Security Focus Africa - Vol 34 No 5 - May 2016

Page 1

www.securityfocusafrica.com | Vol 34 No 5 2016 | R 46 incl. VAT The official industry journal for professional risk practitioners: security, safety, health, environment and quality assurance


COLLEGE OF LAW

DEPARTMENT OF POLICE PRACTICE

Does Crime Pay? Qualifications in Police Science, Forensic Investigations and Traffic Police have become central in the fight against crime and transgressions. Crime and transgression levels are high and the growing complexity with which these are being committed requires and challenges all policing agencies, individual police officials, government departments, non-governmental organisations and the private law enforcement sector to acquire suitable adequate skills and knowledge. The Department of Police Practice at Unisa prides itself for offering superior qualifications that are industry relevant and have academically sound curricula and is pleased to be empowering law enforcement agencies, officers and the security cluster industry. The department offers various qualifications in policing and forensic investigation to ensure that crime in your organisation DOES NOT PAY.

PhD in Criminal Justice

- MTech: Forensic Investigations (Coursework) - MTech: Policing - Master of Arts in Criminal Justice (Coursework) - Master of Arts in Criminal Justice (Full Research)

- BA Honours: Forensic Science and Technology (in the registration process) - BA Honours: Police Science

Diploma in Policing

- BA: Forensic Science and Technology - BA: Police Science

APPLY AND REGISTER FOR POLICING AND FORENSIC INVESTIGATION QUALIFICATIONS AT UNISA. For more information, please feel free to contact the Call Centre of the College of Law Email: Tel:

Shipab@unisa.ac.za 012 433 9410/9443

Define tomorrow.

Chillibush4155Unisa

Higher Certificate in Criminal Justice


The security you want, at the scale you need.

Capture it in PURPLE

Scale it in DATACENTER

WD Surveillance Hard Drives ÂŽ

wd.com/purpose WD, the WD logo and WD Purple are registered trademarks of Western Digital Technologies, Inc in the U.S. and/or other countries. WD Re is a trademark of Western Digital Technologies, Inc in U.S. and other countries. Other marks may be mentioned herein that belong to other companies. Pictures shown may vary from actual products. Total accessible capacity varies depending on operating environment. Not all products are available in all regions of the world. Š 2016 Western Digital Technologies, Inc. All rights reserved. 4178-707154-A00 Feb 2016


CONTENTS

COVER STORY

8

ADI GLOBAL DISTRIBUTION DI invites you to A the Johannesburg ADI Expo to attend seminars, meet the suppliers on the Expo, and then network with ADI staff, suppliers’ representatives or your fellow colleagues in the field.

VOL 34 NO 5

2016

10 FEATURES 10 SPECIAL FEATURE: ACCESS CONTROL The prolific technological development and integration of access control with new technologies, including biometrics and mobile devices – are just some of the major factors propelling the growth of the local and global access control market.

14 TECHNOLOGY UPDATE The Internet of Things (IoT) will, as it grows, automate and inform an increasing number of operations, applications and processes.

14

16


Serving the South African security industry for 34 years

Published by the proprietor Contact Publications (Pty) Ltd (Reg No. 1981/011920/07)

24 REGULARS

prominent quarrying company appointed a new entity to render security services at its Limpopo mine.

4 Comment

Cold case justice

6 News

26 On the Market

Unemployment and its effect on South Africans.

16 Opinion Piece The importance of surveillance for security purposes cannot be under-estimated, says Laurence Smith, executive at GIT.

18 Company News Distribution partnership announced.

20 Residential Security While advanced technology has the ability to revolutionise risk management for estate security, these technologies are often not applied to their full potential.

30 International News

22 Commercial Security It’s all about integration these days, says Laurence Smith, executive at GIT.

24 OH&S When it comes to security in mines, the major focus tends to be on preventing theft and unauthorised access, says Rhys Evans, director, ALCO-Safe.

25 Case Study At the end of its contract with a particular security company, a

• Fighting contraband cellphones in correctional facilities. • 4K surveillance storage sorted. • Technical surveillance countermeasures. • One-stop mobile workforce management system available.

• Video technology from Dallmeier protects Ostdeutsche Galerie. • GJD’s Pearl detector shortlisted for PSI Premier Award. • Dallmeier launches new special camera for number plate recognition. • Video surveillance secures crime lab. • New features make it even easier to find out exactly what happened.

TEL: (031) 764 6977 FAX: 086 762 1867 EMAIL: contact@secpub.co.za PUBLISHER: Godfrey King EDITOR: Andrea Müller PRODUCTION LEADER: Colleen McCann LAYOUT & DESIGN: Hayley Mendelow SUBSCRIPTIONS: Jackie Goosen HEAD OFFICE PHYSICAL ADDRESS: Suite 1, Fields Shopping Centre, Old Main Road, Kloof 3610

POSTAL ADDRESS: PO Box 414, Kloof 3640, South Africa

PUBLICATION DETAILS: Security Focus has 11 isues a year and is published monthly, with the December/January issues combined.

PRINTED BY: Paarl Media KZN 52 Mahogany Road, Westmead www.paarlmedia.co.za

SUBSCRIPTION RATES: Annual subscription for magazine posted in Republic of South Africa is R650 including VAT and postage. Subscription rates for addresses outside South Africa can be obtained on application to the Subscription Department, Box 414, Kloof 3640. Editorial contributions: Editorial contributions are welcome. For details please email the editor: andrea@writescene.co.za. Advertising enquiries: Bernadette Fenton Cell: 082 443 8931 Fax: 086 762 1867 Email: bernadette@secpub.co.za

Security Focus Africa is a member of

36 Law & Security

The Claasen board of inquiry.

38 Index of Advertisers

Official Journal of the Security Association of South Africa

39 Calendar 40 Directory

@SecurityFocusza

Security Focus

www.securityfocusafrica.com


EDITORS COMMENT

Cold case justice

J

ohannesburg has no shortage of reallife crime stories, but few will restore your faith in the system or in people’s relentless quest for truth and justice, quite like the story of Betty Ketani. This week saw the launch of the book, Cold Case Confession, by local journalist Alex Eliseev. Cold Case Confession sets out one of the most perplexing crime stories of the decade. It all started back in 2012, when the owners of a house in Kenilworth ripped up the old carpets in their home to complete some renovations. A simple, typed letter, which could easily have been tossed aside, began with the

EDITORIAL POLICY

following chilling words: “If you are reading this, then I am dead.” What follows is a confession that details the kidnapping, torture and murder of single mother of three, Betty Ketani. Like thousands of other mothers around this country, Betty had made her way to the so-called bright lights of Johannesburg, all the way from Queenstown in the Eastern Cape. She became a chef at Cranks, a restaurant well-known to locals. In her quest to send wages home and provide for her family, Betty spent her life at work. Time with loved ones was restricted to Christmas and Easter. Then in 1999 all contact between Betty and her children ceased. The bewildered Queenstown family were filled with anguish as their beloved mother, daughter and sister had seemingly disappeared without a trace. A haphazard police investigation offered no peace or comfort, and Betty’s story was shelved in the abyss of the criminal justice system for nearly 13 years until that fateful day when the letter was found. In 2012, Eyewitness news reporter, Alex Eliseev was tipped off about a peculiar cold case, and the mystery letter, shortly after the first murder suspects were arrested. Just this week and almost two decades from the time that the murder was committed, Betty Ketani’s killers were finally brought to justice, when the judge handed down sentencing, most notably 30 years to Carrington Laughton, who it turned out was the author of the three-page typed confession. So, what’s the big deal about the Betty Ketani case? It’s the fact that against all odds and despite the best efforts of a few heartless criminals – the story of a little-known woman from a small town captured the attention of a group of dedicated and relentlessly committed individuals. From the police who re-opened the case, including investigating

Statements made or opinions expressed in articles in Security Focus do not necessarily reflect the official views of the Security Association of South Africa (SASA) nor those of any of the other security associations listed in Security Focus. Similarly, advertising in this publication does not imply in any way endorsement or approval by these security associations of any products or services. It is the policy of the Security Association of South Africa that any office-bearer who has an executive position in a company, or companies, which supply security products or services should on no account allow his position to be used to promote his company or its objectives in the editorial content of Security Focus, the official journal of the Association. If, at any time, an office-bearer’s position has been quoted in relation to his company or product, this does not imply the Association’s approval or involvement.

4

SECURITY FOCUS |

VOL 34 NO 5 2016

This book is available at all good bookstores countrywide

officer, Captain Gerhard Van Wyk to lead prosecutor, Herman Broodryk SC (who described the case as the most difficult in his 34-year career) together with his partner, Advocate Namika Kowlas. Without a body and with no motive provided, this entire case was built on circumstantial evidence and DNA samples sent across the continents for testing. Then there’s Alex Eliseev, who gave Betty and her family a voice. While Oscar and Dewani captured the attention of millions around the world, Alex remained quietly committed to Betty’s case. He kept a photo of her above his desk at his home office. So, when free time with his wife and son were sacrificed, when he faced teasing from colleagues about the never-ending cold case, and when the trial seemed to drag on without an end, he would think about the young mother from Queenstown and how desperately her family needed closure. So, while the wheels of justice turned slowly, this time they turned in the right direction. To this day Betty Ketani’s killers have never provided a reason for why she was murdered. However, Cold Case Confession does much to restore your faith in our system, and some of the stellar individuals who still do everything they can for the ordinary South African. To quote Thuli Madonsela’s words about Eliseev’s book, it just goes to show that – “we are all equal before the law”.

Andrea Müller Editor andrea@writescene.co.za



NEWS

Unemployment and its effect on South Africans Unemployment in South Africa is a constant disorder that, instead of being treated, continues to grow and infect growing numbers of disillusioned South Africans.

W

ith the country’s economy struggling to fight off junk status and the rising cost of living, a growing number of South African citizens are finding themselves with few options left. A recent revelation by Pali Lehohla, statistician general of Stats SA, revealed that the unemployment rate in the country has increased by 2.2 per cent in the first quarter of 2016, bringing total unemployment figures in South Africa to a staggering 26.7 per cent. This is statistically the highest it has been since the 2008 global recession that saw global unemployment rates soar. Numerous high-profile industries have

Historical Systems

For Single / Multiple Site Application No wiring required on site

For more information Please visit www.guardtrack.co.za Tel: 011 888 4982 Fax: 011 782 7333 email: info@guardtrack.co.za sales@guardreports.co.za

6

SECURITY FOCUS |

been particularly hard hit by declining employment levels. The trade, manufacturing, and construction industries were the biggest victims in this latest downward spiral, accounting for almost 300 000 jobs lost between them. The issue that South Africa now finds itself facing is the societal impact of unemployment on a portion of the population that is in excess of 14 million citizens. Despite the government’s renewed attempts to stimulate job creation in the wake of the global recession, more South Africans are finding employment hard to come by. This then begs the question: what happens to this unemployed population? One of the key issues that the government faces in this fight against unemployment is growing discontent and loss of support among a significant portion of the voting population. One wouldn’t have to look hard to find support for the reigning ANC government wavering, with the popularity of President Jacob Zuma arguably at an all-time low. The rise of the Economic Freedom Front party has added to the already competitive climate fostered by the DA, meaning the ANC have reason to sweat under the collar, particularly with the impending nationwide municipal elections. Alcohol and substance abuse is another factor that is heavily influenced by the unemployment epidemic. South Africa is one of the highest ranked countries in terms of alcohol consumed

VOL 34 NO 5 2016

per capita, with the average drinking South African consuming approximately 11 litres per year. Alcohol or drug abuse often offers those suffering from depression or desperation a way to escape their hardships and switch off from the real world. Substance abuse has a further knock-on effect of leading to other vices, such as prostitution or petty crime in order to fuel their habits. With South Africa’s existing reputation as a crime haven, further growth in crime statistics will negatively impact on the country’s standing as a popular tourist destination. Ultimately, there is no quick fix to the unemployment problem in this country. Instead, it will have to take a concerted effort from government, first and foremost, in conjunction with public and private sectors in order to stimulate job growth and secure the future of South Africa’s people and its economy. Making education more accessible to a wider portion of the population would be a step in the right direction for fighting youth unemployment and creating a steadier future for the South African workforce.





SPECIAL FEATURE

The global rise of

ACCESS CONTROL The prolific technological development and integration of access control with new technologies, including biometrics and mobile devices – are just some of the major factors propelling the growth of the local and global access control market.

A

ccording to the latest market research by Marketsandmarkets, the access control market is expected to reach $10.4 billion by 2020, at a CAGR of 10.6 per cent between 2014 and 2020. Locally the increase in crime, and globally the ever-present threat of terrorism attacks are the factors compelling corporate and commercial organisations, as well as government authorities to focus on greater utilisation of access control technology, products and services. The high cost of some products is one of the major restraints for the growth of the access control market. The report adds that biometrics has played a crucial role in the growth of access control products by unifying both the technologies. Fingerprint, iris, and signature identification are some of the major areas of biometrics that are expected to indicate significant growth in the near future. Recently, mobile-based access control has been introduced in the market, which follows the principle of bring your own device (BYOD) to access any area or place. All these factors are expected to provide the access control market with a huge growth opportunity in applications such as commercial, industrial, government, military and defence, healthcare, residential, and education. The commercial application of the access control market has the highest market share and is expected to grow tremendously in the coming years. The access control market report covers the products types such as contact cards and readers, contactless cards and readers, hybrid or all-in-one cards and readers, biometric systems, mobile access readers, management software, database and servers. The biometric systems include fingerprint, iris, hand geometry, palm, signature, and face identification. The products are widely used in sectors like commercial, residential, military and defence, government, industrial, healthcare, and education. The commercial application in this report covers

10

SECURITY FOCUS |

VOL 34 NO 5 2016

different sectors such as airports, enterprises, and financial institutions. The report also covers the geographical analysis of the access control market. The regions analyzed are North America, Europe, Asia-Pacific, and Rest of the World (RoW). The players involved in the access control market include ASSA ABLOY AB (Sweden), Gallagher Group Ltd (New Zealand), Cross Match Technologies (U.S.), Morpho SA (France), Honeywell Security Group (US), AMAG Technologies (US), Samsung Techwin Co, Ltd (South Korea), Gemalto NV (The Netherlands), 3M Cogent, Inc. (US), and NEC Corporation (Japan). Notably, the latest market research released by Marketsandmarkets on automated fingerprint identification systems shows that the market is expected to be worth USD 8.49-billion by 2020 at an estimated CAGR of 21.0 per cent between 2015 and 2020. The transformation and technology evolution from the manual process to digital process and the growing investments in the government and enterprise sectors to support e-governance applications should help drive the AFIS market during the forecast period. Research analysts found that the major forces driving the automated fingerprint identification system market are the transformation and technology evolution from the manual process to digital process. As the numbers of criminal records keeps on increasing, the need for the digitisation of the data through the use of AFISs would drive the market for law enforcement applications in the government sector. The need for secure transactions in the banking and finance sector would be another major driver in the AFISÂ market. In addition, the increasing preference for the mobile payments will also help to drive the AFIS market to ensure safe transactions instead of using passwords as a safety tool. The use of fingerprint identification is expected to play a key role in changing the security


landscape for transactions and would grow at a high rate during the forecast period. The government and transportation sectors are expected to hold the significant share of the automated fingerprint identification system market. The AFIS market for the government sector is expected to grow at the highest rate between 2015 and 2020. The use of AFIS in e-governance applications and by the law enforcement agencies would drive the AFIS market for the government sector. The market is also estimated to witness growth in banking and finance and hospitality sectors during the forecast period. North America is expected to have the largest market share and dominate the automated fingerprint identification system market between 2015 and 2020 due to the presence of several players in the region. The North American AFIS market has offered several opportunities in various sectors, such as the law enforcement agencies like Federal Bureau of Investigation (FBI) (U.S.), using AFISs for criminal investigations. The major vendors in the automated fingerprint identification system market identified within the research include 3M Cogent Inc (US), Morpho SA (France), and NEC Corporation (Japan), among others. The scope of the report covers detailed information regarding the major factors influencing the growth of the automated fingerprint identification system market such as drivers, restraints, challenges, and opportunities. A detailed analysis of the key industry players has been done to provide insights into their business overview, products and services, key strategies, new product launches, mergers and acquisitions, partnerships, agreements, collaborations, and recent developments associated with the automated fingerprint identification system market. SECURITY FOCUS |

VOL 34 NO 5 2016

11


XXX

A REVOLUTIONARY SECURITY DEVICE that provides GPS location, real time monitoring and critical two way communication with security guards or personnel

Visit us at

ADVERTORIAL

LAUNCHING AT SECUREX 2016

securex Stand B15

FPX10: A cost-effective, revolutionary biometric solution The industry is no stranger to biometrics – a fingerprint scanner, monitoring employees’ clocking in-and-out times. However, the FPX10 has vastly improved and extended biometric capabilities.

The Active Track device is efficient in tracking personnel via GPS. Door to door movements can be viewed and monitored via Google Maps. The system has the capability to record the duration of time a sales person is at a client and your driver is on the road. The Please Call Me button provides easy communication access to a sales person or driver and a Panic Button if the sales person is in distress.

Integrated with

EasyRoster workforce management system

FEATURES: • User Friendly • GSMVoice/ SMS • RFID Reader • Panic Function • Waterproof • Tamper Proof • Man Down Function • Active View live web-interface

MAIN FUNCTIONALITY:

• Flexible patrol route • Real time processing of alarm events • Preview current GPS position on the map • View devices route on the map • Call back request • Customised reports • Panic Button

Tel: 011 551 1687 | Fax: 086 218 2928 Email: info@activetrack.co.za Twitter: @ActiveTrackRSA

www.activetrack.co.za

D

ESIGNED AND MANUFACTURED in Poland, the FPX10 has developed the biometric technology by expanding its functionality and application in businesses. We, at Active Track (Pty) Ltd, are the Polish manufacturer’s preferred African re-seller. While it monitors time and attendance, much in the same way as traditional biometric systems, the FPX10 Biometric is able to capture data through fingerprints, as well as RFID tags. While biometrics generally use a five-point fingerprint recognition, FPX10 relies on a 21-point fingerprint identification, which ensures extremely accurate inputs insofar as the roll-call, and clocking in and out of staff is concerned. In addition to fingerprint identification, FPX10 is equipped with RFID tag recognition. This feature enables the FPX10 to monitor inter alia the movements of valuable assets, by attaching an RFID tag to each item, to be scanned when being checked in and out, respectively. As

an additional safeguard, one can demand that employees simultaneously scan their fingerprints, and the relevant RFID tags, when moving assets. The brilliance of monitoring staff and assets with FPX10, is fully portrayed by the device’s GSM functionality, and Active View – FPX10’s web-based support platform. With these capabilities, employers are able to access data, in real-time. This feature allows the employer to determine, at any given time, exactly which employees and/ or assets are clocking in or out of the designated premises, and the precise time thereof. Insofar as no-shows, late arrivals and early departures are concerned, the employer can rely on the data as a record of absenteeism, and take disciplinary action against the relevant member of staff. From a cost perspective, the time and attendance data stored on Activeview can be integrated into the employer’s payroll system, thereby ensuring that the employer only pays for hours worked –


XXX

nothing more. In addition, an employer can reduce unwanted overtime, by regularly reviewing the real-time record of time and attendance. At a practical level, the Active View portal allows the customer to edit and update the functionality and intelligence of each of its FPX10 devices, remotely. This would be particularly useful in a security company, where guards are rotated between a range of sites. The security company would simply log on to the portal, and move the relevant guard’s fingerprint intelligence from an FPX10 device stationed at one site, to an FPX10 device stationed at another. Once actioned, the guard would sign on for his shift at the new site, as he had done at the previous site. The data would automatically

adjust to reflect the new site on the guard’s profile, stored on Active View. Due to its portable nature, the FPX10 is easy to install, and can be implemented in all labour-intensive industries. In a relatively short space of time, the FPX10 has been implemented in the security, mining, construction, hospitality, medical health, and landscaping industries. This widespread implementation bears testament to the diverse functionality and application of the FPX10. While the primary focus of the FPX10 is to reduce the customer’s payroll, and improve the monitoring of its staff, it also assists in safeguarding the lives of those employees utilising the device, and the premises at which it is installed. This is achieved

FPX10 THE MOBILE, MODERN, COST-EFFECTIVE BIOMETRIC TECHNOLOGY

through pre-programmed stay-awake, fire, medical, and emergency panic activations, which have been successfully relied on in distress situations. In striving to be the lead supplier of FPX10 in Africa, Active Track (Pty) Ltd incorporates maintenance and technical support into the customer’s monthly rental fee. This monthly rental fee is substantially lower than industry standard. Reducing these costs, and implementing fixed monthly figures, offers us a sizeable advantage over competitors offering similar biometrics. We, at Active Track (Pty) Ltd, invite you to contact us to arrange a demonstration on the FPX10 Biometric – the sophisticated professional in biometric technology.

Mobile No maintenance costs Suitable for all labour-intensive industries Configured to specific site requirements Data capturing through fingerprint and/or RFID tag Accurate 21-point fingerprint recognition GSM enabled, allowing for real-time monitoring and roll-call Functionality and data can be controlled remotely, through the Active View online portal Data can be integrated into Payroll Management Systems Reduces unwanted overtime Eliminates ghost employees

The FPX10 monitors the time, attendance and whereabouts of employees, as well as the whereabouts of valuable assets, in real time, through fingerprint and RFID tag scanning. This easy-to-install, maintenance-inclusive solution is a must for players in all labourintensive industries looking to improve control over their staff and assets, and reduce their payroll.

Pre-programmed stay-awake, fire, medical, and emergency panic functions Can be used in conjunction with a personnel monitoring device – adding value to business

Tel: 011 551 1687 | Fax: 086 218 2928 Email: info@activetrack.co.za | Twitter: @ActiveTrackRSA

www.activetrack.co.za


TECHNOLOGY UPDATE

IoT is coming South Africa needs a dedicated network, standards, infrastructure The Internet of Things (IoT) will, as it grows, automate and inform an increasing number of operations, applications and processes.

W

ith no dedicated infrastructure in place for IoT – i.e., to send, receive or transport IoT signals – it is critical that first movers in South Africa begin to more fully explore the possibilities. The decisions they make now may well impact the cost and longevity of the solutions they are developing, and help determine the robustness of the foundations the country puts in place for IoT. In South Africa, IoT presents a huge opportunity in key sectors, but uptake and development of IoT-driven solutions is still low outside of security, vehicle and asset tracking, and point of sale applications.

In addition, the capacity to implement change is lacking – simple solutions, such as tracking of dustbin collection and emptying, is slow to happen because organisations battle to put in place the skills and technology processes needed. Clearly, more knowledge and awareness is needed in sectors to keep pace with opportunity – along with a sense of urgency.

IoT is coming. Are you ready? The slow pace of change in South Africa is likely to change quickly in the next few years as communication capabilities are built into more and more devices, the IoT

cloud grows exponentially, and disruptive solutions with better value propositions begin to emerge to oust incumbents in various sectors. Quite simply, customers want better services and cost efficiencies, and IoTdriven applications and solutions offer exactly this. First movers are already preparing for this future, but they need to focus on more than the development of the IoT solution and the integration of IoT to existing or new processes. They need to now take a careful look at the long-term implications of making use of IoT. IoT signals vary from a field device sending tiny bits of information every few seconds or minutes, to devices that broadcast a signal every few hours or days. These are tiny bits of data, but for the IoT solution to work, the network that the data is sent along needs to be 100 per cent reliable. There are few dedicated IoT network solution providers in South Africa. The major telcos all offer their own solutions. But GSM is expensive for IoT, and with high congestion on most networks and limited remote coverage, it’s not nearly as reliable as it needs to be. In addition, GSM is power hungry, requiring more bandwidth to move data. IoT data is characterised by small bursts of a few bytes of data. Thus, using GSM networks, the battery technologies used in field devices, which ideally need to last two to five years or more, are quickly depleted. This will add to the cost of the solution.

Find dedicated IoT network providers In Europe, the United States and elsewhere, dedicated networks with new topologies are being developed for IoT. These networks are geared to low power devices and

14

SECURITY FOCUS |

VOL 34 NO 5 2016


TECHNOLOGY UPDATE

low volumes of data, and feature a mesh of repeater stations to ensure 100 per cent throughput. There are some options in South Africa. The globally defined Industrial Scientific and Medical (ISM) band which is also available in South Africa is open for use upon registration but investment in developing such a network is not insignificant. As the IoT data payload is still low, this is not a very lucrative or attractive market yet, and there are few players champing at the bit to offer these services. At present, because network choices are limited, companies offering IoT solutions select their own channel partners and mandate use of these networks. Thus, when customers sign up for the service they may not have a choice of networks. Similarly, organisations developing proprietary solutions are currently making use of whatever network provider solutions they can find, without fully investigating their options or understanding the long term impacts that network choices may

impose – in terms of costs and management of devices. What South Africa needs is a set of reliable dedicated IoT network providers that guarantee data throughput and conform to global standards. With IoT standards developing in China, the US and Europe, it will be important for South Africa to make a choice in terms of standards, and not default to the one most commonly used by operators.

Choosing an IoT network provider – top three considerations Key requirements for companies making use of IoT network providers include the following: • Be specific in terms of defining requirements and needs – Is national or defined geographic coverage needed – How often will data need to be sent and received? – What connect and control specifications are in play?

• Ensure the network provider is flexible – Can they adapt to your IoT application to, for example, easily connect more devices, send more data more or less frequently, improve reporting? – Do meet and incorporate key IoT standards • High service levels are critical – Does the network service provider have a network reserved and dedicated to IoT that offers high stability? In South Africa, commercial applications of IoT are limited, but the opportunity and advantage that IoT presents across sectors is seeing a number of proprietary solutions emerge. If you are gearing to make use of IoT, consider your options carefully. Be aware of the limitations and challenges and make use of solution providers that are flexible, established and experienced, and demonstrate their understanding of IoT technologies. IoT technology is an emerging field but it’s going to be one that plays a big role in our digital future.


OPINION PIECE

Thermal cameras with analytics re-inforce perimeter security By Laurence Smith, executive at Graphic Image Technologies (GIT)

The importance of surveillance for security purposes cannot be under-estimated. Its objective is to detect, prevent and deter criminals, as well as provide evidence that can be used in their prosecution.

F

or businesses or properties with large perimeters, standard CCTV imaging can pose significant challenges. The biggest issue in surveillance lies in the lighting conditions of the area to be monitored, as regular CCTV cameras require adequate lighting to capture a usable image. The solution lies in the use of thermal cameras that operate just as effectively by day as by night, without the need for additional lighting. What are the shortcomings of conventional CCTV cameras? Weather can have a serious detrimental impact on its effectiveness as

25

Years of Experience

WE WANT YOUR BUSINESS!

heavy rainfall and dense fog can obstruct the camera’s view. Such cameras are also affected by bright lights (like car headlights) and smoke which can be used to a criminal’s advantage. Another vulnerability that’s easy to exploit is the fact that CCTV cameras require an additional source of light at night, which is why criminals do their best work under the cover of darkness. One of the most useful applications for thermal cameras is perimeter surveillance and monitoring, as these military-grade cameras have low power requirements and multiple lens options to allow surveillance operators to view images in environments with little or no lighting. Thermal camera technology detects “heat signatures” generated from objects and people to create an image of the environment, which is viewed on screen in black and white; black represents the environment as it should be and white highlights a perimeter threat, or an exception in the environment that triggers an alarm. Intelligent video analytics applications used in conjunction with these cameras can automatically detect threats and distribute

Contact us for a competitive quote FULLY COMPLIANT

Tel: 011 551 1600 Fax: 011 485 2802 www.maxisecurity.co.za 16

SECURITY FOCUS |

VOL 34 NO 5 2016

alerts in real time, leaving security personnel to effectively manage threats to the perimeter rather than expend effort in detecting them. Video analytics technology is able to positively identify and protect against intrusion with up to 98 per cent accuracy and can differentiate between animals, humans and vehicles, which means fewer false alarms. Knowing the nature and exact location of a perimeter alarm can help security operators to respond quickly and appropriately and stop the intruders before any harm is done, which can be challenging in geographically-isolated areas such as estate, farm and factory perimeters, where the perimeters could be many kilometres long. The addition of thermal cameras to an existing CCTV system is uncomplicated and is therefore advisable in those areas where conventional CCTV surveillance is insufficient or not viable. Unaffected by bright light, thermal cameras can penetrate through dust, smoke and any adverse weather conditions with an effective detection range of between 200-400 metres, depending on the lens used. Because of this range, using thermal cameras can even be used to reduce the overall number of cameras required in a surveillance set up. Ensuring that CCTV surveillance footage is effective on a 24/7 basis no matter what the season, is one of today’s biggest challenges in the security field. With thermal imaging cameras and video analytics intelligence, security operators can be assured that the perimeter is secure and that intrusion will be detected no matter the weather or time of day.



COMPANY NEWS

Distribution partnership announced IP Video Solutions (IPVS), a leading security systems distributor and integrator in South Africa, has announced that it has signed a distribution agreement with Genetec Inc. (“GENETEC”), a leading provider of open-platform, unified IP security solutions.

A

s part of the agreement, IPVS will distribute the Genetec portfolio of software and hardware, and network security appliances throughout Southern Africa. "The African region represents a significant emerging market for unified open-architecture, IP security solutions, and we are very pleased to add IPVS to our list of authorised distributors," said Ted Ghali, vice-president and managing director, sales EMEA, Genetec Inc. "With the market knowledge and extensive customer base of IPVS, we are confident we will be able to continue to broaden our market reach in Southern Africa.

Customers will benefit from a solid source of expertise and product choice for all their physical IP security needs, from a company that offers unified, open-platform versatility," added Mr Ghali. Marnix de Lorm, director, IPVS says Genetec is one of the world's leading manufacturers of unified, open-platform, IPbased security solutions and IPVS is looking forward to playing a significant role in the company’s growth in Southern Africa. “We look forward to extending Genetec physical IP security solutions to our customers, offering them more choice and the ability to purchase truly independent, open-platform solutions."

Mr de Lorm says an exciting opportunity for IPVS is to work with the company’s flagship product, Genetec Security Centre – which seamlessly unifies access control, video management systems (VMS) and automated number plate recognition (ANPR) within a single intuitive interface that simplifies operations. IPVS will also be adding to its channel of certified Genetec resellers in Southern Africa. “We are very excited about expanding our network of certified integrators and resellers. “The Genetec appointment will significantly boost the channel as we provide an opportunity to sell the world’s premier IP security system,” concludes Mr de Lorm.

John Elliott Security GUARD TOWERS – A major deterrent, from car thieves’ in parking lots to

custom designed bullet proof towers for high risk theft/assault applications. Says Venessa Mitsingas, Managing Director of John Elliott Security: “Our company is the market leader in the design, manufacture and installation of guard towers from moderate risk to ultra-high risk applications. This is done in association with our design and manufacturing facility at our Wadeville, Germiston production facility.” The guard tower design function is headed up by our Senior Executive Ms Desiree De Andrade who has more than 10 years’ experience in the design, manufacture and installation of guard towers. Desiree manages this division, and her knowledge of customer needs is her speciality. Says Desiree: “Interpreting and understanding customer needs is paramount. Our company has recently installed three custom designed and built guard towers for a major mining group at their cable storage areas, where cable theft was out of control. Since installing the guard towers cable theft has all but been eliminated. We are currently consulting with San Parks in the North of the Kruger Park bordering Mozambique, on Guard towers to counter Rhino poaching.”

Please direct all enquiries to Desiree De Andrade Tel: 011 452 3649 | Email: desiree@jesecurity.co.za

Est. 1980


Paxton Visit us at Securex 2016

24th – 26th May, Stand C10 Hall 2 Gallagher Convention Centre Johannesburg

A global brand of access control and door entry systems • Products IP ready, wired and wireless electronic access control and door entry solutions

• Ultimate Support Industry leading technical support and five year product guarantee

• Seamless Integration Easy integration with CCTV, fire alarm, intruder alarm and biometric systems

• Training & Education Free practical and sales training, ensuring you always offer the best solution

New training dates now available

» For more information visit www.paxton.info/2463 www.paxtonaccess.co.za


RESIDENTIAL SECURITY

The human factor in residential estate management centres (REMCs) OMEGA

While advanced technology has the ability to revolutionise risk management for estate security, these technologies are often not applied to their full potential. In order to maximise the application of newly developed systems, it must be designed to be aligned with the needs, expectations, capabilities, and limitations of the day-to-day operator. Full account also need to be given to the increased skill requirement of the operators.

T

o further enhance the security at residential estates they will over the next five years have to migrate towards adopting some elements of a physical integrated security management system (PSIM). This can be done by borrowing advanced system, information, and control technologies and wedding these to existing, relatively low-technology estate management hardware. “Omega Security Solutions has been working in close collaboration with the Serengeti Residential Estate on a comprehensive security management system, which includes the installation of a physical integrated security management system (PSIM), that will assist us in increasing the efficiency and effectiveness of our security operation at Serengeti,” says Roy Rawlins, managing director of Omega Risk Solutions. Hannes Hendriks, Serengeti Estate manager adds that the Axxon Intellect system applied is an advanced physical security software platform that combines intelligent video analytics, universal IP connectivity and event-driven automation capabilities in a single environment. CiiMS Professional is an integrated application, which is further utilised to capture and manage information related to incidents, risk management, investigative and law enforcement environments. “The installation of these technologies has enabled some core functionality. This allows for the integration of digital video surveillance and audio monitoring systems with existing data systems, various security equipment, and auxiliary software, using integrated open interfaces for data exchange,” adds Mr Hendriks. It also enables security management to load occurrences, investigations, and incidents and set up automated email/SMS notifications for occurrences, incidents, and completed checklists and job cards. The Signal Tower integration allows for alarm management, monitoring, the management of response teams and disaster

20

SECURITY FOCUS |

To maximise the benefit, the level of human skills required on the REMC is of a high calibre. A detail skills matrix has been designed and incorporates elements such as conceptual ability, detail orientation, judgement, decision-making and analytical skills at a higher level than is normally required in the typical control room. However, the results speak for themselves. There have been zero perimeter breaches at Serengeti since February 2010. mode management while the IdentiSafe integration for reference checks, criminal record checks, driver’s licences, credit reports, fraud Llstings with SAFPS, and PSIRA registration. New information and communication technologies allow REMC’s to obtain more (and improved) information and use it to provide more services to the estate management and residents than ever before. Unless the impact of these technologies on human operators is considered and addressed, the expansion of capabilities and responsibilities for the REMC could potentially create excessive workloads for REMC staff. Furthermore, the introduction of new, complex information display and control systems creates an increased likelihood of system-induced human errors.

Maximising operator effectiveness In order to maximise the efficiency of REMC operators and systems and minimise error rates, the REMC must be designed from a human factors perspective. This implies that Estate management, together with the designers and installers of the REMC need to explore and define the role of computers and humans within the context of PISM systems. Some of the biggest challenges experienced during implementation at Serengeti have included operator resistance to change, changes in skills set required, motivating the business model and demonstrating the return on investment in terms of efficiency and effectiveness.

VOL 34 NO 5 2016

Maximising the ranger’s (security officer) effectiveness “The installation of technology, processes and systems is only as good as the people that respond to it,” says Mr Hendriks. “The Rangers (Security Officers) that respond must have the knowledge, skills and ability to attend to the situation, with the right equipment (vehicle, communication, handheld night sight, tabled to navigate on and to send an incident rapport), which integrate directly with the technology and software in the REMCs, to allow operators to make decisions, and to escalate priorities to the management,” he adds. “Omega Risk Solutions has aligned its manpower and training requirement to specifically meet the additional challenges as outlined above,” says Mr Rawlins. “The Omega Risk Solution Training Academy is uniquely positioned to provide custom designed training that specifically meet the requirement of rangers (security officers), REMC operators, and estate supervisors,” he says.

Taking it further The next step at Serengeti is to integrate some estate management software onto the security platform. This will provide for a total new dimension to security management whereby the security platform will directly contribute towards the efficiencies and effective running of a residential estate.


Squeezed storage. Keep the essence with Axis’ Zipstream technology. Optimized for video surveillance, Axis’ Zipstream technology is a radically more efficient H.264 implementation. Zipstream lowers bandwidth and storage requirements by an average 50% or more for many common 24/7 surveillance use cases all without losing forensic details.

www.axis.com/zipstream


COMMERCIAL SECURITY

It’s all about integration these days Owners and operators of commercial facilities are no longer looking for individual security solutions. Today, they want a package that offers all the aspects of security they need. Whether a property is owner-occupied or tenant-occupied, providing the most efficient security to ensure the safety of people and the protection of intellectual and physical property is critical. By Laurence Smith, Executive at Graphic Image Technologies (GIT)

E

mployees that commit theft, armed robbery and information security are major concerns, and companies invest heavily with the aim of bolstering security, protecting people, and solving security problems. This requires alarms, fire protection systems, video surveillance, access control systems, and intrusion detection devices. All technology that, in the hands of capable security operators, can significantly reduce risk, cut losses and keep people safe. The problem, however, comes with the challenge of keeping security staff trained on distinct stand-alone systems. If each of the key components of security – namely intrusion detection, access control, and video surveillance – is purchased separately, the training and administration thereof can become a costly burden. Instead of having intrusion alarms on one system, administering access control on another standalone database and having intelligent digital video technology run elsewhere on its own dedicated computer equipment. By integrating these separate systems under a flexible automated system, the need to have separate service, maintenance, administration, and training for each system is eliminated. An integrated solution allows office park administrators and the like to realise a lower upfront investment for a security system that is more powerful. Installation and training

22

SECURITY FOCUS |

occur on a single system and running costs like service and maintenance are also cut significantly, as one company becomes responsible for all of that. An efficient, automated integrated system would be worthless without highquality input devices. CCTV cameras are an important security component at office parks, buildings, in hallways as well as parking areas. This is where efficiency can be improved even further in the commercial environment, by using next-generation component devices. Ultra-high resolution cameras (“4K cameras”) can be used in the surveillance security, and these newer cameras have embedded processors that enable video to be compressed within the device and transmitted real-time over IP networks to network video recorders (NVRs) that centrally manage video feeds from numerous IP cameras. Streaming video can be continuously recorded and if an incident occurs, disk indexing and time-stamping make it easier to find video from a set date and time. As for the implications of the Protection of Personal Information Act (PoPI) on surveillance footage, the system’s video management software has the facility to rerecord over the oldest information. Where, in some organisations footage is required to be digitally available and stored for a period of 30 days (or longer), the NVR will replace expired footage when the

VOL 34 NO 5 2016

network storage space has been depleted. Where, for example, PoPI states that certain information cannot be kept for more than 30 days, the management system can be programmed so that it erases information after 30 days. How is this possible? Behind the CCTV system lies an intelligent video analytics engine that increases the productivity of security staff that are tasked with monitoring many cameras. This technology examines the 4K camera’s field of view for patterns of movement that indicate something is happening out of the norm, like someone climbing a fence, running a tripline, etc. Video analytics allows the security operator to focus on managing surveillance by exception events rather than having to monitor all events for an exception. By using an integrated approach in commercial properties, the companies and the occupants who work in such buildings will benefit. Integration means lower installation and operating costs, because it cuts out component and system redundancy and allows for the streamlining of security operations. As a result, it reduces training requirements and enables security operators to perform their duties more efficiently, which in turn contributes to enhanced safety and security which is, at the end of the day, a massive feat.



OCCUPATIONAL HEALTH AND SECURITY

Comprehensive mining security

Effective substance abuse policies and procedures required When it comes to security in mines, the major focus tends to be on preventing theft and unauthorised access, as a result of the high value commodities involved in the industry. However, comprehensive safety and security needs to cover so much more, including aspects such as theft of time, as well as risk to employees. By Rhys Evans, Director of ALCO-Safe

W

hen one considers that the mining sector has some of the highest rates of intoxication in the workplace, the importance of this security aspect becomes clear. Employees entering the mining workplace while under the influence of alcohol or drugs not only pose a health and safety risk, they are typically less productive than their sober colleagues, effectively stealing time from their employers. While substance abuse is not traditionally considered an element of mining security, it does introduce risk and an element of theft, and should form part of any comprehensive security solution. Mining by its very nature is a hazardous environment, involving heavy and often dangerous equipment as well as challenging working conditions. Accidents can happen even if the entire workforce is sober and alert. However, the chances of an incident occurring are multiplied drastically when one introduces alcohol and drugs into the mix. Alcohol and drugs have a negative effect on

24

SECURITY FOCUS |

behaviour and reaction times, not to mention the productivity of employees. Employees who are not productive as a result of such intoxication are not working to their full capacity, and this theft of time is an aspect that is often not considered as part of security strategy. In addition, risk mitigation should always form part of security strategy, and reducing employee risk is essential. In order to achieve this, it is essential to put effective substance abuse policies and procedures into place. While random testing is typical and can deliver some benefit, this approach fails to identify the majority of mining employees affected by alcohol or drugs. This not only introduces an unacceptable level of risk; it has the potential to negatively impact the productivity of the entire mine. Mandatory testing of each employee at the start of every shift needs to be included in the security policies of mining organisations. This approach has been proven to be highly effective, particularly where safety regulators enforce this as a daily, compulsory practice.

VOL 34 NO 5 2016

In addition to compulsory daily testing, it is also essential to include educational programmes on the dangers of alcohol consumption in the workplace. Such programmes should include real-world examples of the consequences of actions taken under the influence. When combined with compulsory alcohol testing, such practices can act as a significant deterrent to the use and abuse of alcohol in the workplace. The Occupational Health and Safety Act specifies a zero tolerance approach toward alcohol and drug use in the workplace. In addition, the South African Mine Health and Safety Act states that employers must provide conditions for safe operation, and may not permit intoxicated employees to enter mines. However, the benefits of minimising the risk posed by substance abuse in mining go beyond simple compliance. By including substance abuse into security, identifying intoxicated employees and not permitting them to enter a mine, mine owners can improve employee safety as well as ensuring maximum productivity.


CASE STUDY

ACTIVE TRACK

The tamper-proof guard monitoring device At the end of its contract with a particular security company, a prominent quarrying company appointed a new entity to render security services at its Limpopo mine.

ACTIVE TRACK The Ideal Personnel Monitoring Solution Active Track is a rugged, reliable tool that creates certainty that the job has been done.

FPX10 O

f particular importance to the quarrying company was the safeguarding of limestone, the mineral forming the subject of the company’s mining right, portions of which had been stolen on a number of occasions. Considering that the new security company utilised Active Track devices; and that their managers were properly trained by Active Track to optimally use the technology, their appointment was an easy decision. Unbeknown to the quarrying company, a syndicate had been targeting security officials posted at its Limpopo mine, for some time. It had been bribing the official posted at the main entrance to the mine, to abandon his post at specified times, to allow its team to enter the mine and remove loads of limestone. The syndicate extended its influence by targeting the new guards posted at the mine’s main entrance. The first guard who had been persuaded to abandon his post, resolved to sabotage his Active Track device, so that the Active Track 24-hour call centre would not have evidence of a failed patrol (and would consequently not notify the security company) and would, instead, put it down to a technical error, to be remedied by its technical team at a later

stage. This would afford the syndicate ample time to remove limestone, without raising an alert. However, the security official was ignorant of the fact that each Active Track device is tamper-proof, and that any attempt to dismantle it, triggers an alarm in the Active Track call centre. The call centre immediately alerts the customer, who, in turn, dispatches a response vehicle to look into the incident. Prompted by a call from the Active Track call centre, a member of the security company’s response team arrived on site, shortly after the guard had unscrewed the back of his Active Track device. The response team member witnessed the syndicate loading its bakkie with limestone, and alerted the police. The police arrived on site, where they apprehended the members of the syndicate as they attempted to flee the mine. In addition, the security company was able to take the appropriate disciplinary action against the rogue guard, through reliance on Activeview, Active Track’s online portal, which tracks real-time movements of each device; and records all alarms triggered, and panic buttons activated.

SECURITY FOCUS |

VOL 34 NO 5 2016

25

The FPX10 monitors the time, attendance and whereabouts of employees, as well as the whereabouts of valuable assets, in real time, through fingerprint and RFID tag scanning.

Tel: 011 551 1687 | Fax: 086 218 2928 Email: info@activetrack.co.za Twitter: @ActiveTrackRSA

www.activetrack.co.za


ON THE MARKET

Fighting contraband cellphones in correctional facilities One of the critical issues facing correctional facilities in South Africa is the growing problem of contraband cellular telephones inside our prisons. It is a serious security issue that requires continuous attention and the correct strategy and equipment.

A

ccording to an article in the Times Live on 23 December 2015, Deputy Minister Thabang Makwetla, said “that the Department of Correctional Services (DCS) should be embarrassed at the number of cellphones found in prisons during Operation Vala over the festive season.” The fight against contraband cellular telephones should be based on a number of pillars, such as implementation and enforcing of current laws, rules and regulations that prohibit cellular telephones in the correctional facilities. There should be no fear or favour in enforcing the “no cellphones in prison” rule. It should also be clear to every correctional officer, visitor and others who have access to the prisons what the penalties are when caught with a cellular telephone. A strategy that proposes a “one size fits all” and does not distinguish between the protection requirements of different types

Exclusive supplier of cellular telephone detection systems to secure correctional and government facilities!

of facilities is doomed to fail. A facility that caters for awaiting trail prisoners should rather focus on prevention and when inmates come back from court, or when receiving visitors. A long-term facility, on the other hand should focus more on their own staff and those who have contact with the long term inmates. “At the end of the day it is a correctional officer doing duty at the front door, a correctional officer allowing inmates or visitors in and out and it is a correctional officer [with a hidden cellphone] that can move right from the front door to the most secure cell in the facility” – Gary L Heyward. It is important that correctional departments and facilities procure the correct technology which is appropriate for its own unique situation and challenges. CellDetect will exhibit the latest and most modern technology at Securex that can prevent cellular telephones from entering correctional facilities such as the SentryHound Cell Phone Detection Portal. Where a cellular telephone has made its way into a facility, CellDetect has the right technology such as the SearchLight GSM Detection System that can remotely identify cellular telephones in a specific facility and with the right strategy will allow a prison to remotely deactivate cellular telephones, rendering it useless. It is no longer necessary to conduct physical searches that are dangerous, expensive and requires lots of manpower.

4K surveillance With ultra-high definition (4K) surveillance becoming increasingly common, storage space can become a challenge. The WD Purple 8TB drive offers the ideal solution.

P

urpose-built for surveillance, WD Purple can handle the stresses of this always-on environment, and is ideal for high-definition security systems that use up to eight hard drives and up to 32 cameras. With eight 8TB hard drives in place giving you 64TB of capacity, even 4K video can now be stored with ease. Advanced technology adds longevity and reliability to these drives, ensuring they are always on and always operational for critical security surveillance installations. The Purple drives are engineered specifically for surveillance and able to withstand the extreme

Tel (012) 665-2077 (International +2712) info@celldetect.co.za www.celldetect.co.za

26

SECURITY FOCUS |

VOL 34 NO 5 2016


ON THE MARKET

Technical surveillance countermeasures Eavesdropping Detection Solutions (EDS) will be exhibiting the latest and most modern technical surveillance countermeasures and Cyber TSCM equipment at the upcoming Securex exhibition.

E

DS will be supported during the exhibition by Pete Denson from Research Electronics International (REI) (USA). EDS and REI will be doing presentations on technical surveillance countermeasures and telephone security in the Securex Seminar Theatre on Tuesday 24 and Thursday 26 May 2016. We are at the dawn of various cyber technical surveillance risks and many organisations have gaps in their cyber technical surveillance countermeasures risk management programmes. Given the cross functional and high nature stakes involved to protect corporate information, TSCM resilience can only be achieved through the conduct of regular Cyber TSCM and technical

surveillance countermeasures surveys. Conducting surveys is not enough unless it is conducted by the correct service provider with the right equipment. EDS will exhibit a number of new products that have been specifically designed for professional TSCM teams to counter the latest threats on the GSM, Wi-Fi, Bluetooth and IoT networks. On display will be the new Orion 2.4 HX (3.3W) and the Orion 2.4 HX 6.6W (Government version) Non-Linear Junction Detectors by Research Electronics International (REI) (USA). The ANDRE (Advanced Near Field Detection Receiver) by REI will be introduced in South Africa for the first time during the exhibition.

storage sorted

to

heat fluctuations and equipment vibrations within a Digital Video Recorder (DVR) environment. This means that video playback will always be reliable and high quality, a necessity in the surveillance environment. In addition, exclusive WD AllFrame technology improves ATA streaming to reduce errors, pixilation and video interruptions that typically occur when desktop hard drives are incorrectly used as storage in security systems. WD Purple offers reliable surveillance-class storage, tested for compatibility in a wide range of security systems, with enough capacity store footage from even the highest definition security cameras. With support for up to 32 cameras, WD Purple 8TB drives also offer the flexibility to upgrade and expand security systems in the future, protecting your investment and maximising compatibility. The WD Purple drives feature a three-year limited warranty for additional peace of mind and confidence.

Cyber TSCM™ Surveys All confidential areas and data centres for covert surveillance devices Tel (012) 665-2109 (International +2712) www.tscm-za.com • info@tscm-za.com

SECURITY FOCUS |

VOL 34 NO 5 2016

27


ON THE MARKET

One-stop mobile workforce management system available Econz Wireless has been providing mobile time and attendance solutions across the globe for more than 30 years and mobile solutions to the global security sector for more than 40 years, and today’s technology is key to operating a leading security business, small medium or large.

T

oday, they offer three solutions that provide a full suite of features entirely suited to facilities and field managers. As a leading time and attendance supplier, Econz mobile solutions enable management to eliminate paper timesheets, track employees via GPS, lower fuel costs, and prevent time theft. Their solutions include: • Econz Eservice GPS – a mobile field service dispatch and work order management system that works on mobile phones and tablets. Eservice is web-based software that enables a field service team to receive and respond to customer work orders. • Econz Timecard GPS – a mobile time, attendance, and GPS tracking application that works on mobile devices (Android, Apple, Rugged Phone, etc). Timecard is ideal for companies where time and attendance tracking is helpful for ensuring job completion and maintaining accurate records of working hours

JOIN FSK AT SECUREX TO VIEW THEIR RANGE OF SECURITY ALARM SYSTEMS.

and job types. Building contractors, home healthcare, security guards, distribution, utilities, services and manufacturing companies all benefit by using Econz Timecard. • Timecard Lite GPS – Timecard Lite is our timecard GPS application without the time and attendance reports. For companies that are just looking for GPS tracking, Timecard Lite would be the product of choice. Timecard Lite’s GPS tracking is available on cellphones and tablets – Android, Apple iOS and new BlackBerry. “Managing a workforce, be they security guards or maintenance staff within a large building or a campus consisting of several buildings, is no easy job,” says Thomas Marshall, Econz Wireless national sales director, South Africa. “If the building owner or tenants want prompt maintenance service, while containing costs and ensuring jobs are completed

FSK IS AT 24-26 MAY ‘16 | HALL 2, STAND D04 GALLAGHER CONVENTION CENTRE, JHB

The Rhino 232 Security Alarm Panel is a fully integrated, portable and user friendly life companion – available in the market today.

www.fsk.co.za Call Center 0861 105 962

ORDER NOW sales@fsk.co.za

The Rhino 816 is the most aesthetically pleasing, feature rich, high performing Security Alarm Panel available in the market today.

BUILT STRONG TO PROTECT WHAT MATTERS MOST.


ON THE MARKET

r i s c o g r o u p. c o m

RISCO Stars Partners Program

Boost your Business with RISCO Stars!

properly, timeously and efficiently, then your team has to be managed equally efficiently.” It’s the same for security, Mr Marshall says. “Whether we look at guarding, on booms and in cars, or checking that routes are being followed precisely, on time, and that staff are always awake, supervisors and contact centres need to know the location of everyone, anywhere, any time.” Facilities managers often present with a set of very specific challenges. These include: • Time and attendance – for permanent, casual and shift workers. • Team clock in – where a team leader responsible for one area, floor or building can log in his team on one device. This is transmitted back to head office and integrates into over 100 payroll systems, thus eliminating all inaccurate paper time sheets and relieving the payroll admin staff of hours of checking, as well as ensuring accurate payments and cost savings. • Staff tracking – the facilities manager can pinpoint all staff via an accurate web-portal from the comfort of his office, as well as produce up to 29 management reports on staff activities. • Job dispatch and parts management – managers BENEFITS INCLUDE: are able to dispatch • Low entry cost maintenance staff very • Little or no capex efficiently to carry out • Low monthly cost repairs, receive before • Low set up costs and after photos for job • Almost any mobile device completion and quality, and • Increased customer see the completed parts service levels lists, again via a web-portal. • Fuel savings Customers have reduced • Integration with time theft, consumables theft company payroll (such as cleaning products), • Reports substantiate any increased customer service labour disputes quality and satisfaction, and • Works anywhere, provides almost immediate anytime return on investment.

Choose RISCO, Collect Stars and Benefit! The RISCO Stars Partners Program is a specialized incentive plan designed for installers of RISCO Group products. Choose RISCO and we will help you to boost both your skills with specialized training courses, and your business with promotional tools for increasing your visibility and attracting more clients. With every RISCO Group product purchase and every training course completed, you will receive a designated number of Stars. Collect the Stars in your personal account and redeem them for our selected promotional tools designed to help you increase your market reach.

Download the RISCO HandyApp Installer’s app, register, and start earning Stars today!

+27 (0) 11 401 6700 SECURITY FOCUS |

VOL 34 NO 5 2016

29

www.elvey.co.za


INTERNATIONAL NEWS

Video technology from Dallmeier

protects Ostdeutsche Galerie Modern video technology from Dallmeier is protecting the Ostdeutsche Galerie in Regensburg. Following an arson attack in 2014, it was clear that more effective security measures were needed.

T

he “Kunstforum Ostdeutsche Galerie” in Regensburg is an exceptional art museum with a unique mission – this is where the artistic heritage of the eastern European cultural regions, previously suffused with German influence, is preserved. The museum’s collection includes about 2 500 paintings and sculptures, and 30 000 prints by internationally renowned artists.

30

SECURITY FOCUS |

The emblem of the Ostdeutsche Galerie is the four enormous red pillars at the entrance to the Kunstforum, which were installed in 2006 by Czech artist Magdalena Jetelová. Regrettably, in June 2014, this work of art was seriously damaged in an arson attack, and the museum management resolved to install a video surveillance system to better protect its art, particularly the items in the outdoor area. Just a few days later, the video expert Dallmeier supplied a demo system, which was tested thoroughly and ultimately preferred over its competitors. Today, the four pillars have been completely renovated, resplendent in their restored vibrant red, and the video system from Dallmeier is also working well. Over the years, Dallmeier has repeatedly given fresh impetus to the market with new developments and extraordinary innovations. The world’s first DVR, for example, which

VOL 34 NO 3 5 2016

The red pillars were seriously damaged in an arson attack in June 2014.

introduced digital recording to the entire CCTV industry, came from Dallmeier. The multifocal sensor system Panomera will have a similarly groundbreaking effect. This unique and novel camera technology will revolutionise the market and open up completely new possibilities to the video security industry. This and the extensive experience in the CCTV and IP field have led to a top position


INTERNATIONAL NEWS

in the international market for digital video surveillance systems.

Installation compliant with monument protection regulations The new Dallmeier cameras were mounted in accordance with the strict instructions of the agency for protection of monuments and are trained on the entry portal of the Ostdeutsche Galerie. The IP cameras are fitted with integral infrared lighting, which enables them to deliver highly detailed images even at night. Data is recorded on a VideoNetBox II, a compact video appliance that was built into

the museum’s server cabinet. The museum has two video workstations, where the images from the surveillance cameras can be analysed if there is an incident. The museum hopes the new cameras will serve as a deterrant and convince potential offenders to abandon their plans.

Investment protection for the foundation Maximilian Obermeier, managing director and a member of the management board of the Ostdeutsche Galerie foundation, is satisfied.

“As a foundation, we are duty-bound to handle budget funds carefully. So when we were looking for a provider of professional video technology, it was important for us to get top-quality products with the latest technology. “It was also very important to be able to keep the video system up-to-date with new software for many years, and if necessary to expand it with hardware extras. This represents investment security for our foundation,” says Mr Obermeir. “Dallmeier offers video security systems with a special museum solution. We believe that in Dallmeier, we have found exactly the right partner,” he concludes.

GJD’s Pearl detector shortlisted for PSI Premier Award GJD’s Pearl detector has been nominated in the Intruder Product of the Year Award 2016. This is the second year in a row that GJD has been nominated as a finalist in the PSI Premier Awards.

T

he PSI Premier Awards are unique as readers of the PSI magazine, including professional security installers, specifiers and consultants, vote for their preferred innovative product. The external Pearl triple-tech wired detector is a highly advanced PIR and microwave technology system, designed to provide extremely effective security against potential crime. Mark Tibbenham, managing director, comments: “GJD is truly honoured to have the Pearl detector nominated for the PSI Premier Awards for a second year running. This is a strong indication and recognition of all the hard work the team at GJD have invested. I would like to congratulate all our staff whose dedication has resulted in this prestigious nomination”. GJD was established in 1983 and has an extensive portfolio of security products, which are manufactured inhouse. All products are 100 per cent

tested and supported by a dedicated team who provide knowledgeable expertise and support. The Pearl detector may be small in size yet its quality, reliability and technological performance is exceptional. The innovative design incorporates PIR,

microwave sensing and an anti-masking system, providing robust triple protection. The Pearl detector is a high-end product designed to protect residential, commercial or industrial premises. Its compact size and unique features make it an ideal solution for all security requirements.

SECURITY FOCUS |

VOL 34 NO 5 2016

31


INTERNATIONAL NEWS

Dallmeier launches new special camera for number plate recognition

With the DF5200HD-IRANPR Dallmeier launches a new special camera whose images are optimised for the automatic recognition of vehicle number plates.

T

he DF5200HD-IR-ANPR is a special camera with integrated IR illumination. The images provided by the camera are optimised for the automatic recognition of vehicle number plates on a SEDOR ANPR Server appliance. Equipped with the most advanced sensor and encoder technology, a powerful IR illumination and a special optical filter, the camera provides high-resolution and

32

SECURITY FOCUS |

monochrome video footage. This is the ideal base for a precise and fast 24-hour number plate recognition, regardless of environmental conditions or changing lighting at day and night. The camera features an outstanding infrared sensitivity and permanently supplies infrared images with excellent contrast. The restriction on the infrared range allows for the elimination of disturbing daylight and ambient conditions. In addition, the intense IR reflection of modern number plates is optimally utilised. This enables recordings with brilliant clarity and highest detail resolution, ideal for a precise number plate recognition in a 24/7 operation. The outstanding infrared sensitivity of the camera is supported by the integrated homogeneous IR illumination. It is based on

VOL 34 NO 5 2016

semi-covert 850 nm high power LEDs and permits an illumination range of up to 18 m. The camera is equipped with special presets in order to provide optimum recordings for the number plate recognition with SEDOR ANPR Server. This allows the quick and easy adjustment of the settings to different capture ranges. Individual adjustments of the camera settings are usually not required. The camera is equipped with a RAM memory that is used by the EdgeStorage function for storing the video stream in case of a network failure. When the network is restored, the SmartBackfill function ensures a fast transmission to the SMAVIA recording system. This stores the video stream with high speed and then continues the recording of the live stream seamlessly.


SECURITY SKILLS PROGRAMMES

081965442557

Introduction BTC Training Africa is an accredited safety and security sector education and training authority (SASSETA) training provider who presents the South African Qualifications Authority (SAQA) registered qualification: The National Certificate in general security practices (NQF level 3). The skills programmes 1, 2 and 3 form part of this qualification and each programme has credits towards the full qualification (124 credits). These skills programmes replace the PSIRA Grades E to C. Each skills programme is for a duraration of six days. On successful completion of the skills programme you will be awarded a Sasseta certificate. A payment plan is available.

The Skills Programmes

Unit Standards: ID

Skills Programme 1: Patrol Officer (Old Grade E (39 credits)

Unit Standard Title

Level

Credits

Core 244176 Use security equipment

Level 2

2

Core 244184 Apply legal aspects in a security environment

Level 3

8

Core 244177 Conduct a security patrol in an area of responsibility

Level 3

7

Core 246694 Explain the requirements for becoming a security service provider

Level 3

4

Core 244182 Give evidence in court

Level 3

4

Core 244179 Handle complaints and problems

Level 3

6

Core 244181 Perform hand over and take over responsibilities

Level 3

2

Core 12484 Perform basic fire fighting

Level 2

4

Core 116534 Carry out basic first aid treatment in the workplace

Level 3

2

Skills Programme 2: Access Control Officer (Old Grade D) (35 credits) ID

Security Employers Security employers who are SASSETA compliant may apply to SASSETA for funded skills programmes. They may also apply for a mandatory grant of 50% of the training costs of the skills programmes.

Level

Credits

Core 244189 Conduct access and egress control

Level 4

7

Core 242825 Conduct evacuations and emergency drills

Level 4

4

Core 11505 Identify, handle and defuse security related conflict

Level 4

12

Corel 119465 Write/present/sign texts for a range of communicative contexts

Level 3

5

Core 114979 Operate a computer workstation in a business environment

Level 3

2

Core 117705 Demonstrate knowledge of the Firearms Control Act 2000 (Act No 60 of 2000) applicable to possessing a firearm

Level 3

3

Core 113924 Apply basic business ethics

Level 2

2

Skills Programme 3: Asset Protection Officer (Old Grade C) (39 credits) ID

Call Errol Telephone: 011 869 1946 Cell: 082 414 4898 E-mail: epeace@netactive.co.za www.btcafrica.co.za

Unit Standard Title

Unit Standard Title

Level

Credits

Core 119472 Accommodate audience and context needs in oral/ signed communication

Level 3

5

Core

Level 3

5

Core 113852 Apply occupational health, safety and environmental principles

Level 3

10

Core 113909 Coach a team member in order to enhance individual performance in work environment

Level 3

5

Core 114942 Describe how to manage reactions arising from a traumatic event

Level 3

2

Core

13936

Outline the legal environment in a selected industry

Level 3

2

Core

11508

Write security reports and take statements

Level 4

10

13912 Apply knowledge of self and team in order to develop a plan to enhance team performance


INTERNATIONAL NEWS

Video surveillance secures crime lab Hikvision, the world’s leading supplier in innovative, award-winning IP video surveillance and CCTV products, has provided a state-of-the art surveillance solution to Colorado’s Greenwood Village Police Department for use in its crime lab.

T

his solution, which incorporates Video Content Analysis (VCA), as well as 360° fisheye technology, allows the Greenwood Village police to protect forensic evidence from external threats as well as improve employee accountability and monitor departmental procedure. The Greenwood Village Police Department’s crime lab is a vital facility inside which evidence from crime scenes is stored, including firearms, narcotics, and cash. The primary goals for the video surveillance solution were to integrate VCA into the critical areas of the crime lab to boost employee accountability, while creating new security capabilities as well. “We had a system before but it was very archaic and outdated. There was no recording capability except for live viewing by the dispatch centre. “It couldn’t detect motion and was in limited areas,” remarked Commander Joe Gutsgell, division commander of the Greenwood Village Police Department’s Investigations Unit. Safe Systems Inc. in Louisville, Colorado, provided their technical expertise when installing the crime lab’s new video surveillance system.

34

SECURITY FOCUS |

They chose Hikvision products due to Hikvision’s reliable performance, excellent customer support, and cost-effective product line. Hikvision’s 6 MP fisheye camera (DS2CD6362-IV) allows for broad, yet precise, coverage of the evidence room. The fisheye is designed to capture images from every corner of a particular location and eliminate blind spots: a helpful, costeffective solution for small, indoor spaces like this one. One camera takes on the job of what required three or more fixed cameras in the past. “We’re taking advantage of the 360° fisheye to look at three doors simultaneously: the exterior door, an interior door to another part of the office, and the evidence room,” explained Mark Overland, senior safety and life security consultant of Safe Systems Inc. Hikvision’s 1.3 MP mini dome cameras (DS-2CD2512F-IS-2.8MM) stand guard in the room where highly sensitive property confiscated by police is stored, and in the vehicle processing room, where Commander Gutsgell’s team collects evidence from vehicles involved in investigations. Recorded video of this room also provides forensic accountability for the department’s

VOL 34 NO 5 2016

As valuable evidence is collected and catalogued by police in Greenwood Village, Colorado, video surveillance ensures safety and accountability in the police department’s crime lab.

procedural integrity. Hikvision’s professional series 16-channel NVR (DS-9616NI-ST) rounds out the solution. This high-performing, 48 TB recorder offers the ability to add cameras to the system as needed in the future. VCA features such as motion detection further maximise storage efficiency, reducing saved data when it isn’t needed. All said and done, Greenwood Village Police Department’s crime lab is making good use of a comprehensive surveillance system with features that will serve them well for many years down the road. “Hikvision works to bolster the natural relationship between the security industry and law enforcement officials,” commented Jeffrey He, president of Hikvision USA and Hikvision Canada. “We create products and solutions that help make these officials’ jobs easier and more efficient, allowing them to maximise their resources. “We are proud to support the Greenwood Village Police Department in their tireless efforts to protect their community.”


INTERNATIONAL NEWS

New features make it even easier to find out exactly what happened

XPO 2016

Bringing you the latest in electronic security solutions

ONE SHOW DOWN, 2 TO GO... VENUE DETAILS

The new Geutebruck release has arrived: G-Core 1.4.2. The powerful video engine provided on all G-Scopes makes it easier than ever to find out what happened when an incident occurs, both live and when evaluating recorded images.

Cape Town 7 - 8 June Green Point Stadium, Business Lounge Entrance - P1A

SHOW TIMES 09H30 - 16H00

COCKTAIL PARTY 16H30 - Late

T

he new Spot Monitor Recording plugin facilitates object tracking. Users can drag various cameras onto the Spot Monitor and view images live, record them simultaneously on another channel and then easily export the overview created using the Spot Monitor. For example, security services observe a shoplifter using multiple cameras, making it possible to quickly and easily save the entire event on a storage medium and hand it over to the police. The entire surveillance procedure is documented on the Spot Monitor channel from start to finish. You only need to specify the start and stop times and the back-up is ready. The new metadata motion search, abbreviated MOS, represents a further optimisation in event analysis. With MOS, users can search for specific movements in freely definable image areas – of course, in both live and in recorded images. A special feature: Movement data is stored in an SQL database, video streams in Geutebruck’s proprietary video database. This dual architecture provides twice the security, setting a new standard in access speed and flexibility. As a result, search results are available significantly faster than with other solutions on the video market. Event analysis is extremely comfortable for the user.

Johannesburg (First evening of each show only) 21 - 22 June Kyalami Grand Prix Circuit, The Brand New Jackie Stewart Conference Room 1 Entrance - Cnr Allandale and R55

BENEFITS OF VISITING • •

Exposure to innovative quality products Intimate interaction with highly knowledgeable product personnel • Exciting competitions • Amazing product promotions • Transport arrangements from branch (please contact your nearest Elvey branch for bookings)

OUR PARTNERS

© Geutebrück GmbH

CATHEXIS

Geutebruck’s new release G-Core 1.4.2 has arrived. The powerful video engine provided on all G-Scopes makes it easier than ever to find out what happened when an incident occurs. The Spot Monitor Recording plugin facilitates object tracking and documentation of an event over several cameras. Metadata motion search enables intelligent, lightning fast search for motion in the picture.

+27 (0) 11 401 6700 SECURITY FOCUS |

VOL 34 NO 5 2016

35

www.elvey.co.za


LAW & SECURITY

The Claassen board of inquiry Following the suspension of the National Police Commissioner Riah Phiyega by the State President in line with the recommendations of the Farlam Commission of Inquiry into the deaths at Marikana the first comparison that was made was that she, rather like her immediate predecessor, has been subject to enquiries relating to the performance of their duties and fitness to hold office. By Peter Bagshawe

I

n Cele’s case there was a board of inquiry into his role in the leasing by the South African Police Service of buildings in Pretoria and Durban where both involved excessive floor space and irregular procurement processes. Both of these leases were cancelled following an investigation by the Public Protector. The State President convened the board of enquiry and, on its recommendations, replaced Cele as National Police Commissioner on the basis that he was unfit to hold office but was not found guilty of corruption. The President then replaced Cele with Riah Phiyega in the role of National Police Commissioner, which was the third consecutive appointment of a non-career member of the South African Police Service as National Police Commissioner. Their immediate predecessors were Jackie Selebi (also not a member of the Police Services prior to his appointment, and resigned as National Commissioner when he was charged with corruption) and George Fivaz, who had a lengthy career in the South African Police Service. The Claassen board of inquiry was scheduled to last some five weeks and was established in response to recommendations that the fitness of Phiyega to hold office be reviewed in line with the findings of the Farlam Commission into actions and evidence adduced during the hearings. Given that the Farlam Commission lasted some two years the quantity of evidence available for review was obviously substantial and recommendations on specific allegations that were to be investigated include: • Whether Phiyega and senior police officers misled the Farlam Commission with regard to the decision on the use of maximum force against the striking platinum mine workers. • Events and decisions made at a national meeting of senior police leaders the night before the Marikana shooting. • Remarks made by Phiyega at a police passing out parade shortly after the shootings at which she praised police for their actions.

36

SECURITY FOCUS |

• Establish if there was an orchestrated cover-up of the killing of mine workers at Scene 2 at Marikana. The full ambit of the matters to be reviewed fall broadly into categories that are related to or would fall under the umbrella of the three listed above. The first day of the Claassen inquiry was largely taken up by argument as to whether only evidence adduced at the Farlam Commission could be reviewed. The Commission decided that additional witnesses who had not testified at the Farlam Commission could be called and that within boundaries, evidence outside the Farlam Commission could be introduced in order to review the actions of the parties in relation to the actions and activities of the parties, as well as evidence that had become available subsequent to the Commission. The additional evidence and calling of new parties was obviously argued strenuously, but unsuccessfully, against by the lawyers representing Phiyega on the basis that this would be wide of the mandate of the Claassen enquiry. This was followed by the leading of evidence by the evidence leader which commenced with members of the South African Police Services. The first of the witnesses was a captain in the North West tactical response team who outlined the decision making chain in the decision to use tactical measures in disarming strikers and removing them from the kopje as having been taken by national management which would have included the relevant generals and Commissioner. Captain Ntlati was not a witness at the Farlam Commission but his affidavit was read at the Commission and included in the evidence. This was followed by evidence from then Brigadier Lindela Mashigo of the Police Service’s Communications Department who gave evidence that suspended National Commissioner Phiyega instructed that the content of a media release be amended to delete reference to a number of details, including the number of strikers killed in the Police action. He also stated Phiyega dictated changes to the media release that related to the

VOL 34 NO 5 2016

actions of the strikers, the escalating levels and mechanisms of response by the Police and the use of force being required to protect members of the Police from the advancing strikers. During the course of the evidence, e-mail correspondence was led that showed Phiyega had instructed the Police not to respond to a request for assistance in respect of a meeting of the respective expert witnesses on both sides to identify areas of commonality, differences and the reasoning behind their respective stances. This was particularly applicable to Cees de Rover, an expert witness on behalf of the South African Police Service who, during the Farlam Commission proceedings, gave evidence that he could not obtain clarity on who had issued the order for tactical measures to apply, had not received assistance from Phiyega on this and that it was the international norm that an instruction to use force under these circumstances would have required a written instruction signed by the Executive. The decision not to co-operate was taken up by the South African Police Service Legal Department whose advice to Phiyega recommending compliance was not acted on. At the close of the hearing on Friday, 6 May, Advocate Ismail Jamie, who headed the evidence leaders advised that he was closing the case. This closure came before evidence was adduced for the majority of the witnesses listed by Advocate Ismail Jamie’s team had been heard and on consideration appears to indicate that the evidence leaders are of the opinion that they have established the requirements of at least the three of the four primary points of investigation listed above. If this is taken as correct, the evidence leaders must have been convinced that they had established that Phiyega’s fitness to hold office had been sufficiently eroded for the Claassen inquiry to find against her. Even more surprising is that Phiyega’s team also closed their case and this was done without leading witnesses and without Phiyega giving evidence on her behalf. The option on this side must be that the Phiyega team felt that no case had been presented that required an answering Continued on p38


AccessLine Gramma Switch

VisionLine 8/16 Channel HD DVR

The AccessLine Gramma Switch is a certified Sabbath compliant remote/receiver unit. This device is intended for use on the Sabbath and Festivals and has been approved by The Tzomet Institute and is endorsed by the Beth Din of Johannesburg.

The VisionLine 8/16 channel HD DVRs are1080P high definition hybrid DVRs with the ability to connect HD and IP cameras simultaneously. These recorders can meet different security requirements of home, financial, commerce, enterprise, transportation, government, etc. HD video input, 8/16 CH, 720P / 960H / D1 recording

Pressing the button on a Gramma Switch does not draw power from the battery. There is a computer (microprocessor) inside the Gramma Switch that is always on, unlike a normal remote. This microprocessor sends a pulse, approximately every 10 seconds, which checks to see if the button has been pressed. If the computer (microprocessor) detects that the button has been pressed, the microprocessor waits for the next pulse to confirm that the button was pressed. The microprocessor will then send a signal to change the state of the alarm.

DSC Outdoor Wireless PIR Motion Detector with Integrated Camera The DSC Outdoor Wireless PIR Motion Detector with built-in camera allows for a high level of reliable motion detection. Features: • Innovative Octa-Quad technology to minimize false alarms • Visual verification with image capture • Camera range in parallel to PIR coverage no lost areas • Robust housing and patented anti-masking protection • Market-leading black mirror optics • Built in RF-link status LED • Remote maintenance with configuration and testing via keypad This product is compatible with all PowerSeries NEO panels.

Features: • 16 Ch DVR supports 2 Ch IPC 3MP / 1080P / 720P / 960H / D1 recording • HDMI 1080P output, true high resolution display • Powerful smart phone surveillance supporting iPhone, Android • Express and flexible backup via USB, network • Adopt standard H.264 high profile compression format to get high-quality video at much lower bit rate

ET Systems E-Pad O2 Wireless Keypad ET E-Pad O2 Wireless Keypad

The E-Pad O2 Wireless Keypad has a compact and stylish design with LED illumination for ease of use in the dark. Features: • Keyless access control • Rugged weatherproof die cast aluminium housing • Battery operated keypad (approx. 120 000 operations) • LED illumination for ease of use at night • 1 - 100 users • Fully compatible with all E.T. products

Suprema BioStation 2

Fermax GSM Unit

Suprema’s BioStation 2 incorporates the latest Suprema technology in a beautiful exterior. It combines a new powerful processor, Suprema’s next generation optical sensor and improved fingerprint sensing & capturing algorithm to offer unrivaled performance. BioStation 2 provides users with instant authentication and rapid data transfer to manage high volume data with ease. It is ideal for applications that require versatility without compromise in style and performance.

The Fermax GSM Unit is a digital intercom that allows residents to communicate and trigger the gate via their mobile/cellular phone.

Features: • Match and authenticate up to 20 000 fingerprints per second • Manage up to 1 000 000 fingerprint templates • 500 000 maximum users • Hold up to 3 000 000 logs • Next Generation Optical Sensor • IP65 weather proof • Versatile interface

Elvey is a leading distributor of electronic security equipment in Africa. Our mission is to assist in the protection of people and property by providing quality, innovative products and solutions to the electronic security industry, thereby ensuring a safe and secure future for all.

This system is user friendly and very easy to operate and manage for both administrators and users of the system. It is ideal for residential and business properties.


LAW & SECURITY

Continued from p36

argument (following the cross examination of Mashigo and efforts to attack his credibility) and that there was no requirement to rebut to evidence led by Advocate Jamie. Following on from here it is likely that the Classen inquiry will now be a detailed review of the recorded evidence given by Phiyega to

the Farlam Commission and that proceeding will then be held over pending a decision by the inquiry which will have to report to the State President. In the interim, it is likely that there will be a focus on the inquiry with a number of stake holders, obviously including the widows of the

deceased miners, who will then review the result and options that are available to them.

PETER BAGSHAWE holds a Bachelor of Law degree from the former University of Rhodesia and a Bachelor of Laws degree from the University of the Witwatersrand.

Vol 34 No 5

INDEX OF ADVERTISERS ADVERTISER

PAGE

EMAIL

WEBSITE

Active Track

11-12, 25

info@activetrack.co.za

www.activetrack.co.za

ADI Global Distribution

OFC, 8-9

sales.za@adiglobal.com

www.adi-expo.com/johannesburg

Axis Communications SA

21

sasha.bonheim@axis.com

www.axis.com/outdoor

Boomgates

OBC

boomgate@global.co.za

www.boomgatesystems.co.za

BTC Training

33

epeace@netactive.co.za

www.btcafrica.co.za

CBIA

27

info@tscm-za.com

www.tscm-za.com

CellDetect

26

info@celldetect.co.za

www.celldetect.co.za

Elvey Security Technologies

29,35,37

info@elvey.co.za

www.elvey.co.za

FSK

28

sales@fsk.co.za

www.fsk.co.za

Guard Track

6

info@guardtrack.co.za

www.guardtrack.co.za

Hikvision

23

overseasbusiness@hikvision.com

www.hikvision.com

John Elliott Security

18

desiree@jesecurity.co.za

www.johnelliottsecurity.co.za

Maxi Security

16

info@activetrack.co.za

www.maxisecurity.co.za

Morpho South Africa

5

sec.san.orders@morpho.com

www.morpho.com

neaMetrics

7

enquiry@suprema.co.za

www.suprema.co.za

Paxton Access Ltd

19

support@paxtonaccess.co.za

www.paxtonaccess.co.za

Plaslope

39

glenda.aereboe@plaslope.com

www.plaslope.com

Powell Tronics

17

marketing@powelltronics.com

www.p-tron.com

Reditron

11

sales@reditron.co.za

www.reditron.co.za

Regal Distributors SA

15

sales@regalsecurity.co.za

www.regalsecurity.co.za

Sparks & Ellis

32

info@sparks.co.za

www.sparks.co.za

UNISA

IFC

shipab@unisa.ac.za

www.unisa.ac.za

Western Digital Corporation

1

www.wd.com/purpose

SUBSCRIBE TO

To: Security Publications SA (Pty) Ltd, PO Box 414, Kloof, 3640 Tel: (031) 764-6977 Fax: (031) 764-6974 E-mail: jackie@contactpub.co.za p Yes, please, I would like to subscribe to Security Focus. (Cost: R650,00 per year). (RSA Only) The subscription includes an annual Buyer’s Guide. p Enclosed please find cheque to the amount of R............................... p Please start my subscription from the..........................................issue. Do you require a tax invoice p Yes p No

BANKING DETAILS: First National Bank, Kloof Branch Code: 221526 Account Number: 50730011968 Account Name: Security Publications SA (Pty) Ltd

(If yes, one will be sent to you on receipt of your payment.)

NB: Please make cheques payable to Security Publications SA (Pty) Ltd Name:...................................................................................... Signature:....................................................................................... Date:................................................. Company:.............................................. Position:................................................................... Address........................................................................................................................................................ Code:.......................... Tel:............................................................................................ Fax:................................................................................................

38

SECURITY FOCUS |

VOL 34 NO 5 2016


CALENDAR

Conferences, events and exhibitions of interest to the security industry LOCAL EVENTS: 2016 May 24-26: SECUREX 2016 | Venue: Gallagher Convention Centre, Midrand, Johannesburg | Joshua Louw | t: (011) 835 1565 | Email: joshual@specialised.com May 24-26: A-OSH EXPO SA 2016 | Venue: Gallagher Convention Centre, Midrand, Johannesburg | Joshua Louw | t: (011) 835 1565 | Email: joshual@specialised.com September 4-7: CAMPROSA CONFERENCE Venue: Fairmont Zimbali Hotel, North Coast | John Tunstall | t: (028) 313 1711 | Cell: 082 566 6898 | Email: jtunstall@iafrica.com | www.camprosa.co.za

INTERNATIONAL EVENTS: 2016 June 21-23: IFSEC 2016 | Venue: Excel Centre, London Dockland, UK | www.ifsec.co.uk September 12-13: Fire India South Exhibition and Conference | Venue: Chennai Trade Centre, Chennai, India | www.fire-india.com September 13-15: EuroSafety – Safety and Security Exhibition. Venue: Tampere Trade Fairs, Finland | www.eurosafety.fi September 27-30: Security Essen – The World Forum for Security & Fire Prevention | Venue: Essen, Germany | Messe Essen | www.security-essen.de

November 14-16: IFSEC Arabia | Venue: Riyadh, Kingdom of Saudi Arabia | www.ifsec.co.uk November 16-17: Sectech Denmark 2016 | Venue: Scandic Copenhagen Hotel, Copenhagen | t: +45 33 14 35 35 | www.armedia.se

INTERNATIONAL EVENTS: 2017 January 22-24: Intersec 2017 | Venue: Dubai International Convention & Exhibition Centre, Dubai, UAE | Email: intersec@uae. messefrankfurt.com | www.intersecexpo.com April 4-7: LAAD Defence & Security | Venue: RioCentre, Rio De Janeiro, Brazil | www.laadsecurity.com.br June 2-5: KADEX 2016 – Kazakhstan Defence Expo | Venue: Korme Exhibition Centre, Astana, Republic of Kazakhstan | Email: office@astan-expo.com or office@kadex.kz | www.kadex.kz September 11-13: Kazakhstan Security Systems | Venue: Korme Exhibition Centre, Astana, Republic of Kazakhstan | Jack Yasakov | Email: yasakov25@gmail.com September 12-15: DSEI 2017. World’s leading defence and security exhibition | Venue: ExCeL, London | www.DSEI.co.uk November 6-9: Defence & Security 2017 | Venue: Impact Exhibition Centre, Bangkok, Thailand | Kallie Vlok | t: (012) 428 2075 | Email: kalliev@armscor.co.za

Tel: Fax: E-mail: Web:

+27 (0) 11 452-1115 +27 (0) 11 452-3609 glenda.aereboe@plaslope.com www.plaslope.com

TAMPER EVIDENT SECURITY BAGS l l l l l l

Reliable, permanent, special security closure to show evidence of tamper The closure system shows evidence of tamper by freezing, heat, aqua and solvent The bags are manufactured from high strength coextruded LDPE clear or opaque film Bags can be customised to your specification with high quality print of up to 5 colours (5 sizes of standard stock printed bags are also available ) Bags have a unique sequential number or barcode For security purposes the bags are printed along the edge of the side seals

SOUTH AFRICA’S LEADING SECURITY PACKAGING COMPANY

Under Licence to

DEBATIN SECURITY FOCUS |

VOL 34 NO 5 2016

TM

39


DIRECTORY

SECURITY ASSOCIATION OF SOUTH AFRICA (SASA) SASA OFFICE BEARERS Suite 147 Postnet X2, Helderkruin 1733 National President: Costa Diavastos c: 082 498 4749 | e: costad@servest.co.za National Chairman: Chris Laubscher c: 082 441 4092 | e: LaubscherC@proteacoin.co.za National Deputy Chairman: Marchel Coetzee c: 084 440 0087 | e: marchel_coetzee@omegasol. com

REGIONAL OFFICE BEARERS

ADMINISTRATION

Gauteng: Franz Verhufen c: 082 377 0651 | e: franz.verhufen@za.g4s.com

1st floor, Block A, 153 Ontdekkers Road (cnr Crane Avenue), Horizon Park, Roodepoort

KwaZulu-Natal: Gary Tintinger c: 084 429 4245 | e: garyt@enforce.co.za

National Administrator: Tony Botes | c: 083 272 1373 | e: tony@sasecurity.co.za | f: 0866 709 209

Western Cape: Dave Waywell c:083 261 3059 | e: Dave.Waywell@elvey.co.za

Office & Accounts: Yolandi Evans | t: 0861 100 680 | c: 083 650 4981 | e: info@sasecurity.co.za

OTHER SECURITY AND RELATED ASSOCIATIONS AND ORGANISATIONS PSIRA (Private Security Industry Regulatory Authority) | Eco Park, Centurion | t: (012) 003 0500/1 | Independent Hotline: 0800 220 918 | e: info@psira.co.za | Director: Manabela Chauke. Council Members: Mr T Bopela (chairperson); Ms Z. Holtzman (vice-chairperson); Advocate A. Wiid (council member); and Commissioner A. Dramat (council member). APPISA (Association for Professional Private Investigators SA) | Box 8064, Minnebron 1549 | c: 073 371 7854 or 072 367 8207 | f: 086 689 0166 | e: info@appelcryn.co.za | www.appelcryn.co.za | President: Ken Appelcryn | Secretary: Dianne. ASIS International Johannesburg Chapter No. 155. Box 99742, Garsfontein East 0060 | t: (011) 652 2569 | www.asis155jhb.webs. com | President/Chairperson: Johan Hurter | Secretary: Chris Cray. ASIS International (Chapter 203: Cape Town – South African security professionals) | President/Chairman: Yann A Mouret, CPP | Secretary: Eva Nolle | t: (021) 785 7093 | f: (021) 785 5089 | e: info@aepn.co.za | www.asis203.org. za BAC (Business Against Crime) | Box 784061, Sandton 2146 | Chairman: James Fitzgerald | t: (011) 883 0717 | f: (011) 883 1679 | e: denise@ bac.org.za. Eastern Cape: Box 40078, Walmer 6065 | t: (041) 373 6401. f: (041) 373 6402 | e: info@bacec.co.za | Western Cape: 12th Floor Picbel Arcade, Strand Street | t: (021) 419 2044 | f: (021) 419 2066 | e: jackie@bacwcape. co.za | KwaZulu-Natal: 2 Hopedene Grove, Morningside, Durban 4001 | t: (031) 207 8273 | f: (031) 207 3900 | Provincial manager: Jody Nair | e: jody@backzn.co.za | Mpumalanga: Box 430, White River 1240 | General manager: David Pretorius | t: (013) 751 3188 | f: (013) 744 3555 | c: 083 273 5515 | e: david@bac_mp.co.za | Chairperson: Ed Coombes | c: 082 807 3916 | f: (013) 752 6002 | e: ed.coombes@worldonline. co.za | North West: Postnet Suite 4415, Private Bag X82323, Rustenburg 0300 | Managing director: Charles Kendall | t/f: (014) 592 3591 | e: charles. kendall@lonplats.com | Limpopo: Box 784061, Sandton 2146 | t: (011) 883 0717 | f: (011) 883 1679 | e: info@bac.org.za | Free State: Box 784061, Sandton 2146 | t: (011) 883 0717 | f: (011) 883 1679 | e: info@bac.org.za. CAMPROSA (Campus Protection Society of Southern Africa) | President: Roland September | t: (021) 650 4858 | e: roland.september@uct. ac.za | Vice President: Derek Huebsch | t: (041) 504 2490 | e: derek.huebsch@nmmu.ac.za | Executive Secretary: John Tunstall | t: (028) 313 1711 | e: jtunstall@iafrica.com | www.camprosa. co.za. CENSEC (Centre for the Study of Economic Crime) | Director: Louis de Koker | t: (011) 489 2134 | e: ldekoker@uj.ac.za CISA (Cape Insurance Surveyors Association) | Shahid Sonday | t: (021) 402 8196 | f: (021) 419 1844 | e: shahid.sonday@saeagle.co.za | Mike Genard t: (021) 557 8414 | e: mikeg@yebo.co.za DRA (Disaster Recovery Association of Southern Africa) | Box 405, Saxonwold 2132 | Chairman: Grahame Wright, | t: (011) 486 0677 | f: (011) 646 5587 | Secretary/ Treasurer: Charles Lourens | t: (011) 639 2346 | f: (011) 834 6881. EFCMA (Electric Fencing and Components Manufacturers Association) | Box 411164, Craighall 2024 | t: (011) 326 4157 | f: (011) 493 6835 | Chairperson: Cliff Cawood c: 083 744 2159 | Deputy chairperson: John Mostert | c: 082 444

40

SECURITY FOCUS |

9759 | Secretary: Andre Botha | 083 680 8574.

psspfund.co.za | www.psspfund.co.za

ESDA (Electronic Security Distributors Association) | Box 17103, Benoni West 1503 | t: (011) 845 4870 | f: (011) 845 4850 | Chairperson: Lee-Ann Andreka | Secretary: Shirley James | www.esda.org.za

SAESI (Southern African Emergency Services Institute | Box 613, Krugersdorp 1740 | t: (011) 660 5672 | f: (011) 660 1887 | President: DN Naidoo | Secretary: Mrs S.G. Moolman | e:saesi@mweb.co.za

ESIA Electronic Security Industry Alliance) | Box 62436, Marshalltown 2107 | t: (011) 498 7468 | f: 086 570 8837 | c: 082 773 9308 | e: sia@iburst. co.za or steveconradie@iburst.co.za | www.esia. co.za

SAIA (South African Insurance Association) | Box 30619, Braamfontein 2017 | Chief Executive: B. Scott | t: (011) 726 5381 | f: (011) 726 5351 | e: faith@saia.co.za

FDIA (Fire Detection Installers Association) | Postnet Suite 86, Private Bag X10020, Edenvale 1610 | t: 087 808 7527 | f: 086 518 4376 | e: fdia@fdia.co.za | www.fdia.co.za | President/ Chairperson: Matt Kielty | Secretary: Jolene van der Westhuizen. FFETA The Fire Fighting Equipment Traders Association) | Postnet Suite 86, Private Bag X10020, Edenvale 1610 | t: (011) 455 3157 | f: 086 518 4374/(011) 455 4126 | e: ffeta@tiscali.co.za | www.ffeta.co.za | Chairperson: Astrid Wright | Vice-chairperson: Meshack Gabeni. FPASA (Fire Protection Association of Southern Africa) | Box 15467, Impala Park 1472 | t: (011) 397 1618 | f: (011) 397 1160 | e: library@ fpasa.co.za | www.fpasa.co.za | General Manager: David Poxon. GFA (Gate & Fence Association) | Box 1338, Johannesburg 2000 | t: (011) 298 9400 | f: (011) 838 1522 | Administrator: Theresa Botha. HCSA (Hotel & Casino Security Association) | Box 91728, Auckland Park 2006 | Chairman: Dick Glanville | t: (011) 447 2700 | f: (011) 447 3276 | Vice-chairman: Frans Joubert | t: (011) 898 7333 | Secretary/Treasurer: Graham Bendell | t: (011) 728 4405 | c: 082 699 2392 HSA (Helderberg Security Association) | Box 12857, N1 City Parow 7463 | t: (021) 511 5109 | f: (021) 511 5277 | e: info@command.co.za | www. command.co.za | Chairperson: Stephen van Diggele. IFE (Institution of Fire Engineers (SA)) | Treasurer: A.E. Greig | Box 1033, Houghton 2041 | t/f: (011) 788 4329 | e: adminstaff@ife.org.za | www.ife.org.za | President: John Khoza Mpiyakhe | Secretary: Lindi Mujugira. ISA (Insurance Surveyors Association) | Box 405, Saxonwold 2132 | Chairman: Graham Wright | t: (011) 486 0677 | Vice-chairman: Alan Ventress | Secretary: Alex dos Santos. LASA (Locksmiths Association of South Africa) Box 4007, Randburg 2125 | t: (011) 782 1404 | f: (011) 782 3699 | e: lasa@global.co.za | www. lasa.co.za | President/Chairman: Alan Jurrius | Secretary: Dora Ryan. NaFETI (National Firearms Education and Training Institute) | Box 181067, Dalbridge 4014 | Chairman: M.S. Mitten | Vice: Ken Rightford | t: (033) 345 1669 | c: 084 659 1142. NaFTA (The National Firearms Training Association of SA) Box 8723, Edenglen 1613 | National Chairman: Peter Bagshawe | t: (011) 979 1200 | f: (011) 979 1816 | e: nafta@lantic.net POLSA (Policing Association of Southern Africa) | t: (012) 429 6003 | f: (012) 429 6609 | Chairperson: Anusha Govender | c: 082 655 8759. PSSPF (Private Security Sector Provident Fund) | Jackson Simon | c: 072 356 6358 | e: jackson@

VOL 34 NO 5 2016

SAIDSA (South African Intruder Detection Services Association) | Association House, PO Box 17103, Benoni West 1503 | t: (011) 845 4870 | f: (011) 845 4850 | e: saidsa@mweb.co.za | www.saidsa.co.za | President/Chairman: Johan Booysen | Secretary: Cheryl Ogle. SAIS (South African Institute of Security) Postnet Suite 86, Private Bag X10020, Edenvale 1610 | t: (011) 455 3157 or 0861 111 418 | f: 086 518 4374/(011) 455 4126 | e: SAIS@tiscali. co.za | www.instituteofsecurity.co.za | Chairman: David Dodge | Vice-chairman: Mike Verster | Administrative Manager: Rosemary Cowan. SAN (Security Association of Namibia) | Box 1926, Windhoek, Namibia | Administrator: André van Zyl | t: +264 61 205 2264 | f: +264 61 205 2350 | e: pagvz@nampower.com.na SANSEA (South African National Security Employers’ Association) Box 62436, Marshalltown 2107 | Administrators: SIA | t: (011) 498 7468 | f: 086 570 8837 | e: galen@sansea.co.za. SAPFED (Southern African Polygraph Federation) | President: Ben Lombaard | 083 793 1152 | Secretary: Amelia Griesel | 082 786 3347 | e: info@sapfed.org | www.sapfed.org SAQCC FIRE (South African Qualification Certification Committee) | Postnet Suite 86, Private Bag X10020, Edenvale 1610 | t: (011) 455 3157 | f: 086 518 4374 | e: saqccfire@tiscali. co.za | www.saqccfire.co.za | Management Committee: Chairman: Brett Jones | ViceChairman: Duncan Boyes | SAQCC Fire – 1475 Committee: Chairman: Tom Dreyer | ViceChairperson: JJ Scholtz. SAQCC Fire – Detection & Suppression Committee: Chairman: Matt Kielty | Vice-Chairperson: Laura Swart. SARPA (South African Revenue Protection Association) | Box 868, Ferndale 2160 | t: (011) 789 1384 | f: (011) 789 1385. President: Naas du Preez. Secretariat: Mr J. Venter, Van der Walt & Co. SDOA (Service Dog Operators Association | Box 49554, Hercules 0030 | t: (012) 376 2152/3 | f: (012) 376 2359 | e: company@ppscanine. co.za | Chairperson: Mr F. van Kraayenburg | t: (012) 376 2266. SIA (Security Industry Alliance) | Box 62436, Marshalltown 2107 | t: (011) 498 7468 | Chief Executive Officer: Steve Conradie | www.securityalliance.co.za SKZNSA (Southern KwaZulu-Natal Security Association) | t: (039) 315 7448 | f: (039) 315 7324 | Chairman: Anton Verster | c: 082 371 0820. VESA (Vehicle Security Association of South Africa) | Box 1468, Halfway House 1685 | t: (011) 315 3588/3655 | f: (011) 315 3617 | General Manager: Niresh Reddy. VIPPASA (VIP Protection Association of SA) Box 41669, Craighall 2024 | t: 082 749 0063 | f: 086 625 1192 | e: info@vippasa.co.za | www. vippasa.co.za | Enquiries: Chris Rootman | c: 082 749 0063 | e: vippasa@protectour.co.za




Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.