White Collar Crime
South Africa’s biggest business scourge Billions of rands are being lost annually to the South African economy, and every single company needs to know how to combat white collar crime.
R149
inclusive of VAT and postage
But stocks are limited! First come, first served basis So, what’s included in this book? Here’s a table of contents ... • Establishing an Ethical Culture • Establishing Policy for Dealing with White Collar Crime
• Prevention and Combating of Corrupt Activities Act • Prevention of Banking Related Crime
• Risk Assessments
• Computers and Computer Crime
• Internal Controls
• Investigation
• Fraud Prevention
• Preparing for Trial
• The Crime Response Plan
• Money Laundering
• The Recovery of Assets
• A Disclosure Service: A Critical Component of a Risk Management Strategy
• A Practical Approach to the Prevention of Corruption
• Verification Services
PURCHASE ORDER To: Contact Publications (Pty) Ltd. Please send me ………. copies of Dealing with White Collar Crime at a total of R149 per copy inclusive of VAT, local postage and packaging. This order is being submitted via (tick relevant box): p POST at P O Box 414, Kloof 3640, KwaZulu-Natal, South Africa, along with a cheque made payable to Contact Publications (Pty) Ltd. p Fax at 031 764 6974, plus cheque to P O Box 414 as above or proof of EFT as below. p Email to accounts@contactpub.co.za plus cheque as above or proof of EFT made into FNB current account 50730106925, Kloof branch code 221526
Name................................................................... Position: .............................................................. Company:......................................................................................................................................... Address: .......................................................................................................................................... ............................................................................................................... Code: ............................... Tel: .......................................................................... Fax : ............................................................... Cell:..............................................................Email:.......................................................................... Contact Publications physical address: Suite 1, Fields Shopping Centre, Old Main Road, Kloof 3610, KwaZulu-Natal, South Africa. Telephone: +27 (0) 31 764-6977 For overseas postage rates and also bulk discounts for ten copies or more, contact Lynette Taylor at lynette@contactpub.co.za
Contents page SERVING THE SOUTH AFRICAN SECURITY
Cover Story
INDUSTRY FOR 33 YEARS
Features 12 Special Feature: Integration
In this article, Michel Chalouhi, Security Sales & Integration, discusses the art of upselling integrated security solutions; and Rob Anderson, executive director on the Board of EES Africa (Pty) Ltd, discusses the urban environment and security on page 18.
14 In Conversation With
Andreas Wolf, product manager, intelligent video surveillance at Dallmeier, discusses the “paradigm shift at the fence” with Security Focus.
16 Technology Update
I-CAT hosted live demonstrations earlier this year to showcase the importance of adopting effective suppressant solutions specifically designed for special fire risks.
20 IP-Based Security 8 Enforce Security ... dedicated to its core business Enforce Security recently underwent a necessary
business metamorphosis and has emerged stronger, more focused, and determined to continue challenging the status quo of the security industry.
With the move to IP-based security systems well underway across all market segments, small and medium-sized businesses (SMBs) are particularly benefiting from the modular, cost-effective and easy-to- deploy solutions available, says Jason McGregor, sales manager, Axis Communications.
25 Vehicle Security Update
Fit a tracking device for vehicle safety, says John Edmeston, global chief financial officer of Cartrack Holdings Ltd.
12
10
Security Focus
Advertising enquiries:
is published by the proprietor Contact Publications (Pty) Ltd (Reg No. 1981/011920/07)
Tel: (031) 764-6977 Fax: (031) 764-6974 e-mail: contact@secpub.co.za Publisher: Godfrey King Editor: Andrea Müller Production Leader: Colleen McCann Official Journal of the Security Association of South Africa
Layout & Design: Beth Marchand Subscriptions: Jackie Goosen
Bernadette Fenton
Cell: 082 443 8931. Fax: (031) 764-6974 e-mail: bernadette@secpub.co.za
VOL 33 NO 8 2015
ISSN 1022 6427
16
18 26 On The Market
Regulars
• Paxton introduces “next generation”. • Rosslare introduces AC-825IP. • Suprema extends versatility. • Suprema releases DM-20. • Real-time accountability with Active Track. • The age of “bring your own device”.
4 Comment
How to avoid the truth and manipulate people.
6 News • State and private crime prevention partnerships. • DoL amends Sectoral Determination 6.
30 International News
10 Opinion Piece
• S2 Security introduces video management system. • Oceania market forecast to shift towards network solutions. • North American growth to outpace Latin America. • Dallmeier keeps watchful eye. • Global market to reach $7b by 2019. • New partnership announced. • Alpro on the doors in Bournemouth. • Safe custodial detention with mini dome camera adaptor.
Simmeon Tassev, director and QSA at Galix, discusses preparing for the PCI DSS compliance journey in this opinion piece.
22 Company News • Planting trees of success with Elvey and Khulasizwe Primary. • Dallmeier starting series of live demonstrations. • Kit Group chosen to “kit out” Flight Centre. • Demo and training facility launched. • RISCO wins again. • Nautic to deliver range of boarding craft to SA Navy.
35 Association News • A Word from the Chairman. • Golf day raises generous support for Children of Fire. • SAQCC Fire hosts SAIS 2015 annual general meeting
37 Law & Security
National Police Commissioner under inquiry.
38 39 40
Index of Advertisers Calendar Directory
20 Head Office physical address: Suite 1, Fields Shopping Centre, Old Main Road, Kloof 3610 Postal address: P.O. Box 414, Kloof 3640, South Africa Publication details: Security Focus is published monthly Printed by: Paarl Media KZN, 52 Mahogany Road, Westmead. www.paarlmedia.co.za
www.twitter.com/SecurityFocusza
Subscription rates: Annual subscription for magazine posted in Republic of South Africa is R525 including VAT and postage. Subscription rates for addresses outside South Africa can be obtained on application to the Subscription Department, Box 414, Kloof 3640. Editorial contributions: Editorial contributions are welcome. For details please contact the Editor, Security Focus, on Tel: (031) 764-6977, or Fax: (031) 764-6974, or write to the editorial office address detailed elsewhere in this column.
36
Security Focus is a member of
editors comment
How to avoid the truth and manipulate people
R
emember that old book: How to Win Friends and Influence People? Well, have you read the latest edition, compliments of the local political landscape? The National Prosecuting Authority’s reappointment of Nomgcobo Jiba the very day after fraud and perjury charges against her were dropped – utterly shameful. Citizen editor, Steven Motale’s dramatic front page Mea Culpa to Jacob Zuma – outlandish and cringe-worthy. What’s next?
Well, just when you thought things couldn’t get any stranger, did you know that reporting on crime could actually encourage it? In yet another example of bizarre political logic, the SABC chief operating officer, Hlaudi Motsoeneng, during a “State of The Media” television interview, made a strong call to the South African media to please curb all its excessive crime reporting. Apparently, when you keep talking about something, you actually encourage it. Motsoeneng, who heads up the nation’s public broadcaster said during the interview that he believes the role of the media is to “influence” people. “If you are always reporting about crime and people who appear on the newspaper or on media in general, it’s about crime, you are also influencing the young ones to commit crime because they will believe that for them to be seen they should commit crime,” he asserted. You may recall that this is the very same Hlaudi Motsoeneng who has, for an extended period of time, been trying to shake off that pesky bunch at the DA, hell-bent on having him dethroned as chief operating officer at the SABC. Last year he even formulated the Hlaudi Motsoeneng Coalition, which cited Public Prosecutor, Thuli Madonsela as a messenger of the DA, contracted to spearhead its “mischievous political agendas”. Why? Because Motsoeneng had not quite managed to evade the Public Prosecutor’s radar when one of her reports pointed out his less than proper conduct, abuse of power and maladministration at the big head office in Auckland Park. Not to mention his not so shy R1-million annual salary increase. Of course, the point Motsoeneng was trying to make during this interview
was that the media should be “monitored” so that they only report on the “facts”. During the same interview, presenter Walidimar Pelser tried to establish if the same kind of logic could be applied elsewhere. Pelser asked the SABC chief what he thought the consequences of reporting on corruption were. After a prolonged pause, Motsoeneng replied with a line of thinking, which demonstrates pure genius in the art of skirting around an issue. “What kind of corruption?” he asked. “It depends on whether it’s real corruption, or if people are just talking about issues.” When asked if he thought the South African government sometimes lied to the citizens who pay their salaries, Motsoeneng said he had never heard of anything about government lying. He says he’s also not saying that journalists shouldn’t report about “whatever” but that they should not simply report on “hearsay”. He lamented the fact that young student journalist minds are being poisoned by lecturers who are misleading them about South Africa. He said we desperately need to change the mindsets of journalists so they no longer believe that the topic of corruption makes for a good news story. The Motsoeneng Show continued as he pointed out that one of his fellow panellists on the show, 702 political editor, Stephen Grootes, was a good journalist, but his biggest “weakness” was having his own views. Motsoeneng concluded with the comment that it’s important to portray the country in a positive way, especially when there are so many good things happening. “Where are the positive stories? Do you ever see positive stories leading the headlines?” he cried. Well Motsoeneng, we have tried. Show us all these good things that are happening, and we will merrily oblige, because heaven knows, we need it. Andrea Müller Editor andrea@writescene.co.za
Editorial Policy Statements made or opinions expressed in articles in Security Focus do not necessarily reflect the official views of the Security Association of South Africa (SASA) nor those of any of the other security associations listed in Security Focus. Similarly, advertising in this publication does not imply in any way endorsement or approval by these security associations of any products or services. It is the policy of the Security Association of South Africa that any office-bearer who has an executive position in a company, or companies, which supply security products or services should on no account allow his position to be used to promote his company or its objectives in the editorial content of Security Focus, the official journal of the Association. If, at any time, an office-bearer’s position has been quoted in relation to his company or product, this does not imply the Association’s approval or involvement.
4
Security Focus | Vol 33 No 8 2015
NEWS
State and private crime prevention partnerships The Private Security Industry Regulatory Authority (PSIRA), funded by the International Development Research Centre, Ottawa, Canada has released a research project titled Promoting Crime Prevention Partnerships Between State and Private Security Providers in Southern Africa.
A
ccording to PSIRA, the overall objective of the research was to explore crime prevention partnerships between the state and the private security sector in selected Southern African countries. The Authority says that in paying heed to the recommendations in this monograph, there is no doubt that states, particularly in the Southern African region, will come closer to solving the ever-escalating crime pandemic. This research, which connects theory to practice, is a must read for all politicians, policymakers, security practitioners, scholars and students. This study revealed that it is no longer realistic to consider the provision of security as the sole preserve of the police. According to PSIRA, the private security sector have “invaded” the security space,
not necessarily for purposes of usurping the mandate of the police, but as a result of a constant demand for safety and security on the part of those who can afford to pay for such services. The fact that the private security sector are now complementing the work of the police points to the need for their consideration in crime prevention initiatives. The (mis)perception that all private security officers are rough, sometimes without any supporting evidence, is not only reckless, but also clouds the debate on the role they play in crime prevention. This does not mean the private security sector is always professional, ethical and trustworthy. Just as in the case of the police, there are also rough elements, which taints the work of the private security providers. One way of addressing this problem is to ensure the sector is professionalised and its regulatory framework is effective. Moreover, it is important that regulatory
frameworks are implemented through effective and efficient mechanisms. While some states are more advanced in terms of their regulatory regimes, some are still lagging behind. A sector that is unregulated or ineffectively regulated, cannot be a viable partner, particularly with the state, in crime prevention. Having analysed the private and police sectors in the various countries, PSIRA says there is room for the establishment of partnerships between the state and private security providers as a means of addressing crime. PSIRA’s report concludes that there is a need to develop, or even amend, policies or laws on crime prevention in such a way that the role of the private security sector is recognised, nurtured and included in crime prevention partnerships and strategies. n To read the entire research report, visit the PSIRA website: www.psira.co.za
DoL amends
Sectoral Determination 6
On Line/Live Units
Radio or GPRS up to 4 Patrols per unit
Historical Systems
For Single / Multiple Site Application No wiring required on site For more information Please visit www.guardtrack.co.za or contact Dane/Brad Tel: 011-784 3803/4 Fax: 011-784 3805 email: info@guardtrack.co.za
6
The Minister of Labour, Mildred Nelisiwe Oliphant, in terms of section 56(1) of the Basic Conditions of Employment Act, No 75 of 1997, has amended the Sectoral Determination 6: Private Security Sector, South Africa. The scope of application covers critical areas such as remuneration, ordinary hours of work, annual bonus, overtime, leave, proof of incapacity, maternity, uniforms and protective clothing, temporary employment, etc. The Minister may make a determination to replace or exclude any basic condition of employment provided for in this determination in terms of section 50 of the Basic Conditions of Employment Act, 1997, upon motivated application by an employer and/or an employers’ association. All the provisions of Sectoral Determination 6: Private Security Sector, South Africa published under Government Notice No. 32524 dated 25 August 2009, Government
Security Focus | Vol 33 No 8 2015
Notice No. 35633 dated 28 August 2012 and Government Notice No. 36110 dated 30 January 2013, will be superseded by this determination with effect from 1 September 2015. n A full copy of the Government Gazette is available on the SASA website: www. sasecurity.co.za
Mildred Nelisiwe Oliphant
Cover story
Enforce Security ... dedicated to its core business Rebranded. Restructured. Revitalised. Re-Enforced. Change requires a relentless curiosity and the courage to pursue a different path – Gordon Hulley – CEO Excellerate Holdings Ltd
W
hile its dedication to its core business remains as steadfast as always, Enforce Security has recently undergone a purpose-driven business metamorphosis and emerged stronger, more focused, and determined to continue challenging the status quo of the security industry. The company’s strategic intent is to go beyond delivering a security service, it is about a brand ideal of creating of environments where people can thrive. “Over the years we started seeing the increasingly strained economy result in security budgets coming under pressure and many businesses being tempted into taking shortcuts on their security,” explained Clinton Phipps, Enforce’s CEO. Enforce leadership, therefore, set about
designing a concept whereby the ideal solution to safety and security is a costeffective blend of better skills, intelligence gathering, and new technology. “Our answer to the economic and security challenges that South African businesses are facing is a solution which is intelligence driven, entails the planned application of human resources, supported and enhanced by stateof-the-art technology, driven by rigorous systems and procedures, underwritten by a culture of respect, within a centralised command and control environment.” said Phipps In producing this solid, integrated service offering, and the skilled professionals necessary to implement it, Enforce has had to adapt its recruiting, training and operating models, and make use of new – and develop its own – technologies to stay on the edge of new advancements and capabilities. Derek Lategan, Enforce Director: Guarding, explained that the most dramatic change in the company’s operating model was the introduction of Compliance Officers and Key Accounts Managers. “Historically our Client Services Managers had a dual role. They would attend to the needs of the security officer as well as liaising directly with
our clients.” He said. “We came to realise that we were inadvertently doing both clients and guards a disservice, our new structure allows for Compliance Officers to focus specifically on the needs and training of the security officer while Key Account Managers provide a dedicated single point contact for clients.” Both Enforce and its clients are, as a result, reaping the rewards of a more committed and refreshed workforce, and with it a firm foundation which allows them to focus on other aspects of their own businesses. On the technology front, Glenn Allen, Enforce Director: Technology, explained that Enforce had years ago recognised the pace at which security technology was advancing and had made a strategic decision to stay at the leading edge of these developments – a decision which it is now reaping the benefits of. “Because of our investment in technology, we are now in a position where seamless integration between manned security services and security technologies is a reality. “Every day we come across environments where clients have both security guards and CCTV systems and erroneously believe that they have an integrated solution. “However, even the most sophisticated
Creating environments where people can thrive 8
Security Focus | Vol 33 No 8 2015
Cover story
technology is rendered useless if the operator is unable to use it to its full potential” explained Allen. “Technology will provide data or evidence, but it needs someone to interpret it. For example, in our Remote Video Verification solution we are able effect significant savings by reducing the number of guards on site, but when the camera detects possible criminal activity, someone in the control room will need to assess that activity and decide what action to take – that person is not a security guard – it’s a specifically selected operator that has a combination of appropriate personality traits and specialised training,” H]he said. Conversely even the most skilled operator will be rendered ineffective with poor quality equipment. It is in this area that Enforce sets itself apart, by combining best practice in both technology and the selection and training of personnel to operate the technology. In managing its extensive workforce Enforce has also adopted technologies such as biometric time and attendance and developed the Virtual Inspector which allows inspectors to view live camera footage of its security guards as they report for duty, eliminating the need to drive hundreds of kilometres to check on guards at various remote sites every few days. Still with technology, the recently launched Genie ICE mobile panic button has revolutionised personal security, by taking emergency response to an entirely new level. Operating with either GPS (Global Positioning System) or LBS (Location Based Services) it is the only mobile alert application in the country to be integrated seamlessly into
the alarm monitoring and armed response infrastructure of a security company. The company also makes use of a computerised incident management system in which every incident is recorded. The system manages and escalates incidents to ensure they are followed up timeously, and full feedback is provided. Comprehensive reporting on statistics based on incident type, location and site, is used to understand and manage risk in more detail and enhance Enforce’s intelligence structures. Leading its intelligence gathering capability is Enforce’s private investigations unit, made up of a team of investigators – all with previous SAPS or military experience – which makes use of active informer bases to track and trend crime. Anthony Feuilherade, Enforce Director: Intrusion and Investigations, explained that criminal syndicates have become a lot more sophisticated and do lots of planning before they hit their targets. “This is why intelligence is key to preventing crime” he said. “For example, experience has shown that while there is a place for armed reaction, simply putting more armed response vehicles in a particular area does not necessarily bring its level of crime down. However, a team of investigators working in an area at all hours, asking questions and gathering information from informants, does have an immediate impact,” Feuilherade said. In addition to Enforce’s approach to security, its commitment to society – and the country – as a whole has also been invigorated. This month it launched the #RespectSA campaign, a movement based on the broken window theory which helps create atmospheres of law and order in cities. Enforce is instilling this culture of respect throughout all levels of its company, and ensuring that all who work there spread and grow this movement,
Address: 43 Sea Cow Lake Road, Durban, KZN Tel: +27 (0)31 573-7600 | Email: info@enforce.co.za www.enforce.co.za
both internally, and externally in their respective fields. Enforce Executive Chairman Sibusiso Ncube said: “Respect is a powerful and underestimated attribute that can truly change our world. In traditional culture we refer to the guiding principles of hlonipha and ubuntu. It is more than just something we do or feel, and it is more than mere tolerance. “Respect is the unashamed reverence of the rights, feelings, and opinions of ourselves, others, and every physical thing in the world around us. It is a way of life that, if practiced wholeheartedly and unselectively can not only lead to a healthier and happier existence for everyone, but can rid this country, and world, of crime. “And it starts with us. Today.” n While his management team has been hard at work restructuring and repositioning Enforce, CEO Clint Phipps has been cementing the relationship between Enforce and its new business partner, Excellerate Property Services. “As much as the security budgets are under pressure, so too are operating budgets. This is where Excellerate’s integrated service offering, which provides one-stop delivery of a broad spectrum of property-related services, becomes an extremely attractive proposition” said Phipps. “Ultimately our clients see the benefits of true soft service integration in their buildings, on their bottom line and in their relationship with us because we are able to achieve measurable operational efficiencies by leveraging joint operational resources and minimising redundancy and waste through the implementation of state-of-theart technology and best practice business processes to manage service delivery.” He said. In addition to security, Excellerate’s extensive range of property services includes property management, facilities management, leasing and sales broking, cleaning, parking, repairs and maintenance, utility, development and project management, pest control and landscaping, among others.
Security Focus | Vol 33 No 8 2015
9
Opinionpiece
Preparing for the PCI DSS compliance journey
A
By Simeon Tassev, Director and QSA at Galix
ny organisation that processes credit card transactions is required to comply with the Payment Card Industry Data Security Standard (PCI DSS). This global standard was developed to ensure the payment card processes and all payment card data are secure throughout a transaction. Compliance requirements differ depending on the size of the organisation as well as their role in the process, however, one mistake many enterprises make is in believing that the compliance process is a simple task that takes at most a few weeks. In addition, organisations need to bear in mind that each area of compliance must be met 100% before moving on to the next stage, and remediation of non-compliant areas can prove challenging. PCI DSS compliance is not an end goal, but a journey, and adequate preparation prior to the audit process is essential. One of the biggest tasks with regard to PCI DSS compliance and audits is understanding the scope of the project. The scope includes every system, process and person that is involved in credit card data, even if only in the smallest way. For clients, understanding the relationships between processes, people and technology can be difficult. For auditors, defining the scope and demonstrating the links and relevance to clients is a challenge. The difficulty with defining the scope upfront is that often during
10
Security Focus | Vol 33 No 8 2015
Opinionpiece
an audit, investigations will uncover additional areas where payment card data and processes are involved. Furthermore, areas that are not compliant need to be remediated, and the process for doing so is entirely dependent on the specific scenario. This in turn makes up front costing a challenge for auditors, as they cannot define a concrete scope before the project commences. In order to ensure the success of a PCI DSS audit, there are many steps that need to be followed and addressed first. Engaging with an auditor in the preliminary stages can vastly improve chances for success. While each auditor has their own steps and strategy, the checklist for compliance remains the same, and in order to move on to the next step, the current step must be 100 per cent complete and compliant. The first step in the process is the pre-assessment, which is critical to the definition of scope. The pre-assessment process also involves identifying in detail all systems that are in place and creating an inventory of the Cardholder Data Environment (CDE), defined by both hardware and software. This includes initial data discovery on the network to understand where the data sits and scans of the network to locate cardholder data. It is also essential for the auditor to understand and identify all organisational processes that come into contact with credit card data, and when they come into contact with this data. The trail needs to be identified and followed from capturing information to transmitting and storing it, as well as all elements surrounding it such as business continuity, Disaster Recovery (DR) and back-ups. Systems, system components, network elements such as switches, routers, firewalls, applications, databases, file servers and more all need to form part of the CDE, which needs to be accurate and up to date. Initial discovery and pre-assessment enable the auditor to come up with an initial scope, however, organisations need to bear in mind that this is prone to change, as the process of compliance may uncover additional information and areas that need to be included. Once the initial scope is completed, a gap analysis identifies areas that do not meet compliance requirements. A remediation plan can then be constructed to address this. In addition, auditors must conduct vulnerability assessments and penetration testing, amongst other scans and tests, to identify security levels in accordance with PCI DSS. If these scans and tests result in a fail, the list of identified vulnerabilities must be remediated to protect data and prevent risk. Identifying a set time frame for ensuring PCI DSS compliance is difficult, as often auditors and organisations will need to go back to areas previously examined when new evidence and information is brought to light. The journey is unpredictable, and can take anything from weeks to months to years depending on the organisation, its size, its role in the process and more. To smooth the process and prepare for compliance, organisations should ensure that their security meets best practice standards, which is necessary for compliance not only to PCI DSS but also other regulatory requirements. In addition, organisations should familiarise themselves with PCI DSS requirements, conduct the self-assessment questionnaire, and start preparing and planning for the journey. Engaging with a skilled partner such as an auditor in the beginning
stages of the journey can help organisations to develop a roadmap to prepare for the audit. While the audit itself is straightforward the process of becoming PCI DSS compliant is complex and often complicated. PCI DSS compliance does not centre solely on a single audit, but on the journey of addressing, remediating and checking off each item on the compliance checklist. If areas are not compliant and will cause an organisation to fail, there is no point in beginning the audit. The preparation and initial phases are of the utmost importance to compliance. n
Security Focus | Vol 33 No 8 2015
11
SpecialFeature:Integration
The art of upselling integrated security solutions Learn how to identify and execute long-term project opportunities to achieve greater revenue through multi-system integration, by Michel Chalouhi, Security Sales & Integration (SSI).
S
ystems integration is not a new concept in the security landscape. From the moment the shift to IP security technology caught on, so too did the realisation that systems no longer had to be stand-alone. Communication over IP networks and the adoption of more openarchitecture systems ushered in far-reaching possibilities to correlate data from multiple security systems such as video surveillance, access control, intrusion detection and others. At the same time, forward-thinking businesses advocated the need for greater inter-operability between major systems, hoping to capitalise on existing investments to improve operational efficiencies and reduce costs where possible. This inevitable push toward systems integration even led to the formation of independent groups such as the Physical Security Interoperability Alliance (PSIA) and Open Network Video Interface Forum (ONVIF) whose missions are to develop and promote standards for interoperability of IP-enabled security devices and systems across the physical security landscape. And what did this all mean to the systems integrator? Connectivity between security systems became a new source for potential revenues – an added-value service to offer their customers in the realm of their expertise.
12
Security Focus | Vol 33 No 8 2015
Minimising false alarms is a prime example of efficiencies to be gained from integrating systems such as video surveillance and intrusion. For example, central station operators can remotely identify the cause of an alarm event and more accurately base their decision to dispatch authorities or not. While security systems integration and its benefits have long been discussed, the fact remains that a massive opportunity continues to exist for integrators to help their customers capitalise on the trend of multisystem unification. Apart from being able to identify the need for security enhancements, generate more recurring revenues from linking together existing systems, and relay the time-saving and cost-cutting benefits to its customers, integrators can also position themselves in the market as trusted partners. Specialising in certain types of systems integrations, learning the ins and outs of specific security technologies, and understanding how these blended technologies can work in tandem to enhance live monitoring or improve investigations become differentiating assets in a competitive bid scenario. How systems integration benefits the end user Typically, two upselling scenarios result from systems integration in a new project:
SpecialFeature :Integration
1. The integrator is called in to install a specific system and sees tremendous advantages for the customer to add and fully integrate another system. 2. The integrator is called in to install a specific system and sees the opportunity to eventually merge it with another existing system. The latter case also sometimes leads to greater security improvements by upgrading and phasing out the existing system, depending on its shelf life and performance. While adding and integrating new security components and systems presents the most substantial opportunity, the act of integrating existing systems is still a means to upsell. Part of the sales strategy in upselling an integrated solution is properly communicating its added value. The clearest advantage for an end-user to integrate multiple security systems is improving the effectiveness of their operators in handling everyday tasks. For example, the operator who works from a disparate video surveillance and access control system needs to jump from application to application in search of answers either during an investigation or, worse, during an emergency. The operator will need to take time to look through individual system information, find the event in both systems separately, and make decisions by piecing together their own story. Not only might this lead to frustration, but the process is time-consuming. On the other hand, when systems are deeply integrated, alarms from the access control system are automatically synched with the instance of video and logged as an event. The operator is then only a click away from the cardholder information and a quick playback of the video. Alarms are pre-programmed and automated, and there is no need to jump from one interface to the next since all the information is correlated and centralised within a single user application, allowing for quick decisions to be made. In saving time, the organisation enhances response, improves efficiency and system management and, ultimately, lowers operational costs. n This article was originally published by Security Sales & Integration (SSI) EH Publishing, Inc – 12 September 12 2014
inConversationwith
Paradigm shift at the fence When it is important to provide perimeter protection for sensitive facilities and external building security, thermal imaging cameras are the most popular choice. They are highly effective for detecting trespassers – but, unfortunately, they do not provide visual verification of alarms.
B
ut, when thermal cameras are combined with multifocal sensor technology, a whole range of new capabilities opens up, in terms of analysis, object tracking and identification of individuals on the perimeter. We spoke with Andreas Wolf, product manager, intelligent video surveillance at Dallmeier. Mr Wolf, why is multifocal sensor technology more suitable for perimeter protection than conventional HD or megapixel cameras? Perimeter protection usually involves very long distances. Panomera® is a camera technology developed by Dallmeier that is particularly suitable for monitoring and safeguarding relatively large areas and long distances. With an ingenious array of optical sensors, this patented system is capable of providing surveillance for the entire area in question, with uniform image resolution, good dynamic response and continuous depth of focus from a single location that would be impossible for conventional single sensor cameras, and the resolution would not be good enough. So, in order to achieve similar resolution quality, an enormous number of single sensor cameras would have to be used. Quite apart from the costs entailed by additional mounting masts, wiring etc, there would still be another problem. The time and labour required to configure each camera installation point individually by hand would then be considerable. Then, you must also consider that perimeter surveillance always requires working with 3D models, in order to be able to classify objects meaningfully. The quality of the analysis naturally depends on the camera and analysis having been configured correctly. If a large number of cameras have to be configured manually and this task is not carried out precisely as prescribed, the analysis cannot function reliably. With multifocal sensor technology, the camera is configured automatically, because 3D is already integrated in the Panomera®, so the problem of reliability associated with manual configuration does not exist. Another dimension that is only possible in conjunction with MFS technology is foreground observation. What exactly is meant by foreground observation? If an alarm is set off, the response by security personnel must be rapid and decisive. Particularly when it comes to perimeter protection, it is advisable to continue monitoring the scene so that further movements by the detected object can be observed. With standard perimeter installations, however, the field of view is limited exclusively to the detection zone. That is to say the cameras have a narrow aperture angle and only a small field of view. So, it is not possible to see what is happening in the foreground. With multifocal technology, long distances can be monitored, and an object and its location can be detected with certainty. After an alarm is triggered, an object can be displayed automatically in multiple views, so that observation can be optimal. In this way, it is also possible to work out where the object is coming
14
Security Focus | Vol 33 No 8 2015
from, and where it is headed, so that it is not immediately lost from view. Because of the high resolution provided by the patented sensor concept in MFS technology, an individual can be detected consistently. In short, Panomera® at the fence is actually three systems in one. It offers classic intruder detection at the perimeter, analysis and observation of objects well beyond the detection range by virtue of its larger field of view and, lastly, detection and identification of individuals through its high resolution. To this must be added the high level of availability and reliability of the video analysis through the combination of multifocal sensor technology with thermal imaging. Essentially, this new concept in perimeter security heralds a paradigm shift at the fence. Why does perimeter protection often rely on thermal imaging cameras? Thermal imaging provides the basis for a very high detection rate with a very low false alarm rate. Because analyses in the visible wavelength range are vulnerable to considerably more potential sources of interference, such as shadows, trees or bushes, and they often reach their performance limits in the face of environmental conditions such as rain, snow, sandstorms, or when something as mundane as the lighting equipment fails and they can no longer detect an object. Yet, thermal technology alone is also not equal to the task when the contrast between objects and their surroundings is not evident based on the thermal conditions. And there is one critical disadvantage associated with the use of thermal imaging cameras. It cannot provide any high resolution colour images of the scenery, that is to say, beyond a generalised alarm verification function, it does not have the capability of detecting intruders, much less identifying them. So this is why it is used in combination with multisensor cameras? Coupling Panomera® with thermal technology yields an ideal combination for perimeter surveillance. The purpose of linking these two technologies is so that the weaknesses of the one can be compensated
inConversationwith
for by the other in each case. Video analysis is performed primarily with the thermal video, which is less susceptible to interference. If the thermal technology is no longer equal to the task due to the climatic and thermal environmental conditions, the system automatically switches to analysis in the visible wavelength range. Practically, total availability of video analysis was not possible until multifocal sensor technology and thermal technology were combined. At what point exactly do thermal imaging cameras reach the limits of their capabilities? Thermal sensors measure the thermal radiation from an object and convert it into a grayscale image. The contrast between an object and the background is decisive. If it is inadequate, the thermal video cannot be analysed. The contrast depends on the absolute temperature difference in the image and the relative temperatures of the immediate surroundings and the object. For the purposes of video analysis, thermal sensors lose their effectiveness when the temperature of the immediate surroundings is practically the same as that of the object and the absolute temperature difference is very large, so that few grey values are available per degree of temperature difference. The resulting grayscale image then yields little or no contrast between the object and its surroundings, which means the object is not visible, and thus also cannot be analysed. A large absolute temperature difference and a small relative temperature difference between an object and its immediate surroundings occur particularly frequently in industrial environments and the warm summer months from the late afternoon and lasting until the early morning. Reinforced surfaces, streets and building fronts store so much heat that people on or in front of them disappear. And this is when MFS technology comes into its own? That’s right. A function called the “Quality of Video” module is permanently monitoring the quality of the video content to check that it can be analysed using video analysis processes. The “Quality of Video” module captures various measurement values in the video and uses them to calculate sharpness dimensions, contrast ratios and visibility features, among other things, and in the case of thermal sensors, the measured temperature ranges as well. When the thermal technology loses its effectiveness for video analysis purposes, the system uses the Panomera® videos for
analysis. Switching takes place automatically, but it is reported as an event. Are the videos from the MFS systems only used for analysis? No, the video streams from the Panomera® are simultaneously recorded at the highest possible resolution, recording is either continuous or event-controlled. When an incident occurs, the best resolution for visual verification of the event is activated automatically. What recording and analysis technology is this based on? The DVS Analysis Server, a complete system installation incorporating both extensive recording functions and very powerful video analysis functions. Licences for pre-installed video analysis applications such as intruder, people counting or object counting can be obtained as needed for each camera channel individually. Depending on specification, the video analyses operate with a performance of up to 25 fps and an effective resolution of up to 16 MP. The DVS Analysis Server is based on SEDOR®, a high-performance, self-learning video analysis system that uses the latest image evaluation algorithms and adapts the system parameters continuously to the prevailing ambient conditions to deliver outstanding analysis results. SEDOR® Intruder has the capability to report unauthorised entry in freely definable areas. The application can recognise whether an object is approaching a facility, which direction it is coming from, and how long it remains in an area. The analysis contains special modules and mechanisms that eliminate camera shake, shadows, reflections from the sun and headlights, thereby reducing false alarms to a minimum. Would existing systems have to be completely replaced to implement this perimeter concept? All Dallmeier systems work with open interfaces, so the Panomera® solution could also be integrated in an existing thermal camera system. In that case, a phased introduction would also be possible, in which the multifocal technology would be installed first at important nodal points such as entrance roads and gates. We advise customers thoroughly on this aspect, and prepare corresponding migration concepts, because video analysis in all its forms always depends on good planning. n
Security Focus | Vol 33 No 8 2015
15
technologyupdate
Demonstration an overwhelming success One of the most imminent risks involved with mining operations is fire – which is a constant threat in numerous applications. As a result, I-CAT hosted live demonstrations earlier this year to showcase the importance of adopting effective suppressant solutions that are specifically-designed for special fire risks.
T
he event, hosted at the Council for Scientific and Industrial Research (CSIR) Kloppersbos facility, approximately 40 km north of Pretoria, proved to be an overwhelming success – with more than 140 attendees present – officially the highest attendance ever recorded at the fire and explosion test, training, research and development facility. I-CAT fire division manager Andro Gibhard reveals that the event was aimed at the South African mining industry in particular. “A large number of existing and potential clients were present to witness fisthand the latest cutting-edge fire suppression and mine safety technology from I-CAT.” He highlights the fact that the demonstrations were well-received by representatives from numerous mining sectors, including gold, platinum, coal, chrome and iron ore. The live fire demonstrations undertaken on the day included demonstrations in the “Red Zone” and a “Safe Zone”, and included a coal dust and methane explosion. Red Zone: • Demonstration of a localised protection system for conveyor belts. • Methane and coal dust explosion in a 200 m tunnel. • Underground mining fire and fire curtain demonstration. • Demonstration of localised protection system for transformer/ power packs. • Demonstration of switchgear in-cabinet protection systems.
16
Security Focus | Vol 33 No 8 2015
Safe Zone: • Demonstration of mobile and mining vehicle suppression systems. • Extinguishing all classes of fire with the new water mist and foam mist extinguishers. • Fast response Roto-Fire-Pac demonstration for underground and surface mining. importance of effective suppression solutions specifically-designed for a particular type of risk A major obstacle to fire safety in the mining industry is that standard dry chemical powder (DCP) handheld extinguishers are specified on most of the areas on-site. Although DCP extinguishers are highly-effective in extinguishing flames, they offer minimal cooling properties. This results in re-ignition of flames, particularly in fuel and rubber fires, thereby increasing the risk of property damage and loss of life. Rubber fires can occur on conveyor belts, tyre stores, mining vehicles and plastic or rubber pipes. In this scenario, a first responder would typically use a number of DCP extinguishers to subdue the recurring flames, while waiting until firefighters extinguish it permanently. The powder inside DCP extinguishers also compacts as a result of vibration when placed on a moving vehicle. This compacted powder creates the risk of malfunction when activated, creating further health and safety concerns.
technologyupdate
As a result, DCP extinguishers placed on mobile equipment need to be serviced more frequently, which results in higher costs for mining operations. DCP extinguishers also pose serious operator and environmental hazards too. When used in confined spaces, they can affect operator visibility, and excessive powder inhalation can prove to be fatal. Discharged powder often ends up in water ways and filtration systems, causing contamination or blockages, and the discarding and clean-up process can be long and costly. A more effective and environmentally-friendly alternative I-CAT recently introduced the new range of Water Mist and Foam Mist handheld fire extinguishers to the local market. Utilising water as the main agent and nitrogen as a propellant, this handheld range is capable of extinguishing all types of fires, including rubber and plastic fires; kitchen cooking oil fires; diesel and petrol fires; and electrical fires rated up to 245 kV. Using patented technology from Europe, Mr Gibhard states that the atomised mist generated by the extinguisher gradually cools down a hot surface without causing thermal shock. “It creates a thermal heat radiation barrier between the operator and the fire, thereby shielding the operator from the heat radiation emitted by the fire when operating the extinguisher.” Mr Gibhard highlights the fact that the Water Mist and Foam Mist range is environmentally-friendly and ensures greater operator safety. “Each litre of water amounts to 120 m2 coverage capability, making it extremely safe and efficient. What’s more, the small quantity of water used also results in little to no redundancy or damage,” he continues. The Water Mist range boasts an operational lifespan four to five times longer than standard DCP extinguishers, to ensure greater cost-savings too. The Water Mist extinguisher range received SABS approval at the end of 2014, and Mr Gibhard is confident that it will be well-received by the local market. “The use of water and nitrogen is safer, more effective, and saves on maintenance and service costs – all of which are major benefits in modern-day mining,” he concludes. When using conventional equipment in commercial and residential applications, only five per cent of water directed at the fire actually applies to extinguishing it. The remaining 95 per cent floods the surroundings. EXTINGUISHmist emits a superfine atomised mist that quickly vaporises in the fire zone. A handheld Water Mist fire extinguisher is able to suppress all types of fires without causing extra collateral damage to property, people, animals and the environment. Other fire suppressants, such as foam, DCP and CO2 are toxic, causing harm to people and animals, destruction to property, and pollution. The EXTINGUISHmist, on the other hand, is ideal and is so safe that it can be sprayed directly onto victims threatened by fire, allowing responders to swiftly and effectively execute rescues. Response time is the main factor determining the extent of a fire’s damage to life and property. EXTINGUISHmist’s universal application across all common fire classes not only accelerates fire incident response, but also reduces the need to carry multiple types of equipment. “Equipped with the EXTINGUISHmist, responders can attack a fire immediately without having to worry about whether the agent is appropriate for the type of fire,” adds Mr Gibhard.
The small amount of water sprayed from the EXTINGUISHmist – just six litres per minute – also guarantees a 10 times longer lasting firefighting capacity than traditional DCP extinguishers. It also has a high degree of dispersion and forms a large screening surface or “halo”. Mr Gibhard says: “People shielded by this mist barrier can survive even in close proximity to a powerful fire. “It protects firefighters and victims alike from thermal radiation and smoke. Because the mist contains air, it allows them to breathe freely, preventing asphyxiation and buying time in rescue operations. Rescuing victims is problematic with other suppressants, as the agents are harmful.” The EXTINGUISHmist portable fire extinguisher consists of a proprietary nozzle and T-Rotor unit, unique to I-CAT’s Water Mist and Foam Mist range. The technology is also available in a hose reel device that can be mounted onto fire trucks, vehicles and trailers. n
Security Focus | Vol 33 No 8 2015
17
IntegratedsecuritySolutions
The urban environment and security
T
o reduce the risk of becoming a crime statistic, South Africans are increasingly being confronted with pressure to implement progressively more advanced technical solutions. Many people have come to believe that purchasing a solution will prevent crime. However, technology is only one of the components of successful crime prevention. This is according to Rob Anderson, executive director on the Board of EES Africa (Pty) Ltd, an ISO 9001:2008 certified company providing management, engineering and auditing services throughout Africa. Anderson is a specialist in integrated security and electrical engineering, and has firsthand experience in witnessing prevailing crime trends. He explains that a successful integrated security solution comprises both technology and, as importantly, people. Used in conjunction with each other these elements can produce a local urban environment, which is crucial to crime prevention. “This has led to the use of the internationally accepted concept of Crime Prevention through Environmental Design (CPTED), which is based on the need to build and maintain environments that are unfriendly to criminals,” Mr Anderson says. CPTED relies upon changes to the physical environment that will cause a potential offender to make certain behavioural decisions. These changes are crafted so as to encourage behaviour, and thus they deter rather than conclusively “prevent” behaviour. Some key factors are: Natural Surveillance: Natural surveillance increases the feeling that people can be seen. “It is facilitated by designing and placing physical features, and arranging activities and people in such a way as to maximise visibility and promote
18
Security Focus | Vol 33 No 8 2015
positive social interaction among legitimate users of private and public space. Potential offenders feel increased scrutiny and that they have limited escape routes.” Examples are: • Place windows overlooking roads, paths and parking lots. • Leave window curtains open unless you need privacy. • Use passing traffic and people as a surveillance asset. • Create landscape designs that provide surveillance, especially in proximity to points of normal entry and potential criminal points of entry. • When choosing and placing lighting, avoid poorly placed lights that create blind-spots for potential legitimate observers. Ensure potential problem areas, such as stairwells, are well lit. • Avoid overly bright security lighting that creates blinding glare and/or deep shadows, hindering the view for legitimate observers. Eyesight adapts to bright lighting quickly but has trouble adjusting to low level lighting quickly. Using lower intensity lights often requires more fixtures. Natural surveillance measures can be complemented by technical solutions. For example, closed-circuit television (CCTV) cameras can be installed in areas where natural surveillance is not available. Natural access control: “Natural access control reduces the opportunity for crime by taking steps to clearly differentiate between public space and private space. Selectively place entrances and exits, fencing, lighting and landscape to limit access or control flow,” Mr Anderson advises. Examples are:
IntegratedsecuritySolutions
• Use of a single, clearly identifiable point of entry • Incorporate maze entrances in public restrooms. This avoids the isolation that is produced by an anteroom or double door entry system • Use low, thorny bushes beneath ground level windows. • Eliminate design features that provide access to roofs or upper levels • Have a locked gate between front and back gardens. Territorial reinforcement: Territorial reinforcement promotes the feeling of ownership. An urban environment designed to clearly define private space does two things Anderson explains. “Firstly, territorial enforcement creates a sense of ownership. Owners have a vested interest and are more likely to challenge intruders or report them to the police. Secondly, the sense of owned space creates an environment where ‘strangers’ or ‘intruders’ stand out and are more easily identified. “Using buildings, fences, pavement, signs, lighting and landscape to express ownership and define public, semi-public and private space, achieves natural territorial reinforcement.” Maintenance: Good maintenance presents the image of ownership of property. Deterioration indicates less control by the intended users of a site and indicates a greater tolerance for disorder. Multi-use spaces: Multi-use spaces increase the use of a built environment for safe activities. This results in the spaces being occupied for longer periods, promoting natural surveillance which increases detection of criminal and undesirable activities. Obstacles to CPTED What then are the obstacles to the adoption of CPTED? • A lack of knowledge of CPTED by designers, owners, and individual community members. For this reason education is required with case studies of the successes. • Resistance to change. Many people specifically resist the type of cooperative planning that is required to use CPTED. • Many existing built areas were not designed with CPTED in mind. Modification would be expensive, politically difficult, or require significant changes in some areas of the existing built environment. • Altering an existing environment to meet CPTED can be costly. However, when incorporated in the original design phase, cost of designing to CPTED principles can be reduced. The way forward CPTED strategies are most successful when they inconvenience the end user the least, and when the CPTED design process relies upon the combined efforts of environmental designers, property owners, community leaders and law enforcement personnel. It should be kept in mind that CPTED is a deterrent strategy and not the final and only solution. Mr Anderson concludes: “The successful integration of technology and manpower is crucial to strengthening and complementing the environmental components of the security solution, thus producing a highly efficient integrated security solution and achieving optimum crime prevention.” n
IP-BasedSecurity
New capabilities provide SMBs with more options With the move to IP-based security systems well underway across all market segments, small and medium-sized businesses (SMBs) are particularly benefiting from the modular, cost-effective and easy-to-deploy solutions available.
A
By Jason McGregor, Sales Manager, Axis Communications
nd more efficient networking and storage approaches are lowering the total cost of ownership for increasingly sophisticated security systems. In fact, market forecasters see the market for network video in the SMB sector growing at a faster rate than the overall security market. For the small system segment, it is estimated to be more than 30 per cent until 2018 (small is typically defined as systems less than 10 cameras, and medium less than a 100). Whether it’s for a shop, hotel, office, school or other small business, a security system for this segment must meet a critical balance of cost and quality requirements for the owner. More and more SMBs see the investment required in a quality, fully integrated (hardware and software) IP-based solution as a valuable and worthwhile long-term investment that will, ultimately, cost them less in the long run than trying to extend an outdated system, or relying on lesser quality products. Of course, moving to a networked video approach is usually something of a new area for smaller sized companies. So these customers want a one-stop solution where everything works together and is easy to install and maintain. They are also concerned with future-proofing their systems to ensure compatibility with new cameras and software, as well as to be able to scale with their needs. IP-based solutions are much better suited to this type of dynamic market than analogue. Small business customers need the confidence in their supplier that products will last and perform as they are promoted. Whereas larger companies have support staff and IT personnel or even dedicated security teams, SMBs need to be assured that the systems won’t require much support and maintenance.
20
Security Focus | Vol 33 No 8 2015
Getting started One of the key advantages of IP-based security systems is that they can easily connect with existing IT equipment. They’re flexible and scalable, and will work out of the box with already installed networks, routers, screens, computers, tablets and smartphones. Essentially, IP cameras today are small PCs with built-in intelligence and high capacity SD cards offering local storage. With optimised software, users can view and manage recordings on smartphones, tablets and other mobile devices. Super-fast broadband and 4G networks will help to accelerate uptake. A typical baseline system for a small business should consist of cameras, SD cards, video management software (VMS) and mobile viewing applications. From a maintenance and storage standpoint, one option is to maintain all the technology and data locally and manage it through increasingly intuitive VMS available for existing PCs and/or mobile devices. More and more, however, businesses are looking to “security as a service,” which is a remotely hosted approach that provides the same VMS functionality as a client-based system, but storage and maintenance is handled by a service provider. In addition to video surveillance, the service provider, such as an alarm centre, may offer other managed services. An example of a system optimised for small businesses is AXIS Camera Companion. The latest release of the product allows small businesses to manage their video surveillance system conveniently from a smartphone or tablet. Full HDTV image quality is supported with mobile apps available for Android and iOS, and up to 16 network cameras can be easily added to a system. Features such as instant switching in live views and enhanced 360 degree de-warping for sharper images give the system a high-end feel. Start small, but upgrading is easy Once the baseline security and viewing functions have been addressed, business owners can look to upgrade with extra elements to integrate existing cameras, increase storage capacity, add access control, and other functionality. To integrate existing analogue cameras, video encoders can digitise analogue video and work as a bridge between an analogue CCTV system and a network video system. This provides the flexibility, scalability and smart functionalities of network video without sacrificing a company’s analogue investment and makes the transition quicker, easier and more cost-effective. Increasing storage capacity to allow more video to be recorded can be achieved through the use of a network attached storage (NAS) device. The NAS attaches directly to a local area network and offers shared storage to all cameras on the network. It’s easy to install and operate, and provides a flexible solution for increased storage requirements. Remote entry control is another capability that is easy to add and increases security. With a network video door station, personnel can communicate with and identify people with high-quality video at secured entry points before letting them in. Similarly, an IP-based access management system can manage access credentials and schedules to control who has access to the premises.
IP-BasedSecurity
Although basic security needs may be similar regardless of the size of the business, scaling a system to a solution with more than 50 cameras has some different considerations. For example, the VMS at the core of the system may offer more options. The AXIS Camera Station S10 Recorder is an out-of-the-box ready solution aimed at medium-sized businesses. The intuitive user interface offers all the necessary features for effective surveillance such as flexible live-view layout, site maps, powerful event configuration, efficient alarm management and responsive pan-tiltzoom (PTZ) control. It delivers high image quality at exceptionally low bandwidth and images that can be accessed from wherever required. Combined with network cameras, it is a robust system capable of monitoring a larger scale business, and also a flexible platform on which to expand. Reliability is the key to a long-term investment While a system’s features and functionality will be the most eye-catching element for a buyer, the real long-term ROI is proven in the quality of the product. A proven, tested security system will cost less in the long run than buying a cheaper product. All buyers should consider the quality and reputation of their vendor carefully before making a final decision, as well as their commitment to providing long-term service and support.
While enterprises and other big organisations have their IT department to handle the initial installations, SMBs are relying on the installers to start with the technical process, so good service packages are essential. For a small or medium-sized business, doing business with a single supplier is often the simplest and most reliable approach. n
Small business owners can conveniently manage their network video system via mobile devices such as smartphones or tablets.
Security Focus | Vol 33 No 8 2015
21
CompanyNews
Planting trees of success with Elvey and Khulasizwe Primary
T
his Mandela Day, in partnership with Food and Trees for Africa (FTFA), Elvey Security Technologies, together with Hudaco, took part in a tree planting initiative at Khulasizwe Primary School in Tembisa. The FTFA programme aims to green, educate, offset carbon emission and transform schools and other community centres into healthier and more sustainable environments. The programme also seeks to highlight the benefits of greening and spreading awareness and education on climate change. The day began with a warm welcome from the children of Khulasizwe Primary School who took the time off their school holiday to spend the day with Hudaco and Elvey representatives. After a few minutes of playing with the kids and getting to know one another, everyone then planted trees on the school grounds. Afterwards, food parcels were given out to the children and some community members. “Spending time and planting trees with
the children of Khulasizwe was an incredible experience for me. It reminded me of the value of nature in nurturing our future generation,” said Lisa Chetty, a volunteer from Elvey. “Coming from the community of Tembisa, I must say that this was a heart
warming experience for me. Being given the opportunity to give back to the future leaders of not only my community, but our country is something that I will hold dear to my heart,” Lovers Aphane, a member of the Tembisa community and volunteer from Elvey, stated. n
Dallmeier starting series of live demonstrations Starting from September, Dallmeier will make a tour through South Africa for some live demonstrations of its unique and patented Panomera® multifocal sensor camera technology. The multifocal sensor system Panomera®
22
was specially developed for the allencompassing video surveillance of expansive areas. With MFS technology it is now possible to monitor large-scale areas from a single location and to capture both an overview image and detail images in the highest resolution even from very distant areas at the same time. Based on a patented lens and sensor concept, the Panomera® effect guarantees a perfectly uniform resolution throughout the entire coverage area. In contrast to single sensor cameras, which are equipped with a single lens, the multifocal sensor system works with several lenses, each of which has a different focal length. The MFS technology therefore is able to provide a guaranteed constant resolution of at least 125 pix/m. This makes it possible to monitor large areas and distances from a single location, achieving this in real time with uniform image resolution, high dynamics and consistent focal depth.
Security Focus | Vol 33 No 8 2015
Permanent recording of the entire scene in highest detail resolution, pan, tilt and zoom functions also in the recordings, multicast and multi-user capability, as well as enormous savings on infrastructure are just some of the advantages of this new camera technology. Besides the MFS technology, a series of other IP cameras, including dome cameras or box cameras with integrated infrared IR illumination as well as different Dallmeier recording servers, workstations and video management software will also be displayed live. The Panomera® trailer will start its tour in Johannesburg and then move on to Pretoria, Bloemfontein, Cape Town, Durban, Port Elizabeth and many more South African areas. Between fixed show days there will be enough time for personal live demonstrations on request. To learn more about the dates and locations, or to request a personal live demo, contact dallmeiersa@dallmeier.com n
CompanyNews
Kit Group chosen to ‘kit out’ Flight Centre The Kit Group, Africa’s largest workwear supplier, has won a hotly contested threeway pitch to design and supply uniforms for Flight Centre South Africa’s 1 200 staff members through its bespoke corporate wear department, Impact Corporate Wardrobe (ICW). “I am very excited about the new range of styles and fabrics for our staff,” says Flight Centre’s senior creditor, J Els. “This was a challenging brief that not only had to meet our local needs, but also adhere to the
guidelines we received from our head office in Australia.” “From the get-go ICW understood our requirements,” says Ms Els. “The team studied the uniform specifications we received from ‘down under’ and, although we only had a few sample items, they were able to make up a sample dress and source the perfect fabric samples,” she adds. Ms Els says ICW’s presentation was impressive, adding that “the personal attention to my many requests was amazing.” n
Demo and training facility launched As part of its quest to be the leading authorised distributor of Motorola products, Altech Alcom Radio has launched a state-of-the-art training and demonstration facility at its headquarters in Woodmead, Johannesburg. The demonstration room is the first of its kind in Africa and the training centre is the only Motorola-authorised training facility on the continent. The combined facility will enable both Altech Alcom Radio channel partners and end-user customers to view and receive training on a range of Motorola products, including the latest two-way digital mobile radios, in a live, interactive and multi-functional venue. As the largest distributor of Motorola products in sub-Saharan Africa, Altech Alcom Radio has a history of being at the forefront of innovation in terms of delivering the latest offerings from Motorola to its channel partners and customers. To this end, the investment in the facility will go a long way to cementing the organisation’s position as the leading distributor of two-way radio solutions to the sub-Saharan market. According to Brett Nash, managing director of Altech Alcom Radio, the
opening of the facility represents a milestone in the progression of the partnership between Motorola and Altech Alcom Radio, which spans more than 30 years. The idea to open the training centre, says Mr Nash, stems from the growing knowledge gap in the industry with the advent of digital mobile radio technology. One of the challenges of the migration from analogue to digital has been the need for training to ensure channel partners are sufficiently equipped to understand and advise customers of their needs and queries. “Against this backdrop, end-users will, ultimately, be the beneficiaries of having more empowered, educated and knowledgeable channel partners. By investing in this facility, Altech Alcom Radio recognises the industry’s growing need to ensure that all our partners are educated to adequately demonstrate the benefits of the respective solutions, in this case the Motorola product range,” Mr Nash adds. “The installation of the demonstration room will not only accelerate more opportunities for Altech Alcom Radio’s channel partners and their customers to familiarise themselves with the Motorola equipment, but by enrolling in a Motorola-accredited course in the adjoining training centre, channel partners can themselves become certified product experts and thereby improve their knowledge in digital communications infrastructure and basic IP networking theory,” Mr Nash concludes. The facility comprises a training centre that will enable channel partners and customers of Altech Alcom Radio to achieve certification from Motorola in the design and deployment of Motorola systems. Additionally, the facility houses a leading-edge demo room that showcases the latest Motorola products on offer. In the demo room, users can test Motorola’s two-way radios and the IP Site Connect, Capacity Plus and Link Capacity Plus digital mobile radio systems that include the latest high-end technical features. n
Security Focus | Vol 33 No 8 2015
23
CompanyNews
RISCO wins again This year’s PSI Premier Awards saw fresh thinking security manufacturer, RISCO Group, awarded “Intruder Product of the Year 2015”, for its smart wireless security and safety system, Agility 3. The award was presented to RISCO’s commercial director UK & IE, Steve Riley, by former England rugby union star, Brian Moore. Powered by the established RISCO Cloud, Agility 3 with VUpoint is a smart wireless alarm and video verification solution, that enables home and business owners to check in while they’re out through its smartphone app and web browser. “Agility 3 with VUpoint can really enhance the lifestyle of home and business owners,” explains Anna Royds, head of marketing, UK &IE. “It’s an intelligent panel that gives installers the opportunity to expand into markets that haven’t traditionally been a core focus. The domestic landscape is suddenly much bigger than home movers and those recently affected by burglary. “Agility 3 with VUpoint opens new vertical markets such as technophiles, assisted living,
latch key kids and families or businesses spread across multiple sites.” A much sought-after accolade, the PSI Premier Awards winners were chosen by the readership of PSI magazine – namely those who purchase and install security equipment. PSI Magazine asked manufacturers and distributors to nominate a product or service they thought deserved to be recognised as best in its sector. Readers were then asked to vote over a series of months. At Stapleford Park, Leicestershire, the supplier with the most votes in each award category was announced as a winner. “I’m really pleased to have won the Intruder Product of the Year category for the second year running, enthused Steve Riley. “It’s particularly pleasing that both our core panels (LightSYS2 and Agility3) have now won the award – especially as it is based on the opinion and votes of security installers, who you can always rely on to be honest and candid with their feedback. “More than just a vote for our products, this
achievement reflects installer confidence in RISCO’s innovation and service delivery, as well as the quality and reliability of our impressive product portfolio. “I couldn’t be prouder of the RISCO team, who consistently work so hard and thoroughly deserve the recognition this award brings. “The great news is that RISCO innovation continues, and we have more exciting product launches planned for later on this year and 2016.” n
Nautic to deliver range of boarding craft to SA Navy Nautic Africa, a Paramount Group company, will custom-develop and deliver a new range of boarding craft to the South African Navy by December this year to meet the Navy’s requirements for demanding naval missions. The craft are currently under development at Nautic Africa’s Cape Town facilities and, according to project manager, Pieter Heyneman, will draw extensively on the capabilities of the company’s innovation team. “Nautic always aims to raise the bar, and this project will be no different,” he said explaining that the design brief for Project Carol required a state-of-the-art, fully-equipped, composite craft capable of providing superior performance under demanding conditions. As a certified ISO:9001 service provider with a proven track-record in designing to customer specifications, Nautic Africa is well-positioned to deliver on the Navy’s requirements for a
24
vessel that integrates into existing systems, as well as provide long-term logistical support to the platforms once delivered. Not without its design challenges, the result is a world-class 9m epoxy infused vessel capable of reaching speeds of 38 knots via twin Volvo D4-260 diesel sterndrives. Highlighting the need for a quick design turnaround time, Mr Heyneman emphasises the importance of close collaboration between Navy officials and the development team. Capable of carrying 10 crew members, the mid-engined arrangement will offer inhouse developed shock mitigating seating to operational crew, while the boarding party is accommodated aft. Designed to be deployed from the Navy frigates, the solid fendered, self-righting capable boarding craft make provision for interfacing via a single-point lifting
Security Focus | Vol 33 No 8 2015
arrangement, customised to fit the pre-existing CSIR-adapted Vest Davit launching cranes. In addition, the vessels will be equipped with a suite of equipment including military specification tactical communications, navigation and tracking systems, touch-screen glass cockpit instrumentation, keyless starting, automatic fire suppression, noise cancelling intercom, a drop-in ammunition locker, a customised gun mount pintle interface, as well as a pre-heating umbilical cord system and more. “The multi-purpose boarding craft will be deployed to perform safety and security functions, including boarding operations, intelligence support and rescue missions,” says James Fisher, chief executive officer of Nautic Africa who confirms that a total of five vessels will be delivered to the Navy under Project Carol. n
vehiclesecurityupdate SpecialFeature
Fit a tracking device for vehicle safety
John Edmeston
W
hen Maria Perreira saw her home number light up on her cellphone display late on a Wednesday night, she immediately knew something was wrong. She was away on a business trip in Botswana and any call at 10pm could only be an emergency or bad news. It was. Her husband Paul, told her that her 70-year old mother Gina was missing, and had been seen last by their domestic worker at around 4pm, driving off on her own. Not wanting to worry Maria while she was thousands of kilometres away, and helpless to do anything, Paul pulled out all the stops to find his mom-in-law, trying to convince himself that she was out visiting a friend and had simply lost track of time. She was, after all, mobile with her own car and lived in a separate cottage on their property. To all intents Gina was quite independent, and he ordinarily would not be worried, except Paul knew Gina would never be out late at night. His fears were confirmed when he found Gina’s handbag, purse and cellphone lying on her bed. This was simply not right. Gina would not leave without these, especially not her phone as the family had a rule to stay in contact with each other and were particularly paranoid about safety and security. The next 48 hours were harrowing. Maria cut short her business meetings and was on the first flight back to Johannesburg while a full-scale search was launched to find Gina. The local security company pulled the video footage of the estate’s entrance and exit gates. Gina was seen driving out at 4pm on Wednesday afternoon, alone and seemingly calm. Nothing looked amiss. When asked by the police if Gina’s vehicle was fitted with a tracking device, Maria and Paul both felt the pain of regret. The vehicle was not fitted with one, and right up until that moment, they really did not think it was necessary. The car was old, and they believed had little likelihood of being stolen. Gina also never went anywhere at night, and her trips
were only to the local store or to her friends who were all within a 5km radius of their home. It’s indescribable what goes through your mind when a family member goes missing. The family expected the worst, and thought that Gina had been a victim of a hijacking. They simply had no idea where to start looking. If only the car had a tracking device in it. They could at least pinpoint an area to start looking for her. Maria felt angry at herself for not seeing the bigger picture of how helpful a tracking device would have been in this situation, and especially given the crime situation in Johannesburg. Fortunately, this true story has a happier ending than most. The Perreira family received a phone call from an SAPS detective on the Friday afternoon, almost two full days after Gina went missing. She had been found in her car at Zoo Lake by a couple out for an afternoon walk. She was clearly distressed so they called their local police station for assistance. Gina was lost, completely disoriented and not able to recall her name, phone number or address. She was badly dehydrated, but to all ends she was safe and reunited with her family. After a medical examination, the family was advised that she was in the early stages of Dementia. Had Gina’s vehicle been fitted with a tracking device, her family would have been able to locate her whereabouts a lot faster, and avoid the trauma and danger to Gina’s life that ensued in the two days after her disappearance. Keeping Track of Your Loved Ones Gina’s story is just one account of how valuable a vehicle tracking system can be. The considerations go well beyond simply the recovery of your vehicle in the event of theft or hijacking. Vehicle tracking provides a very plausible solution to keeping track of your loved ones, making sure they are safe, and also monitoring driver behaviour. Today, many tracking units utilise Global Positioning System (GPS) technology that provides a wealth of information at a very affordable price. “Besides being able to pinpoint the exact location of a vehicle in real-time, telematics is also able to provide an accurate recount of the vehicle’s movements and how and when it was driven,” says John Edmeston, global chief financial officer of Cartrack Holdings Ltd. “Consider the example of your child’s first trip on their own without having you around to watch over them. Often a very frightening
experience for a parent. Or consider the aging parent who is no longer as aware of what is going on around them as they used to be, making them soft targets for criminals. “Not only is driving safety an important concern, but crime such as hijacking is also never far from your mind. Far from wanting a ‘big brother’ approach, being able to know that your child or any other family member is safe, driving responsibly and can be located quickly if they need help or assistance, as in the case of Gina, is a huge comfort, ” says John. It is always a good idea to have an open and honest discussion with all family members and let them know the reasons behind the installation of a vehicle tracking unit. This is especially important when dealing with teens who will not want you checking up on them or infringing on their privacy. Explain the risks that are involved and if need be, use the statistics to emphasise the danger of criminal elements, speeding and drunk driving. “A GPS tracking unit offers geo-fencing that sets a virtual perimeter for a real-world geographical area. If you discuss the locations that you expect your family member to be at certain times, then you can set a geo-fence on their travelling location that will alert you if the vehicle was to move outside the perimeter. A notification could be a simple case of your loved one dropping a friend off at their house that is out of the way, or it could be something serious like the car being stolen or hijacked. Either way, it remains a very handy feature,” says John. Online Portal The pure tracking component of the unit allows for the vehicle to be recovered in the event of it being stolen, but it also provides an online portal that will allow the family to log on from any location to check where the vehicle is. Using the telematics capabilities of a GPS tracking unit will also allow you to monitor the speed at which the vehicle is driven and will even tell you whether the driver is accelerating, braking or cornering hard. While vehicle tracking was first developed as a means to counter crimes such as vehicle thefts and hijackings, the modern day telematics capabilities now present an holistic safety solution that not only ensure you get your vehicle back if it’s stolen, but also provides information about driving habits and location to ensure your loved ones, and other road users, are safer on the roads,” concludes John. n
Security Focus | Vol 33 No 8 2015
25
OnTheMarket
Paxton introduces ‘next generation’
P
axton Access Ltd, a UK market leader of electronic IP access control and door entry equipment, has introduced the next generation of Net2 Entry, their leading door entry system, for installers and integrators. On 1 September, Paxton launched two brand new panels and released an update to the Net2 Entry system to offer enhanced door entry functionality for versatile security and building management. The new Net2 Entry panels will directly replace Paxton’s current offering. The latest
versions feature MIFARE® technology, a new intuitive panel interface and pan/tilt camera functionality for the ultimate security solution. Diversifying from access control, Paxton released Net2 Entry, its first door entry system, in 2012 to great industry acclaim. Pitched as the simplest door entry system available, it consists of just three components that auto-detect on set up; external panel, interior monitor and door controller, for a true plug and play solution. The products’ simplicity and ease of use has proved popular with security installers who have voted Net2 Entry to win the PSi Premier Award for Access Control every year from 2013. The new Net2 Entry panels will be available in two variations, standard and vandal-resistant. The slimline standard panel has a high contrast back-lit keypad, while the robust vandal-resistant panel is made from corrosion resistant 316L marine grade stainless steel, with an impact resistance rating of IK10 to withstand even the harshest environment. Both variations are available in flush-mount, surface-mount and rain-hood versions, making them suitable for a range of environments. The updated system also includes a versatile grouping feature enabling smarter management of multi-tenant buildings and gated perimeter sites, plus improved SIP compatibility allowing more sites to enjoy the flexibility of answering the door via SIP-
enabled smart device or handset. The advanced features of the Net2 Entry system include: • Just three components. Simply plug together. • Units auto detect for easy plug and play installation. • Easily scalable – system expands using industry standard Ethernet switches. • Comes with Net2 access control built in. • Multi-format proximity reader – reads Paxton and MIFARE® token technology. • SIP compatible – the door can be answered from smartphone, tablet or PC. • Grouping feature enables smarter management of multi-tenant buildings. • Pan/tilt camera functionality to capture an angled view, for a diverse range of locations. • Intuitive user interface for secondary ONVIF compliant camera integration. • Intruder alarm integration for ultimate convenience. • Video voicemail. Dan Drayton, Paxton Access Ltd sales manager, says: “The new Net2 Entry panels represent the next generation of our awardwinning door entry system. “By working closely with our Net2 installers to truly understand market requirements and implementing features that are undeniably useful for end-users, we believe this new range of panels takes the Net2 Entry system to the next level.” n
Rosslare introduces AC-825IP Rosslare Security products (RSP) recently introduced its latest intelligent networked access controller – the AC-825IP. The new capabilities include connection of up to 12 expansions, which means even more doors – in fact, up to 58 doors with 60 000 card holders. The AC-825IP supports the latest innovative OSDP protocol allowing the use of highsecurity OSDP card readers and peripherals. The new panel supports WAN networks using AES 128-bit encrypted TCP/IP communication to securely connect to the AxTraxNG™ client/
26
server software. Rosslare says its AxTraxNG™ software is even more powerful and easy-to-use, with many new features, including more access levels, time zones, multi-day holidays, card holder access groups, interlock and autorelock, and scheduled outputs operation, as well as four programmable site codes and parking management. The AC-825IP and AxTraxNG together provide a premium ideal modular and expandable solution for commercial and institutional needs. n
Security Focus | Vol 33 No 8 2015
OnTheMarket
Suprema extends versatility Suprema recently introduced three additional RF card format variant models to its BioStation 2 line up. The new models support 125 KHz EM, 125 KHz HID Prox, and 13.56 MHz HID iClass SE RF standards. This completes the RF line- up that already supported 13.56 MHz MiFare/DesFire/DesFire EV1/Felica/NFC formats. The new additions will help Suprema expand its customer base with specific RF card format requirements. BioStation 2 blends powerful hardware and sophisticated algorithms to improve accuracy and provides matching speeds of up to 20 000 fingerprints per second. The performance is matched with a large user and log capacity to accommodate mid- to enterprise-level applications. Combined with an IP65-rated structure and Power-over-Ethernet capability along with a new optical sensor that enhances the capture of wet or dry fingers, BioStation 2 is more than suitable for both indoor and outdoor installation. The terminal features extensive communication interfaces, including TCP/IP, RS485, Wiegand and USB and offers built-in Wi-Fi to extend its versatility. n
Suprema releases DM-20 Suprema, a global leader in biometrics and security, has announced the release of DM-20, a secure door control module designed to provide secure connection to multiple peripherals from Suprema devices. DM-20 provides BioStar 2 with versatility and expandability for system designers to design and deploy centralised access control systems. The module combined with any Suprema access control terminal can function as a secure central controller. It allows a simple and easy upgrade to a smart access control system and utilises existing RS485 or Wiegand networks without the need of establishing a new IP-based network. Additional DM-20 units can be connected via a daisy chain configuration to support up to 32 doors in combination with Wiegand readers or Suprema devices. DM-20 is a BioStar 2 exclusive accessory, and will support all BioStar 2 compatible devices and accessories, and is available worldwide. n
OnTheMarket
Real-time accountability with Active Track Active Track’s combination of RFID, GPS and GSM technologies – all driven by the Active View web interface provides a fully integrated employee management solution that’s the ideal patrol monitoring system for the guarding sector. From the most remote locations around the word to a luxury residential estate in the city, while Active Track’s potential applications extend far beyond the guarding sector, its state-of-the-art technology is proven as one of the most effective monitoring solutions for the private security industry. The Active Track unit, with its built-in world-class communication technology provides a simple, robust and effective direct line of communication between security officers and management teams, or even the end-user. In the security industry, particularly reaction services, where timing, accuracy and quick reaction time can mean the difference between life and death, the real-time communication system provides a vital link in the security chain. From registering the security officer’s arrival on site to monitoring each checkpoint of his patrol – Active Track allows for effective, informed and real-time decisions. It’s web-based interface, Active View, generates an electronic reporting system that can be used to show the client that the security officer has been present at all required checkpoints at the specified times. The Active Track unit provides complete control over the guarding patrol as an empowerment tool that enables all parties to react and respond to a security threat or alarm condition and take the appropriate action. With innovative reporting in real-time, management teams can make informed decisions and respond immediately to an incident. In addition to this open line of communication, Active Track provides a unique reporting system, which provides accurate information of personnel movements, ensuring they are performing their duties as and when required, and precisely to customer expectations. The Active View software generates an on-site patrol route with
28
Security Focus | Vol 33 No 8 2015
various checkpoints. If certain checkpoints are not clocked during a predetermined timeframe, the system will generate an alarm and the call centre can then call the Active Track unit to confirm the security officer’s location. The Active View web interface monitors all RFID transmissions, including panic notifications, call back, missed patrols, etc. The security officer simply has to push the panic button on his Active Track baton to raise an alarm. The event tagging function provides a time and attendance solution as tags can be registered for certain times. Security managers can track officer movements by ensuring that tags are registered by security officers when they arrive on site and that they check these tags continuously during patrols as well. Active Track includes a unique residential security function where residents have a direct communication line to security officers on site. Residents returning home can call ahead to ensure security officers can meet them at their gate or their front door. Residents can also call from inside their home regarding any suspicious activity, or to alert a security officer to arriving visitors. n
OnTheMarket
The age of ‘bring your own device’ By Raja Ukil, Chief Information Officer, Wipro Ltd and Sridhar Govardhan, Group Manager - Information Security, Wipro Ltd Organisations today are faced with the challenge of dealing with a highly mobile, techsavvy workforce that demands to use devices of their choice. While this can potentially help organisations to improve productivity significantly by empowering employees to work from anywhere at any time, it represents a complete disruption to the traditional model of technology provisioning. In addition, in today’s interconnected world, the lines between personal and corporate digital lives are blurring, and users no longer wish to maintain separate devices for personal and official use. Organisations, therefore, need to be able to support the Bring Your Own Device (BYOD) trend to ensure employees are kept happy and productivity levels can be maximised, among other benefits. Age of Secure, Productive Devices Devices today integrate the right combination of style, power and performance to enable them to be used across business and personal applications. The supporting technology ensures enterprise BYOD is secure, productive and effective. Mobility is, without doubt, the future of workforce technology and organisations need to brace themselves to support BYOD now to leverage the benefits and cater to increasing demand in the future. Mobile devices, including phones, tablets and phablet hybrids, now incorporate technology such as mobile broadband, location services, Wi-Fi, Near-Field Communication (NFC), Bluetooth, encryption capabilities, remote device management capability, high definition cameras, biometric authentication, voice to text, secure operating systems, and more. Enterprises can leverage these features for many innovative applications. For example, cameras can be used for document scanning, NFC chips for access control, location services for parking space allocation and more. The possibilities are practically limitless. Building Enterprise Infrastructure in Tandem However, while mobile technology has evolved to be more powerful than ever before, and incorporated many new features that can be leveraged by the enterprise, having the best mobile technology alone is not sufficient to support enterprise BYOD.
It is essential to also put in place a robust enterprise infrastructure for the management of BYOD that also provides the required flexibility to enable employees to utilise the same device for personal applications. Enterprises must, therefore, build a dedicated infrastructure to support BYOD, whether this is delivered on premise or via cloud. Some aspects required include Mobile Device Management (MDM), mobile application management and mobile content management, document and content sharing solutions, Exchange ActiveSync for e-mails, effective authentication tools and productivity solutions such as the Microsoft Office Suite. In addition, organisations need to protect corporate information stored and accessed on mobile devices from a variety of threats, including theft, hackers, viruses, cyber attacks and more. To do this, it is vital for enterprises to define a BYOD programme and, based on the final scope, a comprehensive BYOD policy should be documented. As part of the BYOD policy, adequate security process and technology controls should be identified and implemented for user management, device management, data management and the procedure for BYOD onboarding and acceptance, among other areas. App-Titude Test BYOD has numerous benefits for organisations, including its ability to enhance employee productivity, improve the user experience and deliver cost optimisation. For example, many large enterprises currently spend considerable resources in terms of both people and infrastructure on managing travel and expenses. Utilising mobile apps, however, can yield significant benefits to this process. The employee can use an enterprise travel app on his/her mobile device to book travel tickets and hotels, hire a cab, receive e-tickets etc, through one centralised interface. While in transit, the employee can change local travel plans at their destination dynamically on their mobile device. Once travel is completed, expense bills can be uploaded to the app and submitted automatically to the finance team. Not only does such a mobile app automate several processes, it also creates an enriched user experience, reduces transaction time and helps optimise costing. Another example of mobility can be seen in guest management, which is often a complicated process involving security. The host organisation requires entry passes to be generated, escorts
to be organised and access to be controlled to certain authorised guest areas. A mobile app can be used to simplify this process. Guests simply download the app and request access, which is then sent to the host for approval. On approval, the guest can be sent a QR code, which becomes a virtual gate pass. During the visit, guests are auto navigated to the host’s location using the location services of the guest’s phone. The app can also be used to give the guest WiFi access and the QR code will only work for areas where they are authorised to visit. These are just two examples of how mobility and enterprise applications can be used in innovative ways to enhance user experience and improve automation. As apps become increasingly sophisticated, they will also become more location and contextsensitive, delivering endless possibilities for productivity and experience improvements. Ultimately, to leverage the future of mobility, enterprises need to create a mobile ecosystem that delivers a rich user experience and eases processes that are typically manual and cumbersome. This will not only assist enterprises to leverage the greatest benefit, it will also ensure maximum user adoption. This, in turn, will maximise productivity gains. A specialist outsource provider can assist enterprises to design, plan and build a BYOD programme and enable an effective mobile platform for BYOD users, helping organisations to embrace mobility and futureproof their operations. n
Security Focus | Vol 33 No 8 2015
29
InternationalNews
Headline Headline
S2 Security introduces video management system
S
2 Security, a leader in IP-based access control, video management and mobile security management systems, recently introduced the S2 NetVR 600 video management system, the newest addition to S2 Security’s product eco-system. Ideal for mid-sized businesses and distributed enterprises with RAID storage requirements, S2 NetVR 600 makes real-time video monitoring and recorded video playback accessible from a client, web browser or mobile app. “S2 NetVR 600 brings stand-alone and integrated system users more options when RAID storage is required,” said John L. Moss, chief executive officer, S2 Security.
“As a member of the S2 eco-system, S2 NetVR 600 seamlessly inter-operates with our video, access control and mobile products.” S2 NetVR 600 supports up to 32 IP cameras and up to 32TB internal video storage, available in RAID 5 storage configurations for enhanced reliability and performance. Live and recorded video from S2 NetVR 600 cameras can be viewed from anywhere using the S2 Mobile Security Officer tablet app. S2 NetVR 600 can also tightly integrate with S2 access control systems. Real-time video surveillance and recorded video are unified in the web-based user interface of the connected S2 NetBox or S2 Enterprise
controller. Additional features include on-screen PTZ controls and integration of live video views into floor plan graphics. By clicking on an icon in the activity log, users can instantly play back video associated with an event. S2 Security offers a broad range of video products, including S2 NetVR Series video management systems for deployments ranging from small offices to large, distributed global enterprises; S2 NetBox VR converged video management and access control systems; and S2 Network Node VR, an intelligent field panel that brings access control and video management to the network edge. n
Oceania market forecast to shift towards network solutions The Oceania market for CCTV and video surveillance equipment, which is estimated to have been worth $190 million in 2014, is forecast to grow at a CAGR of 5,5 per cent until 2019. Sandeep Nayak, an analyst for IHS Inc, forecasts that the market will experience a continued shift towards network video surveillance solutions. The Australian market is expected to account for most revenues across the forecast period, with an increasing number of government-funded public surveillance
30
projects being implemented. Other key findings of the report include: • The market in Oceania is not price-sensitive and more emphasis has been provided on the specification of video surveillance equipment. • Video management software solutions and cloud-based storage solutions are being incorporated into the enterprise surveillance solutions to provide better and easier management of the surveillance cameras and other peripherals.
Security Focus | Vol 33 No 8 2015
• The Oceania market is a strong adopter of analytics, particularly in the retail market as business intelligence applications are enabling end-users to monitor customer behaviour. • Tourism has been experiencing a boost across Oceania region. With an increasing number of tourists visiting the country, there is a need for advanced surveillance solutions to be incorporated into the region which is leading to the growth of the market. n
InternationalNews
North American growth to outpace Latin America For many years, access control suppliers have been looking to diversify and invest in new countries to expand growth opportunities, and for many years, high growth and opportunity was on the threshold of being realised. However, Blake Kozak, principal analyst for security and building technologies at IHS, has found that the North American market (including Mexico) will outpace the Latin American market until 2018. There are several reasons for this growth trend. First, IHS expects that end-user education will continue to expand. End-users are beginning to more fully understand and take risks with new technologies. Wireless locks are a prime example. Ten years ago, wireless locks were not considered as secure but are now a driving force for the entire access control industry. IHS also expects that in North America, mechatronic locks for utilities and critical infrastructure currently have more opportunity compared with Latin America. When first released, biometrics were similar to video analytics because they couldn’t deliver what was promised and expected. Now, biometrics are being adopted at a rapid pace. Access control as a service (ACaaS) is
another trend which is helping to increase market growth across North America. These trends are all helping to drive growth across North America, but Latin America has yet to see strong adoption of these trends for several reasons. First, the cost of labour remains low in many parts of Latin America. As a result, the ROI is a tougher sell since one of the primary benefits of wireless locks is the reduction in labour and equipment costs. Since the cost of the wireless lock devices are much more expensive compared with magnetic locks or mechanical systems, the market has yet to hit critical mass. Biometrics remain an expensive technology and is priced out of the budget of many endusers. This is changing though. IHS expects the cost to continue to decrease and the awareness to increase. With more governments relying on biometrics and mobile handset providers, such as Apple, using fingerprint sensors, end-users will start to realise the benefits and want to use the technology for other purposes, like access control. ACaaS remains a small portion of the Latin American market due to the cost of labour,
integrator education and the reliability of broadband connections. In terms of economic indicators, Latin America has also underperformed compared with North America. For construction, Latin America contracted one per cent in 2014 and is projected to contract by 1,2 per cent in 2015. Conversely, construction in North America was estimated to grow by two per cent in 2014 and is projected to increase by 2,1 per cent in 2015. Overall, IHS expects that Latin America will remain a difficult market for the next one to two years, depending on economic growth and how quickly suppliers can educate not only end-users, but also channel partners. Mexico, Peru and Colombia are expected to perform well economically over the next several years and will present good opportunities for access control. While Brazil remains a tremendous growth opportunity due to its size and diversity, IHS expects that Brazil’s growth will not exceed 10 per cent annually until 2019. Although the short term outlook is less positive for Latin America, IHS expects that Latin American growth for access control will nearly double the rate of North America starting in 2019. n
Security Focus | Vol 33 No 8 2015
31
InternationalNews
Dallmeier keeps watchful eye Millennium Square is a popular square in the centre of Bristol, right beside the At-Bristol Science Centre, an interactive science centre. For visitors to the Centre, the square and its remarkable water features and sculptures is a convenient meeting point, made yet more attractive by an enormous LED wall and many restaurants and bars close by. Millennium Square is visited by an immense numbers of people every year. Added to this, its location close to the neighbouring Harbourside and the many festivals held there, it is understandable that the expansive Millennium Square is a busy Bristol locale. For this reason, the city administrators decided to improve security in the public square and install a video system equal to the task. Previously, surveillance for the square had been provided by just a single PTZ camera, part of the At-Bristol centre CCTV system. “The @Bristol Control room is windowless and the Panomera® system is used daily by security staff to give us a live, virtual window on to Millennium Square. “Previously the square was covered with a single PTZ which was generally left in a wide angle view to give us an overview of the area. The problem was this meant if we had to retrieve any evidence the recorded images needed to be digitally zoomed and would pixelate too much to be of any evidential value,” relates John Whittaker, security team manager for At-Bristol. Everything in view So the biggest challenge was to find a solution that delivers a continuous overview of the entire square at highest detail resolution, but which is still cost-efficient and easy to operate. “Our experience with the PTZ camera was that the recordings taken from it are basically worthless for purposes of subsequent investigations due to the low resolution. “One alternative would have been to install several HD cameras at various locations all over the square – but then the job of operating the cameras would become very complex for
32
the security staff, and the infrastructure costs would be prohibitive,” John Whittaker explains the initial deliberations. Then finally, Bristol City Council found the solution at a CCTV User Group conference, where they learned about Panomera® multifocal sensor technology by Dallmeier. With the patented sensor concept of this new camera technology, it is possible to monitor even very large expanses from a single installation point, with very high resolution and consistent depth of focus. And, the entire viewing area is recorded at all times, unlike PTZ cameras, which only record the area they are currently viewing live. “The Panomera® gives us the best of both worlds – the wide angle perspective plus the high quality detail at the furthest point,” says John Whittaker. “We have been working with the city administrators in Bristol for several years now”, says James Walker, Managing Director for Dallmeier UK. “The city already has many Dallmeier products in place, and this was one reason why they decided to test the MFS technology.” A suitable installation site was chosen for the Panomera® in consultation with the CCTV provider Select Electric. A single Panomera® camera with a 90° viewing angle is enough to monitor the whole of Millennium Square in the highest possible resolution. The images from the IP camera are recorded at a rate of 12.5 fps on a Dallmeier video appliance. One workstation in the Security office in the At-Bristol centre allows the recordings to be searched as well as live monitoring of the camera feed. A second workstation has been set up in the Council Emergency Control Centre, where it is used daily by the CCTV operators to monitor the area. “We know we are not missing anything now, because we can look for incidents in the recordings after the fact”, says John Whittaker enthusiastically.
Security Focus | Vol 33 No 8 2015
“Knowing the whole square is being recorded at high detail across the whole scene all the time also enables us to track offenders that have been reported by members of the public perhaps in other areas. “The square is a main thoroughfare and this enables us to provide continuity on an offender’s direction – both where they are going and where they have come from.” Independent system operation “The images from the Panomera® are reviewed and analysed not only by the security operators in the At-Bristol science centre, but also by the city council security personnel – entirely independently of each other,” states Ray Murphy, managing director of Select Electric. Unlike PTZ cameras, MFS technology has multiuser capability, i.e., multiple operators can view the camera images at the same time and tilt or zoom as they wish – not only in the live images but also in the recorded material at the same time, without interfering with the other users. Good results “Millennium Square has a busy schedule of events throughout the year which attract thousands of members of the public. We have used Panomera® to obtain evidence for a number of incidents. In fact within its first couple of weeks of installation we had video of a handbag theft which the Police said was the best quality images they had ever seen from a ‘CCTV’ system,” says John Whittaker. “The Panomera® multifocal sensor technology from Dallmeier is a remarkable solution to the problem of monitoring the whole of the Millennium Square – no other system would ever have been able to do that from a single installation point”, John Whittaker concludes with satisfaction. “We are both pleased and impressed with the power and ease of use of the system and would not want to be without it.” n
InternationalNews
Global market to reach $7b by 2019 By Alexander Richardson Market Research Analyst, IHS Technology According to a recently published IHS report (Command and Control Rooms/PSAPs Market – 2015) the global market for command and control room technologies and services is projected to exceed $7 billion by 2019. As expectations towards emergency response change, further development of control rooms will be critical to handle the capabilities of future technologies. Along with changing legislation and initiatives such as Next Generation 911 and 112 and FirstNet, the market has become more dynamic, offering tremendous opportunity to suppliers who can enhance current technology. Due to demand from major multi-national
LMR solution providers, the IHS Critical Communications team initiated and has continued research on the command and control room market covering its three biggest verticals: public safety, transportation and utilities. Because of the variation in the regional command and control room markets, IHS splits the study by region: Asia, EMEA, Latin America, and North America. Each report analyzes the revenues of critical control room technologies including CAD, GIS, voice dispatch, and others as well as various types of services. Additionally, IHS measures the installed base of control room systems and seats on a country by country basis. Each major region has unique trends with regard to command and control, a few of which
stand out among the major findings. Across public safety, transportation, and utilities is an increasing interest in analytical applications and data analysis. IHS has observed a number of tenders surrounding CAD solutions for instance, where law enforcement agencies have desired a wider range of data inputs and applications. A second trend, in more mature markets, is a movement toward service-oriented tenders due to the desire to optimize current technologies. As such, services have become a substantial part of the market in these regions. Finally, there is huge growth potential across technologies and services in the Indian and Chinese markets, which IHS believes will increase to approximately $929-million in 2019. n
New partnership announced Milestone Systems, the open platform company in IP video management software (VMS), held a Signing Ceremony with Asahi Net at the Danish Embassy in Tokyo on June 23. The gathering of media, security associations, distributors and market research analysts witnessed the signing of the agreement for Asahi Net to become an official Milestone Service Provider Partner. Asahi Net will build and supply a cloud solution based on Milestone XProtect Corporate VMS in collaboration with Milestone IT Infrastructure Partner PROMISE Technology, manufacturer of data storage servers designed for flexible, reliable cloud services. At the ceremony, Asahi Net President Jiro Hijikata and Milestone Systems VP Asia Pacific Japan Benjamin Low signed the partnership contract. “Japan has one of the most advanced internet infrastructures in the world, and combined with Asahi Net’s long experience, deep expertise and extensive network, Milestone is confident we will build a cloud solution that will be attractive to even the most demanding Japanese customers. “The Asahi Net cloud surveillance solution is based on our flagship software, XProtect Corporate. Besides the VMS, other critical components for success are network stability and bandwidth, which Asahi Net can deliver,” said Benjamin Low. “Milestone XProtect is running cloud solutions elsewhere in the world but this will be the first Milestone-based cloud solution in
Japan. Both Milestone and Asahi Net understand that customization and thorough testing are necessary, and that is why the implementation and release of this cloud service is divided into several phases leading to the general launch next year.” In this new partnership, PROMISE Technology is responsible for providing the surveillance cloud platform, as well as customizing the XProtect Corporate VMS according to Asahi Net’s requirements. Milestone engineers will be involved providing Custom Development services, as well. Asahi Net will provide the cloud service
(including VMS licenses), network, and camera options through Milestone distributors and resellers. Milestone channel partners can add this new service to an already comprehensive on-premise XProtect product line as another flexible monitoring tool to serve varied customer needs. Asahi Net is an independent Internet provider also offering cloud services through a communications environment allowing connection between web sites and networks globally. Their services are provided in partnership with major telecom carriers throughout Japan. n
From left to right: Asahi Net-Milestone Cloud Solution Partnership signing ceremony at the Danish Embassy in Tokyo.
Security Focus | Vol 33 No 8 2015
33
InternationalNews
Alpro on the doors in Bournemouth
The Alpro transom closers are being installed on doors manufactured by Poole-based Abbey Southern. The closers are a means of hydraulically
controlling the opening and closing of aluminium doors. Builders and glaziers benefit from the ability to adjust the latching and closing force created by the hydraulic valve according to the weight and height of individual doors, as well as type of usage. Precise adjustment of closing force is vital at a site such as Leyton Mount which has a varied user base. Transom closers are contained within the transom header bar of a door. They are therefore well suited to use at premium developments such as Leyton Mount where the design by architect Terence O’Rourke must not be compromised. Aesthetic concerns are also apparent in the specification of Alpro Impressionist 304-grade stainless steel pull door handles which have been used extensively across the complex. Civils have been performed by residential construction and social housing specialists Lovell who excel in sustainable working methods. The building will accelerate regeneration of the Horseshoe Common area of Bournemouth. Funding includes a £5m grant from the Homes and Communities Agency’s “Get Britain Building” loan and equity fund to housebuilders.
Keith Parry, sales director at Alpro, said: “Our transom closers are designed for durability and have been tested independently at 250 000 double-action cycles. Many of our products are made of aluminium or, as in the case of the closers and pull door handles at Leyton Mount, are designed to be used on aluminium doors.” He continued: “Aluminium is a metal that is easily and endlessly recycled without quality loss and often within six weeks, a practice that is in accord with the sustainable building practices used throughout the Leyton Mount project. It’s gratifying that the carbon footprint of the project has been optimised in many ways. This is a brownfield site and Dorsetbased suppliers like ourselves have been used wherever possible.” Abbey Southern fabricates aluminium and uPVC doors, windows and curtain walling. The company serves end-users predominantly from the educational and housing association sectors. Abbey Southern supports a client base of approximately 150 independent window companies and installers. Founded by Abbas Mazrae, it operates throughout southern England and into the Midlands. n
ITS Products has released an innovative flush corner-mount adaptor for the Canon mini dome series that allows the cameras to be installed in environments where there is a likelihood of physical attack. Locations such as police interview rooms, custody suites, secure mental hospitals and immigration centres make special demands of integrators with the twin challenges of ensuring maximum room coverage and factoring out possible ligature points for self-harm. The triangular design of the new unit, combined with Canon’s wide-angle lens, deliver as complete a view of the room as possible and outperform more traditional solutions by eliminating the blind spot usually found immediately below the camera. ITS Products are aware that there are no Europe-wide standards on performance of cameras in these circumstances, but individual countries and organisations such as health trusts, police, and border control forces impose stringent criteria on optical performance, flushness of mounting and resistance to impact. In the UK, for example, the ACPO guidance on safe custodial detention emphasises the importance of designing out possible ligature points in any custody suite. Installers working in high-security environments will know that engineers are regularly accompanied on site by overseers
to minimise the risk of tools being mislaid and appropriated by inmates. This is combined with laborious counting in and out of every item in an engineer’s toolbox. The new adaptor is installed by fitting a mounting frame complete with an IP-rated seal in the corner of the room. The installation can be enhanced by using anti-pick mastic that further prevents any risk of ligature points. The normal outer cover of the dome is discarded so as not to produce a second lens effect and safeguarding Canon’s marketleading optical performance. Installation is completed with three screws to secure the camera in place. Now fully integrated, the clamping bracket and dome are fitted back onto the front panel and fitted into the frame. The whole installation process takes a matter of minutes, which is a great advantage compared with traditional offerings in facilities that are occupied by vulnerable or potentially disruptive residents. Installers will also appreciate that the mounting frame has a degree of flex which accommodates the fact that few corners form a perfect 90-degree angle. The minimal requirement for tools will appeal to any facilities manager securing a building where there is a potential for appropriation and misuse of tools by residents or inmates. The corner unit’s dome and the camera itself
remain concentric so the optical performance is not compromised and there is no change to the focal point if a PTZ camera is being used. The dome is certified to be optically correct even when used with cameras of up to 5MP. ITS Products have anticipated the likelihood of casual vandalism and sustained physical attack on the unit by making the cast acrylic dome with a scratch-proof coating and the ability to withstand an impact specified by the IK10 rating. Installers will be aware of the need for optically correct corner units for quality control in machine vision applications. There is also provision for an integrated audio system within the unit’s design which requires local power. A flying lead is supplied ready to connect directly to the mini dome. Austin Freshwater, pro-imaging director at Canon UK, said: “At Canon, we strive to work with partners to develop solutions that meet specific industry needs. Our mini dome range offers customers superior image quality and functionality, within compact and discreet designs. Partnering the camera with ITS provides a solution for use in demanding niche verticals that offers a greater angle of view and greater protection for users.” Designed and manufactured by ITS Products in the UK, the new corner adaptor for the Canon Minidome is available through Canon authorised resellers. n
Transom door closers and pull handles from Alpro Architectural Hardware have been installed at Leyton Mount, a five-storey mixed use building in Bournemouth. The site is a crescent-shaped development with 62 dwellings and a projecting lower ground floor with commercial space and a café. The development is one of a planned programme of 17 major regeneration initiatives in the town.
Safe custodial detention with mini dome camera adaptor
34
Security Focus | Vol 33 No 8 2015
associationNews
Economic and other factors a threat to security
A
mong a wide range of newspaper articles indicating the poor state of the South African economy, the Beeld newspaper, on Wednesday 19 August 2015, reported that – according to the union Solidarity – 61 500 people lost their jobs during the last few months, mainly due to the economic downturn. The same newspaper revealed that Shoprite, in its annual report, revealed that it had experienced a shocking increase in armed robberies and burglaries at its stores in South Africa, which went hand-in-hand with a 16 per cent increase in security costs to more than R1-billion per annum. September is the month during which the private security industry salary increases take effect. The Private Security Sector National Bargaining Forum earlier in the year concluded another three-year wage agreement, which will form the basis of the new Sectoral Determination for the sector, which was set to be gazetted in late August. While the collective agreement and the subsequent determination achieved a number of milestones towards the longer term objective of professionalising the industry, it did so at a cost that is higher than inflation. During April of this year, the Private Security Sector Provident Fund launched its nationwide compliance drive, by publishing a shocking level of non-compliance by the security companies to this statutory, not voluntary, industry fund, including a list of 78 security companies against whom the fund had commenced with litigation. Despite the fact that these 78 companies are completely non-compliant and should be prohibited from operating as security service providers, the names of these companies being in the public domain, they continue to operate with impunity, some of them even recently gaining large-scale private and public contracts. The issues mentioned in the first four paragraphs, in isolation, may simply be interesting reading but, all things considered, describe a very troublesome situation which may have dire consequences for the country and its continuous battle against crime. The economic downturn will clearly impact on companies spending decisions, with huge pressure being placed on security companies to reduce their security complement or pricing in the months ahead. This happens at the exact time when
security companies require increases to absorb the increased costs associated with the forthcoming gazetted sectoral determination for the industry. Security companies competing with noncompliant competitors who do not, for example, contribute to the provident fund (which gives the non-compliant company an immediate 7,5 per cent price advantage) may be left with no choice but to either also become non-compliant or to seek alternative means of reducing costs, often illegally or at the expense of service levels. This may, in turn, lead to the eroding of service standards and/or the possibility of increased collusion and involvement by security officers in crime, in order to survive as, ultimately, they bear the brunt of their provident fund money being stolen by their employers or them not being paid in accordance with legislation. The Security Association of South Africa (SASA) is perfectly placed to assist consumers in establishing whether their current or intended private security service provider is compliant with the relevant industry laws and regulations.
It is exactly at this difficult period that, illinformed, unwise and short-term decisions by consumers of private security services or decision by security companies themselves to cut costs by becoming non-compliant or compromising service levels, could have serious long-term negative implications on crime levels in our country. Regards Chris Laubscher SASA Chairman
a word from t h e c ha i rm a n
Chris Laubscher
Security Focus | Vol 33 No 8 2015
35
associationNews
Golf day raises generous support for Children of Fire The South African Institute of Security (SAIS) held its annual charity golf day at Blue Valley Hills recently on a beautiful autumn day, which saw a full field of some 30 four-balls participating. Thanks go to all the sponsors for their
generous support and the golfers themselves for whole-heartedly supporting the event, which saw the evening culminating with an auction of various sports memorabilia. A substantial sum was raised for Children of Fire who were, once again, the charity of choice.
Overall winners on the day were the Emperor’s Palace team. The 2016 charity golf day has already been booked for Friday, 6 May, so make a note in your diary now. Bookings will open at the end of 2015. n
SAQCC Fire hosts SAIS 2015 annual general meeting The 2015 annual general meeting of the South African Institute of Security (SAIS) was held recently in the boardroom of SAQCC Fire’s offices in Johannesburg. During the meeting, David Dodge awarded Rosemary Cowan a certificate in appreciation of her 25 years of commitment to the Institute. The newly-elected board is David Miller, Errol Peace, Peter Jephson, Colin Ackroyd, Dave Dodge, Rosemary Cowan, Doraval Govender, Alan Levitas, Mike Verster, Francois Marais and Gerald Watson. n
36
Security Focus | Vol 33 No 8 2015
Law&Security
National Police Commissioner under inquiry
T
By Peter Bagshawe
he current incumbent National Commissioner of the South African Police Services, Riah Phiyega, was appointed on 13 June 2012 and came from a background that includes being a member of the group executive at Absa Bank Limited, a board member of Absa Actuaries and trustee of the Absa Foundation. She was also a group executive at Transnet and had involvement in the restructuring of Portnet and review of state-owned enterprises. Like her predecessor, Bheki Cele, Phiyega had no background in policing. Cele was suspended from the position, pending investigation, in October 2011 and in June 2012, President Zuma announced that he was releasing Cele from his duties as National Commissioner. Cele remained a prominent member of the African National Congess in KwaZulu-Natal and, despite his termination as Commissioner, was appointed Deputy Minister of Agriculture, Forestry and Fisheries on 25 May 2014. Turning back to Commissioner Phiyega, she had not been in the position long before the deaths of 34 miners with some 70 others injured as a result of police action at a kopje located adjacent to the informal area at which a number of the miners engaged in a strike in the Marikana area lived on 16 August 2012. The escalating level of violence in the area, friction between the two unions involved in the strike on the platinum belt, involvement of mine security and various police actions apparently aimed at stabilising the situation have been the subject of the Marikana Commission. The Commission, which was appointed by President Zuma and chaired by retired judge Ian Farlam, presented its report to President Zuma and contained a number of adverse findings. The commentary released by the Presidency on the report referred, among other aspects, to the finding that Lonmin, as the employer had not acted sufficiently to balance the interests of striking and non-striking employees and were at fault, as were the National Union of Mineworkers (NUM) and the Association of Mineworkers and Construction Union (AMCU) who had not exercised control over their respective members to adequately control a volatile situation. During the course of the hearing, a number of members of the Police Service were called to testify, as were various expert witnesses. The Farlam Commission was obviously a rich source of material for journalists, as well
as interest groups and political parties across the political spectrum were keen participants in debates, rallies and commentaries. Messrs White and De Rover respectively testified that the procedure followed on 16 August was flawed tactically and that training in the use of firearms and deadly force was demonstrated as insufficient. Testimony was also led that the plan to control the movement of the crowd of strikers and to disarm them was flawed, but was undertaken despite this. The statement by the then Commissioner of North West province Lieutenant-General Mbombo to journalists that 16 August was “D-Day, we are ending this matter” has been taken as indicative of a mindset, as well as contextualising the subsequent action by police members on the scene. On 17 August, Commissioner Phiyega stated at a police passing out parade “whatever happened represents the best of responsible policing” which served as the stance the South African Police Service adopted and remained in place over the three years the Farlam Commission sat. The Commission found that evidence given by members of the force, including Commissioner Phiyega, had not stood up to examination, as well as that members of the Police Service had, in many instances, worked to shield the police from their actions by closing ranks and, on occasion, attempting to withhold evidence. Commissioner Phiyega has indicated that members involved in the Marikana shootings will continue to receive psychological support, as well as legal services in accordance with police regulations which are in line with the consolidated approach adopted by the senior police structures subsequent to the Marikana tragedy. It should also be noted that at least two senior members of the police management team on site 2 testified that police members continued to shoot at the strikers after it was obvious that the strikers were not shooting at the police. Here the proportional response and flawed training referred to by Cees de Rover is very evident. The report clearly stated that the actions of the police involved in firing on the strikers at the sites were subject to criticism. The report referred to two sites at which the shootings took place and these need to be considered separately. At site 1, the report found that police members had reasonable grounds to believe they were being attacked by the strikers,
but that there was prima facie evidence that some of the members who fired at the strikers exceeded the bounds of self-defence. Of more concern is the finding of the report that, at site 2, police evidence of details relating to the deaths of strikers was deficient and the evidence that was made available did not bear scrutiny under examination. Survivors at site 2 gave evidence that a number of those shot were already injured or were surrendering at the time they were shot. In respect of both scenes, the finding of the Commission are that there were unlawful acts. At site 1 the exceeding of the bounds of self-defence would require an investigation of the members concerned. At site 2, the report found that the actions of police members were unlawful. In this regard, an investigation of all involved at the scene should similarly be required. To date, this aspect of the report does not appear to have been acted upon. The final aspect of the report that will be referred to relates to the finding of the Farlam Commission in respect of National Commissioner Phiyiga. The finding of the Commission in this regard was that an inquiry should be instituted in the fitness of Riah Piyega to hold office and, on 21 August, President Zuma advised the National Commissioner that he was instituting an inquiry as recommended by the report. At the same time, President Zuma requested reasons from the National Commissioner as to why she should not be suspended from duty pending the outcome of the inquiry. At the time of writing, it appears Commissioner Phiyega has responded to this request. The reaction from the senior SAPS management, including provincial police commissioners, was to issue a statement supporting the National Commissioner. Those involved were summoned to appear before the Parliamentary Police Portfolio Committee, and forced to recant publically. Having established the Farlam Commission, received and considered the report from the Commission, the Executive has now acted on the report and instituted an inquiry as recommended. The implications for Commissioner Phiyega are serious and her likely level of support is questionable from within the African National Congress and its structures. Should she be suspended, an acting commissioner will need to be appointed and commentators consider that Lieutenant General Elias Mawela is the most Continued on page 38
Security Focus | Vol 33 No 8 2015
37
Indexofadvertisers
Vol 33 No 8 Advertiser
Page No. E-mail
Website
Active Track
28
info@activetrack.co.za
www.activetrack.co.za
Axis Communications
21
sasha.bonheim@axis.com
www.axis.com/outdoor
Elvey Security Technologies
13, 19
info@elvey.co.za
www.elvey.co.za
Enforce Security Services
OFC
info@enforce.co.za
www.enforce.co.za
Guard Track
6
info@guardtrack.co.za
www.guardtrack.co.za
Hikvision Digital Technology
1
overseasbusiness@hikvision.com
www.hikvision.com
Mutual Safe&Security
23
info@mutual.co.za
www.mutual.co.za
NeaMetrics
27
enquiry@suprema.co.za
www.suprema.co.za
Plaslope
39
glenda.aereboe@plaslope.com
www.plaslope.com
Powelltronics
5
marketing@powelltronics.com
www.p-tron.com
Rosslare
7
info@rosslaresecurity.com
www.rosslaresecurity.com
Sunell
OBC
mj@sunellsecurity.com
www.sunellsecurity.com
Vikela Aluvin
11
www.aluvin.co.za
National Police Commissioner under inquiry Continued from page 37
likely candidate. The inquiry will probably lead to an element of instability in the South African Police Services and a renewed focus on proportional response to threats to officers.
The latter is a concern to me at a time when there has been a dramatic escalation in attacks on members of the South African Police Services, and an increase in the number of officers killed. n
PETER BAGSHAWE holds a Bachelor of Law degree from the former University of Rhodesia and a Bachelor of Laws degree from the University of the Witwatersrand.
Subscribe to To: Security Publications SA (Pty) Ltd, PO Box 414, Kloof, 3640 Tel: (031) 764-6977 Fax: (031) 764-6974 E-mail: jackie@contactpub.co.za p Yes, please, I would like to subscribe to Security Focus. (Cost: R525,00 per year). (RSA Only) The subscription includes an annual Buyer’s Guide. p Enclosed please find cheque to the amount of R............................... p Please start my subscription from the..........................................issue. Do you require a tax invoice p Yes p No (If yes, one will be sent to you on receipt of your payment.)
Banking Details: First National Bank, Kloof Branch Code: 221526 Account Number: 50730011968 Account Name: Security Publications SA (Pty) Ltd
NB: Please make cheques payable to Security Publications SA (Pty) Ltd Name:....................................................................................... Signature:................................................................................................... Date:............................................Company:.................................................................. Position:................................................................. Address....................................................................................................................................................................Code:........................... Tel:..........................................................................................................Fax:................................................................................................
38
Security Focus | Vol 33 No 8 2015
Calendar
Calendar of conferences, events and exhibitions of interest to the security industry – both local and international LOCAL EVENTS: 2016 May 24-26: SECUREX 2016. Venue: Gallagher Convention Centre, Midrand, Johannesburg. More information: Joshua Louw. Tel: (011) 835-1565. E-mail: joshual@specialised.com
INTERNATIONAL EVENTS: 2015 September 22-24: Safety & Security Netherlands. Venue: Amsterdam RAI, Netherlands. More information: RAI Exhibitions. Tel: +31 (0) 341 253685. Fax: +31 (0)20 549 1843. E-mail: h.v.egdom@nai.nl. Website: www.rai.nl September 22-24: SecurityUser Expo 2015. Venue: Bella Centre, Copenhagen, Denmark. More information: AR Media International. Tel: +46 8 556 306 80. Fax: +46 8 19 10 11. E-mail: info@armedia.se. Website: www.armedia.se September 22-24: Securexpo East Africa. Venue: Visa Oshwal Centre, Nairobi, Kenya. More information: Tel: +44 (0)20 7886 3034. E-mail: Alexander.Angus@ montex.co.uk Website: www.securexpoeastafrica.com October 5-7: Fire India 2015. Venue: PragatiMaidan. New Delhi, India. More information: Reed SI Exhibitions. Tel: +911145055500. E-mail: info@reedsi.com. Website: www.fire-india.com October 21-23: CAIPS 2015. 8th Central Asian International Protection, Security and Fire Safety Exhibition. Venue: Uzexpocentre, Tashkent, Uzbekistan. More information: Agnius Kazalauskas. Tel: +44 207 596 5079. E-mail: security@iteevents.com Website: www.ite-exhibitions.com November 2-5: Defence & Security 2015. Venue: IMPACT Exhibition Centre, Bangkok, Thailand. More information: Thailand Convention & Exhibition Bureau. Tel: +662 642 6911 Ext 121. E-mail: info@asiandefense.com. Website: www. asiandefense.com
November 11-12: Sectech Sweden 2015. Venue: Rica Talk Hotel, Stockholm, Sweden. More information: AR Media International. Tel: +46 (0)8 556 306 80. Fax: +46 (0)8 19 10 11. E-mail: deniz.baykal@armedia.se. Website: www.sectech.nu
INTERNATIONAL EVENTS: 2016 March 1-4: SIPS South Russia 2016. 7th South Russian International Protection and Security Exhibition. Venue: Krasnodarexpo EC, Krasnodar, Russia. More information: Agnius Kazalauskas. Tel: +44 207 596 5079. E-mail: security@iteevents.com Website: www.ite-exhibitions.com March 2-4: KIPS Kiev. Venue: Kiev, Ukraine. More information: Premier Expo. E-mail: info@pe.com.au March 8-11: Security Show 2016. Venue: Tokyo International Exhibition Centre, Tokyo, Japan. More information: Nikkei Inc. E-mail: tradefairs2016@smj.co.jp. Website: http://messe.nikkei.co.jp/en April 12-14: LAAD Security 2016. Venue: RioCentre, Rio De Janeiro, Brazil. Website: www.laadsecurity.com.br April 13-15: CAIPS 2016. Venue: Venue: Almaty, Kazakhstan. Website: www.iteexhibitions.com/CAIPS April 17-21: SPIE DCS Defence + Security. Venue: Baltimore Convention Centre, Baltimore, United States. Website: www.spie.org May 4-6: Asian Securitex Hong Kong. Venue: Hong Kong Convention & Exhibition Centre, Hong Kong. Website: www.asiansecuritex.com June 21-23: IFSEC 2016. Venue: Excel Centre, London Dockland, UK. Website: www.ifsec.co.uk November 14-16: IFSEC Arabia. Venue: Riyadh, Kingdom of Saudi Arabia. Website: www.ifsec.co.uk November 16-17: Sectech Denmark 2016. Venue: Scandic Copenhagen Hotel, Copenhagen. Tel: +45-33-14 35 35. Website: www.armedia.se/
Tel: Fax: E-mail: Web:
+27 (0) 11 452-1115 +27 (0) 11 452-3609 glenda.aereboe@plaslope.com www.plaslope.com
TAMPER EVIDENT SECURITY BAGS l l l l l l
Reliable, permanent, special security closure to show evidence of tamper The closure system shows evidence of tamper by freezing, heat, aqua and solvent The bags are manufactured from high strength coextruded LDPE clear or opaque film Bags can be customised to your specification with high quality print of up to 5 colours (5 sizes of standard stock printed bags are also available ) Bags have a unique sequential number or barcode For security purposes the bags are printed along the edge of the side seals
SOUTH AFRICA’S LEADING SECURITY PACKAGING COMPANY
Under Licence to
DEBATIN Security Focus | Vol 33 No 8 2015
TM
39
Directory
SECURITY ASSOCIATION OF SOUTH AFRICA (SASA) SASA OFFICE BEARERS
REGIONAL OFFICE BEARERS
ADMINISTRATION
Suite 147 Postnet X2, Helderkruin 1733
Gauteng: Christiaan Oelofse E-mail: coelofse@adt.co.za Cell: 082 339-3398
National Administrator: Tony Botes Cell: 083 272 1373 E-mail: info@sasecurity.co.za Fax: 0866 709 209
National President: Costa Diavastos Cell: 082 498-4749 E-mail: CostaD@servest.co.za National Chairman: Chris Laubscher Cell: 082 441-4092 E-mail: laubscherc@proteacoin.co.za National Deputy Chairman: Marchel Coetzee Cell: 084 440-0087 E-mail: marchel_coetzee@omegasol.com
KwaZulu-Natal: Gary Tintinger E-mail: garyt@enforce.co.za Cell: 084 429 4245 Western Cape: Koos van Rooyen E-mail: kvanrooyen@thorburn.co.za Cell: 082 891-2351
Accounts: Yolandi Evans Cell: 061 470-8736 E-mail: accounts@sasecurity.co.za Fax: 0862 124 142
OTHER SECURITY AND RELATED ASSOCIATIONS AND ORGANISATIONS PSIRA — Private Security Industry Regulatory Authority, Eco Park, Centurion. Tel: (012) 003 0500/1. Independent Hotline: 0800 220 918. E-mail: info@psira. co.za Director: Manabela Chauke. Council Members: Mr T Bopela (chairperson); Ms Z. Holtzman (vicechairperson); Advocate A. Wiid (council member); and Commissioner A. Dramat (council member). APPISA – Association for Professional Private Investigators SA, Box 8064, Minnebron 1549. Cell: 073 371-7854 or 072 367-8207. Fax: 086 689-0166. E-mail: info@appelcryn.co.za. Website: www.appelcryn.co.za. President: Ken Appelcryn. Secretary: Dianne. ASIS International — Johannesburg Chapter No. 155. Box 99742, Garsfontein East 0060. Tel: (011) 652-2569. Website: http://www.asis155jhb.webs.com/ President/ Chairperson: Johan Hurter. Secretary: Chris Cray. ASIS International — Chapter 203: Cape Town – South African security professionals. President/Chairman: Yann A Mouret, CPP. Secretary: Eva Nolle. Tel: (021) 785-7093. Fax: (021) 785-5089. E-mail: info@aepn. co.za. Website: www.asis203.org.za bac — Business Against Crime, Box 784061, Sandton 2146. Chairman: James Fitzgerald. Tel: (011) 8830717. Fax: (011) 883-1679. E-mail: denise@bac.org. za. Eastern Cape: Box 40078, Walmer 6065. Tel: (041) 373-6401. Fax: (041) 373-6402. E-mail: info@bacec. co.za. Western Cape: 12th Floor Picbel Arcade, Strand Street. Tel: (021) 419-2044. Fax: (021) 419-2066. E-mail: jackie@bacwcape.co.za KwaZulu-Natal: 2 Hopedene Grove, Morningside, Durban 4001. Tel: (031) 207-8273. Fax: (031) 207-3900. Provincial manager: Jody Nair, e-mail jody@backzn.co.za Mpumalanga: Box 430, White River 1240. Tel: David Pretorius (general manager) (013) 751-3188. Fax: (013) 744-3555. Cell: 083 2735515. E-mail: david@bac_mp.co.za; or Ed Coombes (chairperson) 082 807-3916, fax (013) 752-6002, e-mail: ed.coombes@worldonline.co.za. North West: Postnet Suite 4415, Private Bag X82323, Rustenburg 0300; Charles Kendall (managing director) tel/fax: (014) 5923591, e-mail: charles.kendall@lonplats.com. Limpopo: Box 784061, Sandton 2146. Tel: (011) 883-0717; fax (011) 883-1679; e-mail: info@bac.org.za. Free State: Box 784061, Sandton 2146. Tel: (011) 883-0717; fax (011) 883-1679; e-mail: info@bac.org.za. CAMPROSA — Campus Protection Society of Southern Africa. President: Roland September. Tel: (021) 650-4858. E-mail: roland.september@uct.ac.za. Vice President: Derek Huebsch. Tel: (041) 504 2490. E-mail: derek. huebsch@nmmu.ac.za. Executive Secretary: John Tunstall. Tel: (028) 313 1711. E-mail: jtunstall@iafrica.com. Web: www.camprosa.co.za. CENSEC — Centre for the Study of Economic Crime. Director: Louis de Koker. Tel: (011) 489-2134. E-mail: ldekoker@uj.ac.za CISA — Cape Insurance Surveyors Association. Shahid Sonday (021) 402-8196. Fax: (021) 419-1844. E-mail: shahid.sonday@saeagle.co.za; or Mike Genard (021) 557-8414. E-mail: mikeg@yebo.co.za DRA — Disaster Recovery Association of Southern Africa, Box 405, Saxonwold 2132. Chairman: Grahame Wright, Tel. (011) 486-0677, Fax (011) 646-5587. Secretary/ Treasurer: Charles Lourens, Tel. (011) 639-2346, Fax (011) 834-6881. EFCMA — Electric Fencing and Components Manufacturers Association, Box 411164, Craighall 2024. Tel: (011) 326- 4157. Fax: (011) 493-6835. Chairperson: Cliff Cawood 083 744-
40
2159. Deputy chairperson: John Mostert 082 444-9759. Secretary: Andre Botha 083 680-8574. ESDA — Electronic Security Distributors Association, Box 17103, Benoni West 1503. Tel: (011) 845-4870. Fax: (011) 845-4850. Chairperson: Lee-Ann Andreka. Secretary: Shirley James. Website: www.esda.org.za ESIA — Electronic Security Industry Alliance, Box 62436, Marshalltown 2107. Tel: (011) 498-7468. Fax: 086 570 8837. Cell: 082 773-9308. E-mail: sia@iburst.co.za or steveconradie@iburst.co.za. Web: www.securityalliance. co.za FDIA — Fire Detection Installers Association, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: 087 808 7527. Fax: 086 518 4376. E-mail: fdia@fdia.co.za. Website: www.fdia.co.za President/Chairperson: Matt Kielty. Secretary: Jolene van der Westhuizen. FFETA — The Fire Fighting Equipment Traders Association, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157. Fax: 086 518 4374/ (011) 455-4126. E-mail: ffeta@tiscali.co.za. Website: www.ffeta.co.za. Chairperson: Astrid Wright. Vicechairperson: Meshack Gabeni. FPASA — Fire Protection Association of Southern Africa, Box 15467, Impala Park 1472. Tel: (011) 397-1618. Fax: (011) 397-1160. E-mail: library@fpasa.co.za. Web: www.fpasa.co.za. General Manager: David Poxon. GFA—Gate&FenceAssociation,Box1338,Johannesburg 2000. Tel: (011) 298-9400. Fax: (011) 838-1522. Administrator: Theresa Botha. HCSA — Hotel & Casino Security Association, Box 91728, Auckland Park 2006. Chairman: Dick Glanville, Tel: (011) 447-2700, Fax: (011) 447-3276. Vice-chairman: Frans Joubert, Tel: (011) 898-7333. Secretary/Treasurer: Graham Bendell, Tel (011) 728-4405; Cell 082 699-2392. HSA — Helderberg Security Association, Box 12857, N1 City Parow 7463. Tel: (021) 511-5109. Fax: (021) 511-5277. E-mail: info@command.co.za. Website: www. command.co.za. Chairperson: Stephen van Diggele. IFE — Institution of Fire Engineers (SA). Treasurer: A.E. Greig, Box 1033, Houghton 2041. Tel/Fax: (011) 7884329. E-mail: adminstaff@ife.org.za Website: www.ife. org.za. President: John Khoza Mpiyakhe. Secretary: Lindi Mujugira. ISA — Insurance Surveyors Association, Box 405, Saxonwold 2132. Chairman: Graham Wright (011) 4860677. Vice-chairman: Alan Ventress. Secretary: Alex dos Santos. LASA — Locksmiths Association of South Africa, Box 4007, Randburg 2125. Tel: (011) 782-1404 Fax: (011) 782-3699. E-mail: lasa@global.co.za Website: www.lasa. co.za President/Chairman: Alan Jurrius. Secretary: Dora Ryan. NaFETI — National Firearms Education and Training Institute, Box 181067, Dalbridge 4014. Chairman: M.S. Mitten. Vice: Ken Rightford (033) 345-1669. Cell: 084 659-1142. NaFTA — The National Firearms Training Association of SA, Box 8723, Edenglen 1613. National Chairman: Peter Bagshawe.Tel: (011) 979-1200. Fax: (011) 979-1816. E-mail: nafta@lantic.net POLSA — Policing Association of Southern Africa. Tel: (012) 429-6003. Fax: (012) 429-6609. Chairperson: Anusha Govender, 082 655-8759. PSSPF — Private Security Sector Provident Fund. Contact: Jackson Simon. Cell: 072 356 6358. E-mail: jackson@psspfund.co.za. Website: www.psspfund.co.za SAESI — Southern African Emergency Services
Security Focus | Vol 33 No 8 2015
Institute, Box 613, Krugersdorp 1740. Tel: (011) 6605672. Fax: (011) 660-1887. President: DN Naidoo. Secretary: Mrs S.G. Moolman. E-mail:saesi@mweb. co.za SAIA — South African Insurance Association, Box 30619, Braamfontein 2017. Chief Executive: B. Scott. Tel: (011) 726-5381. Fax: (011) 726-5351. E-mail: faith@saia.co.za SAIDSA — South African Intruder Detection Services Association, Association House, P O Box 17103, Benoni West 1503. Tel: (011) 845-4870. Fax: (011) 845-4850. E-mail: saidsa@mweb.co.za Website: www.saidsa.co.za President/Chairman: Johan Booysen. Secretary: Cheryl Ogle. SAIS — South African Institute of Security, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157 or 0861 111 418. Fax: 086 518 4374/ (011) 455-4126. E-mail: SAIS@tiscali.co.za. Website: www.instituteofsecurity.co.za. Chairman: David Dodge. Vice-chairman: Mike Verster. Administrative Manager: Rosemary Cowan. SAN — Security Association of Namibia, Box 1926, Windhoek, Namibia. Administrator: André van Zyl. Tel: +264 61 205 2264. Fax: +264 61 205 2350. E-mail: pagvz@nampower.com.na SANSEA — South African National Security Employers’ Association, Box 9553, Edenglen 1613. Administrators: SIA, Box 62346, Marshalltown 2107. Tel: (011) 498-7468. Fax: (011) 498-7287. E-mail: sia@iburst.co.za. SAPFED — Southern African Polygraph Federation. President: Ben Lombaard 083 793-1152. Secretary: Amelia Griesel 082 786-3347. E-mail: info@sapfed.org. Website: www.sapfed.org SAQCC FIRE — South African Qualification Certification Committee, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157. Fax: 086 518 4374. E-mail: saqccfire@tiscali.co.za. Website: www.saqccfire. co.za Management Committee: Chairman: Brett Jones. Vice-Chairman: Duncan Boyes. SAQCC Fire – 1475 Committee: Chairman: Tom Dreyer. Vice-Chairperson: JJ Scholtz. SAQCC Fire – Detection & Suppression Committee: Chairman: Matt Kielty. Vice-Chairperson: Laura Swart. SARPA — South African Revenue Protection Association, Box 868, Ferndale 2160. Tel: (011) 7891384. Fax: (011) 789-1385. President: Naas du Preez. Secretariat: Mr J. Venter, Van der Walt & Co. SDOA — Service Dog Operators Association, Box 49554, Hercules 0030. Tel: (012) 376-2152/3. Fax: (012) 376-2359. E-mail: company@ppscanine.co.za Chairperson: Mr F. van Kraayenburg. Tel: (012) 376-2266. SIA — Security Industry Alliance, Box 62436, Marshalltown 2107. Tel: (011) 498-7468. Chief Executive Officer: Steve Conradie. Website: www.securityalliance. co.za SKZNSA—SouthernKwaZulu-NatalSecurityAssociation. Tel: (039) 315-7448. Fax: (039) 315-7324. Chairman: Anton Verster – 082 371-0820. VESA — Vehicle Security Association of South Africa, Box 1468, Halfway House 1685. Tel: (011) 3153588/3655. Fax: (011) 315-3617. General Manager: Niresh Reddy. VIPPASA — VIP Protection Association of SA, Box 41669, Craighall 2024. Tel: 082 749-0063. Fax: 086 625-1192. E-mail: info@vippasa.co.za. Website: www.vippasa.co.za. Enquiries: Chris Rootman. Cell: 082 749 0063.E-mail: vippasa@protectour.co.za