By CHRIS YATES
August will see another deadline missed to deliver effective security for belly-hold freight on passenger flights.
The news was broken by Gale Rossides, Acting Administrator of the Transportation Security Administration (TSA), in testimony before the Appropriations Committee's subcommittee on Homeland Security in the US House of Representatives in early March.
Rossides told the subcommittee that while 100 percent screening of belly-hold cargo on domestic flights would be achieved by the deadline, it would take up to another two years before the same could be said for inbound international belly-hold cargo.
The delay has been caused by problems in getting foreign government cooperation. Some 20 core countries are responsible for around 85 percent of air freight shipments to the US.
Delegates at the 2nd Lufthansa Cargo Security Conference held in Frankfurt heard that this failure in getting agreements was largely of TSA's own making though.
Warren Miller, the TSA's International Air Cargo Branch Chief, admitted that the organisation had initially been “myopic” in its approach to achieving 100 percent screening, given a primary focus on purely domestic rather than domestic and international air freight security.
He went on to say that TSA is “not even at pilot stage” in rolling out a long term, layered approach based around risk targeting.
Aside from stating that rhetoric is poles apart from reality, he proffered only that US experience indicated that focus on the supply chain was the best way forward for imports, adding the usual mantra about harmonising and strengthening global standards.
Which version best version
A cynic might argue that the initially myopic focus he spoke about, was driven by a belief held in Washington D.C. that the rest of the world would simply roll over and accept that their way is the best way and the only game in town. The cynics would, undoubtedly, be correct in that assertion.
Europe has, in part, already bent to US will.
European Commission (EU) regulation 300/2008 incorporates many of the tougher US requirements and replaces previously published regulation enforced after the September 11 terrorist attacks.
Eckard Seebohm, Head of Aviation Security, European Commission (EC), is on record diplomatically stating that a working group comprising shippers, forwarders, airlines and airports, had examined all the issues pertaining to air-freight security and concluded that mistakes had been made when the previous regulation ( 2320/2002) passed into law.
Consequently, 300/2008 includes three specific and much more robust elements (independent validation of known consignors; a mandatory EU cargo database embracing known and unknown or unaccredited consignors and a distinction between direct and transit cargo) which match US policy. Introducing new regulation is one thing but turning regulation into practice is quite another though.
Seebohm admits that there are huge challenges ahead for the aviation industry and the supply chain, not least of which is the requirement for independent validation of known consignors. He is also on record stating that the US may just have to an accept an alternative (such as sniffer dogs) to x-raying every item of belly-hold freight, given that the piece level 100 percent screening requirement favoured by the TSA could potentially bring air-freight movement between Europe and the US to a grinding halt if a hardware only solution were to be rigidly enforced.
A disconnect also remains in respect to timing. TSA's Rossides states that it will take another two years before 100 percent international air-freight screening will be achieved. Seebohm favours a three-year transition period since some countries remain woefully behind the curve in their preparations.
Focus on compliance
With EC regulation 300/2008 having just become law and much debate consequently still raging between regulators and within the industry over how best to achieve compliance, the key issues will be outlined and discussed in detail at the forthcoming Transport Security Expo & Conference, being held 14-15 September at London Olympia.
This annual event will bring focus to many of the fundamental issues the regulation raises, help in identifying who within the extended supply chain has responsibility for what and attempt to answer the vexed at what cost question.
Principal speakers from the International Air Transport Association (IATA), Association of European Airlines (AEA), Swissport, CEVA Logistics, Cargolux and DHL amongst others, will share knowledge and invite in-depth discussion on achieving a 100 percent cargo screening regime within a one-stop security environment.
Considerable disquiet remains about the industry's ability to secure the supply chain fully given that very many questions remain perplexedly unanswered at the regulatory level. Not least of these questions is the unknown cost of accreditation and validation. How many consignors within the supply chain become accredited will depend on both the bottom line figure and how onerous the process of validation is.
Ekhard Seebohm has said that the one-stop security approach for cargo should not be over complicated since it provides a framework for all known consignors and regulated agents to be recognised throughout all European Union (EU) member states. He admits that the validation requirement will probably result in a sharp drop in the number of known consignors though.
Whilst it's patently obvious that many low volume consignors will simply not bother with accreditation since cost would likely outstrip value, there are clear rumblings along similar lines from larger volume consignors as well. A representative of Seimens told the Lufthansa Cargo conference held earlier in the year that while it takes supply chain security very seriously indeed, “certified consignor status will increase costs drastically”.
Back story
The back story in much of this discussion is that a strongly held belief remains that centralised screening at or close to airports may be a more viable process.
Seebohm makes the point that this approach would serve only to create major bottlenecks at airports, thus severely hampering just in time trade.He stressed that, for the time being, the priority had to be getting the EU-originating US bound screening methodology right, with focus shifting to other related matters over time. Referring to in-transit air-freight, he says that he's still looking for a measured and reasonable approach that will obviate US All Cargo International Security Programme requirement for exhaustive searches of aircraft loading goods from non certified airports outside of the EU.
These issues and very many more will undoubtedly be aired at the Transport Security Expo & Conference in September and it remains critically important that those with a vested in the air-freight arena attend to let their views be heard.We may only be talking about a known consignor programme that's been given a course of steroids and a US style makeover, but the requirements could have a profound effect on your business and bottom line.1105 words.
About Transport Security Expo & Conference
Formerly known as TranSec World Expo, this event enters its 8th successful year as the pre-eminent Transport Security Expo and Conference. It remains the only event of its kind globally to bring together the full spectrum of key stakeholders and industry leaders with the areas of Aviation, Maritime and the Supply Chain security under one roof to debate the major issues facing us today.
The event features an exhibition, conferences, workshops and all important networking opportunities.
Transport Security Expo & Conference moves to London for 2010 and will take place in the world-renowned Olympia Conference and Exhibition centre, 14-15 September 2010.
About the author
Chris Yates is the principal of Yates Consulting, a specialist consultancy with a focus on aviation safety and security matters. He will chair the second day of the Transport Security Expo aviation security conference on 15th September 2010.
Showing posts with label Industry News and Forescasts. Show all posts
Showing posts with label Industry News and Forescasts. Show all posts
Thursday, 20 May 2010
Monday, 19 October 2009
Worldwide Defense High Performance Computing (HPC) Market Forecast 2010-2015
Market Research Media Ltd announces a new market report Worldwide Defense High Performance Computing (HPC) Market Forecast 2010-2015.
If one were to choose an index that best represents a national military capacity, the high performance computing power of a nation would win as most comprehensive measure. More and more countries view supercomputing technology as a symbol of national military power.
No modern war has been won without technological superiority. No future war will be won without it. The High Performance Computing (HPC) provides many capabilities and tools the military needs to address defense problems. HPC hardware and software can be used to address a wide spectrum of defense-related issues, including: protecting bases of operations through the mitigation of toxic threats; modeling to support certification of new aircraft-store combinations before deployment to conflicts zones; supporting air and space supremacy; conducting climate, weather, and ocean modeling that provides valuable information for countermine warfare; data mining and intelligence analysis, disaster modeling, preparation for emergency operations and humanitarian relief operations throughout the world. These are but a few examples.
The global defense high performance computing market is projected to increase from $2.6 billion in 2010 to $3.3 billion in 2015. The estimate for worldwide cumulative market 2010 - 2015 is $18 billion, for a compound annual growth rate (CAGR) of 4.7% in the 6-year period.
The report covers the following market segments, products, technologies and services:
* HPC Servers
* HPC Software (Defense Applications)
* HPC Data Center Infrastructure
* HPC Network Equipment
* HPC Storage
* HPC Hardware & Software Services, Support and Maintenance
* Top markets by geography
* Governmental sector
* Private sector
The report focuses on critical HPC applications in defense market, like weapons technology, military communications, military simulation, operational weather and ocean forecasting; planning exercises related to analysis of the dispersion of airborne contaminants; cryptanalysis; military platform analysis; survivability/stealth design; intelligence/surveillance/reconnaissance systems; virtual manufacturing/failure analysis of large aircraft, ships, and structures; and biotechnology.
The report provides:
* Worldwide six-year defense HPC market forecast for the period 2010-2015
* Defense high performance computing market segments by infrastructure
* Defense high performance computing market segments by application
* National defense HPC market forecasts for the period 2010-2015 by countries.
How much do individual countries plan to spend on defense-related HPC between 2010 and 2015? Where are the major market growth opportunities in military HPC software and hardware over the next six years? How are emerging COTS solutions shaping the market? These critical questions and many more can be answered through our in-depth research, as presented in this report - Worldwide Defense High Performance Computing (HPC) Market Forecast 2010-2015
Market Research Media
If one were to choose an index that best represents a national military capacity, the high performance computing power of a nation would win as most comprehensive measure. More and more countries view supercomputing technology as a symbol of national military power.
No modern war has been won without technological superiority. No future war will be won without it. The High Performance Computing (HPC) provides many capabilities and tools the military needs to address defense problems. HPC hardware and software can be used to address a wide spectrum of defense-related issues, including: protecting bases of operations through the mitigation of toxic threats; modeling to support certification of new aircraft-store combinations before deployment to conflicts zones; supporting air and space supremacy; conducting climate, weather, and ocean modeling that provides valuable information for countermine warfare; data mining and intelligence analysis, disaster modeling, preparation for emergency operations and humanitarian relief operations throughout the world. These are but a few examples.
The global defense high performance computing market is projected to increase from $2.6 billion in 2010 to $3.3 billion in 2015. The estimate for worldwide cumulative market 2010 - 2015 is $18 billion, for a compound annual growth rate (CAGR) of 4.7% in the 6-year period.
The report covers the following market segments, products, technologies and services:
* HPC Servers
* HPC Software (Defense Applications)
* HPC Data Center Infrastructure
* HPC Network Equipment
* HPC Storage
* HPC Hardware & Software Services, Support and Maintenance
* Top markets by geography
* Governmental sector
* Private sector
The report focuses on critical HPC applications in defense market, like weapons technology, military communications, military simulation, operational weather and ocean forecasting; planning exercises related to analysis of the dispersion of airborne contaminants; cryptanalysis; military platform analysis; survivability/stealth design; intelligence/surveillance/reconnaissance systems; virtual manufacturing/failure analysis of large aircraft, ships, and structures; and biotechnology.
The report provides:
* Worldwide six-year defense HPC market forecast for the period 2010-2015
* Defense high performance computing market segments by infrastructure
* Defense high performance computing market segments by application
* National defense HPC market forecasts for the period 2010-2015 by countries.
How much do individual countries plan to spend on defense-related HPC between 2010 and 2015? Where are the major market growth opportunities in military HPC software and hardware over the next six years? How are emerging COTS solutions shaping the market? These critical questions and many more can be answered through our in-depth research, as presented in this report - Worldwide Defense High Performance Computing (HPC) Market Forecast 2010-2015
Market Research Media
Wednesday, 2 September 2009
Airport security: A growing market offers opportunities for big and small companies
Billions of dollars have been allocated toward bolstering airport security, encouraging the development of dozens of new technologies; increased reliance on e-ID documents, more attention to perimeter security, emphasis on cargo screening, and a decision of defense against shoulder-fired missiles will see billions more going to airport security
The war in terror began when terrorists exploited a major security weakness in U.S. travel system: The U.S. airline industry engaged in a sustained lobbying campaign and persuaded Congress not to impose meaningful security standards at airports. The two main targets of the industry's lobbying campaign were proposals to mandate airlines to equip the cockpits of their planes with impregnable doors, and proposals to impose tougher standards on security checking at airports.
Those days are gone. Billions and billions of dollars have been directed at airport security, giving boost to industries and scope for new technologies. The latest boost comes the stimulus package which allocated $1 billion toward improving baggage detection at airports, among other airport security-related goals.
Broad, deep market
Airport security refers to the techniques, methods, and equipment used in protecting airports and aircraft from terrorism and crime. The issue is not only the protection of the large number of people who pass through airports each day, and not only the protection of the passengers concentrated on large airliners. As the 9/11 attacks showed, the airplanes themselves may be turned into weapons to inflict death and massive destruction on targets on the ground.
There are many different technologies involved in airport security. The list would include, but would not be limited to:
Digital surveillance
Explosive detection
Biometrics
Perimeter and access control
X-ray and infrared
Metal detectors
"Others" and integration
Closed-circuit television
Intercom and video door phones
Alarms and sensors
Fences and physical barriers
Night and thermal imaging
The combination of increased air travel in the next few years, growing reliance on biometric, RFID-equipped ID documents, and growing attention to two heretofore relatively neglected aspects of airport security -- baggage screening and perimeter security -- present good opportunities for investing in firms that develop or sell airport-security equipment (this was the conclusion last year of consulting firm Frost and Sullivan).
F&S notes that, for one thing, the airport security market is giving all indications it will start another boom period, following an initial rush of federal spending that came on the heels on the 9/11 attacks. In 2003 the Transportation Security Administration (TSA) purchases from security firms spiked at nearly $6.5 billion. That created a temporary "overcapacity" of equipment, according to Rani Cleetez, a F&S financial research analyst.
Thus, in the following year, 2004, aviation-security spending from TSA dropped to about $2 billion. Now, the top 30 firms in the field, which earned a collective $2.6 billion in 2004, are expected to bring in more than $6.1 billion in 2009.
According to Frost's Ken Herbert, the "market mix" in both North America and around the globe is not expected to change significantly over the next few years. "Market mix" refers to the regulatory, political, and economic conditions that can confound predictions for the growth rate in particular industries or market segments.
Within the airport-security equipment industry, Frost expects to see particularly healthy growth rates in an unusually high number of industry sub- segments, especially digital surveillance and explosive detection. Other growing segments will be biometrics, RFID technology for baggage management.
The airport security market remains an area in which large and established companies compete with smaller start-ups.
Perimeter security
The perimeter security market is big - and it is growing. Two things account for the size of the market and growth trends in it:
The many technologies involved
A brief list of the technologies -- and, hence, the companies - involved in perimeter security would include, according the Frost & Sullivan:
Fencing Systems (taut wire, infrared/thermographic sensing): Fencing systems determine boundaries, deter casual intruders, control access, and create delays in the event of intrusion
Fiber Optic: Glass fiber optic cable is used in video signals that communicate between short or long run locations. It is also used in remote sensing, buried under the secure side of a barrier and can sense light movements
Intelligent CCTV: Intelligent CCTC analyzes specific behaviour patterns and algorithms and assesses the scene for security breaches. It possesses capabilities to alert the specific authorities through network systems
Intrusion Detection System (IDS): Set detection systems and technologies that define, observe, control, and sense entry into a secure area
Access Control System (ACS): This manages various combinations of entry, exit, and movement within sterile and non-protected areas. ACS is a subsystem that supports intrusion detection systems
Next generation digital video recording: This refers to the video box that records, stores, manages and analyzes video streams
Perimeter and access control: This refers to simple barriers, fences, identity badges and other means of intrusion control, as well as devices that help in access control at airports
Closed-circuit Television (CCTV): This refers to the video system of a collection of CCTV cameras and surveillance that act as virtual barriers and assess the situation. The use of television cameras for close scrutiny and observation allows for quick response time
Volumetric Sensing: Volumetric sending monitors the physical space adjacent to fence lines for system penetration
Digital systems: Digital signal processing are used to evaluate alarms; characterized by very open architecture systems, large camera installations and a wide variety of technologies.
Booming passenger capacity
The increase in world travel -- even if that increase has flattened during the recent economic slow down -- will fuel technological upgrades and growth of strong perimeter security solutions.
According to F&S, increased efforts to protect critical airport infrastructure following 9/11 have led to increased budget allocations to combat security threats and protect airport perimeters. The result is that a more active approach has been adopted to install integrated security solutions that will be interoperable with new emerging technologies, as well as legacy security systems. Hence, large, system integrators are marking forays into the security market and forging partnerships with smaller niche companies to offer airport operators greater benefits.
The steady growth in the number of airline passengers means that airports will require strong, proactive security solutions. "The perimeter still remains a vulnerable target for terrorism, which, as history has shown, is highly adaptable," remarks the author of a recent F&S study on the topic. "As a result, increased funds allocation is expected toward new technology and protection initiatives, especially in countries witnessing the largest influx of airline passengers."
The direction: Layered technology solutions
The main boost in airport perimeter security will come from networking. A greater number of airports are switching to digital networks, making it essential to network all security solutions to the main command, control, and communications (C3) center. Further, as layered technology security solutions gain importance, integrated network systems are likely to drive increased airport sales. "Interoperable and layered security solutions, which feature open architecture structures will become crucial for existing airport operators," notes the F&S analyst.
Article appeared in Homeland Security Newswire
The war in terror began when terrorists exploited a major security weakness in U.S. travel system: The U.S. airline industry engaged in a sustained lobbying campaign and persuaded Congress not to impose meaningful security standards at airports. The two main targets of the industry's lobbying campaign were proposals to mandate airlines to equip the cockpits of their planes with impregnable doors, and proposals to impose tougher standards on security checking at airports.
Those days are gone. Billions and billions of dollars have been directed at airport security, giving boost to industries and scope for new technologies. The latest boost comes the stimulus package which allocated $1 billion toward improving baggage detection at airports, among other airport security-related goals.
Broad, deep market
Airport security refers to the techniques, methods, and equipment used in protecting airports and aircraft from terrorism and crime. The issue is not only the protection of the large number of people who pass through airports each day, and not only the protection of the passengers concentrated on large airliners. As the 9/11 attacks showed, the airplanes themselves may be turned into weapons to inflict death and massive destruction on targets on the ground.
There are many different technologies involved in airport security. The list would include, but would not be limited to:
Digital surveillance
Explosive detection
Biometrics
Perimeter and access control
X-ray and infrared
Metal detectors
"Others" and integration
Closed-circuit television
Intercom and video door phones
Alarms and sensors
Fences and physical barriers
Night and thermal imaging
The combination of increased air travel in the next few years, growing reliance on biometric, RFID-equipped ID documents, and growing attention to two heretofore relatively neglected aspects of airport security -- baggage screening and perimeter security -- present good opportunities for investing in firms that develop or sell airport-security equipment (this was the conclusion last year of consulting firm Frost and Sullivan).
F&S notes that, for one thing, the airport security market is giving all indications it will start another boom period, following an initial rush of federal spending that came on the heels on the 9/11 attacks. In 2003 the Transportation Security Administration (TSA) purchases from security firms spiked at nearly $6.5 billion. That created a temporary "overcapacity" of equipment, according to Rani Cleetez, a F&S financial research analyst.
Thus, in the following year, 2004, aviation-security spending from TSA dropped to about $2 billion. Now, the top 30 firms in the field, which earned a collective $2.6 billion in 2004, are expected to bring in more than $6.1 billion in 2009.
According to Frost's Ken Herbert, the "market mix" in both North America and around the globe is not expected to change significantly over the next few years. "Market mix" refers to the regulatory, political, and economic conditions that can confound predictions for the growth rate in particular industries or market segments.
Within the airport-security equipment industry, Frost expects to see particularly healthy growth rates in an unusually high number of industry sub- segments, especially digital surveillance and explosive detection. Other growing segments will be biometrics, RFID technology for baggage management.
The airport security market remains an area in which large and established companies compete with smaller start-ups.
Perimeter security
The perimeter security market is big - and it is growing. Two things account for the size of the market and growth trends in it:
The many technologies involved
A brief list of the technologies -- and, hence, the companies - involved in perimeter security would include, according the Frost & Sullivan:
Fencing Systems (taut wire, infrared/thermographic sensing): Fencing systems determine boundaries, deter casual intruders, control access, and create delays in the event of intrusion
Fiber Optic: Glass fiber optic cable is used in video signals that communicate between short or long run locations. It is also used in remote sensing, buried under the secure side of a barrier and can sense light movements
Intelligent CCTV: Intelligent CCTC analyzes specific behaviour patterns and algorithms and assesses the scene for security breaches. It possesses capabilities to alert the specific authorities through network systems
Intrusion Detection System (IDS): Set detection systems and technologies that define, observe, control, and sense entry into a secure area
Access Control System (ACS): This manages various combinations of entry, exit, and movement within sterile and non-protected areas. ACS is a subsystem that supports intrusion detection systems
Next generation digital video recording: This refers to the video box that records, stores, manages and analyzes video streams
Perimeter and access control: This refers to simple barriers, fences, identity badges and other means of intrusion control, as well as devices that help in access control at airports
Closed-circuit Television (CCTV): This refers to the video system of a collection of CCTV cameras and surveillance that act as virtual barriers and assess the situation. The use of television cameras for close scrutiny and observation allows for quick response time
Volumetric Sensing: Volumetric sending monitors the physical space adjacent to fence lines for system penetration
Digital systems: Digital signal processing are used to evaluate alarms; characterized by very open architecture systems, large camera installations and a wide variety of technologies.
Booming passenger capacity
The increase in world travel -- even if that increase has flattened during the recent economic slow down -- will fuel technological upgrades and growth of strong perimeter security solutions.
According to F&S, increased efforts to protect critical airport infrastructure following 9/11 have led to increased budget allocations to combat security threats and protect airport perimeters. The result is that a more active approach has been adopted to install integrated security solutions that will be interoperable with new emerging technologies, as well as legacy security systems. Hence, large, system integrators are marking forays into the security market and forging partnerships with smaller niche companies to offer airport operators greater benefits.
The steady growth in the number of airline passengers means that airports will require strong, proactive security solutions. "The perimeter still remains a vulnerable target for terrorism, which, as history has shown, is highly adaptable," remarks the author of a recent F&S study on the topic. "As a result, increased funds allocation is expected toward new technology and protection initiatives, especially in countries witnessing the largest influx of airline passengers."
The direction: Layered technology solutions
The main boost in airport perimeter security will come from networking. A greater number of airports are switching to digital networks, making it essential to network all security solutions to the main command, control, and communications (C3) center. Further, as layered technology security solutions gain importance, integrated network systems are likely to drive increased airport sales. "Interoperable and layered security solutions, which feature open architecture structures will become crucial for existing airport operators," notes the F&S analyst.
Article appeared in Homeland Security Newswire
Tuesday, 1 September 2009
The growing security market in East Africa
The security sector in the East Africa region is growing and becoming more sensitive, creating a demand for security services by the Government, International organisations, Non Governmental Organisations (staff members working in fields/out of town), financial institutions, the business community and individuals. This has led to significant investment in the sector by both government and the private sector.
Kenya and Tanzania have both suffered from terrorist attacks over the last decade, which resulted in restructuring and advancement in security operations, including the set-up of counter terrorism police units in both countries. The international community recognises the threat of terrorism and helps to equip and fund Kenyan and Tanzanian counter terrorism strategies
The Tanzanian and Kenyan economies rely heavily on the tourism sector for growth which makes security vital. Port of entries, hotels, embassies, offices, and residences are increasing surveillance and taking pre-emptive measures through installation of CCTV, weapons detectors, protective gear etc. to combat insecurity.
Areas requiring security measures and expertise in line with international standards include the airports, ports and maritime (especially with the fast growing problem of piracy on the East African coast).
Most organisations within this region are looking to develop integrated, sophisticated, and pre-emptive security solutions and are constantly searching for professionalism, experience and expertise to deliver security solutions to protect and sustain their businesses, personnel and assets. In addition, the Kenyan and Tanzanian governments would like to put in place the right policies to help mitigate geopolitical upheaval and counter fraud, corruption, terrorism and organised crime.
Two recent cases in Kenya in which more than 150 lives were lost in a supermarket fire and another in an oil tanker explosion demonstrated the lack of preparedness and efficiency in fire fighting and rescue equipment and training. It is also still evident that several public and private buildings and personnel do not adhere to international standards in disaster preparedness. Tanzania has also experienced shortcomings in fighting recent petrol station fires and a fire that destroyed a ship off the port, which questions the ability of major organisations including the port authorities in disaster preparation.
As a result of this, the following opportunities exist:
• Communications and intelligence equipment
• Business continuity, crisis management and contingency planning
• Risk Assessment and Analysis
• Training for specialist military, police, intelligence, security and fire applications
• Close protection, force protection and physical security enhancements
• Security audits and reviews
• Asset and key personnel tracking
• Surveillance and counter-surveillance capability
• Special to Task technical security training
• Corporate liability and reputation risk management
• Insurance related security services
• Media related security and advisory services
• Civil/military co-ordination, planning and interface
• Medical, logistical, and security services and supplies for Explosive Ordnance Disposal and humanitarian support and assistance
• Security printing companies
• Maritime security
• Aviation security
• Fire and disaster preparedness
Kenya and Tanzania have both suffered from terrorist attacks over the last decade, which resulted in restructuring and advancement in security operations, including the set-up of counter terrorism police units in both countries. The international community recognises the threat of terrorism and helps to equip and fund Kenyan and Tanzanian counter terrorism strategies
The Tanzanian and Kenyan economies rely heavily on the tourism sector for growth which makes security vital. Port of entries, hotels, embassies, offices, and residences are increasing surveillance and taking pre-emptive measures through installation of CCTV, weapons detectors, protective gear etc. to combat insecurity.
Areas requiring security measures and expertise in line with international standards include the airports, ports and maritime (especially with the fast growing problem of piracy on the East African coast).
Most organisations within this region are looking to develop integrated, sophisticated, and pre-emptive security solutions and are constantly searching for professionalism, experience and expertise to deliver security solutions to protect and sustain their businesses, personnel and assets. In addition, the Kenyan and Tanzanian governments would like to put in place the right policies to help mitigate geopolitical upheaval and counter fraud, corruption, terrorism and organised crime.
Two recent cases in Kenya in which more than 150 lives were lost in a supermarket fire and another in an oil tanker explosion demonstrated the lack of preparedness and efficiency in fire fighting and rescue equipment and training. It is also still evident that several public and private buildings and personnel do not adhere to international standards in disaster preparedness. Tanzania has also experienced shortcomings in fighting recent petrol station fires and a fire that destroyed a ship off the port, which questions the ability of major organisations including the port authorities in disaster preparation.
As a result of this, the following opportunities exist:
• Communications and intelligence equipment
• Business continuity, crisis management and contingency planning
• Risk Assessment and Analysis
• Training for specialist military, police, intelligence, security and fire applications
• Close protection, force protection and physical security enhancements
• Security audits and reviews
• Asset and key personnel tracking
• Surveillance and counter-surveillance capability
• Special to Task technical security training
• Corporate liability and reputation risk management
• Insurance related security services
• Media related security and advisory services
• Civil/military co-ordination, planning and interface
• Medical, logistical, and security services and supplies for Explosive Ordnance Disposal and humanitarian support and assistance
• Security printing companies
• Maritime security
• Aviation security
• Fire and disaster preparedness
Friday, 21 August 2009
Governmental spending on products and services for homeland security should reach $141.6bn worldwide in 2009...
Government procurement dominates the established security and defence market. But in an increasingly volatile world, Corporations also need to protect their assets, and cannot turn to national authorities to cover their risk. Indeed, governments are placing an ever-increasing burden of responsibility on the private sector to ensure systems are in place to enable them to survive the impacts of negative events. More and more, CEO's are having to turn to outsourced solutions.
Aprodex is the premier International Brokerage for Corporate Defence Management and Operational Support Services, built on a network of suppliers and professionals delivering global diversified asset protection solutions. Through our extensive network, we focus on business to business/private sector relationships to help buyers find the strategic and operational partnerships they need to protect their critical assets, prevent loss, manage risk and support their enterprise worldwide.
Organisations can leverage the free business development and networking services of Aprodex to source diversified risk management and practical support services that enhance operational capability; increase resilience and continuity, prepare for and respond to incidents, crises and disasters; and create the capacity and environment necessary to engage in humanitarian relief, reconstruction, and emerging market investment.
See more at www.aprodex.com
Title taken from a report by Homeland Security News
Aprodex is the premier International Brokerage for Corporate Defence Management and Operational Support Services, built on a network of suppliers and professionals delivering global diversified asset protection solutions. Through our extensive network, we focus on business to business/private sector relationships to help buyers find the strategic and operational partnerships they need to protect their critical assets, prevent loss, manage risk and support their enterprise worldwide.
Organisations can leverage the free business development and networking services of Aprodex to source diversified risk management and practical support services that enhance operational capability; increase resilience and continuity, prepare for and respond to incidents, crises and disasters; and create the capacity and environment necessary to engage in humanitarian relief, reconstruction, and emerging market investment.
See more at www.aprodex.com
Title taken from a report by Homeland Security News
Friday, 7 August 2009
From a Medical Services Joint Venture in Libya to Security Consulting in Saudi Arabia…
It has been a busy week at Aprodex.
A Libyan Medical Services Company came to us seeking joint ventures with a medical services company(ies) in Europe for business opportunities in Libya, specifically within the Oil industry; and a Saudi based Oil Company required security consultancy for a potential 3 day visit of its British and US delegates to Basra, Iraq. We were able to put both parties in contact with relevant supplier companies.
Additionally Job Vacancies have featured extensively, and we have been able to advertise the following roles:
Paramedic and First Aid at Work Instructors, UK
Protective Security Specialist / Emergency Medical Technician – Intermediate: Iraq
Senior Security Systems Consultant, London
Security Consultant, London
PetroChem Crisis Management Manager (London/Middle East)
Field Safety and Security Advisor - DRC
Project Manager, Enterprise Risk Management, The Hague
Aprodex are currently able to offer to all companies who are seeking to fill any vacancies within the industry the ability to advertsie their role – without charge!
Take advantage and tap in to our ever increasing network of capable and experienced professionals from around the world by simply sending your job descriptions to info@aprodex.com and we'll do the rest!
We have also had a number of Supplier registrations – for example, the following joined the Aprodex network:
Rimsco, a Risk Management & Security Consultancy
Star Consortium LLC, Special Operations Training
Janus Investigative Solutions, investigative and threat assessment professionals
Jax Desmond Worldwide, protective security experts
Red Cell, a security and risk mitigation company
Ordia Solutions, the leading provider of integrated, interoperable, real-time command & control systems and for law enforcement and first responders.
Diligence Ltd, Business Intelligence & Risk Management
National Security College, a UK Government licensed training provider
CCTT Inc., Security and Risk Management Consultancy
MK Protection, a close protection company
Pilgrims Group, a security and risk management company
Syracuse Managed, Solutions, Safety and Security Training Specialists
FaberBrent Ltd, a security and risk consultancy
See www.aprodex.com for details of these companies
A Libyan Medical Services Company came to us seeking joint ventures with a medical services company(ies) in Europe for business opportunities in Libya, specifically within the Oil industry; and a Saudi based Oil Company required security consultancy for a potential 3 day visit of its British and US delegates to Basra, Iraq. We were able to put both parties in contact with relevant supplier companies.
Additionally Job Vacancies have featured extensively, and we have been able to advertise the following roles:
Paramedic and First Aid at Work Instructors, UK
Protective Security Specialist / Emergency Medical Technician – Intermediate: Iraq
Senior Security Systems Consultant, London
Security Consultant, London
PetroChem Crisis Management Manager (London/Middle East)
Field Safety and Security Advisor - DRC
Project Manager, Enterprise Risk Management, The Hague
Aprodex are currently able to offer to all companies who are seeking to fill any vacancies within the industry the ability to advertsie their role – without charge!
Take advantage and tap in to our ever increasing network of capable and experienced professionals from around the world by simply sending your job descriptions to info@aprodex.com and we'll do the rest!
We have also had a number of Supplier registrations – for example, the following joined the Aprodex network:
Rimsco, a Risk Management & Security Consultancy
Star Consortium LLC, Special Operations Training
Janus Investigative Solutions, investigative and threat assessment professionals
Jax Desmond Worldwide, protective security experts
Red Cell, a security and risk mitigation company
Ordia Solutions, the leading provider of integrated, interoperable, real-time command & control systems and for law enforcement and first responders.
Diligence Ltd, Business Intelligence & Risk Management
National Security College, a UK Government licensed training provider
CCTT Inc., Security and Risk Management Consultancy
MK Protection, a close protection company
Pilgrims Group, a security and risk management company
Syracuse Managed, Solutions, Safety and Security Training Specialists
FaberBrent Ltd, a security and risk consultancy
See www.aprodex.com for details of these companies
Saturday, 1 August 2009
Private Security Providers And Services In Humanitarian Operations
Increasing insecurity and attacks against aid workers continue to challenge international humanitarian operations.
In response, aid organisations have adopted a number of measures, including the contracting of external commercial entities to provide security services.
Up to now, it has been difficult to obtain an accurate picture of how and how much these entities are used in humanitarian operations, primarily because very few aid organisations will discuss the subject openly.
A 2008 global survey of aid organisations conducted for this research revealed that the contracting of certain security functions to external professionals has become increasingly common among humanitarian operations worldwide.
This trend has followed both the rise in aid worker violence and the proliferation of international private security companies around the operations in Iraq and Afghanistan.
Yet despite alarming predictions, the use of armed protection by security contractors remains the exception and is confined to a small number of contexts.
Download Report from the Humanitarian Policy Group
In response, aid organisations have adopted a number of measures, including the contracting of external commercial entities to provide security services.
Up to now, it has been difficult to obtain an accurate picture of how and how much these entities are used in humanitarian operations, primarily because very few aid organisations will discuss the subject openly.
A 2008 global survey of aid organisations conducted for this research revealed that the contracting of certain security functions to external professionals has become increasingly common among humanitarian operations worldwide.
This trend has followed both the rise in aid worker violence and the proliferation of international private security companies around the operations in Iraq and Afghanistan.
Yet despite alarming predictions, the use of armed protection by security contractors remains the exception and is confined to a small number of contexts.
Download Report from the Humanitarian Policy Group
Sunday, 31 May 2009
Global Climate Change Presents A Serious National Security Threat
The purpose of the recently published study is to examine the national security consequences of climate change. A dozen of the nation’s most respected retired admirals and generals have served as a Military Advisory Board to study how climate change could affect our nation’s security over the next 30 to 40 years—the time frame for developing new military capabilities.
The specific questions addressed in the report are:
1. What conditions are climate changes likely to produce around the world that would represent security risks to the United States?
2. What are the ways in which these conditions may affect America’s national security interests?
3. What actions should the nation take to address the national security consequences of climate change?
The Military Advisory Board hopes these findings will contribute to the call President Bush made in his 2007 State of the Union address to “...help us to confront the serious challenge of global climate change” by contributing a new voice and perspective to the issue.
Findings
Projected climate change poses a serious threat to America’s national security.
The predicted effects of climate change over the coming decades include extreme weather events, drought, flooding, sea level rise, retreating glaciers, habitat shifts, and the increased spread of life-threatening diseases. These conditions have the potential to disrupt our way of life and to force changes in the way we keep ourselves safe and secure.
In the national and international security environment, climate change threatens to add new hostile and stressing factors. On the simplest level, it has the potential to create sustained natural and humanitarian disasters on a scale far beyond those we see today. The consequences will likely foster political instability where societal demands exceed the capacity of governments to cope.
Climate change acts as a threat multiplier for instability in some of the most volatile regions of the world. Projected climate change will seriously exacerbate already marginal living standards in many Asian, African, and Middle Eastern nations, causing widespread political instability and the likelihood of failed states. Unlike most conventional security threats that involve a single entity acting in specific ways and points in time, climate change has the potential to result in multiple chronic conditions, occurring globally within the same time frame. Economic and environmental conditions in already fragile areas will further erode as food production declines, diseases increase, clean water becomes increasingly scarce, and large populations move in search of resources.
Weakened and failing governments, with an already thin margin for survival, foster the conditions for internal conflicts, extremism, and movement toward increased authoritarianism and radical ideologies.
The U.S. may be drawn more frequently into these situations, either alone or with allies, to help provide stability before conditions worsen and are exploited by extremists. The U.S. may also be called upon to undertake stability and reconstruction efforts once a conflict has begun, to avert further disaster and reconstitute a stable environment.
Projected climate change will add to tensions even in stable regions of the world.
The U.S. and Europe may experience mounting pressure to accept large numbers of immigrant and refugee populations as drought increases and food production declines in Latin America and Africa. Extreme weather events and natural disasters, as the U.S. experienced with Hurricane Katrina, may lead to increased missions for a number of U.S. agencies, including state and local governments, the Department of Homeland Security, and our already stretched military, including our Guard and Reserve forces. Climate change, national security, and energy dependence are a related set of global challenges. As President Bush noted in his 2007 State of the Union speech, dependence on foreign oil leaves us more vulnerable to hostile regimes and terrorists, and clean domestic energy alternatives help us confront the serious challenge of global climate change. Because the issues are linked, solutions to one affect the other. Technologies that improve energy efficiency also reduce carbon intensity and carbon emissions.
Recommendations of the Military Advisory Board
1. The national security consequences of climate change should be fully integrated into national security and national defense strategies.
As military leaders, we know we cannot wait for certainty. Failing to act because a warning isn’t precise enough is unacceptable. The intelligence community should incorporate climate consequences into its National Intelligence Estimate. The National Security Strategy should directly address the threat of climate change to our national security interests. The National Security Strategy and National Defense Strategy should include appropriate guidance to military planners to assess risks to current and future missions caused by projected climate change. The next Quadrennial Defense Review should examine the capabilities of the U.S. military to respond to the consequences of climate change, in particular, preparedness for natural disasters from extreme weather events, pandemic disease events, and other related missions.
2. The U.S. should commit to a stronger national and international role to help stabilize climate change at levels that will avoid significant disruption to global security and stability.
Managing the security impacts of climate change requires two approaches: mitigating the effects we can control and adapting to those we cannot. The U.S. should become a more constructive partner with the international community to help build and execute a plan to prevent destabilizing effects from climate change, including setting targets for long term reductions in greenhouse gas emissions.
3. The U.S. should commit to global partnerships that help less developed nations build the capacity and resiliency to better manage climate impacts.
As President Bush noted in his State of the Union speech, “Our work in the world is also based on a timeless truth: To whom much is given, much is required.” Climate forecasts indicate countries least able to adapt to the consequences of climate change are those that will be the most affected. The U.S. government should use its many instruments of national influence, including its regional commanders, to assist nations at risk build the capacity and resiliency to better cope with the effects of climate change. Doing so now can help avert humanitarian disasters later.
Download Report Here
The specific questions addressed in the report are:
1. What conditions are climate changes likely to produce around the world that would represent security risks to the United States?
2. What are the ways in which these conditions may affect America’s national security interests?
3. What actions should the nation take to address the national security consequences of climate change?
The Military Advisory Board hopes these findings will contribute to the call President Bush made in his 2007 State of the Union address to “...help us to confront the serious challenge of global climate change” by contributing a new voice and perspective to the issue.
Findings
Projected climate change poses a serious threat to America’s national security.
The predicted effects of climate change over the coming decades include extreme weather events, drought, flooding, sea level rise, retreating glaciers, habitat shifts, and the increased spread of life-threatening diseases. These conditions have the potential to disrupt our way of life and to force changes in the way we keep ourselves safe and secure.
In the national and international security environment, climate change threatens to add new hostile and stressing factors. On the simplest level, it has the potential to create sustained natural and humanitarian disasters on a scale far beyond those we see today. The consequences will likely foster political instability where societal demands exceed the capacity of governments to cope.
Climate change acts as a threat multiplier for instability in some of the most volatile regions of the world. Projected climate change will seriously exacerbate already marginal living standards in many Asian, African, and Middle Eastern nations, causing widespread political instability and the likelihood of failed states. Unlike most conventional security threats that involve a single entity acting in specific ways and points in time, climate change has the potential to result in multiple chronic conditions, occurring globally within the same time frame. Economic and environmental conditions in already fragile areas will further erode as food production declines, diseases increase, clean water becomes increasingly scarce, and large populations move in search of resources.
Weakened and failing governments, with an already thin margin for survival, foster the conditions for internal conflicts, extremism, and movement toward increased authoritarianism and radical ideologies.
The U.S. may be drawn more frequently into these situations, either alone or with allies, to help provide stability before conditions worsen and are exploited by extremists. The U.S. may also be called upon to undertake stability and reconstruction efforts once a conflict has begun, to avert further disaster and reconstitute a stable environment.
Projected climate change will add to tensions even in stable regions of the world.
The U.S. and Europe may experience mounting pressure to accept large numbers of immigrant and refugee populations as drought increases and food production declines in Latin America and Africa. Extreme weather events and natural disasters, as the U.S. experienced with Hurricane Katrina, may lead to increased missions for a number of U.S. agencies, including state and local governments, the Department of Homeland Security, and our already stretched military, including our Guard and Reserve forces. Climate change, national security, and energy dependence are a related set of global challenges. As President Bush noted in his 2007 State of the Union speech, dependence on foreign oil leaves us more vulnerable to hostile regimes and terrorists, and clean domestic energy alternatives help us confront the serious challenge of global climate change. Because the issues are linked, solutions to one affect the other. Technologies that improve energy efficiency also reduce carbon intensity and carbon emissions.
Recommendations of the Military Advisory Board
1. The national security consequences of climate change should be fully integrated into national security and national defense strategies.
As military leaders, we know we cannot wait for certainty. Failing to act because a warning isn’t precise enough is unacceptable. The intelligence community should incorporate climate consequences into its National Intelligence Estimate. The National Security Strategy should directly address the threat of climate change to our national security interests. The National Security Strategy and National Defense Strategy should include appropriate guidance to military planners to assess risks to current and future missions caused by projected climate change. The next Quadrennial Defense Review should examine the capabilities of the U.S. military to respond to the consequences of climate change, in particular, preparedness for natural disasters from extreme weather events, pandemic disease events, and other related missions.
2. The U.S. should commit to a stronger national and international role to help stabilize climate change at levels that will avoid significant disruption to global security and stability.
Managing the security impacts of climate change requires two approaches: mitigating the effects we can control and adapting to those we cannot. The U.S. should become a more constructive partner with the international community to help build and execute a plan to prevent destabilizing effects from climate change, including setting targets for long term reductions in greenhouse gas emissions.
3. The U.S. should commit to global partnerships that help less developed nations build the capacity and resiliency to better manage climate impacts.
As President Bush noted in his State of the Union speech, “Our work in the world is also based on a timeless truth: To whom much is given, much is required.” Climate forecasts indicate countries least able to adapt to the consequences of climate change are those that will be the most affected. The U.S. government should use its many instruments of national influence, including its regional commanders, to assist nations at risk build the capacity and resiliency to better cope with the effects of climate change. Doing so now can help avert humanitarian disasters later.
Download Report Here
Friday, 17 April 2009
Explosives Detection - Do New Technologies And New Approaches Signal A New Market?
For the last decade, explosives detection technologies and practices appeared to have been frozen in time. Companies continued to bring to market the same decades old technologies - with improvements, with better performance, but with essentially the same technical, technological and cost-effectiveness outlook.
But despite the dormant appearance of this sector, it appears that a lot of work is being done in the background to change the essential characteristics of the offerings, using new technologies, new approaches to deployment and usage and new thinking about expanding markets.
New technologies, such as Low Cost MOS-Based Electro-Chemical Sensor Networks, Laser Ionization Mass Spectrometry, Pulsed Laser Photodissociation/Laser Induced Fluorescence (PSP/LIF) and Mechanically Scanned MM Wave Imaging, are beginning to challenge the conventional approaches to explosives detection.
New companies, such as Qylur Security Systems Inc. in California are doing some very interesting work, challenging the traditional engineering, philosophy and cost-effectiveness mathematics of the explosives detection sector.
All these activities hold promise for much needed change in the explosives detection, a change that will open the market to possible expansion beyond aviation, high security assets and military operations (including force protection).
It is also important to keep in mind another, further away, horizon, around 2020, when we expect the explosives detection market to take another leap forward, away from dedicated systems and toward open-space screening.
Homeland Security Research
CALL FOR PAPERS
Written a relevant article or white paper? We'd like to consider it for publication on Aprodex. Simply e-mail news@aprodex.com
But despite the dormant appearance of this sector, it appears that a lot of work is being done in the background to change the essential characteristics of the offerings, using new technologies, new approaches to deployment and usage and new thinking about expanding markets.
New technologies, such as Low Cost MOS-Based Electro-Chemical Sensor Networks, Laser Ionization Mass Spectrometry, Pulsed Laser Photodissociation/Laser Induced Fluorescence (PSP/LIF) and Mechanically Scanned MM Wave Imaging, are beginning to challenge the conventional approaches to explosives detection.
New companies, such as Qylur Security Systems Inc. in California are doing some very interesting work, challenging the traditional engineering, philosophy and cost-effectiveness mathematics of the explosives detection sector.
All these activities hold promise for much needed change in the explosives detection, a change that will open the market to possible expansion beyond aviation, high security assets and military operations (including force protection).
It is also important to keep in mind another, further away, horizon, around 2020, when we expect the explosives detection market to take another leap forward, away from dedicated systems and toward open-space screening.
Homeland Security Research
CALL FOR PAPERS
Written a relevant article or white paper? We'd like to consider it for publication on Aprodex. Simply e-mail news@aprodex.com
Monday, 20 October 2008
Intersec: The Journal of International Security: October 2008 Edition
Intersec is the monthly journal of international security, covering all aspects of global threat and response. Featuring articles by specialist journalists and industry professionals, as well as incident briefs and technology news, Intersec combines insightful commentary with expert analysis.
This month's Journal edition features the following articles:
Thailand in Knots
The embattled Thai government has survived another political crisis, but the underling tensions remain strong. John Chisolm examines the country's fragile consensus and asks how much longer it can last.
Peacekeepers or Privateers?
Private Military companies have long been used in Western Peacekeeping operations and are now seen as essential assets. But Dr Kevin D Stringer weighs up the implications of growing dependence on PMC's and the ethical implications of their use.
Robots on Patrol
David Mackay assess the growing use of unmanned ground vehicles - mobile autonomous robots offering such capabilities as tireless perimeter surveillance for high risk events and installations.
Blanket Coverage
Increasing the number of CCTV cameras to provide blanket surveillance of a site can be effective but is it cost-effective? Jon Severs weighs up the advantages of quantity versus quality.
Lines of Communications
Scott Coleman discusses the evolution of the lawful telecommunications intercept market and examines the challenges faced by intelligence gatherers.
Inside IEDs
With traditional forms of explosive X-ray technology being phased out, Lieutenant Colonel Eli Ben Bassat analysis the latest IED inspection technologies that could be the difference between life and death for EOD Techs.
Command and Control
Superintendent Alan King talks to Andy Oppenheimer about the London Metropolitan Police’s ability to coordinate the response to a major CBRNE incident.
Smoke on the Water
Lieutenant Colonel Lim Bonn Hwee of the Singapore Civil Defence Force discusses exercise Northstar VI in which Singapore’s multi-agency response to a maritime emergency was put to the test
For more information about Intersec see Defence International Group
This month's Journal edition features the following articles:
Thailand in Knots
The embattled Thai government has survived another political crisis, but the underling tensions remain strong. John Chisolm examines the country's fragile consensus and asks how much longer it can last.
Peacekeepers or Privateers?
Private Military companies have long been used in Western Peacekeeping operations and are now seen as essential assets. But Dr Kevin D Stringer weighs up the implications of growing dependence on PMC's and the ethical implications of their use.
Robots on Patrol
David Mackay assess the growing use of unmanned ground vehicles - mobile autonomous robots offering such capabilities as tireless perimeter surveillance for high risk events and installations.
Blanket Coverage
Increasing the number of CCTV cameras to provide blanket surveillance of a site can be effective but is it cost-effective? Jon Severs weighs up the advantages of quantity versus quality.
Lines of Communications
Scott Coleman discusses the evolution of the lawful telecommunications intercept market and examines the challenges faced by intelligence gatherers.
Inside IEDs
With traditional forms of explosive X-ray technology being phased out, Lieutenant Colonel Eli Ben Bassat analysis the latest IED inspection technologies that could be the difference between life and death for EOD Techs.
Command and Control
Superintendent Alan King talks to Andy Oppenheimer about the London Metropolitan Police’s ability to coordinate the response to a major CBRNE incident.
Smoke on the Water
Lieutenant Colonel Lim Bonn Hwee of the Singapore Civil Defence Force discusses exercise Northstar VI in which Singapore’s multi-agency response to a maritime emergency was put to the test
For more information about Intersec see Defence International Group
Monday, 6 October 2008
The World Security Services Market
The global market for private contract security services is forecast to advance by 7.5 percent per annum through 2012 to $195 billion. Gains will be driven by a generally healthy global economy, rising urbanization, and heightened fears of domestic crime and terrorism in many countries. An upswing in building construction is also expected in several major economies, most notably the US, Japan and Germany, although most other areas will see construction growth slow after a strong 2002-2007 performance. Also limiting gains will be competition from electronic security measures such as CCTV and access controls, as well as by intense price competition in the guard and armored transport segments. The maturity of most developed country security markets will also constrain future increases in demand. Contract guarding will remain the largest segment of the market, accounting for more than 40 percent of total revenues. Especially favorable prospects exist for services such as systems integration and consulting, which benefit from the transition from manned to electronic security modalities. By contrast, the private prison management industry has suffered a dramatic reversal of fortunes since the late 1990s, as rising opposition to the privatization of correctional facilities has taken it from the fastest to one of the slowest growing security service segments. Indeed, prison management contracts with private firms have been revoked in countries from Canada to New Zealand, with the state resuming control.
Developing regions to offer best growth prospects
The strongest gains will be registered in developing parts of Asia, Eastern Europe, Africa and the Middle East, and Latin America. Security markets in these areas are, for the most part, underdeveloped, and demand will be fueled by generally strong economic environments, new business formation and foreign investment activity, increased urbanization (contributing to social tensions and criminal activity), and growing middle and upper class populations. As a result, these developing regions will increasingly have both the need for and means to invest in security services. China, India, Russia and Brazil are forecast to record some of the most robust sales increases. The US will remain the largest single consumer of private contract security services, accounting for 30 percent of all demand. Advances will trail the global average by a wide margin as alarm monitoring and prison management markets continue to mature, although the rebound in building construction will provide some support.
Commercial & industrial markets to dominate
The commercial and industrial security service market is by far the largest. The dominance of this market reflects its size, potential for loss and availability of significant resources for protective purposes. Future advances will be spurred by rising business activity and associated security requirements as the world economy continues to grow. Although the government/ institutional and residential security markets are considerably smaller, they will register healthy increases through 2012. Government/institutional market gains will be fueled by the heightened level of security consciousness that exists in the post 9/11 era, with government agencies playing a lead role in providing for the security of the public at large. However, the strongest growth will be posted by the residential security market, stimulated by a high perceived risk of crime among residents in many areas.
Study coverage
World Security Services, a new Freedonia industry study, is priced at $5900. It presents historical demand data plus forecasts (2012, 2017) for private contractual security service by type and market, as well as for 20 countries and six regions. The study also assesses market share and profiles 38 global industry competitors.
World Security Services Market
Developing regions to offer best growth prospects
The strongest gains will be registered in developing parts of Asia, Eastern Europe, Africa and the Middle East, and Latin America. Security markets in these areas are, for the most part, underdeveloped, and demand will be fueled by generally strong economic environments, new business formation and foreign investment activity, increased urbanization (contributing to social tensions and criminal activity), and growing middle and upper class populations. As a result, these developing regions will increasingly have both the need for and means to invest in security services. China, India, Russia and Brazil are forecast to record some of the most robust sales increases. The US will remain the largest single consumer of private contract security services, accounting for 30 percent of all demand. Advances will trail the global average by a wide margin as alarm monitoring and prison management markets continue to mature, although the rebound in building construction will provide some support.
Commercial & industrial markets to dominate
The commercial and industrial security service market is by far the largest. The dominance of this market reflects its size, potential for loss and availability of significant resources for protective purposes. Future advances will be spurred by rising business activity and associated security requirements as the world economy continues to grow. Although the government/ institutional and residential security markets are considerably smaller, they will register healthy increases through 2012. Government/institutional market gains will be fueled by the heightened level of security consciousness that exists in the post 9/11 era, with government agencies playing a lead role in providing for the security of the public at large. However, the strongest growth will be posted by the residential security market, stimulated by a high perceived risk of crime among residents in many areas.
Study coverage
World Security Services, a new Freedonia industry study, is priced at $5900. It presents historical demand data plus forecasts (2012, 2017) for private contractual security service by type and market, as well as for 20 countries and six regions. The study also assesses market share and profiles 38 global industry competitors.
World Security Services Market
Sunday, 21 September 2008
The Private Military Services Industry
The trend towards increased outsourcing of military activities has led to a rapid expansion of the military services segment of the arms industry in recent decades. Military services as defined here include technical services such as information technology and equipment maintenance, operational support such as facilities management and logistics, and actual armed ‘security’ in conflict zones. Some of the demand for the latter comes not from ‘outsourcing’ as such, but from internal conflict situations where state capacity is weak or absent.
The SIPRI paper discusses the background to the growth of the military services industry and presents an overview of the different types of military service, the size of the market and the companies involved.
The continuing expansion of the private military services industry raises many issues. The view that outsourcing is economically efficient can be challenged on a number of grounds, not least when these services are provided in operationally deployed contexts. The involvement of private companies in assisting military operations in armed conflict situations such as Iraq also raises serious concerns about the democratic accountability of armed forces, the status of civilian contractors in military roles, and the political influence of companies that have a vested interest in the continuation of the conflict.
The SIPRI paper discusses the background to the growth of the military services industry and presents an overview of the different types of military service, the size of the market and the companies involved.
The continuing expansion of the private military services industry raises many issues. The view that outsourcing is economically efficient can be challenged on a number of grounds, not least when these services are provided in operationally deployed contexts. The involvement of private companies in assisting military operations in armed conflict situations such as Iraq also raises serious concerns about the democratic accountability of armed forces, the status of civilian contractors in military roles, and the political influence of companies that have a vested interest in the continuation of the conflict.
Thursday, 21 August 2008
Saudi Arabia To Surround Self With A $40 Billion Virtual/Real Barrier

A few weeks ago, the Saudi government decided to triple the length of its border security barrier from approximately 2,000 km ( Iraq and Yemen ) to about 6,000 km to additionally cover Jordan, Kuwait, Qatar, the UAE, Oman and Gulf and Red Sea coasts.
As a first step the Saudis plan a virtual barrier, based on a network of people and vehicle radars.
Saudi investments in homeland security are actually larger than earlier anticipated by our analysts.
HSRC forecasts that this first stage (radar virtual barrier) will cost about $10 billion to implement (including the procurement of radar and C3I stations). Yet the total market cost of the Saudi project will come, in our assessment to around $40 billion, and will be completed by around 2018.
The reason for the huge difference between the initial cost estimate and our total cost assessment is that the final cost will include Day/Night CCTV networks, a large segment of physical fence, additional costs of service and upgrades, and projected cost overruns.
To find out more details about business opportunities associated with this project and with other projects in Saudi Arabia , please review the Homeland Security Market Research landmark report. This new publication represents several researcher years, dozens of interviews, and in-depth analysis of thousands of documents; the resulting produce is a comprehensive roadmap of this huge and intriguing Homeland Security market.
Friday, 8 August 2008
Private Security Market To Reach $66B In 2012

Among the growth factors cited by the report include a perceived risk of crime, as well as the notion that authorities are overwhelmed and unable to provide adequate security.
The Freedonia Group’s report, titled "Private Security Services to 2012", also cites the privatization of some public safety operations like guarding government buildings and managing correctional facilities as reasons why the private security market will continue its steady growth.
"We’re in an exciting time of growth right now," said John Sacht, president of Philadelphia-based private security services firm Day & Zimmerman. Sacht added that he felt Day & Zimmerman is "growing at probably greater than market or industry rates."
Michael Cooley, the company’s regional vice president for the South added that the need for private security will become even greater over the next several years as new government regulations begin to have an impact on several industries.
"There is a trend for increased government regulation," he said. "Right now you’re seeing it in the chemical industry, both with the MARSEC (Maritime Security) regulations and the CFATS (Chemical Facility Anti-Terrorism Standards) regulations, and that’s forcing companies that may have already had a contract security program to increase both the number of personnel they need, but also the technology and hardened perimeter portions of their security program that they’re going to need."
If the economy continues in its current downward direction, Cooley said that that will also contribute to an increase in private security demand due to the notion - either perceived or real - that crime rates increase in a down economy. Another reason for solid growth in the private security industry, said Cooley, is that government agencies have turned to private firms to secure their facilities now that many of the U.S. troops staffing these positions have been sent to serve in Iraq. He said this privatization of guard services at government facilities is likely to continue, even as troops return.
"The (private security) companies that can best utilize the use of security technology, along with the human element, along with expertise and consulting programs and systems in place are the ones that are really going to excel over the next three or four years," said Cooley.
Article appeared in SecurityInfoWatch
Tuesday, 5 August 2008
Commercial Demining and Security Industries Consolidating, Merging

"There have always been links between the commercial demining, private security and defense industries. In the early 1990s, arms and security companies like Royal Ordnance (now BAE Systems Land and Armaments), MECHEM (part of South African arms firm DENEL), Saracen International and DSL (now ArmorGroup) played a prominant role in the developing sector of ‘humanitarian’ demining. In those early years, some commercial demining companies were accused of ‘double dipping’ for being involved in both mine production and clearance.
These days we seem to be observing even greater consolidation – blurring the lines between civilian demining companies and the more militarized private security contractors. This has been driven largely by the security contracting boom in Iraq and Afghanistan, as well as commercial deminers working in much more insecure conditions than previously.
DynCorp, which has a particularly controversial reputation as a provider of private security, police and counternarcotics services, is one of the three main pre-selected contractors for the State Department’s mine action programs. The other two State Department contractors, ArmorGroup and RONCO have were recently bought up by global security giant Group 4 Securicor (see this article on the RONCO purchase, and this one on ArmorGroup).
Other demining and EOD firms are moving into private security provision. They often developed an internal security capacity while working in a dangerous place and then found it profitable to provide this service to other clients. EODT claims to offer “a range of direct security solutions for clients in high-risk situations.” MineTech sells “highly skilled Explosive Detection Dogs to security and affiliated companies.” UXB “provides armed security services in the middle-east.”
To a certain extent this merging of private security contracting and commercial demining makes sense. Both activities occur in conflicted regions, rely on similar logistical supply chains and draw on an overlapping pool of personnel — mostly former soldiers. Mine action, while less profitable, may also provide a more stable and less risky part of a security company’s portfolio.
However, I believe there are some real dangers in smudging the distinction between demining, which has often been viewed as a civilian and humanitarian endeavor, and the militarized industry of private security. If demining becomes associated with a military campaign, it threatens the lives of civilian humanitarian deminers working for NGOs. Moreover, in my own field research I have found private security companies are far less likely to understand local developmental needs, cultural sensitivies and humanitarian priorities than NGOs and local authorities."
Aprodex Comment: Whilst the concerns are clearly valid, the situation need not be so if NGO's and the PSC community worked out better ways of working together and cooperating in such theatres, rather than one group eyeing the other with suspicion and nervous apprehension - See NGO's and Private Security Companies for addtional commentary.
Wednesday, 30 July 2008
LNG Infrastructure Security: A Surging Market

There is a “perfect storm” brewing in the Homeland Security market – a combination of a large, growing market demand eclipsing the Aviation security market; high exposure to terrorist activities with a corresponding large risk of damage to life and the economy; and a growing gap between the accelerating infrastructure development and awareness by the Homeland Security vendors. This perfect storm has formed in the LNG infrastructure security market. The reasons behind it, the issues it raises and the opportunities it opens has been well researched and analyzed by HSRC professionals, categorized and presented by market segments including by geography and sub-market sector, and available in the new Global LNG (Liquefied Natural Gas) Infrastructure Security Market 2009-2014 report.
The growth of the LNG infrastructure security market results from the world’s demand for LNG. This demand is drastically increasing as LNG has the flexibility of supply to meet global energy demand in a time of rising energy prices. The next few years will therefore witness fast development of the global LNG infrastructure, with the number of LNG terminals nearly tripling and the frequency of LNG tanker shipments increasing dramatically. Consequently the LNG infrastructure security market is also forecasted to grow from $1.5 billion in 2008 to $4 billion in 2014 at a CAGR of 18%.
LNG infrastructure includes the ships and the port facilities where a number of ships may be moored. This provides a tempting target for terrorists with a large physical footprint. A LNG tanker, as shown by the HSRC analysts, if detonated would cause a blast similar in size and effectiveness of a tactical nuclear weapon. With 21 planned ports in or near US cities, the possible ramifications in loss of life and to the economy is troubling to even contemplate. Public demand for excellent security will be a given, driving the market size.
Given the above, it is interesting that one of the conclusions of the HSRC experts based on their observations and research, is that there is a current lack of interest in the LNG infrastructure security market by the homeland security vendor community. This translates to an open and growing business opportunity for providers of the following amongst other, homeland security products and services:
• Perimeter security
• Maritime security
• People screening, Biometrics and RFID
• IT & C3I systems
• Service and upgrade
• Guarding Services
Homeland Security Research
Tuesday, 29 July 2008
Private Contractors' Role In Afghanistan To Grow With Awarding Of Latest Contracts
The war's demands and the availability of that kind of money guarantee a flood of new contracts. A review of the FBO Daily Web site for July contracts shows that the administration, which in Iraq turned to the private sector for tasks once handled by military or government personnel, is stepping up this practice in Afghanistan.
One of the most ambitious efforts is a solicitation from the U.S. Agency for International Development, clarified on July 15, which proposes expansion of an existing program to "increase both the human and physical capacity of the justice sector in Afghanistan."
The work statement says, frankly, that "corruption, local influence, lack of security and insufficient salaries" along with "lack of both physical and human capacity . . . plague and weaken the ability of the formal court system to deliver justice."
To remedy this, USAID is looking for a private contractor to coordinate what it calls "Justice Sector Development," a huge undertaking that would involve working with U.S. and international organizations, as well as with U.S. and NATO military units engaged in rule-of-law issues. The contractor would work with the Afghan Supreme Court to introduce a simplified case-management system and build courthouses around the country. It would advance the development of law schools and promote "access to justice for women and public awareness of rights."
USAID also announced this month that it is looking for a contractor "to increase licit and commercially viable agricultural-based alternatives for rural Afghans" to replace drug production. The target area is the six provinces in southern Afghanistan described as "most insecure and unstable," including Helmand and Kandahar.
The goal of the contract is to significantly reduce and ultimately eradicate poppy production. In developing alternatives, bidders should consider generating income for the Afghans involved as well as promoting "anti-corruption, gender, 'Afghanization' (local project ownership) and local governance," according to the USAID proposal.
Most solicitations were for new contractors in military and intelligence projects. On July 5, the Bagram Regional Contracting Center, located within the giant complex in Afghanistan that U.S. Central Command has described as our long-term base for Central Asia, sought a contractor to supply four human intelligence analysts. They will be required to work 12 hours a day, seven days a week and to be on call 24 hours a day. They also will need clearances to review top-secret and special compartmented information, the highest clearances available.
The four are to work with the Enemy Combatant Review Board, which has been set up in Afghanistan to determine whether detainees should remain in prison. They are, according to the work statement, to serve locally as the "primary military police intelligence adviser and analyst," and as liaisons with local law enforcement and intelligence.
Another notice, posted on July 15, called for a private contractor to design and construct a commercial customs building at a border-crossing point between Afghanistan and Tajikistan at Nizhny Pyandzh, Tajikistan. The U.S. Army Corps of Engineers in Afghanistan will supervise the job, which is expected to cost nearly $10 million and take nine months to complete.
This is not the first project at this border-crossing spot, which at one point was considered an outlet for drugs. In 2006, with $4 million in anti-narcotics money from the Department of Defense, a border-crossing facility was constructed after the area was first cleared of mines and unexploded ordnance. It was built with fencing, guard towers, gates, lights and housing for 30 people.
In addition, U.S. engineers supervised construction of a $37 million bridge across the Oxus River at the Nizhny Pyandzh border, funded by the United States and other countries.
Article appeared in the Washington Post
Saturday, 26 July 2008
Security Concerns To Fuel Global Biometrics To $7.3 Billion In 2013

According to officials from London-based ABI Research, broad interest and investment in a variety of the technologies – particularly after security concerns emerged in the wake of the Sept. 11, 2001 terrorist attacks – will fuel the growth.
“Over the next five years the effort to create standards for biometrics technologies will be rewarded with a significant growth in biometrics system adoption,” said Jonathan Collins, a principal analyst at the research firm.
Generally speaking, biometrics offer a way to automate the recognition of a person’s identity based on a physiological or behavioral characteristic.
Security has become more important in both the public and private sectors, the firm says, but the robust growth that ABI is calling for will be spurred by new technology standards that have enabled more interoperable systems to emerge.
“Face, iris, hand, and speech recognition systems have emerged and are being adopted independently and alongside fingerprints, which will continue be the dominant biometric measurement for some time to come,” ABI officials say. “Nevertheless, it will be increasingly essential for organizations and companies, as they secure their facilities, equipment, and data, to understand the potential of each of these technologies as well as the potential to combine them to drive system efficiency and reliability.”
According to one company – Intervoice, an international company with offices in Dallas that delivers personalized, multi-channel automated information solutions that connect people with information, empowering them to control the way they interact with a business – an essential and developing component of biometrics is so-called “IVR,” or interactive voice response.
Company officials say the telephony technologies, in which someone uses a touch-tone telephone to interact with a database, remain vulnerable to identity theft, because traditional methods of identifying callers aren’t secure.
To address the threat, officials from Intervoice are co-sponsoring a free Webinar to be held at 2 p.m. Eastern on Tuesday, July 29, called “The Next Frontier in Customer Identity Protection: Voice Biometrics.”
According to ABI’s study, simply titled “Biometrics,” there’s growing interest in biometrics as means of gaining convenience, simplicity and speed in the transactions of daily life.
“Biometrics is being offered in laptops and mobile phones – to secure but also speed and simplify log-in – while ‘registered traveler’ applications are emerging to speed passengers through airports,” the firm says. “Biometrics will increasingly move from being the traditional preserve of large-scale public sector systems to adoption in small-scale private sector and even personal systems use.”
Article appeared on TMCNet.com
Sunday, 20 July 2008
Defence International Group publishes the latest Edition of Intersec: The Journal of International Security
Intersec is the monthly journal of international security, covering all aspects of global threat and response. Featuring articles by specialist journalists and industry professionals, as well as incident briefs and technology news, Intersec combines insightful commentary with expert analysis.
This month's Journal edition features the following articles:
Unseating Democracy
In the wake of Zimbabwe deeply flawed election, John Chisholm asses what the future holds for Africa's former breadbasket.
Iraq: Tribalism and State Collapse
Despite recent improvements in Iraq's internal security , the state still remains unstable at best. Berry Zellen highlights the risks of tribalism, state collapse and emerging sub-state contours of the war on terror.
Call in the Troops
Kevin D Stringer discusses the advantages of deploying military assistance for civilian agencies, and calls for more specialised homeland defence units.
Good To Talk?
Three years on from 7/7, all Britain's first responders will soon be using the TETRA Airwave communications network. Jon Severs investigates how effective the system would be in the event of another major incident.
Shoulder to Shoulder
Crisis Management can involve many different agencies but the diversity of response systems can further complicate the response effort. Edith Wilkinson outlines the work being done by the OASIS project to promote interoperability between Europe's responders.
Be Prepared
Richard Flynn examines the need for all parts of society to plan for terrorist attacks and explores the help that is available.
Fighting Dirty
Andy Oppenheimer assesses whether the emergency services and public are ready to cope with radiological terrorist attack.
Visit the Defence International Group's website.
This month's Journal edition features the following articles:
Unseating Democracy
In the wake of Zimbabwe deeply flawed election, John Chisholm asses what the future holds for Africa's former breadbasket.
Iraq: Tribalism and State Collapse
Despite recent improvements in Iraq's internal security , the state still remains unstable at best. Berry Zellen highlights the risks of tribalism, state collapse and emerging sub-state contours of the war on terror.
Call in the Troops
Kevin D Stringer discusses the advantages of deploying military assistance for civilian agencies, and calls for more specialised homeland defence units.
Good To Talk?
Three years on from 7/7, all Britain's first responders will soon be using the TETRA Airwave communications network. Jon Severs investigates how effective the system would be in the event of another major incident.
Shoulder to Shoulder
Crisis Management can involve many different agencies but the diversity of response systems can further complicate the response effort. Edith Wilkinson outlines the work being done by the OASIS project to promote interoperability between Europe's responders.
Be Prepared
Richard Flynn examines the need for all parts of society to plan for terrorist attacks and explores the help that is available.
Fighting Dirty
Andy Oppenheimer assesses whether the emergency services and public are ready to cope with radiological terrorist attack.
Visit the Defence International Group's website.
Saturday, 19 July 2008
Private security contractors: a destabilizing influence in the future of Iraq?
Much of the discussion about the rights and wrongs of private military and security contractors in Iraq is framed either as a capabilities question -- can U.S. forces operate without them? - or a values question -- should private contractors have such a big role?
But another way of framing the debate -- one we might term the Iraqi outcomes question - is whether Iraq itself is being weakened by their presence. A paper written by a colonel at the U.S. Army War College says exactly that.
It suggested that "the United States and our coalition partners may be unknowingly providing the basis for a future military insurgency, after we depart Iraq, by allowing private military firms (PMF), or private security contractors (PSC), or private security providers (PSP) to provide security in Iraq."
The paper, "Phasing Out Private Security Contractors in Iraq," was written in March 2006 by Col. Bobby A. Towery while he was a student at the college. It says, "After our departure, the potential exists for us to leave Iraq with paramilitary organizations that are well organized, financed, trained and equipped. These organizations are primarily motivated by profit and only answer to an Iraqi government official with limited to no control over their actions. These factors potentially make private security contractors a destabilizing influence in the future of Iraq." Towery says the use of private contractors in Iraq is a testament to deficient post-conflict planning by the U.S. government.
At this point, more than five years after the start of the war, this is no longer a novel observation, but it's nevertheless important. First, the U.S. political leadership grossly underestimated the number of troops that would be required for stability and security operations. Ignoring the advice of its own military professionals, the Bush administration chose to invade with far fewer forces than were needed. As a result, companies such as Halliburton were needed just to meet the military logistics requirements of sustaining U.S. and other coalition forces.
Second, as part of the U.S. plan to bring democracy to the Middle East, Iraq was to be remade into a new country. This required a massive reconstruction project to overcome the effects of more than two decades of war against Iran and then the United States as well as the consequences of the sanctions regime. But once again, the U.S. administration miscalculated and did not anticipate the emergence and growth of the insurgency. Since U.S. forces were not available to protect those doing reconstruction work, such firms had no choice but to turn to private security contractors in order to protect their employees.
Towery wrote that this misread on the growing insurgency resulted in a gap between what security the coalition forces, limited by the number of troops on the ground, could provide and the need for security to enable reconstruction. This gap was really the birth of the private security contractors in Iraq, and their use has grown at an almost out-of-control rate since 2003.
Towery writes that private contractors also complicate what is a "complex battle space" in other ways. One of them is the "blue on white" phenomenon in which soldiers have been in conflict with contractors.
A Government Accountability Office official testified to Congress that from January to May 2005, the Reconstruction Operations Center received reports of 20 friendly-fire incidents. It is likely the number of actual incidents during that time period was higher, since some providers said they stopped reporting these types of incidents.
But Towery's biggest concern is that as long as private contractors remain in Iraq, the country will never be self-sufficient. In his view, in order for the new Iraqi government to be recognized as a sovereign country, it must be responsible for every aspect of security in Iraq.
Towery accepts the Bush administration's contention that the overall ability of the new Iraqi government to provide all aspects of security -- to include that of providing security for contractors operating as part of the reconstruction efforts in Iraq -- is much improved.
Thus he proposed the elimination of all private security personnel in Iraq. This includes private security personnel operating on Iraq's roadways for convoy security, private bodyguards and static security operations conducted outside U.S. government or coalition member-controlled bases and camps. In short, all security requirements will become the responsibility of the new Iraqi government, with the only exception being security for companies that are in direct support of U.S. military or coalition member combat operations.
Of course, the State Department, whose personnel are protected by three private security firms under its Worldwide Personal Protective Services contract, is likely to disagree.
Ironically, even Towery acknowledges the role of contractors in helping to end their role in Iraq. When talking about training an Iraqi special security force to replace private security contractors, he writes:
"Based on the Blackwater training model, the training facilities will be able to produce approximately 150 Iraqi special security police officers, trained for a variety of private security missions, every eight weeks by each training contracting firm. If contracts are given to three training contracting firms, it will take over 133 training sessions, almost seven years, to match the almost 20,000 private security contractors operating in Iraq now. While this is not an overly aggressive replacement rate, it will allow the new Iraqi government ample time to phase out private security contractors in an orderly manner. If the Iraqi government wants to move this process at an accelerated rate, then the contractors responsible for training could use a model similar to that of the police-training program that DynCorp, a subsidiary of California-based Computer Sciences Corp., used to land the initial police-training contract in Iraq."
Article appeared in UPI.com
But another way of framing the debate -- one we might term the Iraqi outcomes question - is whether Iraq itself is being weakened by their presence. A paper written by a colonel at the U.S. Army War College says exactly that.
It suggested that "the United States and our coalition partners may be unknowingly providing the basis for a future military insurgency, after we depart Iraq, by allowing private military firms (PMF), or private security contractors (PSC), or private security providers (PSP) to provide security in Iraq."
The paper, "Phasing Out Private Security Contractors in Iraq," was written in March 2006 by Col. Bobby A. Towery while he was a student at the college. It says, "After our departure, the potential exists for us to leave Iraq with paramilitary organizations that are well organized, financed, trained and equipped. These organizations are primarily motivated by profit and only answer to an Iraqi government official with limited to no control over their actions. These factors potentially make private security contractors a destabilizing influence in the future of Iraq." Towery says the use of private contractors in Iraq is a testament to deficient post-conflict planning by the U.S. government.
At this point, more than five years after the start of the war, this is no longer a novel observation, but it's nevertheless important. First, the U.S. political leadership grossly underestimated the number of troops that would be required for stability and security operations. Ignoring the advice of its own military professionals, the Bush administration chose to invade with far fewer forces than were needed. As a result, companies such as Halliburton were needed just to meet the military logistics requirements of sustaining U.S. and other coalition forces.
Second, as part of the U.S. plan to bring democracy to the Middle East, Iraq was to be remade into a new country. This required a massive reconstruction project to overcome the effects of more than two decades of war against Iran and then the United States as well as the consequences of the sanctions regime. But once again, the U.S. administration miscalculated and did not anticipate the emergence and growth of the insurgency. Since U.S. forces were not available to protect those doing reconstruction work, such firms had no choice but to turn to private security contractors in order to protect their employees.
Towery wrote that this misread on the growing insurgency resulted in a gap between what security the coalition forces, limited by the number of troops on the ground, could provide and the need for security to enable reconstruction. This gap was really the birth of the private security contractors in Iraq, and their use has grown at an almost out-of-control rate since 2003.
Towery writes that private contractors also complicate what is a "complex battle space" in other ways. One of them is the "blue on white" phenomenon in which soldiers have been in conflict with contractors.
A Government Accountability Office official testified to Congress that from January to May 2005, the Reconstruction Operations Center received reports of 20 friendly-fire incidents. It is likely the number of actual incidents during that time period was higher, since some providers said they stopped reporting these types of incidents.
But Towery's biggest concern is that as long as private contractors remain in Iraq, the country will never be self-sufficient. In his view, in order for the new Iraqi government to be recognized as a sovereign country, it must be responsible for every aspect of security in Iraq.
Towery accepts the Bush administration's contention that the overall ability of the new Iraqi government to provide all aspects of security -- to include that of providing security for contractors operating as part of the reconstruction efforts in Iraq -- is much improved.
Thus he proposed the elimination of all private security personnel in Iraq. This includes private security personnel operating on Iraq's roadways for convoy security, private bodyguards and static security operations conducted outside U.S. government or coalition member-controlled bases and camps. In short, all security requirements will become the responsibility of the new Iraqi government, with the only exception being security for companies that are in direct support of U.S. military or coalition member combat operations.
Of course, the State Department, whose personnel are protected by three private security firms under its Worldwide Personal Protective Services contract, is likely to disagree.
Ironically, even Towery acknowledges the role of contractors in helping to end their role in Iraq. When talking about training an Iraqi special security force to replace private security contractors, he writes:
"Based on the Blackwater training model, the training facilities will be able to produce approximately 150 Iraqi special security police officers, trained for a variety of private security missions, every eight weeks by each training contracting firm. If contracts are given to three training contracting firms, it will take over 133 training sessions, almost seven years, to match the almost 20,000 private security contractors operating in Iraq now. While this is not an overly aggressive replacement rate, it will allow the new Iraqi government ample time to phase out private security contractors in an orderly manner. If the Iraqi government wants to move this process at an accelerated rate, then the contractors responsible for training could use a model similar to that of the police-training program that DynCorp, a subsidiary of California-based Computer Sciences Corp., used to land the initial police-training contract in Iraq."
Article appeared in UPI.com
Subscribe to:
Posts (Atom)