European Corporate Security Association



Similar documents
CRS Report for Congress

Aircraft Security - Problems and Vulnerabilities

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

STATEMENT OF JOHN ROTH INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM

How To Hold A Public Safety Summit

Supply Chain Security Training Needs for Law Enforcement Agencies

Executive Protection Facility Security Convoy Escort

A Risk Assessment Methodology (RAM) for Physical Security

Espionage and Intelligence. Debra A. Miller, Book Editor

HOMELAND SECURITY INTERNET SOURCES

July 25, 1947 Three Romanian terrorists kill an aircrew member on board a Romanian Airlines flight, resulting in the world s first fatal hijacking.

Homeland Security Executive Certificate Studies Program Strategies for Homeland Security and Risk Management: Lessons from the World s Top Experts

August 16 August 22, 2009 November 1 November 7, 2009

Appendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars)

El Camino College Homeland Security Spring 2016 Courses

6th Annual Homeland Security Professionals Conference & Expo October 3-7, 2011

OR Technology Reliable Partner for Security Applications. Security. Digital Radiography

Airport Scanner Safety

The Fight for the Last Mile

Scanna Postal Screening Equipment

CBO. Federal Funding for Homeland Security: An Update. What Is Homeland Security?

u.s. Marshals Service Office of Security Systems.Weapons & Explosives Screening Program DRAFT

DEPARTMENT OF HOMELAND SECURITY

Richard L. Jones President & CEO InfraGard Los Angeles. Regina Canale-Miles FBI Special Agent & Coordinator InfraGard Los Angeles

The Biggest Regional Security Event

Introduction to PAS 127:2014 Checkpoint security screening of people and their belongings Guide

The Role of Clinical Laboratories During a Radiological Event

DEPARMTMENT OF HOMELAND SECURITY AUTHORIZATION BILL FOR FY 2008 AND FY 2009 SECTION-BY-SECTION

Regional Conference on Factoring in Asia

Purpose of the Governor s strategy. Guiding Principles

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE

Homeland Security Executive Certificate Studies Program Strategies for Combating Terrorism: Lessons from the World s Top Experts in Homeland Security

ISTQB ADVANCED LEVEL TECHNICAL TEST ANALYST CERTIFICATE IN SOFTWARE TESTING

Global Security Academy

The znose, A New Electronic Nose Technology For Homeland Security

Homeland Security Executive Certificate Studies Program Strategies for Homeland Security and Risk Management: Lessons from the World s Top Experts

Remote services are changing your industry

THE EQUIPMENT THE SOLUTION THE CHALLENGE THE THREAT

DEPARTMENT OF HOMELAND SECURITY

The structure and organization of the Fusion Center takes its direction from four key documents, they are:

Statement for the Record by. Dr. Donald M. Kerr. Director, National Reconnaissance Office, Nominee for the Position of

The Strategic Importance, Causes and Consequences of Terrorism

Arizona Counter Terrorism Information Center

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE

ISTQB ADVANCED LEVEL TEST ANALYST CERTIFICATE IN SOFTWARE TESTING

CAREER OPPORTUNITIES

Homeland Security Major

SENIOR MANAGEMENT TEAM 2013

HOMELAND SECURITY INTELLIGENCE RPAD 556

The Asian Event Dedicated to Homeland and Civil Security

Summary of Qualifications: Education: Professional Experience: Kenneth R. Moses

Table Top Exhibition Sponsorship Booking Form

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

VIP Protection Tactical Course

Curriculum Vitae EXPERIENCE WORK HISTORY

The UK s European university. MSc FORENSIC SCIENCE. Canterbury. Graduate study

and in environments up to 80º F (27º C). Introducing Millivision s Next-Generation Low Cost Passive Millimeter X350 Scanning System.

Siemens Intelligence Platform. Non contractual; Commercial in confidence; Subject to change without notice

INTERPOL. Executive Summary

Optimal Technologies Proof of Concept Trial Report

Predictive Cyber Defense A Strategic Thought Paper

DEPARTMENT OF HOMELAND SECURITY

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

MASTER OF PROFESSIONAL STUDIES IN FORENSIC SCIENCE INVESTIGATE THE POSSIBILITIES.

The Role of the Emergency Manager: Has It Changed Since ?

How To Write A Book On Risk Management

SECURITY & RISK MANAGEMENT CONSULTANTS COURSE (SRMC)

Mass Gatherings Medical Strategies for Weapons of Mass Destruction

Flooding Emergency Response Exercise

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS

2010 Michigan Critical Infrastructure Protection Conference

BLOODSTAIN PATTERN ANALYSIS & OTHER COURSE(S) ( FALL 2015).

WHEN ENCOUNTERING LAW ENFORCEMENT

ABE40. Welcome Transportation Partners

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER am 1.00pm Green Park Conference Centre, Reading

The Security Technologies Industry in Germany

Visiongain. -v1531/ Publisher Sample

2015 WEMA Conference. Best Western Premier Waterfront 1 N. Main St. Oshkosh, WI October 14 WEMA CONFERENCE

Privacy in the Digital Age of Encryption and Anonymity Online

PARIS FRANCE. UIA Training Course Compliance Challenges and Opportunities: How to Build and Implement an Effective Compliance Programme

CARVER+Shock Vulnerability Assessment Tool

FUNDING FOR DEFENSE, HOMELAND SECURITY AND COMBATING TERRORISM SINCE 9-11: WHERE HAS ALL THE MONEY GONE?

ISTQB ADVANCED LEVEL TEST MANAGER CERTIFICATE IN SOFTWARE TESTING

The Annual Business Conference hosted by the MBA Program at Edwards School of Business

AN ACT. To create and establish the Office of Homeland Security in the Governor s Office; and for other purposes.

Law Enforcement and Homeland Security Anti-Terrorism Training

How To Get A Masters Degree In Intelligence Analysis

AGENDA. Food Contact Materials: Working Together for Safety and Innovation in Europe

Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards

FACT SHEET RACIAL PROFILING

Sustainable Water Management Workshop Exchange of Industry Best Practices

Introduction to Homeland Security Administration of Justice (AJ10) Fall Transportation Security Administration, 5757 Century Blvd.

VIBRANT SECURITY SERVICES

Big 4 Information Security Forum

Seaborne Attack Impact at Transportation, Energy, and Communication Systems Convergence Points in Inland Waters

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

The Journey.. Extending your Brand & Commercial Values. Through secure solutions

Transcription:

CONFERENCE ON THE TECHNICAL & HUMAN ASPECTS OF DETECTING BOMBS AND BOMBERS Tuesday June 5th 2007 from 09.00 till 17.00, followed by a Reception Chateau of Brasschaat, (North of Antwerp) Belgium In one day, Discover and understand the new Explosives Detection Technologies Understand the principles of Human Security Profiling With Experts from: Belgium USA France UK Israel 1/9

Scope of the Conference The use of explosive devices is the primary choice for Direct Action Groups and Terrorists who want to target people or infrastructure. Additionally, analysts have been warning for an expected significant increase (in Europe!) of the use of the suicide modus operandi for extreme terrorist groups to deliver their explosive devices. In recent years promising new detection technologies (passive Terahertz imaging, active millimeter wave imaging, walk trough portals for explosive traces detection, in body scanning digital X-ray, fully integrated check point screening solutions,...) have been developed in addition to the classical Metal Detection / X-ray systems. The first part of this conference will provide a better understanding of the new detection technologies, together with their possibilities, limits and budget implications. Besides technology, experts from countries with a (sadly) major experience in terrorist attacks put an emphasis on detecting the bomber rather than the bomb. The second part of this conference will focus on human profiling techniques to spot people intending to commit an act of terrorism. 2/9

AGENDA & TOPICS 08.00 09.00 Registration & Coffee 09.00 09.10 Welcome & Introduction ir. Yvan De Mesmaeker, Secretary General - ECSA 09.10 09.50 Walk Trough Portals for Explosive Trace Detection Smiths Detection Walk trough portals with air puffs to dislodge particles trapped on hair, body, clothing and shoes, which are subsequently analyzed for traces of explosives, offer true head-to-toe screening of people. This technology allows mitigating the risk of people carrying explosives into public and private buildings without a need for physical contact and at a relatively high throughput rate. 09.50 10.30 ITMS and Spectroscopy Mr. James Copeman-Bryant Technical support manager - GE Security The continuous drive for new developments within Homeland Protection resulted in a new generation of detectors derived from medical Computed Tomography (CT) for baggage explosives inspection and new developments in the area of trace and substance detection. 10.30 11.00 Coffee Break 3/9

11.00 11.40 Low dose X-ray Systems for Inspecting People Mr. Claude Potelle Managing Director - Corporate Technology Services The use of X-ray based equipment for inspecting people has been recently accelerating, whether in prisons for security reasons, at customs and immigration check-points for detecting narcotics and contraband objects or at diamond mines for controlling workers leaving their working place. Two types of technologies are in use. One is a low dose variant of medical radiographic imaging, the other is based on the reflection from the body (backscattering). Both systems obtain results but meet some psychological and administrative obstacles, depending on countries and applications. 11.40 12.20 Terahertz Imaging of Concealed Objects Mr. Mikael Karlstrom Vice President Product Engineering ThruVision This technology uses the natural terahertz waves emitted by people and objects to form images of concealed items, including metals and non-metals such as ceramics, plastics and liquids. It s a passive system as the subject is not illuminated or irradiated in any way. ThruVision is a spin-out company from the Rutherford Appleton Laboratory a key UK Government laboratory and the European Space Agency. 12.30 14.00 Walking Lunch 14.00 14.40 Millimeter Wave Technology Mr. John Marsala Vice President - L3 SafeView This active millimeter wave technology is a sophisticated imaging technique that sees trough materials, so that objects hidden on a person can be detected, regardless of most cloaking materials. The technology discriminates between all types of organic and inorganic matter, and clearly identifies liquids, ceramic weapons, plastic explosives, etc 4/9

14.40 15.00 Coffee Break 15.00 15.40 Explosives Detection trough Scent Technology Mr. Alon Wainer Product Manager - SDT Scent Detection Technologies Scent trace detection technology is an amalgamation of several scientific disciplines combined to digitally recreate the mammalian olfactory processes. The technology is "flexible", capable of learning to recognize new substances, thereby constantly adapting to new threats. Its sensors have the additional capacity to detect trace amounts of material in gaseous and liquid phases, such as water. SDT's exclusive focus is the development of trace detection products for explosives, narcotics, chemical and biological agents 15.40 16.30 The Human Element in Detecting and Responding to Bombs and Bombers Mr. Amotz Brandes Director and Managing Partner - Chameleon Associates Billions of dollars are being spent on security technology and equipment that fall short of providing the real end-to-end threat mitigation solution vis-à-vis Detection, Determination and Deployment. Traditional security systems developed around immigration, customs and VIP protection use human processes as the basis for threat assessment and response. However when it comes to counter-terrorism the common approach is automation through technology. Mr. Brandes will describe the human processes that must be integrated into a security system in order to make it effective in countering terrorism. 16.30 Closing of Conference 17.00 Reception & Informal exchange of experiences 5/9

THE SPEAKERS Mr. Alon Wainer, Product Manager - SDT Scent Detection Technologies Mr. Wainer served For 9 years in various positions in the security division in Ben-Gurion airport in Israel, where for 4 years he was the manager of the security screening technologies department. During his years in Ben-Gurion Mr. Wainer was in charge of training security personnel in all the aspects of screening technologies; he instructed planned and supervised X-ray operators courses, CT operators courses, security checkpoint training (including metal detectors, ION scan technology, and various EDS technology). Mr. Wainer was in charge of training the explosive detection unit which specializes in bomb threat detection by manually inspecting and dismantling various items. Mr. Wainer specializes in mass transportation security and also has vast experience in designing security programs and training security staff in major public and government installations in Israel. Mr. Claude Potelle, Managing Director - Corporate Technology Services Mr. Potelle holds a Doctorate in Law and a Master degree in Economics from the University of Louvain. He attended Advanced European studies at the College of Europe in Bruges as well as courses on Industrial organization and antitrust at Northwestern University, Evanston, Illinois. He was for many year vice-president of the French strategic planning association AFPLANE and President of the European Strategic Planning Federation. He teaches in a corporate management school in Moscow. Since the early nineties, Mr. Potelle has been conducting advisory missions for international organizations in countries of the former Soviet Union and has developed an activity in technology exchanges between East and West. 6/9

Mr. Amotz Brandes, Director and Managing Partner - Chameleon Associates Mr. Brandes is a veteran of the Israeli Defense Forces Special Reconnaissance Unit. He began his career as a Security Agent for El-Al Israeli Airlines in Los Angeles. Since joining Chameleon Associates he has developed educational programs in Terrorist Threat Mitigation, Security Engineering and Predictive Profiling. In 2005 he became a Managing Partner at Chameleon Associates. Mr. Brandes has a BA Degree in International Development Studies from UCLA. He is the Chair of the Homeland Security Committee of the Southern California Israel Chamber of Commerce. 7/9

PRACTICAL INFORMATION & REGISTRATION When Tuesday June 5th 2007 from 09.00 till 17.00, followed by a Reception Where Kasteel Van Brasschaat Gemeentepark 5 B - 2930 Brasschaat (North of Antwerp, Belgium) Route description: -> www.kasteelvb.be Registration (excl. VAT) ECSA Members: EUR 150 (with priority registration till May 15) Non ECSA Members from Police, Judicial, Intelligence & Military: EUR 200 (subject to seats available) Non ECSA members: EUR 300 (subject to seats available and to acceptance of registration) To Register: Send an email to info@ecsa-eu.org no later than May 30 th, mentioning: Name: First Name: Function: Email: Mobile: Organization: VAT number: Invoice Address: ECSA Members and Accepted Guests will receive a confirmation of registration by email no later than May 30 th.! Cancellation is possible till May 30th, after this date a cost of EUR 150 will be invoiced! 8/9

Hotels Nearby hotels include: Afspanning De Kroon (2 minutes walk from the castle of Brasschaat) www.dekroon.be Bredabaan 409 B - 2930 Brasschaat +32 3 652 09 88 info@dekroon.be Hotel Klokkenhof www.klokkenhof.com Bredabaan 950 B - 2930 Brasschaat +32 3 633 09 27 info@klokkenhof.com Motel Dennenhof www.moteldennenhof.be Bredabaan 940 B - 2930 Brasschaat +32 3 663 05 09 dennenhof@valk.com 9/9