White Collar Crime
South Africa’s biggest business scourge Billions of rands are being lost annually to the South African economy, and every single company needs to know how to combat white collar crime.
R149
inclusive of VAT and postage
But stocks are limited! First come, first served basis So, what’s included in this book? Here’s a table of contents ... • Establishing an Ethical Culture • Establishing Policy for Dealing with White Collar Crime
• Prevention and Combating of Corrupt Activities Act • Prevention of Banking Related Crime
• Risk Assessments
• Computers and Computer Crime
• Internal Controls
• Investigation
• Fraud Prevention
• Preparing for Trial
• The Crime Response Plan
• Money Laundering
• The Recovery of Assets
• A Disclosure Service: A Critical Component of a Risk Management Strategy
• A Practical Approach to the Prevention of Corruption
• Verification Services
PURCHASE ORDER To: Contact Publications (Pty) Ltd. Please send me ………. copies of Dealing with White Collar Crime at a total of R149 per copy inclusive of VAT, local postage and packaging. This order is being submitted via (tick relevant box): p POST at P O Box 414, Kloof 3640, KwaZulu-Natal, South Africa, along with a cheque made payable to Contact Publications (Pty) Ltd. p Fax at 031 764 6974, plus cheque to P O Box 414 as above or proof of EFT as below. p Email to accounts@contactpub.co.za plus cheque as above or proof of EFT made into FNB current account 50730106925, Kloof branch code 221526
Name................................................................... Position: .............................................................. Company:......................................................................................................................................... Address: .......................................................................................................................................... ............................................................................................................... Code: ............................... Tel: .......................................................................... Fax : ............................................................... Cell:..............................................................Email:.......................................................................... Contact Publications physical address: Suite 1, Fields Shopping Centre, Old Main Road, Kloof 3610, KwaZulu-Natal, South Africa. Telephone: +27 (0) 31 764-6977 For overseas postage rates and also bulk discounts for ten copies or more, contact Lynette Taylor at lynette@contactpub.co.za
Contents page SERVING THE SOUTH AFRICAN SECURITY
Cover Story
INDUSTRY FOR 33 YEARS
Features 10 Special Feature: Control Rooms & Communication
The special feature in this month’s Security Focus highlights control rooms and communication and Active Track; Wright Surveillance; Risco Group; Instacom; and EMC update readers on what’s new on the market.
22 Research Note
Blake Kozak, principal analyst for Security and Building Technologies at IHS Inc, identifies growth in the access control industry; John Cropley, principal analyst for video surveillance equipment for IHS Inc, discusses how the rapid growth in the global market continued in 2014; and Oliver Philippou, senior analyst for IHS Inc, tells us how technology changes will drive the market to $500 million by 2019.
28 Business Against Crime
8 Bidvest Protea Coin Bidvest Protea Coin, a leader in innovative
In this issue, the chapter on risk assessments in the book, Dealing With White Collar Crime, has been published in its entirety to give readers an idea of the important information available to them when purchasing a copy of this valuable book.
technology, believes that its differentiating contributions add enormous value to its estate security solutions.
12
10
Security Focus
Advertising enquiries:
is published by the proprietor Contact Publications (Pty) Ltd (Reg No. 1981/011920/07)
Tel: (031) 764-6977 Fax: (031) 764-6974 e-mail: contact@secpub.co.za Publisher: Godfrey King Editor: Andrea Müller Production Leader: Colleen McCann Official Journal of the Security Association of South Africa
Layout & Design: Beth Marchand Subscriptions: Jackie Goosen
Bernadette Fenton
Cell: 082 443 8931. Fax: (031) 764-6974 e-mail: bernadette@secpub.co.za
VOL 33 NO 7 2015
ISSN 1022 6427
18
20
Regulars 4 Comment
31 Opinion Piece
All creatures great and small.
6 News
Why jeopardise AGOA with new restrictions?
32 International News
18 Company News
• How to keep your business safe during a blackout. • Linhai to serve in Servest. • IndigoVision and MASS strengthen ties. • Hikvision strengthens local presence in SA. • New staff appointments at ADT.
24 Opinion Piece
Security Focus spoke to Guillaume Lefevre, Morpho vice- president of market development and sales during his recent visit to South Africa about Morpho’s significant growth in Africa and some of the global trends dominating the international biometrics and access control market.
25 On The Market
• Whistle blowing needed at SA schools. • Making the right security choice. • Taking T&A off-site.
Kalvin Subbadu, WD components sales manager, South Africa, chatted to Security Focus recently about WD’s latest technology developments and new capacities in the surveillance hard drive arena.
• ACT secures Welsh school. • New security capabilities from GJD. • SIA commends US Senate. • Alpro at historic building in West End. • Avigilon appoints new CFO. • Hikvision honoured by ESA.
36 International Opinion
How will integrated MNS change the industry?
37 Law & Security
When an order of court is not acted upon.
38 39 40
Index of Advertisers Calendar Directory
31 Head Office physical address: Suite 1, Fields Shopping Centre, Old Main Road, Kloof 3610 Postal address: P.O. Box 414, Kloof 3640, South Africa Publication details: Security Focus is published monthly Printed by: Paarl Media KZN, 52 Mahogany Road, Westmead. www.paarlmedia.co.za
www.twitter.com/SecurityFocusza
Subscription rates: Annual subscription for magazine posted in Republic of South Africa is R525 including VAT and postage. Subscription rates for addresses outside South Africa can be obtained on application to the Subscription Department, Box 414, Kloof 3640. Editorial contributions: Editorial contributions are welcome. For details please contact the Editor, Security Focus, on Tel: (031) 764-6977, or Fax: (031) 764-6974, or write to the editorial office address detailed elsewhere in this column.
35
Security Focus is a member of
editors comment
All creatures great and small
T
ake the star of a Zimbabwean National Park, add some unflattering photos of the American dentist who hunted him, multiply with social media, and take away all sense of reason and accountability – and the world goes wild. The international outrage over the killing of Cecil the Lion could go down in history as a fascinating case study of people’s pyschy. International celebrities, who were previously completely unaware of Cecil’s existence have added their voices of condemnation, some have broken down in tears on international television, while the rest of the world, divided into those who care too much and those that don’t care enough, fling daring, yet anonymous, insults
back and forth over Twitter and Facebook. Everyone doing their part as usual. Not for one second am I condoning what happened to Cecil, but one can’t help understanding why the Zimbabwean people are more than baffled about all of the attention. After all, if you live in a country where the economy is non-existent, if you’ve witnessed time and again how the value of human life means nothing, and hundreds of people are murdered daily for their money or property – the life of a wild animal could well be the last thing on your list of things to be concerned about. Despite the atrocities that have been committed against the people of Zimbabwe over the last few years, this incident is the one that’s made it around the world and back as a worthy cause. Shame on us. On a completely different note, the Security Association of South Africa (SASA) has announced the establishment of a SASA Skills Development Committee. This follows a series of meetings between members of the Association’s executive committee and the Administrator of SASSETA, as well as other industry employer bodies. Apparently the Administrator of SASSETA has requested that the private security industry provide SASSETA with regular feedback and a list of training priorities. In response to this request SASA has established the Development Committee, which will meet quarterly to consolidate industry training priorities and list matters of concern related to Skills Development. The SASA Skills Development Committee will meet with SASSETA and provide feedback to its members on progress made at these meetings with the Administrator. SASA has encouraged companies outside of the guarding sector to come on board as well, as it says that it requires input from as many companies as possible. Having met for the first time on 27 July, the Committee is now finalising skills priorities for the sector to be presented to SASSETA for inclusion in the Sector Skills Plan. SASA adds
that it is also engaging with the Administrator of SASSETA with the view of reconstituting the Private Security Sector Chamber. The Administrator of SASSETA has also requested that SASA plays a facilitative role in streamlining complaints and issues with the SETA, which can be put forward directly to the Administrator. This will not replace normal communication channels with the SETA, but may speed up the resolution of training issues, as well as highlight trends and areas of poor service. The SASA Skills Development Committee has appointed Eugene Fowlds from Stallion Security to co-ordinate issues raised. Should members have any concerns or complaints with regards to their interaction with SASSETA, they may send their concerns directly to Eugene at eugenef@stallion.co.za who will summarise the issues and facilitate communication to SASSETA. SASA requests that members include as much clear and concise information as possible in order to facilitate a favourable outcome. The Security Industry Alliance has announced that it will, once again, be hosting The Crime Prevention Award Banquet on Tuesday, 6 October 2015. Have any of your employees committed an act of bravery or encountered danger while on duty, or assisting others in the prevention of crime? Are you aware of an individual who has made a major contribution to the protection of people and their property? If the answer is yes, then you need to contact the Security Industry Alliance today and nominate these individuals for recognition from the industry. All nominations will be judged by a committee consisting of the Security Industry Alliance Executive Members. Contact SIA directly on sia@ iburst.co.za or visit www.securityalliance. co.za for further information on categories and to access the nomination form. Andrea Müller Editor andrea@writescene.co.za
Editorial Policy Statements made or opinions expressed in articles in Security Focus do not necessarily reflect the official views of the Security Association of South Africa (SASA) nor those of any of the other security associations listed in Security Focus. Similarly, advertising in this publication does not imply in any way endorsement or approval by these security associations of any products or services. It is the policy of the Security Association of South Africa that any office-bearer who has an executive position in a company, or companies, which supply security products or services should on no account allow his position to be used to promote his company or its objectives in the editorial content of Security Focus, the official journal of the Association. If, at any time, an office-bearer’s position has been quoted in relation to his company or product, this does not imply the Association’s approval or involvement.
4
Security Focus | Vol 33 No 7 2015
The Ideal Personnel Monitoring Solution
Two-way voice communication device Personal protection system NEW FEATURE - Failed to Start Alarm RFID reader, panic function GSM/SMS/Voice Durable, waterproof housing Tamper proof 24 hour battery life. 2 hours for a full charge
The Active Track unit is designed to be a modern, user-friendly device, which is both shock and water resistant. Active Track has a host of applications and many benefits to its users, both commercial and private. This unit offers a fully automated notification system about a life-threatening situation due to its Man Down motion sensor and fall detection technology. The tamper detection alert is detected upon excessive shock to the device which sends a notification through to the monitoring software. Additionally, an alert is sent to the monitoring software, should any unauthorised person try and open the device.
Tel: 011 551 1687 | Fax: 086 218 2928 Twitter: @ActiveTrackRSA
www.activetrack.co.za Terms and Conditions Apply
NEWS
Why jeopardise AGOA with new restrictions? After making the difficult compromise of allowing more US poultry into South Africa to ensure the renewal of the African Growth and Opportunity Act (AGOA), why would South Africa now jeopardise that renewal by introducing foreign ownership restrictions by signing the Private Security Industry Regulatory Amendment Act into law?
T
his is a question raised by Sarah Truen, a senior economist at independent consulting firm DNA Economics. She was commenting on the release of the firm’s report which analysed the likely costs of implementation of clause 20(d) of PSIRA, which will force foreign-owned private security firms to sell at least 51 per cent of their businesses to South Africans. The Act is with the president awaiting signature. The report was commissioned by the Security Industry Alliance (SIA), which represents the interests of both local and international private security companies in South Africa. One of the elements the report examined was the value at risk in respect of international trade agreements. One of the key agreements at risk is AGOA, which has just been renewed by the US Senate. This trade agreement has been estimated
On Line/Live Units Radio or GPRS up to 4 Patrols per unit
Historical Systems For Single / Multiple Site Application No wiring required on site For more information Please visit www.guardtrack.co.za or contact Dane/Brad Tel: 011-784 3803/4 Fax: 011-784 3805 email: info@guardtrack.co.za
6
by the dti itself as being extremely valuable to the domestic economy, allowing 27 per cent of South African goods exported to the US to enter duty free, which was estimated to add 2,78 per cent to South African manufacturing GDP, and 11 per cent to manufacturing employment in 2010. Ms Truen says: “Restricted access to the South African market for American poultry producers was a stumbling block in AGOA’s renewal, but South Africa compromised by allowing greater access for US chicken producers to ensure that renewal occurred, even though an impact on local production is expected. “Dti made this difficult choice because AGOA as a whole is perceived to be so valuable to the South African economy. “However, this compromise may have been in vain if the issues in the security industry legislation are not addressed. “The current version of AGOA now includes an out-of-cycle review provision, which allows the US president to terminate or suspend the AGOA membership of any country which is found to be in contravention of the AGOA Act. “The elimination of trade barriers is one of the specific requirements for access to AGOA, and the US has already expressed concerns about the foreign ownership restriction in PSIRA. “Enactment of clause 20(d) of PSIRA would thus likely be sufficient to cause South Africa to fail an out-of-cycle review, and lose access to AGOA. “Restrictions on foreign ownership such as those proposed by PSIRA will impose a real cost on the South African economy. Closed, autarkic economies are known to perform worse than open economies. “In a global economy, countries need to be open and friendly to international investors. “North Korea is an extreme example of an autarkic state, but it illustrates the disastrous consequences of this kind of national economic self-sufficiency.” In addition to the economic impact via trade in services, the DNA Economics report examined the role foreign-owned private security firms play in the wider South African security environment, risk to investor value and the impact on the equipment manufacturing industry. Risk to value The report found that the proposed amendment
Security Focus | Vol 33 No 7 2015
would result in substantial risk to the value of the international firms currently operating in South Africa (ADT, Chubb, G4S, Securitas and major multi-national companies that supply, manufacture, install and distribute equipment to the private security industry). Ms Truen says: “Where the parent company is uncomfortable with holding only a minority share, which is likely where brand identity and intellectual property are at stake, they would divest of their entire local stake. “Furthermore, it would result in the foreignowned firms all having to simultaneously go to the market, with local investors having the ability to shop around and drive the cost of assets down. “Because these firms will either partially or entirely lose the technical, strategic and financial support of their parent company, they will also lose real value. The net effect will be that assets will be sold at below their true value, to the detriment of investors. “But, the greater cost is likely to come in the form of reduced incentives for international firms to invest both in the private security industry and other sectors out of fear of an increased risk of expropriation in the economy.” Ms Truen also says the reduction in company value may seem to benefit local players, but it will negatively impact customers. “The proposed amendments will require investors to sell their assets, which may result in industry consolidation, and will raise industry entry barriers, both of which will tend to local competition. “Less competition is, in turn, likely to result in higher prices and less effort to continuously improve service quality.” Crime-related costs In its analysis, DNA Economics found that there may be substantial crime-related costs as a result of the implementation of the foreign ownership restrictions. Private security firms act as a complement to SAPS, and fulfil a different role to the police. Foreign-owned private security firms help to implement international best practices in security services locally, and ensure that the private security business is optimally placed to mitigate against the effects of crime as much as possible. Ms Truen says the proposed legislation will
NEWS
undermine these knowledge transfers, and reduce the deterrence effect of the industry on crime levels. “Furthermore, foreign ownership has played a substantive role in the ability of the industry to tackle cash-in-transit crime. “This has been felt both because of the transfer of international best practice from international shareholders, and also because of the enhanced ability of large multi-nationals to offer financial guarantees against losses. “A reduction in the ability of banks to access adequate guarantees against cash losses may be a material effect of the proposed legislation.” Equipment manufacturers The proposed amendments to the Act will also include multi-national companies that supply, manufacture, install and distribute equipment to the private security industry. The report highlights the effect of the amendments on foreign-owned private security equipment manufacturers operating and active within South Africa. Ms Truen says, like security firms, equipment manufacturers are likely to dis-invest rather than lose control of their brand locally.
Products will thus be supplied in South Africa through agencies rather than directly through the manufacturer, which will result in an immediate decrease in the level of client support provided, as well as a reduced ability to customise equipment to suit client needs, and a reduction in the availability of spare parts and system expansions. The foreign-owned entities active which may be affected include, but are not limited to, Bosch, Sony, Apple, Samsung, Panasonic and even listed local firms with majority foreign shareholding, such as Bidvest. The most astute economic decision would be to remove Section 20(d). The process of developing policy and legislation can introduce significant uncertainties into the economic environment. It is essential that the costs and benefits of legislative changes are examined before they are implemented, as unintended consequences can have disastrous impacts on economic outcomes, which often cannot be easily unravelled. The economic cost implications for Section 20(d) are substantial, and arise in a number of areas. Some of the most likely and possibly also most substantial of these costs would be triggered
by a destabilisation of our relationships with important trading partners such as the US and the EU, and the trade litigation and loss of trade in services liberalisation benefits which would result. It is difficult to see how the proposed amendment could generate benefits sufficient to outweigh these costs, particularly given the strict regulations on the employment of foreign nationals in private security that are already in place. In contrast, the removal of clause 20(d) would send an important signal to our trading partners that South Africa intends to honour its trade commitments, and remains supportive of the private property rights of international investors. Our international trade position is of importance both to the achievement of South Africa’s longer term growth objectives, and as a short-term priority, given the current deterioration in our trade position. The removal of clause 20(d) would thus be the correct strategic decision for the wider economy, as well as the sector. n
For a full copy of the report contact dani@prologconsulting.co.za
Security Focus | Vol 33 No 7 2015
7
Cover story
8
Security Focus | Vol 33 No 7 2015
SpecialFeature:Controlrooms&communication
Active Track stands out from the crowd Understanding customer requirements, differentiating from the competition and providing excellent after-sales support are some of the key factors which have contributed towards Active Track’s significant growth in the marketplace over the past year.
A
ctive Track’s two-way communication unit has gained significant traction in the market for its simplicity and durability. With a combination of multiple technologies (RFID, GPS and GSM), all driven by the Active View web interface, this fully integrated and robust communication device is one of the most cost-effective staff monitoring and asset management tracking solutions on the market today. While its features are remarkable, Active Track still finds itself operating in some of the most competitive markets in the country today, where dozens upon dozens of other product providers are also communicating the power of their technology to the same groups of customers. When faced with this situation, the best way to win the hearts and minds of the customers is to provide them with something that differentiates you from the rest of the pack. Active Track is therefore placing great emphasis on its after-sales support function. While the Active Track units have developed a reputation for their exceptional durability there
are cases, particularly in some of its harsher operating environments where repair and replacement are necessary at times. When a call comes through for equipment repair, the customer is immediately equipped with a set of replacement devices and equipment at no additional charge, ensuring that there are no disruptions during the time it takes to repair the customer’s equipment. Active Track is also so confident about the durability of its equipment that the cost of insurance for each device (provided that certain criteria are met) is also covered. Active Track is used in a wide range of industries, including residential estates and office parks that require 24-hour security monitoring. It is used on some of the most remote mining and construction sites around the continent, and has even been used in the transport and logistics space for asset tracking, or as a staff monitoring solution for companies that employ large teams of sales representatives. Active Track believes that the best way to serve each customer is to develop a greater understanding of their industry, ask a number
of key questions, and then match the client’s needs and priorities with the product’s features. Matching features to requirements Providing all the functionality and advantages of a smart phone, the Active Track system is reliant on network coverage. The Active Track operates on the GSM network to transmit data collected from various sites. It effortlessly solves the problem of monitoring employees working from remote locations with its extensive capabilities and unique combination of technologies. Without having to rely on the costs and signal limitations of mobile phones, Active Track provides the ability to stay in contact with employees, even in the most remote locations. The Active Track handheld can be called at any time and the call is automatically answered, but the call cannot be ended by the end-user. It can, however, also be programmed to make calls to a designated number if required. For employees that are required on the road, the GPS (Global Positioning System), a spacebased satellite navigation system, provides an Continued on page 15
10
Security Focus | Vol 33 No 7 2015
SpecialFeature:Controlrooms&communication
Cutting-edge solutions from leading SA security company Wright Surveillance is a leader in the South African CCTV surveillance and offsite monitoring industry, servicing a broad spectrum of the market with cutting-edge security solutions. Wright Surveillance provides comprehensive, integrated CCTV security solutions to an array of blue chip clients in the logistics, retail, manufacturing and service sectors. Wright Surveillance’s comprehensive end-to-end CCTV security solution includes detailed site assessment and planning, installation and maintenance through to off-site monitoring in its technologically advanced off-site CCTV control room. Expert consultancy service ensures clients are assured of a total integrated security package that provides the optimal solution to their security needs. Wright Surveillance is among the pioneers of off-site CCTV monitoring in South Africa, having established its off-site control room 13 years ago. Its vast experience ensures that its CCTV systems deliver as promised. Highly qualified and experienced
installation teams ensure complete control over project installation costs and quality, with seamless integration into on-site or off-site CCTV control rooms, superior image quality and system reliability. “We offer full-time or event-based off-site CCTV surveillance, with the option of virtual guard tours and supervision, access control and energy management. “Our extensive experience in off-site CCTV monitoring means we know what technology delivers the right results in the control room, and what doesn’t. “We offer affordable products and installation techniques that supersede all others in the market, and provide the best integration, image quality, speed and reliability – all essential components when looking to ensure the delivery of a superior security solution,” said a spokesperson. Wright Surveillance strives to build longterm relationships with its clients by offering exceptional service. The success of the company is built on continuous technological advancements and having an unquestionable
reputation for honesty and integrity. “We offer an industry-leading CCTV surveillance automated reporting system to our clients, who receive a monthly CCTV report that includes a snapshot of all pertinent activity at their site that month, including procedures, alarms, technical issues and CCTV surveillance observations. “Detailed information of each category is provided in a simple and understandable graphic and tabulated manner, including detailed summaries of any incidents or pending issues. Reports can be customised according to our client’s requirements. “We also provide technical fault reports, and a detailed report following each preventative maintenance visit,” concluded the spokesperson. With more than 20 years in the security industry, Wright Surveillance has the experience and expertise to offer the WRIGHT solution that is tailored to a client’s specific needs. Wright Surveillance holds a Level 1 BEE rating. n
Security Focus | Vol 33 No 7 2015
11
SpecialFeature:Controlrooms&communication
Benefits of video alarm verification for monitoring stations
By Max Gadot If you haven’t already observed, the alarm industry is in the midst of a major transition, driven by the steam-rolling force of affordable IP video cameras and broadband Internet technology offering new dimensions in this conservative industry. Video verification has grown in popularity due in part to false alarm reduction efforts. However, video verification provides benefits well beyond reducing false alarms. A wide range of stakeholders now benefit from video alarm verification, including home and business owners, law enforcement agencies, monitoring stations, installers and insurance companies. Benefits of Video Alarm Verification False alarms account for approximately 90 per cent of all alarm events. Monitoring stations and law enforcement officials spend a significant amount of time and resources responding to such events. In fact, some law enforcement agencies have been forced to implement a “no response unless verified” approach due to limited resources and budget cuts. Some countries such as the UK, Spain and Chile have regulations
12
Security Focus | Vol 33 No 7 2015
in effect that make alarm verification mandatory to generate police response. Historically, it has been cost-prohibitive to employ video verification as it required expensive video equipment and tedious integration. Furthermore, when monitoring station operators viewed live video of the premises, the activity being viewed did not coincide with the alarm event. Today’s technology allows video clips and snapshots associated with an incoming alarm event to be sent to the monitoring stations, and if requested, simultaneously to the smartphone of the home or business owner. This process allows the monitoring station operator to visually verify the alarm event and determine who or what caused it – before making the decision to dispatch the police. The result is improved police or armed guarding response delivering more efficient security. With video alarm verification, law enforcement can deploy resources more effectively, increase criminal apprehension rate and achieve better situational awareness and safety for first responders. Video verification is now the most popular additional option on alarm systems, a fundamental change within the alarm business. Alarm business recurring monthly revenue (RMR) is based on alarm system
Controlrooms&communication
monitoring, and video verification is the natural progression as it becomes more affordable. Adding video verification is an upgrade like interactive services, additional security devices, or maintenance. It is also clearly an opportunity to add RMR to new and existing accounts.
Taking Responsibility End to End RISCO Group has recognised that a superior and robust video verification solution can only be achieved by making sure the hardware, software, and peripheral devices are tightly controlled and knitted together. The RISCO eco-system – a RISCO intrusion alarm system with RISCO IP cameras connected and controlled by RISCO Cloud and the iRISCO smartphone app allow superior customer experience, simpler installation, and smoother syncing of video and alarm events. Superior Alarm Event Handling An example of the superior customer experience enabled by RISCO’s end-to-end responsibility for the solution is the video and image flow in event of an alarm. Even though RISCO IP cameras record a full HD video clip of preand post-alarm footage, the images initially displayed to the monitoring station operator upon alarm are extracted images of the alarm event from this video clip. These images allow monitoring station operators to make a quick decision if an intruder is present with a single glance at their screen, without reviewing and searching through a 20-30 second video clip in order to decide if an event is a crime in progress. The full HD video clip is, of course, seamlessly available for deeper analysis at any time by double clicking any extracted image of the event. Full HD video look-in to the RISCO IP cameras on premises is also seamlessly accessible to authorised personnel immediately following an alarm event. Two-way audio utilising the IP camera provides an additional dimension of verification and remote management. In conclusion, video verification of alarms is moving into the mainstream at an accelerated pace. Monitoring stations would be well advised to embrace video verification due to the added RMR it offers and due to the benefits for all stakeholders; home and business owners, law enforcement agencies and insurance companies. Those that opt out will, in all probability, be left behind by the competition. Selecting the right video verification partner, one that offers a robust and affordable end-to-end solution and the experience to assist in all implementation steps, is critical to the commercial success of video verification in the monitoring station. n
SpecialFeature:Controlrooms&communication
Integration remains greatest challenge When the September 11 terrorist attacks took place in 2001, reactions were severely delayed by the fact that the operational and security system layers of the relevant forces in the US – FBI, CIA, Army – were unable to communicate with each other. They, like so many other organisations struggled through the challenges created with a silo-based environment, consisting of a number of discrete systems. This meant that it took hours before a reaction could be organised and carried out. Nigel Steyn, EMC’s surveillance subject matter expert, says that from a security standpoint, full integration of security systems remains the greatest challenge facing the industry today. “This is what’s driving developments in the industry – why the various systems don’t talk to one another, and how to improve on that,” he says. “Ideally, customer requirements should dictate security innovations, as every customer’s needs are different and meeting those specifications creates a thread that can be traced through the entire security system.” At present, the industry remains product-driven, with customers being compelled to implement several silo systems from different manufacturers – cameras, storage, software, access control, CCTV
14
Security Focus | Vol 33 No 7 2015
and more. “The challenge is to enable true integrated security management by creating a single user interface into all these systems, so that they all talk to each other and the customer is able to view the entire security environment on one monitor,” Mr Steyn says. Although he admits that 90 per cent of security implementations have huge problems, Mr Steyn points out that it’s not the products that fail. Rather, it is because the interfaces between the various components are unclear. Some companies are tackling the problem with physical integrated security management platforms which connect to the multiple systems and pull all the components together. To date, uptake of this technology is being held back by prohibitive costs, as well as a lack of understanding around the need for integrated security systems. “There is definitely a considerable amount of education and awareness that needs to happen before these tools are adopted on a broad scale,” Mr Steyn says. “This will take time, but mission-critical customers with high security requirements, such as airports, are already implementing fully integrated security systems. “In the Middle East, legislation requires hotels, hospitals and sporting arenas to have integrated security systems. However, these requirements have yet to be mandated in South Africa and Europe.” Mr Steyn explains that security systems consist of three layers, with the operational level at the base. This consists of the operational toolset and systems, including access control, CCTV, biometrics and storage. Next is the tactical layer, where systems enable the customer to be proactive by analysing all the security data in the organisation – this is where big data comes into play. The top layer consists of governance and it is a vital part of any security system. The regulatory, legislative, key performance indicator, asset management and service level agreement requirements drive the first two layers. “Governance provides the thread against which the other two layers are designed, and all of this has to be fully integrated. If this type of system had been in place on September 11, all the US forces would have had a single interface into the nation’s security system – and would have been able to respond much faster,” Mr Steyn says. n
SpecialFeature:Controlrooms&communication
Active Track stands out from the crowd Continued from page 10 efficient monitoring tool by generating a GPS position to identify the location of employees (drivers, reps) and vehicles via Google Maps. The duration that employees spend at various locations is recoded via the device’s RFID (Radio Frequency Identification) technology tags. Active Track can also generate new alarms for various functionalities. The device includes a “Call Me” button for easy communication access to the driver, as well as a panic button if the employee is in distress. In addition to managing employee performance and productivity, for those remote applications, where time and attendance is a must, but biometric solutions are not possible, Active Track’s scan and report RFID technology provides the solution. Active View is the web-based software that allows for ease of access wherever there is Internet connectivity. Active View essentially provides the platform for monitoring and generates all alarm conditions via e-mail
and sms. The reporting system provides a complete business intelligence tool that monitors movements, productivity and provides accountability in terms of reporting back to clients.
In short, Active Track provides clients with an empowerment tool that can supervise and manage any and all employees from anywhere in the world, something that provides true value to every customer’s business. n
Security Focus | Vol 33 No 7 2015
15
CompanyNews
How to keep your business safe during a blackout
B
eyond the inconvenience and loss of profit-making opportunities that electricity outages can cause, there is a real safety risk for businesses during power outages. SBV Services looks at some of the ways businesses can stay safe. Our reliance on electricity becomes most apparent when it is gone. In particular, many safety systems are largely reliant on power and become less effective when there isn’t any. As South Africa faces a future of erratic power supply and regular loadshedding from state-owned power utility Eskom, businesses have to implement back-up security plans and processes to stay safe. The loadshedding schedules provided by Eskom offer an opportunity to predict, to some degree, when loss of power will occur and allow businesses to implement their back-up plans. Cash services and solutions company SBV Services’ risk manager Dean van der Merwe says it is important for businesses to draw up a list of priorities and to plan for black-out scenarios. Good planning includes a detailed list of what systems, such as perimeter security or access control, need to be kept running when the power is off. Business owners also need to be mindful that some security features will have to be forgone to maintain other more critical security points, or to keep their businesses functioning. An important question for business owners to ask is: “What is it going to cost to run the business with no power, and what are the potential losses?” If not having power will mean a business runs at a loss during down times, it may be wiser to close during these periods.
18
It is also necessary to weigh up the balance between keeping core business equipment, such as refrigeration and payment systems, running off back-up power, and redirecting limited back-up power resources to keeping “opening hours” security systems functioning. It may be prudent to revert to temporarily closing so that only after hours security systems need be in place and businesses’ assets are well kept, to allow for continued operating when the power returns. External services that are also affected by outages might have a run-on impact on a business. These services could include water or sewerage supply and management and other health and safety features that could affect the physical safety of employees, such as externally supplied lighting sources. One of the first things businesses need to do when faced with impending electricity outages is to investigate and acquire back-up power. The most common form of back-up power is a generator. But, generators themselves carry certain risk factors and need to be well managed to offer effective alternative power supply. They should be regularly serviced and tested by being run for 20 minutes every two weeks. In winter in particular, it might be difficult to start a generator and businesses should ensure that a generator’s battery is always fully charged. From a health and safety perspective, generators should be installed by a qualified and reputable service provider, and the storage of fuel supplies to run the generator need to be managed correctly.
Security Focus | Vol 33 No 7 2015
There are also different kinds of generators available and business owners should ensure they have the right size and type of generator for their business. It is also important to install an automatic volt generator to prevent a sudden surge of power from affecting appliances and equipment. SBV’s consequence manager Ernst Verster says that when helping a company understand and protect itself against risk, SBV uses three spheres of assessment. These are physical risk, human risk and variable risk. Physical risk A physical risk assessment should focus on a business’ premises, location and access. The type of location of a business, whether it is isolated or, for example, in a mall in close proximity to other businesses, will affect its vulnerability when there is no power. In addition, factors such as the amount of artificial lighting required to give sufficient visibility to detect threats will vary in different locations. Entrance and exit points are also key physical locations that need to be well managed in the event of a loss of power. Mr Van der Merwe says these points are particularity vulnerable as most businesses, particularly in retail, design their entrances to create easy access for customers. When there is no electricity, it may be prudent to assign additional personnel to entrances and exits to watch for any suspicious activity. If manpower is stretched and there are not enough people available to assist with access points, businesses can consider using some of their back-up power supply to keep monitoring
CompanyNews
tools, such as close circuit television (CCTV), running during black-outs. Most alarm systems are also designed to assist with after hours access control. Businesses should check that all back-up batteries on alarm equipment are tested and in good working order on a regular basis. This will ensure that alarms go off as intended in an emergency and that armed response is signalled. This caution also extends to electric fences and gates. If there is a limited back-up power supply, business owners need to decide which physical security systems can be decreased or alternated to manual or manned resources when there is no electricity. A more permanent adjustment to mitigate physical risk for retailers in particular, is to redesign their store lay-outs so that high-value items are not in high-risk, low visibility areas in the store. Human risk In addition to ensuring the physical safety of employees by establishing sufficient lighting during power outages, the human risk for businesses extends to people who intend to commit a crime, or who take advantage of a business’ vulnerability during such instances. Some of the ways businesses can mitigate
risk in this area are to implement searches and physical signing in and out for staff and suppliers that access the businesses during the black-out period. Alternatively, as mentioned, back-up power can be used to maintain security systems such as CCTV. However, these solutions can have limited success and a longer term and more effective approach is to ensure that staff are well vetted and are assessed for their security risk before they are hired. Variable risk There are also risk factors that business owners can unintentionally fail to assess properly because they vary significantly and are seemingly intangible, or are considered to be outsourced areas of business. One of these is insurance. Because most insurance contracts take into account existing security systems and features, business owners need to consult their brokers to establish the terms of their insurance if these systems are down due to a power outage. In assessing and mitigating risks around blackouts it is important that businesses ensure they are not under-insured and that their premiums are up to date so that, should anything go wrong, they will be sufficiently covered.
Another service provider that needs to be consulted is a business’ armed response partner. It is necessary to clarify what the procedures are during a power outage and what the armed response company is able to do or not do, including what services they offer, such as additional security guards, cash handling, and crisis training. One of the trickiest risks for a business during a power outage is its cash risk. Because loadshedding happens at different times, the amount of cash on hand can vary significantly. This means that businesses need to clearly address the risks they face around cash. For example, if they keep money in a vault or device, they need to clarify whether that needs power to function correctly. Possible solutions for managing cash risk include using a licensed cash collection security company to manage the movement of cash, and keeping as little cash on the premises as possible. Though there are many different types of risk that businesses face when they are forced to function without power, assessing and addressing these risks in advance and establishing and communicating mitigation strategies to necessary parties can empower businesses to function as securely as possible, even when the lights go out. n
Security Focus | Vol 33 No 7 2015
19
CompanyNews Proud Servest employees with the 32 Linhai Rustler 260 XL quad bikes from Smith Power to be used for patrolling Transnet railway lines.
Linhai to serve in Servest Servest Security Services, part of the Servest group, has taken delivery of 32 Linhai Rustler 260 XL quad bikes to be used for patrolling Transnet railway lines. Servest regional human resources manager, Bertie van der Mescht says the company looked at several options and decided on Linhai because of the very competitive pricing, Linhai’s tried and tested power and reliability and the well-known excellent levels of after-market service provided by Smith Power Equipment (SPE). “It’s obvious that power and, above all, reliability, are key to providing the best possible security service and with SPE and Linhai we are assured of these. This, combined with the good price we were offered made the choice a fairly simple one,” Mr van der Mescht says. He adds that he is happy with the performance of the machines over what is sometimes quite difficult terrain. The Rustler 260 XL 2X4 has become one of South Africa’s most popular quads. One of its most important features is its lightweight, automatic transmission, which makes the bike extremely user-friendly and a veritable blast to ride from a power perspective. Other key features include: • 257 cc, 4 stroke, single cylinder SOHC, liquid cooled engine • Electric starter • High/Low range with reverse gear • 200kg tow capacity2015mm x 1140mm x 1195mm (LxWxH) dimensions • Dry weight 280kg SPE’s Mark Chittenden says the Servest deal was an important one
Smith Power ‘s Mark Chittenden (left) and Servest regional HR manager Bertie van der Mescht with some of the Linhai quad bikes that will be used for patrolling Transnet railway lines.
for his company. “Servest is a highly effective and professional company, delivering a world-class security service to its clients. For them to choose Linhai and the services of Smith Power Equipment is a feather in our cap.” n
IndigoVision and MASS strengthen ties MASS and IndigoVision recently announced that IndigoVision have appointed MASS as its preferred supplier of IndigoVision products in sub-Saharan African. Barry Kasselman, IndigoVision’s regional manager, said he was delighted with the development. MASS’s founders and owners all enjoyed a very long and rewarding history with IndigoVision and were responsible for some of IndigoVision’s biggest projects in Africa. He felt it was a natural progression for IndigoVision to appoint MASS as its preferred supplier considering the lengthy and profitable
20
history. Pressed for detail, he explained that MASS had set a new standard for project supply in South Africa and IndigoVision wanted to be part of the MASS success story. Ettiene Swanepoel, founder and co-owner of MASS, was equally delighted with the appointment. He said IndigoVision’s range filled an obvious void in MASS’s product range. Having worked with IndigoVision for many years, he said it felt completely natural to take on the product range. His goal was to ensure that
Security Focus | Vol 33 No 7 2015
the IndigoVision range once again enjoyed its previous status as one of the premier product ranges available in Africa. IndigoVision pride themselves on being the world’s leading supplier of CCTV systems to mega-projects. Whether they be some of the world’s biggest casinos, to airports, to city centre surveillance, to sports stadia, to massive government projects, IndigoVision had the expertise, the products and the experience to ensure a clients’ expectations were surpassed. n
CompanyNews
Hikvision strengthens local presence in SA Through June 26 to July 3, 2015, Hikvision, the global leader of innovative video surveillance products and solutions, accompanied its partner Regal Security, Hikvision’s authorised distributor in South Africa, to present the latest Hikvision product innovations in Swaziland, Polokwane, Nelspruit, and Witbank. According to Johnny Ge, Hikvision’s sales representative in South Africa, the showcase was the first of its kind, enabling Hikvision to exhibit in these four areas. A series of the latest Hikvision products were demonstrated live during the roadshows, accompanied by specific product seminars with attendees outlining specific needs and applications. The centre of attention was the newlyreleased Hikvision HDTVI 1080p HD Turbo analogue solution. This innovation, particularly, represents the ideal solution for high definition over coax cables. In conjunction, the new DarkFighter and LightFighter Smart IP cameras were on display, designed to handle full set Smart features in extreme lighting conditions. “We had a great time at the Regal-Hikvision roadshow. It was really well organised. I am quite impressed with the performance of the Hikvision LightFighter camera. The image quality is incredible!” said Qiniso Shongwe, managing director at Instant Electrical. Regal Security uses these roadshows to highlight the latest additions to its vast Hikvision range of products. Hikvision products
are available nationwide at all its 24 branches. Regal and Hikvision are excited to continue the roadshows, coming up shortly in Johannesburg, Bloemfontein, Cape Town, East London, Port Elizabeth, Durban and Pietermaritzburg. “The roadshow has been a phenomenal success. We had hundreds of customers expressing their needs from various industries,
David Myers has been appointed as one of the district managers for Johannesburg. David joined the business in 2014 and, most recently, held the role of branch manager North, Central Region.
Ranesh Ranjith has been appointed as one of the district managers for Johannesburg. Ranesh joined the business in 2001 and, most recently, held the role of branch manager Durban North, East Coast Region.
praising the highly-acclaimed Hikvision products and stunning product images and ease of operation. “We will definitely continue the roadshows with Regal, sharing with our customers the Hikvision ever-expanding product portfolio, and advanced technologies,” commented Evan Liu, country manager for Hikvision South Africa. n
New staff appointments at ADT
Matthew de Gersigny has been appointed district manager: outlying branches. Matthew joined the business in 2011 and, most recently, held the role of dealer development manager, Central Region.
Kavir Singh has been appointed direct manager inland. In this role, Kavir will be responsible for managing the direct sales team and achieving sales targets for the region. Kavir joined the business in 2002 and, most recently, held the role of direct sales manager, Central Region.
Leon Muller has been appointed district manager for Pretoria. Leon joined the business in 2001 and, most recently, held the role of small business manager, Northern Region.
Security Focus | Vol 33 No 7 2015
21
ResearchNote
Identifying growth in the access control industry By Blake Kozak, principal analyst for Security and Building Technologies at IHS Inc.
2
014 proved to be both exciting and challenging for access manufacturers and channel partners. With the influx of new trends and technologies, manufacturers were required to make difficult decisions such as which technologies to invest R&D, while channel partners were required to begin expanding their knowledge and capabilities beyond legacy access control technology. Despite continued geopolitical and global economic turbulence, IHS has estimated the global (excluding China) electronic access control market grew by 6.3 per cent in 2014 and exceeded $3.1 billion. A few of the technologies and services IHS found to have the most potential to be disruptive over the next 2-3 years include: mobile identities, biometrics, hosted/ managed services and IT integrators. Mobile credentials are becoming a mega trend globally. IHS expects that the bulk of the installations will first come in the hospitality/ resorts and residential markets. IHS also expects that universities will be early adopters, while SMEs and large enterprise continue to learn how to deploy the technology among existing workers most efficiently. Biometrics tend to be a cyclical product offering. In 2013, IHS forecast slower growth for biometrics as many suppliers believed the technology was too expensive and was only available for large enterprise and high-security locations. However, in 2014 IHS found biometrics to be one of the most talked about trends globally. Although the price point for many of the biometrics remains out of reach for many end users, IHS expects the price to continue to fall, especially for facial and iris recognition. IHS also expects the use of biometrics in other industries will drive end-user awareness. For hosted/ managed services, IHS expects that as more developing nations see an increase in wages, there will be a demand to automate processes and reduce manned guarding services.
The access control industry is expected to become more IT centric and as the market moves in this direction, integrators will become better prepared to sell ACaaS and end-users will be better prepared to accept these technologies. Finally, IT integrators and IT departments are expected to continue to play a larger role in security. IT departments are beginning to have greater influence over building owners and tenders since the most significant breaches have occurred within the IT domain, e.g. Target, and many of the most valuable assets of an organization are in the IT domain. Security and IT departments can begin to leverage the expertise of the other side, so access control can contribute cryptography while IT can contribute virtualization and networking. IHS expects that the physical space will continue to have a larger role within IT since access control can flag anomalies, which can create a chain reaction to protect intellectual property and other assets. Overall, IHS expects that these trends, as well as many others, will continue to develop through 2015 and into 2016. Which countries will see the most adoption of these disruptive trends? IHS found that in 2014, for access control, developed countries such as the USA and United Kingdom performed quite well compared with smaller, more developing countries. IHS also expects that countries such as Canada, USA and Western Europe will adopt mobile identities, open standards and hosted/ managed services before other countries and sub-regions. Furthermore, developing countries, especially in Southeast Asia, continue to be difficult markets for international access control suppliers. Due to economic indicators and country-level analysis for access control, IHS now expects that the American region will outperform the Asian region (excluding China) until 2017. One reason for this projection is the adoption and growth of electronic locks. IHS expects that the American region will grow nearly twice the rate of the Asian region in 2015 and 2016. n
Year Access Control Growth - Developed Countries GDP Growth - Developed Countries
22
Security Focus | Vol 33 No 7 2015
Access Control - Developed Countries GDP Growth - Developed Countries
ResearchNote
Rapid growth in global market continued in 2014 By Jon Cropley, principal analyst for video surveillance equipment for IHS Inc. The world market for video surveillance equipment grew by 14.2 per cent in 2014.This is according to recently published estimates from IHS Inc. (NYSE: IHS), through its Video Surveillance Intelligence Service. This is a higher rate than IHS was forecasting back in December (it was forecasting 10.7 per cent back then). The difference is down to higher than expected growth in China. EMEA, Americas, and the rest of Asia all grew at slightly lower rates than forecast in December. Slightly lower growth in the global market is forecast for 2015, at 9.5 per cent. Product demand will continue to grow quickly but price erosion will impact revenues. This will mean that the world market for video surveillance equipment will be worth $15.7 billion in 2015*.
IHS has just added new global and regional market statistics, forecasts and market share estimates to its Video Surveillance Intelligence Service. In addition to the above, other key findings include: • A number of Chinese vendors continued to rapidly gain market share in regions outside China in 2014. They tend to offer products with low prices and this has been a major factor in average price erosion in those regions. • China is estimated to have been the largest regional market for video surveillance equipment, accounting for almost 40 per cent of global revenues in 2014. • In terms of revenues, the market for network cameras was almost two and a half times the size of the analogue camera market in 2014. However, only around 40 per cent of all security cameras shipped were network
cameras in that year. Unit shipments of network cameras are forecast to first exceed those of analogue cameras in 2015. • The market for network cameras with 4 megapixels and above grew rapidly in 2014. Growth in demand for 180/360 degree network cameras was the major reason. 4K cameras will increasingly contribute to the category over the forecast period. • The supply base for video surveillance equipment remains highly fragmented. In 2014, the top fifteen vendors accounted for just 52 per cent of revenues. A large number of small vendors accounted for the rest. Only one vendor had a market share greater than 7 per cent. • IHS no longer includes monitors or matrix switchers in its estimates for the video surveillance equipment market. n
Technology changes drive market to $500 million by 2019
By Oliver Philippou, senior analyst for IHS Inc. A new report by IHS Inc. (NYSE:IHS) estimates that the world market for uncooled thermal cameras in commercial security
applications was worth $245.0 million in 2014, and will grow to nearly $500 million in 2019. IHS expects that within the next 12 month the market will start to shift away from 17 micron sensors, to smaller pixel pitch sensors. This is expected to have significant implications on the price of thermal cameras. IHS expects that price declines, and the release of lower-end entry level products will allow thermal cameras to gain traction in commercial markets that have traditionally been unable to justify the high prices associated with thermal cameras. Other key findings of the report include: • Driven by both the use of smaller pixel pitch sensors, and the expected growth in entry level products, IHS forecasts a shift towards smaller focal lens sizes.
• IHS expects a split in the market away from QVGA resolution, and towards VGA and QQQVGA array formats. In an effort to differentiate themselves suppliers will focus on either the high-end of the market, or the low-end. • Due to larger operational budgets and a measurable return on investment IHS expects significant growth of the radiometric camera market. Generally used for preventative maintenance, the concept of the radiometric camera is appealing to camera suppliers and end-users. IHS is aware of some leading manufacturers that have confirmed they will be releasing radiometric cameras within the next 18 months. n
Security Focus | Vol 33 No 7 2015
23
OpinionPiece
Morpho on trends shaping biometric market
G
lobal security solutions provider, Morpho (Safran) is demonstrating its intention to capture more untapped markets on the African continent. Security Focus spoke to Guillaume Lefevre, Morpho, vice-president of market development and sales during his recent visit to South Africa about Morpho’s significant growth in Africa and some of the global trends dominating the international biometrics and access control market. Since its establishment in South Africa during the early 2000s, Morpho has become an acknowledged trendsetter with a consistent ability to advance the security industry with groundbreaking biometric technology and performance. “Our local partner, Ideco, has played an instrumental part in helping Morpho to establish its presence in Africa,” says Mr Lefevre. “Our intention is to continue to grow this partnership in future, as we appreciate Ideco’s insight and understanding of the local market. “Furthermore, we have been fortunate enough to find a long-standing partner in Ideco that shares our business strategy,” he added. While exhibiting at Securex South Africa in May this year, Morpho (Safran) showcased a new range of biometric terminals specifically designed for physical access control and workplace time and attendance management. This included a wide range of products encompassing fingerprint, multi-modal (combination of finger vein and fingerprint biometrics) and facial recognition technologies for public and private sector applications.
24
Among these innovations was MorphoWave, the market’s first biometric access solution featuring high-speed touchless fingerprint matching. Latest Industry Trends Contactless technology is the next big thing for access control and time and attendance solutions, says Mr Lefevre, as demonstrated by the recently-launched MorphoWaveTM. As enterprises continue to move towards efficiency, frictionless access to controlled areas is paramount. Users need to be able to gain access naturally, without having to break gait. MorphoWave™ is the world first biometric access solution capturing and matching 4 fingerprints with a single hand movement. It implements a patented, truly contactless technology that not only acquires extremely accurate fingerprint data but also overcomes the challenges of wet/dry fingers and latent prints pose to conventional scanning systems. The dynamic, touchless acquisition capability provided by MorphoWave™ allows users to remain “on the move” when passing through a control point, making it ideal for securing high traffic areas. Mr Lefevre believes that concerns over data integrity and security among mobile users, the ever increasing use of smart phones to complete banking transactions, and the move towards mobile cloud computing – have all contributed towards smart phones now emerging as the new growth path for fingerprint biometrics. In a space of less than a year the integration of biometrics into smart phones has gone from being a trend to the norm. In terms of trends impacting on the market, Mr Lefevre believes we are going to see a significant move towards market polarisation. In other words, the two ends of the market that will see significant growth are the Entry-level products together with High-end products. Those players in the middle market will see a decrease in sales as they struggle to differentiate themselves from the extravagant premium offerings and more basic models. “Easing migration with IT is the next major trend in biometrics and access control,” says Mr Lefevre. With the dominance of cloud storage, a growing trend toward enterprise access control, the adoption of interoperability standards and a changing relationship with IT departments, access control is keeping pace with its physical security industry counterparts in its ability to adapt to consumer market trends. One of these changes, and perhaps the
Security Focus | Vol 33 No 7 2015
most significant change in the access control market, is the move from integration to unified platforms. Unification provides access and video information that lowers the overall cost of ownership with a single server solution, along with enhanced feature capabilities. These capabilities include access to deeper sets of analytics and report from combined datasets. Global market growth With a presence in more than 55 countries around the world, Morpho’s expertise lies in providing cutting edge technologies for a wide range of markets and applications for citizens, governments and business. With security playing the leading role in Morpho’s future development, thanks to groundbreaking biometric technology and unrivalled performance, the company contributes to managing identities, protecting borders, detecting threats, ensuring law enforcement and providing trusted online transactions. Its solutions ensure safety, protect identities and safeguard privacy. Some of Morpho’s major contracts around the world include civil identity management contracts with governments for voter registration, national identification management, traveller documentation, vehicle and driver registration. On the public security front, the company has developed some of the world’s most advanced biometric screening and investigation services. For digital and ID and smart transactions, Morpho has developed a range of solutions for financial services institutions, the gaming industry and the telecoms industry. It’s aviation and border security division provides automated authentication and threat detection. Finally, Morpho’s significant range of biometric terminals add security to a number of processes, including time and attendance, desktop services, mobile terminals and access control. Morpho (Safran) counts among its clients a number of governments from around the world, private companies and law enforcement agencies such as the Federal Bureau of Investigations (FBI). Mr Lefevre says overall he feels positive about the rapid adoption of biometrics throughout the African continent. “There is a new wave of consumer applications that will drive market innovation,” he says. “What will ultimately separate the winners from the losers will be the readiness of the vendors to advance the industry with groundbreaking technology,” he concluded. n
OnTheMarket
Whistle blowing needed at SA schools
G
rowing reports of sexual abuse, bullying and even drug use at local schools should be ringing alarm bells for parents, educators and school administration bodies says Dale Horne, operations director of Whistle Blowers, South Africa’s largest independent whistle blowing service provider. If newspaper headlines aren’t enough, then he says that many studies highlight mounting dangers at educational institutions, suggesting an urgent need to introduce measures such as whistle blowing lines to protect children. It’s at schools that learners Dale Horne are most likely to be assaulted or become victims of theft, according to a 2006 report by the South African Human Rights Commission. In this study, more than a quarter (26 per cent) of learner assaults occurred at school while more than half of thefts (52.4 per cent) happened at school. Researchers also paint an alarming picture. The latest statistics from the Progress in International Reading Literacy Study show that South Africa has the highest bullying rate in the world for Grade 4 pupils. A 2012 Unisa survey revealed that 55 per cent of school children had been bullied at school. Consumer insights company, Pondering Panda, recently released its study showing that two out of three South African learners are worried about being bullied at school. For 52 per cent, bulling meant teasing and insults while, for 26 per cent, it included pushing, hitting and beatings. The survey, which polled 2 064 pupils between 13 and 21, and 1 015 family members, revealed that 68 per cent of pupils were worried about being physically assaulted or threatened with a weapon at school. 54 per cent said pupils brought guns and knives to school. The survey also highlighted the risk of cyber bullying, with 16 per cent of participants admitting to being threatened or insulted via cellphone, e-mail or social media. Alan Carey, director of Justicia Investigations, who has vat experience in investigation into irregularities at school, pointed out that bullying is the most likely form of school violence. Mr Carey mentioned that a recent video of a brutal school beating that circulated, as well as other incidents of which he was aware, supported the stats and showed there was reason for concern. Mr Carey is regularly involved in investigations pertaining to theft of money and cellphones, as well as the distribution of drugs to scholars by drug syndicates. These investigations include private schools. When releasing its report, Pondering Panda noted that problems had escalated to the point where outside intervention was needed. “While schools usually have policies and disciplinary procedures, Continued on page 26
OnTheMarket
Making the right security choice
Theunis Kotze, ADT’s General Manager Inland Region
For most South Africans utilising the services of a private security provider is a necessary given. Selecting the right company, however, is often a minefield, and unsuspecting residents can sometimes fall for unscrupulous sales tactics. The Security Industry Alliance (SIA), which represents the interests of all registered private security companies in South Africa, says industry regulations place an explicit legal onus on the consumer of private security services to use only legitimate and registered security service providers. SIA’s Steve Conradie says consumers can,
in fact, be found guilty of a criminal offence and can be prosecuted for intentionally or negligently using the services of a security business which is non-compliant with the Act. Theunis Kotze,ADT’s general manager, Inland Region, says for the average consumer who is perhaps unaware of the legislation, there are a number of important criteria worth checking. “Obviously, the most important first check is whether the company is registered with PSIRA (Private Security Industry Regulatory Authority). A registration certificate to this effect must be made available on request. “You equally need to check if all of the employees providing a security service are registered with the Authority. Registration certificates, as well as the last PSIRA audit inspection report to this effect, must be made available on request, as well as the last PSIRA audited inspection report.” Mr Kotze says security can have low barriers to entry and employees can be exploited at times by unscrupulous employers. “We’ve seen a number of smaller companies mushrooming up with little or no training for their officers. We believe training is an absolute necessity and it is important to check if all the security officers deployed to provide a security service are in possession of the necessary training certificates from accredited training establishments. “If you just take ADT alone, we employ 2 000 highly-trained reaction officers and invest heavily in training and development.
That definitely brings a level of comfort to our clients who require that level of capability and resource.” Mr Kotze says you also need to check if the company you select has a code of conduct which supports the statutory code of conduct applicable to all security service providers. “This is an important protection for you as a consumer.” Finally, it is important to check whether your security provider runs a legitimate business. “You can confirm whether the security business registers for tax and that they can provide their tax clearance certificate and up-to-date contribution. “This may seem like a rather tedious check, but it will certainly be worth it in the end. Most of the country’s larger private security companies do conform to the above stipulations. “This then protects their rights and those of the consumer and assists with maintaining a high service standard in the industry. The private security industry is, in fact, highly regulated and controlled,” he says. A number of companies have also started introducing value-added services to clients like, for example, a link to emergency services in the case of a medical emergency, as well as other softer services like a meet and greet service for clients arriving home late. All these add value to consumers and provide a more secure living environment. “Remember, this is one of the most important decisions you can make and it is worth taking the time to make an empowered and informed decision,” says Mr Kotze. n
Whistle blowing needed at SA schools Continued from page 25 more policies are required, such as ethics and whistle blowing policies. I can remember incidents of bullying at school and wouldn’t have dared to report a popular child. If I could have done that anonymously, I probably would have,” Mr Horne says. This is why school crimes go unreported and the true incidence of crime in South African schools is unknown. Neither children, nor educators, speak out because they will be identified and fear victimisation, intimidation and violent reprisals, not to mention feelings of shame and guilt. Mr Carey confirms that in all cases investigated, details of wrong doing were known by fellow learners, who chose to keep quiet. “But, just as schools are the most likely places for children to first encounter violence, they are also the ideal places for children to learn life skills and good values. “When talking about creating a culture of honesty and integrity among our young people, school should be the place where we start. Just as businesses have ethics policies and whistle blowing facilities in place as part of good governance, so should schools,” Mr Horne says. In Europe and America, school whistle blowing lines are commonplace, but these are used by staff. Mr Horne believes that there is no reason why learners shouldn’t use whistle blowing for
26
Security Focus | Vol 33 No 7 2015
reporting wrong doings. “Once we get to high school, we are old enough to know the difference between right and wrong. Pupils need to know that they can speak up about what they know to be wrong – and if they feel they can’t use existing channels or confide in their parents, they need to know that there’s an alternative, independent and trustworthy avenue,” argues Mr Horne. He stresses that school whistle blowing lines need to be professionally managed by a company that has both credibility (Whistle Blowers is accredited by the Ethics Institute of South Africa) and expertise. In addition to operating whistle blowing lines for businesses in South Africa and abroad, Whistle Blowers also operates lines for South African tertiary institutions. Educating learners on why and how to use a whistle blowing line would be key to a successful programme. In addition to providing an effective reporting channel, Mr Horne also believes that whistle blowing lines can act as deterrents. “Learners will be less prone to wrong doing simply because they will know that someone can phone and report what they are doing anonymously.” n
OnTheMarket
Taking T&A off-site It is said that innovation is the result of an idea on a Post-It, pushed by a forward thinking leader, backed by a driven team, with their eye on the plan. This could not be any truer for Powell Tronics, who have, once again, been able to turn an idea into a market desired product. Powell Tronics launched its first venture into the mobile clocking arena at Securex South Africa in May earlier this year and are very happy with the interest the market has shown in the product. Having been a strong promoter of electronic time and attendance systems for workforce time management, Powell Tronics has, over the years, been requested to cater for the time management of employees that work outside of the time and attendance norm of walking into a building and clocking at a designated reader. Organisations with off-site personnel, namely sales staff or field workers, as well as staff that work irregular hours, thus not always having access to their designated readers, namely drivers, have, over the years, always had to compromise with the effiency of their time management systems. It is from this inefficiency in the solution that the idea of catering for mobile clocking in the ATOM development road map was borne and added to the Post-It notes under the “Big Picture Plan” column. Using hardware that has proven unbelievably successful with two other Powell Tronics bespoke solutions, PT-Guest Visitor Management and PT-RollCall, a portable biometric attendance register especially developed for the education sector, ATOM Mobile allows this Morpho distributor to provide the market with a practical and accurate means of enrolling employees and capturing their clockings without having to be inside an office or building. ATOM’s clever use of web and network technology allows for all employee details to be accurately captured by HR back at head office, but then allow for the ability to later remotely capture their biometric templates by a site manager out in the field using the sleek and simple user interface of the handheld scanner. The scanner’s onboard database caters for the need to be able to capture time and attendance information without the restraint of having to make the sometimes impractical journey to an office environment by field staff or to be in range of the organisation’s network. This invaluable off-line feature, coupled with the one-touch enabled quick clocking modes bridge an age-old gap in the time and attendance field. Site managers or supervisors can quickly and easily clock their staff in as they arrive on site, clock them off as they leave site at the end of the shift and when the day is over, bring the scanner to the site office and dock it for power charging while it automatically
connects to the network and uploads the day’s information back to the main ATOM system for reporting and payroll purposes. ATOM Mobile, with the handheld scanner, is the first of an exciting line of features that Powell Tronics is eagerly working on to continue striving to uphold their motto “Supporting The Trade”. Further development on ATOM Mobile for the Morpho Tablet, as well as bespoke smart phone applications, is already in progress and set for release into the market in the first quarter of 2016. n
Security Focus | Vol 33 No 7 2015
27
BusinessAgainstCrime
Risk assessments Dealing with White Collar Crime was published in 2011 by Contact Publications (Pty) Ltd, on behalf of the White Collar Crime KwaZulu-Natal Task Group. Topics covered include establishing an ethical culture; risk assessments; internal controls, fraud prevention, recovery of assets; prevention of banking related crime; computers and computer crime; preparing for trial; money laundering and much more. In this issue of Security Focus, the chapter on “Risk assessments” has been printed in its entirety to give readers an idea of the important information available to them when purchasing a copy of this valuable book.
E
By Basil Carlston
very organisation should have arrangements in place for the recognition of the symptoms of White Collar Crime, even where no prior suspicion or evidence of it exists. This is firmly a management responsibility. Although they have an extremely important role to play, organisations should guard against falling into the trap of leaving this entire function to internal auditors. In this respect it is worth keeping in mind the fact that the auditing process detects only a very small percentage of White Collar Crime (current statistics are two to three per cent). One of the most common methodologies to assess the possible risk to an organisation from White Collar Crime is a Risk Assessment. A Risk Assessment is a method of balancing security controls against the possible loss that could occur in any organisation. There are many variants of risk assessment systems and processes. Indeed, the subject would require a book of its own and certainly there is a variation of approach between forensic auditing companies. It is our intention in this section to concentrate on one or two methodologies which can be utilised by organisations of all sizes without the need for the services of forensic auditing firms. RISK ASSESSMENT BASICS Some of the key elements in any risk assessment methodology are that it must be: • Capable of being consistently applied across the organisation’s operations; • Capable of providing a risk rating for each type of fraud; • Amenable to fine tuning; • Capable of being replicated; • Able to look at risks as if there were no controls in place; and • Able to measure the effectiveness of existing controls. It is recognised that it is easier to measure inherent risks than to determine the effectiveness of controls. The latter requires not only a detailed understanding of the controls, their strengths and weaknesses, but also a factual assessment of how these controls are applied. This can only be done by those with a
28
detailed understanding of the operations of the organisation.
the areas of weakness identified. An outline format for this is in Annexure B to this chapter.
CRITERIA FOR MEASURING RISK It is obviously impossible to set down a definitive list of factors for assessing the risk of White Collar Crime in an organisation. However, the following factors are usually present: • The rand quantum of the operations; • Recognition of White Collar Crime aspects other than money (time, information, threat to safety, insider trading, conflict of interest, FICA, etc); • Recognition of vulnerability to other serious criminal activities, like the abuse of influence, corruption, secret commissions and dishonest advantage; • Tapping in on the management perspective; • Past history of White Collar Crime in the organisation; and • Results of internal and external audits on the organisation. Annexure A reflects a more comprehensive list of criteria adapted from the Australian Law Enforcement Board’s publication “Best Practice for Fraud Control”.
SCHEDULE OF WEAKNESSES The second step is the production of a schedule of weaknesses. This should be in two parts: • Weakness in critical areas; and • Other weaknesses.
THE WHITE COLLAR CRIME TASK GROUP SYSTEM The author has devised an extremely simple methodology which can be adapted to suit any sized organisation. This comprises of five steps: 1. The threat assessment. 2. The production of a schedule of weaknesses. 3. The production of an agreed list of vulnerable areas. 4. The identification of the options available to close the vulnerable areas. 5. The production of an action plan. THE THREAT ASSESSMENT Essentially, the procedure is to list all the functional areas of the organisation. For each area the activity is described and the critical activity identified. For each activity the relevant risk criteria are listed. The activity and risk criteria are then analysed to identify the possible areas of compromise. The protection in place is then examined to see if possible areas of compromise are closed and from this
Security Focus | Vol 33 No 7 2015
LIST OF VULNERABLE AREAS In the third step the schedule of weaknesses is discussed with the CEO/Board/Audit Committee of the organisation and a prioritised list of vulnerable areas agreed upon. Depending on the size of the organisation and the number of weaknesses exposed, it may be necessary to produce: • A consequence profile (a scientific analysis of what effect the threats would have on the organisation should they materialise); and/or • A probability profile (an assessment of what percentage chance the threats at each area of weakness have of occurring). OPTIONS OPEN TO CLOSE AREAS OF WEAKNESS The fourth step is to identify the options available to close the prioritised areas of weakness. These should be costed and further prioritised. ACTION PLAN The final step is the production of an action plan by the Audit Committee, if one exists. However, the Managing Director/CEO of the organisation should always take ownership of the plan. Although the methodology described is simple in concept, management should be aware that it is not so in execution. In medium-to-large-sized organisations, it is recommended that a team be formed to carry out the exercise. This team should include accountants, security experts, computer specialists and internal auditors. However, it is so designed that in a small organisation one person could do the job. BRITISH BANKERS’ ASSOCIATION METHOD The British Bankers’ Association’s recommended system involves the production
BusinessAgainstCrime
of the organisation’s threat profile as a first step. This includes the identification of fraud threats specific to the products and services of the organisation and, in addition, the general factors applicable to the sector in which the organisation operates which may make it more susceptible to fraud. It is important to perform this analysis in all sections of the organisation. The threat profile is usually documented in table format such as depicted in Annexure C. The next stage is the examination of the organisation’s existing policies and procedures in order to assess their effectiveness in addressing the threats identified. It is important that the effectiveness of the prevention, detection and response procedures for each threat take into account the basic techniques of: • Segregation of duties. • Levels of authority. • Monitoring and supervision. • Design of value paper. • Security of premises. Having identified and documented the risk evaluation, management can then produce the assessment of risk and identify any modification of controls to improve effectiveness. Organisations wishing to adopt this system will need to obtain the British Bankers’ Association’s “Fraud Managers Handbook” which is available from BBA Crime Prevention Programmes, Information Transfer, 15 Newmarket Road, Cambridge CB5 8EG, England. COMPUTER AIDS There are a number of proprietary computer programmes on the market which aid the fraud risk process. For example Bergman Voysey’s “Security by Analysis (SBA)” system. Others known to the author are “RiskWatch” and “BiAsys”. A relatively new tool available to managers is data analytics. This technology enables enormous volumes of information to be combed quickly for trends and unusual events. An example of the application of data analytics is to process the journals in the accounting system and process them against a set routine to highlight things that look unusual. Most forensic companies have a tailor-made system for the process, but a simple home made programme could be written by information technology staff of smaller firms. OTHER TECHNIQUES Risk Assessments are, of course, not the only techniques for the recognition of the symptoms of fraud. Some other techniques are: • Analysis of case studies of crimes committed in the general sector and their application to the organisation; • Vulnerability charts; • Invigilation (creation of a controlled
• • • • • •
environment); Observation or surveillance; Under cover investigations and informants; Business and intelligence; Spot checking; Criminal targeting; and Critical point auditing.
WHO CARRIES OUT THE ASSESSMENTS? The reason why so much fraud escapes detection is usually because no one person in the organisation is made accountable for the task. The idea that fraud will be detected by auditors or police is often a fatal fallacy. The auditor is a watchdog, not a bloodhound. The police investigate fraud, they seldom detect it. To detect fraud, resources must be allocated specifically to that task. It cannot usually be achieved as a “spin off” from conventional auditing. In detecting fraud, the objective should not be confused or combined with other work. It should not be considered as a one-off exercise as if done properly, it includes routine monitoring of events, and a lot of hard work. It is vital that “fraud detectors” have considerable investigative expertise and are capable of taking cases from initial detection of symptoms right through to criminal prosecution by the courts. For obvious reasons, the “fraud detector” should be independent from the accounting department of the organisation. In large organisations we recommend that the “fraud detector/s” is/are under the direct control of the Enquiry Controller. CRITERIA AGAINST WHICH FRAUD RISKS CAN BE MEASURED INHERENT RISKS Programme Focus 1. Nature of Programme The extent to which the business of the organisation creates a risk (e.g. service delivery would be of higher risk than policy advice). 2. Policies and Strategies The extent to which policies, procedures and strategies which recognise the importance of fraud control have been developed. In other words the attitude of management. 3. Reputation The extent to which the organisation is perceived to be an easy target for fraud. Resources 4. Cash Handling of cash and other instruments (electronic transfer, etc.) that can be readily negotiated for cash. 5. Attractive Assets The extent to which the organisation handles assets that can be easily stolen
or misused. 6. Intellectual Property The extent to which the organisation holds information that can be traded, or has a cash value. 7. Services The potential for the misuse of facilities (e.g. undertaking private work in company time, abuse of motor vehicles, telephones, digital communications equipment, computers, publishing facilities, etc). Complexity 8. Computerisation Sophisticated information technology systems present an opportunity for fraudulent behaviour. (Of course, they may at the same time be a part of the control mechanism.) 9. Skill The degree to which judgment, academic or technical skills are required to undertake functions. 10.Diversity The extent to which tasks in an organisation, and the management systems needed to perform those tasks, are diverse. Public Contact / Sensitivity 11.Client Relations The extent to which exposure to client groups involves a fraud risk. 12.Business Relations The extent to which exposure to business community and pressure groups involves a fraud risk. 13.Human Relations The degree to which the influence of unions and public expectations may involve a fraud risk. Programme Reviews 14.Effectiveness of reviews in reducing exposure to risk. Stability 15.Procedures The impact of any changes to procedures or system redevelopment. 16.Personnel Continuity in personnel involved in control systems. 17.Organisation Effectiveness of reporting arrangements. 18.Character Does the programme have characteristics that adversely affect fraud control? Statutory Requirements 19.Legal/Regulatory Adequacy of legislation and other formal directions. Pressure to Meet Objectives Continued on page 30
Security Focus | Vol 33 No 7 2015
29
BusinessAgainstCrime
Continued from page 29 20.Deadlines The extent to which deadlines are an integral part of programme delivery. 21.Productivity The extent to which productivity pressures impact upon the programme. 22.Economic The extent to which performance is affected by external economic conditions and revenue targets. Size 23.Number of Departmental Staff 24.Multiple Locations 25.Projects Cost of projects undertaken by the organisation. 26.Rand Throughput 27.Volume of Transactions 28.Assets/Liabilities Magnitude of the assets or liabilities
6. Development Environment Maintaining the leading edge without excess cost. 7. Managerial Control Keeping it all on the rails.
controlled by the organisation.
INTERNAL CONTROL RISK General Control Environment 1. Corporate Framework Where the organisation is going and how it is going to get there. 2. Information Management Ensuring management has reliable information to make appropriate, timely and informed decisions. 3. Organisational Vulnerability Reducing the exposure to fraud risk.
Purchases/Payments 8. Ordering of Goods and Services The right quantity/quality at the right time. 9. Commitment of Funds to Clients Approval of funding to the right people at the correct rate. 10.Accepting Charges Ensuring the organisation only pays for what it gets. 11.Controlling Payments Payment of the right amount at the right time to the right people. 12.Overall Control and Management Assurance that expenditure is under control and properly reflects results. n
Information Technology 4. Processing and Operations Having the computer power an agency needs and when it needs it. 5. Security The right information in the hands of the right people.
THREAT ASSESSMENT SCHEDULE Organisation ……………………………………….. FUNCTIONAL AREA
ACTIVITY
CRITICAL ACTIVITY
RELEVANT RISK CRITERIA
For example: Purchasing, Creditors, Pay and Allowances, Human Resources, Production etc
Describe the functions performed in detail
Describe the List the relevant inherent most important risks and internal control functions risks. See Annexure A to this Chapter for ideas.
COMPROMISE
PROTECTION IN PLACE
AREAS OF WEAKNESS
Analysis of all possible ways a person/people can overcome the activity to gain unjust advantage.
Detail the controls in place and equipment installed to close the areas of compromise and neutralise the threat.
Detail the areas of weakness highlighting those in the areas of critical activity.
THREAT PROFILE PRODUCT/ SERVICE
VOLUME VALUE RELEVANT DEPARTMENT/BRANCH
MAJOR SUPPORTING GENERAL FACTORS RECORDED LEVEL OF THREAT SYSTEMS (DETAILS) CASES H/M/L COMMENTARY
RISK PROFILE SEGREGATION LEVEL OF MONITORING OF DUTIES AUTHORITY & SUPERVISION
30
VALUE PAPER OFFICE PROCEDURES DESIGN SECURITY (OUTLINE OF KEY CONTROLS)
Security Focus | Vol 33 No 7 2015
ASSESSMENT ACTION (IF REQUIRED) OF RISK (COMMENT AND PRIORITY ONLY)
OpinionPiece
High-capacity hard drives a ‘must’ for entertainment industry surveillance With no less than 1 600 surveillance cameras combined with analogue monitoring and digital hard drive storage, it wasn’t long before prosecutors called Montecasino’s assistant surveillance manager Clinton Vigne as state witness to help trace the movements of murder accused Marushka Robinson and JP Malan.
A
fter murdering Dustan Blom and dumping his body in the boot of his car at the entertainment complex in Fourways, the killers proceeded to draw more than R10 000 in cash to abet a drug and alcohol-fuelled shopping spree. Thanks to Montecasino’s always-on surveillance system, the suspects were quickly apprehended and called to stand trial. Just another example of the critical importance of CCTV surveillance when it comes to the prosecution of suspects in some of South Africa’s most heinous crimes. Security Focus recently chatted to Kalvin Subbadu, WD (a Western Digital company) components sales manager, South Africa, about WD’s latest technology developments and new capacities in the surveillance hard drive arena. These new product launches are specifically aimed at helping entertainment facilities such as casinos and other entertainment complexes reduce risk and improve visibility. Surveillance systems form an essential part of the integrated security solution for entertainment facilities. To ensure client safety and reduce incidents of fraud and theft, these environments require hundreds or even thousands of CCTV cameras, ensuring that every inch of the facility is covered. It is therefore essential for entertainment facilities to make use of larger-scale, alwayson digital network video recorder (NVR) surveillance systems with more hard drive bay counts and a greater number of camera feeds. “With the use of larger and more intricate scalable NVR surveillance systems, there is a heightened need for these facilities to upgrade their hard drives and increase the storage capacity as well,” says Mr Subbadu. “Further driving this need is the emergence and uptake of high definition or 4K cameras that deliver better quality footage, but require more storage space. “This is necessary to ensure more footage can be saved on one hard drive and, ultimately, increase the total capacity of a digital video network (DVN), higher durability and longer video retention periods for evaluation and analysis.” He emphasises the importance of drives to be specifically engineered for demanding
surveillance environments, allowing them to function continually in an always-on NVR environment. This ensures that security monitoring employees and surveillance managers never miss a single and possibly critical moment. WD, a Western Digital company and storage industry specialist, recently launched the WD Purple NV, a purpose-built line of 3.5-inch, high-capacity 4 TB and 6 TB hard drives for the greater demands of scalable network video recorder (NVR) surveillance systems. Compared with standard WD Purple drives, the new member of the WD’s surveillance video recording family of drives, WD Purple NV, is designed for larger-scale network surveillance systems that use higher hard drive bay counts and a greater number of attached cameras, which demand increased storage capacity and durability. The new drives’ high capacities also enable long video retention periods for analysis and reference. The WD Purple NV is designed to withstand
the demands of always-on digital NVR recording environments. It offers low power consumption and many advanced performance features typically reserved for higher-end surveillance storage. “NVR surveillance systems can produce significant amounts of data, which makes the WD Purple NV hard drive a perfect solution for NVR systems that need high quality recording, playback and high capacity storage,” says Mr Subbadu. “The local surveillance market is also experiencing increased demand for high definition (HD) and Ultra HD cameras that require more hard disk space,” he added. He says that larger enterprises and security firms that offer surveillance solutions with a centralised control room and storage are increasingly looking towards higher capacity systems that can cater to volumes of footage. “It’s absolutely essential that the right hard drive is used in a specific environment in order to record higher quality footage and guarantee flawless playback,” he concluded. n
Security Focus | Vol 33 No 7 2015
31
InternationalNews
ACT secures Welsh school
D
yfed Alarms is installing access control equipment from ACT at a mixed comprehensive school in Wales. Ysgol Dyffryn Aman has 1 600 pupils studying across a large campus with a sixth form of more than 300. Staff and students are benefiting from protection offered by ACTpro 4 000 door controllers and ACTpro door stations on interior and perimeter doors. The ACT hardware uses low bandwidth and auto-discovery for easy installation and maintenance combined with advanced features such as timed anti-passback and counting areas. Staff at the school activate doors using 13.56MHz MIFARE fobs and ACTpro MIFARE 1030PM readers which, unlike many competitor brands, can read data from any of the 16 sectors on a card, so offering the extra security levels required for education applications. Typical usage at the school is for specialised teaching areas such as science laboratories and infrastructure, including plant rooms. The system is configured with time zones so doors to common areas open automatically during breaks and lunchtime and, subsequently, relock.
32
The access control system at the school has been extended to secure a link with an adjacent public leisure complex featuring two swimming pools, an athletics track, astroturf pitches and a gymnasium. School administrators are able to use ACT management software to track door usage and analyse trends in movement around the site, as well as designing and printing identity cards. To date, Dyfed Alarms has secured 50 doors with ACT units while the school conducts phased refurbishments block by block. Ysgol Dyffryn Aman is a co-educational nondenominational school located in Ammanford at the foot of the Black Mountains with a large catchment area covering both rural and urban neighbourhoods in Carmarthenshire. In its most recent Estyn inspection (equivalent to Ofsted in England) the school was adjudged “good.” Des John, business development manager at Dyfed Alarms, said: “The fact that we have been using ACT on successive modular installations over three years at the school is testimony to the build quality and reliability of the products. “For this kind of educational installation, ACT
Security Focus | Vol 33 No 7 2015
is the only company we specify. The technical support is first-rate and in the rare event of a problem, engineers always come to the site promptly. “We are currently using ACT equipment at another school in Whitland, also in the county of Carmarthenshire.” Classes at Ysgol Dyffryn Aman reflect and enhance the bi-lingual nature of the area. Many students represent their county and country at sports. In its current and former identities, the school has produced impressive alumni. Past pupils include the prominent zoologist Prof Donald Arthur, musician John Cale (founder member of The Velvet Underground), international soccer player Dai Davies and international rugby players Don Tarr and Shane Williams. From a Carmarthen base, Dyfed Alarms covers west, mid and south Wales. Founded in 1977 as an independent company, it is one of the largest suppliers and installers of access control, CCTV, and fire detection equipment in Wales. Dyfed Alarms’ operations include education, healthcare, office space and retail. The company is NSI-approved and a member of NICEIC. n
InternationalNews
New security capabilities from GJD GJD, one of the world’s most innovative leaders in British manufacturing and design of professional external detector equipment, has launched its brand new IP connected LaserWatch surveillance sensor at this year’s IFSEC exhibition in the United Kingdom. The Laser-watch is the newest addition to the company’s extensive IP/digital range. The Laser-Watch is a powerful sensor for detecting objects and humans with great accuracy at long distances. A major advantage is that it can be used without the need for light, reflectors or separate transmitters and receivers that are used by other systems. It is the perfect solution for police stakeout operations and other temporary perimeter security systems including harbours, airports, large industrial areas and large freight terminals. Offering a new class of surveillance technology, the Laser-Watch reaches distances up to 500 metres, and works in conjunction with a powerful web-based user interface, enabling the user to remotely change detection
settings at anytime from anywhere. Another benefit is the 20 fully adjustable alarm zones with individual sensitivity settings and alarm actions that can meet any situation. Mark Tibbenham, managing director at GJD commented: “The new Laser-Watch is an industry leading technology that will deliver utmost precision, regardless of lighting or weather conditions for a wide range of sectors.” Typical applications include perimeter control as the sensor can detect all objects crossing a virtual fence, which is especially useful when a physical fence is not desirable. The Laser-Watch is also perfect for spot surveillance in a specific area, for example a specific part of a road, an entrance to a house or along a wall. The innovative sensor can also be used to detect if an object moves, as it can be located anywhere with a clear line of sight to the object. Not only does the sensor detect an intrusion, it also knows the precise position of an object or a person. The Laser-Watch is known for reliability and accuracy as it offers a near zero
false alarm rate, while increasing the number of genuine detections. The GJD Laser-Watch sensor is powered with power-over-Ethernet and can be used as a stand-alone unit or as part of a system with multiple IP surveillance sensors and IP cameras connected to a server. Owing to the low power consumption, it is energy-efficient and environmentally-friendly. Other key advantages of the Laser-Watch include low installation costs, minimal maintenance and a heavy-duty weatherproof design. n
SIA commends US Senate By Mickey McCarter, Communications Director, SIA US The Security Industry Association (SIA) of America commends the US Senate for approving the bipartisan measure re-authorising the African Growth and Opportunity Act (AGOA), S.1267, on 14 May. In addition to extending the Act, which expires on 30 September, the bill includes a new provision establishing an out-of-cycle review mechanism to ensure compliance with fair trade practices required of sub-Saharan countries receiving export preferences under AGOA. Forced localisation Over the past year, SIA urged the committees drafting the AGOA extension to address the Private Security Industry Regulation Amendment Act (PSIRA) under consideration by the South African government. PSIRA contains a provision, inserted at the last minute during parliamentary consideration, which requires foreign-owned security companies, including technology firms, to sell at least 51 per cent of their South African businesses to South Africans, in what is often referred to as a “forced localisation”
measure. A surprise to many observers, the provision was included despite the fact that such companies are already required to exclusively employ South African citizens within the country. Protective measures The review mechanism in the Senate passed bill allows firms to petition the US Trade Representative (USTR) to investigate actions they believe may violate AGOA eligibility criteria. If found in violation, the USTR would be authorised to limit benefits or suspend the country from AGOA participation. Additionally, in an unprecedented move, the bill singles out a country for immediate review, requiring South Africa to undergo a six-month review beginning within 30 days of enactment. “The inclusion of this enhanced oversight provision in the Senate passed bill will lead to a more reciprocal and balanced trade relationship with beneficiary countries, most notably South Africa, the largest beneficiary of AGOA preferences by far,” said Jake Parker, SIA director of government relations.
It is important to note that the out-ofcycle review mechanism is not an additional eligibility requirement, but rather a provision to ensure compliance with AGOA, Mr Parker said. Under the existing agreement, such a review could only occur at the end of AGOA’s five-year cycle, making it difficult to hold beneficiaries accountable to their commitments. The PSIRA Act is awaiting the South African president’s signature to pass it into law. The South African industry organisations, business, trade and law exports who oppose the foreign ownership limitation clause have called for South African president Jacob Zuma to send the PSIRA Act back to parliament for the removal of the offending section on expropriation. “If the South African parliament does not remove the discriminatory clause from the PSIRA Act, it is highly likely such an issue would be raised as a matter of concern during the South Africa review required under the AGOA re-authorisation moving through Congress,” Mr Parker said. SIA calls on the House of Representatives to expeditiously act on AGOA re-authorisation. n
Security Focus | Vol 33 No 7 2015
33
InternationalNews
Alpro at historic building in West End Transom door closers, bespoke pull handles and locks from Alpro Architectural Hardware have been installed at Henry Wood House, The Office Group’s new flexible work space on Riding House Street, in the heart of London’s West End.
Avigilon appoints new CFO Avigilon Corporation has appointed Ric Leong as chief financial officer (CFO) of the company effective 1 July, 2015. Mr Leong will succeed Avigilon’s current CFO Wan Jung, who will continue to serve on the company’s Board of Directors.
34
The 16-storey property is an historic former BBC building that has been transformed to provide design-led flexible offices and coworking space. Fabricator IDF Aluminium has used Alpro’s transom closers in aluminium partitions within the building, and the concealed nature of the closers (within the transom header bar of the doors) has preserved the aesthetics of a design by architects Buckley Gray Yeoman. The Alpro transom closers are a means of hydraulically controlling the opening and closing of aluminium doors. They enable facility managers to adjust the latching and closing force created by the hydraulic valve according to the weight and height of individual doors, as well as type of usage. Design and aesthetics are a major consideration for The Office Group and Alpro modified their Functional 98 pull handles with a bespoke overrun at either end to suit the project. The pull handles are manufactured from 316-grade stainless steel and can be straight or offset. They are supplied with bolt-thru or back-to-back fixings as standard and powder or nylon-coated finishes to the user’s precise colour requirements can be specified and delivered to short lead times. Keith Parry, sales director at Alpro, said: “Our transom closers are designed for durability
Security Focus | Vol 33 No 7 2015
and have been tested independently at 250 000 double-action cycles. “Internal use of the kind seen at Henry Wood House is unusual, but the glass partition areas in the building are extensive. “It’s rewarding to work on an historic building named after the conductor, Sir Henry Wood, and our components form part of a fitout performed to the highest design standards.” He continued: “We already have a strong presence in Westminster and our bolt-andstrike plates are in use at the nearby University of Westminster in Regent Street. “The Office Group has used Alpro equipment on four other projects and the architects have even used our components at their own premises, the iconic Tea Building in Shoreditch.” IDF Aluminium specialises in the design, manufacture and installation of aluminium doors. The door solutions are designed for use in commercial and public sector environments where usage may be high, but maintenance costs must be minimised. The company has 30 years’ experience in the shopfront and commercial door market. IDF Aluminium ensures a quality service by designing and fabricating all its doors and shopfronts inhouse with no use of sub-contractors. The client portfolio covers transport, local government, healthcare and education from schools through to universities. n
InternationalNews
Hikvision honoured by ESA Hikvision, the world’s leading provider of innovative, award-winning video surveillance products and solutions, was honoured as an Executive Strategic Partner of the Electronic Security Association (ESA) at a special event on 24 June, 2015. Established in 1948, ESA is the largest trade association representing the electronic life safety and security industry. Member companies install, integrate, monitor, and/or manufacture intrusion and fire detection, video surveillance and electronic access control systems for commercial, residential, industrial and governmental clients. ESA established the Executive Strategic Partnership (ESP) programme in 2008 to provide funding and support for ESA programmes that promote and augment the security industry. Hikvision’s commitment to innovative
security technology and enrichment opportunities for customers make them a wellsuited partner to ESA, which provides leading industry education and valuable benefits to security installing member companies, enhances public safety, and serves as a leader in the industry. A special reception, ESA celebrates, was held in Baltimore in the US on 24 June, the first evening of the Electronic Security Expo (ESX) there. This event provided an opportunity to network and celebrated the contributions of ESA volunteers, committees, professional groups and Executive Strategic Partners. The reception also provided attendees the chance to learn more about ESA’s annual philanthropy project, ESA Gives Back, and their chosen charity for 2015: The Green Beret Foundation. The event included recognition for ESA’s
Executive Strategic Partners and professional group sponsors. Alex Asnovich, director of marketing for Hikvision US, accepted a plaque on behalf of Hikvision. “Hikvision is proud to support ESA and we are thrilled to be recognised as one of their most valuable partners,” Mr Asnovich stated. “As Hikvision continues its rapid growth in North America, we are dedicated to cultivating strong relationships with industry-leading organisations such as ESA.” Said ESA president Marshall Marinace: “On behalf of all our members, I would like to thank Hikvision for their support and commitment to ESA and the industry. “Hikvision’s financial support as a Silver Executive Strategic Partner of ESA ensures we are able to continue to raise the bar for our members and offer valuable member benefits. We look forward to working with Hikvision as part of our ESP programme for years to come.” n
Security Focus | Vol 33 No 7 2015
35
INTERNATIONALOPINION
Headline Headline
How will integrated MNS change the industry? The mass notification systems (MNS) market has historically been segmented between indoor, widearea, and distributed recipient notification hardware and software.
I
n its most recent report on the MNS market, Jared Bickenback, an analyst for security and building technologies at IHS found that some end-users are beginning to install integrated MNS solutions that use a combination of indoor, wide-area, and distributed recipient notification technologies to ensure notifications reach the largest number of people. IHS expects integrations of multiple notification modalities to be a key driver of growth in the Americas market over the next five years. IHS found the fastest growth within the Americas industrial market. IHS expects a large percentage of this growth to be the result of increased uptake in integrated MNS solutions. IHS expects the industrial market to increase by more than seven per cent over the next five years to more than $320-million as a result of the uptake in integrated MNS solutions.
Our Take What is driving the uptake of integrated MNS solutions? • A major factor contributing to the uptake of integrated MNS solutions is the introduction of IP notification appliances. The use of IP notification appliances such
36
• •
as speakers, sounders, strobes, and digital signage has enabled MNS vendors to connect these appliances to building management systems and life safety control panels which can also send messages via indoor, wide-area, and distributed recipient notification systems. This allows end-users to send notifications across multiple notification devices to ensure notifications are received. Enterprise MNS solutions are also driving investment into integrated MNS solutions. IHS found that large industrial end-users have a need to integrate their notification systems across multiple facilities and regions. This enables the corporate office to monitor and notify employees throughout an organisation of an emergency and allows local offices to notify the corporate office in the event of an emergency. The ability of an organisation to use its MNS solution for purposes other than emergency communications was found to be a major factor when deciding to install an integrated MNS solution. IHS found that organisations are installing integrated solutions for business processes, business continuity, and
Security Focus | Vol 33 No 7 2015
information technology uses. What does this mean for the MNS market? • As end-users look for more integrated MNS solutions, IHS expects system integrators and physical security information management (PSIM) vendors to take a more prominent role in the MNS market. • Increased demand for integrated MNS solutions is also expected to drive more open protocols within the MNS software market. As end-users demand seamless integration with existing notification appliances, IHS expects MNS vendors to adopt more open software protocols to enable multiple systems from different manufacturers to work together. The need to notify personnel in the event of an emergency is expected to remain a key driver of growth in the MNS market. However, as integrated solutions gain more traction in the MNS market, IHS expects system integration companies to have a larger role in the market. This is expected to result in more cooperation between MNS suppliers as endusers drive demand for seamless integration of notification solutions. n
Law&Security
When an order of court is not acted upon
D
By Peter Bagshawe
uring the latter part of June 2015, the two-day African Union Summit, held in Sandton, was catapulted into the international press by, initially, the arrival of Sudanese president Omar al-Bashir and, subsequently, the failure of the government to comply with the order issued by the Gauteng High Court sitting in Pretoria on Sunday, 14 June, requiring that al-Bashir be detained in compliance with warrants of arrest issued by the International Criminal Court. Briefly stated in 2008, the International Criminal Court indicted al-Bashir to appear on war crimes charges allegedly related to the torture, rape, murder and displacement of civilian, as well as the attempted genocide of the Fur, Masalit, and Zaghawa ethnic groups during the Sudanese conflict, and in accordance with the charges warrants of arrest for al-Bashir were issued in 2009 and 2010. To contextualise the charges, the International Criminal Court estimate between 300 000 and 400 000 people died and some 2 500 000 were displaced during the course of the conflict. South Africa is one of 31 African states that are signatories to the International Criminal Court’s Rome Statute, and South Africa has enacted its own International Criminal Court Implementation Act in terms of which South Africa is obliged to give effect to the warrants issued by the ICC. Once it was established that al-Bashir was in South Africa, the Southern African Litigation Centre made an urgent approach to the Gauteng High Court seeking an order instructing the South African authorities to arrest al-Bashir under South Africa’s International Criminal Court Implementation Act, which obliges South Africa to carry out its obligations to the ICC. This was after approaches made previously to the ICC prosecutor requesting an exemption from its obligation to detain a-Bashir by South Africa’s Ambassador to the Netherlands (which is the seat of the ICC). The Presiding Judge of the ICC issued an order dismissing South Africa’s application for permission not to arrest Al-Bashir following a request by the ICC prosecutor for a clarification order. The ICC Presiding Judge found that there was no lack of clarity in the law, and further that the Republic of South Africa was not subject to competing obligations (as averred by Ambassador Bruce Koloane) as the immunities granted to Omar al-Bashir under international law as a head of state have been
implicitly waived by a resolution of the Security Council of the United Nations. This, in turn, was followed by a statement issued by the President of the Assembly of the States Parties to the Rome Statute (which is the governing body of the ICC) reminding South Africa of its obligation to arrest al-Bashir in terms of the two warrants of arrest referred to above. The position of the South African government was that al-Bashir enjoyed immunity from arrest by South African authorities on behalf of the International Criminal Court and prosecution by the ICC as an attendee at the African Union Summit, and the African Union had instructed members not to co-operate with the ICC, which is perceived as acting with partiality and having an anti-African bias. In addition, the South African government had voted for and enacted in the Government Gazette that all participants at the African Union Summit would be granted immunity in accordance with international norms. The Gazette did not, however, specify that this immunity would extend to heads of state. On Sunday, 14 June, Judge Hans Fabricius issued an order requiring the South African authorities instruct officials at all points of entry and exit to South Africa to stop al-Bashir from leaving the country. The government immediately advised they would appeal the decision and on the Monday, an urgent hearing was convened before a bench comprising Judge President Dunstan Mlambo, Judge Hans Fabricius and Deputy Judge President Aubrey Ledwaba. During the course of the hearing, the State advised that al-Bashir had left South Africa. In response to this, the Court instructed the executive be asked to file an affidavit explaining the circumstances in which President al-Bashir left the country, as well as suggesting that the National Director of Public Prosecutions investigate how the valid court order was violated. The finding of the appeal was that alBashir should be detained and handed to the International Criminal Court. Justice Mlambo stated in his judgment: “A democratic state based on the rule of law cannot exist or function if the government ignores its constitutional obligations.” These findings collectively seem to have been taken rather poorly by the African National Congress, as well as the government, with both ANC Deputy Secretary General Jesse Duarte (who termed the failure to comply with the order of court unfortunate, but politically necessary), Secretary General
Gwede Mantashe, who referred to ” judicial overreach” speaking out against the judgment, and Police Minister Nathi Nhleko reportedly commenting adversely on elements within the judiciary. Blade Nzimande, of the South African Communist Party, stated that he sees the judiciary as encroaching on the territory of the Executive. In an unprecedented step, Chief Justice Mogoeng Mogoeng called a meeting of heads of courts, attended by 27 of the most senior sitting judges, to discuss the al-Bashir issue, as well as what is perceived in some quarters as an orchestrated attack on the judiciary as a precursor to a meeting that the Chief Justice wishes to have with State President Jacob Zuma. Of primary concern here is the upholding of the separation of powers that constitutionally applies to the judiciary and which, in turn, is fundamental to the upholding of the Rule of Law. From material available, the decisions of the two sittings of the Gauteng High Court appear to have been in accordance with the legal requirements of the Rome Statute (which specifically excludes heads of state from immunity from prosecution), as well as the South African International Criminal Court Implementation Act and correct at law. The apparent decision of the government not to give force and effect to the initial decision of Justice Fabricius, as well as permitting the departure of the Sudanese delegation during the hearing of the appeal on Justice Fabricius’s decision, also appears to have been a calculated and politically-based decision. The argument has been put forward that the detention of al-Bashir would have impacted on South Africa’s standing in Africa, and could have placed South African troops deployed in Africa on peace keeping missions at risk. The logistics of any extradition would have been lengthy and complex, run counter to decisions of the African Union, and were in conflict with the specific indemnity granted attendees of the African Union Summit by the South African government. Until the required affidavit and details called for by Justice Mlambo are made available from the Minister in the Presidency, Minister of State Security, the impasse between the government and one of its primary and most well respected institutions, will remain. In the interim, the tensions between the judiciary, Executive and political parties remain a source for deep concern, as well as inviting interest with regard to the manner in which this will be resolved on a political, as well as Continued on page 38
Security Focus | Vol 33 No 7 2015
37
Indexofadvertisers
Vol 33 No 7 Advertiser
Page No. E-mail
Website
Active Track
5
info@activetrack.co.za
www.activetrack.co.za
Deggy SA
7
deggy@deggy.co.za
www.deggy.co.za
Elvey Security Technologies
13, 25
info@elvey.co.za
www.elvey.co.za
Global Communications
15
Guard Track
6
info@guardtrack.co.za
www.guardtrack.co.za
Instacom
16-17
o@instacom.co.za
www.instacom.co.za
Plaslope
39
glenda.aereboe@plaslope.com
www.plaslope.com
Protea Coin
OFC
info@proteacoin.co.za
www.proteacoin.co.za
Mutual Safe & Security
23
info@mutual.co.za
www.mutual.co.za
Powelltronics
27
marketing@powelltronics.com
www.p-tron.com
RBWSA
14
info@rbwsa.co.za
www.rbwsa.co.za
RDC
IFC
leeann.a@radiodata.co.za
www.radiodata.co.za
SASA
IBC
info@sasecurity.co.za
www.sasecurity.co.za
Sparks & Ellis
19
Sunell
OBC
mj@sunellsecurity.com
www.sunellsecurity.com
Wright Surveillance
11
info@wrightcms.co.za
www.wrightcms.co.za
www.globalcomms.co.za
www.sparks.co.za
When an order of court is not acted upon Continued from page 37 practical basis. Also of interest will be action taken by the newly-appointed Director of National Director of Public Prosecutions, Shaun Abrahams, who is faced with something of a baptism of
fire after being appointed to the post on 7 July 2015. In the interim, the exposure of the Rule of Law, recognised as the cornerstone of democracy, to external influence, is a cause for worry and needs to be openly debated. n
PETER BAGSHAWE holds a Bachelor of Law degree from the former University of Rhodesia and a Bachelor of Laws degree from the University of the Witwatersrand.
Subscribe to To: Security Publications SA (Pty) Ltd, PO Box 414, Kloof, 3640 Tel: (031) 764-6977 Fax: (031) 764-6974 E-mail: jackie@contactpub.co.za p Yes, please, I would like to subscribe to Security Focus. (Cost: R525,00 per year). (RSA Only) The subscription includes an annual Buyer’s Guide. p Enclosed please find cheque to the amount of R............................... p Please start my subscription from the..........................................issue. Do you require a tax invoice p Yes p No (If yes, one will be sent to you on receipt of your payment.)
Banking Details: First National Bank, Kloof Branch Code: 221526 Account Number: 50730011968 Account Name: Security Publications SA (Pty) Ltd
NB: Please make cheques payable to Security Publications SA (Pty) Ltd Name:....................................................................................... Signature:................................................................................................... Date:............................................Company:.................................................................. Position:................................................................. Address....................................................................................................................................................................Code:........................... Tel:..........................................................................................................Fax:................................................................................................
38
Security Focus | Vol 33 No 7 2015
Calendar
Calendar of conferences, events and exhibitions of interest to the security industry – both local and international LOCAL EVENTS: 2015
Bangkok, Thailand. More information: Thailand Convention & Exhibition Bureau. Tel: +662 642 6911 Ext 121. E-mail: info@asiandefense.com. Website: www. asiandefense.com
September 6-9: CAMPROSA Annual Conference. Venue: Table Bay Hotel, Cape Town. More information: John Tunstall. Tel: (028) 313-1711. E-mail: jtunstall@iafrica. com. Website: www.camprosa.co.za
November 11-12: Sectech Sweden 2015. Venue: Rica Talk Hotel, Stockholm, Sweden. More information: AR Media International. Tel: +46 (0)8 556 306 80. Fax: +46 (0)8 19 10 11. E-mail: deniz.baykal@armedia.se. Website: www.sectech.nu
LOCAL EVENTS: 2016
INTERNATIONAL EVENTS: 2016
May 24-26: SECUREX 2016. Venue: Gallagher Convention Centre, Midrand, Johannesburg. More information: Joshua Louw. Tel: (011) 835-1565. E-mail: joshual@specialised.com
INTERNATIONAL EVENTS: 2015 September 22-24: Safety & Security Netherlands. Venue: Amsterdam RAI, Netherlands. More information: RAI Exhibitions. Tel: +31 (0) 341 253685. Fax: +31 (0)20 549 1843. E-mail: h.v.egdom@nai.nl. Website: www.rai.nl September 22-24: SecurityUser Expo 2015. Venue: Bella Centre, Copenhagen, Denmark. More information: AR Media International. Tel: +46 8 556 306 80. Fax: +46 8 19 10 11. E-mail: info@armedia.se. Website: www.armedia.se October 5-7: Fire India 2015. Venue: PragatiMaidan. New Delhi, India. More information: Reed SI Exhibitions. Tel: +911145055500. E-mail: info@reedsi.com. Website: www.fire-india.com October 21-23: CAIPS 2015. 8th Central Asian International Protection, Security and Fire Safety Exhibition. Venue: Uzexpocentre, Tashkent, Uzbekistan. More information: Agnius Kazalauskas. Tel: +44 207 596 5079. E-mail: security@iteevents.com Website: www.ite-exhibitions.com November 2-5: Defence & Security 2015. Venue: IMPACT Exhibition Centre,
March 1-4: SIPS South Russia 2016. 7th South Russian International Protection and Security Exhibition. Venue: Krasnodarexpo EC, Krasnodar, Russia. More information: Agnius Kazalauskas. Tel: +44 207 596 5079. E-mail: security@iteevents.com Website: www.ite-exhibitions.com March 2-4: KIPS Kiev. Venue: Kiev, Ukraine. More information: Premier Expo. E-mail: info@pe.com.au April 12-14: LAAD Security 2016. Venue: RioCentre, Rio De Janeiro, Brazil. Website: www.laadsecurity.com.br April 13-15: CAIPS 2016. Venue: Venue: Almaty, Kazakhstan. Website: www.iteexhibitions.com/CAIPS April 17-21: SPIE DCS Defence + Security. Venue: Baltimore Convention Centre, Baltimore, United States. Website: www.spie.org May 4-6: Asian Securitex Hong Kong. Venue: Hong Kong Convention & Exhibition Centre, Hong Kong. Website: www.asiansecuritex.com June 21-23: IFSEC 2016. Venue: Excel Centre, London Dockland, UK. Website: www.ifsec.co.uk November 14-16: IFSEC Arabia. Venue: Riyadh, Kingdom of Saudi Arabia. Website: www.ifsec.co.uk November 16-17: Sectech Denmark 2016. Venue: Scandic Copenhagen Hotel, Copenhagen. Tel: +45-33-14 35 35. Website: www.armedia.se/
Tel: Fax: E-mail: Web:
+27 (0) 11 452-1115 +27 (0) 11 452-3609 glenda.aereboe@plaslope.com www.plaslope.com
TAMPER EVIDENT SECURITY BAGS l l l l l l
Reliable, permanent, special security closure to show evidence of tamper The closure system shows evidence of tamper by freezing, heat, aqua and solvent The bags are manufactured from high strength coextruded LDPE clear or opaque film Bags can be customised to your specification with high quality print of up to 5 colours (5 sizes of standard stock printed bags are also available ) Bags have a unique sequential number or barcode For security purposes the bags are printed along the edge of the side seals
SOUTH AFRICA’S LEADING SECURITY PACKAGING COMPANY
Under Licence to
DEBATIN Security Focus | Vol 33 No 7 2015
TM
39
Directory
SECURITY ASSOCIATION OF SOUTH AFRICA (SASA) SASA OFFICE BEARERS
REGIONAL OFFICE BEARERS
ADMINISTRATION
Suite 147 Postnet X2, Helderkruin 1733
Gauteng: Christiaan Oelofse E-mail: coelofse@adt.co.za Cell: 082 339-3398
National Administrator: Tony Botes Cell: 083 272 1373 E-mail: info@sasecurity.co.za Fax: 0866 709 209
National President: Costa Diavastos Cell: 082 498-4749 E-mail: CostaD@servest.co.za National Chairman: Chris Laubscher Cell: 082 441-4092 E-mail: laubscherc@proteacoin.co.za National Deputy Chairman: Marchel Coetzee Cell: 084 440-0087 E-mail: marchel_coetzee@omegasol.com
KwaZulu-Natal: Gary Tintinger E-mail: garyt@enforce.co.za Cell: 084 429 4245 Western Cape: Koos van Rooyen E-mail: kvanrooyen@thorburn.co.za Cell: 082 891-2351
Accounts: Yolandi Evans Cell: 061 470-8736 E-mail: accounts@sasecurity.co.za Fax: 0862 124 142
OTHER SECURITY AND RELATED ASSOCIATIONS AND ORGANISATIONS PSIRA — Private Security Industry Regulatory Authority, Eco Park, Centurion. Tel: (012) 003 0500/1. Independent Hotline: 0800 220 918. E-mail: info@psira. co.za Director: Manabela Chauke. Council Members: Mr T Bopela (chairperson); Ms Z. Holtzman (vicechairperson); Advocate A. Wiid (council member); and Commissioner A. Dramat (council member). APPISA – Association for Professional Private Investigators SA, Box 8064, Minnebron 1549. Cell: 073 371-7854 or 072 367-8207. Fax: 086 689-0166. E-mail: info@appelcryn.co.za. Website: www.appelcryn.co.za. President: Ken Appelcryn. Secretary: Dianne. ASIS International — Johannesburg Chapter No. 155. Box 99742, Garsfontein East 0060. Tel: (011) 652-2569. Website: http://www.asis155jhb.webs.com/ President/ Chairperson: Johan Hurter. Secretary: Chris Cray. ASIS International — Chapter 203: Cape Town – South African security professionals. President/Chairman: Yann A Mouret, CPP. Secretary: Eva Nolle. Tel: (021) 785-7093. Fax: (021) 785-5089. E-mail: info@aepn. co.za. Website: www.asis203.org.za bac — Business Against Crime, Box 784061, Sandton 2146. Chairman: James Fitzgerald. Tel: (011) 8830717. Fax: (011) 883-1679. E-mail: denise@bac.org. za. Eastern Cape: Box 40078, Walmer 6065. Tel: (041) 373-6401. Fax: (041) 373-6402. E-mail: info@bacec. co.za. Western Cape: 12th Floor Picbel Arcade, Strand Street. Tel: (021) 419-2044. Fax: (021) 419-2066. E-mail: jackie@bacwcape.co.za KwaZulu-Natal: 2 Hopedene Grove, Morningside, Durban 4001. Tel: (031) 207-8273. Fax: (031) 207-3900. Provincial manager: Jody Nair, e-mail jody@backzn.co.za Mpumalanga: Box 430, White River 1240. Tel: David Pretorius (general manager) (013) 751-3188. Fax: (013) 744-3555. Cell: 083 2735515. E-mail: david@bac_mp.co.za; or Ed Coombes (chairperson) 082 807-3916, fax (013) 752-6002, e-mail: ed.coombes@worldonline.co.za. North West: Postnet Suite 4415, Private Bag X82323, Rustenburg 0300; Charles Kendall (managing director) tel/fax: (014) 5923591, e-mail: charles.kendall@lonplats.com. Limpopo: Box 784061, Sandton 2146. Tel: (011) 883-0717; fax (011) 883-1679; e-mail: info@bac.org.za. Free State: Box 784061, Sandton 2146. Tel: (011) 883-0717; fax (011) 883-1679; e-mail: info@bac.org.za. CAMPROSA — Campus Protection Society of Southern Africa. President: Roland September. Tel: (021) 650-4858. E-mail: roland.september@uct.ac.za. Vice President: Derek Huebsch. Tel: (041) 504 2490. E-mail: derek. huebsch@nmmu.ac.za. Executive Secretary: John Tunstall. Tel: (028) 313 1711. E-mail: jtunstall@iafrica.com. Web: www.camprosa.co.za. CENSEC — Centre for the Study of Economic Crime. Director: Louis de Koker. Tel: (011) 489-2134. E-mail: ldekoker@uj.ac.za CISA — Cape Insurance Surveyors Association. Shahid Sonday (021) 402-8196. Fax: (021) 419-1844. E-mail: shahid.sonday@saeagle.co.za; or Mike Genard (021) 557-8414. E-mail: mikeg@yebo.co.za DRA — Disaster Recovery Association of Southern Africa, Box 405, Saxonwold 2132. Chairman: Grahame Wright, Tel. (011) 486-0677, Fax (011) 646-5587. Secretary/ Treasurer: Charles Lourens, Tel. (011) 639-2346, Fax (011) 834-6881. EFCMA — Electric Fencing and Components Manufacturers Association, Box 411164, Craighall 2024. Tel: (011) 326- 4157. Fax: (011) 493-6835. Chairperson: Cliff Cawood 083 744-
40
2159. Deputy chairperson: John Mostert 082 444-9759. Secretary: Andre Botha 083 680-8574. ESDA — Electronic Security Distributors Association, Box 17103, Benoni West 1503. Tel: (011) 845-4870. Fax: (011) 845-4850. Chairperson: Lee-Ann Andreka. Secretary: Shirley James. Website: www.esda.org.za ESIA — Electronic Security Industry Alliance, Box 62436, Marshalltown 2107. Tel: (011) 498-7468. Fax: 086 570 8837. Cell: 082 773-9308. E-mail: sia@iburst.co.za or steveconradie@iburst.co.za. Web: www.securityalliance. co.za FDIA — Fire Detection Installers Association, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: 087 808 7527. Fax: 086 518 4376. E-mail: fdia@fdia.co.za. Website: www.fdia.co.za President/Chairperson: Matt Kielty. Secretary: Jolene van der Westhuizen. FFETA — The Fire Fighting Equipment Traders Association, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157. Fax: 086 518 4374/ (011) 455-4126. E-mail: ffeta@tiscali.co.za. Website: www.ffeta.co.za. Chairperson: Astrid Wright. Vicechairperson: Meshack Gabeni. FPASA — Fire Protection Association of Southern Africa, Box 15467, Impala Park 1472. Tel: (011) 397-1618. Fax: (011) 397-1160. E-mail: library@fpasa.co.za. Web: www.fpasa.co.za. General Manager: David Poxon. GFA—Gate&FenceAssociation,Box1338,Johannesburg 2000. Tel: (011) 298-9400. Fax: (011) 838-1522. Administrator: Theresa Botha. HCSA — Hotel & Casino Security Association, Box 91728, Auckland Park 2006. Chairman: Dick Glanville, Tel: (011) 447-2700, Fax: (011) 447-3276. Vice-chairman: Frans Joubert, Tel: (011) 898-7333. Secretary/Treasurer: Graham Bendell, Tel (011) 728-4405; Cell 082 699-2392. HSA — Helderberg Security Association, Box 12857, N1 City Parow 7463. Tel: (021) 511-5109. Fax: (021) 511-5277. E-mail: info@command.co.za. Website: www. command.co.za. Chairperson: Stephen van Diggele. IFE — Institution of Fire Engineers (SA). Treasurer: A.E. Greig, Box 1033, Houghton 2041. Tel/Fax: (011) 7884329. E-mail: adminstaff@ife.org.za Website: www.ife. org.za. President: John Khoza Mpiyakhe. Secretary: Lindi Mujugira. ISA — Insurance Surveyors Association, Box 405, Saxonwold 2132. Chairman: Graham Wright (011) 4860677. Vice-chairman: Alan Ventress. Secretary: Alex dos Santos. LASA — Locksmiths Association of South Africa, Box 4007, Randburg 2125. Tel: (011) 782-1404 Fax: (011) 782-3699. E-mail: lasa@global.co.za Website: www.lasa. co.za President/Chairman: Alan Jurrius. Secretary: Dora Ryan. NaFETI — National Firearms Education and Training Institute, Box 181067, Dalbridge 4014. Chairman: M.S. Mitten. Vice: Ken Rightford (033) 345-1669. Cell: 084 659-1142. NaFTA — The National Firearms Training Association of SA, Box 8723, Edenglen 1613. National Chairman: Peter Bagshawe.Tel: (011) 979-1200. Fax: (011) 979-1816. E-mail: nafta@lantic.net POLSA — Policing Association of Southern Africa. Tel: (012) 429-6003. Fax: (012) 429-6609. Chairperson: Anusha Govender, 082 655-8759. PSSPF — Private Security Sector Provident Fund. Contact: Jackson Simon. Cell: 072 356 6358. E-mail: jackson@psspfund.co.za. Website: www.psspfund.co.za SAESI — Southern African Emergency Services
Security Focus | Vol 33 No 7 2015
Institute, Box 613, Krugersdorp 1740. Tel: (011) 6605672. Fax: (011) 660-1887. President: DN Naidoo. Secretary: Mrs S.G. Moolman. E-mail:saesi@mweb. co.za SAIA — South African Insurance Association, Box 30619, Braamfontein 2017. Chief Executive: B. Scott. Tel: (011) 726-5381. Fax: (011) 726-5351. E-mail: faith@saia.co.za SAIDSA — South African Intruder Detection Services Association, Association House, P O Box 17103, Benoni West 1503. Tel: (011) 845-4870. Fax: (011) 845-4850. E-mail: saidsa@mweb.co.za Website: www.saidsa.co.za President/Chairman: Johan Booysen. Secretary: Cheryl Ogle. SAIS — South African Institute of Security, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157 or 0861 111 418. Fax: 086 518 4374/ (011) 455-4126. E-mail: SAIS@tiscali.co.za. Website: www.instituteofsecurity.co.za. Chairman: David Dodge. Vice-chairman: Mike Verster. Administrative Manager: Rosemary Cowan. SAN — Security Association of Namibia, Box 1926, Windhoek, Namibia. Administrator: André van Zyl. Tel: +264 61 205 2264. Fax: +264 61 205 2350. E-mail: pagvz@nampower.com.na SANSEA — South African National Security Employers’ Association, Box 9553, Edenglen 1613. Administrators: SIA, Box 62346, Marshalltown 2107. Tel: (011) 498-7468. Fax: (011) 498-7287. E-mail: sia@iburst.co.za. SAPFED — Southern African Polygraph Federation. President: Ben Lombaard 083 793-1152. Secretary: Amelia Griesel 082 786-3347. E-mail: info@sapfed.org. Website: www.sapfed.org SAQCC FIRE — South African Qualification Certification Committee, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157. Fax: 086 518 4374. E-mail: saqccfire@tiscali.co.za. Website: www.saqccfire. co.za Management Committee: Chairman: Brett Jones. Vice-Chairman: Duncan Boyes. SAQCC Fire – 1475 Committee: Chairman: Tom Dreyer. Vice-Chairperson: JJ Scholtz. SAQCC Fire – Detection & Suppression Committee: Chairman: Matt Kielty. Vice-Chairperson: Laura Swart. SARPA — South African Revenue Protection Association, Box 868, Ferndale 2160. Tel: (011) 7891384. Fax: (011) 789-1385. President: Naas du Preez. Secretariat: Mr J. Venter, Van der Walt & Co. SDOA — Service Dog Operators Association, Box 49554, Hercules 0030. Tel: (012) 376-2152/3. Fax: (012) 376-2359. E-mail: company@ppscanine.co.za Chairperson: Mr F. van Kraayenburg. Tel: (012) 376-2266. SIA — Security Industry Alliance, Box 62436, Marshalltown 2107. Tel: (011) 498-7468. Chief Executive Officer: Steve Conradie. Website: www.securityalliance. co.za SKZNSA—SouthernKwaZulu-NatalSecurityAssociation. Tel: (039) 315-7448. Fax: (039) 315-7324. Chairman: Anton Verster – 082 371-0820. VESA — Vehicle Security Association of South Africa, Box 1468, Halfway House 1685. Tel: (011) 3153588/3655. Fax: (011) 315-3617. General Manager: Niresh Reddy. VIPPASA — VIP Protection Association of SA, Box 41669, Craighall 2024. Tel: 082 749-0063. Fax: 086 625-1192. E-mail: info@vippasa.co.za. Website: www.vippasa.co.za. Enquiries: Chris Rootman. Cell: 082 749 0063.E-mail: vippasa@protectour.co.za