Securing Libya’s coastline through persistent maritime surveillance

Securing Libya’s coastline through persistent maritime surveillance

In the past decade, Libya has been the primary transit point for migrants fleeing conflict and poverty across the region with hopes of reaching the shores of Europe. As the summer season creates favourable weather conditions, there are clear signs that the number of migrants attempting the journey along the central Mediterranean route will spike in the coming weeks.

According to statistics released by the International Organization of Migration, more than 12,000 migrants have been rescued at sea and returned to Libya since the start of the year, with 2,000 rescued during the first two weeks of June alone. More than 600 people have died or are missing after having attempted the perilous crossing from the port cities of Tripoli, Azzawiya, and Sabratha since January.

As the European Union cuts back on maritime search and rescue operations within the Mediterranean, the Libyan authorities have been encouraged to increase their responsibility for these operations in international waters. However, the two maritime law enforcement agencies with border security and management responsibilities – the Libyan Coast Guard and Port Security (LCGPS) and General Administration for Coastal Security (GACS) – both have limited operational capacities.

While additional SAR vessels may increase the LCGPS’s ability to conduct rescue operations, it might not be sufficient to tackle the issue of overcrowded and unsafe rubber boats leaving the coastline in the first place. The use of artificial intelligence can be an innovative solution to this complex border management problem.

Over the course of the last 14 months, Rose Partners have been engaged in a transformational security sector reform programme (SSR). At the heart of the programme was the Ministry of Interior’s (MoI) request to provide strategies to secure its borders. Rose Partners have worked in collaboration with the MoI to develop key strategies, including a Counter Illegal Migration Strategy. Such strategies provide robust frameworks and the capabilities required to improve law enforcement skills and collaboration and therefore support efforts to enhance border controls.

Rose Partners works closely with a number of carefully vetted key partners when supporting our clients. One such partner is Sirius Insight.

Sirius Insight has developed an AI-powered persistent maritime surveillance network that allows the operator to rapidly detect threats and anomalies at the frontier, thereby ensuring a proactive approach to border security strategies. Having an advanced threat detection solution at one’s fingertips would allow LCGPS officers to immediately detect departing rubber boats and swiftly allocate resources for SAR operations, rather than reacting to distress calls from vessels. This solution, along with the capacity and capability building being carried out by Rose Partners presents a formidable way forward for Libya in playing its part in securing its border and the joint efforts to prevent people trafficking and illegal migration.

Such a network would dovetail perfectly with current plans to establish a Maritime Rescue Coordination Centre along the Libyan coastline under the auspices of the EU Emergency Trust Fund for Africa. A persistent maritime surveillance solution powered by advanced detection algorithms might be the key to avoid unnecessary deaths and future tragedies in the Mediterranean, in addition to providing exponentially enhanced maritime situational awareness. SiriusInsight, a UK based maritime technology company with a revolutionary maritime surveillance and alerting capability, has joined forces with Rose Partners to propose and deliver this capability in Libya.

World Day Against Trafficking in Persons: Raising awareness of exploitation

World Day Against Trafficking in Persons

Today is World Day Against Trafficking in Persons, which aims to raise awareness of human trafficking and its victims across the globe.

Trafficking is a complex issue which Rose Partners has first-hand experience of from training police services to writing the new Libyan police strategy to help combat illegal migration and organised crime in North Africa.  Better policing is important, but we recognise it is only one of many things needed to tackle this huge global problem. According to the United Nations, 50,000 human trafficking victims were detected and reported by 148 countries in 2018. However, the likelihood is that there will be a far greater number of victims, according to Specialist Policing Consultant Colin Carswell.

‘There is a horrific level of exploitation of people and the scale of the problem is probably frighteningly more than any estimate,’ Colin said. ‘There is a general assumption, certainly here in the UK, that this is in the sex setting. While this is absolutely true, it extends far wider than that.

Colin served in the Metropolitan Police for 31 years and became involved in human trafficking investigations from 2008. One particular investigation he was involved with resulted in the conviction of more than 100 gang members who had been responsible for trafficking more than 1,000 Romanian children across Europe for things like begging, stealing, benefit fraud and sexual exploitation.

Colin has also held a capacity-building role with the Met and UK government, before going on to advisory and consultancy roles, including delivering training in Kazakhstan on behalf of the UN. He believes that raising awareness is the key to tackling the problem across the world.

‘Globally there is a lack of awareness of what human trafficking is, what it looks like and how it manifests itself in societies. Victims can get pulled into it by the draw of a better life – not to make millions, but to live a reasonable existence – some of the work might not be seen as a better life, but if you’ve got no work then you’ll take it.

‘Then there’s the push factors such as poverty, corruption, crime and conflict, whereby people are seeking to leave the area they live in. Lifting people out of poverty, as well as recognising and helping people distressed in areas of conflict would all have a significant impact in reducing global exploitation.

‘In Romania, the kids and their families had no choice – we raided 34 houses linked to the gangs and found military-grade weaponry like AK47s and armour-piercing ammunition. The gangs have control over their lives as nobody can resist that kind of coercion.

‘There’s also horrific exploitation which takes place in North Africa, with people travelling from sub-Saharan Africa in search of a better life. Young men and women can be sold in slave markets and put to work on things like building projects in order to fund the next leg of their journey.’

Knock-on benefits of tackling human trafficking

Preventing or taking people out of these situations is the right thing to do by any measure of morality. By tackling the organised criminal gangs who perpetrate these crimes, there is a knock-on benefit to wider society, including identifying further criminal activity and mitigating the billions of pounds lost from the economy to these activities.

Colin has been involved in investigating county lines gangs and sees parallels between trafficking domestically and internationally.

‘The gangs involved in human trafficking don’t care what they do or who they do it to,’ Colin added. ‘It’s very often the case they’ll also be involved in drugs trafficking and sometimes tax evasion, cigarette smuggling and benefit fraud.

‘Using county lines as a drug trafficking example, it’s the same method as trafficking girls into the country from eastern Europe. You’ll have a young, vulnerable person, looking to better themselves, who gets sucked into the gang but is being duped the whole time. They’ll be selling drugs for the gang and then be subjected to a set-up ‘robbery’, culminating in them owing a debt to the gang.’

How far have we come?

Much of the progress in combating human trafficking has been made in the past 10-20 years. It was in 2000 that the UN codified human trafficking in the Palermo protocol, and only 10 years ago the EU recognised criminal exploitation as a form of human trafficking.

‘There’s talk about eradicating it, but that’s unlikely to happen because ultimately humans can sometimes be bad and greedy people. However, simply having these conversations is a sign of progress – recognising there’s a problem, understanding the problem and government bodies doing something about the problem.’

What is operational security?

What is operational security?

Operational security is a far-reaching sector in 2021. In the modern world, organisations must be aware of a wide array of threats as ever-evolving technologies facilitate new ways in which people might seek to capitalise on security vulnerabilities.


A particular concern for companies in the digital age is corporate espionage. There are many successful instances of corporate espionage every year which can result in intellectual property being sold to other companies or ransomed back to the organisation on the receiving end of an attack. Either way, businesses can stand to lose large sums of money.

It is therefore important that your employees are educated of the threat corporate espionage can pose as well as the techniques used to carry it out. Social media is omnipresent in our lives and attackers might often seek to utilise it as a way of initiating contact with employees or to gather information about people in the business. As such, it is essential to educate your employees regarding the risks and best practices of using social networking sites, such as how to verify the identity of profiles they connect with, signs of information gathering as well as the ‘dos and don’ts’ when it comes to posting on social media.

Corporate espionage can also manifest as a physical threat and take place right under our noses. If a person has access to any computers or facilities at any of your business’s physical sites, it’s highly likely they can extract sensitive data. Businesses should track and supervise their guests as much as reasonably possible while limiting their access to any potentially sensitive information.


The digital age has brought a swathe of new potential security risks, but pre-existing threats remain. The need for operational security at large-scale events, involving high-profile individuals or significant numbers of people, cannot be overstated.

This involves far more than having security guards dotted in and around the perimeter of your event. The growth of advanced technology can be used in conjunction with your security team to limit the risk of multiple event-security threats such as injury to guests, damage to property, troublesome guests and crowd control as well as physically violent and cyber-attacks. The latter of these are likely to involve a greater deal of sophistication – and therefore planned significantly in advance of the event – meaning that a thorough, coordinated approach to security is required from the planning stages right through to the event itself.

As such, the effectiveness of large-scale event security is multi-faceted, but there is a more simplistic fact that should not be overlooked and that is the visibility of security. Highly sophisticated attacks are likely to be attempted irrespective of the security measures in place. However, these measures will act as a deterrent for any opportunists targeting your event.


Many organisations have likely been targets but not all will have suffered a security breach.

For those that have been breached, it is essential to understand how and why there was a breach in order to prevent similar incidents from happening in future. Conversely, organisations that have suffered at the hands of a security breach should not rest on their laurels. Security risks are constantly evolving and businesses should be regularly testing their security measures in order to identify potential vulnerabilities. This allows for any weaknesses to be promptly overcome and reduce the chance of your activities being compromised.

If you’d like to find out more about operational security and how Rose Partners can help your organisation implement it, get in touch with a member of the team today.

Freedom Day – Major Event Planning in the Post Pandemic Environment

The day has finally come upon us where we are able to walk back many of the restrictions of the last 16 months of the covid pandemic. The devastating human and financial toll has been significant and the question remains – will society ever be the same again? Our thoughts are with those who have lost friends and family during this time and continue to be impacted.

As the control measures are rolled back there is an overwhelming sense of society readying itself for coming back together; music festivals, sporting events and more.

It was only last month that Rose Partners was strategically and operationally supporting the G7 Conference in Cornwall. Events such as these are very much part of our core business. Our leadership team has extensive major event experience and have planned everything from the London 2012 Olympics through to football world cups and AGMs in Africa.

However, the effects of the pandemic remain and the impact on hosting major events has been seen in recent weeks and will continue to do so as we go forward. These effects are not just at the tactical and operational level but societal. We only have to look back at the events of the Euro 2020 Final at Wembley where hundreds of England fans overwhelmed an under-resourced security operation. The shameful events of that day were the manifestation of football fans ‘being released back into the wild’, high demand / low ticket availability and a security operation not prepared.

As we look forward to the rest of the year and into 2022, event organisers will need to develop robust and resilient strategic plans for major events. The ‘pingdemic’ will undoubtedly impact law enforcement as it will affect event security providers. The pent-up demand for social interaction, the restarting of company and government events and the desire to ‘get back to normal’ will generate unprecedented demand on event safety and security.

COP 26 represents the next major shop window for event security and the eyes of the world will be on Scotland, not only to deliver outcomes that will deliver meaningful targets and plans to tackle climate change, but the smooth functioning and operational delivery of a flagship event will be vital to its success.

Key success factors to planning and delivering such an event are, but not limited to,

  • Threat led planning – truly understand through intelligence and threat assessing how the risks will manifest that could impact your event. COVID-19 will be on your risk register
  • Detailed planning – from the strategy to the risk mitigation plan. The planning must include a ‘plan b’ not only for managing the strategic threats to events but also the inevitable impact to the workforce of COVID-19
  • Crisis management – creating robust resilience within your planning and creating contingencies
  • Rehearsals – bench test all your plans with all parties involved through table top exercises and ensure emergency services are engaged
  • Strategic engagement – strong relationship management and interaction with law enforcement

Rose Partners is a trusted provider to government and blue-chip companies alike for major event management. From strategic inception through to delivery, we have a highly experienced leadership who have built high performing teams to execute on the most complex of events.

Protecting yourself from the Pegasus Spyware

In the last 24hrs international media outlets have been reporting extensively about the Pegasus Spyware investigation. The media is reporting that rights activists, journalists and lawyers around the world have been targeted with phone malware sold to authoritarian governments by an Israeli surveillance firm.

Pegasus is a form of malware that is designed to infect mobile devices. Originally developed by NSO (an Israeli technology firm), the software has been sold to foreign governments in order to monitor the phone activity of its targets. Through a simple text message, or WhatsApp call the malware can infect a phone. Harnessing zero-day vulnerabilities (security holes in the code of the software on phones that the manufacturers don’t know about yet) the malware, once installed is able to remotely control and manage your phone. It can turn the microphone on, download all of your data and information and access your location information. Essentially, it has access to everything you do on the phone. And it’s not easily detected.

So what can you do to protect yourself?

Deleting all of the apps on your phone that you don’t need is a good start. Essentially, any app on the phone can be exploited. And make sure all apps and the core iPhone/android software is always fully up to date. If you have a fleet of phones used in your company, setting up an MDM (Mobile Device Management) solution can help. Through this management software, you are able to restrict the apps that can be downloaded from the App and Play Stores.

And then finally, you have software on your computers and servers to protect against malware and viruses, so why wouldn’t you do the same on your phones? There are antivirus tools that you can run on your phones that will detect and eradicate most malware. But these are unlikely to detect Pegasus Spyware. Ideally, you would have a proactive MDR (manage, detect and respond) solution deployed on all of your devices, from PCs to mobile phones. These solutions are monitored 24 x 7 from our SOC (Security Operations Centre) for any malware or security breach and are immediately investigated and correctly addressed.

Previously these solutions have only been accessible to enterprise-sized clients, however Rose Partners is now offering a comprehensive visibility and aggregated threat detection solution to all clients which ensures your data and information remains secure. Our scalable solutions seek to address the needs of the SME / family house / HNW clients, through to larger organisations who need a more managed solution. Rose Partners has long been at the leading edge of securing our clients, both virtually and physically. We understand the absolute need to protect what’s important to you and ensuring your data remains secure is our primary objective.

en_GBEnglish (UK)