April/May Insider

Page 1

INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:20 PM

SECURITY

Page 1

THE MAGAZINE FOR SECURITY PROFESSIONALS

PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION

[MAG AZINE] VOL.15 | ISSUE.2 | APR/MAY 2010

KEEPING THE SPORT OF KINGS SAFE 45 25

PP255003/02390

SECURITY 2010 1-3 SEPTEMBER, SYDNEY


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:20 PM

Page 2

Telstra Secure Security Monitoring Centre

Customer Premises

Telstra Secure Network

• Telstra Secure

• Telstra Secure CPE

Alarm Receiver

• Third party Alarm System

Telstra Secure the official replacement of Securitel is Telstra’s next generation back to base fully managed private IP monitoring security network. Telstra Secure is a managed and dedicated security monitoring service provided on Telstra’s Next IP & Next G Private Network. Telstra Secure is independently accredited to C3, C4 and C5 of Australian Standards AS2201.5 – 2008 and is the only approved Telstra solution.

The Telstra Secure Network does not rely

The Telstra Secure Network is dedicated for

The Telstra Secure Network is fully managed

on any Public Networks, this means that

secure and reliable security services, this

and supported by Telstra. All key network

all alarm messages never stray outside the

provides the availability required to ensure

components are totally redundant, this is to

Telstra Secure Australian Private Network

that critical alarm signals are delivered to the

ensure that the Telstra Secure Network stays

before they reach the monitoring centre.

monitoring centre without concern that the

at peak performance now and into the future.

network is loaded by other non related traffic. Telstra Secure is now made very simple and cost effective for monitoring centres. To join please contact your Direct Alarms Supplies representative for more information.


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:20 PM

Page 3

Telstra Secure 8 General Purpose Inputs for low level connectivity to any alarm system

Primary GPRS communications path

Three General Purpose Outputs Securitel Equivalent RS232 and

which can be remotely controlled

TTL connection to alarm system for ultimate monitoring PSTN line connection for Ethernet port for local

Securitel Equivalent Analogue,

configuration and diagnostics

Contact ID dial capture and Dialler backup

PSU Battery backup with mains monitoring and battery testing **Image depicts UC351G only

Telstra Secure the official replacement of Securitel is built on Telstra’s next generation of fully managed IP networks. Telstra Secure “Customer Premises Equipment” (CPEs) are the complete modern day communications tool kit; providing an unrivalled level of connection and communication features that maximise third party alarm system compatibility and removes configuration and installation complexities.

Telstra Secure is independently accredited

The unrivalled level of security system

Telstra Secure CPEs are developed in

to C3, C4 and C5 of Australian Standards

compatibility makes Telstra Secure CPEs

Australia and are a modern and powerful

AS2201.5 – 2008 to provide you the

the simple choice for all your security

platform that can continue to be remotely

assurance that you and your customers are

communications needs, allowing you to

upgraded long after your installation is

well protected now and into the future.

focus on supporting the one solution to

completed. This provides you the peace of

minimise installation costs.

mind in an ever changing communications world.

Powerful yet simple, Telstra Secure CPE is now available from any Direct Alarm Supplies branch for your convenience.


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:21 PM

Page 4

CONTENTS 26

VOL.15 | ISSUE.2 | APR/MAY 2010

KEEPING THE SPORT OF KINGS SAFE

12

FAIR WORK OMBUDSMAN’S REPORT SUMMARY

NBN ALARMS SIGNALS

06 | President’s Message

10 | Guide Dogs welcome in all public places

12 | Fairwork dismissal decision gives casuals access to unfair dismissal remedies 14 | ASIAL on the streets of Australia 16 | Call for universities to offer more security programs

4 //SECURITY INSIDER APR/MAY 2010

20

34

PREVENTING ARMED ROBBERY

23 | Security 2010 Conference and Exhibition 36 | Dealing with workplace bullying 44 | ASIAL Certified Security Monitoring Centres 48 | Hot Products 50 | Frank Sales


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:21 PM

Page 5


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:21 PM

Page 6

PRESIDENT’S MESSAGE

ASIAL welcomes the Fair Work Ombudsman report

THE MAGAZINE FOR SECURITY PROFESSIONALS Editorial and Advertising Security Insider is published by The Australian Security Industry

ASIAL welcomes the release this month of the Fair Work Ombudsman’s report into the security industry (National Security Industry Campaign 2009). Over the course of the past six months ASIAL has provided the Fair Work Ombudsman with the opportunity of educating and informing its members through industry events across the country, along with a range of electronic and print publications. Between July and September 2009, the Fair Work Ombudsman targeted 747 businesses for an Australia-wide audit campaign. The most common contraventions identified were non-compliance with time and wage recordkeeping requirements, the incorrect payment of wages, and noncompliance with payslip requirements. Of the 256 audits undertaken and finalised to date, it was found: • 130 (51%) employers were compliant within the scope of the campaign • 126 (49%) employers contravened either the Act or the Regulations. Of these 126 employers: • 66 (52%) had minor contraventions relating to time and wage records and pay slips • 60 /126 (48%) had monetary contraventions relating to underpayment of wages, penalty rates and allowances • 27/126 (21%) had both types of contraventions. One of the key challenges faced by providers of security personnel has been the preparedness of clients (both government and corporate) to award

6 //SECURITY INSIDER APR/MAY 2010

contracts at the lowest possible price (rather than the best value), with scant regard to the professionalism and integrity of the supplier.This approach has encouraged a ‘race to the bottom’ mentality among some. The recently introduced Security Services Award (2010), of which ASIAL was a key driver, will simplify wages and conditions for security personnel nationally. It replaces a significant number of State and Federal awards that were among the most complex of award structures. ASIAL seeks the highest level of compliance among its members and provides an industrial relations advisory service to all members. For more than a decade ASIAL has called for government to introduce a uniform and consistent national approach to the regulation of the industry. An integral component of ASIAL’s approach has been the introduction of a more rigorous and comprehensive compliance regime for security operators. ASIAL fully supports the recommendations of the report and welcomes the opportunity to work with the Ombudsman to address the issues identified in the report.

Association Limited PO Box 1338 Crows Nest, NSW 1585 Tel: 02 8425 4300 • Fax: 02 8425 4343 Email: communications@asial.com.au Web: www.asial.com.au Publisher

Editor Bryan de Caires | security@asial.com.au Advertising Aleisha Rees | advertising@asial.com.au Creative Director Martin Costanzo | martin@webfx2.com.au Graphic Design + Prepress Webfx2 digital | design@webfx2.com.au Editorial Contributors Rod Cowan, Chris Delaney, Erin Louis, Lance Smith Editorial Enquiries Angela Maan communications@asial.com.au Print + Distribution Everedi Press Published bi-monthly Estimated Readership of 10,000 Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL. Advertising does not imply endorsement by ASIAL, unless otherwise stated with permission. All contributions are welcomed, though the publisher reserves the right to decline to publish or to edit for style, grammar, length and legal reasons. Press Releases to: security@asial.com.au Internet

references

in

articles, stories

and

advertising were correct at the time of printing. ASIAL does not accept responsibility for misleading views. Copyright© 2010 (ASIAL) All rights reserved. Reproduction of Security Insider magazine without permission is strictly prohibited. Security Insider is a subscription based publication, rates and further details can be found at www.asial.com.au

[Next Issue] Jun/Jul 2010

Ged Byrnes ASIAL President

ISSN 1442-1720


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:21 PM

Page 7

With Australia’s best surveillance solutions, life’s good. In hotels, homes, corporations, retail chains, airports and casinos, LG provides just the right surveillance solution – and C.R.Kennedy can tailor them to your needs. LG is one of the world’s great electronics companies, creating leading-edge security technology, including DVR’s, cameras and accessories. And C.R.Kennedy matches this quality with total surveillance solutions and a dedicated local support network right across Australia. We bring you the right LG surveillance product at the right price. You are supported by dedicated technical advice from any of our state offices or authorised resellers around Australia and New Zealand. C.R.Kennedy’s fast and efficient service is recognised as the best in the business. Combined with LG’s world-leading technology, life’s good.

Victoria 9823 1533 viccctv@crkennedy.com.au New South Wales 9552 8350 nswcctv@crkennedy.com.au Queensland 3862 6222 qldcctv@crkennedy.com.au South Australia 8410 0533 sacctv@crkennedy.com.au Western Ausralia 9381 7144 wacctv@crkennedy.com.au New Zealand 09 276 3271 cctv@crknz.co.nz Australia www.lgcctv.com.au New Zealand www.lgcctv.co.nz CRK26213IN


INSIDER_Apr_May10 Iss2_52pp

ZZ

14/4/10

10:21 PM

Page 8

Last Month we delivered a HLI for both Milestone and Verint CCTV systems...

At Inner Range Integration is more than just a buzzword!

• View live and historical video directly in the Insight workspace • Drag & Drop cameras onto graphical floor plans • Playback recorded video based on Insight event log time stamps • Send commands to trigger events in the video management system • Associate cameras with objects in the Insight data base (Doors, Inputs, Users etc) • Log intercom calls in Insight Review • Video pop up on intercom activity More information is available from Central Security Distribution

New South Wales Unit 6, 185 Briens Road, NORTHMEAD, NSW, 2152 Phone: 02 8014 2600 Fax: 02 8569 0954

,5 FRQVXP DG LQGG

Queensland Unit 9, 17 Cairns Street, LOGANHOLME, QLD, 4129 Phone: 07 3333 0800 Fax: 07 3020 3862

Head Office - Victoria Unit 6, Nexus Business Park, 35 Dunlop Road, MULGRAVE, VIC, 3170 Phone: 03 9946 3200 Fax: 03 8612 3656

Distribution Centre - Tullamarine Victoria 22 Mallet Road, TULLAMARINE, VIC, 3043 Phone: 03 9001 1900 Fax: 03 8610 2106

South Australia 21 Grove Avenue, MARLESTON, SA, 5033 Phone: 08 8468 8400 Fax: 08 8219 0181

Western Australia Unit 1, 1 Natalie Way, BALCATTA, WA, 6021 Phone: 08 6465 1500 Fax: 08 9238 1303

$0


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:21 PM

Page 9

This month we’ve delivered again with a High Level Interface to Jacques & Genetec

Insight Professional Management software for Concept 4000 security hardware currently supporting HLI’s to many CCTV brands with more being added continually.

,5 FRQVXP DG LQGG

$0


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:21 PM

Page 10

INDUSTRY NeWS

RETAIL REMEDY WITH FIRST PINLESS ANTI-THEFT TAG ADT Security has released the Sensormatic Ultra•Tag® PT, its first secure, pinless anti-shoplifting tag. Designed with an adjustable spring-loaded metal clip, the anti-theft tag easily attaches to products without penetrating any material.The clip compresses firmly onto merchandise, closing tightly enough to prevent unauthorised removal without damaging items. Its onepiece design allows it to be more easily applied and removed at the checkout counter.

GUIDE DOGS WELCOME IN ALL PUBLIC PLACES AND VENUES Over the last year there have been a number of incidences where Guide Dogs and their owners have been disallowed entry into venues. To prevent this from continuing, Guide Dogs NSW/ACT encourages security personnel to work with people with impaired vision and better understand the best way to assist them. People using a guide dog in harness can legally enter all public places, including restaurants, pubs, clubs, cafes, shops, supermarkets, shopping centres as well as taxis, public transport and hospitals (patients and visitors). Guide Dogs undergo extensive assessment and training in wide variety of environments before they are placed with a person with impaired vision. However there are some guidelines you should follow to assist a Guide Dog and its owner. Guide Dog Etiquette: • When you see a guide dog in harness, it means they are working and you should not pat, feed or distract it in anyway. A guide dog is not a pet; it is there to help the person with impaired vision to move around safely and independently. • There are various ways security personnel can assist people with

10 //SECURITY INSIDER APR/MAY 2010

impaired vision when they enter a venue. This includes assisting people to get to their destination, giving directions and maintaining safety. • There is no way to know if a person with impaired vision needs help. The best option is to just ask them. • Always ensure you provide clear directions from the perspective of

other person (eg. When you say “right”, refer to “their right”) For more information visit www.guidedogs.com.au To request a FREE COPY of the “Working Together - Strategies for assisting people with impaired vision” DVD or information about free training for security personnel call (02) 9412 9300.


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:21 PM

Page 11

Did you

know?

Dedicated Micros has introduced its latest innovation

HYBRID

Combining powerful high-end server and IP features with ease of use and install

• Hybrid DVR - Analogue & IP Camera Connections

• On-screen telemetry control with Point&Go and Absolute Positioning

• Real-time recording per camera

• On-board Help Videos

• Composite and enhanced XVGA main monitor outputs

• Up to 3TB on-board storage

• Direct Configuration of Oracle Domes & Infiniti Cameras • Control multiple monitors with its remote monitor capability

• Front Panel Control • Use NetVu Console to control several units from the same keyboard • Bespoke graphical map presented on the local monitor screen for easy navigation

• AnalyticsCapable

Tel: +612 9634 4211 Email: dmaustralia@dmicros.com Master Licence 404588736

www.dedicatedmicros.com/sdadvanced

*Available through all major distributors and direct in applicable regions. ©Copyright AD Group 22/02/10


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:21 PM

Page 12

INDUSTRY NeWS

FAIR WORK DECISION GIVES CASUALS ACCESS TO UNFAIR DISMISSAL REMEDIES Fair Work Australia has clarified the circumstances in which casual employees can qualify for protection from unfair dismissal under the new Act. Under the Act employees must have served a six-month period of employment to qualify for protection from unfair dismissal and provides that, for casuals employment must have been regular and systematic and the employee must have had a reasonable expectation of continuing to work on that basis. As a consequence, while under the old Act there had been a focus on establishing whether an employee was a casual, the focus is now on whether the employee was employed regularly and systematically. The Fair Work Act also requires employees to have a reasonable expectation of continuing employment during the "period of service", rather than

12 //SECURITY INSIDER APR/MAY 2010

at the point of termination as under the old Act. On the "regular and systematic" requirement, FWA said it applied to the employment itself and not to the hours or days of work the employee performed. The Commissioner said "the fact that an employee works more hours in one week or one month than another and the fact that an employee might have variable start and finish times is not conclusive evidence of irregular, occasional, or nonsystematic employment or engagement,". The guiding principles are (according to the Commissioner): • If the number of hours worked is small and the gaps between days and times worked is long and irregular, this means that there needs to be other evidence that the employment of a casual is regular and systematic; or • Conversely, if there is a clear pattern or a roster for the hours and days worked

then this would be strong evidence of regular and systematic employment. Or, in the absence of evidence of regular and systematic employment can be established where: • The employer regularly offers work when suitable work is available at times when the employer knows that the employee has generally made themselves available; and • Work is offered and accepted sufficiently often that it could no longer be regarded as simply occasional or irregular. Such evidence indicates regular and a systemic employment and a reasonable expectation of continuing employment. The Commissioner found that a casual employee working full-time hours over a lengthy period would also have strong evidence of regular and systematic employment.


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:21 PM

Page 13


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:21 PM

Page 14

INDUSTRY NeWS

Alexandria, NSW

Sydney Harbour Bridge

Perth

Brisbane

Cremorne, NSW

Crows Nest, NSW

C. Luhrmann: SIA Security, Qld

Crows Nest, NSW

ASIAL’s latest awareness campaign has kicked off for 2010. Following our initial newsbreak advertisements across 110 regional Australian radio stations, ASIAL’s clear eye-catching branding can now be spotted on taxi backs across Adelaide, Sydney, Brisbane and Perth. Taxi backs can be found across 1105 taxis in Brisbane (Airport, CBD, Inner West, North Shore, Southern Suburbs, Eastern Suburbs), Sydney (Airport, CBD, North Shore and Eastern Suburbs), Adelaide (Airport, CBD and all suburbs) and Perth (Airport, CBD and all suburbs). Melbourne is also included in the campaign where ASIAL branding will be splashed on trams across the city. Alexandria, Sydney

T. Pierce: Brink’s Australia Alexandria NSW

B.T. Howells: Suncorp Neutral Bay NSW

14 //SECURITY INSIDER APR/MAY 2010

Sydney, NSW

Melbourne, Victoria


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:33 PM

Page 15

INDUSTRY NeWS

H. O’Sullivan: Nationwide Advertising, Sydney

C. Jobben: Seadan Security, Newstead, Qld

ASIAL ON THE STREETS OF AUSTRALIA A.Thomas: Best Security Pty Ltd Geebung, Qld

Brisbane Airport, Qld

T. Pierce: Brink’s Australia, Alexandria NSW

SECURITY INSIDER APR/MAY 2010// 15


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:34 PM

Page 16

INDUSTRY NeWS

CALL FOR UNIVERSITIES TO OFFER MORE PROGRAMS IN SECURITY MANAGEMENT AND ADVANCED SECURITY OPERATIONS

Long-standing history.

With a rock-solid future. FlexSecur provides customers with the highest level of security cards and readers.

A study (Tertiary Education in Security and Policing in Australia – Asian Criminology (2010) 5:1-10.) into the current status of police and security education in Australian universities and technical colleges has found that police studies had a significant profile in universities, but virtually not profile in technical and further education colleges (TAFE). Conversely, protective security offerings were prominent in the TAFE sector than in universities. Acknowledging the fact that private and public sector security services have eclipsed police in numbers in many jurisdictions, the report argues that security should be counted as an equal partner with police in crime prevention services. In addition, the report argues that those engaged in security management should be given greater opportunities for study at the university level. Moreover, security studies should have an expanded research focus.

R

FlexSecur can be used with any access control panel because the security is between the card and reader, and is transparent to the panel. FlexSecur converts even common and frequently duplicated formats such as 26-bit Wiegand, into customer-specific, unique, secure formats where readers and cards are non-interchangeable with those from other systems.

GET YOUR FREE COMPANY WEB PAGE ON THE ASIAL WEBSITE

R

R

16 //SECURITY INSIDER APR/MAY 2010

A growing number of members are utilizing their FREE new ASIAL member benefit – a company webpage on the ASIAL website.The webpage allows ASIAL members to upload their own logo, images, video and product/service information into a web page with a dedicated URL. The new web page will be available in two different templates and four colour schemes. If you haven't already done so, sign up at www.asial.com.au now to get started today.


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:34 PM

Page 17


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:34 PM

Page 18

INDUSTRY NeWS

RAISING INDUSTRY STANDARDS ASIAL MEMBERS are reminded that membership of the association requires adherence to the Association’s Code of Professional Conduct.The Code exists to promote higher levels of professionalism within the membership across all sectors of the industry. When breaches of the Code are identified, the Association has procedures in place to address them. A copy of the Code is included below:

4.

5. ASIAL CODE OF PROFESSIONAL CONDUCT 1. Members shall conduct their professional activities with respect for the public interest. 2. Members shall at all times act with integrity in dealing with clients or employees, past and present, with their fellow members and with the general public. 3. Members shall not intentionally disseminate false or misleading

18 //SECURITY INSIDER APR/MAY 2010

6.

7.

8.

information, whether written, spoken or implied, nor conceal any relevant fact.They have a duty to maintain truth, accuracy and good taste in advertising and sales promotion. Members shall not represent conflicting or competing interests except with the express consent of those concerned given only after full disclosure of the facts to all interested parties. Members shall refrain from knowingly associating with any enterprise, which uses improper or illegal methods for obtaining business. Members shall not intentionally injure the professional reputation or practice of another member. If a member has evidence that another member has been guilty of unethical practices, it shall be their duty to inform the Association. Members shall help to improve the

body of knowledge of the profession by exchanging information and experience with fellow members and by applying their special skill and training for the benefit of others. 9. Members shall refrain from using their relationship with the Association in such a manner as to state or imply an official accreditation or approval beyond the scope of membership of the Association and its aims, rules and policies. 10. Members shall cooperate with fellow members in upholding and enforcing the code.


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:34 PM

Page 19

NSW

VIC (02) 9897 7722

Rowville

(03) 9755 6922

Torrensville

Rosebery

(02) 9698 9698

Coburg

(03) 9383 2066

WA

Chatswood

(02) 8467 1467

QLD

ACT

www.das.com.au

SA

Granville

Fyshwick

(02) 6280 9630

Balcatta

Molendinar

(07) 5597 7203

TAS

Bowen Hills

(07) 3252 5512

Hobart

(08) 8150 9400 (08) 9241 3100 (03) 6272 0211


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:34 PM

Page 20

BROADBAND NETWORK

NBN SIGNALS ALARM ASK NBN CO LIMITED, THE SEEING

ORGANISATION RESPONSIBLE FOR

the National Broadband Network become a reality,

what consideration has been given to existing monitored security systems and the response is short, simple and…well…not exactly enlightening. “We are currently in the design phase of our network and have nothing to say at the moment on this issue,” says an NBN Co spokeswoman. The Minister for Broadband, Communications and the

“NBN Co technical specialists are aware of the requirements of legacy services and are factoring these requirements into the network design.” The fact is, ASIAL representatives met before Christmas with NBN Co’s senior technical staff to outline industry concerns. “Whilst the industry is keen to embrace the opportunities proposed under the National Broadband Network roll-out, there are genuine concerns about vital

Digital Economy, Senator Stephen Conroy’s office has a

legacy services such as security and alarm panels,

little more to say on the matter.

medical and health monitoring systems, duress systems,

“The Government recognises that there are a range of analogue legacy services used by Australian consumers and businesses currently supplied over the copper public

fire panels and help point systems,” says ASIAL’s CEO, Bryan de Caires. “With over 1 million of these systems currently in use,

switching telephone network, which will need to be

this represents a significant issue for those individuals

supported over the digital optic fibre National Broadband

and organisations that rely on the security and safety

Network,” Senator Conroy’s spokesperson said.

services provided. Failure to provide a transitional

“The migration of legacy services is an issue being investigated as part of the NBN Implementation Study.

mechanism to ensure an orderly transition of legacy systems following the roll-out of the National Broadband

> 20 //SECURITY INSIDER APR/MAY 2010


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:34 PM

Page 21

BROADBAND NETWORK

When it comes to the National Broadband Network, the people touting it as the biggest infrastructure project in Australian history, finds Rod Cowan*, have little to say when it comes to alarms.

Network may place the owners of over 1 million security,

AS2201.5 defines the performance requirements of

fire and health systems at risk.”

alarm systems, which include:

Concerns have already been raised that the cost of

o The need to report any attempts to tamper with

connecting new houses to the National Broadband

the alarm transmission system. As the ONT

Network will deter developers and drive first home buyers

(Optical Network Terminal) will now be part of the

out of the market. For example, the Housing Industry

alarm transmission system, interference with the

Association (HIA) in Tasmania has warned it will cost an

ONT could potentially prevent the alarm system

extra $3,000 to $5,000 per home to connect to the $43

from reporting, or could be used to ‘subvert’ the

billion fibre-optic network, on top of existing infrastructure

system.

levies for water and sewerage.

o In the event of mains power outage, to allow

Cost is also high on ASIAL’s agenda.

systems to continue to communicate with

“One of our primary concerns is that if, as a result of

monitoring centres, AS2201.1:2007 calls for 16

the National Broadband Network roll-out, CPE equipment

hour battery backup. If, as has been proposed,

has to be replaced or re-configured, this will represent a

the service provider needs to monitor the ONT’s

significant cost impost on individual and business users,”

backup battery, then a mechanism needs to be

says de Caires.

provided to alert the monitoring centre of ONT power failures or faulty batteries.

ASIAL also put forward some specific issues, including: • Compliance with Australian Standards: AS2201.1 –

o The ONT port used for security has to be monitored for physical or electrical tamper

SECURITY INSIDER APR/MAY 2010// 21


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:34 PM

Page 22

BROADBAND NETWORK

attempts. When detected, these need to be reported to the security service provider. • PSTN emulation: many alarm systems monitor the phone line voltage expecting to see a nominal 48 volt feed. It is an essential requirement that the ONT provides the right feed voltage to avoid the situation whereby the alarm system constantly reports a PSTN line fault. • NBN network upgrade: There is the potential for the ONT to remove feed voltage during a network upgrade. This can result in alarm panels reporting PSTN faults, not to mention a system beeping an alert, waking customers in the middle of the night. • Remote configuration via low-speed dial-up modems: large proportion of alarm systems deployed in commercial applications support remote configuration via low-speed dial-up modems (speeds < 2400 bps), which will need to be supported over the NBN. • Network performance: as the telephony service over the NBN will be supported by multiple network

“NBN is another step in the changing communications world and another change in the traditional reporting of alarms,” says Kiely. “We know the NBN is coming and equipment

providers, standards for telephone services are

manufacturers can — and no doubt will — develop an

essential to ensure that signalling requirements of

interface from the alarm panel to the network to transmit

legacy alarm system are supported.

security information.”

The end result of the discussions? “Whilst acknowledging our issues, the position of the

That has certainly been the case with other IP developments with a range of options appearing on the

NBN Co Limited was that it is beyond their remit to

scene, such as Fratech Multipath, Emizon, and Telstra

provide specific leadership or direction to address these

Secure.

challenges. Rather, the appropriate forum for ASIAL to

The adoption of IP based services — alternative

address these issues would be to work with the

signalling paths, as they are often referred to in the trade

Communications Alliance,” says de Caires, who adds he

— has nonetheless been messy and at times downright

has written to the Communications Alliance

confusing for installers and consumers.

(CommsAlliance). A copy of the CommsAlliance’s response is available on the ASIAL website. “We are awaiting a response from CommsAlliance,” says de Caires. The problem, he adds, is that security is only a very small focus when it comes to the NBN. It is a viewed shared by Neville Kiely, chair of ASIAL’s

Part of the problem is that people within network providers responsible for rolling out new products, such as VoIP, are largely unaware of the effects on legacy systems. When one major telco switched to VoIP in a regional area of NSW, alarms systems simply stopped working. Then there is the lack of collaboration — and at times outright hostility complete with vicious infighting, legal battles and allegations of fraud — on the part of

National Electronic Security Special Interest Group,

manufacturers competing for dominance in what has to

though he breaks it down to bits and bytes.

be said is a very small piece of the pie in the technology

“We are not very popular with network operators, because we only send small amounts of data and don’t

world. The challenge facing the industry, and ASIAL as its

generate huge revenues,” says Kiely.“But, delivery of what

representative, will be to create some coherence within

we do send is absolutely critical.”

the industry, then to convince the policy wonks and tech

Kiely is, however, cautiously upbeat.

heads in the backrooms of network providers that security continued page 24 >

22 //SECURITY INSIDER APR/MAY 2010


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:34 PM

Page 23

INDUSTRY NeWS

KEEP AHEAD OF YOUR COMPETITORS WITH THE LATEST IN SECURITY TECHNOLOGY Australia’s leading security industry event, Security 2010 Conference & Exhibition, will be held at the Sydney Convention & Exhibition Centre from Wednesday 1st to Friday 3rd September, displaying the latest advances in access control, theft protection, system integration and IP technology. Across three action-packed days, the Security 2010 Exhibition, which is supported by ASIAL, will bring together leading Australian and international manufacturers, suppliers, providers, industry experts and end users to connect and explore the unique challenges and opportunities facing today’s Security industry. The Exhibition will feature over 140 exhibitors, with leading brands such as Bosch, Hills, Sony, Dedicated Micros, Suretek Global, ADI Global Distribution, Sanyo and Axis Communications. It goes without saying that technology and development are vital to the success of the Security industry and, in the current IT-driven climate, it’s never been more important to stay

INSIDER Dec08 Iss6_56pp

27/11/08

9:29 PM

ahead of your competitors. If you belong to the security trade, or are involved in making critical security decisions, the Security 2010 Exhibition presents an invaluable opportunity to immerse yourself in every aspect of this vital, evolving industry. The Security 2010 Conference, organised by ASIAL in conjunction with DEA will be run alongside the Exhibition on Thursday 2nd and Friday 3rd

September. The Conference will include international presentations, case studies, panel discussions and workshops featuring international and local industry specialists, offering insight into the latest challenges and innovations affecting the security industry in Australia. Turn innovation into a competitive advantage at the number 1 industry event, Security 2010. For further information visit www.securityexpo.com.au

Page 1

SECURITY

SECURITY NEWS 24/7

THE MAGAZINE FOR SECURITY PROFESSIONALS

PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION

[MAG AZINE] VOL.13 | ISSUE.6 | DEC08/JAN09

+

To subscribe email security@asial.com.au

37 25

PP255003/02390

ASIAL 40th Celebration, 30 April 2009, Crown Casino

industry magazine

high traffic website

SECURITY INSIDER APR/MAY 2010// 23


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:34 PM

Page 24

BROADBAND NETWORK

may be a very small part of the picture in terms of

• engaged Nextgen Networks to rollout almost 6000 km

numbers, but for the victim of a missed medical alert or

of new fibre optic backbone links, as part of the

hold-up alarm gone astray, the effect could be

Government’s $250m investment in the Regional

catastrophic.

Backbone Blackspots Program to connect over 100

And,“having nothing to say on the issue”, if all the warning signals have been strong and clear, will not cut it.

regional locations along the routes to the six priority areas of Geraldton, Darwin, Emerald and Longreach, Broken Hill, Victor Harbor and South West Gippsland

What is the NBN?

• introduced legislation to improve competition in the

The Company line

telecommunications sector, including during the

NBN Co (www.nbnco.com.au) says it “plans to deliver

transition to the full NBN rollout, which was passed by

fibre-based coverage with speeds of 100 Megabits per

the House of Representatives and is before the Senate

second to 90% of premises in Australia, subject to final

for consideration

design. “Premises in areas that cannot be serviced economically by fibre will be connected by advanced

• received an extremely strong response to the regulatory consultation process and progressed legislative changes that will govern NBN Co.”

wireless technology providing speeds of 12 Megabits per second, subject to final design. “Where geographic location impedes the ability to

Dissenting voices When opposition leader, Malcolm Turnbull claimed: "This

provide either fibre or advanced wireless connectivity, NBN

makes the Whitlam era look modest and unassuming".

Co plans to provide like connectivity through satellite

Turnbull compared the project to the failed Sydney cross-

technology, delivering 12 Megabits per second, subject to

city tunnel and said that this time Australian taxpayers are

final design.”

taking the risk and wearing the loss.

The Government view

bandwidth potential already out there ready to be

The Australian Government (www.minister.dbcde.gov.au)

switched on and future potential in Wireless technology,

announced on April 7, 2009, it would “establish a new

where the greatest demand exists – for "Everywhere

company NBN Co Limited to invest up to $43 billion over

Access" If the Government pursues the Fibre to the

eight years delivering superfast broadband to Australian

Premises plan, expect to be using Fibre for your Christmas

homes and workplaces.

decorations in 10 years.”

www.nonbn.org says: “There is already ample

“To turn its vision into action the Government has: • already invested $60 million of an initial $4.7 billion investment in the company • progressed a detailed implementation study (due to

The Australian newspaper (March 22, 2010) reports: “KEVIN Rudd is believed to have told Communications Minister Stephen Conroy to come up with a strategy within two weeks to take the heat out of the political crisis

report to Government in February 2010, but yuet to be

building up around the government's $43 billion national

released) by a consortium of McKinsey and KPMG to

broadband project.

inform the company's operating arrangements, detailed

“Canberra sources said the directive followed a ‘difficult’

network design and ways to attract private sector

meeting between Rudd and Conroy after the Prime

investment

Minister was shown a copy of the controversial $25 million

• established NBN Tasmania Limited as a subsidiary of NBN Co to build and operate the NBN in Tasmania— construction of the rollout has commenced and the first 10 Tasmanian communities to receive superfast

implementation study into the development of the national broadband network. “In a nutshell, it already has a ring of the home insulation fiasco about it.”

broadband were announced

As mentioned in the last issue of Security Insider (Vol.15 | Issue.1 | Feb/Mar 2010), ASIAL sent a letter the NBN Co Ltd outlining the industry’s concerns of the NBN rollout. A response has been received from Anne Hurley Chief Executive Officer NBN Co Ltd.To view both letters in full, please visit www.asial.com.au

24 //SECURITY INSIDER APR/MAY 2010


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:42 PM

Page 25


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:43 PM

Page 26

PHOTO: COURTESY: AJC

AJC SECURITY

26 //SECURITY INSIDER APR/MAY 2010


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:43 PM

Page 27

AJC SECURITY

KEEPING THE SPORT OF KINGS SAFE Royal Randwick, home to the Australian Jockey Club (AJC)

three years the Club has established a highly skilled and

is a sprawling expanse of land covering 200 acres of prime

experienced in-house security team, backed up by

Sydney real estate. While the venue has been synonymous

contracted private security personnel (including mounted

for over a century with horse racing, it may come as a

security), police and a state of the art CCTV system.

surprise to some that it also plays host to numerous

From unruly patrons at a typical race day meeting, to

functions, exhibitions, music festivals and special events over

young fans at music festivals, through to the mass celebrated

the course of a year.

by Pope Benedict as part of World Youth Day before an

Established in 1842, the AJC is Australia’s oldest thoroughbred racing club. Unsurprisingly, for many years security was not a high priority. However, in 2007 this all

audience of over 300,000 and the 2007 outbreak of Equine Influenza, Shane and his team have (almost) seen it all. In 2007, the Club took the decision to bring its security

changed when the club embarked on a major overhaul and

function in-house, with the appointment of Shane Brady as

upgrade of its security operation and facilities. Over the past

Security and Risk Manager. continued page 28 >

SECURITY INSIDER APR/MAY 2010// 27


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:43 PM

Page 28

AJC SECURITY

PHOTO: COURTESY: AJC

PHOTO: ANGELA MAAN

As the man tasked with revamping the Club’s security operation, Shane has almost 20 years experience in the security and risk industry. He has been the driving force behind many of the innovative security measures introduced at the Club. In his previous roles he worked as a Security Manager with Westfield Ltd, a Paratrooper in the Australian Regular Army and a range of internal and external roles within organisations across Australia and Asia. He is a licensed Security Consultant and holds formal qualifications in security and risk, and occupational health and safety. This has enabled resource requirements

Since 2008, Shane’s Assistant Security and Risk Manager has been Dennis

and budgets to be stratified, whilst

Mitchell. Dennis brought with him to the

ensuring that high priority, high risk aspects of existing systems and practices

position, over 20 years experience gained in the Australian Regular Army, including active service in Somalia and East Timor. In his role he has been instrumental in the implementation of a range of security initiatives, from Mounted Security to the development of KPIs for the

are addressed with appropriate urgency to ensure the protection of assets, people and reputation.The AJC is the only thoroughbred horse racing club in Australia to have a dedicated internal security department.

Club’s contract security provider. To gain an insight into how the AJC’s security function

SI: How has the AJCs approach to security changed over

operates, Security Insider spent a day at the races.

the past decade?

SI: What is the AJC’s approach / philosophy towards

security department or strategy, the Club relied upon some

security – a necessary cost of business or important

external consultation and a contracted guard force for asset

business enabler?

protection, events and race days. Over the past three years, a

SB: Prior to July 2007 the AJC did not have a dedicated

SB: A strategic, staged approach was adopted in the

staged approach to the improvement and enhancement of

development of a robust Security Framework for the

the Club’s security operation has been implemented (refer to

Australian Jockey Club (Royal Randwick & Warwick Farm).

a staged apporach to change).

28 //SECURITY INSIDER APR/MAY 2010

>


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:43 PM

Page 29

AJC SECURITY

PHOTO: ANGELA MAAN

“In 2007, the Club took the decision to bring its security function in-house, with the appointment of Shane Brady as Security and Risk Manager.”

continued page 30 >

SECURITY INSIDER APR/MAY 2010// 29


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:44 PM

Page 30

AJC SECURITY

A STAGED APPROACH TO CHANGE Stage 1: July 2007 - Recruitment of a suitably experienced and qualified Security & Risk Manager

security prevention and other operational benefits such as crowd congestion management through people count technology.This system plays a major role in the harm minimisation requirements of the AJC by vastly

This stage incorporated a complete assessment

improving crowd management capabilities.

of the AJC’s security and compliance measures.The implementation of programs to

Stage 2: July 2008

bridge identified shortfalls in incident & emergency management preparedness,

Recruitment of a suitably qualified and

procedural, physical and electronic security

experienced Assistant Security & Risk

ensued.

Manager and Asset Protection Team to increase the supervision of contracted security employees.

In stage 1, the review included: • Cash Related Risk Review was conducted in August 2007 for both facilities • Physical and electronic upgrade of the Cash Storage facilities at both facilities • Terrorist Threat Risk Assessments for both facilities were completed in August 2007 • An Evacuation Exercise was conducted in November 2007 and as a result a training needs analysis was developed • Royal Randwick’s and Warwick Farm’s critical infrastructure

Stage 2 inclusive of, but not limited to: • Stage 3 & 4 of the CCTV installation • Re-keying of the Royal Randwick facility due to the existing compromised master key systems • Introduction of an electronic master key system and electronic storage.The implementation of these systems enables control measures (access levels, remote deactivation etc) to ensure that the system cannot be compromised.

was identified plotted and emergency shutdown procedures

• Installation of a duress pendant system

were developed

• Upgrade of the facilities perimeter security

• Comprehensive Perimeter Audits were conducted at both facilities (completed annually) • A training program in Armed Robbery Awareness / Survival commenced on the 1st December 2007 • An incident reporting template was developed in July 2007

• Upgrade and enhancement of the AJC RSA & Harm Minimisation Plan (inclusive of training) • Design and introduction of a Risk Management Plan • Developed a Occupational Health & Safety compliance process incorporating;

and the creation of an electronic program was completed in

• Contractor inductions

January 2008

• Workplace inspections

• Internally employed Responsible Service of Alcohol Monitors commenced on the 1st December 2007 • Contract Security Specifications and Key Performance Indicators designed and developed • Business Continuity Plan and Alternate Operating Procedures designed and developed

• Rectification process of identified hazards • Risk Register • Hazard Register • Enhance the AJC’s Incident & Emergency Management Preparedness • Staff Training & development

• Risk Management Plan designed in June 2008

• Event Emergency Management Briefs

• Physical Security Gap Analysis

• Emergency Services Access

• Strategic Security Plan

• Failure to Quit Licensed Premises Procedure

• Emergency Response and Contingency Plan

• Bomb Threat • Risk Review of Equine Pool Operations

Procedural development: Cash in Transit, Cash Delivery / Pickup, Bomb Threat, Suspicious Mail Handling, Automated External Defibrillator, Amusement Device Approval, Lost Property, School Formal / Graduation Conditions, Lost / Found Child. CCTV Installation Stage 1 & 2: The Place of Public

• Design and deliver an Emergency Evacuation training program • Kitchen Localised Critical Infrastructure Shutdown Procedures • The design and implementation of the racing carnival and

Entertainment (POPE) licence required the AJC to adhere to the

major event Security & Risk Handbooks inclusive of Risk

pre-determined room capacities within the stands.The CCTV

Assessments customised to incorporate the associated

system provides this requirement. Concurrently it provides

threats. continued page 46 >

30 //SECURITY INSIDER APR/MAY 2010


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:44 PM

Page 31

SECURITY IN MIND

Protection is as much about securing the hearts and minds of security staff, as it is about pay and conditions, finds Rod Cowan*

SECURITY IN MIND Walk into any building with security, say an airport or high-rise office block, and security will greet you in a number of ways. Some will be rude, aggressive, or appear bored and uninterested. Others take a lively interest in your needs, engage in conversation while waiting, and offer assistance to get you where you want to be. Invariably, they will have the same (some would argue low) pay and conditions. So, where does the difference lie? It’s not all about money According to Professor Richard Wiseman, author of :59 Seconds – Think a Little Change a Lot, contrary to popular belief, the promise of reward does not, in fact, motivate people. In studies where children were offered medals for drawing, they drew less than other children who were offered no reward. The thinking went, because adults only offer rewards for activities which children do not like doing, they figured they must not like drawing. As for rewards for activities that people do not like doing, Wiseman ran an experiment where people were asked to spend an afternoon picking up litter in a park. Some were paid handsomely for their time and others received a small amount of cash. When asked about how much they enjoyed the experience, the people being paid small amounts enjoyed themselves more. “These findings have been replicated time and again in studies. Almost regardless of the nature of the rewards or tasks, those who are offered a carrot tend not to perform as well as those who don’t expect to receive anything. Some of the studies have shown short-term boosts in performance, but over the long haul rewards tend to destroy the very behaviours they are designed to encourage,” says Wiseman. So, if rewards don’t work, what does? “When it is something they don’t enjoy, a realistic, but not excessive, reward is effective at the start, followed by feelgood comments that encourage them to pursue the activity,”

SECURITY INSIDER APR/MAY 2010// 31


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:44 PM

Page 32

SECURITY IN MIND

says Wiseman. Perhaps one of the toughest security jobs, especially in terms of dealing with a constant stream of people, not all of whom are pleased to be dealing with you, is aviation security. Professor Robert Bor, an internationally recognised aviation psychologist, acknowledges the job can be boring, monotonous and stressful, yet says it is important for security personnel to have an “empathetic understanding” of the public they are dealing with. Though there is a good deal of training and classroom discussion about dealing with the public, it does not always translate to action on the job. “In real life, a lot of that is either forgotten or, because of the pressures of the job and sometimes, let’s be honest, the monotony of the job, the desire to treat the passenger as a person and understand some of their worries, fears and antagonisms, seems to fall by the wayside,” Bor told Security Insider. As for solutions, Bor says:“Clearly, working as part of a team is important. When we are on our own in these safety and security situations, tensions tend to rise.” Ensuring the people you are dealing are provided information helps, too. “Now, that won’t be the antidote to all the problems, but if passengers have a clearer understanding of what we are doing, what the procedure involves and why we need to do it, they may be more accepting of the process,” says Bor. Recognise, as well, the dynamics of dealing with people, especially if physical contact is required. “As soon as you have personal or eye contact with someone, you enter into a relationship with that person. Not a real relationship. But, at that moment, you are relating,” says Bor. “If things are done carefully, sensibly, and with a smile, you are likely to gain cooperation. Personalise it.That’s always the best way to take it forward.” Ultimately, it all comes down to professionalism, which has a lot to do with those in charge. “The management and leadership of security personnel is crucial,” says Bor. “If we look at it historically, typically these are low paid workers, many of whom who have not had clear career structures, who frankly do quite a repetitive, sometimes, monotonous job, and we

Professor Robert Bor *Rod Cowan is an independent contributing editor and can be contacted at mail@rodcowan.net.

32 //SECURITY INSIDER APR/MAY 2010

demand really huge skills and accuracy from them. “All that is really a recipe for either confusion, sometimes disgruntlement, etc,. I think there are ways we can remedy that. “The first is to make sure that it is seen in many ways as a professional activity that is well supported. “The next is to make sure that training is thorough, consistent, and updated as well, because when they are taken out into a classroom situation to upgrade their skills, to debrief, perhaps to move to a more senior supervisory role, you may get a more interested, engaged, and motivated person on the receiving end.” Much of the current training, he says, is too focused on specifics, such as what prohibited items to look for in bags, whereas the focus should be about looking at the job as a whole and how to work as teams. For example, he asks:“How can they communicate with one another in a professional way?” Often, he says, the public will see security officers working together and talking in a social way,“which is understandable”, since they may be friends, share canteen time, and have common interests. “But, at that moment, they are wearing the hats of professionals. Like many professional groups, that should probably be discouraged.That may not be a popular thing to hear, but there should be an intense focus on the job at hand,” says Bor. Despite security officers performing a crucial role, especially in high-risk areas, such as airports, the rewards may not be there to recognize the effort.The fact is, if security is done well, nothing happens, making it hard to achieve a sense of accomplishment. “The rewards may not be immediate.You are there to act as a deterrent. To be a good deterrent, you have to be professional and vigilant. But, you also have to combine that with a measure of empathy and a human face, as well. All of these are, I don’t think, unreasonable demands to place on people. But, there are certainly ways in which we can make the job more interesting.There are a wide range of skills, ideas, and occasionally, perhaps, armchair theories that we can use and bring into the everyday workplace,” says Bor. All of which adds up to not only a more motivated and professional workforce, but also the public having a more positive experience of security.


INSIDER_Apr_May10 Iss2_52pp MIP advert 6 copy.pdf 1

14/4/10 4:44 10:44 14/01/10 PM

PM

Page 33

An open offer to every central monitoring station in Australia Buy 10 MultiPath STU’s and Inner Range will install hosted service MultiPath IP technology in your monitoring centre at no charge!

s

2ECEIVE )2 FAST !LARM TRANSMISSIONS

s

2EMOTE HIGH LEVEL INTERROGATION AND CONTROL OF #ONCEPT SYSTEMS

s

/FFER YOUR CLIENTS HIGH SECURITY %THERNET MONITORING OPTIONS

s

/NBOARD DIALER CAPTURE OR 3ECURITEL INTERFACING

s

%NCRYPTED TRANSMISSIONS ON ALL )0 PATHS

s -ONITOR CLIENTS USING ALL TELCO NETWORKS s

%ASY STEP INSTALLATION COMMISSIONING PROCESS FOR '023 SITES ON SINGLE OR MULTIPLE NETWORKS

Multipath-IP Monitoring your property and critical assets For further details Phone Nathan Mc Grath on : (03) 9753 3488 or Email : multipath@fratech.com.au

Assisted Enrolment service for Monitoring Stations and Installers available directly from Inner Range

Special Price at CSD Branches

Securitel Replacement STU

$299+GST


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:44 PM

Page 34

PREVENTING ARMED ROBBERY

PREVENTING

ARMED R

By Erin Louis and Lance Smith

34 //SECURITY INSIDER APR/MAY 2010


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:44 PM

Page 35

PREVENTING ARMED ROBBERY

D ROBBERY PREVENTING THE OCCURRENCE OF CRIME IS OF great importance to business owners and individuals. Armed robbery has a significant impact on victims, potentially causing both physical and psychological injury, as well as having a negative impact on businesses and the broader community. It is widely said that prevention is better than a cure and crime is a good case in point.There are a variety of reasons for why crime occurs and criminologists have theorised for

assessment of the relative advantages and disadvantages of the crime. As a result, SCP calls for a range of responses including the use of ‘target hardening’ mechanisms.Target hardening is a means of reducing the opportunity for an offender to commit a crime by tightening the security of potential crime targets. When applying the theory to armed robbery there is a range of effective target hardening measures available to help combat the occurrence.These include simple techniques such as: • making customers as visible as possible inside a premises (this raises the risk of being identified and can deter some offenders)

decades as to why and how to prevent it.This article discusses

• regular staff training in cash handling procedures

some of these theories and how they can be practically applied

• limiting the amount of money kept on the premises

to preventing crime today, specifically how the incidence of

• posting signs saying there are “CCTV cameras on the

armed robbery can be reduced if effective crime prevention strategies are employed. Situational Crime Prevention (SCP) is a theory or perspective that focuses on the opportunity for crime to occur and the settings for crime, rather than on offenders. SCP theory suggests that the rational decision making process of an offender to commit the crime or not is based on their

premises” • posting signs saying “staff do not have access to the time delay safes”, and • ensuring that there is sufficient lighting inside and outside the premises. These are some of the techniques employed by commercial locations in their attempts to combat armed robbery.

SECURITY INSIDER APR/MAY 2010// 35


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:44 PM

Page 36

PREVENTING ARMED ROBBERY

Unfortunately one of the side effects of

Another approach that is similar to

Some examples of what would be

successful target hardening is what’s

Situational Crime Prevention is Routine

considered a capable guardian are:

called a displacement effect.This means

Activity Theory (RAT).This approach

• police patrols

that the offenders may change their

focuses on the opportunity for crime to

• security guards

tactics or their targets rather than not

occur. RAT is an environmental

• Neighbourhood Watch schemes

committing a crime at all. Displacement

criminology theory, devised in the late

• door-staff

occurs in five distinct ways:

1970’s. RAT argues that for crime to

• vigilant staff and co-workers

• GEOGRAPHICAL DISPLACEMENT: occurs

occur three things need to happen at

• friends

when an offender targets the same

the same time and in the same space:

• neighbours

industry type but in another location.

1. A suitable target is available.

• Close Circuit Television (CCTV)

For example, another service station,

2. There is the lack of a suitable

bank or retail outlet in a neighbouring

guardian to prevent the crime from

suburb.

happening.

• TEMPORAL DISPLACEMENT: offenders modify the time that they target the relevant commercial location.

3. A likely and motivated offender is

systems • perpetrator marking systems Clearly some of the guardians listed,

present.

like security guards, are formal and

Generally there are a number of

deliberately placed. Some of the other

suitable targets around at any given

guardians listed above would be

stations target harden all locations in

time. However there are three main types

considered informal and inadvertent, like

the industry, an offender may switch

of targets: a person, an object or a

neighbours. However, they can be just as

their targets to convenience stores as,

place.

effective (Clarke 1999).

• TARGET DISPLACEMENT: if service

from an armed robber’s point of view,

The good news is that regardless of

It is important to note however that it is

how suitable a target is, an offence will

possible for a guardian to be present but

not take place unless a capable

totally ineffective. For example a CCTV

stores put in protective barriers to

guardian is absent and a likely offender

camera is not a capable guardian if it is

protect against knife robberies

present (Clarke 1999).

set up incorrectly or located in an

they are similar in many respects. • TACTICAL DISPLACEMENT: if convenience

offenders may upgrade to using firearms.

A capable guardian takes into

inappropriate place (Clarke 1999). Another

account the 'human element', and would

example would be staff present in a shop

usually be considered a person.Their

who have not had sufficient training or

switch to other crimes such as fraud

mere presence would likely deter

awareness to be an effective deterrent.

or illicit drug supply.

potential offenders from committing a

When a suitable target is unprotected by

Displacement is one of the key

crime (Felson and Clarke 1998).

a capable guardian there is a

challenges facing the prevention and

However, a capable guardian could also

substantially greater chance that a crime

reduction of armed robbery in Australia

be a CCTV system, providing that

will take place.

(Smith and Louis 2009).

someone is monitoring the camera.

• Crime type displacement: offenders

The final element of RAT is the

continued page 38 >

36 //SECURITY INSIDER APR/MAY 2010


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:52 PM

Page 37


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:52 PM

Page 38

PREVENTING ARMED ROBBERY

crime prevention techniques effectively.

presence of a likely offender. RAT looks

synthetic DNA and florescent dye.The

at crime from an offender’s perspective

water is contained in a delivery device

and looks at what influences their

that can be adapted to a range of

Situational Crime Prevention Theory and

decision making processes. Importantly,

crime prevention scenarios.The device

Routine Activity Theory in connection

a crime will only be committed if an

can be activated by a panic button or

with armed robbery go to

offender thinks that a target is suitable

similar device following an armed hold

www.aic.gov.au and see current and

and a capable guardian is absent

up and sprays the offender with the

previous reports from the Australian

(Cohen and Felson 1979). It is their

DNA water upon leaving the premises.

Institute of Criminology’s National

assessment of a situation that

The synthetic DNA and florescent dye

Armed Robbery Monitoring Program.

determines whether a crime will take

remain on the offenders’ body and

place or not.

clothing for several weeks after the

REFERENCES

offence.This presents investigators with

Clarke R.V (1999). Hot Products:

deterred by the practical application of

the opportunity to directly tie an

Understanding, Anticipating and Reducing

this theory is the amateur or opportunist

offender to a crime scene as each

Demand for Stolen Goods. Police

armed robber, as they fail to invest a

system possesses a code in the water

Research Series Paper 112 (London:

great deal of thought into their targets

unique to the store it protects.

Home Office Research, Development and

The type of offender normally

and locations. If any part of the crime

Perpetrator marking systems have

For more information about

Statistics Directorate).

seems too hard, it is likely that they will

been deemed a successful deterrent

alter their plans. RAT highlights the

when used in partnership between

change and crime rate trends: a routine

importance of target hardening and

police, business owners and the

activity approach. American Sociological

situational crime prevention techniques

supply company (Gill 2007). It is

Review,Vol 44, Pages 588-608.

in deterring the occurrence of armed

essential to stress the importance of

robbery.

using a system like perpetrator

Opportunity Makes the Thief. Police

marking in partnership with police,

Research Series Paper 98, Policing and

business owners and the supply

Reducing Crime Unit, Research,

Routine Activity Theory has been the

company. In isolation there is little

Development and Statistics Directorate.

development of perpetrator/property

evidence to suggest that a product

London: Home Office.

marking technology. The technology

like this will be effective. However

was developed in the United Kingdom

there is great potential for its use in

Smart water: Offenders’ Perspective.

in the 1990’s and is now used

Australia.

Perpetuity Research and Consulting

A practical example of applying Situational Crime Prevention and

throughout Europe. The purpose of

Armed robbery is a serious crime

perpetrator marking is to firstly deter

and great challenges remain for

criminal acts, and, secondly to directly

business owners and law enforcement

tie an offender to a crime scene.

in effectively combating it. Nonetheless,

Cohen, L.. and M. Felson (1979). Social

Felson, M. and Clarke, R. (1998).

Gill M. (2007). An Evaluation of

International. Leicester: United Kingdom. Smith L and Louis E (2009). Armed robbery in Australia: 2006 national

as this article notes there are a variety

armed robbery program annual report.

technology is the use of a water based

of ways to help reduce armed

Monitoring report no. 04. Canberra:

product that is infused with a unique

robberies from occurring by employing

Australian Institute of Criminology.

The core component of the

SECURITY 2010 CONFERENCE & EXHIBITION 1-3 SEPTEMBER 2010, SYDNEY CONVENTION & EXHIBITION CENTRE

Security2010 C O N F E R E N C E & E X H I B I T I ON

1–3 SEPTEMBER 2010 For more information visit www.asial.com.au

38 //SECURITY INSIDER APR/MAY 2010

SYDNEYCONVENTION & EXHIBITION CENTRE


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:52 PM

Page 39


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:52 PM

Page 40

PEOPLE

FAILING TO DEAL WITH WORKPLACE BULLYING CAN BE EXPENSIVE! By Chris Delaney* Employers who ignore claims of bullying and/or harassment by employees do so at their peril. In a recent case a court ordered the employer to pay fines and damages totaling $330,000, giving employers a clear message that they must act to deal with these issues professionally and quickly. For all of those we hear about there are many others that are detrimental to morale, efficiency and profitability. So, what constitutes workplace bullying? Workplace bullying means any behaviour that is repeated, systematic and directed towards an employee or group of employees that a reasonable person, having regard to the circumstances, would expect to victimise, humiliate, undermine or threaten and which creates a risk to health and safety. Bullying behaviour can be overt and aggressive, it can also be covert behaviour that undermines, treats less favourably or disempowers others. Examples of overt behaviour include: • Abusive, insulting or offensive language; • Behaviour or language that frightens, humiliates, belittles or degrades, including criticism that is delivered with yelling or raised voice; • Teasing or regularly making someone the brunt of practical jokes; • Displaying material that is degrading or offending; • Spreading gossip, rumours and innuendo of a malicious nature.

Violence, assault and stalking are extreme forms of bullying that may constitute a criminal offence and should be reported to the police. Examples include: • Harmful or offensive initiation practices; • Physical assault or unlawful threats. Workplace bullying can also be subtle and may include behaviour such as: • Deliberately excluding, isolating or marginalising a person from normal workplace activities; • Intruding on a person’s space by pestering, spying or tampering with their personal effects or work equipment; • Intimidating a person through inappropriate personal comments, belittling opinions or unjustified criticism. Covert behaviour that undermines, treats less favourably or disempowers others is also bullying. For example: • Overloading a person with work; • Setting timelines that are very difficult to achieve, or constantly changing deadlines; • Setting tasks that are unreasonably beyond a person’s ability; • Ignoring or isolating a person; • Deliberately denying access to information, consultation or resources; • Unfair treatment in relation to accessing workplace. BEHAVIOUR THAT ISN’T BULLYING The following are examples of behaviour that does not constitute bullying:

• Reasonable action taken in a reasonable manner by an employer to transfer, discipline, counsel, retrench or dismiss an employee; • A decision by an employer, based on reasonable grounds, not to award or provide a promotion, transfer, or benefit in connection with an employee’s employment (other than a statutory entitlement); • Reasonable administrative action taken in a reasonable manner by an employer in connection with an employee’s employment; or • Reasonable action taken in a reasonable manner under legislation affecting an employee. EFFECTS OF WORKPLACE BULLYING ON THE VICTIM Workplace bullying may cause extensive health problems for employees exposed to this hazard, including physical and psychological illnesses and injuries. It can impact on coworkers, clients, customers, business associates, family and friends. The reaction of individual employees will vary according to the nature of the bullying. It is possible that employees who are bullied may experience some of the following effects: • Stress, anxiety or sleep disturbance; • Panic attacks or impaired ability to make decisions; • Incapacity to work, concentration problems, loss of self-confidence and self-esteem or reduced output and performance; • Depression or a sense of isolation; • Physical injury; continued page 41 >

40 //SECURITY INSIDER APR/MAY 2010


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:52 PM

Page 41

PEOPLE

• Reduced quality of home and family life; • Suicide. EFFECTS OF BULLYING ON THE ORGANISATION The costs to the organisation include reduced efficiency, unsafe work environment, increased absenteeism, poor morale, workers compensation claims and civil action. Employers can find themselves embroiled in litigation and may be liable for any discrimination, harassment or bullying that is committed by any employee that breaches any of the many pieces of legislation (both State and Federal) dealing with workplace bullying – UNLESS the organisation has taken “all reasonable steps” or done everything “reasonably practicable”, to: • Prevent the discrimination, harassment, or bullying from happening in the first place, and • Resolve, fairly and appropriately, any alleged discrimination, harassment or bullying that is

suspected or known by any line manager or appointed grievance adviser or resolver. Other adverse effects include: • Increased work error rate • Increased workers compensation claims and associated rehabilitation costs and likely increase in your workers’ compensation premium • Low morale • Decrease in the quality of work • Sabotage or other forms of aggressive or destructive behaviour • Loss of reputation/public image • Unnecessary resignations • Wrong employees being appointed, trained and/or promoted, and the best ones being lost/missed • Breakdowns in communication ability and trust • Industrial problems • Internal grievances and external legal challenges.

WHAT THE LAW EXPECTS EMPLOYERS TO DO Decisions of courts, tribunals and commissions provide clear indications of what they believe organisations must do. These include: • Initiating clear, written policies and procedures that explain exactly what is expected from employees in relation to behaviour towards each other, customers, clients and with anyone else employees have to interact with in the course of their work. • Having an equal employment opportunity (EEO) and discrimination policy and an effective bullying and harassment risk prevention policy. • Having a clear, written, grievance procedure, backed by a fair, appropriate and followed counselling and discipline procedure ensuring procedural fairness, confidentiality and record keeping procedures.

“Bullying behaviour can be overt and aggressive, it can also be covert behaviour that undermines, treats less favourably or disempowers others.”

continued page 42 >

SECURITY INSIDER APR/MAY 2010// 41


INSIDER_Apr_May10 Iss2_52pp

14/4/10

10:52 PM

Page 42

PEOPLE

• Providing all employees with copies of policies and procedures including new employees as part of their induction. • Ensuring all your employees understand the policies and procedures and that they have the knowledge and skills to follow them. • Providing training to all employees especially line managers in EEO, diversity, discrimination, bullying and harassment, grievance management and counselling and discipline on a regular basis. Without this in place, not only are you leaving your organisation exposed to justifiable and costly legal challenges, but also your organisation is not getting the best out of its employees. PREVENTING WORKPLACE BULLYING AND HARASSMENT It is legally, morally and financially negligent for employers and line managers not to do everything they can to prevent bullying and harassment. Employers should: • Ensure that the work environment is not conducive for bullies and harassers, and • Take swift and appropriate action to deal with people proven to have bullied or harassed, and • Where necessary, terminate the employment of and/or stop doing business with those who can’t be stopped or who have committed very serious acts of bullying or harassment. All employees should follow simple rules of respect and treat others with unconditional positive regard. All employees should: • Treat others the way they would like to be treated; • Respect and understand others’ values – know who is comfortable with what; • Be particularly careful if behaviours or statements could be construed as sexual, personally invasive, racist, sexist, anti-gay, or stereotyping in any other way; • Be careful of repetition - know when to stop – when others have had enough • Stop doing it if someone indicates they don’t like what you’re doing; and

• Apologise for any hurt or upset that may have been caused; • Don’t do it again, and don’t talk about others in a negative way. Systems Implemented to deter or eliminate workplace should involve: • Policies dealing specifically with bullying and harassment in any form including cyber bullying; • Induction, training and regular refresher training; • Specific management training in procedures for investigating, dealing with and reporting bullying and harassment; • Procedures for continuous review to improve policies and procedures; and • Intervention strategies for management when bullying and/or harassment allegations are made or an incident comes to their attention. • Education for employees in what amounts to acceptable conduct in the workplace; • A risk assessment for workplace bullying and harassment; • An incident management system identifying and reporting on workplace bullying and harassment; • Adequate levels of confidentiality for both alleged bullies and victims during the investigative process. An effective complaints procedure should: • Be simple and easy to follow by employees and managers; • Detail the step by step process by which complaints will be handled; • Contain achievable time limits for each stage of the process; • Guarantee that all complaints will be handled in line with ‘procedural fairness’ principles - that is, with impartiality, fairness, confidentiality, and appropriate protection from victimisation (payback action), and with full provision for all parties to have access to support and/or representation as desired/necessary; • Ensure that people feel safe to come forward for advice, for advocacy, and for a solution to the problem; • Provide details on the way(s) in which grievances can be resolved and actions

• • • •

which may be taken, e.g. by investigation, conciliation/mediation and/or discipline, depending on the seriousness of the allegation. All complaints and actions arising out of investigations should be determined on their individual merits; Identify which resolutions may be expected, e.g. apologies or written warnings or dismissal, and that such resolutions will be imposed fairly and consistently across the organisation; Explain that confidential records will be kept of all incidents ; Provide for an internal appeal system, wherever practical. Give details of external avenues of help and appeal/review. Allow for training of all Managers and employees, as well as opportunities to review the effectiveness of the procedures.

Because of their duties and responsibilities Managers need to be particularly careful to avoid being seen as bullying or harassing employees. They should: • Always treat others with respect; • Avoid any form of preferential treatment; • Allocate work fairly and with regards to an employee’s skill, competence and training; • Concentrate on the requirements of the job, as opposed to the personality of the employee – in other words separate the person from the problem. • Do not over supervise • Attend to problems, employee requests and complaints in a fair and timely manner; • Consult with and consider employee opinions; • Value diversity; and • Create a work environment conducive to honesty. Workplace bullying should not be tolerated and organisations must take steps to ensure policies, procedures and training are implemented in order to, wherever possible, create a workplace free from bullying and harassment and if it does occur to deal with it quickly, fairly and adequately. ªChris Delaney is ASIAL’s Industrial Relations Advisor.

Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you to take no action without prior reference to an Employee Relations professional. ASIAL members can contact Chris Delaney by emailing ir@asial.com.au

42 //SECURITY INSIDER APR/MAY 2010


14/4/10

11:01 PM

Page 43

PROTECT YOUR BUSINESS WITH AON Aon is the leading insurance broker to the security industry, and the broker preferred by the Australian Security Industry Association (ASIAL). We are pleased to offer you a tailored product, SecurAcover, that provides a simple and competitive insurance solution to protect your business. This product is exclusive to ASIAL Members and covers public and products liability with an extension for errors and omissions coverage. If you need to protect your business, talk to Australia’s leading insurance provider today. CALL

1800 806 584 OR EMAIL asial@aon.com.au

Š 2010 Aon Risk Services Australia Limited ABN 17 000 434 720 AFSL No. 241141

RRIS1595 0410

INSIDER_Apr_May10 Iss2_52pp



INSIDER_Apr_May10 Iss2_52pp

14/4/10

11:01 PM

Page 45

INDUSTRY NeWS

LEADING INTERNATIONAL CRIMINOLOGIST TO DELIVER CRIME PREVENTION COURSES As part of Security 2010 (1-3 September 2010), one of the world’s leading criminologists, Professor Martin Gill will present two practical courses. The first course, Understanding Crime and Crime Prevention will draw on interviews in prison with armed robbers, arsonists, fraudsters and thieves to provide participants with understanding of how offenders see the world. It is striking that so much information has been collected on the causes of crime and how offenders behave and yet we have paid so little attention to this within the world of security management. The second course, Security Strategy & Management will review and analyse the difference between good and bad security. It will explain the importance of strategy and how it can be developed. Participants will gain an understanding of the techniques for adding value and ensuring that security is a worthwhile value added service rather than an unwelcome

cost on the bottom line. Martin Gill is the Director of Perpetuity Research and Consultancy International. He is also a Professor of Criminology and for over two decades has been actively involved in a range of studies relating to different aspects of crime and its prevention. In the

past he has studied victims, the police service and probation service and looked at different ways on which the community manages crime (or tries to). For more information on Professor Gill’s courses, visit www.asial.com.au or email events@asial.com.au.

SECURITY INSIDER APR/MAY 2010// 45


INSIDER_Apr_May10 Iss2_52pp

14/4/10

11:02 PM

Page 46

AJC SECURITY

SI. What are some of the innovations

This highlights the level of transparency

drinks per transaction on race days and

introduced and the reasons behind

the Club extends to compliance

two during carnival.This initiative is

them?

authorities and supports increased

designed to combat drink stacking and

collaboration between the venue and

curb rapid alcohol consumption.

SB: Mounted Security - After intense planning and training, the AJC was the

regulatory bodies. Patron awareness / education: In

first venue in the Southern Hemisphere to deploy mounted security patrols as a

Introduction of internally employed

addition to mandatory signage the AJC

preventative measures.The initial

RSA Monitors – In 2008 the club

has erected customised signage at all

deployment of four horses and riders took

launched a comprehensive new

pedestrian entrances and exits. Purpose

place in early March 2010 to support and

Responsible Service of Alcohol strategy.

designed bar runners are in place

assist with the security of the two stable

The strategy is in line with the Liquor Act

displaying RSA messages. Signage at

complexes at Royal Randwick during the

2007 and its associated regulations with

vehicle exits is also in place to discourage

Future Music Festival, which attracted a

an objective of total compliance.

drink driving.

crowd of over 38,000. It is built on four key enablers or factors

Live CCTV monitoring of patron

an additional opportunity to aid in the

that support the achievement of

behavior & crowd movement: An IP

rehabilitation of Thoroughbreds beyond

overarching objectives:

based digital surveillance system has

Mounted Security presents the AJC

their racing career. Horses are selected

been installed to maintain the integrity of

for their personality, temperament,

Staff training: A comprehensive training

Royal Randwick and to monitor all public

physical ability and aptitude. Each horse

package has been developed to ensure

entertainment areas.Trained Operators

and rider has undertaken extensive

all staff are aware of and able to comply

are employed during race days and

preparation for work in the proximity of

with the AJC’s RSA policies, and to

major events to monitor cameras located

large crowds, weather and noise

refresh knowledge and competence in

in bars and lawn areas.The CCTV

conditions as well as vehicle traffic.

light of changes to the Liquor Act.The

system also includes state of the art

The Mounted Security are not used

AJC also recognises the need to build

people counting technology to ensure

as an active force in crowd control or

RSA principles into management

adherence to the AJC’s Place of Public

criminal apprehension, but rather a

practices and daily operations. By

Entertainment (POPE) licence in regard

deterrent with limited patron interaction,

undertaking this, training staff and

to room capacities.

focusing on observation and reporting.

management will be consistent in the

Their introduction has already proven to

operation of AJC premises and the

responsibility to put in place structures

message the Club is delivering to

to maximise their ability, as a business, to

patrons and the community.

comply.Training bar staff and RSA

be a great success with patrons.

As a licenced venue it is the AJC’s

Monitors wasn’t enough, they also

Remote CCTV System Access to the Office of Liquor Gaming and

Self-imposed alcoholic beverage sale

included contracted security personnel

Racing & NSW Police:

restrictions: The AJC restricts alcoholic

in the education sessions.This has

beverage purchases to four alcoholic

ensured that all key parties are able to

Through greater collaboration with relevant regulatory bodies for licensed venues and through support of state government initiatives to curb alcoholrelated violence and anti-social behavior, the AJC has invested heavily in a state of the art CCTV system. Incorporating digital IP based smart cameras and people counting technology, this technology has enabled us to grant compliance authorities unimpeded access to Royal Randwick’s live camera network via the internet.This level of external access was successfully piloted during World Youth Day in July 2008, when the venue hosted over 350,000 guests. In January 2009, the AJC extended the availability of their live CCTV video to the NSW police and the Office of Liquor, Gaming and Racing.

continued page 47 >

46 //SECURITY INSIDER APR/MAY 2010


INSIDER_Apr_May10 Iss2_52pp

14/4/10

11:02 PM

Page 47

AJC SECURITY

deliver on AJC and legal expectations in

clarified expectations and individual

licensed venues (places of public

the areas of appropriate alcohol service,

responsibilities within the broader

entertainment), operational flexibility and

consumption and related behaviour.

strategic plan.

industry longevity.The security operatives require a broad range of skill

Increased Safety Facilitation – A digital

SI. What are some of the more unique

sets to accommodate the diverse types

CCTV System (170) cameras

challenges that you have had to

of events that the AJC hosts, such as

incorporating People Count Technology

respond to?

race days, music festivals, school

in two of Royal Randwick’s grandstands

SB: The outbreak of the Equine

formals, through corporate and social

is now in operation.The cameras allow

Influenza virus in early August 2007

live and retrospective monitoring of

effected race days and events up to

patron numbers / crowd behaviours and

November.The Security and Risk

SI: What are some of the logistics of a

assists in the compliance to the

Department was instrumental in

‘typical’ race day?

allocated patron capacities for areas. In

ensuring that bio-security measures /

addition a duress pendant paging

procedures were adhered to and that

entry on a race day.The entire facility

system has been introduced for all

the integrity of the quarantine zones at

consists of just over two hundred acres.

permanent and temporary bars and

Royal Randwick and Warwick Farm were

The Warwick Farm facility is just over

points of sale - see diagram page 46:

maintained.

three hundred acres. On race days there

gatherings.

SB: Royal Randwick has six points of

This was achieved through liaison

can be up to 120 competing horses.

SI. What are some of the biggest

with the NSW Department of Primary

Both venues have on-course stables

challenges that you have to grapple

Industry and Racing NSW. Customised

(tenancies) which are occupied by high

with?

Bio-security Operational Orders were

profile trainers such as Gai Waterhouse

designed and implemented to enforce

and Bart Cummings.

SB: Achieving cultural change within a sporting club / business that was

quarantine applications.

For example, on the 3rd October 2009 with a crowd of 15,000, there were

established in 1842 and where security SI: What strategies do you have in

100 security personnel and 35 police on

place to ensure quality and

duty. During the course of the day 63

licensed venues, increasing cost and

consistency in service delivery by the

people were refused entry and 59

demanding a more stringent emphasis

licensed security personnel you

evicted. Police issued 35 traffic and 1

to be placed upon compliance.This

employ?

drug infringement.

was not previously given a high priority. Changing legislative requirements for

proactive enforcement can on

SB: We have developed a

occasions have a negative impact on

comprehensive Security Standard

Postcript:

poorly informed patrons.

Operating Procedures manual and

As Security Insider heads for the exit the

training package for both internal and

first of the day’s evictions are being

SI: the large numbers of young

contracted personnel. Likewise, security

escorted off the venue. It looks like

people attending events at the AJC, is

specifications and key performance

another day at the office for Shane and

the issue of alcohol and violence a

indicators were designed and developed

his team. Judging by the sophisticated

major challenge?

to assist in effective contract

and well run security operation that we

management.

saw, the AJC and their patrons are in

SB: The AJC is committed to

safe hands.

providing responsible service of alcohol to our patrons and a ‘zero tolerance’ to

SI: Do you find it difficult to recruit

anti-social behavior.The Club’s RSA

quality personnel?

Strategy outlined earlier, has formed a

SB: Not for internal roles, however the

key part of our approach to this issue.

consistency of skilled security personnel

Key internal policies support the Club’s

supplied by contract providers is often

strategy and include an in-depth Liquor

not achieved. However, our current

Harm Minimisation Plan, Responsible

contractor ACES strives to supply skilled

Service of Alcohol Policy and

staff to our standards.The AJC

participation in Liquor Accords.To

conducts two main recruitment drives

ensure compliance with these policies

each year where RSA Monitors and

and enable the achievement of broader

casual security operatives can apply.

corporate responsibility and harm minimisation objectives, a licenced

SI: What do you look for in a security

venue is reliant on certain key roles.

provider – whether manpower or

Articulating these roles at the AJC – bar

electronic?

staff, RSA monitors, and security – has

SB: Experience at major events and

SECURITY INSIDER APR/MAY 2010// 47


INSIDER_Apr_May10 Iss2_52pp

14/4/10

11:02 PM

Page 48

HOT PRODUCTS

RoboCam R1 body-worn camera system n ValuTronics Pty Ltd > (02) 9626 2000 n Email > info@www.robocamoz.com n Web > www.robocamoz.com

RoboCam is a totally mobile security system comprising of a portable hard drive and headset with a custom made shoulder holster for user convenience. RoboCam is an essential asset for any professional security operative that wants to protect their livelihood. A false allegation could cost an operative their hard earned license and consequently their means to earn a living. RoboCam can ensure that this never happens to you. Every RoboCam unit provides multi-level password protection and frame counters to keep your data tamperproof. The hands free unit enables the user to have an instant record of everything they hear and see.

NEW! NEW!

TS0099 Enhanced IP Interface n Direct Alarm Supplies > (02) 9717 5222 n Email > info@das.com.au n Web > www.das.com.au

more features, lower cost and improved value.

Connecting a Challenger panel over an IP network has never been more affordable. Direct Alarm Supplies and GE Security have released an all-new IP interface module for the GE Challenger Integrated Alarm and Access Control panel.The TS0099 Enhanced TCP/IP Interface supersedes the TS0898 Challenger Ethernet Interface. Benefits of the TS0099 include improved performance, easier installation, and lower cost than the TS0898, ensuring IP connectivity to management software or a central monitoring station that allows the Challenger system to be configured and managed remotely as well as locally, has never been more affordable. Providing IP connectivity to the Challenger V8 panel allows significant savings in cabling by using existing ITinfrastructure, and avoids the cost of site visits via remote management of the Challenger system. Available now from Direct Alarm Supplies.

LAN over Ethernet Module n Inner Range > (03) 9753 3488

Inner Range - Concept System

n Web > www.centralsd.com.au n Web > www.innerrange.com

Inner Range has released a new Ethernet interface that is set to revolutionize the installation options for its Concept 4000 system. The Concept LAN over Ethernet Interface (CLOE) provides a new convenient option for all Concept RS485-based LAN modules to be connected over standard TCP/IP Ethernet networks. Compatible with its complete range of Security, Access Control & User Interface modules, CLOE introduces a vast array of installation possibilities for the Concept System. Now standard Ethernet network architecture including LAN’s, WAN’s, Wireless LAN’s,VPN’s, Intranet and even the Internet can be used to interface RS485 LAN modules back to the Concept 4000 central controller. CLOE employs a master to slave style architecture and can scale from a single master to slave pair, through to multiple masters and multiple slaves within the one network.

48 //SECURITY INSIDER APR/MAY 2010

NEW!


INSIDER_Apr_May10 Iss2_52pp

14/4/10

11:02 PM

Page 49

HOT PRODUCTS

UniGuard Robust Attendance Recorder n ValuTronics Pty Ltd > (02) 9626 2000 n Email > info@www.robocamoz.com n Web > www.robocamoz.com

The UniGuard Robust Recorder system has outstanding value for money, easy setup and almost zero maintenance. A security operator simply passes by and touches a small checkpoint to record beyond any doubt that they attended that area. Cannot be simpler! The UniGuard Robust Recorder will hold over 4,000 events in its non volatile memory, each event holds identification data, date and time accurate to the second.The wand comes with a high power lithium battery, guaranteed to last five years without recharging. It incorporates shock logging. This feature rates impacts to the recorder, storing time of the impact and intensity. The wand is fully watertight, microwave-oven proof and comes with a 25 month warranty.

Hills Reliance VoiceNav

n Direct Alarm Supplies > (02) 9717 5222 n Email > info@das.com.au n Web > www.das.com.au

NEW!

Packed with innovation the Hills Reliance VoiceNav security code pad is a revolution in form and function. Designed in Australia and currently shortlisted in the Final Round of the 2010 Australian International Design Awards. • Advanced Touch Interface – high visual appeal and intuitive to use • End-user Customizable Voice Recording – easy to understand • Intercom Functionality for 8 rooms – keeping family or staff connected • Full backwards compatibility with NX and Hills Reliance It fulfils the need for an aesthetic modern code pad with advanced security and communication features. Perfect for residential and small to medium-sized commercial customers wanting to protect their family, staff, property and assets. Now available in black vertical and white horizontal models. Hills Reliance VoiceNav - The security code pad that appeals to your senses

Hills Video Intercom

n Direct Alarm Supplies > (02) 9717 5222 n Email > info@das.com.au n Web > www.das.com.au

Hills Home Automation and Video Intercom Kocom KCV-D372 7” Videophone • 7 inch Wide Colour Screen Digital LCD • 1 Door Camera and up to 2 Monitors • On Screen Display • Door Open Function • When no signal on image, converts to standby condition • Ultra Low Power Consumption • Can connect door opener to monitor and camera • Long distance wiring : Can install up to 150cm between camera and monitor. • Camera comes with surface mount, flush mount, corner mount, and sun visor accessories.

NEW!

SECURITY INSIDER APR/MAY 2010// 49


INSIDER_Apr_May10 Iss2_52pp

14/4/10

11:02 PM

Page 50

HUMOUR ME

Frank Sales

“An ex-convict told an Indiana judge that he had a full-time job and intended to turn his life around but had slipped when he tried to rob a local bank.”

F

frank sales

lorida sheriff's deputies detained a US Immigration and Customs Enforcement (ICE) agent working undercover, but who had aroused suspicions of members of the public. After investigating, the deputies discovered that ICE agent was protecting his identity by posing as an FBI agent. A two-time convicted bank robber is suing Canada’s National Parole Board, because it released him early from prison in 1987 from a previous sentence. He claims the Board should have kept him inside until that sentence ran out in 1994, and as such it was the Board’s fault that while on parole, he robbed another bank and had again been locked up. If he had served the full sentence, he said, he would have been more mature and would not have re-offended. An ex-convict told an Indiana judge that he had a full-time job and intended to turn his life around but had slipped when he tried to rob a local bank. “If I hadn’t been watching the news and seeing [other successful] bank robberies,” he said, he wouldn’t have been tempted. He was especially impressed by one serial robber, he said, who had made it look easy by vaulting over banks’ counters. NewYork City police believe that a 44-year-old drug-gang hit man shot three men to death in a high-rise apartment, but a woman in the apartment managed to escape when he tripped on his own baggy pants while chasing her. As police arrived, the man climbed out onto the fire escape but accidentally fell and broke his neck. Eight-year-old Mike Hicks is a frequent flier with his mother, and while she is seldom stopped by airport screeners, her son almost always is, because he shares a name with someone on the enhanced-security list that is one level below “no fly”.Ten days after Umar Farouk Abdulmutallab nearly brought down the Christmas day airliner over Detroit, the US State Department officially revoked his visa. Obama Administration officials, seeking to fulfill a campaign pledge of a more open federal government, held a multi-agency training session in Washington, DC, on the Freedom of Information Act.The meeting was closed to the public. The US Justice Department’s Civil Rights Division posted a job announcement in line with current affirmative-action policy, seeking “experienced attorneys” and encouraging “qualified applicants with targeted disabilities” to apply. Legally protected “targeted disabilities” include blindness and “mental retardation”. Applicants for taxicab licenses in Portsmouth, England, were officially informed by the City Council that application forms are available in other languages or in audio, large print, or Braille. A Californian sheriff’s deputy has filed a lawsuit against the Catholic Church and a former priest for the “emotional trauma" he suffered by being propositioned for sex while working undercover.The deputy was patrolling a public park when the priest reached out and touched the officer’s clothed genital area.The priest was arrested and convicted, but the Deputy says he is not yet over the feelings of “anger, rage, disgust, and embarrassment”. A 20-year-old Ohio man convicted of voyeurism, after being caught peeping at a female using the portable toilets at a local fair, has had an appeal rejected. He claimed police had violated his right to privacy with their surveillance. A 23-year-old Bristol, UK, woman was sentenced to 12 months in prison for leading police on a high-speed chase while injecting heroin. An Alabama man was arrested after a high-speed chase during which he allegedly had methamphetamine cooking in the front seat. A long-distance trucker was charged with manslaughter in Buffalo, NY, after his truck hit a parked car, killing the occupant.The trucker was distracted watching pornography on his laptop computer. U TXT U B NXT, eh? Chinese officials announced that Shijiazhuang’s new“women only” parking lot was designed to meet females’“strong sense of color and different sense of distance”.The spaces are one metre wider than regular spaces and painted pink and purple. Attendants have also been “trained” to “guide” women into parking spaces. At last, we understand that really annoying NRMATV ad. We could say more and probably will do so next issue…

50 //SECURITY INSIDER APR/MAY 2010


INSIDER_Apr_May10 Iss2_52pp

14/4/10

11:02 PM

Page 51


INSIDER_Apr_May10 Iss2_52pp

14/4/10

11:02 PM

Page 52


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.