Security solutions #110

Page 1

AUSTRALASIA’S LEADING SECURIT Y RESOURCE FOR BUSINESS AND GOVERNMENT SECURITY SOLUTIONS • I S S U E 1 1 0 • N O V/ D E C 2 0 1 7

ISSUE 110 NOV/DEC 2017

securitysolutionsmagazine.com 001_SSM110 Cover-FIN.indd All Pages

Reimagining The Future With

13/10/2017 12:53 pm


Are you working to resolve a hostile vehicle attack risk? Ezi Security Systems has an unrivalled, extensive offering of high to extreme security products and have the expertise to design a solution to secure any critical infrastructure or extreme risk assessed site. All Ezi Security Systems Active Vehicle Barriers (AVB) and Hostile Vehicle Barriers (HVB) have been rigorously crash tested and certified to meet relevant ASTM, IWA and PAS 68 stipulations. For further information, please visit our website www.ezisecurity.com or call 1300 558 304 to speak to our security specialist team.

If serious security is your requirement, you need look no further than Ezi

002-003_SSM110 DPS.indd 2

13/10/2017 12:56 pm


1300 558 304 11 Cooper Street Smithfield NSW 2164 www.ezisecurity.com.au sales@ezisecurity.com

002-003_SSM110 DPS.indd 3

13/10/2017 12:56 pm


CUSTOMISABLE ELECTRIC HEIGHT ADJUSTABLE SIT STAND CONSOLES

Does your control room meet

Australian Ergonomic Standards?

www.activconsole.com

004-005_SSM110 DPS.indd 2

Clayton VIC 3168

13/10/2017 12:58 pm


Safe Work Australia, Nov 2015

“...in 2012-13 the cost impact of work-related injuries and illnesses was estimated to be just over $61 billion...�

State-of-the-art ergonomic lifting technology Lifetime Australia phone support AS/NZS 4443:1997 & ISO 11064

+61 3 9574 8044

004-005_SSM110 DPS.indd 3

sales@activconsole.com

13/10/2017 12:58 pm


ISSUE 110

34

FEATURES

54

CONTENTS

102

62

70

82

COVER STORY

Historical industry observations suggest that the security industry goes through a major change every 15 years, although one could easily argue that this timeline is shrinking. These same industry observations suggest that the next inflection point for security, which is referred to as Security 4.0, has been reached. What is Security 4.0 and what impact will it have on security as we know it today?

38

34 THE BENEFITS OF SAFE CITIES

For the first time in history, more people around the world live in cities than in rural areas. By 2030, over 60 percent of the world’s population will be living in cities. While this global migration to urban areas improves the living standards, health and financial prosperity of these citizens, it brings challenges to a city’s infrastructure, resources, security procedures and emergency response systems. How we meet these challenges will be critical to the success of cities in the decades that follow.

38 HOW I BECAME AN ISIS BRIDE

A teenage girl from rural Syria dreamed of becoming a doctor, but the war and the socalled Islamic State made her something very different, and very frightening.

62 THE NEXT GENERATION OF SECURITY

REGULARS 10 LETTER FROM THE EDITOR 14 LEADERSHIP

Jason Brown looks at the Standards which impact leadership.

16 CYBER SECURITY

How will artificial intelligence affect cybersecurity?

PROFESSIONALS

18 RESILIENCE

70 THE COMMONWEALTH GAMES –

20 HUMAN RESOURCES

How do we attract the next generation of security professionals and what skills might they need in a changing world?

ASSURING SECURITY AND SAFETY

In addition to his role as chief executive of Intelligent Risks (IR), an international management services company headquartered in Sydney, Neil Fergus has been the security adviser to the Commonwealth Games Federation in a part-time capacity continuously for over 13 years. Drawing on his experience planning and delivering the security for seven Olympic Games, four FIFA World Cups and six Commonwealth Games, Neil looks at the security challenges around the upcoming 2018 Commonwealth Games on the Gold Coast.

86 APPLYING A MULTIPLEX VIEW TO RISK MANAGEMENT

Dr Gav Schneider proposes that the need for security risk managers to become more rounded risk practitioners is crucial and that a more holistic view to risk management, referred to as the multiplex view, is more critical today than ever before.

6 // SECURITY SOLUTIONS

006-009_SSM110 Contents.indd 6

Dr Rita Parker looks at the trusted insider threat and its impact on resilience.

Greg Byrne examines the impact of bullying within businesses.

22 RISK MANAGEMENT

Dr Kevin Foster asks, how do we deal with hostile vehicles in urban environments?

24 COMMUNICATIONS 26 LEGAL 28 THINKING ABOUT SECURITY

42 OPERATIONS

Richard Kay examines fear and its impact on survival.

46 CCTV

When designing a CCTV system, which camera specifications are actually important?

50 BUSINESS

Why do accountants and other professionals need better risk management competencies?

90 SECURITY STUFF 92 SPOTLIGHTS 98 PROFILES 102 PRODUCT SHOWCASES 110 SHOPTALK

Company announcements from within the industry.

60 LEGAL Q&A

Who pays for damages created during searches?

66 LOSS PREVENTION

How do you create an effective loss prevention culture?

74 AVIATION

With the holiday season fast approaching, we look at handy travel security tips.

78 ACCESS CONTROL

We examine the psychology of security and the perception of safety.

What do you know about the risks next door?

30 EVENTS

A look at upcoming industry events.

securitysolutionsmagazine.com

13/10/2017 6:42 pm


006-009_SSM110 Contents.indd 7

13/10/2017 6:42 pm


Sign up to our eNewsletter and receive up-to-date valuable information regarding all things Security.

www.securitysolutionsmagazine.biz/newsletter

006-009_SSM110 Contents.indd 8

13/10/2017 6:42 pm

EC - S


TALL. FAST. STYLISH. Our award winning speedgates combine state-of-the-art optical technology with a high barrier height to protect your building.

EASYGATE SPT

• • • •

Barrier heights up to 1800mm Fast throughput (up to one person per second) Ideal for Disability Discrimination Act compliance Choose from a number of models, including the LX, SPT, SG, IM or LG • Custom pedestals with an array of attractive finishes EASYGATE LX

Find out which security gate is right for you.

1300 858 840

www.entrancecontrol.com.au

EASYGATE IM

FULL HEIGHT TURNSTILE

EC - Security Solutions Ad.indd 1 9 006-009_SSM110 Contents.indd

TRIPOD TURNSTILE

SWING GATE

6/02/2017 10:37:16 AMpm 13/10/2017 6:42


FROM THE EDITOR www.securitysolutionsmagazine.com

EDITORIAL

EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen Sist, Ged McMahon

CONTRIBUTORS

Garry Barnes, Karissa Breen, Jason Brown, Greg Byrne, Rod Cowan, Rachael Deluca, Neil Fergus, Kevin Foster, Nial Jenkins, Richard Kay, Steve Lawson, Justin Lawrence, John McGiffin, Bob Mesnick, Rita Parker, Don Williams, Dr Gav Schneider, Anne Speckard, Alex Sidernko, Ami Toben

ADVERTISING

Keith Rozairo PHONE 1300 300 552 EMAIL keith@interactivemediasolutions.com.au

DESIGN AND PRODUCTION

Jonathan Rudolph PHONE 1300 300 552 EMAIL graphics@interactivemediasolutions.com.au

MARKETING AND SUBSCRIPTIONS

PHONE 1300 300 552 EMAIL admin@interactivemediasolutions.com.au $62.00 AUD inside Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues)

ACCOUNTS

PHONE 1300 300 552 EMAIL accounts@interactivemediasolutions.com.au

A

s a security professional, are you

similar to how we might teach a young child to

familiar with the area of computer

distinguish a cat from a dog.

science commonly referred to as

Why is this important to the future of security

deep machine learning? Have you

and security professionals? Quite simply, in a

heard of it? Do you know what it is? These are

world where technology becomes intelligent

important questions because, by all reports, this

enough to discern what is aberrant behaviour,

new area of technological development is going to

be that vehicles and/or individuals or groups

have a profound impact, not just with regard to

of people acting in a suspicious manner, as

how security is conducted, but also what the

well as activity that falls outside of specific

security professional of the future will look like.

patterns within the cybersecurity space, then

According to Wikipedia, deep learning (also

we can change the way security is currently

known as deep structured learning, hierarchical

funded. This is achieved by outsourcing security

learning, deep machine learning or deep

infrastructure to perform all sorts of interesting

unsupervised learning) is a branch of machine

tasks for other departments, such as marketing

learning based on a set of algorithms that attempt

and operations, who want data around traffic flow

to model high-level abstractions in data.

within buildings, heat mapping, people counting,

To try and break this concept down to its most

demographic segmentation and so on. All of a

basic aspects, deep learning is based around the

sudden, security is only part of the equation.

idea of teaching a machine to solve problems that

Now imagine being able to integrate

would otherwise be extremely difficult to write

behavioural economics to drive desired security

a computer program for, based on the number

and marketing outcomes, and then test and

of variables in the problem. For example, in the

measure in real time whether those behaviour

case of a video analytics program, the challenge

drivers are achieving the desired results using

might be learning to distinguish the difference

simple A-B testing models. When you combine

between a cat and a dog. You cannot write a

intelligent security analytic systems with choice

computer program because not all cats and

architecture with a view to driving specific

dogs are identical in size, shape, movement and

behavioural outcomes, then the future of

Level 1, 34 Joseph St, Blackburn, Victoria 3130 PHONE 1300 300 552 EMAIL enquiries@interactivemediasolutions.com.au WEBSITE www.securitysolutionsmagazine.com

so on. However, they have similarities that can

security and possibilities around what a security

be learned.

professional can do within an organisation

DISCLAIMER

programmers try to develop an algorithm that

Cover: Peppinuzzo / Shutterstock.com

PUBLISHER

ABN 56 606 919463

The publisher takes due care in the preparation of this magazine and takes all reasonable precautions and makes all reasonable effort to ensure the accuracy of material contained in this publication, but is not liable for any mistake, misprint or omission. The publisher does not assume any responsibility or liability for any loss or damage which may result from any inaccuracy or omission in this publication, or from the use of information contained herein. The publisher makes no warranty, express or implied with respect to any of the material contained herein. The contents of this magazine may not be reproduced in ANY form in whole OR in part without WRITTEN permission from the publisher. Reproduction includes copying, photocopying, translation or reduced to any electronic medium or machine-readable form.

So, instead of trying to write a program,

C

M

Y

CM

MY

CY

becomes extremely interesting. In this issue’s cover story, we take a look at

a computer can use to look at hundreds or

Security 4.0, the next technical evolution in security

thousands of examples of what is a cat as opposed

system design, to get a better understanding of the

to a dog (and the correct answers), and then the

capabilities of emerging technologies and where

computer uses that experience to solve the same

security is headed over the next few years. Quite

problem in new situations. Essentially, the goal is

frankly, it is hard to imagine what the industry

to teach the computer to solve by example, very

might look like 10 years from now. n

CMY

K

WRITTEN CORRESPONDENCE TO:

RS A DE VI

SSOCIATI

ON

O

RALIA LTD

SECURIT Y

PR

UST FA

O

 Level 1, 34 Joseph St, Blackburn, Victoria 3130  1300 300 552  enquiries@interactivemediasolutions.com.au

Official Partners O C I AT I

ON

Y P R OVI D

RIT CU

D LT

SE

STRALIA LTD AU

PR O

ASS

SPAAL

AU S T R A L I A

OF

SECURITY

RS

OF

E

O rigin a l Siz e

SSOCIAT RS A IO DE N VI

blue colour changed to this colour green.

COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE signing your approval to print. Please pay special attention to spelling, punctuation, dates, times, telephone numbers, addresses etc, as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman Press assumes no responsibility for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................

10 // SECURITY SOLUTIONS

010-013_SSM110 Editor's Letter.indd 10

John Bigelow Editor

securitysolutionsmagazine.com

17/10/2017 10:38 am


NEW INT-QUADIP For PB- Series Quad Beams

C

M

Y

CM

MY

CY

CMY

K

IP INTERFACE MODULE

LAN/WAN

With the new IP interface module, our intelligent PB- series Quad Beams are as easy as IP cameras to install and integrate with leading VMS solutions.

VMS

Most intruder detection systems rely on legacy technologies which require a number of third-party products and man-hours to install. The INT-QUADIP module utilises infrastructures already in place with CCTV, Access Control, and other security systems; dramatically reducing installation costs whilst providing a fully integrated security system which can be easily expanded and configured as desired.

KEY SPECIFICATIONS ● ● ● ●

PoE Class 3 IEEE 802.3af VMS Compatible Direct control for cameras including: - Axis - Bosch - Hikvision - Sony

● Plug & play web browser interface ● No software installation required ● One cable installation

PB-IN-HF/HFA The ultimate in trouble free perimeter detection for distances up to 200m.

1300 366 851 www.seadan.com.au 010-013_SSM110 Editor's Letter.indd 11

PB-F/FA Single channel quad beams ideal for simple perimeter systems.

PB-IN-100AT Anti-crawl beam for high security perimeters up to 100m.

PB-KH TAKEX quad beam performance for use in beam towers.

(02) 9427 2677 www.sprintintercom.au

13/10/2017 4:07 pm


READ OUR FREE DIGITAL MAG subscribepage.com/ssm109

securitysolutionsmagazine.biz

010-013_SSM110 Editor's Letter.indd 12

13/10/2017 4:07 pm


ATTENTION INTEGRATORS GOLD CLASS MOBILE ACCESS PROMOTION Upgrade your customers to experience the benefits of GOLD CLASS MOBILE ACCESS on their mobile device.

Increase your own income.

AT NO COST

Complimentary award winning HID Readers and Credentials Exclusive to ISCS

“Only having to carry one device for so many daily tasks is excellent.” ALISON BROWN Facilities, Operations & Events Manager, Netflix

AN ARA PRODUCTS COMPANY

HID Mobile Access®

Secure, convenient access control via your mobile device

ISCS is Australia’s HID Platinum Partner distributor

Contact

goldclass@iscs.com.au or 1300 111 010 and quote code GOLDCLASS Any size company considered, new or existing customers

010-013_SSM110 Editor's Letter.indd 13

13/10/2017 4:07 pm


LEADERSHIP

LEADERS SETTING THE STANDARDS I

BY JASON BROWN

n the last column, I

standards. Over 20 million

ballot and is due for publication in

white paper on sociotechnical

wrote about some of

businesses worldwide are ISO

early 2018.

resilience, crowd management and

the activities that a

certified or recognised.

leader can do to

Australia has mirror committees

In Australia, the mirror committee AS/NZS JTC OB/7

digital surveillance. In March 2018, Australia will

provide the basis for a better

for a large number of ISO

– Risk management is the

host the international plenary

security future through investment

committees but, for the Security

committee responsible for

for the global committee in

in development, mentoring and

Solutions Magazine audience, it

developing standards in the

Sydney. Between now and then,

teaching. In this column, I will

is the Risk Management Technical

area of risk management. It has

there will be opportunities to

consider the capacity of leaders to

Committee (TC262) and the

most recently met to redevelop

participate in this and other

make a long-term substantive

Technical Committee Security and

the current implementation

work. More information about

contribution to building national

Resilience (TC292) that should be

handbook and will be leading the

risk management and security

and international standards.

the main focus.

international development of a

standards work is available on the

subsequent global guide. There

following websites: • https://www.iso.org/

Most readers are familiar with

Security decisions derive their

ISO 31000 Risk Management,

legitimacy from effective risk

are opportunities to participate in

others will know the range of ITC

management and the identification

this work and there will be future

security standards in the 27000

of controls that mitigate risk. ISO

calls for expert participation in

• https://isotc262.org/

series or business continuity

31000:2009 Risk management

the international working group.

• https://www.iso.org/

in the 22301 group. Where did

– Principles and guidelines sets

The committee is also contributing

these standards and others like

out principles, a framework and

to the development of managing

them come from? They came from

a process for managing risk. It

legal risks and managing travel

the work of people, just like the

can be used by any organisation

security risks.

readers of this magazine, who

regardless of its size, activity

were prepared to step up and

or sector. Using ISO 31000 can

should look to engagement with

professionals’ seminar in Canberra

contribute to working groups on

help organisations increase the

the ISO committee for Security and

on 9 November, there will be

specific standards or to technical

likelihood of achieving objectives,

Resilience, TC292. The mission for

specific workshops for part of this

committees who manage the

improve the identification of

ISO/TC292 Security and Resilience

development. For readers who want

standards process.

opportunities and threats and

is to produce high-quality

to engage immediately, contact

effectively allocate and use

standards to support nations,

Jason at jason.brown@thalesgroup.

an institution or even an individual

resources for risk treatment. ISO

societies, industry, organisations

com.au

with a passion recognising the

31000 is the national standard in

and people in general. The purpose

need for standardised technology

the majority of the G8, G20 and

of these standards is to enhance

Security Director for Thales in

and systems. If people have

the Brazil, Russia, India, Indonesia,

and sustain the state of being free

Australia and New Zealand. He

the will and expertise, they can

China and South Africa (BRIICS)

from danger or threat and to feel

has served on a number of senior

make a significant difference to

economies, and is highly valued

safe, stable and free from fear

boards and committees, including

every aspect of risk management,

as a guidance document by a wide

or anxiety.

Chair of the Security Professionals

security and resilience.

range of ISO technical committees

The system works by a country,

More specifically, readers

In Australia, Mirror Committee

committee/629121.html

committee/5259148.html • http://www.isotc292online. org/ n As part of the annual security

Jason Brown is the National

Australasia, member of ASIS

and their national mirror

MB25 is the committee

International Standards and

developing global standards is

committees, as well as a number of

responsible for the development

Guidelines Commission and Chair

the International Organization for

United Nations agencies.

of standards in this area of security

of Australian Standards Committee

and resilience. Current projects

for Security and Resilience. As of

The lead organisation for

Standardization (ISO). ISO is an

Australia is a lead contributor

international body representative

to this work and has participated

include of the international

February 2017, Jason has been

of over 160 countries. It is

in the recent redevelopment of

standards proposal for a

appointed Chair of the International

the world’s largest developer

the 31000 standard. The rewrite

standard on protective security

Standards Committee for

and publisher of international

has now passed final committee

architecture and guidelines, a

Risk Management.

14 // SECURITY SOLUTIONS

014-033_SSM110 Regulars.indd 14

securitysolutionsmagazine.com

13/10/2017 5:42 pm


Presco™ Standard Keypad, Combination RFID Keypad and RFID reader New PrescoTM Range

Introducing the new range of Presco™ indoor keypads and readers. The Proximity reader and Combination keypad are advanced self contained RFID (Radio Frequency Identification) contactless devices. They are capable of interfacing to either a Wiegand input control panel or to the Presco range of PAC controllers. When any of these devices are coupled with the Presco™ PAC series of door access controllers you get the full benefits of a secure door access control solution with all of the features of the Presco™ protocol.

FEATURES The PSK16 is a direct replacement for the PRE keypad and outputs Presco™ data only. Installations require only 3 wires to the controller but can be made with 2 wires if the LED indication is not required The PSC16 & PSR16 output both Presco™ and Wiegand format data. Output type required is auto sensed via white wire connection. Read range of up to 20cm Compatible with Presco™ PAC access controllers and all other Presco™ decoders, the entire system uses low cost non-shielded cable and keypads and readers can be up to 1 kilometre from the door controller (power supply and cable dependent) Compatible with industry standard 26 bit wiegand systems, the keypad can output 8 to 64 bit or burst mode wiegand and custom proximity cards and tags are available for wiegand formats up to 64 bits

For more info www.presco.com.au

NIDAC SECURITY 2 Cromwell Street BURWOOD VICTORIA AUSTRALIA 3125

014-033_SSM110 Regulars.indd 15

Audible and visual confirmation of all actions. Designed and manufactured in Australia. 36 month manufacturer’s warranty

Phone: +61 3 9808 6244 Fax: +61 3 9808 9335 E-mail: sales@nidac.com

13/10/2017 5:42 pm


M S

CYBER SECURITY

TO INFINITY AND BEYOND – WITH ARTIFICIAL INTELLIGENCE BY KARISSA BREEN

W

e are always hearing

By combining AI, machine

about technologies

learning and data stored with

that are trending. But

technology, both AI and humans can

what happens next for

analyse and collect more data and can

a potential decrease in response time for cybersecurity teams.

With anything that is developed, an organisation needs to look at the performance enhancement, but

technology disruptors? For me, it is

do it more efficiently and succinctly.

about understanding these

Technologists understand that AI is

Implications for a Chief Information Security Officer

developments and actually looking

already an ubiquitous part of human

AI is growing to a point where it can

needs to ensure it is measuring the

intrinsically about why these

daily lives and it will only improve

potentially become difficult to control

potential downfalls and risks and

particular trends are going to

with the increasing demand and

and govern from a cybersecurity

maintaining its integrity by protecting

accelerate the cloud computing

enhancement of cloud technology.

point of view. Many people, including

the organisation’s assets and data.

space. The way I see it, machine

The combination of cloud with AI will

security practitioners, can be fearful

learning algorithms and advanced

transform the way in which products

of the unknown and what AI might

world and it can be implemented

computational infrastructure have

and services are viewed.

bring. Adding AI into the mix can

to improve peak performance to

mean that these machines are

detect and remediate security

operating at another level – how can

threats, alongside the human eye.

many upsides, on-trend technologies

The Benefits of AI with Cybersecurity

humans potentially combat super

However, because AI is not always

also carry potential risks and

The human element is always

intelligent computers? Security

accurate, regular touch points are

down sides.

important in conjunction with AI, as

professionals always need to think

needed to ensure false positives

even AI can miss certain elements

outside the box to ensure they are

are not becoming common. Security

to increase key performance on any

and make mistakes that humans

bettering their knowledge against

departments need to be aware of

piece of technology that they can by

can identify. AI opens up machine

cyber espionage. They will need to

the development of AI and not let

adding layers to create depth and

learning algorithms to increase

be organised, always further their

it be totally autonomous. Security

longevity. When cloud computing was

top performance. It also extends

knowledge and stay two steps ahead

teams should constantly research and

first introduced, the capability was

additional capability for computer

of their attackers.

understand the cybersecurity threat

limited. Now, however, enhancements

functions and is a tool to assist in

like artificial intelligence (AI) are increasing exponentially to improve

enabled us to build many new platforms and applications. With

Technologists are always trying

the growth of products and services.

not get too carried away with the capability of new technologies. With a security hat on, an organisation

AI is apparent in the technology

Organisations should ensure

landscape to ensure they are always

identifying patterns and trends within

their cybersecurity business units are

two steps ahead of any attacker and

an organisation.

familiar with AI and the protection

are not just reliant on AI. Security

around this, backed up by in-depth,

should always look at the down sides

Many attackers are leveraging

AI has developed from not only

automation technology to strike.

ongoing research. Consistent

of technology to ensure that they

enhancing current cloud platform

Some organisations are still

exploration and knowledge will

can identify worst case scenarios for

incumbents, but also powering an

utilising manual aggregation of

arm leaders with a comprehensive

organisations. n

entirely new generation of cloud

data to provide solutions to security

understanding of how AI is amplifying

computing technologies. This

findings. The downfall of using

their products and increasing user

innovation drives business growth.

manual methods means it can take

experience. This will also mean

technologist who specialises in

What does this mean for cloud

Karissa Breen is an independent

a lot longer to detect intrusions, by

that they understand and weight

cybersecurity and innovation. Karissa

combined with AI? The cloud industry

which time it can be too late and

the risks that are attached to these

has a particular focus on cybersecurity

itself has invested heavily in AI.

vulnerabilities within organisations

types of enhancements. Hiring an AI

writing, speaking and research. She

The AI and cloud affiliation powers

are compromised through the

researcher will provide direction and

is a cybersecurity influencer and

two areas – AI cloud services and

network and data exfiltration. Whilst

additional solutions to ensure the

advocate, publishes her own IT blog

cloud machine learning platforms.

AI can assist in reducing time for

development of AI with any cloud

and video blog and is also an IT brand

Some key players who are investing

remediation, it cannot sufficiently

computing business. Reassurance

and event ambassador. Karissa also

heavily into the combination include

cure cyberthreats, but it can enhance

and governance would be a strategic

works for CryptoAUSTRALIA, a not-

IBM with Watson, Microsoft with

detection. In some cases, autonomous

solution rather than a tactical one, to

for-profit organisation that advises

Cognitive Services and Google with

machine learning can lead to false

capture the current state and predict

the Australian public on cybersecurity

Cloud Vision.

positives and alerts, which can lead to

the future state of the AI component.

and privacy.

16 // SECURITY SOLUTIONS

014-033_SSM110 Regulars.indd 16

securitysolutionsmagazine.com

13/10/2017 5:42 pm


MULTIPLE CAPABILITIES SUPERIOR SOLUTION

Volvo Group Governmental Sales Oceania

IN HOSTILE ENVIRONMENTS, IT’S IMPORTANT THE SYSTEMS THAT YOU DEPEND ON CAN

STAND THE TEST OF TIME.

At Volvo Group Governmental Sales Oceania, our core business is the manufacturing, delivery and the support of an unparalleled range of military and security vehicle platforms; a range of platforms that are backed by an experienced, reliable and global network with over one hundred years of experience

superior solutions, providing exceptional protected mobility www.governmentalsalesoceania.com 014-033_SSM110 Regulars.indd 17

13/10/2017 5:42 pm


RESILIENCE

TRUSTED INSIDER THREAT TO ORGANISATIONAL RESILIENCE BY DR RITA PARKER

eople are critical to

component. Organisations are

adequate mechanisms built into an

catastrophic activities… that went

an organisation’s

social systems that rely on people

organisation’s systems to identify

undetected as a consequence of a

success, or its failure,

to ensure their ongoing operations

various kinds of risk-indicating

failure of management and other

and significant time

and functions. People are part

behaviours. At the most basic

internal controls of the most basic

and resources are invested in

of, and essential to, the overall

level, these can be incorporated

kind.” If appropriate risk indicating

screening potential job applicants

system and they have the potential

into management processes,

policies and procedures had been

to ensure they have the necessary

to contribute to the resilience of

including performance reviews,

in place at Barings, it is unlikely that

skills, experience, qualifications,

the organisation.

reconciliations of corporate credit

Nick Leeson would have been able

cards and travel records. It does not

to wreak such havoc, and Barings

P

capabilities, attitude and values.

But how well do you know

Many hours are spent reading

your colleagues, your boss, or

mean surveillance of employees

Bank would have been sufficiently

carefully crafted written

the staff you recruited? How well

or breaching their privacy, but it

resilient to survive and thrive. That

applications, interviewing potential

do you really know them? Active

does mean including strategies

lesson is just as relevant today as it

candidates and checking references

recruitment is only one part of

and mechanisms to detect and to

was then.

to ensure the selected candidate

the overall picture of ensuring an

prevent trusted insider threats.

will fit in with the organisational

organisation can trust and rely on

Such strategies were lacking in

as infrastructure, contribute to

culture and contribute to its goals,

its people. Most employees are

the well-documented case of

the resilience of an organisation,

productivity and overall success. In

decent, reliable and trustworthy

Barings Bank.

but while physical assets require

the past, it was often enough to

people, but that does not mean

conduct rudimentary background

organisations can be complacent,

Bank’s derivative futures traders

or replacement, human

checks, but in today’s highly

or abrogate their responsibility to

in Singapore, Nick Leeson, was

assets will enhance resilience

competitive corporate environment,

their shareholders or, indeed, to

engaged in risky trading that relied

through ongoing engagement,

as an added level of scrutiny,

other staff. Rudimentary or more

on stability in the Japanese stock

communication and trust. n

organisations increasingly seek

thorough background checks are

market to avoid major losses.

police checks and some agencies,

useful, but they are only as good as

However, the Kobe earthquake

particularly in the government

the day they were undertaken.

caused the Nikkei Index to drop by

of the International Council of

In 1995, one of Barings

People, like other assets such

only regular routine maintenance

Dr Rita Parker is a member

sector, require a formal security

In today’s competitive and

seven percent in one week. Barings’

Security & Resilience Professionals

vetting procedure of candidates

global environment, there are

losses escalated rapidly, in the end

and is Centre Manager of the

before declaring them successful.

frequent, almost daily, reports

reaching £1.3 billion. This resulted

Australian Centre for Armed Conflict

All these checks are relevant and

of insider trading, intellectual

in bankruptcy for the oldest

and Society. Rita is also a former

appropriate to ensure new

property theft, data breaches,

merchant bank in Britain, which had

Distinguished Fellow at the Center

members of staff are, or at least

unauthorised risks, or other

financed the Napoleonic wars, the

for Infrastructure Protection at

appear to be, trustworthy and they

adverse events that damage

Louisiana Purchase and the Suez

George Mason University, USA. She

will not act in any way that might

an organisation’s reputation –

Canal. Leeson was charged with

provides advice to organisations

damage the organisation’s carefully

sometimes irrevocably. Too often,

forgery and cheating and sentenced

seeking to increase their corporate

built reputation.

organisations adopt the view that

to six and a half years in jail and

and organisational resilience and

once the initial scrutiny of an

many of his former colleagues lost

crisis management ability. Her

the strength and backbone of

employee has been undertaken,

their jobs.

co-edited book, Global Insecurity,

an organisation, whether it is a

no further action is necessary.

multinational or a small entity. Yet,

But that approach is insufficient

the collapse of the bank noted,

available in 2017, includes aspects

in many ways, people are also an

to build and maintain resilience.

“Barings’ collapse was due to

of her recent research about urgent

organisation’s most vulnerable

What is necessary is to have

the unauthorised and ultimately

global security policy issues.

For the most part, people are

18 // SECURITY SOLUTIONS

014-033_SSM110 Regulars.indd 18

Part of the official report into

published by Palgrave McMillan and

securitysolutionsmagazine.com

13/10/2017 5:42 pm


“THE FIRST HAND-TRIGGERED ACCESS CONTROL READER“

STid Security presents

French expert in RFID, NFC, Bluetooth® and IoT, our contact free identification solutions have been designed to eliminate barriers in your business via innovative independence-focused technologies. Thanks to the STid Mobile ID® app and the Architect® Blue Bluetooth® reader, your smartphone turns your hand into a badge you have with you at all times. With the freedom to choose your favourite identification mode and make your access options both secure and much more intuitive.

Slide mode

TapTap mode

Remote mode

Hands-free mode

Security Meeting 2016 Trophées de la sécurité 2016 & 2017 Expoprotection 2014 & 2016 ISC West 2017 Trophées APS 2017

014-033_SSM110 Regulars.indd 19

www.stid-security.com

Photo credit: iStock - 08/17 - 10917

Badge mode

13/10/2017 5:42 pm


HUMAN RESOURCES

BULLYING – THE SCOURGE THAT BESETS SMALL, MEDIUM AND LARGE ORGANISATIONS N

BY GREG BYRNE

ot a day goes by

in a bullying incident that resulted in

work, the person reading the post is

without a headline

the award of over two million dollars

considered to be at work. It should

somewhere in

in damages.

be noted that the FWC has found at

or undertaking (PCBU) has the

work to mean performing work or an

primary duty of care under the Work

activity authorised by the employer.

Health and Safety Act 2011 (WHS

Australia on bullying in

The Fair Work Ombudsman

the workplace. In the vast majority of

defines workplace bullying as

bullying cases, the witnesses and

unreasonable and repeated acts

victims are left emotionally bruised,

discrimination agencies. A person conducting a business

The effects of bullying in

Act) to ensure, so far as is reasonably

towards a worker or a group of

the workplace can be profound,

practicable, the health and safety of

workplaces are left with fractured

workers who are ‘at work’ and that

long-lasting and in some cases

workers and that other persons at the

relationships and the organisation

creates a risk to health and safety,

catastrophic. It can lead to serious

workplace are not put at risk from

suffers at times significant

and includes behaviour that is

psychosocial injury, which is one

the work that is carried out. Health

reputational damage. This column

victimising, humiliating, intimidating

of the main causes of workplace

is defined in the WHS Act as both

will address just what bullying in the

and/or threatening. Safe Work

stress leading to a deterioration of a

physical and psychological health.

workplace is, how it affects all

Australia defines workplace bullying

worker’s mental health. Bullying in

concerned and what should be done

as repeated and unreasonable

the workplace may result in:

made to an employer, including a line

about it at the workgroup, team and

behaviour directed towards a worker

• stress, anxiety or sleep

supervisor, a person should expect

organisational levels.

or a group of workers that creates a

The written or online news

risk to health and safety. It should

disturbance • mental health issues such as

When reports of bullying are

immediate action that is consistent with organisational policy and

websites are littered with headlines

be noted that workplace bullying is

such as, ‘Large payout in bullying

not simply confined to behaviour

case for employee returning from

that occurs within the physical

maternity leave’, ‘Ex-banker accused

workplace, but encompasses both a

of cutting off woman’s ponytail

worker’s performance at work and

amid bullying allegations’, ‘Vic firies

participation in activities that have

• reduced work performance

the outcome of any investigation and

bullying report fight in court’ and

been authorised by an employer,

Everyone at the workplace has a

the right to confidentiality. After the

‘Bullying, harassment cause hundreds

regardless of their location. In a

duty in relation to stopping and/or

report has been investigated and,

of police mental health claims’.

recent decision, a full bench of

intervening when they see workplace

provided an adverse finding has been

The effects of these allegations

the Fair Work Commission (FWC)

bullying occurring. All workers can

made against a person, the range of

can be profound and long-term

considered the meaning of at work as

help ensure that bullying behaviours

possible remedial action available

both for the victim, perpetrator

defined in section 789FD of the Fair

do not occur. The FWC offers the

to the employer include reassigning

and the organisation. In the case

Work Act 2009 (Cth). The FWC found

following advice:

duties, resolution/mediation,

where a large payout was made for

that at work incorporates both:

• Refer to workplace policies

raising awareness in the workplace,

bullying an employee returning from

• the performance of work

maternity leave, the employee was

whenever and wherever that work

found to have been bullied and was

is performed, and

awarded $240,000 in damages. The

• situations when a worker is

depression • reduced quality of family and home life • increased absenteeism and staff turnover

and procedures. • Speak to the person doing the bullying and ask them to stop.

engaged in an activity that is

resources, a line manager,

health issues as a result of bullying

authorised or permitted by the

management or the union.

employer (such as meal breaks).

should be taken seriously and should be investigated. After making a report, a person has the right to be kept informed of the progress and

providing training, requesting an apology, issuing a verbal or written warning, or demotion/dismissal. n

• Seek advice from human

claim where police suffered mental not only led to serious reputational

procedure. In all cases, the report

• The FWC advises that workplace

Greg Byrne is CEO and director of Multiset Consultancy Pty Ltd, a multifaceted consultancy advising CEOs

damage to the force, but increased

By this definition, a worker on

bullying should always be

and boards of security organisations

incidence of suicide and attempted

an authorised meal break at the

reported. The report may be

in Australia on best approaches to

suicide, and the devotion of extensive

workplace is considered to be at work,

verbal or in writing.

manage business risk, particularly

resources both from the police force

and a worker who reads a private

Advice can also be sought from

operations, disaster recovery, business

and the police union. In a matter

Facebook page whilst at work, even

the FWC, Comcare, the relevant

continuity and human resources. Greg

played out in the NSW Supreme

though the post was not work related

state’s Safe Work department, or

can be contacted via email greg@

Court, a security guard was involved

and was made by someone not at

the various human rights and anti-

multisec.com.au or on 0402 295 124.

20 // SECURITY SOLUTIONS

014-033_SSM110 Regulars.indd 20

securitysolutionsmagazine.com

13/10/2017 5:42 pm


Recognize and Analyze How often was he here this month?

Is he a known suspect?

How old is she?

Is this valued customer Mia Clark?

Do they appear in videos recorded last week, two months ago? How many people are here? Is it too crowded in this area? New: Recorded media import and advanced investigation tools upload sets of videos recorded at a specific location and time to track possible participants in a crime find a person enrolled in an image database or search for an unknown person locate appearances in multiple videos make use of filters that specify timeframe, camera location, age range, gender and glasses

FaceVACS-VideoScan performs real-time identity checks to find known persons and alert security staff, while performing anonymous facial analysis to count individuals, analyze demographics and track people flow.

014-033_SSM110 Regulars.indd 21

13/10/2017 5:42 pm


RISK MANAGEMENT

THE WICKED PROBLEM OF HOSTILE VEHICLES IN URBAN ENVIRONMENTS ne of the ‘wicked

There are also traffic

Co Fo

BY DR KEVIN J. FOSTER

of the security measures, or

in their designs. Historically,

problems’ that

engineering standards that

alternatively provides detailed

barriers separating vehicles and

security professionals

should be considered for

specifications of the security

pedestrians have been used to

need to understand

separating vehicles from

treatments required. If a state

provide pedestrian protection

and consider is the risk posed by

pedestrians including:

agency chooses to provide

against vehicle accidents. Perhaps

extremists intent on using motor

• AS/NZS 3845.2:2017 Road

neither, then arguably there is a

these traffic safety standards need

O

vehicles as ramming weapons

Safety Barrier Systems: Road

high likelihood that the security

to be updated to include protection

deliberately to injure or kill

Safety Devices

implemented to counter this type

of pedestrians against deliberate

of attack will be either under-

use of a vehicle to ram pedestrians,

pedestrians in crowded public places. While the use of bollards and vehicle

The Australian Government’s

engineered or over-engineered.

especially in areas where large

barriers to protect infrastructure and

Hostile Vehicle Guidelines

If over-engineered, the solution

numbers of people might gather.

buildings is quite well understood, it

suggest that crowded places

may be uneconomic; if under-

In Western Australia, an example

is not so widely known what

include sports stadia, transport

engineered, the security may

of a guideline that needs updating

standards or guidelines should be

hubs, shopping centres, hotels,

be ineffective.

is published by Department of

used to protect pedestrians from

clubs, places of worship, tourist

hostile vehicle attacks. Some include:

attractions, movie theatres, civic

authorities responsible for

and designing for pedestrians:

• Hostile Vehicle Guidelines

places and pedestrian malls. The

protecting the public in open

guidelines. Each public road

for Crowded Places: A Guide

guide explains that it is important

spaces should consider having a

authority in Australia probably has

for Owners, Operators and

not to design security measures

store of temporary vehicle barriers

a similar guideline.

Designers, published by the

in isolation from other risks, such

that can be used when the threat

Australian Government in 2017

as crowd rush. In other words,

warrants them. For example,

safety engineers and security

and endorsed by the Australia-

if protective barriers are over-

relocatable concrete cubic bollards

specialists are usually attempting

New Zealand Counter-Terrorism

engineered to the point that

have been placed between the

to address different hazards,

Committee. See https://www.

they prevent or delay people

road and pedestrian entry points to

threats and vulnerabilities with

nationalsecurity.gov.au/Media-

from escaping an emergency

Southern Cross Railway Station in

different standards. Perhaps

and-publications/Publications/

situation such as a fire, then the

Melbourne. Similar vulnerabilities

there is a need to develop

Documents/hostile-vehicle-

safety-in-design will have been

elsewhere in Melbourne are also

uniform pedestrian safety and

guidelines-crowded-places.pdf

ineffective. Therefore, a holistic

treated in this way.

security standards in Australia

• Integrated Security: A Public

approach to the selection and

As a minimum, public

When deciding what to

Transport and entitled Planning

Unfortunately, road traffic

and everywhere where the risk

Realm Design Guide for Hostile

design of risk treatment measures

do about this type of threat

of hostile vehicle attacks against

Vehicle Mitigation, Second

is required, and should not be

at a particular location, one

pedestrians is significant. There is

Edition, published by the UK

limited to security issues. Also, it

complication is that whenever

a need for risk policies at federal

Centre for the Protection of

is important not to under-engineer

security is hardened at one place,

and state levels designed to ensure

National Infrastructure in 2014.

the measures to the point that the

extremists can choose a softer

the effective coordination of road

See https://www.cpni.gov.uk/

security issue is not addressed.

target somewhere else. It might

safety and security strategies for

system/files/documents/40/20/

This is particularly challenging if

be a pedestrian precinct, a school

addressing this risk. n

Integrated%20Security%20

the threat is not understood.

playground, a shopping centre,

Guide.pdf

Obtaining a threat assessment

or a football field – anywhere.

Dr Kevin J. Foster is the

from state or national authorities

Therefore, it is impossible to

managing director of Foster Risk

Traffic Advisory Leaflet 1/11:

is critically important for ensuring

fund, design and build security

Management Pty Ltd, an Australian

Vehicle Safety Barriers within

that mitigation measures are not

infrastructure to prevent such

company that provides independent

the Streetscape, published in

under-engineered. It is essential

attacks in every public place where

research aimed at finding better

2011. See https://www.gov.

for public sector projects that the

people gather or walk.

ways to manage risk for security and

uk/government/publications/

managing agency or state sponsor

vehicle-security-barriers-within-

provides the necessary threat

should always consider the

understanding of emerging threats

the-streetscape

assessments to the designers

selection and use of safety barriers

from ‘intelligent’ technologies.

• UK Department of Transport

22 // SECURITY SOLUTIONS

014-033_SSM110 Regulars.indd 22

Designers of public spaces

public safety, and improving our

securitysolutionsmagazine.com

13/10/2017 5:42 pm


Contact us on 1300 364 864 Follow us on

Delivering Proven Solutions for Security & Safety We Protect People & Assets www.magneticautomation.com.au 014-033_SSM110 Regulars.indd 23

13/10/2017 5:42 pm


COMMUNICATIONS

HOW TO FACE RACE, CONFLICT AND YOURSELF BY ROD COWAN

here is a YouTube clip

between people of different races

will be against you. You end up

behaving the way they are. Rather

of a young cancer

is complicated, with each party

dealing with the immediate, which

than judging them and quickly

survivor, Calysta

depending on personally developed

means starting with your mindset

jumping to conclusions, become

Bevier, performing

cultural stereotypes, generalisations

in response to different races. You

curious about their behaviour. Doing

Fight Song on America’s Got Talent

and styles of communicating.

can begin doing so by considering a

so provides a new lens to look at

2016 that I play to people. It is a

Ultimately, misunderstandings

range of factors:

the interaction. Ask yourself, how

poignant song about survival and

create problems, from operational

coping with adversity. The young,

considerations, such as slowing

an interaction with the feeling of

attractive, white songstress ends

operations, to reputational issues,

professionalism and flexibility, and

We all make mistakes: When

her rendition with the words, “I

such as customer complaints.

be open to handle the unknown and

people do something, do not assume

T

might only have one match, but I

Much of the training in this area

Shared interests: Enter into

does their behaviour make sense to them?

the ambiguous. Genuinely embrace

they are deliberately trying to be

can make an explosion.” As the

tends to be adapted from customer

that your role is to protect people

rude or insulting. Even if they are,

backing track trails off, the crowd

service or cross-cultural programs,

and to help them.

maybe it is because they are upset

goes wild. Beautiful. Moving.

but they are often a poor fit for

After a few moments of silence,

Why believe such things?

about something you have done.

`

j

v

security needs and do not help in

Our biology reacts, sometimes

If possible, ask them why they are

I ask viewers, “What if she was

developing an effective mindset

unconsciously and inadvertently,

doing something, but keep it about

`j

wearing a hijab?” When I do

for inter-racial communication that

negatively to new stimuli. The

facts, not opinions.

jv

so, the conflicting emotions on

helps you get the best out of people

right mindset in approaching each

people’s faces can be seen. Our

from a security perspective.

new interaction sets the tone of

race, acquired through genes and

Why inter-racial rather than

your actions.

Watch for inflexible thinking: When this occurs, in yourself and others, pause the conversation and

physical characteristics, overlayed

cross-cultural understanding? In

with our culture, gained through

its simplest terms, race is visual,

be defending and protecting

you are thinking. Often inflexibility

symbols made by humans that

based on physical appearance, while

themselves from a perceived fear,

is only a reaction to another feeling

give meaning to shared beliefs and

culture is often hidden, based on

such as being humiliated, hurt or

that you caused in them. For

values, such as the notion of good

beliefs, values and life symbols.

rejected. They are on the defensive

example, you may have been looking

versus bad and right versus wrong,

Cross-cultural understanding takes

because they feel threatened and

for someone to help, and they

means racism is deeply embedded

place when one or both parties has

cannot predict the needs of the

thought you were ignoring them.

in each of us.

the intellectual capacity and the

other party or their outcomes.

time to understand each other’s

Without the right mindset, you may

is on getting control of a situation.

not help when it comes to inter-

culture, then dig deeper to identify

both be in the same state of mind,

That does not mean being tougher

racial communication. Inter-racial

points of difference and go on to

because at the most fundamental

or more authoritative than the other

communication skills in security,

develop the means to mitigate or

level, we all have the same

person, or smarter, or better, but

law enforcement and intelligence

manage potential conflict.

human needs.

getting to an acceptable outcome

Pretending otherwise does

are vital for personnel who daily

Putting aside intellectual

In many cases, people may

Use your brain: In the middle

talk about the reason behind how

for the security for which you are

capacity, when dealing with people

of a transaction where inter-racial

they need to be thorough and

in a security or law enforcement

tensions are at play, you may start

professional in carrying out their

setting, there is rarely time to get

feeling like you are losing control

duties, while at the same time

to understand another person’s

of your feelings, worrying about the

of securityisyourbusiness.com, a

invariably balance some semblance

culture or what is going on in his

outcome and wondering how to get

research fellow with the Research

of customer service or public image.

head. Limited second language

away from the situation. Think first

Network for a Secure Australia and a

proficiency may make matters

before saying or doing anything.

strategic advisor to the Dubai-based

responsible. n Rod Cowan is a writer/director

Emirates Group Security/Edith Cowan

with staff from various races or

worse. In some settings, such as

staff dealing with customers from

airports, universities and places

are not like you. Maybe there is

University Centre of Aviation and

different cultures, communication

of mass gathering, sheer diversity

a reason that other people are

Security Studies (CASS).

24 // SECURITY SOLUTIONS

014-033_SSM110 Regulars.indd 24

Be curious: Wonder why people

h

In any situation, the emphasis

find themselves in positions where

Whether it be managers dealing

`v

`jv

securitysolutionsmagazine.com

13/10/2017 5:42 pm


`

j

v

`j

jv

`v

`jv

h

THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.

NEW!

ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.

+61 (3) 9544 2477

email: oz_sales@takex.com

HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.

BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.

INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.

OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .

1300 319 499 csd.com.au www.takex.com

TAKEX AMERICA

VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta 014-033_SSM110 Regulars.indd 25

13/10/2017 5:42 pm


LEGAL

PROTECTING YOUR INTELLECTUAL PROPERTY FROM YOUR EMPLOYEES E

BY JUSTIN LAWRENCE

very business, no

confidential business system and

It will not, however, be definitive

that suit, the employer may seek

matter how big or

treats some of its information as

proof as to whether or not the

orders compelling the employee to

small, must protect

sensitive and confidential. The

restraint is valid.

deliver up copies of all confidential

its intellectual

business is entitled to advise

The fourth principle is that the

documents in their possession and

property because it is undeniably

its employees that it requires

validity and reasonableness of

to provide a written undertaking

what separates you from your

each of them to sign a document

the restraint will not be assessed

that they will not continue to

competitors. You might be

in which they agree to protect

in retrospect (that is, it will not be

approach or solicit customers or

surprised to know that the biggest

that information.

assessed after the employment

clientele, and will cease using the

relationship comes to an end), but

former employer’s confidential

risk to your intellectual property is

The confidentiality agreement

not your direct competitors, but

that you prepare should contain

rather it will be assessed at the time

systems. If those orders are not

rather your staff – the very people

two parts: a confidentiality part

that the contract of employment is

made, or if the ex-employee

who handle your intellectual

and a restraint of trade part.

entered into.

refuses to abide by them, the

property every day, and who, quite

Both parts will be designed to

The fifth and final principle is

literally, hold the future prosperity

prevent employees from using

that the court is not permitted to

further breaches by obtaining an

of your business in their hands (and

the confidential information as

re-write the restraint if it is found

injunction. n

in their minds).

an inducement for a prospective

to be too broad or excessive.

There is obviously no problem

employer may seek to prevent

Justin Lawrence is a partner

employer or starting up their own

Instead, the court may remove

with your staff members knowing

business as a direct competitor.

any parts of the agreement

with Henderson & Ball Solicitors,

your intimate business secrets

The restraints that you outline in

that are unreasonable if more

17 Cotham Road, Kew, Victoria, and

while they are working for you. In

this document must be reasonable,

reasonable restrictions are part of

practises in the areas of Commercial

fact, in most cases, you want them

otherwise the court will interpret

the agreement.

Litigation, Criminal, Family and

to use that intellectual property (IP)

them against the employer and in

for the benefit of your operation.

favour of the employee.

A well drafted confidentiality

Property Law. Henderson & Ball has

and restraint agreement may be

Law Institute of Victoria accredited

enforced to prohibit an employee

specialists in the areas of Business

However, the issue of protecting

In 2004, the leading case in

your intellectual property arises

this area of the law set out five

from removing confidential

Law, Property Law and Commercial

not when things are going well

principles that the court will

information from the business, or

Litigation. Justin Lawrence and

and your staff are loyal to you,

consider when deciding whether or

from seeking to poach existing

Henderson & Ball can be contacted

but when the relationship breaks

not a restraint is reasonable.

clients within a specified period

on 03 9261 8000.

down or your employee leaves

The first principle is that the

of time and within a specific

Whilst every effort has been taken to ensure its accuracy, the

acrimoniously or is poached by

employer must have interests

your competitor.

capable of being protected. These

The restraint will not be

things may include customer lists

upheld by the court if it seeks

article is intended to be used as a

prohibition on employees misusing

and trade secrets. They might also

only to protect the employer from

general guide only and should not

confidential information after they

include confidential processes

competition by the employee.

be interpreted or taken as being

have left your business, you really

or other unique elements of

However, an employer may seek to

specific advice, legal or otherwise.

need to consider whether you

the business.

enforce an agreement where the

The reader should seek professional

employee seeks to take advantage

advice of a suitably qualified

Although the law has a general

are prepared to leave something

The second principle is that

geographical location.

information contained in this

so important in the hands of the

it must be reasonable for the

of the employer by using against

practitioner before relying upon

common law, or whether you

confidential information to

the employer’s confidential

any of the information contained

want to set out the prohibition

be protected by a restraint or

information that they obtained

herein. This article and the

in a properly drafted, legally

confidentiality agreement.

during their employment.

opinions contained in it represent

enforceable document. So how

The third principle is that if the

If an employer finds out that

the opinions of the author and

does a business go about protecting

employer and employee enter into

an ex-employee has breached

do not necessarily represent the

its IP?

a written agreement that states the

a confidentiality and restraint

views or opinions of Interactive

proposed restraint is reasonable,

agreement they may sue to protect

Media Solutions or any advertiser

it known to all employees that

the agreement will be afforded

their intellectual property from

or other contributor to Security

the business runs and operates a

significant weight by the court.

disclosure and misuse. As part of

Solutions Magazine.

The first thing to do is to make

26 // SECURITY SOLUTIONS

014-033_SSM110 Regulars.indd 26

securitysolutionsmagazine.com

13/10/2017 5:42 pm


STOP TAILGATING AND OTHER UNAUTHORISED ENTRY ATTEMPTS

NOW AS EASY AS 1,2,... 1

2

1

Take 1 standard access controlled door with tailgating problems.

Tailgating is the art of unauthorised people following authorised people through an access controlled door.

www.pathminder.com.au

014-033_SSM110 Regulars.indd 27

2

Add a PathMinder HPJ half portal.

The PathMinder HPJ half portal can ‘cap’ any access controlled door to turn it into a secure interlock, the highly sophisticated ultra sonic tailgate detection technology makes sure access is limited to one person at a time.

3

Sit back and relax, job done.

With over 40 portals in the range, PathMinder has a high security solution to controlling access at any entry point. Our portals include vandal, attack and bullet resistant certified designs, DDA compliant solutions and full customisable models to match your security needs.

Phone: 1300 750 740

13/10/2017 5:43 pm


THINKING ABOUT SECURITY

THOSE NEXT DOOR BY DON WILLIAMS

M

ost of us are

during or in the aftermath of an

source of risk. They may choose the

(BCP)/resilience plan. In a small

reasonably good at

attack against someone nearby; the

provider of emergency procedures

business, this may be two or three

treating our own

Martin Place siege is an example.

and possibly the security services

people. If the business is too small

Some neighbours, particularly

and systems. Their selection may

to have a BCP plan, then it is too small to survive an incident.

risks, but what about

the risks that belong to others? We

government tenants, can have

not be the best for you; it may

may not be the target for certain

a much lower trigger point for

be the cheapest available. The

types of crimes or political actions,

evacuation, where closing their

risk is that the site’s security or

treatment is to speak to the security

but our neighbours may. It is always

business for half a day does not cost

emergency procedures are not

manager of the identified critical

informative to read the directory in

them anything. The fact that all their

appropriate for your business. A

points of failure to see how (or if)

a multi-tenanted site. There might

neighbours also have to evacuate at

possible response is for you to add

security risks are addressed and

be an embassy, consulate or

great cost to productivity is of little

additional measures to the security

what treatments are in place. As

government trading company from

concern to them. It may be purely

and emergency procedures. It may

well as your business, you may

a country that is currently, or

due to someone else that clients

be possible to ask for better or

want to consider how your critical

permanently, in the news and at

cannot access your site, but it is still

more appropriate capability to be

clients are exposed to supply

risk from attack or protests.

your problem.

provided, but the reality is that each

chain or other service disruptions

tenant should check what is being

and whether their collapse could

Neighbours may be involved in

How is it possible to deal

Again, a risk mitigation

activities that lead to protests or

with other people’s risks? A good

provided and ensure their own

also be yours. Possibly on-

even violent attacks; there may be

start is a cup of coffee. Introduce

concerns and risk are addressed

selling your services to protect

state or federal departments and

yourself to your neighbours. Discuss

by adding to the existing systems,

their survivability?

agencies on the site (more about

common issues and concerns, talk

probably using their own resources.

them later).

about emergency procedures and

A second example of where

Of course, the other option is to rely on the fact that none of this

It is worth considering the

coordinate responses. Chatting

other people’s risks can affect

is your problem and sticking your

threat profiles of your neighbours.

about areas of mutual concern

the business is through supply

nose in will do no good anyway. n

Have a look over the fence and see

and interest as tenants on the site

channels. Understanding up and

who is in the buildings next to and

can lead to significant benefits

down line risks due to deliberate,

opposite. What threats, risks and

and hopefully reduce disruption

malicious human action falls to the

is a recognised thought leader in the

hazards do they bring? Damage and

and concern.

security manager who is, hopefully,

field of security. He can be contacted

working with the team responsible

via email at donwilliams@

for the business continuity plan

dswconsulting.com.au

disruption can be collateral, with your organisation being caught up

28 // SECURITY SOLUTIONS

014-033_SSM110 Regulars.indd 28

The landlord or facility manager for a multi-tenanted site can be a

Don Williams CPP RSecP ASecM

securitysolutionsmagazine.com

13/10/2017 5:43 pm


TR

OR

014-033_SSM110 Regulars.indd 29

HÉE D’ OP

13/10/2017 5:43 pm


EVENTS

ASIS International Australia Conference Contemporary Security Leadership

public and private sectors • security risk management professionals

are based on extensive research

security industry and network with

on key factors that contribute

over 28,000 security professionals.

to and characterise outstanding

M

In Australia

• security service providers

performance. (This research can be

offer attendees a host of

19 October 2017

• security consultants

found at https://perpetuityresearch.

attractions including:

Melbourne Convention and

• government and law

com/wp-content/uploads/2014/09/

• new products and technologies,

Exhibition Centre The ASIS International Australia

enforcement professionals

Aspiring-to-Excellence.pdf)

encompassing everything

Contact events@asisvictoria.org.

The OSPAs are being set-up

from access control to

Conference 2017 is the premier

au or visit www.asisvictoria.org.au

in collaboration with security

unmanned vehicles.

gathering of security professionals.

for more information.

associations and groups across

The conference provides an

many countries.

Y

C

C

Y

CM

introduced in 2017, is an event

the key trends and issues facing

19 October 2017

and criteria, the OSPAs scheme

(UAVs), unmanned ground

security professionals locally

The River Room

provides an opportunity for

robotics and vehicles (UGVs),

and globally.

Crown Casino, Melbourne

countries to run their own

and the various software and

The Outstanding Security

evidence-based OSPAs schemes

Key topics

Performance Awards (OSPAs) are

while maintaining an ability to

• terrorism

pleased to announce the dates

compete on an international level

moved to the ISC West show

• cybersecurity

for the 2017 Australian awards.

in the future – World OSPAs.

floor in 2017! As the digital

• behavioural techniques

They will be working for the third

Visit au.theospas.com for

and physical worlds collide,

• security management

year in a row with the prestigious

more information or to make

it is increasingly important

• emergency management

Australian Security Industry

a nomination.

for industry professionals to

The OSPAs recognise and

within ISC West focusing on

clients from both physical and cyber threats. CSE provides

across the security sector. They are

Sands Expo Convention Center,

holistic solutions for today’s

colleagues from the public and

designed to be both independent

Las Vegas

private sectors

and inclusive, providing an

ISC West is the largest security

Working with SIA, ISC West also

opportunity for outstanding

industry trade show in the US.

features world-class education

performers, whether buyers or

At ISC West you will have the

to learn about every facet of the

security profession

suppliers, to be recognised and for

chance to meet with technical

security industry.

their success to be celebrated.

representatives from 1,000+

014-033_SSM110 Regulars.indd 30

K

connected organisations.

accelerating the future of the

30 // SECURITY SOLUTIONS

K

protect their organisations and

ISC West

• engage with peers and

The criteria for these awards

CMY

applications that support them.

11–13 April 2018

• security professionals across the

CY

K

CY

• Connected Security Expo (CSE)

reward companies and individuals

Who should attend the event:

MY

CMY

opportunity to:

• join industry leaders

CMY

MY

• Unmanned Security Expo,

unmanned aerial vehicles

The conference is a great

CY

CM

standardising the award categories

Association Limited (ASIAL).

MY

Y

The 2017 Australian OSPAs

By researching and

CM

M

M

and business exchange, addressing

established platform for education

C

In 2018, ISC West will

exhibitors and brands in the

Visit www.iscwest.com for more information.

securitysolutionsmagazine.com

13/10/2017 5:43 pm


Thermal2017-5-18.pdf 1 2017/7/14 14:29:40 R

R

R

You Might Think

It’s Magic You Think You Might Might Think It’s It’s Magic Magic C

M

Y

C CM

M MY

Y CY

CM CMY

MY K

CY

CMY

K

Hikvision Thermal Cameras Reveal What’s in the Dark It’s not magic. It’s simple: the heat is on, even when lights are off. Heat replaces light in the darkness and Hikvision’s Thermal Cameras capture everything in vivid images at up to 640 x 512 pixels. Powerful Hikvision Thermal Cameras Reveal What’s in the Dark features make these cameras perfect for 24/7 perimeter protection, unhindered by any weather or light condition – features like temperature-anomaly detection effectively prevent emergencies, and It’s not magic. It’s simple: the heat is on, even and whenfire lights are off. Heat replaces light in the darkness Hikvision Thermal Cameras Reveal What’s in the Dark Smart behavior analyses including line-crossing detection and intrusion detection in open and and Hikvision’s Thermal Cameras capture everything in vivid images at up to 640 x 512 pixels. Powerful expansive areas. Safeguard critical infrastructure and any other application, anywhere, anytime.or light features make these cameras perfect for 24/7 perimeter protection, unhindered by any weather It’s not magic. It’s simple: the heat is on, even when lights are off. Heat replaces light in the darkness condition – features like temperature-anomaly and fire detection effectively prevent emergencies, and andSmart Hikvision’s Thermal Cameras capture everythingdetection in vivid images at up todetection 640 x 512inpixels. behavior analyses including line-crossing and intrusion open Powerful and features make these cameras perfect for 24/7 perimeter protection, unhindered by any weather or light expansive areas. Safeguard critical infrastructure and any other application, anywhere, anytime.

condition – features like temperature-anomaly and fire detection effectively prevent emergencies, and Smart behavior analyses including line-crossing detection and intrusion detection in open and Hikvision Oceania expansive areas. Safeguard critical infrastructure and any other application, anywhere, anytime. Unit 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Email:salesau@hikvision.com Hikvision Oceania Unit 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Email:salesau@hikvision.com

014-033_SSM110 Regulars.indd 31

www.hikvision.com.au

www.hikvision.com.au

13/10/2017 5:43 pm


EVENTS running more sustainable facilities and workplaces • foster a community of multidisciplinary professions

management • catastrophes and humanitarian response • innovation and technology

to have a voice and achieve recognition • redefine the future of the

Comprising an exposition of equipment, technology and

industry and challenge

services and a congress of

traditional perceptions of

specialist conferences, CivSec

facility management

2018 will confront the complex

Visit www.totalfacilities.com.au for

and increasingly interconnected

more information.

security and environmental challenges facing modern societies.

CivSec 2018 1–3 May 2018

Visit www.civsec.com.au/ for more information.

Melbourne Convention and Security, Safety and Sovereignty for

Security Exhibition & Conference 2018

the Indo-Asia-Pacific Region

25–27 July 2018

Building on the success of the

Melbourne Convention and

inaugural CivSec event, 2018

Exhibition Centre, Melbourne

will bring together leaders and

In 2018, the Security Exhibition

decision makers, policy makers

& Conference is heading back

and advisers, managers and

to Melbourne.

Exhibition Centre, Melbourne

officials, operational professionals,

The Security Exhibition &

technical specialists, strategists

Conference is the industry’s annual

and academics, researchers and

opportunity to reunite for three

consultants, technology developers

days of quality networking and

and industry suppliers.

unrivalled education alongside a

While focusing on the Indo-

showcase of the most innovative

Asia-Pacific region, CivSec 2018

solutions to the Australian market.

will address issues of global

For over three decades, it has been

significance. The sovereignty,

the largest and most established

safety, prosperity and cohesion

commercial event for the security

Total Facilities

its delivery and provides real

of societies and communities

industry in Australia, bringing

18–19 April 2018

solutions to everyday operational

everywhere are threatened by

together the entire supply chain of

Melbourne Convention and

challenges by connecting buyers

natural disasters and emergencies,

manufacturers, distributors, security

Exhibition Centre, Melbourne

and sellers to source innovation,

by human catastrophe and civil

professionals and end-users to

Returning to Melbourne with an

debate current issues, share

disorder, by criminal activity and

connect and create unparalleled

exciting new proposition, Total

insights and create opportunities

terrorism and by the movement

business opportunities.

Facilities now unites both facilities

for an invaluable community

of distressed populations across

and workplace professionals in the

of professionals.

porous frontiers.

Our vision

and exposition will zero-in on key

professionals with over 150

We champion professionals

themes, which will include:

leading suppliers. The 2018 show

Sydney and Melbourne, TFX is

who support the built and work

• human security and safety

is set to see some interesting new

Australia’s largest learning and

environment with a sense of

• public security, policing and

innovations as well as a host of

networking event for facilities

belonging and advocacy – the

and workplace management

unsung heroes and behind-the-

professions seeking solutions for

scenes forces. We will evolve and

creating more efficient, sustainable

grow our offer year on year to:

• cybersecurity and social media

seeing you again in Melbourne in

and productive facilities

• bring new and leading solutions

• borders and sovereignty

2018 for the Security Exhibition &

in operational efficiency to the

• homeland security

ASIAL Conference!

market

• community resilience

ultimate industry destination for the built and work environment. Held annually between

and workplaces. Total Facilities is comprehensive and efficient in

32 // SECURITY SOLUTIONS

014-033_SSM110 Regulars.indd 32

This international congress

• deliver forefront trends for

protection • infrastructure, resource and environmental security

• emergencies and disaster

The entire team is looking forward to once again reuniting more than 4,500 security

new attractions. Make sure you put the dates in your diary. We look forward to

Visit securityexpo.com.au for more information. n

securitysolutionsmagazine.com

13/10/2017 5:43 pm


Some cheap solutions can end up being the most expensive. STENTOFON offer fully monitored IP communications solutions made to the highest standards from premium components and materials to ensure unparalleled performance in the most demanding conditions. When you need secure, safe, reliable communications that can integrate into existing systems and grow with your future needs, look no further than STENTOFON.

whencommunicationiscritical

014-033_SSM110 Regulars.indd 33

www.stentofon.com.au

13/10/2017 5:43 pm


FEATURE

THE

BENEFITS SAFE CITI OF

34 // SECURITY SOLUTIONS

034-037_SSM110 Article 1.indd 34

securitysolutionsmagazine.com

13/10/2017 4:14 pm


For the first time in history, more

connectivity now found in core

while others have relatively little

people around the world live in

security and safety technologies,

infrastructure deployed.

cities than in rural areas. By 2030,

safe city solutions are helping

over 60 percent of the world’s

city leaders to better protect their

impact of safe city investments,

population will be living in cities.

citizens from a range of threats

IHS Markit analysed a number of

While this global migration to

including crime, terrorism and

safe city projects by four different

urban areas improves the living

natural disasters.

indexes: government investment;

standards, health and financial

TIES securitysolutionsmagazine.com

034-037_SSM110 Article 1.indd 35

safety result; social benefit; and economic benefit. Each index was

it brings challenges to a city’s

What Are The Benefits Of Safe Cities?

infrastructure, resources, security

Cities around the world face

reflect the various measures of a

procedures and emergency

diverse issues. Risk levels are

successful project defined as:

response systems. Meeting these

impacted by factors including

• Government investment:

challenges is critical to the success

the geographic location, financial

measures the level of

of cities in the decades that follow.

prosperity, population density,

a government or city

increased terrorism, crime and

administration’s continued

developed to help government

the political situation of a city.

commitment to spending

stakeholders, city mayors, and

Furthermore, some cities have

on safe city ICT equipment

police departments mitigate

already installed extensive

as well as the level of ICT

these demands. Leveraging the

security technology solutions

competence, the police

prosperity of these citizens,

THOMAS LYNCH AND NIALL JENKINS

In order to measure the

The safe city concept has been

compiled from 26 indicators to

SECURITY SOLUTIONS // 35

13/10/2017 4:14 pm


FEATURE

resource allocated to public

employment rates, city

the benefit remains stagnant.

with significant improvements

safety and the coverage of

investment and the risk and

The final stage of investment

in property and individual risk

physical security and critical

prevention of serious economic

represents more advanced

levels, police conviction rates

communications equipment

challenges happening in the

integration, co-operation on

and emergency response times.

short-term.

data and analytics and the

• Safety result: measures the

crime centres.

kidnapping as well as the

The Three Investment Stages Of Safe City Projects

investment in a safe city project

Social Benefit And Citizen Happiness Are Most Important In The Third Stage

public’s perception of crime

Government investment in safe

is primarily about safety and

If the safety result benefits most

and the police department’s

cities can be segmented into three

security. At this stage, only the

from the initial government

ability to respond to events

distinct stages. The first stage

city’s critical locations are covered

investment, the social benefit

quickly and effectively

refers to the initial installation

by video surveillance cameras,

score improves most in the third

of video surveillance cameras

basic command and control

stage of government investment.

social benefits such

and critical communications.

equipment is deployed and the

A key component of the social

as the ability to enjoy

The command-and-control

government begins to build the

benefit score is citizen feedback

entertainment, leisure and

infrastructure is deployed

ICT infrastructure required. An

on the government and police, and

sporting events safely, the

enabling the city authorities to

example of this stage can be seen

the general happiness of citizens

public’s appreciation of the

communicate more effectively,

in Nairobi, Kenya where, after

living in the city. The security

government and police force

and video surveillance provides

successful completion of phase

and safety improvements made

based on their response

evidence and a deterrent in the

one of its safe city implementation,

during the initial investment

to security and whether

highest risk areas of the city.

crime dropped by 46 percent.

phase take time to have an

level of crime, the risk to individuals and property from riots, protests, terrorism and

• Social benefit: measures

talented employees are

implementation of predictive

The second stage is

The initial government

As much of the infrastructure

impact, but ultimately create the

characterised by new city

and technology is not already

platform for an improvement in

stakeholders joining the steering

deployed, the required

the social benefit score. Citizens

economic benefits such

group and influencing the

government investment is

appreciate the value of innovative

as personal wealth and

technology direction. This stage

high. However, the benefits are

solutions that make them safer,

prosperity, spending

often is challenging for the city as

quickly realised and can drive a

increasing their appreciation of

on tourism and retail,

project complexity increases while

large increase in the safety result

the government and police force.

moving to the city • Economic benefit: measures

36 // SECURITY SOLUTIONS

034-037_SSM110 Article 1.indd 36

securitysolutionsmagazine.com

13/10/2017 4:14 pm


What Makes A Successful Safe City Project?

The continuous evolution of

these projects, but ultimately a

technologies, city structure, and

collaborative approach between

security requirements, means

the government stakeholders,

stages of investment, and

The safe city is ultimately a

a broad range of expertise

including public health, fire and

the associated benefits and

government-driven approach

is needed to make safe city

rescue, and social services, its

challenges, can help cities reach

to security. However, multiple

projects a success. Strong

citizens, and technology firms will

a positive outcome. Whether it is

stakeholders must be involved.

government support facilitates

provide the best opportunity for

first stage government investment

successful safe city projects. Understanding the different

driving an increase in the safety

Government investment versus safety result

result, or third stage investment improving the social and economic situation of citizens, safe city solutions have a positive impact on the general wellbeing of the people working and living

Safety Results

in the city. n By Thomas Lynch, director, Safe Cities for IHS Markit and Niall Jenkins, senior consultant, Security for IHS Markit. The IHS Markit Benefits of Safe Cities whitepaper covers the latest trends in Safe Cities strategies. For information about Safe Cities deployments and strategies,

Government Investment Source: IHS Markit

contact the sales department at IHS Š 2017 IHS

Markit Asia-Pacific (APAC) at +604 291 3600 or technology_APAC@ ihsmarkit.com.

securitysolutionsmagazine.com

034-037_SSM110 Article 1.indd 37

SECURITY SOLUTIONS // 37

13/10/2017 4:14 pm


FEATURE

MAKING A MONSTER:

Extremism (ICSVE) we have interviewed dozens of ISIS defectors, most of whom tell stories of disillusionment and desperation, escape and rejection of everything they saw in the Islamic State. And that was what we expected as this interview began. Two of our colleagues, Abu Said and Murat, were in the room with Umm Rashid in a Turkish town near the Syrian border, while we were in the US watching and asking questions over a video link.

HOW I BECAME A BRIDE OF ISIS

“My father fell down from a construction site and was crippled,” says the young woman, who is covered in a black abaya.

A teenage girl from rural Syria dreamed of becoming a doctor, but the war and the so-called Islamic State made her something very different, and very frightening.

“I never saw him walking. When I was little, I would stay with my father at home. My mother would be out working all the time. I never saw her a lot. But my mother loved us really a lot.” Then in late 2011 and early 2012, the Syrian civil war began, and soon spread to Raqqa in the

BY ANNE SPECKHARD AND AHMET S. YAYLA / FROM THE DAILY BEAST

east of the country. “My mother was scared and told me, ‘Oh my daughter, I need to get you “I’m from Raqqa,” says

married!’” When the Assad regime’s

Umm Rashid,

security forces pulled out of

as her months-

Raqqa, Ahrār ash-Shām took over

old baby cries

“and things went crazy,” Umm

in her arms.

Rashid remembers, referring to

She bumps him

one of the jihadi militias that rose

up and down trying to get him to settle. “I was born in 1995. I’m 21 years old, from a family of four. I have a younger sister,” she says. “My father was crippled, so my mother worked to feed the family. We

up to fight Syrian dictator Bashar al-Assad. “We heard that the rebel militias were taking girls and forcing them to get married to their soldiers.” But as a teenager, Umm Rashid had a dream. She wanted to be a doctor. Before the eruption of war, her parents had been behind

are farmers. Also, my mother

it, despite their conservative

cleaned the schools.”

Syrian background. But with the

At the International Center for the Study of Violent

uprising, she was not safe as a single girl anymore.

38 // SECURITY SOLUTIONS securitysolutionsmagazine.com

038-041_SSM110 Article 5.indd 38

13/10/2017 4:17 pm


She is composed, articulate

husband fled. I don’t know why he

me, ‘Because of you, my son died.

them, women were enrolled as

and thinking about what she says

fled. I know that his family was not

You brought bad luck to us.’ My

morality police as well.

as she explains her situation.

behaving well toward him. Even

mother-in-law loved money.”

“When the regime left because

his older brothers were beating

of the rebellion, the ninth-grade

him up as well. Soon we found

exams were cancelled. I had to go

out that Yusuf was in Tell Abyat

to Hama for the exams.” This is

and he was working in Tell Abyat.

much because there were so many

married to an emir from ISIS? I

a distance of hundreds of miles.

I continued with my husband’s

people inside the house,” Umm

can arrange that.’ Her name was

“I passed the ninth-grade exam,”

family. Soon I learned that Yusuf

Rashid answered. “I went back to

Umm al-Khattab.

Umm Rashid tells us proudly. “But

had joined Jabhat al Nusra.”

my mother’s house. I waited my

my mother looked at the situation

At the time, al Nusra

iddah,” she explains, referring

iddah for two months. Our entire

and it was so bad. She told me

was becoming the umbrella

to the mandatory three-month

house was demolished except

anyone who wants to get married

organisation for ragtag groups

waiting period for widows to

for one room. We were living in

to you, I have to consider that.”

of villagers who had taken up

determine if they are pregnant

that room. Umm al-Khattab got

arms against the regime. Jihadi

or not and, if not, available for a

me married to a Saudi emir. His

Umm Rashid’s mother was making

ideologues from Jordan and

new husband.

name was Abdullah al-Jazwari. He

about $100 a month as a cleaning

elsewhere had flooded into

woman in schools, and some of

Syria, preaching the concepts of

Yusuf, she explains, “We weren’t

a gentleman and he behaved so

that money was going toward

martyrdom and militant jihad as

happily married. There was

nicely to me. He also accepted my

medication for her father. As little

they organised and affiliated al

always conflict in the house. My

sister to live with us. So my sister

girls on their way to classes, their

Nusra to Al Qaeda.

mother-in-law didn’t allow me to

came also. We lived together like

sleep with my husband, so I didn’t

this. I was happy with him. He was

The family was very poor.

friends could buy snacks like

“First I was thinking,

“You didn’t have a child with him?” we asked Umm Rashid. “No, I was not with him that

Reflecting on her marriage to

“One day,” Umm Rashid continues, speaking of her neighbour in the hisbah, “she came and said, ‘Why don’t you get

“Of course, I was out of my

was a really nice man, he was like

doner kebabs, while Umm Rashid

alhamdulillah [thank God], Yusuf

experience a real marriage. There

behaving toward me really well.

and her sister had to make do

found a job and was working.

were three rooms in the house,

He was an emir.”

with bread and tomato paste from

I didn’t know what Jabhat al

but four other siblings, so we were

home. Now, as young women, they

Nusra was and I was happy that

not given a room.”

were facing hunger.

he had a job… When he came

“I got married to our

For Umm Rashid after the

“After two months, he asked me why don’t you join al Khansaa? He was 40 years old. I didn’t know

back he had money. He bought

death of her husband, the

much about him. We never talked

neighbour’s son,” Umm Rashid

gold for me. He had a car. He

tragedies were just beginning.

about ourselves much. I knew he

continues, her voice flat and

was distributing money to all his

devoid of emotion. “My husband’s

family. He stayed one week with

mortar came down on our home.

it. He used to come home for his

mother talked to my mother and

me and then he left.”

My mother and father died, my

meals. I cleaned his clothes and

sister was wounded.” This was

I treated him really well because

they arranged it.” But, despite

But the militias in Raqqa “got

“During the fight in Raqqa, a

was my husband, but that was

liking Yusuf, the neighbour’s son,

mixed again, and the groups

2014. Umm Rashid was just 18, all

he was behaving toward me really

he was not the eldest and things

started to fight each other.”

her dreams destroyed by war.

nicely, but I didn’t know much

did not go well for young Umm

By late 2013, a schism among

“My sister was wounded in her

about him.”

Rashid. “My husband had four

the leaders of Al Qaeda in Syria

hand, so her arm was amputated.

siblings – three sisters and one

had led to ferocious fights

We were alone at home. Our

woman who had helped her

brother. I was so young. I didn’t

between al Nusra and the rising

neighbour, a woman, was trying to

encouraged her to join al Khansaa,

know anything. My husband was

power in the region, the so-called

help us. For example, when there

another thought weighed on her.

the middle child so he didn’t have

Islamic State, as it moved to

was aid from different groups

She believed that the mortar

a say about what was going on at

take control of Raqqa and the

they would drop a box in front

round that killed her parents

home. Their father was deceased.

surrounding region. “I heard

of our door. If that woman had

and cost her sister her arm was

My husband’s sisters started to

that the ‘brothers’ came. The

something to feed us she would

the work of the US-led coalition.

behave very badly toward me. My

‘brothers’ were the Islamic State.

give us meals. We were suffering

Although many civilians have

mother-in-law beat me.”

Meanwhile, the groups were

and had nothing. That woman was

been killed by its airstrikes and

“I was thinking about my

fighting each other and I had not

from al Khansaa, from ISIS.”

subsequent offensives, it seems

options,” Umm Rashid explains.

heard from my husband. One day

“‘You have to be patient’, my

I learned that he was wounded

2014 in Raqqa as the female

parent’s death in early 2014 that

mother told me. ‘If you come to

and soon after that he died. He

arm of the ISIS morality police,

the coalition was responsible.

us, you are going to suffer from

became a martyr.”

or hisbah, to placate the locals

It had not taken shape until

“After he died, my mother-

who were getting riled up about

that summer. But hatred for

have something to eat.’ So, I

in-law took everything from me,

men arresting or punishing their

the coalition became a deep

stayed there with my husband for

even my clothes, and told me to

women for dress code and other

conviction for Umm Rashid. She

six months. [Then] one day my

go to my mother’s home. She told

morality infringements. To calm

would serve with the enemy of

hunger. At least over there you

securitysolutionsmagazine.com

038-041_SSM110 Article 5.indd 39

Al Khansaa was formed in

As her husband and the

unlikely given the timing of her

SECURITY SOLUTIONS // 39

13/10/2017 4:17 pm


FEATURE Anne Speckhard Ph.D. is

those she believed had killed her

generous to other poor people.

take the woman to the female’s

family. “I accepted to become a

Abu Abdullah [her husband] was

hisbah and the man to the male’s

an adjunct associate professor

member of al Khansaa,” she says.

so generous with me. He would

hisbah. We would take off the

of psychiatry at Georgetown

give me a lot of money. I was not

clothes of the woman until she

University in the School of

emir, I was not sent to the training

used to having money. I would

is in her underwear. Then we

Medicine and Director of the

camp,” Umm Rashid explains.

save it and give some to my sister

would beat her with a lash. Then

International Center for the Study

and also gave money to the poor

there are special women in the

of Violent Extremism (ICSVE)

pictures of women holding

people. I was happy he was giving

hisbah for biting,” says Umm

where she heads the Breaking

weapons in supposed training

it so generously.

Rashid. We have heard about

the ISIS Brand – ISIS Defectors

this practice of biting women,

Counter Narrative Project. She is

“Because my husband was an

The group regularly publishes

exercises but not as combatants.

“Our job was to check the

Of the 63 ISIS cadres – prisoners,

market on our regulations.

but have never had a first-

the author of Talking to Terrorists

returnees and defectors – ICSVE

For example, we would check

hand account.

and Bride of ISIS and coauthor

have thus far interviewed, many

abayas if they are too tight or too

tell us that men go for Sharia

transparent.”

“We would torture that

of ISIS Defectors: Inside Stories

woman so badly, that when

of the Terrorist Caliphate,

training, but the women are

the husband came from the

Undercover Jihadi, and Warrior

instructed individually at home,

other side she wouldn’t be able

Princess. Anne has interviewed

to walk. Then from out of this

nearly 500 terrorists, their

prison, she would feel I would

family members and supporters

never do this again, because of

in various parts of the world,

the things she suffered from the

designed the psychological and

imprisonment. Her husband

Islamic challenge aspects of the

needed to pay a fine and he

Detainee Rehabilitation Program

needed to purchase the proper

in Iraq to be applied to 20,000+

abaya and sign the paperwork

detainees and 800 juveniles

that he would comply to the

and has consulted to NATO,

rules completely in the future. If

OSCE, foreign governments and

the woman repeats her offense,

to the U.S. Senate and House,

we would take the husband and

Departments of State, Defense,

put him in a football field where

Justice, Homeland Security,

coalition forces used to bomb

Health and Human Services, CIA,

a lot. We had a prison and we

FBI, CNN, BBC, NPR, Fox News,

would put him in that prison.

MSNBC, CTV and in Time, The New

Most of the time he would die of

York Times, The Washington Post,

fear because of the explosions in

London Times and many other

that field.”

publications. Follow Anne

by their husbands. Western soldiers mock the awkward way the ISIS women are photographed or filmed holding their rifles in ISIS propaganda. “There were a lot of 14- and 15-year-old girls in al Khansaa,” Umm Rashid tells us. “When I first registered, Umm alKhattab helped me a lot. They gave me a weapon. I joined her brigade. Umm al-Khattab was the emir of that brigade,” Umm Rashid explains. As we have heard in our many other interviews, the women who join the hisbah are armed with a Kalashnikov and have broad powers over the civilian population – able to fine, punish

BUT AS A TEENAGER, UMM RASHID HAD A DREAM. SHE WANTED TO BE A DOCTOR… BUT WITH THE UPRISING, SHE WAS NOT SAFE AS A SINGLE GIRL ANYMORE.

and arrest them for any type of morality offenses. They have an

We ask her if she felt badly doing such things, assuming

Fascinated to be hearing not

@AnneSpeckhard Ahmet S. Yayla Ph.D. is an

that she must. “No! It made me

adjunct professor of criminology,

exalted status over civilians and

just about, but from an actual

strong! I would do the same thing

law and society at George Mason

answer to practically no one.

member of the ISIS hisbah, we

again if given the opportunity. I

University. He is also senior

“Umm al-Khattab was not

ask Umm Rashid to explain to

escaped because I have a small

research fellow at the International

the emir of all of al Khansaa,

us how women are punished.

child. I want to go back after the

Center for the Study of Violent

but of this brigade. I knew her

We know the men have their

baby is grown.”

Extremism (ICSVE). He formerly

for a long time because she was

shirts removed and are flogged

Suddenly the interview is

our neighbour. From the start, I

in public, “But what about the

going in a direction we had not

chair of the sociology department

knew how to work in the brigade

women?” we ask, wondering

anticipated, and a potentially

at Harran University in Turkey.

because Umm al-Khattab was

how ISIS handles this delicate

dangerous one for our

He also served as the chief of

talking to me all the time.”

matter. “Are they undressed as

colleagues, Abu Said and Murat,

counterterrorism and operations

well, and if so, where?”

in the room with this woman,

department of the Turkish National

who now speaks proudly and

Police in Sanliurfa between 2010

“Umm al-Khattab would

served as a professor and the

come and pick me up in a van,

Umm Rashid is perfectly

our brigade worked in that van

matter of fact, “For example, if

defiantly of what she has done.

and 2013. He is the coauthor of the

with six or seven other women.

there is a woman with a coloured

But there is more to come.

newly released book ISIS Defectors:

We were in charge of the market

abaya, we would arrest the

place. Because I was so poor

husband and wife and take them

on 31/8/2017 on http://www.

Caliphate. Follow Ahmet

in the past, I was trying to be

to the hisbah jail. They would

thedailybeast.com n

@ahmetsyayla

40 // SECURITY SOLUTIONS

038-041_SSM110 Article 5.indd 40

This article first appeared

Inside Stories of the Terrorist

securitysolutionsmagazine.com

13/10/2017 4:17 pm


038-041_SSM110 Article 5.indd 41

13/10/2017 4:17 pm


OPERATIONS

42 // SECURITY SOLUTIONS

042-045_SSM110 Operations.indd 42

securitysolutionsmagazine.com

13/10/2017 4:20 pm


BY RICHARD KAY

ALTERNATE OPTIONS: FIREARMS BEYOND QUALIFICATION TRAINING

Officers who carry a lethal force

shooting (clinical skills for

shooting is conducted in a

option on the job must ensure

a score) rather than combat

very clinical context – static

they possess the requisite skills

shooting (stress skills to survive

shooter and target, known drills

needed to survive a situation at

a life-threatening encounter).

and minimal stress. Combat

that level of risk. In the public

Regardless of the emphasis, the

shooting starts with these

safety sector, budgets and

fundamentals of shooting remain

simple paradigms to teach

liability considerations often

the same. It is the relevance of

shooting fundamentals, but then

override adequate training in

certain fundamentals that differs

progresses to tactical firearm

the various options available to

between the two contexts and the

skills, with shooters moving,

officers, with firearms being a

end-result outcome.

variable targets, unknown drills

prime example. Most qualification training places emphasis on precision

securitysolutionsmagazine.com

042-045_SSM110 Operations.indd 43

PART1

A key difference between

and high stress, and include

precision and combat shooting

options for carriage, movement,

methodology is that precision

cover, backup and so on.

SECURITY SOLUTIONS // 43

13/10/2017 4:20 pm


OPERATIONS simple, with no pistol disassembly required, and they come with picatinny rails for accessories such as optics, flashlights and lasers, plus spare magazine and sling attachment. The unit not only facilitates a more stable and accurate shooting platform, but provides an increased visual deterrent to potential subjects, and works well with officers wearing a tactical vest and thigh holster. A key aspect is that the handgun maintains its operating function of single shot capability. Whilst the unit may look like an assault platform, it is still a handgun. At present, there is ambiguity around its use, with regulators examining its operational plausibility. Any option that assists in better operational shooting should be something officers look at. Obviously any gear options should be thoroughly tested and mastered in training prior to using in operations, and any gear accessories should conform to regulations and agency policy.

Gear Options

Carriage and Presentation Lasers provide another

situation during the day, but

Officers should consider carriage

There are numerous options

plausible option, especially for

a quality flashlight with high

options based on operational

available that can assist

officers working at night. Options

lumens output is an excellent

requirements, especially where

officers in the operational use

include laser units that attach

distraction to aggressive subjects.

concealment is concerned.

of firearms. The selection and

to the accessory rail under the

With regards to firearms, there

Alternative carriage options

use of these options depends

barrel, or to the rear of the

are numerous options for

include tactical (vest, thigh

on regulations, agency policy

receiver group, or even laser units

flashlight units that attach to the

holster), concealed (shoulder

and officer ability, but where

that replace the recoil spring

accessory rail and can be activated

holster, tactical bumbag or

permissible, they can be a

assembly in pistols. This latter

without adjusting the shooting

thigh bag, personal defense

valuable aid.

option is convenient as the laser

grip. Some units also include a

accessory [PDA] holster) and

does not alter the external shape

flashlight/laser combination.

sling. When selecting and using

Firearm sights are easily modified, replaced or substituted.

of the firearm and therefore

There are various sighting

officers can use the laser with

conversion kit that provides

configurations designed for

existing duty gear without having

certain advantages, such as a

intuitive sight acquisition

to replace or modify.

shoulder stock, charging handle

gear and think of firearm security

and alignment. High visibility

Another option is a handgun

alternative options, safety is a paramount consideration. Officers should train with their

and extra weight to counter

at all times. A body-holstered

tritium sights offer easy sight

option for officers. Whilst

recoil, as well as accessory

firearm, such as a duty, thigh or

acquisition, especially in low-light

flashlights are mostly reserved

mounting options. These tactical

shoulder holster, is always with

situations. Another alternative

for use in the dark, officers

platforms provide better grip and

the officer. A remote-holstered

is the addition of an optic sight

working in daytime should carry

shooting stability that facilitate

firearm, such as a tactical bumbag

mounted on the frame for

a flashlight. Not only may officers

greater range, faster aiming and

or PDA holster can be put down

reflexive target acquisition.

find themselves in a low-light

better accuracy. The setup is

and taken, misplaced or forgotten.

44 // SECURITY SOLUTIONS

042-045_SSM110 Operations.indd 44

Flashlights are an essential

securitysolutionsmagazine.com

13/10/2017 4:20 pm


(angle is dependent on the

hides from view, but may not

Single-Hand Shooting

action of drawing the firearm

proximity of another person).

stop a projectile. Concealment

Shooting single handed is an

from the holster. Specific

This is useful for a line-of-fire

is not as good as cover, but if

excellent way to master grip

circumstances may dictate which

situation, or when moving with

the subject cannot see officers

and trigger control, and is a skill

position to use, such as behind

firearm drawn.

then he may not be able to shoot

officers should train, as situations

them. Examples include shrubs,

may occur where two-handed

Presentation refers to the

cover, crowded area, building search and so on. The firearm is

Shooting Positions

plasterboard walls, tall grass

shooting is not appropriate,

presented into the ready position

Officers should be comfortable

and hollow core wooden doors.

including cover restrictions,

as a default, and consistency of

shooting from a variety of

Concealment will not protect, but

one hand being occupied with

this action should be drilled every

positions, as the situation may

it may prevent the subject from

another task, or officer injury.

time the firearm is taken out of

evolve rapidly and standing

firing accurately. Officers need

The ability to shoot, reload and

the holster.

may not always be the most

to make use of what is available,

return fire with one hand may

• Ready position: the firearm

suitable shooting platform.

and practise moving to and from

save a life in a violent encounter.

is held in at the body at chest

Shooting positions are dictated

cover so it becomes instinctive.

If officers are going to practise

level with the muzzle forward

by the situational environment,

Alternate shooting positions

one-handed shooting they should

on target. This position

available cover, the number of

include standing, kneeling,

practise one-handed reloading

equates to the ‘working space’

threats and officer capability

(high, low, two knees), seated

also, as the two aspects go

for officers to present their

and vulnerability.

(unsupported, supported,

hand-in-hand with operational

firearm into, assess a threat

chair), prone, supine and foetal.

reality. Options for one-handed

and manipulate the weapon.

Officers should also train to shoot

reloading include placing the

To engage, the arms are

whilst transitioning between

firearm between or behind the

these positions, as well as with

knees, under the armpit, in the

both or either hands. Officers

waistband and in the holster. Any

should reinforce their ability to

protruding part of the firearm

shoot in various positions and

may be used to action the slide,

be able to move and fire from

such as ejector port, front sight,

alternate positions smoothly

rear sight, safety and decocking

and with balance. Whilst these

lever, on a belt, between the

alternate shooting positions

knees, on furniture or the heel of

provide stability and assist in

a shoe.

extended forward into the combat position. • Combat position: the firearm is extended directly towards the threat at eye level, ready to engage. Officers should keep both eyes open, with the firearm held low enough to see the subject’s hands. In the absence of a visible threat, this position allows officers to scan the threat area. • Close combat position: the firearm is held close to the body with the dominant hand, muzzle on target, and the support hand is bent with the elbow facing forward. The

OFFICERS SHOULD BE COMFORTABLE SHOOTING FROM A VARIETY OF POSITIONS, AS THE SITUATION MAY EVOLVE RAPIDLY AND STANDING MAY NOT ALWAYS BE THE MOST SUITABLE SHOOTING PLATFORM.

firearm and support arm are kept parallel to each other.

reducing target profile, they may reduce mobility. The use of cover is a

form. If the need to reload with

fundamental aspect of any

one hand should arise, any way

tactical plan. The ability to

that works is correct. Let the

effectively use a firearm from

situation determine the action.

cover is a necessary skill that

Always maintain vigilance of the

should be practised consistently.

subject, then get to or remain

Statistics show that officers who

behind cover.

seek cover during a confrontation Cover will stop a projectile,

In a violent confrontation, success is more important than

Part 2 of this article in the

have a significantly higher rate

next issue of Security Solutions

This position is used in close

but may not hide an officer. It is

of survival. Be aware of the

Magazine will continue to look

confines or close proximity to a

anything officers can get behind

environment and the potential

at the factors that should be

subject. The bent elbow creates

that will not allow projectiles to

cover offered to take advantage

considered in developing an

a buffer against an advancing

penetrate. The value of cover is

if attacked. Officers should

officer’s tactical firearm skills. n

subject and can be used to

dependent on the firearm type

train to take cover immediately

strike at their centre mass if

and calibre. Examples include

if fired upon. It is important

they close in or sweep them

telephone poles, concrete walls

to remember that gunshot

internationally certified tactical

away or down by unfolding

and the engine block of a car.

wounds are often not fatal

instructor-trainer, Director

the arm.

If perfect cover is not available,

and officers can continue to

and Senior Trainer of Modern

poor cover may not stop bullets,

defend themselves even if they

Combatives, a provider of

firearm is held with the

but may deflect them. Most

are injured. By using alternate

operational safety training for the

arms relaxed and the muzzle

wooden walls, nearly all interior

positions, officers can still defend

public safety sector. Visit www.

pointed down at an angle

walls and wooden or metal doors

themselves even though they may

moderncombatives.com.au for

with the finger off the trigger

will not stop bullets. Concealment

be injured.

more information.

• Low ready position: the

securitysolutionsmagazine.com

042-045_SSM110 Operations.indd 45

Richard Kay is an

SECURITY SOLUTIONS // 45

13/10/2017 4:20 pm


CCTV

46 // SECURITY SOLUTIONS

046-049_SSM110 CCTV.indd 46

securitysolutionsmagazine.com

13/10/2017 4:23 pm


IP CAMERAS

The Important Specifications For A Security System BY BOB MESNICK

IP camera manufacturers provide

the camera is to be used outdoors

vertical pixels. Marketing people

The aspect ratio (vertical to

product specification sheets

where it can get dark. If the IP

also use the terms ‘HD’, ‘720p’ or

horizontal ratio) is usually

that help in the selection of the

camera will only be used indoors,

‘1080p’ and, most recently, ‘4K’.

4:3 or 9:16 (wide). The latest

right camera for individual IP

the viewing angle width may

• Megapixel camera: This is

sensors (especially the ones

security and surveillance systems.

be more relevant. This article

a general term used for any

that claim 4K resolution)

But which specifications are

reviews the important camera

camera that has over one

have different aspect ratios

important? They include such

specifications and how to avoid

million pixels in the sensor.

that are similar to the very

things as resolution, minimum

being fooled by ‘specsmanship’

There are many cameras that

wide formats used in the

light sensitivity, lens, wide

(from the marketing department).

have over one megapixel

dynamic range, signal to noise

resolution. The pixels are

cinema market. • HD camera: This is more

and so on. The importance of

Resolution

organised in a matrix of

of a marketing term and is

each of the camera specifications

This is an important specification.

horizontal and vertical pixels.

defined as either a 720p or

depends on the objective and

Resolution is usually defined

The relationship between the

1080p type HD camera. This

application. For example, the low-

by the total number of pixels in

horizontal and vertical pixels

specification comes from the

light specification is important if

the sensor or the horizontal and

is called the aspect ratio.

video broadcast market rather

securitysolutionsmagazine.com

046-049_SSM110 CCTV.indd 47

SECURITY SOLUTIONS // 47

13/10/2017 4:23 pm


CCTV

than the security market. The

is defined differently. For

This can be very subjective and

720p refers to 720 horizontal

example, Sony announced

depends on what the viewer

also affected by the shutter speed,

lines. The ‘p’ indicates that the

that their new (coming soon)

thinks is an acceptable image.

which relates to the frame rate.

lines are progressive rather

camera has a chip with 4096H

Low-light images are not only

The longer the shutter is opened,

than interlaced. There is

× 2160V pixels, which runs at

dark, but can also be very noisy.

the more light can reach the

only one scan per frame that

up to 60fps. Axis announced

At the low-light level, the

includes 720 lines. The 1080p

a camera with 3840 x 2160,

amplifiers are working very

stays open, the lower the frame

HD camera has at least 1080

which runs at up to 30fps

hard and there can be circuit

rate. There are some camera

horizontal lines.

(which is called Ultra HD). The

noise that affects the video

specifications that indicate very

marketing people call all these

image. This is called the signal

low minimum illumination

cameras 4K.

to noise (S/N) ratio. The better

(0.0001 lux), but this is measured

720p cameras usually have a sensor with at least 1.0

The minimum light level is

sensor. The longer the shutter

megapixels. Pixel resolution is

The resolution of a camera is

manufacturers also include

at a shutter speed of 0.5 sec. This

1280 x 1024, or it can be 1280

defined not only by the sensor, but

the relative level of the signal

translates to a maximum frame

x 800. 1080p cameras have

also the lens and the electronic

(IRE), which is a measure of how

rate of 2fps.

at least a 2 megapixel sensor

circuits. Megapixel IP cameras are

hard the amplifier has to work.

and are considered to be the

sometimes advertised for under

For example, a camera that is

level is also determined by the

higher resolution HD cameras.

$200. Be careful; the sensor may

operating at 30 IRE is receiving

lens. The lower the f-number of

To add to the confusion, some

have the megapixels, but the lens

30 percent of the signal from

the lens, the more light it will

manufacturers call their 3

may be plastic and the result is a

the sensor circuits, while one

let through.

megapixel or 5 megapixel

very low quality image.

operating at 50 IRE is receiving

The minimum illumination

50 percent of the signal. The

Lens

lower the number, the harder the

Many IP cameras come with a

amplifier has to work to boost the

lens. A wide angle lens could

8 megapixels of resolution.

Minimum Illumination (or LowLight Sensitivity)

signal so it can be seen. The noise

be used to view a small room,

It has approximately 4,000

The minimum illumination is the

level can be as high as 20 percent

while a narrow angle lens (with

horizontal pixels. The number

lowest light level (measured in

of the signal, so the resulting video

more magnification) can be used

of vertical and horizontal

lux) that provides a reasonable

can look very noisy when the

to see an area that is far away.

pixels and the aspect ratio

image from the IP camera.

signal level is very low.

The lens can also affect some of

cameras 1080p as well. • 4K camera: This usually refers to a camera with over

48 // SECURITY SOLUTIONS

046-049_SSM110 CCTV.indd 48

securitysolutionsmagazine.com

13/10/2017 4:24 pm


the other specifications, such as

adjusted and depends on

minimum illumination, frame rate

how much light is expected

Lenses bend the light to

By increasing the time that

and resolution. If the IP camera

in the scene. A manual iris

achieve the right focus and

the shutter stays opened,

does not include a lens, it usually

lens is usually used with

magnification. IR light can

users can improve the low-

includes a standard type CS (or C)

indoor cameras where there

bend at a different angle than

light performance of most

mounting capability, so various

is a small light variation.

visible light when the wrong

cameras. But be careful;

type of glass is used in the lens.

increasing the shutter speed

usually used with outdoor

IR corrected lenses compensate

to 0.5 seconds changes the

measured in millimetres. The

cameras. The camera

for the focal difference and

maximum frame rate to

lower the number, the wider

electronics adjust the iris

provide a much clearer image.

the viewing angle. A 2mm lens

opening depending on

This is most apparent at

may have an angle of about

how much light it detects.

higher resolution.

110 degrees, while a 50mm

At night it opens the iris

lens has an angle of about 5.5

and when there is bright

degrees. The angle of the lens

sunlight it closes the iris.

third party lenses can be used. • Lens angle: The lens is

depends on the size of the

o DC auto iris lenses are

o P-iris lenses are similar

• Infrared (IR) corrected lenses:

very low-light situations.

only 2fps. • Audio: Audio capability can be very important in some applications, such as when

Special Applications that Require Specific Capability

connecting an intercom to the

• Wide dynamic range: To view

required. Some cameras have

camera. In this case, a camera with audio input capability is

sensor and the distance from

to the DC auto iris lens,

the sensor to the lens.

except they add additional

an area with challenging

a built-in microphone, but be

intelligence to the lens

lighting conditions, it is best to

aware that it is always best to

The f-number of the lens

opening. When the iris is

select a camera that provides

have the microphone close to

indicates how well the light is

closed all the way, it can

good, wide dynamic range

transferred through the lens.

reduce the clarity of the

(WDR). For example, a camera

A camera with a f-number

image (when used with

that either provides back light

Depending on the application,

of f1.2 can pass more light

megapixel cameras). A p-iris

control or, better yet, WDR, will

input and output connections

than one that has a f2.0 lens.

camera system works with

be needed to view a lobby with

may be required. For example,

The lens angle can affect the

the camera electronics to

a large window. Wide dynamic

to release a door lock, an

f-number – the wider the angle

prevent the iris from closing

range has been dramatically

output signal to control a relay

the more light can get in, so the

all the way. Conversely,

improved in the latest cameras.

that can open an electric lock

illumination specification is

when the view is very dark,

Older cameras provide about

is needed. To detect that a door

usually measured at the widest

the camera tries to open

50dB of WDR; newer models

has been opened and start

lens angle (when a variable

the iris to let in as much

provide over 120dB.

recording video, then an I/O

lens is included).

light as possible. As the

• Lens light capability:

• Frame rate: Frame rates are

the person talking. • Input and output (I/O):

input connection to the camera

iris increases, the depth of

not particularly critical in

fixed, variable and zoom

field is reduced. A p-iris

most applications, but most

lenses. A fixed lens, as the

lens prevents the lens from

megapixel cameras support

Summary

name implies, has only one

opening all the way and

reasonably good frame rates.

Understanding the specifications

mm or angle setting. A variable

compensates by increasing

What is reasonable? It depends

allows users to select the right

lens can be manually adjusted

the camera amplification of

on the application.

camera for their IP camera

through a range of angles.

the video signal.

• Types of lenses: There are

A zoom lens is similar to the

• Focus: The focus of the IP

Video is very smooth even

is required.

system; however, before reviewing

at 10fps. There are a few

the specifications, users should

variable lens, but it can be

camera can be changed

applications where higher

fully understand their required

controlled remotely.

either by adjusting the lens

frame rates may be needed,

application and objectives. n

or by remotely adjusting

such as in casinos, or in special

much light falls on the sensor

the distance between the

testing situations, where

and affects the depth of field.

lens and the sensor (back

there is very fast motion; but

and owner of Kintronics, an

The smaller the iris opening,

focus). Lenses can have a

in most cases, users can save

organisation specialising in

the longer the depth of field.

fixed focus (it cannot be

bandwidth and storage by

providing network attached IP

When the scene is very dark,

changed) or manual focus.

reducing the frame rate.

camera surveillance and security

the lens iris opens and the field

Back focus is not part of the

of view is reduced. This means

lens, but is usually listed

rate has to be reduced. For

experience in the technology

some areas that are close or far

with the lens specification.

example, frame rates tend

industry, Bob also provides

away are not in focus. There

It makes installation much

to be lower in very high-

specialist advice on optical storage

are manual iris controls, DC

easier, enabling the focus to

resolution cameras (over

systems and network attached

auto iris and p-iris lenses.

be adjusted at the computer

3 megapixel). The frame

storage systems. He can be

o Manual iris is manually

instead of at the camera.

rate can also be affected by

contacted at www.kintronics.com

• Iris: Iris control adjusts how

securitysolutionsmagazine.com

046-049_SSM110 CCTV.indd 49

In certain cases, the frame

Bob Mesnick is President

systems. With over 30 years of

SECURITY SOLUTIONS // 49

13/10/2017 4:24 pm


BUSINESS

WHY DO ACCOUNTANTS AND OTHER PROFESSIONALS Need Better Risk Management Competencies? BY ALEX SIDORENKO

50 // SECURITY SOLUTIONS

050-053_SSM110 Business.indd 50

securitysolutionsmagazine.com

13/10/2017 4:28 pm


Risk management competencies

numerous factors responsible for

can significantly improve decision

influencing individual perceptions

making in any profession. The bad

of risk, which included dread,

news is that these competencies

newness, stigma and other factors

do not come naturally, they

(Tversky & Kahneman, 1974).

have to be developed. Even if an

Research also detected that risk

organisation does not operate in a

perceptions are influenced by the

high risk, uncertain environment,

emotional state of the perceiver

it should consider the extensive

(Bodenhausen, 1993). According to

research into what is referred

valence theory, positive emotions

to by scientists as heuristics and

lead to optimistic risk perceptions,

biases, cognitive psychology

whereas negative emotions incite

and psychometric paradigm,

a more pessimistic view of risk

collectively called risk perception.

(Lerner, 2000).

The History of Risk Perception

research was performed by

The study of risk perception

(who later won a Nobel Prize in

originated from the fact that

economics with Vernon Smith

experts and lay people often

“for having integrated insights

disagreed about the riskiness of

from psychological research into

various technologies and natural

economic science, especially

hazards. A lot of this information

concerning human judgment

is available at https://en.wikipedia.

and decision-making under

org/wiki/Risk_perception

uncertainty� [Kahneman, 2003])

The earliest psychometric

The mid-1960s experienced the

psychologists Daniel Kahneman

and Amos Tversky. They performed

rapid rise of nuclear technologies

a series of gambling experiments to

and the promise of clean and safe

understand how people evaluated

energy. However, public perception

probabilities. Their major finding

shifted against this new technology.

was that people use a number of

Fears of both longitudinal dangers

heuristics to evaluate information.

to the environment and immediate

These heuristics are usually

disasters creating radioactive

useful shortcuts for thinking, but

wastelands turned the public

may lead to inaccurate judgments

against this new technology.

in complex business situations of

The scientific and governmental

high uncertainty – in which case

communities asked why public

they become cognitive biases.

perception was against the use of that all the scientific experts were

Cognitive Biases are just the Beginning

declaring how safe it really was.

Beside the cognitive biases

The problem, as perceived by the

inherent in how people think

experts, was a difference between

and behave under uncertainty,

scientific facts and an exaggerated

there are more pragmatic factors

public perception of the dangers

that influence the way people

(Douglas, 1985).

make decisions, including poor

nuclear energy, in spite of the fact

Researchers tried to

securitysolutionsmagazine.com

050-053_SSM110 Business.indd 51

motivation and remuneration

understand how people process

structures, conflict of interest,

information and make decisions

ethics, corruption, poor

under uncertainty. Early findings

compliance regimes, lack of

indicated that people use

internal controls and so on. All of

cognitive heuristics in sorting and

this makes any type of significant

simplifying information, which

decision making based on purely

leads to biases in comprehension.

expert opinions and perceptions

Later findings identified

highly subjective and unreliable.

SECURITY SOLUTIONS // 51

13/10/2017 4:28 pm


BUSINESS Risk Management

training, to jointly carry out

Risk management can provide

training on the basics of risk-

clarity and assurance to decision

based decision making for all

makers anywhere within

new employees.

the organisation, not just the

• Risk awareness sessions for

risk management team. Risk

senior management and

management provides a set

the board

of tools to help management

Executives and board

see risks, understand their

members play a vital

significance to each decision and

role in driving the risk

Make risk management

consistent application of risk

determine the best course of

management agenda.

information available to

management requires good

action with these risks in mind.

Nowadays, many executives

employees, contractors

knowledge of risk management

Risk management may seem

and board members have a

and visitors. Place the Risk

standards, risk psychology and

simple enough in theory, yet

basic understanding of risk

Management Policy on the

quantitative analysis.

many employees not part of the

management. Auditors, risk

intranet and the corporate

risk team still do not have the

management professional

website. Record and publish

references, email admin@

necessary skills and competencies

associations and regulators

risk management training

interactivemediasolutions.com.

to apply it successfully in practice.

have been quite influential in

or awareness session

au n

shaping the board’s perception

videos on the dedicated

practical ideas to bring risk

of risk management. It

risk management intranet

management competencies to life,

is important that risk

page. Invite guest speakers

with over 13 years of strategic,

regardless of a person’s position

management training focuses

(risk managers from other

innovation, risk and performance

in the organisation (based on the

less about risk assessments

companies) to speak to the

management experience across

free risk management book Guide

and more about risk-based

Audit Committee or Risk

Australia, Russia, Poland and

to effective risk management):

decision making, planning,

Management Committee

Kazakhstan. In 2014 Alex was

• Risk management

budgeting and investment

and give all employees the

named the Risk Manager of

competencies should become

management. The paradox is

opportunity to participate.

the Year by the Russian Risk

an important attribute when

that risk management training

hiring new personnel

should not teach management

of everyone’s responsibilities

Human Resources (HR)

how to manage risks, instead

It helps to include risk

for strategic risk analysis in

teams should include risk

it should show them how to

management roles and

decision making, Alex is responsible

management requirements

carry out their responsibilities

responsibilities into existing

for G31000 risk management

in all relevant position

with risks in mind.

job descriptions, policies,

training and certification across

procedures and committee

Russia and CIS, running numerous

The following are some

descriptions when hiring new

• Advanced training for ‘risk-

• Make risk management part

For a full list of

Alex Sidorenko is an expert

Management Association. As a Board member of Institute

personnel for the organisation.

champions’

charters. The common

risk management classroom and

The level of detail will of

Additional risk management

approach of capturing risk

e-learning training programs.

course depend on the risks

training may be needed for

management information

Alex represents the Russian risk

associated with each role.

the risk management team

in a single risk management

management community at the

Any finance, accounting or

and business units responsible

framework document does not

ISO Technical Committee 262

investment individual should

for internal control, audit,

work well.

responsible for the update of

possess a basic understanding

finance, strategy and others.

of risk.

In-depth risk management

into day-to-day work

• Risk-based decision making

training should include:

Experience shows that

in induction training for

risk psychology and risk

updating existing policies and

global PwC risk management

new employees

perception basics, integrating

procedures to include aspects

methodology, the author of the

New hires come from a

risk management into

of risk management works

risk management guidelines for

variety of educational and

culture, basic knowledge of

much better than creating

SME (Russian standardization

experience backgrounds

ISO 31000, risk management

separate risk procedures or

organization), risk management

and, most importantly, each

and decision-making

methodology documents.

textbook (Russian Ministry of

new employee has his own

foundations and integration

Risk management is a valuable tool

Finance), risk management guide

perception of what is an

of risk management into

to help employees make business

(Australian Stock Exchange)

acceptable risk. It is important

core business processes

decisions under uncertainty. It

and the award-winning training

for risk managers to cooperate

and decisions.

works equally well with strategic,

course on risk management (best

investment, financial, project or

risk education program 2013,

operational decisions. However,

2014 and 2015).

with the HR team or any other business unit responsible for

52 // SECURITY SOLUTIONS

050-053_SSM110 Business.indd 52

• Use passive learning techniques

• Integrate risk management

ISO31000:20XX and Guide 73 since 2015. Alex is the co-author of the

securitysolutionsmagazine.com

13/10/2017 4:28 pm


Series 280 is an IP66 rated industrial 19” cabinet for harsh and unforgiving environments – air conditioning available.

The last thing on your mind is the first thing on ours.

DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS

Whether it’s ready-made, pre-configured or custom racking solutions, MFB’s short turnaround capabilities speed your product from the warehouse to where they should be – fast. Our unwavering commitment to timely delivery ensures your projects run on time, every time, reducing deadline pressures while maximising results. With a solid history of over 45 years supplying innovative, off-the-shelf and custom built racking systems, you can rely on MFB for consistent delivery, on time, every time.

AUSTRALIAN MADE MAKES AUSTRALIA

www.mfb.com.au

050-053_SSM110 Business.indd 53

VIC NSW -

P (03) 9801 1044 P (02) 9749 1922

F (03) 9801 1176 F (02) 9749 1987

E sales@mfb.com.au E sydney@mfb.com.au

13/10/2017 4:28 pm


COVER STORY

WELCOME TO THE BY JOHN MCGIFFIN

According to Grandview Research,

change is to focus all of your energy,

market size was valued at USD

not on fighting the old, but on

$51.94 billion in 2013. This

building the new.” This is certainly

market size is expected to double

the requirement for the security

by 2019, which is no surprise

industry trying to keep up with the

given the increasing incidents of

new demands being placed on it.

terrorism and a strong focus by organisations to enhance security. Australia’s strategy for

54 // SECURITY SOLUTIONS

054-059_SSM110 Cover Story.indd 54

Socrates wrote, “The secret of

the global physical security

But what does a new security platform which will take organisations into the future look

protecting crowded places

like? This is where Security 4.0

from terrorism seeks to create

comes into the picture. Security 4.0

a framework that will increase

is an emerging definition for what

inherent security levels in public

the future of security will look like.

spaces by putting the onus

There should be no comparisons

on owners and operators of

drawn to TV shows like CSI, with

crowded places to implement the

their infinite zoom cameras and

recommendations, providing a

the ability to do facial recognition

layered security approach. Once

from shadows; security is still a

implemented, this will push

while away from that. However,

organisations to adopt the latest

there is no doubt that the new era

Security 4.0 technologies.

of security is here with Security 4.0.

securitysolutionsmagazine.com

13/10/2017 4:39 pm


securitysolutionsmagazine.com

054-059_SSM110 Cover Story.indd 55

SECURITY SOLUTIONS // 55

13/10/2017 4:39 pm


COVER STORY Before defining in more detail what Security 4.0 looks like, it is useful to first understand what problems Security 4.0 addresses and what new capabilities it exploits. Problems addressed by Security 4.0: •

Security have frequently struggled to get funding for system enhancements, as security investments can be likened to an insurance policy where it is only needed when something goes wrong. More business value is being delivered from Security 4.0 platforms rather than them being just a record and playback platform.

Organisations are adding an increasing number of cameras and expecting the same

operator loses focus on screen

number of security operators

watching is just 22 minutes.

Security 4.0 exploits the

The amount of video out there

following capabilities:

the screens are not being

is outstripping the ability to sit

monitored at all because of

down and watch it.

to monitor the screens or

budget restrictions. Many

There are barriers to entry

business process orchestration and automation.

increasing maturity of security

What is Security 4.0?

technologies

Historical industry observations

enhanced resolution of

suggest that the security industry

cameras, such as 4K

goes through a major change

edge-based analytics within

every 15 years, although one

cameras and other devices

could easily argue that this

growing use of technologies

timeline is shrinking. These same

organisations have thousands

for companies wanting

of cameras and so it is simply

to trial new technologies

not possible for them all to be

such as facial recognition,

monitored by humans.

as this typically requires

Security is changing from

temporary servers to be

such as deep learning, neural

industry observations suggest

a reactive to proactive

set-up, along with dedicated

networks and video analytics;

that the next inflection point for

service, with the security

cameras. These barriers

deep learning provides the

security, which is referred to as

infrastructure platform

to entry are eliminated

ability for a computer to learn

Security 4.0, has been reached.

telling the security operator

through the use of cloud-

and understand what it sees in

“you need to be aware of

based or hybrid solutions,

an image or video feed

arrived at this point, it is helpful

this” rather than relying

thereby enabling quick and

use of cloud-based platforms

to look at how the security

on observations.

easy demonstrations of

(including a hybrid approach)

industry has changed over time

Situational awareness

the technology.

with improving bandwidth,

from Security 1.0 through to

Previous security platforms

security controls and scalability

Security 4.0.

combination of strong

have lacked GIS overlay

– many security experts agree

metadata management and

capabilities so that locations

that cloud-based platforms

Security 1.0

geographic information

of security officers and

can be more secure than on-

Some readers of this magazine

systems (GIS) infrastructure.

camera positions can be

premise infrastructure

may be too young to remember

Humans struggle to stay

integrated, thereby providing

video as another powerful data

the analogue cameras and

focused on watching screens

security operations centre

stream in a big data analytics

video cassette recorders (VCRs)

for long periods of time,

staff with quicker issue

environment

which were previously utilised

whereas computers never get

resolution capabilities.

growing use of cameras by

by organisations to record and

The role of the VMS is

other business departments,

playback video streamed from

need to play the role of security

expanded to include inputs

such as marketing and safety

cameras. In some cases, these

operator. IBM research

from external data sources,

mobility

cameras and VCR recorders are

suggests that the average

such as global positioning

GIS capabilities

still used today, albeit with many

attention time before a security

system (GPS) tags and Internet

IoT sensors

questions as to their reliability.

is enhanced with the

of Things (IoT) devices.

tired and so computer systems

56 // SECURITY SOLUTIONS

054-059_SSM110 Cover Story.indd 56

• •

To look at how security has

securitysolutionsmagazine.com

13/10/2017 4:39 pm


R

EasyIP 3.0 H.265+

EasyIP 3.0 SERIES

Simple and Powerful The Easier Journey to Better Security The all-new Easy IP product range is simple to install and use, and is available at a budget-friendly price. Rarely does an affordable system come with such powerful functionality: 4K ultra HD with true WDR, H.265+ Smart Codec compression technology. New cameras in the range also provide greater analytic functions, featuring on-board Video Content Analysis options. Its power, combined with its easy installation and user-friendliness, means the Easy IP 3.0 solution requires significantly less operator input to deliver a significantly more efficient and effective security solution. - 4K Ultra HD with true WDR - H.265+/H.265 Compression technology Hikvision Oceania Unite 14a Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Toll Free:1300 557 450( Australia only) Email:salesau@hikvision.com

054-059_SSM110 Cover Story.indd 57

www.hikvision.com

13/10/2017 4:39 pm


COVER STORY

These systems were very good at recording nothing to the tape, as tapes failed or the recording

servers not connected to the

finally being taken seriously

corporate network.

and was slowly integrated into

implement Security 4.0 systems

IT did not want the server in

Companies looking to

standard IT infrastructure.

no longer need to employ

head became dirty, with this

the computer room, particularly

Security servers were moving off

large numbers of people to

being discovered the hard way at

as they struggled to back up the

the security officer’s desk and into

cross-reference, categorise and

a critical point when the footage

amount of video data generated

the IT computer room.

interpret real-time events. Deep

was required. Video footage

by this new system. The server

quality from early analogue

was typically located on or under

become more commonplace as

helps to eliminate the manual

cameras was particularly poor.

the security officer’s desk.

a way of authenticating people

effort associated with these

for access to buildings. Facial

processes by making them completely automatic.

In many cases for large

Security 2.0 presented

Biometrics was starting to

learning/recognition software

organisations, the security

challenges to some security

and demographic recognition

operator was responsible for

integrators who had grown up

was starting to be released. This

changing tapes daily, which

only understanding analogue-

technology improved greatly with

even predicting customer

included applying identification

based camera systems on coaxial

time, although in many cases the

behaviour and security

labels. These tapes needed to be

cables, who were then brought

cameras had to be dedicated to

threats is typically divided

archived in large rooms, creating a

kicking and screaming into the

this function.

into a separate organisational

storage headache. Thank goodness

world of IP addressing and so on.

the industry has moved on from

Cameras were starting to

Understanding and

responsibility; however, via Security 4.0

Security 4.0 infrastructure,

be used for some non-security

Advances in machine vision

they take advantage of

purposes, such as recording

and the ability to extract

common requirements and

Security 2.0

footage from an unmanned

precise interpretations through

infrastructure investments.

Axis Communications pioneered

production line so that it

software-based analytics has

the Internet Protocol (IP) camera,

was possible to review why

placed humanity at the doorstep

marketing and security

which was transformational for

production equipment had

of a whole new way to deeply

endeavours have a wide range

the security industry; however,

stopped, or even to monitor

interface the physical world

of information at their fingertips

IT was less than impressed

water levels.

with the digital world. Image

where the sum of the parts is

and video recognition is poised

indeed vastly more powerful

this phase.

with this bandwidth hog and

Enterprises that combine

so camera infrastructure

Security 3.0

to change how physical objects

than the whole. From real-time

tended to be run on a separate

Security 3.0 infrastructure,

and people are interleaved with

analytics to rapidly emerging

physical or logical network with

including the IP camera, was

the Internet.

security threats, organisations

58 // SECURITY SOLUTIONS

054-059_SSM110 Cover Story.indd 58

securitysolutionsmagazine.com

13/10/2017 4:39 pm


pants wearing sunglasses gives

Social media also plays a

almost instant results as it is the

big part in this – relationships

metadata being searched rather

between people of interest

than the video. Imagine the

can often be uncovered via

Boston bombing situation or Las

social media, even if they are

Vegas terror attacks where the

not friends.

description of the person can be entered into the system and it then

Summary

returns an image of all people

It is an exciting but in many

matching the criteria across a

cases challenging time with the

large number of cameras.

increasing level of terrorist and

Law enforcement vehicles will be fitted with cameras which

sophisticated security attacks. Deep learning and video

coming through the front door,

record the licence plates and

analytics can be utilised to detect

the Security 4.0 platform is

makes/models of vehicles around

a wide range of situations, from

now telling the operator “you

them, once again for metadata

basic people counting through to

need to be aware of this. In the

searching or to let them know

facial recognition, vehicle make/

above example, Ed Smith, who

that a particular vehicle has been

model recognition, a person

is a known armed robber, has

following them for a period of

holding a weapon, a person yelling

been automatically recognised

time statistically above normal.

aggressively or even person-on-

by the facial recognition system

person violence.

in the Retail Upper Area or a

Casinos

currently unknown person yelling

Casinos are expected to leverage

vision systems still require a lot of

aggressively has been recognised

Security 4.0 capabilities in a big

training to teach them something

in the Car Park 3 entrance.

way, although it will take quite

that humans take for granted;

some time. Forensic search –

however, it is a rapidly growing

looking for people matching

area with some of the best

useful information from modern

Examples and Usage Cases

criteria – and facial recognition

minds in the world enhancing it

information sources such as

Digital policing

are expected to be big growth

every day.

video feeds.

Using body-worn cameras along

areas for casinos. Casinos

with video analytics and deep

typically have heavy on-premise

4.0 will be released in subsequent

and conveyance of events and

learning systems incorporating

infrastructure, which can make

issues of Security Solutions

situational awareness is the norm

Security 4.0 principles, police

it difficult for them to undertake

Magazine. n

for the Security 4.0 companies as

forces will be armed with

major VMS upgrades. Cloud-

captured information is displayed

capabilities which enable their

based platforms enable them to

in context on GIS and analytical

body-worn camera systems to

switch environments very easily.

director of Intelliscape, based in

platforms. The Security 4.0

undertake facial recognition

In many cases, dedicated fibre

Melbourne. John has very broad

platform is fast, smart and cloud-

and licence plate recognition on

cables can be run in from hosting

expertise in the information

based for management servers.

the beat. Body-worn cameras

companies, thereby minimising

technology area where he has

Some organisations will stream all

record key video and audio data

bandwidth charges.

been responsible for large teams of

video camera feeds to the Internet,

while the cloud-based backend

whereas some will leverage a

is generating detailed metadata

Entity relationship platforms

development, communications,

hybrid arrangement and keep all

about each person or vehicle that

Across the board, entity

infrastructure and business

recording local, leveraging edge-

the police officer travels past. This

relationship platforms are

intelligence. Intelliscape specialises

based applications and storage.

metadata can include clothing

being utilised to determine the

in the recognition of people, things

Many organisations are now

colour, GPS co-ordinates of the

relationship between people,

and vehicles using cameras, lasers

realising that video data is like

person, demographic information

thereby looking for associations

and microphones and was the first

any other sort of data asset. It is

such as age and gender, and facial

between people of interest. Even

company in the world to deploy

extremely valuable and generates

attributes such as beard, glasses,

if the data does not inform that

technology which could determine

large amounts of metadata.

moustache and even ethnicity.

two people know each other,

the make and model of a vehicle

A person’s level of happiness

facial recognition can highlight

being driven on the road in real

will take on a new dimension.

can also be recorded based on

that an individual has been seen

time for marketing purposes but

Rather than expecting the

facial expressions.

with the same person on more

utilising security infrastructure,

than one occasion to suggest that a

including Milestone VMS and IBM

relationship could exist.

Intelligent Video Analytics.

can now start to become prepared to ferret timely and

Instant collection, recognition

The Security 4.0 control room

security operator to notice an event such as a person of interest

securitysolutionsmagazine.com

054-059_SSM110 Cover Story.indd 59

Searching for a person dressed in a black top and white

Deep learning and computer

More details about Security

John McGiffin is the managing

people across security, application

SECURITY SOLUTIONS // 59

13/10/2017 4:39 pm


LEGAL Q&A BY ANNA RICHARDS

PROPERTY SEARCHES

With the number of terror raids taking place across Australia on the increase, one of the questions I am often asked is “who pays for the damage caused during these raids in instances where the police don’t find anything and there are no charges laid?” It is an interesting question and one that applies to police raids conducted for any number of reasons be it terrorism, organised crime or homicide.

60 // SECURITY SOLUTIONS

060-061_SSM110 Legal Q and A.indd 60

To begin to answer the question,

enter premises; for the purposes of

it is important to first understand

this article, it is assumed that the

that in Australia, there are two

police force member had a legal

different levels of police force.

right to enter the premises. The

Further, these different police

focus of the article is on damage

forces have different types and

to property arising from police

scope of powers. The Australia-

conduct and who, if anyone or any

wide major police force is known

entity, should be held liable to pay

as the Australian Federal Police

compensation for the damage.

(AFP) and each state has its own state police force. The police forces largely

When can Police Search Premises?

get their powers or authority

Let us begin by examining when

to lawfully act in certain ways

Victoria Police are permitted

from various Acts of parliament

to enter premises (including

(legislation), with legislation

business premises) and to conduct

differing from state to state.

a search of those premises. Under

Hence, what a Victorian Police

section 459 A of the Crimes Act

officer is legally permitted to

1958 (Victoria), a police officer

do in Victoria may completely

may, for the purposes of arresting

vary from what a police officer

under section 458 or 459 or any

is entitled to do in New South

other Act, a person (the alleged

Wales. This is largely because

offender) who he or she:

there is rarely any uniformity

• believes, on

between legislation in each state. There are also completely different powers given to state and federal police forces under legislation (parliament-made

reasonable grounds: • to have committed a serious indictable offence in Victoria; or • to have committed an

laws). For instance, in Victoria,

offence elsewhere which

the relevant legislation includes,

would amount to a serious

but is not limited to:

indictable offence in

• the Crimes Act 1958 (Victoria); and • the Victoria Police Act 2013 (Victoria).

Victoria; or • to be escaping from legal custody; or • finds committing a serious indictable offence –

Some of the relevant legislation

enter and search any place where

empowering AFP officers includes,

the police officer, on reasonable

but is not limited to:

grounds, believes the alleged

• the Crimes Act 1914 (Cth); and

offender to be.

• the Australian Federal Police This article will focus on the

What is a Serious Indictable Offence?

situation in the state of Victoria

The scope of what amounts to

as to cover all the various state

a serious indictable offence is

and territory police as well as

probably significantly wider than

federal police is simply beyond the

what many people might imagine.

scope of a single article. Further,

It is an offence punishable by five

the article will not discuss the

or more years of imprisonment

separate issues of when police can

and includes offences such as theft

Act 1979 (Cth).

securitysolutionsmagazine.com

13/10/2017 5:44 pm


and shoplifting and is not reserved

be retrievable. In such a case, if

to only the more serious offences

the alleged offender refused to

involving physical assaults.

provide the police with immediate access to his office, it is likely that

How Much Force can Police use to Obtain Entry and to Search?

a court would find that the state

Generally, the courts have held

to the office doors as a result of

that the state government (as

forcing entry. This is because it

the principal of Victoria Police)

would be likely to find that the

is not liable for acts which are

application of such force (which

permitted under legislation or

resulted in the damage) to be

parliament-made law. This makes

reasonable and necessary in all of

complete sense. The Victorian

the circumstances.

government (Victoria Police) not be held liable for the damage

THE VICTORIAN LEGISLATION STATES THAT THE POLICE ARE PERMITTED TO USE “REASONABLE FORCE”, IF IT IS NECESSARY TO DO SO, IN ORDER TO OBTAIN ENTRY TO THE PREMISES. court case (seeking, for instance,

compensation against the state

are permitted to use “reasonable

than reasonable force was used

compensation for damage to

government. Section 75 of the

force”, if it is necessary to do so,

or that it was not necessary to use

property) by claiming that the

Victoria Police Act 2013 (Victoria)

in order to obtain entry to the

force, then he may have a case

individual officer or officers

provides for a person with a

premises. There is no definition

against the state government for

should be held liable instead

potential claim, for instance, for

of what amounts to reasonable

compensation. However, whether

of the state government, then

damage to property arising from

force set out in the legislation.

or not he would succeed in

the claimant can ask a court for

unreasonable force, to bring

Therefore, what would amount to

obtaining a favourable outcome

permission to also sue (join) the

a claim against the Victorian

reasonable force would depend

(that is, the courts finding that the

individual officer or officers as

Government for compensation for

on the circumstances of each

force used was not reasonable or

parties to the litigation (court

the damage. n

individual case.

not necessary), would depend on

case). Otherwise, there is a risk

legislation states that the police

If a person believes that more

Anna Richards is the legal

There is some case law (or

what the court ultimately finds

that, if only the state government

court-made law) on what would

after hearing evidence from the

is sued and the court found that

director and a lawyer from

amount to reasonable force.

state and claimant to the facts in

the damage was caused by the

Victorian Legal Solutions Pty

This case law exists as a result of

the matter.

individual officer engaging in

Ltd. She practises in commercial

serious and wilful misconduct, the

law, including commercial

case against the state government

litigation, and other areas. Anna

will be dismissed. In other words,

and Victorian Legal Solutions

for compensation for damage

Who is Usually Liable – Victoria Police or the Individual Officer?

the claimant runs the risk of the

can be contacted by telephone

to property.

Section 71 of the Police Act

case being dismissed on the basis

on (03) 9872 4381 or 0419

2013 (Victoria) gives individual

that he failed to sue the person or

229 142 or by email at info@

scenario. Pretend that the police

officers carrying out searches

entity which was responsible.

victorianlegalsolutions.com

believe that a person who

some protection from claims

is committing the offence of

for property damage. It makes

for a particular person or entity

taken to ensure its accuracy, the

“obtaining a financial advantage

sense that this protection exists,

to be liable to pay compensation

information contained in this

by deception” is working in

otherwise police forces would

unless that person or entity was

article is intended to be used as a

a financial institution at that

struggle to employ any field

a party to the court proceedings

general guide only and should not

particular point in time. Further,

officers for fear of exposure to

and hence had the opportunity

be interpreted as being specific

that the only way that they are

liability in court cases.

to defend the claims being made

advice, legal or otherwise. The

against him, her or it.

reader should seek professional

claims having been made against the state (as the employer of the officers carrying out the search)

Consider the following

likely to be able to successfully

Generally speaking, unless an

prosecute him is if they are able to

individual police officer is found

obtain details of transactions from

to have engaged in serious and

his computer and also physical

wilful misconduct, such a claim

records from his office. For the

for damages would lie against

sake of this article, we will assume

the state government (of which

that there is a great risk that if the

A court cannot make an order

Whilst every effort has been

advice from a suitably qualified practitioner before relying upon

Victoria Police is its agent) as

What About Cases Where the Damage was not Necessary or did not Arise from Reasonable Force?

alleged offender discovers that

opposed to against the individual

Where a person believes that the

not necessarily represent the views

the police are going to carry out a

officer or officers carrying out

police have overstepped their

or opinions of Interactive Media

search, that the alleged offender

the search.

authority, he should seek legal

Solutions Pty Ltd or any advertiser

advice to ascertain whether or

or other contributor to Security

not he may have a legal claim for

Solutions Magazine.

will destroy most of the records and that those records may not

securitysolutionsmagazine.com

060-061_SSM110 Legal Q and A.indd 61

However, if the state government attempts to defend a

any of the information contained herein. This article and the opinions contained in it represent the opinions of the author and do

SECURITY SOLUTIONS // 61

13/10/2017 5:44 pm


FEATURE

62 // SECURITY SOLUTIONS

062-065_SSM110 Article 2.indd 62

securitysolutionsmagazine.com

13/10/2017 5:44 pm


THE NEXT GENERATION OF SECURITY PROFESSIONALS

BY SCOTT O’DRISCOLL

In its early years, the security

$6 billion annually and employing

industry in Australia was a

over 50,000 Australian workers,

fragmented industry which

with the breakdown by discipline

operated in silos across its various

in 2014 looking something like

disciplines. If your goal was a

that shown in Figure 1.

career in security, you really

In 2004, the Organisation

did have to ‘carve’ one out as

for Economic Co-operation and

there was little to offer by way of

Development (OECD) released

courses provided by educational

a report titled The Security

institutions. However, more

Economy, which reported the

recently, the security sector in

global spend on private security

Australia has evolved into a

was estimated at somewhere

thriving multi-discipline, billion

between $100 and $120 billion.

dollar industry in high demand

However, the OECD appears to

with many courses on offer for

have underestimated the spend

those so inclined to seek them out.

or it has increased exponentially over the years since 2004, with

securitysolutionsmagazine.com

062-065_SSM110 Article 2.indd 63

The Security Economy

ASIS International and the

According to a report produced

US Institute of Finance and

by The Construction and Property

Management (IOFM) releasing a

Services Industry Skills Council

report in 2013 titled The United

(CPSISC), the Australian security

States Security Industry, Size and

industry is generating in excess of

Scope, Trends and Data, which

SECURITY SOLUTIONS // 63

13/10/2017 5:44 pm


FEATURE the British insurance company Figure 1

Lloyd’s estimated that, in 2015,

Security Disciplines

cyberattacks cost businesses as much as $400 billion a year, which includes direct damage

8.2

plus post-attack disruption to

4.6

the normal course of business.

8.9

26.4

11.1

16.2

24.6

n

Other Security Services

n

Mobile Guards and Patrol Services

n

Private Investigation Services

n

Security System Monitoring Services

n

Cash in Transit and Armoured Guards

n

Crowd Control Services

n

Secure Document and Handling Services

In the same article, Morgan predicts that by 2019 the cost of cybercrime to business will reach a staggering $2 trillion. The article also quotes IBM’s chairman, CEO and president, Ginni Rometty, as saying “cybercrime may be the greatest threat to every company in the world”. The 2016 Australian Industry Report, published by the Australian Government Department of Industry, Innovation and Science, Office of the Chief Economist, listed cybersecurity alongside advanced

reported that the spend on private

Let’s start with question three.

of portable technology device

manufacturing, food and

security alone in the US in 2012

Educational institutions such as

such as a smartphone, tablet or

agribusiness, medical technologies

was in excess of $281 billion.

universities, TAFEs and colleges

laptop. I know in my own home

and pharmaceuticals, mining

According to the report, a further

have been quick to recognise

my wife and I have had to limit

equipment technology and

spend of $68 billion on homeland

that there is a growing demand

the time our kids spend using

services and oil, gas and energy

security services by the US Federal

for security professionals and

portable devices. If it was up

resources as a key growth centre

Government in 2013 resulted in a

have developed courses offering

to the kids, they would never

for Australian industry. An article

staggering $350 billion spend in

degrees in security management

put them down. This increase

published by the Australian

the US over the 2012–13 period.

and other security-related

in the use of portable devices

Security Industry Association

disciplines. This brings us back to

and technology in general, both

Ltd (ASIAL) in August 2017

Satisfying the Demand

questions one and two. How are

at home and in the workplace,

attributes the rise in demand for

In such a thriving industry, there

these courses being marketed and

has seen increased demands

cybersecurity expertise in the

is a huge call for intelligent,

who are these institutes targeting?

for cybersecurity professionals.

workplace is due to the following:

competent individuals to satisfy

I believe the educational

One only has to review the

• employees bringing

the demands of a market whose

institutions should be targeting

current job market to see that a

global size appears to be difficult

school leavers. This raises even

large percentage of the recently

to quantify. However, it would be

more questions. How do we

advertised security consultant

fair to say that the global security

attract them to an industry that

roles are seeking security

industry is growing at a staggering

historically has played a relatively

professionals with cybersecurity

rate and that trend looks like

minor role in the corporate world?

skill sets. Educational institutions

it will continue well into the

What do young people today find

are not the only ones who can

future. To facilitate this growth,

interesting that could be used as

identify opportunities to turn

Given the younger generation’s

the security industry needs

a drawcard to bring them into

a profit; criminals have also

attraction to technology and the

well educated and enthusiastic

the industry?

recognised that the increased use

obvious need for industry and

of technology both at home and in

everyday users of technology

the workplace can be exploited to

to protect themselves against

their advantage.

the threat of cybercrime,

young people. This raises three questions: 1. Where will the next generation

Trends and Opportunities

unapproved apps or devices in the workplace • employees being negligent or careless when following organisational security policies • phishing and social engineering scams

of security professionals

As you walk down the street

come from?

or catch public transport, look

on Forbes.com by Steve Morgan,

links to technology – is the key

around. What are the majority of

founder and CEO at Cybersecurity

to attracting the next generation

young people doing? Typically,

Ventures and editor-in-chief of

of security professionals to our

they will be using some type

the Cybersecurity Market Report,

industry. We all know security

2. How do we attract new ‘blood’ into the industry? 3. Who will train them?

64 // SECURITY SOLUTIONS

062-065_SSM110 Article 2.indd 64

According to an article posted

cybersecurity – with its obvious

securitysolutionsmagazine.com

13/10/2017 5:44 pm


topic was Women in Security. One of the speakers was a lady who heads up security courses at NSW TAFE Ultimo. During question time, I asked, “What is TAFE doing by way of promoting their courses to school leavers?” The answer was, “Unfortunately nothing.” The possibility of engaging with school leavers was raised and met with a positive response from those in attendance.

Summary Clearly, security is a thriving global industry. Therefore, we can and must market security as a career and target young adults looking for a role which offers diversity, recognition at a global level with opportunities for travel and, unlike many other careers, allows individuals to start their own business with very little capital outlay when compared to trades and other professions. I believe technology and the increasing need for those with expertise in cybersecurity may be the drawcard the industry needs to attract younger school leavers. I further believe that cybersecurity courses should include training in other security-related disciplines should not and cannot operate in

almost weekly and many of them

The time to engage is when they

as part of their curriculum. This

silos, so the goal here should be

have university qualifications in

are preparing to leave school and

would allow us to develop the next

to further develop the skill sets

other disciplines. They start out

are deciding what career path

generation of general practitioners

of the cybersecurity practitioner

working in security as a means

they will pursue. To do so, security

in security. I for one would be

to the point where they become

of paying their way through

professionals such as myself need

happy to volunteer my time to

what one of my colleagues

university and then find out they

to be engaged by universities and

speak to these young people.

once described as a general

actually enjoy what they are

TAFEs to speak to these young

practitioner of security. In other

doing and do not pursue their

people at events such as career

admin@interactivemediasolutions.

words, someone who has been

original career path. Perhaps if

days and vocational guidance

com.au n

trained to be a multi-disciplinary

they had been approached earlier

courses. There, we can explain

security professional.

instead of completing a course in

what we do, share our experiences

economics or accounting they may

and show them how we got to

is a security professional with

Marketing and Engagement

have selected to complete a course

where we are. I believe this type of

over 35 years’ experience in the

in cybersecurity, criminology,

engagement and marketing could

industry. He is a licenced security

It has become increasingly

policing or security risk

easily be facilitated by industry

consultant and private investigator.

obvious to me that the majority of

management and would be well

bodies such as ASIS International

Scott currently holds the position

people tend to fall into a career in

on the way to increasing the level

and ASIAL in collaboration with

of Global Security Operations

security as opposed to seeking out

of professionalism the industry is

the universities and TAFEs.

and Risk Manager for one of the

and selecting a career in security.

crying out for.

I read the CVs of persons applying for positions as security officers

securitysolutionsmagazine.com

062-065_SSM110 Article 2.indd 65

So when is the best time to engage with these young adults?

Recently, I attended a NSW

For a full list of references, email

Scott O’Driscoll CPP, JP

world’s largest financial banking

ASIS International breakfast

institutions. Scott can be contacted

seminar. The seminar discussion

on 0437 618 812.

SECURITY SOLUTIONS // 65

13/10/2017 5:44 pm


LOSS PREVENTION

66 // SECURITY SOLUTIONS

066-069_SSM110 Loss Prevention B.indd 66

securitysolutionsmagazine.com

17/10/2017 10:16 am


DEVELOPING A LOSS PREVENTION SECURITY CULTURE IN YOUR ORGANISATION

BY SCOTT TAYLOR

incoming calls. It needs to be

learning curve. By continuing

the same with the security / loss

this focus, it sets the stage for all

prevention culture.

staff focussing on reducing losses

coupled with the ever ongoing

So with only having access to minimum resources, how can an organisation ensure their loss prevention strategy is truly effective?

problem security professionals

My initial response to this would

face, of tangibly showing senior

The security / loss prevention department in an organisation is one of the few departments that regularly has its value measured by what does not happen rather than what does. Due to this fact,

Each and every staff member in a company needs to play

through prevention strategies. To ensure this occurs, there

their part in the loss prevention

needs to be solid support from

program. The easiest way to

senior management. This would

ensure this occurs is to intertwine

ideally be supported by devising

be that most companies maintain

a security / loss prevention focus

specific metrics to show how

management a clear return

that every staff member is

at all stages of their employment.

the security / loss prevention

on investment in funding the

involved in the sales process in

Security-based questions and

department is contributing to

department, security / loss

one way or another – whether

focus need to be part of an initial

the company profits through

prevention departments can quite

it is the sales executives in the

interview process and then

reducing (or eliminating)

often be resourced to the bare

field, the account management

continue on through induction,

preventable losses.

minimum with a small handful

staff back at the office or the

orientation, and ongoing training

of people.

receptionist answering the

and development to prop up the

securitysolutionsmagazine.com

066-069_SSM110 Loss Prevention B.indd 67

Another key aspect of maintaining effective loss

SECURITY SOLUTIONS // 67

17/10/2017 10:19 am


LOSS PREVENTION prevention strategies is ensuring

department in an organisation

regularly after the loss prevention

“I am here to see XYZ for an urgent

there is not a silo approach in

attend and contribute will

team meetings and updated

meeting and I am just running a

the organisation. For example,

not only ensure all necessary

accordingly as new issues and

bit late”. As I was not dressed like

management, administration and

information is captured, it will

information come to light.

a standard criminal, had a nice

the HR department should all

also assist in driving the follow

work hand in glove with the loss

up communication with their

representation at the security

of a senior management member,

prevention department. This helps

individual department staff,

loss prevention meetings, it can

the response was “yeah just go

ensure there is not a duplication of

thus helping reiterate the loss

also be extremely beneficial to

through here, do you know where

duties and it also helps to reiterate

prevention focus we are seeking.

use external specialist resources

you are going mate”. This same

the needed organisation-wide loss

From the involvement of

for specific individual tasks.

response happened while I walked

Besides the multi-department

shiny briefcase and used the name

prevention focus. Standard tasks

various departments in the

One of the reasons this may

around the first three levels of

of the security department may

security / loss prevention meetings,

be effective is due to what is

the building, leaving my business

normally include items such as

greater information sharing

sometimes called ‘store blindness’.

card in multiple locations. You

company property monitoring,

between departments occurs and

Day-to-day vulnerabilities in an

would be amazed at some of the

access control, key storage and

this may also provide different

organisation can be overlooked or

areas I was able to gain access to.

issuance, and specific elements

perspectives on individual

not recognised due to them being

After approximately 40 minutes,

of business continuity planning.

department issues. Having the IT

previously accepted or overlooked

I walked to reception and asked

However, to help support the

department assist with providing

for so long.

for the designated representative

needed culture, companies

solutions on controlling the

should be involving the security

information sharing of specific

involved in two examples of

explained that approximately

/ loss prevention department

stock levels held or product

such accepted or overlooked

30 of my business cards would

in duties such as: recruitment

delivery routes would be one

vulnerabilities. With the first one,

be turning up throughout the

background vetting, supplier due

example of this.

I was conducting a gap analysis

company building so I would

on a company that was suffering

suggest following up with the

diligence reviews, developing the

Another clear example would

I have been personally

I was supposed to meet with and

security modules of the company

be the security department

unexplained theft of some of their

team as to where they find them

induction program and orientation

working with the procurement and

products. Upon attending the site,

as that is where I was able to gain

programs, and then physically

legal departments to draft external

within approximately 10 minutes

access to.

conducting the training with staff

supplier vetting procedures and

of conducting an external walk

for it.

standards and ongoing codes of

around, I asked the designated

countless times before, security

conduct underpinned with key

company contact how long the

and loss prevention is about

security requirements.

large hole had been there for in

protecting all of a company’s assets

the chain wire fence separating

(People, Property, Information

Having the initial focus and all of our ducks in a line with the recruitment, induction and

The data produced through

In summary, as has been stated

ongoing training programs for

the collation of these ‘team built’

the loading dock area and staff car

and Reputation) and it is my

staff is a great start. However, to

solutions can be used to update

park. His response was “as long as

opinion that the development of

manage the ongoing identification

(or commence) an organisation

I can remember”. I am relatively

a proactive and unified security /

of organisational vulnerabilities,

security awareness program

confident you can draw the logical

loss prevention culture throughout

and to ensure that appropriate

that should be applied across all

conclusion for yourself.

an organisation, supported

treatments are underpinned with

divisions of an organisation. This

operational effectiveness, you

program can also be replicated

multinational corporate who had a

structured ongoing training and

need the use of cross functional

to all business partners to build

control room onsite. I simply used

multi-department represented

or multi-departmental teams.

awareness of the proper protocols

their company website to obtain a

improvement meetings will

Any changes in systems need

with anyone working with or for

senior manager’s name onsite (We

provide any organisation its

to be tested for their impact on

the organisation and it sends a

will call him “XYZ”) and arrived

best chance at minimising or

company operations which can

very strong message reinforcing

just before 9:00am. I made sure I

eliminating preventable losses. n

then be weighed against the

the organisation’s loss prevention

was dressed in a nice suit and was

benefit of implementation. Each

focus and helps enforce a

carrying a nice shiny brief case.

individual department in an

consistent approach.

Upon arriving onsite, I noticed that

of International Security Training

The second example was for a

by regular communication,

Scott Taylor CPP is the CEO

a back door was slightly ajar with

Academy. With over 23 years of

specific risks and idiosyncrasies,

clearly documented and heavily

a brick inside it and an ashtray

experience in the security services

and to ensure all of this knowledge

supported by procedural programs

next to it. From this, I deduced

industry, Scott has a wide variety

is captured and utilised effectively

where each department can

that this was where the staff

of experience in a range of security

in the planning processes, regular

be audited against the agreed

exited for a quick smoke break

related fields including loss

scheduled loss prevention focussed

standards that focus on prevention

so I walked directly towards that

prevention, incident investigations,

meetings should occur. Having

strategies. These are ‘living’

door. After waiting two minutes, a

risk mitigation and workplace

key representatives from each

documents that should be revisited

staff member emerged and I said

violence prevention.

organisation is aware of its own

68 // SECURITY SOLUTIONS

066-069_SSM110 Loss Prevention B.indd 68

The training should be

securitysolutionsmagazine.com

17/10/2017 10:19 am


SMARTair™

Proximity access control Introducing ASSA ABLOY’s new Lockwood SMARTair™; a powerful access control system that is simple to install, simple to configure, simple to administer and maintain. SMARTair™ provides peace of mind for businesses small and large, knowing that lost credentials are no longer a risk, with the flexibility to restrict user movements within the building. Audit trails can show historical movement for reporting purposes. SMARTair™ offers an intelligent, yet simple, step up from keys, and a cost effective alternative to traditional access control. No bells, whistles, or wires, just sleek, reliable security. Available in standalone, offline, update on card and wireless online.

SMARTairTM Door Lock

SMARTairTM Knob Cylinder

SMARTairTM Wall Reader

SMARTairTM Cabinet Lock

S E C U R I T Y, S I M P L I C I T Y , C O N V E N I E N C E . Visit lockweb.com.au/smartair to learn more.

066-069_SSM110 Loss Prevention.indd 69

13/10/2017 4:41 pm


FEATURE

70 // SECURITY SOLUTIONS

070-073_SSM110 Article 3.indd 70

securitysolutionsmagazine.com

13/10/2017 4:43 pm


ASSURING SECURITY AND SAFETY

BY NEIL FERGUS

All eyes from within Australia

people within the Commonwealth

and around the 71 nations

and, most particularly, the

and territories that make up

participating athletes.

the Commonwealth will be

questioning the success of the

2018. Viewers anticipate being

Commonwealth Games? Sure.

thrilled by a spectacular opening

And perhaps readers have

ceremony, which will herald

also heard the CGF had to take

the commencement of the XXI

the 2022 Games away from

Commonwealth Games.

South Africa due to unresolved

The Gold Coast Commonwealth

securitysolutionsmagazine.com

070-073_SSM110 Article 3.indd 71

Are there a few cynics

on the Gold Coast on 4th April

contractual issues? Yes, also

Games will bring together

true. Unfortunately, the 2022

able and disabled athletes,

Games are no longer going to

families, officials, spectators and

Durban in South Africa but,

media from a diverse array of

most importantly, the CGF was

countries in a sports and cultural

subsequently flooded with

extravaganza. Having served the

inquiries from other cities across

Commonwealth Games Federation

the globe that expressed interest

(CGF) as its security adviser for

in stepping into the breach.

13 years in a part-time capacity,

Malaysia, England, Canada

here are some insights into how

and Australia all engaged in

this event keeps on being so

discussions with the CGF about

successful and the strategies that

the possibility of being selected as

are in place to ensure the event is

the replacement city for 2022. And

secured for the benefit of all the

some cities have already indicated

SECURITY SOLUTIONS // 71

13/10/2017 4:43 pm


FEATURE

a strong interest in hosting the

understanding of, how to use the

2026 Games. So, notwithstanding

international standard for risk

the South African debacle,

management (ISO 31000:2009)

global interest in hosting the

and no appreciation of the

Commonwealth Games has

necessity to apply sound risk

never been stronger. By the

methodology in the infrastructure

time this article is published,

and event sectors. However,

there will likely have been a CGF

as the private sector has long

announcement on which city will

been aware, risk management

be hosting the 2022 Games.

is an essential planning and

Unsurprisingly, many of the interested cities had researched the outstanding success of the

delivery tool in the major

be maintained from opening

rigorously at a Games. However,

events environment.

until closing include the main

the reality is there is no complete

stadium and, this might surprise

business redundancy for any IBC

While threat assessments are

Glasgow 2014 edition – in respect

a key input to risk management,

some people, the International

at an Olympics, a FIFA World Cup

to sports, finances, infrastructure,

they are only one of the inputs,

Broadcast Centre (IBC).

or a Commonwealth Games. These

legacy and social inclusion.

along with vulnerability analyses,

Glasgow was a sensational Games

to assist the objective and accurate

be searched and ‘locked down’

that operate 24/7, ensuring images

on every measure, including

assessment of the likelihood of

prior to the commencement of the

and reporting on the event are

security. Some of the more

hazards impacting the Games.

Games. For several compelling

streamed promptly all over

experienced event commentators

When talking about a multi-

reasons, it is unthinkable for

the world.

are predicting the Gold Coast

billion dollar Games – comprising

the integrity of that principal

2018 Games could potentially be

278 events in 18 international

venue to be breached in any way,

rightsholders are complex and

as successful as Glasgow.

championships over 15 days

particularly as the venue manager

detailed and always involve

– threat assessments are too

and emergency services are likely

very significant revenues.

city will have to give the CGF

imprecise a methodology on

to have to deal with several venue-

All international major event

several binding commitments

their own to fully inform major

specific threats over the period of

organisers are dependent on their

to satisfy its safety and security

capital investment decisions, let

a Games.

IBCs functioning properly and

requirements. Under the host

alone to assuage the concerns of

city contract signed with the

insurance underwriters.

The 2022 host country and

CGF, there is a mandatory

When the CGF issues a Games

The main stadium needs to

are enormous broadcast facilities

Event contracts with broadcast

If the venue has been poorly

digital broadcast signals being

secured, the worst-case scenario

uninterrupted so the event can

is managers might have to order

obtain optimal coverage and

obligation to routinely provide

contract to a city, the hosts

a partial or full evacuation.

maximum broadcast payments

the CGF coordination commission

are required to provide 100

However, if it has been properly

are remitted.

with six-monthly updated

percent security, screening of all

searched, locked down and kept

security risk assessments.

people and materials, at several

secured, the venue manager and

visits the host city every six

This has surprisingly proven

designated venues, including at

emergency responders can have

months or so to review and

a challenge for some Games

the Games village. The ‘heart’ of

strong, professionally sound

ensure planning is progressing

organising committees and

any Games is its village, where

confidence in their handling of

in accordance with the host city

their law enforcement partners.

the athletes of the Commonwealth

a wide range of potential threats

contract and that all obligations

Many national security

reside, train and interact – sharing

without disrupting any events.

and timelines are being

agencies routinely talk in

the Commonwealth values – in

threat methodology and have

privacy and safety. Other venues

unusual example of where 100

an amicable assurance process,

little interest in, and a poor

where 100 percent security must

percent screening must be applied

as the Commission is sharing its

72 // SECURITY SOLUTIONS

070-073_SSM110 Article 3.indd 72

The IBC might seem an

A CGF evaluation commission

satisfactorily met. This is normally

securitysolutionsmagazine.com

13/10/2017 4:43 pm


works were completed to address

accreditation pass to back-of-house

Commonwealth Games next year

the problems. As a consequence,

and restricted areas, including

– athletes and spectators alike –

the organising committee had

the village; transport security for

simply enjoy a wonderful event.

AS THE PRIVATE SECTOR HAS LONG BEEN AWARE, RISK MANAGEMENT IS AN ESSENTIAL PLANNING AND DELIVERY TOOL IN THE MAJOR EVENTS ENVIRONMENT.

to foot the bill for the first teams

athletes and technical officials; and

Organisers want the sporting and

that arrived in Delhi to be

field of play security at venues.

cultural experience to leave an

extensive experience in planning

accommodated in hotels. The CGF is the owner of the

The CGF member nations

enduring impression on them

and territories are always

and their families, to inspire

Games, not the host city, on

understandably very concerned

the youth of the Commonwealth

behalf of all the member nations

for every Games venue to have

and leave a positive legacy for

and territories. It protects the

an up-to-date, customised,

the Gold Coast, Queensland and

Games for those members and

emergency management plan

Australia. Security will hopefully

all the athletes and citizens of

appropriate for its use in the

be friendly, firm and effective.

the Commonwealth. Safety and

Games context. For example, an

security is obviously a very key

emergency management plan for

beforehand and the

issue for it and for each evaluation

an Australian Football League

professionalism of the men and

commission which is appointed by

(AFL) final at the Melbourne

women who will be working

the board of the CGF.

Cricket Ground (MCG) is not fit for

on screening operations and in

purpose for the Games if the MCG

various roles behind the scenes,

trying to interfere with national

is being used to hold an opening

as well as Queensland Police

and delivery of previous events,

security arrangements in any

ceremony with a show involving

Service and its national security

and the organising committee and

host country. However, the

several thousand school children,

partners, should ensure Games

its local partners are of course

CGF members, including the

numerous other entertainers,

safety and security works as

equally keen for the Games

Australian Commonwealth

massive pyrotechnics, a march-

everyone hopes and expects. We

to succeed.

Games Association, collectively

by of the participating teams

aim for great. n

have very clear expectations

and torch bearers running the

there can be some tensions or

of how safety and security

Queen’s baton message into the

concerns between an evaluation

should be consistently and

stadium from the public realm.

executive of Intelligent

commission and the organisers of

appropriately delivered inside

And it is entirely likely some of the

Risks (IR), an international

a Games. The CGF had some grave

the footprint of the event; and it

ingress and egress arrangements

management services company

concerns about the delays in the

is the responsibility of the CGF in

might need to be changed due

headquartered in Sydney. He is an

building and overlay programs

partnership with the organising

to the ceremony plan and that,

internationally renowned expert

for the Delhi 2010 Commonwealth

committee to ensure that occurs.

in turn, could impact on the

on international terrorism and

Games and those issues eventually

Some of the security issues

routine evacuation plans at the

has been the security adviser

However, very occasionally,

Of course, the CGF is not

The meticulous preparation

Neil Fergus is the chief

became very public when it was

that the CGF needs to carefully

venue. Emergency management

to the Commonwealth Games

evident the athletes’ village was

manage at each Commonwealth

plans need to be reviewed very

Federation in a part-time capacity

not in a fit state for occupation,

Games include the restricted

late in the process, immediately

continuously for over 13 years.

and nor was it appropriately

items list, which specifies what

before the Games commence,

Neil has been engaged on security

secure, immediately prior to

people are permitted to take or

so any temporary overlay and

planning and delivery for seven

the commencement of those

not take into venues; airspace

infrastructure is fully taken

Olympic Games, four FIFA World

Games. In fact, the CGF refused to

protection zones over venues;

into consideration.

Cups and six Commonwealth

authorise teams to move into the

the accreditation system – who is

Of course, it is hoped that

village until significant remedial

eligible and permitted to have an

people attending the Gold Coast

securitysolutionsmagazine.com

070-073_SSM110 Article 3.indd 73

Games. Visit www.irisks.com for more information.

SECURITY SOLUTIONS // 73

13/10/2017 4:43 pm


AVIATION

TRAVEL SAFETY

BY STEVE LAWSON

74 // SECURITY SOLUTIONS

074-077_SSM110 Aviation.indd 74

securitysolutionsmagazine.com

13/10/2017 4:45 pm


It is getting towards the holiday

suggest you skimp on paying

It not only makes it quicker

part of the year and about this

for insurance; it is amazing how

to get the bag off the arrivals

time last year I wrote an article

many Australians get injured

carousel, but it means that

about travel security, so it seems

overseas and then find that their

you can see if someone tries to

appropriate to revisit the subject.

basic insurance is not sufficient. It

steal the bag off the carousel.

immediate environs

Most of this article is aimed at the

is the same if you are holidaying

There are also electronic tags

of Western diplomatic

international traveller, but much

domestically – get insurance.

that track your bag. I have

missions, including

is appropriate to domestic travel

If you travel regularly, get an

not tried them, but we did

embassies, high

as well. As a director of a company

annual policy.

experiment with something

commissions, consulate

similar for air cargo a few

generals and consulates, unless you have a reason

which provides travel advice (www.paradym.co), I have access

Baggage

years ago and I cannot see any

to a range of resources.

1. Buy a bag that is suitable for

reason they would not work.

possible, make sure there is more than one. 2. Areas to avoid: • Stay away from the

to visit.

the travel you do. I buy good

To be honest, given the first

years of travel, I have never had an

bags because I travel a lot

sentence of this paragraph,

issue, and I have travelled to a few

and they last. I do not buy

you should not need them.

places that could be described as

bags because they are status

I also carry at least a set of

less than desirable. I have lost one

symbols. I got my latest bag

underwear in my carry-on

gatherings and

bag, when I was on my way to New

in Thailand and it is perfectly

bag, just in case my bag is lost.

demonstrations; they may

York to handle Qantas’ on-ground

good. My cabin bag came from

response to September 11 and I did

Costco. If you do not intend

Checklists

not have a ticket for one sector. I

travelling a lot, go to Big W,

I do not do this but I should. Keep

have had one bag broken and that

Kmart, Target or similar and

a checklist of your valuables,

and shopping venues

was by New Zealand Customs, who

get a bargain. There is not

even if it is on your phone or

carefully – venues with

decided they needed to get into my

much use paying a fortune

tablet. When I checkout, I always

a higher level of visible

locked bag so they broke the locks

for a designer bag just to use

do two walk arounds and look

security are generally safer

and it was never the same.

once every year or two. Even

everywhere, including drawers

than venues with no, or

if you travel a lot, do not buy

that I did not use, to make sure

obviously poor, security

Do Some Research

expensive bags. If your bag

I have not left anything. To be

as criminals and terrorists

There are so many sites that

stands out as being ‘expensive’

completely frank, I do not unpack

are more likely to attack

provide information that it can

then thieves (who are not

my bag unless I am in a room for

be overwhelming and often the

stupid) may target it.

more than a week. A checklist is

I can say that in almost 30

security advice on many sites is

• Stay away from ‘seedy’ parts of town such as redlight districts. • Do not go near political

appear benign, but they can turn violent quickly. • Choose entertainment

the ‘softer’ target. 3. Things not to do:

a good way to make sure that you

• Photography of police and

not particularly good. However,

do not put anything that you do

have accounted for all your items

military infrastructure

if you are travelling overseas,

not want to lose into checked

before checking out.

and personnel is not

look at Smartraveller (http://

baggage! I often show people

smartraveller.gov.au) and the UK

how easy it is to open and close

equivalent (https://www.gov.uk/

2. The most basic rule of travel –

recommended. In many places, photography of

a zippered bag without letting

General Security Advice

foreign-travel-advice). I do find

someone know that you have

1. Always be aware of your

airports or bridges is also

the detail on the UK site is a little

been inside. If you do use a

surroundings. It is not possible

better, but that is probably just a

zippered bag, you need to make

to teach situational awareness

• Do not look too wealthy

personal preference. It only takes

sure the slider (pull tab) does

in this article, but a couple of

– avoid conspicuous

10 minutes to check both and it

not move. The locks on some

pieces of advice:

displays of wealth such as

is good practice to register your

modern bags fix them in place,

• Look around – there is no

expensive clothing, flashy

travel on Smartraveller.

but some soft-sided bags have

hard and fast rule about

jewellery, electronics or

multiple zips. You should fasten

who is acting suspiciously,

displaying large amounts

Insurance

them to a fixed point (like a

but if someone keeps

of cash (bearing in mind,

I often watch the news and

handle) on your bag. You do

looking at you, and like

what we may consider a

see travellers stranded in

not need to use anything fancy

me you are not the most

small amount of money

various places and whining that

or expensive – zip ties work,

attractive person in the

may be a considerable

something has gone wrong and

but I would make sure you can

area, avoid that person. He

fortune to others). Only

the airline is not helping. The

identify your zip tie by marking

or she may only be trying

take with you items that

short answer is to get travel

it with nail polish or similar.

to sell you something, but

insurance! It is not the answer

3. Put a ribbon or coloured

avoid him.

to all problems, but it will help

bag tag on your bag so that

• Know where your exit

in most cases. I also do not

you can recognise it easily.

points are and, where

securitysolutionsmagazine.com

074-077_SSM110 Aviation.indd 75

public buildings, ports, not recommended.

you are prepared to lose. • Watch out for strangers ‘offering help’ or ‘needing help’.

SECURITY SOLUTIONS // 75

13/10/2017 4:45 pm


AVIATION • Try not to travel on your own; it is best to be part of a group. That does not mean a tour group, but if you become friends with people during your travel, stay as a group. Look to join tours provided by your agent

I ALSO DO NOT SUGGEST YOU SKIMP ON PAYING FOR INSURANCE; IT IS AMAZING HOW MANY AUSTRALIANS GET INJURED OVERSEAS AND THEN FIND THAT THEIR BASIC INSURANCE IS NOT SUFFICIENT.

or the hotel. To be blunt, many are rip-offs because they take you to businesses associated with them where they get a cut, but they are usually safer than randomly wandering on your own. An alternative is to offer a cab driver a day rate. Some of the best tours I have had were in cabs

W i I a s

A m o a r i

where I negotiated a day rate. That included a great

drink spiking. If alcohol is

are going and when you can

consist of at least a torch,

tour of San Francisco, so

consumed, the preferred

be expected to return.

a whistle, a bottle of water

try in first world countries

alcohol is beer or wine

as well.

from sealed bottles that are

phone numbers of the hotel

It seems a long list of do nots,

opened in your presence.

and anyone in your group

especially from someone who

programmed in your phone.

says he has had almost 30 years of

• Having said to use cabs, do not hail them in many third

• Drinks (including water)

• Make sure that you have the

and some food.

world countries. It is best to

should only be consumed

use vehicles pre-booked by

from closed and sealed

the hotel rather than hailing

bottles, including in hotel

them in the street. This is

bars. Opened bottles and

your room safe or the hotel

checklist, things I mostly do. Have

important at the airport. Be

glasses should not be

safety deposit box.

a great trip, wherever you go. n

aware that in many places

left unattended at any

the cab can be a shared ride

time. If they are, discard

money exchanges. People

and the drivers may stop to

the contents.

may be observing and

years’ experience in aviation

noting the amount of money

security. As a security executive

you are carrying – go inside

with Qantas, Steve held a number

ID with you always. I do

a bank or convert money at

of senior management roles

not leave my passport in

your hotel.

covering all aspects of aviation

collect people until the cab is full. 4. Local customs: • When you research your

6. Things to do: • You must carry a form of

• Ensure your mobile phone is always charged. • Leave your valuables in

travelling without an issue, but if you look at the article, almost all is common sense and, other than the

• Take care using ATMs or Steve Lawson has over 20

the hotel – I always carry it

• You are responsible for the

at what is acceptable

with me and keep it in my

security of your baggage

to airport operations. He was

behaviour. That may

front pocket. If someone

while checking in or out of

sent to New York immediately

include what is acceptable

does brush against you

a hotel – ensure that it is

following the 9/11 attacks to

dress. I have been in a

and you think you have

under constant supervision.

manage the Qantas response

shopping centre with a

been pickpocketed, do not

police officer who reminded

automatically check one

enough to be the victim of

following the 2002 Bali Bombings.

some Western girls that

pocket for your wallet. That

crime, do not put up a fight.

On his return to Australia, he

they should dress modestly.

just signals where you keep

Do as the person says.

was appointed Security Manager

In many countries, men

your valuables.

• Maintain a small

and undertook a similar role

Freight for the Qantas Group. Since

‘emergency kit’ to hand

2007, he has been a director of

or be alone with them

thieves may pose as police

when staying in hotels

AvSec Consulting in partnership

and, in several places,

officers or private security

in case there is a fire,

with Bill Dent, a fellow former

homosexuality is illegal.

guards. Always ask to

earthquake or other

Qantas security executive. Steve

see identification.

emergency or where

can be contacted via email

electricity supplies are

slawson@avsecconsulting.com or

unreliable. This should

on 0404685103.

should not touch women

5. Drinking and alcohol: • Watch out for ‘tourist drugging’ and other

76 // SECURITY SOLUTIONS

074-077_SSM110 Aviation.indd 76

• Beware that in some places

• If you go out, make sure someone knows where you

A c m o

security from policy development

trip, make sure you look

• If you are unfortunate

T a e t s

securitysolutionsmagazine.com

13/10/2017 4:45 pm

W n R a b

A fu t d


We are a leading player in the biometric identification market by pioneering In Motion Identification (IMID) access, a multimodal verification for instant, seamless, and non-invasive verification. Ask us about advanced features such as multi-modality, speed of identification, our committed accuracy, anti-fraud algorithm, double factor availability, restricted people alerts, simultaneous identification.

The solution is designed for enterprise and can be easily integrated with existing infrastructure. It can be added to any existing door, turnstile or speed stile, and any access control solution. Ask us about high availability, scalability, cyber security and encryption, multi-site management, traceability and auditability, our APIs and ease of integration.

FST Biometrics is a leading identity management solutions provider. The company’s IMID™ product line offers access control through its proprietary In Motion Identification technology. This provides the ultimate security and convenience for users, who are accurately identified without having to stop or slow down. IMID™ solutions integrate a fusion of biometric and analytic technologies that include face recognition, body behavior analytics and voice verification. For more information, please visit http://www.fstbm.com.

With IMID Access, authorized users do not have to slow down, sign in or stop. Rather, they are identified in motion, and granted seamless access to buildings and facilities. Ask us about our rich out of the box functionality, such as visitor management, time attendance, notifications, digital doorman and mobile applications.

074-077_SSM110 Aviation.indd 77

Add-On APAC Innovative Solutions offers converged physical, cyber and communication security solutions. Operating across the Asia Pacific region, we harness advanced products and ground-breaking technologies, helping our customers transform the way they protect people, information and assets. Learn more about us at http://www.addonapac.com. Add-On APAC Australia Pty Ltd info@addonapac.com, 03 9607 8465

IMID is the future of access control. Prefer to take your own conclusions?

Ask us for a product demonstration, and see it for yourself.

13/10/2017 4:45 pm


ACCESS CONTROL

78 // SECURITY SOLUTIONS

078-081_SSM110 Access Control.indd 78

securitysolutionsmagazine.com

13/10/2017 4:48 pm


The

Psychology of Security& PERCEPTION OF SAFETY BY RACHELL DELUCA

The past decade has seen a

past 15 years, this has resulted in

that an increased effort is being

with advanced capabilities such as

dramatic shift to the security

a more security conscious society

made to provide them with this

analytics and facial recognition,

landscape in that security

of educated end-users in both

feeling. If security mechanisms

but because these systems are

concepts and strategies, once

the information and physical

cannot be seen and do not impact

so commonplace and widely

only the domain of professionals,

security environments.

upon a person’s interaction with

accepted and expected, there

his environment in some way,

will be no impact upon the

are now ordinary topics of

With this increased education

conversation in both businesses

and understanding, however,

even if inconvenient or invasive,

perception of safety amongst the

and households alike. It seems

comes criticism and evaluation of

the perception that any action

community. Average users will

these days that everyone has an

the visible protection mechanisms

has been taken to address the

not know that the system they can

opinion on everything, from local

utilised in environments where

perceived increased level of risk

see has been upgraded and has

crime rates, spam protection and

physical security and personal

will not be made and people will

increased capabilities that directly

online privacy to national security

safety are at a premium and

not feel safe. People today need

impact upon their safety, but

and counterterrorism.

are, in fact, demanded by users.

to see and feel that measures are

will definitely notice the absence

Terrorism activity in public

being taken to let the good guys in

of any visible, new security

security and its subsequent

places of mass gathering such as

and keep the bad guys out.

measures that are reactive to

accessibility to everyday users is

stadiums, public transportation,

partly due to advancements in

airports, entertainment venues,

the notion of keeping malicious

reassure the public and provide

online services such as banking,

hotels, restaurants, marketplaces

persons, items and weapons

the perception of safety, visible

social media and the prevalence

and just about every other

out of places of public use is the

security countermeasures have

of personal computing and home

possible type of venue has

fundamental definition of access

become necessary, regardless of

networks. These advances have

generated fear and unease within

control. Unfortunately, security

the actual effectiveness, if any,

generated a need for everyday

the community. The need for

measures that are highly visible

they provide.

users to understand risks

venue owners, managers and

but very common nowadays

pertaining to privacy, identity

governments to address this

such as CCTV, electronic access

theatre, and has been written

theft, hacking, access control and

fear and secure their sites has

control systems and locks, and

about in depth by renowned

overall protection of their data–

intensified; however, the most

entrance barriers do very little

security expert Bruce Schneier,

concepts which readily translate

effective methods of achieving

to placate and reassure people

who notes that security is both

into the physical protection

this may not be visible to the

that any increase in security has

a reality and a feeling. Security

space. Coupled with worldwide

average user, and therefore will

been made. A venue may have

as a reality can be measured

terrorism activity and an overall

have no impact whatsoever on the

spent many thousands of dollars

in a mathematical sense based

increase in media reporting of

perception of safety. The general

upgrading such systems to the

upon risk probability and

security-related matters over the

public needs to feel secure and see

latest, state-of-the-art technologies

countermeasure effectiveness.

This consumerisation of

securitysolutionsmagazine.com

078-081_SSM110 Access Control.indd 79

This psychology of security and

the changing risk climate. To

This concept is called security

SECURITY SOLUTIONS // 79

13/10/2017 4:48 pm


ACCESS CONTROL

TO REASSURE THE PUBLIC AND PROVIDE THE PERCEPTION OF SAFETY, VISIBLE SECURITY COUNTERMEASURES HAVE BECOME NECESSARY, REGARDLESS OF THE ACTUAL EFFECTIVENESS, IF ANY, THEY PROVIDE. THIS CONCEPT IS CALLED SECURITY THEATRE.

Security as a feeling, however,

screening of individuals, ID

cannot be measured and is subject

requirements and checks, and ‘see

to the differing psychological

something, say something’ type

reactions of individuals to

campaigns involving everyday

risk, perceived risk and to

citizens to increase awareness and

countermeasures. Schneier

reporting of suspicious activity.

summarises this perfectly, stating,

Security has become highly visible

“The two things are different: you

and in many circumstances

can be secure even though you do

inconvenient or invasive, as is

not feel secure, and you can feel

the case with bag screening or

secure even though you are not

body scanning of every person.

really secure.”

However effective or ineffective

metal detection being used to

historically, however, the value

these visible methods are, it

screen persons entering such

of an effective countermeasure

cannot be discarded, particularly

cannot be argued that they do not

venues. The reality is that the

compared to a theatrical one

after security incidents such

provide psychological reassurance

likelihood of patrons bringing

is negligible if it is invisible to

as terrorist attacks have

and address some of the fears of

illegal alcohol, glass containers

the average person who now

occurred. The genuine fear

the public. For that reason alone,

and nuisance items such as flares

demands increased security,

and psychological uneasiness

countermeasures that do not

or fireworks into these venues

despite not always knowing what

of the public that occurs now

contribute in any other way to the

is still higher than the likelihood

that actually entails.

around public places of mass

mathematical reduction of risk

of explosives and firearms. The

gathering, air travel, underground

probability, and thereby qualify

consequences of the latter of

and the perception of safety as

train stations, sports arenas,

only as security theatre, are

course are much different, but

people go about their day-to-

entertainment venues and the like

effective. Just as the placebo effect

despite recent attacks globally,

day lives is a crucial aspect

is a very real issue and cannot be

in medical treatment is effective

the likelihood locally has not

of overcoming the effect

left untreated. Society’s perception

and qualifies as a treatment in its

statistically increased. In fact, new

that terrorism has on the

of safety and security in day-

own right.

risks may be introduced as a result

consciousness of a community.

of the implementation of security

The message globally after any

The value of security theatre

to-day lives has been shattered

Security theatre is not just

The psychology of security

and people’s innocence in such

being performed at airports, or

theatre treatments, such as health

incident or attack is unanimously

matters has been lost. This in turn

in response to actual incidents,

and safety concerns for elderly or

that people will not live in fear

has led to the increased security

but is now being used to satisfy

young patrons standing in long

and will not change their way of

awareness of everyday citizens

governments, board members

queues for hours in excessive heat,

life. Security theatre measures

who now demand to be reassured

and event organisers that efforts

or the increased risk of violence

and their capacity to provide

that they are safe.

have been made to reduce the

and aggression amongst patrons

reassurance to the general public,

occurrence of risks, which in

frustrated with the inconvenient

reducing anxiety and fear during

that after the September 11 attacks

turn impacts upon the likelihood

and invasive search tactics.

times of great uncertainty, means

in the US, several airports utilised

of litigation and accusations

National Guard troops to stand

It has been well documented

Just as the presence of

it is in fact a valid and valuable

of negligence or complacency.

essentially unarmed National

security strategy. The changing

guard at security checkpoints to

Changes to access control

Guard troops at US airports

risk climate and the increased

provide a highly visible presence

measures at rock concerts,

following the September 11

fear within the community that

to all airport users. What

festivals and stadiums is a great

attacks provided reassurance

increases with every incident

subsequently came to light and

example of how the performance

to the public, the value of the

that occurs will ensure that

was widely reported upon in 2002

of security theatre has become

access control countermeasures

psychological security treatment

was that none of those officers

mainstream, with little or no

seen today is in the visual

becomes increasingly common,

were carrying loaded weapons

evidence of providing any tangible

deterrence, public reassurance

and may become just as

and that their guns were empty.

risk mitigation.

and reduction of liability. The

important as traditional security

operating costs of security theatre

countermeasures in days to come. n

The effectiveness of their presence

Where once the focus of

was purely as a visual deterrent

security at such venues was to

strategies that treat perception

and to reassure frightened

ensure a patron had a valid ticket

rather than reality can be quite

passengers that action was being

and was not bringing any illegal

high; in many cases just as high

taken to prevent such an attack

alcohol or glass containers into

as the costs of treating actual

Security Consultant with Arup,

from happening again.

the facility, the focus now is on

risk by upgrading existing

located in Melbourne, Australia.

explosives and weapons. This

systems with more effective

She has over 17 years of experience

been an overall increase in visual

means longer queues, additional

technologies or implementing

in the security industry. Rachell can

presence of uniformed security

manpower, increased baggage

new countermeasures with

be contacted via email

personnel, baggage screening,

searches and, in some cases,

measurable effect. As shown

rachell.deluca@arup.com

Since that time, there has

80 // SECURITY SOLUTIONS

078-081_SSM110 Access Control.indd 80

Rachell DeLuca is a Senior

securitysolutionsmagazine.com

13/10/2017 4:48 pm


LIKE US ON FACEBOOK facebook.com/ssmaust

078-081_SSM110 Access Control.indd 81

13/10/2017 4:48 pm


PROFESSIONAL DEVELOPMENT

82 // SECURITY SOLUTIONS

082-085_SSM110 Professional Development.indd 82

securitysolutionsmagazine.com

13/10/2017 4:53 pm


PROTECTING

CEO THE

BY AMI TOBEN

In recent years, quite a few

two general problems – one minor

an unfortunate necessity for

ominous tales about it, it is not

articles have been published about

and one major.

people under a great deal of risk

surprising that lots of people

The benefit of the doubt can

believe corporate interests,

CEO protection and how much

The minor problem is that the

money different corporations

figures they show for corporate

possibly be given to those who

wealthy individuals and private

spend on it. Forbes might have

expenditure on CEO protection

do not understand the subject

security must, by definition, be up

been the first to get this trend

all come from the Securities and

of security risk management,

to no good. So, a few things should

started with an article first

Exchange Commission (SEC), since

but what is inexcusable are

be clarified:

published back in August 2008

publically traded corporations

the common implications that

1. The job of private security

(Kirdahy, 2008). CNBC discussed

in the US have to disclose annual

the executives who receive this

professionals is to protect

the issue back in 2010 during the

security spending that exceeds

type of protection only do so

their clients and their families.

US healthcare debate (Coombs,

$10,000. The issue here is that

out of paranoia or delusions of

Many people might think that

2010), and Fortune Magazine put

much, if not most, of the spending

grandeur (or both), and that there

the CEOs of major corporations

out a piece about it in January

on executive protection comes

is something sinister about the

and billionaire tech moguls

of 2015 (Zillman, 2015). But the

from private accounts or family

security industry.

are somehow impervious

champion in this field has to be

offices that are owned by the

Business Insider, which focuses

executives (and therefore do

have seen in this respect was

well-secured fortresses. But I

primarily on the tech sector, and

not get to the SEC). This means

the recent one by The Register

can tell you from experience

seems to enjoy the idea of ranking

the articles only give a partial

(McCarthy, 2017), which goes

that threats of physical harm

CEO security expenditure (Carson,

(and in some cases, grossly

so far as to rank executives on

(which are far from rare)

2016). It will occasionally even

underestimated) picture of the

a paranoia scale (nominating

affect these executives pretty

pick on specific executives, like

actual spending. I call this a lesser

Mark Zuckerberg for first place).

much the same way they affect

Sergey Brin (Stone, 2015) and Evan

problem because it results from

This piece was so preposterous,

anyone else. Readers can think

Spiegel (Carson, 2017).

an insufficient amount of data,

and so intentionally insulting to

whatever they want about

leading to wrong conclusions –

executives and to the protection

the ‘lifestyles of the rich and

which is an innocent mistake.

industry, that I felt I simply had to

famous’, but these people have

say a few things.

jobs, families and kids, and

The subject of corporate executive protection seems to have struck a certain chord with the

What I describe as a major

Perhaps the worst article I

to threats as they sit in their

general public in recent years and

problem is the not-so-innocent,

this, in my opinion as an industry

false claims about the protection

idea that there is something

like everyone else. Security

professional, is a great thing. But

industry and the executives

surreptitiously sinister about the

professionals are simply there

unfortunately, pretty much every

that employ it. It usually comes

high-level security that billionaire

one of the previously mentioned

down to security being depicted

executives receive. To a certain

articles (there are many more

as an ostentatious perk for

degree, I get it. With so many

require putting anyone else at

than those mentioned) has at least

corporate elitists, rather than

movies and TV shows spinning

risk. The best way to protect

securitysolutionsmagazine.com

082-085_SSM110 Professional Development.indd 83

First, I want to address the

they worry about them just

to keep them safe. 2. The security of clients does not

SECURITY SOLUTIONS // 83

13/10/2017 4:53 pm


PROFESSIONAL DEVELOPMENT clients is to ensure that the

else. Working in dark suits,

measures, and many resisted it as

claims about the industry and

entire area is safe and secure

maintaining a low profile or

long as they could.

the executives who make use

– for everyone. But what about

operating covertly does not

cases where someone wants

suddenly make an operator less

individuals become so important to

making it less likely that anyone

to harm the client? Well, there

of a good, moral person. You do

their organisations, and since they

from the industry would be

too, the best way to protect the

not hear me talk about this all

suffer from such elevated levels

willing to collaborate and share

client is either to avoid the area

that often, but values such as

of risk, they had to accept their

their knowledge.

altogether or to ensure that

sacrifice, honour and service

fate and employ quite formidable

There is no shame in not

the area is safe and secure for

are extremely important

protective measures. The irony in

knowing something. Everyone

everyone – including those who

to those in the protection

the above articles is that though

is ignorant about most things

want to do harm. On numerous

industry. And the fact of the

they try to hype up and inflate

there are to know in the world.

occasions, I have had to jump

matter is that mean-spirited or

the subject of security, the reality

The awareness of one’s absence

in between clients, or members

overly aggressive individuals

is that many executives receive a

of knowledge is what is known

of the organisation I was

simply do not fit into this type

level of protection that far exceeds

as Socratic Ignorance, and is the

protecting, and those who were

of environment.

what people read.

cornerstone of any honest attempt

However, since these

of it only deepens the divide –

trying to harm or otherwise

As for the executives who employ

harass them. Harming those

security professionals, many

things (even entertaining at times)

makes it all the more tragic when

who want to harm clients is

people tend to assume that these

comes from seeing the contrasts

media outlets claim to know more

an absolute last resort – and

individuals must live in a bubble

that exist within the lives of

than they do, insult those who do

an extremely rare one at that.

of security, or otherwise lead

many executives. For example,

have the knowledge and ensure

Physical harm to anyone almost

some kind of high-tech, James

some of these individuals will go

that they – and anyone they reach –

always leads to bad press and

Bond villain lifestyle. Hollywood

unprotected to their children’s

will remain in a state of ignorance.

damaged reputations, which

has definitely played its part in

school plays or to community

no one wants. The ultimate

perpetuating this notion, but

centre functions, but at other

important as this deserves to be

goal is to make sure that no

the funny thing about this hype

times be surrounded by advanced

better represented, and readers

one gets hurt on either side.

is that the reality (or at least

security technology and covert

who try to find out more about it

Many of the worst stalkers who

everything I have seen in over a

protection that exceeds what is

deserve to be better informed.

threaten and harass executives

decade) would both disappoint

seen in most Hollywood movies.

are people who suffer from

and completely blow your mind

If readers happen to find an irony

references, email admin@

mental health disorders. Police

at the same time. I say disappoint

or even a paradox in any of this,

interactivemediasolutions.com.

officers will advise that all it

only in reference to Hollywood’s

then welcome to the crazy world

au n

takes in many cases is to give

glamourised depictions. In reality,

we live in.

the person some attention

it is actually kind of reassuring

and sympathy, and I have

to discover that some of the most

been involved in cases where

famous and influential people on

security professionals resolve

the planet lead largely normal

very troubling situations with

lives. It may surprise many people

a long, friendly conversation.

to discover that multi-billionaires

In some cases, it is the security

– some of whom head the largest

professionals who help the

and most important Silicon Valley

person get back in touch

corporations – drop their kids off

with their mental health

at school in the morning, get their

professional, helping them to

coffee at Starbucks and go home to

get their lives back on track.

their families at the end of the day,

3. The overwhelming majority of operators in the protection

just like everyone else. And though there are those

One of the most interesting

VALUES SUCH AS SACRIFICE, HONOUR AND SERVICE ARE EXTREMELY IMPORTANT TO THOSE IN THE PROTECTION INDUSTRY. Much of what I try to do in

to gain more knowledge. This

An industry as interesting and

For a full list of

Ami Toben is the director of consulting, training and special operations for HighCom Security Services. He is one of the pioneer developers of the terrorist activity prevention, surveillance detection and covert protection fields in Silicon Valley. Trained in Israel, Japan and the US, Ami has over 15 years of military (IDF) and private sector security experience. Currently based in the San Francisco Bay Area, Ami has been providing special

industry are honest, moral

who do indeed enjoy basking

my writing is share, demystify

protective services to Fortune 500

people. Most operators are

in their fame and fortune, most

and better communicate what

corporations, foreign governments,

military veterans, former

executives I know prefer to

operators do in the private

foundations, political organisations

or current law enforcement

simply be left alone to live a quiet

security industry, so that non-

and wealthy individuals. Ami’s

officers, firefighters,

and normal a life. I can also tell

security professionals can better

new book, Surveillance Zone:

paramedics and former

readers that most of the CEOs that

understand it. Popular articles

The Hidden World of Corporate

government agents. They

are featured in the above articles

about executive security and close

Surveillance Detection Covert

have families and children

were extremely reluctant when

protection can be a great thing,

Special Operations, is available

and friends, just like everyone

it came to implementing security

but making purposely insulting

now from amazon.com

84 // SECURITY SOLUTIONS

082-085_SSM110 Professional Development.indd 84

securitysolutionsmagazine.com

13/10/2017 4:53 pm


For more information, please contact

Jeff Park on 0424 185 880

082-085_SSM110 Professional Development.indd 85

13/10/2017 4:53 pm


FEATURE

SECURITY & RISK MANAGEMENT: THE NEXT EVOLUTION – APPLYING THE MULTIPLEX VIEW TO RISK MANAGEMENT There is no doubt that the field

BY DR GAV SCHNEIDER

This article proposes that the

hard risks was often assigned to a

whereby hard-risk management

of security risk management has

need for security risk managers

senior manager due to the level of

activities are broken up into various

evolved to become a vocation

to become more rounded risk

accountability associated with it.

categories as organisations have

more so than a function and

practitioners is crucial and that

This has changed over time, and

grown and expanded, is now the

it is now widely recognised

a more holistic view to risk

in the current economic climate

common reality, not the exception.

as a specialist area requiring

management, referred to as the

less senior levels within the

Whilst in principle silos for large

extensive knowledge, skills and

multiplex view, is more critical

organisation have been charged

organisations are a necessity, when

experience by practitioners to

today than ever before.

with this responsibility, or it has

it comes to managing hard risk, the

been assigned as an additional

reality of issues such as duplication

succeed. Operational settings that, for example, include

Context

responsibility to an existing role.

of activities, denial of incidents and

such scopes as safety, security,

The harsh consequences of security

The core skills of a hard-risk

risk exposure, transfer of blame

emergency response and disaster

incidents resulting from crime

practitioner would commonly

and lack of authority all become

management invariably require

(internal and/or external), fraud

include appropriate skills,

potential issues. These issues are

an inherent level of technical

and terrorism, including death,

experience and expertise to:

highlighted in the various versions

expertise by the practitioner

business disruption, reputational

• identify the potential for

of workplace health and safety

to fully understand and thus

damage, fines and jail time, are

internal and external threats

legislation which, in most cases,

deal with the risks associated

ever-present realities for modern

and hazards leading to

does not differentiate between the

within these environments. As

business. The ability to subrogate

unwanted events

employees and subcontractors,

organisations grow, so have

and de-risk via insurances is no

a diverse range of organic

longer as robust as it once was

threats or hazards manifesting

levels of an organisation (low level

organisational and corporate

based on the evolution of non-

into incidents, as well as the

worker right up to senior executive).

structures. These structures have

payment clauses for regulatory

potential consequences that

The need to move away from the

become so diverse and range

non-compliance and other

may occur as a result

decades-old checklist-type hard-risk

from no direct allocation of safety,

complexities. The ability to de-risk

security, health and emergency

via subcontracting has now been

and mitigation systems to

by most organisations has reached

management (SSHE) activities

legislatively closed off and it is now

eliminate or reduce the

epidemic proportions.

to mass duplication. There is

well established legal precedent

likelihood of incidents occurring

the ongoing reality that no one

that all parties (top to bottom)

model can be applied across

involved in the supply chain are

reactive control plans which

The Need for a Different Approach

different sized organisations

responsible for the identification,

detail actions to be undertaken

The complex mapping, rating and

that are in different sectors,

mitigation and management of

to treat threats or hazards,

referencing systems that proliferate

operating in vastly different

foreseeable risk in a reasonably

prevent incidents, or respond

through the hard-risk management

risk environments. However, in

practicable manner.

should they occur

world have actually reached a point

many cases, organisations are

SSHE activities very often

• forecast the likelihood of such

• develop and apply management

• design, develop and apply

• monitor, review and update

and places the responsibility at all

management approaches utilised

where they are now no longer

suffering from wastage due to

include operating areas where

these forecasts, assessments,

practical tools for risk management,

duplication and inefficiency or

physical loss, including death,

plans and procedures on an

but merely academic routine and/

intolerably high-risk exposure

injury, asset loss and adverse

ongoing basis in response to

or just another additional non-

due to lack of resource allocation

environmental impact, occur.

events or reviews.

profit, non-performance enhancing

to hard-risk management. In

These are referred to as hard

Hard-risk practitioners quite

function that organisations ‘have to’

many cases, organisations are

risk, where outcomes can be

literally save lives as core functions

do. In addition, the neglect of hard-

exposed to both of these realities

measured and hopefully forecasted

of their roles and the positive

risk education for most of today’s

simultaneously, specifically if

so that elimination, preventative

impact of their contribution is

business leaders, who are often

they have become siloed based on

measures and/or mitigation can

often overlooked in the day-to-day

the product of academic education

size, specialisation, management

be achieved. The responsibility

operation of an organisation. The

which specialises in conventional

control or geographic complexity.

for the management of these

evolution of organisational siloing,

modelling ,has contributed to

86 // SECURITY SOLUTIONS

086-089_SSM110 Article 4.indd 86

securitysolutionsmagazine.com

13/10/2017 5:10 pm


two of the biggest issues facing

improving technology and people

and knowledge that is not

hard-risk managers to transcend

organisations from a hard-risk

management systems, some

tapped as a result of corporate

organisational and psychological

perspective today, namely denial

fundamental principles are missing

segregation and legacy, the

barriers to become generalist

and reactive approaches based

in the way management make

creation of internal ‘kingdoms’

practitioners is an evolutionary

on ignorance and negligence. It is

things happen. Unfortunately, all

and the biggest problem – lack

change in the way this complex

human nature to avoid systems

too often, senior executive teams

of internal cross-silo forums

area is handled. In this day and

that either do not show a direct

believe an issue has been resolved

and structures to leverage

age, employers demand more from

reward, have a consequence which

by creating and attempting to

capabilities and sharing.

practitioners and require multi-

is deemed harsh enough to force

enforce a policy which has no real

This often comes down to

skilled and capable professionals.

compliance or have an effective

chance of being embraced at ground

human resources based

Many hard-risk managers are

‘policing system’ in place to ensure

level and thus it becomes a purely

limitations tied back to key

happy in their specific vocational

compliance. One only has to look at

academic exercise in futility. In

performance indicators, which

area of expertise and, whilst their

traffic and road safety and imagine

fact, the organisation may make

sometimes create performance

portfolios may include other areas,

the carnage that would ensue

itself more vulnerable by having

measurements that are silo

tend to stay specialists within their

without a set of rules that had harsh

a policy but not adhering to it. A

specific and ignore the core

comfort zone.

enough consequences for non-

side effect of policy setting without

objectives of the organisations

compliance and no enforcement

effective implementation and take

on a macro level.

to apprehend offenders. This is

up results in the executive believing

not a unique issue to first world or

that hard risks are under control,

is important to know when

with respect to risk management.

emerging markets, but the focus of

middle managers being frustrated

external help is required and

A potential way to achieve this is to

hard-risk management based on

that there are insufficient resources

how it should be utilised. Not

adopt a multiplex view to the way

reactivity, sentiment and anecdotal

to implement and lower level never

only are external assessments

issues are diagnosed, rated and

behaviour seems to be the driver.

even being made aware of issues

considered to be more impartial,

managed. Even if evaluation tools

and or solutions.

but they bring fresh eyes to

such as the AS/NZ ISO 3100:2009

issues that may have been taken

Risk Management Guidelines and

for granted as being ‘just the

the numerous other risk matrices

cases, this stems from the following

Identified Areas of Opportunity

way it is’. The challenge is to act

are used, a multiplex view is often

core problems:

This reality is not new ground and

once solutions are identified

not applied. It should be noted that

• consistent viewing of hard-risk

many executives and managers live

and not be demotivated by what

while most tools and systems are

management as a grudge spend

with this ongoing problem. So, what

may appear to be a mountain

endorsed and approved, they should

area

can be done about these issues?

of issues with no clear start, end

be viewed as exactly that – tools and

Here is a brief list of actions and

and implementation approach.

enablers, not a ‘magic bullet’ for all

Limitations on the way risk is viewed continue to be a propagator for reactivity and denial. In many

• failure to apply proactive

• Leverage external resources – it

It would be fair to surmise that organisations want to improve their operational performance

budgets based on a dynamic

concepts, which could each be an

risk-based approach

article in their own right:

resource for mitigating risk

on these tools, they could be seen

• Educate at all levels –

is a ‘switched on’ staff and

as barriers to more comprehensive multi-dimensional approaches.

• lack of understanding of actual

• Invest in people – the biggest

that is wrong. Due to the reliance

versus perceived risk from a

understanding hard-risk

contractor base. People need

hard-risk perspective

management in context at all

to be motivated using both

levels of an organisation is

stick and carrot approaches

The Mulitplex View

critical as a starting point. One

in a balanced manner to gain

A multiplex approach involves

of the simplest ways to do this is

their buy-in, otherwise systems

viewing an organisation as a

get everyone talking the same

will fail and good-intentioned

multi-dimensional structure

hard-risk language and not

solutions will go nowhere.

and evolving methodologies to

get too caught up in a silo or

• Incorporate technology – it is

a broader paradigm aligned to

• inefficient use of internal resources • inefficient use of external expertise • lack of understanding of internal limitations • lack of alignment of hard-risk management understanding

specific jargon. • Assess and understand realities

important to find the balance

the organisation’s key objectives.

between human trust and

This will be illustrated and explained below.

at senior executive as well

in a dynamic way – people tend

having sufficient checks and

as lower levels (middle

to want to ignore bad news and

balances. The battle ground

management mayhem)

as such it is often hidden from

of the future is in cyberspace

2 level evaluation

the people that need to know

and organisations face ongoing

In a traditional risk management

until a crisis occurs. Regular

vulnerability in managing the

system, risk hazards and threats

• the human factor

health checks using internal and

hard-risk realities of data and

are often rated using tools such as

• the use of technology (in terms

external resources is critical for

Internet Protocol protection,

a 5x4 matrix focusing on the core

more robust decision making.

along with the physical safety

measurement tools of likelihood and

and wellbeing of their staff.

consequence, which may look like

These issues are further complicated by two realities:

of limitations or over-reliance) While there is no doubt that great strides have been made in

securitysolutionsmagazine.com

086-089_SSM110 Article 4.indd 87

• Leverage internal resources – often there is internal expertise

The requirement for risk and

the following:

SECURITY SOLUTIONS // 87

13/10/2017 5:10 pm


FEATURE

MATRIX

experts and gain trust and

Consequences

Likelihood

Minor

Moderate

Major

Extreme

Almost certain

Moderate

High

Extreme

Extreme

credibility within and without their organisations. 4. Know when to ask for help

Likely

Moderate

High

High

Extreme

Possible

Moderate

Moderate

High

High

help them achieve their goals.

Unlikely

Low

Moderate

Moderate

High

An unfortunate reality is that

Rare

Low

Low

Moderate

Moderate

when on the inside expertise

4 level evaluation A more detailed approach may add other variables such as exposure, which may look like this:

5 level evaluation Once variables such as legislative compliance, industry standards and organisational policy are superimposed, the diagram may look like this:

and use external consultants to

may be discounted and the only way to achieve real results is to de-risk by using external and credible resources. 5. Be flexible and adaptable and learn how to sell ideas

Target Attractiveness

Likelihood

Likelihood

Likelihood

in a collaborative and

Exposure

Target Attractiveness

Exposure Policy

Industry Standards Legislation

Consequences

Consequences

Consequences

well-structured way up the organisational tree. 6. Design solutions based on benefits such as cost saving, risk reduction and strive to apply attribute measurables to solutions. In most cases, good solutions are

6 level evaluation Then the requirements of understanding the organisation and people itself become issues. These include aspects such as organisational goals, history and culture. The diagram may then look like this:

management approach stem from

the product of all the above, with

striving to eliminate denial via

many other variables interwoven,

education and ongoing assessment

such as timing and personalities of

and implementing a proactive

the role players and stakeholders.

approach which requires more

The goal of all professionals

than just paperwork and lip

should be continuous

service. In essence, the driver

improvement of their own

should be a move to change,

levels of knowledge, skills and

improve and sustain an enhanced

experience, with the ultimate goal

level of security and safety

of adding value to the organisation

Exposure

culture. By aligning hard-risk

they work for. n

Policy

management to culture and

7 level evaluation The next level has to include some of the unfortunate realities which pose challenges to any solutions, such as resistance to change, limited budget and denial, which may make the diagram look like this:

Goals Goals History History

People & Culture

Target Attractiveness

Exposure Policy

Target Attractiveness

Likelihood

Likelihood

People & Culture

Industry Standards

Industry Standards

Legislation

Legislation

Consequences

Consequences

Budget Denial Resistance

When risk is being assessed

core organisational objectives,

For a full list of

it is truly possible to turn risk to

references, email info@

opportunity. To evolve to this level

interactivemediasolutions.com.au

of thinking, it is advised that hard-

Dr Gav Schneider is an

risk practitioners embrace some

acknowledged leader in the field

of the following:

of human-based risk management

1. Learn about the organisation

and the psychology of risk. He

of the cube look great, it does not

that they are working for and

is a leading academic in his field

and evaluated on this basis,

destabilise and cause discontinuity

its core strategic goals and

and heads up the postgraduate

solutions that may actually work,

on another side. Of course, there

keep that first and foremost as

Psychology of Risk Program at

be acceptable and gain budget and

is the band aid solution of taking

a fundamental of any activity

the Australian Catholic University

traction become closer to reality.

a sticker off and sticking it over

or solution they scope.

(ACU). Dr Gav is the CEO of the

However, the next paradigm

the piece that does fit, which may

2. Align methodology to existing

Risk 2 Solution group of companies,

of reality has to be taken into

work for a while, but it is back to

recognised tools and guidelines

which focus on delivering

account, which is the limitations

the same problem if the sticker

such as the AS/NZ 31000:

innovative and cutting-edge

of expressing any matrix in

peels off.

2009 Risk Management

solutions in the risk, intelligence,

Guidelines and apply the

safety, security, medical and

multiplex approach.

emergency response sectors.

two dimensions. Think of the organisation as a puzzle cube. The

Summary

goal is to ensure that by moving

In summary, the core ingredients

one piece, which makes one side

to implement a better security risk

88 // SECURITY SOLUTIONS

086-089_SSM110 Article 4.indd 88

3. Continue to educate themselves so that they become qualified

Visit www.risk2solution.com for more information.

securitysolutionsmagazine.com

13/10/2017 5:10 pm


KeyWatcher is a reliable and extremely easy to use electronic key management system, designed to prevent mismanaged, misplaced, or stolen keys. KeyWatcher eliminates outdated metal boxes, unreliable manual logs and messy key identification tags utilising a computerised storage cabinet. The system releases keys only to the individuals with correct authorisation, recording each user transaction and providing total system accountability.

KEYWATCHER SYSTEM OFFERS l Up to 14,400 keys and 10,000 user per site l “Site” concept uses a common database l Numerous high level interfaces for access control, contractor management and vehicle fleet systems l Longer user IDs can be up to any 6 digits, plus a 4 digit PIN l Bright 7” full colour, touch screen l “Key Anywhere” allows keys to be returned to any KeyWatcher Touch within a site l On-screen guides for users, along with voice commands

Available in Australia through: AST Pty Ltd T: +61 2 8020 5555 | M: +61 417 089 608 | F: +61 2 9624 7194 E: di@astpl.com.au | www.astpl.com.au

086-089_SSM110 Article 4.indd 89

13/10/2017 5:10 pm


SECURITY STUFF C O N T E N T S

SPOTLIGHT

PROFILE

SpotBox4K

102

Boon Edam

110

092

Dahua

094

Hikvision

104

Anixter, Bosch

110

Security Distributors Paxton 096

Dahua

105

Balga

111

Sting

106

Dahua

112

LSC Security

108

Leda

113

Uniview

108

ISCS, N.A.S.A.

Ring

109

090-091_SSM110 Security Stuff.indd 90

SHOP TALK

Boon Edam

90 // SECURITY SOLUTIONS

STid

PRODUCT SHOWCASES 098

113

securitysolutionsmagazine.com

13/10/2017 5:53 pm


securitysolutionsmagazine.com

090-091_SSM110 Security Stuff.indd 91

SECURITY SOLUTIONS // 91

13/10/2017 5:53 pm


SPOTLIGHT

BOON EDAM COMBINES BEAUTIFUL ENTRANCES WITH HIGH SECURITY FOR EXCLUSIVE RETAIL STORES A

rchitectural revolving doors that seamlessly blend beauty and class with high levels

of security are being introduced to Australasia by entrance security specialists Boon Edam, for high-end and exclusive retail stores and shop fitters. A custom-designed and manufactured Boon Edam Tourniket revolving door was recently installed at the iconic Fortnum and Mason building in St James, London – the same type that was used in Melbourne’s Rialto Towers regeneration project. Tailored features for Fortnum and Mason included an all handmade timber door, with power assisted drive and collapsible door-set, while tailored features for Rialto included an increased height of 5m, the tallest in the Southern Hemisphere, and custom-made Tournex dual motors to control the 1.3t doors. “The Tourniket model is readily available locally, and Boon Edam is always open to working on customising our doors to suit particular applications and needs,” says Boon Edam Australia Managing Director, Michael Fisher. “High-end and exclusive retail stores and shop fitters operate in a challenging environment where they have a strong need for a beautiful entrance and a similarly strong need for high levels of security,” he said. “Retail stores that can benefit

92 // SECURITY SOLUTIONS

092-097_SSM110 Product Spotlight.indd 92

Boon Edam’s custom designed revolving doors for Fortnum and Mason London, left – the same type that has been used locally on Melbourne’s Rialto Towers regeneration project where they installed the tallest doors in the Southern Hemisphere, standing 5m tall, right.

securitysolutionsmagazine.com

13/10/2017 5:46 pm


a height of 2300 mm under the

• Weatherproofing

regeneration project, where the

THE CUSTOM-MADE TOURNEX DUAL MOTORS HAD TO BE INSTALLED AT THE TOP AND BOTTOM TO CONTROL THE DOOR’S WINGS AND COMPLY WITH AUSTRALIAN SAFETY STANDARDS

5m high 1.3t doors provide a

and Mason, these added benefits

of staff, but has a smaller

striking focal point of the $100m

are a worthwhile bonus, but their

footprint and is ideally suited to

regeneration project for the Rialto

key focus is on getting the aesthetic

smaller operations.

building, managed by Built, to

‘just right.’ Boon Edam’s custom-

from custom-designed revolving

modernise the building and extend

made Tourniket featured bespoke,

door solutions include those that

it by wrapping new buildings

handmade timber and brass, power

Service and Maintenance

sell jewellery, watches, clothing,

around its base.

assisted drive, collapsible door-set,

Although revolving doors

glazed, curved walls, rubber safety

generally enjoy excellent energy

canopy. It features glazed curved walls to the underside of canopy with rubber safety buffers at the ends and wooden cross-detailing.

Rialto, Melbourne The same technology, customised for an entirely different application has already been proven in service in Melbourne’s Rialto Towers

accessories and other high-end

The custom-made Tournex

• Biometric readers • StereoVision 2 antipiggybacking technology • Attack resistance, from vandalism through to ballistic protection • Night locking The Tourlock 180+90 has a high throughput and can facilitate two-way secure traffic. The Circlelock handles lower volumes

fashion items as well as high-end

dual motors had to be installed

buffers and internal lighting in the

conservation and security

restaurants and cafes.”

at the top and bottom to control

canopy. The building’s architect

benefits, this can be further

the door’s wings and comply

even provided samples of the

extended by sensible maintenance

their project an additional element

with Australian safety standards,

timber and brass to ensure the

and upgrading where required.

of class, with security and energy

which specify that the door needs

door matched it perfectly,” said

benefits can also benefit from doors

to be able to stop instantly if an

Mr Fisher.

such as the Tourniket, which can

emergency sensor is triggered.

be easily integrated into existing

Boon Edam worked closely with

Full Security Suite

deliver benefits not only with

architecture or designed to specific

the project engineers to integrate

The Tourniket revolving door used

OEM equipment, but also wider

requirements.”

this dual motor system into the

by Fortnum and Mason and Rialto

brands that can be both improved

building’s existing infrastructure.

is just one of a complete security

in performance while also having

suite that Boon Edam supplies

their durability extended,” says

to Australia and New Zealand,

Mr Fisher.

For exclusive London-based

Benefits for the retail industry

ranging from security speed gates

In addition to its own specialist

retailer Fortnum and Mason, Boon

Benefits of revolving doors for

to revolving doors with increasing

staff, Boon Edam has joined forces

Edam designed an authentic and

exclusive retail stores extend

levels of security.

with door maintenance leaders

bespoke revolving door that was

beyond their sleek appearance and

entirely hand-made with mid-

added security. They also assist in

and Circlelock are the highest

manufacturer Auto Ingress Pty

dark stained oak timber, power-

maintaining a pleasant climate by

security doors in the range, for

Ltd in Australia, and with leading

assisted drive, and an additional

not allowing too much inside air to

applications like data centres,

New Zealand door installation and

collapsible function to allow for

escape, or outside air to enter each

cash centres, military or law

service company Commercial and

wheelchair access, emergency exit

time someone enters the store.

enforcement, where valuable

Industrial Doors.

“Shop fitters looking to give

Fortnum and Mason, London

use or for passing through with bulkier luggage. A revolving door was also the

Additionally, revolving doors like the Tourniket reduce the amount of debris, rubbish, dust,

“Our maintenance services – which are conducted to the global standards of Boon Edam – can

Boon Edam’s Tourlock 180+90

information, personnel or items are contained within the facility. Both of these products are ideal

and automatic sliding door

Boon Edam’s service and maintenance helps to keep the equipment compliant with

preferred option for overcoming

smoke or airborne particulates

for when you want to know that

Australian Standard AS:5007,

any inclement weather, as it

that end up inside the store,

only one person has entered your

which requires doors to be

decreases the amount of cold

which further helps to maintain

building at a given time, and that

inspected every three months.

air that enters their Fountain

a pleasant atmosphere inside –

person is exactly who they say they

Restaurant during use.

something of high importance to

are. The high security door ranges

Michael Fisher at michael.fisher@

exclusive retailers.

can be customised to individual

boonedam.com or visit www.

needs, with features such as:

boonedam.com.au n

The finished product has an internal diameter of 2400mm and

securitysolutionsmagazine.com

092-097_SSM110 Product Spotlight.indd 93

“For companies like Fortnum

For Further Information contact

SECURITY SOLUTIONS // 93

13/10/2017 5:46 pm


SPOTLIGHT

DAHUA DRONE X820 GUARANTEES PUBLIC SAFETY

s one classical

What is Industrylevel drone?

such as power tower inspection,

they can put real-time audio and

forest fire detection, public event

video streaming on the screen of

management, security supervision

a control center, thus providing

of drones, consumer-level and

over long bridges, detection

information for police or security

great now fly to ordinary peoples’

industry-level. Dahua Drones

aid for police forces, inspection

companies to solve the problem on

homes”. UAV (Unmanned Aviation

belong to the latter.

of high speed traffic and other

site, such as directing crowds for

illegal incidents. It means that a

evacuation via the correct route or

A

Chinese poem goes, “The swallows once in mansions of the

Vehicle), more commonly known as

There are in fact two levels

Consumer-level drones

drones, are just like those swallows:

are mainly designed for use

very different set of functions are

sending out a medical team to the

once only found in military

in aerial photography and

required for industry-level drones,

location where it is needed.

applications and war films, are now

personal shooting/ sharing for

including maintaining a high level

widely used in daily life. Military

entertainment. Naturally they

of stability and safety, intelligent

Application scenarios

UAVs now are vastly outnumbered

are pretty straightforward to

control, adaptability to different

Dahua Drones are easy to operate

by civilian UAVs, whose use is

operate and can take easily

applications and environment, long

and use in situations such as the

expanding to commercial, scientific

editable images/videos, often with

distance mapping abilities, carrying

following scenarios.

and even recreational realms. What

automatic beautification and other

capacity, and long battery life.

distinguishes a Dahua Drone from

entertainment functions.

other Civilian UAVs is the mission it

This contrasts with industry-

The current industry-level

Power Tower Inspections

drones boast the capacity to

Often located in mountainous areas,

is born with: to guarantee safety

level drones that are built for

transmit images at up to 10km, and

power towers are hard and risky to

from above.

serious public security mission

with access to multi-VMS platforms,

reach. Dahua Drones can enhance

94 // SECURITY SOLUTIONS

092-097_SSM110 Product Spotlight.indd 94

securitysolutionsmagazine.com

13/10/2017 5:46 pm


the efficiency while making it less

information collected is accessible

coverage for the entire marathon.

to resist the wind (up to Windspeed

labor-intensive.

to all mainstream VMS platforms. In

Each drone could take care of 6 km

7.0), and are fully capable of

short, it is a very powerful assistant

range by patrolling back and forth,

maintaining highly accurate

for the police.

staying still a few minutes at each of

suspension over the river and

the 6 patrol points 1 km apart to have

providing stable visual information.

Benefitting from x30 optical zooming ability, Dahua Drones can capture HD images at a long distance,

a good look at the situation under.

ordinary drones have encountered

Public Security Management

as a result of electromagnetic

At public events like concerts, sports

above ground to produce sufficient

Inspection of High Speed Traffic

interference from high-voltage

meetings and marathons, a Dahua

clarity to effectively identify mass

In daily patrols, when suddenly

power grids and visual mistakes

Drone can provide special security

casualty incidents such as stampedes

encountering the illegal behaviour

by people operating from afar.

surveillance from up high because

or a traffic accident.

of a driver, Dahua Drones can

The thermal camera they carry

of its multiple flying modes (circling

can accurately locate abnormally

around and tracking down the target),

of drones can also be applied to

and keep the record as evidence.

hot spots in cables and insulation

while its powerful camera can

scenarios such as music festivals,

Information about the car, the

terminals, thus preventing accidents

capture the whole picture as well as

open-air concerts and important

license plate and the driver will be

from occurring.

specific details and whilst benefiting

political rallies, which will not only

immediately identified after the

from its long 38 minute battery life.

help security companies to work

video is simultaneously transmitted

The beauty of a Dahua Drone

more efficiently but also provide

to the back-end. In another

evidence if illegal incidents occur.

scenario, if there is a traffic jam on a

thus avoiding the accidents that

These drones will be flying at 100m

Obviously similar deployment

capture the HD image of it from afar

Forest Fire Detection and Control

lies not only in its ability to work

Via the thermal camera it carries,

from afar but also its safety whilst

Dahua Drones can detect suspicious

flying. Having undergone all sorts of

Inspection of Bridges

happening, Dahua Drone can provide

hot spots invisible to naked eyes. At

extreme tests, this means when in

The construction of massive bridges

real time and first hand images/video

a height of 1500m, a Dahua Drone

use, a Dahua Drone will not disturb

requires inspection, which usually

for related department to decide.

covers an area of 5km², doing the

the crowd below at all.

takes lots of boats, equipment and

inspection work of dozens of people in just one flight. When there is a fire, Dahua

highway and nobody knows what is

In conclusion, Dahua Drones

experienced staff. Dahua Drones

can play a key role in various public

for example. There are thousands

can greatly simplify the process and

security scenarios. Dahua has caught

of participants and spectators

reduce the cost of money and time.

the latest technology trend and

Take New York City Marathon

Dahua Drones can fly all around

Drones can fly to the site against

spreading over a range of over 26

high temperatures and strong winds,

miles. It is quite a challenge to set up

the bridge, checking the erosion,

and Smarter Living. This is the future

transmitting relevant data to ground

an effective surveillance system for

damage and other damages, while

that Dahua Drones are helping

teams, so that they can make the

such a 1 day event. Dahua drone can

keeping a numbered record for

us towards.

right move using this information.

be very useful for such scenario. If

experts to analyze afterwards.

Once the fire has been extinguished,

properly deployed, 8 sets of model

Dahua Drone’s overhead inspection

820 drones can deliver very good

It’s worth adding that Dahua Drones boast an outstanding ability

adapted to enable a Safer Society

Visit http://www.dahuasecurity. com to learn more and follow us on Facebook and LinkedIn. n

can prevent a second fire. In this sense, Dahua Drone is one of the best aids to help fire fighters.

Detection for Police Arriving swiftly and secretly at crime scenes, Dahua Drones record real-time visual information about locations, traffic and personnel using its multifunctional camera, which is capable of optical zooming x30 (allowing the drone to work from a long distance where it won’t be noticed by criminals); thermal imaging (allowing the drone to work at night) and automatic recognition of faces or wanted cars. Using wireless transmission the

securitysolutionsmagazine.com

092-097_SSM110 Product Spotlight.indd 95

SECURITY SOLUTIONS // 95

13/10/2017 5:46 pm


SPOTLIGHT

INTEGRATING VIDEO WITH ACCESS CONTROL

T

he role of access

essential technologies, it makes

modular approach, thus enabling

alphanumeric data. This means

control is pivotal to

sense to integrate the solutions.

installers and integrators to offer

they use a minimal amount

the security of many

However, it appears that this occurs

bespoke solutions.

of bandwidth, and storage

applications.

less often that one might believe.

Furthermore, the proliferation of

In the vast majority of modern

Access control does much more

requirements are not significant.

than merely control access. Whilst

One benefit of this is the access

access installations in recent years

businesses and organisations,

the management of authorised

control systems can use distributed

speaks volumes about the

access control plays a pivotal role

users and visitors is a key

intelligence. This makes it possible

flexibility of the technology. In

in the overall security strategy.

consideration (and often the driving

for relevant data to be stored at

many applications, the system will

The technology delivers a wide

reason for which the technology

the door controller or the reader.

include video surveillance to

range of security and business

is specified), professional systems

If network connectivity is lost,

increase the level of protection on

related efficiencies, while enabling

can also offer a number of

the system can remain fully

offer. The benefits of video in a

users to enhance the level of

other benefits.

operational, and transactional data

security system are well

protection and safety at their sites.

understood by installers,

Professional access control systems

ideally suited to operation on a

server as and when connectivity

integrators, and end users alike.

offer a high degree of flexibility

network-based infrastructure.

is resumed.

Given the positive symbiotic

and scalability, with some of the

Access transactions generally

relationship between these two

market-leading options taking a

involve small amounts of

96 // SECURITY SOLUTIONS

092-097_SSM110 Product Spotlight.indd 96

Access control systems are

can be transferred back to the main

As well as controlling who can enter and exit a site or department,

securitysolutionsmagazine.com

13/10/2017 5:46 pm


access control systems can deliver

decisions nor apply reasoning

its customers whether the sites on

makes it a no-brainer in terms

additional benefits such as muster

when dealing with transactions.

which Net2 was installed included

of implementation.

reporting (an essential resource

If a current and authorised card

networked video surveillance.

should an evacuation of the site

issued to John Smith is used by

Where it did, they then asked

Making the link

be required), time and attendance

any other individual, the system

whether it had been integrated

As already mentioned, video

reporting, asset management, photo

will still grant access and record

with the access control. In the vast

integration is a standard feature

ID creation, concierge services and

that transaction.

majority of cases, it had not.

of Net2. It can also be accessed

so on. As such, a well-designed

Even where a violation is clear,

What was more interesting

in Net2 Lite, meaning even

access control system can deliver a

such as if the card is used by a

were the reasons given for

installations making use of the

variety of benefits for the customer.

female, a system that relies solely

the integration not being

basic software can enjoy the

on the access credential being

implemented. One common

benefits of video integration. It

and organisations have begun

present to grant access still will

answer was that the customer

is also worth noting that Net2 is

to include video surveillance as

not recognise that the transaction

had not requested it. It should

integrated with Milestone’s access

a part of their security overlay.

is fraudulent.

be noted that very few end-users

module for the XProtect series of

Video technology, on the other

have an in-depth understanding of

VMS products, so integration with

well documented and clearly

hand, is ideally suited to gathering

security technologies. Often, their

systems based on that platform are

understood by the vast majority

real-time information for the

skills base revolves around their

also straightforward.

of end-users. Video can be used

purpose of visual identification of

core business activity. For example,

both as a proactive and reactive

individuals, the analysis of events

a retailer will understand sales

very basic task involving the entry

tool, and can also deliver vital

and where smart technologies

and marketing, customer service,

of limited data into an extremely

evidence in the case of post-event

are deployed as well as detecting

merchandising, stock management

easy to use system. The process is

analysis. It can also act as a great

violations in expected behaviour.

and staff deployment. With

quick, simple and takes less than

enabler if operators or members of

What video does not provide, is

regards to technology, their skills

a minute. It allows video to be

staff need to assess a situation as

a log of transactional data which

are more likely to be focused on

associated with the access control

visual verification and confirmation

clearly identifies the presence

stock management systems, point

system, and the implementation is

of circumstances is a key part of

of individuals on a site or their

of sale devices and on-line retail

well within reach of any installer

effective decision-making.

movements. It also cannot

options. They rely on the installer

or integrator who is competent

implement a security procedure to

or integrator to offer the optimal

enough to install Net2.

A Perfect Combination?

ensure that only authorised persons

solution within the constraints of

Access control has its pros and

can enter and leave the site.

the available budget.

Increasingly, many businesses

The benefits of video are

cons, as does video surveillance.

Interestingly, the combination

The question of budget was

Adding a networked camera is a

In summary The integration of video

For example, an access system

of access control and video

also a significant factor giving

surveillance and access control

performs the tasks of managing

surveillance technology not only

rise to the second most common

enhances the potential of both

transactions as well as logging

eliminates the weaker attributes

reason for not integrating video

technologies, and delivers a

and reporting these transactions

of each system, but combine to

into access control which was that

solution that adds value for the

very effectively. An access control

elevate a security system above

customers often believed that the

end-user. Integrating network-

system can implement actions

and beyond what would normally

integration of access control and

based video with Paxton’s Net2

based upon real-time data using

be expected from the various

video surveillance was going to be

access control system is simple

a variety of criteria. This can

elements of the solution. It

too costly. This was a surprising

and quick, and the ability to

include occupancy information,

therefore makes great sense for the

response given that, in the case of

manage video standard within

the authority of staff currently on

two to be integrated. Yet, again, all

Net2, the product around which

the software.

site, activities based on schedules,

too often this is not the occurring!

people were being interviewed,

behaviour-based movement and so

Research carried out by Paxton

Installers and integrators

integration with video was offered

looking to deliver value-added

on. The downside of access control

Access, a global name in access

as standard and not an additional

bespoke solutions should ensure

is that in the majority of systems,

control and door systems, with

cost. The only costs associated

that they take advantage of this

the presence of an authorised

30 years’ industry experience,

with the implementation of any

option. It costs nothing, takes

credential (be that a code, card or

highlighted that many installations

integration relate to installation

minutes but enhances the installed

token) is all that is required to gain

based on their market-leading Net2

time. However, the integration is

system substantially.

entry. Lost, stolen or ‘borrowed’

access control platform had not

very simple and fast to implement.

credentials will be accepted until

been integrated with on-site video

they are revoked. An access control system cannot make user-based

securitysolutionsmagazine.com

092-097_SSM110 Product Spotlight.indd 97

For more information visit www.

Indeed, the ease with

securitydistributors.com.au or call

surveillance. The access control

which network-based video

Security Distributors Australia Pty

manufacturer asked a number of

surveillance can be added to Net2

Ltd on 1300 882 101 n

SECURITY SOLUTIONS // 97

13/10/2017 5:46 pm


PROFILE

SMARTPHONE-BASED MOBILE ACCESS CONTROL SELECTING THE RIGHT MANAGEMENT AND CONFIGURATION TOOLS

L P

American technology research

98 // SECURITY SOLUTIONS

098-101_SSM110 Profiles.indd 98

virtualization solution that requires

2017, the STid Mobile ID® badge

no compromises to the philosophy

three years’ time, more than

virtualization solution has been

undergirding your organization’s

20% of organizations will use

highly successful. How do you

security policy.

smartphones instead of physical

explain this success?

access cards. Mobile access control

Vincent Dupart, CEO of STid

Since its launch in early

firm Gartner predicts that in

Our solution is extremely user

Why would you outsource your data to a third party?

is not just about a more user-

friendly, with a range of different

Where is the data stored? Are

friendly way of opening doors. The

identification methods available

you independent in managing

connectivity of smartphones opens

– you can just tap your phone, or

your security? No technical or

the way to new real-time solutions

lightly touch the access control

technological constraints should

for managing mobile identity.

reader to identify yourself. STid

prevent Directors of Security

Vincent Dupart, CEO of STid, a

Mobile ID® has been specially

from managing their systems

French firm that develops secure

designed to make access control

independently, with the freedom

access control solutions, tells us

easy. You no longer need to take

to host sensitive data in-house if

why the right management tools

your smartphone out of your

that’s what they want… We offer

are required to roll out this type

pocket or bag to identify yourself.

our clients an Offline management

of solution.

Beyond this, we have chosen a

tool, which keeps them in control of

securitysolutionsmagazine.com

13/10/2017 5:46 pm


NEW UniGuard+Real Time Guard Duress

RFID NFC

Half Page Ad Long Range

Supports Bluetooth long range beacons

CALL FOR A FREE INFO PACK 1300 133366 Locally supported by DelTonic Pty Ltd – Po Box 359 Plumpton NSW 2761 – ABN 69 108 465 550 Phone 1300 133366 Email Sales@uniguard.com.au – Web: www.UniGuard.com.au

Half

098-101_SSM110 Profiles.indd 99

Follow us on Twitter Page Ad twitter.com/secsolutionsmag

13/10/2017 5:47 pm


V T

PROFILE their security. That’s a key issue in

meaning you can quickly create a

our line of work!

short-term visitor access card, and

Can you tell us a bit more about

later recover the credits to create

the Online management platform

another virtual access card. It’s so

that you have officially launched at

cheap and easy to use!

the APS Show in September? Innovation is the cornerstone of STid’s strategy. We’ve continued to work to develop a secure Web

How does this platform meet clients’ aspirations to manage their systems independently? Unlike many solutions on

platform which will revolutionize

the market and most people’s

the way we manage user virtual

preconceptions about cloud

access cards and configure readers!

technology, STid is not looking

Access rights can be assigned,

to tie its clients into a particular

revoked and updated in real time,

technology. Independence operates at many different levels! First and foremost, we have always wanted to respect our clients’ value chain. Anyone will be able to create an account and associate accounts for their own clients (dealers and end customers), without any involvement on our part. STid has no access to sensitive

ID® solution make access control

administrator, user, etc. Data can

data in the dealer and end customer

instinctive. How is this user

then be shared, enabling multiple

accounts – that would be a major

experience carried across to your

client employees to work on the

security vulnerability. Our clients

Web platform?

platform in real time.

will remain totally independent in managing their security.

Our two priorities are security

Data entry times are reduced

and user-friendliness. The STid

by an easy upload function for

Mobile ID® Web platform will be

your existing databases (variable

easier to use than conventional

and fixed data, photos, logos, etc.),

tools, making it quicker to access

which will boost the performance

ever-more mobile world, with a

data, which is all centralized on a

of your access solution.

continually increasing threat of

single platform.

How do you secure the data stored in your Web platform? Today’s businesses work in an

cyberattacks. Security is a major challenge. In addition to the

Different levels of rights can be assigned to each account -

More information on www.stid. com - info@stid.com - +33 4 42 12 60 60 n

security benefits of the client’s independence in management, all data is stored in our server in France, in accordance with the tightest data protection regulations issued by CNIL (the French data protection authority). The information is stored in encrypted formats and all server connections use the secure https protocol. The virtual access cards are managed in real time so if an employee reports the loss of a smartphone, the mobile access rights can immediately be revoked, before the device ends up in the wrong hands. The different identification methods of your STid Mobile

100 // SECURITY SOLUTIONS

098-101_SSM110 Profiles.indd 100

securitysolutionsmagazine.com

13/10/2017 5:47 pm


VIDEO DOESN’T HAVE TO BE EXPENSIVE TO BE EFFECTIVE

With years of experience across hundreds of clients, let us show you how we can help you generate more business than ever before. enquiries@interactivemediasolutions.com.au

098-101_SSM110 Profiles.indd 101

13/10/2017 5:47 pm


PRODUCT SHOWCASES

SPOTBOX4K The SpotBox4K is a 4K ONVIF IP Camera, multi view decoder box which allows users to programme and view up to 32 network IP cameras in multiple/varied viewing modes in resolutions up to 4K in video quality. Developed by Antrica – a UK company who specialise in video encoders and decoders, SpotBox4K is an exciting new offering to the CCTV market, and was recently launched at ‘Security Expo 2017’ in Sydney with an overwhelmingly positive response. The box appears to claim an apparent gap in the existing market for users who

102 // SECURITY SOLUTIONS

102-109_SSM110 Product Showcase.indd 102

want to ‘view’ existing IP cameras without affecting the existing CCTV infrastructure (replacing the older ‘Spot Monitor’ type product). The box connects to a monitor with a HDMI cable and is controlled with a simple to use IR remote control. Users can programme up to 32 IP cameras into the configuration tool – which displays cameras in a range of tile configuration modes including 1 x 1, 2 x 2 , 3 x 3 and 4 x 4. The box harnesses both H.264 and H.265 decode capabilities and can decode and display a full 8MP / 4K camera in full screen mode. The SpotBox4K replaces the

requirement for VMS software or PC-based viewing applications and makes easy work of decoding multiple cameras simultaneously. Not only is it a more powerful, easy to use solution, it is also lower priced, thereby saving both hassle and money! The SpotBox4K can be used in a wide variety of applications including but not limited to: • Reception Desk Overview Of CCTV / Meeting Room Cameras • Control Room Video Wall – A low cost way of creating a video wall • Remote CCTV Viewing Station

– Pop up emergency Control Centres, etc. • Live Event Broadcast / Viewing – View a Live Company Broadcast / Messages • Digital Signage – SpotBox4K can display various video feeds • Shop Theft Deterrent -– The 4K decode capability enables facial recognition more accurately • Live Video In Transport – e.g. Train drivers can view ‘door cameras’ in higher quality than before. For further information, visit www.spotbox4k.com or email sales@antrica.com n

securitysolutionsmagazine.com

13/10/2017 6:47 pm

dorm


When a high level of security is essential, dormakaba turnstiles and full-height gates provide the ideal solution. The robust turnstiles and full-height gates are especially suitable for securing the perimeter of buildings and property.

Secure your perimeters

Benefits include versatality in design, safe passage, minimal power consumption and lasting quality for any indoor or outdoor installation. For the complete range of smart and secure access solutions, contact dormakaba. 1800 675 411 www.dormakaba.com.au

dormakaba_TURNSTILES_210mm x 275mm_0117_SS#106.indd 1 102-109_SSM110 Product Showcase.indd 103

25/01/2017 10:05:51 AMam 17/10/2017 10:27


PRODUCT SHOWCASES

Hikvision DeepinMind Network Video Recorder (NVR) Hikvision, a global leader in the feild of video surveillance products and solutions, has launched its ‘DeepinMind Network Video Recorder (NVR)’ — the world’s first embedded NVR benefiting from ‘Deep Learning’ functionality. This intelligent NVR effectively ‘learns’ to identify people captured by video surveillance cameras. The NVR will also learn to filter out false alarms that would have previously been triggered by non-threatening moving objects. This new 32-channel iDS-9632NXII8/16S NVR will be the first in Hikvision’s new range of DeepinMind products. Hikvision is taking the ‘Deep Learning’ concept and applying it to the security industry, yielding a series of completely new products. Imitating human beings’ synaptic learning and memory processes, the DeepinMind Series NVR incorporates advanced algorithms to achieve

104 // SECURITY SOLUTIONS

102-109_SSM110 Product Showcase.indd 104

astonishingly accurate and consistent Video Content Analytics (VCA) performance. The launch of the innovative iDS-9632NXI-I8/16S NVR is on track to establish remarkable new levels of alarm-activated monitoring. False alarms triggered by animals, leaves, shadows, changes in lighting, and other insignificant objects regularly plague security personnel, costing many man-hours and monetary resources. With its ability to detect human bodies, the iDS-9632NXI-I8/16S NVR effectively filters out such false alarms. The DeepinMind NVR identifies and triggers human activity with an unprecedented accuracy — exceeding 90%. Its high-speed Graphics Processing Unit (GPU) performs accelerated computing while Deep Learning algorithms improve accuracy against current NVR models that still rely on conventional CPUs. Moreover,

these features enable authorised users to search recorded footage and find targets far more quickly than with a traditional NVR. The iDS-9632NXI-I8/16S DeepinMind embedded NVR can simply substitute an existing DVR or NVR, introducing intelligent learning previously unavailable with traditional surveillance systems in just one step. Such an upgrade enhances conventional video surveillance performance for markedly more efficient security. The DeepinMind embedded NVR also features up to 32 channels of video input for IP cameras (up to 12 MP), HD video output and decoding, hard drive hot-swapping, RAID (0, 1, 5, 6, and 10) configurations for up to eight 8-TB HDDs, and dual-NICs. For more information, please visit us at www. hikvision.com. n

securitysolutionsmagazine.com

13/10/2017 6:47 pm


F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry

instagram.com/securitysolutionsmag

Dahua NVR6-4KS2 Range Integrated with D-DECT IP Detectors and Clarius Plus IP Illuminators

DAHUA AND GJD PARTNERSHIP DELIVERS ADVANCED, HIGHLY RELIABLE DETECTOR-ACTIVATED SURVEILLANCE

Dahua Technology’s network video recorders (NVRs) now have a direct integration with IP-based outdoor detectors from GJD Manufacturing Limited. This integration provides users with high-quality and reliable detectoractivated surveillance and monitoring. D-TECT IP detectors and Clarius PLUS IP illuminators have been integrated with Dahua’s NVR6-4KS2 range, an enterpriselevel NVR providing up to 4K resolution. Its open architecture supports multi-user access and it is compatible with ONVIF 2.4, enabling interoperability when combined with third-party 4K cameras.

securitysolutionsmagazine.com

102-109_SSM110 Product Showcase.indd 105

The NVR includes intelligent video analytics to detect people and moving objects, as well as other predetermined events, such as abandoned or missing objects, tripwire detection, people counting and facial detection. The integration was achieved by incorporating GJD’s API on a special firmware that enables the NVR to accept alarms from the detectors and link them to the recorder’s functions. The BS8418-compliant IP detectors are suitable for intruder monitoring, CCTV surveillance and other alarm warning requirements, providing

both volumetric and long-range narrow field-of-view sensing, plus remote programming. To provide increasingly advanced products and solutions to its customers globally, Dahua is continuously investing in R&D and cooperation with world-class partners. With a mission of “Enabling a Safer Society and Smarter Living”, Dahua will continue to focus on “Innovation, Quality, and Service” to serve partners and customers around the world. Visit www.dahuasecurity.com to learn more and follow us on Facebook and LinkedIn. n

SECURITY SOLUTIONS // 105

13/10/2017 6:47 pm


PRODUCT SHOWCASES

STING LONG-LIFE RECHARGABLE GPS TRACKER

The Sting is an ultra-compact, rechargeable GPS tracking device featuring light, temperature and humidity sensors which set it apart from other batterypowered trackers. It has been designed to track high value parcels, cargo, cash in transit, personnel, and other assets where super-long battery life is required without sacrificing the frequency of updates and performance. The rechargeable, high capacity Lithium Polymer battery pack allows the Sting to

106 // SECURITY SOLUTIONS

102-109_SSM110 Product Showcase.indd 106

be recharged and redeployed, extending the product life. Utilising the latest technology, the Sting can operate in ultra-low power modes. With an incredible battery life of up to 18 months on a charge, the Sting can be attached to assets and tracked without needing to charge the battery regularly. The Sting has builtin antennas for GPS reception and cellular communication, a 3D accelerometer, a highperformance GPS that can track both GPS and GLONASS satellites simultaneously and

flash memory for storing nonvolatile information. The light sensor is designed to work as a tamper detector for cargo applications. If a parcel or container is opened, the Sting can detect the light change, wake up and report the tamper. The temperature and humidity sensor allows spoilable cargo to be tracked. The Sting is available in different versions to cater for different networks around the globe. Enquire with Digital Matter as to availability in your country.

The Sting uses a 2500mAh 3.7V Lithium Polymer battery pack. It can be recharged with the included USB micro cable. • Light Sensor for Tamper Detection • Temperature and Humidity Sensors • Rechargable internal battery for long-life • Small, compact and easy to conceal • Recovery mode. For more information, visit Digital Matter +61 8 6280 1217 or visit www.digitalmatter.com n

securitysolutionsmagazine.com

13/10/2017 6:47 pm


FOLLOW US ON INSTAGRAM instagram.com/securitysolutionsmag

102-109_SSM110 Product Showcase.indd 107

13/10/2017 6:47 pm


PRODUCT SHOWCASES

LSC Security Supplies has announced a new partnership with Sydney based manufacturer, Direct Cable Supplies (DCS). This partnership is the latest in a string of new distributorships for LSC, including well-known brands such as HID Global, Dahua Technology and AMC. “Despite our extensive range of over 20,000 product lines, a quality cable brand has long been

the Achilles’ heel of our electronic security offering” said David Cooper, Product Manager at LSC. “I’m pleased to say that our new partnership with DCS means this is no longer the case”. When asked why LSC chose to partner with DCS Cooper replied; “DCS is an ACMA licensed and accredited cable manufacturing company, so installers can buy with confidence knowing that

UNIVIEW MOTORISED EYEBALL INTRODUCTORY OFFER

LSC SECURITY SUPPLIES PARTNERS WITH DCS CABLES

their cable is compliant with the Australian telecommunications cabling standards,” said Cooper. “In addition to its solid copper construction the 305m boxed Security and Data cable products include their new EZITAG feature – which allows installers to quickly and easily pre-mark their cable by simply circling the relevant location. Add that to the end of reel meter marking feature and

The IPC3634ER3-DPZ28 is the new released model of outdoor Motorised Vari-Focal IR Eyeball network camera that can be widely used in many applications. Uniview patented ISP technology helps to reach high image quality but with less bitrate. It produces exceptional 4-megapixel high resolution video images with latest H.265 compression technology. It supports 120dB WDR which ensures clear image with rich details when confronting with sharp lighting contrast. The eyeball camera used IR anti-reflection glass. The black anti-reflection material can also improve 8% IR transmission. Moreover, it applies smart IR to detect brightness of view and adjust a suitable IR light compensation. It supports IP67 with 100% leak test before shipment. It embedded with H.265, U-Code and multiple smart functions. H.265 compression can reduce up to 50% bandwidth but keep high image quality. U-code is an enhanced encoding technology released by Uniview. It can reduce up to 95% bandwidth while no details missing. Smart functions in this eyeball are face detection, intrusion, crossing line, people

108 // SECURITY SOLUTIONS

102-109_SSM110 Product Showcase.indd 108

you have a pretty innovative Cable.” said Cooper. A wide range of 4 Core, 6 Core, Figure 8, CAT5E, CAT6 and specialty security cables are now in stock and available to purchase from the LSC Security Supplies website or at one of their five branches. Distributor: LSC Security Supplies Contact: 1300 646 269 Website: www.lscsecuritysupplies. com.au n

counting, audio exception detection, defocus detection, scene change detection. This eyeball camera has built-in microphone for audio input, hence customer doesn’t need to install an individual audio pickup device. By using up to 128GB SD card for edge storage, it can prevent unpredictable network connection breaks. The motorized lens can save installation cost. And the 3-Axis can provide a wide adjustable view. Key features: • 4MP H.265 Compression • 2.7~12mm Motorised lens (Smart Focus) • 120dB Wide Dynamic Range • Triple Stream • Micro SD Card (up to 128GB) • Built-in Microphone • IR distance up to 30M • Long range POE (up to 250m) • Smart Features • Behaviour detection • Corridor mode • IP67 rated To see how SecuSafe can help you with Uniview Products, Call 02-9649 4477 or Visit http:// www.secusafe.com.au, Email: sales@secusafe. com.au n

securitysolutionsmagazine.com

13/10/2017 6:47 pm


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmagazine.biz/newsletter

The Next Generation of Video Doorbells from Ring RING VIDEO DOORBELL 2

Watch over your home in crystal-clear 1080HD video, and see, hear and speak to visitors from anywhere. With instant mobile alerts and two-way talk, you can answer the door from your smartphone, tablet and PC. • Instant mobile alerts • 1080HD wide-angle video • Built-in microphone and speakers Monitor Your Home from Anywhere Ring lets you adjust your motion sensors so you can find the ideal setting for your home. You’ll get instant alerts when motion is detected, allowing you to protect your property from the comfort of your smartphone.

securitysolutionsmagazine.com

102-109_SSM110 Product Showcase.indd 109

• Adjustable motion sensors • Infrared night vision • Live View on-demand video and audio Smart Security for Every Home Video Doorbell 2 works on any home and includes a quickrelease rechargeable battery, so you can charge your Doorbell without removing the device. Get two battery packs, and you’ll never worry about power. • Hardwired or batterypowered • Includes one rechargeable battery pack • iOS, Android, Mac and Windows 10 compatible For more information visit www. ring.com n

SECURITY SOLUTIONS // 109

13/10/2017 6:47 pm


STOPTALK Global Architectural and Security Door Specialist Boon Edam Appoints New National Service and Installation Manager Global architectural revolving door and entrance security specialist Boon Edam has appointed Mr Jason Gauci as its new National Service and Installation Manager, to strengthen its installation and maintenance team and enhance its OEM service offering in Australia. Mr Gauci has worked in the revolving door and security access industry for almost 20 years, and has worked with Boon Edam products for the last 15 years, giving him an extensive knowledge of the full security suite, including revolving doors, security doors and portals, speed gates, tripod turnstiles, access gates and full height turnstiles. His product knowledge and industry expertise has made him a valuable member of the Australian team.

Operating in 27 countries, Boon Edam is a global supplier to some of the world’s biggest companies and multinational groups, as well as public and private agencies. Boon Edam’s global clients include dozens of fortune 500 companies. “The Boon Edam brand is known globally for quality and reliability and I’m looking forward to contributing to maintaining Boon Edam’s reputation as a national leader in revolving doors and security access technologies here in Australia,” said Mr Gauci. “Boon Edam is a dedicated and customer-focused company, and that ‘family environment’ is something I’d like to continue to develop in our service and installation team,” he said. “It’s really rewarding to be given this new role and new responsibility within the

company. I’d like to pass on my product knowledge when training new technicians, so that they’re thoroughly familiar with the intricacies of each product. I also have some process improvement strategies to streamline the installation and servicing process, as well as plans for continuous selfimprovement as I further develop in the new role.” Managing Director of Boon Edam Australia, Mr Michael Fisher, says the appointment is a further step in expanding Boon Edam’s service offering nation-wide. “Jason is ideally suited to this role. His expertise and knowledge of Boon Edam products is first class, and he develops positive and lasting relationships with our valued customers, which reflects Boon Edam’s strong customer-focused values,” said Mr Fisher.

Mr Gauci will report directly to National Technical Manager, Mr John Powell, who is responsible for overseeing all service and maintenance operations nation-wide. For further information contact Michael Fisher at michael.fisher@boonedam.com or visit www.boonedam.com.au n

ANIXTER TO DISTRIBUTE BOSCH SECURITY VIDEO SYSTEMS PRODUCTS IN AUSTRALIA GLOBAL RELATIONSHIP STRENGTHENED BY LOCAL PARTNERSHIP Bosch is pleased to announce that effective immediately, Anixter Australia Pty Ltd will be distributing the Bosch Security Video Systems product range in Australia. They will also offer the G Series integrated security alarm panel. This local partnership agreement strengthens the global relationship already shared by Bosch and Anixter. Anixter has been distributing Bosch products overseas for more than 18 years. Together, Bosch and Anixter manufacture and resell high quality security and communications solutions around the world. This enables dealers and integrators to purchase Bosch products at the right place and time, driving efficiency and effectiveness for their businesses. This local strategic alliance means Bosch Video and integrated IP solutions, including the new IP camera range, will

110 // SECURITY SOLUTIONS

110-114_SSM110 Shop Talk.indd 110

now be available to the network of integrators, end-users and contractors that Anixter services. With national coverage and distribution centres in Sydney, Melbourne, Brisbane and Perth, and a focus on technical competence and service, Anixter is well resourced to provide expert support for the complete Bosch Video Security product range. All Anixter local staff have undertaken Bosch product training in preparation for the partnership commencement. According to Mr Raj Singh, Regional Vice President - South Pacific, Anixter Australia Pty Ltd, “The addition of Bosch Security Video Systems to our Australian product portfolio better aligns our relationship on a global scale, allowing us to replicate the advantages of partnership that we already enjoy elsewhere in the world and provides significant

value to our customers. The Bosch video surveillance range and the G Series panel perfectly complements Anixter’s end-toend solutions, simplifying the sourcing process for dealers and integrators throughout Australia who are seeking best-in-class systems for their client”. Chris Dellenty, General Manager - Oceania, Bosch Security Systems Pty Ltd stated that “Anixter and Bosch have built a very strong partnership in Europe and North America, and we are delighted to have the opportunity to replicate this in Australia. The partnership with Anixter is in line with our strategy to make our products available through more channels by teaming with a high end solutions-driven provider.” For more information email: katarina.bailey@au.bosch.com or visit www.boschsecurity.com.au n

securitysolutionsmagazine.com

13/10/2017 6:54 pm


L I K E U S O N FA C E B O O K For the latest news, products and events in the security industry

facebook.com/ssmaust

WESTERN AUSTRALIA’S LEISUREPARK BALGA IMPROVES ACCESS FOR ALL

A refurbishment to a popular leisure facility in the City of Stirling including state of the art ‘speedgates’ has improved accessibility for the facility’s less mobile patrons, enhanced customer service and boosted efficiency through automation. Leisurepark – Balga is a community leisure facility in Western Australia. It receives around 320,000 visits annually, and has meeting rooms, sports courts, a gym and swimming pools. Facility Manager Luke Ellis said Leisurepark had wanted to enhance accessibility for people with reduced mobility and improve the customer experience. EasyGate SG speedgates from Centaman Entrance Control were chosen for this purpose.

securitysolutionsmagazine.com

110-114_SSM110 Shop Talk.indd 111

The new speedgates are wide enough to accommodate wheelchairs, mobility frames, and extra-wide buggies. The facility experiences higher visitor numbers at certain times of the day, and the gates are sandblasted with entry and exit symbols to improve wayfinding. “We’re finding the speed of access has greatly improved. With the new speedgates, it’s very clear what is an entry or exit”, said Mr Ellis. “Previously, people had to push open a gate or go through turnstiles with rotating arms. That led to some compromises. You’d get people with prams who had to hold the gate open to the side, and also young children attempting to duck under or get around the turnstiles. The

new gates work hands-free, so that doesn’t happen anymore.” The facility has separate entrances for the pools and fitness centre. Each gate is now equipped with a scanner so swimming pool and fitness centre members can enter with an access card. In case of a fire alarm or other emergencies, an automated panel is programmed to open the speedgates so visitors can exit easily. Mr Ellis said other efficiencies arise from the turnstile’s ability to connect with Leisurepark – Balga’s facility management software. The software now receives data from the gates to inform business reporting, and staff can operate the gates from the front desk if necessary. The primary motivation for installing the speedgates at the

facility was to reduce operating costs and improve the visitor experience by allowing customers to self-manage their own entry and exit to the facility. This also meant staff could focus on good customer service rather than ‘transacting’ with people, Mr Ellis said. “From my perspective, the best thing about effective entrance control is that I don’t have to worry about or think about it. We are not having to assist customers who have issues with getting in, they are finding it easy and it’s very intuitive. The new turnstiles allow us to direct resources to the right place to get the best bang for our buck.” For more information, contact Michael Bystram at michael@ entrancecontrol.com.au n

SECURITY SOLUTIONS // 111

13/10/2017 6:54 pm


STOPTALK

Dahua Makes the 2017 Forbes Asia’s Fab 50

Dahua Technology, a leading solution provider in the global video surveillance industry, Was recently named in the prestigious 2017 Forbes Asia’s Fab 50. The Forbes 13th annual Fab 50 list, comprising the best big publicly traded companies according to Forbes, honors corporate stars throughout the Asia-Pacific region. This year, China is grabbing most of the spotlight, with 29 of the 50 companies headquartered on the mainland, represented by the two most valuable companies on the list: Alibaba and Tencent Holdings. Dahua is one of 11 Chinese newcomers to the Fab 50, reflecting the country’s deep pool of entrepreneurial talent. The list is drawn from around

112 // SECURITY SOLUTIONS

110-114_SSM110 Shop Talk.indd 112

1,694 publicly traded companies whose reported annual revenue must reach at least US$1.8 billion. According to the Dahua 2016 Financial Report, Dahua accomplished a yearly gross revenue of US$1.93 Billion, representing a Year-On-Year (YOY) growth of 32.26%. Since its IPO in the Shenzhen Stock Exchange in 2008, Dahua has attained continuous growth over the last decade. Its 2017 H1 Financial Report shows that the company has achieved a YOY growth of 50.81% in terms of gross revenue in the reporting period. 3 Reasons Why Dahua Made the 2017 Forbes Asia’s Fab 50 1. Innovative Technology Since 2014, Dahua has invested approximately 10% of its annual sales revenue into research and development, 10.67% in 2017 H1 according to the Dahua 2017 H1 Financial Report. The company has four research institutes – Advanced Technology Institute, Big Data Institute, Chip Institute and Video Cloud Institute – and more than 5,000 R&D engineers and technical staff working on cutting-edge

technologies. In 2017 alone, Dahua has released numerous new products including the HDCVI-4K product line, ePoE systems, Seaport Solution, and Smart City Solutions. 2. Reliable Quality Quality has always been Dahua’s main focus. A national lean six sigma award in 2015, Hangzhou Best QC Organization as well as Asia Quality Innovation Excellent Project in 2016 are just a few examples of Dahua’s commitment to quality. In June 2017, Dahua partnered with Synopsys (Nasdaq: SNPS) to enhance the security of its Internet of Things (IoT) devices. Later this year, the Dahua Intelligent (IoT) Industrial Park will be opened in Hangzhou’s Fuyang District. 3. End-to-end Service Dahua places specific emphasis on providing the highest level of service to its customers and partners. In 2017, this has involved focusing on the development of locally based customer service centres in each of the regions Dahua services. In addition to the establishment of service centres which mainly provide after-sales services,

more and more subsidiaries and international academies have been opened in different regions of the world. In 2017 alone, Dahua opened subsidiaries in Russia, India and Bulgaria. Two Dahua International Academy training sessions were held in Poland and Iberia, attracting extensive attention from Dahua customers and partners worldwide. Dahua has also been cooperating with worldrenowned third party software platforms such as Milestone, Genetec, Axxon and Angelcam to extend the application scope of its products and solutions, giving its customers more utilisation opportunities. As the only video surveillance company listed in the Forbes 2017 Fab 50, Dahua is extremely pleased to be included in this highly prestigious list of blue chip companies. With its mission to “Enable a safer society and smarter living”, Dahua will continue to focus on “Innovation, Quality and Service” to serve partners and customers around the world. Visit http://www. dahuasecurity.com to learn more and follow us on Facebook and LinkedIn. n

securitysolutionsmagazine.com

13/10/2017 6:54 pm


L I K E U S O N FA C E B O O K For the latest news, products and events in the security industry

facebook.com/ssmaust

LEDA SECURITY APPOINTS NEW CEO Leda is delighted to announce the appointment of Sandy Capannolo as their new CEO. He will be based at Leda’s head office at Tuggerah NSW. Sandy succeeds David Matthews who will retire from Leda Security after 24 years at the helm as founder and Managing Director. During this time, David has built Leda from a small engineering firm into a market leader and key player at the local, state and the federal levels, assisting government departments to protect our cities and assets against the threat of terrorism and Hostile Vehicle Mitigation (HVM). Leda has manufacturing plants in Tuggerah NSW and Ningbo, China with sales and service branches in all major capital cities. The company employs approximately 100 staff nationally. Leda is Australia’s leading manufacturer of over

1,200 perimeter security product lines within its four product pillars: Bollards, Industrial Gates & Fencing, Docks & Doors and Bicycle Parking. Over the past 20 years, Leda developed a comprehensive range of Bicycle Parking designs, advancing to be the market leader in Australia. In addition, the company supplies these products from its China plant to a number of international markets, including North and South America as well as Singapore and closer to home in New Zealand. Sandy’s appointment as CEO is part of an exciting period of expansion for Leda as federal, state and local governments endeavour to protect their assets and citizens’ security from terrorism. “Sandy Cappannolo has a strong business development background”, says David Matthews, Leda’s Managing

Director. “Sandy’s experience in the engineering sector, logistics, supply chain management and business processes will be crucial in ensuring Leda takes full advantage of the growing need for Counter Terrorism Products.” Sandy has been in the engineering and logistics sectors for over 30 years and has performed many Senior Executive roles including General Manager at Loscam Limited, Director and CEO at BAM Wine Logistics, General Manager at Sigma Pharmaceuticals, and General Manager at Amcor. Sandy has also worked for The Boston Consulting Group, a world recognised strategy consulting firm. He has an MBA from the University of Melbourne and a Bachelor of Engineering from RMIT University. For more information, contact Pamela Betts on (02) 8413 3410 or email pamela.b@ledasecurity. com.au n

Hands Free Access Control installation crucial to Queensland MS kids moveability ISCS and N.A.S.A. Electronic Security Systems have been instrumental in providing young, high-care MS patients with much-needed technology to help them move about more freely. Nedap uPASS readers and UHF cards in conjunction with the ICT Protégé WX Access Control system were installed in the recently completed $5.5 million MS Queensland Youngcare complex at Albany Creek, Queensland. Integrator Norm Larden, managing director, said 29 of the long-range readers were installed in eight care units in the state-ofthe-art facility. “Because of the difficulties in presenting a standard access control card, everything needs to be automated so when they wheel

securitysolutionsmagazine.com

110-114_SSM110 Shop Talk.indd 113

their chairs up to a door it opens for them,” Mr Larden said. “MS Queensland were extremely happy with the product and we were most impressed by the ability to alter the read range. “The readers can be easily configured at the time of installation to suit the needs of the project. Whether it’s a couple of paces or two metres, it is simple to provide the ideal solution.” ISCS Queensland manager Mike Knowland said the project was a great showcase for the Nedap flexibility and the ICT WX System. “The Nedap readers are an industry leader for long range identification solutions. They are on-site configurable, offer consistent reading up to five metres in a weatherproof housing that

also provides LED and audible read indication. The cards are available in several form factors and being a passive UHF technology has no battery so there are no concerns regarding the life span of the card. “Protégé WX is a fantastic system that is a flexible, all-in-one, web-based system that integrates access control, intrusion detection and building automation into one simple unified solution. The modular hardware design provides the flexibility to accommodate any installation whether it’s small, large, residential or commercial. Expandable modules allow you to scale your system as your requirements change.” Protégé WX can cater to up to 128 doors, 50,000 events, 10,000 users and 512 inputs and outputs. n

SECURITY SOLUTIONS // 113

13/10/2017 6:54 pm


SUBSCRIBE Security Solutions Magazine, Level 1, 34 Joseph St, Blackburn, Victoria 3130 | Tel: 1300 300 552

I wish to subscribe for:

oONLY $62 per annum!

Name: ............................................................................Company: ....................................................................................... Position: .........................................................................Address: ......................................................................................... Suburb:...........................................................................State: ................................. Postcode:............................................. Tel:..................................................................................Email: ................................................................. ........................... TERMS AND CONDITIONS For more information on subscriptions, or to contact Interactive Media Solutions, please phone 1300 300 552 or email to admin@interactivemediasolutions.com.au. Deductions will be made from your nominated credit card every year in advance of delivery. The direct debit request and subscription price may be changed by Interactive Media Solutions from time to time, however you will always be given at least 28 days notice. The authority to debit your account every year remains valid until you notify Interactive Media Solutions to cancel your subscription by contacting Interactive Media Solutions Customer Service. No refund is given after a payment is made. In the event of a cancellation of your subscription, the subscription will simply expire twelve months from when the last subscription payment was made. Information on how we handle your personal information is explained in our Privacy Policy Statement.

Credit Card oBankcard

oVisa

oMastercard

oAmex

oDiners

Card Number: ........................................................................................................................................................................ Exp: _ _ / _ _ Card Name: .................................................................................................................................................................................................................... Signature: ....................................................................................................................................................................................................................... When payment has been received and funds cleared, this document serves as a Tax Invoice. Interactive Media Solutions ABN 56 606 919 463. If this document is to be used for tax purposes, please retain a copy for your records.

AUSTRALASIA’S LEADING SECURIT Y RESOURCE FOR BUSINESS AND GOVERNMENT S E C U R I T Y S O L U T I O N S • IS SU E 10 9 • SEPT/O C T 2017

ISSUE 109 SEPT/OCT 2017

Security Solutions Magazine digital version is now available via ISSUU on every platform, everywhere! Download it now and enjoy your favourite security magazine when you like, where you like, however you like. PC, MAC, Linux, Apple, Android, Google and more...

Subscribe to Security Solutions Magazine for

ONLY $62 per annum! securitysolutionsmagazine.com

Simply fill in the form or call 1300 300 552

WHAT ARE AUSTRALIANS REALLY AFRAID OF?

001 SSM109 Cover-FIN.indd All Pages

110-114_SSM110 Shop Talk.indd 114

$9.95 inc GST / $10.95 NZ ISSN 1833 0215

22/08/2017 10:09 am

13/10/2017 6:54 pm


115_SSM110 IBC.indd 1

13/10/2017 12:57 pm


CRASH RATED SURFACE MOUNT & SHALLOW MOUNT SOLUTIONS

FIND OUT MORE ABOUT US!

AUSTRALIA NATIONAL

1300 558 304 11 Cooper Street Smithfield NSW 2164 www.ezisecurity.com.au sales@ezisecurity.com

116_SSM110 OBC.indd 1

13/10/2017 12:58 pm


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.