Contents page SERVING THE SOUTH AFRICAN
Cover Story
SECURITY INDUSTRY FOR 33 YEARS
Features 12 SPECIAL FEATURE: ALARMS
In this special feature on alarms, editor Andrea Müller takes a look at the effects of power cuts on intruder alarm systems, as well as the impact load shedding is having on every type of business in South Africa.
14 TECHNOLOGY UPDATE
Since being introduced to the local community policing sector in December 2014, Imperial Green Mobility’s SE3 Segway Patroller has been dubbed an invaluable tool in preventing crime.
16 IT SECURITY TRENDS
8 Omega Risk Solutions Training Academy The Omega Risk Solutions Training Academy has
been certified by City & Guilds as an institution that maintains international training standards.
In this feature, IT security trends are explored by Peter Reid, SharePoint Solutions Head at Intevate, a T-Systems company; Neil Campbell, group general manager for Dimension Data’s Security Business Unit and Matt Gyde, group executive for Dimension Data’s Security Business Unit; and Dr Dawie de Wet, chief executive officer at QKON Africa.
22 SECUREX 2015 PREVIEW
Securex provides visitors with an unrivalled opportunity to view, discuss and source products and services from leading South African and international manufacturers and suppliers.
26 BUSINESS AGAINST CRIME
Dealing with White Collar Crime was published in 2011 on behalf of the White Collar Crime KwaZulu-Natal Task Group by Contact Publications. Topics covered are vast and in this issue of Security Focus, the chapter on “The Crime Response Plan” has been printed in its entirety to give readers an idea of the important information available to them when purchasing a copy of this valuable book.
35 PSSPF NEWS
12
The Private Security Sector Provident Fund (PSSPF) is attaining a 14,98 per cent average annualised return on investment for its members over the last four years.
Security Focus
Advertising enquiries:
is published by the proprietor Security Publications S.A. (Pty) Ltd (Reg No. 1982/006233/07)
Tel: (031) 764-6977 Fax: (031) 764-6974 e-mail: contact@secpub.co.za Publisher: Godfrey King Editor: Andrea Müller Production Leader: Colleen McCann Official Journal of the Security Association of South Africa
Layout & Design: Beth Marchand Subscriptions: Jackie Goosen
Bernadette Fenton
Cell: 082 443 8931. Fax: (031) 764-6974 e-mail: bernadette@secpub.co.za
VOL 33 NO 2 2015
ISSN 1022 6427
14 30 International News
Regulars
4 Comment
The thin blue line
6 News
• Is this a year of acquisitions? • New wage structure.
10 Industry Opinion
23
Kalvin Subbadu, sales manager, components, WD South Africa, asks the question: Is the future in flash, or still the hard drive?
• Dallmeier secures Naples Airport. • ACT empowers healthcare trust. • Hikvision Canada Inc established. • Hikvision and EMCS in partnership. • State-of-the-art technology launched. • Training coastguards is key to tackling piracy. • Paxton and Microlatch integrate. • Hikvision announces growth.
36 Law & Security
Peter Bagshawe provides an overview of xenophobia internationally, as well as locally.
19 Research Note 37 Association News
Blake Kozak, senior analyst, Security & Building Technologies, IHS Inc, says the Indian market for access control remains difficult to enter.
20 Company News
• Deggy SA proves real customer service works. • New camera from Axis.
• A word from the SASA Chairman. • SAIS annual charity golf day.
38 39 40
Index of Advertisers Calendar Directory
24 On The Market
• CALYPSO ... latest alarm offering. • Do door phone companies need indoor units?
32 Head Office physical address: Suite 1, Fields Shopping Centre, Old Main Road, Kloof 3610 Postal address: P.O. Box 414, Kloof 3640, South Africa Publication details: Security Focus is published monthly Printed by: Paarl Media KZN, 52 Mahogany Road, Westmead. www.paarlmedia.co.za
www.twitter.com/SecurityFocusza
Subscription rates: Annual subscription for magazine posted in Republic of South Africa is R525 including VAT and postage. Subscription rates for addresses outside South Africa can be obtained on application to the Subscription Department, Box 414, Kloof 3640. Editorial contributions: Editorial contributions are welcome. For details please contact the Editor, Security Focus, on Tel: (031) 764-6977, or Fax: (031) 764-6974, or write to the editorial office address detailed elsewhere in this column.
34
Security Focus is a member of
SecurityinAction editors comment
The thin blue line
M
urderers, rapists, robbers and fraudsters. Earlier this year it was reported in national newspapers across the country that the South African Police Service (SAPS) had issued its list of the top 25 most wanted criminals in South Africa. According to police spokesman LieutenantGeneral Solomon Makgale, putting these criminals behind bars would have a significant impact on crime levels in South Africa, as most of the suspects were repeat offenders.
According to the National Police Commissioner, General Riah Phiyega, the SAPS has tasked each province to supply a list of its top 30 most wanted individual criminals, its 15 most prolific crime syndicates and the “worst” rapists and paedophiles. Lieutenant Makgale added that a new unit within Gauteng’s Family Violence, Child Protection and Sexual Offences Unit was working across all provinces to combat child pornography. He also went as far as to say that the SAPS had received 124 “enquiries” and that 64 of these cases were in court, with the others still under investigation. The top 25 list has been compiled because the SAPS is calling on the public to help convict the criminals, it said. “We want to reduce the number of the most wanted criminals out there. We want people to be able to sleep peacefully at night without worrying about crime. It is the criminals who must be worried, knowing that, at any given moment, police could pounce on them,” said Lieutenant Makgale. All good and well, but then the Institute of Race Relations (IRR) went and created another PR nightmare for the SAPS when it released the latest findings of its study known as the Broken Blue Line. According to its findings, one in every 100 policemen in South Africa is involved in serious and violent crime. The study is an advocacy project operated by the IRR to draw attention to criminality within the SAPS, to study the extent of the problem and to develop policy solutions to stop it. The IRR report was based on a selected 100 reported incidents between April 2011 and February 2015. Of the 100, 32 were related to murder and attempted murder, 22 to armed robberies, 26 to rape and 20 to other crimes such as torture, theft and burglary.
The study was based only on serious and violent crime, and did not include bribery, corruption or harassment and assaults. According to the report, the most frightening and important finding is that in South Africa, gangs have infiltrated the police, as opposed to police infiltrating gangs. The report goes on to say that with as much as 9 000 of the reports against policemen to the Independent Police Investigative Directorate (Ipid), only 5 045 cases were completed, with 83 criminal convictions, 135 disciplinary actions and only 1 470 cases were referred to the National Prosecuting Authority. Obviously the police themselves would often be at the first line of reporting, play a role in the follow-up investigation, and with wolves guarding the sheep, conviction was increasingly unlikely. The IRR report concluded that the middle classes and private sector will continue to, and increasingly turn to private security companies to safeguard their lives and assets. The trend in poor or informal communities is to resort to vigilante justice. The report, which has unsurprisingly come under fire from the SAPS itself, says that it is with good reason that members of the public often do not trust the police. Both sides of the country’s socio-economic spectrum will seek to isolate themselves from exposure to the police. The IRR report also included a number of recommendations. It said the Commissioner, Riah Phiyega, should step down and be replaced with an officer who has an established track record. It mentioned establishing a new investigative agency within the Department of Justice, which is outside the control of the police. That this agency should actively seek out and prosecute corrupt officers. It also recommended decentralising the decision-making on station leadership, and finally depoliticising the appointment process within the SAPS. Andrea Müller Editor andrea@writescene.co.za
Editorial Policy Statements made or opinions expressed in articles in Security Focus do not necessarily reflect the official views of the Security Association of South Africa (SASA) nor those of any of the other security associations listed in Security Focus. Similarly, advertising in this publication does not imply in any way endorsement or approval by these security associations of any products or services. It is the policy of the Security Association of South Africa that any office-bearer who has an executive position in a company, or companies, which supply security products or services should on no account allow his position to be used to promote his company or its objectives in the editorial content of Security Focus, the official journal of the Association. If, at any time, an office-bearer’s position has been quoted in relation to his company or product, this does not imply the Association’s approval or involvement.
4
Security Focus | Vol 33 No 2 2015
One Device – Many Functions
Asset monitoring
Active communication
Staff monitoring
Real time tracking
Web application designed by EBS for Active Guard and Active Track users. Expanded functionality and easy operation is the right answer for worldwide customer demands. Active View enables unlimited control over employees and protected objects from anywhere in the world done in real-time. All you need is internet access.
Features:
Main Functionality:
• • • • • •
• Flexible patrol route settings • Real time processing of alarm events • Preview current GPS position on the map • View route on the map • Personnel staff data maintenance
GSM Voice/SMS RFID Reader Panic Function Man Down Function Waterproof Tamper Proof
Tel: 011 100 5259 Fax: 086 218 2928 Twitter: @ActiveTrackRSA www.activetrack.co.za Terms and Conditions Apply
NEWS
Is this a year of acquisitions? Canon’s Axis acquisition could herald a year of consolidation in the fragmented surveillance market. This is according to Jon Cropley, principal analyst, Video Surveillance & Security Services, IHS.
C
anon has announced a public offer to acquire Axis Communications, one of the world’s largest manufacturers of video surveillance equipment. “This is a massive development in the video surveillance equipment market. Until last year, Canon was a small player in this market (as the company’s product strategy and planning director effectively admitted in an interview with IFSEC Global last year),” says Mr Cropley. However, back in August 2013, the Japanese giant’s chief executive officer, Fujio Mitari, hinted at big plans ahead when he declared the company’s ambition to make security cameras an “important pillar” in its strategy and the market having
“limitless possibilities for growth”. Then, in June 2014, Canon acquired the world’s largest supplier of video management software, Milestone Systems. Now the company, hitherto most famous of course for being a pioneer in the consumer camera market, is set to buy the world’s largest supplier of network cameras. “All of which shows just how serious Canon is about expanding its interests in the video surveillance equipment market,” adds Mr Cropley. Chinese rivals IHS estimates that Axis Communications was the third largest supplier of video surveillance equipment in 2014, with more than five per cent of a global market worth around £9,85bn. Despite this, the company has faced intense competition, particularly from Chinese rivals, in recent years.
The largest of these, Hikvision and Dahua, have both been gaining market share faster than Axis. At the same time, the average selling price of a network camera has more than halved between 2010 and 2014. “Canon’s acquisition of Axis will be the latest in a number of major changes to the structure of the supply chain for video surveillance equipment. It comes just two months after Samsung Group sold Samsung Techwin, for instance.” IHS say that today, the supply chain remains highly fragmented. The top 15 suppliers account for less than 50 per cent of revenues and there are thousands of small suppliers. “Consolidation has been anticipated for some time and Canon’s purchase of Axis could be just the start of a series of industry acquisitions throughout 2015”, concluded Mr Cropley. n
New wage structure
On Line/Live Units
Radio or GPRS up to 4 Patrols per unit
Historical Systems
For Single / Multiple Site Application No wiring required on site For more information Please visit www.guardtrack.co.za or contact Dane/Brad Tel: 011-784 3803/4 Fax: 011-784 3805 email: info@guardtrack.co.za
6
The Department of Labour is in the process of setting up a new wage adjustment structure for the private security sectoral determination. The current sectoral determination is coming to an end this year. The Department has invited all stakeholders in the private security sector, who are directly and indirectly affected, including employers, employer organisations, employees and trade unions to attend national public hearings in which they will be allowed to voice their inputs. “In terms of the Basic Conditions of Employment Act (BCEA), the Labour Minister should consult with stakeholders in the sector with the aim to source information in relation to the wage adjustment,” said the Department. The private security sector employs about 1 070 387 people. The Sectoral Determination for Private Security Sector in South Africa was published in the Government Gazette on 30 November 2001, and provisions in respect of minimum
Security Focus | Vol 33 No 2 2015
wages became applicable on 10 December 2001. Prior to the promulgation, the private security sector, like any other sector, was covered by the BCEA. The Department said the current minimum wages in the sector lapse on 31 August 2016, and the new minimum wages should be in effect from 1 September 2016. The national road shows were set to begin on 4 February 2015 in Klerksdorp, North West, at the department’s Labour Centre at Pelser Building, corner Anderson and Voortrekker Streets, and in Thohoyandou Labour Centre in Limpopo province, at stand 68 & 69 Leisure Lodge Building, respectively. All public hearings start at 10am. They end on 6 March in Mbombela, Mpumalanga and in Bethlehem, Free State. Other issues that will be discussed during national public hearings include special allowances, maternity leave, night shift, temporary employment services and overtime. n
Cover story
Omega Risk Solutions Training Academy “Constant quest for excellence” The lack of high quality accredited security training, or investment in security training, creates challenges for all stakeholders in the global security industry. Security companies are responsible for the safeguarding of assets with huge values, large amounts of personal data including financial-, medical- and intellectual property, all which may be subject to theft, fraud or damage. Omega believes there is an industry-wide inconsistency of private security training standards which could have a negative impact on the overall performance and reputation of the security industry.
T
he majority of security officers who enter and leave the industry, or move between different security companies, have no realistic vision of where they want to be in the next couple of years. This is not always their fault. Good talented people naturally want to advance in their careers and therefore will always appreciate meaningful support in order to get there. For any individual to advance in his/her career, meaningful support would be training, training and more training! Training is the most powerful contribution any employer can make towards its employees.
8
Security Focus | Vol 33 No 2 2015
Inconsistent security training standards, and a lack of skilled manpower, has prompted the company to establish the Omega Training Academy in an effort to create a training environment that provides students with all the knowledge, skills, professionalism, integrity and discipline required in the security industry. In addition to this, the Academy will also provide training to many other businesses and institutions such as private companies, governments, parastatals and individuals. The ORS Training Academy has been certified by City & Guilds as an institution that maintains international training standards. Once all the Omega courses at the Academy are certified by City & Guilds, our qualifications will be internationally recognised as qualifications that offers learners great opportunities for career development, as well as progression into higher and professional education. Backed by a Royal Charter, City & Guilds works with education providers, companies and governments in more than 80 countries. Omega’s certified qualifications will be widely accepted by employers around the world as the benchmark for workplace excellence. The ORS Training Academy will also be certified by one of Europe’s foremost management and leadership bodies. This institution is dedicated to equipping managers and supervisors with leadership and management techniques that are recognised all over the world as qualifications of international standard.
Cover story
Omega believes that world-class service delivery is only possible through the effective integration of operations, quality assurance and world-class training. For this reason, the group’s Quality Assurance Programme is managed as one of the functions of the Academy. This approach ensures that sub-standard service delivery, as well as any nonconformances, are identified through the Quality Assurance Programme, and any deficiencies will result in pro-active intervention by management, as well as corrective action training and the
improvement of operational policies and procedures. The Academy furthermore continuously strives to enhance and advance all the training and development aspects within the Omega Group of Companies. The Omega Risk Solutions Training Academy works in close association with Omega Risk Solutions (PTY) Ltd, a Proudly South African, Level 2 BEE Company, who is also SABS ISO certified. Student qualifications will therefore be valid and just. Specific training conducted at the Omega Risk Solutions Training Academy, which have the City & Guilds accreditation, will have world-wide recognition.
COURSES Security Officer and Supervisor Training
Occupational Health & Safety Training
• Omega Risk Solutions Company Induction for all newly-appointed Security Officers and Supervisors • NQF-Aligned Training (ETDP & SASSETA) and PSIRA Grades E - A • Soft Skills • Supervisory • Control Room Operators • CCTV Surveillance Operators • Defensive Driver Techniques • Crowd Control • Armed Response • Fire-Arm • National Key Point • Retail Security Officer • Banking Security • Special Events Faan du Toit: CEO. • Cash-in-Transit
• • • • • •
Management Development Courses • Omega Risk Solutions Company Induction for all newly-appointed Managers • Supervisor Management Skills • Basic Security Management • Site Managers • Area Managers • Occupational Health and Safety Diploma Course (Security Manager and higher – correspondence training) • Port Facility Security Officers (ISPS Code) • Risk Surveys
First Aid (Level 1) Fire Fighting (Level 1) Safety Awareness (Supervisors) Safety Awareness and Legal Compliance (Managers) Safety Health and EnvironmentalRepresentative (SHE REP) Safety Health and Environmental Representative Incident Investigators • Hazard Identification and Risk Assessment (HIRA) Certificate in Health and Safety in the Workplace. This prestigious and internationally-recognised qualification consists of four compulsory study units being: • Fire Safety Awareness • Health and Safety in the Workplace • Fire Safety Principles • 203 Risk Assessment To complete the fifth unit, the students have a choice between the following study units: • Fundamentals of Display Screen Equipment • Manual Handling Safety at Work
In addition to his normal responsibilities with Omega, newly-appointed Fanie de Villiers will also be extensively involved at the Academy presenting seminars, motivational speeches and assisting in Fanie de Villiers
Tel: 012 361 0620
management training.
Fax: 012 361 0618
Email: mail@omegasol.com
Website: www.omegasol.com
Security Focus | Vol 33 No 2 2015
9
Industryopinion
Is the future in flash, or still the hard drive? By Kalvin Subbadu, Sales Manager Components, WD South Africa
W
ith data volumes continuing to increase at an unprecedented rate, capacity has become a critical criterion when it comes to selecting data storage solutions. On the flip side, the need for increased speed and performance and “instant on� solutions has driven a growing trend towards flash-based storage systems. With industry touting Solid State Drives (SSDs) and flash-based storage as the way of the future, and predicting the death of the hard drive as we know it, where exactly does the path lie? Is the future in flash, or is the humble hard drive here to stay? Hard Disk Drives (HDDs) utilise spinning media technology which, although it is prone to issues from being dropped or moved around too much, has been tried and tested over many decades and has seen significant enhancements to improve speed and storage capacity. On the other hand, SSDs as well as thumb drives and memory cards utilise flash, a newer technology which is faster and not prone to such ill effects from being dropped or handled roughly, as it does not require moving parts in the form of spinning platters. While flash-based storage is faster and better able to handle mobility, several challenges remain with this new technology which means the predicted death of the HDD is vastly premature.
Kalvin Subbadu
10
Security Focus | Vol 33 No 2 2015
One of the biggest challenges currently is that HDDs are far more cost-effective than SSDs. This is because, as an older technology, the cost of research and development as well as manufacturing around HDDs has already been absorbed. SSDs are still in the infancy stage, which means that R&D costs are high and economies of scale with regard to major manufacturing runs cannot yet be achieved. In addition, the available capacity of SSDs simply cannot cope with the storage volumes required today. While HDDs are available in capacities of up to 6TB, the maximum capacity of an SSD is only 1TB. The cost per GB of SSD remains unaffordable for the majority of applications and for many users. Another issue with SSDs is that of reliability. While SSDs do not contain moving parts such as read/write arms and spinning platters, there is a common issue of the degeneration of cells, which can negatively affect the capacity of the drive over the years. Cell generation is unpredictable, and causes permanent data loss, which is problematic. SSD failure is permanent, whereas often data can be recovered from a damaged HDD, depending on the severity of the damage. While SSD is less prone to damage from dropping or shocks, the spinning platter continues to have the advantage, not only in terms of cost per gigabyte, but also in terms of applications. The HDD is available in many platforms, such as the 3.5-inch architecture for desktop applications, 2.5-inch form factor for mobile applications, and 1.8-inch for automobiles and specialised applications. The many applications for HDDs are evident in the fact that around 90 per cent of the data stored around the world is stored on a hard drive, and approximately 90 per cent of data storage manufactured today is still HDD. SSD is currently a technology that fits niche applications, such as smartphones, tablets, cameras and other applications that are not performance or storage intensive. In addition, SSDs are also used in high-end servers, which run mission critical applications where speed is critical. However, when it comes to capacity data storage, the trusted, cost-effective HDD is here to stay. Within the flash memory space, there are also a host of new technologies being developed, such as Phase-Change Memory (PCM), Resistive Random-Access Memory (RRAM), and Magnetoresistive RAM (MRAM), which may show promise with faster speed and durability. However, while HDD is a tried and tested technology, it has by no means become static, and a similar evolution is taking place from a hard drive perspective. Perpendicular recording and Single Magnetic Recording (SMR) have enabled increased performance and capacity, and the next upcoming technology centres around heat assisted magnetic recording, which could further this technology, leading to hard drives with even higher capacities and greater performance. When it comes to choosing between HDD and SSD, users need to take into account specific requirements, preferences and budget. Each storage medium has its own pros and cons, and each is thus currently applicable in different devices and scenarios. This means that the two technologies will continue to co-exist for the foreseeable future, and we can safely say that the HDD is here to stay. n
SpecialFeature:Alarms
Security in the dark
L
oad shedding has become the thorn in the side of each and every South African. Perhaps the only individuals that might stand to gain from the unreliable power grid are the criminals themselves. A question was recently posed to the Security Association of South
Africa (SASA) members through its various social media platforms. The post reads as follows: Have you noticed an increase in crime as a direct result of load shedding? The response was disappointing as so few comments followed. This is perhaps, however, a confirmation of just how busy load shedding is keeping these private security companies. However, companies such as ADT, and Durban-based Blue Security have listed a number of tips and precautions for their customers on their company websites, providing them with information of how to ensure that security is not compromised during load shedding. According to Koos Van Rooyen, managing director of Thorburn Security Services (Southern Region), there may well be a correlation between load shedding and higher exposure to the risk of crime. He says that security companies are currently providing the following advice to clients. What has the impact of load shedding been on the security industry? Like every business in South Africa, load shedding has had an impact on the security industry as well. The unpredictable and ever-changing schedule means that all businesses need to adopt a proactive approach and basically expect the unexpected. Security companies also need to prepare themselves for a possible increase in the number of emergency calls from clients, and ensure reaction teams are ready to respond immediately. Have you noticed any trends developing of criminals targeting your clients during periods of load shedding? We are aware of a few instances in which criminals have targeted businesses and households during load shedding, in an attempt to take advantage of compromised electronic security systems. Are there any sectors that are experiencing more security difficulties related to load shedding than others?
The effects of power cuts on intruder alarm systems In security systems, power is everything. The battery is the single most important component of the intruder alarm system. The system is totally dependent on the correct power delivered to all its components at all times. Too little power and you’ll have an unstable system, false alarms or non-activations. Too much power, on the other hand, will reduce the lifetime of the battery, or destroy it. No power means that the system is running on a battery that is no longer charging. This is fine in the short term, providing that the battery in question is still 100 per cent efficient Unfortunately, frequent power cuts, cable theft and load shedding have a detrimental effect on batteries and reduces its lifetime bit by bit through continuous power failures. Many lower quality sealed lead acid batteries, when fully discharged, do not always recover from a total discharge. This, in effect, means that thousands of intruder alarm systems in South Africa are literally running off their transformers, particularly in older systems. The importance of good quality power components cannot be emphasised enough in a country that has a high crime rate and unreliable power delivery. Although a sealed battery should supply a minimum of six hours
12
Security Focus | Vol 33 No 2 2015
in a standby condition, this is highly unlikely in most systems, given the scenarios described above. If a power failure extends beyond the average three-hour period, it only takes a clever intruder with a basic knowledge of alarm systems to figure out that many alarm systems are no longer functional. Battery failure in high temperatures To add to the problem, sealed lead acid and gel batteries do not like heat. They will ensure optimum capacity at around 20 degrees C to provide a lifetime of between five and seven years under normal conditions. The battery life is approximately halved for each 10 degrees C above normal temperature. In summer months, where temperatures in South Africa can soar between 30 and 37 degrees C, battery lifetime is being reduced considerably. The lifetime of the battery reduces as the temperature gets higher and, if installed in an area that reaches 60 degrees C or higher, the lifetime can be reduced to as little as five months. In fact, the temperatures in a home that has a tin roof can reach well into the 80s when the outside temperature is 35 degrees. This definitely blows the theory out of the water regarding the
SpecialFeature:Alarms
Any and all sectors are potential targets for criminals, including private homes, malls and residential estates, particularly if these businesses and residents don’t make use of manned security or security officers in addition to their electronic security systems. Could you provide any examples of where load shedding has had an impact on security? Examples of compromised security during load shedding include the following: • High traffic congestion makes road users more vulnerable to smash and grab scenarios. • A lack of street lighting, and the need to get out of your vehicle to open security gates also increases the risk of hijacking. • CCTV camera, alarm systems and electric fencing systems that are not backed-up by reliable battery systems, means that those security measures are compromised for both businesses and residents. How would you recommend that your clients mitigate the risks associated with load shedding? • Both businesses and private residents must ensure that they have a reliable back-up battery to ensure that alarm systems, electric fencing, electronic gates and doors – all remain in full working order during load shedding. • Call your security service provider and request the presence of security officers on your business or home premises, particularly during the evenings for added peace-of-mind. • Save your security company’s number to your cellphone and report any suspicious noises or activities immediately. • When arriving home late at night, residents could also request a security company to meet them at a specific location and then to escort them to their residential premises when areas are poorly lit, and even to check the property before the resident arrives home. n
installation of control panels and batteries in a ceiling void, which was and still is, common practice among some installers. The number of systems that have been installed in ceilings over the years far exceeds those that are not. Apart from this practice being regarded as poor security and leaving the panel vulnerable to tampering, you are guaranteed to have voltage problems, battery failures and false alarms In order to gain some sort of control over an already critical situation and to counter some of the effects of power failures, installers and end-users need to realise the importance of quality and install high quality batteries and transformers in intruder alarm systems. How to help counter the challenges: • Clients should have their batteries checked regularly to ensure that they are not damaged. • Installers should refrain from installing control panels and batteries in ceiling voids, boiler rooms, near furnaces or any other area where temperatures are likely to be high. • Installers should also install an extra power pack, battery and relay into the system to increase the current capacity during power cuts. The following article was printed with permission from the South African Intruder Detection Services Association (SAIDSA). It was compiled by the SAIDSA Central Technical Committee and edited by Bryan Rudolph. n
TechnologyUpdate
Crime fighter on 3 wheels The future of community law enforcement is NOW, with the roll-out of Imperial Green Mobility’s SE3 Segway Patroller.
G
lobally recognised as leaders in electric vehicles that boast little to no carbon emissions, Imperial Green Mobility has collaborated with the South African Police Service (SAPS), Metro Police and private security sector by providing SE3 Patrollers to help in the fight against crime. Since being introduced to the local community policing sector in December 2014, the SE3 has been dubbed an invaluable tool in preventing crime. A natural extension of Segway’s Patroller product line, this model, “felony fighter”, is an ideal match for crime busting missions that require a larger vehicle. Not only does the SE3 display a more visible and obvious security presence – fully equipped with emergency lights, a headlight/spotlight, indicators, brake lights, hot swappable batteries (for 24-hour non-stop patrolling), storage compartments and siren – it enables the rider to easily mount and dismount the vehicle during a patrol and chase. Behind the wheel of the SE3, officials in Cape Town and Durban have been able to prevent crime by creating a stronger police presence, efficiently patrolling larger areas three times faster than on foot and with less fatigue. They’re also able to travel indoors, outdoors and over varied and
uneven terrain, implement better traffic management, positively interact with the community they serve and proactively gather intelligence from citizens. In addition, the SE3 enables officers to prevent traffic misdemeanours and traffic congestion during load shedding. “Some of the biggest challenges facing the public and private security sector when it comes to fighting crime are reaction times, public awareness and community trust and perception. “Imperial Green realised that we were able to assist with these challenges by giving adequate patrolling equipment to the security sector, which would also allow for visual awareness,” says Jonathan Cohen, managing director of Imperial Green Mobility. “As part of a joint patrolling collaboration between private security and public police, we deployed two demo SE3 Patrollers to Proexec Security (private security sector) and one to Metro Police to help them patrol Cape Town’s most densely populated suburbs – Sea Point and Mouille Point – during the festive season. “In another joint patrolling collaboration, we deployed five more units for officers working along Durban North beachfront/Golden Mile. Ensure Security is currently renting four SE3s, while the SAPS were given one unit.” The collaboration, says Mr Cohen, has been in force since the end of 2014 and is still currently in effect. Assistant Chief Gavin Greeve, who manages the Law Enforcement, Area West, says since the SE3 was issued for patrols on Sea Point promenade, it has improved visibility tremendously, as well as bettering the officers’ response times, especially to complaints on grass areas and on the walkways. “Usually the officers have difficulty responding to complaints between crowds, but the SE3 Patroller ensures swift response. It is easy to handle and to control,” says Chief Greeve. “The SE3 has increased police visibility tenfold and it is easily noticeable from a distance due to the fact that it is clearly branded and fitted with blue lights. “This is an effective way of creating a safe and secure environment to the members of the public during very busy periods of the day. It is also easy to spot problems from a distance, and it is also used to make an appearance where you least expected.” Geoff Levy, chief executive officer for Proexec Security, says the SE3 has made a positive impact on the private security sector too. “Private security is very important in terms of crime prevention, as well as response services,” says Mr Levy. “Proexec have made use of other Segway products over the years so we were not sceptical at all. In fact, we were excited to deploy the SE3. The SE3 technology is superior to the regular Segway products and, in my opinion, it is safer and more stable.” Special features introduced to the SE3 also ensure every officer riding behind the wheel is safe. The SE3 includes anti-roll-over technology to help keep things on the up, independent front and rear hydraulic brakes, and Rider Detect, which disables the motor if a rider is not on the vehicle. There is an accessory bar for attaching such things as video surveillance cameras, and a built-in 12V power-to-go outlet for charging mobile devices. The SE3 has already proven to be a valuable asset to the international security sector, with a number of SE3s in circulation, and is set to change the way crime is tackled in our home country of South Africa. n
ITSecurityTrends
Taking a realistic approach to the cloud By Peter Reid, SharePoint Solutions Head at Intervate, a T-Systems company
T
he IT industry’s love affair with cloud-based architecture continues unabated. However, what is missing from the discussion is a pragmatic view of exactly where cloud migration makes sense and produces business transformation, and where traditional on-premise solutions remain the best option. Research giant Gartner now positions cloud computing in the “stabilisation” zone of its maturity cycle – reflecting that the overexuberance seen over the past few years may be coming to an end, as companies get to grips with the practical realities of shifting their core applications to a new environment. Many of the true benefits of the cloud are, in fact, yet to be made fully available. Those companies who have already shifted many applications have, essentially, laid a solid foundation that will enable them to achieve cloud’s benefits in time. These “future” benefits include: • Increasingly rapid iterations – Major vendors of IT applications and services will create and update their services with an increasingly cloud-based consumption model in mind. This results in faster iterations of enterprise software and faster attention to any bugs or inefficiencies. Those organisations consuming such services via the cloud stand, to benefit from the rapid evolution of the services. • Faster response to security issues –
16
The threat of cybercrime will only rise in importance, as more of the world’s transactions and interactions happen in the digital landscape. A cloud-based deployment framework enables security companies to respond with patches and updates that mitigate the cybercrime risks facing their clients. • Positive environmental impact – As cloud-based consumption models remove the need for massive investment in physical on-premise hardware, energy requirements are reduced. Relying increasingly on cloud providers for hosting and storage will leverage economies of scale and mean that newer, more efficient, and more environmentally-friendly hardware is used. • Enabling enterprise mobility – Cloudbased architecture generally considers endpoint access as a primary consideration. With most enterprise-grade cloud applications, the encryption and security for end-point devices is fully catered for. This enables the organisation to roll out an enterprise mobility programme that makes staff members happier, more flexible and more productive – while protecting vital company intellectual property. With this in mind, the focus for the coming five to 10 years will be on developing hybrid models of cloud adoption. It will be all about blending private cloud, public cloud and on-premise – and shifting the balance of these workloads over time. The key considerations when designing and implementing hybrid cloud solutions lie in how
Security Focus | Vol 33 No 2 2015
best to smartly integrate the services. This ensures that the organisation is benefitting from those cloud advantages that are available today, as well as positioning itself to benefit from the further advantages in the future. Cloud needs to be seen as a long-term strategy and a long-term investment that will produce multiple streams of payback, or return-on-investment. It is not a “quick fix” solution where all applications can be thrown into a new hosted environment immediately. In enterprise IT, there is a generally-accepted adage that adopting anything too early comes with its risks (higher costs, less maturity, security vulnerabilities, limited ecosystems, etc). This rings true for the cloud. While it promises phenomenal benefits, companies should be conscious of the risks associated with using the wrong cloud vendors and partners, migrating the wrong services to the cloud, and potentially losing direct control over certain key systems and databases. Ultimately, the cloud revolution will transform all aspects of an organisation’s computing requirements (infrastructure, applications and software) into a service as simple and reliable as electricity or water. However, that time is still some way off. The story of the cloud is still very much in the early chapters. As hosted services evolve and mature, organisations adopting integrated hybrid models will be in prime position to accelerate their cloud migration and leverage the transformative benefits as and when they emerge. n
‘Fire drills’ a must IT security “fire drills”, supported by executive management and the risk committee should be conducted regularly in organisations, in order to understand the appropriate course of action in advance of a security breach. So says Neil Campbell, group general manager for Dimension Data’s Security Business Unit, who points out that technologies and services focused on incident response – rather than just incident prevention – should be one of the trends high on the agendas of security professionals in 2015. This is the top trend on the list of Dimension Data’s team of security experts, following daily interactions with clients. Data breaches such as the March 2014 ¹Target hack, the biggest retail hack in US history, as well as allegations of statesponsored hacking, are a strong warning that organisations need to move beyond focusing purely on the prevention of security incidents, and start to concentrate on what they will do when an incident occurs. “It’s inevitable that security incidents will occur. It’s therefore critical that organisations begin to focus on identifying what we call ‘indicators of compromise’, putting a comprehensive incident response plan in place, and performing regular IT security ‘fire drills’,” explains Mr Campbell. He points out the regular fire drills – or rehearsals – will ensure that, in the event of an incident, IT and management teams are clear about what needs to be done, and the business is less at risk. This includes recovering evidence, identifying and resolving the root cause of the incident (not just the symptoms), and undertaking a forensic investigation. So what other issues are on the watch-list in 2015 for IT security professionals? Matt Gyde, Dimension Data group executive – security business unit says: “We’ve identified what we believe to be five of the most significant trends in our industry for 2015. These are not the only areas where change is occurring. However, they certainly warrant discussion.” He points out that a trend that did not make the top five list, but which is closely linked to each is the use of data and machine learning which, when coupled with human interaction, can create actionable and contextualised intelligence. “This enables organisations to make rapid decisions on how to protect themselves against a pending attack, how to respond during the attack, and what action to take post-attack.” ¹In the Target hacking incident, signs of the hack showed up in their event monitoring systems but had too many alerts overall and the importance of these signs were missed. Important to note that the CIO and then CEO were dismissed over this incident.
Trend # 2 – Managed security services move front and centre For most businesses, identifying IT security incidents swiftly requires 24/7 coverage of the network environment. This can be costly. IT security professionals are scarce, and require regular training to keep abreast of everevolving technologies. However, there’s a drawback to the insourcing model, explains Mr Campbell. To become truly proactive about incident response, organisations need visibility of other networks and to be kept abreast of attacks occurring elsewhere. Mr Gyde agrees, and says in recent years, security management and monitoring have become more complex and time-consuming. Today, you need to prevent what you can, and manage the inevitable compromises. This means optimising your detection, and response capabilities. Many businesses lack the skills required to detect and effectively respond to threats in this manner. “Managed security service providers have teams of security professionals focused exclusively on identifying potential malware and monitoring thousands of clients’ networks for precursors to denial-of-service attacks. “Incidents don’t happen out of the blue. Usually there’s ‘chatter’ on the popular ‘dark web’ channels beforehand. Dimension Data, for example, monitors these channels very closely, which significantly increases the likelihood that we can forewarn our clients ahead of impending attacks.”
Trend # 3 – IT security gets cloudy Both Mr Campbell and Mr Gyde predict a continued increase in the adoption of cloud services for security in 2015. “This holds true for software-as-a-service solutions, such as secure web proxy, and secure e-mail in the cloud. These solutions are particularly attractive as the implementation effort is negligible. You’re simply redirecting traffic to take advantage of the service through a consumption-based model. “And the services are highly scalable. If you need to support 20 000 users today and you acquire a company and your headcount suddenly increases to 30 000 in six months, you simply amend your licence agreement, and your new employees will be up and running immediately.” Application security in the cloud and cloudbased, distributed denial-of-service controls such as those offered by Akamai are other areas of growing interest. According to Mr Campbell, security of the cloud will become increasingly important as more organisations move their workloads to the cloud. “It’s no good adopting this model only to be told by your auditors a year later that your cloud provider’s security protocols aren’t up to scratch. I believe we’ll see
ITSecurityTrends
cloud providers investing heavily in building rich network architectures that support the gamut of security controls, so they can assure their clients that enterprise-grade security technologies are being applied to their workloads.” Mr Gyde agrees and says there’s still some work to be done within the cloud industry and security. “The most secure platforms in the world can still be compromised by human error or poor management,” he adds and points out that another area that needs attention is integration with existing organisational policies and processes. “It’s very easy for start-up companies to transition to the cloud as they have no legacy physical infrastructure, and can implement ‘greenfield’ security controls. Larger, more established businesses find the prospect of cloud more daunting, as they’re unsure of how to adapt their security controls, policies, and processes to this model.”
Trend # 4 – From security technologies to secure platforms 2015 will also see the notion of security being a secure platform rather than a series of point products or devices on the network – gaining traction. The expectation on security professionals will be to deliver a secure platform that allows the business to confidently run multiple applications, in a secure environment. Mr Gyde says for many years, organisations typically bought multiple security products from different vendors. While this helped create “defence in depth”, it also introduced complexity and potential risk. After all, 95 per cent of successful attacks may be attributed to human error, rather than technology. “Increasingly, organisations are weighing up their risks and making buying decisions that aren’t necessarily based on best-ofbreed technology and are instead adopting a pragmatic, risk-based approach where they work with their existing infrastructure and partners to manage their risks to an acceptable level, rather than aiming for, but never achieving, ‘perfect’ security.” The concept of cloud and its pay-per-use model is also relevant to this discussion. Organisations want to replicate the consumption-based approach of cloud in an on-premise model, either independently owned, or owned by a trusted service provider or vendor. Increasingly, organisations prefer security partners that are prepared to take on some of the financial risk, while also offering a flexible service construct. For example, one that allows them to turn on a firewall at short notice to deal with a specific event, and then spin it down when the requirement has passed. The notion of a secure platform directly Continued on page 18
Security Focus | Vol 33 No 2 2015
17
ITSecurityTrends
Satellite ... where and why? An overview of technology application by Dr Dawie de Wet, chief executive officer at QKON Africa. Surprisingly, the debate surrounding satellite as a feasible and sustainable communication technology continues. Usually these debates discuss satellite as an alternative option to fibre cable networks and how fibre will replace satellite and then, almost inevitably, the conclusion is that satellite will someday, maybe soon, become obsolete. However, as a quick reference and perspective, just consider DSTv services. Arguably, DSTv and other satellite TV distribution networks are some of the most successful mass deployment of satellite technology to the consumer market throughout Africa. Clearly, the use of satellite as a communication medium for distribution of TV services is effective and highly relevant in existing and emerging markets. The question of whether or not satellite technology is feasible and sustainable is really about the application of technology rather than technology itself. One has to consider what applications will be complimented by satellite solutions and what market applications would satellite represent the most preferred option. To analyse this with accuracy, we should start by considering the fundamental elements of satellite solutions. In brief the core principles are: Ubiquitous coverage Geostationary satellites broadcast communication signals over fast geographical areas. Typical signal coverage for satellite networks can be pan-Africa coverage, national coverage or high-powered regional coverage. It is literally available anywhere anytime within the target market region. High Availability From the user terminal, the communication is directly to the satellite and no local towers, masts or other signal transmission networks form part of the network. This means service availability can be high and even the influences of local weather storms can be mitigated to meet mission-critical communication demands.
Broadcast Nature Satellite networks are typically deployed in a star configuration. According to this model, services are provided from a central location to many, even thousands, of remote locations.This is exactly how the DSTv network operates and why satellite is such an attractive option for broadcast networks.
High capacity, high availability, remote circuits Mining and industrial developments are often remote and located in regions which are not yet connected to the national telecom networks. For these requirements satellite circuits remain the only option.
Service Operating Costs The on-going communication costs for today’s satellite networks is high compared to fibre and other wireless networks. This is because of the cost of leasing services on communication satellites. However, it should be noted that this cost element can be mitigated through the use of different network design and costing models. Keeping in mind these basic technology principles, we can define user requirements for which satellite networks will provide the optimum solution. High availability, large scale deployment and low data volumes. This is a typical scenario that applies to financial ATM networks and is a perfect example of where satellite networks provide far superior communication and lower price points than either DSL or 3G. The strength of satellite networks in this application is high availability to all locations linked to low “pay-per-use” communication costs.
Mobile, rapid deployment, tactical and on-demand services For news-gathering crews, event management, disaster management and other tactical requirements, satellite networks provide reliable, high capacity and affordable communication services. The “anywhere anytime” nature of satellite services, linked to guaranteed service levels and “pay-per-use” pricing models, makes satellite the technology of choice.
Two-way data broadcast networks Satellite networks are the perfect broadcast medium to all applications that are “IP broadcast”. These include corporate in-store media distribution and digital advertising networks.
Broadband, multimedia, consumer networks Today, satellite network offers can provide consumer broadband services as a “last resort” basis and mostly for locations or application where either ADSL or 3G is not available or reliable. With the development of high-throughput satellites on the horizon and improvements in satellite modem technologies, it is expected that the cost per GB will near that of 3G and other terrestrial networks. At this point in time, satellite will become the most cost-effective and most suitable solution for consumer IP distribution networks and will start superseding the DSTv network with an IP two-way broadcast network equivalently. In summary, the use and deployment of satellite networks as a communication option is now most relevant to a number of specific user application scenarios within the current environment and this will develop. With the ever-increasing demand for broadband connectivity, linked to the cost-performance benefits expected from the next generation high-throughput satellite, we can expect wider deployments of satellite as a communication medium. n
Trend # 5 – Endpoint security back in vogue Mr Campbell predicts a resurgence in interest in end-point security in the industry. “This is closely tied to the first trend we discussed – incident response – and the fact that some traditional network-based security controls aren’t as effective as they used to be. “Security professionals will be looking at devices – whether they’re PCs, Macs, or smartphones – for indicators of compromise, and then enabling some form of incident response process. They’ll deploy technologies
to end-points to make incident response easier,” he says. Application control is also expected to reemerge as a key focus area for 2015. However, emphasis will be on identifying malicious activity on the end-point, rather than malicious code. “While user awareness of information security best practices is a key priority, at some point someone is going to click on something they shouldn’t, so organisations must be proactive about managing the impact of such events,” Mr Campbell concludes. n
Reliable, pan-Africa, critical communications networks Mission-critical corporate communications from South Africa to offices and operations in Africa is an ideal application for satellite networks. The “anywhere in Africa” signal footprint, low-cost remote equipment and cost-effective pricing models provide businesses with operations inAfrica a peace-of-mind alternative – either as primary option or as back-up to local communication.
‘Fire drills’ a must Continued from page 17
relates to organisations’ desire for a “single pane of glass” through which to manage their security assets, delivered on-premise, hosted, or as cloud infrastructure. Essentially, this enables robust security to “follow” an organisation’s applications, data, and workloads without any compromises or changes in technology or management being required. This approach also supports and aligns with enterprise mobility requirements for corporate data to be accessible to users anytime, anywhere, and from anyplace. 18
Security Focus | Vol 33 No 2 2015
ResearchNote
Growth challenging in 2014 By Blake Kozak, Senior Analyst Security & Building Technologies, IHS Inc.
I
n 2014, IHS projected the Indian market for access control would expand at a compound annual growth rate (CAGR) of 13,7 per cent from 2013 to 2018. However, IHS has revised its original forecast downward to about 13,1 per cent. One reason for the lower growth projection is related to electronic locks. The adoption of electronic locks in India has been slower than expected, but IHS expects growth to pick up rapidly in 2017 and 2018. Part of the woes for the Indian market for access control can be attributed to falling productivity, lack of financing, and numerous regulatory issues that have dampened investment, thereby halting growth in the manufacturing sector. Overall, the Indian market for access control remains difficult to enter, with price pressure and suppliers in China and other countries reducing overall margins. For Australia, the original growth forecast has been halved. Even when including electronic locks, IHS doesn’t anticipate growth to exceed 2,2 per cent through 2016 for access control. Although there is uncertainty, IHS expects the Australian market to continue to grow during the next five years, but at a much slower pace than originally projected. Large-scale projects for commercial, residential, infrastructure National Broadband Network (NBN) and education facilities should aid growth. However, government spending cuts and a decline in mining and manufacturing will no doubt slow the access control industry growth in the country. Similar to India, the market opportunity for electronic locks in Malaysia is projected to be limited in the short term, which is why IHS has slowed its original growth projection. Furthermore, slower growth through 2016 can be attributed to the current state of global oil prices and the upcoming introduction of the goods and service tax (GST). Overall, the Malaysian market outlook for access control remains optimistic over the next five years. IHS expects rapid investment in infrastructure and spending, with the barriers to growth being price and competition with lower-cost brands. n
Indian Market for Access Control
Mixed Brands Inexpensive Brands
Product ASP
Electric Strikes
Magnetic Locks Market Competitiveness
High
Premium Brand
Electronic Locks
Low
CompanyNews
Deggy SA proves real customer service works
F
our years since its launch into what is arguably one of the most competitive industry sectors in the country, Deggy® South Africa continues to build on its expanding portfolio of customers. Pieter Pretorius, Deggy SA managing director, believes the company’s success can be attributed to its customer centricapproach. “We are not just paying lip service to the old adage of the customer is always right,” he says. “Deggy South Africa has distinguished itself in the market through the provision of alternative options that ensure that our customers, regardless of their budget, are able to reap the full rewards of the Deggy Guard Tour Solution,” he added. Deggy South Africa launched in 2011 with a simple and easy-to-use Guard Tour Solution, which assists security companies and businesses to monitor a team of security officers from virtually anywhere.
Pieter Pretorius
Deggy offers an advanced, reliable, robust and resistant guard tour recording system that is easy to install and highly durable. Users can manage an unlimited number of guard tour sites with remote access capability. The system includes user-friendly software to generate and print multiple powerful featured point-to-point reports. For brand new customers, the start-up kit includes all the essential components, including the software, needed to implement the Guard Tour Solution. Furthermore, the system gives a client the availability to transfer tour data directly to a designated computer via the use of the Deggy® Web Wireless Download Station. The Deggy® Remote Supervisor Download Station can be used by a visiting supervisor or security manager to collect the recorded tour data. “Deggy has proven its worth as a superior guard monitoring solution that offers complete accountability and peace of mind for the client,” says Mr Pretorius. One of the company’s distinguishing factors is its warranty and replacement policy. Customers are provided with a threeyear warranty and maintenance policy, and Deggy® is committed to the replacement of all warranty-covered items for new ones, completely free of charge. “This is almost unheard of in the industry, but our company is so confident about the quality and durability of our products that customers who approach us with faulty or damaged equipment will immediately be issued with brand new equipment, no questions asked, no repair time and no replacement charge,” says Mr Pretorius. Last year, Deggy South Africa made two major announcements. Firstly, the rent or buy option, which provides Deggy customers with a highly affordable alternative. The equipment can be leased to a client with the option to renew the contract after a specified
period of time. Secondly, the newly-launched Deggy online store, which makes for a seamless, fast and simplistic new way for customers to purchase or expand their Deggy Guard Tour Solution. Security companies have an obligation of complete accountability to their clients and are held responsible for the actions of their security officers. In order to deliver measurable results, the monitoring of guards can improve the level of security offered. Deggy products also meet the basic demands of the sector. They are rugged, robust, easy to use, and match the needs of an evolving sector. Cutting-edge software and hardware means the company can meet and exceed a client’s expectations. By tracking every step of a guard’s tour, you have data that is detailed and correct – two key points most security companies find invaluable. Deggy also offers comprehensive after-sales service and pre-sales consultation. Deggy South Africa forms part of a global supplier with three decades of expertise. For almost 30 years, Deggy has been designing, manufacturing and supplying electronic products to security professionals with offices for direct sales and support based in the US and Brazil Since its local launch, Deggy South Africa has followed the same direct-to-thecustomer approach. As part of its global strategy, Deggy markets its products in those places where it can directly serve its clients without intermediaries. “Without the middle man, we can offer the best service, support and, price,” says Mr Pretorius. “The repaid expansion of the local guarding sector has necessitated the need for sophisticated products that are effective, affordable and immediately available,” he concluded. n
Enter Sparks & Ellis online uniform survey Sparks & Ellis is inviting all readers to participate in a uniform survey. In this survey, you are asked to complete a few questions around uniforms for security workers. It will only take a few minutes of your time, and we believe the results will be of great interest to the industry.
20
“We are running this survey online in conjunction with Security Focus magazine. The aim of the survey is to find out more about the industry’s views, attitudes, perceptions and requirements in relation to security uniforms, so Sparks & Ellis may convey the results to the industry
Security Focus | Vol 33 No 2 2015
as an additional service offering,” said a spokesperson. “The survey is online now and we encourage you to click here and complete it as soon as possible. We will advise you of the results once we have collated all the responses.” n
CompanyNews
New camera from Axis Axis Communications, a global leader in network video surveillance, has announced its first corner-mount fixed network camera. The new AXIS Q8414-LVS features a stainless steel anti-grip casing and is impact-resistant, supporting the IK10+ 50 joules rating, as well as the IP66/NEMA 4X rating for water resistance. The 24/7 indoor surveillance camera provides excellent image quality, both day and night, with capabilities like Lightfinder technology, which enables life-like colours in low-light conditions, and built-in invisible IR LED illuminator for video surveillance in complete darkness. “High security environments like correctional facilities and psychiatric wards present unique security challenges and a growing need to prevent self-harm and conflict,” said Roy Alves, director of business development, Axis Communications, EMEA. “Specifically designed to meet these needs, AXIS Q8414-LVS lacks ligature points, features an anti-grip design and is vandal-resistant. The camera delivers superior HDTV video in any lighting, day or night, for increased image usability.”
The new anti-ligature AXIS Q8414-LVS is ideal for video surveillance of small rooms in premises like correctional facilities, interview rooms, psychiatric wards and medical observation rooms, including elevators and stairwells. Thanks to a built-in microphone and the possibility to integrate the network camera into an alarm system via its I/O port, AXIS Q8414LVS becomes part of the overall surveillance solution, an important tool to protect and secure the safety of people in high security environments. In addition, privacy masks ensure restricted areas are not monitored for privacy reasons or to protect personnel. Available in two colour versions, powder coated white (AXIS Q8414-LVS White) and brushed stainless steel (AXIS Q8414-LVS Metal), the corner-mount network camera offers 1.3 megapixel or HDTV 720p video stream. It features P-Iris control for an optimal depth of field, resolution, image contrast and clarity. The horizontal angle of view up to 105° covers the entire room without blind spots. Capabilities such as remote zoom and focus
facilitate the optimisation of the captured view during the installation. AXIS Q8414-LVS features a unique design that has been developed to be perceived as softer as, and less provocative than, that of other security installations in correctional facilities and psychiatric wards. Working closely with prison and health authorities in several countries, as well as system integrators and installers, Axis designed AXIS Q8414-LVS to feature as few cavities and holes as possible to make the camera easy to clean, as well as prevent prisoners and patients from lodging items inside them. AXIS Q8414-LVS Network Camera is supported by the industry’s largest base of video management software through the Axis Application Development Partner Programme and AXIS Camera Station. The cameras include support for AXIS Camera Companion, AXIS Camera Application Platform, AXIS Video Hosting System and ONVIF for easy camera system integration and for application developers to provide the camera with intelligent capabilities. n
Securex2015preview
Securex – a leading industry exhibition Securex provides visitors with an unrivalled opportunity to view, discuss and source products and services from leading South African and international manufacturers and suppliers. Securex has a long history in the sector as a leading exhibition for security and fire professionals to interact with the best-in-breed suppliers.
S
ecurex and the co-located exhibition A-OSH Expo 2015, which will be held at Gallagher Convention Centre in Johannesburg from 12-14 May, continue to bring education to the fore through a number of targeted seminars and conferences. These educational sessions focus on building a professional future for risk mitigation within organisations, and addressing current security and fire issues. “We have revised the Securex brand in line with our Africa-centricity and a number of new features have been added to our popular existing features, to bring further value to visitors,” says Joshua Low, Securex event director at show organiser, Specialised Exhibitions Montgomery. The Securex free-to-attend Seminar Theatre will provide visitors with access to up-to-theminute information on best practice, as well as pertinent industry-related and legislative issues. Topics at the seminar include “Africa: Tapping into growth opportunities, challenges and strategies”; “Funding for security SME’s”; “Adherence to fire standards” and “Cyber security: A pertinent business risk”. The Installer Workshop is being launched at Securex 2015 to address the gap in what is deemed a very important sector of the industry. This interactive educational platform will provide installers with the latest technology trends and best practice from specialists in the field. Topping off the programme, an installer competition will be run on 14 May. A new Products Showcase will be erected in a prominent area at Securex 2015. This will allow visitors to preview the latest technology in a number of security and fire modalities. A new service – known as the Global Meetings Programme – will see visitors to both exhibitions matched up with companies that are best able to devise solutions to their apparent threats and risks. This will substantially reduce the time it takes to find a suitable supplier, allowing visitors to maximise their time at Securex 2015 by setting up meetings with exhibitors prior to even arriving at Securex 2015. In addition to the extensive array of traditional security technology such as surveillance and access control, visitors to Securex 2015 can also look forward to more in-depth coverage of other security modalities such as cybersecurity and guarding services. Attention to the growing field of fire detection,
22
monitoring and prevention will increase, and the Fire Protection Association of South Africa (FPASA) will run a Fire Hazard Identification Challenge throughout the three days of the exhibition. On show Better Life Concepts is launching the locally made Universal Armguard which can be used on either arm. The product is very light and durable and houses a torch or pepper spray. It has an inner pad for comfort and is strapped to the arm. The Universal Armguard and a torch can be used on the same arm while the other arm is free to perform other tasks. The Universal Armguard can be used to protect against dog, knife and machete attacks. It can also be used to cover the face if one is pepper sprayed and can be used as a sling for the arm if it is injured. British Standards Institution (BSI) is an approved certification and testing body that will assist visitors in gaining a better understanding of the Kitemark certification for fire products, PPE, emergency lighting, and CE marking. The Kitemark is a registered and globally recognised product certification mark owned and operated by BSI. It is one of the most accepted symbols of quality and safety and offers true value to consumers, businesses and procurement practices. Benefits include risk reduction, increased customer satisfaction and access to new customers around the world. Architects and property developers are becoming more aware of the aesthetic and security benefits that accompany C-Thru Fencing. As a security barrier, and from a functionality point of view, C-Thru Fencing offers an all-in-one solution. Cochrane International continues to provide segment-leading physical perimeter security barriers including the ClearVu Invisible Wall – the world’s only architecturally inspired highsecurity fencing system. The company will also showcase its Marine Floating Barrier, the world’s only rough water, high-security barrier and the Rapid Deployment Barrier that delivers unmatched crowd and riot control. Easi-card is a manufacturer/printer of plastic cards. The company custom makes printed PVC photo ID cards, security/access cards, membership and loyalty cards with or without RFID, magstripe and signature panels. Easi-card
Security Focus | Vol 33 No 2 2015
also stocks all the ID card printer equipment and accessories for data cards, enabling customers to undertake all their card printing on-site with instant issuance. Fox Electronics will be showcasing the VHF FX255 D3 monitoring system that supports full CID multi-data alarm monitoring. The T9 transmitter with selectable RF power output has eight input triggers including CID and serial port, and provides multiple alarm panel connectivity to all popular alarm systems. Other products on display will include GSM, alarm panel, battery charger modules and battery testers. Maxiflex Door Systems will be displaying the Teckentrup fireproof steel roller door. The first class materials and excellent workmanship of the doors guarantee quality, reliability and long service life. Teckentrup fire doors are tested in accordance with DIN 4102. Also on show are the company’s fire-resistant steel doors, Teckentrup burglar resistant security doors with multi-function protection, Teckentrup heat insulated multi-purpose doors, Teckentrup steel internal doors and Teckentrup roller shutter system “easy”. MiRO will display its wireless IP convergence portfolio with wireless solutions from SIAE, RADWIN, Ubiquiti, MikroTik, Deliberant and more. The company will also exhibit the VIVOTEK range of cameras (from their Supreme cameras to their compact more cost-effective C Series) and its Sunell range of thermal, analogue and IP cameras. The NUUO range of VMS and NVR solutions and the Milestone open platform video management system will also be highlighted. The MiRO stand will be interactive, with live displays on how the cameras work. A new version of Netgear’s operating system for its ReadyNAS family of desktop and rackmount Network Attached Storage (NAS) devices will be demonstrated on the Duxbury Networking stand. Other products include a new Power over Ethernet (PoE) switch – the Lantech IPGS2204DSFP – which is targeted at highperformance, stand-alone solutions supporting converged network access deployments. Also on show will be a wireless uplink gateway designed to facilitate multi-media content sharing; the new Cambium PTP 650 wireless broadband platform; the Tsunami 8200 Series point-to-point and point-tomultipoint carrier-class wireless networking platform; and an ACTi Internet Protocol (IP)
Securex2015preview
based video surveillance systems. ORing Industrial Networking Africa will release four of its latest PoE (Power over Ethernet) IEEE802.3(af/) at industrial Ethernet switches: IPS-1080A, IPS-1080-24V, IPS-1042FX-24V and IPS-1042FA. These products are specially designed for the high power demand equipment, such as PTZ cameras. The power input of IPS-1080-24V and IPS-1042FX-24V is with 24V power input, which is suitable for in-vehicle applications. This series offers up to 30W, which is almost twice that of the existing IEEE 802.3af PoE standard equipment. IPS-1080A and IPS-1042FA series solve the problems of limited space with their compact form. This series also offers the IP30 rigid standard, excellent heat dissipation, and wide-ranged operating temperature of 4070°C. Phendula Technologies is launching the MICROSENS range from a leading German manufacturer of fibre optic data transmission systems. The range of micro switches, in particular, offer true FTTO by virtue of its compact design. With dimensions of 90x45x58 mm, a total of six Gigabit ports are available: five 10/100/1000Base-T ports with Power-overEthernet+ (PoE+) according to IEEE 802.3at, to connect terminal devices and a fibre optic uplink port. Powell Tronics is following a similar theme to 2014, with a number of new high-technology products from its popular suppliers dominating the stand, including Impro’s scalable Access Portal range, Safran Morpho’s 3D Face and the MorphoTablet™ – the answer to portable biometrics. Other products include Golmar’s latest IP intercom solution, the ATOM biometric template distribution software with entry level T&A and Synerion’s Workforce Management (WFM) for enterprise solutions. In addition, bespoke software such as PT-GUEST, which uses market-established handheld scanners to scan and decrypt South African driver’s licences and then integrate the data captured with the ImproNet access control system, as well as the PT-VEND cashless vending solution (using pin code, prox cards and biometrics), will be on show. The company will provide live demonstrations and will be running a number of competitions with great prizes over the three days of the exhibition. ProDiS offers tailored, supported solutions based on industrial IP surveillance and hemispheric and decentralized technology. Offering supporting products to complete a turnkey solution, from storage, optical, mobility, automation, analytics, networking equipment to full integrated video management systems, ProDiS will be focusing on the internationally known brand MOBOTIX at Securex 2015. The German company MOBOTIX AG is known as the leading pioneer in network camera
technology and its decentralised concept has made high-resolution video systems costefficient. PSS Distributors will feature the Vautex range of batteries. These batteries come with the option of a five- or 10-year life design, ranging from 12V-1.3Ah, 12V-2.3Ah, 12V-5Ah, 12V-7Ah up to 12V100Ah. Batteries are distributed for various applications, of which security and telecommunications form a big part. There has been a large growth in back-up power and the UPS industry. The PSS Distributors Securex 2015 stand will be filled with UPSs, inverters, batteries, power supplies, solar panels, automatic voltage stabilisers and surge protection. RJ Connect is launching the Moxa VPort 56-2MP series, a rugged 1080P H.264 zoom IP camera designed for mission-critical video surveillance applications, as well as the Moxa VPort P06HC-1MP-M12, a new series of rugged, EN 50155 compliant IP cameras that support superior 720P images with an advanced constant bit rate control function. The cameras have an anti-vibration Ethernet connector and a built-in microphone for implementing an intercom function, and sport an IP66-rated housing. Salto Systems will be exhibiting its new range of keyless access control locking solutions, including the XS4 Mini and the XS4 One escutcheon, which is stand-alone, wire-free and easy to install with the embedded SVN technology. Also on show will be the new XS4 wall reader and controller, as well as the new XS4 GEO cylinder. Securitytechnologystore.com is the answer to stand-alone security needs. The STStore’s focus is to assist African market consumers/resellers with access to proven stand-alone products and consumables with a few clicks of a button. Register, buy and the product is delivered. Show specials and vouchers will be on offer for first time buyers. Trade enquiries will be welcome. Shenzhen EEP Industry Co. will exhibit its range of Keeper 1- and 1.3-megapixel CMOS analogue cameras with full HD support and 960H output. In addition, its KC-AHD3104 DVR features 4CH 720P or 960H input, mobile phone support, as well as 1CH real-time or 3CH non real-time playback. Suprema will be launching an array of new products at Securex 2015. Some include the new BioStation T2 sensor with live finger detection and FBI credentials, Secure IO2 expansion module and Product X, a new terminal loaded with heaps of features and setting a new standard in biometric device architecture. BioStar II will be launched, this major release revolutionises access control with full cloud architecture and a superlative web interface. As always, Suprema will boast an array of new value-added integrations, including the new Impro Portal, Saflec Access Control system,
Paxton Access and Milestone VMS. TeleEye will showcase the new TeleEye MP Series of HD network cameras and the new TeleEye GX680 series of real-time, HD digital video recorders for faster transmission, hacker resistance and the securing of ONVIF cameras. The 4-, 9- and 16-channel GX680 DVRs are BS8418 compliant and allow for remote monitoring through PC and mobile devices. FLIR thermal imaging products from the commercial security, law enforcement and automation ranges will be showcased, including FLIR’s new short-range thermal cameras. The REDWALL range, which includes outdoor PIR sensors, infra-red beams and laser scan detectors, will also be on view. n
UAG.
MICROSENS range.
Teckentrup security doors.
C-Thru1.
Security Focus | Vol 33 No 2 2015
23
OnTheMarket
Simple functionality and quick installation with CALYPSO
T
he Calypso wireless control panel, the latest alarm offering from EBS in Poland, and distributed by Active Track in South Africa, meets all the basic requirements for securing offices, commercial premises, houses, small industrial buildings, garages and holiday homes. The CPX200N control panel is a highly functional alarm control panel, which is integrated with a GPRS transmitter. It boasts simple functionality, durable service and quick installation. The small dimensions and modern design of the keypad makes it possible to programme up to seven zones. For more demanding applications, the Calypso CPX200NW control panel system reliably meets the requirements of more complex buildings as well. Both panels (CPX200N and CPX200NW) support up to three keypads, so the alarm can be armed/disarmed from three different locations. This becomes extremely useful in office buildings with multiple entry and exit points, or in homes with balcony doors and garage entry points. As this is a wireless system, the detector can be placed anywhere. There are no dedicated detectors required, and no need to distribute metres of unnecessary cabling. The Calypso system can be operated with nine 4-button remote controls, and functionality can be freely configured. The arming/ disarming of the system by radio is confirmed each time by a buzzer. The Calypso system supports up to 16 lines, including nine wireless. Each panel has the ability to divide the inputs into two zones of which the user can assign any number of lines to each zone. Calypso is also integrated with AlertView, a mobile smartphone application that allows one to manage all the features of the control panels remotely by multiple users. This application allows the user to manage all the features of the control panel remotely, including arm/ disarm each partition, assign sensors and messages, alarm notification, preview event history, as well as immediate notification of appropriate services. Advantages of the Calypso Control Panel include • Easy Operation: The system is free of any complicated functions. • Functionality: The simple design not only allows for quick and easy installation but also keeps the price affordable for the end-user. • Adaption to different markets needs: The product has been designed based on research of client requirements from all over the world. • Quality and safety: The EBS research and development department constantly incorporate the high, European quality of components and provides ongoing technical support. • Competitiveness: EBS with its simplistic design and affordable pricing is highly competitive with leading products from around the world.
24
Security Focus | Vol 33 No 2 2015
Main Features of the Calypso Alarm Control Panel • Supports up to three LED keypads • Transmission of signals through GPRS/SMS module • The control panels allows one to programme text messages to 10 different users • The system provides a warranty of reliable data transmission (GPRS communicator integration), AES encryption, quick and easy configuration, remote arming and disarming. Inputs • Seven zones-type DEOL, possible conversion on EOL or NO/NC • Nine wireless zones • Ability to set two zones with any amount of inputs Response Line types • Instant • Delay • 24h burglary • Arming/disarming • 24h tamper • Interior delay • 24h burglary silent Outputs • One monitored alarm output, high-current (max. current 1.1A) • Two monitored alarm outputs, low-current (max. current 50mA) For further information, kindly contact Active Track by visiting www. activetrack.co.za or emailing info@activetrack.co.za n
OnTheMarket
Do door phone companies need indoor units? By Oliver Philippou, senior analyst Video Surveillance and Security Services, IHS Inc. In recent years there has been a growing interest and adoption of the “smart home” concept in North America. This has been led by service providers using physical security to drive “smart home” applications. The issue for door phone suppliers is that all of these services are increasingly being integrated and controlled by either a central intelligent alarm control panel, or online via a smart mobile device such as a smartphone or tablet. So what does this mean for the door phone industry? Even within the door phone industry, companies are starting to offer solutions that do not require indoor units. Panasonic offers a wireless monitor that is not fixed to a wall, and companies, such as SkyBell, offer Wi-Fi-based door phones.
IHS expects that there is still a place for indoor units. Indoor units accounted for 50 per cent of the $2,3-billion world market in 2014, and the market is forecast to grow in line with other component items and villa kits through to 2019. The reason that the “smart home” market is not expected to significantly impact the use of indoor units in the near future is because of geographic differences: • While there are high-end “smart home” offerings around the world, the drive to bring the “smart home” to the mass market is taking place in North America, which at present is a relatively small market for door phones when compared to Europe and Asia. • The European and Asian door phone markets are highly focused on the residential market, while the North American market is heavily focused on commercial end-users. • The type of residential user is very
different as well. In Asia, door phones are mainly used in high-rise flats, where “smart home” applications are much harder to implement, due to building services normally being managed by the building owners, not the residents. In North America, however, proportionally there are many more villa kits and door phones for smaller occupancy buildings sold. These types of products are much easier to integrate with “smart home” offerings. n
Security Focus | Vol 33 No 2 2015
25
BusinessAgainstCrime
Dealing with White Collar Crime was published in 2011 by Contact Publications (Pty) Ltd, on behalf of the White Collar Crime KwaZulu-Natal Task Group. Topics covered include establishing an ethical culture; risk assessments; internal controls, fraud prevention, recovery of assets; prevention of banking related crime; computers and computer crime; preparing for trial; money laundering and much more. In this issue of Security Focus, the chapter on “The Crime Response Plan” has been printed in its entirety to give readers an idea of the important information available to them when purchasing a copy of this valuable book.
The Crime Response Plan
A
By Basil Carlston
ny prudent organisation will plan its response to White Collar Crime so that when it strikes, it can be dealt with in an organised and efficient manner. Key decision makers should have no doubts about what needs to be done, and what the likely effect of their decisions will be. As White Collar Crime frequently involves the swift movement of money, the need for quick decisions and action is a vital ingredient of the plan. Clearly any contingency plan must be consistent with the organisation’s policy. Although this document concentrates on the response to White Collar Crime, the plan could be written to encompass all serious crime. The purpose of a crime response plan is to enable the organisation to take prompt and effective action to: a. Put into place immediate and appropriate damage control measures; b. Investigate and secure the evidence so that any subsequent internal
disciplinary or civil or criminal action in the courts will succeed; c. Minimise the risk of subsequent losses; d. Improve the chance and scale of recoveries; e. Reduce any adverse commercial effects; f. Make a clear statement that the organisation is not a soft target for crime; g. Minimise negative or adverse publicity; h. Identify any lessons for the future in respect of improving the organisation’s defence against White Collar Crime; i. Make recoveries from otherwise unattainable sources such as pension monies due to the perpetrator; and j. Consider the insolvency alternative in order to take advantage of the insolvency investigation, interrogation and, other extra-ordinary powers granted to liquidators. The plan will assist in demonstrating to staff, customers and the public that the organisation remains in control of its affairs in a crisis situation. We have already discussed various policy
issues related to crime contingency planning in the section which deals with establishing policy for dealing with commercial crime. Any contingency plan will need to include details of: • The immediate action on a crime being discovered or suspected; • How and by whom the crime will be investigated within the organisation; • How and by whom the immediate subsequent action (in line with the organisation’s policy) will be handled; • Whether, and under what circumstances, contact should be made with the media; and • Which sources of external assistance should be used.
IMMEDIATE ACTION ON CRIME BEING DISCOVERED OR SUSPECTED
We recommend that the sequence of events on the discovery of a crime or suspected crime should be: Continued on page 28
26
Security Focus | Vol 33 No 2 2015
White Collar Crime
South Africa’s biggest business scourge Billions of rands are being lost annually to the South African economy, and every single company needs to know how to combat this problem. Now, however, there’s help at hand. Dealing With White Collar Crime is a book that puts the spotlight on every single facet of this subject. Moreover, it is a book that every professional security practitioner needs to read and – more important – a book every single company in South Africa needs to have in its library as compulsory reading!
So, what’s included in this book? Here’s a table of contents ... • Establishing an Ethical Culture • Establishing Policy for Dealing with White Collar Crime
• Prevention and Combating of Corrupt Activities Act • Prevention of Banking Related Crime
• Risk Assessments
• Computers and Computer Crime
• Internal Controls
• Investigation
• Fraud Prevention
• Preparing for Trial
• The Crime Response Plan
• Money Laundering
• The Recovery of Assets
• A Disclosure Service: A Critical Component of a Risk Management Strategy
• A Practical Approach to the Prevention of Corruption
• Verification Services
PURCHASE ORDER To: Contact Publications (Pty) Ltd. Please send me ………. copies of Dealing with White Collar Crime at a total of R199 per copy inclusive of VAT, local postage and packaging. This order is being submitted via (tick relevant box): p POST at P O Box 414, Kloof 3640, KwaZulu-Natal, South Africa, along with a cheque made payable to Contact Publications (Pty) Ltd. p Fax at 031 764 6974, plus cheque to P O Box 414 as above or proof of EFT as below. p Email to accounts@contactpub.co.za plus cheque as above or proof of EFT made into FNB current account 50730106925, Kloof branch code 221526
Name................................................................... Position: .............................................................. Company:......................................................................................................................................... Address: .......................................................................................................................................... ............................................................................................................... Code: ............................... Tel: .......................................................................... Fax : ............................................................... Cell:..............................................................Email:.......................................................................... Contact Publications physical address: Suite 1, Fields Shopping Centre, Old Main Road, Kloof 3610, KwaZulu-Natal, South Africa. Telephone: +27 (0) 31 764-6977 For overseas postage rates and also bulk discounts for ten copies or more, contact Lynette Taylor at lynette@contactpub.co.za
BusinessAgainstCrime
Continued from page 26 a. An immediate report should be made to the head of the department who should in turn immediately inform the nominated board member/CEO and the Enquiry Controller. Speed and secrecy is of the essence. To ensure that there is no delay in further action, both the nominated board member and the Enquiry Controller should have nominated deputies. All this is in line with our recommended policy in Chapter 2. b. The Enquiry Controller should take immediate steps to preserve the evidence and secure assets at risk. c. The nominated board member and the Enquiry Controller will need to decide on the immediate subsequent action. Depending on the nature and seriousness of the crime this action may include: i. Notifying the South African Police Service; ii. The steps necessary to secure the assets at risk; iii.The removal of the suspect from a position of authority and the withdrawal of signing powers; iv. Countering the undermining of staff morale or interference in the investigation by removing the suspect from the organisation’s premises; v. Changing locks, passwords and access codes as well as securing accounting and other records; vi. Securing the contents of the suspects office, personal computer, diary and files, including all personal documents on the premises; vii.Securing the relevant records held on the organisation’s computer network (this should be done by a computer specialist); viii.Appointing the appropriate investigators to commence the actual investigation as soon as possible with the initial aim of establishing the scale of the offence and the degree of contamination within the organisation; ix. Doing a preliminary assessment of the following issues: 1. The possible need for civil recovery in terms of Section 300 of the Criminal Procedure Act (Act 51 of 1977); 2. The possible requirement for a sequestration or anti-dissipation interdict order from the courts;
28
3. The registration of a likely insurance claim; 4. The specialist investigative resources which may be required; and 5. A recovery in terms of Section 37D of the Pensions Act.
INVESTIGATION WITHIN THE ORGANISATION
As his title implies, the Enquiry Controller is normally responsible for the control of the investigation within the organisation (see also Chapter 12). The person that actually carries out the investigation will depend on the nature of the crime and on the organisation of the institution. Large institutions with their own security department can expect that department to undertake the majority of the investigation themselves. Smaller institutions might have a designated, trained manager. Whoever undertakes the task, the investigation must be carried out to a high professional standard if the objectives are to be met. The Enquiry Controller should ensure that the investigators are adequately trained. This training should include: • The legal issues relating to White Collar Crime. In particular, fraud, bribery and corruption; • The organisation’s disciplinary procedures; • Evidence gathering and interview techniques; and • Evaluating and presenting evidence, both orally and in writing. When drawing up the contingency plan the Enquiry Controller should identify, brief and train individual specialists who may be required for the investigation team. Some examples are: • A Computer Expert This expert must be prepared to secure the computer evidence (either on a network or a PC) in such a manner that it will be acceptable in a court of law. This will have to be pre-planned and the procedures documented as part of the plan. The computer expert should be chosen with care as he or she must: a. Not be an employee of the victim organisation b. Have a real understanding of the roles that computers can play in the commission of a crime; c. Be able to provide clear simple testimony of what they can prove to be a fact;
Security Focus | Vol 33 No 2 2015
d. Have a high professional reputation as well as a professional approach; e. Be trustworthy and able to work as part of a team; f. Be articulate, in terms of being able to explain technical computer matters to laymen; and g. Have a “presence” before a group, displaying no irritating mannerisms and idiosyncrasies. The expert must be an articulate and credible witness who will be able to establish the accuracy of the data processing evidence being presented in court. • A Legal Expert This person should be trained and know what is required for both civil legal recoveries and criminal prosecution. • A Human Resources Manager This manager should be warned that he/ she will have to initiate such actions as suspension, internal disciplinary hearings and provide advice on the organisation’s approach to the recovery of money under the auspices of the appropriate section of the Basic Conditions of Employment Act (or replacement legislation) as well as on the Pension Funds Act No. 24 of 1956. • A Nominated In-House Accountant This person should be trained to understand the basics of forensic accounting so that he/she can carry out this function in respect of low level frauds and be able to assemble all the relevant records and documents and prepare schedules in preparation for the deployment of an external forensic accountant. The rationale behind this is simply that forensic accountants are expensive; therefore it is sensible to have someone within the organisation to assemble information and documents so that the forensic auditor’s time is utilised cost effectively. • Internal Auditors Internal Auditors have a major part to play in the prevention of White Collar Crime. The focus of their activity is normally on the systems in place within the organisation. However the nominated Board Member/CEO should encourage their participation in the crime response plan and through the organisation’s audit committee expect them to be an independent monitor of the effectiveness of the plan.
BusinessAgainstCrime
EXTERNAL SOURCES OF ASSISTANCE
There are a number of external resources available to assist the organisation in its response to crime. All of these have both advantages and disadvantages and it is essential that the Enquiry Controller is aware of these and that he identifies the individuals concerned, establishes their possible reaction time and likely costs involved. Some of these external resources are:
SAPS
If the objective is to mount a criminal prosecution, the sooner the Police are involved the better. However, there may be cases where the Police may not be over enthusiastic when receiving a call for assistance, particularly when the facts are complicated, the accounting systems confused or the proof of loss unclear. Technically, the Police are obliged to investigate every complaint, but some are investigated more thoroughly and more quickly than others. SAPS Commercial branches in South Africa are over-burdened as it is and an organisation’s case has a much better chance of being attended to if it has been properly presented and the evidence correctly preserved. The organisation should be aware that once a case is handed to the Police, it will lose control over events. An organisation normally wishes to have a loss proved down to the last cent so that it can seek compensation. The role of the Police is law enforcement; it does not matter too much if a criminal is convicted of a R5 000 or R5 million fraud. The conviction is the important outcome for the Police; recovery, quite rightly, is the concern of the organisation. But, as we have already made clear in our chapter on policy, we are adamant that all commercial crime should be reported to the SAPS for the reasons given in that chapter. The Enquiry Controller should establish a good rapport with the relevant SAPS departments as part of the plan so that cases can be discussed, mutual approaches agreed upon and a free exchange of information is possible.
Other Government Departments
Other Government bodies, besides the Police, may be able to help with investigations especially when their interests coincide.
Some of these are: Revenue Department, the National Prosecuting Authority of South Africa, which includes the Asset Forfeiture Unit, the Directorate of Special Operations and the Specialised Commercial Crimes Unit. Another organisation is the Special Investigating Unit. All of these, and others, have investigation resources which might be called upon when the issue is covered by their respective mandates (see Chapter 13 ). Local contacts should be established by the Enquiry Controller and included in the plan documentation.
Lawyers
The organisation’s legal advisors are obviously an important element in the response plan. They should be consulted when drawing up the plan and detailed procedures agreed upon for their involvement. The lawyers have a major part to play in, inter alia, the recovery of money and assets, liaising with the forensic accountants, interviewing witnesses, assembling documentation, if possible crossexamining the perpetrator, taking steps to prevent the dissipation of assets and, if need be, pursuing a sequestration, drawing up of acknowledgements of debt, the presentation of the case to, and liaison with, the SAPS for criminal proceedings and, of course, the processing of any action through the civil courts.
External Auditors
By law all companies must be audited on an annual basis by independent external auditors. Although their primary function is to establish whether the company’s financial statements represent a fair presentation of the financial facts pertaining to the company, they will also note all major control weaknesses and risks. It follows that their observations can add value to the response plan.
Forensic Auditors
The key attributes of a forensic auditor are clarity of reporting, good witness box performance and an above average accounting competence. Forensic accounting is a relatively new discipline, but one, when correctly utilised, can save an organisation a good deal of money. But they are relatively expensive and, in our view, should not be utilised as the sole source of investigational capacity in a case. They must be part of a team - not take
over. When drawing up a response plan the Enquiry Controller should establish contact with a selected firm of forensic auditors and discuss their possible role in the plan. Large organisations who experience fairly frequent crimes will find it both cost effective and beneficial to arrange visits to the organisation by the selected forensic auditors for them to be briefed on the organisation’s accounting methods and systems.
Investigational Firms
It would be prudent for smaller organisations without in-house security/investigational departments to identify external private investigational facilities. There are a number of private firms in South Africa who specialise in commercial crime. It may be worth a small retainer to such a firm to ensure their rapid response to a crime and a prior briefing as to the organisation’s policy and procedures. Care needs to be taken when selecting such a firm as “fly-by-nights” abound in South Africa. When selecting such a firm the Enquiry Controller might consult the local branch of the Security Association of South Africa
CONTACT WITH THE MEDIA
In due course the media will learn of any major fraud. Organisations should accept this inevitability and make plans to attempt to control it. It is a sad but true fact that fraud is not good media copy in contemporary South Africa; a gory murder or hijack is much more likely to grab the headlines. Nevertheless it is important that a media strategy is agreed by the organisation for every commercial crime case and where the SAPS or any other outside organisation is involved, a common approach decided. The Enquiry Controller should establish the procedures for this as part of the response plan.
RECOVERY OF ASSETS
Obviously the recovery of the proceeds of the crime is an essential part of any crime response plan. While an acknowledgement of debt from the criminal concerned is often the quickest and simplest method for doing this, more often than not the acknowledgement does not cover than full extent of the loss. It follows therefore that the Enquiry Controller must be aware of the methods available to him/her for recovery under civil law. This is discussed in Chapter 7. n
Security Focus | Vol 33 No 2 2015
29
InternationalNews
Dallmeier secures Naples Airport
T
Representatives of Dallmeier Italy visited the site several times so they could adapt the new video system precisely to the requirements of the airport management company.
Innovative multifocal sensor technology GESAC‘s security engineers saw the Panomera® multifocal sensor system from Dallmeier for the first time at the “Sicurezza” trade fair in Milan in 2010, and were very impressed by the performance capabilities of this ground-breaking video technology. Unlike conventional cameras, which have a single focal lens, multifocal sensor technology is based on a multi-sensor platform with several lenses, each with different focal lengths, creating the unrivalled Panomera® effect. This innovative system provides surveillance of large areas with extremely high resolution, all from a single installation site. The contact at the trade fair was followed by an intensive planning and design phase, during which the staff at Dallmeier Italy worked closely with the “Infrastructure Development & Flight Operations” department of GESAC, under the direction of Alessandro Fidato.
Safety for apron, runways and forecourt For GESAC, two major zones of the airport site were of paramount importance: the area in front of the airport buildings (“Panomera® Forecourt” project), and the apron and runways (“Panomera® Airfield” project). In the airport forecourt and concourse, Panomera® monitors traffic and pedestrian flows between the multi-storey car park, Terminal 1 and the network of feeder roads and paths by which people arrive and leave the airport, either in motor vehicles or on foot. The customer also wanted to obtain complete coverage of the movements of all vehicles and aircraft anywhere on the entire airfield, including the ramps and aprons, taxiways, and take-off and landing runways, so that incidents could be reconstructed if necessary, wherever they occurred on the site. The cameras of the Panomera® system for this airfield project were installed at a considerable height, close to the roof of the APRON tower at about 13 metres; three Panomera® systems installed in a semi-circle provide a panoramic view through 228°. The Panomera® Viewer workstation was located inside the APRON tower to provide security staff with a unique and full panoramic view of the entire airfield. “With Panomera® technology, distant objects can be captured with the same quality as those in the foreground. The extremely high resolution over the entire area of interest and intuitive operation of the system led us to choose Dallmeier,” says Giuseppe Musto, head of innovation & automation development
he international airport at Naples, Napoli Capodichino Airport, is used by six million travellers every year. With the introduction of the Panomera® multifocal sensor system from Dallmeier, security in both the apron and the airport forecourt areas is enhanced further still by the very latest in camera technology. Napoli Capodichino offers direct connections to 50 domestic and international destinations. It is managed by GESAC SPA, a member of the F2I Airports Group, an airport management company known for the excellent quality of its services and for its culture of continuous improvement. GESAC works constantly to find efficient solutions and satisfy the requirements of its passengers and field operators, particularly with regard to personal safety and environmental protection.
30
Security Focus | Vol 33 No 2 2015
for GESAC. Another important difference between Panomera® and conventional PTZ cameras is that the whole area to be monitored with Panomera® is recorded continuously, so the high resolution images enable important, single details to be examined even after the event. With PTZ cameras, the general overview image is lost while the camera is recording a detailed area. Reliable recording Recording is based on the Dallmeier DIS-2/M NSU blade technology. This ensures maximum availability and reliability of the recording. Each blade unit is equipped with a redundant hard disk. The units are powered via a rack for 19” slide-in modules with redundant power supply units. The rack system can accommodate up to 10 single modules, so even relatively large systems can be installed in compact and costefficient manner. The modular structure of the system guarantees high availability of the overall solution. Complete success Alessandro Fidato, director of the infrastructure development and flight operations department, describes the video system as a resounding success. “With these two projects, GESAC confirms its orientation towards innovative solutions that ensure high standards of security and simplify management arrangements. We are very satisfied with this co-operation.” Pierpaolo Piracci, of Dallmeier Italy, responds: “I am very proud to have been personally involved in these highly innovative projects, and I would like to thank Alessandro Fidato and Giuseppe Musto of GESAC SPA for the confidence they have shown in our technology and professionalism.” n
InternationalNews
Act empowers healthcare trust Executive Alarms have installed ACT access control equipment on more than 450 doors in a roll-out across multiple hospital sites in Oxfordshire and Buckinghamshire, in the United Kingdom. The project covers facilities ranging from a new £11m centre for adolescents with mental health problems in Headington, to a brand-new adult unit with 80 beds in Aylesbury, built at a cost of £40m. The Aylesbury facility, which was constructed by Kier Group, has merged multiple services onto the same site, meaning that a wider range of clinicians and health professionals are available to patients. It opened in 2014. The challenge for ACT was replacing the number of different legacy systems in use with a single solution across all properties. After Executive Alarms won the contract in open tender, their designers collaborated with ACT engineers to design and deliver the required solution. The Oxford Health NHS Foundation Trust and the Buckinghamshire Healthcare NHS Trust are using the latest version of ACT’s management software, ACTenterprise. This is a role-based platform with functionality available to users according to their specific needs (e.g. installer, security guard, system administrator), a feature that increases overall security. The software is highly intuitive with the look and feel of a web browser experience. Full integration to ACT’s own VMS solution, ACTviquest provides additional real-time security. Executive Alarms and ACT created a rolespecific database structure for the client who were able to populate this from their existing software without any re-keying. This is a feature of ACTenterprise that is of considerable value to customers and can produce rapid return on investment (ROI) during migration. The trusts ran parallel systems initially at small sites while security managers tested the new equipment in the field and found that it exceeded expectations. Jason Thomas, senior engineer at Executive Alarms, said: “The key performance indicator here is that ACT have delivered a completely focused solution that allows central administration of previously fragmented systems and enables the client to obtain MIFARE cards themselves in a cost-effective manner. “The sites include high, medium and low security in-patient units as well as day care centres. The savings have been widespread
and include the cost of the controllers over rival suppliers, a reduction in the number of engineer call-outs and rationalisation of system administration.” The trusts are using ACT’s ACTproMIFARE1040 proximity readers which are suitable for indoor and outdoor installation. They support third-party smart cards and fobs, are housed in a robust polycarbonate housing and have an ingress rating of IP67. Crucially for this project, they have a flush mounting option which reduces potential for self-harm by factoring out ligature points. The readers are being used with door stations and controllers from the ACTpro range. Richard Huison, of ACT, said: “The client needed precise tailoring of access levels. Facility managers can put an individual into a group in terms of roles-specific user rights,
but also fine-tune that person’s unique access privileges. ACT are industry leaders in this functionality.” He continued: “The trusts are also benefiting from alarm management so that if a door is forced or there is a voltage problem, the selfdiagnostics in the ACTenterprise software will advise security. “Another core offering was embedded interlocking or ‘airlocks’. These are logic-based and intuitive for the user to understand but are not a core feature of our main competitors. ACT has empowered the trusts with an adaptive system that allows interlocking of doors as patient care processes change.” Oxford-based Executive Alarms was founded in 1990 and excels in commercial and residential security across access control, CCTV, intruder alarms and fire protection. n
Security Focus | Vol 33 No 2 2015
31
InternationalNews
Hikvision Canada Inc established Hikvision, a world leading supplier of innovative and award-winning video surveillance products and solutions, has established Hikvision Canada Inc, which will focus on the video surveillance market in Canada. This achievement represents the company’s strong commitment to the Canadian market and speaks to its rapid growth in Canada, North America, and across the globe. State-of-the-art technology and exceptional technical support are two hallmarks of Hikvision’s success. The company boasts 12 000 employees globally, including 4 200 engineers devoted solely to R&D. Hikvision’s dedication to research and development is apparent: the percentage of revenue spent on R&D in 2013 topped eight per cent of US $1,76-billion, amounting to more than US $140-million. Hikvision and its affiliated companies have submitted more than 1 000 patent applications in China, as well as more than 50 patent applications through the Patent Co-operation Treaty (PCT) and Paris Convention, holding more than 500 patents worldwide. The year 2015 will find Hikvision advancing even further as a robust global corporation with quickly expanding human resources and numerous technical achievements.
Hikvision recently opened offices in Canada.
Hikvision Canada Inc is just one example of Hikvision’s incredible success in North America. The company established Hikvision USA Inc in 2007, which began Canadian operations in 2011. In the four-year period since then, Hikvision has seen a tremendous increase in revenue in Canada, and the Canadian team has experienced significant expansion. In the coming year, the company has plans to add additional regional managers, field engineers, and the bilingual French-English technical support staff based out of Montreal to better serve the needs of customers in French-speaking Canada. Education is one vertical market where Hikvision has found particular success, such as with the Hikvision security solution installed by Montreal’s Marguerite-Bourgeoys School Board. Retail and property management are also proving to be successful verticals for Hikvision, with finance, transportation, and municipal markets on the rise as well. Another trend for Hikvision in Canada has been an increase in middletier and high-end projects. Hikvision’s Dealer Partner Programme and A&E Programme have enabled Hikvision to support a broad range of Canadian consumers with both SMB and enterprise solutions. “Our team in Canada is firmly committed to creating relationships with distributors, dealers, and A&E firms, providing localised service to help Canadian businesses succeed,” noted Jeffrey He, president of Hikvision USA Inc and Hikvision Canada Inc. “The creation of Hikvision Canada cements our reputation as a company with an exceptional understanding of the North American market. “By continuing on the trajectory we’ve seen in the past few years and expanding the resources we provide to the Canadian market, Hikvision will witness great success in North America in 2015. This is just the beginning.” n
Hikvision and EMCS in partnership Hikvision is expanding opportunities for comprehensive CCTV system checks through a unique partnership with EMCS, one of the UK’s largest independent monitoring stations. EMCS will use its CCTV Sentry software to proactively monitor every customers’ CCTV system, not just those that traditionally opt for a monitored solution, and send an e-mail if any problem is detected, and Hikvision has ensured that its entire range of DVR, NVR, hybrid, and HD-SDI products are 100 per cent compatible. EMCS has worked closely with Hikvision to roll out this comprehensive system checking service to the 80 per cent of customers who have not, until now, had their CCTV systems monitored. Every Hikvision DVR is now compatible with CCTV Sentry and provides information on
32
camera and hard disk failures, recording issues and time accuracy problems. As well as e-mail alerts, CCTV Sentry customers can view a live status webpage on a smartphone, anywhere, anytime. “As a result of our partnership with EMCS, CCTV Sentry will now be available to every multi-site organisation where a fullyfunctional CCTV system is a necessity, such as retail, banking, hotels, education, logistics, transportation and critical infrastructure,” says Keen Yao, international marketing director at Hikvision. “It provides all EMCS customers with a valuable and highly proactive maintenance service tool to help ensure their CCTV systems are fully operational 24/7.” Says Mark Hewerdine, CCTV manager at
Security Focus | Vol 33 No 2 2015
EMCS: “Our customers can be rightly confident in the knowledge that all Hikvision’s products are 100 per cent compatible with CCTV Sentry, competitively priced, easy to use and, most importantly, stable and reliable.” Mr Yao adds: “Integrating CCTV Sentry into EMCS’ standard alarm panel is a breakthrough for sites with unmonitored CCTV installations, allowing them to be alerted when a fault happens rather than finding out after an incident has occurred. “It also means the team at EMCS can offer an immediate visual check for an intruder if an alarm is triggered. “We bring a totally transparent approach to working with all our technical partners and are proud to stand behind EMCS in their roll-out of CCTV Sentry.” n
InternationalNews
State-of-the-art technology launched GJD Manufacturing Ltd, one of the world’s most innovative leaders in UK manufacturing, design and supply of CCTV LED illuminators and professional external detector equipment has recently launched its Pearl Triple-Tech wired detector, a highly advanced PIR and microwave technology system to provide effective security against potential crime. The external “Pearl” wired detector may be small in size but quality, performance and reliability are not compromised. It has been thoroughly tested to outperform its rivals and the innovative technology incorporates PIR, microwave sensing and anti-masking it offers triple protection. The smartly matched sensors work intelligently to protect property against crime with a completely invisible detection curtain. The Pearl detector’s sensing technology is enhanced with a robust anti-masking
alarm, specially designed to warn of any tampering. Mark Tibbenham, managing director, commented: “The Pearl detector is a highend product to help protect residential, commercial or industrial premises. Its compact design and unique features, including four selectable detection range settings, provide a reliable and trustworthy security solution for all requirements.” The Pearl detector includes a standard customisable “T” bracket for narrow beam applications protecting across a door or window. An additional swivel bracket is also available for applications that require a customisable pan and tilt angle. The Pearl can easily be positioned across many areas including windows, doors or the entire length of a property wall. The product also features separate volt-
free output contacts. GJD Manufacturing, headquartered in Heywood, Greater Manchester, in the UK, provides world-leading and innovative presence detection and security lighting systems. GJD’s detectors are a perfect fit for sites of all sizes and from low to high-end security requirements. Why use the external Pearl wired detector? • Triple technology PIR, anti-mask and microwave sensors. • Narrow PIR curtain lens. • Range selectable 3, 6, 9, 12 metres. • Low voltage 12VDC supply input. • Temperature compensation for extreme environments. • N/C volt-free contacts for tamper, antimask and alarm. • Available in silver or white. n
Training coastguards is key to tackling piracy Training and mentoring of coastguards in Africa, the Middle East, and South East Asia is essential if coastal nations are to have effective control over their territorial waters and economic zones, says leading maritime security company Maritime Asset Security & Training Ltd (MAST). Furthermore, if Western governments continue to cut back on defence spending, these nations will be increasingly reliant on their own organic resources to provide security in international waters adjacent to their territorial limits. Gerry Northwood, OBE, chief operating officer of MAST, said: “While the UK Chamber of Shipping has recently reported that Indian Ocean piracy is under control, it should not be forgotten this is directly attributable to the success of international maritime military deployments to the Indian Ocean, and because commercial shipping has taken positive and decisive action to protect their vessels through Best Management Practices 4 (BMP4) and armed guards. “However, the report rightly warned that there is still much to be done ashore if a resurgence of piracy in the Gulf of Aden and
the Indian Ocean is to be prevented. “Somalia remains a politically fragmented state and in places, the lack of governance, and law and order, means that the ‘pirate breeding grounds’ are still intact.” He added: “This is not just about Somalia. Coastal nations in other piracy-prone areas such as West Africa and South East Asia are being encouraged to police their territorial waters and exclusive economic zones, and will benefit from mentoring in how to do so more effectively.” Richard Battrick, director of training, compliance and ordnance management at MAST, said: “There remains a paucity of multinational naval assets which will be further affected by defence budget cuts in 2015 as states continue to identify savings in the wake of the global recession. “Non-military solutions such as national coastguard agencies require improved capabilities and capacities if they are to become a sustainable solution. “An integrated approach, including international public-private co-operation to maintain border security and safeguard the maritime flank is the way forward.”
He added: “While avoiding military levels of expenditure, to be effective, it is important that coastguards are able to implement a more sophisticated and layered application of maritime security. “This requires that they can efficiently manage a range of capabilities, which include surface vessels, helicopters and fixed-wing surveillance aircrafts. Networked operation centres should co-ordinate these assets and share critical information. “Well trained and professionally proficient personnel are essential to achieving this.” Mr Northwood added: “Coastal nations are becoming increasingly cognisant of the need to be able to exploit and protect their maritime flank. Some nations, such as Oman, Egypt, Indonesia and Malaysia, have been highly proactive and have already made significant steps to improve their maritime capabilities. “However, there remains much to be done to ensure coastal states improve their surveillance capabilities, and are able to efficiently coordinate assets. “In particular, it is important that air and surface assets are regarded as essential yet complimentary capabilities.” n
Security Focus | Vol 33 No 2 2015
33
InternationalNews
Paxton and Microlatch integrate Paxton, UK market leader of electronic IP access control and door entry solutions has announced the integration of its networked access control system, Net2, with Microlatch’s BIOFOB range of biometric tokens. The integration offers a higher level of security to Paxton’s existing Net2 infrastructure with the addition of fingerprint authentication, meaning that only verified users can activate the tokens, improving the level of assurance offered. All biometric credentials are stored locally on the BIOFOB, overcoming privacy issues and avoiding the need for additional software or hardware. In keeping with Paxton’s ethos of making straightforward products, adding BIOFOB-ID-PX to a Net2 system is extremely simple. No installation is required. Simply enrol the administrators BIOFOB using the same process as a standard card or token, then allocate it to the authorised user. Net2 software will continue to monitor and manage the user, as it would normally, but with the addition of a biometric layer of security. Additionally, sites will not need to change existing readers as each BIOFOB includes an integral Paxton HiTag2 chip enabling compatibility with all Paxton readers for seamless integration. Chris Burke, Microlatch founder and president, said: “Integrating BIOFOB with Paxton’s Net2 access control is a milestone achieved in Microlatch’s growth plan. Paxton has become the leading access control manufacturer in its field. With this integration agreed and implemented, we can see the future benefits for our customers coming to realisation.” Paxton provides industry-leading access control systems which meet the challenges and trends of the security market. With 30 years’ experience, they offer engineering excellence, creating simple, yet intelligent and innovative products with simplicity designed in, ensuring they are straightforward to install, use and maintain. Net2 is the UK’s most popular access control solution. The IP-based networked security system offers centralised administration and control of sites ranging from one to hundreds of doors, and thousands of users.
Microlatch is synonymous with mobile biometric solutions, and is renowned for wireless mobile security with its encrypted communications devices. With a global reach since 2003, Microlatch’s integration is paramount to offering industry-specific solutions to its partners and customers. Gareth O’Hara, Paxton’s sales and marketing director, said: “Our Net2 access control delivers an easy-to-use, effective solution suitable for buildings of any size. The Paxton and Microlatch integration enhances Net2 access control, providing increased levels of security with the addition of a biometric layer. “We always aim to offer the latest and most appropriate complete solutions for our customers and are excited to be in the position to provide them with what they need. We hope the integration answers demand for a versatile, highly secure system that protects users data.” n
Hikvision announces growth
Hikvision, a global leader in innovative video surveillance products and solutions,
34
has announced revenues of US$2,82 billion for the financial year 2014. This corresponds
Security Focus | Vol 33 No 2 2015
to a 60,37 per cent growth rate year-on-year and a compound annual growth rate over the last decade of 53 per cent. “Hikvision’s continued growth is attributable to our product innovation capability and complete product and integrated vertical solution offerings, as well as the expanding global service network. Keeping in touch with market trends, Hikvision has made stupendous achievements in both domestic and overseas markets in the last year,” says Cynthia He, vice-president at Hikvision. “In 2014, Hikvision invested eight per cent of its annual revenue into research and development. Looking to the future, we will continue to devote our R&D efforts into delivering innovative products and vertical solutions that fulfill the ever-changing needs of the security industry, in the belief that we are ideally placed to provide a complete video surveillance solution to the market globally.” n
PSSPFNews
PSSPF maintains good returns for members
O
ne of the sound achievements by the Private Security Sector Provident Fund (PSSPF) under the present market conditions was attaining a 14,98 per cent average annualised return on investment for its members over the last four years. The investment approach by the Private Security Sector Provident Fund involves employing assets liability modelling which first looks at what the PSSPF’s obligations in monetary terms are towards its members. “Can we today, in theory satisfy everyone needing their monies from the fund? Would the fund be able to meet that commitment financially? Is there enough money available to pay out each individual’s share of the investment? That is the first test the fund applies to make sure that it is always financially sound. “That process is not as simple as choosing some investment portfolios and expecting a return. The PSSPF starts by analysing a few aspects with implications on its stakeholders, such as certain demographics of member’s age and how many years do they have left until retirement,” said Costa Diavastos, chairperson of the PSSPF Investment Committee. According to Mr Costa, members must be paid out proper retirement benefits upon reaching the age of 65. The fund’s approach is to look at how many years members have until retirement. This is also with the realisation that at least 90 per cent of all the members existing on the fund leave the industry long before retirement and only a few remain invested until retirement. “The above impacts on the decision of how long should the fund invest members’ monies, bearing in mind that a retirement fund has a long-term view on investment. The fund is not investing to make quick money in a short period of 6-12 months. The aim is to achieve real positive returns to the members over 10, 15 and 20-year periods. But if members leave the fund after three or five years, that changes the way the fund decides to invest, monies or should it rather take a short-term investment approach? Those are the odds with the principles of retirement funding, he said. He indicated that the fund is proactive in dealing with the fund’s asset managers and considering sound advice. The investment sub-committee moves quickly in identifying a particular asset manager or class that is not doing so well and advise the board accordingly, so that immediate action is taken in moving to a better performing investment portfolio. He added that the fund prefers broadening its asset portfolio by investing in stock,
Costa Diavastos
shares, cash and cash-like products when making investment choices. “By doing so, the fund minimises the risk and in getting a combination of local and off-shore investments, it capitalises on benefits inside and outside the country,” he added. He highlighted that the fund maintains a balance in considering local and off-shore investments. “There are five good reasons why the fund also invests off-shore, namely asset and liability matching, tactical asset allocation, diversification, access to unrestricted currency and sovereign risk,” he said. Mr Costa also revealed that the past 12 to 18 months have been an exciting chapter for the PSSPF, as the fund has been exploring investment opportunities in property and diversification across Africa. “Africa’s perceived attractiveness has improved dramatically over the years. The continent has moved from third from the bottom position in 2011 to become the second most attractive investment destination in the world. We have commenced with the selection of property asset managers in Africa, and as a result there has been real good performance over the past three years,” he said. He emphasised that the fund focuses on environmental and social issues with regards to social responsible investing and Black Economic Empowerment (BEE). He indicated that BEE comes into the framework on various levels, i.e. when the fund selects the service providers and asset managers who should have BEE credentials before being considered to render services to the fund. “The asset manager companies have portfolios where the fund can see their top 10 clients and top 20 holdings companies in which they are investing in. The fund ascertains if the asset managers from a BEE
Advertorial
perspective invest responsibly in those companies to ensure that there is true transformation, corporate governance and social ethics. We do not want to be entrusting members’ monies to asset managers who will deal with unethical companies. We make it our business to keep track of everything that is happening,” he added. Mr Costa said the new retirement reform from the National Treasury, if not managed properly, may have an impact on monies that have been invested. That is, if a considerable number of members decide to leave the fund. With the existing regulation, members are able to access their monies as and when they need to. Whereas when the T-Day comes into effect, members’ access to their funds is limited until retirement. However, the new developments will have a nominal effect on PSSPF members. Some members will not be required to annuitise their retirement benefit as it will be less than the R150 000 threshold stipulated by the National Treasury when they reach retirement, he highlighted. He further stated that the fund ensures that any investment decision made is understood and endorsed by the board. This happens in various stages, firstly by making certain that the overarching strategy gets the buy-in, and then the investment committee formulates its mandate to guide how the fund will approach any investment activity. The second process is finding the best category of investment that the fund can invest in. The latter is brought to the consideration of the board for ratification. Once this is attained, the process of monitoring kicks in. This includes monthly reporting to the board on how each manager is performing and also identity areas of under-performance. This strategy is reviewed annually to ascertain if the committee is still on a correct path. “Considering how well the fund has performed from an investment point of view, the challenge will be maintaining the status quo and remaining in that position for the next three-year cycle. Another challenge is non-compliance and some of the bottlenecks in the administration of the fund. This has an effect on the frequency and the amount that has to be invested. Despite these issues, PSSPF has performed well in realising good returns for its members,” said Mr Costa. n
Security Focus | Vol 33 No 2 2015
35
Law&Security
Xenophobia in context
X
By Peter Bagshawe
enophobia is defined as a deepseated irrational or unreasonable hatred or fear of that which is foreign, unusual or strange. Breaking down the elements of xenophobia and building on these can be on an ethnic, racial, religious or linguistic basis. There have recently been a number of incidents that have been classed as xenophobic in South Africa and, before looking at these, it is useful to look at incidents that have happened historically internationally and then review the local trends. The following is not an exhaustive list and is an overview that I selected from a far wider history. The protracted war in the former Yugoslavia between 1991-1995 involved fighting between ethnic and religious groups which resulted in a massive amount of deaths. The groups involved were the Croats, Serbs, Bosnians and Slovaks, and the estimated number of deaths during the period is in the order of 100 000. The ethnic cleansing in Srebrenica started in April 2003, and resulted in an estimated 8 000 Bosnian Muslim men and boys being killed in what is widely regarded as the largest individual instance of ethnic cleansing in one location in the conflict. The Bosnian war has not been officially classified as genocide per se, although Srebrenica has itself been classified as genocide. The 1994 Rwandan genocide started when the Hutu majority, including elements of the army and police, augmented by militias and pressganged civilians, apparently reacting to the downing of an aircraft carrying the Rwandan and Burubdian heads of state, started the systematic killing of minority Tutsis and moderate Hutus. In a 100-day period, the estimated death toll was between 500 000 and 1 000 000 Tutsis which comprised, at the upper level, some 20 per cent of the total population of Rwanda and in the order of 70 per cent of the Tutsis who had not fled Rwanda for neighbouring countries which itself caused an immense refugee crisis. The best documented and researched modern example of xenophobic-based genocide is the holocaust which was perpetrated by the Nazis during World War II. Between 1941-1944, the Nazi administration was responsible for the death of 6 000 000 Jews and 5 000 000 gypsies, Poles, communists or suspected communist sympathisers, homosexuals, Soviet bloc prisoners of war, as well as the mentally and physically disabled. The ethnic cleansing campaign was driven by a political imperative using increasingly sophisticated methods culminated in concentration camps fed by the rail transport
36
systems. Other examples that will not be amplified include the internment and stripping of rights from Japanese in America and Canada during World War II, and the lynching and murder of black families by the Klu Klux Klan over a period in America. A hallmark of the first three, and larger instances referred to above, include institutionalised rape, displacement or enforced relocation, economic deprivation, creation of refugees, a breakdown of family and community bonds and some level of involvement of state or para-statal organisations. In the latter part of 2008, widespread xenophobic attacks led to some 60 deaths of foreign nationals and substantial displacement of foreigners throughout South Africa, as well as the death of 20 South Africans. This necessitated the deployment of a substantial police presence, as well as elements of the South African National Defence Force (SANDF), to stabilise the situation, with a watching brief to maintain order for a period afterwards. In this instance, the targeting of shops was not the driving force and the violence was directed at individuals. Arising from this, the South African Human Rights Commission (SAHRC), was commissioned to report to Parliament’s Portfolio Committee on Justice and Constitutional Development. In the “Report on the rule of law, justice and impunity: institutional responses to the 2008 violence against non-nationals” found that the re-integration of people displaced by the violence was unmonitored and ineffectual. There was involvement of local community leaders in the violence, security forces were unable to prevent the spread of violence, there was a generally poor relationship between the community, police and judicial system, and guidelines were necessary around the deployment of police and the SANDF. From my perspective, the recommendations have not been followed up on and systemic weaknesses remain. Further sporadic outbreaks of xenophobic violence took place in 2011 and 2013.Admittedly, not on the scale present in 2008, and these were largely dealt with by the authorities. The violence that took place in January 2015 was on a larger scale and has been condemned by the national and provincial authorities, the Congress of South African Trade Unions, civic organisations, and religious bodies. The trigger for the violence appears to have been the shooting of a 14-year-old who may or may not have been involved in an attempt to rob a Somali-owned spaza shop in Snake Park. There was a further death in Naledi when police, attempting to protect business interests, reportedly fired into a crowd gathered outside a Pakistani-owned shop with the apparent
Security Focus | Vol 33 No 2 2015
intention of breaking into the shop. Looting spread to Eldorado Park, Langlaagte, Kagiso, parts of Soweto and Durban Deep, where a 74-year-old Malawian shopkeeper was stabbed to death. An estimated 153 arrests have been made for public violence, theft, possession of unlicensed firearms and possession of stolen property. The recent events have involved a high level of opportunistic theft, looting targeting foreignowned spaza shops with a focus on, among other, resaleable items including airtime and foodstuffs, but including the theft of fridges and equipment which appears as a focus shift away from targeting individuals solely on the basis of ethnicity. Unemployment, a lack of opportunities, poverty, poor service delivery, drug and gangrelated acts and dissatisfaction have variously been identified as causes. More disturbingly, the Gauteng City-Region Observatory (GCRO) report of 2014 refers to increasing levels of xenophobia and intolerance of foreigners in Gauteng, with almost a third of those polled calling for the repatriation of foreigners. It is not my intention to diminish the scope and level of attacks which recently took place in South Africa, nor is it intended to deflect attention away from the looting and forced displacement of the Pakistani and Somalian shop owners away from their businesses and into shelters in secured locations. The cross-over of the ethnic targeting of the shops and the criminality of the widespread looting and opportunism, together with allegations of the active involvement of local business associations seeking to protect their interests is deeply concerning, as is the alleged involvement of police or Metro officers in the looting or alleged lack of protective action to safeguard foreign interests by some members of both forces. Given the porosity of South Africa’s borders, the tendency of immigrant communities to bond and assist one another, as well as alleged criminal organisations within some of these communities, the necessity for proactive management of integration and control at a grassroots level becomes apparent. This echoes the HSRC and Witwatersrand University’s African Centre for Migration and Society report recommendations which have, to date, not been implemented. However, given the background of xenophobic incidents internationally, and the scale of these, ignoring xenophobia cannot be allowed locally. n
PETER BAGSHAWE holds a Bachelor of Law degree from the former University of Rhodesia and a Bachelor of Laws degree from the University of the Witwatersrand.
associationNews
A word from the Chairman
Supply and demand
T
he Security Association of South Africa (SASA) is in full agreement with the recent statement by the Congress of South African Trade Unions (Cosatu), made jointly with the South African Transport and Allied Workers Union (Satawu). In the media statement, Cosatu states that it condemns the treatment given to workers that are employed by some of the security companies that are currently providing services to certain government departments. Cosatu adds that it had been informed that many of the security companies working with government are not complying with the laws of South Africa, in terms of paying workers according to the sectoral determination for the security sector. It also called on these companies to comply with the legislation governing the private security industry. It added that it would begin investigations on certain companies that would have to prove their compliance. SASA recently reviewed its strategic objectives, which included our approach towards eradicating the scourge of industry non-compliance. We understand our limitations as an organisation and we are acutely aware that we stand no chance of achieving our objective of eradicating non-compliance if we do not have the support of all the major role players and interest groups associated with our industry.Of the most important role players are the trade unions that organise in our sector. SASA is, therefore, particularly pleased to see that the war against non-compliance is receiving support from Cosatu and Satawu and we look forward to more public support and action from Cosatu and Satawu, as well as the broader trade union movement. Every public statement and action against non-compliance is valuable and important, but the real impact will come from a more coordinated effort. We are already seeing positive steps towards such a co-ordinated effort, but
we still have a very long way to go. We call on government departments to heed the call from Cosatu/Satawu and ensure that they only award security tenders to compliant security companies. In line with the co-ordinated effort mentioned earlier, it will be beneficial to get government departments to participate in established non-compliance forums. As most people will be aware, wage negotiations are currently underway for the sector. While positive progress has been made, the conclusion of an agreement in itself creates one of the biggest threats to compliance in the industry. Non-compliant security companies do not comply or selectively comply with the provisions of the sectoral determination, which follows the conclusion of a collective agreement. SASA’s primary role is to represent its members’ interests in the private security industry. Our membership criteria and processes require compliance to a broad range of requirements from our members. One of our main functions is to act as the collective bargaining agent at industry level. As the leading player at the Bargaining Forum for the Private Security Sector, we have to tread carefully to maintain a balance between a number of opposing factors, including the impact of the increases and other employment conditions on the market and our members, the well-being of our employees, the impact of the increase on non-compliance and the impact of not achieving an agreement. It stands to reason that it will make no sense for us to conclude an agreement at industry level and then not get robustly involved in ensuring that the agreement (amended sectoral determination) is implemented. As such, the promotion of legislative compliance in the private security industry is critical for SASA, and it is our number one priority. We have put in place a robust and aggressive
plan to eradicate non-compliance, but we are largely dependent on the Regulatory Authority for the Private Security Industry (PSIRA) to enforce legislative requirements. There have been a number of successes achieved by PSIRA in the recent past, and progress is being made in setting up coordinated efforts to fight the scourge of noncompliance. Real and material progress will, in my opinion, only be made when the consumers of security services either get prosecuted in terms of the PSIRA Act of 2001 or due to public pressure to stop utilising rogue security companies. The answer is most probably a combination of the two options. Not being an organisation that can enforce legislation, it stands to reason that our efforts will be, among other things, on ensuring that pressure is placed on consumers/ end-users of security services. We call on PSIRA to increase its efforts to prosecute those consumers/end-users who enter into contracts with non-compliant security companies. In line with the Cosatu/Satawu media statement mentioned earlier, government departments specifically should lead by example, and over and above the legal avenues open to PSIRA, it should engage with government at the highest possible level to ensure that our government complies with the laws it creates. As long as there is a demand for cheap unethical operators, they will continue to plague our industry. A critical component in winning the war against non-compliance is to target the consumers of non-compliant security services and to make public the names of such culprits. Watch this space for more information on the war against non-compliance.
The South African Institute of Security (SAIS) will be hosting its 17th annual charity golf day at the Blue Valley Golf & Country Estate, in Midrand, Johannesburg, on Friday, 8 May, 2015. The format will be a four-ball Alliance, with two scores to count and the cost per four-ball will be R4 500 which includes playing fees, golf cart, golf shirt and cap, halfway house costs, prize-giving dinner and cabaret. What more could you ask for?
If you are not a golfer, then why not come along and attend the evening function and prize-giving where you are guaranteed great fun and where you will be most welcome. The organisers are currently looking for sponsors for this event. In the past, one major sponsor was secured for the event but this year, the organisers are seeking several sponsors for the various items such as shirts, caps, prizes, the dinner and/or drinks, and halfway house. Sponsors would receive the maximum
amount of publicity possible, both on the day and afterwards, courtesy of the various security-related magazines, as well as the SAIS website. Interested in sponsoring? Then contact either Reggie or Rosemary on 086 111 1418 or email sais@tiscali.co.za with your interest. The SAIS charity of choice for 2015 will, once again, be “Children of Fire” and a most deserving charity it is. For more details about the charity, visit www.firechildren.org n
Sincerely Chris Laubscher SASA Chairman
SAIS annual charity golf day
Security Focus | Vol 33 No 2 2015
37
Indexofadvertisers
Vol 33 No 2 Advertiser
Page No. E-mail
Website
Active Track
5
info@activetrack.co.za
www.activetrack.co.za
Axis Communications
21
sasha.bonheim@axis.com
www.axis.com/outdoor
Elvey Security Technologies
13,19
info@elvey.co.za
www.elvey.co.za
Guard Track
6
info@guardtrack.co.za
www.guardtrack.co.za
Hikvision Digital Technology
1
overseasbusiness@hikvision.com
www.hikvision.com
Imperial Green Mobility
15
info@imperialgreen.co.za
www.imperialgreen.co.za
Omega Business Trust
OFC
Plaslope
39
glenda.aereboe@plaslope.com
www.plaslope.com
Powelltronics
OBC
marketing@powelltronics.co.za
www.p-tron.com
Private Sector Security Provident Fund
11
Security Association of South Africa (SASA)
IBC
SBV Security Services
7
Securex 2015
IFC
leighm@specialised.com
www.securex.co.za
Simon Workwear
24
sales@simonworkwear.co.za
www.simonworkwear.co.za
Sparks & Ellis
25
www.omegasol.com
www.psspfund.co.za info@sasecurity.co.za
www.sasecurity.co.za www.sbv.co.za
www.sparks.co.za
Subscribe to To: Security Publications SA (Pty) Ltd, PO Box 414, Kloof, 3640 Tel: (031) 764-6977 Fax: (031) 764-6974 E-mail: jackie@contactpub.co.za p Yes, please, I would like to subscribe to Security Focus. (Cost: R525,00 per year). (RSA Only) The subscription includes an annual Buyer’s Guide. p Enclosed please find cheque to the amount of R............................... p Please start my subscription from the..........................................issue. Do you require a tax invoice p Yes p No (If yes, one will be sent to you on receipt of your payment.)
Banking Details: First National Bank, Kloof Branch Code: 221526 Account Number: 50730011968 Account Name: Security Publications SA (Pty) Ltd
NB: Please make cheques payable to Security Publications SA (Pty) Ltd Name:....................................................................................... Signature:................................................................................................... Date:............................................Company:.................................................................. Position:................................................................. Address....................................................................................................................................................................Code:........................... Tel:..........................................................................................................Fax:................................................................................................
38
Security Focus | Vol 33 No 2 2015
Calendar
Calendar of security conferences, events and exhibitions of interest to the security industry – both local and international LOCAL EVENTS: 2015
March 24-25: Sectech Norway 2015. Venue: Oslo Kongressenter, Oslo, Norway. More information: Ar Media International. Tel: +46 8 556 306 80. E-mail: deniz.baykal@armedia.se Website: www.sectech.nu
May 12-14: SECUREX 2015. Venue: Gallagher Convention Centre, Midrand, Johannesburg. More information: Joshua Louw. Tel: (011) 835-1565. E-mail: joshual@specialised.com
March 25-28: Security Expo. Venue: Inter Expo Centre, Sofia, Bulgaria. More information: Bulgarreklama Agency. Tel: +359 2 9655 275. E-mail: safetysecurity@iec.bg Website: www.securityexpo.bg
September 6-9: CAMPROSA Annual Conference. Venue: Table Bay Hotel, Cape Town. More information: John Tunstall. Tel: (028) 313-1711. E-mail: jtunstall@ iafrica.com. Website: www.camprosa.co.za
April 13-16: MIPS Moscow 2015. 21st Moscow International Protection, Security and Fire Safety Exhibition. Venue: All-Russian Exhibition Centre, Moscow, Russia. More information: ITE Group, Agnius Kazalauskas. Tel: +44 20 7596 5079. E-mail: agnius.kazlauskas@ite-exhibitions.com Website: www. securityshows.com
INTERNATIONAL EVENTS: 2015 March 3-6: SECURITY SHOW 2015. Japan’s largest Trade Fair for the Security & Safety Industry. Venue: Tokyo International Exhibition Centre, Tokyo, Japan. More information: Space Media Japan Co., Ltd. Tel: +81 3 3512 5670. Fax: +81 3 3512 5680. E-mail: tradefairs2015@smj.co.jp Website: http://messe. nikkei.co.jp/en
April 14-16: Interpol World 2015. Venue: Sand Expo & Convention Centre, Singapore. More information: Interpol, David Lim. Tel: +65 6389 6614. E-mail: davidlim@mpinetwork.com. Website: www.interpol-world.com April 15-17: ISC West. Venue: Sands Expo, Las Vegas, US. More information: Reed Exhibitions. Tel: +203 840-5831. E-mail: ssessa@reedexpo.com Website: www.iscwest.com
March 5-7: IFSEC Istanbul. Venue: Lutfi Kirdar Convention Centre, Istanbul, Turkey. More information: UBM. Tel: +44 (0)20 7921 8057. E-mail: kristan. johnstone@ubm.com Website: www.ifsec-istanbul.com
October 21-23: CAIPS 2015. 8th Central Asian International Protection, Security and Fire Safety Exhibition. Venue: Uzexpocentre, Tashkent, Uzbekistan. More information: Agnius Kazalauskas. Tel: +44 207 596 5079. E-mail: security@ite-events.com Website: www.ite-exhibitions.com
March 7-8: Africa Hotel Security Expo and Conference. Venue: Arusha International Conference Centre, Arusha, Tanzania. More information: E-mail: hotelsecurityexpo@hospitalityafricagroup.com March 10-12: ISC Brasil 2015. Venue: Expo Centre Norte, Sáo Paulo, Brazil. More information: Reed Exhibitions. Tel: +55 11 2129-6303. E-mail: isc-expo@ reedalcantaranews.com.br Website: www.iscbrasil.com.br
INTERNATIONAL EVENTS: 2016
March 11-13: AIPS 2015. 5th Almaty International Protection, Security, rescue and Fire Safety Exhibition. Venue: Atakent Exhibition Centre, Almaty, Kazakhstan. More information: Agnius Kazalauskas. Tel: +44 207 596 5079. E-mail: security@ite-events.com Website: www.ite-exhibitions.com
February 24-27: SIPS South Russia 2016. 7th South Russian International Protection and Security Exhibition. Venue: Krasnodarexpo EC, Krasnodar, Russia. More information: Agnius Kazalauskas. Tel: +44 207 596 5079. E-mail: security@ite-events.com Website: www.ite-exhibitions.com
Tel: Fax: E-mail: Web:
+27 (0) 11 452-1115 +27 (0) 11 452-3609 glenda.aereboe@plaslope.com www.plaslope.com
TAMPER EVIDENT SECURITY BAGS l l l l l l
Reliable, permanent, special security closure to show evidence of tamper The closure system shows evidence of tamper by freezing, heat, aqua and solvent The bags are manufactured from high strength coextruded LDPE clear or opaque film Bags can be customised to your specification with high quality print of up to 5 colours (5 sizes of standard stock printed bags are also available ) Bags have a unique sequential number or barcode For security purposes the bags are printed along the edge of the side seals
SOUTH AFRICA’S LEADING SECURITY PACKAGING COMPANY
Under Licence to
DEBATIN Security Focus | Vol 33 No 2 2015
TM
39
Directory
SECURITY ASSOCIATION OF SOUTH AFRICA (SASA) SASA OFFICE BEARERS
REGIONAL OFFICE BEARERS
ADMINISTRATION
Suite 147 Postnet X2, Helderkruin 1733
Gauteng: Christiaan Oelofse E-mail: coelofse@adt.co.za Cell: 082 339-3398
National Administrator: Tony Botes Cell: 083 272 1373 E-mail: info@sasecurity.co.za Fax: 0866 709 209
National President: Costa Diavastos Cell: 082 498-4749 E-mail: costa.diavastos@za.g4s.com National Chairman: Chris Laubscher Cell: 082 441-4092 E-mail: chrisl@bidvestmagnum.co.za National Deputy Chairman: Marchel Coetzee Cell: 084 440-0087 E-mail: marchel_coetzee@omegasol.com
KwaZulu-Natal: Gary Tintinger E-mail: garyt@enforce.co.za Cell: 084 429 4245 Western Cape: Koos van Rooyen E-mail: kvanrooyen@thorburn.co.za Cell: 082 891-2351
Accounts: Yolandi Evans Cell: 061 470-8736 E-mail: accounts@sasecurity.co.za Fax: 0862 124 142
OTHER SECURITY AND RELATED ASSOCIATIONS AND ORGANISATIONS PSIRA — Private Security Industry Regulatory Authority, Eco Park, Centurion. Tel: (012) 003 0500/1. Independent Hotline: 0800 220 918. E-mail: info@psira. co.za Director: Manabela Chauke. Council Members: Mr T Bopela (chairperson); Ms Z. Holtzman (vicechairperson); Advocate A. Wiid (council member); and Commissioner A. Dramat (council member). APPISA – Association for Professional Private Investigators SA, Box 8064, Minnebron 1549. Cell: 073 371-7854 or 072 367-8207. Fax: 086 689-0166. E-mail: info@appelcryn.co.za. Website: www.appelcryn.co.za. President: Ken Appelcryn. Secretary: Dianne. ASIS International — Johannesburg Chapter No. 155. Box 99742, Garsfontein East 0060. Tel: (011) 652-2569. Website: http://www.asis155jhb.webs.com/ President/ Chairperson: Johan Hurter. Secretary: Chris Cray. ASIS International — Chapter 203: Cape Town – South African security professionals. President/Chairman: Yann A Mouret, CPP. Secretary: Eva Nolle. Tel: (021) 785-7093. Fax: (021) 785-5089. E-mail: info@aepn. co.za. Website: www.asis203.org.za bac — Business Against Crime, Box 784061, Sandton 2146. Chairman: James Fitzgerald. Tel: (011) 8830717. Fax: (011) 883-1679. E-mail: denise@bac.org. za. Eastern Cape: Box 40078, Walmer 6065. Tel: (041) 373-6401. Fax: (041) 373-6402. E-mail: info@bacec. co.za. Western Cape: 12th Floor Picbel Arcade, Strand Street. Tel: (021) 419-2044. Fax: (021) 419-2066. E-mail: jackie@bacwcape.co.za KwaZulu-Natal: 2 Hopedene Grove, Morningside, Durban 4001. Tel: (031) 207-8273. Fax: (031) 207-3900. Provincial manager: Jody Nair, e-mail jody@backzn.co.za Mpumalanga: Box 430, White River 1240. Tel: David Pretorius (general manager) (013) 751-3188. Fax: (013) 744-3555. Cell: 083 2735515. E-mail: david@bac_mp.co.za; or Ed Coombes (chairperson) 082 807-3916, fax (013) 752-6002, e-mail: ed.coombes@worldonline.co.za. North West: Postnet Suite 4415, Private Bag X82323, Rustenburg 0300; Charles Kendall (managing director) tel/fax: (014) 5923591, e-mail: charles.kendall@lonplats.com. Limpopo: Box 784061, Sandton 2146. Tel: (011) 883-0717; fax (011) 883-1679; e-mail: info@bac.org.za. Free State: Box 784061, Sandton 2146. Tel: (011) 883-0717; fax (011) 883-1679; e-mail: info@bac.org.za. CAMPROSA — Campus Protection Society of Southern Africa. President: Roland September. Tel: (021) 650-4858. E-mail: roland.september@uct.ac.za. Vice President: Derek Huebsch. Tel: (041) 504 2490. E-mail: derek. huebsch@nmmu.ac.za. Executive Secretary: John Tunstall. Tel: (028) 313 1711. E-mail: jtunstall@iafrica.com. Web: www.camprosa.co.za. CENSEC — Centre for the Study of Economic Crime. Director: Louis de Koker. Tel: (011) 489-2134. E-mail: ldekoker@uj.ac.za CISA — Cape Insurance Surveyors Association. Shahid Sonday (021) 402-8196. Fax: (021) 419-1844. E-mail: shahid.sonday@saeagle.co.za; or Mike Genard (021) 557-8414. E-mail: mikeg@yebo.co.za DRA — Disaster Recovery Association of Southern Africa, Box 405, Saxonwold 2132. Chairman: Grahame Wright, Tel. (011) 486-0677, Fax (011) 646-5587. Secretary/ Treasurer: Charles Lourens, Tel. (011) 639-2346, Fax (011) 834-6881. EFCMA — Electric Fencing and Components Manufacturers Association, Box 411164, Craighall 2024. Tel: (011) 326- 4157. Fax: (011) 493-6835. Chairperson: Cliff Cawood 083 744-
40
2159. Deputy chairperson: John Mostert 082 444-9759. Secretary: Andre Botha 083 680-8574. ESDA — Electronic Security Distributors Association, Box 17103, Benoni West 1503. Tel: (011) 845-4870. Fax: (011) 845-4850. Chairperson: Lee-Ann Andreka. Secretary: Shirley James. Website: www.esda.org.za ESIA — Electronic Security Industry Alliance, Box 62436, Marshalltown 2107. Tel: (011) 498-7468. Fax: 086 570 8837. Cell: 082 773-9308. E-mail: sia@iburst.co.za or steveconradie@iburst.co.za. Web: www.securityalliance. co.za FDIA — Fire Detection Installers Association, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: 087 808 7527. Fax: 086 518 4376. E-mail: fdia@fdia.co.za. Website: www.fdia.co.za President/Chairperson: Matt Kielty. Secretary: Jolene van der Westhuizen. FFETA — The Fire Fighting Equipment Traders Association, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157. Fax: 086 518 4374/ (011) 455-4126. E-mail: ffeta@tiscali.co.za. Website: www.ffeta.co.za. Chairperson: Astrid Wright. Vicechairperson: Meshack Gabeni. FPASA — Fire Protection Association of Southern Africa, Box 15467, Impala Park 1472. Tel: (011) 397-1618. Fax: (011) 397-1160. E-mail: library@fpasa.co.za. Web: www.fpasa.co.za. General Manager: David Poxon. GFA—Gate&FenceAssociation,Box1338,Johannesburg 2000. Tel: (011) 298-9400. Fax: (011) 838-1522. Administrator: Theresa Botha. HCSA — Hotel & Casino Security Association, Box 91728, Auckland Park 2006. Chairman: Dick Glanville, Tel: (011) 447-2700, Fax: (011) 447-3276. Vice-chairman: Frans Joubert, Tel: (011) 898-7333. Secretary/Treasurer: Graham Bendell, Tel (011) 728-4405; Cell 082 699-2392. HSA — Helderberg Security Association, Box 12857, N1 City Parow 7463. Tel: (021) 511-5109. Fax: (021) 511-5277. E-mail: info@command.co.za. Website: www. command.co.za. Chairperson: Stephen van Diggele. IFE — Institution of Fire Engineers (SA). Treasurer: A.E. Greig, Box 1033, Houghton 2041. Tel/Fax: (011) 7884329. E-mail: adminstaff@ife.org.za Website: www.ife. org.za. President: John Khoza Mpiyakhe. Secretary: Lindi Mujugira. ISA — Insurance Surveyors Association, Box 405, Saxonwold 2132. Chairman: Graham Wright (011) 4860677. Vice-chairman: Alan Ventress. Secretary: Alex dos Santos. LASA — Locksmiths Association of South Africa, Box 4007, Randburg 2125. Tel: (011) 782-1404 Fax: (011) 782-3699. E-mail: lasa@global.co.za Website: www.lasa. co.za President/Chairman: Alan Jurrius. Secretary: Dora Ryan. NaFETI — National Firearms Education and Training Institute, Box 181067, Dalbridge 4014. Chairman: M.S. Mitten. Vice: Ken Rightford (033) 345-1669. Cell: 084 659-1142. NaFTA — The National Firearms Training Association of SA, Box 8723, Edenglen 1613. National Chairman: Peter Bagshawe.Tel: (011) 979-1200. Fax: (011) 979-1816. E-mail: nafta@lantic.net POLSA — Policing Association of Southern Africa. Tel: (012) 429-6003. Fax: (012) 429-6609. Chairperson: Anusha Govender, 082 655-8759. PSSPF — Private Security Sector Provident Fund. Contact: Jackson Simon. Cell: 072 356 6358. E-mail: jackson@psspfund.co.za. Website: www.psspfund.co.za SAESI — Southern African Emergency Services
Security Focus | Vol 33 No 2 2015
Institute, Box 613, Krugersdorp 1740. Tel: (011) 6605672. Fax: (011) 660-1887. President: DN Naidoo. Secretary: Mrs S.G. Moolman. E-mail:saesi@mweb. co.za SAIA — South African Insurance Association, Box 30619, Braamfontein 2017. Chief Executive: B. Scott. Tel: (011) 726-5381. Fax: (011) 726-5351. E-mail: faith@saia.co.za SAIDSA — South African Intruder Detection Services Association, Association House, P O Box 17103, Benoni West 1503. Tel: (011) 845-4870. Fax: (011) 845-4850. E-mail: saidsa@mweb.co.za Website: www.saidsa.co.za President/Chairman: Johan Booysen. Secretary: Cheryl Ogle. SAIS — South African Institute of Security, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157 or 0861 111 418. Fax: 086 518 4374/ (011) 455-4126. E-mail: SAIS@tiscali.co.za. Website: www.instituteofsecurity.co.za. Chairman: David Dodge. Vice-chairman: Mike Verster. Administrative Manager: Rosemary Cowan. SAN — Security Association of Namibia, Box 1926, Windhoek, Namibia. Administrator: André van Zyl. Tel: +264 61 205 2264. Fax: +264 61 205 2350. E-mail: pagvz@nampower.com.na SANSEA — South African National Security Employers’ Association, Box 9553, Edenglen 1613. Administrators: SIA, Box 62346, Marshalltown 2107. Tel: (011) 498-7468. Fax: (011) 498-7287. E-mail: sia@iburst.co.za. SAPFED — Southern African Polygraph Federation. President: Ben Lombaard 083 793-1152. Secretary: Amelia Griesel 082 786-3347. E-mail: info@sapfed.org. Website: www.sapfed.org SAQCC FIRE — South African Qualification Certification Committee, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157. Fax: 086 518 4374. E-mail: saqccfire@tiscali.co.za. Website: www.saqccfire. co.za Management Committee: Chairman: Brett Jones. Vice-Chairman: Duncan Boyes. SAQCC Fire – 1475 Committee: Chairman: Tom Dreyer. Vice-Chairperson: JJ Scholtz. SAQCC Fire – Detection & Suppression Committee: Chairman: Matt Kielty. Vice-Chairperson: Laura Swart. SARPA — South African Revenue Protection Association, Box 868, Ferndale 2160. Tel: (011) 7891384. Fax: (011) 789-1385. President: Naas du Preez. Secretariat: Mr J. Venter, Van der Walt & Co. SDOA — Service Dog Operators Association, Box 49554, Hercules 0030. Tel: (012) 376-2152/3. Fax: (012) 376-2359. E-mail: company@ppscanine.co.za Chairperson: Mr F. van Kraayenburg. Tel: (012) 376-2266. SIA — Security Industry Alliance, Box 62436, Marshalltown 2107. Tel: (011) 498-7468. Chief Executive Officer: Steve Conradie. Website: www.securityalliance. co.za SKZNSA—SouthernKwaZulu-NatalSecurityAssociation. Tel: (039) 315-7448. Fax: (039) 315-7324. Chairman: Anton Verster – 082 371-0820. VESA — Vehicle Security Association of South Africa, Box 1468, Halfway House 1685. Tel: (011) 3153588/3655. Fax: (011) 315-3617. General Manager: Niresh Reddy. VIPPASA — VIP Protection Association of SA, Box 41669, Craighall 2024. Tel: 082 749-0063. Fax: 086 625-1192. E-mail: info@vippasa.co.za. Website: www.vippasa.co.za. Enquiries: Chris Rootman. Cell: 082 749 0063.E-mail: vippasa@protectour.co.za