The SSTC Concept

Over the past few years, the increasing threat of terrorism has forced Governing bodies around the world to set up stringent regulations on the way security personnel should be trained and tested.

These new regulations have meant many organisations no longer have the capabilities to provide in house training to their employees and require specialist help from security training companies.

While many security trainers have sufficient security  knowledge to provide the training, many lack the technologies and marketing prowess required to take advantage of these extra requirements.

The SSTC franchise has been developed by Renful Premier Technologies in order to develop a worldwide framework for superior security training.

It is designed to enable security trainers to take advantage of the expertise, know-how and technology Renful has developed since its inception in 1994 so that they can provide a multi level security training service to their clients and increase their business opportunities.

Following the Renful Concept

All SSTC’s are able to follow Renful’s concept of providing training, testing and certification products and services that meet the needs of security screeners throughout their job cycle.

The concept is built on the belief that screener’s require a high level of initial training and testing before they are ready for their job.

For example, Pre-M enables security managers to analyse whether a candidate has the correct aptitudes to become a successful security screener while the use of our security X-ray simulator; Simfox together with our range of Simulants enable new personnel to familiarise themselves with the look, texture, functionality and x-ray signature of explosives.

At Renful, we also believe that security training should be pro-active rather than re-active and have therefore developed products and services that enable security personnel to get regular training on current and emerging threats.

For example, our Infogence publication provides monthly reports on emerging terrorism trends that can be used to update security personnel and build replica IEDs for Red Team Testing that are relevant to the current threat.  These threats are also placed into Simfox; which should be used on a monthly basis to improve the detection skills of x-ray screeners.

As well as providing services that meet every training and testing requirement of an x-ray screener, Renful provide a range of security courses, accredited in partnership with Middlesex University.

The courses last 3 days; are taught by experts and cover subjects such as Profiling, Document Verification, Terrorism Awareness, and more. Participants are then able to continue their studies via e-learning before enrolling at Middlesex University where they can earn academic qualifications designed to improve their earning potential and job prospects.

 Contact us for more information about providing secuirty training services through the SSTC>>

 

 


Advertisements

The Rise of Cyber Terrorism

Q: Where are you most likely to find a Terrorist? A: Wherever there’s a good Wi-Fi connection.

Author: 

For most, the internet has become an indispensible part of modern life. We Tweet about our lives, Facebook with our friends and shop till we drop.

Just like you and me, Terrorists spend a lot of time on the internet. However, their reasons for clicking “like” will be a lot more sinister.

Communication

YouTube channels and Facebook pages of Al Qaeda supporters are used to radicalise Western-based sympathisers, and also provide a means for communication between these “lone wolf” actors and larger organised networks of terrorists.

Recently, a 20 year old Moroccan was arrested in Brescia, Italy and accused of making a detailed plan for a terror attack on a Synagogue in Milan. A 40 year old Yemeni woman was also arrested in London over links with this group showing the global reach of many of these sites.

Police claim the accused used “exceptional” computer skills to create secret groups on Facebook.

A statement from police claimed “In this online arena, members could share instructions on how to assemble explosive devices, what chemical ingredients could be bought and the use of weapons”.

Propaganda

Terrorist organizations use the Internet to raise awareness for their cause, to spread propaganda, and to inspire potential operatives across the globe.

Websites operated by terrorist groups can contain graphic images of supposed successful terrorist attacks, lists and biographies of celebrated martyrs, and forums for discussing ideology and methodology.

Al-Quaeda distributes audio, video and graphics via The As-Shahab Institute for Media Production to forums, blogs and file-hosting websites.

Only recently, an English language terrorist publication called Inspire was intercepted by intelligence officials. Many articles within are thought to have come from Anwar al-Awlaki, a U.S. born radical imam who has been linked to a number of terrorist plots including the attempted Times Square bombing.

Al-Awalki is also thought to have been behind the radicalizing of Nidal M. Hasan, who allegedly committed the November 2009 shooting at Fort Hood, Texas, and Umar Farouk Abdulmutallab, the Nigerian suspect accused of trying to ignite explosives on Christmas Day 2009.

Funding

The internet is also used as a way to fund terrorist organisations. Cybercrime has now overtaken drug trafficking as the main source of income for terrorist organisations.

Identity theft, counterfeiting, and other types of computer fraud all provide a higher yield whilst also having the benefit of being carried out under a shroud of anonymity.

The 2002 terrorist bombings in Bali were thought to be partially funded through online credit card fraud.

Explosive Manufacturing

Given the difficulty in accessing military grade hardware, many online discussions will turn to the homemade manufacture of explosive charges.

Anders Behring Breivik admitted he used instructions he found on the internet to build the bomb he used in his terror attacks on Norway in 2011.

The ingredients used by Breivik to build his bomb were all available to the general public. For example, the main charge was made from Amonium Nitrate and Diesel Fuel obtained from fertilizer.

Tactics

Many online discussions often turn to how best to build and conceal an IED in order to get through security checkpoints.

In 2009, Al-Quaeda’s expert bomb maker, Ibrahim Al-Asiri, saw the potential of inserting a bomb in the rectum of a suicide bomber.

The plan was to assassinate Prince Mohammed bin Nayef, the head of the Saudi Arabia’s counter-terror operations.

The suicide bomber got through a number of security measures before setting off his IED as he went to meet the Prince. Fortunately, bin Nayef survived with only a few minor injuries.

A few months later, Al-Asiri got his bomb through security at Amsterdam’s Schipol Airport, this time concealed in the underpants of Umar Farouk Abdulmutallab.

The IED had no metallic parts, completely cancelling the effectiveness of metal detectors and x-ray machines. Fortunately, the bomb malfunctioned and the plane landed safely.

Recent intelligence suggests Al-Asiri has not given up. Reports tell us he is currently working with doctors on a plan to surgically implant IEDs into the bodies of terrorists.

The next step

While terrorists are very adept at spreading propaganda and communicating online, they have yet to deliver any major cyber attacks on organisations.

At the moment, cyber attacks attributed to terrorists have largely been limited to denial-of service attacks and defacing of websites.

However, as they have shown with their continued innovation in the manufacturing and concealment of bombs, it is clear that they will continue to improve their technical skills in order to deliver a major cyber attack.

Only time will tell.

About Us

Renful Premier Technologies is a knowledge based company that offers security solutions to organisations throughout the world.

Renful believes that working towards compliance is only the first step towards high-quality security and aims to provide a comprehensive solution that enables security x-ray screeners to excel in their job for the benefit of both the individual and the employer.

Our solution provides an integrative approach that includes training and assessment tools for the selection of the right candidate for the job of x-ray screener (Pre-M), computer based theoretical security training (TREFOX), familiarization with prohibited items (Simulated Explosives) and computerized security x-ray simulation training (SIMFOX).

We understand that training does not end in the classroom.  Once a screener has obtained certification following the induction phase, it is the employer’s responsibility to continue challenging his image interpretation skills and monitor his progress.  Renful’s solution is to present each employee periodically with tests and to provide feedback to the employee and employer. The system will allow the employer to take part in the design of the test and will record all results permanently.

During the operation, the employee is challenged by other assessment tools, such as TIP (Threat Image Projection), covert testing and supervisor assessment and routine testing on the SIMFOX Security X-Ray Scanner Simulation system.  This ensures that the x-ray screeners are constantly challenged in their detection abilities by regularly introduction of new threats and concealment methods.

To overcome difficulties with cross-referencing test results from various sources, Renful has developed a readiness management system (OpeReady) which enables the management to identify performance flaws and non-compliance issues on all levels, whether occurring on an individual, departmental or organisational level.

Please visit our website for more information about our security training services. 

What does it take to become a successful x-ray screener?

Author: 

The evolving threat and innovation of terrorism over the last 30 years has completely changed the security screening landscape.   It was once the case that all an x-ray screener needed to concern themselves with was the detection of guns and knives.

Now, all types of items have to be considered as threats as they may be concealing an explosive device. Whether it is a pair of shoes, a bottle of liquid, a tennis ball filled with TATP explosive or a pair of underpants; terrorists will try any possible means to get past security,

The easiest way to identify a concealed IED is through the use of an explosive trace detector. However, due to time constraints, security screeners are unable to use these machines on every single item that passes through the security checkpoint.

X-ray machines are therefore still the most common way of screening items that pass through security checkpoints. Although many x-ray machines are configured to automatically identify explosives, they cannot be relied on at 100%. They still lean heavily on the ability of the x-ray screener to identify threats.

For this reason, we have compiled a list of the key capabilities required to identify well concealed threats and become a successful screener.

Personality

Security x-ray screening is a monotonous task that requires deep concentration for as much as 30 minutes.

On busy security checkpoints, screeners only have a few seconds to identify each bag. They must therefore find the right balance between analysis and speed.

The perfect screener needs to have confidence in their ability to detect a threat. Not enough confidence and the screener will send too many items for search or deliberate too long on a bag, creating queues and annoyed passengers.

Attention to Details

If an IED is well concealed within an item, the item may only have small anomalies. In a packed bag these small differences can be almost impossible to detect.

The likelihood that a screener comes into contact with a concealed IED is very low and this only increases the level of attention to details that is required.

It means a screener must treat each bag that goes through the x-ray machine with the same high level of attention. Something that after 20 minutes of screening is very hard to maintain.

Visual Dexterity

An x-ray machine generally only produces two x-ray angles of each bag that passes through it. Items will therefore not always be at the optimum angle for x-ray screeners to identify.

Screeners must possess some visual dexterity in order for them to virtually rotate the items in their mind and identify them correctly.

Threat Knowledge

Without knowing what a threat looks like, it’s impossible to identify it. When it’s an IED that’s been concealed in another item, it’s even more difficult.

Given the evolving nature of threats, screeners need to be given continuous training and testing to ensure they can identify them.

Experience

Experience is not something you can get overnight but if you work at it, you can get it quicker. The use of realistic simulators like Simfox can help accelerate the learning process.

Getting experience isn’t always about spending days on end in front of an x-ray simulator. In this case quality is far better than quantity. It’s all about getting focused training that improves the weaknesses of each individual screener.

Knowing your weaknesses helps and with Simfox; trainers are able to identify it quickly through an easy to use statistical interface. The information can then be used to create training that will help the screener improve on their weakness.

Click here to get more information about Renful Premier Technologies and the security training products we provide.