Emerging trends in security and counter- terrorism | Daily News

Emerging trends in security and counter- terrorism

A robot in security
A robot in security

In today’s modern world, the issue of protective security can be a dividing one. With advances in technology, advanced security tactics are more accessible than ever. But how much security is too much security?

Many of the people who are falling victims to breaches of personal security are high profile figures. Terrorism in public places has seen an alarming increase over the last decade, which has made public and private security even more of a necessity. VVIP convoys have become yet another manifestation of a political and administrative culture. Across the world police forces are overzealous, because they respond to a system where public inconvenience is a low priority.

In the first decade of the 21 century, we are witnessing the emergence of a new form of counterterrorism in several democratic States. The shift to an ideological–religious discourse can be traced back to a conceptual transformation about the nature of terrorism, from the notion of terrorism as a “crime” to that as a “war”.

In today’s world, cyber security is a matter of national security.Convergence is the integration of IT and physical security programs. These two security domains cannot be thought of separately. Convergence is an ongoing security trend that will continue to be important in the coming years.

Biometric authentication will see broader use in access control. Biometrics previously saw use mostly in higher-security facilities.As their cost continues to come down, we will see them used more for general building access control and authenticating access to critical business resources.Globally banks remain a highly targeted mark for criminals and attempted robberies, so security measures surrounding banks have increased as a result. Hackers and cyber terrorists have shown ability to take down critical infrastructures like electric grids and communications systems.

In addition to biometrics, smartphones and other mobile devices will also see increased use as authentication tokens. Because phones and other mobile devices are network-connected, they can be updated live in the field. Keys will be a part of physical security programs for years to come. They remain a cost-effective access control method for organisations of every size. However, organisations heavily invested in key security will need to find new efficient ways to manage their physical keys, such as with an electronic key control system.

The University of Birmingham in the United Kingdom is undergoing a $12 million pilot project, the aim of which is to place robot security guards starting with Bob: the first robotic security guard in the UK. Robots also have capabilities that humans don’t: the ability to stay awake 24/7, the ability to see from all angles, the ability to process information rapidly.At certain US Air Force Bases, robotic dogs are used to patrol the grounds.These robot dogs will not get tired in comparison to real dogs.

Close Protection duty uses layers of concentric circles or rings of security. The standard formations are the box, diamond and V formation on foot. All foot drills require prudent spatial formation. The principles of Close Protection are centered on the four pillars of defence — risk, intelligence, advance, and location.

Previously, Close Protection was focused on protecting the physical safety of an assigned VIP. While this is still a priority, there has been a shift that requires security professionals to protect assets, such as brand reputation and data privacy as it relates to their VIP.With the rise of social media, terrorists and criminals have access to much information about potential targets – both in form of individuals and events. Social media posts can alert terrorists of an event days before, giving them time to react.

The Close Protection Team is responsible for completing security searches of the vehicle and venues for potential signs of danger and planning emergency escape routes. With the increase in terrorism over the last decade, airports have experienced some of the most significant changes.

A security team may have a strong strategy to protect a VIP in their country, different countries pose different risks.Situational awareness has always been of high priority for Close Protection duty. Previously, situational awareness would be the responsibility of physical security professionals “on the ground”. With the capabilities of technology, security teams are able to use the internet to detect ongoing threats.

Convoys are exposed to a variety of threats, from a simple ambush with small arms to the covert use of IEDs (Improvised Explosive Devices) and mines. They may also be at risk from the threat of modern Unmanned Aerial Vehicles (UAVs) used to spy on them. In order to counter these threats, vehicles can be equipped with IED systems and counter-sniper systems. In addition, a convoy may carry portable UAVs that can be used for the reconnaissance of the route ahead. Smart weapons include precision-guided bombs that have accuracy, smart bullets that can change their trajectory and smart land mines that deactivate at a certain time.

Remote controlled guns can be fired at targets in the most unexpected places, as the weapon can be concealed in any environment. The SRP Talon can be mounted and removed from any vehicle. Its extreme precision is ensured by state of the art military-spec gyros. South Korea engineers developed a belt-fed .50 caliber machine gun turret known as the Super Aegis II, which was unveiled in 2010. An Ethernet cable runs from the turret’s base to the back of a computer with the rifle controlled by a joystick. With a four-kilometer engagement range, the joystick gives the operator the ability to maneuver the weapon. Israel debuted small “combat robots,” which can climb stairs and maneuver through almost any terrain. The mini-robot is capable of carrying a fully loaded Glock with 14 rounds. Called Dogo, it weighs a little over 25 pounds, has eight cameras to provide a 360-degree view. These are the modern trends in the domain of global security. However when technology reaches the hands of criminals and terrorists, it is a clear and present danger.

(The writer is author of Target Secured- Police Special Task Force)


Add new comment