REWIRING THE COPPER THEFT PROBLEM
OPPORTUNITIES FOR NEWCOMERS AT ASIS
CRISIS TRAINING IN DOWNTOWN TORONTO
PAGE 6
PAGE 8
PAGE 16
Canadian
January/February2015 2015 January/February
www.canadiansecuritymag.com
PM# 40065710
THE PUBLICATION FOR PROFESSIONAL SECURITY MANAGEMENT
CS Jan_feb 2015 CS.indd 1
GOAL IN
SIGHT
As the Women’s World Cup comes to Canada, security preparations are underway
2015-02-05 12:24 PM
BEYOND SECURITY Commissionaires goes beyond client expectations by providing a wide range of security services. We offer: • Security Guarding • Security Consulting • Identification Services (including background checks, fingerprinting) • Non-core Police Services • Security Training For more than 85 years, Commissionaires has secured and protected businesses, property, information and people across Canada. We are a private, not-for-profit organization dedicated to hiring veterans of the Canadian Armed Forces, RCMP and others.
1 888 688 0715 www.commissionnaires.ca/cdnsecurity
CS Jan_feb 2015 CS.indd 2 Commissionnaires_CS_April.indd 1
2015-02-05 PM 2014-03-21 12:24 2:20 PM
ity
21 2:20 PM
Canadian Volume 37 Number 1
THE PUBLICATION FOR PROFESSIONAL SECURITY MANAGEMENT
Columns
Best foot forward
10 RISK PERSPECTIVE More roles for risk 11 CCTV & THE LAW Surveillance in civil cases
Departments 4
EDITOR’S NOTEBOOK Team building
6
TRENDING
8
ASIS UPDATE A warm welcome for newcomers
Thomas Gerstenecker’s main goal for the Women’s World Cup, held later this year in six provinces across Canada, is to deliver a safe and secure event for athletes, staff and spectators
Photo: Canada Soccer/Bob Frid
Y
CONTENTS 3
By Neil Sutton
12 Put to the test
An emergency scenario unfolds in downtown Toronto as property companies and first responders stage a co-ordinated exercise to see how the city holds up under pressure
19 Q&A Dave Tyson, president, ASIS International
By Linda Johnson
16
20 PRODUCT FOCUS IP Video 22 WORLD WATCH Windsor Castle protected from vehicle-based attacks; Port of Tacoma opens new SOC
visit www.CanadianSecuritymag.com Security leaders will be dropping by our studio in 2015, so be sure to check out the video section of our website for new content.
Cover Image courtesy Canada Soccer: Women’s International Friendly, Canada v USA May 8 2014, Investors Group Field, Winnipeg, Man., (©CanadaSoccer / by Douglas Portz)
FOCUS ON
S•E•R•I•E•S
Brought to you by
Canadian THE PUBLICATION FOR PROFESSIONAL SECURITY MANAGEMENT
Where the Security Industry Talks Solutions
School (K-12) - March 25
Retail - June 24
Hospitality - September 24
Health Care - December 9
www.focusonseries.ca @SecurityEd • January/February 2015
CS Jan_feb 2015 CS.indd 3
2015-02-05 12:25 PM
Canadian
4 EDITOR’S NOTEBOOK By Neil Sutton
TEAM BUILDING Canadian security leaders emphasize the value of co-operation
I
n the course of writing this month’s cover story on the FIFA Women’s World Cup, I knew there was one question I would have to pose to Thomas Gerstenecker. Gerstenecker’s list of accomplishments is enough to make most people in the security profession sit up and take notice. His acumen comes from military service as well as senior posts with the United Nations. In 2011, this magazine recognized him for his accomplishments when he was named Security Director of the Year. Knowing a few things about Gerstenecker, I knew he would have a good answer to this question: when planning an event, how do you deal with the “Information-sharing spectre of terrorism? At the time, I was referring and openness to the October attacks against Canadian military personnel in Ottawa and Quebec. Not too long after when appropriate is my initial conversation with Gerstenecker, we were shaken again when hostages were taken at a Sydney, benefical to safety.” Australia, café, and yet again in Paris when the Charlie Hebdo attacks occurred. “That issue is always an agenda item,” he said, adding that he is in constant contact with police and authorities to ensure his information is up to date and that he is as prepared as he can be to administer security for one of the largest events on the Canadian sporting calendar. The kernel of that philosophy was shared by Mark LaLonde of CKR Global in a column published on the Canadian Security website in the wake of the Paris attacks. If you have not read it, I would encourage you to do so. In it, LaLonde, specified the need for a “new Canadian security doctrine . . . One that spans the public and private sector, takes an inclusive approach to stakeholders and permits sharing of real intelligence.” LaLonde and Gerstenecker may be coming at the issue of threat and terror from two different perspectives, but the consensus is that information-sharing, and openness when appropriate, is beneficial to public safety. Security is in the peculiar position of preparing for eventualities that everyone hopes will never occur. But the act of that preparation helps prevent them in the first place and mitigates damage should they actually transpire. Again this theme was literally played out in a downtown Toronto emergency management exercise that took place last fall. During that exercise, property management companies and first responders worked together to ensure that their response to a crisis was optimal and that efforts between stakeholders were co-ordinated effectively (see the full story on p.16). It’s also timely that the position of president of ASIS International is now filled by a Canadian. Dave Tyson, another Canadian Security magazine Security Director of the Year, assumed that role at the beginning of the year. I had the opportunity to speak to him at length on New Year’s Eve (you can read that Q&A in this issue). We covered numerous topics, among them the advantages of a broad outlook — one that includes an international perspective and values multiple points of view. Sharing information and breaking down silos help make security successful. There may be many players on the field, but the goal should always be the same.
THE PUBLICATION FOR PROFESSIONAL SECURITY MANAGEMENT
Group Publisher Paul Grossinger pgrossinger@annexweb.com
Account Coordinator Trish Ramsay tramsay@annexweb.com
Publisher Peter Young pyoung@annexweb.com
Circulation Lisa Thomson lthomson@annexweb.com
Editor Neil Sutton nsutton@annexweb.com
President Mike Fredericks mfredericks@annexweb.com
Art Director Graham Jeffrey gjeffrey@annexweb.com
Editorial and Sales Office 222 Edward Street, Aurora, Ontario L4G 1W6 (905) 727-0077 • Fax (905) 727-0017 Web Site: www.canadiansecuritymag.com Canadian Security is the key publication for professional security management in Canada, providing balanced editorial on issues relevant to end users across all industry sectors. Editorial content may, at times, be viewed as controversial but at all times serves to inform and educate readers on topics relevant to their individual and collective growth and interests. Canadian Security is published six times per year by Annex Publishing & Printing Inc. Subscriber Services: Lisa Thomson lthomson@annexweb.com P.O. Box 530, Simcoe ON N3Y 4N5 Tel: 866-790-6070 ext (201) Fax: 877-624-1940 I.S.S.N. 0709-3403 Printed in Canada Canada Post: Customer #6597297, Agreement #40065710. RETURN UNDELIVERABLE CANADIAN ADDRESS TO CIRCULATION DEPARTMENT P.O. Box 530, Simcoe ON N3Y 4N5 Subscription Rates: Canada: 1 year $40.00 + HST; U.S.A. (payable in US dollars): 1 year $60.00; International (payable in US dollars): 1 year $75.00 The contents of Canadian Security are copyright by ©2015 Annex Publishing & Printing Inc. and may not be reproduced in whole or part without written consent. Annex Publishing & Printing Inc. disclaims any warranty as to the accuracy, completeness or currency of the contents of this publication and disclaims all liability in respect of the results of any action taken or not taken in reliance upon information in this publication.
Editorial Advisory Board Jason Caissie Profile Group
Tracy Ann Kosa Microsoft
Carol Osler TD Bank
Ken Close Trillium Health Partners
Bill McQuade Final Image
Theresa Rowsell Target
Ashley Cooper Paladin Security
Clark Northcott Pelco by Schneider Electric
Tim Saunders G4S
David Hyde Hyde & Assoc.
Malcolm Smeaton Whitehorse Group
@SecurityEd January/February 2015 • www.canadiansecuritymag.com
CS Jan_feb 2015 CS.indd 4
2015-02-05 12:25 PM
ADVERTORIAL
Evolving Bank Security One Step Ahead
Y
ou turn on the news and see reports of a series of ATM robberies – a lot of money stolen and the thief goes unnoticed as the grainy video footage leads to nowhere. What if it happened at your bank? ATM robberies are high-profile crimes that are often reported in the media and criminals are getting smarter and finding new ways to beat the law. The good news is that our innovative products and features help you stay a step ahead. With Axis’ solutions you can be sure to get an open and flexible platform that can be integrated into existing analog equipment and CCTV installations as they’re needed. Afterwards, you can add functionality to it. We have a broad catalogue ranging from encoders and cameras to proactive security measures and of course, video intelligence. Our smart capabilities, such as video motion detection, auto detection, anti-tampering alarms and cross-line detection
are designed to give you peace of mind. Axis cameras can be fitted with video intelligence applications such as license plate recognition and face recognition. These can be used for both proactive and forensic purposes – giving you the means to fight crime. However, let’s get back to those ATM robberies. With new types of criminal behavior arising everyday such as card skimming, cash or card tapping, transaction reversal fraud and shoulder surfing – ATM crimes are on the rise. To meet these important ATM security challenges, Axis offers a combination of modular and external cameras. Our covert installations include pinhole HDTV cameras for ATMs which are able to provide close-up high definition face images for identifications. Best of all, footage can be recorded and stored cost-effectively using a built-in SD-card or through standard NAS. Protect your customer. Protect your brand.
Visit www.axis.com/banking to learn more. @SecurityEd • January/February 2015
CS Jan_feb 2015 CS.indd 5
2015-02-05 12:25 PM
6 TRENDING CALENDAR Focus on School (K-12) Security March 25, 2015 Richmond Hill, Ont. www.focusonseries.ca Interpol World April 14-16, 2015 Singapore www.interpol-world.com ISC West April 15-17, 2015 Las Vegas, Nev. www.iscwest.com Border Security Expo April 21-22, 2015 Phoenix, Ariz. www.bordersecurityexpo.com Counter Terror Expo April 21-22, 2015 London, U.K. www.counterterrorexpo.com Canadian Technical Security Conference April 21-23, 2015 North Gower, Ont. www.ctsc-canada.com Security Canada East April 22, 2015 Laval, Que. www.securitycanadaexpo.com IAHSS AGM May 6, 2015 St. Louis, Mo. www.iahss.org Security Canada Alberta May 13, 2015 Edmonton, Alta. www.securitycanadaexpo.com Port Secure May 19-21, 2015 Montreal, Que. www.portsecure.ca Security Canada Ottawa June 3, 2015 Ottawa, Ont. www.securitycanadaexpo.com Security Canada West June 17, 2015 Richmond, B.C. www.securitycanadaexpo.com
Robbers and copper
C
opper theft has long been a thorn in the side of utilities that provide Canadians with essential services but a working group made up of stakeholders in Alberta is trying to reframe the issue from simple theft to one that recognizes the extreme dangers associated with the practice. The Provincial Electricity Physical Security (PEPS) working group was established in 2012 in response to the idea that copper theft is merely a nuisance, says its facilitator Dean Young, who is manager of security at AltaLink and also a retired deputy chief from the Calgary Police Service. While copper theft may cost utilities hundreds or perhaps thousands of dollars per incident, the monetary value is not the most important issue, says Young. Any damage to an electricity facility carries with it serious risk. The perpetrator of a copper theft may be risking his or her life in the process of the act. On top of that, essential services could also be seriously impacted. “Every time we have copper stolen, it presents a safety issue — safety to the public, to our workers and to the culprit,” says Young. “From a reliability perspective, it could potentially take down the grid and cause power outages,” he says, adding that damage could even affect 911 emergency services. But a paradigm shift had to occur before PEPS could seriously get off the ground. “Bike thefts are sometimes worth more than what we’re losing,” says Young. By switching the emphasis to the serious safety concerns, the group was able to garner greater support not only from energy producers but also police. “When I started talking to law enforcement across this province about it, the light bulb started coming on for them.” The PEPS working group now represents not only the organizations responsible for energy generation, transmission and distribution but also
various other agencies that are affected by copper theft, including police and RCMP, Crimestoppers, as well as construction companies and metal recyclers. The group gets together quarterly for regular meetings that typically run four hours or more where they discuss strategies and share best practices. A common problem, for example, was replacing stolen copper with new only to have that stolen as well. Now, many are replacing the lost material with a metal that has no scrap value and is therefore no longer a worthwhile target. The fact that is has no material value will also be indicated on site as a further deterrent. “Sometimes it’s not a matter of throwing more money at cameras and things along those lines. It’s about taking a look at your facility yourself, how differently can it be constructed, what different materials can you use, rather than just saying the answer is in guards and guns,” says Young. The way these crimes are prosecuted is also undergoing an evolution. Not only is there better co-ordination between police and industry, the penalties associated with successful prosecution may be more severe. Whereas in the past, the punishment would fit reflect the monetary value of the copper stolen, there is a movement underway to have it also reflect the potential endangerment of human life. The group is also working with prosecutors, developing victim impact statements to put a face to the crime as well as expert witnesses who can testify in court. Ultimately, says Young, the goal is to have fewer people charged with the crime by reducing the number of actual incidents through a combination of deterrents and target hardening. “We’re trying to prevent this from happening in the first place. If we don’t have anyone to prosecute, that’s a success for us.” — Neil Sutton
January/February 2015 • www.canadiansecuritymag.com
CS Jan_feb 2015 CS.indd 6
2015-02-05 12:25 PM
Security Systems & Technology
Innovative, flexible and cost-effective solutions 1-888-717-4447 • solutions@ca.g4s.com • www.g4s.ca
CS G4S_CanSec_Feb.indd Jan_feb 2015 CS.indd 17
2015-02-05 2015-01-1912:25 3:38PM PM
8 ASIS UPDATE
By Guillaume Banville
A warm welcome for newcomers employers. Although networking Not only is development as a security with other members of a professional professional a great personal choice, association like ASIS is a great way to the industry is showing evidence of the overcome the challenges that come with need for resources who are specialized an unproven reputation, in an in the business of protection. industry that is synonymous Contemporary organizations with vigilance and caution, are constantly seeking greater it can be intimidating for efficiency, requiring more beginners to make contact with expertise in risk management, seasoned veterans at a meeting. asset protection, governance and The ASIS Young compliance. More than ever, Professionals networking group today’s security professional is a recognizes these challenges and business enabler. Guillaume Banville was implemented to promote With that said, integration the development and education of into the security industry remains young careerists in the security industry. relatively difficult for newcomers. After I have the pleasure of supporting a completing my own undergraduate group of amazing volunteer leaders studies, I noticed firsthand how dedicated to making a difference for the challenging it was for some to even get next generation of security practitioners. a shot at making the first impression To accomplish this, the ASIS Young that is so crucial when meeting future
Professionals Canada 2014-2015 Strategy is focused on three objectives: • To establish local, core groups of members and build Chapter programs and services tailored to young professionals; • To create learning, mentorship and exposure opportunities for young professionals; • To serve as a conduit between Chapter, regional and international leadership on programs and the concerns of young professionals. Please don’t hesitate to reach out to your Chapter’s young professional liaison and learn about the program. Or even better, become part of the change! Guillaume Banville, PSP, is the Assistant Regional Vice President, Young Professionals Canada, ASIS International.
January/February 2015 • www.canadiansecuritymag.com GaiTronics_CS_Jan.indd 1
CS Jan_feb 2015 CS.indd 8
2015-01-15 2:25 PM
2015-02-05 12:25 PM
Paladin named security provider for Kelowna
V
ancouver-based Paladin Security recently announced that it has taken over mobile patrol services for the City of Kelowna, B.C. The contract, which officially started Nov. 1, 2014, covers a variety of safety and security services for the city (approx. pop. 117,000) including City Hall, recreation centres, parkades, offices and parks, as well as alarm monitoring and response. “In essence, every single city facility at some level is covered by us. The locking and unlocking of city parks, alarm response to all of the cities, even providing security officers for city facilities that have been rented out,” says Kelowna branch manager Jason Begin. Begin describes the security contract as a partnership with the city. In addition to their security duties, Paladin employees can also help Kelowna with ongoing concerns such as maintenance. Security officers will use their smart phones to take pictures of issues that require attention such as an inoperative streetlight. That information is catalogued and the reported back to the city so they can act accordingly. Paladin receives a confirmation when the repair has been completed. Paladin had already established an office presence in Kelowna when it was awarded a B.C. interior health contract in 2013. The company has since opened a systems division there, providing services like commercial alarms, CCTV, access control and laser detection.
ASIS Toronto website hacked
T
he ASIS Toronto chapter website (www.asistoronto. org) was hacked on Jan. 4 but was back up to full strength hours later, according to the chapter’s executive. On the evening on Jan. 4, the chapter learned that one of its event registration pages had been compromised and replaced with an image posted by a group claiming to be the Ashiyane Digital Security Team. Chapter chair Mike Soberal says that no other aspects of the site were affected, and no data was compromised. The hack was perpetrated using an old password, says Soberal, and site security has since been tightened considerably. “Never say never again, but it’s that much harder to [hack],” he says. “I’m satisfied that we’ve taken the necessary steps.”
STOCK
CUSTOMIZED
CUSTOM
IMPROVE YOUR VIEW
@SecurityEd • January/February 2015 Winsted_CS_April.indd 1
CS Jan_feb 2015 CS.indd 9
2014-03-20 11:20 AM
2015-02-05 12:25 PM
10 RISK PERSPECTIVE By Tim McCreight
MORE ROLES FOR RISK
T The risk assessment team now comprises players from multiple departments
his past year, we saw enough I still believe that this approach is beneficial information security breaches to start to an organization and our profession as a second-guessing how secure we really whole. are online, and if corporations are taking the We’re starting to see new regulations need to protect our data seriously. and reporting requirements come into effect We also had some insight into how for data breaches in North America. Not companies deal with risk, or how they don’t. every organization is required to report a You’re reading this in early 2015. By now, breach, but key sectors are focusing on cyber the pundits have analyzed security protection and a number of successful the secure management of attacks against companies these infrastructures. One “I’d rather spend the like Sony, Target, Home interesting development I’ve Depot… the list goes on. noticed recently is the need time doing something a We’ve been inundated with to engage legal counsel in bit more productive — tales of how emails slipped conducting risk assessments, through defences, and how or assessing threats to an focusing on what went malware was installed organization when bringing on computer systems on board a new technology, wrong.” targeted by criminals and or engaging a vendor for (potentially) nation states. third-party support. Attributing these actions to This signals a significant specific groups or nations change in our approach to continues to occupy armchair enthusiasts assessing risks. What used to be an exercise and security professionals alike. It seems like conducted by individuals or subject matter we’re looking for the source of an attack to experts is transforming into a team approach, somehow demystify the reasoning behind the with representatives from disparate groups electronic assault. within an organization coming together I’d rather spend the time doing something to identify gaps in existing controls, or a bit more productive — focusing on what vulnerabilities present in new applications went wrong, if these threats could potentially or third party providers. As security affect my company, and what risks still professionals, we now need to bring into our remain. In my last column, I used a fictitious assessment team lawyers who understand the breach to deconstruct the event from news complexities of the agreements we’re signing sources to generate a risk statement. The risk with vendors, or who appreciate the risks statement is something concrete, something present from operating in a foreign country an organization can use to assess their or implementing a new software program. controls against any number of potential We need to ensure our operating teams are threats. And it can be used by both the engaged in the assessment process, and that physical or logical security professional, they’re capable of accepting new software allowing both sides of the security world applications once they’re in place. What is to use a similar approach to assessing risks unfolding in the logical security space can facing our organizations. also affect the physical security team. I believe I wonder if 2015 will be the year we it is only a matter of time before we see new as a profession embrace this approach: faces joining the risk assessment team that assessing our security posture throughout the truly represent all aspects of an organization. organizations we’re charged with protecting Think of what a team like this could and work with different teams to come up accomplish. I’m hopeful 2015 is the year we see with pragmatic approaches to help protect it become a reality in many organizations. our people, property and information. It’s a lofty goal, something I’ve been writing and Tim McCreight is director, enerprise information security speaking about for almost a decade now, but at Suncor (www.suncor.com).
January/February 2015 • www.canadiansecuritymag.com
CS Jan_feb 2015 CS.indd 10
2015-02-05 12:25 PM
By Elliott Goldstein
CCTV & THE LAW 11
SURVEILLANCE IN CIVIL CASES
T Access to information may provide greater access to the truth
he Supreme Court of Canada This case is also relevant to video recently decided in Imperial Oil surveillance conducted by the police v Jacques1 that wiretaps and because section 193 also applies to the video surveillance search warrant provisions other electronic surveillance in criminal in section 487.01 of the Criminal Code. investigations can be used in civil Section 487.01(4) specifically authorizes proceedings. “a peace officer to observe, by means of a This means that recordings of television camera or other private communications similar electronic device, intercepted by the police any person who is engaged under Part VI of the “The Supreme Court in activity in circumstances Criminal Code2 — during in which the person has a a criminal or regulatory of Canada ordered reasonable expectation of investigation — can be that these recordings privacy ….” obtained by a party to a However, section civil proceeding under the be disclosed to the 487.01(5) states that applicable (provincial) civil section 193 applies “with discovery rules. plaintiffs.” such modifications as the In the Imperial Oil circumstances require, case, the plaintiffs launched … as though reference multimillion dollar class in those provisions to action lawsuits, alleging interceptions of private communications anti-competitive practices and inflated gas were read as references to observations by prices, against a number of oil companies peace officers by means of television cameras and gasoline retailers in Quebec. The or similar electronic devices of activities plaintiffs sought disclosure of more than in circumstances in which persons had 5,000 private conversations recorded by the reasonable expectations of privacy.” police as part of an investigation conducted This means that video surveillance by the federal government’s Competition recordings made by the police pursuant to a Bureau. The Supreme Court of Canada video search warrant may also be subject to ordered that these recordings be disclosed to disclosure in civil proceedings, if ordered by the plaintiffs. the Court. Access to wiretap and electronic Section 193(2)(a) — which specifies surveillance is restricted by section 193(1) that disclosure of intercepted private of the Criminal Code that makes it an communications (or video surveillance) indictable offence to use or disclose a is not an offence if made for the purpose private communication that has been of giving evidence in any civil or criminal intercepted. However, there are exemptions proceeding — is not for the sole purpose in 193(2) for persons who disclose a private of fighting crime. It also ensures that the communication “in the course of or for the Courts will have access to all information purpose of giving evidence in any civil or (audio and video) relevant to the proceedings criminal proceedings ….” before them. Having access to audio and The Supreme Court decided that the video recordings will aid the Court in subsequent use of intercepted private searching for the truth. communications is not restricted to the purpose for which they were intercepted in the first place, which is criminal Elliott Goldstein, B.A., J.D., is a Thornhill, Ont.-based enforcement. Once intercepted, wiretaps lawyer (elgold@rogers.com). and other electronic surveillance become 1. R. v. Seaman 2010 CarswellMan 465, 2010 MBQB 181. available to anyone in a civil proceeding, if a 2. R. v. Melnychuk 2008 ABCA 189 (Alta. C.A.). judge so orders. 3. R. v. Nikolovski [1996] 3 S.C.R. 1197. @SecurityEd • January/February 2015
CS Jan_feb 2015 CS.indd 11
2015-02-05 12:25 PM
12 EVENT SECURITY
BEST FOOT
FORWARD This summer’s Women’s World Cup will see hundreds of athletes from 24 countries compete in six provinces. Where their security and safety is concerned, consultant Thomas Gerstenecker is on the ball By Neil Sutton
January/February 2015 • www.canadiansecuritymag.com
CS Jan_feb 2015 CS.indd 12
2015-02-05 12:25 PM
13
Photo courtesy Canada Soccer: Women’s International Friendly, Canada v Germany, Christine Sinclair, June 18 2014, BC Place, Vancouver, B.C. (©CanadaSoccer / by Bob Frid)
T
rules. The default position in these competitions is that the hey call soccer the beautiful game for its mix host country sets those rules and as such “is responsible for of finesse and power, its showmanship and all aspects of safety and security.” Against that backdrop, athleticism. FIFA has a set of rules and expectations — FIFA has its own It all adds up to a thrilling spectacle that draws security team and a security officer — and some of the higher millions of fans to stadiums around the world each year. And, profile teams participating in the tournament will travel with as with any major sporting activity, there are levels of intricate their own security advisors. “One of the co-ordination jobs planning, scheduling and minutia that must go into ensuring I have is [understanding] what role they play, how they feed matches are played without a hitch. Thomas Gerstenecker, into the overall security component and security consultant and CEO of his own mechanisms, and just make sure that we’re Corp., recently joined the firm, 360 Secure Corp. “One of the all singing off the same sheet of music at the soccer world, helping to oversee one of the end of the day. major events on its calendar, the FIFA co-ordination jobs is . . . “I end up speaking with them to find a Women’s World Cup. His job is to cocommon ground and see how we can move ordinate the security aspects of the to make sure that we’re forward just to make sure we’re staying tournament, which will be played all singing off the same within the scope of our plan. It’s not rigid later this year at facilities in six in terms of being able to find a solution, but provinces across Canada. sheet of music at the trying to stay within the scope of the overall Gerstenecker says he got security concept.” the job the same as he would end of the day.” Gerstenecker also co-ordinates with the any other — he applied, was — Thomas Gerstenecker, RCMP, local authorities in the jurisdictions interviewed extensively, and was 360 Secure Corp where matches are played, as well as CSIS hired. The whole process moved and the Integrated Terrorism Assessment quite quickly, since FIFA wanted a Centre. He has to juggle a tournament that person in place as soon as possible. is coast-to-coast in scope, but also managed Gerstenecker also brings with him at a local level, which means interfacing with provincial and an impressive pedigree. He has an extensive Canadian municipal governments, airport security, police authorities and military background, including participation in Joint ultimately the security personnel already in place at each of Task Force 2 (Canadian Forces Special Operations), and the sports facilities. has also served in various high-level security functions Wherever possible, the tournament will rely on the for the United Nations. He was recognized as Canadian existing security staff at each of the venues. “The last thing Security Magazine’s Security Director of the Year in 2011 we’re going to do is bring in a new company into a stadium while he was UNOPS’s chief of corporate security, based in if we find the current security company is appropriate, which Copenhagen, Denmark. has been the case.” “My role is to establish and implement a nationwide Not only will they be extremely familiar with their own security program which is basically encompassing the security venue, they can provide valuable information on their own and safety of everyone involved in the World Cup,” explains security operations, as well as details on how crowds tend to Gerstenecker, providing a succinct explanation to what is move and function when the stadium is full and an event is ultimately a very complicated endeavour. underway. There are 24 national teams in the tournament who Gerstenecker will apply a strict access control structure will play matches at six facilities in Vancouver, Edmonton, to each of the venues. Everyone involved in the matches, Winnipeg, Ottawa, Montreal and Moncton. The Canadian with the exception of the players, will undergo a background team plays the first match against China on June 6 in check. An appropriate level of accreditation is assigned to Edmonton; the last will played by the tournament finalists each person depending on their role, and their movement on July 5 in Vancouver. There are 50 matches to be played in is governed accordingly. “Our access control measures are between. Each team travels with at least 36 people; the largest extremely rigid,” he says. “We apply zones, and those zones has about 50. In addition, there will be delegates, referees, are supported by accreditation passes.” officials, and stadium staff at each of the matches, not to Each venue’s physical security measures are also assessed mention fans in attendance. by Gerstenecker. Some, like Ottawa’s TD Place, already has “It’s extremely complex,” says Gerstenecker. With so many state of the art surveillance and a modern control room in countries involved, there needs to be a common set of ground place. In other cases, technology may have to be added to maximize security. Canadian superstar Christine Sinclair (left) plays in an international friendly match Day-to-day concerns, like each team’s whereabouts and against Germany in 2014. Canada is one of 24 teams partipating in the Women’s World Cup this year. venue security may be the bread-and-butter of a security @SecurityEd • January/February 2015
CS Jan_feb 2015 CS.indd 13
2015-02-05 12:25 PM
14 EVENT SECURITY
consultant, but stacked against those are the million-to-one unforeseen events — the remote possibility that something terrible could occur either close to a match or within the orbit of a match itself. The October 2014 attacks in Quebec and Ottawa are still fresh memories and terrorism, whether a threat or the real thing, is never far from the headlines. “That issue is always an agenda item,” says Gerstenecker. “The best way that we’ve found so far in order to stay on top of it and plan as much as possible to mitigate any type of terrorist concern is the relationship that we have with key stakeholders — from CSIS to the RCMP to local authorities, but also private security companies on the ground, ensuring that we do have surveillance measures out there from an operational point of view and getting that type of information as soon as possible from a strategic level as well. So far I have to say
Thomas Gerstenecker will co-ordinate all security aspects of the tournament, liaising with teams as well as security personnel at each stadium.
that our relationship and communication with the Canadian authorities and key stakeholders has been fantastic.” In a very real sense, Gerstenecker has done all this before. Last year, he managed security for the Under 20s Women’s World Cup event which was also held in Canada. It was a smaller event than what’s coming up later this year — 16 teams played matches across four provinces — but was accomplished smoothly and without incident, and provided some insight into the challenges that may lay ahead. “This past summer was an interesting experience, because it allowed us to look at certain aspects — what worked, what didn’t — and we can apply it to the much larger World Cup,” he says. “Having experienced the under 20s in 2014 gives us a very clear indication of how venues work from the security point of view,” adds Joe Guest, deputy general secretary of the Canadian Soccer Association, and chief competitions officer for the Women’s World Cup. “It was a very seamless show from our side.” The majority of the security falls
IMAGE JEAN-MARC CARISSE
Investors Group Field in Winnipeg is one of the six stadium venues for the Women’s World Cup. The venue will not host the Canadian team, but will see action from teams including the U.S., Australia, Sweden and Nigeria. Access control for all stadiums in use for the tournament will be governed by a strict process of zoning and accreditation.
January/February 2015 • www.canadiansecuritymag.com
CS Jan_feb 2015 CS.indd 14
2015-02-05 12:25 PM
Photo courtesy Canada Soccer: Women’s International Friendly, Canada v USA May 8 2014, Investors Group Field, Winnipeg, Man. (©CanadaSoccer / by Douglas Portz)
15 There’s a lot of young fans who want to get autographs.” under Gerstenecker’s purview whereas Guest’s role is more Through the process of researching security provisions and about the logistics of the tournament: making training protocols for the soccer events, Gerstenecker had access to time available to teams, and scheduling their travel, both lessons learned from previous World Cups, as well as the 2008 air and ground, along with their copious luggage. “It’s very Vancouver Winter Olympics. structured,” he says. “Teams arrive four He will also be engaging with the days before the competition and we take “There’s a lot of young upcoming Pan Am Games to “get a sense of responsibility for them.” their security program . . . and see if there are There’s a different vibe to women’s fans who want to get any similarities.” soccer, he says, describing it as more of a Too often, notes Gerstenecker, a security “family affair” than the men’s game, which autographs.” director may walk into a situation, sports or is occasionally beleaguered by hooliganism. — Joe Guest, Canadian otherwise, with only a scant framework to “That takes away some of the pressure from Soccer Association work with and a limited sense of what has the security side of the house.” gone before. By accessing the work of others He anticipates this next tournament will and documenting the work he is currently go smoothly, but the remote possibility of a doing, he hopes to break that cycle. security event “I think is something everyone In soccer, the winning team is frequently the one with the in conscious of, and we would have to deal with it as each piece best passing game — a philosophy that Gerstenecker hopes to arrives. Thomas’s area is very clear on those assessments.” apply to security. He says he will stay on with FIFA for several Of more immediate concern to Guest is ensuring months after the World Cup has concluded in order to create harmonious interactions between players and fans — allowing a manual for “not only future FIFA World Cup events but for the latter the appropriate level of access while ensuring the a security manager to pick it up and say, ‘What are the key safety of the former. “We manage that on a regular basis with things that I need to know?’” our own Canadian women’s national team when they play.
FINANCIAL SERVICES SECURITY Securitas Canada has a dedicated and highly trained Financial Services Security Division that focuses solely on the security services and support to Financial Institutions. Our specialized staff, and state of the art technology will provide you with: • Guard services for commercial buildings and data centres • Bank branch guards • Mobile Patrol services • Anti-skimming Services • Alarm response for properties and ABM networks • Executive Protection • 24/7 bilingual Canadian Security Operations Centre
1-800-268-0545
On-Site Guarding
Remote Guarding
www.securitas.ca info@securitas.ca
Mobile Guarding
CREATING ALTERNATIVES
Call to learn about our Integrated Guarding; a unique security solution that allows you to create a customized Guarding program by combining any of our service offerings; On-Site Guarding, Remote Guarding with camera technology and analytics, and/or Mobile Guarding. Integrated Guarding Solutions can provide you with Cost Efficiencies, Flexible Service Coverage, and Service Unification. @SecurityEd • January/February 2015
Securitas_CS_Jan.indd 1
CS Jan_feb 2015 CS.indd 15
2015-01-15 2:21 PM
2015-02-05 12:25 PM
16 EMERGENCY MANAGEMENT
PUT TEST to the
Property companies and first responders stage a massive emergency management exercise in Toronto’s downtown core to test the city’s readiness for the worst By Linda Johnson
T
with emergency services providers,” he says. he Sunday morning dawned cool and clear. Testing communication ability between security personnel Still, it was perhaps not the best day to venture and emergency services, and also with other participants such as out for a stroll. Across Toronto’s downtown core, a tenant companies, property managers and media, was another simulated terrorist attack was underway. major goal. The simulation, one of the largest public-private emergency Organizers were particularly interested in testing the management exercises ever conducted in Canada, involved communication network “PATHComm,” which connects 150 emergency service and security personnel from property the security operations centres of the major buildings in the management companies, more than 100 volunteers, millions of downtown core with 911, police, fire and EMS dispatch centres. dollars in equipment and specialized HAZMAT teams. Finally, the exercise would test the “It was quite the exercise and was several workability of the various response plans, to years in the making. It was culmination of two ensure plans and assumptions were accurate, previous table top exercises, each one building “If two years ago says Luciano Cedrone, vice-president of on each other. And this was the crescendo,” national security at Brookfield Properties. says Brian Claman, national senior manager of someone had said “We all have plans. Every building has one, security and life safety services at GWL Realty we could pull this off, and emergency services have their own plans. Advisors. But the problem was none of the assumptions The company is a member of the I would have said, were ever talked about in an open format. So Commercial Real Estate Financial District we wanted to bring everybody to the table Security Group (CRE-FDSG), made up of the ‘impossible.’” and say: What would you do in this situation? national senior security leadership of major — Brian Claman, GWL Realty Does it make sense?” he says. real estate management companies with Advisors “We’re all about interoperability and assets in Toronto’s financial district. The other integration: they’re all buzz words that a lot of members are Brookfield Office Properties, associations say, but I don’t think a lot really Cadillac Fairview, Oxford Properties and practice. That ultimately was our goal, to make Scotia Plaza. The group’s exercise steering that a reality.” committee, including David Sulston, national director of security Bill Neadles, superintendent and unit commander of at Oxford, planned and hosted the simulation with Toronto emergency management and public order at Toronto Police Police, Fire and EMS services. Service, says the service wants to help the private sector prepare The primary goal of the Oct. 26 exercise, Claman says, was for emergencies that may involve the police. If a major event to test the ability of the private and public sectors to collaborate occurs in the downtown core, police officers might not be able to in responding to a major emergency. The event, set off by the provide the first-line, immediate response companies expect. discovery of a suspicious package, is deemed a terrorist act and It’s thus essential that companies have the internal resources prompts a large-scale evacuation. and procedures to be able to handle major events for a period “We wanted to test interoperable operations, to see the of time by themselves. individual properties work collectively with other properties and
January/February 2015 • www.canadiansecuritymag.com
CS Jan_feb 2015 CS.indd 16
2015-02-05 12:25 PM
17
The emergency exercise scenario began with the discovery of a suspicious package on July 10, 2015 and resulted in illness from building tennants. Speciality teams are dispatched to the site in response to a CBRNE medical emergency. Such exercises assess the readiness of security and emergency services should the unthinkable actually occur.
“With a criminal event,” he says, “we’re eventually going to show up. But if it’s something that just takes them into their emergency management preparation mode, then they might have to deal with it on their own schedule, before the emergency services arrive. We might be tied up doing something on a priority basis.” The centre of the exercise was Commerce Court, a complex of four office buildings, but it included all major office towers in the financial district and beyond, stretching south to Union Station and the CN Tower and north up to the Eaton Centre. Several buildings in the area, including Rogers Centre, created their own scenarios, which would integrate with the event at Commerce Court. The emergency began at 8 a.m. on Fri. July 10, 2015, the start of the Pan Am Games and a normal work day at Commerce Court. Building security receive a call from a 19th floor tenant: a courier has just delivered a package containing a note suggesting a threat to the Games. Hearing of the note, some tenants start leaving the building. While police and security try to determine what they’re dealing with, they learn some people — played by community college students, property company staff and police auxiliary — are falling sick. A supervisor calls for a CBRNE (chemical, biological, radiological, nuclear and explosive response), and police, fire and EMS units dispatch their specialized teams to the site. Their first task is to determine whether the problem
is primarily a medical, criminal or fire event, says Andrew Kostiuk, division commander for Toronto Fire Services. Because there is a chemical hazard and decontamination is required, fire services assume prime responsibility. “We perform the decon part of any kind of CBRNE event. We take care of the decon for both the allied agencies — police, fire and ambulance — and any civilians involved,” he says. EMS prepares to treat the injured. While command and decontamination centres are set up, and emergency services put on protective equipment information, updates are communicated via PATHcomm to other buildings. Then a package explodes. Security personnel in all buildings in the financial district and surrounding areas start searching for more packages. In other buildings, more people are getting sick. “At Commerce Court we have multiple packages now that are being found throughout the building. A terrorist attack is underway,” Claman says. “The security folks are dealing with people who are sick and dropping around them. They have to determine: What’s happening? How do they best respond? What does it mean for their own safety? If people are getting sick, are security and police going to get sick?” At 9:30 the buildings start evacuating; some people leave after hearing media reports. When packages are found at Union Station, it closes. “So that’s not an egress point. You can’t leave the downtown core by Union Station. There’s a lot of confusion @SecurityEd • January/February 2015
CS Jan_feb 2015 CS.indd 17
2015-02-05 12:25 PM
18 EMERGENCY MANAGEMENT
IMAGE COURTESY TORONTO POLICE SERVICE.
All aspects of an emergency are evaluated, from co-ordinating efforts between security and first responders, to how police would deliver bad news during a press conference and answer difficult questions from media. College students, building staff and police auxilliary play a variety of roles as the scenario unfolds.
about where people should go,” he says. do their roles, and the exercise provided good training. It even Emergency services conduct scrums with media, both real gave them a chance to experiment with changes they wanted to and fictional; some reporters are portrayed by actors. Claman make. says they wanted to see how security teams and police would “We ran our HAZMAT/CBRNE team through two full handle questioning. “We had to make sure the media could days of training beforehand, and then we got to test the changes do their job but weren’t in harm’s way nor in a scenario that is just about as close as you getting in the way of security or police.” can get to a real event,” he says. As more people fall sick, the focus of “It was a good opportunity to work with “We found a lot of the exercise turns to the medical response. our partners in PATHcomm, but it was also Security continues looking for packages, an opportunity to do some pre-planning and archaic thinking — securing the buildings and blocking off pre-training before the Pan Am event coming people stuck in the past contaminated areas. up next summer.” At 11 a.m. there’s a formal press On the police side, Neadles says the with egos or fiefdoms.” conference at police HQ, again with actors exercise went according to the script and — Luciano Cedrone, playing reporters. Fire, ambulance and everything went well. “We practised and Brookfield Properties building officials attend, and the Chief of exercised our folks right down to the nth Police, Toronto Public Health and City Hall degree.” are represented. After a short, informal The biggest challenge, he adds, was debrief among organizers, the exercise ends. communication. The various groups work on “Logistically, it was very challenging. We got a lot right, and different radios and different frequencies and don’t always have there’s a lot we’re proud of,” Claman says. “It was the first of its direct voice communication. kind, and if two years ago someone had said we could pull this “We do have the PATHcomm communication system there, off, I would have said, ‘impossible.’ That to me is an incredible which is a marvel. But there’s still a bit of a communication gap success.” because we’re not always able to speak to them in the quickest, Cedrone says clear, concise communication was a problem frankest way that we might want to,” he says. throughout. They also encountered reluctance to change. “We The CRE plans to publish an After Action Review (AAR) found a lot of archaic thinking, people stuck in the past with of the exercise early this year. Once that review is out, and its egos or fiefdoms, or ‘we don’t normally do that.’ ” recommendations implemented, the CRE will begin planning On the other hand, he adds, they were surprised by the the next exercise. They plan to conduct a major simulation high level of participation. “Union Station played 100 per cent. every two or three years. CN Tower, we found out later, had four or five other property “If we do this right, the next time we do it, we won’t repeat owners in that area sitting in on their piece of the exercise. the mistakes. We’ll find other mistakes, and that’s healthy,” That’s encouraging, to see properties taking it to the next level Claman says. “We’re well on this path, but there’s still a lot of by themselves.” work to do.” Kostiuk says they were also very satisfied with the fire services side of the exercise. Crews worked together well to Linda Johnson is a freelance writer based in Toronto. January/February 2015 • www.canadiansecuritymag.com
CS Jan_feb 2015 CS.indd 18
2015-02-05 12:26 PM
19
QA &
D
with Dave Tyson, president, ASIS International
globally. One of the things I’ve been ave Tyson’s resumé is extensive, talking about is really globalizing the to say the least. He has held organization. How do we really operate senior security positions at in a global way? It’s one thing to do the City of Vancouver, eBay, PG&E lot of programs around the U.S. and and most recently SC Johnson, and in then replay them around the world, but 2007 was named Canadian Security how do we look at more? We’ve seen magazine’s Security Director of the Year. this with the CSO Roundtable. We’ve His latest accomplishment is assuming pushed it out and the role of president actually operated in of ASIS International “One of the things . . . Europe and Asia — making him the and the Middle East, first Canadian to do about being president India . . . so. Canadian Security Another focus is spoke to Tyson recently is, it’s your opporunity member value. It’s about his history not enough to just with ASIS and how to drive change.” do more things he plans to move the for members; we organization forward. have to provide value. As an example, when we started Canadian Security: What do you think the International Lounge and the ASIS is doing right? Certification Lounge at our annual Dave Tyson: ASIS is really about the seminar, members really liked that big picture. When we look at the because it was an opportunity to get in growth of the society over a global a room and really have a conversation footprint, we’ve done a really good job with people from around the world. at two things: one, we’ve continued to grow — albeit slower than we’d CS: What does it mean to you personally like — and internationalize the society. to become president? Another good job we’ve done is, DT: For me, it’s the culmination of many we weathered the financial storm of years work. I started my efforts in the 2008 and beyond very well in general Vancouver chapter in 1995, 1996, and terms. A lot of volunteer organizations I’ve been working at it ever since. As a literally collapsed from their members Canadian, to lead an organization like dealing with a lack of ability to travel ASIS is a huge, huge accomplishment and invest in training. Membership and opportunity. It’s recognizing that organizations in general suffered if you’re going to be an international around the world. We negotiated those organization, you have to have people waters very well and we continue to that represent more than just one grow. The staff worked very, very hard country and can bring that broader to make that happen, both financially perspective. I think to have a Canadian and from a value proposition in this role, just like we had Eduard perspective. in this role [Eduard Emde from the Netherlands was ASIS president in CS: What are your goals as president? 2012], it brings a slightly different DT: My job is to continue down that perspective . . . That adds value. path in terms of greater expansion
CS: Considering the number of information breaches that occurred in 2014, what should be the role of physical security and ASIS be in mitigating these threats? DT: I think it has a large and prominent role in two ways: one, in our relationship with (ISC)² we help to bring the two sides of the house together . . . giving people a safe environment to ask questions, learn and be educated. I think you’re right that 2014 probably will go down as the year of the breach, at least until [2015]. We’ve seen these old traditional ideas of the insider threat having an impact, whether they’re walking off with your server, or they’re introducing a virus via a physical device like a USB storage device, or an insider who is behaving in a way that is detectable and could have picked up from a background check. Or there may have been signs that should have been picked up by the security team or the HR team; these are all components of the security program that should be considered at an enterprise level. Between the traditional and the information security programs, there’s tons of evidence that this is an area where collaboration needs to occur and make joint efforts to reduce those types of risks that our companies face. CS: What sort of lasting impression would you like to make during your tenure as president? DT: From my perspective, I think I want to drive the organization forward. This is a year of acceleration and evolution. I want to drive globalization and member value. It’s easy to be cynical about large, slow-moving organizations, but the one message that I heard when I was coming up, was, if you don’t like something, then get involved. Volunteer, make a change and help drive the organization in the right direction. I hope that everybody hears that from me and that I do that. One of the things about being president is, it’s your opportunity to drive change. There’s lots of good people on the board to provide guidance, but it’s a platform to do the right thing. @SecurityEd • January/February 2015
CS Jan_feb 2015 CS.indd 19
2015-02-05 12:26 PM
20 PRODUCT FOCUS IP Video IP camera family
Video management software
Bosch Security Systems The recent release of the IP 2000, IP 4000 and IP 5000 camera families creates a comprehensive portfolio of IP cameras. The IP 5000 family offers resolutions up to five megapixel to distinguish individuals or minor details, increasing the effectiveness of retrospective analysis. For applications where cost is more important than fine scene details, the IP 4000 family offers 720p resolution. And, the IP 2000 family is suggested for small retail businesses, as it includes two-in-one solutions that combine a built-in passive infrared (PIR) sensor and a 720p HD IP video surveillance camera — for easy identification of events or intruders day and night. www.boschsecurity.com/HDSecurity
WavestoreUSA V5.48 is the latest version of the advanced IP Wavestore V5 Video Management Software suite. Features of the new version V5.48 deliver upgrades including new vector PTZ joystick commands, operability enhancements and event integration for GANZ cameras. The V5.48 provides additional video performance enhancements, along with code optimizations for improved handling of views for cameras and layouts, and better management for network interfaces. Highlights of the new V5.48 release include: Improved handling of Full Screen views for cameras and layouts and improved handling of Joystick controls through new vector PTZ commands. www.wavestoreusa.com
HD video decoder
720-degree camera
LILIN Americas The VD022 HD four-channel IP video decoder with Virtual Matrix functionality is a monitoring solution for displaying live video from up to four IP cameras without a PC or NVR. The VD022 can also remotely playback video from LILIN brand NVRs of up to 16 channels or DVRs via a TCP/IP network to form a video wall. www.lilin.us
IC Real Tech ALLIE (formerly called IC720) is a 720-degree video monitoring camera. It can be placed on a countertop or mounted to the ceiling and easily connects to the Wi-Fi network. With an immersive field-of-view that’s 360-degrees horizontally and 360-degrees vertically, the camera — in conjunction with its integrated, proprietary software app — delivers a remote-monitoring experience that allows the user to panoramically scan from floor-to-ceiling and completely around the camera itself — even zoom and freeze images — all in a smooth, unrestricted fashion without any blind spots or distortion. Monitoring is achieved via a wide variety of wireless mobile devices. www.icrealtech.com
Lawyer,
Mediator
Author of Visual
Evidence
Elliott Goldstein, Cell: 416.315.0066
& B.A., J.D.
elgold@rogers.com
Mediation of Disputes - Commercial, Shareholder, Employment. Litigation to Collect Debts or Defend Customer Lawsuits. Alarm Installation & Monitoring Contracts, Employment Agreements. Minute Book Reviews and Updates, Incorporations. Wills, Powers of Attorney for Property and Personal Care. Video Surveillance Law Seminars, Forensic Video Analysis Law.
www.videoevidence.ca 45 Redondo Drive, Thornhill (Vaughan), ON, Canada L4J 7S7
Fax: 905.597.6226
360-degree camera Oncam Grandeye The Evolution Mini camera has received IK10+ Certification for its vandal-proof housing. The testing process included dropping a 0.5 kg metallic ball from increasing heights onto several critical areas of the camera— including a direct hit on the dome, then moving to a 5.89 kg bullet-shaped weight drop on the dome from a height of 864mm. The same camera was used during the entire certification process, which started from IK08 testing (5 joules/3.7 pounds) and went up through IK10+ (50 joules or 37 pounds of force). The camera recorded live at all times. www.oncamgrandeye.com
Cameras with PoE extenders VIVOTEK These network cameras with embedded PoE extenders, IB8367-R, IB8367-RT and IB8338-HR, are bullet-style network cameras suited for outdoor applications. The PoE extender embedded within the three models allows for both PoE input and output and direct connection with other PoE network cameras without an additional power source, thereby facilitating long-distance surveillance system implementation in factory areas, parking lots, crossroads, etc. www.vivotek.com
January/February 2015 • www.canadiansecuritymag.com Goldstein_CS_Sept.indd 1
CS Jan_feb 2015 CS.indd 20
2014-09-04 1:44 PM
2015-02-05 12:26 PM
By Derek Knights
BOOK REVIEW 21
SURVIVING THE HOSTILE READER Introduction to Forensic Writing By Dr. Michael Arntfield and Justice Kelly Anne Gorman Carswell/Thomson Reuters ISBN: 978-0-7798-6382-2 Reproduced by permission of Carswell, a division of Thomson Reuters Canada Limited.
P
eople ask me, “What was the best book you read this year?” Or “What was the worst?” This year the answer to both is the same book: Introduction to Forensic Writing. Its authors are cop-turned-professor Dr. Michael Arntfield, who teaches technical writing in Criminology and is affiliated with several Ontario universities and Madame Justice Kelly Anne Gorman, a judge in the Ontario Court of Justice Superior Division. It’s a “style guide…a textbook, a handbook…and a guidebook” that is designed for many in the legal professions and any “police officer…private or corporate investigator…or a student of the above.” And they define the term forensic writing as writing “in service to the law [or] other fields that serve the public trust.” The authors discuss the need to understand how words and grammar operate, compare legalese with plain language, and bring some very telling examples into the mix. Reports or other documents in today’s business and legal environment are subject to extreme scrutiny, so how they are written is important. The authors cite cases where the written product of governments and industry have fared well or poorly in courts and include pivotal cases (R v. Askov; R v. Stinchecomb; R v. O’Connor) to drive home the point. There are detailed examples and situations where forensic writing was a critical factor. Entire chapters are devoted to introducing readers to the art of forensic writing — and educating them on the dangers of poor writing skills and the documents derived therefrom. In fact, the authors point out that many issues (criminal or civil) never make it to trial because the written work is too poorly done or error-ridden to risk its disclosure to the other side. The book discusses the “hostile reader” — a term I hope catches on. In business, both from an operational and administrative perspective, there are persons internal and external who will attack your written product. Some may do so to help you improve it while others do so to destroy its (and your) credibility. Often our reputation is solely based on our written product. A well-intentioned critique can help you bullet-proof your report against a withering onslaught from the opposition. This is an extremely valuable book that every security executive or security professional must read. And I’m annoyed
about that. Why? Because this valuable book is virtually unreadable. While the authors give lip-service to clarity and plain language they don’t follow their own advice. An old writing clarity scale, the Gunning Fog Index, gives thumbnail assessments of writing clarity; a score of 8-12 is optimal. One 80-word sentence in this book scored 40, meaning roughly that 40 years of education is necessary to understand the sentence in one reading (I still don’t know what it’s about). That sentence’s complexity is typical of the book as a whole. There are other issues, too. In short: reading this book is very, very hard work. The authors are not lightweights and their opinions and advice and teachings matter. We need to read this book and it deserves to be read. But it deserved to be written differently. I fear many (probably all) of the people who’d benefit from its lessons and who pick it up will put it down after struggling through mere pages. Derek Knights, CPP, CISSP, CFE CIPP/C, PCI, is the senior manager, strategic initiatives, global security and investigations, at the TD Bank Group (www.tdbank.com).
NOTE-TAKING SOLUTIONS FROM TRIFORM To help you with the important task of documenting your work and investigations, Triform offers a wide variety of industry-leading investigative recordkeeping solutions: • Evidence notebooks • Investigation casebooks and record books • Carrying cases • Ticket and forms holders • Records management systems We also specialize in making custom notebooks with custom content and stamping.
To order online or get an instant quote Visit www.triform.com Call 1-877-TRIFORM (874-3676)
@SecurityEd • January/February 2015 Thomson_CS_Jan.indd 1
CS Jan_feb 2015 CS.indd 21
2015-01-16 9:02 AM
2015-02-05 12:26 PM
22 WORLD WATCH Windsor Castle protected from vehicle-based attacks
Windsor Castle, home of the British monarchy since the time of Henry I (1110) and the longest occupied palace in Europe, is being protected from terrorist vehicle attacks with Delta’s DSC800 decorative bollards. Safety consultants can specify having ornamental steel trim attached directly to the bollard or select cast aluminum, iron or bronze to slip over the crash tube. If damaged, one slides off the old sleeve and installs a new one. The DSC800 is certified at K4, L2, and able to stop a 6,800 kg vehicle at 50 kilometres per hour.
Port of Tacoma opens new SOC
The Port of Tacoma, Wash., is among the largest container ports in North America. Located on Commencement Bay in South Puget Sound, the port serves as a major trade gateway to Asia and Alaska, handling 1.7 million containers in 2012. Port security is handled on-site by security personnel, in co-operation with federal, state and local officials and in compliance with all U.S. Coast Guard security regulations. Recently, the port received a grant from the U.S. Department of Homeland Security to upgrade its security system, including building a new security operations centre. After researching a number of available options, the port chose a Winsted Sight-Line console and M-View monitor wall for its new operations centre.
Polish hotel upgrades surveillance Bania Hotel, a luxury Polish hotel in Bialka Tatrzanska Mountain Resort in the central Tatra Mountain region has deployed new surveillance equipment from Vivotek. For indoor surveillance, security specialists recommended a fixed dome network camera. In areas requiring special attention, such as lobbies, entrances and places frequently visited by guests, the Vivotek FD8162 was installed. For outdoor areas, the Vivotek IP8335H bullet camera was employed, which includes features such as WDR Pro for high contrast environments.
Bahrain stores surveilled inside and out Located throughout Persian Gulf, Ramez Hyper Market is a rapidly expanding retail chain that is expected to reach 90 total stores within five years. For its stores on the island nation of Bahrain, the chain wanted the ability to see the cars entering its premises. Integrator Al Wardi Security Trading Co. W.L.L. selected Hikvision’s DS-2CD854FWD-IR5 3MP WDR Network Box Camera for its 50M IR range combined with a vari-focal lens. The IR range provides the needed distance to survey individual automobiles, while the vari-focal lens provides the means to see specific detail, such as licence plate numbers.
Surveillance oversees chemical lifecycle Taminco USA is using Milestone Systems’ IP video technology to help manage employee safety and to uphold federal regulations for the production and transportation of hazardous materials. Taminco manufactures compounds and solutions for agricultural, personal and home care, energy and water treatment chemicals. To research and develop these essential compounds, Taminco uses a wide variety of solutions, powders and other substances for its manufacturing sites. The Department of Health, Department of Homeland Security and Department of Transportation heavily monitor the shipping of these substances. To monitor and record all daily activity in its U.S. manufacturing facilities, Taminco has deployed Milestone XProtect video management software.
AD INDEX Axis Communications Commissionaires Elliott Goldstein Focus On Health Care G4S Gai-Tronics
5 2 20 3 7 8
www.axis.com www.commissionaires.ca www.videoevidence.ca www.focusonseries.ca www.g4s.ca www.gai-tronics.com
Garrett Metal Detectors Keyscan Securitas Thomson Reuters Winsted
24 23 15 21 9
www.garrett.com www.keyscan.ca www.securitas.ca www.triform.com www.winsted.com
January/February 2015 • www.canadiansecuritymag.com
CS Jan_feb 2015 CS.indd 22
2015-02-05 12:26 PM
KEYSCAN GIVES LEGACY ACCESS CONTROL SYSTEMS WHAT THEY NEED
...A FUTURE. With Keyscan’s full complement of feature-rich 1, 2, 4 and 8-reader door and elevator floor access control units and our renowned software, we can provide a simple solution to upgrading your aged or failing access control system. Keyscan’s ‘hybrid’ approach to access control mixes network appliance-based hardware architecture as well as our ‘At-the-Edge’ solution. It simplifies system design by utilizing some, if not all, of your existing readers, credentials, network and power cables. Keyscan’s approach helps you breathe new life into your aged or failing system by providing the latest in access control technology and making it easy for you to upgrade.
Contact us today to find out how we can assist you.
1 888 KEYSCAN (539-7226) toll free Canada or USA www.keyscan.ca
CS Keyscan_CS_Feb.indd Jan_feb 2015 CS.indd 123
2015-02-05 2015-01-21 12:26 10:21 PM AM
Team with GARRETTÂŽ to create your SAFE ZONE Enjoy peace of mind as you enjoy your favorite sporting events. Sports fans are passionate about their teams. Garrett Metal Detectors help keep them safe so they can simply relax and enjoy their big game. Our American-made products have been an integral part of the security plan at major sports events such as the Olympic Games, the Pan American Games, FIFA World Cup venues, professional football, and even the Little League BaseballÂŽ World Series.
Garrett supports the spirit of competition.
MADE IN THE USA
Garrett_CS_Jan.indd CS Jan_feb 2015 CS.indd 1 24
2015-01-21 2015-02-05 8:43 12:26 AM PM