February/March 2019
Code of Practice for Security Drones Active shooter pre-attack behaviours
Surveillance: Legal and Ethical Considerations For Private Investigators The Perfect Storm: how training went missing
www.defsec.net.nz
SECURITY TECHNOLOGY RELIABILITY
your electromagnetic locking specialist!
Underpinned by 29 year's experience and service with integrity. Standard features include: • Field-selectable 12 & 24 VDC options • 550kg holding force • Slimline styling • Instant release • Stainless steel fitting hardware • Through hardened, polished stainless sex nut • Full protection against transients.
Options include: • Door Position Switch • End-to-end Magnetic Bond Sensor • Header extension angle bracket • Custom full width housings • Z/L brackets for inward opening doors • Frameless glass door brackets • Powder coated or anodised colours • Stainless indoor, outdoor and gate locks
GUARANTEE
Loktronic Limited Unit 7 19 Edwin Street Mt Eden Auckland P O Box 8329 Symonds Street Auckland 1150 New Zealand Ph 64 9 623 3919 Fax 64 9 623 3881 0800 FOR LOK mail@loktronic.co.nz www.loktronic.co.nz
GUARANTEE
*Standard terms & conditions of sale apply.
21066/1/18
For expert advice and assistance with your security locking needs, trust in Loktronic, call us on 0800 367 565
AIRPORT
Panomera W8 Model W8 Topline 75/360
75MP Resolution!
75 MP
75 MP
e
Ø 179 m >
Ø 72 m
25 px/m
>
Detection Distance
e
30
62 px/m
Observation Distance
360° FoV
FPS
ICR Day-Night
Motor Lens
P-Iris
UWDR
EdgeStorage
Multiuser
Weatherproof
The Panomera® W8 360° Multifocal Sensor System has been developed with special focus on the surveillance of large spaces from a single location. The innovative lens and sensor concept of the Panomera® in combination with a high-resolution fisheye lens allows for the unique recording of a complete half-space (half sphere) without blind spots, thus 360° horizontally and 90° vertically. A total effective resolution of 75MP. The W8 is the perfect solution for a variety of locations. When combined with Dallmeier Semsy technology and detection tracking. It is an effective solution for detection and tracking of individuals over a large area who pose a security risk.
• Perfection solution for Airports, Logistics, Supermarkets, Malls. • Provides Long-term investment protection. Distributed by :
3 Hotunui Drive, Mt. Wellington, Auckland, New Zealand P.O. Box 14-058, Panmure, Auckland 1741, New Zealand T. +64 9 276 3271F. +64 9 276 9645 | E. sales@crknz.co.nz | Website : www.crkennedy.co.nz
CONTENTS
ISSN Print 1175-2149 ISSN Online 2537-8937
17
24
10
38
year 10 guarantee ENJOY a
*
on Loktronic Indoor Electromagnetic Locks!
Industry Associations
www.security.org.nz
www. asis.org.nz
www.masterlocksmiths.com.au
www.nzipi.org.nz
www.security-institute.org.nz
0800 367 565
20851
4
*Standard terms & conditions of sale apply.
Get your business ahead this year.............................................................................................................................................................................................8 Surveillance: Legal and Ethical Considerations for Private Investigators............................................................................................................ 10 Cyber security – you don’t have to be an expert........................................................................................................................................................... 14 NZSA to release Code of Practice for Security Drones................................................................................................................................................. 16 Employment relations shake-up has industry on edge...............................................................................................................................................17 NZSA internship results in security drones Code of Practice.................................................................................................................................... 18 Hikvision: Removing the weak security link in the retail chain................................................................................................................................ 20 Changing face of supermarkets creates loss prevention challenges................................................................................................................... 22 The Privacy Problem....................................................................................................................................................................................................................... 24 The global rise of knife crime.................................................................................................................................................................................................... 26 Portrait of a shooter........................................................................................................................................................................................................................ 28 ASIS NZ Chapter Executive Update........................................................................................................................................................................................ 30 Top five security trends for 2019.............................................................................................................................................................................................. 32 Skills Shortage: A serious industry problem...................................................................................................................................................................... 36 World-class behavioural analysis training comes to Auckland................................................................................................................................ 38 The Perfect Storm: how training went missing................................................................................................................................................................40 Showcase..............................................................................................................................................................................................................................................44 Events.....................................................................................................................................................................................................................................................46
www.loktronic.co.nz
NZSM
www.skills.org.nz
February/March 2019
Your Preferred Pelco Distributor
www.sektor.co.nz | 0800 735 867 | security@sektor.co.nz
NZSM New Zealand Security Magazine
Nick Dynon Managing Editor Nick has written for NZSM since 2013. He writes on all things security, but is particularly fascinated with the fault lines between security and privacy, and between individual, enterprise and national security. Prior to NZSM he clocked up over 20 years experience in various border security and military roles.
Contact Details: Nick Dynon, Managing Editor Phone: + 64 (0) 22 366 3691 Email: nick@defsec.net.nz Craig Flint, Publisher Phone: + 64 7 868 2703 Email: craig@defsec.net.nz Postal and delivery address: 27 West Crescent, Te Puru 3575, Thames, RD5, New Zealand
6
NZSM
From the Editor Welcome to the February - March 2019 issue of New Zealand Security Magazine. With this issue I’m particularly excited to be featuring such a formidable line-up of local and international security professionals as authors and interviewees. They include: David Horsburgh CPP PSP PCI, Lincoln Potter PSP, Andrew Thorburn, Dean Kidd, Andrew Scothern, Gary Morrison, Dimphy Korstanje, Mark Tarallo, Megan Gates and Robert Kaiser. We’re also honoured to be featuring two fantastic articles from the magazine Security Management as part of a very exciting new partnership with ASIS International. Headlining this issue of NZSM, David Horsburgh writes that the recent report of the State Services Commission Inquiry into the use of external security consultants by government agencies raises need for debate of our industry’s legal and ethical use of intrusive surveillance techniques. There is no one better qualified in New Zealand to provide insights into privacy and the ethics of surveillance than David, and this article a must-read. Also returning to write for us in this issue is Lincoln Potter, who takes no prisoners in his discussion of the state of training in the security industry. Gary Morrison also weighs in on the skills crisis being faced in both the ‘manned’ and electronic security sectors. For those willing to invest in upskilling, we also feature educational opportunities at Manukau Institute of Technology, the new ASIS International APP board certification, and Behavioural Analysis training to be delivered in Auckland by the internationally respected Philip Baum. In other industry news, the NZSA is set to launch its first-ever Code of Practice for Security Drones, the industry braces itself for Fair Pay Agreements and the impacts of the recently enacted Employment Relations Amendment Act 2018, and the ASIS New Zealand Chapter gets 2019 off to a flying start. Continuing our multi-issue focus on crowded places and fixated persons, we are joined by international contributors Mark Tarallo and Robert Kaiser. Mark explores the idea that detecting red flag shooter behaviour prior to an attack is more effective than any physical security measure, and Robert identifies the factors contributing to the global proliferation of knife crime. There’s plenty more news inside, with great cyber reads from Gallagher’s Andrew Scothern and ASIS International’s Megan Gates, a look into how selfcheckouts and re-usable bags are a supermarket loss prevention nightmare, a listing of selected upcoming local and international security events, and much, much more. Have you visited our new website yet? New content is being added daily, with the site fast becoming a uniquely rich resource of thought leadership for New Zealand security practitioners. We’re very excited about it! Please note the new address: www.defsec.net.nz. Nick Dynon Auckland facebook.com/defsecmedia twitter.com/DefsecNZ linkedin.com/company/ defsec-media-limited Upcoming Issue April / May 19 Government, Transport, Tourism, Access management, IT security threats
Disclaimer: The information contained in this publication is given in good faith and has been derived from sources believed to be reliable and accurate. However, neither the publishers nor any person involved in the preparation of this publication accept any form of liability whatsoever for its contents including advertisements, editorials, opinions, advice or information or for any consequences from its use. Copyright: No article or part thereof may be reproduced without prior consent of the publisher.
February/March 2019
Intercom gets human. Enter Hikvision’s updated video intercom solution‌ With high-quality vision and echo-cancellation technology that ensures superior voice transmission, hosts and their visitors can enjoy a warmer, more personal welcome to the home or workplace. The intercom solution also serves as an emergency response hub, ensuring families and businesses are empowered to take action in the event of unwelcome guests. Features include IP support cloud, Hikvision Lift Control compatibility, Hikvision CCTV integration, and free software.
Distributed by Website: www.atlasgentech.co.nz E-mail: orders@atlasgentech.co.nz
Website: www.nfs.co.nz E-mail: sales@nfs.co.nz
Hikvision New Zealand Ltd Level 1, Building B, 93-95 Ascot Avenue, Greenlane, Auckland 1052 +61 1300 557 450 sales.nz@hikvision.com
https://www.hikvision.com/au-en/
TRAINING
Get your business ahead this year As the security industry becomes more sophisticated and is continuously disrupted by technological advances, new roles and career pathways are popping up all the time. While there are still some aspects of future business activities that may seem uncertain, what will remain constant is the importance of employing the right people for your company. Employees are the foundation of your company; they look after your processes and, of course, your customers. Which is why companies worldwide spend a tonne of money and time investing in their staff.
There are a variety of ways this can be done. We’ve seen many companies focus on improving corporate culture, allowing flexible work arrangements, handing out bonuses, or providing opportunities to learn. Whatever you choose, your staff need to understand the benefits of it. Don’t just select a random cause to volunteer them for as a teambonding exercise, find out what your employees actually value and align this to your company’s values. This will create a clear focus for everyone and the more meaningful the investment the more impact and return you’ll get from your staff. Why professional development is important It’s been well documented that employees place high importance on the development of their skills. Candidates are known to choose employers that are able to help them through their professional and personal development. So, now is the time to make sure your staff are being given serious opportunities to expand their knowledge and grow into their chosen fields of interest. Whether you’re a small business owner or part of a larger national company there are very real and applicable benefits to investing in your
8
NZSM
people. Staff that are supported and encouraged to gain more skills will be kept intrigued, challenged, and be more interested in their work. If staff feel more valued and appreciated there will be less miscommunication and fewer interpersonal conflicts. It also lowers the chances of your staff being lured away by roles with your competitors. Happier employees are likely to be more productive and contribute to other areas of the business. A productive employee who is confident in their work can take on greater responsibilities and more complex jobs. Electronic security opportunities In electronic security, there is a simple pathway to take your team to the next level and it’s exclusive to E-tec. The courses are designed for those in the industry, delivering the theory online, so there’s no need to take time off for block courses. Any practical assessments can
also be completed at the workplace, with verification done by a supervisor. E-tec is an expert in industry training and, in partnership with the Manukau Institute of Technology (MIT), helps graduates gain skills and expertise that are highly sought after by the security industry. What next? Taking the step to train up your staff is a journey that can benefit everyone in the business. Some courses, like the New Zealand Certificate in Electrotechnology (Level 3) and the New Zealand Certificate in Electronic Security (Level 4) qualify for fees free and student loan options – what could be easier? Want to know more about how to invest in your team’s and business’ future? Chat to Carine at E-tec on 022 568 66 71 or carinev@shift.org.nz
February/March 2019
Bring out the most in your workforce Give your team the step up they’ve been waiting for. E-tec, in partnership with MIT, is now offering the NZ Certificate in Electrotechnology (Level 3). It’s a course designed to get results through online training and learning from specialists in the industry. This electrotechnology course is a prerequisite to study the NZ Certificate in Electronic Security (Level 4). This course is exclusive to E-tec and qualifies for fees free and student loan too, what could be easier? Secure your company’s future in Electronic Security. Contact Carine at E-tec on: 022 568 66 71 or carinev@shift.org.nz
Surveillance: Legal and Ethical Considerations For Private Investigators
The recent State Services Commission Inquiry report into the use of external security consultants by government agencies, writes David Horsburgh CPP PSP PCI, raises the need to debate our industry’s legal and ethical use of intrusive surveillance techniques.
10
NZSM
February/March 2019
The release of the State Services Commission’s report into private investigation company Thompson and Clark has signalled a need for the security industry to re-evaluate both legal and ethical implications in the use of surveillance technologies.
The challenges facing the New Zealand private security sector are far broader than the issues highlighted by the State Services Commission Inquiry and blame for reputational damage to our industry cannot be laid solely at the feet of Thompson and Clark. The SSC Inquiry was initially driven by publicity around Southern Response Earthquake Services Ltd’s engagement of Thompson and Clark Investigations Ltd to conduct surveillance of individual insurance claimants. Southern Response is a government-owned company and as such is bound by the State Services Commission Code of Conduct. After the Inquiry was announced, further questions arose regarding Thompson and Clark’s relationships with other government agencies, including the Ministry of Business, Innovation and Employment, the Ministry for Primary Industries and the New Zealand Security Intelligence Service. The Inquiry was expanded to finally include 131 government agencies and subsidiaries. The Inquiry found that Southern Response, the Ministry of Agriculture and Forestry, the Ministry of Business Innovation and Employment, Crown Law, the Ministry of Social Development, the New Zealand Transport Authority, and the New Zealand Security Intelligence Service
David Horsburgh CPP PSP PCI
February/March 2019
all breached the State Services Code of Conduct when conducting business with New Zealand private investigation and security consultancy companies. A key issue addressed by the SSC Inquiry was the use of surveillance technologies by Thompson and Clark. The Inquiry defined the term ‘surveillance activities’ and ‘surveillance’ to include ‘any close observation of people, places, things or information, with or without the use of devices’. The Inquiry described the term as including following or tracking people in public or private places and suggested that it could extend to social media monitoring using assumed identities that interfered with a reasonable expectation of privacy. This is arguably a fair meaning of the term surveillance. The SSC Inquiry found that an unlicensed private investigator, contracted to Thompson and Clark, undertook covert audio recordings in closed meetings involving Southern Response claimants. The Inquiry disagreed with the Thompson and Clark argument that covert attendance at claimant meetings and conducting audio recordings of claimants was not surveillance. In its reports to various government agencies, Thompson and Clark referred to ‘issue motivated groups’ which were reported as including Save Animals From Exploitation, Oil Free Otago, Climate Justice Taranaki, Farmwatch, the Green Party, the Mana Movement, various iwi and Greenpeace. The SSC Inquiry was highly critical of government agencies designing their enforcement functions based on the construct of ‘issue motivated groups’. The Inquiry found that Thompson and Clark conducted large-scale surveillance operations against Greenpeace, involving close observation, extensive searches of the Motor Vehicle Register and access to other databases including the Driver Licence Register. The report implied that Thompson and Clark considered surveillance and analysis of ‘issue motivated groups’ was justified on the grounds that those groups posed threats to the safety and security of their client organisations. The Inquiry formed the view that activities such as electronic surveillance of individuals, covert surveillance of groups, attending meetings using false identities, and involvement in activity that conflicts with human rights may breach the SSC Code of Conduct and potentially contravene the provisions
State Services Commissioner Peter Hughes Image: State Services Commission / Twitter
enshrined in the New Zealand Bill of Rights Act 1990 (NZBoR) including freedom of expression, freedom of association and freedom from discrimination. An important view expressed by the Inquiry was that legal requirements applying to Crown agencies apply equally to activities carried out by contractors working for government agencies. That means private security consultants and investigators contracted to government agencies become bound by the SSC Code of Conduct and the NZBoR. In 2017 the Ministry of Business, Innovation and Employment created an ‘All of Government’ sub-panel to facilitate the private security sector delivering Protective Security Consultancy Services to government agencies. Thompson and Clark were part of the sub-panel. Key requirements within the subpanel agreement include: (a) Services must be provided in accordance with industry best practice. (b) Providers must act in the best interests of the participating agency. (c) Providers must comply with all privacy and other policies and guidelines issued by the participating agency, including the State Services Code of Conduct. (d) Providers must obtain, maintain and comply with any governmental, regulatory or other relevant approvals, permissions or requirements. (e) Providers must comply with all laws relevant to the provision of services. (f ) Providers must use all reasonable endeavours to avoid damaging or adversely affecting the reputation of the participating agency.
NZSM
11
So, what are the consequences to our industry from the SSC Inquiry? The Inquiry report should not be examined in isolation but rather the debate needs to be about our industry’s legal and ethical use of highly intrusive surveillance devices and techniques that intrude unreasonably into the privacy of individuals. The Principles contained in the Privacy Act 1993 require that personal information collection: (a) Must be for a lawful purpose. (b) Must be necessary.
12
NZSM
(c) Must not be collected unfairly. (d) Must not intrude to an unreasonable extent upon the personal affairs of the individual concerned. However, a review of the private security industry requires an analysis broader than an examination of the Privacy Act principles. The Private Investigators and Security Guards Act 1974 placed restrictions on the use of imaging and audio recording devices by private investigators. Those restrictions were a response to reports of unethical
behaviour by private investigators involved in divorce investigations. The Private Security Personnel and Private Investigators’ Bill of 2010 originally contained the imaging and audio recording restrictions from the 1974 Act. However during the passage of the Bill through the House in 2010, those restrictions were removed. The removal met strong opposition from various parliamentarians, as recorded in Hansard, during the second reading of the Bill on 7 September 2010 and at a subsequent hearing of the Justice and Electoral Committee. Some key excerpts from Hansard include: (a) “There is good reason why there should be protections around the way that the industry operates when it comes to an individual’s privacy.” (Rt Hon Jacinda Ardern). (b) “I do not think they should have carte blanche to use [digital devices such as cameras, voice recorders and so on] in any way that they see fit, which is effectively what this bill allows them to do.” (Hon Chris Hipkins). (c) “Now that we see private investigators using [surveillance] technology and being so intrusive into the lives of others, it is appropriate that they be properly restrained.” (Keith Locke). (d) “When discussing the expansion
February/March 2019
of technology that intrudes on our privacy we have to consider carefully how it might be applied by private investigators and the like in our society today.” (Keith Locke). (e) “The select committee held divergent views on this topic and although a number of people argued that the original restriction would inhibit the work of private investigators, and that the public interest in investigating criminal activity outweighed public privacy, a number of people argued that the clause should be retained to avoid potential abuse and unfairness.” (Hon Iain Lees-Galloway). (f ) “It is important to be mindful that not all of the work that this provision covered would have been investigation around criminal activity. In fact, probably some of the more frequent activity might have simply related to, for instance, marital disputes …” (Rt Hon Jacinda Ardern). (g) “Our privacy is under threat as never before because of the reach of digital technology, and who is leading that invasion? It is the private spies, often private corporate spies, who engage in industrial espionage and in the invasion of private rights that is pushing the boundary.” (Hon David Cunliffe). (h) “We need to protect New Zealanders’ privacy. We need to protect them from sophisticated private individuals
February/March 2019
not covered by the restraints that apply to the State, who have access to advanced technology and can access information about other individuals in unprecedented ways.” (Hon David Cunliffe). Since the removal of the restriction placed on private investigators’ use of imaging and audio recording devices, investigators have seized the opportunity to engage in the use of intrusive technologies to levels even greater than opponents had feared. For example in the field of ‘infidelity investigations’ research has identified some New Zealand licensed private investigators marketing surveillance, GPS vehicle tracking, computer forensics, phone data recovery and covert cameras to investigate suspicions that a husband, wife or partner is ‘cheating’. Some such companies are openly marketing ‘Honey Trap’ services, claiming use of ‘male and female investigators of all ages, interests, looks and levels of education, equipped with the latest video, voice and visual recording devices’, to test whether a husband or wife might be open to an extramarital affair. Investigators are described as ‘all former police detectives and the surveillance teams staffed with former military Special Forces and Police specialists’. Another company describes their ‘Honey Trap’ service in the following terms: ‘If you want to know the honesty and integrity of your partner,
a honey trap will present them with an opportunity that they can choose to accept or reject. All conversations are recorded and include video evidence.’ The use of ‘Honey Traps’ may well be a breach of Privacy Act Principles 4(b) (i) and (ii), in that personal information is being obtained both by unfair means and by means that unreasonably intrude into the privacy of the individual. It may also reach the threshold of the tort, intrusion into seclusion, as described in C v Holland [2012] NZHC 2155. These types of investigations call into question the ethics of the private investigation industry. The release of the State Services Commission Inquiry Report into the Use of External Security Consultants by Government Agencies provides the security industry, and in particular the private investigation sector, an incentive to examine both the legal and ethical aspects of how their businesses are conducted. A failure to do so may result in a re-introduction of the 1974 restrictions on private investigator use of imaging and audio recording technologies. Sources 1. http://www.ssc.govt.nz/sites/all/ files/Report%20of%20the%20 inquiry%20into%20the%20 use%20of%20external%20 security%20consultants%20by%20 government%20agencies.pdf 2. https://www.parliament.nz/en/pb/ hansard-debates/rhr/
NZSM
13
INFOSEC
Cyber security – you don’t have to be an expert Cyber is a topic that can make people switch off straight away, particularly when it comes to cyber risks in their security system. Apathy, fear or unfamiliarity can all play a part, writes Andrew Scothern, Chief Software Architect at Gallagher. The good news is, you don’t have to be an expert to address the cyber security of your security system. You just have to understand the cost to your business of not doing it, and care enough to act. Assess the level of threat Start by getting an understanding of the cost of a cyber breach in your system. Threat modelling will help you discover what risks you face, which threat actors you really care about, and determine the solutions you need to focus on. What’s the worst that can happen to your business and brand? How much could it cost you and what’s it worth? It’s important to keep things in perspective. Banks, prisons and high security government buildings have very different requirements to an office building or university. Different aspects of your security system will also have lower or higher levels of importance, depending on your operating environment. Determine your priorities, or you could end up down a time-consuming (and potentially very expensive) cybersecurity rabbit hole. Use the expertise of those around you If cyber-security is not in your wheelhouse, that’s ok. But it does mean you need to partner with people who do have the knowledge to help you make the best decisions for your business. They can be found anywhere – in your IT department, your security company’s hardening guide,
14
NZSM
or even bringing in external consultants. Leverage off the people around you and make good use of what they know. Of course, it never hurts to upskill yourself as well. There are many cyber security journals and online resources you can use to increase your knowledge of the cyber threat landscape and how to address business risk: • CERT NZ’s top 11 cyber security tips for your business. • Netsafe’s advice for Business/Security. • US government National Institute of Standards and Technology (NIST) cyber security site and fundamentals of small business information security document. Plan for the worst Being aware of the cyber threat landscape and making use of expert knowledge will help prevent cyber breaches, but you also need to plan for recovery in case the worst happens. Regularly back up your systems, keep the back-ups isolated, and have a plan to rebuild in the event of a cyber-attack compromising your system. It’s not a happy thought, but if you have a response plan in place the downtime and damage can be mitigated. Most of all, get your IT team involved – they have a vested interest in both getting cyber security measures right and having an action plan in place, when they’ll be the ones spending days rebuilding the system after a cyber breach. Ultimately, it’s up to you to decide what level of risk your business needs to address when it comes to cyber security of your security system. Make
sure it’s a conscious decision based on threat assessment, expert support and ongoing auditing and awareness of the threat landscape – not a head in the sand decision based on fear or misunderstanding.
About the author: Andrew Scothern, Chief Software Architect at Gallagher, has over 20 years’ experience in product development encompassing software development, software architecture, R&D management and IT advisory roles. He loves to work where people, process and technology intersect, finding new and innovative ways to solve complex problems. Andrew is also a founding member of the industry advisory group (IAG) behind the STRATUS research project, focused on improving cyber security and control of data to the end user.
February/March 2019
NZSA to release Code of Practice for Security Drones New Zealand Security Association internship research project results in the drafting of a Code of Practice for security drones. It’s a move, writes editor Nicholas Dynon, that places the industry on the front foot. As 23-year old security management student Dimphy Korstanje returns to Holland at the completion of her NZSA internship, she does so having penned the draft of a new Code of Practice for Security Drones. The first-of-a-kind document will define the policies and procedures to be followed by NZSA members involved in operating unmanned aerial vehicles (UAVs) for the delivery of security services. The requirements of the Code will be mandatory, and compliance a condition of NZSA membership. The objectives of the Code of Practice are to ensure that high professional standards are maintained, legal responsibilities are complied with and, ultimately, that the industry’s image and reputation are maintained. It’s a timely document, coming hot on the heels of controversies around recreational drones transgressing into airport airspace, and at a time when the industry’s regard for privacy principles is being called into question in the public arena. Among the stipulations listed in the document are a range of Civil Aviation Authority Unmanned Aircraft Operator Certification requirements, insurance coverage, and Privacy Act compliance items. As part of a regular review process, companies operating security drones “must be able to show evidence of continuously reviewing the processes and policies concerning drones.” They must also be able to show evidence of continuously improving processes and policies concerning drones by “using the outcomes of incidents.”
16
NZSM
Drones in security New Zealand is by no means an early adopter of security drone technology. Despite emerging use in certain applications, including rural contexts, the utilisation of UAVs in security remains at a largely prototypical stage. Recognised as a solution to certain surveillance applications involving hazardous or hard-to-get-to areas, drones are increasingly being proposed in some markets as a cost-effective alternative to installing more cameras or putting more security officers and patrol vehicles on the ground. Drones are well-suited to patrolling perimeters of large properties, such as wind farms, pipelines, dock yards and campus-type installations, and detecting and monitoring agricultural poachers. Some drone security teams responsible for particularly expansive areas are utilising thermal cameras on fixed wing drones to cover perimeters instead of deploying teams on the ground. Drones can also monitor areas of a property never previously patrolled, such as rooves, and they can cover areas otherwise missed, such as fixed camera blind spots. As the technology gains higher levels of local market acceptance and regulatory certainty, we can expect to see more security solutions augmented with UAV capabilities where it leads to savings, enhanced security outcomes, and/or the delivery of additional non-security outcomes (such as facilities management and stock control). Bringing New Zealand into line According to NZSA CEO Gary Morrison, stakeholder engagement informed the compilation of the Code, significantly with local security drone
developer Advanced Security. “Dimphy also met with and interviewed several recreational drone users to better understand the non-commercial aspects,” Gary told NZSM. “From an international best practice perspective, Dimphy has undertaken research via ASIS, including a recent webinar on this topic, and has engaged with her teacher and research facilities in The Netherlands.” “We’ve received several phone calls from people asking if there was any guidance in relation to [the use of drones in security],” he said. “At the moment it’s not covered in the [PSPPI] Act, which is silent in relation to whether or not you need to be licensed in order to operate a security drone.” With the Code currently in draft form, the NZSA will now seek wider stakeholder engagement and feedback prior to formalising the document. According to Gary, that will happen over the next two to three months.
February/March 2019
Employment relations shake-up has industry on edge Along with increases to the minimum wage, the security industry now faces targeting as a test ground for new Fair Pay Agreements as it also braces for the impacts of the Employment Relations Amendment Act 2018. Fair Pay Agreements A Working Group chaired by former National Prime Minister Jim Bolger is set to deliver its recommendations to the Government on the imposition of Fair Pay Agreements. The Agreements would set minimum terms and conditions for all workers in an entire industry or occupation. “The aim of FPAs is to prevent a race to the bottom, where some employers are undercut by others who reduce costs through low wages and poor conditions of employment,” stated Workplace Relations and Safety Minister Iain Lees Galloway in a press release. The National Party has recently claimed that the Government Working Group is proposing that a Fair Pay Agreement covering all of an industry can be triggered where 10 percent of – or at least 1,000 – workers within that industry request it, whichever is lower. Remuneration will likely be above the minimum wage. Prime Minister Jacinda Ardern has said that her government will move one or two industries onto a Fair Pay Agreement in its first term of government. Speculation is that those industries will be private security and bus drivers. There remains much speculation as to what FPAs might look like, and to what extent coalition partners New Zealand First might seek to influence this. “There are a lot of things still up in the air politically,” commented NZSA CEO Gary Morrison. Employment Relations Amendment Act A slew of employment relations changes are being rolled out over the first half of 2019 as the new act takes effect in
February/March 2019
two stages: 12 December 2018 and 6 May 2019. Many of the changes will be familiar to employers, as they represent a roll back to a pre-2015 legislative context. Among the changes that will come into effect on May 6th is the restoration of the right to set rest and meal breaks, the number and duration of which depends on the hours worked. Under the new rules, an eight-hour work day, for example, must include two 10-minute rest breaks and one 30-minute meal break, while a four-hour work day must include one 10-minute rest break. The Act will also allow employers and employees to agree to take breaks in a different manner than prescribed or to have agreed compensatory measures for those breaks. It will also provide exemption from the rest and meal break requirement to those engaged in the protection of New Zealand’s national security, where continuity of service is critical to national security and where the costs and risks in replacing the employee during the rest or meal break are too great. The NZSA has sought clarification from the Ministry of Business, Innovation & Employment (MBIE) in relation to whether the term “national
security” in this regard includes private security staff licenced under the Private Security Personnel and Private Investigators Act. So far, the indicators are that employees engaged in the private security industry are not considered to be engaged in the protection of New Zealand’s national security for the purposes of the meal break requirement exemption. Those that are likely to be covered are government employees working for central agencies such as the Government Communications Security Bureau and New Zealand Security Intelligence Service. The meal-break requirement is set to impact significantly on the industry, with logistical challenges for rosterers the tip of the iceberg. The NZSA has noted concerns from within its membership in relation to the feasibility of the changes and the non-acknowledgement of the industry’s national security role. NZSM understands that the Association will meet with senior policy officials at MBIE and also the Minister of Justice during February to discuss the potential changes and their industry impact.
NZSM
17
INDUSTRY
NZSA internship results in security drones Code of Practice New Zealand Security Association intern Dimphy Korstanje has just completed her stint with the organisation, and the result is a Code of Practice for security drones. Hailing from The Netherlands, she writes that her time in NZ was the fulfilment of a long-term dream. My name is Dimphy Korstanje, 23 years old and as a Safety & Security Management student in The Netherlands, I came to New Zealand to do an internship at the New Zealand Security Association as part of my degree.
I’m currently in my third year at Avans University of Applied Science. It’s mandatory to do a twenty-week internship in the third year of the degree. Although it’s not mandatory to go abroad, I saw the opportunity to combine travelling and studying, and to get to know New Zealand in a different way. Over ten years ago, my dad travelled solo through New Zealand and told me all of his stories. Since then, I’ve been dreaming of coming to New Zealand and discovering this beautiful country. I knew that this was a place that I really wanted to visit. And as you can see now, I made it eventually! I’m really happy that I did this internship and I feel like I developed myself both professionally and personally. For my internship at the NZSA, I conducted research into drones (also called UAVs, or Unmanned Aerial Vehicles), in which I looked not only at the threats and risks, but also at how drones can be used as a tool. I focused on how drones can be used to improve the delivery of security services in New Zealand. The research resulted in a Code of Practice for Security Drones, which will be available for NZSA members and the public. The Code of Practice is designed
18
NZSM
to provide guidance on the governance, licensing and policy requirements for the use of drones in a commercial environment, and encompasses Civil Aviation Authority (CAA) compliance and certification requirements. The research also gave insight into the impact of drones on society. Recent examples are the drone that caused chaos at Gatwick Airport in London just before Christmas, and the near-miss of a drone with a Police Eagle helicopter in Auckland on New Year’s Day. A drone can not only disturb air traffic, but can also be used in a terrorist attack, for smuggling or in a weaponised capacity. They also raise questions around privacy and ethics, especially given that you’re in the wrong if you shoot a spying drone out of the sky. Legislation is an important factor here, but the research shows that the law is far behind the technology curve. This appears to be a worldwide problem, evident in a number of countries from The Netherlands to the USA. In Europe, they’re already developing new legislation concerning drones covering all countries within the European Union. But, like I said, drones can also be used as a tool, and these drones can also have a big impact on society. All around the world, people are developing drones for purposes that can really make a difference, such as a drone that delivers packages and medicines from A to B, or a drone that locates poachers in Africa. For safety and security, a drone can be used to do dull, dirty and/or dangerous
Dimphy Korstanje, a Safety & Security Management student came to New Zealand to do an internship at the New Zealand Security Association as part of her degree.
tasks, such as inspecting barrels with chemicals. Perimeter control can also be improved by using drones to respond to an alarm. Eventually, I think drones will play a big part in the future and that they’re going to be ‘as normal as’ computers. Like drones, computers can also be used as both a tool, and a threat. I think that we just have to accept that this is going to happen, although I agree that we should do the best we can to protect ourselves against the threat – just like you use a virus scanner on your computer.
February/March 2019
NZ made
SECURITY TECHNOLOGY RELIABILITY
fire door holding
electromagnets 12 & 24 VDC selectable
rea
unb
!
le b a k
FDH40S
unbreakable universal mounting • Low power consumption - low operating temperature • One product suits floor and wall mounting • Universal armature - offsets to 55º to suit doors opening past 90º • Wall mount extensions available • 12 & 24 VDC selectable • Push off button with no residual magnetism • Oversize armature for easy alignment • Emergency release button • Electroless nickel plated armature and electromagnet • Stainless fastenings • Full local support and back up
10 YEAR GUARANTEE*
Standard, floor mounted, wall to door distance 114mm
Designed, tested and produced in New Zealand to AS4178 A) Wall mounted,126mm extn. tube (overall 202mm) B) Wall mounted, 156mm extn. tube (overall 232mm) C) Wall mounted, 355mm extn. tube (overall 431mm) B)
C)
TEE
Option A – Surface Mounted
AN GUAR
FDH40S/R
Surface and Recess mounting This device enhances an outstanding range of unbreakable products which conveniently hold open fire doors. When a smoke/fire alarm is activated the magnet instantly releases the door to the closed position to prevent the spread of smoke and fire. These units feature a choice of 3 covers for optimum aesthetic appeal and durability. The installer can utilise one device for surface mounting or for recess mounting. Option B – Recess Mounted
10 YEAR GUARANTEE*
Satin Aluminium
Gloss Black
Gloss White
Loktronic Limited Unit 7 19 Edwin Street Mt Eden Auckland P O Box 8329 Symonds Street Auckland 1150 New Zealand Ph 64 9 623 3919 Fax 64 9 623 3881 0800 FOR LOK mail@loktronic.co.nz www.loktronic.co.nz
For expert advice and assistance with your security locking needs, trust in Loktronic, call us on 0800 367 565
GUARANTEE
*Standard terms & conditions of sale apply.
21556/1/18
A)
Hikvision: Removing the weak security link in the retail chain Maintaining visibility over geographically dispersed branches is a perennial challenge for retail chain operations. By adopting Hikvision’s intelligent security solutions, retailers can bring branch security under central management with proper access to business intelligence data. Traditional retail industry is facing unprecedented difficulties. The rise of e-commerce has led to unprecedented declines in offline customer flow and associated revenues, and achieving ever-so-sleek profit margins has fast become a struggle of business intelligence ‘precision warfare’.
Unsurprisingly, the retail market has become increasingly data-driven in its selection of physical security devices and solutions. Professional security systems are now tasked not only to provide security, but also enhance economic efficiency and productivity. In this context, the critical success factor for any system is in demonstrating to senior executives (i.e. key decision makers) that a physical security solution will provide a return on investment (ROI), either through: • Protecting the value of stock • Providing business intelligence, or • Improving efficiency The statistics of loss prevention are well-known. According to a 2017 U.S. National Retail Security Survey, for example, we know that the average cost per shoplifting incident in that year in the U.S. was USD 798.48, and that dishonest employees accounted for an average of USD 1,922.80 per act. But loss prevention savings alone are no longer adequate in justifying the investment in a security system. The system needs to be able to provide store owners and managers with intelligence relating to customer volumes, patterns and behaviours, and data that can eek out business efficiencies that keep that thin profit margin from disappearing altogether. For multiple – or chain – store operations, the age-old challenge is in consolidating – or centralising – the management of the security system and the security monitoring in one place. It’s a challenge that Hikvision’s Retail Chain Integrated Security Solution is designed to meet. Central Management In a chain store operation, you don’t tend to find a dedicated senior security manager located at each store. They tend to sit at headquarters – where the decisions are made. So it makes sense that the physical security system they rely upon to make decisions sits there as well.
20
NZSM
Central Management: solution architecture for a large scale project, such as a national bank branch network requiring plenty of channels and display screens.
Hikvision’s Retail Chain Integrated Security Solution Monitoring Centre capability delivers central surveillance management that allows security administrators to monitor all stores in a geographically dispersed branch network. Specifically, the central management capability of the Retail Chain Integrated Security Solution makes it possible to: • Inspect stores remotely – remote live view and playback of multiple scenes or chain stores. • Centralise business data analysis – centralised management of all cameras and devices from multiple chain stores. • Perform overall system maintenance – monitor real-time system health status, and handle the exceptions. • Globally manage alarms – real-time monitoring for quick emergency response. With the Remote Site Management (RSM) module of Hikvision VMS platform, you can centrally manage all remote sites, such as chain stores, as well as all cameras, videos and alarms. VMS platform is able to manage large scale projects with up to 1,024 sites or devices and 100,000 cameras. The VMS platform in the monitoring centre allows for the remote live view and playback of multiple scenes or chain
February/March 2019
stores. Pop-up linkage video can be displayed on the video wall when alarm events occur. But it’s not just security managers who stand to benefit from the centralisation of security smarts. Marketing teams may have an interest in aspects of the security system that gather business intelligence. Human Resources can make use of employee access and attendance data provided by access control systems; and IT also have a stake in the security system as part of the organisation’s network footprint. Central management makes security-driven business intelligence more accessible to these stakeholders than ever. Security and Loss Prevention Hikvision knows a thing or two about protecting businesses from theft, and it is doing just that in increasingly intelligent and cost-effective ways. Hikvision’s Fisheye cameras, for example, provide for 360 degree dead-corner-free surveillance – ideal for covering big shopping areas for maximum monitoring view and image quality. Thermal Detection Worried about the safety of the stored goods? Warehouses and storage areas are often sought out by thieves, and even by employees on occasion, and they also tend to have a higher susceptibility to fire. With Hikvision Thermal cameras, fire and other nasties can be detected by temperature before it’s too late. POS Text Overlay Reduce fraud, identify employee theft and solve disputes efficiently. Hikvision’s POS Solution, for instance, connects surveillance video with transaction data captured at Points of Sale, either while POS data is sent for printing (via RS232/ USB), while POS data is sent to central database (via IO server), or from the POS software itself (via IP address). Video with POS text overlaid provides more detail of each transaction and makes the often vexed process of footage searching that little easier. This technology can be easily applied for solving customer and employee disputes and preventing inside jobs. Electronic article surveillance No conclusive evidence to convict a shoplifter? Electronic article surveillance (EAS) is an effective method of inventory protection. By integrating it with Hikvision cameras, an image or video clip of the incident can be captured or recorded for retails to use it as the conclusive evidence and lower the shrinkage. Precision marketing Business intelligence (BI) is a broad category of applications and technologies that enable enterprise users to optimise business decisions with better access and understanding of relevant commercial data. Store managers use BI to do things like optimising their shelf products, improve employee performance, and forecast sale data, and with centralised management it becomes possible to view the entire chain network and to compare individual stores. People Counting A precise customer flow is the key to evaluate sales performance, and it can assist in identifying peak times daily/ weekly/monthly, optimising staff scheduling and promotional activity planning. Where rental terms are based on footfall, it can also help you judge the reasonability of store rent.
February/March 2019
Heat mapping High customer traffic, low sales volume? Recording dead/heavy traffic zones and tracking the customer browsing experience as customer traffic knowledge can help you gain insight on how to better arrange product layout and shopping area presentation. With Hikvision’s Heat Mapping function, retailers can determine the amount of time shoppers spend in specific areas of a store, identify hot spots and dead zones. Hikvision’s heat-mapping Fisheye Cameras not only capture a panoramic high-definition image but also learn about heat conditions in different regions within a store. In spacious areas, each fisheye camera does the work of several conventionallens cameras, requiring fewer cameras and therefore reduced installation and labour fees. Queue Analysis Automatic queue monitoring and alarm. Improve Customer Experience. Long queues are a real customer experience no-no. Hikvision’ queue detection cameras monitor the queuing situation in real-time. The cameras count the number of people in each queue, and then track the dwell time of each customer. Once it is identified that the number of people in a queue is too high, or the average dwell time of customers is too long, an alarm is then triggered to prompt a response. Data Fusion By comprehensive analysis of the data derived from people counting, heat mapping, and queue detection, together with the transaction data available from retailer’s ERP system, Hikvision’s retail solution can help managers to get an overall idea of the operational status of their shops and make wiser business decisions. In the retail chain context, Hikvision’s Retail Chain Integrated Security Solution brings security and business intelligence oversight to the people that need it. Centralised management of data collected from regional and national retail networks delivers the ‘single source of truth’ that headquarters-based decision makers could previously only have dreamt of.
NZSM
21
PHYSEC
Changing face of supermarkets creates loss prevention challenges The wide adoption of self-service checkouts and the phasing out of single-use shopping bags, writes editor Nicholas Dynon, has provided new opportunities for shoplifters, making it easier for perpetrators to explain their way out of detection. The New Zealand supermarket shopper experience has undergone significant upheaval in recent years with the introduction of self-service checkouts and the phasing out over the last 12 months of the once ubiquitous plastic shopping bag.
By pushing shoppers to bring their own shopping bags and conduct their own product scanning and payments, retailers are effectively relinquishing control over key aspects of the shopping process to shoppers. In doing so, they
22
NZSM
are inadvertently providing greater opportunities for those of malintent to steal. Technology-enabled theft Self-checkout terminals are projected to increase internationally from 191,000 in 2013 to 325,000 in 2019. Australia and Italy are apparently leading the selfcheckout charge. According to Gary Mortimer and Paula Dootson in The Conversation, employment in the Australian supermarket and grocery industry went down for the first time in 2015-16, but is projected to rebound again “in part due
to the need to curtail growing theft in self-checkouts.� There is reason to believe that rates of theft are higher on self-service machines than regular checkouts. A study of 1 million transactions in the United Kingdom found losses incurred through self-service technology payment systems totalled 3.97 percent of stock, compared to just 1.47 percent otherwise. The Guardian cites another U.K. study by sales coupon website Voucher Codes Pro, which surveyed 2,532 shoppers about their supermarket habits and found that almost a quarter had committed theft at a self-checkout at least once. The
February/March 2019
report suggested that more than £3bn worth of items was stolen in 2017 at selfcheckout terminals, up from £1.6bn in 2014. In 2016, criminologists at the University of Leicester published a paper on the impact of recent developments in mobile-scanning and pay (MSP) technology. They argued that MSP generates significantly high rates of loss and promotes ease of effort for theft by removing human contact in the shopping process. The report, Developments in Retail Mobile Scanning Technologies: Understanding the Potential Impact on Shrinkage and Loss Prevention, suggests that allowing customers to pay for supermarket products via MSP could make it easier for people to steal and also reduce their perception of legal consequence. Available data indicates that selfscanning technologies generates significantly high rates of loss – more than 122 percent higher than the average rate of loss. The report found that the sense of risk perception felt by customers is reduced when using MSP, as human interaction is removed from the shopping process.
February/March 2019
The technology also gives offenders ‘ready-made excuses’ for non-scanning behaviour, such as blaming faulty technology, problems with product barcodes, a lack of technical proficiency – or just absentmindedness. “Both loved and loathed by consumers, with the phrase ‘unexpected item in the bagging area’ striking dread into many a shopper, self-scan technologies are growing in use and likely to become even more prominent as we begin to be encouraged to use our own mobile devices to both scan and pay for products in the stores we visit,” stated report co-author Professor Adrian Beck. “From the retailers’ perspective, the benefits seem obvious – less investment required in staff and checkout technologies, with the former being the biggest expense they face,” he said. “For the shopper it could mean the end of checkout queues as product scanning and payment can in theory be performed anywhere in the store at their convenience.” “To borrow a well-warn Top Gear phrase, ‘what could possibly go wrong’?” “Well, our research found that quite a bit could and does go wrong, with some potentially rather worrying long term consequences.” Ultimately, Professor Beck and coauthor Dr Matt Hopkins found that retailers could find themselves accused of making theft so easy that some customers who would normally - and happily - pay are tempted to commit crime, especially when they feel ‘justified’ in doing it. From plastic bags to loot bags This feeling of ‘justification’ appears to be a key behavioural driver behind the significant numbers of shoppers who are stealing reusable shopping bags from supermarkets. A Canstar Blue survey of 3,000 adults has found that almost one in five survey respondents (19 percent) admitted to taking a reusable bag from a supermarket without paying. The survey found that 80 percent of those surveyed typically remember to take their own bags when they visit the supermarket, but one in five (19 percent) usually forget and have to pay for reusable bags. The remaining one percent prefer not to take their own bags and are happy to buy them each time they shop. Those aged 18-29 were most likely to steal a bag (33 percent), with those aged 60 and over least likely (6 percent). Men
were more likely than women to consider taking their own bags to the supermarket to be a hassle (47 percent versus 39 percent), and they were more likely to steal reusable bags (22 percent versus 16 percent). “It seems that plastic bags are being seen as ‘fair game’ by some shoppers who either forget to bring their own bags, or simply don’t think they should have to pay for them,” said Canstar Blue Editor Simon Downes. “But the reality is that, if you take something you need to pay for without paying, it’s stealing, regardless of the cost.” Thefts have forced some supermarkets to place security tags on their re-usable plastic bags. Other supermarkets have reported an increase in the numbers of shopping baskets going missing, prompting some to stop providing them to customers. Some shoppers – it appears – prefer to carry the baskets home rather than paying for a re-usable bag. A more concerning trend is the increasing reports of shoplifters using re-usable bags to steal supermarket products. Entering the store with reusable bags, perpetrators are finding that they can use them to more easily conceal items they steal. Reusable bags make it more difficult for staff and loss-prevention officers to tell what a customer has paid for and what they may have brought into the store with them. According to Stuff.co.nz, Wellington’s Moore Wilson’s supermarket has banned shoppers from using their own bags, preferring them to use baskets or trolleys to prevent stealing. A sign at the store stated: “To assist in our efforts to eliminate shoplifting, we ask all customers to not shop into their own bags”. As is the case with self-checkouts, providing thieves with the opportunity to utilise re-usable bags provides them with ‘ready-made excuses’ for non-payment of products, such as claiming that paid for and not paid for items were inadvertently placed in the same bag, or that the goods were bought elsewhere. Mounting evidence indicates that both self-checkouts and re-usable shopping bags have provided new opportunities for shoplifters, including those that might not fit the traditional shoplifter profile. The risk of getting caught is perceived to be less the more that stores cede control of processes to shoppers and leave them to ‘do-itthemselves’.
NZSM
23
INFOSEC
The Privacy Problem Megan Gates, senior editor of Security Management, writes that the push for privacy in cyberspace will likely come from private companies looking to ensure that revenues and trust in their products and services remain high. Internet users generate more than 2.5 quintillion bytes of data every day and will create vast amounts more in the future as the Internet of Things (IoT) continues to grow, according to cloud-based operating system company Domo.
There are benefits to the creation of this data—improved technology offerings, learning material for artificial intelligence programs, advances in medical science, and more. But there are also downsides if companies that collect this data are left unregulated, critics say. One horrifying example came to light in the past two years when a Facebook propaganda campaign resulted in the emigration of more than 700,000 Rohingya who fled Myanmar to escape a campaign of ethnic cleansing targeting Muslims in the country. Thousands of others were killed. The Facebook campaign was created by Myanmar military personnel, who coordinated over several years to spread false information—like allegations of rape and mass killings by Rohingya— across the Internet. The posts escaped Facebook’s notice, and human rights groups allege that they were used to incite murders, rapes, and the ultimate massive migration of Rohingya out of Myanmar to escape persecution. Almost a year after Rohingya began fleeing Myanmar, Facebook—facing mounting criticism—hired the Business for Social Responsibility (BSR) to assess Facebook’s role in the violence in Myanmar.
The report found that Facebook was not doing enough to prevent its platform from being used to create division and incite offline violence. Facebook agreed with the report’s findings, and explained in a corporate statement by Alex Warofka, product policy manager, that it was making changes to the platform to prevent future atrocities. “BSR provided several recommendations for our continued improvement across five key areas, in order to help mitigate the adverse human rights impact and maximise the opportunities for freedom of expression, digital literacy, and economic development,” Warofka wrote. “These areas include building on existing governance and accountability structures, improving enforcement of content policies, increasing engagement with local stakeholders, advocating for regulatory reform, and preparing for the future.” Facebook is taking these actions independently because currently there is no regulatory framework that would require it to remove propaganda like that used by the Myanmar military. This lack of legal guidance highlights a major problem in our current “data-industrial complex” that allows information to be “weaponised against us with military efficiency,” said Apple CEO Tim Cook in a recent speech at a European privacy conference. “Platforms and algorithms that promised to improve our lives can actually magnify our worst human tendencies,” Cook explained. “Rogue actors and even governments have taken advantage of user trust to deepen divisions, incite
violence, and even undermine our shared sense of what is true and what is false. This crisis is real. It is not imagined, or exaggerated, or crazy.” In his speech, Cook praised European lawmakers and California legislators who have enacted data protections for users (the General Data Protection Regulation and the California Consumer Privacy Act). But he said more needs to be done to protect users, so they continue to trust—and use—new technology. “It is time for the rest of the world to follow [Europe’s] lead,” Cook said. “We at Apple are in full support of a comprehensive federal privacy law in the United States.” Specifically, Cook articulated that this law would give users the right to have their personal data minimised, give users the right to know what data is collected on them, give users the right to access that data, and require that data be kept securely. And Apple isn’t alone in its stance. Intel recently released a draft bill for the United States designed to optimise innovation and protect privacy. “What the United States needs is a privacy law that parallels the country’s ethos of freedom, innovation, and entrepreneurship,” Intel said in a statement about the legislation. “That law needs to protect individuals and enable for the ethical use of data.” Having a legal framework for data usage will help new technologies, such as artificial intelligence, solve global problems while creating economic growth, Intel added. “Ethical use of data will be critical as we use data to train artificial intelligence
© 2019 ASIS International, 1625 Prince Street, Alexandria, VA 22314. Reprinted with permission from the January 2019 issue of Security Management.
24
NZSM
February/March 2019
algorithms to detect bias and enhance cybersecurity,” the statement from Intel explained. “In short, it takes data to protect data. The U.S. needs a law that promotes ethical data stewardship, not one that just attempts to minimise harm.” Intel’s suggestions are similar to Apple’s, including limiting the amount of data that is collected on users, requiring organisations to specify why they are collecting that data, limiting the use of that data, and requiring organisations to “adopt reasonable measures to protect personal data.” Intel also explained that it recognised the need for a legal framework to prevent “harmful uses of technology and to preserve personal privacy so that all individuals embrace new, data-driven technologies,” in the statement. “At Intel, we know that privacy is a fundamental human right and robust privacy protection is critical to allow individuals to trust technology and participate in society.” Microsoft has also advocated for more robust regulation of the Internet and tech firms. In 2018, it worked with the French government to create the Paris Call for Trust and Security in Cyberspace, which was announced at the UNESCO Internet Governance Forum in November. “The French government has worked to lay the foundation for the steps the world’s governments and other stakeholders need to take,” said Microsoft President Brad Smith in a Financial Times op-ed. “We should all hope that the other participants in Paris will support efforts to protect citizens and civilian infrastructure from systematic or indiscriminate cyberattacks.” The initiative will create international norms for the Internet, including
February/March 2019
preventing foreign actors from interfering with elections, prohibiting private companies from “hacking back,” and protecting intellectual property. “As the Internet has become central to daily life, cyberattacks have grown more frequent and destructive,” the call said. “Only by acting together can we protect cyberspace.” Endorsing the call were 130 private companies-including Microsoft, Facebook, Google, IBM, and HP-along with 90 nonprofits and more than 50 nations. The United States, Russia, China, Iran, and Israel did not pledge their support. This is indicative of the reluctance of the United States on the national level to address privacy and cybersecurity regulations. This is unlikely to change in 2019 with U.S. President Trump in the White House and Republicans maintaining control of the U.S. Senate. Varonis Tech Evangelist Brian Vecci says that private companies will lead efforts to standardise the regulatory field following actions by U.S. states—many of which have already adopted data breach disclosure laws and will likely consider legislation similar to California’s in the future. “The big tech companies are very forward thinking,” Vecci says. “They tend not to think a quarter ahead or a year ahead, but five, 10, 20 years ahead—that’s the business they’re in.” While in the past Americans may have assumed that a major data breach or cyberattack would press the U.S. Congress to act, Vecci adds that, following the Equifax breach, that’s unlikely to happen. Instead, the push will come from private companies looking to ensure that revenues and trust in their products and services remain high.
“If no action is taken, we’re going to start to see a bit of a backlash,” Vecci says. “To maintain trust for their businesses to work, these firms are going to be at the forefront of putting that privacy regulation in.” Paris call for trust and security in cyberspace French President Emmanuel Macron unveiled the Paris Call for Trust and Security in Cyberspace at the 2018 UNESCO Internet Governance Forum in Paris. The call pledges to create a set of international norms for cyberspace. They include the mission to work together to: 1. Prevent and recover from malicious cyber activity that threatens or causes harm to individuals and critical infrastructure. 2. Prevent activity that damages the general availability or integrity of the public core of the Internet. 3. Strengthen the ability to prevent election interference. 4. Prevent intellectual property theft. 5. Develop ways to prevent proliferation of malicious information communication technology tools and practices. 6. Strengthen the security of digital processes. 7. Strengthen cyber hygiene for all actors. 8. Prevent nonstate actors from hacking back. 9. Promote acceptance and implementation of international norms of responsible behaviour in cyberspace. Those participating in the call will revisit the norms at the Paris Peace Forum and at the Internet Governance Forum in Berlin in 2019.
NZSM
25
The global rise of knife crime Robert Kaiser, widely-respected expert in body armour and CEO of PPSS Group, explains why poverty, drugs, extremism and mental illness – and availability – is resulting in a global increase in knife crime. The rise of knife crime is now an international issue and reports of stabbings in the news increases fear and worry in communities. But, there is nothing new about knife crime: sharp objects, blades and knives have been used as weapons for thousands of years. But why is knife crime around the world rising?
In his 2010 book Knife Crime: The Law of the Blade, John McShane compiles a catalogue of the UK’s most high-profile knife murders in recent years. Describing the 1995 murder of Philip Lawrence, McShane declares that it marked “the dawn of an age when the response to a confrontation was no longer verbal or even rough physicality. Instead it was the quick, uncaring thrust of a blade from a feral youth lacking compassion or morality, thinking only of himself and nothing of the havoc caused to those in his way or their loved ones.” There is no question about it, we do live in a society where individuals care far less for each other than they used to; and one can also identify a lack of compassion in parts of today’s world. Every time somebody commits a murder or assault, by making bodily contact, by choking, beating, or in these cases by stabbing others to death, it always speaks of a level of rage and sometimes even a personal connection to the victim, but it most certainly also reflects an incredible lack of compassion. When you are stabbing someone, it’s close and in your face. The experience is extremely graphic; it somehow tells an emotional story of hate or rage. I do believe that more and more people are becoming more and more angry and frustrated with life in general and – rightly or wrongly – that somehow brings them that bit closer to the stage of ‘rage’ from the outset. I look at humans and see them as ‘pressure cookers’. Many people in today’s societies are under pressure, financially, emotionally, mentally or physically, and a person can only take a certain amount of pressure (some can, of course, take more than others). Ultimately many – or most – humans can ‘blow up’ if they haven’t learned to ‘let steam off ’ in a controlled manner, or by finding a more balanced and satisfying life style in the first place. In cases where people have ‘exploded’ and taken action ignited by additional anger, hate, disappointment or frustration, they were either unable to control themselves or had simply chosen not to. I believe that five things in particular are a massive contributing factor to the increase of violent crimes involving edged weapons.
26
NZSM
1. Religious/political extremism – If you truly believe that harming or killing others is the absolutely only way you can achieve your goal (whatever that might be) then you are unlikely to stop from proceeding with your action. 2. Drugs – One cannot produce, transport and deal with drugs without enforcing certain aspects of the process. Guns have been used a lot in the past and are still the weapon of choice in some regions, but in more and more countries we can already identify a shift moving to the use of edged weapons.
February/March 2019
3. Poverty and social exclusion – Knife crime is mostly present in the poorest and most deprived places where violence is a clear sign of deeper problems, such as poverty and social exclusion. The subsequent missing ‘sense of belonging’ often leads to the desire of wanting to become a member of a gang, which ultimately leads to the need for carrying and ultimately using a knife. 4. Social media – yes, this has also been blamed for the increase in knife crime, with some experts arguing that social media means everything to some knife carrying criminals. People are recording footage of knife attacks, and these videos are being streamed millions of times, offering fame and more ‘followers’. 5. Serious mental illness – Many of those who have been responsible for multiple killings using edged weapons have been diagnosed with serious mental illness either before or after the attack. But why the clear shift from guns to knives? In most countries guns are illegal. Selling or buying firearms, exporting or importing firearms, carrying or transporting them comes with a real risk. Due to the threat of global terrorism, intelligence services and law enforcement agencies around the world are keeping a close eye on anything metal that fires rounds and can kill people. The risk of being arrested during the purchase/sales/transport of firearms is just too high for most terrorists, criminals or ‘pressure cookers’. However, all it takes for a knife attack to occur is for one of these individuals to go home, grab a kitchen knife, and return to the place of anger and hate in order to deal with a victim in the only way he/she believes is right at that moment in time.
February/March 2019
This ‘grab a kitchen knife’ point is also of great relevance in terms of the recent rise of global terrorism utilising edged weapon. Due to the stringent firearm controls and the low level of planning required to conduct a knife attack (whether against an individual or group), knives have become the weapon of choice for many so called ‘lone-wolf ’ attackers. Knives are commonly available, and this is not going to change, no matter what the law says or will say in the future. We cannot stop people from walking into the kitchen or the local hardware store, grabbing a knife (or screwdriver) and randomly stabbing other human beings. If one has the intention to cause harm to others using a knife or edged weapon, then intelligence services and law enforcement agencies will always struggle to prevent such an attack. Knives are also relatively concealable. The desire of people to conceal their weapon is based on the fact that it is a crime in many countries to carry an offensive weapon and they wish to avoid detection and arrest. A knife is easier to conceal than a firearm, hence more criminals have moved from carrying firearms to carrying knives. A further reason why more and more people chose the knife over a gun is a rather simple one. They couldn’t get a gun! It is very difficult to procure a gun in most countries, and even if you live in a country where guns are available, if you have a criminal record the chance of purchasing a firearm is close to zero. The final reason why I believe knives are being used more and more is the ‘no training required’ aspect. To purchase a firearm is one thing, but to fire a gun and hit a target from a reasonable distance to avoid identification and arrest is an altogether different matter. A knife is easy to use. It almost doesn’t matter where you stab a body – it will hurt a lot and likely kill that person subject to the point of entry and/or number of stabs.
NZSM
27
Portrait of a shooter Mark Tarallo, a veteran award-winning journalist writing in Security Management, explores the notion that preventing violence by detecting and addressing red flag shooter behaviour prior to an attack is more effective than any physical security measure.
Do active shooters display any detectable warning behaviours at some point before an attack? The FBI has found that they do.
In the new report A Study of PreAttack Behaviours of Active Shooters in the U.S. between 2000 and 2013, authors and researchers from the FBI’s Behavioural Analysis Unit looked at a scientific sample of 63 active shooters who were involved in the 160 active shootings that occurred in the 2000-2013 time period. The FBI found that most of these 63 shooters exhibited four warning behaviours before they attacked. These four warning signs, which the report calls “concerning behaviours,” were noticed around the shooter’s mental health (62 percent), interpersonal interactions (57 percent), leakage of violent intentions (56 percent), and quality of thinking or communications (54 percent). “What emerges is a complex and troubling picture of individuals who fail to successfully navigate multiple stressors in their lives while concurrently displaying four to five observable, concerning behaviours,” is how the report describes the 63 active shooters. The FBI defines active shooter as someone actively killing (or attempting to kill) people in a populated area. Not all active shootings are classified as mass shootings, which is a broader category of shootings in which three or more people are killed. Other shooter characteristics emerge from the FBI’s data portrait. A large majority (77 percent) spent a week or more planning the attack. Very few (8 percent) obtained their firearms illegally.
And, contrary to the stereotype of a shooter as isolated and cut off from society, the study found that 68 percent of shooters lived with someone else, and 86 percent had significant in-person social interactions with at least one other person in the year of the attack. In addition, almost all of the shooters were under a significant amount of stress. On average, the shooters were experiencing 3.6 separate stressors in their lives in the year before they attacked, the report finds. The most common stressors were mental health (experienced by 62 percent of shooters), financial strain (49 percent), and job stress (35 percent). However, the FBI cautions that the mental health stressor is not synonymous with a diagnosis of mental illness. “The Stressor ‘mental health’ indicates that the active shooter appeared to be struggling with (most commonly) depression, anxiety, paranoia, etc., in their daily life in the year before the attack,” the authors write. So, while 62 percent of the shooters were experiencing a mental health stressor, in only 25 percent of the cases was the FBI able to verify that the shooter received an actual mental illness diagnosis. In 37 percent of cases, the FBI could not determine if a diagnosis had been received or not. Demographically, there are two characteristics that were common among the shooters. The overwhelming majority (94 percent) were male, and a solid majority (63 percent) were white. However, a range of different races were represented. Shooters have been Asian, black, Hispanic, Middle Eastern, and Native American.
Mark Tarallo, award-winning journalist for Security Management
As for the troubling behaviours, the report emphasizes that these behaviours were “objectively knowable” to others. This, then, addresses a particular issue, according to the FBI: “the possibility of identifying active shooters before they attack by being alert for observable, concerning behaviours.” However, one fact that works against this possibility is that troubling behaviours are not always reported. In fact, the study found that the most common response to an observed concerning behaviour was to communicate directly to the shooter (83 percent) or do nothing (54 percent). The behaviour was reported to law enforcement in 41 percent of cases. Brad Spicer, a member of the ASIS School Safety and Security Council and president and CEO of SafePlans, says that the FBI’s study is of significant value for those looking to detect and prevent school shootings. “If an incident occurs at X time on a time line, then everything
© 2019 ASIS International, 1625 Prince Street, Alexandria, VA 22314. Reprinted with permission from the October 2018 issue of Security Management.
28
NZSM
February/March 2019
before X is an opportunity to prevent the incident,” Spicer says. The study is also a good supplement to another valuable resource for school shootings, the FBI’s four-pronged assessment model, Spicer adds. That model was released in a previous FBI report, The School Shooter: A Threat Assessment Perspective. Under the four-pronged assessment model, a student who has made a threat is evaluated based on circumstances and behaviours in four areas: personality of the student, family dynamics, school dynamics, and social dynamics. “It continues to be refined. It’s a great resource,” Spicer says. In the school setting, early detection of troubling behaviours is not only a good way to help prevent future violence, but it also has value as a tool for identifying students who may need support and help, Spicer says. Once identified, remedial assistance can then
February/March 2019
be given, the level of which will be appropriate to the case at hand. “This is not a situation where we are going to be engaging the SWAT team and dragging the child into the hallway,” he explains. In the workplace, information generated by the FBI’s study can be used as part of a threat assessment program that educates employees about what to look for in terms of possible concerning behaviours, Spicer explains. A team can then review possible threats, to make sure they are legitimate. “You never want to ignore a problem,” he says. However, Spicer also explained that he was not surprised by the FBI’s assertion that troubling behaviours often go unreported, such as the report’s finding that nothing is done in 54 percent of cases. This is especially true where the person observing the behaviour has an intimate relationship with the suspect, such as a family member or spouse, Spicer explains.
“While that reluctance is understandable, no one should ignore their own built-in danger detector: their intuition,” says Spicer, who adds that intuition is helpful and correct in two ways—it is always acting in the subject’s best interest, and it is always based on something. So, a spouse or family member whose intuition is telling them that the troubling behaviour they are witnessing could be signalling something serious should report this, perhaps to a threat assessment professional in the workplace, or a mental health professional. “There’s no easy button for preparedness,” Spicer says. “People have to take some accountability and use the resources that are out there.” Those resources now also include a new guide by the U.S. Department of Homeland Security, K-12 School Security: A Guide for Preventing and Protecting Against Gun Violence. The guide includes information on developing a school security process called Connect, Plan, Train, Report (CPTR). It also includes sections on threat assessment teams, mental health and school climate issues, and the importance of looking for behavioural warning signs. “The importance of detecting and addressing concerning behaviour, thoughts, or statements cannot be overstated,” the guide’s authors write. “In fact, preventing violence by detecting and addressing these red flags is more effective than any physical security measure.”
NZSM
29
INDUSTRY
ASIS NZ Chapter Executive Update In this abridged version of his first update to members for 2019, ASIS New Zealand Chapter Chairperson Andrew Thorburn introduces the ASIS NZ executive, new membership fee arrangements, certifications and more. Welcome to the first update for 2019 from the ASIS NZ Chapter 148 executive! I intend that we as an executive will have regular communication with you to ensure content on our events continues to be relevant and accessible to current and future members. An email distributed on the 26 November updated you on who your new executive is, and I am proud to say for the first time in our Chapter history we have women filling three out of the four roles. We are on track to have our first female Chairperson in the next two years too, so we have come a long way in the 15-odd years I have been involved.
Andrew Thorburn, Chairperson ASIS New Zealand Chapter
30
NZSM
Joining me on the executive are: • Ngaire Kelaher CPP PSP, Deputy Chairperson • Dee Wakelin, Secretary • Caroline Halton, Treasurer • Charlie O’Donnell, Shadow Committee (Head) • Lincoln Potter PSP, Shadow Committee It is my intention that quarterly updates will be shared by the executive team. This enables each of us to provide a quarterly insight to the sector, and for you as members to become familiar with why each of them is an important part of our organisation. We will provide details on what has been happening and what will be happening. Please support each of the team if you are able. I also want to provide insights following the recent visit by ASIS International’s CEO Peter J. O’Neil and Secretary-elect, Malcom J. Smith, along with outcomes of a strategy meeting of the newly elected executive and shadow committee members on Wednesday 19 December. We must acknowledge the time and efforts of our outgoing volunteer and Chapter executives, Dean Kidd, Lincoln Potter, Carlton Ruffell and Mark Gutry, who without their commitment and expertise, the Chapter would not have continued. Thank you to you all. Visit by ASIS International Executive From Monday through Wednesday 4-6 December, Peter and Malcom visited New Zealand, as part of an APAC region visit, to better understand the needs of Chapters and their members.
During this visit, we convened at the NZSA offices in Albany, had a tour of ICT’s manufacturing and head office facility in Albany, and met with the Auckland War Memorial Museum Safety & Security Manager and team, in addition to holding a special meeting for members to learn of the ASIS strategy in the years ahead. There are four fundamental pillars that will be focused on to improve the value of ASIS membership. These are research, certification, standards and guidelines. We will execute the strategy through more collaboration with the NZSA, sharing of content with Defsec Media from ASIS publication Security Management, and establishing training and certification support from within the membership to members and non-members wishing to undertake professional certification examinations. A special thank you to Lincoln Potter, PSP, for hosting and supporting our guests with transfers between meetings. Meetings in 2019 The intent is to hold monthly Chapter meetings from February to November in Auckland and Wellington on the second and third weeks of each month respectively. We hope to have the same presenters/presentations at both locations for continuity and the option to attend at least one if the other clashes with professional commitments. We intend to have a wider mix of academic presenters delivering findings from local and global enterprise security risk management research and crosssector interest groups, such as the NZISF and ISC2, to ensure a holistic approach is applied to our work.
February/March 2019
Keep an eye out for our first meetings in February, which will feature a presentation by Institute of Business Ethics New Zealand representative, Jane Arnott, on the triennial survey into employees’ views of ethics at work in Britain since 2005. The survey has since been widened to review ethics at work in more countries including, for the first time, New Zealand and Australia. I think we’d all agree that the sector does not have the best track record when it comes to ethics, but this is changing, and insight will be valuable when considering culture and people in a PERSEC sense. Membership Fees and Sponsorship The committee has agreed that we will move to a lower cost engagement model and one that affords convenience without added cost to the ASIS NZ Chapter. We hope this will make membership and engagement more accessible, but most importantly, valuable. Initially, members will join ASIS International and then subscribe to the NZ Chapter. We will offer morning, afternoon and/or evening sessions to ensure we can attract the right presenters and audience. Current costs for breakfasts will be absorbed for paid-up members through sponsorship from industry organisations and solution vendors. Non-members will be required to pay for attendance to encourage membership, collaboration and sector engagement. Details are yet to be finalised, but it is looking like annual NZ Chapter fees of $60.00 per ASIS International member. Where Credit Cards are used a 5% surcharge will apply to cover processing costs. Certification With several options available from APP, CPP, PSP to PCI, the executive is engaging with Bruce Couper of RISQ New Zealand to explore the costs of establishing a study support program in Auckland and Wellington.
Congratulations to Johan Janse van Rensburg of Kiwibank on being selected as the ASIS New Zealand Chapter 148 recipient of the ASIS Foundation CPP Accelerator Scholarship. This scholarship includes a gift voucher to go online and apply for the ASIS CPP certification at no charge provided one qualifies as per the certification guidelines to take the exam. In addition, Nicholas Dynon of Defsec Media will be undertaking the new APP programme and providing an insider’s account of the experience through an article in New Zealand Security Magazine. If any other members or nonmembers wish to learn more about certification programs offered by ASIS, please reach out to one of the executive to explore how we can facilitate or support your professional development. ASIS NZ Chapter Constitution\ Relevance to our sector and members is paramount. To that end, it has been recognised and accepted that our Chapter constitution is out of date with current trends and requires amendments. Lincoln Potter has offered his support to this and is currently preparing a revised Constitution for the executive to review and pass in Q1 2019 (Calendar Year). Social Media and Website We are presently reviewing the best options for engagement with members and resources through Social media and the website. Please connect with ASIS New Zealand on LinkedIn and Facebook. We have several initiatives that we are working on in regards to our website and Dee will provide recommendations to the executive in Q1. That’s it from me, and if you have stayed with me this far I appreciate it. Ngaire will provide our next executive report at the end of Q1 with further updates on meetings and sponsors. I look forward to representing our membership and seeing us all work towards growing a more diverse, converged and professional industry.
SUBSCRIBE Readers of NZ Security include those working directly and indirectly in the domestic and commercial security industry. From business owners and managers right through to suppliers, installers and front line staff. Among our readers are IT security experts, surveillance professionals and loss prevention staff. Our readers take their job seriously and make an active choice to be kept informed and up to date with the industry. For only $75.00 plus GST you can ensure that you receive a 1 year subscription (6 issues) by filling out the form below and posting to: New Zealand Security Magazine 27 West Cresent, Te Puru, 3575 RD5, Thames, New Zealand or email your contact and postal details to: craig@defsec.net.nz Mr Mrs Ms________________________ Surname_________________________ Title_____________________________ Company________________________ Postal Address____________________ ________________________________ ________________________________ Telephone________________________ Email____________________________ Date_____________________________ Signed___________________________
NZSM New Zealand Security Magazine
February/March 2019
NZSM
31
EVENT
Top five security trends for 2019 The organisers of Security Exhibition & Conference 2019 list the top five security trends for 2019: biometrics, artificial intelligence and robotics, IoT, cloud versus edge computing, and physical and cyber security.
2018 was a huge year for technology, particularly within artificial intelligence (AI) and machine learning. In 2019, we can certainly expect to see more implementations of smart video analytics and biometric solutions, along with virtual assistants, autonomous vehicles, robots and ever greater automation across the board.
The challenge for security professionals will be how to best harness the power of these tools, whilst mitigating the inevitable threat a rapid increase in connected and autonomous technologies will pose. Biometrics Adoption of biometric systems across access control, workforce management, banking and payments, immigration, law enforcement, and government services look set to keep rising. Within both the physical and logical security sectors, demand has been growing for biometric sensors, largely due to concerns over security and the continued rise of automation. With a current growth rate of 10.4 percent CAGR, the biometric market is predicted to reach US $29.37 billion by 2022, with the APAC region tipped for the greatest growth. However, as biometric security is not foolproof, and there have already been successful instances of spoofing fingerprint and facial recognition. Multifactor authentication will be essential to guarantee security, but the likelihood of the public being enticed by the convenience of single-factor biometric
32
NZSM
authentication could leave the door wide open to cybercriminals. Artificial Intelligence and Robotics As Deep Learning continues to push the boundaries of AI, we will see the increased merging of intelligent video surveillance with robots and autonomous vehicles. Employed to patrol our streets, shopping precincts, hospitals, sports grounds, government buildings, and industrial perimeters to name a few. They will be able to process information on the spot, such as object and facial recognition, and behavioural analysis, to detect and deter potential risks. Gartner forecasts Global AI will reach US $1.9 Trillion in 2019. China, with the largest video surveillance network in the world of 170 million cameras, already uses facial recognition to great effect and is planning to achieve 90 percent accuracy of facial recognition within seconds. Knightscope in the US have built a robot that is currently patrolling shopping malls, and in Dubai, flying cars and robocops are on the cards. Internet of Things Having continued to evolve throughout 2018, the Internet of Things (IoT) will keep transforming our personal and professional lives. From small gadgets to make our lives easier, through to largescale industrial, smart city and critical infrastructure solutions. A shift towards managed IoT services is already happening and will continue, as the number and variety of devices becomes too large for organisations to handle internally. As we reap the benefits of everevolving smart technologies, vigilance will
be essential to ensure these devices do not become the targets of malicious attacks. Robust cybersecurity, as ever, will be vital. Cloud vs Edge computing Almost 9 out of 10 organisations are expected to be using cloud services by 2021, with the cloud marketplace slated to reach US $260.2 billion by 2020 according to Gartner. However, the intelligent edge may start eating away at the cloud, with an increasing number of IoT devices demanding real-time, failsafe and secure operating environments. By processing data at the ‘edge’ of the network, close to where it is collected, such as by a video camera or access control device, bandwidth and storage requirements drop considerably. Given that many smart security devices are already edge devices, edge computing is already firmly embedded in the security sector and will continue to grow. However, its popularity in general is a two-edged sword. Whilst offering the potential to increase security when data is encrypted and packaged correctly, the use of IoT devices and the current BYOD culture in workplaces, will put networks at risk if adequate cybersecurity controls are not in place. Cybersecurity and Physical security Cybersecurity and data privacy dominated the news in 2018, with data breaches compromising the personal information of millions of people around the world. Some of the biggest victims included Marriott Hotels, Cathay Pacific, Quora, Facebook, Google, and Orbitz. 2019 is barely underway and already in Australia the Early Warning Network, the Victorian Government and First National have all been attacked. With more and
February/March 2019
fired up protection LOKTRONIC’s expansive product range has just become even wider with these first class EGRESS and FIRE PROTECTION DEVICES and PROTECTIVE COVERS.
NEW
STI-1130 Ref. 720-102
STI-WRP2-RED-11 IP67 Ref. 720-062R
Surface mount with horn and spacer 255mm H x 179mm W x 135mm D
Also available in White.
STI-RP-WS-11/CN Ref. 720-052W Available in White, Green, Blue & Yellow.
STI-13000-NC Ref. 720-090 Flush mount, no horn 206mm H x 137mm W x 69mm D
STI-RP-GF-11/CN Ref. 720-051G Available in White, Green, Blue & Yellow.
NEW
STI-RP-RS-02/CI
STI-13B10-NW Ref. 720-092 Surface mount, horn and label optional 206mm H x 137mm W x 103mm D
Ref. 720-058 Cover included. Flush Mount Available. • •
STI-1100 Ref. 720-054
•
Flush mount with horn 255mm H x 179mm W x 86mm D
•
• • • • •
STI-6518 Ref. 720-060 Flush mount, no horn 165mm H x 105mm W x 49mm D
STI-13210-NG Ref. 720-093 Surface mount, horn and label optional 206mm H x 137mm W x 103mm D
All STI ‘Stoppers’ are made of tough, UV stabilised polycarbonate. Many can be supplied with or without a 105 dB horn. Other models and sizes available including weather resistant options.
Approved to EN54-11 Current Rating: 3 Amps @ 12-24V DC, 3 Amps @ 125-250V AC Material: Polycarbonate Comes with Clear Cover 2 x SPDT switches Positive activation that mimics the feel of breaking glass. Visible warning flag confirms activation. Simple polycarbonate key to reset operating element - no broken glass. Dimensions: 87mm Length x 87mm Width x 23mm Depth (Flush Mount) & 58mm Depth (Surface Mount)
STI-6255 Ref. 720-042
Mini Theft Stopper discourages inappropriate use of equipment. Sounds a powerful 105 dB warning horn when activated. Tough, ABS construction. Reed switch activation for cabinets and display cases or unique clip activation for freestanding equipment. Does not interfere with use of protected fire fighting equipment. Compact design 85mm H x 85mm W x 25mm D.
STI-6720 Ref. 720-047
Break Glass Stopper. Keys under plexiglas. Protects emergency keys from inappropriate use. Keys remain visible. Fast, easy installation. Simple, inexpensive plexiglas. 3 year guarantee against breakage of the ABS housing within normal use.
NEW
Battery Load Tester Ref. 730-101
Fire Brigade Alarm: (Closed/Open) Ref. 730-231
Anti-Interference Device
ViTECH, strong, lightweight aluminum case, 5, 15 and 30 amp battery load tester for fire and alarm use. Weight: 500gms, Size: 165mm x 90 x 70mm.
ViTECH branded Type X (730-230) and Type Y (illustrated) models with temperature compensated pressure transducers with digital display showing pressures for defect, fire and pump start.
Ref. 730-400 series ViTECH AID for sprinkler valve monitoring; fits all ball valve sizes.
Loktronic Limited Unit 7 19 Edwin Street Mt Eden Auckland P O Box 8329 Symonds Street Auckland 1150 New Zealand Ph 64 9 623 3919 Fax 64 9 623 3881 0800 FOR LOK mail@loktronic.co.nz www.loktronic.co.nz
21620/1/18
21620
ViTECH products are designed and produced in New Zealand.
more smart network devices connecting people, cities, buildings, industry and critical infrastructure, we will have to be on our guard. On the cards to watch out for this year will be vaporworms (fileless malware), malicious chatbots, WPA3 Wi-Fi Network vulnerabilities, biometric hacks and attacks to critical infrastructure. About the Security Exhibition & Conference As the adoption of connected and autonomous technologies continue to increase and the associated risks continue to heighten, security professionals need to have a proactive approach in harnessing the power of these resources. As Australia’s leading industry event, the Security Exhibition & Conference (24-26 July 2019, ICC Sydney) is the best platform for professionals to keep abreast of the changing security landscape. Featuring over 170 leading brands, many global manufacturers plan their Australian product launches around the Security Exhibition. Covering the full spectrum of physical and electronic security suppliers, attendees get hands-on product experience with live demonstrations and the opportunity to discuss capabilities with technicians and R&D experts.
34
NZSM
To further demonstrate our proactive approach to providing the security community with the innovation and education it needs to keep up with the fast-paced nature of the industry, we are pleased to launch our ‘Focus on security’ theme for Security 2019. The need and demand for security is evident and the idea behind the theme is to bring it to the fore. This dynamic creative will be seen across industry media over the coming months and will help frame the way our audiences see and understand security. Expo Continuing to provide opportunities for visitors and exhibitors; the Security Exhibition & Conference is where your security needs are brought into focus. With over 5,000 attendees and held over three days, the free exhibition will host hundreds of new product releases and demonstrations. Some of the product and service categories include access control, home automation, biometrics, cyber security, and CCTV. ASIAL Security Conference Once again, the ASIAL Security Conference provides delegates with fundamental updates from the organisations shaping today’s security
landscape. The first day of the program covers critical industry updates, followed by a choice of streamed sessions on the second and third day of the program. The future of Security Breakfast Held on the second day of the Security Exhibition & Conference, the future of Security Breakfast is the ideal opportunity to connect with industry professionals and colleagues over a light breakfast and keynote presentation. Networking drinks Held after the first day of the Security Exhibition & Conference, the Networking Drinks reception is the ideal place to network with clients and suppliers in a more social environment. Gala Dinner Hosted in partnership with ASIAL, the annual Gala Dinner is held at Sydney’s iconic Town Hall. This ultimate networking evening brings together security professionals from across the globe to celebrate, engage and socialise with colleagues, suppliers, and clients. Find out more information, register your interest in exhibiting, or secure your place at www.securityexpo.com.au
February/March 2019
FOCUS ON SECURITY BRING YOUR BRAND INTO FOCUS. GAIN A COMPETITIVE ADVANTAGE. For over three decades the Security Exhibition & Conference has been the most established and respected trade event for the security industry in Australia, bringing together the full spectrum of manufacturers, distributors, security professionals and end users.
ICC SYDNEY DARLING HARBOUR
BOOK A STAND Contact:
Position your business and amplify your brand among the industry’s most powerful influencers. Network with the most established names, discover the latest technology and create profitable opportunities.
Melissa Clendinen Event Manager 03 9261 4662 mclendinen@divcom.net.au
securityexpo.com.au
Industry Partner
#security2019
Abigail Ford Account Manager 03 9261 4650 aford@divcom.net.au
INDUSTRY
Skills Shortage: A serious industry problem New Zealand Security Association CEO Gary Morrison writes that the security industry is in the midst of a skills shortage, and that we need to do a lot better in promoting and demonstrating security as a career pathway.
As the representative body for the New Zealand security industry we maintain regular contact and dialogue with our members (service providers) including surveys, member visits and attendance at various meetings and forums. In discussion with our members, it is very evident that the most significant issue currently facing the industry is that of finding sufficient labour resources to meet work demands. We have identified current vacancies within the industry as in excess of 4,000 security officer positions and 1500plus security technician positions. That represents an immediate 25 percent increase in licenced security personnel.
Gary Morrison, New Zealand Security Association CEO
36
NZSM
Furthermore, with current growth trends and the security demands related to events such as APEC and the America’s Cup in 2021, these numbers are expected to increase substantially over the next few years. Are we heading for a skill shortage crisis or are we already in the midst of one? According to government definitions, skill shortage is a ‘catch-all’ term to describe a range of situations in which an employer is experiencing difficulties finding a worker with the right skills. Skill shortages may differ in cause and nature: 1. Genuine skill shortage 2. When there are not enough job seekers who have the required skills 3. Skill shortage caused by recruitment and retention difficulties 4. When there are enough job seekers with the required skills but they choose not to work because they are unhappy with the pay rates and/or working conditions 5. Labour shortage 6. When there are simply not enough workers available, skilled and unskilled. This happens when unemployment numbers are low In our particular industry situation, the skill shortage is likely the result of a combination of all of these factors, however it is also fair to say that as an industry we have done little historically to promote security as a career option. That includes many service providers paying lip service to industry training beyond the mandatory requirements and a preference towards poaching experienced technicians rather than investing in apprentices.
The intent of this article is not to criticise or lay blame, but to put forward suggestions on how we as individual employers, and the wider industry, can move towards addressing the existing skill shortage and minimise our exposure to future demands. On a national level, the New Zealand Security Association (NZSA) has in recent months implemented a number of strategies targeted at bringing new workers into the security industry, the most tangible of which being the Skills for Industry Outcome Agreement signed between the Ministry of Social Development (MSD) and the NZSA. Under this agreement the NZSA operates as a national work broker for the security industry, working with MSD to identify beneficiaries with the skill, attitude and attributes to work within the industry and matching those individuals with member job vacancies. Effectively the NZSA acts as an employment agent, providing members with “fit for purpose” applicants and at no cost. Should the member offer the applicant a full-time position, they also qualify for subsidies of close to $3,000 to cover the induction and training costs that are often incurred with new appointments. Whilst the agreement is currently under a nine-month trial, the early results have been exceptional, exceeding MSD expectations and welcomed by the NZSA members who have signed up to participate. Assuming the contract is renewed (as seems highly probable), it is anticipated to achieve between 150 and 200 placements annually across both the manpower and electronic sectors.
February/March 2019
The NZSA has also formalised arrangements with other agencies such as Active Plus and APM WorkCare who work with candidates who have been out of employment due to injuries, etc., and regularly promotes available candidates to the membership. As part of the Skills for Industry Outcome Agreement, MSD and NZSA have jointly funded and developed several videos that document the roles of security officers and technicians and the attributes required to work within the industry. The videos are available for viewing on the NZSA website (www. security.org.nz) and can also be made available to members for use at school presentations, gateway programmes and recruitment events. The NZSA will also be targeting schools as a means of creating awareness of career opportunities available
February/March 2019
within the security industry, including promoting the new security technician apprenticeship programme. Our primary focus will be with the Careers and Transition Education Association as this provides us with a direct link to all career advisors at secondary schools nationally. There is also the opportunity for individual businesses to ‘do their bit’ towards addressing the skills shortage and meeting their own resourcing requirements. Industry training is a key component of this. Whilst there have been some limitations around the national qualifications, the new NZCiS (New Zealand Certificate in Security) and NZCiES (New Zealand Certificate in Electronic Security) programmes address those issues, and in the case of NZCiES, provides a two-year apprenticeship pathway to becoming a qualified Security Technician. Those businesses that promote training as a career pathway, and recognise and reward training completion, are not only positioning themselves as an employer of choice but also providing a strong selling point. It is also important for businesses to consider the demographics of the workers they are looking to employ and how best to communicate with that demographic. If looking for young people keen to enter the workforce, interaction with local secondary schools via workchoice and gateway programmes can provide valuable links and establish recruitment pathways. Similarly ensuring that the business has a strong, positive and modern corporate image through social media channels will often provide significant
return over traditional advertising methods. Another recruitment option often ignored by employers is that of encouraging and rewarding employee candidate referrals. There is a significant cost and time commitment associated with the recruitment process so why not incentivise successful referrals from existing staff or even customers? The one area not touched on is pay rates and conditions. Certainly, those employers who offer higher rates, including those who have committed towards providing a living wage, find it easier to attract and recruit staff but even they are not immune to recruitment pressure. Pending increases to the minimum pay rates and the flow-on effect to other more lowly paid roles will have a significant impact on the manpower sector in coming months, and providers need to have clear plans and strategies on how they can recover the direct wage cost increases that will be incurred. What is evident is that the skill shortage is a serious issue that affects not just the security industry, but many of the industry sectors in New Zealand. It is easy to sit and blame government policies or what has happened in the past, but the reality is that we collectively need to take ownership of the problem. Many security providers already have strategies and planning in place to position themselves as employers of choice and to minimise their exposure to the skills shortage, but as an industry we still need to do a lot better in promoting and demonstrating security as a career pathway.
NZSM
37
World-class behavioural analysis training comes to Auckland Dean Kidd, Manager of Safety and Security at Auckland Live, talks to NZSM about a Regional Facilities Auckland initiative bringing behavioural analysis expert Philip Baum to New Zealand to train local security managers. Mt Smart Stadium in Auckland will play host to a first time ever in New Zealand Tactical Risk Assessment of People (TRAP) Workshop from 18 to 21 March 2019. The course will provide security instructors and practitioners with an indepth introduction to behavioural analysis techniques. The four-day programme will provide attendees with guidance as to how behavioural analysis (a term often used interchangeably with behaviour detection) techniques can enhance the security of sports stadiums, historic buildings, entertainment complexes, hotels, tourist attractions and other crowded places. Instructor Philip Baum is an international authority on behavioural analysis and profiling techniques. The managing director of security consultancy Green Light Limited, he is also visiting professor of aviation security at Coventry University and editor of Aviation Security International. “We want to improve the behaviour detection aspect in and around events, especially for the iconic stadiums and upcoming events such as APEC and the America’s Cup,” said Dean Kidd, who is spearheading the RFA-driven initiative. “Whilst our risk rating is low, what we’ve found is that in order to make significant improvements it takes time to embed these new ways of working.” “In Auckland, apart from its probable wide use in the aviation environment, nobody is showcasing this particular tactic,” he said. “We want it to ripple out to other venues and suppliers and people operating in those spaces.” Several RFA security staff will be among attendees on the course. The intention is for these staff to take what they learn from the course and then start educating various teams within the council organisation.
38
NZSM
Dean Kidd, Manager of Safety and Security at Auckland Live
“[Following the course] we can start awareness training and more in-depth training sessions with front-of-house staff, baristas, event staff, in-house security teams, and security suppliers,” Dean explained. “In this way, we can build a layered security function around events, which will eventually become the norm.” “The behaviour detection working group that the ASIS International New Zealand Chapter formed in 2018 brought local experts together over the course of the year and we identified our own definition of behaviour detection in a New Zealand context.” The definition describes behaviour detection as a set of “flexible and adaptable techniques, integrated into a wider security capability, designed to identify and respond to clusters of human behavioural and physiological signals indicating a possible intent to conduct unacceptable, criminal or violent activities in or around a baselined venue or event.” The “flexible and adaptable techniques” associated with behaviour
detection include surveillance, observation, processing, assessment, questioning, command and control. TRAP methodologies combine behaviour analysis with threat resolution protocols based on questioning skills to achieve ‘go or no go’. The techniques are most effective in a venue where the relevant staff are completely familiar with the environment, the event dynamic and patron profile, in other words a ‘baselined’ venue or event. Used widely in counter terrorism and aviation security contexts, behavioural analysis has been shown to be just as effective as a weapon against the threat posed by criminals and fixated persons at events and in public spaces, such as shopping malls, public squares and transport hubs. If you are interested in attending this event and making the most of this rare opportunity to learn from Philip Baum first-hand, please contact Nicky Simonds-Gooding at trap@avsec.com or call +44 (0)20 8255 9447.
February/March 2019
From
, a cleverly designed,
Motorised Hook Lock to simplify electric locking of sliding doors. Available now from Loktronic. HL1260 • Up to 650 kg holding strength for the toughest jobs • Motor driven hook captures roller on strike plate • Recessed or surface mounting for easy fitting to most door types • Fail Safe/Fail Secure field changeable for simplicity • Accepts 12-30 VDC • Door Position Switch • Hook Position Switch • Tested to 400,000 cycles for durability • 5 year warranty for peace of mind
Also from FSH, the expertly designed
VE Lock
sets
new standards of reliability. VE1260 • 1,000 kg holding strength… ideal where high security is needed • Release with up to 35 kg pre-load makes for easy unlocking • Field changeable between Fail Safe and Fail Secure • Accepts 12-30 VDC • Door and Lock status monitoring for total status reporting • Radiused and square edged models suit new installs and upgrades • Can be installed horizontally, vertically and into surface mounted housings • Pre-taped housings make for simple installation onto frameless glass • Special wide V strike plate allows for up 12 mm door offset
Loktronic Limited Unit 7 19 Edwin Street Mt Eden Auckland P O Box 8329 Symonds Street Auckland 1150 New Zealand Ph 64 9 623 3919 Fax 64 9 623 3881 0800 FOR LOK mail@loktronic.co.nz www.loktronic.co.nz
16078. REV 11.17
These fine products from world leaders in electric locking design, FSH, are proudly stocked and supported by NZ’s leading authorized distributor,
TRAINING
The Perfect Storm: how training went missing Security consultant and experienced security trainer Lincoln Potter PSP is one of only four holders of the National Diploma in Security. The uptake of training in security, he writes, is dismal, and the forecast is for more of the same. With the National Certificate level 3 Foundation Qualification due for release this year, let’s have a look at the history of Security Tradecraft Qualifications and the problems our industry faces with the training of our security officers. What will be the uptake on this new qualification? A serious lack of training, a serious staffing problem (guard force is down approximately 4,500 officers nationally) and a challenging security theatre. The Industry is the middle of a perfect storm, and it’s nobody’s fault.
40
NZSM
It is what it is, but within the next couple of years New Zealand will be hosting major international events such as APEC and the Americas Cup. How are we going to cope? The beginning: changing the PSPPI Act 2010 The industry waited for two years while mandatory training (scope) was decided on. During this time, security training companies struggled because of the ‘handbrake’ that was applied on training. Some went out of business. Security trainers had to seek work elsewhere. When the mandatory requirements were announced, the handbrake
was released and security training organisations struggled with the instant demand and lack of qualified instructors. The two-year gap had also resulted in an industry perception that “given we didn’t need to train for the last two years and still managed to maintain customer expectations, do we need anything more than the mandatory unit standards?” The mandatory training ‘tick in the box’, it appeared, was all the industry required. This perception sealed the fate of the tradecraft qualifications. Let’s be clear. Mandatory Training is not a National Qualification, and it’s not a replacement for National Qualifications.
February/March 2019
It is an entry level requirement for the industry. Mandatory Training does not teach the candidate the tradecraft skills required to become a competent security operator. Industry tradecraft skills are found/taught in the National Certificates Levels 2 and 3 (Soon to be replaced by the new level 3 ‘Foundation’ Qualification). Tumbleweeds in Trainingville Those training providers that survived the Act change are a small and ‘elite’ group. These companies should be flat-out training interns and tradecraft candidates, inclusive of first aid, fire extinguisher handling, control and restraint, and selfdefence techniques. But they are not. There is a perception that security training is a “cash cow”, but the reality is that training providers are on struggle street. In their attempts to attract new students they are, frankly, on a hiding to nothing. Security trainers are transitioning out due to lack of demand. Many of the most experienced have moved out of training entirely, while the few that remain are engaged in using other skill sets while awaiting their next training opportunity. Given there are so few providers, why are they struggling? Clearly, there is no real incentive for guards and their employers to invest in pursuing tradecraft qualifications beyond the legislated Mandatory Training. There are two ways to achieve National qualifications: a full-time 8-10 week block course, or by way of employers entering into training
February/March 2019
agreements with training providers. The latter is often the most feasible option, however security guards do shift work and many struggle with finding the time for education. Security training is also expensive, and employers have to pay for the training (at least those that don’t pass the cost on to the employee), pay the guard while they attend courses, and then pay for the guard’s replacement while the guard is in class and not on the job. With the high levels of employee turnover in the industry, many companies are reluctant to spend money on training staff who may not be around in 6-18 months’ time. People enter the security industry for various reasons. People who have lost their jobs and are looking for a stop-gap until they re-employ in their vocation, people who are on the unemployment benefit and need work, new immigrants needing employment for visa reasons, retirees returning to work because they are struggling. The industry draws many of its entrants from the above, and they don’t tend to stick around. Very few people enter the industry because they have made it their number one career choice. Even within the industry, guard traffic amongst companies is a problem. Guards can be quite nomadic as they – quite understandably – tend to seek better sites (conditions) and – as always – better pay. Security companies are expensive to run and the profit margin in ‘manpower’ services is notoriously tight. Companies
can’t afford to have their guards siting in a class room for weeks on end when they should be out in the field making money and protecting clients’ assets. It makes no business sense to spend 50-100k training staff, because there just isn’t good return on investment. And yet security companies wait anxiously for new recruits coming out of block courses amid a widely acknowledged ‘skills shortage’. If people were willing to pay for National Certificate Level 2 and 3 qualified guards, then the training providers would run the courses. In the meantime, with little or no courses running, employers are at a loss for tradecraft-trained guards. Higher security qualifications But what of the state of training among the higher qualifications? Surely, the uptake of higher security qualifications among those who are at more advanced stages of their careers – and in more senior roles – provides us with a more exemplary picture. Unfortunately not. Since its inception, the National Diploma in Security Level 5 and 6 has only seen seven completions. There are only four holders of the NDiS currently active in industry. This is New Zealand’s highest undergraduate security qualification. The NZSA Security Consultants Certificate of Competence has seen reasonable uptake, but completion rates are poor. There are masters degrees available, offered by universities both in New
NZSM
41
Zealand and overseas, but they are very expensive, and require the meeting of entry criteria that very few people in the industry are likely to meet. Then there are professional certifications, such as the internationally recognised ASIS International Board Certifications: PSP, CPP, PSI, and the new APP. These are relatively affordable and accessible – given that their entry requirements acknowledge professional experience. Yet, in the last five years there has been only one CPP certification issued in New Zealand. Just one. The majority of people holding senior security positions in this country do not have any formal qualification in security whatsoever. Clearly, the rot is as bad at the top as it is at the bottom of the industry. Do we have a bad training culture? I don’t need a master’s degree to know the answer to that one. Industry bodies and government The Skills Organisation and NZQA have worked hard to maintain qualifications and provide “fit for purpose” educational pathways for our industry. The Targeted Review of Qualifications (TRoQ) has taken five years, largely because the nature of security, or specifically what we do and how do it, has changed considerably. Developing industry qualifications is problematic because it relies on qualitative data and therefore descriptors that need to be assessed and moved into learning outcomes and evidential requirements, this is not easy due to the lack of reliable metrics. A lot of work has gone into the New level 3 Foundation Qualification, which is due for release this year. New qualifications in electronic security have already made it to market. The NZSA and its academic members have spent a considerable amount of time working on the TRoQ committee over the last five years. The Association is acutely aware of the shortage of guards and has been actively engaged in promoting industry to schools. It also continues to have a strong relationship with the Ministry of Social Development (MSD) and Government. For over 20 years MSD and government funding has been responsible for training our guards, whether it be by way of block courses, employer training agreements or funding mandatory training. This funding has kept our training companies alive and provided incomes for our trainers.
42
NZSM
Due to the lack of up take on the level 2 qualification over the years, funding for level 3 foundation qualification will likely be limited. Just like anyone else, Government needs to see a return on its investment. Surely there will come a time when funding will dry up. The new security theatre As I discussed in an article “Opinion: Guarding in a post-compliant society” in a previous issue of NZSM (Dec 2017 – Jan 2018), society has changed in recent years and people have become increasingly “feral” towards security officers. In that article, I wrote: “Plenty of psychologists and social commentators have observed that society is getting less civil, angrier, anti-social, and less accepting of being told what to do. Politicians are less trusted than ever, teachers less respected, and security guards are regarded as lower life forms than whatever it is we were regarded as previously.” Yet clients still expect our security people to achieve the same results we were capable of say, for example, five or ten years ago. Security officers have no statuary legal powers (the legal system has not supported industry). The public perception is that guards will not engage and therefore we are weak and powerless. Security companies face very serious health and safety compliance issues and the risk of litigation more so now than ever before. We are in a new theatre of operations; it’s complicated and fraught with extremely serious consequences for personal and the companies they serve.
Training hasn’t kept pace with this. Traditionally, the security trainer held the level of qualification that they were instructing on (or the level above that). They were a subject matter knowledge expert, but more importantly they demonstrated experience in fieldcraft skills applicable to the course. What we’re now seeing though is that the role of security trainer is trending towards becoming that of the literacy and numeracy educator; moving or removing the field skills of the traditional trainer and replacing this experience with a qualified adult educator. Low literacy, numeracy and, more importantly, comprehension and effective reasoning, are big barriers to learning in our industry. The soft skills approach to training in conflict management has been a great help to industry, however we now have a guard force that cannot defend themselves or other people from an aggressive assault. Yes, there is a need for the above, but guards need effective tradecraft training that they can turn into fieldcraft skill sets. They need competencies that will equip them to effectively deal with the risks and scenarios that the contemporary guard is confronted with on the job. It’s a vexed issue, and it’s not going to go away. The level of uptake in any form of training above the mandated unit standards is low – as it stands there just aren’t sufficient incentives for it to be any different. We are in the middle of a perfect storm, and it’s very difficult indeed to see a way out of it.
February/March 2019
Loktronic
Power
distribution module
key switches Two functions are available Momentary or maintained contact (specify when ordering) Switch rated at 6A @ 28 VDC Supplied random keyed Re-key or master key at any locksmith Front or rear fixing
Loktronic
for gate locks
For the widest range range of applications, see our IP67 rated Loktronic and Loktrenz electromagnetic locks with optional brackets to make fitting a breeze.
Applications Access control, air-conditioning, lifts, lighting etc
•D
in N Z •
Lo
ic Prod ron uc
Designed, tested and produced in New Zealand.
Designed, tested and produced in New Zealand.
ts
kt
Key switch supplied loose Mounting bracket Escutcheon Mounted on PDL plate with alloy cover
Comprises • DPDT 12 or 24 VDC Fire Drop Relay • 6, 8 or 10 fused terminals with LED • 2 Red Terminals • 2 Black Terminals • Assembled on DIN Rail • All Terminals Labelled
New options with this versatile product
We have strikes by FSH and eff-eff, Rim locks by CISA, plus specialty roller door locks.
Outdoor and Gate Locks from Loktronic - a smart choice.
This 6, 8 or 10 way Power Distribution Module will drop power to a group of doors when signaled by a fire alarm and has individual fused power supply to each lock. LED lights when fuse fails. Red and black terminals distribute from PSU or battery to load.
,T
es
uc
ed
e s i gned
and Pr od ted
R
R
ISO 9001:2015
R
ISO 9001:2015
REGISTERED COMPANY
ISO 9001:2015
REGISTERED COMPANY
Certificate No. NZ1043
REGISTERED COMPANY
Certificate No. NZ1043
Certificate No. NZ1043
Unit 7 19 Edwin Street Mt Eden Auckland P O Box 8329 Symonds Street Auckland 1150 New Zealand Ph 64 9 623 3919 Fax 64 9 623 3881 0800 FOR LOK www.loktronic.co.nz 21636.KS.2018
Unit 7 19 Edwin Street Mt Eden Auckland P O Box 8329 Symonds Street Auckland 1150 New Zealand Ph 64 9 623 3919 Fax 64 9 623 3881 0800 FOR LOK www.loktronic.co.nz 20756_BP.2018
ALLIANCE Wholesale
ICTS e &cSecurity ICT & u r i t y – –ffrom r o m Entry E n t r ytotEnterprise o Enterprise
Unit 7 19 Edwin Street Mt Eden Auckland P O Box 8329 Symonds Street Auckland 1150 New Zealand Ph 64 9 623 3919 Fax 64 9 623 3881 0800 FOR LOK www.loktronic.co.nz 20239.2018
CCTV – Alarms – Access – Intercoms
0800 AWL NZL
Power supply cabinets • Mounts for our 5 most popular models of power supplies; 6 key-hole anchor points for easier mounting • Lift off hinged doors for added convenience
total reed switch
• Louvre ventilation on doors • Roller ball reed switch provides anti-tamper to front and rear of cabinet
solutions from Flair
• 6 x 25mm knockouts, 2 each sides and bottom • Medium cabinet holds 5 x 7 A/h batteries
Choose from Closed Circuit or SPDT. Listed options will suit Standard doors, Steel doors, Roller doors
• Large cabinet holds 14 x 7 A/h batteries • Cam lock for security • Front lip to retain batteries and for additional strength
• Lip return on door for greater rigidity ic Prod ron uc
in N Z •
•D
,T
es
uc
ed
e s i gned
and Pr od ted
Designed, tested and produced in New Zealand.
kt
ts
• Heavy gauge 1.2mm steel
Lo
• Durable powder coated white finish
for power supplies
Specials available to order.
With 30 models in stock, make Loktronic your go-to supplier. Fully monitored Powerbox brand security PSUs in 12 VDC from 3.5 A to 20 A and 24 VDC units from 5 A to 12 A. We have Meanwell DIN rail PSUs in 12 & 24 VDC from 20 - 100 watts, with optional battery charging. Inline, Plug packs and DC/DC converters round out this great range.
Flair reeds from Loktronic: an unbeatable combination.
Power supplies from Loktronic – a Powerful Deal.
• Surface mount • Press fit • Self adhesive tape or screw mounting • Flying leads or screw terminals • Standard and wide gap • Stubbies • Mini flange • Sub miniatures • Pull aparts • Clamp ons • Overhead doors with offsets
• Removable shelf and removable back plate to facilitate easy bench mounting of equipment
Loktronic
R
ISO 9001:2015
REGISTERED COMPANY
Loktronic Limited Unit 7 19 Edwin Street Mt Eden Auckland P O Box 8329 Symonds Street Auckland 1150 New Zealand Ph 64 9 623 3919 Fax 64 9 623 3881 0800 FOR LOK www.loktronic.co.nz
20238_PSC
Certificate No. NZ1043
Unit 7 19 Edwin Street Mt Eden Auckland P O Box 8329 Symonds Street Auckland 1150 New Zealand Ph 64 9 623 3919 Fax 64 9 623 3881 0800 FOR LOK www.loktronic.co.nz 20237.FL.2018
R
ISO 9001:2015
REGISTERED COMPANY Certificate No. NZ1043
Unit 7 19 Edwin Street Mt Eden Auckland P O Box 8329 Symonds Street Auckland 1150 New Zealand Ph 64 9 623 3919 Fax 64 9 623 3881 0800 FOR LOK www.loktronic.co.nz 20757_BP.2018
Wireless IP Surveillance
Customized CCTV Kits Kits Dahua Customized
Open Platform VMS
• Cost effective high performance wireless access points for outdoor use • Stockists of AirMax, AirFiber, AirVision, UniFI & mFi series products • ITPLUS are a Ubiquiti certified and trained partner
• We supply fully customized supply fully customized • We complete CCTV kits in form of complete CCTV kits in form of Hybrid, Tribrid, IP Hybrid, Tribrid, IP, , CVI etc CVI etc • Complete kits are a great way of • Complete kits are a great way of reducing costs and getting the reducing costs and getting the whole package from one place whole package from one place • Receive FREE support* Receive FREE support* including including remote connection • remote connection assistance assistance
• Award winning best open platform VMS • Advanced Built-in Video Analytics • Micromodule crashproof software architecture • Includes powerful features such as Modern GUI, Video Archive, Green Stream, Time Compressor, Interactive 3D Map, Autozoom etc.
Distributed by
Distributed by
Distributed by
Ph: 09 950 4940 l E: info@itplus.co.nz www.itplus.co.nz
Ph: 09 950 4940 l E: info@itplus.co.nz www.itplus.co.nz
Ph: 09 950 4940 l E: info@itplus.co.nz www.itplus.co.nz
ALLIANCE Wholesale
L • 8A Triton Drive, Albany, Auckland • sales@AWLNZ.com
IPC3615 5MP Turret
I C T & S e c u r iwww.AWLNZ.com ty – from Entry to Enterprise
IPC2325 5MP Bullet
IPC868 4k Fisheye
5MP 2592 x 1944 @ 20 fps
5MP 2592 x 1944 @ 20 fps
12MP 4000 x 3000 @ 15 fps
2.8mm AF lens (105deg view)
2.7~13.5mm AF lens
Ultrawide 360deg view
SmartIR, up to 30 m
SmartIR, up to 50 m
SmartIR, up to 10 m
Onboard Mic
Storage up to 128GB
Onboard Mic/speaker
Onboard Analytics
Onboard Analytics
Storage up to 128GB
IP67
IP67
Onboard Analytics IP66
ph: 09 276 3271 sales@crknz.co.nz
ph: 09 276 3271 sales@crknz.co.nz
ph: 09 276 3271 sales@crknz.co.nz
3 Hotunui Drive Mt Wellington, Auckland, 1060
3 Hotunui Drive Mt Wellington, Auckland, 1060
3 Hotunui Drive Mt Wellington, Auckland, 1060
SUBSCRIBE Readers of NZ Security include those working directly and indirectly in the domestic and commercial security industry. From business owners and managers right through to suppliers, installers and front line staff. Among our readers are IT security experts, surveillance professionals and loss prevention staff. Our readers take their job seriously and make an active choice to be kept informed and up to date with the industry. For only $75.00 plus GST you can ensure that you receive a 1 year subscription (6 issues) by filling out the form below and posting to: New Zealand Security Magazine 27 West Cresent, Te Puru, 3575 RD5, Thames, New Zealand or email your contact and postal details to: craig@defsec.net.nz Mr Mrs Ms________________________ Surname_________________________ Title_____________________________ Company________________________ Postal Address____________________ ________________________________ ________________________________ Telephone________________________ Email____________________________ Date_____________________________ Signed___________________________
NZSM
EVENTS Cyber Intelligence Asia When: 26-28 February 2019 Where: Bangkok, Thailand http://www.intelligence-sec.com/events/ cyber-intelligence-asia-2019
Border Management and Tech Summit Europe When: 24-25 April 2019 Where: Istanbul, Turkey http://www.ibmata.org
Responsive Drones & Robotics Conference When: 1-3 March 2019 Where: Avalon Airport, Victoria, Australia http://www.dronezonedownunder.com. au/
Secutech When: 08-10 May 2019 Where: Taipei, Taiwan https://secutech.tw.messefrankfurt.com/ taipei/en/
Security & Counter Terror Expo When: 05-06 March 2019 Where: London, United Kingdom https://www.counterterrorexpo.com SECON 2019 When: 6-8 March 2019 Where: KINTEX, Seoul, South Korea http://www.seconexpo.com/2019/eng/ main.asp SSF Indonesia 2019 When: 14-17 March 2019 Where: Jakarta Convention Center, Indonesia http://www.megabuild.co.id/ssf-expo/ Tactical Risk Assessment of People Workshop When: 18-21 March 2019 Where: Mt Smart Stadium, Auckland https://trap@avsec.com The Security Event – When: 09-11 April 2019 Where: Birmingham, United Kingdom www.thesecurityevent.co.uk ISC West 2019 When: 10-12 April 2019 Where: Las Vegas, United States www.iscwest.com
Behavioural Analysis 2019 When: 21-23 May 2019 Where: Mall of America, Minneapolis, USA https://behaviouralanalysis.com Interpol World 2019 When: 2-4 July 2019 Where: Sands Expo & Convention Centre, Singapore https://www.interpol-world.com 2019 Security Exhibition & Conference When: 24-26 July 2019 Where: Sydney, Australia https://www.asial.com.au/events/ category/security-conference-exhibition NZ Security Awards 2019 When: 23 August 2019 Where: Crowne Plaza, Auckland https://security.org.nz/events/nz-securityawards/ ASIS Global Security Exchange 2019 When: 8-12 September Where: Chicago, Illinois, USA https://www.gsx.org/event-info/futuredates/ Facilities Integrate 2019 When: 25 - 26 September 2019 Where: ASB Showgrounds, Auckland https://www.northportevents.nz/events/ facilities-integrate/
New Zealand Security Magazine
46
NZSM
February/March 2019
MEM2400LP
World leaders in revolutionary Electric Locking Design and Craftsmanship. Proudly stocked and supported by NZ’s leading authorized distributor…
• Suits low door height or narrow profile frames • High holding force up to 1000kg • Releases with up to 70kg of side pressure; early warning alarm • Supplied with anti-tamper bracket • 12/24 VDC, low power consumption • 4 hour fire rated • Lock Status & Door Status Sensors MEM2400LED-LZ • Features as for MEM2400LP with L/Z Bracket for inward opening doors
FES20M • High security stainless steel strike rated up to 1490kg holding strength • Quick and easy Power to Lock/Power to Open interchange • Mounting kit with adaptor tabs • 12VDC 220mA; 24 VDC 120mA; 36 VDC 80mA • Door, Lock & Frame status monitors • Pre-drilled for extension lips, 25mm & 50mm available
FES 10 and FES 10M • Stainless steel faceplate & keeper rated up to 1300 kg holding strength • FES 10 is IP56 rated • Dual voltage capable; 12VDC 200mA, 24VDC 100mA • Pre-drilled for extension lips, 25mm and 50mm available • FES 10M has door latch monitor
SECURITY TECHNOLOGY RELIABILITY
• ELECTROMAGNETIC LOCKS
VE1260
• STRIKES • DROP BOLTS • ELECTRIC MORTICE LOCKS
FEL990M
• 5 YEAR WARRANTY
Loktronic Limited Unit 7 19 Edwin Street Mt Eden Auckland P O Box 8329 Symonds Street Auckland 1150 New Zealand Ph 64 9 623 3919 Fax 64 9 623 3881 0800 FOR LOK mail@loktronic.co.nz www.loktronic.co.nz
• High security, 1000 kg holding force, 35kg pre-load capability • Accepts 12-30 VDC • Door status & Lock status monitors • Square & radius edge models • Pre-taped glass door housing available for radius edge version • Special strike plate caters for up to 12mm door misalignment • • • • • • • •
Multi-functional and field changeable Vestibule or combination Fail Safe/Fail Secure selectable 12/24 VDC Left or Right hand Key override Monitors: Door, Lock, Key & REX 12 pin connector
21136/REV11.17 21336/1/18
Your FSH Electric Locking range includes…
We can help you
INTEGRATE
Solve the technology integration puzzle with Hills and these best-in-class solutions
THE COMPLETE GUIDE TO
CCTV LIGHTING
All backed by Hills after sales service and technical support. See in branch or online at www.hills.co.nz HSS0038-Sep18-v1
For more information on these and other best-in-class solutions from Hills call us on 0800 1 HILLS (44557) or visit hills.co.nz
facebook.com/HillsLtd/ CONNECT
E N T E RTA I N
SECURE