Security - PowerPoint PPT Presentation

1 / 25
About This Presentation
Title:

Security

Description:

X-ray, radar, CBRNE detection, people detection (immigration) through oxygen, ... Mobile information access with Tetra specialist Beat Systems ... – PowerPoint PPT presentation

Number of Views:120
Avg rating:3.0/5.0
Slides: 26
Provided by: doh8
Category:
Tags: security

less

Transcript and Presenter's Notes

Title: Security


1
Security
2
National Security Resilience Worldwide Context
  • Homeland Security market can be divided into
    National Security, coping with terrorist threat
    and activity, and Resilience, coping with natural
    and non-terrorist emergency
  • The market place is immature and as such highly
    mobile and easy influenced (by major man-made and
    natural disasters)
  • Market requirements are complex, which offers
    opportunities for innovative technologies
  • Besides the main target markets USA and UK
    itself, new areas (with expected growth mainly
    due to proximity to terrorist activity) are UAE,
    Oman, Abu Dhabi, Qatar, Singapore
  • USA
  • The high HS expenditure in the US has resulted in
    their dominant market position.
  • Key focus areas for DHS include national
    preparedness, emergency communication
    integration, chemical security, FEMA, cargo
    screening.
  • Coordinated RD programme overseen by the
    Technical Support Working Group, TSWG. Budget
    40-60M
  • Size
  • Global Market (2005) - 42B (USA - 23B, Rest of
    World 19B. This is forecasted to be 115B by
    2010) with a growth of 12 CAGR
  • European Market in 2005 - 40M. This is
    forecasted to be 400M by 2010 with a growth of
    10

3
National Security ResilienceUK / Scottish
context
  • Homeland Security market can be divided into
    National Security, coping with terrorist threat
    and activity, and Resilience, coping with natural
    and non-terrorist emergency.
  • Not to be mistaken to be another strand of
    Defence. In the UK, Home Office who is
    responsible for security (not MoD). Home office
    has committed 70m per annum in planned
    expenditure 2005-2008.
  • Various disciplines used in counter-terrorism are
    improved intelligence Law enforcement Border
    control Enhance transportation security.
    Examples of natural disaster are floods
    hurricanes landslides. Whilst Industrial
    emergency can include fires explosions toxic
    gas leaks.
  • The Home office has identified priorities in its
    Science and Technology Strategy 2005-08,
    including tracking (incl. identification from
    CCTV), biometrics, cyber security, chemical,
    biological, Radiological, Nuclear and Explosives
    (CBRNE) threats.

4
National Security ResilienceUK Context
  • UK Opportunities
  • Home office is important market for Scottish
    companies in its own right with committed spend
    70M per annum
  • A joint RD agreement was signed with US to
    exchange information, scientists, engineers,
    testing labs etc
  • Agreement for Co-operation in Science and
    Technology for Critical Protection and Other
    Homeland Security Matters
  • Counter Terrorism Science and Technology Centre
    (CTTC), operated by MoD laboratories at Porton
    Down. Responsibility for co-ordinating and
    controlling ST that underpin the MoDs
    activities, allowing government, industry and
    universities to work together on projects.
  • National Infrastructure Security Co-ordination
    Centre (NISCC), minimise risk to critical
    national infrastructure (CNI) from electronic
    attack (other parts of government work to protect
    physical and natural disasters), advisory,
    Alerts, briefings. Budget 10M FY2005/06
  • Cyber Security Knowledge Transfer Network, funded
    by DTI, encourages joint working between Gov,
    industry and academia. Contributes to several
    government initiatives such as eBorders and the
    national Biometric ID card scheme. 1.8 funding,
    managed by QinetiQ, furhter 10M grants available
    for product development and research (cyber
    crime, identity management and biometrics)
    Launched May 2006.
  • Civil Contingencies Secretariat (CCS)
  • Key stakeholder in implementing the UKs security
    policies. Its role is to identify and assess
    risk, audit performances and define requirements.
    It has NO procurement function, which lies with
    the individual agencies tasked with the relevant
    activities, for example the Fire service.

5
National Security ResilienceEuropean Union
  • The European Commission launched its Preparatory
    Action on Security Research (PASR) which mapped
    the EU wish-list. They are set out in the
    European Security Research Programme (ESRP). Any
    tenders/procurements coming from this programme
    will be an integral part of Framework 7.
  • ESRP focuses specially on emerging technologies
  • Integrated concepts (network enabling
    capabilities, key being interoperability)
  • Test, evaluation and certification tools
    (particular simulation)
  • Programme for critical Infrastructure protection
  • Management of trans-national crises
  • Emergency response measurements
  • A new EU Agency for Border control was
    established in 2005 in Warsaw, FRONTEX,
    responsibility includes research for border
    control and surveillance.

6
National Security Resilience Key Facts
  • There are many different technologies used to
    protect the national security. Most of them have
    a dual-use nature they are also used in other
    markets (e.g. cellular and digital
    communications).
  • The key technology areas are as follows
  • Identification and authentication
  • Screening
  • Surveillance
  • Tracking
  • Sensor technologies
  • Data analysis
  • Cyber security

7
Terahertz Spectroscopy
There are many different graphs, all grouping
the elements different depending on which country
or organisation they represent. However most
include the same technologies. We do not endorse
this or any other graph as the right one. It is
used for illustration purposes only.
8
National Security Resilience Key Facts
Identification Authentication
  • What is it?
  • Technology to identify individuals (or
    personnel), verify that they are who they claim
    they are, enable their access to facilities and
    locations. Used both by governments and industry
  • What technologies are involved?
  • RFID, smart cards, biometrics (facial
    recognition, fingerprint etc), multiple biometric
    in one mode simultaneously
  • What are the Challenges?
  • Associated links with privacy, speed of
    processing, scalability and security of data
  • Example of Scottish Companies are
  • PKIone (digital signatures), Aspects Software,
    ECEBS (smart cards), Innometriks, Yarg Biometrics
    (biometrics), Bitwise (embedded software), Gavin
    Watsons (security links)

9
National Security Resilience Key Facts
Screening
  • What is it?
  • Technology to investigate/verify the safety,
    legality and genuinety of cargo, people
    (personnel), vehicles. Mainly used at ports of
    entry (water ports and airports, border control
    posts)
  • What technologies are involved?
  • X-ray, radar, CBRNE detection, people detection
    (immigration) through oxygen, respiration, body
    heat, gasses fumes or mass density.
  • What are the Challenges?
  • Limit the impact on trade, speed of processing,
    mobility, detection accuracy, scalability and
    security of data
  • Example of Scottish Companies are
  • Edinburgh Instruments, Cascade technologies, Alba
    Ultra sound, Realtime Engineering, Aperta,
    Fortkey

10
National Security Resilience - Key
FactsSurveillance
Leading technology 4i2i provides solutions within
the areas of video coding, digital broadcasting
and error correction. Software, IP core design or
board level solutions for digital CCTV and
monitoring applications.
  • What technologies are involved?
  • CCTV, wide spectrum detection, smart surveillance
    including motion detection, interpretation and
    analysis and intelligent integration
    (identification and integration with surveillance
    databases)
  • What are the Challenges?
  • Correct identification susceptible to failure
    (false positives), need to reduce rate at which
    this occurs so improvements to CCTV related image
    processing and identification
  • Examples of Scottish companies
  • 4i2i, Indigo Vision, Visimetrics, VVS, Essential
    Viewing, MaxIMT, Nallatech, Positive Response

11
National Security Resilience - Key
FactsTracking
What is it? Technology to follow an object and
determine its movements and location. This
technology is widely used by both governments and
industry and greatly improves efficiency. What
technologies are involved? GPS, 3G/GSM and
RFID What are the Challenges? The technologies
are not without limitations. Future developments
concentrate on accuracy, costs and the ability to
use the technologies in an integrated manner
(multiple modal tracking solutions) Example of
Scottish Companies are Spartan Solutions,
Realtime Engineering, TES, Luichart technology,
Nautronics
12
National Security Resilience - Key FactsSensors
  • Sensors are used in many mentioned applications
    such as screening (particular CBRNE detection
    example world-class Scottish companies are
    Cascade Technology and Albagaia).
  • Related technologies include radar technologies,
    real-time processing, processing algorithms and
    control and electro-magnetic environments.
  • Worth noting on RD side-
  • Scotland has ground breaking projects taking
    place in universities regarding sensor platforms
    and wireless sensor networks. Examples of
    companies are Selex, EADS and Thales Optronix.
    Academic highlights include Strathclyde
    University, Edinburgh University, Glasgow
    University and Heriot-Watt.

Wireless Sensor Networks SPECKNET
13
National Security Resilience - Key FactsData
Analysis
  • Data analysis runs across all functions. It
    enables information to be interpreted and
    utilised more effectively. Considering most
    security applications build up huge amounts of
    data this market becomes increasingly important.
  • Challenges are again privacy issues. Key to
    success is the ability to make certain info
    available to multiple users securely whilst
    preserving other information, see also cyber
    security.
  • Market leaders (info infrastructure and
    integration) Northrop Gruman, Siebel Systems,
    Purdue University, Carnegie Mellon University
    (Pittsburgh)
  • World leader in Law Enforcement data Management
    Systems is Memex, supplier to the Metropolitan
    Police and key player in the US

Mobile information access with Tetra specialist
Beat Systems
14
National Security Resilience - Key FactsCyber
security
  • Cyber security and the need to share information
    (often between disparate agencies) is one of the
    biggest challenges for the security sector.
  • Estimated 2bn I 2005, predicted growth 30 per
    annum (IT Security, Key Note, Feb 2005)
  • Future challenge is the integrating of several
    security systems with mobile access and real-time
    processing power
  • Examples of Scottish companies are Westica
    communications, Airlie Connections, Abelon
    Systems, Altera, Selex, Bloxx
  • To encourage government, academic and industry
    working together, the Cyber Security Knowledge
    Transfer Network, run by the DTI committed funds
    to develop effective response.
  • An example of SME excellence in embedded software
    with cryptography applications is Abelon Systems.

?Edinburgh School of Informatics is focussing on
a project on automated security engineering,
involving software secured coding.
15
National Security Resilience - Key
FactsCompanies base and strengths
  • A market analysis report, carried out by the DDA,
    identified and categorised over 100 companies in
    Scotland operating in the security sector.
  • Suggested business development strategy is to
    encourage cluster development including both SMEs
    and prime contractors through partnership
    programmes, continue joint working with partners
    organisations e.g. UK TI (in some cases UK is
    better positioned then Scotland alone, in
    particular in the USA)
  • Scottish activity (both commercial and academic)
    has been mapped against the global opportunities
    and creates the following graph. Intelligence,
    communications and data analysis scores high.
    (data behind chart available via DDA report)

16
(No Transcript)
17
National Security University Research
Scotland has the highest concentration of
universities in Europe with 13 located within 100
miles of Edinburgh. Many of these have
significant global reputations in relevant
research areas.Scottish higher-education
institutes produced 5,122 engineering and
technology graduates 4,390 mathematics and
computer science graduates and 1,665 physical
sciences related (excluding combined studies)
graduates. Specific strengths include automated
security engineering control engineering
Computer Modelling Human Machine
Interfaces/displays MEMs signal processing
wireless sensor networks.A market analysis
report, carried out by the DDA, identified and
categorised over 50 university departments in
Scotland carrying out more than 65 RD projects
related to the security .
18
Proof of Concept
19
Key Selling Messages National Security
  • Key Strengths
  • Large pool of experienced and highly skilled
    graduates
  • Low cost v rest of UK / Europe
  • Outstanding academic and commercial RD base of
    world renown
  • Very good spread of technology skills in company
    base eg. wireless, sensors, displays, MEMs, DSP,
    security, embedded software
  • Strong cluster-collaboration spirit amongst
    company base both indigenous and inward investors
  • Scottish employee loyalty
  • Support network to inward investors
  • English speaking access to EU markets

Scotlands Competitive Position World class RD
and spin out companies of scale. High calibre,
loyal and low cost workforce. Easy location to
set-up and do business.
20
Collaboration Opportunities
Cyber security KTN DTI The Cyber Security KTN
will be the single focal point for UK Cyber
Security expertise to identify universal
challenges and develop effective response,
influence UK government policy and investment
strategy, improve the UK security baseline
through accelerated innovation, harness and
promote UK capability internationally.
Intermediary Technology Institutes (ITIs) - ITI
Techmedia aims to bring Scotland to the forefront
of the global market for digital media and
communications technology.  ITI Energy funds and
manages RD programmes across the energy
spectrum, including energy storage, renewables
and clean energy. ITI will invest 450 million
over ten years to develop a range of
pre-competitive technologies with global market
potential. 
21
Collaboration Opportunities
International Business Opportunities (IBO) - IBO
is a web-based service offered by Scottish
Development International that matches up
business opportunities from foreign companies
with interested Scottish organisations. So
regardless of the type of business opportunity a
company is looking for joint venture, supplier,
distributor, licensing, strategic alliance, etc,
the IBO online service means they can contact
suitable Scottish companies quickly, easily and
effectively to establish successful partnerships
in their chosen markets. Innovation Relay
Centre (IRC) Scotland - IRC Scotland is a gateway
to an extensive technology and business network
spanning 32 countries across Europe. The IRC
works with Scottish organisations to help find
innovative new technology, sell or
licence innovations or enter into joint
development arrangements with suitable partners
in Europe. They can also help secure European RD
funding and find Framework 6 partners or projects
to join. Euro Information Centre - Euro Info
Centres (EICs) provide local access to a range of
specialist information and advisory services to
help companies develop their business in Europe
22
Key Companies in Scotland
Note Cos to be added Boeing, ABM, Honeywell,
SAIC
real time engineering
23
Industry Associations
24
Industry Associations
NOTE insert logos and make lay out same as
previous slide Association of Police and Public
Security Suppliers (APPSS) www.appss.org.uk Bri
tish Security Industry Association (BSIA) -
www.bsia.co.uk Fire Industries Confederation
(FIC) - www.the-fic.org.uk International
Associations for Biometrics (IAfB) -
www.iafb.org.uk
25
Science Parks
  • The UK Science Park Association lists 16 business
    science parks which are located in Scotland.
Write a Comment
User Comments (0)
About PowerShow.com