SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-Powered Video Analytics
    Understanding AI-Powered Video Analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-Powered Video Analytics
    Understanding AI-Powered Video Analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Understanding AI-Powered Video Analytics
    Understanding AI-Powered Video Analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Understanding AI-Powered Video Analytics
    Understanding AI-Powered Video Analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-Powered Video Analytics
    Understanding AI-Powered Video Analytics
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-Powered Video Analytics
    Understanding AI-Powered Video Analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • AI-Powered Video Analytics
  • AI special report
  • Cybersecurity special report
  • 6
Intrusion detection
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Counter Terror Expo 2014 To Incorporate C-IED Demonstration Zone Showcasing Safe IED Detection At Olympia, London

icon Add as a preferred source Download PDF version
Major features covered will be clearing landmines, conventional ordnance disposal, high risk search, heavy IEDD team, post room and bomb making factories
The C-IED Demonstration Zone will feature a spectrum of IED threats from all parts of the world

On the battlefield, in the public transport arena and within the urban environment, the threat from Improvised Explosive Devices (IEDs) remains potent. Advanced threat detection methods, threat handling techniques and threat containment solutions are helping to mitigate the danger inherent in safe IED detection and disposal.

However, with the nature of the threat evolving all the time, Counter Terror Expo 2014 will this year incorporate a C-IED Demonstration Zone dedicated to showcasing the latest developments from some of the leading companies working in this critical area. Just how critical was confirmed only recently by news reports that the republican terror alliance known as the new IRA has claimed responsibility, using a codeword confirmed by Scotland Yard, for a series of some seven separate parcel bombs sent to military careers offices across England.

In the words of Bob Shaw, a director at Optimal Risk, and the lead organizer of the C-IED Demonstration Zone: “Operational forces are so busy dealing with current operations that planning for the future and looking at all the new technology and our adversaries’ TTP (tactics, techniques and procedures) ends up too low a priority, especially in today’s fiscal climate. That is why features such as the C-IED Demonstration Zone at Counter Terror Expo are key.”

As part of his role within the Zone, Bob will be providing a live commentary on six different scenarios that will be enacted over the course of the two days of the show. Covering the full spectrum of IED threats in all parts of the world, the scenarios will feature some of the latest equipment available.

 "This is a must-attend show feature, not just for law enforcement and military personnel, but all security personnel to ensure their security procedures in the event of suspect packages are fully optimised to minimise risk to their colleagues"

Examples of the operations that will be featured in the scenarios include:

Clearing landmines - important not only from a humanitarian point of view but because mines can be recycled by terrorists. Mines contain high grade military explosives, so IEDS made from them are particularly destructive and can fragment and penetrate armoured vehicles.

Conventional ordnance disposal - for example, anything dropped from a plane. The technology and equipment required for more traditional bombs, like those used in WWII are still required, as you never know when a bomb might be constructed out of old equipment, using old techniques, by an organization operating with limited funds.

High Risk Search - This involves a Royal Engineer search team, in conjunction with an IEDD operator, isolating an area – possibly while under enemy fire – to allow for the detection of IEDs.  Using metal detectors that also have ground penetrating radar to detect changes in the soil, the searches can be done more accurately, avoiding the previous false alarms caused by seeding (where alarms are triggered by deliberately placed scrap metal decoys).

Heavy IEDD Team - dealing with a Vehicle Born IED, where the car itself is the device, designed to attack major infrastructure, often in crowded market places, and possibly deployed in a suicide mission.

Post Room – demonstrating the equipment used for dealing with a postal device, including the personal protection equipment used by an IEDD operator and the small disrupters designed for selective disruption, to minimize damage and maximize forensic exploitation of the device. 

Bomb Making Factories – highlighting the role of an Assault IEDD team entering an environment where terrorists are making producing IEDs (most likely to be in a domestic setting) and disposing of the devices while possibly finding themselves under armed attack.

Among the organizations exhibiting their products and services within the C-IED Demonstration Zone will be Microdrones, a manufacturer of Unmanned Aerial Systems, who commented: “Detection, avoidance, and intelligence gathering are key issues for the C-IED community and unmanned technologies will prove to be of increasing importance in supporting C-IED efforts”.

"The C-IED Demonstration Zone
is just one element of the free to
attend exhibition which is crucial
in ensuring the counter-terrorism
and security industry is fully
preparedto tackle the evolving
terrorist threat"

Also exhibiting will be Sentinor (formerly Becatech Systems) who specialize in tactical intrusion prevention and the securing of fixed infrastructure and have won the Counter Terror Expo Excellence Awards for the past two consecutive years. Sentinor stressed the importance of “knowing when and where IEDs 'might' be and when and where potential bad guys may have been”.

Tactical Electronics have been designing tactical camera systems and EOD equipment, including Unmanned Aerial Systems, as well as providing multiple-level training for over a decade. In their view, “Counter Terror Expo will allow us to showcase our latest equipment and course offerings to EOD operators and police services, including our Armed Response Kit, EOD Tool Kits and K-9 Cameras”.

Philip Hunter, Event Director, Clarion Defence & Security commented: “The C-IED Demonstration Zone is just one element of the free to attend exhibition which is crucial in ensuring the counter-terrorism and security industry is fully prepared to tackle the evolving terrorist threat. This is a must-attend show feature, not just for law enforcement and military personnel, but all security personnel to ensure their security procedures in the event of suspect packages are fully optimized to minimize risk to their colleagues”.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Perimeter security
  • Intrusion detection
  • Public security
  • Counter terror
  • Perimeter protection
  • Related links
  • Counter Terror Expo 2014
  • Related categories
  • Intruder alarm warning devices
  • Intruder alarm accessories
  • Intruder alarm system control panels & accessories
  • Intruder detectors
  • Intruder alarm communicators
Related white papers
Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems

Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems

Download
The Top 4 Reasons To Upgrade Physical Security With The Cloud

The Top 4 Reasons To Upgrade Physical Security With The Cloud

Download
11 Advantages Of A Combined System For Access Control And Intrusion

11 Advantages Of A Combined System For Access Control And Intrusion

Download
Related articles
Securitas UK & Hays Travel Partnership Milestone

Securitas UK & Hays Travel Partnership Milestone

Ranger Acquires Universal Fire & Security In UK Expansion

Ranger Acquires Universal Fire & Security In UK Expansion

Detection Tech Unveils DT2030 Strategy For X-ray Growth

Detection Tech Unveils DT2030 Strategy For X-ray Growth

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Intrusion detection
  4. News
  5. Events news

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec