate crime in the wake of the Brexit vote, the victory of Donald Trump and the brutal murder of a sitting MP generated anxiety that the far-right threat is being grossly underestimated. Over the past 12 months, there have been indications that the threat from the extreme right wing could be increasing and we are alive to this, Neil Basu, senior national coordinator for counter-terrorism policing and deputy assistant commissioner, said this week. Anti-radicalisation scheme Prevent has reported a 73.5% rise in the last year in the number of referrals linked to the far right. Currently just under 10% of all Prevent referrals relate to the extreme right wing, and we have put programmes in place to support those at risk of being radicalised, said Basu. Last week jurors at the Old Bailey heard how Thomas Mair, who was sentenced to a whole-life term for the murder of Labour MP Jo Cox, was an avid reader of Nazi propaganda and a regular visitor to neo Nazi websites. Mair shot and stabbed the 41-year-old mother of two as she arrived for a constituency surgery in Birstall, West Yorkshire. Nevertheless, Basu insisted that The overriding threat remains from Daesh-inspired groups. Internet of Things No household or everyday object, however mundane, is safe from the digital revolution.

Whether most people truly want a smart toaster, smart clothing or a smart toothbrush remains to be seen, but it s clear that the number of things being connected to computer networks is growing exponentially. And this applies just as much to buildings and the urban environment around us. From trains to shopping centres, data is being generated in ever greater volumes with huge potential for energy saving, easing congestion and generally making cities more effiecient and our lives easier. It s also multiplying the vectors of attack for cyber terrorists and we re ill prepared for it, according to Advent IM founder Mike Gillespie. If you ve got a CCTV system going back 10 or 15 years, how old is the security management software controlling it? We re patching IT systems on a weekly basis for Windows-based vulnerabilities. We re seeing firmware vulnerabilities discovered on a daily if not hourly basis. Yet how much of our security system is being maintained in a secure manner? We re trying to plug holes because the planning wasn t in place for the new cyber landscape that we ve entered.

And with the internet of things, the pace of change is getting faster and faster. embedded content Vehicular attack When Mohamed Lahouaiej-Bouhlel drove a HGV truck through the crowds celebrating Bastille Day in Nice, France on 14 July 2016, it demonstrated brutally that vehicles can be every bit as destructive as bullets and bombs. Leaving 86 dead and injuring 434, it tragically highlighted the need for robust physical barriers in public spaces. Naturally, people don t want to feel like they re surrounded by a militarised ring of steel, so the challenge for authorities is to make crowded public spaces harder to encroach by vehicles without ruining the appeal that draws people to plazas and the like in the first place. The growing importance of aesthetically pleasing crash tested street furniture forms the subject of a Marshalls-sponsored trend report we re publishing soon. Self-starter terror cells Intelligence services always had a tough job on their hands discovering terror plots before they happened. Identifying communications and links between Al Qaeda central command in so far as a diffuse network even had a central command and terror cells was a tricky job. Things got tougher still following the spate of attacks in France and Germany, however, as it signalled a new kind of terrorist. If the Al Qaeda model was like a franchise then these attacks were simply homages to the central idea of ISIS.

Recognising the power of their ideology ISIS effectively encouraged sympathisers within Europe to become self-starters no need for contact with, or direction from, ISIS HQ at all.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.