The SSTC Concept

Over the past few years, the increasing threat of terrorism has forced Governing bodies around the world to set up stringent regulations on the way security personnel should be trained and tested.

These new regulations have meant many organisations no longer have the capabilities to provide in house training to their employees and require specialist help from security training companies.

While many security trainers have sufficient security  knowledge to provide the training, many lack the technologies and marketing prowess required to take advantage of these extra requirements.

The SSTC franchise has been developed by Renful Premier Technologies in order to develop a worldwide framework for superior security training.

It is designed to enable security trainers to take advantage of the expertise, know-how and technology Renful has developed since its inception in 1994 so that they can provide a multi level security training service to their clients and increase their business opportunities.

Following the Renful Concept

All SSTC’s are able to follow Renful’s concept of providing training, testing and certification products and services that meet the needs of security screeners throughout their job cycle.

The concept is built on the belief that screener’s require a high level of initial training and testing before they are ready for their job.

For example, Pre-M enables security managers to analyse whether a candidate has the correct aptitudes to become a successful security screener while the use of our security X-ray simulator; Simfox together with our range of Simulants enable new personnel to familiarise themselves with the look, texture, functionality and x-ray signature of explosives.

At Renful, we also believe that security training should be pro-active rather than re-active and have therefore developed products and services that enable security personnel to get regular training on current and emerging threats.

For example, our Infogence publication provides monthly reports on emerging terrorism trends that can be used to update security personnel and build replica IEDs for Red Team Testing that are relevant to the current threat.  These threats are also placed into Simfox; which should be used on a monthly basis to improve the detection skills of x-ray screeners.

As well as providing services that meet every training and testing requirement of an x-ray screener, Renful provide a range of security courses, accredited in partnership with Middlesex University.

The courses last 3 days; are taught by experts and cover subjects such as Profiling, Document Verification, Terrorism Awareness, and more. Participants are then able to continue their studies via e-learning before enrolling at Middlesex University where they can earn academic qualifications designed to improve their earning potential and job prospects.

 Contact us for more information about providing secuirty training services through the SSTC>>




The Rise of Cyber Terrorism

Q: Where are you most likely to find a Terrorist? A: Wherever there’s a good Wi-Fi connection.


For most, the internet has become an indispensible part of modern life. We Tweet about our lives, Facebook with our friends and shop till we drop.

Just like you and me, Terrorists spend a lot of time on the internet. However, their reasons for clicking “like” will be a lot more sinister.


YouTube channels and Facebook pages of Al Qaeda supporters are used to radicalise Western-based sympathisers, and also provide a means for communication between these “lone wolf” actors and larger organised networks of terrorists.

Recently, a 20 year old Moroccan was arrested in Brescia, Italy and accused of making a detailed plan for a terror attack on a Synagogue in Milan. A 40 year old Yemeni woman was also arrested in London over links with this group showing the global reach of many of these sites.

Police claim the accused used “exceptional” computer skills to create secret groups on Facebook.

A statement from police claimed “In this online arena, members could share instructions on how to assemble explosive devices, what chemical ingredients could be bought and the use of weapons”.


Terrorist organizations use the Internet to raise awareness for their cause, to spread propaganda, and to inspire potential operatives across the globe.

Websites operated by terrorist groups can contain graphic images of supposed successful terrorist attacks, lists and biographies of celebrated martyrs, and forums for discussing ideology and methodology.

Al-Quaeda distributes audio, video and graphics via The As-Shahab Institute for Media Production to forums, blogs and file-hosting websites.

Only recently, an English language terrorist publication called Inspire was intercepted by intelligence officials. Many articles within are thought to have come from Anwar al-Awlaki, a U.S. born radical imam who has been linked to a number of terrorist plots including the attempted Times Square bombing.

Al-Awalki is also thought to have been behind the radicalizing of Nidal M. Hasan, who allegedly committed the November 2009 shooting at Fort Hood, Texas, and Umar Farouk Abdulmutallab, the Nigerian suspect accused of trying to ignite explosives on Christmas Day 2009.


The internet is also used as a way to fund terrorist organisations. Cybercrime has now overtaken drug trafficking as the main source of income for terrorist organisations.

Identity theft, counterfeiting, and other types of computer fraud all provide a higher yield whilst also having the benefit of being carried out under a shroud of anonymity.

The 2002 terrorist bombings in Bali were thought to be partially funded through online credit card fraud.

Explosive Manufacturing

Given the difficulty in accessing military grade hardware, many online discussions will turn to the homemade manufacture of explosive charges.

Anders Behring Breivik admitted he used instructions he found on the internet to build the bomb he used in his terror attacks on Norway in 2011.

The ingredients used by Breivik to build his bomb were all available to the general public. For example, the main charge was made from Amonium Nitrate and Diesel Fuel obtained from fertilizer.


Many online discussions often turn to how best to build and conceal an IED in order to get through security checkpoints.

In 2009, Al-Quaeda’s expert bomb maker, Ibrahim Al-Asiri, saw the potential of inserting a bomb in the rectum of a suicide bomber.

The plan was to assassinate Prince Mohammed bin Nayef, the head of the Saudi Arabia’s counter-terror operations.

The suicide bomber got through a number of security measures before setting off his IED as he went to meet the Prince. Fortunately, bin Nayef survived with only a few minor injuries.

A few months later, Al-Asiri got his bomb through security at Amsterdam’s Schipol Airport, this time concealed in the underpants of Umar Farouk Abdulmutallab.

The IED had no metallic parts, completely cancelling the effectiveness of metal detectors and x-ray machines. Fortunately, the bomb malfunctioned and the plane landed safely.

Recent intelligence suggests Al-Asiri has not given up. Reports tell us he is currently working with doctors on a plan to surgically implant IEDs into the bodies of terrorists.

The next step

While terrorists are very adept at spreading propaganda and communicating online, they have yet to deliver any major cyber attacks on organisations.

At the moment, cyber attacks attributed to terrorists have largely been limited to denial-of service attacks and defacing of websites.

However, as they have shown with their continued innovation in the manufacturing and concealment of bombs, it is clear that they will continue to improve their technical skills in order to deliver a major cyber attack.

Only time will tell.

About Us

Renful Premier Technologies is a knowledge based company that offers security solutions to organisations throughout the world.

Renful believes that working towards compliance is only the first step towards high-quality security and aims to provide a comprehensive solution that enables security x-ray screeners to excel in their job for the benefit of both the individual and the employer.

Our solution provides an integrative approach that includes training and assessment tools for the selection of the right candidate for the job of x-ray screener (Pre-M), computer based theoretical security training (TREFOX), familiarization with prohibited items (Simulated Explosives) and computerized security x-ray simulation training (SIMFOX).

We understand that training does not end in the classroom.  Once a screener has obtained certification following the induction phase, it is the employer’s responsibility to continue challenging his image interpretation skills and monitor his progress.  Renful’s solution is to present each employee periodically with tests and to provide feedback to the employee and employer. The system will allow the employer to take part in the design of the test and will record all results permanently.

During the operation, the employee is challenged by other assessment tools, such as TIP (Threat Image Projection), covert testing and supervisor assessment and routine testing on the SIMFOX Security X-Ray Scanner Simulation system.  This ensures that the x-ray screeners are constantly challenged in their detection abilities by regularly introduction of new threats and concealment methods.

To overcome difficulties with cross-referencing test results from various sources, Renful has developed a readiness management system (OpeReady) which enables the management to identify performance flaws and non-compliance issues on all levels, whether occurring on an individual, departmental or organisational level.

Please visit our website for more information about our security training services. 

OpeReady – A Quick Overview

OpeReady is an operational readiness management system that allows managers to track their employees’ training and testing performance and readiness.

OpeReady is a completely customizable system that can be configured in a way that meets your organisation’s exact training and testing requirements.

The system is therefore able to match your expectations and notify you each time an employee does not reach the required levels of performance and readiness.

Have your employees taken the required amount of training to be compliant with local regulations?

This is a question that must be asked every week. Especially in industries that are heavily regulated like Airports and Cargo/Mail Forwarders.

It is also a question that is not always obvious, especially when the employee has a number of training courses to attend and certifications to achieve.

You’ll often have to look through a number of files or even hire a data analyst to make sense of all the numbers.

As all your employees’ key information is stored on OpeReady, it is able to tell you, at the touch of a button, whether or not an employee or department within your organization has achieved all the training and certification required to work within their job role.

OpeReady will also provide reasoning for anyone that has not met the required level of training and certification. This ensures managers are able to quickly schedule any training that may be required.

How well are your employees performing in training and on the job?

While ensuring your employees are meeting the expected readiness levels, it is also important to get an understanding as to whether they are performing at an above average standard.

OpeReady delivers an extremely useful Employee Performance Monitoring Tool that provides a number of graphs and tables that can be configured based on the criteria you want them to be.

So it is possible to see the average score from one date to another on a specific module within a training course or find out the average readiness level of a specific employee over time. The later is obviously extremely useful in identifying those that are always behind in their certification and training and should be looked into in more detail.

OpeReady is also able to syncronise with any of the technology you use to test or train your employees. For example, we have developed OpeReady to be syncronised with London City Airport’s S.E.M.S. and T.I.P. systems.

This ensures City Airport is able to view the throughput speed and detection skills of each of their x-ray screeners over time as they work within the security operation.

For more information about OpeReady, our employee readiness management software, please visit our dedicated website.

If you would like to attend a demo of OpeReady, please feel free to email us at or call on +44 (0) 208 457 9111.

Security Seminar – Cancun, Mexico

In August 2012, Renful will be holding a seminar in Cancun, Mexico that consists of 3 separate modules that can be taken together or individually:

‣      Airport Risk Assessment and Operational Design.

‣      Passenger Profiling using Behavioural Patterns Analysis.

‣      Training Management and Readiness of Screeners.

Airport Risk Assessment and Operational Design

Module 1 – (August 20th 2012)

It is commonly known that the design and implementation of an Airport security operation affects the probability of threat detection and passenger throughput.

Participants will be taken on a visit to Cancun Airport during which they will be introduced to a number of training and operational design ideas as well as the use and implementation of various security technologies including CT scanners, single and multi view x-ray systems and trace detection technologies.

Passenger Profiling using Behavioural Patterns Analysis

Module 2 – (August 21st–  22nd 2012)

Profiling ensures more time can be devoted to detecting threats as security personnel are able to target suspicious passengers based on their behavioural patterns and target them for additional searches and questioning.

This module teaches the unique skills required to implement a Profiling System within all high security organisations in order to help reduce delays and increase passenger throughput, whilst actually enhancing security.

Training Management and Readiness of Screeners

Module 3 – (August 23rd – 24th 2012) 

A security system is only as strong as its weakest link. If one component within it is not ready to meet the threat, the whole operation is at risk.

Security managers must, therefore, be able to identify weaknesses within their security system and be able to correct them immediately.

This module focuses on the tools required to manage employee qualification, training, re-training and certification requirements and provide suggestions for monitoring the readiness of single employees, units, departments and equipment within an organization ensuring that compliance and performance standards are being maintained.

Seminar Prices

Participants can select which of the three modules they wish to attend:

‣       Module 1: $390.00

‣       Module 2: $590.00

‣       Module 3: $590.00

‣       Discounted Full Seminar Price: $1,250.00

Fees include lunch and light refreshments daily, airport visit (module 1) and course material. There is a 10% Early-bird discount for payments received on or before 1st of July 2012

For more information about this seminar please contact us on +44 208 457 9111 or

Training, Monitoring & Management of Security Screeners

11th, 12th and 13th June, London 

In June 2012, Renful will be holding a seminar in London dealing specifically with the Training, Monitoring & Management of Security Screeners. The seminar lasts 3 days, features informative lectures, multimedia presentation, discussions and expert analysis from our security experts.

Renful is dedicating this seminar to the promotion of creative thinking in the areas of Security X-ray Simulation Training and Testing, Effective Screening Operation Design and the Management and Monitoring of Operational Readiness.

Effective Screening Operations & X-ray Simulation Training and Testing

It is commonly known that probability of threat detection relates directly to the level of training and testing of the X-ray operator, and to the design and implementation of procedures in the operational environment.

Our key note speaker on this subject will be Moshe Cohen, former Director of Training and Commercial Development at TWA, who will introduce a number of training and operational design ideas and technologies that ensure your screening personnel are of the highest possible quality.

Management and Monitoring of Operational Readiness

A security system is only as strong as its weakest link. If one component within it is not ready to meet the threat, the whole operation is at risk.

Security managers must, therefore, be able to identify weaknesses within their security system and be able to correct them immediately.

Benny Landshut, founder and manager of the security training and procedures department at Ben Gurion Airport, will discuss the management of employee qualification, training, re-training and certification requirements and provide suggestions for monitoring the readiness of single employees, units, departments and equipment within an organization ensuring that compliance and performance standards are being maintained.

A compelling argument for Passenger Profiling at Airports


A recent failed plot by al-Quaeda in Yemen again shows the lengths terrorists are willing to take to get past security and cause havoc over our skies.

This new underwear bomb provides another challenge to our Airports’ security measures; that would most likely not have been able to detect it

  1. The IED would have been worn by the terrorist, completely bypassing what is considered the most effective tool in the detection of threats; the security x-ray machine.
  2. The IED contains no metallic parts and would have gone through any metal detector without setting it off.
  3. The IED was concealed in underwear, an area that is avoided during initial body searches.
  4. It is most likely that the IED would not have been detected by body scanners given its location on the terrorist’s body. His thighs would most likely have covered the IED making any detection either extremely difficult or even impossible.

These findings do not put our traditional security measures in good light. It is clear to see that terrorists understand what it takes to get past current security measures and are now developing IEDs that will get past them without much risk.

The biggest problem is that security measures are very predictable. Each and every passenger from a toddler to a 90 year old man must get their bag screened by an x-ray machine and walk through a metal detector or body scanner.

In some cases they may be subject to a pat down search or their bags may be subject to additional searches using explosive trace detectors.

However, these extra security measures are very rare and terrorists are able to plan their attack without much fear that they will have to change them.

How do we detect a threat like this?

The first thing we need to identify is the types of security measures that could have detected the threat:

  1. A full strip search would have identified the threat. This measure is only taken very rarely once security staff have sufficient proof that the passenger represents a safety risk.
  2. Explosive Trace Detection systems may have been able to identify the IED if the terrorist had contaminated his luggage or clothes with explosive residue.

Why don’t we just ask all passengers to remove their clothes and get their possessions swiped by a machine?

First of all, I’m pretty sure a number of human rights groups might have something to say about it.

Secondly, if you decide to swipe everyone’s clothes and bags to find traces of explosives, you’ll probably have to ask them to show up 2 days prior to their flight rather than the current 2 hours.

Airports, Airlines and passengers would never accept this.

So what’s the solution?

While this all seems a bit negative, the important thing to remember is that these findings show that the problem is not that we can’t identify a pair of concealed underpants; it is that we don’t have the time.

All we need to do is use our time a little bit more effectively.

For this, we need to forget about detecting the IED and concentrate more on identifying the terrorist.

Past events show us that while terrorists are good at concealing IEDs, they are not so good at hiding the fact that they are terrorists.

For example, although the original underwear bomber, Abdulmutallab, managed to get through security, his appearance at the security checkpoint should have raised a number of suspicions.

He paid for a $3000 ticket in cash; a very expensive transaction that most people would use a credit card for. You might also expect someone who likes to pay in cash to actually have some on him. At least enough for his 2 week stay. In fact, he only had a few notes.

Other strange signs were the fact he had not checked any luggage for his 2 week stay and did not have a coat, despite the temperature at the flight’s destination being sub zero.

In spite of these clear signs, Abdulmutallab managed to clear security and get onto his flight. Fortunately, the bomb failed and nobody was hurt.

How can we stop this happening again?

The use of profiling within the security checkpoint would have been able to identify all these signs.

It involves trained profilers going through the security checkpoint queue asking passengers a set of questions based on any suspicious signs in their documentation, itinerary, appearance and behaviour.

The profiler then decides based on the passenger’s behaviour and answers whether they are a threat to the flight they are attempting to board.

An old lady in a wheel chair, for example, is extremely unlikely to be a terrorist and would most likely be classed as a terrorist.

She should get minimal security checks.

On the other hand, a 25 year old man that cannot tell you the nearest train station to where he claims to live would be considered a high security risk.

He should be screened using all available methods until security staff are satisfied he poses no threat to the security of the airplane.

This effectively means that only those that pose a security risk will be screened using all available methods and ensures only those that pose a valid security risk are kept waiting in line at the airport.

Renful Security Seminaras – Profiling

Renful hold a number of profiling seminars each year that teach security personnel the skills required to perform effective behavioural analysis and questioning techniques.

The seminar is taught by Moshe Cohen, the former head of security at TWA, who has developed a number of profiling systems at Airports throughout the world.

It teaches the knowledge required to implement a Profiling System within all high security organisations in order to help reduce delays and increase passenger throughput, whilst actually enhancing security.

For more information about our profiling courses, please contact us at or visit our website

Security Training Essentials: Operational Readiness Management Systems


X-ray simulation training and testing, T.I.P., S.E.M.S, and quality control measures like covert testing are used to monitor the performance of screeners throughout their careers.

This creates an information overload that can be extremely difficult to digest and keep up to date.

OpeReady is an Operational Readiness Management System that is used to monitor and control in real-time the operational readiness level and performance of departments, individual employees and equipment within security operations.

  • Employees’ T.I.P., S.E.M.S. and Simfox Net data can be fed automatically into OpeReady providing real time updates on their readiness and performance levels.

OpeReady Features

OpeReady frees you from the daily grind of administration and allows you to focus on managing your security operation.

Keeping an accurate and up to date record of all your employees’ details is extremely important in maintaining a high operational level. OpeReady centralises your employee records within one easy to use window, so it is quick to locate, update and view key employee details.

With OpeReady, you can create customised administrative and Readiness Tasks and assign them to specific employees, job roles, units and locations within the organisational structure.

OpeReady’s pro-active warning system actually tells you about problems before they arise.  Combine this with an easy to use query tool and learn about what really is happening in your operation.

Analysing the performance of your employees couldn’t be simpler with OpeReady. It provides graphs and reports that are easy to analyse and understand and can point you immediately to any weakness in the performance of your security operation.

Many organisations rely on the use of equipment as part of their day to day operation and must therefore ensure they meet certain specific regulatory requirements. For this reason, OpeReady has been developed with the capability to monitor the readiness levels of equipment.

OpeReady’s comprehensive reporting system enables managers and supervisors to create, save, export, print and email customised reports detailing any of their employees’ details, performance and readiness over a specified period of time.

Find out more about our Operational Readiness Management system by visiting our dedicated website >>