AUSTRALASIA’S LEADING SECURIT Y RESOURCE FOR BUSINESS AND GOVERNMENT SECURITY SOLUTIONS • I S S U E 1 1 0 • N O V/ D E C 2 0 1 7
ISSUE 110 NOV/DEC 2017
securitysolutionsmagazine.com 001_SSM110 Cover-FIN.indd All Pages
Reimagining The Future With
13/10/2017 12:53 pm
Are you working to resolve a hostile vehicle attack risk? Ezi Security Systems has an unrivalled, extensive offering of high to extreme security products and have the expertise to design a solution to secure any critical infrastructure or extreme risk assessed site. All Ezi Security Systems Active Vehicle Barriers (AVB) and Hostile Vehicle Barriers (HVB) have been rigorously crash tested and certified to meet relevant ASTM, IWA and PAS 68 stipulations. For further information, please visit our website www.ezisecurity.com or call 1300 558 304 to speak to our security specialist team.
If serious security is your requirement, you need look no further than Ezi
002-003_SSM110 DPS.indd 2
13/10/2017 12:56 pm
1300 558 304 11 Cooper Street Smithfield NSW 2164 www.ezisecurity.com.au sales@ezisecurity.com
002-003_SSM110 DPS.indd 3
13/10/2017 12:56 pm
CUSTOMISABLE ELECTRIC HEIGHT ADJUSTABLE SIT STAND CONSOLES
Does your control room meet
Australian Ergonomic Standards?
www.activconsole.com
004-005_SSM110 DPS.indd 2
Clayton VIC 3168
13/10/2017 12:58 pm
Safe Work Australia, Nov 2015
“...in 2012-13 the cost impact of work-related injuries and illnesses was estimated to be just over $61 billion...�
State-of-the-art ergonomic lifting technology Lifetime Australia phone support AS/NZS 4443:1997 & ISO 11064
+61 3 9574 8044
004-005_SSM110 DPS.indd 3
sales@activconsole.com
13/10/2017 12:58 pm
ISSUE 110
34
FEATURES
54
CONTENTS
102
62
70
82
COVER STORY
Historical industry observations suggest that the security industry goes through a major change every 15 years, although one could easily argue that this timeline is shrinking. These same industry observations suggest that the next inflection point for security, which is referred to as Security 4.0, has been reached. What is Security 4.0 and what impact will it have on security as we know it today?
38
34 THE BENEFITS OF SAFE CITIES
For the first time in history, more people around the world live in cities than in rural areas. By 2030, over 60 percent of the world’s population will be living in cities. While this global migration to urban areas improves the living standards, health and financial prosperity of these citizens, it brings challenges to a city’s infrastructure, resources, security procedures and emergency response systems. How we meet these challenges will be critical to the success of cities in the decades that follow.
38 HOW I BECAME AN ISIS BRIDE
A teenage girl from rural Syria dreamed of becoming a doctor, but the war and the socalled Islamic State made her something very different, and very frightening.
62 THE NEXT GENERATION OF SECURITY
REGULARS 10 LETTER FROM THE EDITOR 14 LEADERSHIP
Jason Brown looks at the Standards which impact leadership.
16 CYBER SECURITY
How will artificial intelligence affect cybersecurity?
PROFESSIONALS
18 RESILIENCE
70 THE COMMONWEALTH GAMES –
20 HUMAN RESOURCES
How do we attract the next generation of security professionals and what skills might they need in a changing world?
ASSURING SECURITY AND SAFETY
In addition to his role as chief executive of Intelligent Risks (IR), an international management services company headquartered in Sydney, Neil Fergus has been the security adviser to the Commonwealth Games Federation in a part-time capacity continuously for over 13 years. Drawing on his experience planning and delivering the security for seven Olympic Games, four FIFA World Cups and six Commonwealth Games, Neil looks at the security challenges around the upcoming 2018 Commonwealth Games on the Gold Coast.
86 APPLYING A MULTIPLEX VIEW TO RISK MANAGEMENT
Dr Gav Schneider proposes that the need for security risk managers to become more rounded risk practitioners is crucial and that a more holistic view to risk management, referred to as the multiplex view, is more critical today than ever before.
6 // SECURITY SOLUTIONS
006-009_SSM110 Contents.indd 6
Dr Rita Parker looks at the trusted insider threat and its impact on resilience.
Greg Byrne examines the impact of bullying within businesses.
22 RISK MANAGEMENT
Dr Kevin Foster asks, how do we deal with hostile vehicles in urban environments?
24 COMMUNICATIONS 26 LEGAL 28 THINKING ABOUT SECURITY
42 OPERATIONS
Richard Kay examines fear and its impact on survival.
46 CCTV
When designing a CCTV system, which camera specifications are actually important?
50 BUSINESS
Why do accountants and other professionals need better risk management competencies?
90 SECURITY STUFF 92 SPOTLIGHTS 98 PROFILES 102 PRODUCT SHOWCASES 110 SHOPTALK
Company announcements from within the industry.
60 LEGAL Q&A
Who pays for damages created during searches?
66 LOSS PREVENTION
How do you create an effective loss prevention culture?
74 AVIATION
With the holiday season fast approaching, we look at handy travel security tips.
78 ACCESS CONTROL
We examine the psychology of security and the perception of safety.
What do you know about the risks next door?
30 EVENTS
A look at upcoming industry events.
securitysolutionsmagazine.com
13/10/2017 6:42 pm
006-009_SSM110 Contents.indd 7
13/10/2017 6:42 pm
Sign up to our eNewsletter and receive up-to-date valuable information regarding all things Security.
www.securitysolutionsmagazine.biz/newsletter
006-009_SSM110 Contents.indd 8
13/10/2017 6:42 pm
EC - S
TALL. FAST. STYLISH. Our award winning speedgates combine state-of-the-art optical technology with a high barrier height to protect your building.
EASYGATE SPT
• • • •
Barrier heights up to 1800mm Fast throughput (up to one person per second) Ideal for Disability Discrimination Act compliance Choose from a number of models, including the LX, SPT, SG, IM or LG • Custom pedestals with an array of attractive finishes EASYGATE LX
Find out which security gate is right for you.
1300 858 840
www.entrancecontrol.com.au
EASYGATE IM
FULL HEIGHT TURNSTILE
EC - Security Solutions Ad.indd 1 9 006-009_SSM110 Contents.indd
TRIPOD TURNSTILE
SWING GATE
6/02/2017 10:37:16 AMpm 13/10/2017 6:42
FROM THE EDITOR www.securitysolutionsmagazine.com
EDITORIAL
EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen Sist, Ged McMahon
CONTRIBUTORS
Garry Barnes, Karissa Breen, Jason Brown, Greg Byrne, Rod Cowan, Rachael Deluca, Neil Fergus, Kevin Foster, Nial Jenkins, Richard Kay, Steve Lawson, Justin Lawrence, John McGiffin, Bob Mesnick, Rita Parker, Don Williams, Dr Gav Schneider, Anne Speckard, Alex Sidernko, Ami Toben
ADVERTISING
Keith Rozairo PHONE 1300 300 552 EMAIL keith@interactivemediasolutions.com.au
DESIGN AND PRODUCTION
Jonathan Rudolph PHONE 1300 300 552 EMAIL graphics@interactivemediasolutions.com.au
MARKETING AND SUBSCRIPTIONS
PHONE 1300 300 552 EMAIL admin@interactivemediasolutions.com.au $62.00 AUD inside Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues)
ACCOUNTS
PHONE 1300 300 552 EMAIL accounts@interactivemediasolutions.com.au
A
s a security professional, are you
similar to how we might teach a young child to
familiar with the area of computer
distinguish a cat from a dog.
science commonly referred to as
Why is this important to the future of security
deep machine learning? Have you
and security professionals? Quite simply, in a
heard of it? Do you know what it is? These are
world where technology becomes intelligent
important questions because, by all reports, this
enough to discern what is aberrant behaviour,
new area of technological development is going to
be that vehicles and/or individuals or groups
have a profound impact, not just with regard to
of people acting in a suspicious manner, as
how security is conducted, but also what the
well as activity that falls outside of specific
security professional of the future will look like.
patterns within the cybersecurity space, then
According to Wikipedia, deep learning (also
we can change the way security is currently
known as deep structured learning, hierarchical
funded. This is achieved by outsourcing security
learning, deep machine learning or deep
infrastructure to perform all sorts of interesting
unsupervised learning) is a branch of machine
tasks for other departments, such as marketing
learning based on a set of algorithms that attempt
and operations, who want data around traffic flow
to model high-level abstractions in data.
within buildings, heat mapping, people counting,
To try and break this concept down to its most
demographic segmentation and so on. All of a
basic aspects, deep learning is based around the
sudden, security is only part of the equation.
idea of teaching a machine to solve problems that
Now imagine being able to integrate
would otherwise be extremely difficult to write
behavioural economics to drive desired security
a computer program for, based on the number
and marketing outcomes, and then test and
of variables in the problem. For example, in the
measure in real time whether those behaviour
case of a video analytics program, the challenge
drivers are achieving the desired results using
might be learning to distinguish the difference
simple A-B testing models. When you combine
between a cat and a dog. You cannot write a
intelligent security analytic systems with choice
computer program because not all cats and
architecture with a view to driving specific
dogs are identical in size, shape, movement and
behavioural outcomes, then the future of
Level 1, 34 Joseph St, Blackburn, Victoria 3130 PHONE 1300 300 552 EMAIL enquiries@interactivemediasolutions.com.au WEBSITE www.securitysolutionsmagazine.com
so on. However, they have similarities that can
security and possibilities around what a security
be learned.
professional can do within an organisation
DISCLAIMER
programmers try to develop an algorithm that
Cover: Peppinuzzo / Shutterstock.com
PUBLISHER
ABN 56 606 919463
The publisher takes due care in the preparation of this magazine and takes all reasonable precautions and makes all reasonable effort to ensure the accuracy of material contained in this publication, but is not liable for any mistake, misprint or omission. The publisher does not assume any responsibility or liability for any loss or damage which may result from any inaccuracy or omission in this publication, or from the use of information contained herein. The publisher makes no warranty, express or implied with respect to any of the material contained herein. The contents of this magazine may not be reproduced in ANY form in whole OR in part without WRITTEN permission from the publisher. Reproduction includes copying, photocopying, translation or reduced to any electronic medium or machine-readable form.
So, instead of trying to write a program,
C
M
Y
CM
MY
CY
becomes extremely interesting. In this issue’s cover story, we take a look at
a computer can use to look at hundreds or
Security 4.0, the next technical evolution in security
thousands of examples of what is a cat as opposed
system design, to get a better understanding of the
to a dog (and the correct answers), and then the
capabilities of emerging technologies and where
computer uses that experience to solve the same
security is headed over the next few years. Quite
problem in new situations. Essentially, the goal is
frankly, it is hard to imagine what the industry
to teach the computer to solve by example, very
might look like 10 years from now. n
CMY
K
WRITTEN CORRESPONDENCE TO:
RS A DE VI
SSOCIATI
ON
O
RALIA LTD
SECURIT Y
PR
UST FA
O
Level 1, 34 Joseph St, Blackburn, Victoria 3130 1300 300 552 enquiries@interactivemediasolutions.com.au
Official Partners O C I AT I
ON
Y P R OVI D
RIT CU
D LT
SE
STRALIA LTD AU
PR O
ASS
SPAAL
AU S T R A L I A
OF
SECURITY
RS
OF
E
O rigin a l Siz e
SSOCIAT RS A IO DE N VI
blue colour changed to this colour green.
COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE signing your approval to print. Please pay special attention to spelling, punctuation, dates, times, telephone numbers, addresses etc, as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman Press assumes no responsibility for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................
10 // SECURITY SOLUTIONS
010-013_SSM110 Editor's Letter.indd 10
John Bigelow Editor
securitysolutionsmagazine.com
17/10/2017 10:38 am
NEW INT-QUADIP For PB- Series Quad Beams
C
M
Y
CM
MY
CY
CMY
K
IP INTERFACE MODULE
LAN/WAN
With the new IP interface module, our intelligent PB- series Quad Beams are as easy as IP cameras to install and integrate with leading VMS solutions.
VMS
Most intruder detection systems rely on legacy technologies which require a number of third-party products and man-hours to install. The INT-QUADIP module utilises infrastructures already in place with CCTV, Access Control, and other security systems; dramatically reducing installation costs whilst providing a fully integrated security system which can be easily expanded and configured as desired.
KEY SPECIFICATIONS ● ● ● ●
PoE Class 3 IEEE 802.3af VMS Compatible Direct control for cameras including: - Axis - Bosch - Hikvision - Sony
● Plug & play web browser interface ● No software installation required ● One cable installation
PB-IN-HF/HFA The ultimate in trouble free perimeter detection for distances up to 200m.
1300 366 851 www.seadan.com.au 010-013_SSM110 Editor's Letter.indd 11
PB-F/FA Single channel quad beams ideal for simple perimeter systems.
PB-IN-100AT Anti-crawl beam for high security perimeters up to 100m.
PB-KH TAKEX quad beam performance for use in beam towers.
(02) 9427 2677 www.sprintintercom.au
13/10/2017 4:07 pm
READ OUR FREE DIGITAL MAG subscribepage.com/ssm109
securitysolutionsmagazine.biz
010-013_SSM110 Editor's Letter.indd 12
13/10/2017 4:07 pm
ATTENTION INTEGRATORS GOLD CLASS MOBILE ACCESS PROMOTION Upgrade your customers to experience the benefits of GOLD CLASS MOBILE ACCESS on their mobile device.
Increase your own income.
AT NO COST
Complimentary award winning HID Readers and Credentials Exclusive to ISCS
“Only having to carry one device for so many daily tasks is excellent.” ALISON BROWN Facilities, Operations & Events Manager, Netflix
AN ARA PRODUCTS COMPANY
HID Mobile Access®
Secure, convenient access control via your mobile device
ISCS is Australia’s HID Platinum Partner distributor
Contact
goldclass@iscs.com.au or 1300 111 010 and quote code GOLDCLASS Any size company considered, new or existing customers
010-013_SSM110 Editor's Letter.indd 13
13/10/2017 4:07 pm
LEADERSHIP
LEADERS SETTING THE STANDARDS I
BY JASON BROWN
n the last column, I
standards. Over 20 million
ballot and is due for publication in
white paper on sociotechnical
wrote about some of
businesses worldwide are ISO
early 2018.
resilience, crowd management and
the activities that a
certified or recognised.
leader can do to
Australia has mirror committees
In Australia, the mirror committee AS/NZS JTC OB/7
digital surveillance. In March 2018, Australia will
provide the basis for a better
for a large number of ISO
– Risk management is the
host the international plenary
security future through investment
committees but, for the Security
committee responsible for
for the global committee in
in development, mentoring and
Solutions Magazine audience, it
developing standards in the
Sydney. Between now and then,
teaching. In this column, I will
is the Risk Management Technical
area of risk management. It has
there will be opportunities to
consider the capacity of leaders to
Committee (TC262) and the
most recently met to redevelop
participate in this and other
make a long-term substantive
Technical Committee Security and
the current implementation
work. More information about
contribution to building national
Resilience (TC292) that should be
handbook and will be leading the
risk management and security
and international standards.
the main focus.
international development of a
standards work is available on the
subsequent global guide. There
following websites: • https://www.iso.org/
Most readers are familiar with
Security decisions derive their
ISO 31000 Risk Management,
legitimacy from effective risk
are opportunities to participate in
others will know the range of ITC
management and the identification
this work and there will be future
security standards in the 27000
of controls that mitigate risk. ISO
calls for expert participation in
• https://isotc262.org/
series or business continuity
31000:2009 Risk management
the international working group.
• https://www.iso.org/
in the 22301 group. Where did
– Principles and guidelines sets
The committee is also contributing
these standards and others like
out principles, a framework and
to the development of managing
them come from? They came from
a process for managing risk. It
legal risks and managing travel
the work of people, just like the
can be used by any organisation
security risks.
readers of this magazine, who
regardless of its size, activity
were prepared to step up and
or sector. Using ISO 31000 can
should look to engagement with
professionals’ seminar in Canberra
contribute to working groups on
help organisations increase the
the ISO committee for Security and
on 9 November, there will be
specific standards or to technical
likelihood of achieving objectives,
Resilience, TC292. The mission for
specific workshops for part of this
committees who manage the
improve the identification of
ISO/TC292 Security and Resilience
development. For readers who want
standards process.
opportunities and threats and
is to produce high-quality
to engage immediately, contact
effectively allocate and use
standards to support nations,
Jason at jason.brown@thalesgroup.
an institution or even an individual
resources for risk treatment. ISO
societies, industry, organisations
com.au
with a passion recognising the
31000 is the national standard in
and people in general. The purpose
need for standardised technology
the majority of the G8, G20 and
of these standards is to enhance
Security Director for Thales in
and systems. If people have
the Brazil, Russia, India, Indonesia,
and sustain the state of being free
Australia and New Zealand. He
the will and expertise, they can
China and South Africa (BRIICS)
from danger or threat and to feel
has served on a number of senior
make a significant difference to
economies, and is highly valued
safe, stable and free from fear
boards and committees, including
every aspect of risk management,
as a guidance document by a wide
or anxiety.
Chair of the Security Professionals
security and resilience.
range of ISO technical committees
The system works by a country,
More specifically, readers
In Australia, Mirror Committee
committee/629121.html
committee/5259148.html • http://www.isotc292online. org/ n As part of the annual security
Jason Brown is the National
Australasia, member of ASIS
and their national mirror
MB25 is the committee
International Standards and
developing global standards is
committees, as well as a number of
responsible for the development
Guidelines Commission and Chair
the International Organization for
United Nations agencies.
of standards in this area of security
of Australian Standards Committee
and resilience. Current projects
for Security and Resilience. As of
The lead organisation for
Standardization (ISO). ISO is an
Australia is a lead contributor
international body representative
to this work and has participated
include of the international
February 2017, Jason has been
of over 160 countries. It is
in the recent redevelopment of
standards proposal for a
appointed Chair of the International
the world’s largest developer
the 31000 standard. The rewrite
standard on protective security
Standards Committee for
and publisher of international
has now passed final committee
architecture and guidelines, a
Risk Management.
14 // SECURITY SOLUTIONS
014-033_SSM110 Regulars.indd 14
securitysolutionsmagazine.com
13/10/2017 5:42 pm
Presco™ Standard Keypad, Combination RFID Keypad and RFID reader New PrescoTM Range
Introducing the new range of Presco™ indoor keypads and readers. The Proximity reader and Combination keypad are advanced self contained RFID (Radio Frequency Identification) contactless devices. They are capable of interfacing to either a Wiegand input control panel or to the Presco range of PAC controllers. When any of these devices are coupled with the Presco™ PAC series of door access controllers you get the full benefits of a secure door access control solution with all of the features of the Presco™ protocol.
FEATURES The PSK16 is a direct replacement for the PRE keypad and outputs Presco™ data only. Installations require only 3 wires to the controller but can be made with 2 wires if the LED indication is not required The PSC16 & PSR16 output both Presco™ and Wiegand format data. Output type required is auto sensed via white wire connection. Read range of up to 20cm Compatible with Presco™ PAC access controllers and all other Presco™ decoders, the entire system uses low cost non-shielded cable and keypads and readers can be up to 1 kilometre from the door controller (power supply and cable dependent) Compatible with industry standard 26 bit wiegand systems, the keypad can output 8 to 64 bit or burst mode wiegand and custom proximity cards and tags are available for wiegand formats up to 64 bits
For more info www.presco.com.au
NIDAC SECURITY 2 Cromwell Street BURWOOD VICTORIA AUSTRALIA 3125
014-033_SSM110 Regulars.indd 15
Audible and visual confirmation of all actions. Designed and manufactured in Australia. 36 month manufacturer’s warranty
Phone: +61 3 9808 6244 Fax: +61 3 9808 9335 E-mail: sales@nidac.com
13/10/2017 5:42 pm
M S
CYBER SECURITY
TO INFINITY AND BEYOND – WITH ARTIFICIAL INTELLIGENCE BY KARISSA BREEN
W
e are always hearing
By combining AI, machine
about technologies
learning and data stored with
that are trending. But
technology, both AI and humans can
what happens next for
analyse and collect more data and can
a potential decrease in response time for cybersecurity teams.
With anything that is developed, an organisation needs to look at the performance enhancement, but
technology disruptors? For me, it is
do it more efficiently and succinctly.
about understanding these
Technologists understand that AI is
Implications for a Chief Information Security Officer
developments and actually looking
already an ubiquitous part of human
AI is growing to a point where it can
needs to ensure it is measuring the
intrinsically about why these
daily lives and it will only improve
potentially become difficult to control
potential downfalls and risks and
particular trends are going to
with the increasing demand and
and govern from a cybersecurity
maintaining its integrity by protecting
accelerate the cloud computing
enhancement of cloud technology.
point of view. Many people, including
the organisation’s assets and data.
space. The way I see it, machine
The combination of cloud with AI will
security practitioners, can be fearful
learning algorithms and advanced
transform the way in which products
of the unknown and what AI might
world and it can be implemented
computational infrastructure have
and services are viewed.
bring. Adding AI into the mix can
to improve peak performance to
mean that these machines are
detect and remediate security
operating at another level – how can
threats, alongside the human eye.
many upsides, on-trend technologies
The Benefits of AI with Cybersecurity
humans potentially combat super
However, because AI is not always
also carry potential risks and
The human element is always
intelligent computers? Security
accurate, regular touch points are
down sides.
important in conjunction with AI, as
professionals always need to think
needed to ensure false positives
even AI can miss certain elements
outside the box to ensure they are
are not becoming common. Security
to increase key performance on any
and make mistakes that humans
bettering their knowledge against
departments need to be aware of
piece of technology that they can by
can identify. AI opens up machine
cyber espionage. They will need to
the development of AI and not let
adding layers to create depth and
learning algorithms to increase
be organised, always further their
it be totally autonomous. Security
longevity. When cloud computing was
top performance. It also extends
knowledge and stay two steps ahead
teams should constantly research and
first introduced, the capability was
additional capability for computer
of their attackers.
understand the cybersecurity threat
limited. Now, however, enhancements
functions and is a tool to assist in
like artificial intelligence (AI) are increasing exponentially to improve
enabled us to build many new platforms and applications. With
Technologists are always trying
the growth of products and services.
not get too carried away with the capability of new technologies. With a security hat on, an organisation
AI is apparent in the technology
Organisations should ensure
landscape to ensure they are always
identifying patterns and trends within
their cybersecurity business units are
two steps ahead of any attacker and
an organisation.
familiar with AI and the protection
are not just reliant on AI. Security
around this, backed up by in-depth,
should always look at the down sides
Many attackers are leveraging
AI has developed from not only
automation technology to strike.
ongoing research. Consistent
of technology to ensure that they
enhancing current cloud platform
Some organisations are still
exploration and knowledge will
can identify worst case scenarios for
incumbents, but also powering an
utilising manual aggregation of
arm leaders with a comprehensive
organisations. n
entirely new generation of cloud
data to provide solutions to security
understanding of how AI is amplifying
computing technologies. This
findings. The downfall of using
their products and increasing user
innovation drives business growth.
manual methods means it can take
experience. This will also mean
technologist who specialises in
What does this mean for cloud
Karissa Breen is an independent
a lot longer to detect intrusions, by
that they understand and weight
cybersecurity and innovation. Karissa
combined with AI? The cloud industry
which time it can be too late and
the risks that are attached to these
has a particular focus on cybersecurity
itself has invested heavily in AI.
vulnerabilities within organisations
types of enhancements. Hiring an AI
writing, speaking and research. She
The AI and cloud affiliation powers
are compromised through the
researcher will provide direction and
is a cybersecurity influencer and
two areas – AI cloud services and
network and data exfiltration. Whilst
additional solutions to ensure the
advocate, publishes her own IT blog
cloud machine learning platforms.
AI can assist in reducing time for
development of AI with any cloud
and video blog and is also an IT brand
Some key players who are investing
remediation, it cannot sufficiently
computing business. Reassurance
and event ambassador. Karissa also
heavily into the combination include
cure cyberthreats, but it can enhance
and governance would be a strategic
works for CryptoAUSTRALIA, a not-
IBM with Watson, Microsoft with
detection. In some cases, autonomous
solution rather than a tactical one, to
for-profit organisation that advises
Cognitive Services and Google with
machine learning can lead to false
capture the current state and predict
the Australian public on cybersecurity
Cloud Vision.
positives and alerts, which can lead to
the future state of the AI component.
and privacy.
16 // SECURITY SOLUTIONS
014-033_SSM110 Regulars.indd 16
securitysolutionsmagazine.com
13/10/2017 5:42 pm
MULTIPLE CAPABILITIES SUPERIOR SOLUTION
Volvo Group Governmental Sales Oceania
IN HOSTILE ENVIRONMENTS, IT’S IMPORTANT THE SYSTEMS THAT YOU DEPEND ON CAN
STAND THE TEST OF TIME.
At Volvo Group Governmental Sales Oceania, our core business is the manufacturing, delivery and the support of an unparalleled range of military and security vehicle platforms; a range of platforms that are backed by an experienced, reliable and global network with over one hundred years of experience
superior solutions, providing exceptional protected mobility www.governmentalsalesoceania.com 014-033_SSM110 Regulars.indd 17
13/10/2017 5:42 pm
RESILIENCE
TRUSTED INSIDER THREAT TO ORGANISATIONAL RESILIENCE BY DR RITA PARKER
eople are critical to
component. Organisations are
adequate mechanisms built into an
catastrophic activities… that went
an organisation’s
social systems that rely on people
organisation’s systems to identify
undetected as a consequence of a
success, or its failure,
to ensure their ongoing operations
various kinds of risk-indicating
failure of management and other
and significant time
and functions. People are part
behaviours. At the most basic
internal controls of the most basic
and resources are invested in
of, and essential to, the overall
level, these can be incorporated
kind.” If appropriate risk indicating
screening potential job applicants
system and they have the potential
into management processes,
policies and procedures had been
to ensure they have the necessary
to contribute to the resilience of
including performance reviews,
in place at Barings, it is unlikely that
skills, experience, qualifications,
the organisation.
reconciliations of corporate credit
Nick Leeson would have been able
cards and travel records. It does not
to wreak such havoc, and Barings
P
capabilities, attitude and values.
But how well do you know
Many hours are spent reading
your colleagues, your boss, or
mean surveillance of employees
Bank would have been sufficiently
carefully crafted written
the staff you recruited? How well
or breaching their privacy, but it
resilient to survive and thrive. That
applications, interviewing potential
do you really know them? Active
does mean including strategies
lesson is just as relevant today as it
candidates and checking references
recruitment is only one part of
and mechanisms to detect and to
was then.
to ensure the selected candidate
the overall picture of ensuring an
prevent trusted insider threats.
will fit in with the organisational
organisation can trust and rely on
Such strategies were lacking in
as infrastructure, contribute to
culture and contribute to its goals,
its people. Most employees are
the well-documented case of
the resilience of an organisation,
productivity and overall success. In
decent, reliable and trustworthy
Barings Bank.
but while physical assets require
the past, it was often enough to
people, but that does not mean
conduct rudimentary background
organisations can be complacent,
Bank’s derivative futures traders
or replacement, human
checks, but in today’s highly
or abrogate their responsibility to
in Singapore, Nick Leeson, was
assets will enhance resilience
competitive corporate environment,
their shareholders or, indeed, to
engaged in risky trading that relied
through ongoing engagement,
as an added level of scrutiny,
other staff. Rudimentary or more
on stability in the Japanese stock
communication and trust. n
organisations increasingly seek
thorough background checks are
market to avoid major losses.
police checks and some agencies,
useful, but they are only as good as
However, the Kobe earthquake
particularly in the government
the day they were undertaken.
caused the Nikkei Index to drop by
of the International Council of
In 1995, one of Barings
People, like other assets such
only regular routine maintenance
Dr Rita Parker is a member
sector, require a formal security
In today’s competitive and
seven percent in one week. Barings’
Security & Resilience Professionals
vetting procedure of candidates
global environment, there are
losses escalated rapidly, in the end
and is Centre Manager of the
before declaring them successful.
frequent, almost daily, reports
reaching £1.3 billion. This resulted
Australian Centre for Armed Conflict
All these checks are relevant and
of insider trading, intellectual
in bankruptcy for the oldest
and Society. Rita is also a former
appropriate to ensure new
property theft, data breaches,
merchant bank in Britain, which had
Distinguished Fellow at the Center
members of staff are, or at least
unauthorised risks, or other
financed the Napoleonic wars, the
for Infrastructure Protection at
appear to be, trustworthy and they
adverse events that damage
Louisiana Purchase and the Suez
George Mason University, USA. She
will not act in any way that might
an organisation’s reputation –
Canal. Leeson was charged with
provides advice to organisations
damage the organisation’s carefully
sometimes irrevocably. Too often,
forgery and cheating and sentenced
seeking to increase their corporate
built reputation.
organisations adopt the view that
to six and a half years in jail and
and organisational resilience and
once the initial scrutiny of an
many of his former colleagues lost
crisis management ability. Her
the strength and backbone of
employee has been undertaken,
their jobs.
co-edited book, Global Insecurity,
an organisation, whether it is a
no further action is necessary.
multinational or a small entity. Yet,
But that approach is insufficient
the collapse of the bank noted,
available in 2017, includes aspects
in many ways, people are also an
to build and maintain resilience.
“Barings’ collapse was due to
of her recent research about urgent
organisation’s most vulnerable
What is necessary is to have
the unauthorised and ultimately
global security policy issues.
For the most part, people are
18 // SECURITY SOLUTIONS
014-033_SSM110 Regulars.indd 18
Part of the official report into
published by Palgrave McMillan and
securitysolutionsmagazine.com
13/10/2017 5:42 pm
“THE FIRST HAND-TRIGGERED ACCESS CONTROL READER“
STid Security presents
French expert in RFID, NFC, Bluetooth® and IoT, our contact free identification solutions have been designed to eliminate barriers in your business via innovative independence-focused technologies. Thanks to the STid Mobile ID® app and the Architect® Blue Bluetooth® reader, your smartphone turns your hand into a badge you have with you at all times. With the freedom to choose your favourite identification mode and make your access options both secure and much more intuitive.
Slide mode
TapTap mode
Remote mode
Hands-free mode
Security Meeting 2016 Trophées de la sécurité 2016 & 2017 Expoprotection 2014 & 2016 ISC West 2017 Trophées APS 2017
014-033_SSM110 Regulars.indd 19
www.stid-security.com
Photo credit: iStock - 08/17 - 10917
Badge mode
13/10/2017 5:42 pm
HUMAN RESOURCES
BULLYING – THE SCOURGE THAT BESETS SMALL, MEDIUM AND LARGE ORGANISATIONS N
BY GREG BYRNE
ot a day goes by
in a bullying incident that resulted in
work, the person reading the post is
without a headline
the award of over two million dollars
considered to be at work. It should
somewhere in
in damages.
be noted that the FWC has found at
or undertaking (PCBU) has the
work to mean performing work or an
primary duty of care under the Work
activity authorised by the employer.
Health and Safety Act 2011 (WHS
Australia on bullying in
The Fair Work Ombudsman
the workplace. In the vast majority of
defines workplace bullying as
bullying cases, the witnesses and
unreasonable and repeated acts
victims are left emotionally bruised,
discrimination agencies. A person conducting a business
The effects of bullying in
Act) to ensure, so far as is reasonably
towards a worker or a group of
the workplace can be profound,
practicable, the health and safety of
workplaces are left with fractured
workers who are ‘at work’ and that
long-lasting and in some cases
workers and that other persons at the
relationships and the organisation
creates a risk to health and safety,
catastrophic. It can lead to serious
workplace are not put at risk from
suffers at times significant
and includes behaviour that is
psychosocial injury, which is one
the work that is carried out. Health
reputational damage. This column
victimising, humiliating, intimidating
of the main causes of workplace
is defined in the WHS Act as both
will address just what bullying in the
and/or threatening. Safe Work
stress leading to a deterioration of a
physical and psychological health.
workplace is, how it affects all
Australia defines workplace bullying
worker’s mental health. Bullying in
concerned and what should be done
as repeated and unreasonable
the workplace may result in:
made to an employer, including a line
about it at the workgroup, team and
behaviour directed towards a worker
• stress, anxiety or sleep
supervisor, a person should expect
organisational levels.
or a group of workers that creates a
The written or online news
risk to health and safety. It should
disturbance • mental health issues such as
When reports of bullying are
immediate action that is consistent with organisational policy and
websites are littered with headlines
be noted that workplace bullying is
such as, ‘Large payout in bullying
not simply confined to behaviour
case for employee returning from
that occurs within the physical
maternity leave’, ‘Ex-banker accused
workplace, but encompasses both a
of cutting off woman’s ponytail
worker’s performance at work and
amid bullying allegations’, ‘Vic firies
participation in activities that have
• reduced work performance
the outcome of any investigation and
bullying report fight in court’ and
been authorised by an employer,
Everyone at the workplace has a
the right to confidentiality. After the
‘Bullying, harassment cause hundreds
regardless of their location. In a
duty in relation to stopping and/or
report has been investigated and,
of police mental health claims’.
recent decision, a full bench of
intervening when they see workplace
provided an adverse finding has been
The effects of these allegations
the Fair Work Commission (FWC)
bullying occurring. All workers can
made against a person, the range of
can be profound and long-term
considered the meaning of at work as
help ensure that bullying behaviours
possible remedial action available
both for the victim, perpetrator
defined in section 789FD of the Fair
do not occur. The FWC offers the
to the employer include reassigning
and the organisation. In the case
Work Act 2009 (Cth). The FWC found
following advice:
duties, resolution/mediation,
where a large payout was made for
that at work incorporates both:
• Refer to workplace policies
raising awareness in the workplace,
bullying an employee returning from
• the performance of work
maternity leave, the employee was
whenever and wherever that work
found to have been bullied and was
is performed, and
awarded $240,000 in damages. The
• situations when a worker is
depression • reduced quality of family and home life • increased absenteeism and staff turnover
and procedures. • Speak to the person doing the bullying and ask them to stop.
engaged in an activity that is
resources, a line manager,
health issues as a result of bullying
authorised or permitted by the
management or the union.
employer (such as meal breaks).
should be taken seriously and should be investigated. After making a report, a person has the right to be kept informed of the progress and
providing training, requesting an apology, issuing a verbal or written warning, or demotion/dismissal. n
• Seek advice from human
claim where police suffered mental not only led to serious reputational
procedure. In all cases, the report
• The FWC advises that workplace
Greg Byrne is CEO and director of Multiset Consultancy Pty Ltd, a multifaceted consultancy advising CEOs
damage to the force, but increased
By this definition, a worker on
bullying should always be
and boards of security organisations
incidence of suicide and attempted
an authorised meal break at the
reported. The report may be
in Australia on best approaches to
suicide, and the devotion of extensive
workplace is considered to be at work,
verbal or in writing.
manage business risk, particularly
resources both from the police force
and a worker who reads a private
Advice can also be sought from
operations, disaster recovery, business
and the police union. In a matter
Facebook page whilst at work, even
the FWC, Comcare, the relevant
continuity and human resources. Greg
played out in the NSW Supreme
though the post was not work related
state’s Safe Work department, or
can be contacted via email greg@
Court, a security guard was involved
and was made by someone not at
the various human rights and anti-
multisec.com.au or on 0402 295 124.
20 // SECURITY SOLUTIONS
014-033_SSM110 Regulars.indd 20
securitysolutionsmagazine.com
13/10/2017 5:42 pm
Recognize and Analyze How often was he here this month?
Is he a known suspect?
How old is she?
Is this valued customer Mia Clark?
Do they appear in videos recorded last week, two months ago? How many people are here? Is it too crowded in this area? New: Recorded media import and advanced investigation tools upload sets of videos recorded at a specific location and time to track possible participants in a crime find a person enrolled in an image database or search for an unknown person locate appearances in multiple videos make use of filters that specify timeframe, camera location, age range, gender and glasses
FaceVACS-VideoScan performs real-time identity checks to find known persons and alert security staff, while performing anonymous facial analysis to count individuals, analyze demographics and track people flow.
014-033_SSM110 Regulars.indd 21
13/10/2017 5:42 pm
RISK MANAGEMENT
THE WICKED PROBLEM OF HOSTILE VEHICLES IN URBAN ENVIRONMENTS ne of the ‘wicked
There are also traffic
Co Fo
BY DR KEVIN J. FOSTER
of the security measures, or
in their designs. Historically,
problems’ that
engineering standards that
alternatively provides detailed
barriers separating vehicles and
security professionals
should be considered for
specifications of the security
pedestrians have been used to
need to understand
separating vehicles from
treatments required. If a state
provide pedestrian protection
and consider is the risk posed by
pedestrians including:
agency chooses to provide
against vehicle accidents. Perhaps
extremists intent on using motor
• AS/NZS 3845.2:2017 Road
neither, then arguably there is a
these traffic safety standards need
O
vehicles as ramming weapons
Safety Barrier Systems: Road
high likelihood that the security
to be updated to include protection
deliberately to injure or kill
Safety Devices
implemented to counter this type
of pedestrians against deliberate
of attack will be either under-
use of a vehicle to ram pedestrians,
pedestrians in crowded public places. While the use of bollards and vehicle
The Australian Government’s
engineered or over-engineered.
especially in areas where large
barriers to protect infrastructure and
Hostile Vehicle Guidelines
If over-engineered, the solution
numbers of people might gather.
buildings is quite well understood, it
suggest that crowded places
may be uneconomic; if under-
In Western Australia, an example
is not so widely known what
include sports stadia, transport
engineered, the security may
of a guideline that needs updating
standards or guidelines should be
hubs, shopping centres, hotels,
be ineffective.
is published by Department of
used to protect pedestrians from
clubs, places of worship, tourist
hostile vehicle attacks. Some include:
attractions, movie theatres, civic
authorities responsible for
and designing for pedestrians:
• Hostile Vehicle Guidelines
places and pedestrian malls. The
protecting the public in open
guidelines. Each public road
for Crowded Places: A Guide
guide explains that it is important
spaces should consider having a
authority in Australia probably has
for Owners, Operators and
not to design security measures
store of temporary vehicle barriers
a similar guideline.
Designers, published by the
in isolation from other risks, such
that can be used when the threat
Australian Government in 2017
as crowd rush. In other words,
warrants them. For example,
safety engineers and security
and endorsed by the Australia-
if protective barriers are over-
relocatable concrete cubic bollards
specialists are usually attempting
New Zealand Counter-Terrorism
engineered to the point that
have been placed between the
to address different hazards,
Committee. See https://www.
they prevent or delay people
road and pedestrian entry points to
threats and vulnerabilities with
nationalsecurity.gov.au/Media-
from escaping an emergency
Southern Cross Railway Station in
different standards. Perhaps
and-publications/Publications/
situation such as a fire, then the
Melbourne. Similar vulnerabilities
there is a need to develop
Documents/hostile-vehicle-
safety-in-design will have been
elsewhere in Melbourne are also
uniform pedestrian safety and
guidelines-crowded-places.pdf
ineffective. Therefore, a holistic
treated in this way.
security standards in Australia
• Integrated Security: A Public
approach to the selection and
As a minimum, public
When deciding what to
Transport and entitled Planning
Unfortunately, road traffic
and everywhere where the risk
Realm Design Guide for Hostile
design of risk treatment measures
do about this type of threat
of hostile vehicle attacks against
Vehicle Mitigation, Second
is required, and should not be
at a particular location, one
pedestrians is significant. There is
Edition, published by the UK
limited to security issues. Also, it
complication is that whenever
a need for risk policies at federal
Centre for the Protection of
is important not to under-engineer
security is hardened at one place,
and state levels designed to ensure
National Infrastructure in 2014.
the measures to the point that the
extremists can choose a softer
the effective coordination of road
See https://www.cpni.gov.uk/
security issue is not addressed.
target somewhere else. It might
safety and security strategies for
system/files/documents/40/20/
This is particularly challenging if
be a pedestrian precinct, a school
addressing this risk. n
Integrated%20Security%20
the threat is not understood.
playground, a shopping centre,
Guide.pdf
Obtaining a threat assessment
or a football field – anywhere.
Dr Kevin J. Foster is the
from state or national authorities
Therefore, it is impossible to
managing director of Foster Risk
Traffic Advisory Leaflet 1/11:
is critically important for ensuring
fund, design and build security
Management Pty Ltd, an Australian
Vehicle Safety Barriers within
that mitigation measures are not
infrastructure to prevent such
company that provides independent
the Streetscape, published in
under-engineered. It is essential
attacks in every public place where
research aimed at finding better
2011. See https://www.gov.
for public sector projects that the
people gather or walk.
ways to manage risk for security and
uk/government/publications/
managing agency or state sponsor
vehicle-security-barriers-within-
provides the necessary threat
should always consider the
understanding of emerging threats
the-streetscape
assessments to the designers
selection and use of safety barriers
from ‘intelligent’ technologies.
• UK Department of Transport
22 // SECURITY SOLUTIONS
014-033_SSM110 Regulars.indd 22
Designers of public spaces
public safety, and improving our
securitysolutionsmagazine.com
13/10/2017 5:42 pm
Contact us on 1300 364 864 Follow us on
Delivering Proven Solutions for Security & Safety We Protect People & Assets www.magneticautomation.com.au 014-033_SSM110 Regulars.indd 23
13/10/2017 5:42 pm
COMMUNICATIONS
HOW TO FACE RACE, CONFLICT AND YOURSELF BY ROD COWAN
here is a YouTube clip
between people of different races
will be against you. You end up
behaving the way they are. Rather
of a young cancer
is complicated, with each party
dealing with the immediate, which
than judging them and quickly
survivor, Calysta
depending on personally developed
means starting with your mindset
jumping to conclusions, become
Bevier, performing
cultural stereotypes, generalisations
in response to different races. You
curious about their behaviour. Doing
Fight Song on America’s Got Talent
and styles of communicating.
can begin doing so by considering a
so provides a new lens to look at
2016 that I play to people. It is a
Ultimately, misunderstandings
range of factors:
the interaction. Ask yourself, how
poignant song about survival and
create problems, from operational
coping with adversity. The young,
considerations, such as slowing
an interaction with the feeling of
attractive, white songstress ends
operations, to reputational issues,
professionalism and flexibility, and
We all make mistakes: When
her rendition with the words, “I
such as customer complaints.
be open to handle the unknown and
people do something, do not assume
T
might only have one match, but I
Much of the training in this area
Shared interests: Enter into
does their behaviour make sense to them?
the ambiguous. Genuinely embrace
they are deliberately trying to be
can make an explosion.” As the
tends to be adapted from customer
that your role is to protect people
rude or insulting. Even if they are,
backing track trails off, the crowd
service or cross-cultural programs,
and to help them.
maybe it is because they are upset
goes wild. Beautiful. Moving.
but they are often a poor fit for
After a few moments of silence,
Why believe such things?
about something you have done.
`
j
v
security needs and do not help in
Our biology reacts, sometimes
If possible, ask them why they are
I ask viewers, “What if she was
developing an effective mindset
unconsciously and inadvertently,
doing something, but keep it about
`j
wearing a hijab?” When I do
for inter-racial communication that
negatively to new stimuli. The
facts, not opinions.
jv
so, the conflicting emotions on
helps you get the best out of people
right mindset in approaching each
people’s faces can be seen. Our
from a security perspective.
new interaction sets the tone of
race, acquired through genes and
Why inter-racial rather than
your actions.
Watch for inflexible thinking: When this occurs, in yourself and others, pause the conversation and
physical characteristics, overlayed
cross-cultural understanding? In
with our culture, gained through
its simplest terms, race is visual,
be defending and protecting
you are thinking. Often inflexibility
symbols made by humans that
based on physical appearance, while
themselves from a perceived fear,
is only a reaction to another feeling
give meaning to shared beliefs and
culture is often hidden, based on
such as being humiliated, hurt or
that you caused in them. For
values, such as the notion of good
beliefs, values and life symbols.
rejected. They are on the defensive
example, you may have been looking
versus bad and right versus wrong,
Cross-cultural understanding takes
because they feel threatened and
for someone to help, and they
means racism is deeply embedded
place when one or both parties has
cannot predict the needs of the
thought you were ignoring them.
in each of us.
the intellectual capacity and the
other party or their outcomes.
time to understand each other’s
Without the right mindset, you may
is on getting control of a situation.
not help when it comes to inter-
culture, then dig deeper to identify
both be in the same state of mind,
That does not mean being tougher
racial communication. Inter-racial
points of difference and go on to
because at the most fundamental
or more authoritative than the other
communication skills in security,
develop the means to mitigate or
level, we all have the same
person, or smarter, or better, but
law enforcement and intelligence
manage potential conflict.
human needs.
getting to an acceptable outcome
Pretending otherwise does
are vital for personnel who daily
Putting aside intellectual
In many cases, people may
Use your brain: In the middle
talk about the reason behind how
for the security for which you are
capacity, when dealing with people
of a transaction where inter-racial
they need to be thorough and
in a security or law enforcement
tensions are at play, you may start
professional in carrying out their
setting, there is rarely time to get
feeling like you are losing control
duties, while at the same time
to understand another person’s
of your feelings, worrying about the
of securityisyourbusiness.com, a
invariably balance some semblance
culture or what is going on in his
outcome and wondering how to get
research fellow with the Research
of customer service or public image.
head. Limited second language
away from the situation. Think first
Network for a Secure Australia and a
proficiency may make matters
before saying or doing anything.
strategic advisor to the Dubai-based
responsible. n Rod Cowan is a writer/director
Emirates Group Security/Edith Cowan
with staff from various races or
worse. In some settings, such as
staff dealing with customers from
airports, universities and places
are not like you. Maybe there is
University Centre of Aviation and
different cultures, communication
of mass gathering, sheer diversity
a reason that other people are
Security Studies (CASS).
24 // SECURITY SOLUTIONS
014-033_SSM110 Regulars.indd 24
Be curious: Wonder why people
h
In any situation, the emphasis
find themselves in positions where
Whether it be managers dealing
`v
`jv
securitysolutionsmagazine.com
13/10/2017 5:42 pm
`
j
v
`j
jv
`v
`jv
h
THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.
NEW!
ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.
+61 (3) 9544 2477
email: oz_sales@takex.com
HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.
BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.
INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.
OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .
1300 319 499 csd.com.au www.takex.com
TAKEX AMERICA
VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta 014-033_SSM110 Regulars.indd 25
13/10/2017 5:42 pm
LEGAL
PROTECTING YOUR INTELLECTUAL PROPERTY FROM YOUR EMPLOYEES E
BY JUSTIN LAWRENCE
very business, no
confidential business system and
It will not, however, be definitive
that suit, the employer may seek
matter how big or
treats some of its information as
proof as to whether or not the
orders compelling the employee to
small, must protect
sensitive and confidential. The
restraint is valid.
deliver up copies of all confidential
its intellectual
business is entitled to advise
The fourth principle is that the
documents in their possession and
property because it is undeniably
its employees that it requires
validity and reasonableness of
to provide a written undertaking
what separates you from your
each of them to sign a document
the restraint will not be assessed
that they will not continue to
competitors. You might be
in which they agree to protect
in retrospect (that is, it will not be
approach or solicit customers or
surprised to know that the biggest
that information.
assessed after the employment
clientele, and will cease using the
relationship comes to an end), but
former employer’s confidential
risk to your intellectual property is
The confidentiality agreement
not your direct competitors, but
that you prepare should contain
rather it will be assessed at the time
systems. If those orders are not
rather your staff – the very people
two parts: a confidentiality part
that the contract of employment is
made, or if the ex-employee
who handle your intellectual
and a restraint of trade part.
entered into.
refuses to abide by them, the
property every day, and who, quite
Both parts will be designed to
The fifth and final principle is
literally, hold the future prosperity
prevent employees from using
that the court is not permitted to
further breaches by obtaining an
of your business in their hands (and
the confidential information as
re-write the restraint if it is found
injunction. n
in their minds).
an inducement for a prospective
to be too broad or excessive.
There is obviously no problem
employer may seek to prevent
Justin Lawrence is a partner
employer or starting up their own
Instead, the court may remove
with your staff members knowing
business as a direct competitor.
any parts of the agreement
with Henderson & Ball Solicitors,
your intimate business secrets
The restraints that you outline in
that are unreasonable if more
17 Cotham Road, Kew, Victoria, and
while they are working for you. In
this document must be reasonable,
reasonable restrictions are part of
practises in the areas of Commercial
fact, in most cases, you want them
otherwise the court will interpret
the agreement.
Litigation, Criminal, Family and
to use that intellectual property (IP)
them against the employer and in
for the benefit of your operation.
favour of the employee.
A well drafted confidentiality
Property Law. Henderson & Ball has
and restraint agreement may be
Law Institute of Victoria accredited
enforced to prohibit an employee
specialists in the areas of Business
However, the issue of protecting
In 2004, the leading case in
your intellectual property arises
this area of the law set out five
from removing confidential
Law, Property Law and Commercial
not when things are going well
principles that the court will
information from the business, or
Litigation. Justin Lawrence and
and your staff are loyal to you,
consider when deciding whether or
from seeking to poach existing
Henderson & Ball can be contacted
but when the relationship breaks
not a restraint is reasonable.
clients within a specified period
on 03 9261 8000.
down or your employee leaves
The first principle is that the
of time and within a specific
Whilst every effort has been taken to ensure its accuracy, the
acrimoniously or is poached by
employer must have interests
your competitor.
capable of being protected. These
The restraint will not be
things may include customer lists
upheld by the court if it seeks
article is intended to be used as a
prohibition on employees misusing
and trade secrets. They might also
only to protect the employer from
general guide only and should not
confidential information after they
include confidential processes
competition by the employee.
be interpreted or taken as being
have left your business, you really
or other unique elements of
However, an employer may seek to
specific advice, legal or otherwise.
need to consider whether you
the business.
enforce an agreement where the
The reader should seek professional
employee seeks to take advantage
advice of a suitably qualified
Although the law has a general
are prepared to leave something
The second principle is that
geographical location.
information contained in this
so important in the hands of the
it must be reasonable for the
of the employer by using against
practitioner before relying upon
common law, or whether you
confidential information to
the employer’s confidential
any of the information contained
want to set out the prohibition
be protected by a restraint or
information that they obtained
herein. This article and the
in a properly drafted, legally
confidentiality agreement.
during their employment.
opinions contained in it represent
enforceable document. So how
The third principle is that if the
If an employer finds out that
the opinions of the author and
does a business go about protecting
employer and employee enter into
an ex-employee has breached
do not necessarily represent the
its IP?
a written agreement that states the
a confidentiality and restraint
views or opinions of Interactive
proposed restraint is reasonable,
agreement they may sue to protect
Media Solutions or any advertiser
it known to all employees that
the agreement will be afforded
their intellectual property from
or other contributor to Security
the business runs and operates a
significant weight by the court.
disclosure and misuse. As part of
Solutions Magazine.
The first thing to do is to make
26 // SECURITY SOLUTIONS
014-033_SSM110 Regulars.indd 26
securitysolutionsmagazine.com
13/10/2017 5:42 pm
STOP TAILGATING AND OTHER UNAUTHORISED ENTRY ATTEMPTS
NOW AS EASY AS 1,2,... 1
2
1
Take 1 standard access controlled door with tailgating problems.
Tailgating is the art of unauthorised people following authorised people through an access controlled door.
www.pathminder.com.au
014-033_SSM110 Regulars.indd 27
2
Add a PathMinder HPJ half portal.
The PathMinder HPJ half portal can ‘cap’ any access controlled door to turn it into a secure interlock, the highly sophisticated ultra sonic tailgate detection technology makes sure access is limited to one person at a time.
3
Sit back and relax, job done.
With over 40 portals in the range, PathMinder has a high security solution to controlling access at any entry point. Our portals include vandal, attack and bullet resistant certified designs, DDA compliant solutions and full customisable models to match your security needs.
Phone: 1300 750 740
13/10/2017 5:43 pm
THINKING ABOUT SECURITY
THOSE NEXT DOOR BY DON WILLIAMS
M
ost of us are
during or in the aftermath of an
source of risk. They may choose the
(BCP)/resilience plan. In a small
reasonably good at
attack against someone nearby; the
provider of emergency procedures
business, this may be two or three
treating our own
Martin Place siege is an example.
and possibly the security services
people. If the business is too small
Some neighbours, particularly
and systems. Their selection may
to have a BCP plan, then it is too small to survive an incident.
risks, but what about
the risks that belong to others? We
government tenants, can have
not be the best for you; it may
may not be the target for certain
a much lower trigger point for
be the cheapest available. The
types of crimes or political actions,
evacuation, where closing their
risk is that the site’s security or
treatment is to speak to the security
but our neighbours may. It is always
business for half a day does not cost
emergency procedures are not
manager of the identified critical
informative to read the directory in
them anything. The fact that all their
appropriate for your business. A
points of failure to see how (or if)
a multi-tenanted site. There might
neighbours also have to evacuate at
possible response is for you to add
security risks are addressed and
be an embassy, consulate or
great cost to productivity is of little
additional measures to the security
what treatments are in place. As
government trading company from
concern to them. It may be purely
and emergency procedures. It may
well as your business, you may
a country that is currently, or
due to someone else that clients
be possible to ask for better or
want to consider how your critical
permanently, in the news and at
cannot access your site, but it is still
more appropriate capability to be
clients are exposed to supply
risk from attack or protests.
your problem.
provided, but the reality is that each
chain or other service disruptions
tenant should check what is being
and whether their collapse could
Neighbours may be involved in
How is it possible to deal
Again, a risk mitigation
activities that lead to protests or
with other people’s risks? A good
provided and ensure their own
also be yours. Possibly on-
even violent attacks; there may be
start is a cup of coffee. Introduce
concerns and risk are addressed
selling your services to protect
state or federal departments and
yourself to your neighbours. Discuss
by adding to the existing systems,
their survivability?
agencies on the site (more about
common issues and concerns, talk
probably using their own resources.
them later).
about emergency procedures and
A second example of where
Of course, the other option is to rely on the fact that none of this
It is worth considering the
coordinate responses. Chatting
other people’s risks can affect
is your problem and sticking your
threat profiles of your neighbours.
about areas of mutual concern
the business is through supply
nose in will do no good anyway. n
Have a look over the fence and see
and interest as tenants on the site
channels. Understanding up and
who is in the buildings next to and
can lead to significant benefits
down line risks due to deliberate,
opposite. What threats, risks and
and hopefully reduce disruption
malicious human action falls to the
is a recognised thought leader in the
hazards do they bring? Damage and
and concern.
security manager who is, hopefully,
field of security. He can be contacted
working with the team responsible
via email at donwilliams@
for the business continuity plan
dswconsulting.com.au
disruption can be collateral, with your organisation being caught up
28 // SECURITY SOLUTIONS
014-033_SSM110 Regulars.indd 28
The landlord or facility manager for a multi-tenanted site can be a
Don Williams CPP RSecP ASecM
securitysolutionsmagazine.com
13/10/2017 5:43 pm
TR
OR
014-033_SSM110 Regulars.indd 29
HÉE D’ OP
13/10/2017 5:43 pm
EVENTS
ASIS International Australia Conference Contemporary Security Leadership
public and private sectors • security risk management professionals
are based on extensive research
security industry and network with
on key factors that contribute
over 28,000 security professionals.
to and characterise outstanding
M
In Australia
• security service providers
performance. (This research can be
offer attendees a host of
19 October 2017
• security consultants
found at https://perpetuityresearch.
attractions including:
Melbourne Convention and
• government and law
com/wp-content/uploads/2014/09/
• new products and technologies,
Exhibition Centre The ASIS International Australia
enforcement professionals
Aspiring-to-Excellence.pdf)
encompassing everything
Contact events@asisvictoria.org.
The OSPAs are being set-up
from access control to
Conference 2017 is the premier
au or visit www.asisvictoria.org.au
in collaboration with security
unmanned vehicles.
gathering of security professionals.
for more information.
associations and groups across
The conference provides an
many countries.
Y
C
C
Y
CM
introduced in 2017, is an event
the key trends and issues facing
19 October 2017
and criteria, the OSPAs scheme
(UAVs), unmanned ground
security professionals locally
The River Room
provides an opportunity for
robotics and vehicles (UGVs),
and globally.
Crown Casino, Melbourne
countries to run their own
and the various software and
The Outstanding Security
evidence-based OSPAs schemes
Key topics
Performance Awards (OSPAs) are
while maintaining an ability to
• terrorism
pleased to announce the dates
compete on an international level
moved to the ISC West show
• cybersecurity
for the 2017 Australian awards.
in the future – World OSPAs.
floor in 2017! As the digital
• behavioural techniques
They will be working for the third
Visit au.theospas.com for
and physical worlds collide,
• security management
year in a row with the prestigious
more information or to make
it is increasingly important
• emergency management
Australian Security Industry
a nomination.
for industry professionals to
The OSPAs recognise and
within ISC West focusing on
clients from both physical and cyber threats. CSE provides
across the security sector. They are
Sands Expo Convention Center,
holistic solutions for today’s
colleagues from the public and
designed to be both independent
Las Vegas
private sectors
and inclusive, providing an
ISC West is the largest security
Working with SIA, ISC West also
opportunity for outstanding
industry trade show in the US.
features world-class education
performers, whether buyers or
At ISC West you will have the
to learn about every facet of the
security profession
suppliers, to be recognised and for
chance to meet with technical
security industry.
their success to be celebrated.
representatives from 1,000+
014-033_SSM110 Regulars.indd 30
K
connected organisations.
accelerating the future of the
30 // SECURITY SOLUTIONS
K
protect their organisations and
ISC West
• engage with peers and
The criteria for these awards
CMY
applications that support them.
11–13 April 2018
• security professionals across the
CY
K
CY
• Connected Security Expo (CSE)
reward companies and individuals
Who should attend the event:
MY
CMY
opportunity to:
• join industry leaders
CMY
MY
• Unmanned Security Expo,
unmanned aerial vehicles
The conference is a great
CY
CM
standardising the award categories
Association Limited (ASIAL).
MY
Y
The 2017 Australian OSPAs
By researching and
CM
M
M
and business exchange, addressing
established platform for education
C
In 2018, ISC West will
exhibitors and brands in the
Visit www.iscwest.com for more information.
securitysolutionsmagazine.com
13/10/2017 5:43 pm
Thermal2017-5-18.pdf 1 2017/7/14 14:29:40 R
R
R
You Might Think
It’s Magic You Think You Might Might Think It’s It’s Magic Magic C
M
Y
C CM
M MY
Y CY
CM CMY
MY K
CY
CMY
K
Hikvision Thermal Cameras Reveal What’s in the Dark It’s not magic. It’s simple: the heat is on, even when lights are off. Heat replaces light in the darkness and Hikvision’s Thermal Cameras capture everything in vivid images at up to 640 x 512 pixels. Powerful Hikvision Thermal Cameras Reveal What’s in the Dark features make these cameras perfect for 24/7 perimeter protection, unhindered by any weather or light condition – features like temperature-anomaly detection effectively prevent emergencies, and It’s not magic. It’s simple: the heat is on, even and whenfire lights are off. Heat replaces light in the darkness Hikvision Thermal Cameras Reveal What’s in the Dark Smart behavior analyses including line-crossing detection and intrusion detection in open and and Hikvision’s Thermal Cameras capture everything in vivid images at up to 640 x 512 pixels. Powerful expansive areas. Safeguard critical infrastructure and any other application, anywhere, anytime.or light features make these cameras perfect for 24/7 perimeter protection, unhindered by any weather It’s not magic. It’s simple: the heat is on, even when lights are off. Heat replaces light in the darkness condition – features like temperature-anomaly and fire detection effectively prevent emergencies, and andSmart Hikvision’s Thermal Cameras capture everythingdetection in vivid images at up todetection 640 x 512inpixels. behavior analyses including line-crossing and intrusion open Powerful and features make these cameras perfect for 24/7 perimeter protection, unhindered by any weather or light expansive areas. Safeguard critical infrastructure and any other application, anywhere, anytime.
condition – features like temperature-anomaly and fire detection effectively prevent emergencies, and Smart behavior analyses including line-crossing detection and intrusion detection in open and Hikvision Oceania expansive areas. Safeguard critical infrastructure and any other application, anywhere, anytime. Unit 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Email:salesau@hikvision.com Hikvision Oceania Unit 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Email:salesau@hikvision.com
014-033_SSM110 Regulars.indd 31
www.hikvision.com.au
www.hikvision.com.au
13/10/2017 5:43 pm
EVENTS running more sustainable facilities and workplaces • foster a community of multidisciplinary professions
management • catastrophes and humanitarian response • innovation and technology
to have a voice and achieve recognition • redefine the future of the
Comprising an exposition of equipment, technology and
industry and challenge
services and a congress of
traditional perceptions of
specialist conferences, CivSec
facility management
2018 will confront the complex
Visit www.totalfacilities.com.au for
and increasingly interconnected
more information.
security and environmental challenges facing modern societies.
CivSec 2018 1–3 May 2018
Visit www.civsec.com.au/ for more information.
Melbourne Convention and Security, Safety and Sovereignty for
Security Exhibition & Conference 2018
the Indo-Asia-Pacific Region
25–27 July 2018
Building on the success of the
Melbourne Convention and
inaugural CivSec event, 2018
Exhibition Centre, Melbourne
will bring together leaders and
In 2018, the Security Exhibition
decision makers, policy makers
& Conference is heading back
and advisers, managers and
to Melbourne.
Exhibition Centre, Melbourne
officials, operational professionals,
The Security Exhibition &
technical specialists, strategists
Conference is the industry’s annual
and academics, researchers and
opportunity to reunite for three
consultants, technology developers
days of quality networking and
and industry suppliers.
unrivalled education alongside a
While focusing on the Indo-
showcase of the most innovative
Asia-Pacific region, CivSec 2018
solutions to the Australian market.
will address issues of global
For over three decades, it has been
significance. The sovereignty,
the largest and most established
safety, prosperity and cohesion
commercial event for the security
Total Facilities
its delivery and provides real
of societies and communities
industry in Australia, bringing
18–19 April 2018
solutions to everyday operational
everywhere are threatened by
together the entire supply chain of
Melbourne Convention and
challenges by connecting buyers
natural disasters and emergencies,
manufacturers, distributors, security
Exhibition Centre, Melbourne
and sellers to source innovation,
by human catastrophe and civil
professionals and end-users to
Returning to Melbourne with an
debate current issues, share
disorder, by criminal activity and
connect and create unparalleled
exciting new proposition, Total
insights and create opportunities
terrorism and by the movement
business opportunities.
Facilities now unites both facilities
for an invaluable community
of distressed populations across
and workplace professionals in the
of professionals.
porous frontiers.
Our vision
and exposition will zero-in on key
professionals with over 150
We champion professionals
themes, which will include:
leading suppliers. The 2018 show
Sydney and Melbourne, TFX is
who support the built and work
• human security and safety
is set to see some interesting new
Australia’s largest learning and
environment with a sense of
• public security, policing and
innovations as well as a host of
networking event for facilities
belonging and advocacy – the
and workplace management
unsung heroes and behind-the-
professions seeking solutions for
scenes forces. We will evolve and
creating more efficient, sustainable
grow our offer year on year to:
• cybersecurity and social media
seeing you again in Melbourne in
and productive facilities
• bring new and leading solutions
• borders and sovereignty
2018 for the Security Exhibition &
in operational efficiency to the
• homeland security
ASIAL Conference!
market
• community resilience
ultimate industry destination for the built and work environment. Held annually between
and workplaces. Total Facilities is comprehensive and efficient in
32 // SECURITY SOLUTIONS
014-033_SSM110 Regulars.indd 32
This international congress
• deliver forefront trends for
protection • infrastructure, resource and environmental security
• emergencies and disaster
The entire team is looking forward to once again reuniting more than 4,500 security
new attractions. Make sure you put the dates in your diary. We look forward to
Visit securityexpo.com.au for more information. n
securitysolutionsmagazine.com
13/10/2017 5:43 pm
Some cheap solutions can end up being the most expensive. STENTOFON offer fully monitored IP communications solutions made to the highest standards from premium components and materials to ensure unparalleled performance in the most demanding conditions. When you need secure, safe, reliable communications that can integrate into existing systems and grow with your future needs, look no further than STENTOFON.
whencommunicationiscritical
014-033_SSM110 Regulars.indd 33
www.stentofon.com.au
13/10/2017 5:43 pm
FEATURE
THE
BENEFITS SAFE CITI OF
34 // SECURITY SOLUTIONS
034-037_SSM110 Article 1.indd 34
securitysolutionsmagazine.com
13/10/2017 4:14 pm
For the first time in history, more
connectivity now found in core
while others have relatively little
people around the world live in
security and safety technologies,
infrastructure deployed.
cities than in rural areas. By 2030,
safe city solutions are helping
over 60 percent of the world’s
city leaders to better protect their
impact of safe city investments,
population will be living in cities.
citizens from a range of threats
IHS Markit analysed a number of
While this global migration to
including crime, terrorism and
safe city projects by four different
urban areas improves the living
natural disasters.
indexes: government investment;
standards, health and financial
TIES securitysolutionsmagazine.com
034-037_SSM110 Article 1.indd 35
safety result; social benefit; and economic benefit. Each index was
it brings challenges to a city’s
What Are The Benefits Of Safe Cities?
infrastructure, resources, security
Cities around the world face
reflect the various measures of a
procedures and emergency
diverse issues. Risk levels are
successful project defined as:
response systems. Meeting these
impacted by factors including
• Government investment:
challenges is critical to the success
the geographic location, financial
measures the level of
of cities in the decades that follow.
prosperity, population density,
a government or city
increased terrorism, crime and
administration’s continued
developed to help government
the political situation of a city.
commitment to spending
stakeholders, city mayors, and
Furthermore, some cities have
on safe city ICT equipment
police departments mitigate
already installed extensive
as well as the level of ICT
these demands. Leveraging the
security technology solutions
competence, the police
prosperity of these citizens,
THOMAS LYNCH AND NIALL JENKINS
In order to measure the
The safe city concept has been
compiled from 26 indicators to
SECURITY SOLUTIONS // 35
13/10/2017 4:14 pm
FEATURE
resource allocated to public
employment rates, city
the benefit remains stagnant.
with significant improvements
safety and the coverage of
investment and the risk and
The final stage of investment
in property and individual risk
physical security and critical
prevention of serious economic
represents more advanced
levels, police conviction rates
communications equipment
challenges happening in the
integration, co-operation on
and emergency response times.
short-term.
data and analytics and the
• Safety result: measures the
crime centres.
kidnapping as well as the
The Three Investment Stages Of Safe City Projects
investment in a safe city project
Social Benefit And Citizen Happiness Are Most Important In The Third Stage
public’s perception of crime
Government investment in safe
is primarily about safety and
If the safety result benefits most
and the police department’s
cities can be segmented into three
security. At this stage, only the
from the initial government
ability to respond to events
distinct stages. The first stage
city’s critical locations are covered
investment, the social benefit
quickly and effectively
refers to the initial installation
by video surveillance cameras,
score improves most in the third
of video surveillance cameras
basic command and control
stage of government investment.
social benefits such
and critical communications.
equipment is deployed and the
A key component of the social
as the ability to enjoy
The command-and-control
government begins to build the
benefit score is citizen feedback
entertainment, leisure and
infrastructure is deployed
ICT infrastructure required. An
on the government and police, and
sporting events safely, the
enabling the city authorities to
example of this stage can be seen
the general happiness of citizens
public’s appreciation of the
communicate more effectively,
in Nairobi, Kenya where, after
living in the city. The security
government and police force
and video surveillance provides
successful completion of phase
and safety improvements made
based on their response
evidence and a deterrent in the
one of its safe city implementation,
during the initial investment
to security and whether
highest risk areas of the city.
crime dropped by 46 percent.
phase take time to have an
level of crime, the risk to individuals and property from riots, protests, terrorism and
• Social benefit: measures
talented employees are
implementation of predictive
The second stage is
The initial government
As much of the infrastructure
impact, but ultimately create the
characterised by new city
and technology is not already
platform for an improvement in
stakeholders joining the steering
deployed, the required
the social benefit score. Citizens
economic benefits such
group and influencing the
government investment is
appreciate the value of innovative
as personal wealth and
technology direction. This stage
high. However, the benefits are
solutions that make them safer,
prosperity, spending
often is challenging for the city as
quickly realised and can drive a
increasing their appreciation of
on tourism and retail,
project complexity increases while
large increase in the safety result
the government and police force.
moving to the city • Economic benefit: measures
36 // SECURITY SOLUTIONS
034-037_SSM110 Article 1.indd 36
securitysolutionsmagazine.com
13/10/2017 4:14 pm
What Makes A Successful Safe City Project?
The continuous evolution of
these projects, but ultimately a
technologies, city structure, and
collaborative approach between
security requirements, means
the government stakeholders,
stages of investment, and
The safe city is ultimately a
a broad range of expertise
including public health, fire and
the associated benefits and
government-driven approach
is needed to make safe city
rescue, and social services, its
challenges, can help cities reach
to security. However, multiple
projects a success. Strong
citizens, and technology firms will
a positive outcome. Whether it is
stakeholders must be involved.
government support facilitates
provide the best opportunity for
first stage government investment
successful safe city projects. Understanding the different
driving an increase in the safety
Government investment versus safety result
result, or third stage investment improving the social and economic situation of citizens, safe city solutions have a positive impact on the general wellbeing of the people working and living
Safety Results
in the city. n By Thomas Lynch, director, Safe Cities for IHS Markit and Niall Jenkins, senior consultant, Security for IHS Markit. The IHS Markit Benefits of Safe Cities whitepaper covers the latest trends in Safe Cities strategies. For information about Safe Cities deployments and strategies,
Government Investment Source: IHS Markit
contact the sales department at IHS Š 2017 IHS
Markit Asia-Pacific (APAC) at +604 291 3600 or technology_APAC@ ihsmarkit.com.
securitysolutionsmagazine.com
034-037_SSM110 Article 1.indd 37
SECURITY SOLUTIONS // 37
13/10/2017 4:14 pm
FEATURE
MAKING A MONSTER:
Extremism (ICSVE) we have interviewed dozens of ISIS defectors, most of whom tell stories of disillusionment and desperation, escape and rejection of everything they saw in the Islamic State. And that was what we expected as this interview began. Two of our colleagues, Abu Said and Murat, were in the room with Umm Rashid in a Turkish town near the Syrian border, while we were in the US watching and asking questions over a video link.
HOW I BECAME A BRIDE OF ISIS
“My father fell down from a construction site and was crippled,” says the young woman, who is covered in a black abaya.
A teenage girl from rural Syria dreamed of becoming a doctor, but the war and the so-called Islamic State made her something very different, and very frightening.
“I never saw him walking. When I was little, I would stay with my father at home. My mother would be out working all the time. I never saw her a lot. But my mother loved us really a lot.” Then in late 2011 and early 2012, the Syrian civil war began, and soon spread to Raqqa in the
BY ANNE SPECKHARD AND AHMET S. YAYLA / FROM THE DAILY BEAST
east of the country. “My mother was scared and told me, ‘Oh my daughter, I need to get you “I’m from Raqqa,” says
married!’” When the Assad regime’s
Umm Rashid,
security forces pulled out of
as her months-
Raqqa, Ahrār ash-Shām took over
old baby cries
“and things went crazy,” Umm
in her arms.
Rashid remembers, referring to
She bumps him
one of the jihadi militias that rose
up and down trying to get him to settle. “I was born in 1995. I’m 21 years old, from a family of four. I have a younger sister,” she says. “My father was crippled, so my mother worked to feed the family. We
up to fight Syrian dictator Bashar al-Assad. “We heard that the rebel militias were taking girls and forcing them to get married to their soldiers.” But as a teenager, Umm Rashid had a dream. She wanted to be a doctor. Before the eruption of war, her parents had been behind
are farmers. Also, my mother
it, despite their conservative
cleaned the schools.”
Syrian background. But with the
At the International Center for the Study of Violent
uprising, she was not safe as a single girl anymore.
38 // SECURITY SOLUTIONS securitysolutionsmagazine.com
038-041_SSM110 Article 5.indd 38
13/10/2017 4:17 pm
She is composed, articulate
husband fled. I don’t know why he
me, ‘Because of you, my son died.
them, women were enrolled as
and thinking about what she says
fled. I know that his family was not
You brought bad luck to us.’ My
morality police as well.
as she explains her situation.
behaving well toward him. Even
mother-in-law loved money.”
“When the regime left because
his older brothers were beating
of the rebellion, the ninth-grade
him up as well. Soon we found
exams were cancelled. I had to go
out that Yusuf was in Tell Abyat
to Hama for the exams.” This is
and he was working in Tell Abyat.
much because there were so many
married to an emir from ISIS? I
a distance of hundreds of miles.
I continued with my husband’s
people inside the house,” Umm
can arrange that.’ Her name was
“I passed the ninth-grade exam,”
family. Soon I learned that Yusuf
Rashid answered. “I went back to
Umm al-Khattab.
Umm Rashid tells us proudly. “But
had joined Jabhat al Nusra.”
my mother’s house. I waited my
my mother looked at the situation
At the time, al Nusra
iddah,” she explains, referring
iddah for two months. Our entire
and it was so bad. She told me
was becoming the umbrella
to the mandatory three-month
house was demolished except
anyone who wants to get married
organisation for ragtag groups
waiting period for widows to
for one room. We were living in
to you, I have to consider that.”
of villagers who had taken up
determine if they are pregnant
that room. Umm al-Khattab got
arms against the regime. Jihadi
or not and, if not, available for a
me married to a Saudi emir. His
Umm Rashid’s mother was making
ideologues from Jordan and
new husband.
name was Abdullah al-Jazwari. He
about $100 a month as a cleaning
elsewhere had flooded into
woman in schools, and some of
Syria, preaching the concepts of
Yusuf, she explains, “We weren’t
a gentleman and he behaved so
that money was going toward
martyrdom and militant jihad as
happily married. There was
nicely to me. He also accepted my
medication for her father. As little
they organised and affiliated al
always conflict in the house. My
sister to live with us. So my sister
girls on their way to classes, their
Nusra to Al Qaeda.
mother-in-law didn’t allow me to
came also. We lived together like
sleep with my husband, so I didn’t
this. I was happy with him. He was
The family was very poor.
friends could buy snacks like
“First I was thinking,
“You didn’t have a child with him?” we asked Umm Rashid. “No, I was not with him that
Reflecting on her marriage to
“One day,” Umm Rashid continues, speaking of her neighbour in the hisbah, “she came and said, ‘Why don’t you get
“Of course, I was out of my
was a really nice man, he was like
doner kebabs, while Umm Rashid
alhamdulillah [thank God], Yusuf
experience a real marriage. There
behaving toward me really well.
and her sister had to make do
found a job and was working.
were three rooms in the house,
He was an emir.”
with bread and tomato paste from
I didn’t know what Jabhat al
but four other siblings, so we were
home. Now, as young women, they
Nusra was and I was happy that
not given a room.”
were facing hunger.
he had a job… When he came
“I got married to our
For Umm Rashid after the
“After two months, he asked me why don’t you join al Khansaa? He was 40 years old. I didn’t know
back he had money. He bought
death of her husband, the
much about him. We never talked
neighbour’s son,” Umm Rashid
gold for me. He had a car. He
tragedies were just beginning.
about ourselves much. I knew he
continues, her voice flat and
was distributing money to all his
devoid of emotion. “My husband’s
family. He stayed one week with
mortar came down on our home.
it. He used to come home for his
mother talked to my mother and
me and then he left.”
My mother and father died, my
meals. I cleaned his clothes and
sister was wounded.” This was
I treated him really well because
they arranged it.” But, despite
But the militias in Raqqa “got
“During the fight in Raqqa, a
was my husband, but that was
liking Yusuf, the neighbour’s son,
mixed again, and the groups
2014. Umm Rashid was just 18, all
he was behaving toward me really
he was not the eldest and things
started to fight each other.”
her dreams destroyed by war.
nicely, but I didn’t know much
did not go well for young Umm
By late 2013, a schism among
“My sister was wounded in her
about him.”
Rashid. “My husband had four
the leaders of Al Qaeda in Syria
hand, so her arm was amputated.
siblings – three sisters and one
had led to ferocious fights
We were alone at home. Our
woman who had helped her
brother. I was so young. I didn’t
between al Nusra and the rising
neighbour, a woman, was trying to
encouraged her to join al Khansaa,
know anything. My husband was
power in the region, the so-called
help us. For example, when there
another thought weighed on her.
the middle child so he didn’t have
Islamic State, as it moved to
was aid from different groups
She believed that the mortar
a say about what was going on at
take control of Raqqa and the
they would drop a box in front
round that killed her parents
home. Their father was deceased.
surrounding region. “I heard
of our door. If that woman had
and cost her sister her arm was
My husband’s sisters started to
that the ‘brothers’ came. The
something to feed us she would
the work of the US-led coalition.
behave very badly toward me. My
‘brothers’ were the Islamic State.
give us meals. We were suffering
Although many civilians have
mother-in-law beat me.”
Meanwhile, the groups were
and had nothing. That woman was
been killed by its airstrikes and
“I was thinking about my
fighting each other and I had not
from al Khansaa, from ISIS.”
subsequent offensives, it seems
options,” Umm Rashid explains.
heard from my husband. One day
“‘You have to be patient’, my
I learned that he was wounded
2014 in Raqqa as the female
parent’s death in early 2014 that
mother told me. ‘If you come to
and soon after that he died. He
arm of the ISIS morality police,
the coalition was responsible.
us, you are going to suffer from
became a martyr.”
or hisbah, to placate the locals
It had not taken shape until
“After he died, my mother-
who were getting riled up about
that summer. But hatred for
have something to eat.’ So, I
in-law took everything from me,
men arresting or punishing their
the coalition became a deep
stayed there with my husband for
even my clothes, and told me to
women for dress code and other
conviction for Umm Rashid. She
six months. [Then] one day my
go to my mother’s home. She told
morality infringements. To calm
would serve with the enemy of
hunger. At least over there you
securitysolutionsmagazine.com
038-041_SSM110 Article 5.indd 39
Al Khansaa was formed in
As her husband and the
unlikely given the timing of her
SECURITY SOLUTIONS // 39
13/10/2017 4:17 pm
FEATURE Anne Speckhard Ph.D. is
those she believed had killed her
generous to other poor people.
take the woman to the female’s
family. “I accepted to become a
Abu Abdullah [her husband] was
hisbah and the man to the male’s
an adjunct associate professor
member of al Khansaa,” she says.
so generous with me. He would
hisbah. We would take off the
of psychiatry at Georgetown
give me a lot of money. I was not
clothes of the woman until she
University in the School of
emir, I was not sent to the training
used to having money. I would
is in her underwear. Then we
Medicine and Director of the
camp,” Umm Rashid explains.
save it and give some to my sister
would beat her with a lash. Then
International Center for the Study
and also gave money to the poor
there are special women in the
of Violent Extremism (ICSVE)
pictures of women holding
people. I was happy he was giving
hisbah for biting,” says Umm
where she heads the Breaking
weapons in supposed training
it so generously.
Rashid. We have heard about
the ISIS Brand – ISIS Defectors
this practice of biting women,
Counter Narrative Project. She is
“Because my husband was an
The group regularly publishes
exercises but not as combatants.
“Our job was to check the
Of the 63 ISIS cadres – prisoners,
market on our regulations.
but have never had a first-
the author of Talking to Terrorists
returnees and defectors – ICSVE
For example, we would check
hand account.
and Bride of ISIS and coauthor
have thus far interviewed, many
abayas if they are too tight or too
tell us that men go for Sharia
transparent.”
“We would torture that
of ISIS Defectors: Inside Stories
woman so badly, that when
of the Terrorist Caliphate,
training, but the women are
the husband came from the
Undercover Jihadi, and Warrior
instructed individually at home,
other side she wouldn’t be able
Princess. Anne has interviewed
to walk. Then from out of this
nearly 500 terrorists, their
prison, she would feel I would
family members and supporters
never do this again, because of
in various parts of the world,
the things she suffered from the
designed the psychological and
imprisonment. Her husband
Islamic challenge aspects of the
needed to pay a fine and he
Detainee Rehabilitation Program
needed to purchase the proper
in Iraq to be applied to 20,000+
abaya and sign the paperwork
detainees and 800 juveniles
that he would comply to the
and has consulted to NATO,
rules completely in the future. If
OSCE, foreign governments and
the woman repeats her offense,
to the U.S. Senate and House,
we would take the husband and
Departments of State, Defense,
put him in a football field where
Justice, Homeland Security,
coalition forces used to bomb
Health and Human Services, CIA,
a lot. We had a prison and we
FBI, CNN, BBC, NPR, Fox News,
would put him in that prison.
MSNBC, CTV and in Time, The New
Most of the time he would die of
York Times, The Washington Post,
fear because of the explosions in
London Times and many other
that field.”
publications. Follow Anne
by their husbands. Western soldiers mock the awkward way the ISIS women are photographed or filmed holding their rifles in ISIS propaganda. “There were a lot of 14- and 15-year-old girls in al Khansaa,” Umm Rashid tells us. “When I first registered, Umm alKhattab helped me a lot. They gave me a weapon. I joined her brigade. Umm al-Khattab was the emir of that brigade,” Umm Rashid explains. As we have heard in our many other interviews, the women who join the hisbah are armed with a Kalashnikov and have broad powers over the civilian population – able to fine, punish
BUT AS A TEENAGER, UMM RASHID HAD A DREAM. SHE WANTED TO BE A DOCTOR… BUT WITH THE UPRISING, SHE WAS NOT SAFE AS A SINGLE GIRL ANYMORE.
and arrest them for any type of morality offenses. They have an
We ask her if she felt badly doing such things, assuming
Fascinated to be hearing not
@AnneSpeckhard Ahmet S. Yayla Ph.D. is an
that she must. “No! It made me
adjunct professor of criminology,
exalted status over civilians and
just about, but from an actual
strong! I would do the same thing
law and society at George Mason
answer to practically no one.
member of the ISIS hisbah, we
again if given the opportunity. I
University. He is also senior
“Umm al-Khattab was not
ask Umm Rashid to explain to
escaped because I have a small
research fellow at the International
the emir of all of al Khansaa,
us how women are punished.
child. I want to go back after the
Center for the Study of Violent
but of this brigade. I knew her
We know the men have their
baby is grown.”
Extremism (ICSVE). He formerly
for a long time because she was
shirts removed and are flogged
Suddenly the interview is
our neighbour. From the start, I
in public, “But what about the
going in a direction we had not
chair of the sociology department
knew how to work in the brigade
women?” we ask, wondering
anticipated, and a potentially
at Harran University in Turkey.
because Umm al-Khattab was
how ISIS handles this delicate
dangerous one for our
He also served as the chief of
talking to me all the time.”
matter. “Are they undressed as
colleagues, Abu Said and Murat,
counterterrorism and operations
well, and if so, where?”
in the room with this woman,
department of the Turkish National
who now speaks proudly and
Police in Sanliurfa between 2010
“Umm al-Khattab would
served as a professor and the
come and pick me up in a van,
Umm Rashid is perfectly
our brigade worked in that van
matter of fact, “For example, if
defiantly of what she has done.
and 2013. He is the coauthor of the
with six or seven other women.
there is a woman with a coloured
But there is more to come.
newly released book ISIS Defectors:
We were in charge of the market
abaya, we would arrest the
place. Because I was so poor
husband and wife and take them
on 31/8/2017 on http://www.
Caliphate. Follow Ahmet
in the past, I was trying to be
to the hisbah jail. They would
thedailybeast.com n
@ahmetsyayla
40 // SECURITY SOLUTIONS
038-041_SSM110 Article 5.indd 40
This article first appeared
Inside Stories of the Terrorist
securitysolutionsmagazine.com
13/10/2017 4:17 pm
038-041_SSM110 Article 5.indd 41
13/10/2017 4:17 pm
OPERATIONS
42 // SECURITY SOLUTIONS
042-045_SSM110 Operations.indd 42
securitysolutionsmagazine.com
13/10/2017 4:20 pm
BY RICHARD KAY
ALTERNATE OPTIONS: FIREARMS BEYOND QUALIFICATION TRAINING
Officers who carry a lethal force
shooting (clinical skills for
shooting is conducted in a
option on the job must ensure
a score) rather than combat
very clinical context – static
they possess the requisite skills
shooting (stress skills to survive
shooter and target, known drills
needed to survive a situation at
a life-threatening encounter).
and minimal stress. Combat
that level of risk. In the public
Regardless of the emphasis, the
shooting starts with these
safety sector, budgets and
fundamentals of shooting remain
simple paradigms to teach
liability considerations often
the same. It is the relevance of
shooting fundamentals, but then
override adequate training in
certain fundamentals that differs
progresses to tactical firearm
the various options available to
between the two contexts and the
skills, with shooters moving,
officers, with firearms being a
end-result outcome.
variable targets, unknown drills
prime example. Most qualification training places emphasis on precision
securitysolutionsmagazine.com
042-045_SSM110 Operations.indd 43
PART1
A key difference between
and high stress, and include
precision and combat shooting
options for carriage, movement,
methodology is that precision
cover, backup and so on.
SECURITY SOLUTIONS // 43
13/10/2017 4:20 pm
OPERATIONS simple, with no pistol disassembly required, and they come with picatinny rails for accessories such as optics, flashlights and lasers, plus spare magazine and sling attachment. The unit not only facilitates a more stable and accurate shooting platform, but provides an increased visual deterrent to potential subjects, and works well with officers wearing a tactical vest and thigh holster. A key aspect is that the handgun maintains its operating function of single shot capability. Whilst the unit may look like an assault platform, it is still a handgun. At present, there is ambiguity around its use, with regulators examining its operational plausibility. Any option that assists in better operational shooting should be something officers look at. Obviously any gear options should be thoroughly tested and mastered in training prior to using in operations, and any gear accessories should conform to regulations and agency policy.
Gear Options
Carriage and Presentation Lasers provide another
situation during the day, but
Officers should consider carriage
There are numerous options
plausible option, especially for
a quality flashlight with high
options based on operational
available that can assist
officers working at night. Options
lumens output is an excellent
requirements, especially where
officers in the operational use
include laser units that attach
distraction to aggressive subjects.
concealment is concerned.
of firearms. The selection and
to the accessory rail under the
With regards to firearms, there
Alternative carriage options
use of these options depends
barrel, or to the rear of the
are numerous options for
include tactical (vest, thigh
on regulations, agency policy
receiver group, or even laser units
flashlight units that attach to the
holster), concealed (shoulder
and officer ability, but where
that replace the recoil spring
accessory rail and can be activated
holster, tactical bumbag or
permissible, they can be a
assembly in pistols. This latter
without adjusting the shooting
thigh bag, personal defense
valuable aid.
option is convenient as the laser
grip. Some units also include a
accessory [PDA] holster) and
does not alter the external shape
flashlight/laser combination.
sling. When selecting and using
Firearm sights are easily modified, replaced or substituted.
of the firearm and therefore
There are various sighting
officers can use the laser with
conversion kit that provides
configurations designed for
existing duty gear without having
certain advantages, such as a
intuitive sight acquisition
to replace or modify.
shoulder stock, charging handle
gear and think of firearm security
and alignment. High visibility
Another option is a handgun
alternative options, safety is a paramount consideration. Officers should train with their
and extra weight to counter
at all times. A body-holstered
tritium sights offer easy sight
option for officers. Whilst
recoil, as well as accessory
firearm, such as a duty, thigh or
acquisition, especially in low-light
flashlights are mostly reserved
mounting options. These tactical
shoulder holster, is always with
situations. Another alternative
for use in the dark, officers
platforms provide better grip and
the officer. A remote-holstered
is the addition of an optic sight
working in daytime should carry
shooting stability that facilitate
firearm, such as a tactical bumbag
mounted on the frame for
a flashlight. Not only may officers
greater range, faster aiming and
or PDA holster can be put down
reflexive target acquisition.
find themselves in a low-light
better accuracy. The setup is
and taken, misplaced or forgotten.
44 // SECURITY SOLUTIONS
042-045_SSM110 Operations.indd 44
Flashlights are an essential
securitysolutionsmagazine.com
13/10/2017 4:20 pm
(angle is dependent on the
hides from view, but may not
Single-Hand Shooting
action of drawing the firearm
proximity of another person).
stop a projectile. Concealment
Shooting single handed is an
from the holster. Specific
This is useful for a line-of-fire
is not as good as cover, but if
excellent way to master grip
circumstances may dictate which
situation, or when moving with
the subject cannot see officers
and trigger control, and is a skill
position to use, such as behind
firearm drawn.
then he may not be able to shoot
officers should train, as situations
them. Examples include shrubs,
may occur where two-handed
Presentation refers to the
cover, crowded area, building search and so on. The firearm is
Shooting Positions
plasterboard walls, tall grass
shooting is not appropriate,
presented into the ready position
Officers should be comfortable
and hollow core wooden doors.
including cover restrictions,
as a default, and consistency of
shooting from a variety of
Concealment will not protect, but
one hand being occupied with
this action should be drilled every
positions, as the situation may
it may prevent the subject from
another task, or officer injury.
time the firearm is taken out of
evolve rapidly and standing
firing accurately. Officers need
The ability to shoot, reload and
the holster.
may not always be the most
to make use of what is available,
return fire with one hand may
• Ready position: the firearm
suitable shooting platform.
and practise moving to and from
save a life in a violent encounter.
is held in at the body at chest
Shooting positions are dictated
cover so it becomes instinctive.
If officers are going to practise
level with the muzzle forward
by the situational environment,
Alternate shooting positions
one-handed shooting they should
on target. This position
available cover, the number of
include standing, kneeling,
practise one-handed reloading
equates to the ‘working space’
threats and officer capability
(high, low, two knees), seated
also, as the two aspects go
for officers to present their
and vulnerability.
(unsupported, supported,
hand-in-hand with operational
firearm into, assess a threat
chair), prone, supine and foetal.
reality. Options for one-handed
and manipulate the weapon.
Officers should also train to shoot
reloading include placing the
To engage, the arms are
whilst transitioning between
firearm between or behind the
these positions, as well as with
knees, under the armpit, in the
both or either hands. Officers
waistband and in the holster. Any
should reinforce their ability to
protruding part of the firearm
shoot in various positions and
may be used to action the slide,
be able to move and fire from
such as ejector port, front sight,
alternate positions smoothly
rear sight, safety and decocking
and with balance. Whilst these
lever, on a belt, between the
alternate shooting positions
knees, on furniture or the heel of
provide stability and assist in
a shoe.
extended forward into the combat position. • Combat position: the firearm is extended directly towards the threat at eye level, ready to engage. Officers should keep both eyes open, with the firearm held low enough to see the subject’s hands. In the absence of a visible threat, this position allows officers to scan the threat area. • Close combat position: the firearm is held close to the body with the dominant hand, muzzle on target, and the support hand is bent with the elbow facing forward. The
OFFICERS SHOULD BE COMFORTABLE SHOOTING FROM A VARIETY OF POSITIONS, AS THE SITUATION MAY EVOLVE RAPIDLY AND STANDING MAY NOT ALWAYS BE THE MOST SUITABLE SHOOTING PLATFORM.
firearm and support arm are kept parallel to each other.
reducing target profile, they may reduce mobility. The use of cover is a
form. If the need to reload with
fundamental aspect of any
one hand should arise, any way
tactical plan. The ability to
that works is correct. Let the
effectively use a firearm from
situation determine the action.
cover is a necessary skill that
Always maintain vigilance of the
should be practised consistently.
subject, then get to or remain
Statistics show that officers who
behind cover.
seek cover during a confrontation Cover will stop a projectile,
In a violent confrontation, success is more important than
Part 2 of this article in the
have a significantly higher rate
next issue of Security Solutions
This position is used in close
but may not hide an officer. It is
of survival. Be aware of the
Magazine will continue to look
confines or close proximity to a
anything officers can get behind
environment and the potential
at the factors that should be
subject. The bent elbow creates
that will not allow projectiles to
cover offered to take advantage
considered in developing an
a buffer against an advancing
penetrate. The value of cover is
if attacked. Officers should
officer’s tactical firearm skills. n
subject and can be used to
dependent on the firearm type
train to take cover immediately
strike at their centre mass if
and calibre. Examples include
if fired upon. It is important
they close in or sweep them
telephone poles, concrete walls
to remember that gunshot
internationally certified tactical
away or down by unfolding
and the engine block of a car.
wounds are often not fatal
instructor-trainer, Director
the arm.
If perfect cover is not available,
and officers can continue to
and Senior Trainer of Modern
poor cover may not stop bullets,
defend themselves even if they
Combatives, a provider of
firearm is held with the
but may deflect them. Most
are injured. By using alternate
operational safety training for the
arms relaxed and the muzzle
wooden walls, nearly all interior
positions, officers can still defend
public safety sector. Visit www.
pointed down at an angle
walls and wooden or metal doors
themselves even though they may
moderncombatives.com.au for
with the finger off the trigger
will not stop bullets. Concealment
be injured.
more information.
• Low ready position: the
securitysolutionsmagazine.com
042-045_SSM110 Operations.indd 45
Richard Kay is an
SECURITY SOLUTIONS // 45
13/10/2017 4:20 pm
CCTV
46 // SECURITY SOLUTIONS
046-049_SSM110 CCTV.indd 46
securitysolutionsmagazine.com
13/10/2017 4:23 pm
IP CAMERAS
The Important Specifications For A Security System BY BOB MESNICK
IP camera manufacturers provide
the camera is to be used outdoors
vertical pixels. Marketing people
The aspect ratio (vertical to
product specification sheets
where it can get dark. If the IP
also use the terms ‘HD’, ‘720p’ or
horizontal ratio) is usually
that help in the selection of the
camera will only be used indoors,
‘1080p’ and, most recently, ‘4K’.
4:3 or 9:16 (wide). The latest
right camera for individual IP
the viewing angle width may
• Megapixel camera: This is
sensors (especially the ones
security and surveillance systems.
be more relevant. This article
a general term used for any
that claim 4K resolution)
But which specifications are
reviews the important camera
camera that has over one
have different aspect ratios
important? They include such
specifications and how to avoid
million pixels in the sensor.
that are similar to the very
things as resolution, minimum
being fooled by ‘specsmanship’
There are many cameras that
wide formats used in the
light sensitivity, lens, wide
(from the marketing department).
have over one megapixel
dynamic range, signal to noise
resolution. The pixels are
cinema market. • HD camera: This is more
and so on. The importance of
Resolution
organised in a matrix of
of a marketing term and is
each of the camera specifications
This is an important specification.
horizontal and vertical pixels.
defined as either a 720p or
depends on the objective and
Resolution is usually defined
The relationship between the
1080p type HD camera. This
application. For example, the low-
by the total number of pixels in
horizontal and vertical pixels
specification comes from the
light specification is important if
the sensor or the horizontal and
is called the aspect ratio.
video broadcast market rather
securitysolutionsmagazine.com
046-049_SSM110 CCTV.indd 47
SECURITY SOLUTIONS // 47
13/10/2017 4:23 pm
CCTV
than the security market. The
is defined differently. For
This can be very subjective and
720p refers to 720 horizontal
example, Sony announced
depends on what the viewer
also affected by the shutter speed,
lines. The ‘p’ indicates that the
that their new (coming soon)
thinks is an acceptable image.
which relates to the frame rate.
lines are progressive rather
camera has a chip with 4096H
Low-light images are not only
The longer the shutter is opened,
than interlaced. There is
× 2160V pixels, which runs at
dark, but can also be very noisy.
the more light can reach the
only one scan per frame that
up to 60fps. Axis announced
At the low-light level, the
includes 720 lines. The 1080p
a camera with 3840 x 2160,
amplifiers are working very
stays open, the lower the frame
HD camera has at least 1080
which runs at up to 30fps
hard and there can be circuit
rate. There are some camera
horizontal lines.
(which is called Ultra HD). The
noise that affects the video
specifications that indicate very
marketing people call all these
image. This is called the signal
low minimum illumination
cameras 4K.
to noise (S/N) ratio. The better
(0.0001 lux), but this is measured
720p cameras usually have a sensor with at least 1.0
The minimum light level is
sensor. The longer the shutter
megapixels. Pixel resolution is
The resolution of a camera is
manufacturers also include
at a shutter speed of 0.5 sec. This
1280 x 1024, or it can be 1280
defined not only by the sensor, but
the relative level of the signal
translates to a maximum frame
x 800. 1080p cameras have
also the lens and the electronic
(IRE), which is a measure of how
rate of 2fps.
at least a 2 megapixel sensor
circuits. Megapixel IP cameras are
hard the amplifier has to work.
and are considered to be the
sometimes advertised for under
For example, a camera that is
level is also determined by the
higher resolution HD cameras.
$200. Be careful; the sensor may
operating at 30 IRE is receiving
lens. The lower the f-number of
To add to the confusion, some
have the megapixels, but the lens
30 percent of the signal from
the lens, the more light it will
manufacturers call their 3
may be plastic and the result is a
the sensor circuits, while one
let through.
megapixel or 5 megapixel
very low quality image.
operating at 50 IRE is receiving
The minimum illumination
50 percent of the signal. The
Lens
lower the number, the harder the
Many IP cameras come with a
amplifier has to work to boost the
lens. A wide angle lens could
8 megapixels of resolution.
Minimum Illumination (or LowLight Sensitivity)
signal so it can be seen. The noise
be used to view a small room,
It has approximately 4,000
The minimum illumination is the
level can be as high as 20 percent
while a narrow angle lens (with
horizontal pixels. The number
lowest light level (measured in
of the signal, so the resulting video
more magnification) can be used
of vertical and horizontal
lux) that provides a reasonable
can look very noisy when the
to see an area that is far away.
pixels and the aspect ratio
image from the IP camera.
signal level is very low.
The lens can also affect some of
cameras 1080p as well. • 4K camera: This usually refers to a camera with over
48 // SECURITY SOLUTIONS
046-049_SSM110 CCTV.indd 48
securitysolutionsmagazine.com
13/10/2017 4:24 pm
the other specifications, such as
adjusted and depends on
minimum illumination, frame rate
how much light is expected
Lenses bend the light to
By increasing the time that
and resolution. If the IP camera
in the scene. A manual iris
achieve the right focus and
the shutter stays opened,
does not include a lens, it usually
lens is usually used with
magnification. IR light can
users can improve the low-
includes a standard type CS (or C)
indoor cameras where there
bend at a different angle than
light performance of most
mounting capability, so various
is a small light variation.
visible light when the wrong
cameras. But be careful;
type of glass is used in the lens.
increasing the shutter speed
usually used with outdoor
IR corrected lenses compensate
to 0.5 seconds changes the
measured in millimetres. The
cameras. The camera
for the focal difference and
maximum frame rate to
lower the number, the wider
electronics adjust the iris
provide a much clearer image.
the viewing angle. A 2mm lens
opening depending on
This is most apparent at
may have an angle of about
how much light it detects.
higher resolution.
110 degrees, while a 50mm
At night it opens the iris
lens has an angle of about 5.5
and when there is bright
degrees. The angle of the lens
sunlight it closes the iris.
third party lenses can be used. • Lens angle: The lens is
depends on the size of the
o DC auto iris lenses are
o P-iris lenses are similar
• Infrared (IR) corrected lenses:
very low-light situations.
only 2fps. • Audio: Audio capability can be very important in some applications, such as when
Special Applications that Require Specific Capability
connecting an intercom to the
• Wide dynamic range: To view
required. Some cameras have
camera. In this case, a camera with audio input capability is
sensor and the distance from
to the DC auto iris lens,
the sensor to the lens.
except they add additional
an area with challenging
a built-in microphone, but be
intelligence to the lens
lighting conditions, it is best to
aware that it is always best to
The f-number of the lens
opening. When the iris is
select a camera that provides
have the microphone close to
indicates how well the light is
closed all the way, it can
good, wide dynamic range
transferred through the lens.
reduce the clarity of the
(WDR). For example, a camera
A camera with a f-number
image (when used with
that either provides back light
Depending on the application,
of f1.2 can pass more light
megapixel cameras). A p-iris
control or, better yet, WDR, will
input and output connections
than one that has a f2.0 lens.
camera system works with
be needed to view a lobby with
may be required. For example,
The lens angle can affect the
the camera electronics to
a large window. Wide dynamic
to release a door lock, an
f-number – the wider the angle
prevent the iris from closing
range has been dramatically
output signal to control a relay
the more light can get in, so the
all the way. Conversely,
improved in the latest cameras.
that can open an electric lock
illumination specification is
when the view is very dark,
Older cameras provide about
is needed. To detect that a door
usually measured at the widest
the camera tries to open
50dB of WDR; newer models
has been opened and start
lens angle (when a variable
the iris to let in as much
provide over 120dB.
recording video, then an I/O
lens is included).
light as possible. As the
• Lens light capability:
• Frame rate: Frame rates are
the person talking. • Input and output (I/O):
input connection to the camera
iris increases, the depth of
not particularly critical in
fixed, variable and zoom
field is reduced. A p-iris
most applications, but most
lenses. A fixed lens, as the
lens prevents the lens from
megapixel cameras support
Summary
name implies, has only one
opening all the way and
reasonably good frame rates.
Understanding the specifications
mm or angle setting. A variable
compensates by increasing
What is reasonable? It depends
allows users to select the right
lens can be manually adjusted
the camera amplification of
on the application.
camera for their IP camera
through a range of angles.
the video signal.
• Types of lenses: There are
A zoom lens is similar to the
• Focus: The focus of the IP
Video is very smooth even
is required.
system; however, before reviewing
at 10fps. There are a few
the specifications, users should
variable lens, but it can be
camera can be changed
applications where higher
fully understand their required
controlled remotely.
either by adjusting the lens
frame rates may be needed,
application and objectives. n
or by remotely adjusting
such as in casinos, or in special
much light falls on the sensor
the distance between the
testing situations, where
and affects the depth of field.
lens and the sensor (back
there is very fast motion; but
and owner of Kintronics, an
The smaller the iris opening,
focus). Lenses can have a
in most cases, users can save
organisation specialising in
the longer the depth of field.
fixed focus (it cannot be
bandwidth and storage by
providing network attached IP
When the scene is very dark,
changed) or manual focus.
reducing the frame rate.
camera surveillance and security
the lens iris opens and the field
Back focus is not part of the
of view is reduced. This means
lens, but is usually listed
rate has to be reduced. For
experience in the technology
some areas that are close or far
with the lens specification.
example, frame rates tend
industry, Bob also provides
away are not in focus. There
It makes installation much
to be lower in very high-
specialist advice on optical storage
are manual iris controls, DC
easier, enabling the focus to
resolution cameras (over
systems and network attached
auto iris and p-iris lenses.
be adjusted at the computer
3 megapixel). The frame
storage systems. He can be
o Manual iris is manually
instead of at the camera.
rate can also be affected by
contacted at www.kintronics.com
• Iris: Iris control adjusts how
securitysolutionsmagazine.com
046-049_SSM110 CCTV.indd 49
In certain cases, the frame
Bob Mesnick is President
systems. With over 30 years of
SECURITY SOLUTIONS // 49
13/10/2017 4:24 pm
BUSINESS
WHY DO ACCOUNTANTS AND OTHER PROFESSIONALS Need Better Risk Management Competencies? BY ALEX SIDORENKO
50 // SECURITY SOLUTIONS
050-053_SSM110 Business.indd 50
securitysolutionsmagazine.com
13/10/2017 4:28 pm
Risk management competencies
numerous factors responsible for
can significantly improve decision
influencing individual perceptions
making in any profession. The bad
of risk, which included dread,
news is that these competencies
newness, stigma and other factors
do not come naturally, they
(Tversky & Kahneman, 1974).
have to be developed. Even if an
Research also detected that risk
organisation does not operate in a
perceptions are influenced by the
high risk, uncertain environment,
emotional state of the perceiver
it should consider the extensive
(Bodenhausen, 1993). According to
research into what is referred
valence theory, positive emotions
to by scientists as heuristics and
lead to optimistic risk perceptions,
biases, cognitive psychology
whereas negative emotions incite
and psychometric paradigm,
a more pessimistic view of risk
collectively called risk perception.
(Lerner, 2000).
The History of Risk Perception
research was performed by
The study of risk perception
(who later won a Nobel Prize in
originated from the fact that
economics with Vernon Smith
experts and lay people often
“for having integrated insights
disagreed about the riskiness of
from psychological research into
various technologies and natural
economic science, especially
hazards. A lot of this information
concerning human judgment
is available at https://en.wikipedia.
and decision-making under
org/wiki/Risk_perception
uncertainty� [Kahneman, 2003])
The earliest psychometric
The mid-1960s experienced the
psychologists Daniel Kahneman
and Amos Tversky. They performed
rapid rise of nuclear technologies
a series of gambling experiments to
and the promise of clean and safe
understand how people evaluated
energy. However, public perception
probabilities. Their major finding
shifted against this new technology.
was that people use a number of
Fears of both longitudinal dangers
heuristics to evaluate information.
to the environment and immediate
These heuristics are usually
disasters creating radioactive
useful shortcuts for thinking, but
wastelands turned the public
may lead to inaccurate judgments
against this new technology.
in complex business situations of
The scientific and governmental
high uncertainty – in which case
communities asked why public
they become cognitive biases.
perception was against the use of that all the scientific experts were
Cognitive Biases are just the Beginning
declaring how safe it really was.
Beside the cognitive biases
The problem, as perceived by the
inherent in how people think
experts, was a difference between
and behave under uncertainty,
scientific facts and an exaggerated
there are more pragmatic factors
public perception of the dangers
that influence the way people
(Douglas, 1985).
make decisions, including poor
nuclear energy, in spite of the fact
Researchers tried to
securitysolutionsmagazine.com
050-053_SSM110 Business.indd 51
motivation and remuneration
understand how people process
structures, conflict of interest,
information and make decisions
ethics, corruption, poor
under uncertainty. Early findings
compliance regimes, lack of
indicated that people use
internal controls and so on. All of
cognitive heuristics in sorting and
this makes any type of significant
simplifying information, which
decision making based on purely
leads to biases in comprehension.
expert opinions and perceptions
Later findings identified
highly subjective and unreliable.
SECURITY SOLUTIONS // 51
13/10/2017 4:28 pm
BUSINESS Risk Management
training, to jointly carry out
Risk management can provide
training on the basics of risk-
clarity and assurance to decision
based decision making for all
makers anywhere within
new employees.
the organisation, not just the
• Risk awareness sessions for
risk management team. Risk
senior management and
management provides a set
the board
of tools to help management
Executives and board
see risks, understand their
members play a vital
significance to each decision and
role in driving the risk
Make risk management
consistent application of risk
determine the best course of
management agenda.
information available to
management requires good
action with these risks in mind.
Nowadays, many executives
employees, contractors
knowledge of risk management
Risk management may seem
and board members have a
and visitors. Place the Risk
standards, risk psychology and
simple enough in theory, yet
basic understanding of risk
Management Policy on the
quantitative analysis.
many employees not part of the
management. Auditors, risk
intranet and the corporate
risk team still do not have the
management professional
website. Record and publish
references, email admin@
necessary skills and competencies
associations and regulators
risk management training
interactivemediasolutions.com.
to apply it successfully in practice.
have been quite influential in
or awareness session
au n
shaping the board’s perception
videos on the dedicated
practical ideas to bring risk
of risk management. It
risk management intranet
management competencies to life,
is important that risk
page. Invite guest speakers
with over 13 years of strategic,
regardless of a person’s position
management training focuses
(risk managers from other
innovation, risk and performance
in the organisation (based on the
less about risk assessments
companies) to speak to the
management experience across
free risk management book Guide
and more about risk-based
Audit Committee or Risk
Australia, Russia, Poland and
to effective risk management):
decision making, planning,
Management Committee
Kazakhstan. In 2014 Alex was
• Risk management
budgeting and investment
and give all employees the
named the Risk Manager of
competencies should become
management. The paradox is
opportunity to participate.
the Year by the Russian Risk
an important attribute when
that risk management training
hiring new personnel
should not teach management
of everyone’s responsibilities
Human Resources (HR)
how to manage risks, instead
It helps to include risk
for strategic risk analysis in
teams should include risk
it should show them how to
management roles and
decision making, Alex is responsible
management requirements
carry out their responsibilities
responsibilities into existing
for G31000 risk management
in all relevant position
with risks in mind.
job descriptions, policies,
training and certification across
procedures and committee
Russia and CIS, running numerous
The following are some
descriptions when hiring new
• Advanced training for ‘risk-
• Make risk management part
For a full list of
Alex Sidorenko is an expert
Management Association. As a Board member of Institute
personnel for the organisation.
champions’
charters. The common
risk management classroom and
The level of detail will of
Additional risk management
approach of capturing risk
e-learning training programs.
course depend on the risks
training may be needed for
management information
Alex represents the Russian risk
associated with each role.
the risk management team
in a single risk management
management community at the
Any finance, accounting or
and business units responsible
framework document does not
ISO Technical Committee 262
investment individual should
for internal control, audit,
work well.
responsible for the update of
possess a basic understanding
finance, strategy and others.
of risk.
In-depth risk management
into day-to-day work
• Risk-based decision making
training should include:
Experience shows that
in induction training for
risk psychology and risk
updating existing policies and
global PwC risk management
new employees
perception basics, integrating
procedures to include aspects
methodology, the author of the
New hires come from a
risk management into
of risk management works
risk management guidelines for
variety of educational and
culture, basic knowledge of
much better than creating
SME (Russian standardization
experience backgrounds
ISO 31000, risk management
separate risk procedures or
organization), risk management
and, most importantly, each
and decision-making
methodology documents.
textbook (Russian Ministry of
new employee has his own
foundations and integration
Risk management is a valuable tool
Finance), risk management guide
perception of what is an
of risk management into
to help employees make business
(Australian Stock Exchange)
acceptable risk. It is important
core business processes
decisions under uncertainty. It
and the award-winning training
for risk managers to cooperate
and decisions.
works equally well with strategic,
course on risk management (best
investment, financial, project or
risk education program 2013,
operational decisions. However,
2014 and 2015).
with the HR team or any other business unit responsible for
52 // SECURITY SOLUTIONS
050-053_SSM110 Business.indd 52
• Use passive learning techniques
• Integrate risk management
ISO31000:20XX and Guide 73 since 2015. Alex is the co-author of the
securitysolutionsmagazine.com
13/10/2017 4:28 pm
Series 280 is an IP66 rated industrial 19” cabinet for harsh and unforgiving environments – air conditioning available.
The last thing on your mind is the first thing on ours.
DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS
Whether it’s ready-made, pre-configured or custom racking solutions, MFB’s short turnaround capabilities speed your product from the warehouse to where they should be – fast. Our unwavering commitment to timely delivery ensures your projects run on time, every time, reducing deadline pressures while maximising results. With a solid history of over 45 years supplying innovative, off-the-shelf and custom built racking systems, you can rely on MFB for consistent delivery, on time, every time.
AUSTRALIAN MADE MAKES AUSTRALIA
www.mfb.com.au
050-053_SSM110 Business.indd 53
VIC NSW -
P (03) 9801 1044 P (02) 9749 1922
F (03) 9801 1176 F (02) 9749 1987
E sales@mfb.com.au E sydney@mfb.com.au
13/10/2017 4:28 pm
COVER STORY
WELCOME TO THE BY JOHN MCGIFFIN
According to Grandview Research,
change is to focus all of your energy,
market size was valued at USD
not on fighting the old, but on
$51.94 billion in 2013. This
building the new.” This is certainly
market size is expected to double
the requirement for the security
by 2019, which is no surprise
industry trying to keep up with the
given the increasing incidents of
new demands being placed on it.
terrorism and a strong focus by organisations to enhance security. Australia’s strategy for
54 // SECURITY SOLUTIONS
054-059_SSM110 Cover Story.indd 54
Socrates wrote, “The secret of
the global physical security
But what does a new security platform which will take organisations into the future look
protecting crowded places
like? This is where Security 4.0
from terrorism seeks to create
comes into the picture. Security 4.0
a framework that will increase
is an emerging definition for what
inherent security levels in public
the future of security will look like.
spaces by putting the onus
There should be no comparisons
on owners and operators of
drawn to TV shows like CSI, with
crowded places to implement the
their infinite zoom cameras and
recommendations, providing a
the ability to do facial recognition
layered security approach. Once
from shadows; security is still a
implemented, this will push
while away from that. However,
organisations to adopt the latest
there is no doubt that the new era
Security 4.0 technologies.
of security is here with Security 4.0.
securitysolutionsmagazine.com
13/10/2017 4:39 pm
securitysolutionsmagazine.com
054-059_SSM110 Cover Story.indd 55
SECURITY SOLUTIONS // 55
13/10/2017 4:39 pm
COVER STORY Before defining in more detail what Security 4.0 looks like, it is useful to first understand what problems Security 4.0 addresses and what new capabilities it exploits. Problems addressed by Security 4.0: •
Security have frequently struggled to get funding for system enhancements, as security investments can be likened to an insurance policy where it is only needed when something goes wrong. More business value is being delivered from Security 4.0 platforms rather than them being just a record and playback platform.
•
Organisations are adding an increasing number of cameras and expecting the same
operator loses focus on screen
number of security operators
watching is just 22 minutes.
Security 4.0 exploits the
The amount of video out there
following capabilities:
the screens are not being
is outstripping the ability to sit
•
monitored at all because of
down and watch it.
to monitor the screens or
budget restrictions. Many
•
•
•
There are barriers to entry
•
•
business process orchestration and automation.
increasing maturity of security
What is Security 4.0?
technologies
Historical industry observations
enhanced resolution of
suggest that the security industry
cameras, such as 4K
goes through a major change
edge-based analytics within
every 15 years, although one
cameras and other devices
could easily argue that this
growing use of technologies
timeline is shrinking. These same
organisations have thousands
for companies wanting
of cameras and so it is simply
to trial new technologies
not possible for them all to be
such as facial recognition,
monitored by humans.
as this typically requires
Security is changing from
temporary servers to be
such as deep learning, neural
industry observations suggest
a reactive to proactive
set-up, along with dedicated
networks and video analytics;
that the next inflection point for
service, with the security
cameras. These barriers
deep learning provides the
security, which is referred to as
infrastructure platform
to entry are eliminated
ability for a computer to learn
Security 4.0, has been reached.
telling the security operator
through the use of cloud-
and understand what it sees in
“you need to be aware of
based or hybrid solutions,
an image or video feed
arrived at this point, it is helpful
this” rather than relying
thereby enabling quick and
use of cloud-based platforms
to look at how the security
on observations.
easy demonstrations of
(including a hybrid approach)
industry has changed over time
Situational awareness
the technology.
with improving bandwidth,
from Security 1.0 through to
Previous security platforms
security controls and scalability
Security 4.0.
combination of strong
have lacked GIS overlay
– many security experts agree
metadata management and
capabilities so that locations
that cloud-based platforms
Security 1.0
geographic information
of security officers and
can be more secure than on-
Some readers of this magazine
systems (GIS) infrastructure.
camera positions can be
premise infrastructure
may be too young to remember
Humans struggle to stay
integrated, thereby providing
video as another powerful data
the analogue cameras and
focused on watching screens
security operations centre
stream in a big data analytics
video cassette recorders (VCRs)
for long periods of time,
staff with quicker issue
environment
which were previously utilised
whereas computers never get
resolution capabilities.
growing use of cameras by
by organisations to record and
The role of the VMS is
other business departments,
playback video streamed from
need to play the role of security
expanded to include inputs
such as marketing and safety
cameras. In some cases, these
operator. IBM research
from external data sources,
•
mobility
cameras and VCR recorders are
suggests that the average
such as global positioning
•
GIS capabilities
still used today, albeit with many
attention time before a security
system (GPS) tags and Internet
•
IoT sensors
questions as to their reliability.
is enhanced with the
•
•
of Things (IoT) devices.
tired and so computer systems
56 // SECURITY SOLUTIONS
054-059_SSM110 Cover Story.indd 56
•
•
• •
•
•
•
To look at how security has
securitysolutionsmagazine.com
13/10/2017 4:39 pm
R
EasyIP 3.0 H.265+
EasyIP 3.0 SERIES
Simple and Powerful The Easier Journey to Better Security The all-new Easy IP product range is simple to install and use, and is available at a budget-friendly price. Rarely does an affordable system come with such powerful functionality: 4K ultra HD with true WDR, H.265+ Smart Codec compression technology. New cameras in the range also provide greater analytic functions, featuring on-board Video Content Analysis options. Its power, combined with its easy installation and user-friendliness, means the Easy IP 3.0 solution requires significantly less operator input to deliver a significantly more efficient and effective security solution. - 4K Ultra HD with true WDR - H.265+/H.265 Compression technology Hikvision Oceania Unite 14a Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Toll Free:1300 557 450( Australia only) Email:salesau@hikvision.com
054-059_SSM110 Cover Story.indd 57
www.hikvision.com
13/10/2017 4:39 pm
COVER STORY
These systems were very good at recording nothing to the tape, as tapes failed or the recording
servers not connected to the
finally being taken seriously
corporate network.
and was slowly integrated into
implement Security 4.0 systems
IT did not want the server in
Companies looking to
standard IT infrastructure.
no longer need to employ
head became dirty, with this
the computer room, particularly
Security servers were moving off
large numbers of people to
being discovered the hard way at
as they struggled to back up the
the security officer’s desk and into
cross-reference, categorise and
a critical point when the footage
amount of video data generated
the IT computer room.
interpret real-time events. Deep
was required. Video footage
by this new system. The server
quality from early analogue
was typically located on or under
become more commonplace as
helps to eliminate the manual
cameras was particularly poor.
the security officer’s desk.
a way of authenticating people
effort associated with these
for access to buildings. Facial
processes by making them completely automatic.
In many cases for large
Security 2.0 presented
Biometrics was starting to
learning/recognition software
organisations, the security
challenges to some security
and demographic recognition
operator was responsible for
integrators who had grown up
was starting to be released. This
changing tapes daily, which
only understanding analogue-
technology improved greatly with
even predicting customer
included applying identification
based camera systems on coaxial
time, although in many cases the
behaviour and security
labels. These tapes needed to be
cables, who were then brought
cameras had to be dedicated to
threats is typically divided
archived in large rooms, creating a
kicking and screaming into the
this function.
into a separate organisational
storage headache. Thank goodness
world of IP addressing and so on.
the industry has moved on from
Cameras were starting to
Understanding and
responsibility; however, via Security 4.0
Security 4.0 infrastructure,
be used for some non-security
Advances in machine vision
they take advantage of
purposes, such as recording
and the ability to extract
common requirements and
Security 2.0
footage from an unmanned
precise interpretations through
infrastructure investments.
Axis Communications pioneered
production line so that it
software-based analytics has
the Internet Protocol (IP) camera,
was possible to review why
placed humanity at the doorstep
marketing and security
which was transformational for
production equipment had
of a whole new way to deeply
endeavours have a wide range
the security industry; however,
stopped, or even to monitor
interface the physical world
of information at their fingertips
IT was less than impressed
water levels.
with the digital world. Image
where the sum of the parts is
and video recognition is poised
indeed vastly more powerful
this phase.
with this bandwidth hog and
Enterprises that combine
so camera infrastructure
Security 3.0
to change how physical objects
than the whole. From real-time
tended to be run on a separate
Security 3.0 infrastructure,
and people are interleaved with
analytics to rapidly emerging
physical or logical network with
including the IP camera, was
the Internet.
security threats, organisations
58 // SECURITY SOLUTIONS
054-059_SSM110 Cover Story.indd 58
securitysolutionsmagazine.com
13/10/2017 4:39 pm
pants wearing sunglasses gives
Social media also plays a
almost instant results as it is the
big part in this – relationships
metadata being searched rather
between people of interest
than the video. Imagine the
can often be uncovered via
Boston bombing situation or Las
social media, even if they are
Vegas terror attacks where the
not friends.
description of the person can be entered into the system and it then
Summary
returns an image of all people
It is an exciting but in many
matching the criteria across a
cases challenging time with the
large number of cameras.
increasing level of terrorist and
Law enforcement vehicles will be fitted with cameras which
sophisticated security attacks. Deep learning and video
coming through the front door,
record the licence plates and
analytics can be utilised to detect
the Security 4.0 platform is
makes/models of vehicles around
a wide range of situations, from
now telling the operator “you
them, once again for metadata
basic people counting through to
need to be aware of this. In the
searching or to let them know
facial recognition, vehicle make/
above example, Ed Smith, who
that a particular vehicle has been
model recognition, a person
is a known armed robber, has
following them for a period of
holding a weapon, a person yelling
been automatically recognised
time statistically above normal.
aggressively or even person-on-
by the facial recognition system
person violence.
in the Retail Upper Area or a
Casinos
currently unknown person yelling
Casinos are expected to leverage
vision systems still require a lot of
aggressively has been recognised
Security 4.0 capabilities in a big
training to teach them something
in the Car Park 3 entrance.
way, although it will take quite
that humans take for granted;
some time. Forensic search –
however, it is a rapidly growing
looking for people matching
area with some of the best
useful information from modern
Examples and Usage Cases
criteria – and facial recognition
minds in the world enhancing it
information sources such as
Digital policing
are expected to be big growth
every day.
video feeds.
Using body-worn cameras along
areas for casinos. Casinos
with video analytics and deep
typically have heavy on-premise
4.0 will be released in subsequent
and conveyance of events and
learning systems incorporating
infrastructure, which can make
issues of Security Solutions
situational awareness is the norm
Security 4.0 principles, police
it difficult for them to undertake
Magazine. n
for the Security 4.0 companies as
forces will be armed with
major VMS upgrades. Cloud-
captured information is displayed
capabilities which enable their
based platforms enable them to
in context on GIS and analytical
body-worn camera systems to
switch environments very easily.
director of Intelliscape, based in
platforms. The Security 4.0
undertake facial recognition
In many cases, dedicated fibre
Melbourne. John has very broad
platform is fast, smart and cloud-
and licence plate recognition on
cables can be run in from hosting
expertise in the information
based for management servers.
the beat. Body-worn cameras
companies, thereby minimising
technology area where he has
Some organisations will stream all
record key video and audio data
bandwidth charges.
been responsible for large teams of
video camera feeds to the Internet,
while the cloud-based backend
whereas some will leverage a
is generating detailed metadata
Entity relationship platforms
development, communications,
hybrid arrangement and keep all
about each person or vehicle that
Across the board, entity
infrastructure and business
recording local, leveraging edge-
the police officer travels past. This
relationship platforms are
intelligence. Intelliscape specialises
based applications and storage.
metadata can include clothing
being utilised to determine the
in the recognition of people, things
Many organisations are now
colour, GPS co-ordinates of the
relationship between people,
and vehicles using cameras, lasers
realising that video data is like
person, demographic information
thereby looking for associations
and microphones and was the first
any other sort of data asset. It is
such as age and gender, and facial
between people of interest. Even
company in the world to deploy
extremely valuable and generates
attributes such as beard, glasses,
if the data does not inform that
technology which could determine
large amounts of metadata.
moustache and even ethnicity.
two people know each other,
the make and model of a vehicle
A person’s level of happiness
facial recognition can highlight
being driven on the road in real
will take on a new dimension.
can also be recorded based on
that an individual has been seen
time for marketing purposes but
Rather than expecting the
facial expressions.
with the same person on more
utilising security infrastructure,
than one occasion to suggest that a
including Milestone VMS and IBM
relationship could exist.
Intelligent Video Analytics.
can now start to become prepared to ferret timely and
Instant collection, recognition
The Security 4.0 control room
security operator to notice an event such as a person of interest
securitysolutionsmagazine.com
054-059_SSM110 Cover Story.indd 59
Searching for a person dressed in a black top and white
Deep learning and computer
More details about Security
John McGiffin is the managing
people across security, application
SECURITY SOLUTIONS // 59
13/10/2017 4:39 pm
LEGAL Q&A BY ANNA RICHARDS
PROPERTY SEARCHES
With the number of terror raids taking place across Australia on the increase, one of the questions I am often asked is “who pays for the damage caused during these raids in instances where the police don’t find anything and there are no charges laid?” It is an interesting question and one that applies to police raids conducted for any number of reasons be it terrorism, organised crime or homicide.
60 // SECURITY SOLUTIONS
060-061_SSM110 Legal Q and A.indd 60
To begin to answer the question,
enter premises; for the purposes of
it is important to first understand
this article, it is assumed that the
that in Australia, there are two
police force member had a legal
different levels of police force.
right to enter the premises. The
Further, these different police
focus of the article is on damage
forces have different types and
to property arising from police
scope of powers. The Australia-
conduct and who, if anyone or any
wide major police force is known
entity, should be held liable to pay
as the Australian Federal Police
compensation for the damage.
(AFP) and each state has its own state police force. The police forces largely
When can Police Search Premises?
get their powers or authority
Let us begin by examining when
to lawfully act in certain ways
Victoria Police are permitted
from various Acts of parliament
to enter premises (including
(legislation), with legislation
business premises) and to conduct
differing from state to state.
a search of those premises. Under
Hence, what a Victorian Police
section 459 A of the Crimes Act
officer is legally permitted to
1958 (Victoria), a police officer
do in Victoria may completely
may, for the purposes of arresting
vary from what a police officer
under section 458 or 459 or any
is entitled to do in New South
other Act, a person (the alleged
Wales. This is largely because
offender) who he or she:
there is rarely any uniformity
• believes, on
between legislation in each state. There are also completely different powers given to state and federal police forces under legislation (parliament-made
reasonable grounds: • to have committed a serious indictable offence in Victoria; or • to have committed an
laws). For instance, in Victoria,
offence elsewhere which
the relevant legislation includes,
would amount to a serious
but is not limited to:
indictable offence in
• the Crimes Act 1958 (Victoria); and • the Victoria Police Act 2013 (Victoria).
Victoria; or • to be escaping from legal custody; or • finds committing a serious indictable offence –
Some of the relevant legislation
enter and search any place where
empowering AFP officers includes,
the police officer, on reasonable
but is not limited to:
grounds, believes the alleged
• the Crimes Act 1914 (Cth); and
offender to be.
• the Australian Federal Police This article will focus on the
What is a Serious Indictable Offence?
situation in the state of Victoria
The scope of what amounts to
as to cover all the various state
a serious indictable offence is
and territory police as well as
probably significantly wider than
federal police is simply beyond the
what many people might imagine.
scope of a single article. Further,
It is an offence punishable by five
the article will not discuss the
or more years of imprisonment
separate issues of when police can
and includes offences such as theft
Act 1979 (Cth).
securitysolutionsmagazine.com
13/10/2017 5:44 pm
and shoplifting and is not reserved
be retrievable. In such a case, if
to only the more serious offences
the alleged offender refused to
involving physical assaults.
provide the police with immediate access to his office, it is likely that
How Much Force can Police use to Obtain Entry and to Search?
a court would find that the state
Generally, the courts have held
to the office doors as a result of
that the state government (as
forcing entry. This is because it
the principal of Victoria Police)
would be likely to find that the
is not liable for acts which are
application of such force (which
permitted under legislation or
resulted in the damage) to be
parliament-made law. This makes
reasonable and necessary in all of
complete sense. The Victorian
the circumstances.
government (Victoria Police) not be held liable for the damage
THE VICTORIAN LEGISLATION STATES THAT THE POLICE ARE PERMITTED TO USE “REASONABLE FORCE”, IF IT IS NECESSARY TO DO SO, IN ORDER TO OBTAIN ENTRY TO THE PREMISES. court case (seeking, for instance,
compensation against the state
are permitted to use “reasonable
than reasonable force was used
compensation for damage to
government. Section 75 of the
force”, if it is necessary to do so,
or that it was not necessary to use
property) by claiming that the
Victoria Police Act 2013 (Victoria)
in order to obtain entry to the
force, then he may have a case
individual officer or officers
provides for a person with a
premises. There is no definition
against the state government for
should be held liable instead
potential claim, for instance, for
of what amounts to reasonable
compensation. However, whether
of the state government, then
damage to property arising from
force set out in the legislation.
or not he would succeed in
the claimant can ask a court for
unreasonable force, to bring
Therefore, what would amount to
obtaining a favourable outcome
permission to also sue (join) the
a claim against the Victorian
reasonable force would depend
(that is, the courts finding that the
individual officer or officers as
Government for compensation for
on the circumstances of each
force used was not reasonable or
parties to the litigation (court
the damage. n
individual case.
not necessary), would depend on
case). Otherwise, there is a risk
legislation states that the police
If a person believes that more
Anna Richards is the legal
There is some case law (or
what the court ultimately finds
that, if only the state government
court-made law) on what would
after hearing evidence from the
is sued and the court found that
director and a lawyer from
amount to reasonable force.
state and claimant to the facts in
the damage was caused by the
Victorian Legal Solutions Pty
This case law exists as a result of
the matter.
individual officer engaging in
Ltd. She practises in commercial
serious and wilful misconduct, the
law, including commercial
case against the state government
litigation, and other areas. Anna
will be dismissed. In other words,
and Victorian Legal Solutions
for compensation for damage
Who is Usually Liable – Victoria Police or the Individual Officer?
the claimant runs the risk of the
can be contacted by telephone
to property.
Section 71 of the Police Act
case being dismissed on the basis
on (03) 9872 4381 or 0419
2013 (Victoria) gives individual
that he failed to sue the person or
229 142 or by email at info@
scenario. Pretend that the police
officers carrying out searches
entity which was responsible.
victorianlegalsolutions.com
believe that a person who
some protection from claims
is committing the offence of
for property damage. It makes
for a particular person or entity
taken to ensure its accuracy, the
“obtaining a financial advantage
sense that this protection exists,
to be liable to pay compensation
information contained in this
by deception” is working in
otherwise police forces would
unless that person or entity was
article is intended to be used as a
a financial institution at that
struggle to employ any field
a party to the court proceedings
general guide only and should not
particular point in time. Further,
officers for fear of exposure to
and hence had the opportunity
be interpreted as being specific
that the only way that they are
liability in court cases.
to defend the claims being made
advice, legal or otherwise. The
against him, her or it.
reader should seek professional
claims having been made against the state (as the employer of the officers carrying out the search)
Consider the following
likely to be able to successfully
Generally speaking, unless an
prosecute him is if they are able to
individual police officer is found
obtain details of transactions from
to have engaged in serious and
his computer and also physical
wilful misconduct, such a claim
records from his office. For the
for damages would lie against
sake of this article, we will assume
the state government (of which
that there is a great risk that if the
A court cannot make an order
Whilst every effort has been
advice from a suitably qualified practitioner before relying upon
Victoria Police is its agent) as
What About Cases Where the Damage was not Necessary or did not Arise from Reasonable Force?
alleged offender discovers that
opposed to against the individual
Where a person believes that the
not necessarily represent the views
the police are going to carry out a
officer or officers carrying out
police have overstepped their
or opinions of Interactive Media
search, that the alleged offender
the search.
authority, he should seek legal
Solutions Pty Ltd or any advertiser
advice to ascertain whether or
or other contributor to Security
not he may have a legal claim for
Solutions Magazine.
will destroy most of the records and that those records may not
securitysolutionsmagazine.com
060-061_SSM110 Legal Q and A.indd 61
However, if the state government attempts to defend a
any of the information contained herein. This article and the opinions contained in it represent the opinions of the author and do
SECURITY SOLUTIONS // 61
13/10/2017 5:44 pm
FEATURE
62 // SECURITY SOLUTIONS
062-065_SSM110 Article 2.indd 62
securitysolutionsmagazine.com
13/10/2017 5:44 pm
THE NEXT GENERATION OF SECURITY PROFESSIONALS
BY SCOTT O’DRISCOLL
In its early years, the security
$6 billion annually and employing
industry in Australia was a
over 50,000 Australian workers,
fragmented industry which
with the breakdown by discipline
operated in silos across its various
in 2014 looking something like
disciplines. If your goal was a
that shown in Figure 1.
career in security, you really
In 2004, the Organisation
did have to ‘carve’ one out as
for Economic Co-operation and
there was little to offer by way of
Development (OECD) released
courses provided by educational
a report titled The Security
institutions. However, more
Economy, which reported the
recently, the security sector in
global spend on private security
Australia has evolved into a
was estimated at somewhere
thriving multi-discipline, billion
between $100 and $120 billion.
dollar industry in high demand
However, the OECD appears to
with many courses on offer for
have underestimated the spend
those so inclined to seek them out.
or it has increased exponentially over the years since 2004, with
securitysolutionsmagazine.com
062-065_SSM110 Article 2.indd 63
The Security Economy
ASIS International and the
According to a report produced
US Institute of Finance and
by The Construction and Property
Management (IOFM) releasing a
Services Industry Skills Council
report in 2013 titled The United
(CPSISC), the Australian security
States Security Industry, Size and
industry is generating in excess of
Scope, Trends and Data, which
SECURITY SOLUTIONS // 63
13/10/2017 5:44 pm
FEATURE the British insurance company Figure 1
Lloyd’s estimated that, in 2015,
Security Disciplines
cyberattacks cost businesses as much as $400 billion a year, which includes direct damage
8.2
plus post-attack disruption to
4.6
the normal course of business.
8.9
26.4
11.1
16.2
24.6
n
Other Security Services
n
Mobile Guards and Patrol Services
n
Private Investigation Services
n
Security System Monitoring Services
n
Cash in Transit and Armoured Guards
n
Crowd Control Services
n
Secure Document and Handling Services
In the same article, Morgan predicts that by 2019 the cost of cybercrime to business will reach a staggering $2 trillion. The article also quotes IBM’s chairman, CEO and president, Ginni Rometty, as saying “cybercrime may be the greatest threat to every company in the world”. The 2016 Australian Industry Report, published by the Australian Government Department of Industry, Innovation and Science, Office of the Chief Economist, listed cybersecurity alongside advanced
reported that the spend on private
Let’s start with question three.
of portable technology device
manufacturing, food and
security alone in the US in 2012
Educational institutions such as
such as a smartphone, tablet or
agribusiness, medical technologies
was in excess of $281 billion.
universities, TAFEs and colleges
laptop. I know in my own home
and pharmaceuticals, mining
According to the report, a further
have been quick to recognise
my wife and I have had to limit
equipment technology and
spend of $68 billion on homeland
that there is a growing demand
the time our kids spend using
services and oil, gas and energy
security services by the US Federal
for security professionals and
portable devices. If it was up
resources as a key growth centre
Government in 2013 resulted in a
have developed courses offering
to the kids, they would never
for Australian industry. An article
staggering $350 billion spend in
degrees in security management
put them down. This increase
published by the Australian
the US over the 2012–13 period.
and other security-related
in the use of portable devices
Security Industry Association
disciplines. This brings us back to
and technology in general, both
Ltd (ASIAL) in August 2017
Satisfying the Demand
questions one and two. How are
at home and in the workplace,
attributes the rise in demand for
In such a thriving industry, there
these courses being marketed and
has seen increased demands
cybersecurity expertise in the
is a huge call for intelligent,
who are these institutes targeting?
for cybersecurity professionals.
workplace is due to the following:
competent individuals to satisfy
I believe the educational
One only has to review the
• employees bringing
the demands of a market whose
institutions should be targeting
current job market to see that a
global size appears to be difficult
school leavers. This raises even
large percentage of the recently
to quantify. However, it would be
more questions. How do we
advertised security consultant
fair to say that the global security
attract them to an industry that
roles are seeking security
industry is growing at a staggering
historically has played a relatively
professionals with cybersecurity
rate and that trend looks like
minor role in the corporate world?
skill sets. Educational institutions
it will continue well into the
What do young people today find
are not the only ones who can
future. To facilitate this growth,
interesting that could be used as
identify opportunities to turn
Given the younger generation’s
the security industry needs
a drawcard to bring them into
a profit; criminals have also
attraction to technology and the
well educated and enthusiastic
the industry?
recognised that the increased use
obvious need for industry and
of technology both at home and in
everyday users of technology
the workplace can be exploited to
to protect themselves against
their advantage.
the threat of cybercrime,
young people. This raises three questions: 1. Where will the next generation
Trends and Opportunities
unapproved apps or devices in the workplace • employees being negligent or careless when following organisational security policies • phishing and social engineering scams
of security professionals
As you walk down the street
come from?
or catch public transport, look
on Forbes.com by Steve Morgan,
links to technology – is the key
around. What are the majority of
founder and CEO at Cybersecurity
to attracting the next generation
young people doing? Typically,
Ventures and editor-in-chief of
of security professionals to our
they will be using some type
the Cybersecurity Market Report,
industry. We all know security
2. How do we attract new ‘blood’ into the industry? 3. Who will train them?
64 // SECURITY SOLUTIONS
062-065_SSM110 Article 2.indd 64
According to an article posted
cybersecurity – with its obvious
securitysolutionsmagazine.com
13/10/2017 5:44 pm
topic was Women in Security. One of the speakers was a lady who heads up security courses at NSW TAFE Ultimo. During question time, I asked, “What is TAFE doing by way of promoting their courses to school leavers?” The answer was, “Unfortunately nothing.” The possibility of engaging with school leavers was raised and met with a positive response from those in attendance.
Summary Clearly, security is a thriving global industry. Therefore, we can and must market security as a career and target young adults looking for a role which offers diversity, recognition at a global level with opportunities for travel and, unlike many other careers, allows individuals to start their own business with very little capital outlay when compared to trades and other professions. I believe technology and the increasing need for those with expertise in cybersecurity may be the drawcard the industry needs to attract younger school leavers. I further believe that cybersecurity courses should include training in other security-related disciplines should not and cannot operate in
almost weekly and many of them
The time to engage is when they
as part of their curriculum. This
silos, so the goal here should be
have university qualifications in
are preparing to leave school and
would allow us to develop the next
to further develop the skill sets
other disciplines. They start out
are deciding what career path
generation of general practitioners
of the cybersecurity practitioner
working in security as a means
they will pursue. To do so, security
in security. I for one would be
to the point where they become
of paying their way through
professionals such as myself need
happy to volunteer my time to
what one of my colleagues
university and then find out they
to be engaged by universities and
speak to these young people.
once described as a general
actually enjoy what they are
TAFEs to speak to these young
practitioner of security. In other
doing and do not pursue their
people at events such as career
admin@interactivemediasolutions.
words, someone who has been
original career path. Perhaps if
days and vocational guidance
com.au n
trained to be a multi-disciplinary
they had been approached earlier
courses. There, we can explain
security professional.
instead of completing a course in
what we do, share our experiences
economics or accounting they may
and show them how we got to
is a security professional with
Marketing and Engagement
have selected to complete a course
where we are. I believe this type of
over 35 years’ experience in the
in cybersecurity, criminology,
engagement and marketing could
industry. He is a licenced security
It has become increasingly
policing or security risk
easily be facilitated by industry
consultant and private investigator.
obvious to me that the majority of
management and would be well
bodies such as ASIS International
Scott currently holds the position
people tend to fall into a career in
on the way to increasing the level
and ASIAL in collaboration with
of Global Security Operations
security as opposed to seeking out
of professionalism the industry is
the universities and TAFEs.
and Risk Manager for one of the
and selecting a career in security.
crying out for.
I read the CVs of persons applying for positions as security officers
securitysolutionsmagazine.com
062-065_SSM110 Article 2.indd 65
So when is the best time to engage with these young adults?
Recently, I attended a NSW
For a full list of references, email
Scott O’Driscoll CPP, JP
world’s largest financial banking
ASIS International breakfast
institutions. Scott can be contacted
seminar. The seminar discussion
on 0437 618 812.
SECURITY SOLUTIONS // 65
13/10/2017 5:44 pm
LOSS PREVENTION
66 // SECURITY SOLUTIONS
066-069_SSM110 Loss Prevention B.indd 66
securitysolutionsmagazine.com
17/10/2017 10:16 am
DEVELOPING A LOSS PREVENTION SECURITY CULTURE IN YOUR ORGANISATION
BY SCOTT TAYLOR
incoming calls. It needs to be
learning curve. By continuing
the same with the security / loss
this focus, it sets the stage for all
prevention culture.
staff focussing on reducing losses
coupled with the ever ongoing
So with only having access to minimum resources, how can an organisation ensure their loss prevention strategy is truly effective?
problem security professionals
My initial response to this would
face, of tangibly showing senior
The security / loss prevention department in an organisation is one of the few departments that regularly has its value measured by what does not happen rather than what does. Due to this fact,
Each and every staff member in a company needs to play
through prevention strategies. To ensure this occurs, there
their part in the loss prevention
needs to be solid support from
program. The easiest way to
senior management. This would
ensure this occurs is to intertwine
ideally be supported by devising
be that most companies maintain
a security / loss prevention focus
specific metrics to show how
management a clear return
that every staff member is
at all stages of their employment.
the security / loss prevention
on investment in funding the
involved in the sales process in
Security-based questions and
department is contributing to
department, security / loss
one way or another – whether
focus need to be part of an initial
the company profits through
prevention departments can quite
it is the sales executives in the
interview process and then
reducing (or eliminating)
often be resourced to the bare
field, the account management
continue on through induction,
preventable losses.
minimum with a small handful
staff back at the office or the
orientation, and ongoing training
of people.
receptionist answering the
and development to prop up the
securitysolutionsmagazine.com
066-069_SSM110 Loss Prevention B.indd 67
Another key aspect of maintaining effective loss
SECURITY SOLUTIONS // 67
17/10/2017 10:19 am
LOSS PREVENTION prevention strategies is ensuring
department in an organisation
regularly after the loss prevention
“I am here to see XYZ for an urgent
there is not a silo approach in
attend and contribute will
team meetings and updated
meeting and I am just running a
the organisation. For example,
not only ensure all necessary
accordingly as new issues and
bit late”. As I was not dressed like
management, administration and
information is captured, it will
information come to light.
a standard criminal, had a nice
the HR department should all
also assist in driving the follow
work hand in glove with the loss
up communication with their
representation at the security
of a senior management member,
prevention department. This helps
individual department staff,
loss prevention meetings, it can
the response was “yeah just go
ensure there is not a duplication of
thus helping reiterate the loss
also be extremely beneficial to
through here, do you know where
duties and it also helps to reiterate
prevention focus we are seeking.
use external specialist resources
you are going mate”. This same
the needed organisation-wide loss
From the involvement of
for specific individual tasks.
response happened while I walked
Besides the multi-department
shiny briefcase and used the name
prevention focus. Standard tasks
various departments in the
One of the reasons this may
around the first three levels of
of the security department may
security / loss prevention meetings,
be effective is due to what is
the building, leaving my business
normally include items such as
greater information sharing
sometimes called ‘store blindness’.
card in multiple locations. You
company property monitoring,
between departments occurs and
Day-to-day vulnerabilities in an
would be amazed at some of the
access control, key storage and
this may also provide different
organisation can be overlooked or
areas I was able to gain access to.
issuance, and specific elements
perspectives on individual
not recognised due to them being
After approximately 40 minutes,
of business continuity planning.
department issues. Having the IT
previously accepted or overlooked
I walked to reception and asked
However, to help support the
department assist with providing
for so long.
for the designated representative
needed culture, companies
solutions on controlling the
should be involving the security
information sharing of specific
involved in two examples of
explained that approximately
/ loss prevention department
stock levels held or product
such accepted or overlooked
30 of my business cards would
in duties such as: recruitment
delivery routes would be one
vulnerabilities. With the first one,
be turning up throughout the
background vetting, supplier due
example of this.
I was conducting a gap analysis
company building so I would
on a company that was suffering
suggest following up with the
diligence reviews, developing the
Another clear example would
I have been personally
I was supposed to meet with and
security modules of the company
be the security department
unexplained theft of some of their
team as to where they find them
induction program and orientation
working with the procurement and
products. Upon attending the site,
as that is where I was able to gain
programs, and then physically
legal departments to draft external
within approximately 10 minutes
access to.
conducting the training with staff
supplier vetting procedures and
of conducting an external walk
for it.
standards and ongoing codes of
around, I asked the designated
countless times before, security
conduct underpinned with key
company contact how long the
and loss prevention is about
security requirements.
large hole had been there for in
protecting all of a company’s assets
the chain wire fence separating
(People, Property, Information
Having the initial focus and all of our ducks in a line with the recruitment, induction and
The data produced through
In summary, as has been stated
ongoing training programs for
the collation of these ‘team built’
the loading dock area and staff car
and Reputation) and it is my
staff is a great start. However, to
solutions can be used to update
park. His response was “as long as
opinion that the development of
manage the ongoing identification
(or commence) an organisation
I can remember”. I am relatively
a proactive and unified security /
of organisational vulnerabilities,
security awareness program
confident you can draw the logical
loss prevention culture throughout
and to ensure that appropriate
that should be applied across all
conclusion for yourself.
an organisation, supported
treatments are underpinned with
divisions of an organisation. This
operational effectiveness, you
program can also be replicated
multinational corporate who had a
structured ongoing training and
need the use of cross functional
to all business partners to build
control room onsite. I simply used
multi-department represented
or multi-departmental teams.
awareness of the proper protocols
their company website to obtain a
improvement meetings will
Any changes in systems need
with anyone working with or for
senior manager’s name onsite (We
provide any organisation its
to be tested for their impact on
the organisation and it sends a
will call him “XYZ”) and arrived
best chance at minimising or
company operations which can
very strong message reinforcing
just before 9:00am. I made sure I
eliminating preventable losses. n
then be weighed against the
the organisation’s loss prevention
was dressed in a nice suit and was
benefit of implementation. Each
focus and helps enforce a
carrying a nice shiny brief case.
individual department in an
consistent approach.
Upon arriving onsite, I noticed that
of International Security Training
The second example was for a
by regular communication,
Scott Taylor CPP is the CEO
a back door was slightly ajar with
Academy. With over 23 years of
specific risks and idiosyncrasies,
clearly documented and heavily
a brick inside it and an ashtray
experience in the security services
and to ensure all of this knowledge
supported by procedural programs
next to it. From this, I deduced
industry, Scott has a wide variety
is captured and utilised effectively
where each department can
that this was where the staff
of experience in a range of security
in the planning processes, regular
be audited against the agreed
exited for a quick smoke break
related fields including loss
scheduled loss prevention focussed
standards that focus on prevention
so I walked directly towards that
prevention, incident investigations,
meetings should occur. Having
strategies. These are ‘living’
door. After waiting two minutes, a
risk mitigation and workplace
key representatives from each
documents that should be revisited
staff member emerged and I said
violence prevention.
organisation is aware of its own
68 // SECURITY SOLUTIONS
066-069_SSM110 Loss Prevention B.indd 68
The training should be
securitysolutionsmagazine.com
17/10/2017 10:19 am
SMARTair™
Proximity access control Introducing ASSA ABLOY’s new Lockwood SMARTair™; a powerful access control system that is simple to install, simple to configure, simple to administer and maintain. SMARTair™ provides peace of mind for businesses small and large, knowing that lost credentials are no longer a risk, with the flexibility to restrict user movements within the building. Audit trails can show historical movement for reporting purposes. SMARTair™ offers an intelligent, yet simple, step up from keys, and a cost effective alternative to traditional access control. No bells, whistles, or wires, just sleek, reliable security. Available in standalone, offline, update on card and wireless online.
SMARTairTM Door Lock
SMARTairTM Knob Cylinder
SMARTairTM Wall Reader
SMARTairTM Cabinet Lock
S E C U R I T Y, S I M P L I C I T Y , C O N V E N I E N C E . Visit lockweb.com.au/smartair to learn more.
066-069_SSM110 Loss Prevention.indd 69
13/10/2017 4:41 pm
FEATURE
70 // SECURITY SOLUTIONS
070-073_SSM110 Article 3.indd 70
securitysolutionsmagazine.com
13/10/2017 4:43 pm
ASSURING SECURITY AND SAFETY
BY NEIL FERGUS
All eyes from within Australia
people within the Commonwealth
and around the 71 nations
and, most particularly, the
and territories that make up
participating athletes.
the Commonwealth will be
questioning the success of the
2018. Viewers anticipate being
Commonwealth Games? Sure.
thrilled by a spectacular opening
And perhaps readers have
ceremony, which will herald
also heard the CGF had to take
the commencement of the XXI
the 2022 Games away from
Commonwealth Games.
South Africa due to unresolved
The Gold Coast Commonwealth
securitysolutionsmagazine.com
070-073_SSM110 Article 3.indd 71
Are there a few cynics
on the Gold Coast on 4th April
contractual issues? Yes, also
Games will bring together
true. Unfortunately, the 2022
able and disabled athletes,
Games are no longer going to
families, officials, spectators and
Durban in South Africa but,
media from a diverse array of
most importantly, the CGF was
countries in a sports and cultural
subsequently flooded with
extravaganza. Having served the
inquiries from other cities across
Commonwealth Games Federation
the globe that expressed interest
(CGF) as its security adviser for
in stepping into the breach.
13 years in a part-time capacity,
Malaysia, England, Canada
here are some insights into how
and Australia all engaged in
this event keeps on being so
discussions with the CGF about
successful and the strategies that
the possibility of being selected as
are in place to ensure the event is
the replacement city for 2022. And
secured for the benefit of all the
some cities have already indicated
SECURITY SOLUTIONS // 71
13/10/2017 4:43 pm
FEATURE
a strong interest in hosting the
understanding of, how to use the
2026 Games. So, notwithstanding
international standard for risk
the South African debacle,
management (ISO 31000:2009)
global interest in hosting the
and no appreciation of the
Commonwealth Games has
necessity to apply sound risk
never been stronger. By the
methodology in the infrastructure
time this article is published,
and event sectors. However,
there will likely have been a CGF
as the private sector has long
announcement on which city will
been aware, risk management
be hosting the 2022 Games.
is an essential planning and
Unsurprisingly, many of the interested cities had researched the outstanding success of the
delivery tool in the major
be maintained from opening
rigorously at a Games. However,
events environment.
until closing include the main
the reality is there is no complete
stadium and, this might surprise
business redundancy for any IBC
While threat assessments are
Glasgow 2014 edition – in respect
a key input to risk management,
some people, the International
at an Olympics, a FIFA World Cup
to sports, finances, infrastructure,
they are only one of the inputs,
Broadcast Centre (IBC).
or a Commonwealth Games. These
legacy and social inclusion.
along with vulnerability analyses,
Glasgow was a sensational Games
to assist the objective and accurate
be searched and ‘locked down’
that operate 24/7, ensuring images
on every measure, including
assessment of the likelihood of
prior to the commencement of the
and reporting on the event are
security. Some of the more
hazards impacting the Games.
Games. For several compelling
streamed promptly all over
experienced event commentators
When talking about a multi-
reasons, it is unthinkable for
the world.
are predicting the Gold Coast
billion dollar Games – comprising
the integrity of that principal
2018 Games could potentially be
278 events in 18 international
venue to be breached in any way,
rightsholders are complex and
as successful as Glasgow.
championships over 15 days
particularly as the venue manager
detailed and always involve
– threat assessments are too
and emergency services are likely
very significant revenues.
city will have to give the CGF
imprecise a methodology on
to have to deal with several venue-
All international major event
several binding commitments
their own to fully inform major
specific threats over the period of
organisers are dependent on their
to satisfy its safety and security
capital investment decisions, let
a Games.
IBCs functioning properly and
requirements. Under the host
alone to assuage the concerns of
city contract signed with the
insurance underwriters.
The 2022 host country and
CGF, there is a mandatory
When the CGF issues a Games
The main stadium needs to
are enormous broadcast facilities
Event contracts with broadcast
If the venue has been poorly
digital broadcast signals being
secured, the worst-case scenario
uninterrupted so the event can
is managers might have to order
obtain optimal coverage and
obligation to routinely provide
contract to a city, the hosts
a partial or full evacuation.
maximum broadcast payments
the CGF coordination commission
are required to provide 100
However, if it has been properly
are remitted.
with six-monthly updated
percent security, screening of all
searched, locked down and kept
security risk assessments.
people and materials, at several
secured, the venue manager and
visits the host city every six
This has surprisingly proven
designated venues, including at
emergency responders can have
months or so to review and
a challenge for some Games
the Games village. The ‘heart’ of
strong, professionally sound
ensure planning is progressing
organising committees and
any Games is its village, where
confidence in their handling of
in accordance with the host city
their law enforcement partners.
the athletes of the Commonwealth
a wide range of potential threats
contract and that all obligations
Many national security
reside, train and interact – sharing
without disrupting any events.
and timelines are being
agencies routinely talk in
the Commonwealth values – in
threat methodology and have
privacy and safety. Other venues
unusual example of where 100
an amicable assurance process,
little interest in, and a poor
where 100 percent security must
percent screening must be applied
as the Commission is sharing its
72 // SECURITY SOLUTIONS
070-073_SSM110 Article 3.indd 72
The IBC might seem an
A CGF evaluation commission
satisfactorily met. This is normally
securitysolutionsmagazine.com
13/10/2017 4:43 pm
works were completed to address
accreditation pass to back-of-house
Commonwealth Games next year
the problems. As a consequence,
and restricted areas, including
– athletes and spectators alike –
the organising committee had
the village; transport security for
simply enjoy a wonderful event.
AS THE PRIVATE SECTOR HAS LONG BEEN AWARE, RISK MANAGEMENT IS AN ESSENTIAL PLANNING AND DELIVERY TOOL IN THE MAJOR EVENTS ENVIRONMENT.
to foot the bill for the first teams
athletes and technical officials; and
Organisers want the sporting and
that arrived in Delhi to be
field of play security at venues.
cultural experience to leave an
extensive experience in planning
accommodated in hotels. The CGF is the owner of the
The CGF member nations
enduring impression on them
and territories are always
and their families, to inspire
Games, not the host city, on
understandably very concerned
the youth of the Commonwealth
behalf of all the member nations
for every Games venue to have
and leave a positive legacy for
and territories. It protects the
an up-to-date, customised,
the Gold Coast, Queensland and
Games for those members and
emergency management plan
Australia. Security will hopefully
all the athletes and citizens of
appropriate for its use in the
be friendly, firm and effective.
the Commonwealth. Safety and
Games context. For example, an
security is obviously a very key
emergency management plan for
beforehand and the
issue for it and for each evaluation
an Australian Football League
professionalism of the men and
commission which is appointed by
(AFL) final at the Melbourne
women who will be working
the board of the CGF.
Cricket Ground (MCG) is not fit for
on screening operations and in
purpose for the Games if the MCG
various roles behind the scenes,
trying to interfere with national
is being used to hold an opening
as well as Queensland Police
and delivery of previous events,
security arrangements in any
ceremony with a show involving
Service and its national security
and the organising committee and
host country. However, the
several thousand school children,
partners, should ensure Games
its local partners are of course
CGF members, including the
numerous other entertainers,
safety and security works as
equally keen for the Games
Australian Commonwealth
massive pyrotechnics, a march-
everyone hopes and expects. We
to succeed.
Games Association, collectively
by of the participating teams
aim for great. n
have very clear expectations
and torch bearers running the
there can be some tensions or
of how safety and security
Queen’s baton message into the
concerns between an evaluation
should be consistently and
stadium from the public realm.
executive of Intelligent
commission and the organisers of
appropriately delivered inside
And it is entirely likely some of the
Risks (IR), an international
a Games. The CGF had some grave
the footprint of the event; and it
ingress and egress arrangements
management services company
concerns about the delays in the
is the responsibility of the CGF in
might need to be changed due
headquartered in Sydney. He is an
building and overlay programs
partnership with the organising
to the ceremony plan and that,
internationally renowned expert
for the Delhi 2010 Commonwealth
committee to ensure that occurs.
in turn, could impact on the
on international terrorism and
Games and those issues eventually
Some of the security issues
routine evacuation plans at the
has been the security adviser
However, very occasionally,
Of course, the CGF is not
The meticulous preparation
Neil Fergus is the chief
became very public when it was
that the CGF needs to carefully
venue. Emergency management
to the Commonwealth Games
evident the athletes’ village was
manage at each Commonwealth
plans need to be reviewed very
Federation in a part-time capacity
not in a fit state for occupation,
Games include the restricted
late in the process, immediately
continuously for over 13 years.
and nor was it appropriately
items list, which specifies what
before the Games commence,
Neil has been engaged on security
secure, immediately prior to
people are permitted to take or
so any temporary overlay and
planning and delivery for seven
the commencement of those
not take into venues; airspace
infrastructure is fully taken
Olympic Games, four FIFA World
Games. In fact, the CGF refused to
protection zones over venues;
into consideration.
Cups and six Commonwealth
authorise teams to move into the
the accreditation system – who is
Of course, it is hoped that
village until significant remedial
eligible and permitted to have an
people attending the Gold Coast
securitysolutionsmagazine.com
070-073_SSM110 Article 3.indd 73
Games. Visit www.irisks.com for more information.
SECURITY SOLUTIONS // 73
13/10/2017 4:43 pm
AVIATION
TRAVEL SAFETY
BY STEVE LAWSON
74 // SECURITY SOLUTIONS
074-077_SSM110 Aviation.indd 74
securitysolutionsmagazine.com
13/10/2017 4:45 pm
It is getting towards the holiday
suggest you skimp on paying
It not only makes it quicker
part of the year and about this
for insurance; it is amazing how
to get the bag off the arrivals
time last year I wrote an article
many Australians get injured
carousel, but it means that
about travel security, so it seems
overseas and then find that their
you can see if someone tries to
appropriate to revisit the subject.
basic insurance is not sufficient. It
steal the bag off the carousel.
immediate environs
Most of this article is aimed at the
is the same if you are holidaying
There are also electronic tags
of Western diplomatic
international traveller, but much
domestically – get insurance.
that track your bag. I have
missions, including
is appropriate to domestic travel
If you travel regularly, get an
not tried them, but we did
embassies, high
as well. As a director of a company
annual policy.
experiment with something
commissions, consulate
similar for air cargo a few
generals and consulates, unless you have a reason
which provides travel advice (www.paradym.co), I have access
Baggage
years ago and I cannot see any
to a range of resources.
1. Buy a bag that is suitable for
reason they would not work.
possible, make sure there is more than one. 2. Areas to avoid: • Stay away from the
to visit.
the travel you do. I buy good
To be honest, given the first
years of travel, I have never had an
bags because I travel a lot
sentence of this paragraph,
issue, and I have travelled to a few
and they last. I do not buy
you should not need them.
places that could be described as
bags because they are status
I also carry at least a set of
less than desirable. I have lost one
symbols. I got my latest bag
underwear in my carry-on
gatherings and
bag, when I was on my way to New
in Thailand and it is perfectly
bag, just in case my bag is lost.
demonstrations; they may
York to handle Qantas’ on-ground
good. My cabin bag came from
response to September 11 and I did
Costco. If you do not intend
Checklists
not have a ticket for one sector. I
travelling a lot, go to Big W,
I do not do this but I should. Keep
have had one bag broken and that
Kmart, Target or similar and
a checklist of your valuables,
and shopping venues
was by New Zealand Customs, who
get a bargain. There is not
even if it is on your phone or
carefully – venues with
decided they needed to get into my
much use paying a fortune
tablet. When I checkout, I always
a higher level of visible
locked bag so they broke the locks
for a designer bag just to use
do two walk arounds and look
security are generally safer
and it was never the same.
once every year or two. Even
everywhere, including drawers
than venues with no, or
if you travel a lot, do not buy
that I did not use, to make sure
obviously poor, security
Do Some Research
expensive bags. If your bag
I have not left anything. To be
as criminals and terrorists
There are so many sites that
stands out as being ‘expensive’
completely frank, I do not unpack
are more likely to attack
provide information that it can
then thieves (who are not
my bag unless I am in a room for
be overwhelming and often the
stupid) may target it.
more than a week. A checklist is
I can say that in almost 30
security advice on many sites is
• Stay away from ‘seedy’ parts of town such as redlight districts. • Do not go near political
appear benign, but they can turn violent quickly. • Choose entertainment
the ‘softer’ target. 3. Things not to do:
a good way to make sure that you
• Photography of police and
not particularly good. However,
do not put anything that you do
have accounted for all your items
military infrastructure
if you are travelling overseas,
not want to lose into checked
before checking out.
and personnel is not
look at Smartraveller (http://
baggage! I often show people
smartraveller.gov.au) and the UK
how easy it is to open and close
equivalent (https://www.gov.uk/
2. The most basic rule of travel –
recommended. In many places, photography of
a zippered bag without letting
General Security Advice
foreign-travel-advice). I do find
someone know that you have
1. Always be aware of your
airports or bridges is also
the detail on the UK site is a little
been inside. If you do use a
surroundings. It is not possible
better, but that is probably just a
zippered bag, you need to make
to teach situational awareness
• Do not look too wealthy
personal preference. It only takes
sure the slider (pull tab) does
in this article, but a couple of
– avoid conspicuous
10 minutes to check both and it
not move. The locks on some
pieces of advice:
displays of wealth such as
is good practice to register your
modern bags fix them in place,
• Look around – there is no
expensive clothing, flashy
travel on Smartraveller.
but some soft-sided bags have
hard and fast rule about
jewellery, electronics or
multiple zips. You should fasten
who is acting suspiciously,
displaying large amounts
Insurance
them to a fixed point (like a
but if someone keeps
of cash (bearing in mind,
I often watch the news and
handle) on your bag. You do
looking at you, and like
what we may consider a
see travellers stranded in
not need to use anything fancy
me you are not the most
small amount of money
various places and whining that
or expensive – zip ties work,
attractive person in the
may be a considerable
something has gone wrong and
but I would make sure you can
area, avoid that person. He
fortune to others). Only
the airline is not helping. The
identify your zip tie by marking
or she may only be trying
take with you items that
short answer is to get travel
it with nail polish or similar.
to sell you something, but
insurance! It is not the answer
3. Put a ribbon or coloured
avoid him.
to all problems, but it will help
bag tag on your bag so that
• Know where your exit
in most cases. I also do not
you can recognise it easily.
points are and, where
securitysolutionsmagazine.com
074-077_SSM110 Aviation.indd 75
public buildings, ports, not recommended.
you are prepared to lose. • Watch out for strangers ‘offering help’ or ‘needing help’.
SECURITY SOLUTIONS // 75
13/10/2017 4:45 pm
AVIATION • Try not to travel on your own; it is best to be part of a group. That does not mean a tour group, but if you become friends with people during your travel, stay as a group. Look to join tours provided by your agent
I ALSO DO NOT SUGGEST YOU SKIMP ON PAYING FOR INSURANCE; IT IS AMAZING HOW MANY AUSTRALIANS GET INJURED OVERSEAS AND THEN FIND THAT THEIR BASIC INSURANCE IS NOT SUFFICIENT.
or the hotel. To be blunt, many are rip-offs because they take you to businesses associated with them where they get a cut, but they are usually safer than randomly wandering on your own. An alternative is to offer a cab driver a day rate. Some of the best tours I have had were in cabs
W i I a s
A m o a r i
where I negotiated a day rate. That included a great
drink spiking. If alcohol is
are going and when you can
consist of at least a torch,
tour of San Francisco, so
consumed, the preferred
be expected to return.
a whistle, a bottle of water
try in first world countries
alcohol is beer or wine
as well.
from sealed bottles that are
phone numbers of the hotel
It seems a long list of do nots,
opened in your presence.
and anyone in your group
especially from someone who
programmed in your phone.
says he has had almost 30 years of
• Having said to use cabs, do not hail them in many third
• Drinks (including water)
• Make sure that you have the
and some food.
world countries. It is best to
should only be consumed
use vehicles pre-booked by
from closed and sealed
the hotel rather than hailing
bottles, including in hotel
them in the street. This is
bars. Opened bottles and
your room safe or the hotel
checklist, things I mostly do. Have
important at the airport. Be
glasses should not be
safety deposit box.
a great trip, wherever you go. n
aware that in many places
left unattended at any
the cab can be a shared ride
time. If they are, discard
money exchanges. People
and the drivers may stop to
the contents.
may be observing and
years’ experience in aviation
noting the amount of money
security. As a security executive
you are carrying – go inside
with Qantas, Steve held a number
ID with you always. I do
a bank or convert money at
of senior management roles
not leave my passport in
your hotel.
covering all aspects of aviation
collect people until the cab is full. 4. Local customs: • When you research your
6. Things to do: • You must carry a form of
• Ensure your mobile phone is always charged. • Leave your valuables in
travelling without an issue, but if you look at the article, almost all is common sense and, other than the
• Take care using ATMs or Steve Lawson has over 20
the hotel – I always carry it
• You are responsible for the
at what is acceptable
with me and keep it in my
security of your baggage
to airport operations. He was
behaviour. That may
front pocket. If someone
while checking in or out of
sent to New York immediately
include what is acceptable
does brush against you
a hotel – ensure that it is
following the 9/11 attacks to
dress. I have been in a
and you think you have
under constant supervision.
manage the Qantas response
shopping centre with a
been pickpocketed, do not
police officer who reminded
automatically check one
enough to be the victim of
following the 2002 Bali Bombings.
some Western girls that
pocket for your wallet. That
crime, do not put up a fight.
On his return to Australia, he
they should dress modestly.
just signals where you keep
Do as the person says.
was appointed Security Manager
In many countries, men
your valuables.
• Maintain a small
and undertook a similar role
Freight for the Qantas Group. Since
‘emergency kit’ to hand
2007, he has been a director of
or be alone with them
thieves may pose as police
when staying in hotels
AvSec Consulting in partnership
and, in several places,
officers or private security
in case there is a fire,
with Bill Dent, a fellow former
homosexuality is illegal.
guards. Always ask to
earthquake or other
Qantas security executive. Steve
see identification.
emergency or where
can be contacted via email
electricity supplies are
slawson@avsecconsulting.com or
unreliable. This should
on 0404685103.
should not touch women
5. Drinking and alcohol: • Watch out for ‘tourist drugging’ and other
76 // SECURITY SOLUTIONS
074-077_SSM110 Aviation.indd 76
• Beware that in some places
• If you go out, make sure someone knows where you
A c m o
security from policy development
trip, make sure you look
• If you are unfortunate
T a e t s
securitysolutionsmagazine.com
13/10/2017 4:45 pm
W n R a b
A fu t d
We are a leading player in the biometric identification market by pioneering In Motion Identification (IMID) access, a multimodal verification for instant, seamless, and non-invasive verification. Ask us about advanced features such as multi-modality, speed of identification, our committed accuracy, anti-fraud algorithm, double factor availability, restricted people alerts, simultaneous identification.
The solution is designed for enterprise and can be easily integrated with existing infrastructure. It can be added to any existing door, turnstile or speed stile, and any access control solution. Ask us about high availability, scalability, cyber security and encryption, multi-site management, traceability and auditability, our APIs and ease of integration.
FST Biometrics is a leading identity management solutions provider. The company’s IMID™ product line offers access control through its proprietary In Motion Identification technology. This provides the ultimate security and convenience for users, who are accurately identified without having to stop or slow down. IMID™ solutions integrate a fusion of biometric and analytic technologies that include face recognition, body behavior analytics and voice verification. For more information, please visit http://www.fstbm.com.
With IMID Access, authorized users do not have to slow down, sign in or stop. Rather, they are identified in motion, and granted seamless access to buildings and facilities. Ask us about our rich out of the box functionality, such as visitor management, time attendance, notifications, digital doorman and mobile applications.
074-077_SSM110 Aviation.indd 77
Add-On APAC Innovative Solutions offers converged physical, cyber and communication security solutions. Operating across the Asia Pacific region, we harness advanced products and ground-breaking technologies, helping our customers transform the way they protect people, information and assets. Learn more about us at http://www.addonapac.com. Add-On APAC Australia Pty Ltd info@addonapac.com, 03 9607 8465
IMID is the future of access control. Prefer to take your own conclusions?
Ask us for a product demonstration, and see it for yourself.
13/10/2017 4:45 pm
ACCESS CONTROL
78 // SECURITY SOLUTIONS
078-081_SSM110 Access Control.indd 78
securitysolutionsmagazine.com
13/10/2017 4:48 pm
The
Psychology of Security& PERCEPTION OF SAFETY BY RACHELL DELUCA
The past decade has seen a
past 15 years, this has resulted in
that an increased effort is being
with advanced capabilities such as
dramatic shift to the security
a more security conscious society
made to provide them with this
analytics and facial recognition,
landscape in that security
of educated end-users in both
feeling. If security mechanisms
but because these systems are
concepts and strategies, once
the information and physical
cannot be seen and do not impact
so commonplace and widely
only the domain of professionals,
security environments.
upon a person’s interaction with
accepted and expected, there
his environment in some way,
will be no impact upon the
are now ordinary topics of
With this increased education
conversation in both businesses
and understanding, however,
even if inconvenient or invasive,
perception of safety amongst the
and households alike. It seems
comes criticism and evaluation of
the perception that any action
community. Average users will
these days that everyone has an
the visible protection mechanisms
has been taken to address the
not know that the system they can
opinion on everything, from local
utilised in environments where
perceived increased level of risk
see has been upgraded and has
crime rates, spam protection and
physical security and personal
will not be made and people will
increased capabilities that directly
online privacy to national security
safety are at a premium and
not feel safe. People today need
impact upon their safety, but
and counterterrorism.
are, in fact, demanded by users.
to see and feel that measures are
will definitely notice the absence
Terrorism activity in public
being taken to let the good guys in
of any visible, new security
security and its subsequent
places of mass gathering such as
and keep the bad guys out.
measures that are reactive to
accessibility to everyday users is
stadiums, public transportation,
partly due to advancements in
airports, entertainment venues,
the notion of keeping malicious
reassure the public and provide
online services such as banking,
hotels, restaurants, marketplaces
persons, items and weapons
the perception of safety, visible
social media and the prevalence
and just about every other
out of places of public use is the
security countermeasures have
of personal computing and home
possible type of venue has
fundamental definition of access
become necessary, regardless of
networks. These advances have
generated fear and unease within
control. Unfortunately, security
the actual effectiveness, if any,
generated a need for everyday
the community. The need for
measures that are highly visible
they provide.
users to understand risks
venue owners, managers and
but very common nowadays
pertaining to privacy, identity
governments to address this
such as CCTV, electronic access
theatre, and has been written
theft, hacking, access control and
fear and secure their sites has
control systems and locks, and
about in depth by renowned
overall protection of their data–
intensified; however, the most
entrance barriers do very little
security expert Bruce Schneier,
concepts which readily translate
effective methods of achieving
to placate and reassure people
who notes that security is both
into the physical protection
this may not be visible to the
that any increase in security has
a reality and a feeling. Security
space. Coupled with worldwide
average user, and therefore will
been made. A venue may have
as a reality can be measured
terrorism activity and an overall
have no impact whatsoever on the
spent many thousands of dollars
in a mathematical sense based
increase in media reporting of
perception of safety. The general
upgrading such systems to the
upon risk probability and
security-related matters over the
public needs to feel secure and see
latest, state-of-the-art technologies
countermeasure effectiveness.
This consumerisation of
securitysolutionsmagazine.com
078-081_SSM110 Access Control.indd 79
This psychology of security and
the changing risk climate. To
This concept is called security
SECURITY SOLUTIONS // 79
13/10/2017 4:48 pm
ACCESS CONTROL
TO REASSURE THE PUBLIC AND PROVIDE THE PERCEPTION OF SAFETY, VISIBLE SECURITY COUNTERMEASURES HAVE BECOME NECESSARY, REGARDLESS OF THE ACTUAL EFFECTIVENESS, IF ANY, THEY PROVIDE. THIS CONCEPT IS CALLED SECURITY THEATRE.
Security as a feeling, however,
screening of individuals, ID
cannot be measured and is subject
requirements and checks, and ‘see
to the differing psychological
something, say something’ type
reactions of individuals to
campaigns involving everyday
risk, perceived risk and to
citizens to increase awareness and
countermeasures. Schneier
reporting of suspicious activity.
summarises this perfectly, stating,
Security has become highly visible
“The two things are different: you
and in many circumstances
can be secure even though you do
inconvenient or invasive, as is
not feel secure, and you can feel
the case with bag screening or
secure even though you are not
body scanning of every person.
really secure.”
However effective or ineffective
metal detection being used to
historically, however, the value
these visible methods are, it
screen persons entering such
of an effective countermeasure
cannot be discarded, particularly
cannot be argued that they do not
venues. The reality is that the
compared to a theatrical one
after security incidents such
provide psychological reassurance
likelihood of patrons bringing
is negligible if it is invisible to
as terrorist attacks have
and address some of the fears of
illegal alcohol, glass containers
the average person who now
occurred. The genuine fear
the public. For that reason alone,
and nuisance items such as flares
demands increased security,
and psychological uneasiness
countermeasures that do not
or fireworks into these venues
despite not always knowing what
of the public that occurs now
contribute in any other way to the
is still higher than the likelihood
that actually entails.
around public places of mass
mathematical reduction of risk
of explosives and firearms. The
gathering, air travel, underground
probability, and thereby qualify
consequences of the latter of
and the perception of safety as
train stations, sports arenas,
only as security theatre, are
course are much different, but
people go about their day-to-
entertainment venues and the like
effective. Just as the placebo effect
despite recent attacks globally,
day lives is a crucial aspect
is a very real issue and cannot be
in medical treatment is effective
the likelihood locally has not
of overcoming the effect
left untreated. Society’s perception
and qualifies as a treatment in its
statistically increased. In fact, new
that terrorism has on the
of safety and security in day-
own right.
risks may be introduced as a result
consciousness of a community.
of the implementation of security
The message globally after any
The value of security theatre
to-day lives has been shattered
Security theatre is not just
The psychology of security
and people’s innocence in such
being performed at airports, or
theatre treatments, such as health
incident or attack is unanimously
matters has been lost. This in turn
in response to actual incidents,
and safety concerns for elderly or
that people will not live in fear
has led to the increased security
but is now being used to satisfy
young patrons standing in long
and will not change their way of
awareness of everyday citizens
governments, board members
queues for hours in excessive heat,
life. Security theatre measures
who now demand to be reassured
and event organisers that efforts
or the increased risk of violence
and their capacity to provide
that they are safe.
have been made to reduce the
and aggression amongst patrons
reassurance to the general public,
occurrence of risks, which in
frustrated with the inconvenient
reducing anxiety and fear during
that after the September 11 attacks
turn impacts upon the likelihood
and invasive search tactics.
times of great uncertainty, means
in the US, several airports utilised
of litigation and accusations
National Guard troops to stand
It has been well documented
Just as the presence of
it is in fact a valid and valuable
of negligence or complacency.
essentially unarmed National
security strategy. The changing
guard at security checkpoints to
Changes to access control
Guard troops at US airports
risk climate and the increased
provide a highly visible presence
measures at rock concerts,
following the September 11
fear within the community that
to all airport users. What
festivals and stadiums is a great
attacks provided reassurance
increases with every incident
subsequently came to light and
example of how the performance
to the public, the value of the
that occurs will ensure that
was widely reported upon in 2002
of security theatre has become
access control countermeasures
psychological security treatment
was that none of those officers
mainstream, with little or no
seen today is in the visual
becomes increasingly common,
were carrying loaded weapons
evidence of providing any tangible
deterrence, public reassurance
and may become just as
and that their guns were empty.
risk mitigation.
and reduction of liability. The
important as traditional security
operating costs of security theatre
countermeasures in days to come. n
The effectiveness of their presence
Where once the focus of
was purely as a visual deterrent
security at such venues was to
strategies that treat perception
and to reassure frightened
ensure a patron had a valid ticket
rather than reality can be quite
passengers that action was being
and was not bringing any illegal
high; in many cases just as high
taken to prevent such an attack
alcohol or glass containers into
as the costs of treating actual
Security Consultant with Arup,
from happening again.
the facility, the focus now is on
risk by upgrading existing
located in Melbourne, Australia.
explosives and weapons. This
systems with more effective
She has over 17 years of experience
been an overall increase in visual
means longer queues, additional
technologies or implementing
in the security industry. Rachell can
presence of uniformed security
manpower, increased baggage
new countermeasures with
be contacted via email
personnel, baggage screening,
searches and, in some cases,
measurable effect. As shown
rachell.deluca@arup.com
Since that time, there has
80 // SECURITY SOLUTIONS
078-081_SSM110 Access Control.indd 80
Rachell DeLuca is a Senior
securitysolutionsmagazine.com
13/10/2017 4:48 pm
LIKE US ON FACEBOOK facebook.com/ssmaust
078-081_SSM110 Access Control.indd 81
13/10/2017 4:48 pm
PROFESSIONAL DEVELOPMENT
82 // SECURITY SOLUTIONS
082-085_SSM110 Professional Development.indd 82
securitysolutionsmagazine.com
13/10/2017 4:53 pm
PROTECTING
CEO THE
BY AMI TOBEN
In recent years, quite a few
two general problems – one minor
an unfortunate necessity for
ominous tales about it, it is not
articles have been published about
and one major.
people under a great deal of risk
surprising that lots of people
The benefit of the doubt can
believe corporate interests,
CEO protection and how much
The minor problem is that the
money different corporations
figures they show for corporate
possibly be given to those who
wealthy individuals and private
spend on it. Forbes might have
expenditure on CEO protection
do not understand the subject
security must, by definition, be up
been the first to get this trend
all come from the Securities and
of security risk management,
to no good. So, a few things should
started with an article first
Exchange Commission (SEC), since
but what is inexcusable are
be clarified:
published back in August 2008
publically traded corporations
the common implications that
1. The job of private security
(Kirdahy, 2008). CNBC discussed
in the US have to disclose annual
the executives who receive this
professionals is to protect
the issue back in 2010 during the
security spending that exceeds
type of protection only do so
their clients and their families.
US healthcare debate (Coombs,
$10,000. The issue here is that
out of paranoia or delusions of
Many people might think that
2010), and Fortune Magazine put
much, if not most, of the spending
grandeur (or both), and that there
the CEOs of major corporations
out a piece about it in January
on executive protection comes
is something sinister about the
and billionaire tech moguls
of 2015 (Zillman, 2015). But the
from private accounts or family
security industry.
are somehow impervious
champion in this field has to be
offices that are owned by the
Business Insider, which focuses
executives (and therefore do
have seen in this respect was
well-secured fortresses. But I
primarily on the tech sector, and
not get to the SEC). This means
the recent one by The Register
can tell you from experience
seems to enjoy the idea of ranking
the articles only give a partial
(McCarthy, 2017), which goes
that threats of physical harm
CEO security expenditure (Carson,
(and in some cases, grossly
so far as to rank executives on
(which are far from rare)
2016). It will occasionally even
underestimated) picture of the
a paranoia scale (nominating
affect these executives pretty
pick on specific executives, like
actual spending. I call this a lesser
Mark Zuckerberg for first place).
much the same way they affect
Sergey Brin (Stone, 2015) and Evan
problem because it results from
This piece was so preposterous,
anyone else. Readers can think
Spiegel (Carson, 2017).
an insufficient amount of data,
and so intentionally insulting to
whatever they want about
leading to wrong conclusions –
executives and to the protection
the ‘lifestyles of the rich and
which is an innocent mistake.
industry, that I felt I simply had to
famous’, but these people have
say a few things.
jobs, families and kids, and
The subject of corporate executive protection seems to have struck a certain chord with the
What I describe as a major
Perhaps the worst article I
to threats as they sit in their
general public in recent years and
problem is the not-so-innocent,
this, in my opinion as an industry
false claims about the protection
idea that there is something
like everyone else. Security
professional, is a great thing. But
industry and the executives
surreptitiously sinister about the
professionals are simply there
unfortunately, pretty much every
that employ it. It usually comes
high-level security that billionaire
one of the previously mentioned
down to security being depicted
executives receive. To a certain
articles (there are many more
as an ostentatious perk for
degree, I get it. With so many
require putting anyone else at
than those mentioned) has at least
corporate elitists, rather than
movies and TV shows spinning
risk. The best way to protect
securitysolutionsmagazine.com
082-085_SSM110 Professional Development.indd 83
First, I want to address the
they worry about them just
to keep them safe. 2. The security of clients does not
SECURITY SOLUTIONS // 83
13/10/2017 4:53 pm
PROFESSIONAL DEVELOPMENT clients is to ensure that the
else. Working in dark suits,
measures, and many resisted it as
claims about the industry and
entire area is safe and secure
maintaining a low profile or
long as they could.
the executives who make use
– for everyone. But what about
operating covertly does not
cases where someone wants
suddenly make an operator less
individuals become so important to
making it less likely that anyone
to harm the client? Well, there
of a good, moral person. You do
their organisations, and since they
from the industry would be
too, the best way to protect the
not hear me talk about this all
suffer from such elevated levels
willing to collaborate and share
client is either to avoid the area
that often, but values such as
of risk, they had to accept their
their knowledge.
altogether or to ensure that
sacrifice, honour and service
fate and employ quite formidable
There is no shame in not
the area is safe and secure for
are extremely important
protective measures. The irony in
knowing something. Everyone
everyone – including those who
to those in the protection
the above articles is that though
is ignorant about most things
want to do harm. On numerous
industry. And the fact of the
they try to hype up and inflate
there are to know in the world.
occasions, I have had to jump
matter is that mean-spirited or
the subject of security, the reality
The awareness of one’s absence
in between clients, or members
overly aggressive individuals
is that many executives receive a
of knowledge is what is known
of the organisation I was
simply do not fit into this type
level of protection that far exceeds
as Socratic Ignorance, and is the
protecting, and those who were
of environment.
what people read.
cornerstone of any honest attempt
However, since these
of it only deepens the divide –
trying to harm or otherwise
As for the executives who employ
harass them. Harming those
security professionals, many
things (even entertaining at times)
makes it all the more tragic when
who want to harm clients is
people tend to assume that these
comes from seeing the contrasts
media outlets claim to know more
an absolute last resort – and
individuals must live in a bubble
that exist within the lives of
than they do, insult those who do
an extremely rare one at that.
of security, or otherwise lead
many executives. For example,
have the knowledge and ensure
Physical harm to anyone almost
some kind of high-tech, James
some of these individuals will go
that they – and anyone they reach –
always leads to bad press and
Bond villain lifestyle. Hollywood
unprotected to their children’s
will remain in a state of ignorance.
damaged reputations, which
has definitely played its part in
school plays or to community
no one wants. The ultimate
perpetuating this notion, but
centre functions, but at other
important as this deserves to be
goal is to make sure that no
the funny thing about this hype
times be surrounded by advanced
better represented, and readers
one gets hurt on either side.
is that the reality (or at least
security technology and covert
who try to find out more about it
Many of the worst stalkers who
everything I have seen in over a
protection that exceeds what is
deserve to be better informed.
threaten and harass executives
decade) would both disappoint
seen in most Hollywood movies.
are people who suffer from
and completely blow your mind
If readers happen to find an irony
references, email admin@
mental health disorders. Police
at the same time. I say disappoint
or even a paradox in any of this,
interactivemediasolutions.com.
officers will advise that all it
only in reference to Hollywood’s
then welcome to the crazy world
au n
takes in many cases is to give
glamourised depictions. In reality,
we live in.
the person some attention
it is actually kind of reassuring
and sympathy, and I have
to discover that some of the most
been involved in cases where
famous and influential people on
security professionals resolve
the planet lead largely normal
very troubling situations with
lives. It may surprise many people
a long, friendly conversation.
to discover that multi-billionaires
In some cases, it is the security
– some of whom head the largest
professionals who help the
and most important Silicon Valley
person get back in touch
corporations – drop their kids off
with their mental health
at school in the morning, get their
professional, helping them to
coffee at Starbucks and go home to
get their lives back on track.
their families at the end of the day,
3. The overwhelming majority of operators in the protection
just like everyone else. And though there are those
One of the most interesting
VALUES SUCH AS SACRIFICE, HONOUR AND SERVICE ARE EXTREMELY IMPORTANT TO THOSE IN THE PROTECTION INDUSTRY. Much of what I try to do in
to gain more knowledge. This
An industry as interesting and
For a full list of
Ami Toben is the director of consulting, training and special operations for HighCom Security Services. He is one of the pioneer developers of the terrorist activity prevention, surveillance detection and covert protection fields in Silicon Valley. Trained in Israel, Japan and the US, Ami has over 15 years of military (IDF) and private sector security experience. Currently based in the San Francisco Bay Area, Ami has been providing special
industry are honest, moral
who do indeed enjoy basking
my writing is share, demystify
protective services to Fortune 500
people. Most operators are
in their fame and fortune, most
and better communicate what
corporations, foreign governments,
military veterans, former
executives I know prefer to
operators do in the private
foundations, political organisations
or current law enforcement
simply be left alone to live a quiet
security industry, so that non-
and wealthy individuals. Ami’s
officers, firefighters,
and normal a life. I can also tell
security professionals can better
new book, Surveillance Zone:
paramedics and former
readers that most of the CEOs that
understand it. Popular articles
The Hidden World of Corporate
government agents. They
are featured in the above articles
about executive security and close
Surveillance Detection Covert
have families and children
were extremely reluctant when
protection can be a great thing,
Special Operations, is available
and friends, just like everyone
it came to implementing security
but making purposely insulting
now from amazon.com
84 // SECURITY SOLUTIONS
082-085_SSM110 Professional Development.indd 84
securitysolutionsmagazine.com
13/10/2017 4:53 pm
For more information, please contact
Jeff Park on 0424 185 880
082-085_SSM110 Professional Development.indd 85
13/10/2017 4:53 pm
FEATURE
SECURITY & RISK MANAGEMENT: THE NEXT EVOLUTION – APPLYING THE MULTIPLEX VIEW TO RISK MANAGEMENT There is no doubt that the field
BY DR GAV SCHNEIDER
This article proposes that the
hard risks was often assigned to a
whereby hard-risk management
of security risk management has
need for security risk managers
senior manager due to the level of
activities are broken up into various
evolved to become a vocation
to become more rounded risk
accountability associated with it.
categories as organisations have
more so than a function and
practitioners is crucial and that
This has changed over time, and
grown and expanded, is now the
it is now widely recognised
a more holistic view to risk
in the current economic climate
common reality, not the exception.
as a specialist area requiring
management, referred to as the
less senior levels within the
Whilst in principle silos for large
extensive knowledge, skills and
multiplex view, is more critical
organisation have been charged
organisations are a necessity, when
experience by practitioners to
today than ever before.
with this responsibility, or it has
it comes to managing hard risk, the
been assigned as an additional
reality of issues such as duplication
succeed. Operational settings that, for example, include
Context
responsibility to an existing role.
of activities, denial of incidents and
such scopes as safety, security,
The harsh consequences of security
The core skills of a hard-risk
risk exposure, transfer of blame
emergency response and disaster
incidents resulting from crime
practitioner would commonly
and lack of authority all become
management invariably require
(internal and/or external), fraud
include appropriate skills,
potential issues. These issues are
an inherent level of technical
and terrorism, including death,
experience and expertise to:
highlighted in the various versions
expertise by the practitioner
business disruption, reputational
• identify the potential for
of workplace health and safety
to fully understand and thus
damage, fines and jail time, are
internal and external threats
legislation which, in most cases,
deal with the risks associated
ever-present realities for modern
and hazards leading to
does not differentiate between the
within these environments. As
business. The ability to subrogate
unwanted events
employees and subcontractors,
organisations grow, so have
and de-risk via insurances is no
a diverse range of organic
longer as robust as it once was
threats or hazards manifesting
levels of an organisation (low level
organisational and corporate
based on the evolution of non-
into incidents, as well as the
worker right up to senior executive).
structures. These structures have
payment clauses for regulatory
potential consequences that
The need to move away from the
become so diverse and range
non-compliance and other
may occur as a result
decades-old checklist-type hard-risk
from no direct allocation of safety,
complexities. The ability to de-risk
security, health and emergency
via subcontracting has now been
and mitigation systems to
by most organisations has reached
management (SSHE) activities
legislatively closed off and it is now
eliminate or reduce the
epidemic proportions.
to mass duplication. There is
well established legal precedent
likelihood of incidents occurring
the ongoing reality that no one
that all parties (top to bottom)
model can be applied across
involved in the supply chain are
reactive control plans which
The Need for a Different Approach
different sized organisations
responsible for the identification,
detail actions to be undertaken
The complex mapping, rating and
that are in different sectors,
mitigation and management of
to treat threats or hazards,
referencing systems that proliferate
operating in vastly different
foreseeable risk in a reasonably
prevent incidents, or respond
through the hard-risk management
risk environments. However, in
practicable manner.
should they occur
world have actually reached a point
many cases, organisations are
SSHE activities very often
• forecast the likelihood of such
• develop and apply management
• design, develop and apply
• monitor, review and update
and places the responsibility at all
management approaches utilised
where they are now no longer
suffering from wastage due to
include operating areas where
these forecasts, assessments,
practical tools for risk management,
duplication and inefficiency or
physical loss, including death,
plans and procedures on an
but merely academic routine and/
intolerably high-risk exposure
injury, asset loss and adverse
ongoing basis in response to
or just another additional non-
due to lack of resource allocation
environmental impact, occur.
events or reviews.
profit, non-performance enhancing
to hard-risk management. In
These are referred to as hard
Hard-risk practitioners quite
function that organisations ‘have to’
many cases, organisations are
risk, where outcomes can be
literally save lives as core functions
do. In addition, the neglect of hard-
exposed to both of these realities
measured and hopefully forecasted
of their roles and the positive
risk education for most of today’s
simultaneously, specifically if
so that elimination, preventative
impact of their contribution is
business leaders, who are often
they have become siloed based on
measures and/or mitigation can
often overlooked in the day-to-day
the product of academic education
size, specialisation, management
be achieved. The responsibility
operation of an organisation. The
which specialises in conventional
control or geographic complexity.
for the management of these
evolution of organisational siloing,
modelling ,has contributed to
86 // SECURITY SOLUTIONS
086-089_SSM110 Article 4.indd 86
securitysolutionsmagazine.com
13/10/2017 5:10 pm
two of the biggest issues facing
improving technology and people
and knowledge that is not
hard-risk managers to transcend
organisations from a hard-risk
management systems, some
tapped as a result of corporate
organisational and psychological
perspective today, namely denial
fundamental principles are missing
segregation and legacy, the
barriers to become generalist
and reactive approaches based
in the way management make
creation of internal ‘kingdoms’
practitioners is an evolutionary
on ignorance and negligence. It is
things happen. Unfortunately, all
and the biggest problem – lack
change in the way this complex
human nature to avoid systems
too often, senior executive teams
of internal cross-silo forums
area is handled. In this day and
that either do not show a direct
believe an issue has been resolved
and structures to leverage
age, employers demand more from
reward, have a consequence which
by creating and attempting to
capabilities and sharing.
practitioners and require multi-
is deemed harsh enough to force
enforce a policy which has no real
This often comes down to
skilled and capable professionals.
compliance or have an effective
chance of being embraced at ground
human resources based
Many hard-risk managers are
‘policing system’ in place to ensure
level and thus it becomes a purely
limitations tied back to key
happy in their specific vocational
compliance. One only has to look at
academic exercise in futility. In
performance indicators, which
area of expertise and, whilst their
traffic and road safety and imagine
fact, the organisation may make
sometimes create performance
portfolios may include other areas,
the carnage that would ensue
itself more vulnerable by having
measurements that are silo
tend to stay specialists within their
without a set of rules that had harsh
a policy but not adhering to it. A
specific and ignore the core
comfort zone.
enough consequences for non-
side effect of policy setting without
objectives of the organisations
compliance and no enforcement
effective implementation and take
on a macro level.
to apprehend offenders. This is
up results in the executive believing
not a unique issue to first world or
that hard risks are under control,
is important to know when
with respect to risk management.
emerging markets, but the focus of
middle managers being frustrated
external help is required and
A potential way to achieve this is to
hard-risk management based on
that there are insufficient resources
how it should be utilised. Not
adopt a multiplex view to the way
reactivity, sentiment and anecdotal
to implement and lower level never
only are external assessments
issues are diagnosed, rated and
behaviour seems to be the driver.
even being made aware of issues
considered to be more impartial,
managed. Even if evaluation tools
and or solutions.
but they bring fresh eyes to
such as the AS/NZ ISO 3100:2009
issues that may have been taken
Risk Management Guidelines and
for granted as being ‘just the
the numerous other risk matrices
cases, this stems from the following
Identified Areas of Opportunity
way it is’. The challenge is to act
are used, a multiplex view is often
core problems:
This reality is not new ground and
once solutions are identified
not applied. It should be noted that
• consistent viewing of hard-risk
many executives and managers live
and not be demotivated by what
while most tools and systems are
management as a grudge spend
with this ongoing problem. So, what
may appear to be a mountain
endorsed and approved, they should
area
can be done about these issues?
of issues with no clear start, end
be viewed as exactly that – tools and
Here is a brief list of actions and
and implementation approach.
enablers, not a ‘magic bullet’ for all
Limitations on the way risk is viewed continue to be a propagator for reactivity and denial. In many
• failure to apply proactive
• Leverage external resources – it
It would be fair to surmise that organisations want to improve their operational performance
budgets based on a dynamic
concepts, which could each be an
risk-based approach
article in their own right:
resource for mitigating risk
on these tools, they could be seen
• Educate at all levels –
is a ‘switched on’ staff and
as barriers to more comprehensive multi-dimensional approaches.
• lack of understanding of actual
• Invest in people – the biggest
that is wrong. Due to the reliance
versus perceived risk from a
understanding hard-risk
contractor base. People need
hard-risk perspective
management in context at all
to be motivated using both
levels of an organisation is
stick and carrot approaches
The Mulitplex View
critical as a starting point. One
in a balanced manner to gain
A multiplex approach involves
of the simplest ways to do this is
their buy-in, otherwise systems
viewing an organisation as a
get everyone talking the same
will fail and good-intentioned
multi-dimensional structure
hard-risk language and not
solutions will go nowhere.
and evolving methodologies to
get too caught up in a silo or
• Incorporate technology – it is
a broader paradigm aligned to
• inefficient use of internal resources • inefficient use of external expertise • lack of understanding of internal limitations • lack of alignment of hard-risk management understanding
specific jargon. • Assess and understand realities
important to find the balance
the organisation’s key objectives.
between human trust and
This will be illustrated and explained below.
at senior executive as well
in a dynamic way – people tend
having sufficient checks and
as lower levels (middle
to want to ignore bad news and
balances. The battle ground
management mayhem)
as such it is often hidden from
of the future is in cyberspace
2 level evaluation
the people that need to know
and organisations face ongoing
In a traditional risk management
until a crisis occurs. Regular
vulnerability in managing the
system, risk hazards and threats
• the human factor
health checks using internal and
hard-risk realities of data and
are often rated using tools such as
• the use of technology (in terms
external resources is critical for
Internet Protocol protection,
a 5x4 matrix focusing on the core
more robust decision making.
along with the physical safety
measurement tools of likelihood and
and wellbeing of their staff.
consequence, which may look like
These issues are further complicated by two realities:
of limitations or over-reliance) While there is no doubt that great strides have been made in
securitysolutionsmagazine.com
086-089_SSM110 Article 4.indd 87
• Leverage internal resources – often there is internal expertise
The requirement for risk and
the following:
SECURITY SOLUTIONS // 87
13/10/2017 5:10 pm
FEATURE
MATRIX
experts and gain trust and
Consequences
Likelihood
Minor
Moderate
Major
Extreme
Almost certain
Moderate
High
Extreme
Extreme
credibility within and without their organisations. 4. Know when to ask for help
Likely
Moderate
High
High
Extreme
Possible
Moderate
Moderate
High
High
help them achieve their goals.
Unlikely
Low
Moderate
Moderate
High
An unfortunate reality is that
Rare
Low
Low
Moderate
Moderate
when on the inside expertise
4 level evaluation A more detailed approach may add other variables such as exposure, which may look like this:
5 level evaluation Once variables such as legislative compliance, industry standards and organisational policy are superimposed, the diagram may look like this:
and use external consultants to
may be discounted and the only way to achieve real results is to de-risk by using external and credible resources. 5. Be flexible and adaptable and learn how to sell ideas
Target Attractiveness
Likelihood
Likelihood
Likelihood
in a collaborative and
Exposure
Target Attractiveness
Exposure Policy
Industry Standards Legislation
Consequences
Consequences
Consequences
well-structured way up the organisational tree. 6. Design solutions based on benefits such as cost saving, risk reduction and strive to apply attribute measurables to solutions. In most cases, good solutions are
6 level evaluation Then the requirements of understanding the organisation and people itself become issues. These include aspects such as organisational goals, history and culture. The diagram may then look like this:
management approach stem from
the product of all the above, with
striving to eliminate denial via
many other variables interwoven,
education and ongoing assessment
such as timing and personalities of
and implementing a proactive
the role players and stakeholders.
approach which requires more
The goal of all professionals
than just paperwork and lip
should be continuous
service. In essence, the driver
improvement of their own
should be a move to change,
levels of knowledge, skills and
improve and sustain an enhanced
experience, with the ultimate goal
level of security and safety
of adding value to the organisation
Exposure
culture. By aligning hard-risk
they work for. n
Policy
management to culture and
7 level evaluation The next level has to include some of the unfortunate realities which pose challenges to any solutions, such as resistance to change, limited budget and denial, which may make the diagram look like this:
Goals Goals History History
People & Culture
Target Attractiveness
Exposure Policy
Target Attractiveness
Likelihood
Likelihood
People & Culture
Industry Standards
Industry Standards
Legislation
Legislation
Consequences
Consequences
Budget Denial Resistance
When risk is being assessed
core organisational objectives,
For a full list of
it is truly possible to turn risk to
references, email info@
opportunity. To evolve to this level
interactivemediasolutions.com.au
of thinking, it is advised that hard-
Dr Gav Schneider is an
risk practitioners embrace some
acknowledged leader in the field
of the following:
of human-based risk management
1. Learn about the organisation
and the psychology of risk. He
of the cube look great, it does not
that they are working for and
is a leading academic in his field
and evaluated on this basis,
destabilise and cause discontinuity
its core strategic goals and
and heads up the postgraduate
solutions that may actually work,
on another side. Of course, there
keep that first and foremost as
Psychology of Risk Program at
be acceptable and gain budget and
is the band aid solution of taking
a fundamental of any activity
the Australian Catholic University
traction become closer to reality.
a sticker off and sticking it over
or solution they scope.
(ACU). Dr Gav is the CEO of the
However, the next paradigm
the piece that does fit, which may
2. Align methodology to existing
Risk 2 Solution group of companies,
of reality has to be taken into
work for a while, but it is back to
recognised tools and guidelines
which focus on delivering
account, which is the limitations
the same problem if the sticker
such as the AS/NZ 31000:
innovative and cutting-edge
of expressing any matrix in
peels off.
2009 Risk Management
solutions in the risk, intelligence,
Guidelines and apply the
safety, security, medical and
multiplex approach.
emergency response sectors.
two dimensions. Think of the organisation as a puzzle cube. The
Summary
goal is to ensure that by moving
In summary, the core ingredients
one piece, which makes one side
to implement a better security risk
88 // SECURITY SOLUTIONS
086-089_SSM110 Article 4.indd 88
3. Continue to educate themselves so that they become qualified
Visit www.risk2solution.com for more information.
securitysolutionsmagazine.com
13/10/2017 5:10 pm
KeyWatcher is a reliable and extremely easy to use electronic key management system, designed to prevent mismanaged, misplaced, or stolen keys. KeyWatcher eliminates outdated metal boxes, unreliable manual logs and messy key identification tags utilising a computerised storage cabinet. The system releases keys only to the individuals with correct authorisation, recording each user transaction and providing total system accountability.
KEYWATCHER SYSTEM OFFERS l Up to 14,400 keys and 10,000 user per site l “Site” concept uses a common database l Numerous high level interfaces for access control, contractor management and vehicle fleet systems l Longer user IDs can be up to any 6 digits, plus a 4 digit PIN l Bright 7” full colour, touch screen l “Key Anywhere” allows keys to be returned to any KeyWatcher Touch within a site l On-screen guides for users, along with voice commands
Available in Australia through: AST Pty Ltd T: +61 2 8020 5555 | M: +61 417 089 608 | F: +61 2 9624 7194 E: di@astpl.com.au | www.astpl.com.au
086-089_SSM110 Article 4.indd 89
13/10/2017 5:10 pm
SECURITY STUFF C O N T E N T S
SPOTLIGHT
PROFILE
SpotBox4K
102
Boon Edam
110
092
Dahua
094
Hikvision
104
Anixter, Bosch
110
Security Distributors Paxton 096
Dahua
105
Balga
111
Sting
106
Dahua
112
LSC Security
108
Leda
113
Uniview
108
ISCS, N.A.S.A.
Ring
109
090-091_SSM110 Security Stuff.indd 90
SHOP TALK
Boon Edam
90 // SECURITY SOLUTIONS
STid
PRODUCT SHOWCASES 098
113
securitysolutionsmagazine.com
13/10/2017 5:53 pm
securitysolutionsmagazine.com
090-091_SSM110 Security Stuff.indd 91
SECURITY SOLUTIONS // 91
13/10/2017 5:53 pm
SPOTLIGHT
BOON EDAM COMBINES BEAUTIFUL ENTRANCES WITH HIGH SECURITY FOR EXCLUSIVE RETAIL STORES A
rchitectural revolving doors that seamlessly blend beauty and class with high levels
of security are being introduced to Australasia by entrance security specialists Boon Edam, for high-end and exclusive retail stores and shop fitters. A custom-designed and manufactured Boon Edam Tourniket revolving door was recently installed at the iconic Fortnum and Mason building in St James, London – the same type that was used in Melbourne’s Rialto Towers regeneration project. Tailored features for Fortnum and Mason included an all handmade timber door, with power assisted drive and collapsible door-set, while tailored features for Rialto included an increased height of 5m, the tallest in the Southern Hemisphere, and custom-made Tournex dual motors to control the 1.3t doors. “The Tourniket model is readily available locally, and Boon Edam is always open to working on customising our doors to suit particular applications and needs,” says Boon Edam Australia Managing Director, Michael Fisher. “High-end and exclusive retail stores and shop fitters operate in a challenging environment where they have a strong need for a beautiful entrance and a similarly strong need for high levels of security,” he said. “Retail stores that can benefit
92 // SECURITY SOLUTIONS
092-097_SSM110 Product Spotlight.indd 92
Boon Edam’s custom designed revolving doors for Fortnum and Mason London, left – the same type that has been used locally on Melbourne’s Rialto Towers regeneration project where they installed the tallest doors in the Southern Hemisphere, standing 5m tall, right.
securitysolutionsmagazine.com
13/10/2017 5:46 pm
a height of 2300 mm under the
• Weatherproofing
regeneration project, where the
THE CUSTOM-MADE TOURNEX DUAL MOTORS HAD TO BE INSTALLED AT THE TOP AND BOTTOM TO CONTROL THE DOOR’S WINGS AND COMPLY WITH AUSTRALIAN SAFETY STANDARDS
5m high 1.3t doors provide a
and Mason, these added benefits
of staff, but has a smaller
striking focal point of the $100m
are a worthwhile bonus, but their
footprint and is ideally suited to
regeneration project for the Rialto
key focus is on getting the aesthetic
smaller operations.
building, managed by Built, to
‘just right.’ Boon Edam’s custom-
from custom-designed revolving
modernise the building and extend
made Tourniket featured bespoke,
door solutions include those that
it by wrapping new buildings
handmade timber and brass, power
Service and Maintenance
sell jewellery, watches, clothing,
around its base.
assisted drive, collapsible door-set,
Although revolving doors
glazed, curved walls, rubber safety
generally enjoy excellent energy
canopy. It features glazed curved walls to the underside of canopy with rubber safety buffers at the ends and wooden cross-detailing.
Rialto, Melbourne The same technology, customised for an entirely different application has already been proven in service in Melbourne’s Rialto Towers
accessories and other high-end
The custom-made Tournex
• Biometric readers • StereoVision 2 antipiggybacking technology • Attack resistance, from vandalism through to ballistic protection • Night locking The Tourlock 180+90 has a high throughput and can facilitate two-way secure traffic. The Circlelock handles lower volumes
fashion items as well as high-end
dual motors had to be installed
buffers and internal lighting in the
conservation and security
restaurants and cafes.”
at the top and bottom to control
canopy. The building’s architect
benefits, this can be further
the door’s wings and comply
even provided samples of the
extended by sensible maintenance
their project an additional element
with Australian safety standards,
timber and brass to ensure the
and upgrading where required.
of class, with security and energy
which specify that the door needs
door matched it perfectly,” said
benefits can also benefit from doors
to be able to stop instantly if an
Mr Fisher.
such as the Tourniket, which can
emergency sensor is triggered.
be easily integrated into existing
Boon Edam worked closely with
Full Security Suite
deliver benefits not only with
architecture or designed to specific
the project engineers to integrate
The Tourniket revolving door used
OEM equipment, but also wider
requirements.”
this dual motor system into the
by Fortnum and Mason and Rialto
brands that can be both improved
building’s existing infrastructure.
is just one of a complete security
in performance while also having
suite that Boon Edam supplies
their durability extended,” says
to Australia and New Zealand,
Mr Fisher.
For exclusive London-based
Benefits for the retail industry
ranging from security speed gates
In addition to its own specialist
retailer Fortnum and Mason, Boon
Benefits of revolving doors for
to revolving doors with increasing
staff, Boon Edam has joined forces
Edam designed an authentic and
exclusive retail stores extend
levels of security.
with door maintenance leaders
bespoke revolving door that was
beyond their sleek appearance and
entirely hand-made with mid-
added security. They also assist in
and Circlelock are the highest
manufacturer Auto Ingress Pty
dark stained oak timber, power-
maintaining a pleasant climate by
security doors in the range, for
Ltd in Australia, and with leading
assisted drive, and an additional
not allowing too much inside air to
applications like data centres,
New Zealand door installation and
collapsible function to allow for
escape, or outside air to enter each
cash centres, military or law
service company Commercial and
wheelchair access, emergency exit
time someone enters the store.
enforcement, where valuable
Industrial Doors.
“Shop fitters looking to give
Fortnum and Mason, London
use or for passing through with bulkier luggage. A revolving door was also the
Additionally, revolving doors like the Tourniket reduce the amount of debris, rubbish, dust,
“Our maintenance services – which are conducted to the global standards of Boon Edam – can
Boon Edam’s Tourlock 180+90
information, personnel or items are contained within the facility. Both of these products are ideal
and automatic sliding door
Boon Edam’s service and maintenance helps to keep the equipment compliant with
preferred option for overcoming
smoke or airborne particulates
for when you want to know that
Australian Standard AS:5007,
any inclement weather, as it
that end up inside the store,
only one person has entered your
which requires doors to be
decreases the amount of cold
which further helps to maintain
building at a given time, and that
inspected every three months.
air that enters their Fountain
a pleasant atmosphere inside –
person is exactly who they say they
Restaurant during use.
something of high importance to
are. The high security door ranges
Michael Fisher at michael.fisher@
exclusive retailers.
can be customised to individual
boonedam.com or visit www.
needs, with features such as:
boonedam.com.au n
The finished product has an internal diameter of 2400mm and
securitysolutionsmagazine.com
092-097_SSM110 Product Spotlight.indd 93
“For companies like Fortnum
For Further Information contact
SECURITY SOLUTIONS // 93
13/10/2017 5:46 pm
SPOTLIGHT
DAHUA DRONE X820 GUARANTEES PUBLIC SAFETY
s one classical
What is Industrylevel drone?
such as power tower inspection,
they can put real-time audio and
forest fire detection, public event
video streaming on the screen of
management, security supervision
a control center, thus providing
of drones, consumer-level and
over long bridges, detection
information for police or security
great now fly to ordinary peoples’
industry-level. Dahua Drones
aid for police forces, inspection
companies to solve the problem on
homes”. UAV (Unmanned Aviation
belong to the latter.
of high speed traffic and other
site, such as directing crowds for
illegal incidents. It means that a
evacuation via the correct route or
A
Chinese poem goes, “The swallows once in mansions of the
Vehicle), more commonly known as
There are in fact two levels
Consumer-level drones
drones, are just like those swallows:
are mainly designed for use
very different set of functions are
sending out a medical team to the
once only found in military
in aerial photography and
required for industry-level drones,
location where it is needed.
applications and war films, are now
personal shooting/ sharing for
including maintaining a high level
widely used in daily life. Military
entertainment. Naturally they
of stability and safety, intelligent
Application scenarios
UAVs now are vastly outnumbered
are pretty straightforward to
control, adaptability to different
Dahua Drones are easy to operate
by civilian UAVs, whose use is
operate and can take easily
applications and environment, long
and use in situations such as the
expanding to commercial, scientific
editable images/videos, often with
distance mapping abilities, carrying
following scenarios.
and even recreational realms. What
automatic beautification and other
capacity, and long battery life.
distinguishes a Dahua Drone from
entertainment functions.
other Civilian UAVs is the mission it
This contrasts with industry-
The current industry-level
Power Tower Inspections
drones boast the capacity to
Often located in mountainous areas,
is born with: to guarantee safety
level drones that are built for
transmit images at up to 10km, and
power towers are hard and risky to
from above.
serious public security mission
with access to multi-VMS platforms,
reach. Dahua Drones can enhance
94 // SECURITY SOLUTIONS
092-097_SSM110 Product Spotlight.indd 94
securitysolutionsmagazine.com
13/10/2017 5:46 pm
the efficiency while making it less
information collected is accessible
coverage for the entire marathon.
to resist the wind (up to Windspeed
labor-intensive.
to all mainstream VMS platforms. In
Each drone could take care of 6 km
7.0), and are fully capable of
short, it is a very powerful assistant
range by patrolling back and forth,
maintaining highly accurate
for the police.
staying still a few minutes at each of
suspension over the river and
the 6 patrol points 1 km apart to have
providing stable visual information.
Benefitting from x30 optical zooming ability, Dahua Drones can capture HD images at a long distance,
a good look at the situation under.
ordinary drones have encountered
Public Security Management
as a result of electromagnetic
At public events like concerts, sports
above ground to produce sufficient
Inspection of High Speed Traffic
interference from high-voltage
meetings and marathons, a Dahua
clarity to effectively identify mass
In daily patrols, when suddenly
power grids and visual mistakes
Drone can provide special security
casualty incidents such as stampedes
encountering the illegal behaviour
by people operating from afar.
surveillance from up high because
or a traffic accident.
of a driver, Dahua Drones can
The thermal camera they carry
of its multiple flying modes (circling
can accurately locate abnormally
around and tracking down the target),
of drones can also be applied to
and keep the record as evidence.
hot spots in cables and insulation
while its powerful camera can
scenarios such as music festivals,
Information about the car, the
terminals, thus preventing accidents
capture the whole picture as well as
open-air concerts and important
license plate and the driver will be
from occurring.
specific details and whilst benefiting
political rallies, which will not only
immediately identified after the
from its long 38 minute battery life.
help security companies to work
video is simultaneously transmitted
The beauty of a Dahua Drone
more efficiently but also provide
to the back-end. In another
evidence if illegal incidents occur.
scenario, if there is a traffic jam on a
thus avoiding the accidents that
These drones will be flying at 100m
Obviously similar deployment
capture the HD image of it from afar
Forest Fire Detection and Control
lies not only in its ability to work
Via the thermal camera it carries,
from afar but also its safety whilst
Dahua Drones can detect suspicious
flying. Having undergone all sorts of
Inspection of Bridges
happening, Dahua Drone can provide
hot spots invisible to naked eyes. At
extreme tests, this means when in
The construction of massive bridges
real time and first hand images/video
a height of 1500m, a Dahua Drone
use, a Dahua Drone will not disturb
requires inspection, which usually
for related department to decide.
covers an area of 5km², doing the
the crowd below at all.
takes lots of boats, equipment and
inspection work of dozens of people in just one flight. When there is a fire, Dahua
highway and nobody knows what is
In conclusion, Dahua Drones
experienced staff. Dahua Drones
can play a key role in various public
for example. There are thousands
can greatly simplify the process and
security scenarios. Dahua has caught
of participants and spectators
reduce the cost of money and time.
the latest technology trend and
Take New York City Marathon
Dahua Drones can fly all around
Drones can fly to the site against
spreading over a range of over 26
high temperatures and strong winds,
miles. It is quite a challenge to set up
the bridge, checking the erosion,
and Smarter Living. This is the future
transmitting relevant data to ground
an effective surveillance system for
damage and other damages, while
that Dahua Drones are helping
teams, so that they can make the
such a 1 day event. Dahua drone can
keeping a numbered record for
us towards.
right move using this information.
be very useful for such scenario. If
experts to analyze afterwards.
Once the fire has been extinguished,
properly deployed, 8 sets of model
Dahua Drone’s overhead inspection
820 drones can deliver very good
It’s worth adding that Dahua Drones boast an outstanding ability
adapted to enable a Safer Society
Visit http://www.dahuasecurity. com to learn more and follow us on Facebook and LinkedIn. n
can prevent a second fire. In this sense, Dahua Drone is one of the best aids to help fire fighters.
Detection for Police Arriving swiftly and secretly at crime scenes, Dahua Drones record real-time visual information about locations, traffic and personnel using its multifunctional camera, which is capable of optical zooming x30 (allowing the drone to work from a long distance where it won’t be noticed by criminals); thermal imaging (allowing the drone to work at night) and automatic recognition of faces or wanted cars. Using wireless transmission the
securitysolutionsmagazine.com
092-097_SSM110 Product Spotlight.indd 95
SECURITY SOLUTIONS // 95
13/10/2017 5:46 pm
SPOTLIGHT
INTEGRATING VIDEO WITH ACCESS CONTROL
T
he role of access
essential technologies, it makes
modular approach, thus enabling
alphanumeric data. This means
control is pivotal to
sense to integrate the solutions.
installers and integrators to offer
they use a minimal amount
the security of many
However, it appears that this occurs
bespoke solutions.
of bandwidth, and storage
applications.
less often that one might believe.
Furthermore, the proliferation of
In the vast majority of modern
Access control does much more
requirements are not significant.
than merely control access. Whilst
One benefit of this is the access
access installations in recent years
businesses and organisations,
the management of authorised
control systems can use distributed
speaks volumes about the
access control plays a pivotal role
users and visitors is a key
intelligence. This makes it possible
flexibility of the technology. In
in the overall security strategy.
consideration (and often the driving
for relevant data to be stored at
many applications, the system will
The technology delivers a wide
reason for which the technology
the door controller or the reader.
include video surveillance to
range of security and business
is specified), professional systems
If network connectivity is lost,
increase the level of protection on
related efficiencies, while enabling
can also offer a number of
the system can remain fully
offer. The benefits of video in a
users to enhance the level of
other benefits.
operational, and transactional data
security system are well
protection and safety at their sites.
understood by installers,
Professional access control systems
ideally suited to operation on a
server as and when connectivity
integrators, and end users alike.
offer a high degree of flexibility
network-based infrastructure.
is resumed.
Given the positive symbiotic
and scalability, with some of the
Access transactions generally
relationship between these two
market-leading options taking a
involve small amounts of
96 // SECURITY SOLUTIONS
092-097_SSM110 Product Spotlight.indd 96
Access control systems are
can be transferred back to the main
As well as controlling who can enter and exit a site or department,
securitysolutionsmagazine.com
13/10/2017 5:46 pm
access control systems can deliver
decisions nor apply reasoning
its customers whether the sites on
makes it a no-brainer in terms
additional benefits such as muster
when dealing with transactions.
which Net2 was installed included
of implementation.
reporting (an essential resource
If a current and authorised card
networked video surveillance.
should an evacuation of the site
issued to John Smith is used by
Where it did, they then asked
Making the link
be required), time and attendance
any other individual, the system
whether it had been integrated
As already mentioned, video
reporting, asset management, photo
will still grant access and record
with the access control. In the vast
integration is a standard feature
ID creation, concierge services and
that transaction.
majority of cases, it had not.
of Net2. It can also be accessed
so on. As such, a well-designed
Even where a violation is clear,
What was more interesting
in Net2 Lite, meaning even
access control system can deliver a
such as if the card is used by a
were the reasons given for
installations making use of the
variety of benefits for the customer.
female, a system that relies solely
the integration not being
basic software can enjoy the
on the access credential being
implemented. One common
benefits of video integration. It
and organisations have begun
present to grant access still will
answer was that the customer
is also worth noting that Net2 is
to include video surveillance as
not recognise that the transaction
had not requested it. It should
integrated with Milestone’s access
a part of their security overlay.
is fraudulent.
be noted that very few end-users
module for the XProtect series of
Video technology, on the other
have an in-depth understanding of
VMS products, so integration with
well documented and clearly
hand, is ideally suited to gathering
security technologies. Often, their
systems based on that platform are
understood by the vast majority
real-time information for the
skills base revolves around their
also straightforward.
of end-users. Video can be used
purpose of visual identification of
core business activity. For example,
both as a proactive and reactive
individuals, the analysis of events
a retailer will understand sales
very basic task involving the entry
tool, and can also deliver vital
and where smart technologies
and marketing, customer service,
of limited data into an extremely
evidence in the case of post-event
are deployed as well as detecting
merchandising, stock management
easy to use system. The process is
analysis. It can also act as a great
violations in expected behaviour.
and staff deployment. With
quick, simple and takes less than
enabler if operators or members of
What video does not provide, is
regards to technology, their skills
a minute. It allows video to be
staff need to assess a situation as
a log of transactional data which
are more likely to be focused on
associated with the access control
visual verification and confirmation
clearly identifies the presence
stock management systems, point
system, and the implementation is
of circumstances is a key part of
of individuals on a site or their
of sale devices and on-line retail
well within reach of any installer
effective decision-making.
movements. It also cannot
options. They rely on the installer
or integrator who is competent
implement a security procedure to
or integrator to offer the optimal
enough to install Net2.
A Perfect Combination?
ensure that only authorised persons
solution within the constraints of
Access control has its pros and
can enter and leave the site.
the available budget.
Increasingly, many businesses
The benefits of video are
cons, as does video surveillance.
Interestingly, the combination
The question of budget was
Adding a networked camera is a
In summary The integration of video
For example, an access system
of access control and video
also a significant factor giving
surveillance and access control
performs the tasks of managing
surveillance technology not only
rise to the second most common
enhances the potential of both
transactions as well as logging
eliminates the weaker attributes
reason for not integrating video
technologies, and delivers a
and reporting these transactions
of each system, but combine to
into access control which was that
solution that adds value for the
very effectively. An access control
elevate a security system above
customers often believed that the
end-user. Integrating network-
system can implement actions
and beyond what would normally
integration of access control and
based video with Paxton’s Net2
based upon real-time data using
be expected from the various
video surveillance was going to be
access control system is simple
a variety of criteria. This can
elements of the solution. It
too costly. This was a surprising
and quick, and the ability to
include occupancy information,
therefore makes great sense for the
response given that, in the case of
manage video standard within
the authority of staff currently on
two to be integrated. Yet, again, all
Net2, the product around which
the software.
site, activities based on schedules,
too often this is not the occurring!
people were being interviewed,
behaviour-based movement and so
Research carried out by Paxton
Installers and integrators
integration with video was offered
looking to deliver value-added
on. The downside of access control
Access, a global name in access
as standard and not an additional
bespoke solutions should ensure
is that in the majority of systems,
control and door systems, with
cost. The only costs associated
that they take advantage of this
the presence of an authorised
30 years’ industry experience,
with the implementation of any
option. It costs nothing, takes
credential (be that a code, card or
highlighted that many installations
integration relate to installation
minutes but enhances the installed
token) is all that is required to gain
based on their market-leading Net2
time. However, the integration is
system substantially.
entry. Lost, stolen or ‘borrowed’
access control platform had not
very simple and fast to implement.
credentials will be accepted until
been integrated with on-site video
they are revoked. An access control system cannot make user-based
securitysolutionsmagazine.com
092-097_SSM110 Product Spotlight.indd 97
For more information visit www.
Indeed, the ease with
securitydistributors.com.au or call
surveillance. The access control
which network-based video
Security Distributors Australia Pty
manufacturer asked a number of
surveillance can be added to Net2
Ltd on 1300 882 101 n
SECURITY SOLUTIONS // 97
13/10/2017 5:46 pm
PROFILE
SMARTPHONE-BASED MOBILE ACCESS CONTROL SELECTING THE RIGHT MANAGEMENT AND CONFIGURATION TOOLS
L P
American technology research
98 // SECURITY SOLUTIONS
098-101_SSM110 Profiles.indd 98
virtualization solution that requires
2017, the STid Mobile ID® badge
no compromises to the philosophy
three years’ time, more than
virtualization solution has been
undergirding your organization’s
20% of organizations will use
highly successful. How do you
security policy.
smartphones instead of physical
explain this success?
access cards. Mobile access control
Vincent Dupart, CEO of STid
Since its launch in early
firm Gartner predicts that in
Our solution is extremely user
Why would you outsource your data to a third party?
is not just about a more user-
friendly, with a range of different
Where is the data stored? Are
friendly way of opening doors. The
identification methods available
you independent in managing
connectivity of smartphones opens
– you can just tap your phone, or
your security? No technical or
the way to new real-time solutions
lightly touch the access control
technological constraints should
for managing mobile identity.
reader to identify yourself. STid
prevent Directors of Security
Vincent Dupart, CEO of STid, a
Mobile ID® has been specially
from managing their systems
French firm that develops secure
designed to make access control
independently, with the freedom
access control solutions, tells us
easy. You no longer need to take
to host sensitive data in-house if
why the right management tools
your smartphone out of your
that’s what they want… We offer
are required to roll out this type
pocket or bag to identify yourself.
our clients an Offline management
of solution.
Beyond this, we have chosen a
tool, which keeps them in control of
securitysolutionsmagazine.com
13/10/2017 5:46 pm
NEW UniGuard+Real Time Guard Duress
RFID NFC
Half Page Ad Long Range
Supports Bluetooth long range beacons
CALL FOR A FREE INFO PACK 1300 133366 Locally supported by DelTonic Pty Ltd – Po Box 359 Plumpton NSW 2761 – ABN 69 108 465 550 Phone 1300 133366 Email Sales@uniguard.com.au – Web: www.UniGuard.com.au
Half
098-101_SSM110 Profiles.indd 99
Follow us on Twitter Page Ad twitter.com/secsolutionsmag
13/10/2017 5:47 pm
V T
PROFILE their security. That’s a key issue in
meaning you can quickly create a
our line of work!
short-term visitor access card, and
Can you tell us a bit more about
later recover the credits to create
the Online management platform
another virtual access card. It’s so
that you have officially launched at
cheap and easy to use!
the APS Show in September? Innovation is the cornerstone of STid’s strategy. We’ve continued to work to develop a secure Web
How does this platform meet clients’ aspirations to manage their systems independently? Unlike many solutions on
platform which will revolutionize
the market and most people’s
the way we manage user virtual
preconceptions about cloud
access cards and configure readers!
technology, STid is not looking
Access rights can be assigned,
to tie its clients into a particular
revoked and updated in real time,
technology. Independence operates at many different levels! First and foremost, we have always wanted to respect our clients’ value chain. Anyone will be able to create an account and associate accounts for their own clients (dealers and end customers), without any involvement on our part. STid has no access to sensitive
ID® solution make access control
administrator, user, etc. Data can
data in the dealer and end customer
instinctive. How is this user
then be shared, enabling multiple
accounts – that would be a major
experience carried across to your
client employees to work on the
security vulnerability. Our clients
Web platform?
platform in real time.
will remain totally independent in managing their security.
Our two priorities are security
Data entry times are reduced
and user-friendliness. The STid
by an easy upload function for
Mobile ID® Web platform will be
your existing databases (variable
easier to use than conventional
and fixed data, photos, logos, etc.),
tools, making it quicker to access
which will boost the performance
ever-more mobile world, with a
data, which is all centralized on a
of your access solution.
continually increasing threat of
single platform.
How do you secure the data stored in your Web platform? Today’s businesses work in an
cyberattacks. Security is a major challenge. In addition to the
Different levels of rights can be assigned to each account -
More information on www.stid. com - info@stid.com - +33 4 42 12 60 60 n
security benefits of the client’s independence in management, all data is stored in our server in France, in accordance with the tightest data protection regulations issued by CNIL (the French data protection authority). The information is stored in encrypted formats and all server connections use the secure https protocol. The virtual access cards are managed in real time so if an employee reports the loss of a smartphone, the mobile access rights can immediately be revoked, before the device ends up in the wrong hands. The different identification methods of your STid Mobile
100 // SECURITY SOLUTIONS
098-101_SSM110 Profiles.indd 100
securitysolutionsmagazine.com
13/10/2017 5:47 pm
VIDEO DOESN’T HAVE TO BE EXPENSIVE TO BE EFFECTIVE
With years of experience across hundreds of clients, let us show you how we can help you generate more business than ever before. enquiries@interactivemediasolutions.com.au
098-101_SSM110 Profiles.indd 101
13/10/2017 5:47 pm
PRODUCT SHOWCASES
SPOTBOX4K The SpotBox4K is a 4K ONVIF IP Camera, multi view decoder box which allows users to programme and view up to 32 network IP cameras in multiple/varied viewing modes in resolutions up to 4K in video quality. Developed by Antrica – a UK company who specialise in video encoders and decoders, SpotBox4K is an exciting new offering to the CCTV market, and was recently launched at ‘Security Expo 2017’ in Sydney with an overwhelmingly positive response. The box appears to claim an apparent gap in the existing market for users who
102 // SECURITY SOLUTIONS
102-109_SSM110 Product Showcase.indd 102
want to ‘view’ existing IP cameras without affecting the existing CCTV infrastructure (replacing the older ‘Spot Monitor’ type product). The box connects to a monitor with a HDMI cable and is controlled with a simple to use IR remote control. Users can programme up to 32 IP cameras into the configuration tool – which displays cameras in a range of tile configuration modes including 1 x 1, 2 x 2 , 3 x 3 and 4 x 4. The box harnesses both H.264 and H.265 decode capabilities and can decode and display a full 8MP / 4K camera in full screen mode. The SpotBox4K replaces the
requirement for VMS software or PC-based viewing applications and makes easy work of decoding multiple cameras simultaneously. Not only is it a more powerful, easy to use solution, it is also lower priced, thereby saving both hassle and money! The SpotBox4K can be used in a wide variety of applications including but not limited to: • Reception Desk Overview Of CCTV / Meeting Room Cameras • Control Room Video Wall – A low cost way of creating a video wall • Remote CCTV Viewing Station
– Pop up emergency Control Centres, etc. • Live Event Broadcast / Viewing – View a Live Company Broadcast / Messages • Digital Signage – SpotBox4K can display various video feeds • Shop Theft Deterrent -– The 4K decode capability enables facial recognition more accurately • Live Video In Transport – e.g. Train drivers can view ‘door cameras’ in higher quality than before. For further information, visit www.spotbox4k.com or email sales@antrica.com n
securitysolutionsmagazine.com
13/10/2017 6:47 pm
dorm
When a high level of security is essential, dormakaba turnstiles and full-height gates provide the ideal solution. The robust turnstiles and full-height gates are especially suitable for securing the perimeter of buildings and property.
Secure your perimeters
Benefits include versatality in design, safe passage, minimal power consumption and lasting quality for any indoor or outdoor installation. For the complete range of smart and secure access solutions, contact dormakaba. 1800 675 411 www.dormakaba.com.au
dormakaba_TURNSTILES_210mm x 275mm_0117_SS#106.indd 1 102-109_SSM110 Product Showcase.indd 103
25/01/2017 10:05:51 AMam 17/10/2017 10:27
PRODUCT SHOWCASES
Hikvision DeepinMind Network Video Recorder (NVR) Hikvision, a global leader in the feild of video surveillance products and solutions, has launched its ‘DeepinMind Network Video Recorder (NVR)’ — the world’s first embedded NVR benefiting from ‘Deep Learning’ functionality. This intelligent NVR effectively ‘learns’ to identify people captured by video surveillance cameras. The NVR will also learn to filter out false alarms that would have previously been triggered by non-threatening moving objects. This new 32-channel iDS-9632NXII8/16S NVR will be the first in Hikvision’s new range of DeepinMind products. Hikvision is taking the ‘Deep Learning’ concept and applying it to the security industry, yielding a series of completely new products. Imitating human beings’ synaptic learning and memory processes, the DeepinMind Series NVR incorporates advanced algorithms to achieve
104 // SECURITY SOLUTIONS
102-109_SSM110 Product Showcase.indd 104
astonishingly accurate and consistent Video Content Analytics (VCA) performance. The launch of the innovative iDS-9632NXI-I8/16S NVR is on track to establish remarkable new levels of alarm-activated monitoring. False alarms triggered by animals, leaves, shadows, changes in lighting, and other insignificant objects regularly plague security personnel, costing many man-hours and monetary resources. With its ability to detect human bodies, the iDS-9632NXI-I8/16S NVR effectively filters out such false alarms. The DeepinMind NVR identifies and triggers human activity with an unprecedented accuracy — exceeding 90%. Its high-speed Graphics Processing Unit (GPU) performs accelerated computing while Deep Learning algorithms improve accuracy against current NVR models that still rely on conventional CPUs. Moreover,
these features enable authorised users to search recorded footage and find targets far more quickly than with a traditional NVR. The iDS-9632NXI-I8/16S DeepinMind embedded NVR can simply substitute an existing DVR or NVR, introducing intelligent learning previously unavailable with traditional surveillance systems in just one step. Such an upgrade enhances conventional video surveillance performance for markedly more efficient security. The DeepinMind embedded NVR also features up to 32 channels of video input for IP cameras (up to 12 MP), HD video output and decoding, hard drive hot-swapping, RAID (0, 1, 5, 6, and 10) configurations for up to eight 8-TB HDDs, and dual-NICs. For more information, please visit us at www. hikvision.com. n
securitysolutionsmagazine.com
13/10/2017 6:47 pm
F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry
instagram.com/securitysolutionsmag
Dahua NVR6-4KS2 Range Integrated with D-DECT IP Detectors and Clarius Plus IP Illuminators
DAHUA AND GJD PARTNERSHIP DELIVERS ADVANCED, HIGHLY RELIABLE DETECTOR-ACTIVATED SURVEILLANCE
Dahua Technology’s network video recorders (NVRs) now have a direct integration with IP-based outdoor detectors from GJD Manufacturing Limited. This integration provides users with high-quality and reliable detectoractivated surveillance and monitoring. D-TECT IP detectors and Clarius PLUS IP illuminators have been integrated with Dahua’s NVR6-4KS2 range, an enterpriselevel NVR providing up to 4K resolution. Its open architecture supports multi-user access and it is compatible with ONVIF 2.4, enabling interoperability when combined with third-party 4K cameras.
securitysolutionsmagazine.com
102-109_SSM110 Product Showcase.indd 105
The NVR includes intelligent video analytics to detect people and moving objects, as well as other predetermined events, such as abandoned or missing objects, tripwire detection, people counting and facial detection. The integration was achieved by incorporating GJD’s API on a special firmware that enables the NVR to accept alarms from the detectors and link them to the recorder’s functions. The BS8418-compliant IP detectors are suitable for intruder monitoring, CCTV surveillance and other alarm warning requirements, providing
both volumetric and long-range narrow field-of-view sensing, plus remote programming. To provide increasingly advanced products and solutions to its customers globally, Dahua is continuously investing in R&D and cooperation with world-class partners. With a mission of “Enabling a Safer Society and Smarter Living”, Dahua will continue to focus on “Innovation, Quality, and Service” to serve partners and customers around the world. Visit www.dahuasecurity.com to learn more and follow us on Facebook and LinkedIn. n
SECURITY SOLUTIONS // 105
13/10/2017 6:47 pm
PRODUCT SHOWCASES
STING LONG-LIFE RECHARGABLE GPS TRACKER
The Sting is an ultra-compact, rechargeable GPS tracking device featuring light, temperature and humidity sensors which set it apart from other batterypowered trackers. It has been designed to track high value parcels, cargo, cash in transit, personnel, and other assets where super-long battery life is required without sacrificing the frequency of updates and performance. The rechargeable, high capacity Lithium Polymer battery pack allows the Sting to
106 // SECURITY SOLUTIONS
102-109_SSM110 Product Showcase.indd 106
be recharged and redeployed, extending the product life. Utilising the latest technology, the Sting can operate in ultra-low power modes. With an incredible battery life of up to 18 months on a charge, the Sting can be attached to assets and tracked without needing to charge the battery regularly. The Sting has builtin antennas for GPS reception and cellular communication, a 3D accelerometer, a highperformance GPS that can track both GPS and GLONASS satellites simultaneously and
flash memory for storing nonvolatile information. The light sensor is designed to work as a tamper detector for cargo applications. If a parcel or container is opened, the Sting can detect the light change, wake up and report the tamper. The temperature and humidity sensor allows spoilable cargo to be tracked. The Sting is available in different versions to cater for different networks around the globe. Enquire with Digital Matter as to availability in your country.
The Sting uses a 2500mAh 3.7V Lithium Polymer battery pack. It can be recharged with the included USB micro cable. • Light Sensor for Tamper Detection • Temperature and Humidity Sensors • Rechargable internal battery for long-life • Small, compact and easy to conceal • Recovery mode. For more information, visit Digital Matter +61 8 6280 1217 or visit www.digitalmatter.com n
securitysolutionsmagazine.com
13/10/2017 6:47 pm
FOLLOW US ON INSTAGRAM instagram.com/securitysolutionsmag
102-109_SSM110 Product Showcase.indd 107
13/10/2017 6:47 pm
PRODUCT SHOWCASES
LSC Security Supplies has announced a new partnership with Sydney based manufacturer, Direct Cable Supplies (DCS). This partnership is the latest in a string of new distributorships for LSC, including well-known brands such as HID Global, Dahua Technology and AMC. “Despite our extensive range of over 20,000 product lines, a quality cable brand has long been
the Achilles’ heel of our electronic security offering” said David Cooper, Product Manager at LSC. “I’m pleased to say that our new partnership with DCS means this is no longer the case”. When asked why LSC chose to partner with DCS Cooper replied; “DCS is an ACMA licensed and accredited cable manufacturing company, so installers can buy with confidence knowing that
UNIVIEW MOTORISED EYEBALL INTRODUCTORY OFFER
LSC SECURITY SUPPLIES PARTNERS WITH DCS CABLES
their cable is compliant with the Australian telecommunications cabling standards,” said Cooper. “In addition to its solid copper construction the 305m boxed Security and Data cable products include their new EZITAG feature – which allows installers to quickly and easily pre-mark their cable by simply circling the relevant location. Add that to the end of reel meter marking feature and
The IPC3634ER3-DPZ28 is the new released model of outdoor Motorised Vari-Focal IR Eyeball network camera that can be widely used in many applications. Uniview patented ISP technology helps to reach high image quality but with less bitrate. It produces exceptional 4-megapixel high resolution video images with latest H.265 compression technology. It supports 120dB WDR which ensures clear image with rich details when confronting with sharp lighting contrast. The eyeball camera used IR anti-reflection glass. The black anti-reflection material can also improve 8% IR transmission. Moreover, it applies smart IR to detect brightness of view and adjust a suitable IR light compensation. It supports IP67 with 100% leak test before shipment. It embedded with H.265, U-Code and multiple smart functions. H.265 compression can reduce up to 50% bandwidth but keep high image quality. U-code is an enhanced encoding technology released by Uniview. It can reduce up to 95% bandwidth while no details missing. Smart functions in this eyeball are face detection, intrusion, crossing line, people
108 // SECURITY SOLUTIONS
102-109_SSM110 Product Showcase.indd 108
you have a pretty innovative Cable.” said Cooper. A wide range of 4 Core, 6 Core, Figure 8, CAT5E, CAT6 and specialty security cables are now in stock and available to purchase from the LSC Security Supplies website or at one of their five branches. Distributor: LSC Security Supplies Contact: 1300 646 269 Website: www.lscsecuritysupplies. com.au n
counting, audio exception detection, defocus detection, scene change detection. This eyeball camera has built-in microphone for audio input, hence customer doesn’t need to install an individual audio pickup device. By using up to 128GB SD card for edge storage, it can prevent unpredictable network connection breaks. The motorized lens can save installation cost. And the 3-Axis can provide a wide adjustable view. Key features: • 4MP H.265 Compression • 2.7~12mm Motorised lens (Smart Focus) • 120dB Wide Dynamic Range • Triple Stream • Micro SD Card (up to 128GB) • Built-in Microphone • IR distance up to 30M • Long range POE (up to 250m) • Smart Features • Behaviour detection • Corridor mode • IP67 rated To see how SecuSafe can help you with Uniview Products, Call 02-9649 4477 or Visit http:// www.secusafe.com.au, Email: sales@secusafe. com.au n
securitysolutionsmagazine.com
13/10/2017 6:47 pm
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmagazine.biz/newsletter
The Next Generation of Video Doorbells from Ring RING VIDEO DOORBELL 2
Watch over your home in crystal-clear 1080HD video, and see, hear and speak to visitors from anywhere. With instant mobile alerts and two-way talk, you can answer the door from your smartphone, tablet and PC. • Instant mobile alerts • 1080HD wide-angle video • Built-in microphone and speakers Monitor Your Home from Anywhere Ring lets you adjust your motion sensors so you can find the ideal setting for your home. You’ll get instant alerts when motion is detected, allowing you to protect your property from the comfort of your smartphone.
securitysolutionsmagazine.com
102-109_SSM110 Product Showcase.indd 109
• Adjustable motion sensors • Infrared night vision • Live View on-demand video and audio Smart Security for Every Home Video Doorbell 2 works on any home and includes a quickrelease rechargeable battery, so you can charge your Doorbell without removing the device. Get two battery packs, and you’ll never worry about power. • Hardwired or batterypowered • Includes one rechargeable battery pack • iOS, Android, Mac and Windows 10 compatible For more information visit www. ring.com n
SECURITY SOLUTIONS // 109
13/10/2017 6:47 pm
STOPTALK Global Architectural and Security Door Specialist Boon Edam Appoints New National Service and Installation Manager Global architectural revolving door and entrance security specialist Boon Edam has appointed Mr Jason Gauci as its new National Service and Installation Manager, to strengthen its installation and maintenance team and enhance its OEM service offering in Australia. Mr Gauci has worked in the revolving door and security access industry for almost 20 years, and has worked with Boon Edam products for the last 15 years, giving him an extensive knowledge of the full security suite, including revolving doors, security doors and portals, speed gates, tripod turnstiles, access gates and full height turnstiles. His product knowledge and industry expertise has made him a valuable member of the Australian team.
Operating in 27 countries, Boon Edam is a global supplier to some of the world’s biggest companies and multinational groups, as well as public and private agencies. Boon Edam’s global clients include dozens of fortune 500 companies. “The Boon Edam brand is known globally for quality and reliability and I’m looking forward to contributing to maintaining Boon Edam’s reputation as a national leader in revolving doors and security access technologies here in Australia,” said Mr Gauci. “Boon Edam is a dedicated and customer-focused company, and that ‘family environment’ is something I’d like to continue to develop in our service and installation team,” he said. “It’s really rewarding to be given this new role and new responsibility within the
company. I’d like to pass on my product knowledge when training new technicians, so that they’re thoroughly familiar with the intricacies of each product. I also have some process improvement strategies to streamline the installation and servicing process, as well as plans for continuous selfimprovement as I further develop in the new role.” Managing Director of Boon Edam Australia, Mr Michael Fisher, says the appointment is a further step in expanding Boon Edam’s service offering nation-wide. “Jason is ideally suited to this role. His expertise and knowledge of Boon Edam products is first class, and he develops positive and lasting relationships with our valued customers, which reflects Boon Edam’s strong customer-focused values,” said Mr Fisher.
Mr Gauci will report directly to National Technical Manager, Mr John Powell, who is responsible for overseeing all service and maintenance operations nation-wide. For further information contact Michael Fisher at michael.fisher@boonedam.com or visit www.boonedam.com.au n
ANIXTER TO DISTRIBUTE BOSCH SECURITY VIDEO SYSTEMS PRODUCTS IN AUSTRALIA GLOBAL RELATIONSHIP STRENGTHENED BY LOCAL PARTNERSHIP Bosch is pleased to announce that effective immediately, Anixter Australia Pty Ltd will be distributing the Bosch Security Video Systems product range in Australia. They will also offer the G Series integrated security alarm panel. This local partnership agreement strengthens the global relationship already shared by Bosch and Anixter. Anixter has been distributing Bosch products overseas for more than 18 years. Together, Bosch and Anixter manufacture and resell high quality security and communications solutions around the world. This enables dealers and integrators to purchase Bosch products at the right place and time, driving efficiency and effectiveness for their businesses. This local strategic alliance means Bosch Video and integrated IP solutions, including the new IP camera range, will
110 // SECURITY SOLUTIONS
110-114_SSM110 Shop Talk.indd 110
now be available to the network of integrators, end-users and contractors that Anixter services. With national coverage and distribution centres in Sydney, Melbourne, Brisbane and Perth, and a focus on technical competence and service, Anixter is well resourced to provide expert support for the complete Bosch Video Security product range. All Anixter local staff have undertaken Bosch product training in preparation for the partnership commencement. According to Mr Raj Singh, Regional Vice President - South Pacific, Anixter Australia Pty Ltd, “The addition of Bosch Security Video Systems to our Australian product portfolio better aligns our relationship on a global scale, allowing us to replicate the advantages of partnership that we already enjoy elsewhere in the world and provides significant
value to our customers. The Bosch video surveillance range and the G Series panel perfectly complements Anixter’s end-toend solutions, simplifying the sourcing process for dealers and integrators throughout Australia who are seeking best-in-class systems for their client”. Chris Dellenty, General Manager - Oceania, Bosch Security Systems Pty Ltd stated that “Anixter and Bosch have built a very strong partnership in Europe and North America, and we are delighted to have the opportunity to replicate this in Australia. The partnership with Anixter is in line with our strategy to make our products available through more channels by teaming with a high end solutions-driven provider.” For more information email: katarina.bailey@au.bosch.com or visit www.boschsecurity.com.au n
securitysolutionsmagazine.com
13/10/2017 6:54 pm
L I K E U S O N FA C E B O O K For the latest news, products and events in the security industry
facebook.com/ssmaust
WESTERN AUSTRALIA’S LEISUREPARK BALGA IMPROVES ACCESS FOR ALL
A refurbishment to a popular leisure facility in the City of Stirling including state of the art ‘speedgates’ has improved accessibility for the facility’s less mobile patrons, enhanced customer service and boosted efficiency through automation. Leisurepark – Balga is a community leisure facility in Western Australia. It receives around 320,000 visits annually, and has meeting rooms, sports courts, a gym and swimming pools. Facility Manager Luke Ellis said Leisurepark had wanted to enhance accessibility for people with reduced mobility and improve the customer experience. EasyGate SG speedgates from Centaman Entrance Control were chosen for this purpose.
securitysolutionsmagazine.com
110-114_SSM110 Shop Talk.indd 111
The new speedgates are wide enough to accommodate wheelchairs, mobility frames, and extra-wide buggies. The facility experiences higher visitor numbers at certain times of the day, and the gates are sandblasted with entry and exit symbols to improve wayfinding. “We’re finding the speed of access has greatly improved. With the new speedgates, it’s very clear what is an entry or exit”, said Mr Ellis. “Previously, people had to push open a gate or go through turnstiles with rotating arms. That led to some compromises. You’d get people with prams who had to hold the gate open to the side, and also young children attempting to duck under or get around the turnstiles. The
new gates work hands-free, so that doesn’t happen anymore.” The facility has separate entrances for the pools and fitness centre. Each gate is now equipped with a scanner so swimming pool and fitness centre members can enter with an access card. In case of a fire alarm or other emergencies, an automated panel is programmed to open the speedgates so visitors can exit easily. Mr Ellis said other efficiencies arise from the turnstile’s ability to connect with Leisurepark – Balga’s facility management software. The software now receives data from the gates to inform business reporting, and staff can operate the gates from the front desk if necessary. The primary motivation for installing the speedgates at the
facility was to reduce operating costs and improve the visitor experience by allowing customers to self-manage their own entry and exit to the facility. This also meant staff could focus on good customer service rather than ‘transacting’ with people, Mr Ellis said. “From my perspective, the best thing about effective entrance control is that I don’t have to worry about or think about it. We are not having to assist customers who have issues with getting in, they are finding it easy and it’s very intuitive. The new turnstiles allow us to direct resources to the right place to get the best bang for our buck.” For more information, contact Michael Bystram at michael@ entrancecontrol.com.au n
SECURITY SOLUTIONS // 111
13/10/2017 6:54 pm
STOPTALK
Dahua Makes the 2017 Forbes Asia’s Fab 50
Dahua Technology, a leading solution provider in the global video surveillance industry, Was recently named in the prestigious 2017 Forbes Asia’s Fab 50. The Forbes 13th annual Fab 50 list, comprising the best big publicly traded companies according to Forbes, honors corporate stars throughout the Asia-Pacific region. This year, China is grabbing most of the spotlight, with 29 of the 50 companies headquartered on the mainland, represented by the two most valuable companies on the list: Alibaba and Tencent Holdings. Dahua is one of 11 Chinese newcomers to the Fab 50, reflecting the country’s deep pool of entrepreneurial talent. The list is drawn from around
112 // SECURITY SOLUTIONS
110-114_SSM110 Shop Talk.indd 112
1,694 publicly traded companies whose reported annual revenue must reach at least US$1.8 billion. According to the Dahua 2016 Financial Report, Dahua accomplished a yearly gross revenue of US$1.93 Billion, representing a Year-On-Year (YOY) growth of 32.26%. Since its IPO in the Shenzhen Stock Exchange in 2008, Dahua has attained continuous growth over the last decade. Its 2017 H1 Financial Report shows that the company has achieved a YOY growth of 50.81% in terms of gross revenue in the reporting period. 3 Reasons Why Dahua Made the 2017 Forbes Asia’s Fab 50 1. Innovative Technology Since 2014, Dahua has invested approximately 10% of its annual sales revenue into research and development, 10.67% in 2017 H1 according to the Dahua 2017 H1 Financial Report. The company has four research institutes – Advanced Technology Institute, Big Data Institute, Chip Institute and Video Cloud Institute – and more than 5,000 R&D engineers and technical staff working on cutting-edge
technologies. In 2017 alone, Dahua has released numerous new products including the HDCVI-4K product line, ePoE systems, Seaport Solution, and Smart City Solutions. 2. Reliable Quality Quality has always been Dahua’s main focus. A national lean six sigma award in 2015, Hangzhou Best QC Organization as well as Asia Quality Innovation Excellent Project in 2016 are just a few examples of Dahua’s commitment to quality. In June 2017, Dahua partnered with Synopsys (Nasdaq: SNPS) to enhance the security of its Internet of Things (IoT) devices. Later this year, the Dahua Intelligent (IoT) Industrial Park will be opened in Hangzhou’s Fuyang District. 3. End-to-end Service Dahua places specific emphasis on providing the highest level of service to its customers and partners. In 2017, this has involved focusing on the development of locally based customer service centres in each of the regions Dahua services. In addition to the establishment of service centres which mainly provide after-sales services,
more and more subsidiaries and international academies have been opened in different regions of the world. In 2017 alone, Dahua opened subsidiaries in Russia, India and Bulgaria. Two Dahua International Academy training sessions were held in Poland and Iberia, attracting extensive attention from Dahua customers and partners worldwide. Dahua has also been cooperating with worldrenowned third party software platforms such as Milestone, Genetec, Axxon and Angelcam to extend the application scope of its products and solutions, giving its customers more utilisation opportunities. As the only video surveillance company listed in the Forbes 2017 Fab 50, Dahua is extremely pleased to be included in this highly prestigious list of blue chip companies. With its mission to “Enable a safer society and smarter living”, Dahua will continue to focus on “Innovation, Quality and Service” to serve partners and customers around the world. Visit http://www. dahuasecurity.com to learn more and follow us on Facebook and LinkedIn. n
securitysolutionsmagazine.com
13/10/2017 6:54 pm
L I K E U S O N FA C E B O O K For the latest news, products and events in the security industry
facebook.com/ssmaust
LEDA SECURITY APPOINTS NEW CEO Leda is delighted to announce the appointment of Sandy Capannolo as their new CEO. He will be based at Leda’s head office at Tuggerah NSW. Sandy succeeds David Matthews who will retire from Leda Security after 24 years at the helm as founder and Managing Director. During this time, David has built Leda from a small engineering firm into a market leader and key player at the local, state and the federal levels, assisting government departments to protect our cities and assets against the threat of terrorism and Hostile Vehicle Mitigation (HVM). Leda has manufacturing plants in Tuggerah NSW and Ningbo, China with sales and service branches in all major capital cities. The company employs approximately 100 staff nationally. Leda is Australia’s leading manufacturer of over
1,200 perimeter security product lines within its four product pillars: Bollards, Industrial Gates & Fencing, Docks & Doors and Bicycle Parking. Over the past 20 years, Leda developed a comprehensive range of Bicycle Parking designs, advancing to be the market leader in Australia. In addition, the company supplies these products from its China plant to a number of international markets, including North and South America as well as Singapore and closer to home in New Zealand. Sandy’s appointment as CEO is part of an exciting period of expansion for Leda as federal, state and local governments endeavour to protect their assets and citizens’ security from terrorism. “Sandy Cappannolo has a strong business development background”, says David Matthews, Leda’s Managing
Director. “Sandy’s experience in the engineering sector, logistics, supply chain management and business processes will be crucial in ensuring Leda takes full advantage of the growing need for Counter Terrorism Products.” Sandy has been in the engineering and logistics sectors for over 30 years and has performed many Senior Executive roles including General Manager at Loscam Limited, Director and CEO at BAM Wine Logistics, General Manager at Sigma Pharmaceuticals, and General Manager at Amcor. Sandy has also worked for The Boston Consulting Group, a world recognised strategy consulting firm. He has an MBA from the University of Melbourne and a Bachelor of Engineering from RMIT University. For more information, contact Pamela Betts on (02) 8413 3410 or email pamela.b@ledasecurity. com.au n
Hands Free Access Control installation crucial to Queensland MS kids moveability ISCS and N.A.S.A. Electronic Security Systems have been instrumental in providing young, high-care MS patients with much-needed technology to help them move about more freely. Nedap uPASS readers and UHF cards in conjunction with the ICT Protégé WX Access Control system were installed in the recently completed $5.5 million MS Queensland Youngcare complex at Albany Creek, Queensland. Integrator Norm Larden, managing director, said 29 of the long-range readers were installed in eight care units in the state-ofthe-art facility. “Because of the difficulties in presenting a standard access control card, everything needs to be automated so when they wheel
securitysolutionsmagazine.com
110-114_SSM110 Shop Talk.indd 113
their chairs up to a door it opens for them,” Mr Larden said. “MS Queensland were extremely happy with the product and we were most impressed by the ability to alter the read range. “The readers can be easily configured at the time of installation to suit the needs of the project. Whether it’s a couple of paces or two metres, it is simple to provide the ideal solution.” ISCS Queensland manager Mike Knowland said the project was a great showcase for the Nedap flexibility and the ICT WX System. “The Nedap readers are an industry leader for long range identification solutions. They are on-site configurable, offer consistent reading up to five metres in a weatherproof housing that
also provides LED and audible read indication. The cards are available in several form factors and being a passive UHF technology has no battery so there are no concerns regarding the life span of the card. “Protégé WX is a fantastic system that is a flexible, all-in-one, web-based system that integrates access control, intrusion detection and building automation into one simple unified solution. The modular hardware design provides the flexibility to accommodate any installation whether it’s small, large, residential or commercial. Expandable modules allow you to scale your system as your requirements change.” Protégé WX can cater to up to 128 doors, 50,000 events, 10,000 users and 512 inputs and outputs. n
SECURITY SOLUTIONS // 113
13/10/2017 6:54 pm
SUBSCRIBE Security Solutions Magazine, Level 1, 34 Joseph St, Blackburn, Victoria 3130 | Tel: 1300 300 552
I wish to subscribe for:
oONLY $62 per annum!
Name: ............................................................................Company: ....................................................................................... Position: .........................................................................Address: ......................................................................................... Suburb:...........................................................................State: ................................. Postcode:............................................. Tel:..................................................................................Email: ................................................................. ........................... TERMS AND CONDITIONS For more information on subscriptions, or to contact Interactive Media Solutions, please phone 1300 300 552 or email to admin@interactivemediasolutions.com.au. Deductions will be made from your nominated credit card every year in advance of delivery. The direct debit request and subscription price may be changed by Interactive Media Solutions from time to time, however you will always be given at least 28 days notice. The authority to debit your account every year remains valid until you notify Interactive Media Solutions to cancel your subscription by contacting Interactive Media Solutions Customer Service. No refund is given after a payment is made. In the event of a cancellation of your subscription, the subscription will simply expire twelve months from when the last subscription payment was made. Information on how we handle your personal information is explained in our Privacy Policy Statement.
Credit Card oBankcard
oVisa
oMastercard
oAmex
oDiners
Card Number: ........................................................................................................................................................................ Exp: _ _ / _ _ Card Name: .................................................................................................................................................................................................................... Signature: ....................................................................................................................................................................................................................... When payment has been received and funds cleared, this document serves as a Tax Invoice. Interactive Media Solutions ABN 56 606 919 463. If this document is to be used for tax purposes, please retain a copy for your records.
AUSTRALASIA’S LEADING SECURIT Y RESOURCE FOR BUSINESS AND GOVERNMENT S E C U R I T Y S O L U T I O N S • IS SU E 10 9 • SEPT/O C T 2017
ISSUE 109 SEPT/OCT 2017
Security Solutions Magazine digital version is now available via ISSUU on every platform, everywhere! Download it now and enjoy your favourite security magazine when you like, where you like, however you like. PC, MAC, Linux, Apple, Android, Google and more...
Subscribe to Security Solutions Magazine for
ONLY $62 per annum! securitysolutionsmagazine.com
Simply fill in the form or call 1300 300 552
WHAT ARE AUSTRALIANS REALLY AFRAID OF?
001 SSM109 Cover-FIN.indd All Pages
110-114_SSM110 Shop Talk.indd 114
$9.95 inc GST / $10.95 NZ ISSN 1833 0215
22/08/2017 10:09 am
13/10/2017 6:54 pm
115_SSM110 IBC.indd 1
13/10/2017 12:57 pm
CRASH RATED SURFACE MOUNT & SHALLOW MOUNT SOLUTIONS
FIND OUT MORE ABOUT US!
AUSTRALIA NATIONAL
1300 558 304 11 Cooper Street Smithfield NSW 2164 www.ezisecurity.com.au sales@ezisecurity.com
116_SSM110 OBC.indd 1
13/10/2017 12:58 pm