INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:20 PM
SECURITY
Page 1
THE MAGAZINE FOR SECURITY PROFESSIONALS
PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION
[MAG AZINE] VOL.15 | ISSUE.2 | APR/MAY 2010
KEEPING THE SPORT OF KINGS SAFE 45 25
PP255003/02390
SECURITY 2010 1-3 SEPTEMBER, SYDNEY
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:20 PM
Page 2
Telstra Secure Security Monitoring Centre
Customer Premises
Telstra Secure Network
• Telstra Secure
• Telstra Secure CPE
Alarm Receiver
• Third party Alarm System
Telstra Secure the official replacement of Securitel is Telstra’s next generation back to base fully managed private IP monitoring security network. Telstra Secure is a managed and dedicated security monitoring service provided on Telstra’s Next IP & Next G Private Network. Telstra Secure is independently accredited to C3, C4 and C5 of Australian Standards AS2201.5 – 2008 and is the only approved Telstra solution.
The Telstra Secure Network does not rely
The Telstra Secure Network is dedicated for
The Telstra Secure Network is fully managed
on any Public Networks, this means that
secure and reliable security services, this
and supported by Telstra. All key network
all alarm messages never stray outside the
provides the availability required to ensure
components are totally redundant, this is to
Telstra Secure Australian Private Network
that critical alarm signals are delivered to the
ensure that the Telstra Secure Network stays
before they reach the monitoring centre.
monitoring centre without concern that the
at peak performance now and into the future.
network is loaded by other non related traffic. Telstra Secure is now made very simple and cost effective for monitoring centres. To join please contact your Direct Alarms Supplies representative for more information.
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:20 PM
Page 3
Telstra Secure 8 General Purpose Inputs for low level connectivity to any alarm system
Primary GPRS communications path
Three General Purpose Outputs Securitel Equivalent RS232 and
which can be remotely controlled
TTL connection to alarm system for ultimate monitoring PSTN line connection for Ethernet port for local
Securitel Equivalent Analogue,
configuration and diagnostics
Contact ID dial capture and Dialler backup
PSU Battery backup with mains monitoring and battery testing **Image depicts UC351G only
Telstra Secure the official replacement of Securitel is built on Telstra’s next generation of fully managed IP networks. Telstra Secure “Customer Premises Equipment” (CPEs) are the complete modern day communications tool kit; providing an unrivalled level of connection and communication features that maximise third party alarm system compatibility and removes configuration and installation complexities.
Telstra Secure is independently accredited
The unrivalled level of security system
Telstra Secure CPEs are developed in
to C3, C4 and C5 of Australian Standards
compatibility makes Telstra Secure CPEs
Australia and are a modern and powerful
AS2201.5 – 2008 to provide you the
the simple choice for all your security
platform that can continue to be remotely
assurance that you and your customers are
communications needs, allowing you to
upgraded long after your installation is
well protected now and into the future.
focus on supporting the one solution to
completed. This provides you the peace of
minimise installation costs.
mind in an ever changing communications world.
Powerful yet simple, Telstra Secure CPE is now available from any Direct Alarm Supplies branch for your convenience.
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:21 PM
Page 4
CONTENTS 26
VOL.15 | ISSUE.2 | APR/MAY 2010
KEEPING THE SPORT OF KINGS SAFE
12
FAIR WORK OMBUDSMAN’S REPORT SUMMARY
NBN ALARMS SIGNALS
06 | President’s Message
10 | Guide Dogs welcome in all public places
12 | Fairwork dismissal decision gives casuals access to unfair dismissal remedies 14 | ASIAL on the streets of Australia 16 | Call for universities to offer more security programs
4 //SECURITY INSIDER APR/MAY 2010
20
34
PREVENTING ARMED ROBBERY
23 | Security 2010 Conference and Exhibition 36 | Dealing with workplace bullying 44 | ASIAL Certified Security Monitoring Centres 48 | Hot Products 50 | Frank Sales
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:21 PM
Page 5
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:21 PM
Page 6
PRESIDENT’S MESSAGE
ASIAL welcomes the Fair Work Ombudsman report
THE MAGAZINE FOR SECURITY PROFESSIONALS Editorial and Advertising Security Insider is published by The Australian Security Industry
ASIAL welcomes the release this month of the Fair Work Ombudsman’s report into the security industry (National Security Industry Campaign 2009). Over the course of the past six months ASIAL has provided the Fair Work Ombudsman with the opportunity of educating and informing its members through industry events across the country, along with a range of electronic and print publications. Between July and September 2009, the Fair Work Ombudsman targeted 747 businesses for an Australia-wide audit campaign. The most common contraventions identified were non-compliance with time and wage recordkeeping requirements, the incorrect payment of wages, and noncompliance with payslip requirements. Of the 256 audits undertaken and finalised to date, it was found: • 130 (51%) employers were compliant within the scope of the campaign • 126 (49%) employers contravened either the Act or the Regulations. Of these 126 employers: • 66 (52%) had minor contraventions relating to time and wage records and pay slips • 60 /126 (48%) had monetary contraventions relating to underpayment of wages, penalty rates and allowances • 27/126 (21%) had both types of contraventions. One of the key challenges faced by providers of security personnel has been the preparedness of clients (both government and corporate) to award
6 //SECURITY INSIDER APR/MAY 2010
contracts at the lowest possible price (rather than the best value), with scant regard to the professionalism and integrity of the supplier.This approach has encouraged a ‘race to the bottom’ mentality among some. The recently introduced Security Services Award (2010), of which ASIAL was a key driver, will simplify wages and conditions for security personnel nationally. It replaces a significant number of State and Federal awards that were among the most complex of award structures. ASIAL seeks the highest level of compliance among its members and provides an industrial relations advisory service to all members. For more than a decade ASIAL has called for government to introduce a uniform and consistent national approach to the regulation of the industry. An integral component of ASIAL’s approach has been the introduction of a more rigorous and comprehensive compliance regime for security operators. ASIAL fully supports the recommendations of the report and welcomes the opportunity to work with the Ombudsman to address the issues identified in the report.
Association Limited PO Box 1338 Crows Nest, NSW 1585 Tel: 02 8425 4300 • Fax: 02 8425 4343 Email: communications@asial.com.au Web: www.asial.com.au Publisher
Editor Bryan de Caires | security@asial.com.au Advertising Aleisha Rees | advertising@asial.com.au Creative Director Martin Costanzo | martin@webfx2.com.au Graphic Design + Prepress Webfx2 digital | design@webfx2.com.au Editorial Contributors Rod Cowan, Chris Delaney, Erin Louis, Lance Smith Editorial Enquiries Angela Maan communications@asial.com.au Print + Distribution Everedi Press Published bi-monthly Estimated Readership of 10,000 Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL. Advertising does not imply endorsement by ASIAL, unless otherwise stated with permission. All contributions are welcomed, though the publisher reserves the right to decline to publish or to edit for style, grammar, length and legal reasons. Press Releases to: security@asial.com.au Internet
references
in
articles, stories
and
advertising were correct at the time of printing. ASIAL does not accept responsibility for misleading views. Copyright© 2010 (ASIAL) All rights reserved. Reproduction of Security Insider magazine without permission is strictly prohibited. Security Insider is a subscription based publication, rates and further details can be found at www.asial.com.au
[Next Issue] Jun/Jul 2010
Ged Byrnes ASIAL President
ISSN 1442-1720
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:21 PM
Page 7
With Australia’s best surveillance solutions, life’s good. In hotels, homes, corporations, retail chains, airports and casinos, LG provides just the right surveillance solution – and C.R.Kennedy can tailor them to your needs. LG is one of the world’s great electronics companies, creating leading-edge security technology, including DVR’s, cameras and accessories. And C.R.Kennedy matches this quality with total surveillance solutions and a dedicated local support network right across Australia. We bring you the right LG surveillance product at the right price. You are supported by dedicated technical advice from any of our state offices or authorised resellers around Australia and New Zealand. C.R.Kennedy’s fast and efficient service is recognised as the best in the business. Combined with LG’s world-leading technology, life’s good.
Victoria 9823 1533 viccctv@crkennedy.com.au New South Wales 9552 8350 nswcctv@crkennedy.com.au Queensland 3862 6222 qldcctv@crkennedy.com.au South Australia 8410 0533 sacctv@crkennedy.com.au Western Ausralia 9381 7144 wacctv@crkennedy.com.au New Zealand 09 276 3271 cctv@crknz.co.nz Australia www.lgcctv.com.au New Zealand www.lgcctv.co.nz CRK26213IN
INSIDER_Apr_May10 Iss2_52pp
ZZ
14/4/10
10:21 PM
Page 8
Last Month we delivered a HLI for both Milestone and Verint CCTV systems...
At Inner Range Integration is more than just a buzzword!
• View live and historical video directly in the Insight workspace • Drag & Drop cameras onto graphical floor plans • Playback recorded video based on Insight event log time stamps • Send commands to trigger events in the video management system • Associate cameras with objects in the Insight data base (Doors, Inputs, Users etc) • Log intercom calls in Insight Review • Video pop up on intercom activity More information is available from Central Security Distribution
New South Wales Unit 6, 185 Briens Road, NORTHMEAD, NSW, 2152 Phone: 02 8014 2600 Fax: 02 8569 0954
,5 FRQVXP DG LQGG
Queensland Unit 9, 17 Cairns Street, LOGANHOLME, QLD, 4129 Phone: 07 3333 0800 Fax: 07 3020 3862
Head Office - Victoria Unit 6, Nexus Business Park, 35 Dunlop Road, MULGRAVE, VIC, 3170 Phone: 03 9946 3200 Fax: 03 8612 3656
Distribution Centre - Tullamarine Victoria 22 Mallet Road, TULLAMARINE, VIC, 3043 Phone: 03 9001 1900 Fax: 03 8610 2106
South Australia 21 Grove Avenue, MARLESTON, SA, 5033 Phone: 08 8468 8400 Fax: 08 8219 0181
Western Australia Unit 1, 1 Natalie Way, BALCATTA, WA, 6021 Phone: 08 6465 1500 Fax: 08 9238 1303
$0
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:21 PM
Page 9
This month we’ve delivered again with a High Level Interface to Jacques & Genetec
Insight Professional Management software for Concept 4000 security hardware currently supporting HLI’s to many CCTV brands with more being added continually.
,5 FRQVXP DG LQGG
$0
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:21 PM
Page 10
INDUSTRY NeWS
RETAIL REMEDY WITH FIRST PINLESS ANTI-THEFT TAG ADT Security has released the Sensormatic Ultra•Tag® PT, its first secure, pinless anti-shoplifting tag. Designed with an adjustable spring-loaded metal clip, the anti-theft tag easily attaches to products without penetrating any material.The clip compresses firmly onto merchandise, closing tightly enough to prevent unauthorised removal without damaging items. Its onepiece design allows it to be more easily applied and removed at the checkout counter.
GUIDE DOGS WELCOME IN ALL PUBLIC PLACES AND VENUES Over the last year there have been a number of incidences where Guide Dogs and their owners have been disallowed entry into venues. To prevent this from continuing, Guide Dogs NSW/ACT encourages security personnel to work with people with impaired vision and better understand the best way to assist them. People using a guide dog in harness can legally enter all public places, including restaurants, pubs, clubs, cafes, shops, supermarkets, shopping centres as well as taxis, public transport and hospitals (patients and visitors). Guide Dogs undergo extensive assessment and training in wide variety of environments before they are placed with a person with impaired vision. However there are some guidelines you should follow to assist a Guide Dog and its owner. Guide Dog Etiquette: • When you see a guide dog in harness, it means they are working and you should not pat, feed or distract it in anyway. A guide dog is not a pet; it is there to help the person with impaired vision to move around safely and independently. • There are various ways security personnel can assist people with
10 //SECURITY INSIDER APR/MAY 2010
impaired vision when they enter a venue. This includes assisting people to get to their destination, giving directions and maintaining safety. • There is no way to know if a person with impaired vision needs help. The best option is to just ask them. • Always ensure you provide clear directions from the perspective of
other person (eg. When you say “right”, refer to “their right”) For more information visit www.guidedogs.com.au To request a FREE COPY of the “Working Together - Strategies for assisting people with impaired vision” DVD or information about free training for security personnel call (02) 9412 9300.
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:21 PM
Page 11
Did you
know?
Dedicated Micros has introduced its latest innovation
HYBRID
Combining powerful high-end server and IP features with ease of use and install
• Hybrid DVR - Analogue & IP Camera Connections
• On-screen telemetry control with Point&Go and Absolute Positioning
• Real-time recording per camera
• On-board Help Videos
• Composite and enhanced XVGA main monitor outputs
• Up to 3TB on-board storage
• Direct Configuration of Oracle Domes & Infiniti Cameras • Control multiple monitors with its remote monitor capability
• Front Panel Control • Use NetVu Console to control several units from the same keyboard • Bespoke graphical map presented on the local monitor screen for easy navigation
• AnalyticsCapable
Tel: +612 9634 4211 Email: dmaustralia@dmicros.com Master Licence 404588736
www.dedicatedmicros.com/sdadvanced
*Available through all major distributors and direct in applicable regions. ©Copyright AD Group 22/02/10
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:21 PM
Page 12
INDUSTRY NeWS
FAIR WORK DECISION GIVES CASUALS ACCESS TO UNFAIR DISMISSAL REMEDIES Fair Work Australia has clarified the circumstances in which casual employees can qualify for protection from unfair dismissal under the new Act. Under the Act employees must have served a six-month period of employment to qualify for protection from unfair dismissal and provides that, for casuals employment must have been regular and systematic and the employee must have had a reasonable expectation of continuing to work on that basis. As a consequence, while under the old Act there had been a focus on establishing whether an employee was a casual, the focus is now on whether the employee was employed regularly and systematically. The Fair Work Act also requires employees to have a reasonable expectation of continuing employment during the "period of service", rather than
12 //SECURITY INSIDER APR/MAY 2010
at the point of termination as under the old Act. On the "regular and systematic" requirement, FWA said it applied to the employment itself and not to the hours or days of work the employee performed. The Commissioner said "the fact that an employee works more hours in one week or one month than another and the fact that an employee might have variable start and finish times is not conclusive evidence of irregular, occasional, or nonsystematic employment or engagement,". The guiding principles are (according to the Commissioner): • If the number of hours worked is small and the gaps between days and times worked is long and irregular, this means that there needs to be other evidence that the employment of a casual is regular and systematic; or • Conversely, if there is a clear pattern or a roster for the hours and days worked
then this would be strong evidence of regular and systematic employment. Or, in the absence of evidence of regular and systematic employment can be established where: • The employer regularly offers work when suitable work is available at times when the employer knows that the employee has generally made themselves available; and • Work is offered and accepted sufficiently often that it could no longer be regarded as simply occasional or irregular. Such evidence indicates regular and a systemic employment and a reasonable expectation of continuing employment. The Commissioner found that a casual employee working full-time hours over a lengthy period would also have strong evidence of regular and systematic employment.
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:21 PM
Page 13
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:21 PM
Page 14
INDUSTRY NeWS
Alexandria, NSW
Sydney Harbour Bridge
Perth
Brisbane
Cremorne, NSW
Crows Nest, NSW
C. Luhrmann: SIA Security, Qld
Crows Nest, NSW
ASIAL’s latest awareness campaign has kicked off for 2010. Following our initial newsbreak advertisements across 110 regional Australian radio stations, ASIAL’s clear eye-catching branding can now be spotted on taxi backs across Adelaide, Sydney, Brisbane and Perth. Taxi backs can be found across 1105 taxis in Brisbane (Airport, CBD, Inner West, North Shore, Southern Suburbs, Eastern Suburbs), Sydney (Airport, CBD, North Shore and Eastern Suburbs), Adelaide (Airport, CBD and all suburbs) and Perth (Airport, CBD and all suburbs). Melbourne is also included in the campaign where ASIAL branding will be splashed on trams across the city. Alexandria, Sydney
T. Pierce: Brink’s Australia Alexandria NSW
B.T. Howells: Suncorp Neutral Bay NSW
14 //SECURITY INSIDER APR/MAY 2010
Sydney, NSW
Melbourne, Victoria
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:33 PM
Page 15
INDUSTRY NeWS
H. O’Sullivan: Nationwide Advertising, Sydney
C. Jobben: Seadan Security, Newstead, Qld
ASIAL ON THE STREETS OF AUSTRALIA A.Thomas: Best Security Pty Ltd Geebung, Qld
Brisbane Airport, Qld
T. Pierce: Brink’s Australia, Alexandria NSW
SECURITY INSIDER APR/MAY 2010// 15
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:34 PM
Page 16
INDUSTRY NeWS
CALL FOR UNIVERSITIES TO OFFER MORE PROGRAMS IN SECURITY MANAGEMENT AND ADVANCED SECURITY OPERATIONS
Long-standing history.
With a rock-solid future. FlexSecur provides customers with the highest level of security cards and readers.
A study (Tertiary Education in Security and Policing in Australia – Asian Criminology (2010) 5:1-10.) into the current status of police and security education in Australian universities and technical colleges has found that police studies had a significant profile in universities, but virtually not profile in technical and further education colleges (TAFE). Conversely, protective security offerings were prominent in the TAFE sector than in universities. Acknowledging the fact that private and public sector security services have eclipsed police in numbers in many jurisdictions, the report argues that security should be counted as an equal partner with police in crime prevention services. In addition, the report argues that those engaged in security management should be given greater opportunities for study at the university level. Moreover, security studies should have an expanded research focus.
R
FlexSecur can be used with any access control panel because the security is between the card and reader, and is transparent to the panel. FlexSecur converts even common and frequently duplicated formats such as 26-bit Wiegand, into customer-specific, unique, secure formats where readers and cards are non-interchangeable with those from other systems.
GET YOUR FREE COMPANY WEB PAGE ON THE ASIAL WEBSITE
R
R
16 //SECURITY INSIDER APR/MAY 2010
A growing number of members are utilizing their FREE new ASIAL member benefit – a company webpage on the ASIAL website.The webpage allows ASIAL members to upload their own logo, images, video and product/service information into a web page with a dedicated URL. The new web page will be available in two different templates and four colour schemes. If you haven't already done so, sign up at www.asial.com.au now to get started today.
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:34 PM
Page 17
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:34 PM
Page 18
INDUSTRY NeWS
RAISING INDUSTRY STANDARDS ASIAL MEMBERS are reminded that membership of the association requires adherence to the Association’s Code of Professional Conduct.The Code exists to promote higher levels of professionalism within the membership across all sectors of the industry. When breaches of the Code are identified, the Association has procedures in place to address them. A copy of the Code is included below:
4.
5. ASIAL CODE OF PROFESSIONAL CONDUCT 1. Members shall conduct their professional activities with respect for the public interest. 2. Members shall at all times act with integrity in dealing with clients or employees, past and present, with their fellow members and with the general public. 3. Members shall not intentionally disseminate false or misleading
18 //SECURITY INSIDER APR/MAY 2010
6.
7.
8.
information, whether written, spoken or implied, nor conceal any relevant fact.They have a duty to maintain truth, accuracy and good taste in advertising and sales promotion. Members shall not represent conflicting or competing interests except with the express consent of those concerned given only after full disclosure of the facts to all interested parties. Members shall refrain from knowingly associating with any enterprise, which uses improper or illegal methods for obtaining business. Members shall not intentionally injure the professional reputation or practice of another member. If a member has evidence that another member has been guilty of unethical practices, it shall be their duty to inform the Association. Members shall help to improve the
body of knowledge of the profession by exchanging information and experience with fellow members and by applying their special skill and training for the benefit of others. 9. Members shall refrain from using their relationship with the Association in such a manner as to state or imply an official accreditation or approval beyond the scope of membership of the Association and its aims, rules and policies. 10. Members shall cooperate with fellow members in upholding and enforcing the code.
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:34 PM
Page 19
NSW
VIC (02) 9897 7722
Rowville
(03) 9755 6922
Torrensville
Rosebery
(02) 9698 9698
Coburg
(03) 9383 2066
WA
Chatswood
(02) 8467 1467
QLD
ACT
www.das.com.au
SA
Granville
Fyshwick
(02) 6280 9630
Balcatta
Molendinar
(07) 5597 7203
TAS
Bowen Hills
(07) 3252 5512
Hobart
(08) 8150 9400 (08) 9241 3100 (03) 6272 0211
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:34 PM
Page 20
BROADBAND NETWORK
NBN SIGNALS ALARM ASK NBN CO LIMITED, THE SEEING
ORGANISATION RESPONSIBLE FOR
the National Broadband Network become a reality,
what consideration has been given to existing monitored security systems and the response is short, simple and…well…not exactly enlightening. “We are currently in the design phase of our network and have nothing to say at the moment on this issue,” says an NBN Co spokeswoman. The Minister for Broadband, Communications and the
“NBN Co technical specialists are aware of the requirements of legacy services and are factoring these requirements into the network design.” The fact is, ASIAL representatives met before Christmas with NBN Co’s senior technical staff to outline industry concerns. “Whilst the industry is keen to embrace the opportunities proposed under the National Broadband Network roll-out, there are genuine concerns about vital
Digital Economy, Senator Stephen Conroy’s office has a
legacy services such as security and alarm panels,
little more to say on the matter.
medical and health monitoring systems, duress systems,
“The Government recognises that there are a range of analogue legacy services used by Australian consumers and businesses currently supplied over the copper public
fire panels and help point systems,” says ASIAL’s CEO, Bryan de Caires. “With over 1 million of these systems currently in use,
switching telephone network, which will need to be
this represents a significant issue for those individuals
supported over the digital optic fibre National Broadband
and organisations that rely on the security and safety
Network,” Senator Conroy’s spokesperson said.
services provided. Failure to provide a transitional
“The migration of legacy services is an issue being investigated as part of the NBN Implementation Study.
mechanism to ensure an orderly transition of legacy systems following the roll-out of the National Broadband
> 20 //SECURITY INSIDER APR/MAY 2010
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:34 PM
Page 21
BROADBAND NETWORK
When it comes to the National Broadband Network, the people touting it as the biggest infrastructure project in Australian history, finds Rod Cowan*, have little to say when it comes to alarms.
Network may place the owners of over 1 million security,
AS2201.5 defines the performance requirements of
fire and health systems at risk.”
alarm systems, which include:
Concerns have already been raised that the cost of
o The need to report any attempts to tamper with
connecting new houses to the National Broadband
the alarm transmission system. As the ONT
Network will deter developers and drive first home buyers
(Optical Network Terminal) will now be part of the
out of the market. For example, the Housing Industry
alarm transmission system, interference with the
Association (HIA) in Tasmania has warned it will cost an
ONT could potentially prevent the alarm system
extra $3,000 to $5,000 per home to connect to the $43
from reporting, or could be used to ‘subvert’ the
billion fibre-optic network, on top of existing infrastructure
system.
levies for water and sewerage.
o In the event of mains power outage, to allow
Cost is also high on ASIAL’s agenda.
systems to continue to communicate with
“One of our primary concerns is that if, as a result of
monitoring centres, AS2201.1:2007 calls for 16
the National Broadband Network roll-out, CPE equipment
hour battery backup. If, as has been proposed,
has to be replaced or re-configured, this will represent a
the service provider needs to monitor the ONT’s
significant cost impost on individual and business users,”
backup battery, then a mechanism needs to be
says de Caires.
provided to alert the monitoring centre of ONT power failures or faulty batteries.
ASIAL also put forward some specific issues, including: • Compliance with Australian Standards: AS2201.1 –
o The ONT port used for security has to be monitored for physical or electrical tamper
SECURITY INSIDER APR/MAY 2010// 21
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:34 PM
Page 22
BROADBAND NETWORK
attempts. When detected, these need to be reported to the security service provider. • PSTN emulation: many alarm systems monitor the phone line voltage expecting to see a nominal 48 volt feed. It is an essential requirement that the ONT provides the right feed voltage to avoid the situation whereby the alarm system constantly reports a PSTN line fault. • NBN network upgrade: There is the potential for the ONT to remove feed voltage during a network upgrade. This can result in alarm panels reporting PSTN faults, not to mention a system beeping an alert, waking customers in the middle of the night. • Remote configuration via low-speed dial-up modems: large proportion of alarm systems deployed in commercial applications support remote configuration via low-speed dial-up modems (speeds < 2400 bps), which will need to be supported over the NBN. • Network performance: as the telephony service over the NBN will be supported by multiple network
“NBN is another step in the changing communications world and another change in the traditional reporting of alarms,” says Kiely. “We know the NBN is coming and equipment
providers, standards for telephone services are
manufacturers can — and no doubt will — develop an
essential to ensure that signalling requirements of
interface from the alarm panel to the network to transmit
legacy alarm system are supported.
security information.”
The end result of the discussions? “Whilst acknowledging our issues, the position of the
That has certainly been the case with other IP developments with a range of options appearing on the
NBN Co Limited was that it is beyond their remit to
scene, such as Fratech Multipath, Emizon, and Telstra
provide specific leadership or direction to address these
Secure.
challenges. Rather, the appropriate forum for ASIAL to
The adoption of IP based services — alternative
address these issues would be to work with the
signalling paths, as they are often referred to in the trade
Communications Alliance,” says de Caires, who adds he
— has nonetheless been messy and at times downright
has written to the Communications Alliance
confusing for installers and consumers.
(CommsAlliance). A copy of the CommsAlliance’s response is available on the ASIAL website. “We are awaiting a response from CommsAlliance,” says de Caires. The problem, he adds, is that security is only a very small focus when it comes to the NBN. It is a viewed shared by Neville Kiely, chair of ASIAL’s
Part of the problem is that people within network providers responsible for rolling out new products, such as VoIP, are largely unaware of the effects on legacy systems. When one major telco switched to VoIP in a regional area of NSW, alarms systems simply stopped working. Then there is the lack of collaboration — and at times outright hostility complete with vicious infighting, legal battles and allegations of fraud — on the part of
National Electronic Security Special Interest Group,
manufacturers competing for dominance in what has to
though he breaks it down to bits and bytes.
be said is a very small piece of the pie in the technology
“We are not very popular with network operators, because we only send small amounts of data and don’t
world. The challenge facing the industry, and ASIAL as its
generate huge revenues,” says Kiely.“But, delivery of what
representative, will be to create some coherence within
we do send is absolutely critical.”
the industry, then to convince the policy wonks and tech
Kiely is, however, cautiously upbeat.
heads in the backrooms of network providers that security continued page 24 >
22 //SECURITY INSIDER APR/MAY 2010
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:34 PM
Page 23
INDUSTRY NeWS
KEEP AHEAD OF YOUR COMPETITORS WITH THE LATEST IN SECURITY TECHNOLOGY Australia’s leading security industry event, Security 2010 Conference & Exhibition, will be held at the Sydney Convention & Exhibition Centre from Wednesday 1st to Friday 3rd September, displaying the latest advances in access control, theft protection, system integration and IP technology. Across three action-packed days, the Security 2010 Exhibition, which is supported by ASIAL, will bring together leading Australian and international manufacturers, suppliers, providers, industry experts and end users to connect and explore the unique challenges and opportunities facing today’s Security industry. The Exhibition will feature over 140 exhibitors, with leading brands such as Bosch, Hills, Sony, Dedicated Micros, Suretek Global, ADI Global Distribution, Sanyo and Axis Communications. It goes without saying that technology and development are vital to the success of the Security industry and, in the current IT-driven climate, it’s never been more important to stay
INSIDER Dec08 Iss6_56pp
27/11/08
9:29 PM
ahead of your competitors. If you belong to the security trade, or are involved in making critical security decisions, the Security 2010 Exhibition presents an invaluable opportunity to immerse yourself in every aspect of this vital, evolving industry. The Security 2010 Conference, organised by ASIAL in conjunction with DEA will be run alongside the Exhibition on Thursday 2nd and Friday 3rd
September. The Conference will include international presentations, case studies, panel discussions and workshops featuring international and local industry specialists, offering insight into the latest challenges and innovations affecting the security industry in Australia. Turn innovation into a competitive advantage at the number 1 industry event, Security 2010. For further information visit www.securityexpo.com.au
Page 1
SECURITY
SECURITY NEWS 24/7
THE MAGAZINE FOR SECURITY PROFESSIONALS
PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION
[MAG AZINE] VOL.13 | ISSUE.6 | DEC08/JAN09
+
To subscribe email security@asial.com.au
37 25
PP255003/02390
ASIAL 40th Celebration, 30 April 2009, Crown Casino
industry magazine
high traffic website
SECURITY INSIDER APR/MAY 2010// 23
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:34 PM
Page 24
BROADBAND NETWORK
may be a very small part of the picture in terms of
• engaged Nextgen Networks to rollout almost 6000 km
numbers, but for the victim of a missed medical alert or
of new fibre optic backbone links, as part of the
hold-up alarm gone astray, the effect could be
Government’s $250m investment in the Regional
catastrophic.
Backbone Blackspots Program to connect over 100
And,“having nothing to say on the issue”, if all the warning signals have been strong and clear, will not cut it.
regional locations along the routes to the six priority areas of Geraldton, Darwin, Emerald and Longreach, Broken Hill, Victor Harbor and South West Gippsland
What is the NBN?
• introduced legislation to improve competition in the
The Company line
telecommunications sector, including during the
NBN Co (www.nbnco.com.au) says it “plans to deliver
transition to the full NBN rollout, which was passed by
fibre-based coverage with speeds of 100 Megabits per
the House of Representatives and is before the Senate
second to 90% of premises in Australia, subject to final
for consideration
design. “Premises in areas that cannot be serviced economically by fibre will be connected by advanced
• received an extremely strong response to the regulatory consultation process and progressed legislative changes that will govern NBN Co.”
wireless technology providing speeds of 12 Megabits per second, subject to final design. “Where geographic location impedes the ability to
Dissenting voices When opposition leader, Malcolm Turnbull claimed: "This
provide either fibre or advanced wireless connectivity, NBN
makes the Whitlam era look modest and unassuming".
Co plans to provide like connectivity through satellite
Turnbull compared the project to the failed Sydney cross-
technology, delivering 12 Megabits per second, subject to
city tunnel and said that this time Australian taxpayers are
final design.”
taking the risk and wearing the loss.
The Government view
bandwidth potential already out there ready to be
The Australian Government (www.minister.dbcde.gov.au)
switched on and future potential in Wireless technology,
announced on April 7, 2009, it would “establish a new
where the greatest demand exists – for "Everywhere
company NBN Co Limited to invest up to $43 billion over
Access" If the Government pursues the Fibre to the
eight years delivering superfast broadband to Australian
Premises plan, expect to be using Fibre for your Christmas
homes and workplaces.
decorations in 10 years.”
www.nonbn.org says: “There is already ample
“To turn its vision into action the Government has: • already invested $60 million of an initial $4.7 billion investment in the company • progressed a detailed implementation study (due to
The Australian newspaper (March 22, 2010) reports: “KEVIN Rudd is believed to have told Communications Minister Stephen Conroy to come up with a strategy within two weeks to take the heat out of the political crisis
report to Government in February 2010, but yuet to be
building up around the government's $43 billion national
released) by a consortium of McKinsey and KPMG to
broadband project.
inform the company's operating arrangements, detailed
“Canberra sources said the directive followed a ‘difficult’
network design and ways to attract private sector
meeting between Rudd and Conroy after the Prime
investment
Minister was shown a copy of the controversial $25 million
• established NBN Tasmania Limited as a subsidiary of NBN Co to build and operate the NBN in Tasmania— construction of the rollout has commenced and the first 10 Tasmanian communities to receive superfast
implementation study into the development of the national broadband network. “In a nutshell, it already has a ring of the home insulation fiasco about it.”
broadband were announced
As mentioned in the last issue of Security Insider (Vol.15 | Issue.1 | Feb/Mar 2010), ASIAL sent a letter the NBN Co Ltd outlining the industry’s concerns of the NBN rollout. A response has been received from Anne Hurley Chief Executive Officer NBN Co Ltd.To view both letters in full, please visit www.asial.com.au
24 //SECURITY INSIDER APR/MAY 2010
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:42 PM
Page 25
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:43 PM
Page 26
PHOTO: COURTESY: AJC
AJC SECURITY
26 //SECURITY INSIDER APR/MAY 2010
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:43 PM
Page 27
AJC SECURITY
KEEPING THE SPORT OF KINGS SAFE Royal Randwick, home to the Australian Jockey Club (AJC)
three years the Club has established a highly skilled and
is a sprawling expanse of land covering 200 acres of prime
experienced in-house security team, backed up by
Sydney real estate. While the venue has been synonymous
contracted private security personnel (including mounted
for over a century with horse racing, it may come as a
security), police and a state of the art CCTV system.
surprise to some that it also plays host to numerous
From unruly patrons at a typical race day meeting, to
functions, exhibitions, music festivals and special events over
young fans at music festivals, through to the mass celebrated
the course of a year.
by Pope Benedict as part of World Youth Day before an
Established in 1842, the AJC is Australiaâ&#x20AC;&#x2122;s oldest thoroughbred racing club. Unsurprisingly, for many years security was not a high priority. However, in 2007 this all
audience of over 300,000 and the 2007 outbreak of Equine Influenza, Shane and his team have (almost) seen it all. In 2007, the Club took the decision to bring its security
changed when the club embarked on a major overhaul and
function in-house, with the appointment of Shane Brady as
upgrade of its security operation and facilities. Over the past
Security and Risk Manager. continued page 28 >
SECURITY INSIDER APR/MAY 2010// 27
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:43 PM
Page 28
AJC SECURITY
PHOTO: COURTESY: AJC
PHOTO: ANGELA MAAN
As the man tasked with revamping the Club’s security operation, Shane has almost 20 years experience in the security and risk industry. He has been the driving force behind many of the innovative security measures introduced at the Club. In his previous roles he worked as a Security Manager with Westfield Ltd, a Paratrooper in the Australian Regular Army and a range of internal and external roles within organisations across Australia and Asia. He is a licensed Security Consultant and holds formal qualifications in security and risk, and occupational health and safety. This has enabled resource requirements
Since 2008, Shane’s Assistant Security and Risk Manager has been Dennis
and budgets to be stratified, whilst
Mitchell. Dennis brought with him to the
ensuring that high priority, high risk aspects of existing systems and practices
position, over 20 years experience gained in the Australian Regular Army, including active service in Somalia and East Timor. In his role he has been instrumental in the implementation of a range of security initiatives, from Mounted Security to the development of KPIs for the
are addressed with appropriate urgency to ensure the protection of assets, people and reputation.The AJC is the only thoroughbred horse racing club in Australia to have a dedicated internal security department.
Club’s contract security provider. To gain an insight into how the AJC’s security function
SI: How has the AJCs approach to security changed over
operates, Security Insider spent a day at the races.
the past decade?
SI: What is the AJC’s approach / philosophy towards
security department or strategy, the Club relied upon some
security – a necessary cost of business or important
external consultation and a contracted guard force for asset
business enabler?
protection, events and race days. Over the past three years, a
SB: Prior to July 2007 the AJC did not have a dedicated
SB: A strategic, staged approach was adopted in the
staged approach to the improvement and enhancement of
development of a robust Security Framework for the
the Club’s security operation has been implemented (refer to
Australian Jockey Club (Royal Randwick & Warwick Farm).
a staged apporach to change).
28 //SECURITY INSIDER APR/MAY 2010
>
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:43 PM
Page 29
AJC SECURITY
PHOTO: ANGELA MAAN
“In 2007, the Club took the decision to bring its security function in-house, with the appointment of Shane Brady as Security and Risk Manager.”
continued page 30 >
SECURITY INSIDER APR/MAY 2010// 29
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:44 PM
Page 30
AJC SECURITY
A STAGED APPROACH TO CHANGE Stage 1: July 2007 - Recruitment of a suitably experienced and qualified Security & Risk Manager
security prevention and other operational benefits such as crowd congestion management through people count technology.This system plays a major role in the harm minimisation requirements of the AJC by vastly
This stage incorporated a complete assessment
improving crowd management capabilities.
of the AJC’s security and compliance measures.The implementation of programs to
Stage 2: July 2008
bridge identified shortfalls in incident & emergency management preparedness,
Recruitment of a suitably qualified and
procedural, physical and electronic security
experienced Assistant Security & Risk
ensued.
Manager and Asset Protection Team to increase the supervision of contracted security employees.
In stage 1, the review included: • Cash Related Risk Review was conducted in August 2007 for both facilities • Physical and electronic upgrade of the Cash Storage facilities at both facilities • Terrorist Threat Risk Assessments for both facilities were completed in August 2007 • An Evacuation Exercise was conducted in November 2007 and as a result a training needs analysis was developed • Royal Randwick’s and Warwick Farm’s critical infrastructure
Stage 2 inclusive of, but not limited to: • Stage 3 & 4 of the CCTV installation • Re-keying of the Royal Randwick facility due to the existing compromised master key systems • Introduction of an electronic master key system and electronic storage.The implementation of these systems enables control measures (access levels, remote deactivation etc) to ensure that the system cannot be compromised.
was identified plotted and emergency shutdown procedures
• Installation of a duress pendant system
were developed
• Upgrade of the facilities perimeter security
• Comprehensive Perimeter Audits were conducted at both facilities (completed annually) • A training program in Armed Robbery Awareness / Survival commenced on the 1st December 2007 • An incident reporting template was developed in July 2007
• Upgrade and enhancement of the AJC RSA & Harm Minimisation Plan (inclusive of training) • Design and introduction of a Risk Management Plan • Developed a Occupational Health & Safety compliance process incorporating;
and the creation of an electronic program was completed in
• Contractor inductions
January 2008
• Workplace inspections
• Internally employed Responsible Service of Alcohol Monitors commenced on the 1st December 2007 • Contract Security Specifications and Key Performance Indicators designed and developed • Business Continuity Plan and Alternate Operating Procedures designed and developed
• Rectification process of identified hazards • Risk Register • Hazard Register • Enhance the AJC’s Incident & Emergency Management Preparedness • Staff Training & development
• Risk Management Plan designed in June 2008
• Event Emergency Management Briefs
• Physical Security Gap Analysis
• Emergency Services Access
• Strategic Security Plan
• Failure to Quit Licensed Premises Procedure
• Emergency Response and Contingency Plan
• Bomb Threat • Risk Review of Equine Pool Operations
Procedural development: Cash in Transit, Cash Delivery / Pickup, Bomb Threat, Suspicious Mail Handling, Automated External Defibrillator, Amusement Device Approval, Lost Property, School Formal / Graduation Conditions, Lost / Found Child. CCTV Installation Stage 1 & 2: The Place of Public
• Design and deliver an Emergency Evacuation training program • Kitchen Localised Critical Infrastructure Shutdown Procedures • The design and implementation of the racing carnival and
Entertainment (POPE) licence required the AJC to adhere to the
major event Security & Risk Handbooks inclusive of Risk
pre-determined room capacities within the stands.The CCTV
Assessments customised to incorporate the associated
system provides this requirement. Concurrently it provides
threats. continued page 46 >
30 //SECURITY INSIDER APR/MAY 2010
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:44 PM
Page 31
SECURITY IN MIND
Protection is as much about securing the hearts and minds of security staff, as it is about pay and conditions, finds Rod Cowan*
SECURITY IN MIND Walk into any building with security, say an airport or high-rise office block, and security will greet you in a number of ways. Some will be rude, aggressive, or appear bored and uninterested. Others take a lively interest in your needs, engage in conversation while waiting, and offer assistance to get you where you want to be. Invariably, they will have the same (some would argue low) pay and conditions. So, where does the difference lie? It’s not all about money According to Professor Richard Wiseman, author of :59 Seconds – Think a Little Change a Lot, contrary to popular belief, the promise of reward does not, in fact, motivate people. In studies where children were offered medals for drawing, they drew less than other children who were offered no reward. The thinking went, because adults only offer rewards for activities which children do not like doing, they figured they must not like drawing. As for rewards for activities that people do not like doing, Wiseman ran an experiment where people were asked to spend an afternoon picking up litter in a park. Some were paid handsomely for their time and others received a small amount of cash. When asked about how much they enjoyed the experience, the people being paid small amounts enjoyed themselves more. “These findings have been replicated time and again in studies. Almost regardless of the nature of the rewards or tasks, those who are offered a carrot tend not to perform as well as those who don’t expect to receive anything. Some of the studies have shown short-term boosts in performance, but over the long haul rewards tend to destroy the very behaviours they are designed to encourage,” says Wiseman. So, if rewards don’t work, what does? “When it is something they don’t enjoy, a realistic, but not excessive, reward is effective at the start, followed by feelgood comments that encourage them to pursue the activity,”
SECURITY INSIDER APR/MAY 2010// 31
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:44 PM
Page 32
SECURITY IN MIND
says Wiseman. Perhaps one of the toughest security jobs, especially in terms of dealing with a constant stream of people, not all of whom are pleased to be dealing with you, is aviation security. Professor Robert Bor, an internationally recognised aviation psychologist, acknowledges the job can be boring, monotonous and stressful, yet says it is important for security personnel to have an “empathetic understanding” of the public they are dealing with. Though there is a good deal of training and classroom discussion about dealing with the public, it does not always translate to action on the job. “In real life, a lot of that is either forgotten or, because of the pressures of the job and sometimes, let’s be honest, the monotony of the job, the desire to treat the passenger as a person and understand some of their worries, fears and antagonisms, seems to fall by the wayside,” Bor told Security Insider. As for solutions, Bor says:“Clearly, working as part of a team is important. When we are on our own in these safety and security situations, tensions tend to rise.” Ensuring the people you are dealing are provided information helps, too. “Now, that won’t be the antidote to all the problems, but if passengers have a clearer understanding of what we are doing, what the procedure involves and why we need to do it, they may be more accepting of the process,” says Bor. Recognise, as well, the dynamics of dealing with people, especially if physical contact is required. “As soon as you have personal or eye contact with someone, you enter into a relationship with that person. Not a real relationship. But, at that moment, you are relating,” says Bor. “If things are done carefully, sensibly, and with a smile, you are likely to gain cooperation. Personalise it.That’s always the best way to take it forward.” Ultimately, it all comes down to professionalism, which has a lot to do with those in charge. “The management and leadership of security personnel is crucial,” says Bor. “If we look at it historically, typically these are low paid workers, many of whom who have not had clear career structures, who frankly do quite a repetitive, sometimes, monotonous job, and we
Professor Robert Bor *Rod Cowan is an independent contributing editor and can be contacted at mail@rodcowan.net.
32 //SECURITY INSIDER APR/MAY 2010
demand really huge skills and accuracy from them. “All that is really a recipe for either confusion, sometimes disgruntlement, etc,. I think there are ways we can remedy that. “The first is to make sure that it is seen in many ways as a professional activity that is well supported. “The next is to make sure that training is thorough, consistent, and updated as well, because when they are taken out into a classroom situation to upgrade their skills, to debrief, perhaps to move to a more senior supervisory role, you may get a more interested, engaged, and motivated person on the receiving end.” Much of the current training, he says, is too focused on specifics, such as what prohibited items to look for in bags, whereas the focus should be about looking at the job as a whole and how to work as teams. For example, he asks:“How can they communicate with one another in a professional way?” Often, he says, the public will see security officers working together and talking in a social way,“which is understandable”, since they may be friends, share canteen time, and have common interests. “But, at that moment, they are wearing the hats of professionals. Like many professional groups, that should probably be discouraged.That may not be a popular thing to hear, but there should be an intense focus on the job at hand,” says Bor. Despite security officers performing a crucial role, especially in high-risk areas, such as airports, the rewards may not be there to recognize the effort.The fact is, if security is done well, nothing happens, making it hard to achieve a sense of accomplishment. “The rewards may not be immediate.You are there to act as a deterrent. To be a good deterrent, you have to be professional and vigilant. But, you also have to combine that with a measure of empathy and a human face, as well. All of these are, I don’t think, unreasonable demands to place on people. But, there are certainly ways in which we can make the job more interesting.There are a wide range of skills, ideas, and occasionally, perhaps, armchair theories that we can use and bring into the everyday workplace,” says Bor. All of which adds up to not only a more motivated and professional workforce, but also the public having a more positive experience of security.
INSIDER_Apr_May10 Iss2_52pp MIP advert 6 copy.pdf 1
14/4/10 4:44 10:44 14/01/10 PM
PM
Page 33
An open offer to every central monitoring station in Australia Buy 10 MultiPath STU’s and Inner Range will install hosted service MultiPath IP technology in your monitoring centre at no charge!
s
2ECEIVE )2 FAST !LARM TRANSMISSIONS
s
2EMOTE HIGH LEVEL INTERROGATION AND CONTROL OF #ONCEPT SYSTEMS
s
/FFER YOUR CLIENTS HIGH SECURITY %THERNET MONITORING OPTIONS
s
/NBOARD DIALER CAPTURE OR 3ECURITEL INTERFACING
s
%NCRYPTED TRANSMISSIONS ON ALL )0 PATHS
s -ONITOR CLIENTS USING ALL TELCO NETWORKS s
%ASY STEP INSTALLATION COMMISSIONING PROCESS FOR '023 SITES ON SINGLE OR MULTIPLE NETWORKS
Multipath-IP Monitoring your property and critical assets For further details Phone Nathan Mc Grath on : (03) 9753 3488 or Email : multipath@fratech.com.au
Assisted Enrolment service for Monitoring Stations and Installers available directly from Inner Range
Special Price at CSD Branches
Securitel Replacement STU
$299+GST
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:44 PM
Page 34
PREVENTING ARMED ROBBERY
PREVENTING
ARMED R
By Erin Louis and Lance Smith
34 //SECURITY INSIDER APR/MAY 2010
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:44 PM
Page 35
PREVENTING ARMED ROBBERY
D ROBBERY PREVENTING THE OCCURRENCE OF CRIME IS OF great importance to business owners and individuals. Armed robbery has a significant impact on victims, potentially causing both physical and psychological injury, as well as having a negative impact on businesses and the broader community. It is widely said that prevention is better than a cure and crime is a good case in point.There are a variety of reasons for why crime occurs and criminologists have theorised for
assessment of the relative advantages and disadvantages of the crime. As a result, SCP calls for a range of responses including the use of ‘target hardening’ mechanisms.Target hardening is a means of reducing the opportunity for an offender to commit a crime by tightening the security of potential crime targets. When applying the theory to armed robbery there is a range of effective target hardening measures available to help combat the occurrence.These include simple techniques such as: • making customers as visible as possible inside a premises (this raises the risk of being identified and can deter some offenders)
decades as to why and how to prevent it.This article discusses
• regular staff training in cash handling procedures
some of these theories and how they can be practically applied
• limiting the amount of money kept on the premises
to preventing crime today, specifically how the incidence of
• posting signs saying there are “CCTV cameras on the
armed robbery can be reduced if effective crime prevention strategies are employed. Situational Crime Prevention (SCP) is a theory or perspective that focuses on the opportunity for crime to occur and the settings for crime, rather than on offenders. SCP theory suggests that the rational decision making process of an offender to commit the crime or not is based on their
premises” • posting signs saying “staff do not have access to the time delay safes”, and • ensuring that there is sufficient lighting inside and outside the premises. These are some of the techniques employed by commercial locations in their attempts to combat armed robbery.
SECURITY INSIDER APR/MAY 2010// 35
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:44 PM
Page 36
PREVENTING ARMED ROBBERY
Unfortunately one of the side effects of
Another approach that is similar to
Some examples of what would be
successful target hardening is what’s
Situational Crime Prevention is Routine
considered a capable guardian are:
called a displacement effect.This means
Activity Theory (RAT).This approach
• police patrols
that the offenders may change their
focuses on the opportunity for crime to
• security guards
tactics or their targets rather than not
occur. RAT is an environmental
• Neighbourhood Watch schemes
committing a crime at all. Displacement
criminology theory, devised in the late
• door-staff
occurs in five distinct ways:
1970’s. RAT argues that for crime to
• vigilant staff and co-workers
• GEOGRAPHICAL DISPLACEMENT: occurs
occur three things need to happen at
• friends
when an offender targets the same
the same time and in the same space:
• neighbours
industry type but in another location.
1. A suitable target is available.
• Close Circuit Television (CCTV)
For example, another service station,
2. There is the lack of a suitable
bank or retail outlet in a neighbouring
guardian to prevent the crime from
suburb.
happening.
• TEMPORAL DISPLACEMENT: offenders modify the time that they target the relevant commercial location.
3. A likely and motivated offender is
systems • perpetrator marking systems Clearly some of the guardians listed,
present.
like security guards, are formal and
Generally there are a number of
deliberately placed. Some of the other
suitable targets around at any given
guardians listed above would be
stations target harden all locations in
time. However there are three main types
considered informal and inadvertent, like
the industry, an offender may switch
of targets: a person, an object or a
neighbours. However, they can be just as
their targets to convenience stores as,
place.
effective (Clarke 1999).
• TARGET DISPLACEMENT: if service
from an armed robber’s point of view,
The good news is that regardless of
It is important to note however that it is
how suitable a target is, an offence will
possible for a guardian to be present but
not take place unless a capable
totally ineffective. For example a CCTV
stores put in protective barriers to
guardian is absent and a likely offender
camera is not a capable guardian if it is
protect against knife robberies
present (Clarke 1999).
set up incorrectly or located in an
they are similar in many respects. • TACTICAL DISPLACEMENT: if convenience
offenders may upgrade to using firearms.
A capable guardian takes into
inappropriate place (Clarke 1999). Another
account the 'human element', and would
example would be staff present in a shop
usually be considered a person.Their
who have not had sufficient training or
switch to other crimes such as fraud
mere presence would likely deter
awareness to be an effective deterrent.
or illicit drug supply.
potential offenders from committing a
When a suitable target is unprotected by
Displacement is one of the key
crime (Felson and Clarke 1998).
a capable guardian there is a
challenges facing the prevention and
However, a capable guardian could also
substantially greater chance that a crime
reduction of armed robbery in Australia
be a CCTV system, providing that
will take place.
(Smith and Louis 2009).
someone is monitoring the camera.
• Crime type displacement: offenders
The final element of RAT is the
continued page 38 >
36 //SECURITY INSIDER APR/MAY 2010
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:52 PM
Page 37
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:52 PM
Page 38
PREVENTING ARMED ROBBERY
crime prevention techniques effectively.
presence of a likely offender. RAT looks
synthetic DNA and florescent dye.The
at crime from an offender’s perspective
water is contained in a delivery device
and looks at what influences their
that can be adapted to a range of
Situational Crime Prevention Theory and
decision making processes. Importantly,
crime prevention scenarios.The device
Routine Activity Theory in connection
a crime will only be committed if an
can be activated by a panic button or
with armed robbery go to
offender thinks that a target is suitable
similar device following an armed hold
www.aic.gov.au and see current and
and a capable guardian is absent
up and sprays the offender with the
previous reports from the Australian
(Cohen and Felson 1979). It is their
DNA water upon leaving the premises.
Institute of Criminology’s National
assessment of a situation that
The synthetic DNA and florescent dye
Armed Robbery Monitoring Program.
determines whether a crime will take
remain on the offenders’ body and
place or not.
clothing for several weeks after the
REFERENCES
offence.This presents investigators with
Clarke R.V (1999). Hot Products:
deterred by the practical application of
the opportunity to directly tie an
Understanding, Anticipating and Reducing
this theory is the amateur or opportunist
offender to a crime scene as each
Demand for Stolen Goods. Police
armed robber, as they fail to invest a
system possesses a code in the water
Research Series Paper 112 (London:
great deal of thought into their targets
unique to the store it protects.
Home Office Research, Development and
The type of offender normally
and locations. If any part of the crime
Perpetrator marking systems have
For more information about
Statistics Directorate).
seems too hard, it is likely that they will
been deemed a successful deterrent
alter their plans. RAT highlights the
when used in partnership between
change and crime rate trends: a routine
importance of target hardening and
police, business owners and the
activity approach. American Sociological
situational crime prevention techniques
supply company (Gill 2007). It is
Review,Vol 44, Pages 588-608.
in deterring the occurrence of armed
essential to stress the importance of
robbery.
using a system like perpetrator
Opportunity Makes the Thief. Police
marking in partnership with police,
Research Series Paper 98, Policing and
business owners and the supply
Reducing Crime Unit, Research,
Routine Activity Theory has been the
company. In isolation there is little
Development and Statistics Directorate.
development of perpetrator/property
evidence to suggest that a product
London: Home Office.
marking technology. The technology
like this will be effective. However
was developed in the United Kingdom
there is great potential for its use in
Smart water: Offenders’ Perspective.
in the 1990’s and is now used
Australia.
Perpetuity Research and Consulting
A practical example of applying Situational Crime Prevention and
throughout Europe. The purpose of
Armed robbery is a serious crime
perpetrator marking is to firstly deter
and great challenges remain for
criminal acts, and, secondly to directly
business owners and law enforcement
tie an offender to a crime scene.
in effectively combating it. Nonetheless,
Cohen, L.. and M. Felson (1979). Social
Felson, M. and Clarke, R. (1998).
Gill M. (2007). An Evaluation of
International. Leicester: United Kingdom. Smith L and Louis E (2009). Armed robbery in Australia: 2006 national
as this article notes there are a variety
armed robbery program annual report.
technology is the use of a water based
of ways to help reduce armed
Monitoring report no. 04. Canberra:
product that is infused with a unique
robberies from occurring by employing
Australian Institute of Criminology.
The core component of the
SECURITY 2010 CONFERENCE & EXHIBITION 1-3 SEPTEMBER 2010, SYDNEY CONVENTION & EXHIBITION CENTRE
Security2010 C O N F E R E N C E & E X H I B I T I ON
1–3 SEPTEMBER 2010 For more information visit www.asial.com.au
38 //SECURITY INSIDER APR/MAY 2010
SYDNEYCONVENTION & EXHIBITION CENTRE
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:52 PM
Page 39
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:52 PM
Page 40
PEOPLE
FAILING TO DEAL WITH WORKPLACE BULLYING CAN BE EXPENSIVE! By Chris Delaney* Employers who ignore claims of bullying and/or harassment by employees do so at their peril. In a recent case a court ordered the employer to pay fines and damages totaling $330,000, giving employers a clear message that they must act to deal with these issues professionally and quickly. For all of those we hear about there are many others that are detrimental to morale, efficiency and profitability. So, what constitutes workplace bullying? Workplace bullying means any behaviour that is repeated, systematic and directed towards an employee or group of employees that a reasonable person, having regard to the circumstances, would expect to victimise, humiliate, undermine or threaten and which creates a risk to health and safety. Bullying behaviour can be overt and aggressive, it can also be covert behaviour that undermines, treats less favourably or disempowers others. Examples of overt behaviour include: • Abusive, insulting or offensive language; • Behaviour or language that frightens, humiliates, belittles or degrades, including criticism that is delivered with yelling or raised voice; • Teasing or regularly making someone the brunt of practical jokes; • Displaying material that is degrading or offending; • Spreading gossip, rumours and innuendo of a malicious nature.
Violence, assault and stalking are extreme forms of bullying that may constitute a criminal offence and should be reported to the police. Examples include: • Harmful or offensive initiation practices; • Physical assault or unlawful threats. Workplace bullying can also be subtle and may include behaviour such as: • Deliberately excluding, isolating or marginalising a person from normal workplace activities; • Intruding on a person’s space by pestering, spying or tampering with their personal effects or work equipment; • Intimidating a person through inappropriate personal comments, belittling opinions or unjustified criticism. Covert behaviour that undermines, treats less favourably or disempowers others is also bullying. For example: • Overloading a person with work; • Setting timelines that are very difficult to achieve, or constantly changing deadlines; • Setting tasks that are unreasonably beyond a person’s ability; • Ignoring or isolating a person; • Deliberately denying access to information, consultation or resources; • Unfair treatment in relation to accessing workplace. BEHAVIOUR THAT ISN’T BULLYING The following are examples of behaviour that does not constitute bullying:
• Reasonable action taken in a reasonable manner by an employer to transfer, discipline, counsel, retrench or dismiss an employee; • A decision by an employer, based on reasonable grounds, not to award or provide a promotion, transfer, or benefit in connection with an employee’s employment (other than a statutory entitlement); • Reasonable administrative action taken in a reasonable manner by an employer in connection with an employee’s employment; or • Reasonable action taken in a reasonable manner under legislation affecting an employee. EFFECTS OF WORKPLACE BULLYING ON THE VICTIM Workplace bullying may cause extensive health problems for employees exposed to this hazard, including physical and psychological illnesses and injuries. It can impact on coworkers, clients, customers, business associates, family and friends. The reaction of individual employees will vary according to the nature of the bullying. It is possible that employees who are bullied may experience some of the following effects: • Stress, anxiety or sleep disturbance; • Panic attacks or impaired ability to make decisions; • Incapacity to work, concentration problems, loss of self-confidence and self-esteem or reduced output and performance; • Depression or a sense of isolation; • Physical injury; continued page 41 >
40 //SECURITY INSIDER APR/MAY 2010
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:52 PM
Page 41
PEOPLE
• Reduced quality of home and family life; • Suicide. EFFECTS OF BULLYING ON THE ORGANISATION The costs to the organisation include reduced efficiency, unsafe work environment, increased absenteeism, poor morale, workers compensation claims and civil action. Employers can find themselves embroiled in litigation and may be liable for any discrimination, harassment or bullying that is committed by any employee that breaches any of the many pieces of legislation (both State and Federal) dealing with workplace bullying – UNLESS the organisation has taken “all reasonable steps” or done everything “reasonably practicable”, to: • Prevent the discrimination, harassment, or bullying from happening in the first place, and • Resolve, fairly and appropriately, any alleged discrimination, harassment or bullying that is
suspected or known by any line manager or appointed grievance adviser or resolver. Other adverse effects include: • Increased work error rate • Increased workers compensation claims and associated rehabilitation costs and likely increase in your workers’ compensation premium • Low morale • Decrease in the quality of work • Sabotage or other forms of aggressive or destructive behaviour • Loss of reputation/public image • Unnecessary resignations • Wrong employees being appointed, trained and/or promoted, and the best ones being lost/missed • Breakdowns in communication ability and trust • Industrial problems • Internal grievances and external legal challenges.
WHAT THE LAW EXPECTS EMPLOYERS TO DO Decisions of courts, tribunals and commissions provide clear indications of what they believe organisations must do. These include: • Initiating clear, written policies and procedures that explain exactly what is expected from employees in relation to behaviour towards each other, customers, clients and with anyone else employees have to interact with in the course of their work. • Having an equal employment opportunity (EEO) and discrimination policy and an effective bullying and harassment risk prevention policy. • Having a clear, written, grievance procedure, backed by a fair, appropriate and followed counselling and discipline procedure ensuring procedural fairness, confidentiality and record keeping procedures.
“Bullying behaviour can be overt and aggressive, it can also be covert behaviour that undermines, treats less favourably or disempowers others.”
continued page 42 >
SECURITY INSIDER APR/MAY 2010// 41
INSIDER_Apr_May10 Iss2_52pp
14/4/10
10:52 PM
Page 42
PEOPLE
• Providing all employees with copies of policies and procedures including new employees as part of their induction. • Ensuring all your employees understand the policies and procedures and that they have the knowledge and skills to follow them. • Providing training to all employees especially line managers in EEO, diversity, discrimination, bullying and harassment, grievance management and counselling and discipline on a regular basis. Without this in place, not only are you leaving your organisation exposed to justifiable and costly legal challenges, but also your organisation is not getting the best out of its employees. PREVENTING WORKPLACE BULLYING AND HARASSMENT It is legally, morally and financially negligent for employers and line managers not to do everything they can to prevent bullying and harassment. Employers should: • Ensure that the work environment is not conducive for bullies and harassers, and • Take swift and appropriate action to deal with people proven to have bullied or harassed, and • Where necessary, terminate the employment of and/or stop doing business with those who can’t be stopped or who have committed very serious acts of bullying or harassment. All employees should follow simple rules of respect and treat others with unconditional positive regard. All employees should: • Treat others the way they would like to be treated; • Respect and understand others’ values – know who is comfortable with what; • Be particularly careful if behaviours or statements could be construed as sexual, personally invasive, racist, sexist, anti-gay, or stereotyping in any other way; • Be careful of repetition - know when to stop – when others have had enough • Stop doing it if someone indicates they don’t like what you’re doing; and
• Apologise for any hurt or upset that may have been caused; • Don’t do it again, and don’t talk about others in a negative way. Systems Implemented to deter or eliminate workplace should involve: • Policies dealing specifically with bullying and harassment in any form including cyber bullying; • Induction, training and regular refresher training; • Specific management training in procedures for investigating, dealing with and reporting bullying and harassment; • Procedures for continuous review to improve policies and procedures; and • Intervention strategies for management when bullying and/or harassment allegations are made or an incident comes to their attention. • Education for employees in what amounts to acceptable conduct in the workplace; • A risk assessment for workplace bullying and harassment; • An incident management system identifying and reporting on workplace bullying and harassment; • Adequate levels of confidentiality for both alleged bullies and victims during the investigative process. An effective complaints procedure should: • Be simple and easy to follow by employees and managers; • Detail the step by step process by which complaints will be handled; • Contain achievable time limits for each stage of the process; • Guarantee that all complaints will be handled in line with ‘procedural fairness’ principles - that is, with impartiality, fairness, confidentiality, and appropriate protection from victimisation (payback action), and with full provision for all parties to have access to support and/or representation as desired/necessary; • Ensure that people feel safe to come forward for advice, for advocacy, and for a solution to the problem; • Provide details on the way(s) in which grievances can be resolved and actions
•
• • • •
which may be taken, e.g. by investigation, conciliation/mediation and/or discipline, depending on the seriousness of the allegation. All complaints and actions arising out of investigations should be determined on their individual merits; Identify which resolutions may be expected, e.g. apologies or written warnings or dismissal, and that such resolutions will be imposed fairly and consistently across the organisation; Explain that confidential records will be kept of all incidents ; Provide for an internal appeal system, wherever practical. Give details of external avenues of help and appeal/review. Allow for training of all Managers and employees, as well as opportunities to review the effectiveness of the procedures.
Because of their duties and responsibilities Managers need to be particularly careful to avoid being seen as bullying or harassing employees. They should: • Always treat others with respect; • Avoid any form of preferential treatment; • Allocate work fairly and with regards to an employee’s skill, competence and training; • Concentrate on the requirements of the job, as opposed to the personality of the employee – in other words separate the person from the problem. • Do not over supervise • Attend to problems, employee requests and complaints in a fair and timely manner; • Consult with and consider employee opinions; • Value diversity; and • Create a work environment conducive to honesty. Workplace bullying should not be tolerated and organisations must take steps to ensure policies, procedures and training are implemented in order to, wherever possible, create a workplace free from bullying and harassment and if it does occur to deal with it quickly, fairly and adequately. ªChris Delaney is ASIAL’s Industrial Relations Advisor.
Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you to take no action without prior reference to an Employee Relations professional. ASIAL members can contact Chris Delaney by emailing ir@asial.com.au
42 //SECURITY INSIDER APR/MAY 2010
14/4/10
11:01 PM
Page 43
PROTECT YOUR BUSINESS WITH AON Aon is the leading insurance broker to the security industry, and the broker preferred by the Australian Security Industry Association (ASIAL). We are pleased to offer you a tailored product, SecurAcover, that provides a simple and competitive insurance solution to protect your business. This product is exclusive to ASIAL Members and covers public and products liability with an extension for errors and omissions coverage. If you need to protect your business, talk to Australiaâ&#x20AC;&#x2122;s leading insurance provider today. CALL
1800 806 584 OR EMAIL asial@aon.com.au
Š 2010 Aon Risk Services Australia Limited ABN 17 000 434 720 AFSL No. 241141
RRIS1595 0410
INSIDER_Apr_May10 Iss2_52pp
INSIDER_Apr_May10 Iss2_52pp
14/4/10
11:01 PM
Page 45
INDUSTRY NeWS
LEADING INTERNATIONAL CRIMINOLOGIST TO DELIVER CRIME PREVENTION COURSES As part of Security 2010 (1-3 September 2010), one of the worldâ&#x20AC;&#x2122;s leading criminologists, Professor Martin Gill will present two practical courses. The first course, Understanding Crime and Crime Prevention will draw on interviews in prison with armed robbers, arsonists, fraudsters and thieves to provide participants with understanding of how offenders see the world. It is striking that so much information has been collected on the causes of crime and how offenders behave and yet we have paid so little attention to this within the world of security management. The second course, Security Strategy & Management will review and analyse the difference between good and bad security. It will explain the importance of strategy and how it can be developed. Participants will gain an understanding of the techniques for adding value and ensuring that security is a worthwhile value added service rather than an unwelcome
cost on the bottom line. Martin Gill is the Director of Perpetuity Research and Consultancy International. He is also a Professor of Criminology and for over two decades has been actively involved in a range of studies relating to different aspects of crime and its prevention. In the
past he has studied victims, the police service and probation service and looked at different ways on which the community manages crime (or tries to). For more information on Professor Gillâ&#x20AC;&#x2122;s courses, visit www.asial.com.au or email events@asial.com.au.
SECURITY INSIDER APR/MAY 2010// 45
INSIDER_Apr_May10 Iss2_52pp
14/4/10
11:02 PM
Page 46
AJC SECURITY
SI. What are some of the innovations
This highlights the level of transparency
drinks per transaction on race days and
introduced and the reasons behind
the Club extends to compliance
two during carnival.This initiative is
them?
authorities and supports increased
designed to combat drink stacking and
collaboration between the venue and
curb rapid alcohol consumption.
SB: Mounted Security - After intense planning and training, the AJC was the
regulatory bodies. Patron awareness / education: In
first venue in the Southern Hemisphere to deploy mounted security patrols as a
Introduction of internally employed
addition to mandatory signage the AJC
preventative measures.The initial
RSA Monitors – In 2008 the club
has erected customised signage at all
deployment of four horses and riders took
launched a comprehensive new
pedestrian entrances and exits. Purpose
place in early March 2010 to support and
Responsible Service of Alcohol strategy.
designed bar runners are in place
assist with the security of the two stable
The strategy is in line with the Liquor Act
displaying RSA messages. Signage at
complexes at Royal Randwick during the
2007 and its associated regulations with
vehicle exits is also in place to discourage
Future Music Festival, which attracted a
an objective of total compliance.
drink driving.
crowd of over 38,000. It is built on four key enablers or factors
Live CCTV monitoring of patron
an additional opportunity to aid in the
that support the achievement of
behavior & crowd movement: An IP
rehabilitation of Thoroughbreds beyond
overarching objectives:
based digital surveillance system has
Mounted Security presents the AJC
their racing career. Horses are selected
been installed to maintain the integrity of
for their personality, temperament,
Staff training: A comprehensive training
Royal Randwick and to monitor all public
physical ability and aptitude. Each horse
package has been developed to ensure
entertainment areas.Trained Operators
and rider has undertaken extensive
all staff are aware of and able to comply
are employed during race days and
preparation for work in the proximity of
with the AJC’s RSA policies, and to
major events to monitor cameras located
large crowds, weather and noise
refresh knowledge and competence in
in bars and lawn areas.The CCTV
conditions as well as vehicle traffic.
light of changes to the Liquor Act.The
system also includes state of the art
The Mounted Security are not used
AJC also recognises the need to build
people counting technology to ensure
as an active force in crowd control or
RSA principles into management
adherence to the AJC’s Place of Public
criminal apprehension, but rather a
practices and daily operations. By
Entertainment (POPE) licence in regard
deterrent with limited patron interaction,
undertaking this, training staff and
to room capacities.
focusing on observation and reporting.
management will be consistent in the
Their introduction has already proven to
operation of AJC premises and the
responsibility to put in place structures
message the Club is delivering to
to maximise their ability, as a business, to
patrons and the community.
comply.Training bar staff and RSA
be a great success with patrons.
As a licenced venue it is the AJC’s
Monitors wasn’t enough, they also
Remote CCTV System Access to the Office of Liquor Gaming and
Self-imposed alcoholic beverage sale
included contracted security personnel
Racing & NSW Police:
restrictions: The AJC restricts alcoholic
in the education sessions.This has
beverage purchases to four alcoholic
ensured that all key parties are able to
Through greater collaboration with relevant regulatory bodies for licensed venues and through support of state government initiatives to curb alcoholrelated violence and anti-social behavior, the AJC has invested heavily in a state of the art CCTV system. Incorporating digital IP based smart cameras and people counting technology, this technology has enabled us to grant compliance authorities unimpeded access to Royal Randwick’s live camera network via the internet.This level of external access was successfully piloted during World Youth Day in July 2008, when the venue hosted over 350,000 guests. In January 2009, the AJC extended the availability of their live CCTV video to the NSW police and the Office of Liquor, Gaming and Racing.
continued page 47 >
46 //SECURITY INSIDER APR/MAY 2010
INSIDER_Apr_May10 Iss2_52pp
14/4/10
11:02 PM
Page 47
AJC SECURITY
deliver on AJC and legal expectations in
clarified expectations and individual
licensed venues (places of public
the areas of appropriate alcohol service,
responsibilities within the broader
entertainment), operational flexibility and
consumption and related behaviour.
strategic plan.
industry longevity.The security operatives require a broad range of skill
Increased Safety Facilitation – A digital
SI. What are some of the more unique
sets to accommodate the diverse types
CCTV System (170) cameras
challenges that you have had to
of events that the AJC hosts, such as
incorporating People Count Technology
respond to?
race days, music festivals, school
in two of Royal Randwick’s grandstands
SB: The outbreak of the Equine
formals, through corporate and social
is now in operation.The cameras allow
Influenza virus in early August 2007
live and retrospective monitoring of
effected race days and events up to
patron numbers / crowd behaviours and
November.The Security and Risk
SI: What are some of the logistics of a
assists in the compliance to the
Department was instrumental in
‘typical’ race day?
allocated patron capacities for areas. In
ensuring that bio-security measures /
addition a duress pendant paging
procedures were adhered to and that
entry on a race day.The entire facility
system has been introduced for all
the integrity of the quarantine zones at
consists of just over two hundred acres.
permanent and temporary bars and
Royal Randwick and Warwick Farm were
The Warwick Farm facility is just over
points of sale - see diagram page 46:
maintained.
three hundred acres. On race days there
gatherings.
SB: Royal Randwick has six points of
This was achieved through liaison
can be up to 120 competing horses.
SI. What are some of the biggest
with the NSW Department of Primary
Both venues have on-course stables
challenges that you have to grapple
Industry and Racing NSW. Customised
(tenancies) which are occupied by high
with?
Bio-security Operational Orders were
profile trainers such as Gai Waterhouse
designed and implemented to enforce
and Bart Cummings.
SB: Achieving cultural change within a sporting club / business that was
quarantine applications.
For example, on the 3rd October 2009 with a crowd of 15,000, there were
established in 1842 and where security SI: What strategies do you have in
100 security personnel and 35 police on
place to ensure quality and
duty. During the course of the day 63
licensed venues, increasing cost and
consistency in service delivery by the
people were refused entry and 59
demanding a more stringent emphasis
licensed security personnel you
evicted. Police issued 35 traffic and 1
to be placed upon compliance.This
employ?
drug infringement.
was not previously given a high priority. Changing legislative requirements for
proactive enforcement can on
SB: We have developed a
occasions have a negative impact on
comprehensive Security Standard
Postcript:
poorly informed patrons.
Operating Procedures manual and
As Security Insider heads for the exit the
training package for both internal and
first of the day’s evictions are being
SI: the large numbers of young
contracted personnel. Likewise, security
escorted off the venue. It looks like
people attending events at the AJC, is
specifications and key performance
another day at the office for Shane and
the issue of alcohol and violence a
indicators were designed and developed
his team. Judging by the sophisticated
major challenge?
to assist in effective contract
and well run security operation that we
management.
saw, the AJC and their patrons are in
SB: The AJC is committed to
safe hands.
providing responsible service of alcohol to our patrons and a ‘zero tolerance’ to
SI: Do you find it difficult to recruit
anti-social behavior.The Club’s RSA
quality personnel?
Strategy outlined earlier, has formed a
SB: Not for internal roles, however the
key part of our approach to this issue.
consistency of skilled security personnel
Key internal policies support the Club’s
supplied by contract providers is often
strategy and include an in-depth Liquor
not achieved. However, our current
Harm Minimisation Plan, Responsible
contractor ACES strives to supply skilled
Service of Alcohol Policy and
staff to our standards.The AJC
participation in Liquor Accords.To
conducts two main recruitment drives
ensure compliance with these policies
each year where RSA Monitors and
and enable the achievement of broader
casual security operatives can apply.
corporate responsibility and harm minimisation objectives, a licenced
SI: What do you look for in a security
venue is reliant on certain key roles.
provider – whether manpower or
Articulating these roles at the AJC – bar
electronic?
staff, RSA monitors, and security – has
SB: Experience at major events and
SECURITY INSIDER APR/MAY 2010// 47
INSIDER_Apr_May10 Iss2_52pp
14/4/10
11:02 PM
Page 48
HOT PRODUCTS
RoboCam R1 body-worn camera system n ValuTronics Pty Ltd > (02) 9626 2000 n Email > info@www.robocamoz.com n Web > www.robocamoz.com
RoboCam is a totally mobile security system comprising of a portable hard drive and headset with a custom made shoulder holster for user convenience. RoboCam is an essential asset for any professional security operative that wants to protect their livelihood. A false allegation could cost an operative their hard earned license and consequently their means to earn a living. RoboCam can ensure that this never happens to you. Every RoboCam unit provides multi-level password protection and frame counters to keep your data tamperproof. The hands free unit enables the user to have an instant record of everything they hear and see.
NEW! NEW!
TS0099 Enhanced IP Interface n Direct Alarm Supplies > (02) 9717 5222 n Email > info@das.com.au n Web > www.das.com.au
more features, lower cost and improved value.
Connecting a Challenger panel over an IP network has never been more affordable. Direct Alarm Supplies and GE Security have released an all-new IP interface module for the GE Challenger Integrated Alarm and Access Control panel.The TS0099 Enhanced TCP/IP Interface supersedes the TS0898 Challenger Ethernet Interface. Benefits of the TS0099 include improved performance, easier installation, and lower cost than the TS0898, ensuring IP connectivity to management software or a central monitoring station that allows the Challenger system to be configured and managed remotely as well as locally, has never been more affordable. Providing IP connectivity to the Challenger V8 panel allows significant savings in cabling by using existing ITinfrastructure, and avoids the cost of site visits via remote management of the Challenger system. Available now from Direct Alarm Supplies.
LAN over Ethernet Module n Inner Range > (03) 9753 3488
Inner Range - Concept System
n Web > www.centralsd.com.au n Web > www.innerrange.com
Inner Range has released a new Ethernet interface that is set to revolutionize the installation options for its Concept 4000 system. The Concept LAN over Ethernet Interface (CLOE) provides a new convenient option for all Concept RS485-based LAN modules to be connected over standard TCP/IP Ethernet networks. Compatible with its complete range of Security, Access Control & User Interface modules, CLOE introduces a vast array of installation possibilities for the Concept System. Now standard Ethernet network architecture including LAN’s, WAN’s, Wireless LAN’s,VPN’s, Intranet and even the Internet can be used to interface RS485 LAN modules back to the Concept 4000 central controller. CLOE employs a master to slave style architecture and can scale from a single master to slave pair, through to multiple masters and multiple slaves within the one network.
48 //SECURITY INSIDER APR/MAY 2010
NEW!
INSIDER_Apr_May10 Iss2_52pp
14/4/10
11:02 PM
Page 49
HOT PRODUCTS
UniGuard Robust Attendance Recorder n ValuTronics Pty Ltd > (02) 9626 2000 n Email > info@www.robocamoz.com n Web > www.robocamoz.com
The UniGuard Robust Recorder system has outstanding value for money, easy setup and almost zero maintenance. A security operator simply passes by and touches a small checkpoint to record beyond any doubt that they attended that area. Cannot be simpler! The UniGuard Robust Recorder will hold over 4,000 events in its non volatile memory, each event holds identification data, date and time accurate to the second.The wand comes with a high power lithium battery, guaranteed to last five years without recharging. It incorporates shock logging. This feature rates impacts to the recorder, storing time of the impact and intensity. The wand is fully watertight, microwave-oven proof and comes with a 25 month warranty.
Hills Reliance VoiceNav
n Direct Alarm Supplies > (02) 9717 5222 n Email > info@das.com.au n Web > www.das.com.au
NEW!
Packed with innovation the Hills Reliance VoiceNav security code pad is a revolution in form and function. Designed in Australia and currently shortlisted in the Final Round of the 2010 Australian International Design Awards. • Advanced Touch Interface – high visual appeal and intuitive to use • End-user Customizable Voice Recording – easy to understand • Intercom Functionality for 8 rooms – keeping family or staff connected • Full backwards compatibility with NX and Hills Reliance It fulfils the need for an aesthetic modern code pad with advanced security and communication features. Perfect for residential and small to medium-sized commercial customers wanting to protect their family, staff, property and assets. Now available in black vertical and white horizontal models. Hills Reliance VoiceNav - The security code pad that appeals to your senses
Hills Video Intercom
n Direct Alarm Supplies > (02) 9717 5222 n Email > info@das.com.au n Web > www.das.com.au
Hills Home Automation and Video Intercom Kocom KCV-D372 7” Videophone • 7 inch Wide Colour Screen Digital LCD • 1 Door Camera and up to 2 Monitors • On Screen Display • Door Open Function • When no signal on image, converts to standby condition • Ultra Low Power Consumption • Can connect door opener to monitor and camera • Long distance wiring : Can install up to 150cm between camera and monitor. • Camera comes with surface mount, flush mount, corner mount, and sun visor accessories.
NEW!
SECURITY INSIDER APR/MAY 2010// 49
INSIDER_Apr_May10 Iss2_52pp
14/4/10
11:02 PM
Page 50
HUMOUR ME
Frank Sales
“An ex-convict told an Indiana judge that he had a full-time job and intended to turn his life around but had slipped when he tried to rob a local bank.”
F
frank sales
lorida sheriff's deputies detained a US Immigration and Customs Enforcement (ICE) agent working undercover, but who had aroused suspicions of members of the public. After investigating, the deputies discovered that ICE agent was protecting his identity by posing as an FBI agent. A two-time convicted bank robber is suing Canada’s National Parole Board, because it released him early from prison in 1987 from a previous sentence. He claims the Board should have kept him inside until that sentence ran out in 1994, and as such it was the Board’s fault that while on parole, he robbed another bank and had again been locked up. If he had served the full sentence, he said, he would have been more mature and would not have re-offended. An ex-convict told an Indiana judge that he had a full-time job and intended to turn his life around but had slipped when he tried to rob a local bank. “If I hadn’t been watching the news and seeing [other successful] bank robberies,” he said, he wouldn’t have been tempted. He was especially impressed by one serial robber, he said, who had made it look easy by vaulting over banks’ counters. NewYork City police believe that a 44-year-old drug-gang hit man shot three men to death in a high-rise apartment, but a woman in the apartment managed to escape when he tripped on his own baggy pants while chasing her. As police arrived, the man climbed out onto the fire escape but accidentally fell and broke his neck. Eight-year-old Mike Hicks is a frequent flier with his mother, and while she is seldom stopped by airport screeners, her son almost always is, because he shares a name with someone on the enhanced-security list that is one level below “no fly”.Ten days after Umar Farouk Abdulmutallab nearly brought down the Christmas day airliner over Detroit, the US State Department officially revoked his visa. Obama Administration officials, seeking to fulfill a campaign pledge of a more open federal government, held a multi-agency training session in Washington, DC, on the Freedom of Information Act.The meeting was closed to the public. The US Justice Department’s Civil Rights Division posted a job announcement in line with current affirmative-action policy, seeking “experienced attorneys” and encouraging “qualified applicants with targeted disabilities” to apply. Legally protected “targeted disabilities” include blindness and “mental retardation”. Applicants for taxicab licenses in Portsmouth, England, were officially informed by the City Council that application forms are available in other languages or in audio, large print, or Braille. A Californian sheriff’s deputy has filed a lawsuit against the Catholic Church and a former priest for the “emotional trauma" he suffered by being propositioned for sex while working undercover.The deputy was patrolling a public park when the priest reached out and touched the officer’s clothed genital area.The priest was arrested and convicted, but the Deputy says he is not yet over the feelings of “anger, rage, disgust, and embarrassment”. A 20-year-old Ohio man convicted of voyeurism, after being caught peeping at a female using the portable toilets at a local fair, has had an appeal rejected. He claimed police had violated his right to privacy with their surveillance. A 23-year-old Bristol, UK, woman was sentenced to 12 months in prison for leading police on a high-speed chase while injecting heroin. An Alabama man was arrested after a high-speed chase during which he allegedly had methamphetamine cooking in the front seat. A long-distance trucker was charged with manslaughter in Buffalo, NY, after his truck hit a parked car, killing the occupant.The trucker was distracted watching pornography on his laptop computer. U TXT U B NXT, eh? Chinese officials announced that Shijiazhuang’s new“women only” parking lot was designed to meet females’“strong sense of color and different sense of distance”.The spaces are one metre wider than regular spaces and painted pink and purple. Attendants have also been “trained” to “guide” women into parking spaces. At last, we understand that really annoying NRMATV ad. We could say more and probably will do so next issue…
50 //SECURITY INSIDER APR/MAY 2010
INSIDER_Apr_May10 Iss2_52pp
14/4/10
11:02 PM
Page 51
INSIDER_Apr_May10 Iss2_52pp
14/4/10
11:02 PM
Page 52