Download PDF version Contact company

Security issues and ways to tackle them are the main area of focus at the Transport Security Expo 2010
Security in the aviation sector is the prime focus of Transport Security Expo 2010
Aviation, maritime and supply chain security professional from around the world will gather in London in September for Transport Security Expo and Conference 2010.

The annual event is being held this time around against the backdrop of the abject failure on the part of the aviation sector to prevent Umar Farouk Abdulmutallab from attempting to blow himself up on a Detroit bound jetliner, a continued inability on the part of the maritime sector to minimise high profile incidence of piracy on the high seas and a considerable disconnect emerging between the United States and Europe over delivery of a more robust supply chain security model.

Clearly, professionals from within each of the industry sectors have much to talk about during the two-days of this leading event.

Found wanting

Security in the aviation sector is rather obviously the prime focus of conference. Abdulmutallab's attempted downing of Northwest Airlines flight 253 on Christmas Day revealed widespread systematic failures in the security regime intended to prevent people with both the intent and means to do hard from getting on planes. Only good fortune prevented him from succeeding in blowing up the flight as it descended into Detroit Metropolitan Airport.

Despite changes made to intelligence gathering and sharing in the wake of the above incident, the airport security regime was once again shown to be a failure in May when Faisal Shahzad almost skipped the United States after attempting to set off a car bomb at Time Square in the heart of downtown New York. That he was sitting aboard Emirates flight EK202 which was preparing for take-off at the runway threshold when his presence was discovered, speaks volumes of the ability of border agencies, security and airlines to prevent wanted individuals doing a runner.

August will see yet another deadline missed to deliver effective security for belly-hold freight on passenger flights



Delegates attending the Transport Security Expo aviation security conference will discover the implications of these two events on an industry caught between the rock and a hard place of delivering meaningful and effective security in the continually challenging economic environment it finds itself in. Both revision and introduction of new European Union (EU) regulation (particularly in respect to Liquid, Aerosol & Gel detection) will also impact heavily on airports in the coming couple of years, thus financing of new security initiatives will also feature. Meanwhile, the industry continues to debate the pressing need to improve the customer experience while meeting the statutory requirement to ensure appropriate security controls.

Acts of piracy surge

The EU has acknowledged that the pirate threat in the Horn of Africa region is "an expanding phenomenon", both in terms of level of activity and range.

Rear Admiral Peter Hudson, Operation Commander EU Naval Force (Navfor), enumerated the continuing threat of piracy in the region, when he recently stated that a huge surge in Somali pirate attacks meant that activity in March was double than that of the three months from September to November last year. Hudson says that the priority for international navies is now to increase co-operation and concentrate forces to counter this new swarming tactic on the part of the pirates.

The NATO (North Atlantic Treaty Organisation) Shipping Centre (NSC) offers maritime world delegates attending Transport Security Expo & Conference 2010, the opportunity to take part in a unique tactical floor exercise which will follow a vessels' voyage from departure in Rotterdam to the attack point in the Gulf of Aden, through its capture and on to its eventual release.

This highly specialised full-day exercise offers much in the way of both mission critical and real world advice designed to aid in the safe passage of shipping through such pirate infested waters.

The International Maritime Organisation conference will also focus on regulations in respect of maritime security

The International Maritime Organisation (IMO) conference will complement the tactical floor exercise with its clear focus on an examination of both current and future international policy and regulations in respect of maritime security and how this impinges on the shipping industry.

With incidence of pirate attack continuing to climb and becoming increasingly wide ranging, including within the so called Internationally Recommended Transit Corridor (IRTC) established to aid in safe passage through the Gulf of Aden, the importance of these two key conference streams deliver vital information to the maritime sector.

Supply chain disconnect

August will see yet another deadline missed to deliver effective security for belly-hold freight on passenger flights. This news was broken by Gale Rossides, Acting Administrator of the Transportation Security Administration (TSA), in testimony before the US House of Representatives Appropriations Committee subcommittee on Homeland Security in early March.

Rossides told the subcommittee that while 100 percent screening of belly-hold cargo on domestic flights would be achieved by the deadline, it would take up to another two years before the same could be said for inbound international belly-hold cargo. But others at the regulatory level elsewhere in the world argue that this time line may well be over optimistic.

EU regulation 300/2008 incorporates three specific and tough US requirements on supply chain security - independent validation of known consignors; a mandatory EU cargo database embracing known and unknown or unaccredited consignors and a distinction between direct and transit cargo - to ensure compliance.

Eckard Seebohm, Head of Aviation Security, European Commission (EC) admits that there are huge challenges ahead for the aviation industry and the supply chain in meeting these regulatory requirements. He is also on record stating that the US may just have to an accept an alternative (such as sniffer dogs) to x-raying every item of belly-hold freight, given that the piece level 100 percent screening requirement favoured by the TSA could potentially bring air-freight movement between Europe and the US to a grinding halt if a hardware only solution were to be rigidly enforced.

Transport Security Expo & Conference 2010 is being held 14-15 September at London Olympia  



With EC regulation 300/2008 having just become law and much debate consequently still raging between regulators and within the industry over how best to achieve compliance, the key issues will be outlined and discussed in detail at the forthcoming Transport Security Expo & Conference.

The event is expected to bring focus to the fundamental issues the regulation raises, help in identifying who within the extended supply chain has responsibility for what and attempt to answer the vexed at what cost question.

Principal speakers from the International Air Transport Association (IATA), Association of European Airlines (AEA), Swissport, CEVA Logistics, Cargolux and DHL amongst others, will be on hand to share knowledge and invite in-depth discussion on achieving a 100 percent cargo screening regime within a one-stop security environment.

Given that so many major security issues still need to be addressed, Transport Security Expo & Conference 2010, being held 14-15 September at London Olympia, is the must attend event in the aviation, maritime and supply chain security sectors.

For further information please contact Nicola Greenaway on + 44 (0) 208 542 9090 or email her.

Download PDF version Download PDF version

In case you missed it

How should the security industry promote diversity?
How should the security industry promote diversity?

Diversity in a company’s workforce is arguably more important now than ever. Societal awareness of the importance of diversity has grown, and many people see diversity as an important factor that reflects positively (or negatively) on a company’s culture and image in the marketplace. We asked this week’s Expert Panel Roundtable: What should the security industry do to promote workplace diversity?

Why face recognition as a credential is the ideal choice for access control?
Why face recognition as a credential is the ideal choice for access control?

In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialised equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair colour, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.

What are the challenges and benefits of mobile access control?
What are the challenges and benefits of mobile access control?

There is a broad appeal to the idea of using a smartphone or wearable device as a credential for physical access control systems. Smartphones already perform a range of tasks that extend beyond making a phone call. Shouldn’t opening the door at a workplace be among them? It’s a simple idea, but there are obstacles for the industry to get there from here. We asked this week’s Expert Panel Roundtable: What are the challenges and benefits of mobile access control solutions?