Security solutions #109

Page 1

AUSTRALASIA’S LEADING SECURIT Y RESOURCE FOR BUSINESS AND GOVERNMENT SECURITY SOLUTIONS • IS SU E 10 9 • SEPT/O C T 2017

ISSUE 109 SEPT/OCT 2017

securitysolutionsmagazine.com

WHAT ARE AUSTRALIANS REALLY AFRAID OF? 001 SSM109 Cover-FIN.indd 3

14/09/2017 10:44 am


CUSTOMISABLE ELECTRIC HEIGHT ADJUSTABLE SIT STAND CONSOLES

Does your control room meet

Australian Ergonomic Standards?

www.activconsole.com

002-003_SSM109 DPS.indd 2

Clayton VIC 3168

21/08/2017 9:39 am


Safe Work Australia, Nov 2015

“...in 2012-13 the cost impact of work-related injuries and illnesses was estimated to be just over $61 billion...�

State-of-the-art ergonomic lifting technology Lifetime Australia phone support AS/NZS 4443:1997 & ISO 11064

+61 3 9574 8044

002-003_SSM109 DPS.indd 3

sales@activconsole.com

21/08/2017 9:39 am


RECOGNISING EXCELLENCE

Australian Security Industry Awards Nominations close 1 September www.asial.com.au

2017 EVENT

C

M

Y

C

C

CM

M

M

MY

Y

Y

CY

CM

CM

CMY

MY

MY

CY

CMY

K

CY

CMY

K

K

Winners announced - 19 October 2017 The River Room, Crown Melbourne. The Australian Security Awards Ceremony & Dinner The night is an opportunity to celebrate excellence and innovation in the security industry, and network with likeminded security professionals.

Organised by

Lead dinner sponsor

Entertainment and centrepiece sponsor

2017

#securityawards 004-005_SSM109 DPS.indd 2

22/08/2017 10:17 am


Thermal2017-5-18.pdf 1 2017/7/14 14:29:40 R

R

R

You Might Think

It’s Magic You Think You Might Might Think It’s It’s Magic Magic C

M

Y

C CM

M MY

Y CY

CM CMY

MY K

CY

CMY

K

Hikvision Thermal Cameras Reveal What’s in the Dark It’s not magic. It’s simple: the heat is on, even when lights are off. Heat replaces light in the darkness and Hikvision’s Thermal Cameras capture everything in vivid images at up to 640 x 512 pixels. Powerful Hikvision Thermal Cameras Reveal What’s in the Dark features make these cameras perfect for 24/7 perimeter protection, unhindered by any weather or light condition – features like temperature-anomaly detection effectively prevent emergencies, and It’s not magic. It’s simple: the heat is on, even and whenfire lights are off. Heat replaces light in the darkness Hikvision Thermal Cameras Reveal What’s in the Dark Smart behavior analyses including line-crossing detection and intrusion detection in open and and Hikvision’s Thermal Cameras capture everything in vivid images at up to 640 x 512 pixels. Powerful expansive areas. Safeguard critical infrastructure and any other application, anywhere, anytime.or light features make these cameras perfect for 24/7 perimeter protection, unhindered by any weather It’s not magic. It’s simple: the heat is on, even when lights are off. Heat replaces light in the darkness condition – features like temperature-anomaly and fire detection effectively prevent emergencies, and andSmart Hikvision’s Thermal Cameras capture everythingdetection in vivid images at up todetection 640 x 512inpixels. behavior analyses including line-crossing and intrusion open Powerful and features make these cameras perfect for 24/7 perimeter protection, unhindered by any weather or light expansive areas. Safeguard critical infrastructure and any other application, anywhere, anytime.

condition – features like temperature-anomaly and fire detection effectively prevent emergencies, and Smart behavior analyses including line-crossing detection and intrusion detection in open and Hikvision Oceania expansive areas. Safeguard critical infrastructure and any other application, anywhere, anytime.

004-005_SSM109 DPS.indd 3

Unit 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Email:salesau@hikvision.com Hikvision Oceania Unit 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Email:salesau@hikvision.com

www.hikvision.com.au

www.hikvision.com.au

22/08/2017 10:17 am


ISSUE 109

34

FEATURES

54

CONTENTS

108

62

70

78

COVER STORY

At a time when the Australian public’s concern about security issues are at a decade high, John Kendall, director of the Border and National Security Program, Unisys, explores why concerns are so heightened and what organisations can do to restore consumer trust in their safety.

82

34 CISOS ON THE RISE, BUT MANY ORGANISATIONS STILL LACKING ADEQUATE CYBERSECURITY

According to ISACA’s State of Cyber Security 2017 research, 65 percent of organisations now have a dedicated chief information security officer (CISO) on staff. However, research also showed that, while cybersecurity budgets have expanded, the rate of growth is slowing. Why is this decreased growth occurring at a time when cyber threats are increasing and becoming more sophisticated?

62 FIXING SECURITY RISK MANAGEMENT:

FOCUS ON THE THREAT ACTOR

Government and private industry place enormous emphasis on the concept of Risk Management and Security Risk Management, despite the fact that it has been shown that in areas where the concepts of Risk Management and Security Risk Management were implemented, crime rates actually increased. Does such a significant trend mean we need to rethink the effectiveness of the concept, especially when applied against an actor with intent to harm?

70 THE SHAPE OF THINGS TO COME

We caught up with Serra Luck, Vice President, End-User Consultant Business for HID at this year’s Security Conference and Exhibition, and spoke to her about the future of access control.

82 CONFRONTING AN ISIS EMIR

Most experts agree that the most successful counter-messaging campaigns against ISIS are the ones that utilise the voices of insiders: the voices of ISIS victims and ISIS cadres themselves who have first-hand knowledge of the group’s brutality, corruption, religious manipulation and deception. We look at the work being done by The International Centre for the Study of Violent Extremism (ICSVE) who have spent the last two years interviewing ISIS defectors, ISIS prisoners and returnees from the Syrian and the Iraq conflict in Western Europe, Turkey, Iraq, Central Asia and the Balkans, capturing their stories on video and editing them down to short clips, interspersed with actual ISIS video footage and pictures, illustrating their stories to turn back against ISIS. 6 // SECURITY SOLUTIONS

006-009_SSM109 Contents.indd 6

REGULARS 10 LETTER FROM THE EDITOR 14 LEADERSHIP

Jason Brown looks at the responsibilities of leadership.

16 CYBER SECURITY

We bring you our top 10 cyber security blogs?

18 RESILIENCE

Dr Rita Parker looks at the issues around data privacy and resilience.

20 HUMAN RESOURCES

Greg Byrne presents the third part of his special on conducting workplace investigations.

22 RISK MANAGEMENT

Dr Kevin Foster asks, what is a Risk Assessment Context?

24 COMMUNICATIONS

How can you increase prices without driving away customers?

26 LEGAL

Our legal expert explains why owning your own business can be a mistake.

28 THINKING ABOUT SECURITY

Don Williams examines the pros and cons of red teams.

30 EVENTS

38 ALARMS

We bring you all the highlights from this year’s Security Exhibition and Conference.

42 OPERATIONS

Richard Kay examines fear and its impact on survival.

46 CCTV

How is deep learning making CCTV smarter?

94 SECURITY STUFF 96 SPOTLIGHTS 102 PROFILES 108 PRODUCT SHOWCASES 112 SHOPTALK

Company announcements from within the industry.

50 BUSINESS

Dr Gav Schneider and Kate Down look at Dynamic Risk Equilibrium.

60 LEGAL Q&A

We take a look at workplace health and safety laws in the context of security.

66 LOSS PREVENTION

We present the second of our two-part special on the role of loss prevention across the retail supply chain security program.

74 AVIATION

What is the most important part of addressing aviation security?

78 ACCESS CONTROL

Is a new threat emerging for access control brands?

90 GLOBAL SMART HOME MARKET

A look at upcoming industry events. securitysolutionsmagazine.com

21/08/2017 3:40 pm


Series 280 is an IP66 rated industrial 19” cabinet for harsh and unforgiving environments – air conditioning available.

The last thing on your mind is the first thing on ours.

DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS

Whether it’s ready-made, pre-configured or custom racking solutions, MFB’s short turnaround capabilities speed your product from the warehouse to where they should be – fast. Our unwavering commitment to timely delivery ensures your projects run on time, every time, reducing deadline pressures while maximising results. With a solid history of over 45 years supplying innovative, off-the-shelf and custom built racking systems, you can rely on MFB for consistent delivery, on time, every time.

AUSTRALIAN MADE MAKES AUSTRALIA

www.mfb.com.au

006-009_SSM109 Contents.indd 7

VIC NSW -

P (03) 9801 1044 P (02) 9749 1922

F (03) 9801 1176 F (02) 9749 1987

E sales@mfb.com.au E sydney@mfb.com.au

21/08/2017 3:40 pm


Sign up to our eNewsletter and receive up-to-date valuable information regarding all things Security.

www.securitysolutionsmagazine.biz/newsletter

006-009_SSM109 Contents.indd 8

21/08/2017 3:40 pm

EC - S


TALL. FAST. STYLISH. Our award winning speedgates combine state-of-the-art optical technology with a high barrier height to protect your building.

EASYGATE SPT

• • • •

Barrier heights up to 1800mm Fast throughput (up to one person per second) Ideal for Disability Discrimination Act compliance Choose from a number of models, including the LX, SPT, SG, IM or LG • Custom pedestals with an array of attractive finishes EASYGATE LX

Find out which security gate is right for you.

1300 858 840

www.entrancecontrol.com.au

EASYGATE IM

FULL HEIGHT TURNSTILE

EC - Security Solutions Ad.indd 1 9 006-009_SSM109 Contents.indd

TRIPOD TURNSTILE

SWING GATE

6/02/2017 10:37:16 AMpm 21/08/2017 3:40


FROM THE EDITOR www.securitysolutionsmagazine.com

EDITORIAL

EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen Sist, Ged McMahon

CONTRIBUTORS

Garry Barnes, Karissa Breen, Jason Brown, Greg Byrne, Kevin Foster, Steve Lawson, Justin Lawrence, Rita Parker, Don Williams, Richard Kay, Dr Gav Schneider, Kate Down, John Kendal, David Harding, Jac Brittain, Jim Dearing, Oliver Philippou, Jo StewartRattray, David Gregory, Ardian Shajkovci

T

here should be little doubt in

out that a significant number of respondents

anyone’s mind that the security

and businesses in the industry saw real

industry is set to experience

opportunities in automation, cloud services

significant change over the next

and IP technologies, but felt that cybersecurity

few years. The Australian Security Market Review

was a significant challenge to the immediate

2017 provides a number of interesting insights

development of such opportunities.

that, while not necessarily surprising, serve to

A number of reports by highly regarded

reinforce some important trends and changes

cybersecurity research groups, such as Gartner,

that anyone operating a business in security

have repeatedly pointed out a growing dearth

Keith Rozairo PHONE 1300 300 552 EMAIL keith@interactivemediasolutions.com.au

should be aware of.

of cybersecurity professionals globally, which

DESIGN AND PRODUCTION

(IoT), Internet Protocol (IP) based technology,

of concerns around the safety of online

cloud-based solutions, big data and mobile

technologies. However, with the work currently

technologies will be the sources of greatest

being done in areas like deep machine learning,

change, potential revenue opportunities and

where machines essentially get smarter over

innovation over the next three to five years.

time as they analyse increasingly larger volumes

While this may seem obvious, the real question

of data, it is not inconceivable that, in the near

should be, “How will these areas impact the

future, machine intelligences will be capable of

security market?”

bringing cybersecurity to a level where many of

ADVERTISING

Jonathan Rudolph PHONE 1300 300 552 EMAIL graphics@interactivemediasolutions.com.au

MARKETING AND SUBSCRIPTIONS

PHONE 1300 300 552 EMAIL admin@interactivemediasolutions.com.au $62.00 AUD inside Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues)

ACCOUNTS

PHONE 1300 300 552 EMAIL accounts@interactivemediasolutions.com.au

According to the report, the Internet of Things

Take, for example, the IoT and the introduction

PUBLISHER

on the surface could be seen as confirmation

today’s threats and challenges no longer pose

of IPv6, the most recent standard for the

a significant problem. Any business that opts to

addressing of IP devices (every device that has

wait until the IoT is safe runs the risk of being

an online connection). The original designers of

left well and truly behind. As Eric Rees, the father

the IP defined an IP address as a 32-bit number

of lean start-up methodology often says, “There

and this system, known as Internet Protocol

is little point planting saplings when you need

Level 1, 34 Joseph St, Blackburn, Victoria 3130 PHONE 1300 300 552 EMAIL enquiries@interactivemediasolutions.com.au WEBSITE www.securitysolutionsmagazine.com

Version 4 (IPv4), is still in use today. However,

shade.” Smart companies will take resources

`j

because of the growth of the Internet and the

like this year’s Australian Security Market Review

jv

predicted depletion of available addresses, a

2017 and not just look at its findings as they

DISCLAIMER

new version of IP (IPv6), using 128 bits for the

stand right now, but will instead read between

ABN 56 606 919463

The publisher takes due care in the preparation of this magazine and takes all reasonable precautions and makes all reasonable effort to ensure the accuracy of material contained in this publication, but is not liable for any mistake, misprint or omission. The publisher does not assume any responsibility or liability for any loss or damage which may result from any inaccuracy or omission in this publication, or from the use of information contained herein. The publisher makes no warranty, express or implied with respect to any of the material contained herein. The contents of this magazine may not be reproduced in ANY form in whole OR in part without WRITTEN permission from the publisher. Reproduction includes copying, photocopying, translation or reduced to any electronic medium or machine-readable form.

WRITTEN CORRESPONDENCE TO:

 Level 1, 34 Joseph St, Blackburn, Victoria 3130  1300 300 552  enquiries@interactivemediasolutions.com.au

address, was developed in 1995. Mathematically,

the lines and ask, “What insights can I draw from

the new address space provides the potential for

these findings to better position my business

a maximum of two to the power of 128 (2128), or

to take advantage of emerging trends and

about 3.403×1038 addresses. In layman terms, that

opportunities in years to come?” Disrupt your

means we could effectively assign an individual IP

market before someone does it for you. n

`

j

v

`v

`jv

h

address to every single grain of sand on earth and still have plenty of addresses left over. With such unprecedented levels of connectivity now available, what does this mean in the context of market opportunities for the security industry? More importantly, how might this level of connectivity be deployed in a useful and useable fashion? Too often in the security industry we see engineers building solutions because they can, rather than focusing on customer needs. Smart businesses in the security industry will take new opportunities around

SSOCIATI

ON

big data and mobile technologies, and build

O

RALIA LTD

SECURIT Y

PR

UST FA

O

things like the IoT, cloud services and storage, RS A DE VI

Official Partners O C I AT I

ON

Y P R OVI D

RIT CU SE

PR O

ASS

SPAAL

frustrations rather than simply rehashing their current offering to make it fit the new paradigm.

D LT

STRALIA LTD AU

SECURITY

RS

AU S T R A L I A

SSOCIAT IO N OF

RS A DE VI

solutions based on customer pain points and

OF

E

O rigin a l Siz e

The security industry must also develop blue colour changed to this colour green.

COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE signing your approval to print. Please pay special attention to spelling, punctuation, dates, times, telephone numbers, addresses etc, as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman Press assumes no responsibility for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................

10 // SECURITY SOLUTIONS

010-013_SSM109 Editor's Letter.indd 10

the ability to look over the horizon. The

John Bigelow

Editor / Security Solutions

Australian Security Market Review 2017 points

securitysolutionsmagazine.com

22/08/2017 10:47 am


`

j

v

`j

jv

`v

`jv

h

THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.

NEW!

ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.

+61 (3) 9544 2477

email: oz_sales@takex.com

HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.

BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.

INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.

OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .

1300 319 499 csd.com.au www.takex.com

TAKEX AMERICA

VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta 010-013_SSM109 Editor's Letter.indd 11

22/08/2017 10:47 am


READ OUR FREE DIGITAL MAG Search ‘Security Solutions’ on issuu.com

Or go to goo.gl/A2BdNu

securitysolutionsmagazine.biz

010-013_SSM109 Editor's Letter.indd 12

22/08/2017 10:47 am


STOP TAILGATING AND OTHER UNAUTHORISED ENTRY ATTEMPTS

NOW AS EASY AS 1,2,... 1

2

1

Take 1 standard access controlled door with tailgating problems.

Tailgating is the art of unauthorised people following authorised people through an access controlled door.

www.pathminder.com.au

010-013_SSM109 Editor's Letter.indd 13

2

Add a PathMinder HPJ half portal.

The PathMinder HPJ half portal can ‘cap’ any access controlled door to turn it into a secure interlock, the highly sophisticated ultra sonic tailgate detection technology makes sure access is limited to one person at a time.

3

Sit back and relax, job done.

With over 40 portals in the range, PathMinder has a high security solution to controlling access at any entry point. Our portals include vandal, attack and bullet resistant certified designs, DDA compliant solutions and full customisable models to match your security needs.

Phone: 1300 750 740

22/08/2017 10:47 am


M S

LEADERSHIP

THE RESPONSIBILITIES OF LEADERSHIP BY JASON BROWN

I

was talking with some

know the answers, but the art is in

colleagues at the ASIAL

guiding and advising, not in directing;

conference about

the mentee needs to find his own

mentoring and related

course. The iLead project (https://

actions by leaders at all levels to help

www.ileadtalentexchange.com.au) is

others, particularly those just starting

a great way for security professionals

out, and it made me consider the

to get involved.

attributes of leadership that go to

VISION Creating a compelling vision for the future, combining the gathering of complex information from different sources with out-of-the-box thinking

by creating a shared sense of purpose and a learning culture CONNECTION Embracing and leveraging diversity across perspectives and cultures while creating positive emotions in others

Pay It Forward where the young hero

Number Two – Contributing to Teaching and Education

calls his plan “pay it forward”, which

Leaders who have managed to reach

means the recipient of a favour does

the dizzy heights have probably

a favour for three others rather than

learnt something along the way. It is

paying the favour back. The story,

time to pass on those experiences in

while emotionally manipulative,

a more formal way by contributing

made a point about the individual’s

to courses in the technical and

to being on a standards committee

for security, both here and

capacity to pass on knowledge,

further education sector, or at

in Australia or internationally. These

internationally. There are more

opportunity and advancement with

institutes and universities. Lecturers

are ways that experience can make

opportunities to contribute in the

no other thought other than the

and tutors are often in demand,

a difference for others and the future.

space coming your way.

person he assists will do good in turn.

especially if they are also doing

Along with the above, leaders

‘giving back’ and ‘paying forward’. Readers may remember the film

In thinking this through, consider

some study themselves.

ACTION Managing uncertainty and change effectively, while showing courage, resilience and the ability to make sound decisions IMPACT Inspiring others to unleash their potential and talent

DRIVE Confidently pursuing challenging career goals with a thirst for learning and appetite for feedback

Jason Brown is the National

can also write for the security and

Security Director for Thales in Australia

more general press to pass on their

and New Zealand. He is responsible

pay back for the opportunities he has

official positions on school and

knowledge. In the social media age,

for security liaison with government,

and pay forward to those that can

college boards or other community

it is not that difficult to join in by

law enforcement and intelligence

make a contribution in future.

organisations that will allow leaders

sharing information, responding

communities to develop cooperative

to contribute the management skills

to legitimate requests and linking

arrangements to minimise risk to

they have developed.

people together who can assist with

Thales and those in the community

their respective objectives.

that it supports. He is also responsible

three things that a leader can do to

Number One – Mentoring

Alternatively, there may be some

Mentoring is a relationship between

relationship is a non-reporting

Number Three – Engage with professional institutes and representative bodies

one and replaces none of the

Groups like ASIAL, ASIS International,

(http://au.hudson.com/talent-

served on a number of senior boards

organisational structures in place.

the Risk Management Institution

management/hudson-leadership-

and committees, including Chair of

It is additional to other forms of

Australasia (RMIA), Australian

model). Readers may also wish to

the Security Professionals Australasia;

assistance, such as developmental

Information Security Association

Google images for leadership models

member of ASIS International

assignments, classroom instruction,

(AISA) and the Security Professionals

– there is sure to be one to fit most

Standards and Guidelines Commission;

on-the-job training and coaching.

Australasia (SPA) are always in need

circumstances. Do not forget to do a

Chair of Australian Standards

It works best when a mentor

of those who can volunteer to take

bit of tailoring of the models; after

Committee for Security and resilience.

brings his professional and life

leadership roles. They can range from

all, everyone is a bit unique!

As of February 2017, Jason has been

experience to assist another person

judging the Outstanding Security

to chart his course in life. It is not

Performance awards or the best

the opportunity to participate in

Standards Committee for Risk

always easy, as the mentor may

new product in the Security show,

making and setting the standards

Management. n

two individuals based on a mutual desire for development towards career goals and objectives. The

14 // SECURITY SOLUTIONS

014-033_SSM109 Regulars.indd 14

In closing, these ideas fit in well

for ensuring compliance with

with a number of leadership models,

international and commonwealth

including the Hudson model shown

requirements for national security and

above, which deserves attention

relevant federal and state laws. He has

In the next article, I will discuss

appointed Chair of the International

securitysolutionsmagazine.com

21/08/2017 10:25 am


MULTIPLE CAPABILITIES SUPERIOR SOLUTION

Volvo Group Governmental Sales Oceania

IN HOSTILE ENVIRONMENTS, IT’S IMPORTANT THE SYSTEMS THAT YOU DEPEND ON CAN

STAND THE TEST OF TIME.

At Volvo Group Governmental Sales Oceania, our core business is the manufacturing, delivery and the support of an unparalleled range of military and security vehicle platforms; a range of platforms that are backed by an experienced, reliable and global network with over one hundred years of experience

superior solutions, providing exceptional protected mobility www.governmentalsalesoceania.com 014-033_SSM109 Regulars.indd 15

21/08/2017 10:25 am


CYBER SECURITY

TOP 10 CYBERSECURITY INFORMATION SOURCES T

here can be no doubt

malware discoveries, with insights

vulnerabilities, as well as strategies

Security, Sophos warn subscribers

that cybersecurity is

from experts.

for protecting enterprise data. It

about all kinds of bad computer

one of the hottest

Frequency – about eight

also offers guidance on setting

threats, including the latest

topics in the security

posts per week.

risk management and compliance

Facebook scams and rogue apps.

policies. However, be prepared

Frequency – about 34 posts per week.

world right now. In fact, it is one of the hottest topics around – period.

securingtomorrow.mcafee.com

for information overload as they

However, for the average physical

Just about everyone who has

post a lot.

security practitioner, staying

owned a computer is familiar with

Frequency – about 34

security.googleblog.com

informed about cybersecurity

McAfee, one of the best known

posts per week.

The latest news and insights from

trends, practices and technologies

names in anti-virus and computer

can be challenging to say the least;

security software. Now a part of

schneier.com

the Internet.

especially in a world where

Intel Security, McAfee produce this

Bruce Schneier is an internationally

Frequency – about three posts

information overload, a lack of time

fantastic blog full of security news

-renowned security technologist and

per month.

and an expectation that people

and resources on solutions for

author. Described by The Economist

should be able to do more with less

everyone from small business to

as a security guru, he is perhaps

grahamcluley.com

all make finding and digesting

enterprise organisations.

the only security practitioner to

A veteran anti-virus expert,

relevant information difficult. To that

Frequency – about 11 posts per week.

ever have been dubbed a ‘security

Graham Cluley specialises in data

rockstar’ by IFSEC. His blog covers

security, as well as the usual host of

end, we have compiled a list of what

Google on security and safety on

are, in our opinion, the top 10

krebsonsecurity.com

security and security technology.

computer security issues.

cybersecurity blogs from the leading

Brian Krebs is a household name

Frequency – about eight

Frequency – about 11

experts around the world. Why go

in information security, and his

posts per week.

posts per week.

looking for information when you

blog is among the most well

can have it delivered directly to your

known and respected in the space.

threatpost.com

infosecurity-magazine.com

smartphone, favourite device or

This is a daily blog dedicated to

Threatpost is an independent

Infosecurity Magazine is the award-

desktop? Check out some of these

investigative stories on cybercrime

news site and leading source of

winning online magazine dedicated

great blogs and simply subscribe to

and computer security.

information about IT and business

to the strategy, insight and

the ones you like. After all,

Frequency – about three

security for hundreds of thousands

technology of information security.

they are free.

posts per week.

of professionals.

This blog is an extension of the

Frequency – about 19

great work they produce through

posts per week.

their online magazine.

welivesecurity.com

darkreading.com

With around 1,838,316 Facebook

Dark Reading is the premier online

followers, WeLiveSecurity is one

resource helping information

nakedsecurity.sophos.com

of the most popular cybersecurity

security professionals manage the

Brought to you by Sophos, a world-

sites around. It is an IT security

balance between protection and

renowned provider of PC security

site covering the latest news,

access. It offers breaking news and

software, Naked Security is their

cybersecurity blogs. Check them

research, cyber threats and

analysis on attacks, breaches and

threat news room. Through Naked

out and get reading. n

16 // SECURITY SOLUTIONS

014-033_SSM109 Regulars.indd 16

Frequency – about 42 posts per week. So, there you have it, our top 10

securitysolutionsmagazine.com

21/08/2017 10:25 am


ATTENTION INTEGRATORS GOLD CLASS MOBILE ACCESS PROMOTION Upgrade your customers to experience the benefits of GOLD CLASS MOBILE ACCESS on their mobile device.

Increase your own income.

AT NO COST

Complimentary award winning HID Readers and Credentials Exclusive to ISCS

“Only having to carry one device for so many daily tasks is excellent.” ALISON BROWN Facilities, Operations & Events Manager, Netflix

AN ARA PRODUCTS COMPANY

HID Mobile Access®

Secure, convenient access control via your mobile device

ISCS is Australia’s HID Platinum Partner distributor

Contact

goldclass@iscs.com.au or 1300 111 010 and quote code GOLDCLASS Any size company considered, new or existing customers

014-033_SSM109 Regulars.indd 17

21/08/2017 10:25 am


RESILIENCE

DATA PRIVACY AND RESILIENCE – A CAUTIONARY NOTE BY DR RITA PARKER

he digital

information while maintaining

• the collection of solicited

transformation of

protection of data privacy and

personal information and

cloud-based data storage, while

society has added to

protecting the individual’s privacy

receipt of unsolicited personal

convenient for access, means

the complexity of

preferences and his personally

information, including giving

increased exposure to risks to the

doing business today for large

identifiable information from

notice about collection

data stored, which may belong to

corporations, international

inappropriate or unauthorised use.

conglomerates and small owner

This is particularly challenging

can be used and disclosed

business using the service. The

operators, as well as for individuals.

when data comes from a wide range

(including overseas)

increasing number of cyberattacks

Risks and threats are evolving on a

of information sources.

T

daily basis due to the widespread

In Australia, the Privacy Act

• how personal information

• maintaining the quality of personal information

For example, the trend to use

the online service as well as to the

on large and small organisations means that extra caution needs

use of internet-enabled devices and

1988 regulates how personal

processes. Recent high-profile

information is handled. The Privacy

cyberattacks demonstrate the

Act defines personal information

extent of possible losses to

as ‘… information or an opinion,

to access and correct their

specified data, as this would

institutions and business and their

whether true or not, and whether

personal information.

inhibit operational business

impact on civil society when the

recorded in a material form or not,

The challenge for many

needs. What is necessary is to

daily operations of banks, airlines,

about an identified individual, or

organisations is how to collect

ensure cybersecurity procedures

hospitals and other institutions

an individual who is reasonably

and use personal data without

are current and integrated into

have been compromised. This

identifiable’. The Privacy Act

breaching the Privacy Act. For

mainstream resilience management

situation has been further

includes 13 Privacy Principles that

example, while data collection

strategies and practices.

compounded by increasing physical

outline how all private sector and

agencies and marketers state they

Further information about

and financial damage relating to

not-for-profit organisations with an

keep users’ data private by viewing

the Privacy Act 1988 and Privacy

data privacy breaches. The

annual turnover of more than $3

it only in aggregate, the extensive

Principles can be obtained from the

challenge for business is to ensure

million and some small businesses

volume of data a cookie can collect

Office of the Australian Information

it protects personal and other

must handle, use and manage

about any individual can enable the

Commissioner.

information while simultaneously

personal information. These

cookie’s owner to infer a surprising

being able to utilise the information

Privacy Principles also apply to

amount about the individuals

the International Council of Security

for operational business needs.

most Australian and Norfolk Island

being tracked.

and Resilience Professionals and is

Online privacy faces new risks and threats with each emerging technology, which could affect

Government agencies and to all private health service providers. While the Privacy Principles are

• keeping personal

to be taken to protect personal

information secure

information and data. It is not

• the right for individuals

enough to simply ‘air-gap’ the

Obtaining consent from an

Dr Rita Parker is a member of

Centre Manager of the Australian

individual to a secondary use

Centre for Armed Conflict and

or disclosure is permissible,

Society. Rita is also a former

how web-based data is protected,

not prescriptive, each entity needs

but organisations need to be

Distinguished Fellow at the Center

or exposed. Privacy concerns exist

to consider how the principles

aware that under the Privacy Act,

for Infrastructure Protection at

wherever personally identifiable

apply to its own situation. The

the individual can reasonably

George Mason University, USA. She

information or other sensitive

principles cover:

expect that the secondary use or

provides advice to organisations

information is collected, stored and

• the open and transparent

disclosure is related to the primary

seeking to increase their corporate

used in digital form. The challenge

management of personal

purpose of collection or, in the case

and organisational resilience and

for business is to increase the

information, including having a

of sensitive information, directly

crisis management ability. Her

way it protects personal and

privacy policy

related to the primary purpose.

co-edited book, Global Insecurity,

other information, and thereby

• an individual having the option

enhance its business resilience.

of transacting anonymously

to understand and calibrate,

available in 2017, includes aspects

An additional challenge for many

or using a pseudonym where

especially given the significant

of her recent research about urgent

organisations is how to use

practicable

potential for related exposures.

global security policy issues. n

18 // SECURITY SOLUTIONS

014-033_SSM109 Regulars.indd 18

Cyber risks are complex

published by Palgrave McMillan and

securitysolutionsmagazine.com

21/08/2017 10:25 am


Presco™ Standard Keypad, Combination RFID Keypad and RFID reader New PrescoTM Range

Introducing the new range of Presco™ indoor keypads and readers. The Proximity reader and Combination keypad are advanced self contained RFID (Radio Frequency Identification) contactless devices. They are capable of interfacing to either a Wiegand input control panel or to the Presco range of PAC controllers. When any of these devices are coupled with the Presco™ PAC series of door access controllers you get the full benefits of a secure door access control solution with all of the features of the Presco™ protocol.

FEATURES The PSK16 is a direct replacement for the PRE keypad and outputs Presco™ data only. Installations require only 3 wires to the controller but can be made with 2 wires if the LED indication is not required The PSC16 & PSR16 output both Presco™ and Wiegand format data. Output type required is auto sensed via white wire connection. Read range of up to 20cm Compatible with Presco™ PAC access controllers and all other Presco™ decoders, the entire system uses low cost non-shielded cable and keypads and readers can be up to 1 kilometre from the door controller (power supply and cable dependent) Compatible with industry standard 26 bit wiegand systems, the keypad can output 8 to 64 bit or burst mode wiegand and custom proximity cards and tags are available for wiegand formats up to 64 bits

For more info www.presco.com.au

NIDAC SECURITY 2 Cromwell Street BURWOOD VICTORIA AUSTRALIA 3125

014-033_SSM109 Regulars.indd 19

Audible and visual confirmation of all actions. Designed and manufactured in Australia. 36 month manufacturer’s warranty

Phone: +61 3 9808 6244 Fax: +61 3 9808 9335 E-mail: sales@nidac.com

21/08/2017 10:25 am


HUMAN RESOURCES

CONDUCTING WORKPLACE INVESTIGATIONS – PART 3

BY GREG BYRNE

his is the third article

tribunal due to feelings of not

does not play any part in the

and all those involved. Sources of

on the correct and

being treated fairly. All parties

decision-making process.

evidence include:

(safe) method of

involved must be spoken to and

conducting an internal

provided the opportunity to have

‘sending a message’ to the

• informant information

investigation due to workplace

their say and present inculpatory

workforce play any part in the

• proceeds of a search

conflict or misconduct. The first two

or exculpatory evidence, as the

decision-making process.

• observations

articles in previous issues of Security

case may be.

T

Solutions Magazine outlined the

• It is possible to summarily

o Do not let the temptation of

• letters of complaints

• The HR manager should not be

• interviews

given the sole responsibility

• statements

steps involved in conducting an

dismiss (sack on the spot) an

in deciding the outcome of an

• documents

investigation. This article will outline

employee, but due process must

internal investigation. Before

• photographs

some common pitfalls with not

be followed. Employers have

taking any disciplinary action,

• emails

conducting an internal investigation

the right to summarily dismiss

ensure that the investigation

• forensic evidence

correctly or of not conducting

for conduct that is serious

has complied with any legal

• computer records

one at all.

enough to justify it. However,

obligations and that it has

• other physical items.

prior to doing this, all the

followed the organisation’s

Investigators are not bound to only

companies ignore the need to

evidence and all the available

policies and codes of conduct.

look at certain types of evidence;

conduct an internal investigation,

options must be considered. For

Failure to conduct competent

they are obliged to consider any

and that is because it is hard. The

the summarily dismissal to be

internal investigations could

evidence that is relevant, reliable

process is often referred to as

lawful, it must be established

have grave consequences for a

and fair. Failure to do this could

the dark side of human resources

that the actions of the employee

business. The following court

result in adverse and costly

(HR) and is something a lot of HR

being dismissed are serious

matters highlight some of the court

decisions against the business being

professionals and managers do

enough to warrant it. Before

decisions that have gone against

made by the Fair Work Commission.

not like to do. The reason for this

summary dismissal:

businesses who have not conducted

There is a plethora of decisions

is that investigations are complex,

o Ensure that the investigation

fair and reasonable investigations.

from the various industrial relations

There is one very good reason

involve expert knowledge, involve

is competent. If the matter

In one case, an employee was

tribunals in the country, as well as

some emotion (the perpetrator/s

being investigated might,

reinstated to his former role in the

from the various criminal and civil

and the investigators usually

if found to be true, warrant

company and, as compensation, his

courts that you could rely on to help

know each other) and are time

summary dismissal, an

employer was ordered to pay him

determine what is relevant, reliable

consuming. Without the correct

employer can consider

six month’s salary.

and fair. The terms are also defined

person conducting the investigation,

suspending the employee

• Bruce v AWB Ltd [2000] FCA

in the various evidence acts that

the outcome can be very costly to

subject to the investigation

• Concut Pty Ltd v Worrell

operate in each state of Australia.

all involved, including the company

until the outcome of the

as its employees and reputation

investigation is known.

• Smith v Aussie Waste

outline what bullying is, what effect

are dragged before the Industrial

o Be aware of the employee’s

Management Pty Ltd

it has on the workplace, what can be

[2015] FWC 1044

done about it and what happens if

Relations Commission. Some very important points to

employment record and establish if he has been

[2000] HCA

• John Pinawin t/a RoseVi Hair Face.

consider when either conducting an

subject to a previous

Body v Edwin Domingo [2012]

investigation or reviewing one are:

complaint or not and if that

FWAFB 1359

• The subject of the complaint must have been interviewed and been

previous incident was serious. o Be aware of and consider

• Lloyd & Co Pty Ltd v Shuttle ([2016] FWCFB 144)

My next series of articles will

nothing is done. Greg Byrne is CEO and director of Multiset Consultancy Pty Ltd, a multifaceted consultancy advising CEOs and boards of security organisations

offered the opportunity to defend

available options (including

himself or offer new evidence.

demotion, counselling,

Finally, ensure that the investigator

manage business risk, particularly

Failure to do this can result in

movement to another

has collected all available evidence.

operations, disaster recovery, business

an aggrieved employee who

workplace, or training) and

Evidence is any information that

continuity and human resources.

could become more of a problem

document the decision-

can be considered to assist in

Greg can be contacted via email

than previously was the case, or

making process.

determining a fair, reasonable

greg@multisec.com.au or on 0402

and just outcome for the business

295 124. n

who takes the matter before a

20 // SECURITY SOLUTIONS

014-033_SSM109 Regulars.indd 20

o Ensure that saving money

in Australia on best approaches to

securitysolutionsmagazine.com

21/08/2017 10:25 am


SMARTair™

Proximity access control Introducing ASSA ABLOY’s new Lockwood SMARTair™; a powerful access control system that is simple to install, simple to configure, simple to administer and maintain. SMARTair™ provides peace of mind for businesses small and large, knowing that lost credentials are no longer a risk, with the flexibility to restrict user movements within the building. Audit trails can show historical movement for reporting purposes. SMARTair™ offers an intelligent, yet simple, step up from keys, and a cost effective alternative to traditional access control. No bells, whistles, or wires, just sleek, reliable security. Available in standalone, offline, update on card and wireless online.

SMARTairTM Door Lock

SMARTairTM Knob Cylinder

SMARTairTM Wall Reader

SMARTairTM Cabinet Lock

S E C U R I T Y, S I M P L I C I T Y , C O N V E N I E N C E . Visit lockweb.com.au/smartair to learn more.

014-033_SSM109 Regulars.indd 21

21/08/2017 10:25 am


RISK MANAGEMENT

Co Fo

WHAT IS A RISK ASSESSMENT CONTEXT? BY DR KEVIN J. FOSTER

ecurity professionals

always a flurry of risk assessment

security and suggest a suitable

threats and vulnerabilities.

are often required to

activity because decision makers

budget to cover the cost. However,

For example, ISO31000:2009

conduct risk

want to know if their own

the strategic manager responsible

describes external context as the

assessments.

organisations or the societies they

for deciding what to do with the

key drivers and trends having an

Sometimes the security risk

protect are exposed to the changed

building might be more interested in

impact on the objectives of the

assessor might focus on

threat environment.

some other objective. For example,

organisation and includes the

Sometimes a societal or

there might be a strategic decision

values and perceptions of external

notices in his or her employer’s

organisational risk environment

to sell the building or lease it to a

stakeholders. For example, a security

facility or operations. For example,

might have changed due to other

tenant. The strategic manager may

intelligence agency or a central

if the risk assessor has an

factors that are not directly related

simply want to ensure that the

security policy agency might explain

electronics background, he might

to security, such as economic or

security systems are operational

the current threat environment

make quite a few suggestions about

political factors. For example,

and adequate for presentation

(such as terrorism) for a particular

how to improve access control

there could be an objective to

purposes. This is just one example;

industry sector at a national level.

systems, intrusion alarms and CCTV.

reduce expenditure through

there are many others where the risk

This context then needs to be

Of course, it might be useful for

efficiency gains. In this case,

analyst and the decision maker are

amended to fit the state level, the

decision makers in organisations to

the risk assessment might be

concerned about different issues.

market segment level and even

understand how security could be

requested to highlight potential

The risk assessor might think he is

the facility level. It all depends

improved in their facility or

savings in operational costs.

doing his job well, but the decision

on who the decision makers and

organisation. However, there is an

There are many reasons why a risk

maker could be presented with

stakeholders are.

important question that needs to

assessment could be needed in the

expensive security solutions to a

be asked: is an upgrade of security

decision process.

problem he does not want to solve!

S

vulnerabilities that he or she

really necessary? To answer this question, it

Clearly, it is important to

This strategic misalignment of

Senior decision makers need to consider which threats and risks might prevent their organisation

understand who the decision makers

security and business objectives can

from achieving its business

is important to understand the

might be and what their motivation

cause tension between the security

objectives. Security is only one

context of the decision problem. In

is for conducting a risk assessment.

operatives and the senior managers

category of risk that they need to

this article, I will try to explain this

In the absence of this information,

they advise. For this reason, it is very

consider. There can be many other

concept for people who are new

the risk analyst might be tempted

important for security professionals

categories. Security advisers need

to the risk assessment process and

to raise issues of concern to himself,

to understand the business

to ensure that their assessments

perhaps remind others.

instead of those that the decision

objectives of the organisation for

and advice are in the context of

maker wants to address. For

which they are providing security

the business objectives of the

dictionaries as the circumstances

example, a security consultant might

advice. They need to understand

organisation that they serve.

that form the setting for an

be concerned about the physical

what the senior managers are trying

event, statement, or idea. In

vulnerabilities of a particular

to achieve. The security goals need

managing director of Foster Risk

security reviews this generally

building that has poorly maintained

to align with those objectives in

Management Pty Ltd, an Australian

refers to threat events that might

security systems. The consultant

order for the security risk assessment

company that provides independent

present unacceptable outcomes

might explain how thieves could

to be in tune with the context.

research aimed at finding better

or unwanted impacts on the

exploit these vulnerabilities, and the

objectives of the decision makers. It

need for better physical security.

management standards emphasise

public safety, and improving our

seems that after any major terrorist

He might offer some good ideas

the need to define the context of

understanding of emerging threats

event in a Western country there is

about how to achieve more effective

the assessment before determining

from ‘intelligent’ technologies. n

Context is usually defined in

22 // SECURITY SOLUTIONS

014-033_SSM109 Regulars.indd 22

For this reason, most risk

Dr Kevin J. Foster is the

ways to manage risk for security and

securitysolutionsmagazine.com

21/08/2017 10:25 am


Contact us on 1300 364 864 Follow us on

Delivering Proven Solutions for Security & Safety We Protect People & Assets www.magneticautomation.com.au 014-033_SSM109 Regulars.indd 23

21/08/2017 10:25 am


COMMUNICATIONS

PUT YOUR PRICES UP? BY DAVID GREGORY

ricing is often

market will accept price change

ongoing understanding of what the

deemed as a black

before reacting against the product

market is doing.

art. It creates fear in

or business. Most businesses don’t

the hearts of

realise how diverse the pricing

of regular small increases rather

Secondly, many business

business owners and a sense that it

within their industry can be. To

than doing a substantial irregular

owners won’t raise prices out of

alone will decide on the success of

test the market, all a business

increase is far more appealing. To

fear of telling their customers.

their business. The reality can be

needs to do is ask the question.

this end, set yourself a timeframe.

You simply have to bite the bullet

quite different.

Call your opposition and ask for a

Have it diarised that each year on

and tell them. Where possible, tell

quote. Drop into an opposition’s

the 1st of July I will put my prices

them ahead of the price rise, but if

that told me he had “never” put up

business and look at their prices.

up. Then stick with it.

not possible, don’t apologise, just

his prices for existing customers.

Speak to the salesperson behind

His belief was that he would

P

I recently met with a business

For small business an approach

As a result, they will not leave for the devil they don’t know, for a measly 5-10%.

Advise the customers as part of

tell them. You will be surprised

the desk and ask what they charge.

the process. “Our annual price rise

at how many will just shrug, or

lose the customer, if they had to

While this seems simplistic, very

will take effect on the 1st of July,

say “about time”. They want you

pay more. When quizzed on his

few businesses actually do regular

come in now to take advantage of

around so they can buy from you

customer base, he said that many

market research. As a result they

the current prices”. This approach

again. As such, they expect you to

had become like friends and that

are robbing themselves blind in

not only trains the customers to

make a profit.

they all loved his service, but he

the process.

expect an annual increase, but also

was afraid of losing them. Progressively he had to keep

Statistically, most customers of small businesses will accept an

creates an incentive to buy now.

The greatest challenge you have to overcome in putting

Now that you have made a

up your prices is you and your

tabs on the prices he charged

increase of between 5 and 15%

commitment to yourself that price

confidence to do so. Believe in

because they had become different

without falling off their chairs in

increase will happen and you will

yourself and your product or

for each customer depending on

dismay. For a business with a large

manage their implementation, let’s

service. Your business and your

when they had begun buying from

and diverse customer base, it is

address your fears.

customers will be the beneficiaries

him. It had become a real headache

possible to test the impact of an

to manage.

increase by targeting a specific

buy from you because of price.

low risk group. If the prices are

Price may have been a factor

the Small Business Mentoring

would expect prices to rise and as

accepted, then expand the increase

originally but they have become

Service www.sbms.org.au , an

a business owner, you have to train

to the next group. For businesses

regular because of:

organisation that has supported

your customers to appreciate the

with a smaller base, perhaps a

• you

thousands of small businesses for

value you provide over and above

staged increase starting at 5% is

• your location

over 25 years. SBMS has over 140

the prices.

an easier entry point. The critical

• your service

Mentors in Victoria and NSW. He is

aspect is to start. A business needs

• your quality

also the Founder and CEO of The

price elasticity. This is a term that

to establish a regular approach

• your range

Small Business Institute. www.

reflects on the degree to which the

to their pricing aligned with an

• your uniqueness.

tsbi.com.au n

The reality is that the customers

Part of the approach is to test

24 // SECURITY SOLUTIONS

014-033_SSM109 Regulars.indd 24

Many regular customers do not

of your confidence. David Gregory is the CEO of

securitysolutionsmagazine.com

21/08/2017 10:25 am


TR

OR

014-033_SSM109 Regulars.indd 25

HÉE D’ OP

21/08/2017 10:25 am


LEGAL

STRUCTURING YOUR BUSINESS TO PROTECT YOUR ASSETS BY JUSTIN LAWRENCE

any people own their

and is unable to keep working or

name is owned by a company, that

bankruptcy as his greatest threat. To

own businesses, and

pay the rent – then anyone chasing

name could do. However, in an ideal

start with, Callum should not own

this is a mistake. At

the business for money will chase

world, a new company would be set

any assets of significance. His house

this point, you are

Callum. If he loses that fight, he is

up for that purpose. That company

and car should not be in his own

probably asking yourself what I’m

a good chance to lose the business

– let’s call it Doctor Callum Pty

name. As a proprietor of a business,

talking about.

and the lease.

Ltd – would apply for credit, issue

Callum’s assets are best held in

purchase orders and pay invoices

the names of others (even though

M

People should not own

If, however, the lease is held in

businesses in their personal

the name of a separate entity – let’s

on behalf of the business. If, for

Callum will be advised that holding

capacities. Businesses should

call his company Cal’s Security Stuff

any reason, the business had

his home in the name of a company

be owned not by the proprietors

Pty Ltd – then even if the business

insufficient funds available to pay

will have tax consequences which

of them, but by other people or

is sued, Callum has shielded the

creditors, then Doctor Callum Pty

would not otherwise apply if the

entities who are separated from

lease from the firing line as best

Ltd would be the entity sued for

house was in his own name). If he

the day-to-day operation of the

he can, and the business will still

the money. At the same time, the

can manage it, Callum should pay as

business. But how do business

have premises from which to

business name and lease would be

much money as he can afford into

owners structure themselves

trade. If Callum is the sole director

quarantined from that law suit.

his superannuation fund. He should

appropriately?

and shareholder of Cal’s Security

At any time during its trading

not go crazy with contributions,

Stuff Pty Ltd, then the company

life, Callum should undertake an

but they should be significant

Here’s a bit of an action plan:

will take whatever steps Callum

asset protection risk assessment.

and steady.

For starters, the business name

directs anyway, so he does not lose

As part of that assessment, Callum

should be registered in the name

any control.

should ask himself what is the

Callum is made bankrupt, he can

of a company or other entity. Take

Similarly, the business name

If, despite his best efforts,

most important thing he is trying

prevent the money paid into his

for example, Callum’s Security

of Callum’s Security Distribution

to protect and who represents the

superannuation fund being clawed

Distribution. Now, Callum is a

should also be held by an entity

greatest threat to that asset.

back by his trustee in bankruptcy.

young go-getter full of ideas about

other than Callum. Ideally, Callum

how to turn his online security

would have a separate company

protection structures may protect

be effective if it is put in place from

wholesale business into a multi-

that owns the business name – that

assets from creditors, but not from

the early days of Callum’s business

site, fully franchised operation.

is, a company other than Cal’s

matrimonial breakdown. Some

and the contributions are for

Callum intends to lease modest, yet

Security Stuff Pty Ltd. Then, even

structures may protect assets from

consistent and reasonable amounts.

comfortable premises in a semi-

if the company holding the lease

matrimonial breakdown, but may

Similar strategies exist if the

industrial part of the city and to

is wound up or liquidated, the

not protect from claims brought

risk assessment reveals matrimonial

throw his doors open for business.

business name would be kept free

against Callum’s estate after he

breakdown or claims against

from claims.

dies. Once Callum has undertaken

estates as Callum’s most pressing

his full assessment, he can structure

asset protection issue.

Who should be the tenant

For example, some asset

named on his lease? Not Callum,

When Callum’s Security

that’s for sure. Why? Because at

Distribution buys materials and

and plan his asset protection risk

this stage, the business is Callum. If

supplies, it should do so under a

strategy. Let’s look at one of those.

something happens to Callum – he

name other than Callum’s private

is sued or he is in a car accident

name. Given that the business

26 // SECURITY SOLUTIONS

014-033_SSM109 Regulars.indd 26

Let’s assume that Callum has assessed his own personal

While this strategy is limited, it can

Giving some thought to those things now, will greatly assist Callum – and his business – in the long run. n

securitysolutionsmagazine.com

21/08/2017 10:25 am


R

EasyIP 3.0 H.265+ EasyIP 3.0 H.265+

EasyIP 3.0 SERIES

Simple and Powerful The Easier Journey toEasyIP Better 3.0Security SERIES Simple and Powerful The Easier Journey to Better Security

The all-new Easy IP product range is simple to install and use, and is available at a budget-friendly price. Rarely does an affordable system come with such powerful functionality: 4K ultra HD with true WDR, H.265+ Smart Codec compression technology. New cameras in the range also provide greater analytic functions, featuring on-board Video Content Analysis options. Its power, combined with its easy installation and user-friendliness, means the Easy IP 3.0 solution requires significantly less operator input to deliver a significantly more efficient and effective security solution. - 4K Ultra HD with WDRrange is simple to install and use, and is available at a budget-friendly price. The all-new Easy IP true product Rarely does an affordable system come with such powerful functionality: 4K ultra HD with true WDR, H.265+ - H.265+/H.265 Compression technology Smart Codec compression technology. New cameras in the range also provide greater analytic functions, featuring on-board Video Content Analysis options. Its power, combined with its easy installation and Hikvision Oceania user-friendliness, means the Easy IP 3.0 solution requires significantly less operator input to deliver a significantly more efficient effective security solution. Unite 14a Eden Park Dr, Macquarie Parkand NSW 2113 Tel: +61 2 8599 4233 - 4K HD557 with true WDR Toll Ultra Free:1300 450( Australia only) Email:salesau@hikvision.com www.hikvision.com - H.265+/H.265 Compression technology 014-033_SSM109 Regulars.indd 27

Hikvision Oceania

21/08/2017 10:25 am


THINKING ABOUT SECURITY

RED TEAMS / TOO CLOSE TO SEE I

s it possible to be too

How can we find out if we

C

M

The client needs to clearly

possibly to assets and functions

Y

close to something?

have become blind or, at the least,

define how far the Red Team may

that have not been identified or

CM

To be so familiar with

blinkered? Two options present

go, are they allowed to conduct

considered.

the situation that the

themselves.

Social Engineering against staff?

view has become ordinary? I once

One option is to do another

MY

Obviously, it is essential

Can they cut fences or pop doors?

to ensure confidentiality

CY

asked the then security manager of

security risk review – this time

It is also necessary to remind the

is maintained and that the

Sydney Opera House, as we stepped

from first principles, putting

team that they are not to break any

weaknesses are only reported to

out onto the forecourt with the sun

previous assessments aside and

laws but can report on how illegal

those who need to know.

sparkling off the wakes of the

starting from absolute scratch. If

means could be used.

ferries, the Bridge towering off to

done objectively and as if for a new

one side and the Botanic Gardens

business it should produce, if not

vectors and motives and ensure

that dealt with sensitive corporate

lush on the other, if they ever forgot

a different range of security risks,

they are realistic and relevant in

data and had processes in place

where they worked. The answer was

at least an honest review of assets,

relation to the organisation. There

to manage and control the flow

“yes, sometimes”.

threats, risks and outcomes. As

has been a tendency to “Blue Sky”

of information, but had failed to

the potential for self-propagating

threat vectors and thereby include

notice that they employed foreign

become so familiar with our work

sameness will exist, perhaps the

all sorts of unrealistic scenarios.

nationals from countries that

environment, with normal business

use of an external consultant

Consideration should be given

were direct competitors. While

and the ‘usual suspects’ that we

to conduct an enterprise-level

to what is ‘probable’ rather than

there was no obvious evidence

can fail to see what has changed

security risk assessment, without

‘possible’.

of corporate espionage, the

or what has always been there and

access to the previous reports,

never noticed.

may assist.

It is the same with our risks. We

Managers all talk about

The second option is to

Discuss the possible attack

A ‘first principles’ review can help establish a new or revised baseline for security. However, it

CMY

One example where this was of benefit was an organisation

possibility certainly existed with great potential cost. We need to step back and

foreseeable risks; but foreseeable

have outsiders test the validity

can still be biased by corporate

see both the beauty and terror

to whom? What if we are so

of the existing risk mitigation

prejudices and blind spots. A Red

of the wider view and remember

comfortable that we don’t see the

methodologies. The use of a “Red

Team review, if appropriately

where we work.

things around us that others do,

Team”. However, care must be

managed and controlled without

particularly those in the future

taken when considering having an

inflicting ‘known wisdom’ on the

is a recognised thought leader

sitting in a court room who have had

external agency deliberately try to

external assessors, can provide a

in the field of security. He can

time to prepare with the advantage

identify and prosecute holes in the

valuable and relevant snapshot

be contacted at donwilliams@

of hindsight?

security structure.

of exposures and vulnerabilities,

dswconsulting.com.au. n

28 // SECURITY SOLUTIONS

014-033_SSM109 Regulars.indd 28

K

Don Williams CPP RSecP ASecM

securitysolutionsmagazine.com

21/08/2017 10:25 am


NEW INT-QUADIP For PB- Series Quad Beams

C

M

Y

CM

MY

CY

CMY

K

IP INTERFACE MODULE

LAN/WAN

With the new IP interface module, our intelligent PB- series Quad Beams are as easy as IP cameras to install and integrate with leading VMS solutions.

VMS

Most intruder detection systems rely on legacy technologies which require a number of third-party products and man-hours to install. The INT-QUADIP module utilises infrastructures already in place with CCTV, Access Control, and other security systems; dramatically reducing installation costs whilst providing a fully integrated security system which can be easily expanded and configured as desired.

KEY SPECIFICATIONS ● ● ● ●

PoE Class 3 IEEE 802.3af VMS Compatible Direct control for cameras including: - Axis - Bosch - Hikvision - Sony

● Plug & play web browser interface ● No software installation required ● One cable installation

PB-IN-HF/HFA The ultimate in trouble free perimeter detection for distances up to 200m.

1300 366 851 www.seadan.com.au 014-033_SSM109 Regulars.indd 29

PB-F/FA Single channel quad beams ideal for simple perimeter systems.

PB-IN-100AT Anti-crawl beam for high security perimeters up to 100m.

PB-KH TAKEX quad beam performance for use in beam towers.

(02) 9427 2677 www.sprintintercom.au

21/08/2017 10:25 am


EVENTS

Integrate

offers industry certification and

is invitation only and intended for

This conference will provide

29–31 August 2017

training with tailored programs

Australia’s most senior IT leaders

CISO professionals with a unique

Melbourne Convention and

from InfoComm International

to gather for a strategic event in

opportunity to learn and interact

Exhibition Centre

and CEDIA.

order to exchange knowledge

with their peers through a series of

and interact as one over a range

professionally-led sessions hosted

Now entering its ninth year,

• Experience – Integrate is your

Integrate is Australia’s premier AV

opportunity to interact and

of important issues facing the

by both international and local

and Integration trade show. The

test the latest cutting-edge

industry. The one-to-one meetings

experts, allowing all attendees the

event is a hub of activity for local

innovations in the industry and

with leading supplier companies

opportunity to be informed by front

and global brands to showcase

talk to the specialists behind

will also provide a wealth of

line executives while also having

solutions and products to AV

these leading products.

knowledge and offer opportunities

the opportunity to engage with

for all attending delegates, while

a unique group of key suppliers

technicians and corporate end-

• Network – As the leading AV

users, meet with buyers, integrators

event in the Australasia region,

the informal networking sessions

through targeted pre-arranged

and distributors, and celebrate the

with visitors and suppliers

promise to create a unique

meeting sessions.

latest industry developments.

coming from all corners of

interactive forum.

• Explore – With over 130

the globe. Integrate offers

exhibitors showcasing their

an unrivaled networking

latest products and services in

opportunity for the industry to

AV and solution technology, you

meet annually and exchange

are going to wish you had more

news and insights.

Visit cioleadersaustralia.com for

Visit cisoleaders.com.au for more information.

more information.

CISO Leaders Australia Summit

ASIS International Australia Conference Contemporary Security Leadership

than three days to explore the

Visit integrate-expo.com for more

7 September 2017

In Australia

Integrate show floor!

information.

Sydney, Australia

19 October 2017

The CISO Leaders Summit Australia

Melbourne Convention and

will highlight the emerging

Exhibition Centre

speakers, global brands and

CIO Leaders Summit Australia 2017

technologies that are leading the

The ASIS International Australia

product specialists as they share

6 September 2017

way and will examine current

Conference 2017 is the premier

their insight into the latest in

Sydney, Australia

challenges that CISOs are faced

gathering of security professionals.

AV technology. Integrate also

The CIO Leaders Summit Australia

with throughout 2017 and beyond.

The conference provides an

• Learn – Learn from internationally renowned

30 // SECURITY SOLUTIONS

014-033_SSM109 Regulars.indd 30

securitysolutionsmagazine.com

21/08/2017 10:25 am

dorma


Co m

es Sec at ee th urit st e yE xpo and H futur e , fo 2 r yo 2, ur cha nce

WI aG

oP

ro V

ide

N

to

oC am

era

The c-lever range -The perfect symbiosis of technology and design. Since the launch of the smartphone, it’s been clear that intelligent secure technology and design are not mutually exclusive.

Come see the future

Our designers have taken inspiration from such developments and created shapes that stylishly combine aesthetic and functional secure requirements. Come visit stand H22 at the Security Exhibition & Conference to learn more about our c-lever range and our security solutions to meet your business requirements.

1800 675 411 www.dormakaba.com.au

dormakaba_c-lever x 275mm_SS#107_108_240517.indd 2 014-033_SSM109air_210mm Regulars.indd 31

6/2/2017 9:21:54 AMam 21/08/2017 10:25


EVENTS established platform for education

suppliers, to be recognised and for

and business exchange, addressing

their success to be celebrated.

the key trends and issues facing

The criteria for these awards

• Connected Security Expo (CSE) moved to the ISC West show floor in 2017! As the digital

• bring new and leading solutions in operational efficiency to the market

security professionals locally

are based on extensive research

and physical worlds collide, it

and globally.

on key factors that contribute

is increasingly important for

Key topics:

to and characterise outstanding

industry professionals to protect

• terrorism

performance. This research can be

their organisations and clients

• cybersecurity

found at https://perpetuityresearch.

from both physical and cyber

multidisciplinary professions

• behavioural techniques

com/wp-content/uploads/2014/09/

threats. CSE provides holistic

to have a voice and achieve

• security management

Aspiring-to-Excellence.pdf

solutions for today’s connected

• emergency management.

The OSPAs are being set-up

organisations.

• deliver forefront trends for running more sustainable facilities and workplaces • foster a community of

recognition • redefine the future of the

in collaboration with security

Working with SIA, ISC West also

industry and challenge

The conference is a great

associations and groups across

features world-class education

traditional perceptions of

opportunity to:

many countries.

to learn about every facet of the

• engage with peers and

By researching and

colleagues from the public and

standardising the award categories

private sectors

and criteria, the OSPAs scheme

security industry. Visit www.iscwest.com for more

facility management. Visit www.totalfacilities.com.au for more information.

information.

accelerating the future of the

countries to run their own

Total Facilities

Security Exhibition & Conference 2018

security profession.

evidence-based OSPAs schemes

18–19 April 2018

25–27 July 2018

while maintaining an ability to

Melbourne Convention and

Melbourne Convention and

Who should attend the event:

compete on an international level

Exhibition Centre, Melbourne

Exhibition Centre, Melbourne

• security professionals across the

in the future – World OSPAs.

Returning to Melbourne with an

In 2018, the Security Exhibition

exciting new proposition, Total

& Conference is heading back to

more information or to make a

Facilities now unites both facilities

Melbourne.

nomination.

and workplace professionals in the

• join industry leaders

public and private sectors • security risk management professionals

provides an opportunity for

Visit au.theospas.com for

• security service providers • security consultants

ISC West

• government and law

11–13 April 2018

The Security Exhibition &

ultimate industry destination for

Conference is the industry’s annual

the built and work environment.

opportunity to reunite for three days

Held annually between Sydney

of quality networking and unrivalled

Sands Expo Convention

and Melbourne, TFX is Australia’s

education alongside a showcase of

Contact events@asisvictoria.org.au

Center, Las Vegas

largest learning and networking

the most innovative solutions to the

or visit www.asisvictoria.org.au for

ISC West is the largest security

event for facilities and workplace

Australian market. For over three

more information.

industry trade show in the US.

management professions seeking

decades, it has been the largest and

At ISC West you will have the

solutions for creating more efficient,

most established commercial event

The 2017 Australian OSPAs

chance to meet with technical

sustainable and productive facilities

for the security industry in Australia,

representatives from 1,000+

and workplaces.

bringing together the entire supply

19 October 2017

exhibitors and brands in the

The River Room

security industry and network with

and efficient in its delivery

security professionals and end-users

Crown Casino, Melbourne

over 28,000 security professionals.

and provides real solutions to

to connect and create unparalleled

The Outstanding Security

In 2018, ISC West will offer

everyday operational challenges

business opportunities.

enforcement professionals.

Total Facilities is comprehensive

chain of manufacturers, distributors,

Performance Awards (OSPAs) are

attendees a host of attractions,

by connecting buyers and sellers to

pleased to announce the dates

including:

source innovation, debate current

forward to once again reuniting more

for the 2017 Australian awards.

• New products and technologies,

The entire team is looking

issues, share insights and create

than 4,500 security professionals

They will be working for the third

encompassing everything

opportunities for an invaluable

with over 150 leading suppliers.

year in a row with the prestigious

from access control to

community of professionals.

The 2018 show is set to see some

Australian Security Industry

unmanned vehicles.

Association Limited (ASIAL). The OSPAs recognise and

• Unmanned Security Expo,

interesting new innovations as well Our vision

as a host of new attractions.

introduced in 2017, is an event

We champion professionals

reward companies and individuals

within ISC West focusing on

who support the built and work

your diary. We look forward to seeing

across the security sector. They are

unmanned aerial vehicles

environment with a sense of

you again in Melbourne in 2018

designed to be both independent

(UAVs), unmanned ground

belonging and advocacy – the

for the Security Exhibition & ASIAL

and inclusive, providing an

robotics and vehicles (UGVs),

unsung heroes and behind-the-

Conference!

opportunity for outstanding

and the various software and

scenes forces. We will evolve and

performers, whether buyers or

applications that support them.

grow our offer year-on-year to:

32 // SECURITY SOLUTIONS

014-033_SSM109 Regulars.indd 32

Make sure you put the dates in

Visit securityexpo.com.au for more information. n

securitysolutionsmagazine.com

21/08/2017 10:25 am


Recognize and Analyze How often was he here this month?

Is he a known suspect?

How old is she?

Are they employees?

When, where did she enter?

Is this valued customer Mia Clark?

How many people are here? Is it too crowded in this area? New: Recorded media import and advanced investigation tools upload sets of videos recorded at a specific location and time to track possible participants in a crime find a person enrolled in an image database or search for an unknown person locate appearances in multiple videos make use of filters that specify timeframe, camera location, age range, gender and glasses

See it in action at Security Expo in Sydney, stand K26! 014-033_SSM109 Regulars.indd 33

21/08/2017 10:25 am


FEATURE

CISO On The Rise But Many Organisations Still Lacking Adequate Cybersecurity

34 // SECURITY SOLUTIONS

034-037_SSM109 Article 1.indd 34

securitysolutionsmagazine.com

21/08/2017 4:53 pm


BY JO STEWART-RATTRAY

securitysolutionsmagazine.com

034-037_SSM109 Article 1.indd 35

In my discussions with colleagues

According to ISACA’s State of

and peers, it is pleasing to see

Cyber Security 2017 research,

the importance of cybersecurity

65 percent of organisations

awareness is growing among

now have a dedicated chief

business leaders and board

information security officer (CISO)

directors. Unfortunately, this

on staff. This is a 15 percent

awareness and understanding of

increase compared to last year.

cyber threats has come at a price,

Additionally, a recent study by The

as the recent WannaCry and Petya

Australian Computer Society and

ransomware attacks demonstrate

Deloitte Access Economics predicts

how vulnerable and unprepared

information and communications

many organisations remain.

technologies (ICT) management

SECURITY SOLUTIONS // 35

21/08/2017 4:53 pm


FEATURE

and operations roles will grow

executed their

in Australia by 2.4 percent per

incident response plan

annum, with ICT technical and

having their wallets stolen,

• 53 percent report an increase

professional workers growing at

in the year-over-year

1.9 percent per annum.

number of attacks.

However, the ISACA research

To take another example, consumers used to worry about

Stagnant or reduced budgets could

also showed that, while

lead to an inability to keep up with

cybersecurity budgets have

the growing threat landscape,

expanded, the rate of growth is

especially considering many

slowing. Only half of the survey

enterprises are still experiencing

respondents anticipated growth

a shortage of skilled cybersecurity

in their budget – down 11 percent

professionals. This may result in

compared to the previous year.

CISOs having less budget available

This decreased growth comes

to prevent and respond to attacks.

at a time when cyber threats are increasing and becoming

Data is the New Black

more sophisticated. As the

At the turn of the century, the

research highlights:

mantra for businesses was

• 80 percent of security

‘knowledge is power’. As the

resulting in loss of money and

HOWEVER, THE ISACA RESEARCH ALSO SHOWED THAT, WHILE CYBERSECURITY BUDGETS HAVE EXPANDED, THE RATE OF GROWTH IS SLOWING.

credit cards. Today, with credit card companies having systems in place to immediately deal with theft, while still an annoying and time-consuming process, consumers are more concerned about the theft of a mobile. This results in a higher value loss – the loss of personal information, such as contacts and photos, and sensitive financial and business-related data. Thankfully, with businesses addressing mobile security and encryption, this threat is

leaders believe their

knowledge economy continues

decreasing rapidly. Now, hackers

enterprise will experience a

to evolve, data is now a currency

see a viable opportunity in the

cyberattack this year

being traded on the darknet like

emergence of the Internet of

commodities on the stock market.

Things (IoT). IoT has overtaken

• 50 percent of enterprises

36 // SECURITY SOLUTIONS

034-037_SSM109 Article 1.indd 36

securitysolutionsmagazine.com

21/08/2017 4:53 pm


mobile as a primary focus for cyber defences, as 97 percent of organisations see a rise in its usage. The rise of sophisticated

STAGNANT OR REDUCED BUDGETS COULD LEAD TO AN INABILITY TO KEEP UP WITH THE GROWING THREAT LANDSCAPE, ESPECIALLY CONSIDERING MANY ENTERPRISES ARE STILL EXPERIENCING A SHORTAGE OF SKILLED CYBERSECURITY PROFESSIONALS.

What can Businesses do to Protect Data?

a significant and concerning

1. Information sharing is

organisation faces and its

gap between the threats an

paramount. Enterprises

readiness to address those

must consider expanding

threats in a timely or effective

participation in information

manner. Cybersecurity

sharing and collaborative-

professionals face huge demands

analysis venues. Both better

to secure organisational

dissemination of what is

infrastructure, and teams

known and better intelligence

need to be properly trained,

gathering so that more is

resourced and prepared.”

known is needed to ensure

Enterprises should begin

that organisations are as well

planning strategies now

connected to information

to ensure that they are

on the latest threats as their

prepared by investing in talent

adversaries are.

retention, professional growth

2. Build and maintain a strong

opportunities, cross-training and

cybersecurity workforce.

other activities that maximise

Security professionals must

current staff and minimise the

not only be trained, but have

impact of attrition. The future

their skills maintained using

viability of their organisations

hands-on technical training

could well depend on it.

and performance-based assessment, which is why

Jo Stewart-Rattray has

this year ISACA developed

over 25 years’ experience in

the Cybersecurity Nexus

the IT industry. She specialises

(CSX)™ Training Platform.

in consulting in information

And this must be done while

security issues, with a particular

also assuring that these

emphasis on governance in both

professionals understand the

the commercial and operational

nature of the businesses for

areas of businesses. Jo provides

which they work.

strategic advice to organisations

3. Provide cybersecurity the

across a number of industry

resources required. Sixteen

sectors, including banking and

percent of survey respondents

finance, utilities, automotive

stated they do not have an

manufacturing, tertiary education,

incident response plan, and

retail and government. Jo heads

motivation of attackers is most

one in four organisations

ISACA’s Connecting Women

likely to be financial gain, and

have training budgets of less

Leaders in Technology and chairs

recent research from IBM showed

than US$1,000 (A$1330) per

the Branch Executive Committee of

most organisations pay the ransom.

cybersecurity team member.

the Australian Computer Society.

Financial motivations by hackers

Companies still do not have

She is also past chair of ISACA’s

are likely to spur the development

the skills they need or the

Audit Committee, Leadership

of increasingly sophisticated

plans in place to prepare for

Development Committee and

ransomware in the future. This

advanced cyber threats. These

Security Management Committee.

may mean an uptick in the amount

things take resources.

ransomware further illustrates that data is now a currency. Half of respondents indicated that the

This article is an extract of

of malware and its complexity.

My colleague, Christos

the ISACA State of Cyber Security

Just as credit card companies have

Dimitriadis, Ph.D., CISA, CISM,

2017, Part 2: Current Trends in

systems and processes in place

past ISACA board chair and

the Threat Landscape. The full

to deal with theft, enterprises

group head of information

report can be read at: https://

need to treat data like money and

security at INTRALOT,

cybersecurity.isaca.org/state-

protect it vigorously.

commented recently, “There is

of-cybersecurity n

securitysolutionsmagazine.com

034-037_SSM109 Article 1.indd 37

SECURITY SOLUTIONS // 37

21/08/2017 4:53 pm


ALARMS

38 // SECURITY SOLUTIONS

038-041_SSM109 Alarms.indd 38

securitysolutionsmagazine.com

21/08/2017 10:22 am


Taking place at the new

evident, not just from the increase

Awards”, sponsored by Sony.

NVR5224-24P-4KS2, a 24 Channel

International Convention Centre

in visitor numbers, but also the

These awards are a celebration

NVR capable of transmitting over

Sydney, from 26 to 28 July, the

look of the show. This year’s event

of the most innovative products

cable distances of up to 800m

32nd annual Security Conference

saw exhibitors invest more than

to hit the Australian market in

between the camera and NVR, a

and Exhibition returned to Sydney

ever before in their stands, with

the last 12 months. This year’s

huge increase in distance when

after a three-year absence and the

Inner Range producing one of

competition included around

compared to the current 100m

atmosphere was electric.

the most impressive stands ever

50 entries. Products were

limitation experienced across

seen at the show. Awards for this

judged on originality, impact

most traditional IP networks.

attendance, including the return

year’s exhibitors went to Ness

of innovation, measurability of

of some big name brands such as

Corporation, who were awarded

the benefits, and applicability

awarded to Avigilon for their

FLIR Systems, HID Global, Inner

Best Custom Stand over 36sqm,

to the Australian market by a

Appearance Search™ technology,

Range, Dahua, HIK Vision, Bosch,

Alarm.com, who won Best Custom

panel of leading security experts

a sophisticated deep learning

and so on, this year’s event was

Stand under 36sqm and Sententia,

including General Manager of

artificial intelligence (AI) search

the largest yet. Over three days,

won the Best Shell Scheme Stand

ASIAL, John Fleming and Editor of

engine technology. Appearance

more than 5000 visitors attended

with their team dressed up as the

Security Solutions Magazine, John

Search™ sorts through hours of

the show, an increase of 14% on

Cyber Security A-Team!

Bigelow among others.

footage with ease, to quickly locate

With 153 exhibitors in

visitor numbers for 2016 and

The 2017 show also saw the

Dahua Technology, one of

First Runner Up was

specific people and vehicles across

13% more than attended the last

release of an amazing array of

the world’s largest providers of

Sydney show back in 2013.

new products and technologies

video surveillance products and

Second Runner Up

as highlighted by the “2017

services, took out this year’s Best

was awarded to Amaryllo

Security Best New Products

New Product Award for the Dahua

International’s ATOM AR3S, the

The growth in both size and popularity of the show was

securitysolutionsmagazine.com

038-041_SSM109 Alarms.indd 39

an entire site.

SECURITY SOLUTIONS // 39

21/08/2017 10:22 am


ALARMS

W i I a s

A m o a r i

T a e t s

A c m o

world’s first professional IP66

at Doltone House in Sydney’s

a diverse range of topics

Security Solutions at Telstra;

certified outdoor robot camera.

Jones Bay Wharf as part of the

shaping the current security

Assistant Commissioner Mark

The ATOM AR3S recognises faces

annual Security Gala Dinner.

landscape including cyber

Murdoch, Commander Counter

as well as deciphering military-

The dinner runs alongside the

security, crisis management,

Terrorism & Special Tactics at

grade 256-bit encryption. The

Security Exhibition & Conference

terror preparedness, the

NSW Police; and Shara Evans,

AR3S is also fast to set up as it

and was attended by over 400

Commonwealth Games security,

Founder at Market Clarity.

can be powered from a standard

industry professionals.

supply chain management

Edison light bulb socket. The standard of entries for this

Running in conjunction with the exhibition, this year’s

Next year’s event will return to

and security risk management

Melbourne, taking place from the

to name a few.

25–27 July 2018 at the Melbourne

year’s awards was second to none,

ASIAL Security Conference and

making the judging decisions

Executive Briefing program

industry experts such as Danny

Those people wanting more

harder than ever with a special

was completely sold out. The

Baade, Head of Security at Gold

information, looking to book

mention going out to all entries.

program brought together

Coast 2018 Commonwealth

space or attend the conference

The awards were announced on

local and international thought

Games Corporation; Neil

program can visit

the evening of Thursday 27 July

leaders who addressed

Campbell, Director of Global

www.securityexpo.com.au n

40 // SECURITY SOLUTIONS

038-041_SSM109 Alarms.indd 40

Among those speaking were

Convention & Exhibition Centre.

securitysolutionsmagazine.com

21/08/2017 10:22 am

W n R a b

A fu t d


We are a leading player in the biometric identification market by pioneering In Motion Identification (IMID) access, a multimodal verification for instant, seamless, and non-invasive verification. Ask us about advanced features such as multi-modality, speed of identification, our committed accuracy, anti-fraud algorithm, double factor availability, restricted people alerts, simultaneous identification.

The solution is designed for enterprise and can be easily integrated with existing infrastructure. It can be added to any existing door, turnstile or speed stile, and any access control solution. Ask us about high availability, scalability, cyber security and encryption, multi-site management, traceability and auditability, our APIs and ease of integration.

FST Biometrics is a leading identity management solutions provider. The company’s IMID™ product line offers access control through its proprietary In Motion Identification technology. This provides the ultimate security and convenience for users, who are accurately identified without having to stop or slow down. IMID™ solutions integrate a fusion of biometric and analytic technologies that include face recognition, body behavior analytics and voice verification. For more information, please visit http://www.fstbm.com.

With IMID Access, authorized users do not have to slow down, sign in or stop. Rather, they are identified in motion, and granted seamless access to buildings and facilities. Ask us about our rich out of the box functionality, such as visitor management, time attendance, notifications, digital doorman and mobile applications.

038-041_SSM109 Alarms.indd 41

Add-On APAC Innovative Solutions offers converged physical, cyber and communication security solutions. Operating across the Asia Pacific region, we harness advanced products and ground-breaking technologies, helping our customers transform the way they protect people, information and assets. Learn more about us at http://www.addonapac.com. Add-On APAC Australia Pty Ltd info@addonapac.com, 03 9607 8465

IMID is the future of access control. Prefer to take your own conclusions?

Ask us for a product demonstration, and see it for yourself.

21/08/2017 10:22 am


OPERATIONS

P R I M A 42 // SECURITY SOLUTIONS

042-047_SSM109 Operations.indd 42

securitysolutionsmagazine.com

21/08/2017 10:23 am


L F E A R Key Considerations For Operational Survival BY RICHARD KAY

Fear is a feeling induced by

or in anticipation or expectation of

emotions, with fear one of them,

responses, so it has been preserved

perceived danger or threat

a future threat perceived as a risk

but which also includes acute

throughout evolution.

that occurs in certain types of

to body or life. The fear response

stress reaction, anger, angst,

organisms, which causes a change

arises from the perception of

anxiety, fright, horror, joy, panic

danger; if people did not feel it, they

in metabolic and organ functions

danger leading to confrontation

and sadness. Fear is related to,

could not protect themselves from

and ultimately a change in

with, or escape/avoidance (fight-or-

but should be distinguished from,

legitimate threats. But often people

behaviour, such as fleeing, hiding or

flight response), which in extreme

anxiety, which occurs as the result

fear situations that are far from life

freezing from perceived traumatic

cases of fear (terror) can be a freeze

of threats that are perceived to be

or death, and thus hang back for

events. Fear in human beings may

response or paralysis.

uncontrollable or unavoidable. The

no good reason. In humans and

fear response serves survival by

animals, fear is modulated by the

generating appropriate behavioural

process of cognition and learning.

occur in response to a specific stimulus occurring in the present,

securitysolutionsmagazine.com

042-047_SSM109 Operations.indd 43

Psychologists suggest that there is only a small set of innate

Fear is a vital response to

SECURITY SOLUTIONS // 43

21/08/2017 10:23 am


OPERATIONS Thus fear is judged as rational

humans that were quick to fear

Fear in violent confrontations can

experiences necessary to ensure

or appropriate and irrational or

dangerous situations were more

take many forms:

a high level of survivability, but

inappropriate. An irrational fear is

likely to survive and reproduce,

• fear of getting harmed or

things can take a negative turn if

called a phobia.

preparedness is a genetic effect

Fear of the unknown

that is the result of natural

harming others • fear of harm to fellow officers

trainees are given the experience of losing, even in simulated

(irrational fear) can be defined

selection. From an evolutionary

as false evidence appearing

perspective, different fears may

real and is caused by negative

be adaptations that have been

thinking which arises from

useful in an evolutionary past.

anxiety, and it can branch out

Some fears, such as fear of heights,

to many areas. Being scared

may be common to all mammals.

makes people anticipate and

Other fears, such as fear of snakes,

aggravate of what may lie ahead

may be common to all simians.

These fears can exist

There are four levels of

rather than plan and evaluate.

Still others, such as fear of mice

simultaneously, clouding the

physiological performance.

The ambiguity of situations

and insects, may be unique to

focus of what needs to be

There is no specific heart rate

that tend to be uncertain and

humans. Fear is high only if the

accomplished. When dealing

associated with Condition White

unpredictable can cause anxiety

observed risk and seriousness

with violent confrontations,

and Yellow; the difference is more

and other psychological and

both are high, and is low if risk or

officers do not need these mental

psychological than physiological.

physical problems, especially in

seriousness is low.

distractions to cloud their

However, as the level of arousal

judgement and cause hesitation.

increases, the ‘conditions’ can

those who engage it constantly.

or bystanders • fear of legal litigation or procedural inquiry

encounters. It also creates neurological deficiency that can be difficult to overcome.

• fear of judgement after the fact • fear of issues relating to religious beliefs.

Consequences on Operational Performance

Ambiguous and mixed messages

Signs and Symptoms

can affect self-esteem and self-

Many physiological changes in

in four main ways – those who

rate levels.

confidence. Developing a sense

the body are associated with

have no fear (no time, caught by

• Condition White is the lowest

of equanimity to handle various

fear. An innate response for

surprise) and do the job, those

level of readiness, unfocused,

situations is often advocated as an

coping with danger, it works by:

who have fear and no one knows

unprepared, helpless and

antidote to irrational fear and is

accelerating the breathing rate

it and they do the job, those who

an essential skill.

(hyperventilation) and heart

have fear and everyone knows

Fear manifests itself in people

be associated with specific heart

vulnerable and in denial. • Condition Yellow is the

rate; constricting the peripheral

it, but it does not matter because

level of basic alertness and

as a result of learning, called fear

blood vessels, leading to blushing

they do the job, and those who

readiness, psychologically

conditioning in psychology. Fear

and vasodilation of the central

have fear and everyone knows it

can be learned by experiencing

vessels (pooling); increasing

because they failed to do the job.

or watching a traumatic accident.

muscle tension, including the

Humans usually vacillate between

optimal survival and combat

There are studies looking at areas

muscles attached to each hair

all four stages, with a propensity

performance (115–145bpm),

of the brain that are affected in

follicle to contract and causing

towards one or another.

where complex motor skills,

relation to fear. When looking at

goose bumps (piloerection) to

these areas, such as the amygdala,

make a cold person warmer or

is stress inoculation training,

cognitive reaction time are

it was proposed that people learn

a frightened animal look more

which places an obvious fork in

all at their peak, but there is

to fear regardless of whether they

impressive; sweating; increasing

a person’s survival psychology

a price – at about 115bpm,

themselves have experienced

blood glucose; increasing serum

pathway at the point of ‘harm’.

fine-motor skills begin to

trauma, or if they have observed

calcium; increasing white

If officers are conditioned to

the fear in others. Fear is also

blood cells called neutrophilic

stop when they are harmed,

affected by cultural and historical

leukocytes; heightening alertness,

they program an undesirable

accelerated heart rate levels

context. There are consistent

leading to sleep disturbance; and

and potentially self-destructive

(145–175bpm). For most

cross-cultural differences in how

creating a feeling of ‘butterflies’

action into their mind. Giving

officers, 145bpm represents

people respond to fear. Display

in the stomach (dyspepsia).

officers the experience of losing

a level at which performance

rules affect how likely people are

This primitive mechanism

in a simulation actually begins to

begins to break down, but

to show the facial expression of

may help an organism survive

condition a risk-aversion pathway

for some this is the optimal

fear and other emotions.

by either running away or

in the brain to which they may

level of arousal, enabling

fighting the danger. With the

turn during similar experiences

extraordinary performance,

learned, the capacity to fear is

series of physiological changes,

in the future – they may actually

a process called stress

part of human nature. Studies

the consciousness realises an

stop and give up as they were

have found that certain fears

emotion of fear.

programmed to do in training.

People develop specific fears

Although many fears are

In violent confrontations,

The key to managing fear

prepared for combat. • Condition Red is the level of

visual reaction time and

deteriorate. • Condition Grey exists at

acclimatisation. • Condition Black is when the

When properly structured,

sympathetic nervous system

– a phenomenon known as

everyone feels fear to some

reality-based training can provide

arousal induces a heart rate

preparedness. Because early

degree, even experienced officers.

officers with those essential

above 175bpm, and cognitive

are more common than others

44 // SECURITY SOLUTIONS

042-047_SSM109 Operations.indd 44

securitysolutionsmagazine.com

21/08/2017 10:23 am


Effects of FearInduced Heart Rate Increase (bpm)

adrenaline has been introduced

includes preparation for the

into the system, the resulting

possibility of being shot at and

startle response contraction (of

preparation for the possibility

There is a tremendous difference

For those who do not push

the hands) can generate as much

of being hit. It is about being

between the performance impact

the envelope through physical

as 25lbs of pressure. That amount

prepared ahead of time for

of heart rate increase from fear

fitness and repetitive training,

of force is approximately twice

operational reality.

and heart rate increase from

Condition Grey is generally a

the amount needed to discharge a

physical exercise. This data is

realm in which complex motor

double action handgun.

for hormonal induced heart

skills begin to break down and

rate increases resulting from

bilateral symmetry begins to set

to prevent this convulsive clutch

can act. The best equipment

sympathetic nervous system

in, meaning that what an officer

response. One is to keep the

and training in the world

arousal. Exercise-induced

does with one hand he is likely to

finger off the trigger until it

cannot make up for the officer

increases do not have the same

do with the other.

is time to engage the target, a

unprepared to use available

technique that has become the

assets. Officers must mentally

processing deteriorates as the midbrain takes over from the forebrain.

effect. Hormonal-induced

Bilateral symmetry can have

There are many safeguards

Mental conditioning is extremely important. The brain must decide before the body

performance and strength

grave consequences for an officer

standard for firearm training.

prepare themselves to deal

increases can achieve 100 percent

in a tense situation where he is

Even that is not a guarantee,

with any situation at any time.

of potential maximum within 10

holding a firearm on a subject.

since the clutch response can

A poor survival mindset leads

seconds, but drop 55 percent after

Say the subject attempts to flee

sometimes be so intense that

to indecisiveness that can

30 seconds, 35 percent after 60

and the officer grabs him with

the finger will slip back into

jeopardise all parties involved.

seconds and 31 percent after 90

his free hand. The accelerated

the trigger guard causing an

A strong survival mindset

seconds. It takes three minutes

heartbeat causes bilateral

unintentional discharge. Another

helps instil the confidence and

of rest to ‘recharge’ the system.

symmetry, so that as the officer

safeguard is to ensure muzzle

commitment necessary to survive

Any extended period of relaxation

grabs a fistful of the subject’s

discipline. The best safeguard,

and prevail.

after intense sympathetic nervous

shirt with his support hand, he

however, is for an officer to not

system arousal can result in a

has a convulsive clutch response

allow his heart rate to get too

occasion in operations; they sink

parasympathetic backlash, with

in his dominant hand, which may

high. Calm people are much less

to the level of their training.

significant drops in energy level,

cause an unintentional discharge

likely to make these kinds of

Whatever is drilled in training

heart rate and blood pressure.

of the weapon. Bilateral

mistakes. To remain calm, and

comes out the other end in

This can manifest itself as

symmetry can also happen when

control heart rate, officers should

operations. There must be a

normal shock symptoms and/or

a person is startled. If a person

engage in tactical breathing.

continual effort to develop

profound exhaustion.

is under extreme stress and

One tool to control

Officers do not rise to the

realistic simulations training so

physiological response is

that officers develop skill sets

autogenic breathing, a technique

that transfer to reality. Everyone

that can be used in a stressful

has good and bad days. Do not

situation to control sympathetic

let officers destroy themselves

nervous system reactions. The

because of a bad day, and do not

more an officer practises it, the

destroy others because they had

quicker the effects kick in. It

a bad one. Take pride in the good

can be used before, during and

days and strive to constantly

after a combat situation. When

improve. While it is acceptable to

used before, it quickly calms and

have a bad day, it is unacceptable

prepares an officer to function at

not to train and improve and to

his best in a hostile environment.

not use available resources to

After a critical incident, it is

make sure that the bad day never

a highly effective tool to help

happens again.

delink the physiological arousal from the memory of the event.

internationally certified tactical

it, he should keep tuning it

instructor-trainer, director

until he gets to the level that

and senior trainer of Modern

works for him.

Combatives, a provider of

Statistics show that over a

securitysolutionsmagazine.com

042-047_SSM109 Operations.indd 45

Richard Kay is an

Once an officer starts using

operational safety training for the

third of all officers killed on

public safety sector. Visit www.

duty did not defend themselves.

moderncombatives.com.au for

The solution lies in training that

more information. n

SECURITY SOLUTIONS // 45

21/08/2017 10:23 am


CCTV

46 // SECURITY SOLUTIONS

046-049_SSM109 CCTV B.indd 46

securitysolutionsmagazine.com

21/08/2017 10:26 am


A REVOLUTION IN

VIDEO

A N A LY T I C S How Deep-Learning Makes Video Surveillance Smarter BY OLIVER PHILIPPOU, Senior Analyst, Video Surveillance, IHS Markit

Why is the security industry talking about artificial intelligence? • IHS Markit forecasts the total market for paid-for video analytics market will reach $700 million in 2021. • This growth attributed to the widespread adoption of emerging analytics technologies, specifically deep learning architectures, which promise to alter not just the video analytics landscape, but the video surveillance industry as a whole. • The 2017 edition of the IHS Markit Report on Video Analytics in Security and Business Intelligence is now available.

securitysolutionsmagazine.com

046-049_SSM109 CCTV B.indd 47

SECURITY SOLUTIONS // 47

21/08/2017 10:26 am


CCTV

World Market For Deep-Learning Video Analytics Software by Application Type in 2021

Security - 53% Safety - 13% Business Intelligence - 22% Traffic Management - 12%

For a video camera, the world

facilitate a significant leap in the

1) Accuracy

need an analytics solution that is

is not a straightforward place.

capabilities of video analytics.

A long held complaint levied

100 percent accurate 100 percent

It is a mirage of complex detail,

The last couple of years has seen

against traditional analytics

of the time, many user require

subtle nuances, and ever-changing

a large increase in research and

products was that these

a security system be as close to

scenes. As such, for years the

development in deep-learning

algorithms were unable to

infallible as possible. Users in

reliability of video analytics has

neural networks, proving

distinguish between objects

the critical infrastructure sector,

been extremely variable, with

their capabilities, generating

and behaviours that a human

for instance, cannot afford to

vendors struggling to develop

considerable excitement, and

being would have no problem

miss a breach in their security;

algorithms that could function

putting them within reach of a

classifying. This lack of intuition

and can spend a large amount of

in complex real world scenes.

much wider user group.

on the part of computer vision

money investigating false alarms.

algorithms results either in

Deep learning algorithms have

However, the industry has come a

Deep learning appears to be

long way in recent years, and the

able to offer a level of accuracy

missed security breaches or

proven their ability to learn to

traditional “rules-based” video

and reliability in object and

false alarms. The ability of deep

achieve 99.9 percent accuracy

analytics have steadily improved

behaviour classification, which

learning algorithms to view a

in certain tasks, in controlled

their capability. These analytics

not only enables video analytics

scene intuitively, in the same way

environments like airport

are still not quite able to cope with

to finally deliver on some of the

as a human viewer, means that

immigration face recognition

the detailed and complex world

lofty but as yet unrealised claims

detection accuracy increases, and

applications, where conventional

in which we live, particularly

made in the past, but pushes

false alarm rates fall, dramatically.

systems would struggle to achieve

when dealing with scenarios

capabilities far beyond them.

Neural networks allow a

95 percent (according to Paul Sun,

outside a highly controlled

Broadly speaking, there are two

computer to apply a series of

CEO, IronYun – Deep learning

environment. Enter ‘deep-learning

main areas in which deep learning

assessments to a given situation.

technology applications for video

analytics’. Deep-learning analytics

analytics offer significant benefits

This is a significant development

surveillance). In many security

are poised to revolutionise

over the technology that has

for the video analytics industry.

use cases, these few percentage

the security industry, and

preceded it. They are:

Although some end-users may not

points make all the difference.

48 // SECURITY SOLUTIONS

046-049_SSM109 CCTV B.indd 48

securitysolutionsmagazine.com

21/08/2017 10:26 am


with approximately one billion

to radically increase the

So what is driving adoption of video analytics based on deep learning?

effectiveness of a computer to

There are numerous factors

power with even faster iteration.

reliably classify objects and

that appear likely to drive the

The rapid development of

behaviour. It is also making

widespread adoption of deep

GPUs, supercomputers, and

possible the processing and

learning analytics across a variety

cloud computing and other

analysis of increasing volumes

of video surveillance application

high performance hardware

of video footage in a fraction of

types. One major factor is the

platforms has facilitated the rise

the time that previous analytics

astonishing volume of data

of deep-learning analytics.

would need. Companies such as

generated by video surveillance

Avigilon, Qognify, and IronYun

systems each day. Hundreds of

are becoming more and more

are now marketing analytics that

petabytes of video footage are

common. China’s safe city

leverage deep learning to turn

recorded daily, and this figure

initiatives have, for example,

vast amounts of video footage into

is rising all the time. This is not

been expanding in complexity

usable information in a fraction of

just thanks to an increase in

and scope since their inception

the time it would have taken in the

resolution, but also a general

in 2003: this trend is reviewed

past. Video processing software

increase in the number of video

in depth in the Safe City 2017

that allows users to interact

feeds. Indeed, video surveillance

report from IHS Markit. Deep-

with their surveillance footage

data makes up over half of the

learning video analytics will be

using a Google-like interface and

volume of what could be referred

an essential facilitator to realise

natural language search terms

to as “big data” and the proportion

drastically reduces the amount

is rising significantly. While the

of time it takes to find relevant

volume of video data is huge and

video footage in an archive

increasing, the ability of security

that might store video from

companies and end-users to

thousands of feeds.

monitor and review it without

2) Power Not only has deep learning demonstrated its capacity

Facial recognition is also an

assistance is nowhere near up

neurons. Today, only a few GPUs are required to achieve the same sort of computational

Safe and smart city projects

FACIAL RECOGNITION IS ALSO AN AREA THAT HAS BENEFITTED THE MOST FROM DEEP LEARNING ARCHITECTURE.

the safe city concept. Indeed, we are increasingly seeing facial recognition, which more often than not requires deep-learning architecture to function reliably, become a required feature in Chinese tender documents.

area that has benefitted the most

to the task. Deep learning offers

from deep learning architecture.

a number of advantages in this

Indeed, most facial recognition

context, allowing faster, more

analytics on the market today

intuitive review and indexing of

feature some kind of deep

recorded footage, and reducing

learning. Not only does deep

the time it takes to find relevant

system that can operate efficiently

learning increase the accuracy of

images from days, weeks or even

in real time, with much of the

facial recognition sensors, it also

months, down to minutes.

process being automated. Highly

enables faces to be identified in

Computing power will also

Huge amounts of data will be generated from the thousands of sensors deployed across safe cities. A key element of the safe city concept is an integrated

reliable analytics, that are capable

larger and more crowded scenes.

play a significant facilitating

of making inferences on a more

In the wake of recent terrorist

role; deep learning video

abstract level than traditional

attacks on crowded venues,

analytics promise unprecedented

machine-vision algorithms,

this capability could radically

performance, but also require

in a wider variety of weather

change the whole approach to

significantly more computational

conditions, will be essential to

security monitoring, allowing law

power than many traditional

reduce false alarms and the

enforcement to track suspects with

video analytics products. The

level of manpower required to

far greater speed and efficiency.

deep-learning model requires

monitor video feeds.

Herta is one such company that

very many samples, and carries

specialises in facial recognition in

out very many calculations. In

large crowds. Because of this, IHS

the past, hardware devices were

Analytics in Security and

Markit expects verticals such as

incapable of processing complex

Business Intelligence Report –

large shopping malls, airports, and

deep-learning models with over

2017 includes dedicated in-depth

other transportation hubs, along

a hundred layers. For example,

research into deep-learning

with city surveillance projects,

in 2011, Google’s DeepMind used

video analytics market, and is

to be early adopters of this

1,000 devices with 16,000 CPUs

available for purchase through:

type of analytics.

to simulate a neural network

technology.ihs.com. n

securitysolutionsmagazine.com

046-049_SSM109 CCTV B.indd 49

The IHS Markit Video

SECURITY SOLUTIONS // 49

21/08/2017 10:26 am


BUSINESS

DYNAMIC RISK EQUILIBRIUM THE NEXT WAVE

50 // SECURITY SOLUTIONS

050-053_SSM109 Business.indd 50

securitysolutionsmagazine.com

21/08/2017 10:30 am


BY DR GAV SCHNEIDER AND KATE DOWN

The term ‘VUCA’, made popular

now face frustration due to a

risk professionals know that to

obviously these can be improved

by the United States military in

VUCA reality. Since Michael

succeed, business and cultural

and developed over time with

the late 1990s and now adopted

Porter’s groundbreaking work

change must be viewed from a

the right focus and intent. So,

by business schools all over the

in the 1980s, workers have

human psychology perspective.

how is this done? With focus on

world, shows the criticality of

become adept at developing

It takes organisational attributes

several aspects:

dynamic thinking and action.

strategy but unfortunately, as

such as agility and resilience

1. People need to be taught

VUCA stands for volatility,

most experienced leaders know,

to be able to adapt planning as

situational awareness – if

uncertainty, complexity and

they are not nearly as good

required to achieve objectives,

they cannot be present and

ambiguity. It highlights the key

at executing it. This has to do

or even to be wise enough to

orientate, how can they

underlying factors that everyone

with the persistent myth that

know when objectives should

know how to bounce back or

faces in everyday decision making

good execution means always

change. This presents the next

in the modern age. This also

sticking to a plan. It has been well

issue – every industry sector

makes sense from a sociocultural

documented that organisations

can now be seen starting to add

whole-of-person approach

evolutionary perspective because

spend huge amounts of time and

these catchy buzz words: “let’s

– flexible work structures

VUCA encapsulates the human

energy mapping out who should

be agile, let’s be resilient and

and changing trends mean

ancestral nature for adapting

do what and with what resources

because we said we are it has now

people cannot be controlled

to novelty and to change

(Sull et al, 2015). But they cannot

happened!” Or has it…

based on ‘when they are in

itself (Potts, 1998).

anticipate every event. In

Research in the field of brain

Since organisations are

where to move to? 2. It is necessary to embrace the

our buildings’ any more.

volatile markets, managers and

comprised of groups of people,

People need to be educated

science has shown the human

employees need to be agile and

the facets of group interaction

and empowered with the

brain is designed to:

that is not easy. Issues such as

combined with the individual

skills to apply ongoing

1. Solve problems relating

digital disruption, technological

attributes of the people who make

personal development

to survival in an

integration, globalisation and

up these groups is where the

and decision-making skills

unstable environment.

numerous other variables

disjoin seems to lie. People do not

continuously prove that long-term,

just become agile and resilient

3. Mindfulness needs to be

2. Do so in almost constant motion (Medina, 2014).

(Bernstein et al, 2016).

unbending plans serve as a great

because a mission statement is

developed so that people

However, much to the detriment

starting point, but if they are not

changed and catchy posters are

are present when they need

of workplace health, there is

structured with inbuilt flexibility

put up around the office. In fact,

to be (Csikszentmihalyi,

a gap between what science

they usually never work.

if one looks at the core connects

1990) – this has never

behind these two attributes from

been harder in a world of

knows and what businesses do.

Based on this it would seem

This has become increasingly

simple enough to focus planning

a definitional perspective, the

constant communications

evident through the upward

on shorter term cycles and have

complexity in assuming that

and distractions. How many

trend in stress and mental health

inbuilt flexibility. However,

people just get it can be seen:

readers want to check emails

issues and downward trend in

modern age humans struggle

• Resilience – the ability

or look on social media while

productivity. Business leaders and

for stability and continuity and

to bounce back and

strategy professionals who used

resist change, so this is much

exhibit toughness.

to be fixated with the ‘critical’

easier said than done. It is at

need for the three to five year

this point it makes sense to ask

course and direction quickly

they can mitigate the realities of

and longer strategic plan that

why there is resistance to change

and effectively.

cognitive and heuristics biases

factored all variables and strived

from a human psychological

It needs to be acknowledged that

that everyone has, and that

to minimise uncertainty so that

point of view; however,

everyone has different natural

impact decision making and

results could be guaranteed

organisations rarely do. Leading

abilities in these two aspects, but

performance (Ariely, 2008).

securitysolutionsmagazine.com

050-053_SSM109 Business.indd 51

• Agility – the ability to change

reading this article? 4. People need to be taught to understand themselves so that

SECURITY SOLUTIONS // 51

21/08/2017 10:30 am


BUSINESS 5. Enhanced understanding of others and empathy need to be taught so that people can

and governance activity that the

state of mind is now becoming

research supporting DRE that

business ‘has to do’.

well understood. Neuroscience

highly functional organisations

proposes the brain is organised

are those who operate not as a

The importance of cultivating

try and understand each other

DRE is reinforced when

to minimise threat and maximise

transactional network, but as an

better and play to each other’s

attention is focused towards

reward (Rock, 2008). Meaning,

evolved social network. Failed

strengths (Cuddy et al, 2013) to

how today’s workforce is faced

every person’s brain constantly

organisations tend to ignore

achieve workplace harmony

with increasingly complex

scans the environment for

the people dimension, treating

and organisational objectives.

environments, as well as

perceived threats, which leads

the human resource as simply

Only when the above has been

psychological and physical

to the acknowledgement that

cogs in the machine, which

achieved can businesses begin

demands that stem from a fast-

high performing workplaces

inevitably results in the loss of

to start expecting their people to

paced and volatile economy. A

are a by-product of two distinct

those resources. The leaders of

translate the relevant skills and

paper from Harvard Business

forces that mutually influence

industry are those who view their

attributes into the workplace,

School on building a resilient

one another. These forces

human assets as exactly that: an

and develop the ability to be

workplace culture highlights the

are positive organisations (or

asset to be maximised, a potential

organisationally agile and

particularly harsh toll on mental

environment and culture) and

to be utilised and an investment

resilient. Of course, it would be

health with workplace stress

positive individuals, based on

for return. The higher valued,

remiss to ignore the importance

and workforce disengagement

mindset and behaviours. It is

higher trained, higher engaged

of systems and processes but,

(Everly, 2011). In fact, a 2012

accepted that it is the mindset

the workforce, the greater return

in the end, it is people that have

Towers Watson study found that

of an individual that determines

on the investment. Dynamic risk

to use and apply these systems

in most organisations, only 35

their high levels of productivity,

equilibrium is thus the output of

and processes, so if the people

percent of employees said they

profitability, engagement,

a strategic and tactical balance

part is not right, the system

were engaged. In other words,

innovation and quality of life

between people and process that

and process is bound to fail. In

65 percent of employees have

(Kabat-Zinn, 1993). This is a

is constantly evolving.

order to drive this, a focused

mentally checked out, causing

double-edged sword: individual

cultural and behavioural change

productivity, innovation and

resilience can be developed

For a full list of

approach is needed, which

creativity to plummet. The study

through training the person

references, email info@

usually takes around three to

also found that 38 percent of

to focus on their thoughts and

interactivemediasolutions.com.au

five years to be successful in

employees felt stress and anxiety

feelings and examine their

Dr Gav Schneider is an

most organisations. This is where

about the future, and that less

actions and responses, but

acknowledged leader in the field

strategic planning and long-term

than half of the employees

resilience and agility can be

of human-based risk management

vision become critical.

surveyed agreed that senior

either assisted or disturbed by

and the psychology of risk. He

leaders had a sincere interest

the environment in which the

is a leading academic in his field

strive to create what is referred

in their wellbeing (Towers

individual finds themself.

and heads up the Postgraduate

to as a dynamic risk equilibrium

Watson staff, 2012).

The output of all of this is to

(DRE), which is the ability to

In most cases, when viewed

So what is it that makes some

Psychology of Risk program at

organisations able to not only

the Australian Catholic University

innovate and adapt, to take

through the lens of DRE,

survive but also thrive in the face

(ACU). Dr Gav is the CEO of the

calculated and educated risks so

the structure of the modern

of adversity? This is the challenge

Risk 2 Solution group of companies,

that opportunities can be seized.

organisation has not put the

the authors seek to solve through

which focus on delivering

It means that risk baselines

person at the heart of business

can be adjusted to match the

activities. Dr John Medina,

environment and people, based

a developmental molecular

on the opportunities and threats

biologist and author of Brain

that have to be managed. If DRE

Rules, has clearly highlighted that

cannot be achieved, people will

stress impacts people’s ability

constantly lose opportunities,

to perform in business (Medina,

fail to innovate and live in a

2008). There is a growing

risk-averse world where they

recognition that good mental

will steadily see themselves

health at work is a must, not a

and their organisations become

nice to have. This is not simply

obsolete. The challenge is to apply

altruistic, because of the upward

the embedded approach to risk

trend, mental ill health is a main

leadership in everyday life at all

cause of absenteeism. In fact,

levels of organisations so that

the growing recognition that

risk truly becomes opportunity

performance and engagement

and not just another compliance

can be affected by a worker’s

52 // SECURITY SOLUTIONS

050-053_SSM109 Business.indd 52

innovative and cutting-edge

LEADING RISK PROFESSIONALS KNOW THAT TO SUCCEED, BUSINESS AND CULTURAL CHANGE MUST BE VIEWED FROM A HUMAN PSYCHOLOGY PERSPECTIVE.

solutions in the risk, intelligence, safety, security, medical and emergency response sectors. Visit www.risk2solution.com for more information. Kate Down is a behavioural scientist and coach who specialises in social and emotional intelligence and rational thinking. Kate heads up Risk 2 Solution’s: People, Culture and Behavioural change division. She is an Associate Member of the Australian Psychological Society and a lecturer on ACU’s innovative Postgraduate Psychology of Risk program. n

securitysolutionsmagazine.com

21/08/2017 10:30 am


TR

OR

050-053_SSM109 Business.indd 53

HÉE D’ OP

21/08/2017 10:30 am


COVER STORY

C R S AVE TRUST N A I L A R T S U A

AS

SECURITY

CONCERNS

REACH DECADE HIGH BY JOHN KENDALL

At a time when the Australian public’s concern about security issues is at a decade high, John Kendall, director of the Border and National Security Program, Unisys, explores why concerns are so heightened and what organisations can do to restore consumer trust in their safety.

54 // SECURITY SOLUTIONS

054-059_SSM109 Cover Story.indd 54

securitysolutionsmagazine.com

21/08/2017 10:32 am


securitysolutionsmagazine.com

054-059_SSM109 Cover Story.indd 55

SECURITY SOLUTIONS // 55

21/08/2017 10:32 am


COVER STORY Security comes in many shapes

concerned about unauthorised

and forms, and an individual’s

access to, or misuse of, their

sense of security is complex and

personal information.

influenced by a wide range of

Perhaps this is not surprising

issues affecting the world. As the

when high-profile security

current environment grows even

breaches continue to make

more digitally interconnected,

headlines. It was just less than

a person’s online and physical

12 months ago that Australia

worlds continue to converge –

recorded its largest ever data

complicating an individual’s sense

breach when the Red Cross Blood

of vulnerability and safety.

Service lost over half a million

That sentiment is echoed in

personal and medical files. More

the findings from the 2017 Unisys

recently, the Department of

Security Index, which for over 10

Human Services requested an

years has measured the attitudes

investigation into reports that

of citizens around the world

Medicare card numbers are being

on a range of issues relating to

sold on the dark web.

national, personal, financial and internet security. Australians have typically had a fairly moderate level of concern when it comes to their security, which is why the 2017 findings of the Index are particularly interesting. The overall Security Index for Australia is 157 out of 300 (up from 106 recorded in the last survey, which took place in 2014) and is considered a serious level of concern. Despite constant headlines of war, terrorism and personal safety, it is concerns over identity theft, bank card fraud and

TO BE PREPARED FOR THE EVENT OF DATA BREACH, ORGANISATIONS MUST LEARN TO THINK AND BEHAVE LIKE THEY ARE ALREADY UNDER ATTACK.

computer viruses / unsolicited emails that reached a tipping

Most Australian organisations

point; causing Australians’

(90 percent) faced some form

concern for their security to

of cybersecurity compromise,

reach its highest level in a

whether attempted or successful,

decade. The findings strongly

during the 2015–16 financial year

suggest that Australians no longer

(Australian Cyber Security Centre).

believe that governments and

Instances of data loss have become

commercial organisations have

so prevalent that laws have been

the ability to protect them, and

introduced on how organisations

that there is work to be done by

must handle them. In February

all organisations to reassure the

2017, a mandatory data breach

public that they are on their side.

notification law was passed by the senate. Sitting back and

Personal Security

waiting for an attack is no longer

Since 2006, the top security

an option. Organisations must

concern for Australians has

be aware that security breaches

consistently related to identity

do not just impact their ability

theft. The 2017 Unisys Security

to deliver services. The negative

Index found 58 percent of

repercussions of a data breach can

Australians are extremely or very

change the way customers think

56 // SECURITY SOLUTIONS

054-059_SSM109 Cover Story.indd 56

securitysolutionsmagazine.com

21/08/2017 10:33 am


054-059_SSM109 Cover Story.indd 57

21/08/2017 10:33 am


COVER STORY about or trust the business. To

to minimise and contain the

be prepared for the event of data

impact on themselves and their

behaviour in real time to

breach, organisations must learn

customers. Such steps include

swiftly identify suspicious

to think and behave like they are

the use of microsegmentation

activity. This will limit

already under attack.

that hides resources from

exposure to loss and

Unisys recommends a five-step

• reactive: monitor transaction

mitigate future risk.

invasive scans and restricts

approach organisations can take

what parts of the system can

Ensuring all systems are working

to position themselves as a trusted

be accessed even if the ‘bad

in real time is the key to limiting

partner to consumers:

guys’ do get in.

risk and exposure. Self-learning

1. Educate – all too often it is

analytic technologies help banks to

humans who are the weak

Financial Security

actively monitor all transactions at

link in personal data security.

Ranking as the second biggest

all times and reassure customers

So, it is critical to educate

security concern for Australians

that they are in safe hands.

customers on the importance

since 2006, debit and credit card

of the basic steps they can

fraud continues to play heavily

Internet Security

take to protect their data. This

on the mind of Australians. The

Further findings from the Unisys

also provides an opportunity

findings reveal that 55 percent of

Security Index reveal that fears

to highlight what measures

Australians are extremely or very

regarding the safety of online

the organisation is taking to

concerned about other people

transactions and the threat of

protect sensitive information, a

obtaining or using their credit/debit

viruses have almost doubled

key way to build trust.

card details. According to figures

2. Analyse – organisations must

from the Australian Payments

understand their security

Clearing Association, Australians

posture. Know what threats

lost $521 million to credit card

and vulnerabilities exist

fraud in the 2016 financial year – a

within the current systems,

significant amount which has been

and address the security risks

increasing year-on-year.

before they become an issue. 3. Deter – prevention is the

For a financial services provider, there is more at stake

THE FINDINGS STRONGLY SUGGEST THAT AUSTRALIANS NO LONGER BELIEVE THAT GOVERNMENTS AND COMMERCIAL ORGANISATIONS HAVE THE ABILITY TO PROTECT THEM.

since 2014. The findings show that 54 percent of Australians are concerned about computer and Internet security (in relation to viruses, unsolicited emails or hacking), which has almost doubled (up from 28 percent) since the last Unisys Security Index in 2014 and now equals the level of concern about

first line of defence when

than just the loss of money.

facing an active cyber threat.

Reputational loss and disruption

Effective deterrence strategies

to the customer experience can

include strong and current

be equally as damaging for banks.

firewalls and anti-malware

From theft and fraud to money

software, timely installation of

laundering schemes, banks have

software updates and frequent

no option but to be firmly on high

changes to passwords.

alert for illegal activity that can

new malware scam, their fourth in

happen anytime, anywhere, as the

two months. The email scam was

quickly responding to cyber

evolution of technology continues

built so the ‘view bill’ button was

intrusions serves as the

to enable criminal activity to occur

a malicious link. It comes at the

second line of defence when

faster and easier than anticipated.

same time as the Australian Tax

facing an active cyber threat.

With multiple platforms, such as

Office fights a phone scam. It is not

Proactive monitoring using

ATMs, credit cards and mobile

just essential personal information

advanced data analytics can

apps that require protecting,

at risk either. Woolworths is

alert organisations to any

banks must make sure that the

currently investigating reports

suspicious activity that may be

solutions they have in place to

of its rewards cards being

a precursor to a cyberattack

detect, fight and protect customers

hacked and points stolen from

and automatically initiate

from financial crime are:

customers’ accounts using a

responses to potential threats.

• proactive: undertake risk

security vulnerability in the

4. Detect – monitoring and

5. Contain – even when

analysis to build transaction

war or terrorism. A further 51 percent are concerned about the security of online shopping and banking transactions. In the last month, Origin Energy customers were hit by a

Woolworths app. Cyberattacks are nothing

appropriate steps are taken

profiles. This will result in

to deter and detect cyber

fewer losses, reduce false

new and there will always be

intrusions, organisations

positives and improve early

criminals out there who want to

must assume that a breach is

detection rates in advance of

take advantage of people, but the

inevitable and must take steps

fraudulent attacks.

growing sophistication of hackers,

58 // SECURITY SOLUTIONS

054-059_SSM109 Cover Story.indd 58

securitysolutionsmagazine.com

21/08/2017 10:33 am


behaviour and knowing what to do when an incident does occur. These days, more police departments have apps and online social channels that Australians can access, which can help them have a direct line to emergency support.

Improving Security and Restoring Consumer Trust Reputation loss is not easily quantifiable, but is likely to erode future business opportunities. In today’s fast-paced and unforgiving business environment, there is no shortage of other operators waiting to collect disenchanted customers in the wake of a controversial security breach. The reputation and brand image of a business is a key corporate asset and when the balance of trust is compromised it remains to be seen whether this confidence can be fully restored. Transparency helps to build trust and organisations need to not only implement security measures, they need to be seen combined with the increase

will reinforce authority and

from the Unisys Security Index

taking such measures to build

in the number of high-profile

demonstrate an organisation’s

show that concerns have risen by

public confidence.

cyberattacks, such as WannaCry

desire to protect.

22 percent since 2014, possibly

and Petya, has highlighted

• Transparency – As the world

It is critical that organisations

driven by increased terror events

operating in Australia, both those

how vulnerable the online and

continues its shift towards a

in Europe and on home soil, such

in the commercial and public

digital world can be.

digital economy, one of the

as the Lindt Café siege in Sydney.

sector, understand what security

Consumer trust has become

growing trends is to push more

The London Metropolitan

issues concern their customers

increasingly fragile and there is

government and business

Police’s quick response to recent

and citizens most in order to

work to be done by organisations

services online. By increasing

London terror attacks was

address them, build upon them

who must be proactive in their

their digital services, criminals

to implement the ‘Run, Hide,

and then maintain public trust.

approach to security. There are

have more opportunities

Tell’ advice. These practical

two things organisations can do

to target customers.

instructions gave Londoners

to get on the front foot for online

Organisations must not only

guidance on how to behave

the Border and National Security

consumer security:

take the appropriate measures

during a terror attack. Even more

Program for the global public

• Education – Educate

to protect their internal

recently, Australia’s domestic

sector practice at Unisys. His

customers on the importance

systems from cyberattacks, but

and international airports have

particular area of focus is the

of taking basic steps to

they should be transparent

intensified security screenings

national security sector, helping

protect their digital world. It

with consumers about

following the thwarted terror plot

public sector organisations

is easy for customers to get

what has occurred.

in Sydney to blow up an airplane.

leverage innovative technologies

caught up in the convenience

As war and terrorism

John Kendall is the director of

such as biometrics, real-time

of new technologies;

National Security

continues to dominate the news

analytics and mobility to

however, reminding them

Concerns around national

agenda, it is important to let

provide secure and cost-effective

to be vigilant about any

security remain top-of-mind

Australians know that they too

services to their citizens and

suspicious online behaviour

for many Australians. Findings

can help by reporting suspicious

business communities. n

securitysolutionsmagazine.com

054-059_SSM109 Cover Story.indd 59

SECURITY SOLUTIONS // 59

21/08/2017 10:33 am


LEGAL Q&A

WORKPLACE HEALTH AND SAFETY IN THE SECURITY INDUSTRY: DO YOU KNOW YOUR DUTIES?

BY ANNA RICHARDS

The main legislation which

to far wider duties in so far as

an offence and/or being liable to

governs what duties employers

their duties will require them to

pay for compensation for any loss

owe and what duties contractors

contemplate all of the different

or damage suffered by the person

3.1 the hazard of the risk; and

and employees owe in relation to

workplace locations that might be

to whom the duty was owed.

3.2 ways of eliminating the risk

workplace safety is set out in the

relevant to their business.

4. the availability and suitability

knows, or ought reasonably to know, about:

or minimising the risk; and

(Commonwealth) (referred to as

employ security guards to assist

What are the Main Duties of Care?

“the Act” in this article).

in a waterfront dispute, then the

Definition Of The Duty To

workplace may be a wharf or dock

Manage Risks

Purpose of the Act

or even a ship – it could be as far

There is a general duty of care

risk and the available ways of

One of the main purposes of the

reaching as your personnel decide

imposed on persons to ensure

eliminating or minimising the

Act is obviously to eliminate as

to venture in the execution of their

health and safety. The Act states

risk, the cost associated with

far as possible, and otherwise

duties, providing they have not

that a duty imposed on a person to

available ways of eliminating

to minimise as far as possible,

gone against your instructions.

ensure health and safety requires

or minimising the risk,

the person:

including whether the cost is

1. to eliminate risks to health and

grossly disproportionate to

Work Health and Safety Act 2011

For instance, if you were to

risks to anyone who is present at a workplace.

Definition of “Workplace”

Definition of a “Worker” One of the classes of people to which certain duties of care

safety, so far as is reasonably practicable; and 2. if it is not practicable to

of ways to eliminate or minimise the risk; and 5. after assessing the extent of the

the risk. So, what does all of this mean for you? It means that you are

What exactly is the definition of a

are owed are “workers”. Who

eliminate those risks, to

required to assess what risks

“workplace” you might ask. The

is a “worker”? The Act once

minimise those risks so far as

workers and others may be

definition is wide ranging and

again defines “workers” very

reasonably practicable.

exposed to at a workplace and to

refers to virtually any place where

broadly. The definition includes

work is carried out for a business

an employee, a contractor or

and includes any place where

subcontractor, an employee of

a worker goes or is likely to be

take reasonable steps to prevent them occurring, as far as is

a contractor or subcontractor,

Definition of Reasonably Practicable

whilst at work. It even includes

an employee of a labour hire

It is common and reasonable

knowledge of the areas concerned

a vehicle, vessel, aircraft or

company who has been assigned

for people to ask what does

which may pose such risks, then

other mobile structure, amongst

to work in the business, an

“reasonably practicable” mean.

you should engage a person or

other things.

outworker, an apprentice or

The Act defines it as what was

body to provide an assessment of

trainee, even a student gaining

reasonably able to be done in

the risks and any strategies for

this rather vast definition of

work experience and a volunteer,

relation to ensuring health and

managing them.

“workplace” is due to the fact

amongst others.

safety, taking into account and

The point of outlining

that security services can cross

reasonably possible. If you don’t have enough

As an example, if you required

weighing up all relevant matters,

security personnel to ensure that unauthorised people do not enter

What is a Duty of Care?

including the following:

earth, as opposed to a number of other industries where the

Duty of care refers to the duties a

The relevant matters

not be required to provide those

workplace is often confined

person owes another person and

1. the likelihood of the hazard or

security staff with an armoured

to an office. This very broad

which, if breached, may expose

application of the meaning of

the person who owes the duty

“workplace” means that security

to certain repercussions, such as

industry personnel are exposed

being fined, being found guilty of

into virtually any location on this

60 // SECURITY SOLUTIONS

060-061_Legal Q and A.indd 60

a building, you would clearly

the risk concerned occurring;

vehicle to travel to and from

2. the degree of harm that might

work! Obviously, the cost of

result from the hazard or risk; 3. what the person concerned

doing so would be prohibitive in view of the small risk of them

securitysolutionsmagazine.com

21/08/2017 10:33 am


being shot at! The test is one of

security officer is required to

education and strategies that you

under the heading “The definition

‘reasonableness’.

carry a firearm but his employer

employ to minimise or eradicate

of reasonably practicable” in

has failed to provide adequate, or

such risks, including the times

this article. You should also

claims that you might have

any, training. That security then

and dates that you have done

keep very clear and legible hard

breached this duty, you should

discharges a firearm into a crowd

so. These pieces of evidence can

copy records of all the ways

make enquiries of those people

in order to stop an intruder but

obviously be used to assist you

in which you have discharged

with knowledge (conduct due

ends up injuring an occupant of

with establishing that you did in

your duties including keeping

diligence) in your specific area of

the bank.

fact discharge your duty of care.

all manuals, policies as well as

To assist in warding off any

concern (if you are not an expert).

This duty goes even beyond

any covering emails or letters under which they were sent to

requires a person conducting a

Duties Owed by Workers

have undertaken. You should also

business to do the following:

Luckily, it is not all a one-way

keep written or hard copy notes

record in writing your justification

1. provide and maintain a work

street. Workers also have to take

of any discussions that you have

for your belief that any training

environment without risks to

care in any action that they take

had with workers on issues

and or equipment you have

health and safety;

whilst being engaged in work for

relating to health and safety,

a business.

including the dates that the notes

Further, you should keep hard

what is outlined above. It also

copy records of any research you

provided to your personnel is adequate to eliminate or at least minimise any risk to their safety and health or the safety and health of others.

2. provide and maintain safe plant and equipment; 3. provide and maintain safe systems of work; 4. ensure the safe use, handling and storage of plant, structures

Primary Duty of Care The primary duty of care is

and substances; 5. provide adequate facilities for

The Act requires that whilst at

workers. Further, you should

were taken and full details of who

work, a worker must:

else was present as a witness at

1. take reasonable care for his or

the time that you provided the

her own health and safety; and 2. take reasonable care that his or

information. All of these pieces of evidence will help to establish

her acts or omissions (failing to

whether or not you discharged

do something) do not adversely

your duty of care in regard to health and safety.

that a person conducting a

the welfare at work of workers

affect the health and safety of

business must ensure, so far as

in carrying out work for the

other persons; and

is reasonably practicable, the

business, including ensuring

health and safety of workers

access to such facilities;

3. comply, so far as the worker

Anna Richards is the Legal

is reasonably able, with

Director and principal lawyer

engaged, or caused to be engaged,

6. provide any information,

any reasonable instruction

from Victorian Legal Solutions

by the person and workers whose

training, instruction or

that is given by the person

Pty Ltd and practices in the areas

activities in carrying out work,

supervision that is necessary

conducting the business to

of Commercial law including

are influenced or directed by the

to protect all persons from

allow the person to comply

Commercial litigation and

person while the workers are at

risks to their health and safety

with the Act; and

other areas. Anna Richards and

work in the business. (Say that

arising from work carried out

4. co-operate with any

Victorian Legal Solutions can be

three times quickly.)

as part of the business; and

Also, the person must extend

7. ensure that the health of

reasonable policy or procedure

contacted on (03) 9872 4381 or

of the person conducting the

0419 229 142.

this duty to other persons. What

workers and the conditions at

business relating to health and

does this mean? Put simply, it

the workplace are monitored

safety at the workplace that

taken to ensure its accuracy, the

means that if you have employed

for the purpose of preventing

has been notified to workers.

information contained in this

or contracted a worker to work

illness or injury to workers

In summary, everyone is

article is intended to be used as

at a workplace, then you must

arising from the conduct of

required to take care. The best

a general guide only and should

take care to not expose anyone

the business.

course of action is “overkill” in

not be interpreted to take as

Whilst every effort has been

else who might be present at that

In essence, this means that those

so far as it is better to be seen

being specific advice, legal or

workplace (even if he or she is not

people engaging others must

as having overdone the creation

otherwise. The reader should

a “worker”) to any such risk to his

consider the risks; take action

of procedures and policies

seek professional advice from a

or her safety or health.

to minimise or eliminate those

and providing equipment that

suitably qualified practitioner

risks; and constantly review

minimises or eliminates risks to

before relying upon any of the

contractors to provide security

the situation. In these days of

health and safety. However, it

information contained herein.

services to a bank, then you must

fast evolving technology, it is

is often prohibitive from a cost

This article and the opinions

take steps to train and equip

imperative to continue to review

position to do so. The next best

contained in it represent the

the contractor to minimise or

whether you are providing

step is to take action that you

opinions of the author and do not

eliminate him or his actions (for

a safe workplace. To protect

believe, within your reasonable

necessarily represent the views

instance, directing others) from

yourself, you should keep hard

capabilities, discharges your

or opinions of Interactive Media

harming the safety and health

copy records of all steps that you

duties taking into account the

Solutions Pty Ltd or any advertiser

of anyone present at the bank.

take to do so as well as copies of

factors referred to under the sub

or other contributor to Security

An example might be where a

all manuals, policies, means of

heading “The relevant matters”

Solutions Magazine. n

For instance, if you engage

securitysolutionsmagazine.com

060-061_Legal Q and A.indd 61

SECURITY SOLUTIONS // 61

21/08/2017 10:33 am


FEATURE

62 // SECURITY SOLUTIONS

062-065_SSM109 Article 2.indd 62

securitysolutionsmagazine.com

21/08/2017 10:34 am


FIXING SECURITY RISK MANAGEMENT Focus on the Threat Actor BY DAVID HARDING

G

overnment and

Institute of Criminology, the US

private industry

State Department, and this author

place enormous

have identified the limitations

emphasis on the

that situational crime prevention

concept of Risk Management and

and security risk treatment

Security Risk Management. In an

options have when applied

article published in Security

against a Threat Actor. These

Solutions Magazine in November

studies have also identified that

2016, it was identified how

a focus and assessment of the

dangerous and ineffective this

Threat Actor’s intentions to harm

concept actually is. It was shown

may allow for the refinement of

that in areas where the concepts

management options that can be

of Risk Management and Security

directed towards reducing the

Risk Management were

risk of attack, or lowering the

implemented, crime rates

incidence of criminal attacks.

actually increased. Such a

varying methodologies that seek

rethink into the effectiveness of

to identify and assess a Threat

the concept, especially when

Actor’s intentions, and their

applied against an actor with

capabilities to carry out those

intent to harm, hereafter called a

intentions. The article will also

Threat Actor.

outline varying management

Studies conducted by the

securitysolutionsmagazine.com

062-065_SSM109 Article 2.indd 63

This article will outline

significant trend requires a

strategies and methodologies that

United States Secret Service,

can be used to provide resources

American Psychological

that can reduce the risk and

Association, the Australian

incidence of criminal attack.

SECURITY SOLUTIONS // 63

21/08/2017 10:34 am


FEATURE

CRIMINAL THREAT MANAGEMENT HAS BEEN DEVELOPED FOR USE WITHIN THE PROTECTIVE SECURITY ENVIRONMENT

Definitions

Risk is different to threat.

of each segment and the whole

Virginia Student Threat

is determined.

Assessment guidelines, the United

So as to avoid confusion, it

Risk, according to ISO 31000:2009

is important to understand

Risk Management-Principle

that risk and threat are two

and guidelines, can be defined

and capabilities; risk focuses on

the Australian Standards

separate concepts. Both

as the effect of occurrences

likelihood and effect. A Threat

Handbook HB167:2006, and

concepts require two separate

on objectives. Risk is normally

Assessment requires behavioural,

Criminal Threat Management.

and different assessment tools

calculated by determining the

psychological, cultural and

and methodologies.

likelihood of a specific event and

intelligence assessment tools.

Association’s Virginia Student

Threat is defined as the

Threat focuses on intentions

States Secret Service guidelines,

The American Psychological

the effect that that event could

A Risk Assessment requires

Threat Assessment Guidelines

intention to harm. A Threat

have. The process of assessing

statistical, consequence,

have been developed to assist

Assessment determines an actor’s

Risk commences with identifying

historical assessment tools. The

in the identification and

intentions and the ability to carry

the varying occurrences that

two concepts should not be

management of school children

out those intentions. The first

could happen. The next step

intermingled.

who may have developed

stage of a Threat Assessment

includes analysing the varying

includes identifying and gathering

components, such as likelihood

The Threat Assessment

assessment process commences

specific information regarding

of the event based on previous

Several methodologies can be

when a student is identified as

the Threat Actor. Analysis is then

data, and the financial, personal

utilised that focus on a Threat

having intentions and behaviours

carried out on such components as

etc effects and outcomes, should

Actor’s intentions and capabilities.

to harm other students. Then, a

the actor’s intentions, capabilities,

the identified event occur. Finally,

These include the American

seven-step model is applied. This

and background history.

an evaluation of the significance

Psychological Association’s

model includes an interview with

64 // SECURITY SOLUTIONS

062-065_SSM109 Article 2.indd 64

intentions to harm others. The

securitysolutionsmagazine.com

21/08/2017 10:34 am


on such areas as the individual’s

Threat Management

cases this may mean the removal

motivations and goals, that

The aim of a Threat Assessment is

of the target, or the physical

individual’s communication with

to provide decision-makers with

control and management of the

others regarding their intentions,

the information that can allow for

Threat Actor.

previous deviant and mental

the development of management

history, interests and capabilities in

plans to prevent the incidence of

Threat Management model,

attack methodologies.

As outlined in the Criminal

crime, or for the Threat Actor’s

measures can be put in place that

In Australia, the Australian

intentions to find fulfilment.

will allow for the changing of the

Standards Handbook HB167:2006

Whichever method is

deviant belief system that the

Security Risk Management

selected, at the completion of the

Threat Actor has been identified

specifically mentions the inherent

process, the assessment should

with. Counter-arguments to the

issue of the actor with an intention

identify who has an intention to

deviant belief can also provide

to harm within the Protective

harm, and what type of harm is

preventative opportunities

Security Sphere. The Handbook

intended. What capabilities the

and finally, should all else fail,

then redefines a threat as being

group or person has. And when

neutralising the Threat Actor

‘anything that has the potential to

the Threat Actor will carry out

through law enforcement

prevent or hinder the achievement

their intentions, should they not

intercession, prior to the Threat

of objectives or disrupt the

encounter interference, and what

Actor’s attack, can provide

processes that support them’. It

methods the actor could use to

opportunities to prevent crime.

then identifies potential harmful

carry out their intentions.

events, and the effect the event

From the above assessment,

This article has outlined several methodologies that can

could have on the achievement

decision-makers can utilise

be used to assess a Threat Actor’s

of objectives. The assessment

available resources to manage

intentions and capabilities. Each

focuses on geographical influence,

the Threat Actor. Some options

methodology aims to assess the

threat source, threat targeting and

could include the provision of

information gained and provide

threat type.

alternative avenues of social and

decision-makers with additional

economic assistance to provide

knowledge and understanding

has been developed for use

persons the opportunity to achieve

of the Threat Actor. Such an

within the protective security

their goals without the need to

understanding can better align

environment. It primarily focuses

harm others. This could include

and manage resources allocated

on the asymmetric Threat Actor

the provision of funds to allow for

to prevent the incidence of

and utilises an assessment

the purchase of necessities rather

harm being actioned by the

methodology that allows the

that acquiring those necessities

Threat Actor.

organisation to identify those

through criminal means.

Criminal Threat Management

persons with an intention to harm

Alternatively, situational crime

David Harding is an

the subject. Then, a distinction

it. This model commences with the

prevention measures, or security

internationally experienced

between a transient threat

identification of the communities

risk treatment measures could

Threat Management consultant

(minor) and substantive threat

that the organisation is located

be implemented to prevent the

and advisor. He is a Research

(significant) is made. A response

within, and those communities that

opportunity that a Threat Actor

Associate with the Australian

is then developed, which includes

come into the organisation. The

has to carry out their intentions.

Security Research Centre (ASRC)

conducting and implementing a

model then focuses on identifying

These options, once refined

and has researched and written

safety plan.

those persons or groups from

through the development of an

about security, asymmetric and

within each community that may

appropriate Threat Assessment

non-state security threats. David

has conducted considerable

have beliefs that could lead persons

methodology, have the potential to

runs master classes throughout

research into assessing those

to harm the organisation. Once

achieve more beneficial and cost

Australia. Those people interested

persons who may wish to harm

a Threat Actor’s intentions have

effective outcomes than otherwise

in attending should visit the

either US government officials,

been identified, an assessment

may have been possible.

Australian Security Research

such as the US President, or

of the Threat Actor’s intelligence

US government facilities. The

gathering capabilities, the Threat

operations may indicate that

and information.

Secret Service utilise the input

Actor’s view of the vulnerability of

the Threat Actor has developed

You can also connect with David at:

of local law enforcement bodies

the target is conducted. In addition,

sufficiently along the Criminal

• criminalthreatmanagement.com

to identify a person of interest.

a counter-surveillance operation

Development Pathway to allow

• facebook.com/

The Secret Service then focus

is conducted to determine

law enforcement to intercede

its Protective Intelligence and

the immediacy of the Threat

and neutralise the Threat Actor’s

Threat Assessment Investigation

Actor’s intentions.

intentions or capabilities. In some

The United States Secret Service

securitysolutionsmagazine.com

062-065_SSM109 Article 2.indd 65

In addition, investigative

Centre at asrc.com.au for dates

winningstrategytactics • smashwords.com/profile/view/ davidjrharding n

SECURITY SOLUTIONS // 65

21/08/2017 10:34 am


LOSS PREVENTION

KEEPING PACE WITH THE GLOBAL RETAIL SUPPLY CHAIN - PART II

66 // SECURITY SOLUTIONS

066-069_SSM109 Loss Prevention Pt 2.indd 66

securitysolutionsmagazine.com

21/08/2017 4:40 pm


BY JAC BRITTAIN

The role of loss prevention across the retail supply chain has grown considerably in recent years. Part one of this article in the previous issue of Security Solutions Magazine introduced readers to supply chain management and began the discussion on points of potential risk to the supply chain. Jac Brittain continues the discussion in the final of this two-part article.

In-Transit Methods

rig stops, several individuals will

training programs that provide

of the larger facilities managing

For decades, members of

forcibly break into the cargo area

necessary and appropriate

the inventory for several hundred

organised groups have stolen full

and off-load as much product as

information to employees at every

stores in a single location,” said

and partial shipments and/or

they can. This is also a common

step along the way.

one industry expert. “Teams must

loaded trucks while they were in

technique used when employee

transit. These incidents can occur

vehicles are used to transport

Distribution Centres

freight at all times throughout the

in a number of different ways. For

valuable goods, such as jewellery,

Distribution centres are often

product cycle, to include accurate

example, many hijacking incidents

from one store to another.

viewed as the foundation of the

receiving protocols, proper storage

retail supply chain network,

of the freight in its designated

occur while a driver is away from

Deception is another common

ensure the accountability of the

the truck, such as at dinner or on

method. Thieves may tamper

establishing a centralised location

location, cycle counting, and

a break, and thieves simply break

with trailer/carton seals and/or

from which retailers can stock

order pulling and shipping of

into the vehicle and drive off with

locks in order to conceal trailer

and distribute products to the

merchandise to the correct

the goods. In other instances,

break-ins, or tamper directly with

stores or directly to customers.

location.”

hijackers will target a vehicle and

the container or trailer to commit

While designs and functions

forcibly enter the cab while the

these thefts. Leakage incidents

may be similar, each facility

in moving boxes from one site

driver is in the vehicle. Freeway

may involve the theft of entire

is also unique based on the

to another. This is about product

on- and off-ramps, rest stops and

cartons, or removing desired

organisation, the types of

flow and speed to market, driving

other common stopping points are

product from within a carton and

products and the special needs

replenishment, maximising sales

particularly dangerous.

resealing the packaging to attempt

of the business. These complex

and maintaining quality customer

Another common method is

to conceal the theft. ORC groups

operations can house volumes

service while minimising losses,

to coerce the driver into making

have even used individuals who

of merchandise, equipment,

damage and theft of goods. All

an unplanned stop by having

present themselves as legitimate

supplies and employees in order

of this requires cutting-edge

someone gain the driver’s

drivers at shipping facilities, using

to meet and maintain primary

loss prevention management,

attention while he is driving. This

counterfeit paperwork or even

business objectives.

with progressive programs that

individual may falsely inform the

electronic shipment information

driver that something is wrong

in order to gain access to and

a project-specific, labour-intensive

and supply chain management

with his vehicle or may use other

make off with valuable loads.

venture, the actual mission of the

strategies and design. Every

persuasive tactics to convince the

Effective, well-planned

distribution centre operation is

function, process and practice

While often viewed as simply

This is not simply an exercise

build on modern technologies

driver to stop the vehicle. Once the

strategies must be developed,

strategic and tactically calculated.

must be continuously re-

driver pulls over and the vehicle

combining the latest

Coordinating the concurrent

evaluated to help control costs and

stops, accomplices arrive to steal

advancements in technology

needs of the stores, customers,

maximise efficiency.

the rig.

with industry best practices,

suppliers, buyers, inventory

robust security procedures and

control, transportation systems

a retailer may purchase and sell

organised retail crime (ORC)

fundamental loss prevention

and other services and service

tens of thousands of products.

groups targeting trucks or

methodologies. Such practices

providers is a formidable

Goods typically arrive in bulk

containers loaded with high-tech

would include enhanced

task to keep product moving

and are stored in the distribution

and high-value merchandise is the

awareness efforts, improved

efficiently and contributing to a

centre until needed by the retail

‘grab and run’. Often travelling

response, advanced information

company’s profits.

location. Products are then

in vans or similar vehicles, they

and communication management,

follow a targeted vehicle, waiting

safety practices, employee

can house thousands of SKUs

shipments before being forwarded

for the vehicle to stop. Once the

screening programs, and robust

[stock keeping units], with some

to stores or directly to customers.

A technique favoured by

securitysolutionsmagazine.com

066-069_SSM109 Loss Prevention Pt 2.indd 67

“Today’s distribution centre

Depending on the company,

retrieved and assembled into

SECURITY SOLUTIONS // 67

21/08/2017 4:40 pm


LOSS PREVENTION Throughout every stage of the

away from the dock. With

Establishing a Culture

place the roles of loss prevention

process, there are opportunities

attention focused on labour and

The retail supply chain network

in the stores and in the retail

for loss.

speed, employee interest can be

demands control to drive

supply chain in very different

diverted, leading to enhanced

efficiency and productivity.

buckets. However, closer

risks and greater opportunity.

Setting the tone early and

inspection definitely puts things

often by maintaining direction

into a different perspective, as

The efficient processing of goods through the distribution centre plays an essential role in

The possible infiltration of

the business operation. Every

associates by organised criminal

and enforcing rules sends an

these roles are often much more

facility must be designed to

groups is also a threat within the

important message and helps

similar than they are different. I

provide for the safest, fastest,

distribution centre environment.

establish a culture of safety,

would encourage each of you to

most secure, most efficient

Perpetrators may gain access

control and honesty. This is why

pause for a moment and reflect

and cost-effective control and

through temporary agencies

the fundamental aspects of loss

on some of your dealings with

movement of retail products,

when services are needed,

prevention provide such an

your fellow loss prevention peers

and loss prevention efforts

such as during peak selling

important barometer of program

who work in the supply chain. If

must complement the process.

seasons. Employees with ORC

success. Failure to control basic

you haven’t already done so, take

Vulnerabilities extend well

ties may simply hire into the

support functions is an indicator

some time and get to learn more

beyond basic physical security

company in order to gain access

of greater opportunities, which in

about this aspect of the business.

measures and access controls,

to merchandise, information

turn can significantly influence

If possible, look for opportunities

and the same proactive,

and opportunity. Existing

the scale of involvement

to do some cross-training in these

cooperative insights that have

employees may be recruited by

throughout the entire network.

partner departments. Make the

helped to build success in other

ORC operations to participate in

areas of the business must

illicit activities. Individuals who

policies that serve to establish

horizons. These lessons will go a

be shown.

hired in with honest intentions

workable controls is an important

long way in building relationships

may also observe and exploit

step, but this must be coupled

and adding value to your

opportunity, and make poor life

with appropriate resources to

organisation and your future.”

decisions as a result.

support the control measures

Distribution Centre Risks Identifying the potential source

While the direct theft of

Creating and implementing

effort to expand your professional

For some, this may open

as necessary, to include

the doors of opportunity that

of theft risks within a distribution

merchandise is an ongoing

adequate attention and staffing.

lie within the supply chain for

facility is typically not hard to

concern, the theft or disclosure

Programs must be regularly

growth and development. For

determine. Access to the facility

of information can be just as

reviewed and monitored to

others, it may serve as a simple

is managed. Activities within

problematic. Shipment and

ensure effectiveness, efficiency,

reminder of a side of the business

the facility are controlled. In

product information, seals

relevance and application.

that does not always hold their

the stores, there is public access

and seal sequences, delivery

Most importantly, this must

full attention. For all retailers,

to the building. However, this

schedules, truck routes and other

have the support of all levels

it should serve as a notice that

is clearly not the case in the

relevant information can be

of management, to include

the role of loss prevention

distribution centre environment.

divulged to assist with hijackings

implementation, maintenance,

is expanding and they have

In plain terms, the most likely

and similar operations. Blank

enforcement and resolution.

a definitive responsibility to

way for theft activity to be

forms may be pilfered to create

successful in distribution centres

fraudulent documents. Alarm

knowledge, awareness and

is if employees are involved.

information, CCTV placement,

education regarding the entire

internal layouts, rosters,

retail supply chain network must

is editorial director, digital for LP

opportunities for losses in the

schedules and shift changes,

be improved. Programs such as

Magazine. He has worked in the

distribution centre involve

and other important operational

the supply chain course within

loss prevention industry for over

collusion between multiple

information may be shared or

the LPC certification coursework

30 years and was instrumental in

parties – especially between

exposed. Additional actions may

provide a tremendous resource;

the development of the industry’s

drivers and the employees

include intentionally damaging

however, retailers must also

only internationally sanctioned

that load and unload trailers.

or blocking CCTV or other

open more effective channels

LP credentials – the LPQualified

Merchandise within the

security equipment, removing

of communication with subject-

(LPQ) and LPCertified (LPC)

distribution centre is at its

batteries from alarmed doors,

matter experts, especially those

courses in collaboration with

greatest risk when trucks are

leaving outside doors or security

within their own organisations,

the Loss Prevention Foundation.

being loaded and unloaded,

enclosures opened or unlocked,

to gain a more comprehensive

Jacque can be contacted via email

which is a timeframe that

purposeful distractions, or simply

understanding of this critical

jacb@Ipportal.com

is particularly chaotic, with

looking the other way. Any and all

aspect of the retail business.

individuals largely concerned

opportunities may be exploited

with emptying or filling the

depending on the complexity and

industry leader, “Within our

the website of the US-based Loss

trailer and getting the truck

motivations of those involved.

industry, there is a tendency to

Prevention Magazine. n

Often, the greatest

68 // SECURITY SOLUTIONS

066-069_SSM109 Loss Prevention Pt 2.indd 68

Finally, as an industry,

As emphasised by one

keep pace. Jacque (Jac) Brittain, LPC

This article first appeared on losspreventionmedia.com,

securitysolutionsmagazine.com

21/08/2017 4:40 pm


LIKE US ON FACEBOOK facebook.com/ssmaust

066-069_SSM109 Loss Prevention Pt 2.indd 69

21/08/2017 4:40 pm


FEATURE

THE

SHAPE THINGS TO

OF

COME

BY JOHN BIGELOW

There should be little doubt that security technology is evolving at a rapid rate. One need only look at the depth and range of new solutions on display at this year’s Security Conference and Exhibition, held at the International Conventional Centre in Darling Harbour Sydney in late July. One area that seems to be experiencing significant change is that of access control. The introduction of newer and more effective biometrics, mobile access and data analytics has seen a myriad of interesting products emerge. In order to better understand where the industry is heading, we spoke with Serra Luck, Vice President, End-User and Consultant Business for HID Global, a global leader in in trusted identity solutions.

70 // SECURITY SOLUTIONS

070-073_SSM109 Article 3 B.indd 70

securitysolutionsmagazine.com

21/08/2017 3:05 pm


securitysolutionsmagazine.com

070-073_SSM109 Article 3 B.indd 71

SECURITY SOLUTIONS // 71

21/08/2017 3:06 pm


FEATURE John Bigelow: From the point of

from its traditional business

efficient, and again, more user-

view of HID and access control,

model involving reader controllers

friendly for security staff and

there have obviously been some

installed on site, requiring the use

facility owners while enabling

significant changes in the last

of a card, to a cloud based model

better risk management.

few years. What is HID’s vision

which enabled users to issue a

for access control? Where

virtual identity in a matter of

focusing on is data analytics.

do you see the market going,

seconds to a person’s smartphone

If we can better understand

and why?

which that person is then able to

the data that we capture, then

use just like a traditional access

we know that we can help our

on powering trusted identities.

card. That is a completely new

customers make better decisions

We know and we’re thankful

concept for the end-user, and it

based on understanding when

that millions of users are using

introduced new economies of

service demands peak within a

HID every day for physical and

scale as well as new level of user

building, where and when greater

digital access around the world.

convenience, without hampering

investment and action might be

We also have more than two

the trusted identity use in security.

required, how the building is

Serra Luck: At HID, we focus

Another area that HID is

billion things that are identified,

As a natural extension to

verified and connected with HID

this, HID is now moving ahead

security is. With this knowledge,

technology around the world. We

with more innovations - location

we are able to use data analytics

have a large and trusted install

services being the latest. We’re

to make better decisions for

base in education, critical national

very happy with the growth we are

the tenants.

infrastructure, healthcare, utilities,

seeing in location-based services

transportation and financial

in the Asia region especially.

information and services to the

services. I think it’s important to

HID acquired a company called

cloud brings different challenges

mention that we work with some

Bluvision at the end of December

of the most innovative companies

2016, and through this acquisition,

around the world. That is quite

we are bringing an array of other

important for us because it means

services to the end-users who what

we need to innovate to remain

to be able to do more with the

attractive to the installers and

access control infrastructure in

systems integrators that we are

the security space to help improve

serving today.

operational efficiencies.

In the few last years, we have

For example, location services

being utilised and what the role of

And finally, moving

HID GLOBAL POWERS THE TRUSTED IDENTITIES OF THE WORLD’S PEOPLE, PLACES AND THINGS.

that we, as a company, are tackling from a data security point of view. This is yet another example of why trusted identities are extremely important. Moving service to the cloud can provide companies with a significant advantage as they are able to reduce their total cost of ownership for specific services.

seen a lot of changes happening

will enable people to know at a

in the access control market that

glance things like which rooms are

some of the services they currently

are reflected in the evolution of

currently available for a meeting,

maintain on site up to the cloud.

HID as a business. We are seeing

or how to get to a meeting. This

Examples include mobile access,

the emergence of trends such

sort of functionality allows

expansion of services to the

as artificial intelligence and the

building owners, facility managers

cloud, changing the operational

Internet of Things connected

and enterprise security managers

model and or getting into location

to smart buildings. We see a

to optimise the use of the building.

services. The more services we

growth in robotics and changes in

Also, connected to this, if you know

can offer around that security

demographics happening around

where people are going, where the

and safety model, the better the

the world, so we are very much

meetings are happening, then you

experience for users.

aware of the macro-trends that are

can steer the use of heat, lightning

impacting the global workplace as

and other services around those

John Bigelow: In 2014, HID

well as the security industry.

needs. Good service, better user

introduced mobile access

experience, and of course there’s

which, at the time was seen

customers are able to do many

lot of energy efficiency that

as a significant disruption to

things they were not able to do

comes from knowing this sort of

the traditional access control

only a few years ago. Take, for

information.

market. At this year’s Security

This is exciting because our

example, the introduction of

Connected to that, we also

This is achieved by removing

Conference and Exhibition,

mobile access back in 2014. That

envision that if, during an

we saw HID launch Location

was a turning point for HID and

emergency, you are able to

Services, but you’ve also spoken

the broader access control market.

determine where people are in

at this event about things

HID, as a business, began to move

your building, it is much more

like artificial intelligence, the

72 // SECURITY SOLUTIONS

070-073_SSM109 Article 3 B.indd 72

securitysolutionsmagazine.com

21/08/2017 3:06 pm


I THINK WE WILL ALSO SEE A MOVE FROM THE TRADITIONAL CAPITAL EXPENDITURE MODEL FOR ACCESS TO CONTROL MORE OF AN OPERATIONAL EXPENDITURE MODEL.

securitysolutionsmagazine.com

070-073_SSM109 Article 3 B.indd 73

Internet of Things, and robotics.

How do you make this convergence

and don’t necessarily all possess

What do you envision the next

seamless for the user?

the same capabilities. We have

major disruption will be for the access control market?

also seen in corporations that John Bigelow: So between mobile

some staff have a corporate phone

access, biometrics and data

capable of being enabled with

not new in the traditional IT space,

analytics, is HID moving away

mobile access technology, while

it is definitely an area that is still

from traditional physical access

other staff don’t. We also see sites

new to traditional physical access

control measure such as cards in

where employees and contractors

control security. However, making

favour of virtual credentials?

work side-by-side along with

services like those available in the

Serra Luck: With mobile

IT space available on the cloud for

access, we have already brought

visits, in this scenario, how do you

physical security is something that

the idea of using a virtual

manage the technology when only

takes time but it is an area HID are

credential. Our mobile access

some people have mobile access

putting a lot of effort into.

products are being used in 58

capable devices. To that end, we

different countries, with more than

believe physical access card and

move from the traditional capital

130 different phones supporting

virtual credentials will continue

expenditure model for access to

mobile access at present. However,

to reside next to each other for

control more of an operational

we believe that cards, readers,

some time to come. However, with

expenditure model. This will mean

and controllers will continue to

the launch of our HID Location

that companies do not necessarily

be a significant part of both our

Services, virtual credentials and

have to pay upfront to fit out an

business and the industry for many

mobile access are areas they we

entire building but rather, can

years to come. I say this because

expect to see significant growth in

manage expenses through a user

when we work with our large

across the access control industry

pays type of system. Combine with

corporate clients; we see time and

in the next few years.

this will be a challenge around how

again, how different mobile phones

we combine the trusted identity in

bring differing complexities to

about HID Location Services:

IT space with the trusted identity in

access control because the devices

https://www.youtube.com/

the physical access control space.

are manufactured by a third party

watch?v=sZjdJdro2TI n

Serra Luck: While the Cloud is

I think we will also see a

people who come for temporary

To understand more

SECURITY SOLUTIONS // 73

21/08/2017 3:06 pm


AVIATION

ASK THE QUE S

74 // SECURITY SOLUTIONS

074-077_SSM109 Aviation.indd 74

securitysolutionsmagazine.com

21/08/2017 4:47 pm


E STION FIRST BY STEVE LAWSON

I was going to write an article

is old and not fit for purpose’;

the equipment. What is done if

about the new US rules on the

“the number of casual employees

someone arrives with a prohibited

carriage of electronics. That idea

should be reduced on the airside”;

item in his bag? Where is it put

was overtaken by the arrests in

“we should present ID to travel

while the person is at work?

Sydney in relation to a suspected

domestically”; “catering is a hole”;

Should people be stopped taking

attack on Australian aviation.

“there should be screening onto

anything onto the airside? What

As such, I will write about the

the airside”; or “there should be

about vehicles? Then the question

electronics ban in a later article.

more training” and on and on.

I really like: how do I stop people

I am always amazed that

securitysolutionsmagazine.com

074-077_SSM109 Aviation.indd 75

Take the comment that people

just throwing something over

after any major incident, and for

should be screened onto the

the airside boundary fence

Australia this is a major incident,

airside. Do not get me wrong, I

for someone to pick up after

there is so much information

think people should be screened

airside screening?

put out to the media by so many

onto the airside. I would like them

Throwaway lines are easy,

people pushing their own agenda.

screened off the airside as well as

implementing effective measures,

I have heard comments like

a theft prevention measure, but it

not so much.

“screening should be taken out

is easier said than done. There are

of the private sector and given to

infrastructure issues associated

from one person who said that

the government”; “the equipment

with that decision, not simply

the explosive detection equipment

My favourite comment was

SECURITY SOLUTIONS // 75

21/08/2017 4:47 pm


AVIATION used in Australia does not detect

fluid used to carry contact lenses

be, “How do the Australian

they become private charters!

tri-acetone tri-peroxide (TATP).

– a medical device.

screeners measure up against

I can use a Boeing 737 or even

other overseas organisations?”

an A380 in that category. How

That is just plain wrong. The

Is it time for a new look at

equipment here is mostly ion

aviation security? Yes, aviation

My understanding is that our

about I put a weight restriction on

mobility spectrometry (IMS)

security is a moving feast and

screeners are up there with

the aircraft? Guess what, that is

equipment, the majority of which

it should be looked at all the

the best.

already done!

can detect TATP – I say majority

time, but without the blinkers

because some time ago I looked

of agendas and with a modicum

commentary about introducing

but I really get fed up with the

at one model and at that time I

of common sense. There is

security to regional airports.

media and talking heads just

was not sure how it could detect

no reason for implementing

One commentator said, with a

using throwaway lines and

TATP, but it was in the process of

a process unless it provides a

straight face, that he travelled

then running with those lines

being upgraded. I have not seen

security outcome.

to Sydney from a regional

as if they have the answer to

airport with “hundreds” of other

aviation security.

that particular machine being

Everyone is providing a

Then I hear media

I am not trying to be difficult,

used during my travels around

solution when the first question

passengers on the same aircraft

Australia, so I feel happy saying

that should always be asked is,

and no security checks. Reality

really do not know and for me

the majority. The same person

“What is the threat?” Identifying

check! Aircraft over 20,000kg

that is a big confession. What I

talked about bypassing liquids,

the threat is to a large extent

are screened and the number

do know is that security is like

aerosols and gels screening

the role of government and

of passengers on aircraft under

any other business decision; the

(LAGs) and ‘mixing’ TATP on

that information should, where

that weight is in the tens not

market needs to be identified

board the aircraft. I think that

possible, be passed to industry,

hundreds. Really, it is about

first or the problem needs to

is possible, but hardly feasible.

not least because industry must

50 passengers.

be defined. Do not provide

TATP is extremely volatile and

make long-term purchasing

the solution and then ask

the perpetrator would most likely

decisions. Information is shared

the question.

end up blowing up the toilet and

as specific threats are known

becoming a smelly corpse while

and government will say they do

mixing the TATP, as opposed to

pass on strategic information,

destroying the whole aircraft.

but I would suggest, not from my

Destroying an aircraft with an

experience but from talking to

improvised explosive device

those who should know, that the

(IED) in the cabin relies to a large

information is so ‘cleansed’ as to

extent on placing the IED in the

be useless for long-term decisions.

best location and, contrary to

Once the threat is identified,

the popular media, aircraft are

the second question should

really strong.

then be, “Is what we are doing

I will let readers in on a

sufficient to counter the threat?”

‘secret’ – a single person can

Throwaway lines like the

carry any number of 100ml

“equipment is 15 years behind

containers in a one-litre plastic

Europe and the US” mean nothing

sealable bag onto the aircraft.

on their own. A better question is,

That is, at most, a person can

“What am I trying to find and is

have a little under one litre of

the equipment able to find it?”

liquids, aerosols and gels in his

Should screening be moved

or her possession. The rules do

WHAT I DO KNOW IS THAT SECURITY IS LIKE ANY OTHER BUSINESS DECISION; THE MARKET NEEDS TO BE IDENTIFIED FIRST OR THE PROBLEM NEEDS TO BE DEFINED.

So, what should be done? I

In this instance, I go back to the questions I included earlier in this article: 1. What is the threat? 2. What do we do to effectively counter that threat? Steve Lawson has over 20 years’ experience in aviation security. As a security executive with Qantas, Steve held a number of senior management roles covering all aspects of aviation security from policy development to airport operations. He was sent to New York immediately following the 9/11 attacks to manage the

Again, ask the question and do

Qantas response and undertook

not provide the solution before

a similar role following the 2002

from the terminal operator to a

doing so. Is there a need to screen

Bali Bombings. On his return

not say that the LAGs in those

government organisation? That

all passenger aircraft irrespective

to Australia, he was appointed

containers must be different,

may be a reasonable result and

of the number of passengers?

Security Manager Freight for the

just under 100ml per container.

I think workable, but it is not

Be very, very careful before

Qantas Group. Since 2007 he has

The explosive in Oplan Bojinka

necessarily the answer. Look at

answering that question, as a

been a Director of AvSec Consulting

(which is the classic example

the issues with the Transportation

commercial passenger aircraft

in partnership with Bill Dent, a

for building an explosive on an

Security Administration (TSA)

could have as few as two or three

fellow former Qantas security

aircraft) was nowhere near one

in the US! How does one stop

passengers! Is that going to be

executive. AvSec has recently

litre, so it could have been carried

a government organisation

screened? How about if passenger

evolved outside of just aviation

through a screening point under

turning into a bureaucracy

screening is restricted to what are

security and is now operating as

the current rules; in any case, it

that does not consider the

known as regular public transport

Paradym. Steve can be contacted

would likely be exempt since it

needs of the travelling public?

(RPT) flights? Not a problem – I

via email stephen.lawson@

was reportedly disguised as the

Again, the question should

will modify my operations so that

paradym.co or on 0404 685 103. n

76 // SECURITY SOLUTIONS

074-077_SSM109 Aviation.indd 76

securitysolutionsmagazine.com

21/08/2017 4:47 pm


For more information, please contact

Jeff Park on 0424 185 880

074-077_SSM109 Aviation.indd 77

21/08/2017 4:47 pm


ACCESS CONTROL

IS A NEW THREAT

EMERGING FOR

AC C E S S CONTROL BRANDS? BY JIM DEARING

Is the Rise of PIAM a Threat to Access Control Equipment Manufacturers?

(IAM) system. This means the

Could PIAM be a Threat to Suppliers?

across an enterprise installation –

system is able to deploy identities (cardholders) and credentials

The projected high growth of

of credentials and active directory

(cards) as well as assign access

PIAM is potentially alarming,

integration. The catch is that the

Physical Identity Access

rights into one or more vendor-

as a PIAM system’s capacity

enterprise has to exclusively adopt

Management (PIAM) systems

independent physical access

to link together and manage

that supplier’s brand.

essentially add a decision-

control systems.

multiple brands of access

making identity management

According to new research

layer on top of access control systems. This is done by

for example, central management

Because PIAM makes it

control hardware essentially

easy to control multiple brands

from IHS Markit, global PIAM

undermines the allure of some

of equipment across a single

market revenues, excluding Asia

large manufacturers’ offerings.

installation, it also makes it easier

changing the authoritative

Pacific and Africa, amounted

One of the unique selling points

for the end-user to change the

decision-making database or

to just $136 million in 2016.

that large multinational access

access control equipment over

location to a higher authority

However, this is forecast to

control suppliers tout is the fact

time by using the PIAM to ease the

like an active directory or an

grow rapidly to nearly $500

that they can offer some of the

transition. Historically, suppliers

identity and access management

million by 2021.

functionality of a PIAM system

have always fought extremely

78 // SECURITY SOLUTIONS

078-081_SSM109 Access Control.indd 78

securitysolutionsmagazine.com

21/08/2017 10:41 am


securitysolutionsmagazine.com

078-081_SSM109 Access Control.indd 79

SECURITY SOLUTIONS // 79

21/08/2017 10:41 am


ACCESS CONTROL hard for ‘greenfield projects’.

budgets large enough to afford

maintenance needs. This means

with the company is compromised.

The first access control brand

implementing such a system.

there is a cost involved for the

As a result, IT departments want to

entire lifecycle that the system

be assured that PIAM systems are

is in place. These costs, and the

completely devoid of cybersecurity

easiest way to expand that system

Barriers to Wider Adoption

lengthy implementation process,

vulnerabilities. On the other hand,

later was to buy the same brand

There are still a number of

present a huge barrier to adoption

physical security managers want

again. PIAM software, however,

barriers that PIAM providers

in smaller projects.

to be assured that the building’s

potentially eliminates this

must overcome before true mass-

advantage for manufacturers.

market adoption occurs. After all,

system implementation factors

following a simple network hack,

just two percent of all commercial

continue to stifle adoption.

or that their system is rendered

What could Happen as Adoption of PIAM Grows?

access control projects included

Installing and servicing PIAM

unusable due to a distributed

some form of PIAM system

software requires a high level of

denial of service (DDoS) attack.

in 2016. First and foremost,

collaboration and communication

If the adoption of PIAM systems

complexity remains the bane of

between the enterprise’s physical

continues to grow as expected,

PIAM system implementation.

security and IT departments.

larger suppliers may begin to see

Early adopters often have a clear

Historically, these two

Opportunity for Physical Access Control Suppliers

their grip on high-value projects

picture of what they would like

departments tend to disagree on

Despite these barriers and the

from the transportation, corporate

the system to do. The problems

where the equilibrium lies for

threat of increased competition,

enterprise and utilities sectors

arise when they start to realise

the conventional security versus

PIAM also presents a huge

weaken – especially considering

that their pre-existing physical

convenience balancing act that

opportunity for suppliers of

that these high-value projects

and logical security infrastructure

every company faces. Working

physical access control systems.

seem to be the earliest adopters

is not able to meet their own

on a PIAM system together is

The addition of logical integration

of PIAM. For example, IHS Markit

requirements. This usually comes

often no different.

adds a variety of unique selling

estimates that the number of

in one of two forms: access

transportation sector access

control hardware limitations or

security systems poses a variety

control system offering, allowing

control projects that include

weaknesses in their corporate

of potential vulnerabilities

the supplier to become more

some form of PIAM system will

governance and workflows. Both

on both sides of the equation.

competitive. Additionally, if a

quadruple during the next five

result in delays to PIAM system

Connecting every access control

large number of suppliers add

years. End-users from these

implementation.

system to the IT network and then

some form of logical integration

also managing all the identities

to their offerings, it may help

deployed had a huge advantage over the competition because the

industries are increasingly seeing

Due to their complexity, PIAM

Even for larger projects, other

Integrating logical and physical

perimeter is not left vulnerable

points to a standard access

the benefits of being able to

solutions currently require large

associated with the company via

to slow market adoption of full

automate credential management

commissioning and design efforts,

one system creates huge network

PIAM systems. It is unlikely that a

and comply with legislation.

not only initially but also post-

risk. If the system is hacked,

particularly cost-sensitive end-user

Additionally, they possess

implementation due to system

suddenly every identity associated

would opt for a bespoke solution when they are already getting some

PIAM vs Physical Access Control World (excluding Asia and Africa) revenues for 2016 and 2021 and growth forecast for 2017

level of logical integration from the physical security manufacturer. Furthermore, a traditional supplier that fully commits to developing its logical integration capabilities may be also able to provide a true off-the-shelf solution. This would be more affordable than the current PIAM systems on the market and would have the potential to drive greater adoption in small- and mediumsized enterprise projects. For more information, refer to the IHS Markit Physical Identity

PIAM

PIAM Growth

Access Control

Access Control Growth

Electronic Locks

Electronic Locks Growth

Notes: 1) The physical identity access management (PIAM) market size includes revenues from services, software and software maintenance 2) The access control market size includes revenues from equipment (readers, cards and controllers) and software. 3) The electronic lock market size includes revenues from equipment (mechatronic, electromechanical and digital cylinders) only 4) The final set of columns in the chart are the forecasted growth rates for each market in 2017. Source: IHS Markit © 2017

80 // SECURITY SOLUTIONS

078-081_SSM109 Access Control.indd 80

Access Management – 2017 report. Jim Dearing is a senior analyst, access control and fire, for IHS Markit. n

securitysolutionsmagazine.com

21/08/2017 10:41 am


KeyWatcher is a reliable and extremely easy to use electronic key management system, designed to prevent mismanaged, misplaced, or stolen keys. KeyWatcher eliminates outdated metal boxes, unreliable manual logs and messy key identification tags utilising a computerised storage cabinet. The system releases keys only to the individuals with correct authorisation, recording each user transaction and providing total system accountability.

KEYWATCHER SYSTEM OFFERS l Up to 14,400 keys and 10,000 user per site l “Site” concept uses a common database l Numerous high level interfaces for access control, contractor management and vehicle fleet systems l Longer user IDs can be up to any 6 digits, plus a 4 digit PIN l Bright 7” full colour, touch screen l “Key Anywhere” allows keys to be returned to any KeyWatcher Touch within a site l On-screen guides for users, along with voice commands

Available in Australia through: AST Pty Ltd T: +61 2 8020 5555 | M: +61 417 089 608 | F: +61 2 9624 7194 E: di@astpl.com.au | www.astpl.com.au

078-081_SSM109 Access Control.indd 81

21/08/2017 10:41 am


FEATURE

82 // SECURITY SOLUTIONS

082-089_SSM109 Article 4.indd 82

securitysolutionsmagazine.com

21/08/2017 4:52 pm


CONFRONTING

AN ISIS EMIR ICSVE’s Breaking The ISIS Brand Counter-Narrative Videos BY ANNE SPECKHARD AND ARDIAN SHAJKOVCI

Most experts agree that the most

ideology before turning away

models. Often, they are not easily

he takes his seat. Abu Islam’s

successful counter-messaging

and infiltrating a Canadian

accessible and reachable.

dark, wavy hair, medium-length

campaigns against ISIS are

terrorist cell to help take it

the ones that use the voices of

In April 2017, we spoke to

curly beard and burning brown

down (Speckhard & Shaikh,

an ISIS emir (high in military

eyes are revealed. His eyes dart

insiders: the voices of ISIS victims

2015). Usama Hasan, a former

command) in a prison in

quickly around the room, taking

and ISIS cadres themselves who

radical Salafi extremist and

Sulaymaniyah, the Kurdistan

everyone in, focus briefly on me,

have first-hand knowledge of

mujahidin in the Afghan jihad

region of Iraq.

burn momentarily into mine and

the group’s brutality, corruption,

against the country’s communist

religious manipulation and

government in the early 90s, is

and wearing a black mask over

waits to begin. They know each

deception. The International

another example of someone

his face, Abu Islam is brought

other. Alaz has already repeatedly

Center for the Study of Violent

who has turned against Salafi-

into the faux wood-panelled room

interrogated him.

Extremism (ICSVE) has spent

jihadi ideology and is dedicated

of the Special Forces Security

the last two years interviewing

to fighting violent extremism

compound in Sulaymaniyah, Iraq.

Islam has been heavily hunted for

ISIS defectors, ISIS prisoners

in the United Kingdom (www.

His hands are cuffed and feet

two years by the Peshmerga forces

and returnees from the Syrian

quilliaminternational.com).

shackled together.

who credit him with running

and the Iraq conflict in Western

Using formers is rife with

Dressed in an orange jumpsuit

There are five of us in the

then dart back again to Alaz as he

Only in his mid-twenties, Abu

a network of cells of suicide

Europe, Turkey, Iraq, Central Asia

problems, however. Those

room: myself, Ardian, Alice

bombers, sending some as young

and the Balkans. Their stories

returned from ISIS were often

(a Kurdish handler) and our

as 12 to explode themselves in

are captured on video and edited

psychologically unhealthy before

Peshmerga interpreter, Alaz. I am

suicide missions. He is credited

down to short clips, interspersed

they joined and are deeply

seated at the front corner of the

with either directly or indirectly

with actual ISIS video footage and

traumatised upon their return.

desk with my laptop unfolded.

organising attacks that killed

pictures, illustrating their stories

Some do not want to speak about

Ardian is seated to my side. Alice

over 250 victims, although some

to turn back against ISIS.

their experiences, while others

and our interpreter sit behind

of the high-ranking Peshmerga

fear retribution from ISIS if they

the desk. Alaz takes the hooded

counterterrorism officials we

terrorism is a well-established

speak out against the group. Some

Abu Islam from the prison

spoke to believe that number to

practice. Mubin Shaikh is a

of them fear further prosecution

guards and guides him gently to

be at 500. “He’s a guy we chased

good example of someone who

and social stigma. Others are

the centre chair in front of the

for more than two years,” stated

nearly joined Al Qaeda and

unstable, reverse their positions

desk next to me, where he gently

the head of Kurdistan’s Zanyari

imbibed deeply of the jihadist

frequently, or are not good role

lifts the mask from his face as

intelligence service in a recent

Using formers to talk back to

securitysolutionsmagazine.com

082-089_SSM109 Article 4.indd 83

SECURITY SOLUTIONS // 83

21/08/2017 4:52 pm


FEATURE interview with journalist Robin

came to Iraq and established their

Wright (2017). “To pick him up

Islamic State.

and realise that we finally got

“I got into the brotherhood at

him, it was a big catch for us,”

the mosque,” Abu Islam explains.

he explained.

“They were against Islamic State,

Born as Mazan Nazhan

but for me I saw that the Islamic

Ahmed al-Obeidi, Abu Islam is

State was living by shariah law.

the second oldest in his family.

They were throwing homosexual

He is the oldest male and has

people from high buildings. If you

eight siblings. His father served

steal, they cut your hand. They are

in Saddam’s army. He describes

really living it.”

his childhood as both “safe” and

When asked where he saw

“nice”. Growing up in the oil-rich

this, Abu Islam answers, “It was

area of Kirkuk, Iraq, Abu Islam

on social media, YouTube. It

first finished high school and then

made sense for me. I watched

pursued university studies in

a lot of their videos.” As we

shariah (Islamic law) at the local

listen to him speak, we become

university. With only one year left

aware of ISIS’s powerful online

to go before graduation, in 2014

presence and online propaganda

Abu Islam abruptly left his studies

machine that recruits youth via

to join the so-called Islamic State.

the Internet here in Iraq as well.

“I wasn’t Salafi growing up,”

Even in Iraq, ISIS propaganda

Abu Islam explains. The legs of his

videos reached a university

orange jumpsuit are rolled up to

student, persuading him of their

mid-calf – Salafi style – to match

righteousness, “I was convinced

the dress worn by the Companions

and made up my mind.”

also bypassed military training

and teach them. I moved from

since they needed shariah

place to place to give shariah

also. They had a territory twice

teachers to train the others. “They

lessons,” Abu Islam explains.

in university when I read the book

the size of Great Britain. At the

didn’t teach me weapons. In the

“It was mostly fiqh [principles

Tawhid by Wahhab. It convinced

time I joined, I was 22 or 23. A lot

beginning, they asked me if I knew

and understanding of Islamic

me,” he adds.

of my relatives were in the area

how to use an AK, and of course,

practices]. How to pray properly.

Abu Islam is referring to

they [ISIS] took over, and some of

I did.” The knowledge of assault

How to fast. How to help other

Kitab at-Tawhid (The Book of the

my cousins and family members

rifles is common among Iraqis,

Muslims, how to pay zakat

Unity of God) by Muhammad ibn

were already in [ISIS]. It was easy

notes our Peshmerga interpreter.

[obligatory charity] and about the

Abd al-Wahhab, an 18th century

to join. I got a recommendation,”

“I gave lessons in shariah.”

Saudi religious reformer who

Abu Islam explains, referring to

This is how Abu Islam initially

worked to purify Islam by turning

the ISIS practice of trusting their

describes his role in the

interviewed in our ISIS Defectors

back to following the original

potential recruits based on the

Islamic State.

Interview Project described their

practices of the Prophet and his

recommendation of another ISIS

Companions. The violent followers

member. “They knew I don’t drink

there are not large camps for

charismatics” and were heartened

of Wahhab, including Al Qaeda

or smoke and that I’m a shariah

the Cubs of the Caliphate in Iraq,

by learning “true Islam” from

and ISIS, interpret his teachings

student. That made my CV look

where hundreds of youth are

them (Speckhard & Yayla, 2016). I

to justify killing those who do not

really good,” he explains while

gathered, trained and taught to

ask if the Iraqis already knew their

follow their strict interpretation

smiling enthusiastically.

fight – with some being trained

religion or were also gladdened

and prepared to become suicide

by these teachings. His answer,

of the Prophet Muhammed. He is

“They were on the streets

also bearded. “I got that mentality

of Islam. ISIS, and groups like

“I didn’t take shariah training,”

Compared to Syria, it appears

Islamic State.” In Syria, ISIS defectors

shariah trainers as “shining

them, practise Takfir – that is, an

Abu Islam answers proudly when

bombers – after they graduate

“They didn’t know the right way.

extreme extension of Wahhabi-

asked about ISIS’s known practice

(Ibid). In Iraq, it seems the Cubs

We taught them the right ways.

Salafi doctrine that sanctions

of putting new recruits through

are gathered into smaller groups.

We talked about what it could

violence against both Muslims and

two weeks of shariah training

Individuals like Abu Islam

[Islamic State] be. Hopefully, we’ll

non-Muslims who are deemed as

to learn the basics of Islam as

appear to serve as their itinerate

expand our territory. According

infidels (non-believers). This is the

they preach it and to take on

preachers, travelling from one

to our beliefs, we can’t say we are

type of Islam and ideology that

their ‘hear and obey’ philosophy

group to another.

definitely doing it. Instead, we say,

Abu Islam had already embraced

(Speckhard & Yayla, 2016). “I

in his university studies, thus

became the teacher because of my

five or six to seven [individuals].

expand our territory. Open the

he was ready for ISIS when they

background,” he continues. He

It depended. I’d go to the villages

walls. Take down Europe.”

84 // SECURITY SOLUTIONS

082-089_SSM109 Article 4.indd 84

“Sometimes there were four to

inshallah [by God’s will] we will

securitysolutionsmagazine.com

21/08/2017 4:52 pm

FP Ad


Pre-installed software ready to go ! SECURING YOUR BUSINESS HAS NEVER BEEN SO SIMPLE

Easy Installation

Mini-PC with AxTraxNG UltraLight

Pre configured cards

Flexible grow together with your business

The most advanced mainstream readers in the market. TRY THE NEW 2017 VERSION... • ALL THE FLEXIBILiTY YOU WANTED IN 13.65 MULTI CREDENTIAL CSN • CONFIGURATION CARD SUPPORT

• TWO NEW ANTI-VANDAL MODELS • NOW WITH NFC-ID CARDHOLDER APP FOR ANDROID OS

OFFICIAL DISTRIBUTOR

www.seadan.com.au TEL 1300-366-851 EMAIL seadan@seadan.com.au

FP Ad Template.indd 1 4.indd 85 082-089_SSM109 Article

23/06/2017 am 21/08/2017 11:47 4:52 pm


FEATURE question was asked and explains that ISIS never takes children into its ranks, “In Iraq, you have to be 18 to sign up for the Army. We

MOST EXPERTS AGREE THAT THE MOST SUCCESSFUL COUNTER-MESSAGING CAMPAIGNS AGAINST ISIS ARE THE ONES THAT USE THE VOICES OF INSIDERS: THE VOICES OF ISIS VICTIMS AND ISIS CADRES THEMSELVES WHO HAVE FIRST-HAND KNOWLEDGE OF THE GROUP’S BRUTALITY, CORRUPTION, RELIGIOUS MANIPULATION AND DECEPTION.

[ISIS] don’t have any age limit. Instead, we believe that when a man’s semen develops, then he’s considered a grown-up man. We only take them when they get to that point. They were never children. They were men.” Cynical about how he answered the question, I further probe, “How old were these men according to your criteria?” “A fully-grown man has to have his semen,” Abu Islam reiterates. “This is according to shariah.” The translator interjects by explaining that, according to Abu Islam’s definition, a young boy who begins with wet dreams is already

Abu Islam tells us that there

Picking them up and handling

die. All this I already know from

a man ready for battle and mature

were “young fighters from foreign

them gave each of us a chill down

our Syrian defector interviews

enough to sign his life over for a

places”, in his classes, but “they

the spine – touching the same

(Speckhard & Yayla, 2016).

‘martyrdom’ mission.

didn’t understand much Arabic”,

books ISIS cadres had handed out

which reminds us of an Albanian

to children under their control.

I interviewed in Kosovo who

The schools in the area

“We used to tell them,” Abu

While Abu Islam denies

Islam begins, but then quickly

there was any pressure in ISIS

detours into denial. “It was not

for children to become martyrs,

also recalled taking ISIS shariah

continued to run even when ISIS

my job exactly.” He hesitates and

we know from ISIS defector

training in Arabic – it all went

took over, Abu Islam explains,

then continues, “Study and learn

interviews that in the Syrian

over his head.

adding, “They used to study

your future. We want to expand

training camps youth are heavily

English. It was good for us,

our territories and put shariah

pressured into driving explosive-

just spoken at the Prime Minister’s

knowing English, but we denied

over the whole earth. Most of the

laden cars into enemy lines and

conference, Education in Iraq

books that we didn’t like. After a

time they came as volunteers,

lied to about the painfulness of

Post Daesh-ISIL Territory. The

while, we denied all the existing

self- motivated.” Remembering

their deaths – sometimes failing

conference brought together

books. We changed all the books

how the kids chose themselves

to even tell them their mission

both local and international

over to our mentality.”

as martyrs, he gains confidence

involves death. “There is an office.

again, “They have read the book.

If anyone volunteers… ‘I want to

We are in Iraq this trip having

experts to address the issue of

“How did you talk to the

the 250–500,000 youth that the

kids who are going on suicide

We make the way for them. We

my give my bayat [pledge]’ then

government of Iraq estimates lived

missions?” I ask, going back to

never told anyone they have to go.

he signs up for a martyrdom

and served under ISIS over the

his role as a shariah trainer.

It’s voluntary. It’s never forced. I

mission at the same time. It’s like

past three years in the Nineveh

“What did you teach them to

didn’t see anyone forced, ever.”

a regular recruiting process,” Abu

and the Mosul regions of Iraq.

persuade them to go on suicide

Universities were closed under

missions?” already knowing from

children to take martyrdom

ISIS. Libraries were burnt to the

our interviews with Syrian ISIS

missions – driving explosive-laden

training camps and how they

ground. Textbooks, even for the

defectors that ISIS leaders fill

cars or wearing vests into enemy

have a steady stream of explosive-

very young, were replaced by texts

the children’s minds with bright

lines or checkpoints – what did

rigged cars being made to put

that taught them how to behead

visions of paradise and promise

you teach them? How did you

the children in and send them to

and indoctrinated them from the

them they will feel no pain when

prepare them?” I ask, having

their deaths at checkpoints and

earliest of ages into Islamic State’s

they push the button to explode

already learned from Peshmerga

the front lines. “There is a training

barbarity and refusal to recognise

themselves – that they go instantly

counterterrorism officials that he

camp they take them to and teach

anyone else’s views as legitimate

to paradise. The faint-hearted ones

sent them as young as 12 years old

them how to set up and use these

but their own. At the conference,

are even offered a sedative and,

on suicide missions.

cars,” he explains. “It’s a regular

we viewed the exhibit of some

in many cases, the youngest do

of these captured ISIS textbooks.

not even realise they are about to

86 // SECURITY SOLUTIONS

082-089_SSM109 Article 4.indd 86

“So, when you prepared young

Abu Islam exudes disagreement with how the

Islam explains. He is further asked about the

camp they tell them…” he hesitates again. “The car manufacturing is

securitysolutionsmagazine.com

21/08/2017 4:52 pm


in a different place,” he detours. “But what do they tell these children?” I push. “They instruct them. They

“Both,” he answers. “They wear the belt in the car just in case one goes down,” he adds. “What are their instructions?”

“Were you scared?” I ask.

produced videos denouncing ISIS.

“Yes,” he admits. “I was scared.

I open my computer and ask if

Every human being is scared.” I ask Abu Islam about ISIS’s

he would be willing to watch the video of another ISIS cadre (a

know what will happen. They’re

I further ask. “Kill as many as

policy toward captured women,

defector) speaking on this subject.

happy. It’s like a kid on Christmas.

possible?”

a question that instantly grabs

I inform him that it is a short

You know how happy they are?

“Yes.”

his attention. He is in his element

video – only four minutes – and

Calmly happy, knowing something

“Any special conditions? What

spouting out shariah law on the

with his agreement, I begin to play

good is going to happen,” Abu

if there are women and children

rights of ISIS cadres with regards

it. Abu Islam watches intently as a

Islam explains as we realise he

at a checkpoint?” I probe.

to captured women. “It becomes

Syrian former ISIS cadre explains

a right,” he says, while looking

his horror and post-traumatic

an enemy. Everyone is a target,”

around the room in which three

stress after being the guard for 475

this?” I further ask, wondering

Abu Islam intones, but quickly

out of five in the room are women,

Yezidi, Shia and Sunni sex slaves,

exactly how they send a kid off to

adds, “In cities, we tell them to try

waving his arm to bring us all

including his role in organising

his horrific death.

avoid targeting the markets and

into his sweeping gesture. “If I

mass institutionalised rape.

civilians, and they have specific

dominate everything in this room,

list of serial numbers and names.

targets – military and government

then it becomes mine. I do as I

the pictures in the video taken

If I’m set to go next, then I’m next.

targets.”

want. It all becomes the property

from ISIS, taking in faces and

of the Islamic State,” he adds.

places he may recognise, just as

truly embraces this sickness. “Is there any ritual to go with

“They [the ISIS senders] have a

If something changes the order

“In the front line, everyone is

“And you?” I ask about his

Abu Islam’s eyes dart along

and they aren’t sent, they start

recent arrest in which he was

crying. If they are the next one,

wearing, but did not detonate, his

of listening to anything without

Huthaifa Azzam did when we

they actually cry and get angry,

suicide vest. “I didn’t sign up to

having much of a reaction during

showed him the same video. “He

and even complain, ‘My name is

be one. I did fight.” He goes on to

the interview, we felt suddenly

is an Iraqi speaking,” Abu Islam

set to go!’ I’ve seen this with my

say that he has fought in all three

sickened, imagining how close

comments. I tell him no, this is a

own eyes,” Abu Islam explains,

ISIS tactical military formations,

to Mosul we have been in the

Syrian, but he has got a similar

as his eyes appear to shine in

including in the very front line

past days – barely an hour’s

accent as he is from Deir ez-Zor.

admiration for their zeal.

where the fighters go in wearing

drive – and how this mindset has

The video plays as Ibn Ahmed

vests and martyr themselves

been a harsh reality for so many

(the ISIS defector in the video)

if overtaken, killing everyone

captured women, whether they be

paints a grim picture of rape

around them to avoid capture. He

Yazidis, Christians, Shia or Sunni

and horror for young captured

was never one of those cadres,

women alike.

women separated from their men

“What happens right before you go?” I ask again. “There is nothing special they do.” “Pray? Wash? Celebrate? Make

While we are usually capable

the Free Syrian Army (FSA) fighter

yet he states, “I always had my

Abu Islam denies that he

a video?” I press, as in the past I

suicide belt on. We jump into

had a sabaya (sex slave). He also

images of Yazidi and other women

have sat with relatives of bombers

the [Peshmerga] helicopters and

explains that very few Iraqis

abused by ISIS appear on the

who have seen the videos of their

explode ourselves. There is no

had them. He can think of only

video, Abu Islam’s gaze falls to

children wrapped up in explosive

surrender. No surrender. Just

one man in their area of ISIS,

the floor. Suddenly, he is silent

vests or jammed into explosive-

push the button.”

Dr Mahavia, who had one. This

and stunned to see his version of

is likely similar to the Syrian

his glorified ISIS described in this graphic manner.

laden vehicles, with some crying

“But you did surrender?” I

and others seemingly jubilant

press. “You wore the belt. Did

experience where married Iraqis

about going as martyrs.

you have it in your mind, when

who served from home are not

captured?”

seen by ISIS leadership as needing

“There is nothing special. They wash up to be clean. Everyone

“You didn’t have time to

to be supplied with a woman.

and children. As more horrifying

“How do you feel watching this video?” I gently ask. “I was against that idea,”

prays. Everyone says goodbye.

detonate or didn’t want to do it?”

Yet, we will hear next from an

he says. His voice appears flat

There are tears of joy. We make

inquires Alaz, our Peshmerga

unmarried Iraqi who took full

by what he has just viewed. “It

a video,” he admits, but again

translator, while explaining to us

sexual advantage of the enslaved

doesn’t matter. When I see this

adds a denial, which is possibly

how he never had the chance to

women held in this region of Iraq.

video… this is the outcome of this

self-protective given he is in prison

ask him this question and would

As we continue interviewing

and does not want to incriminate

like to know the answer as well.

himself. “I didn’t make the

“I didn’t want to die. I wanted

practice – this video. It’s not the

Abu Islam, though calm, I feel

proper way to turn you to Islam.

increasingly agitated and irritated

It’s not a good way to spread our

videos. I sent them to Kirkuk,”

to live, so I didn’t do it,” Abu Islam

at how he is able to justify the

beliefs.” Referring back to the

he explains.

states matter-of-factly, despite

brutal and inhumane practices

rapes, he adds, “Not everyone

“Do they receive a sedative?”

the fact that he has sent plenty of

of ISIS and offer arguments in

listens [to objections]. They

“No sedative, ever.”

others to do just that. “I wanted

support of their activities. Just

just go with it. There are more

“What’s the usual way to go?

to finish the project, spreading

before my next question, I decide

that like it [raping of captured

shariah,” he adds.

to show him one of our ICSVE-

women] than are against it.”

Car or belt?”

securitysolutionsmagazine.com

082-089_SSM109 Article 4.indd 87

SECURITY SOLUTIONS // 87

21/08/2017 4:52 pm


FEATURE “How about the beheadings?” I ask. “It was a law,” he answers. We cannot help but see discomfort in his face as he patiently awaits his next question. “Is it not the same thing? Does

again studying everything in it. At the end, the boy denounces ISIS, calling them kafirs (unbelievers) and infidels. “He [the boy] is calling you the kafir. How do you feel about that?” I ask after we view the clip.

it not also spread a negative view

“These are little kids. Do these

of Islam?” I further push.

children have their semen? Are

“I got convinced,” Abu Islam answers defensively. “How do you feel now?” “It’s not right,” he says gazing down at his hands, and adds, “We were wrong.” “Is there a way to get there

they men?” I challenge, feeling angry with his denials. Abu Islam is stunned into silence as he again begins to stare at the floor. “How do you make this right between you and Allah?” I ask

without all this violence?” I ask

softly, wondering if he will open

softly, knowing he harbours the

up more.

dream of spreading shariah and

“Allah will accept everything

AFTER BEING CHALLENGED WITH THE HARSH REALITIES OF ISIS AND OTHER ISIS CADRES DENOUNCING THE GROUP, HE ADMITS TO NOT KNOWING WHETHER ISIS WAS RIGHT.

and Bride of ISIS and coauthor

We have focus tested the

FBI, CNN, BBC, NPR, Fox News,

of ISIS Defectors: Inside Stories of the Terrorist Caliphate, Undercover Jihadi, and Warrior Princess. Anne has interviewed nearly 500 terrorists, their family members and supporters in various parts of the world, designed the psychological and Islamic challenge aspects of the Detainee Rehabilitation Program in Iraq to be applied to 20,000+ detainees and 800 juveniles and has consulted to NATO, OSCE, foreign governments and to the U.S. Senate and House, Departments of State, Defense, Justice, Homeland Security, Health and Human Services, the CIA,

making a utopian world where

– if you admit it,” he answers

Islam reigns above all else.

back, and continues to stare at

Breaking the ISIS Brand videos

MSNBC, CTV and in Time, The

the floor.

in the Balkans, Central Asia,

New York Times, The Washington

Western Europe and the Middle

Post, London Times and many

East, and overwhelmingly they

other publications.

“Yes, of course.” “Why did you sign up to violence?” I ask, although I know that the US and the US-led coalition security blunder in Iraq that led to the ousting of Saddam

“Did you make a mistake?” I ask. “Yes. We were mistaken,” are his last words. We end our interview. The

have hit their mark. No one

Ardian Shajkovci Ph.D. is

we spoke to questioned their

the Director of Research and a

authenticity or viewed the

Senior Research Fellow at the

Hussein’s senior military and

guards come into the room and

message as being wrong. Many

International Center for the Study

intelligence officials, coupled

Abu Islam’s black mask is once

are sobered by them, including

of Violent Extremism (ICSVE). He

with more than a decade of

again placed back over his face

the ISIS emir we discussed in

has been collecting interviews

sectarian killings, gave birth

as he lets them guide him blindly

this article.

with ISIS defectors and studying

to ISIS.

out of the room.

If readers want to support

their trajectories into and out of

Abu Islam is by no means

ISCVE’s Breaking the ISIS Brand –

terrorism as well as training key

time,” Abu Islam explains. “I got

rehabilitated from watching two

ISIS Defectors Counter-Narratives

stakeholders in law enforcement,

convinced,” he adds. He explains

counter-narrative videos. That

Project, please contact us at

intelligence, educators and

about how ISIS appeared as a

being said, capture, interrogation

info@ICSVE.org or donate on our

other professionals on the use

righteous and Islamic answer to

and imprisonment have all

webpage www.icsve.org

of counter-narrative messaging

sectarian power struggles and

begun to work on him. After

security issues, “I didn’t know it

being challenged with the harsh

was going to be that way.”

“I believed back in that

We ask Abu Islam if he is

materials produced by ICSVE both The names of participants

locally and internationally. He

realities of ISIS and other ISIS

other than the authors and Abu

has also been studying the use

cadres denouncing the group, he

Islam have been changed.

of children as violent actors by

willing to watch another ICSVE-

admits to not knowing whether

produced video. When he agrees,

ISIS was right. After all, joining

references, email info@

rehabilitate them. Ardian holds

we show him our four-minute

ISIS has not worked out that

interactivemediasolutions.com.au

a doctorate in Public Policy and

video clip of a 15-year-old

well for him. Arguably, once

Anne Speckhard Ph.D. is

Administration, with a focus on

Syrian boy describing his time

confronted with other former

Adjunct Associate Professor

Homeland Security Policy. He

in the Cubs of the Caliphate and

ISIS cadres telling the truth, he

of Psychiatry at Georgetown

also holds several professional

how the leaders sent children

is unable to keep up his false

University in the School of

certifications in the field of

as young as six years old in

bravado and unquestioned

Medicine and Director of the

homeland security, as well as

explosive-laden vehicles to their

beliefs in ISIS’s interpretation

International Center for the Study

a professional designation for

deaths – many having no idea

of shariah law. His arguments

of Violent Extremism (ICSVE)

his contributions to the field of

they were about to die. There

fall flat. He is backed into

where she heads the Breaking

homeland security and homeland

are pictures of children younger

submission, as evidenced through

the ISIS Brand – ISIS Defectors

security efforts in general. He is

than eight in the film. Abu Islam

his responses after watching

Interviews Project. She is the

also an Adjunct Professor teaching

watches this clip intently as well,

the videos.

author of Talking to Terrorists

counterterrorism courses. n

88 // SECURITY SOLUTIONS

082-089_SSM109 Article 4.indd 88

For a full list of

groups such as ISIS and how to

securitysolutionsmagazine.com

21/08/2017 4:52 pm

L P


NEW UniGuard+Real Time Guard Duress

RFID NFC

Long Range

Supports Bluetooth long range beacons

CALL FOR A FREE INFO PACK 1300 133366 Locally supported by DelTonic Pty Ltd – Po Box 359 Plumpton NSW 2761 – ABN 69 108 465 550 Phone 1300 133366 Email Sales@uniguard.com.au – Web: www.UniGuard.com.au

Follow us on Twitter twitter.com/secsolutionsmag

082-089_SSM109 Article 4.indd 89

23/08/2017 5:19 pm


FEATURE

GLOBAL

MARKET TO EXCEED $14 BILLION IN 2017, ACCORDING TO IHS MARKIT BY BLAKE KOZAK, PRINCIPAL ANALYST, IHS TECHNOLOGY

10 percent of households will be smart by 2025

Smart home device revenue will exceed $14 billion in 2017

The smart home market has seen

The global market for smart

significant growth since 2010,

home was worth $14.7 billion in

when fewer than 0.5 percent of

2017, with the Americas region

homes in the Americas region

representing 48 percent of

had connected devices such as

global revenues.

thermostats, lighting, security and

90 // SECURITY SOLUTIONS

090-093_IHS Markit Editorial.indd 90

In 2021, the EMEA region will

entertainment, according to the

represent the largest portion of

device database of the IHS Markit

device revenue with a 42 percent

smart home intelligence service. By

global share.

the end of 2017, nearly 7 percent of

When excluding large ticket

households in the region will have

items, such as major appliances, the

a connected home, averaging six

global market size for smart home

devices per home. Globally, in 2025,

devices is forecast to be worth $3.3

10 percent of households will be

billion by the end of 2017, reaching

smart homes.

$9.4 billion in 2021.

securitysolutionsmagazine.com

23/08/2017 3:30 pm


securitysolutionsmagazine.com

090-093_IHS Markit Editorial.indd 91

SECURITY SOLUTIONS // 91

21/08/2017 3:17 pm


FEATURE

Although the EMEA and

radiator valves were shipped

The top five players for unit

Americas regions are expected to

shipments in 2016 accounted

into Europe. By 2021, about

represent more than 70 percent

for 34 percent of global unit

75 percent of radiator valves

of revenues for smart devices

shipments and included Xiaomi,

will be shipped into Europe,

over the next five years, Asia is

Amazon, Honeywell, Nest and

expected to dominate in terms

Koninklijke Philips N.V.

of unit shipments. In 2021,

Globally, 19 manufacturers

the Asia region is expected to

had more than 500 thousand

represent about 46 percent of

annual smart home device

unit shipments. Leading the unit

shipments in 2016. 46

shipments in Asia in 2021 will

manufacturers had more than

include light bulbs, air quality

$10 million in revenue in 2016,

sensors and video cameras.

when excluding appliances.

Top five players account for 36 percent of revenue

Top products to watch

Nest, Amazon, Honeywell,

growth include radiator valves,

Xiaomi and Netgear rounded

air quality sensors, smart

out the top five for smart

speakers and appliances.

The top smart home devices to watch in terms of unit shipment

home revenue accounting

IN 2016, 90 PERCENT OF SMART RADIATOR VALVES WERE SHIPPED INTO EUROPE. BY 2021, ABOUT 75 PERCENT OF RADIATOR VALVES WILL BE SHIPPED INTO EUROPE

with Asia gaining traction, representing 24 percent of shipments in 2021. With the increased awareness of energy savings, radiator valves are expected to become part of smart home systems, especially in Germany and in other countries where district/ common heating is popular. Air quality sensors Air quality sensors are gaining traction across the three major regions but are mostly a device for the Asia region. In 2016, Asia represented about 64 percent

for 36 percent in 2016 when

Radiator valves

of air quality device shipments.

excluding appliances.

In 2016, 90 percent of smart

However, in 2021, the Asia region

92 // SECURITY SOLUTIONS

090-093_IHS Markit Editorial.indd 92

securitysolutionsmagazine.com

21/08/2017 3:17 pm


will represent 95 percent of the air

enhancement to in-home displays

that many appliances are already

WeMo switch not connected to

quality device market.

(IHDs) that will likely be placed

embedded with Wi-Fi capabilities

the network would be useless.

through the home.

that only need to be turned on by

As a result, many connected

the manufacturer.

appliances are not actually

Air quality sensors are devices that measure Volatile organic

Although smart speakers

compounds (VOCs) and Particulate

will remain the primary form-

Matter (PM2.5). There are only a

factor for voice assistants in the

manufacturers of appliances to

few device brands that measure

smart home, home audio is also

the smart home will be the data

VOCs and even fewer that

expected to gain traction. Several

that can be collected but this will

manufacturers need to make

measure PM2.5; however, the list

manufacturers and service

be a challenge for many because

the setup dead simple and

will continue to expand over the

providers are already integrating

most manufacturers are not well

need to educate the customer

next five years.

with leading speaker platforms to

placed to manage and service

on use cases in order to justify

bring audio into the smart home.

connected devices. For appliance

the process of connecting the

sensors available to the smart

This is significant because to-

manufacturers to be successful,

appliance to a network.

home market focus only on CO2,

date, the consumer smart home

partnerships will be critical,

air temperature and humidity.

has not included audio (speaker

especially for voice control

By 2021, IHS Markit expects

systems) in any format. Audio

because many appliances are not

Analyst for the Security

that more consumers will be

has been reserved for the ultra-

well suited for embedded voice

Technology Group at IHS. Blake is

purchasing air purifiers in

high-end automated households

activation or control.

responsible for all research across

addition to these sensors that

only but it is expected audio will

detect air quality, especially in

become more mainstream and

shipments, the quantity of

business models, platforms,

the major cities across Asia such

offered by service providers

appliances that are actually being

devices, consumer video and

as Beijing.

(telcos and security companies)

used with a mobile app remains

competitive analysis. Since joining

by 2021.

very small, despite many models

IHS in 2008, he has authored

and brands of appliances being

numerous syndicated reports and

were about 7 million smart

shipped with the feature option.

intelligence services on intruder

speakers shipped.

The reason for low percentage

alarms, electronic physical

of connected appliances actually

access control, Access Control

Currently, many air quality

Globally, there were about 1.1 million air quality sensors shipped in 2016.

Globally in 2016, there

Smart speakers

What will drive

In term of activations versus

connected to a network and the reason is it remains cumbersome. Overall, appliance

Blake Kozak is a Principal

the smart home which includes

Home audio (smart speakers)

Appliances

being used goes back to the

as a Service (ACaaS), perimeter

will continue to be one of the

Globally appliances were the

use cases and ease of setup.

security and residential security.

most disruptive trends in smart

fourth largest device type in

For most major appliances, a

Blake is also a regular speaker at

home through 2021. The primary

terms of unit shipments in 2016

refrigerator or dishwasher will

industry events.

reason voice assistants in the

but will be the most shipped

work without connectivity to the

smart home will gain significant

device type in 2021. The reason is

network. In comparison, a Belkin

For more information visit https://technology.ihs.com n

traction across all three regions is the ability for these devices to aggregate disparate systems. So instead of using five different mobile applications in order to control the smart home features, voice can be used to aggregate all control, reducing the need to interact with a mobile device once the product is setup. Voice reduces complexity by removing the need for additional hardware such as tablets and mobile phones, so anyone that can speak can potentially interact with the home. This is significant because, today, most smart home solutions sit in one app (usually an aggregator app) and one single device behind a passcode. This limits family interaction with the smart home system. Voice is an

securitysolutionsmagazine.com

090-093_IHS Markit Editorial.indd 93

SECURITY SOLUTIONS // 93

23/08/2017 3:34 pm


SECURITY STUFF C O N T E N T S

SPOTLIGHT Dahua

096

HID

098

Add-on

100

94 // SECURITY SOLUTIONS

094-095_SSM109 Security Stuff.indd 94

PROFILE

PRODUCT SHOWCASES

SHOP TALK

Hills Limited and Genetec

Amaryllo

108

Dahua

112

Dahua

109

Sektor

112

Boom Edam

109

STid

113

Salto

110

Hikvision

113

KeyLokrâ„¢

111

AMC Alarms

111

VIVOTEK and Genetec

102 104

securitysolutionsmagazine.com

21/08/2017 2:28 pm


securitysolutionsmagazine.com

094-095_SSM109 Security Stuff.indd 95

SECURITY SOLUTIONS // 95

21/08/2017 2:28 pm


SPOTLIGHT

DAHUA RETAIL SOLUTION

Dahua Retail Security Solution

Dahua Retail Security Solution

It calculates foot traffic at the

June 26, 2017 With the impact of a

Dahua Technology, a world leading

export of daily / monthly / yearly

rapidly developing

provider of intelligent video

reports, providing highly valuable

online shopping industry through

surveillance products and solutions,

data as a reference for future

PC and mobile devices, retail

launched the Dahua Retail Security

business decisions.

stores are facing great

Solution. Dahua Retail Security

challenges. In a fiercely

improves customer satisfaction,

The video feed and corresponding

competitive market, enlarging

secures the shopping environment,

POS information can be shown

the customer base and

and optimises business results –

simultaneously, both in the real-

maintaining their loyalty become

which keep OPEX low, enhance

time and in playback mode. Text

increasingly important and at the

store operating efficiency, and

search is supported to retrieve

same time – very difficult.

increase profits. The solution is

specific order and associated video

Improving customer satisfaction,

customised for you.

recording data.

transactions, ensuring a safe

Technical Highlights

series cameras provide up to a

environment, and reducing

People Counting & Height

140dB Wide Dynamic Range for

unnecessary loss have become a

Detection The 3D Camera

obtaining a crystal clear image

major focus of retail owners and

provides people counting and

even in high contrast, sunny

chain store companies.

height detection functionalities.

environments. Clearly monitor

H

ANGZHOU, CHINA /

096-101_SSM109 Product Spotlight.indd 96

POS (Point of Sale) Integration

Super WDR Dahua Ultra Smart

maximising per-customer

96 // SECURITY SOLUTIONS

store entrance, and supports the

securitysolutionsmagazine.com

21/08/2017 3:29 pm


store entrances under various

enabling them to manage and

conditions, day or night.

operate according to data like an

Heat Map Fisheye cameras

e-commerce storefront.

identifying the cause of problems. Store Room Starlight cameras

(Dahua Security Software), managers can view the latest store information

make sure your store room is under

and access video through mobile

provide Heat Map functionality for

Store Floor As a major area

careful surveillance 24 hours a day,

devices even when they are on

areas throughout the store, helping

center of the shopping experience

performing well under any lighting

business trips.

businesses analyse and adjust to

and customer traffic, the shelf area

conditions and greatly reducing the

customer traffic. A fisheye camera

tends to have differentiated visitor

probability of being robbed. Day

Summary

also can capture images around the

flow and requires great efforts

and night, starlight cameras provide

The Dahua Retail Security Solution

store floor.

in enacting security measures.

complete coverage of the store

provides more details without blind

Monitoring coverage contributes

room, preventing theft.

spots, ensuring the safety of your

Dewarping Modes Dewarping

employees, customers and property.

modes allow fisheye cameras

to reducing theft of customer

to capture a full view of the

property and retail goods, providing

application scenarios are mainly

It also helps provide valuable

stores. One fisheye camera has a

a reassuring shopping environment.

used to help retailers manage the

statistics to aid your future business

field of view equivalent to eight

Meanwhile, visitor flow data helps

store more efficiently with valuable

decisions. It is cost-effective,

standard cameras.

shopkeepers understand visitor flow

data. It utilises data processing

customisable, and cross-functional,

distribution so they can prolong the

to reduce time and labor cost,

and is an ideal solution for retail shop

suitable for narrow shopping aisles,

time of customer stay and visitor

and relies on a visualisation of

owners and chain store companies.

enabling minimal camera usage to

flow coverage by rearranging goods

various data to get an intuitive

With a mission of “Safer Society,

monitor the same area.

and shelves.

understanding of previous and

Smarter Living”, Dahua will continue

current status of the store as well as

to focus on “Innovation, Quality,

its future trend.

and Service” to serve partners and

Corridor Mode Corridor mode is

Checkout Counter Customer

Office DSS business analysis

Application Areas

disputes and salesperson fraud

Entrance Port People counting

occur frequently at the checkout

& Height Detection helps retail

counter. High-definition video,

time, with remote access to the

stores acquire customer flow data,

audio, and POS overlay can improve

management client in Dahua DSS

securitysolutionsmagazine.com

096-101_SSM109 Product Spotlight.indd 97

Remote Access At the same

customers around the world. Visit www.dahuasecurity.com to learn more. n

SECURITY SOLUTIONS // 97

21/08/2017 3:30 pm


SPOTLIGHT

ATTENTION INTEGRATORS MIGRATING YOUR CUSTOMERS TO GOLD CLASS MOBILE ACCESS HAS NEVER BEEN EASIER!

n a world where we

experienced the benefits of ISCS

end users will enjoy using HID

the Gold Class Mobile Access

rely so heavily upon

Gold Class mobile technology.

Mobile Access so much, that they

system offers user convenience,

Managing Director of ISCS,

will seriously consider rolling the

operational efficiency and

Stuart Harmer, said the organisation

system out throughout their entire

higher security.

your security and access control

is so excited by the technology,

business.”

should follow suit.

that it is offering a limited time

I

our mobile devices, it makes sense that

From smartphones and tablets

Just like the traditional access

By ‘tapping’ their mobile device or using the ‘twist and go’

promotion that will not only

control, the Gold Class Mobile

gesture, employees will have more

to wearable devices, leveraging

allow end users to experience the

Access system works with Gold

convenient and efficient access.

mobile technology for door

convenience of Gold Class Mobile

Class Mobile Access Credentials

Administrators can also save time

access, parking facilities, gates,

Access, but integrators will have

which are assigned to staff

through using the Secure Identity

as well as networks and other

the opportunity to increase their

members via email. By simply

Services portal, which allows

enterprise applications, is an

passive income.

downloading the Mobile Access

operators to create, manage, issue

App, staff will have instant access to

and revoke credentials over the air.

obvious progression in the world of access control. According to Netflix Facilities

“The convenience that mobile connectivity offers is changing

a range of secure access points and

the way we live, work and play.

network access points.

Using a cloud-based Trusted Services Manager, Seos® allows

Operations and Events Manager,

For a limited time, ISCS is offering

Alison Brown, “Only having to carry

new and existing customers and

control convenient for staff, it also

security protections, as overall

one device for so many daily tasks

integrators the option to install one

positions businesses with a more

facility security is elevated by the

is excellent.”

free HID Mobile Access Reader for

modern and professional image.

simple notion that users generally

It’s seems surprising then, that many businesses have not yet

98 // SECURITY SOLUTIONS

096-101_SSM109 Product Spotlight.indd 98

up to five users,” Mr Harmer said. “We are so confident that

This not only makes access

Leveraging Seos® as its underlying credential technology,

operators to go beyond technical

guard their mobile phones more closely than their access cards.

securitysolutionsmagazine.com

21/08/2017 3:30 pm


“By extending access control to

allows users to open gates and

a mobile device, we are allowing

doors, but allows users to log

the end user to securely access

on, open electronic locks and

the workplace using a device that

securely release documents from

is almost always on hand,” Mr

the printer.

Harmer said. “From the parking gate, to the

The award-winning technology is based on ISO standards and used by

front door and the network, Mobile

organisations around the world to

Access can help organisations

encrypt classified or sensitive data.

meet the growing demand for convenience.” Integrators and end users

The solution also supports the widest variety of mobile devices in the industry, so you can define the

have the option to implement the

mobile experience that is right for

system as a pure mobile solution

your organisation.

or integrate it into an existing

To find out more, email us at

card-based access control system,

goldclass@iscs.com.au, visit http://

allowing flexibility among users.

www.iscs.com.au/contact/gold-

The technology, which supports

class-mobile-promotion/ or phone

the widest variety of mobile

1300 111 010 and quote the code

devices in the industry, not only

GOLDCLASS. n

securitysolutionsmagazine.com

096-101_SSM109 Product Spotlight.indd 99

SECURITY SOLUTIONS // 99

21/08/2017 3:30 pm


SPOTLIGHT

ON INNOVATION IN SECURITY FROM FACIAL RECOGNITION TO VISUAL IDENTIFICATION

T

hey say necessity is

moment. This insight would later

the mother of

form the basis upon which FST would

invention. This simple

build its security paradigm and its

proverb provides a

biometric solutions. In short, Gen.

great insight into why a small

Farkas realised in that one defining

country like Israel is becoming a

moment that it would be far faster

hotbed of technology innovation

and easier to develop a solution

competing in the global economy.

which would quickly identify and

Israel, with very little in the way of

validated trusted or known workers,

resources, a small domestic market

thus saving the costly, manual

and a myriad of security challenges,

and slower screening approaches

has reinvented itself in recent years

for cases where technology is not

through the creation of a hub of

available to provide the solution.

advanced industries. Many of those

Upon retiring from the armed

industries are now challenging tech

forces, after spending most of his

titans found in more traditional

life in service of defense of Israel,

tech hotbeds such as Silicon Valley.

Gen. Farkas turned his attention

An example of the innovation

to a challenge that has troubled

and commercialisation process

him throughout most of his career

in Israel’s own ‘Silicon Wadi’ can

– creating a technological solution

this challenge. Instead of spending

Using face recognition, as well as

be seen in the emergence of FST

that would help ease the pain of the

an enormous amount of resources

body behaviour analytics to assess

Biometrics, a leader in the space

security measures imposed upon

looking for and identifying the few

body gait, and optional secondary

of in-motion visual identification.

Palestinians entering into Israel in

bad apples in the orchard, making

modules such as voice biometrics,

The idea itself was born out of a

the hope that such a solution might

everybody’s life difficult in the

personal pins or physical cards,

need, following the Second Intifada,

reduce anger among young people

process, this technology can and

IMID access creates a fusion of

where upon Israel had to institute

whom were merely trying to make

is being adopted by the public

identification technology which is

onerous security checks for the tens

a living. This is how FST Biometrics

to “self-screen”, allowing scarce

highly accurate, and second to none

of thousands of Palestinians who

originally started, and later evolved

resources to be spent on the ones

regarding ease-of-use and speed,

work in Israel. General A. Farkas,

into the solution it is today.

who do not cooperate or participate

allowing users to be identified in

in this effort.

motion, without stopping, while

founder of FST Biometrics and

Now, because of significant

former head of the Israeli Military

increase in global terror combined

Intelligence Directorate, watched as

with increased crime rates as a side

in the quest for widespread

that could be a door, a speed stile,

approximately 35,000 Palestinians

effect of urbanisation, security has

biometric technology adoption

or even a self-serve kiosk.

crossed from Gaza into Israel each

become a global issue. Countries

has always been the cost in terms

day, waiting in long lines for hours

and organisations alike struggle

of inconvenience for the user. This

to recognise FST Biometrics with

at the security checkpoints. While

to find solutions that strike an

is the reason why, IMID Access,

the Visionary Award for leading

there has been a mutual benefit to

appropriate balance between

FST Biometrics’ product, has been

the market in Biometric-based in

both Palestinians and Israel allowing

security, privacy and freedom. How

designed from the ground up to

motion identification in November

Palestinians to cross into Israel for

to balance the constant threat of

provide non-intrusive and seamless

of 2016, it was yet a further proof

work, boarder checkpoints had

criminal and terrorist attacks against

user experience for access control.

the FST was on the right track. This

become an unfortunate necessity

the fear that we might end up living

Through investing in In-Motion

award is presented annually to the

in the wake of rising Islamic

in a police state if security becomes

Visual Identification, and the power

company that demonstrates the

Fundamentalism. It was while

too pervasive?

of a fusion of biometric modules,

understanding to leverage global

IMID Access promises visual

mega trends, integrating a vision

identification at the speed of life.

into processes to achieve strategic

observing one such check point that Gen. Farkas had his “Eureka”

100 // SECURITY SOLUTIONS

096-101_SSM109 Product Spotlight.indd 100

Biometric technology is possibly the best, least intrusive solution to

In the past, the biggest obstacle

they walk towards an access point

When Frost & Sullivan decided

securitysolutionsmagazine.com

21/08/2017 3:30 pm


www.addonapac.com

photos to each other. Image acquisition for non-stationary individuals is not perfect, with many of the individual frame photos being blurred, with people looking towards a camera at an angle. As such, the entire image acquisitions task requires that every image taken from the video stream must first be optimised through a process of applying appropriate cleaning technologies and filters before attempting to identify a face. In addition, the face is only one aspect which can be used to identify an individual. Every person has a specific way of moving through space which is unique to us, referred to as body gait, and this information is, in many cases available to the camera from a further distance, and is less impacted by external factors such as lighting and the angle of the camera. The fusion of these modules is what enables the solution from FST biometrics to be so fast and so accurate, enabling a truly innovative solution to be so effective. In the case of the IMID Access solution, this identification is then used to provide secure access control through secure gates, at the speed of life. FST Biometrics is represented in Asia Pacific by Add-On Apac Innovative Solutions. We offer converged physical, cyber and communication security solutions. Operating across the Asia Pacific region, we harness advanced products and groundexcellence. In this case, the award

progress. In the case of FST, they

so quickly and accurately. The

breaking technologies, helping

signals the recognition of the

decide to think outside the box by

answer is simple, FST biometrics

our customers transform the way

significance of a product that is

redefining what the box is. Most

operates on a completely different

they protect people, information

non-invasive, instantaneous for end

people considering their solution

paradigm. One based on visual

and assets.

users, yet still meets the security

tend to ask initially “How does

identification as opposed to simple

and identification needs of today’s

this solution compare to the other

facial recognition.

range of organisations.

main facial recognition players?”

Except necessity, a different

Compared to facial recognition,

For more information of FST Biometrics, please visit www. fstbm.com. For more information

After seeing the product in action,

visual identification is an approach

on Add-On Apac, please visit www.

approach to solve a problem is

most people wonder how is it

that seeks to identify a person

addonapac.com, or call us on 03

sometimes required to make real

possible for their solution to work

and not simply compare two

9607 8465. n

securitysolutionsmagazine.com

096-101_SSM109 Product Spotlight.indd 101

SECURITY SOLUTIONS // 101

21/08/2017 3:30 pm


PROFILE

Hills Limited and Genetec Inc. Announce New Australian Application Development Centre

Hills Limited and Genetec Inc.

Partner in Asia Pacific, Hills’ strong

(“Genetec”), a leading provider

performance means it was the

common vision for delivering

of open architecture security

obvious choice to drive Genetec

unified, innovative security

and public safety solutions, have

SDK growth in the ANZ region. Hills

solutions that help ‘Protect the

announced plans to create the

is one of a few strategic Genetec

Everyday’,” said Philippe Ouimette,

Genetec™ Australian Application

partners worldwide that has been

Genetec Country Manager–Australia

Development Centre to support the

selected to support systems

and New Zealand. “We are excited

ongoing growth of both companies’

integration and delivery services.

to open the new Genetec Australian

joint security integration business

partnership to date, both Hills and

which will allow Australian and

(ANZ) market.

Genetec are keen to announce this

New Zealand customers to have

new initiative which will accelerate

custom and optimised applications

a unified IP security platform that

growth across ANZ,” said Hills CEO,

in their security and operational

blends security systems within a

David Lenz. “Our focus will be on

environments. Together with Hills,

single intuitive interface to simplify

expansion into application solutions

we will be very well positioned

the management of access control,

for the industry verticals of retail,

to cultivate and win new

video surveillance, automatic

banking, public safety, government

business opportunities in ANZ,”

license plate recognition (ALPR),

and transport,” said Lenz.

added Ouimette.

VoIP communications, intrusion,

“By collaborating with Genetec

“World leading technology

and analytics. Its open architecture

to develop a strategic plan that

from Genetec, supported by

enables organisations to customise

drives sales growth for the next

Hills expertise and technical

their security and operations using

three years, with a strong focus

support, is a winning combination

the Genetec software developer’s

on pre-sales capabilities, we’ll be

for customers – we can create

kit (SDK) with support from trusted

able to provide a state-of-the-art,

unified security solutions that

partners like Hills.

purpose-built security solution

are customised, future proof and

for the diverse markets we serve,”

ensure best practices,” concluded

added Lenz.

Lenz. n

Named by Genetec Inc. as Best Distributor and Best Development

102-107_SSM109 Profile.indd 102

Application Development Centre,

in the Australia and New Zealand Genetec™ Security Centre is

102 // SECURITY SOLUTIONS

“Based on the success of our

“Genetec and Hills share a

securitysolutionsmagazine.com

22/08/2017 1:28 pm


Some cheap solutions can end up being the most expensive. STENTOFON offer fully monitored IP communications solutions made to the highest standards from premium components and materials to ensure unparalleled performance in the most demanding conditions. When you need secure, safe, reliable communications that can integrate into existing systems and grow with your future needs, look no further than STENTOFON.

whencommunicationiscritical

102-107_SSM109 Profile.indd 103

www.stentofon.com.au

21/08/2017 4:18 pm


PROFILE

VIVOTEK and Genetec™ (Stratocast) Unite to Ensure Travelers’ Safety at Hotel Gran Marquise One of Fortaleza’s largest hotels,

Championship. In addition, the

of IP surveillance software,

which hosts thousands of people

Gran Marquise was the first hotel

access control and license plate

each year and holds hundreds

in Brazil to achieve the ISO 22000,

recognition solutions.

of events, has reinvented itself

certificate that ensures adherence

and converted analog technology

to extremely high standards of food

the goal of the project was to

to IP surveillance. Upon project

quality and safety.

enable the total unification of

completion, it is expected that

Divided into four stages,

management, security, marketing and commercial operations. In

integrated and linked with all other

The Challenge: Enable the Unification of the Management

hotel devices under Genetec’s

The Gran Marquise realised that

48 VIVOTEK network cameras.

cloud-based video-surveillance-

its security system needed to

Also installed was the Genetec™

as-a-service (VSaaS) solution,

be renewed. The hotel had 500

Stratocast ™ software, a cloud-

Stratocast™.

analog cameras and 22 digital

based video recorder tool that

video recorders installed – an

eliminates the need for any local

About the Gran Marquise Hotel

extensive system, but one

server, making it possible to

which only provided low-quality

monitor and share images with

The Gran Marquise is a five-star

images and demanded heavy

fully encrypted data. Two models

hotel of 18 thousand square

workload when it was necessary

of network cameras were installed

metres located on the seafront

to locate and retrieve footage of

throughout the hotel: one is the

of Fortaleza (Ceará). With a 23-

a recorded event. “We looked at

IB8369A, a 2-megapixel camera

year history, the hotel has a large

the hotel and realised that we had

capable of capturing high quality

infrastructure of 230 apartments

good internet, excellent rooms,

video, with IR illuminators effective

ranging in size from 29 to 131

perfect service, but if a customer

up to 30 metres for superior image

square metres, two presidential

asked for footage from security

quality throughout the day and

suites and 21 floors in total, of

cameras, the only thing we could

night. The camera also features

which 14 are dedicated to guest

offer were noisy images,” said

Smart Stream II technology, which

rooms 7 are retained for events,

Jussieudo Gomes, Security and

optimises image quality for the

recreation and administration.

Information Technology Division

most important regions in any

It is one of the most in-demand

chief of the Grand Marquise. To

scene; in doing so it can reduce

destinations among national and

solve this dilemma and improve

network bandwidth consumption

international authorities, artists and

the management and security of

and storage requirements by up to

athletes, such as Bill Clinton, former

the hotel, a plan was formulated

50%. The other camera installed

president of the United States,

to develop a pilot project with

was the small-scale, but big-

Vladimir Putin, current president

VIVOTEK – a global provider of

featured FD8166, an ultra-mini

of Russia, singer Paul McCartney,

network cameras, PoE switches,

fixed dome network camera with a

rapper Snoop Dogg, as well as the

and network video recorders,

tiny diameter of only 90mm.

fighters of the Ultimate Fighting

and Genetec™, a global provider

the Gran Marquise will have 250 VIVOTEK network cameras installed,

the first phase, 250 analogue cameras were replaced by a mere

“Because of the ‘L’ shaped layout of the hotel, we previously had five analog cameras installed on each floor: two in the corridor, because the distance from one side to the other was too long to be monitored by a single analog camera; one in front of the elevator; another covering the ‘L’ and one

104 // SECURITY SOLUTIONS

102-107_SSM109 Profile.indd 104

securitysolutionsmagazine.com

22/08/2017 1:28 pm


102-107_SSM109 Profile.indd 105

21/08/2017 4:18 pm


PROFILE more covering the maid’s service area. Now, each floor has only three cameras: one camera that serves the ‘L’ and the elevator; another that serves the corridor and one more observing the service area. At the reception area, the same thing happens, we put a different camera on the ceiling, and with just that solution we managed to cover the lobby, the bar, a part of the reception and the stairs of the restaurant,” explained Gomes. In the second phase, the Genetec™ Security Center solution was implemented for the internal parts of the hotel. With this platform, Gran Marquise can unify operations by combining all IP surveillance systems into

THE THIRD AND FOURTH STAGES ARE STILL IN PROGRESS. THE GOAL IS TO INSTALL 250 NETWORK CAMERAS IN TOTAL AND UNIFY THE SECURITY SYSTEM WITH ACCESS CONTROLS AND THE FIRE ALARM SYSTEM.

entire investigation process, finding the images and resolve the case, took only 15 minutes, but saved a very important day” said the security chief.

Public-Private Partnership The Hotel Gran Marquise’s new security system is part of Genetec’s private-public sharing initiative, which enables the sharing of certain cloud-recorded images with police forces. The Military Police, the Ceará State Government and the ABIH (Brazilian Hotels Industry Association in Ceará) are partners in this project along with the hotel. public partnership is that, with the

control and video surveillance

New System Producing Immediate and Tangible Results

monitoring carried out by private

are still in progress. The goal is

The new IP surveillance

speedily curbing the action of

to install 250 network cameras

infrastructure has already proven

criminals in monitored places.

in total and unify the security

effective during a wedding held at

The private-public partnership

system with access controls and

the hotel. The bride had been in

is founded on the belief that

the fire alarm system. In addition,

the spa area enjoying the luxurious

such sharing of private company

the KiwiVision analytical software

Day of the Bride service. However

surveillance with the public sector

was also installed, a system which

when she went to dress up for

will enable a more expedient

counts people automatically

the ceremony, she did not find

and effective curbing of criminal

through cameras and 3D sensors

the jewellery she had prepared

activity in such monitored areas.

and detects objects added or

for the wedding. Security staffs

In this way, it is possible to expand

removed from a scene. This way it is

were triggered to investigate the

monitored areas and reduce

possible to automatically detect if a

occurrence. ”Through descriptions

crime without direct public sector

dangerous object has left behind or

of the bag that carried the jewellery

investment. Recorded images are

if something has been stolen from a

and the time when the bride last

transmitted in real time to the

particular area.

saw it, we were able to locate the

police, and a two-way relationship

footage though the synergy of

benefits both sectors.

are connected to, and accessible through, the cloud. The third and fourth stages

“The new security system

102-107_SSM109 Profile.indd 106

day would have been ruined. This

The purpose of this private

one interface. Now all access

106 // SECURITY SOLUTIONS

only after the ceremony, and her

companies, the public sector can achieve a more effective action,

has come to improve the image

VIVOTEK’s camera and the Genetec™

quality of surveillance, the layout

system, and then proceed to point

public-private partnerships is

of the hotel and the promptness

of precise relevance in the video.

prevention. It is possible to increase

of response to the customer. In the

We noticed that the bride carried

public safety with little investment

past, if we needed an image we had

the purse into the car, but on exiting

from the private sector,” explained

to expend great effort in searching

the car she was no longer carrying it.

Country Manager of Genetec

whole files and spend hours

When we showed her the pictures,

Brazil, Denis André Côté. With

watching videos to be able to select

she went to the car and the purse

such initiatives, we are beginning

and retrieve the relevant event –

was there. If it wasn’t for the new IP

to see the benefits of advances in

not to mention the impact power

surveillance solution, we would not

total surveillance systems expand

failures, and malfunctions issues in

have been able to ascertain what

beyond those companies who take

power supplies, recorders and hard

had happened, the bride would

the initiative to invest in them, and

disk drives,” said Gomes.

remember and find the jewellery

begin to serve the broader public. n

“The goal of projects with

securitysolutionsmagazine.com

22/08/2017 1:28 pm

IMS-A


WE’RE VIDEO HEADS

In a digital and fast paced world, video is an ever advancing asset to your arsenal. Whether you’re in need of a promotional, corporate or explainer video, a motion graphic or animation, IMS has you covered. Show the world what you can do, harness the power of video today.

www.interactivemediasolutions.com.au

102-107_SSM109 Profile.indd2 107 IMS-Ad.Video-working.indd

Interactive Media Solutions 21/08/2017 10:02 4:18 am pm 2/10/2014


PRODUCT SHOWCASES

KOOVA BY AMARYLLO The world’s most advanced, yet smallest security system is now available to protect you and your family 24-hours a day. Implementing 256-bit encryption, the same security level that NASA employs, your privacy will be under lock and key at all times. Measuring a mere 4-inches tall, the Koova security robot can auto-track humans at 240° and recognize people’s faces to ensure your home or business is smoothly and expertly guarded while recording or sounding an alarm if needed. A built-in speech function will greet you and even allows a two-way talk feature to communicate with people or scare off intruders. A front-facing LED light acts as an additional deterrent when danger is detected. With remote functionality that can control the Koova from your smart device, panning and zooming of the camera can be done with a swipe of your finger. Easily review all videos and alerts in your timeline to monitor what happened while you were away. Bring the most advanced monitoring technology into your home or office and live life with the security of knowing you’re always protected. One of the finalists for Product of the Year at this year’s Security Conference and Expo, the Koova is a great new innovation in home and office security. For more information visit www.amaryllo.eu n

108 // SECURITY SOLUTIONS

108-111_SSM109 Product Showcase.indd 108

securitysolutionsmagazine.com

21/08/2017 4:59 pm


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmagazine.biz/newsletter

THE DAHUA NVR5224-24P-4KS2

Winner of Best New Product at this year’s Security Exhibition and Conference in Sydney, the Dahua NVR5224-24P-4KS2 is a 24 Channel NVR which also has 24 built-in POE ports which is an expansion over the traditional maximum of 16. However, the standout feature of this new Dahua NVR is a

new technology called ePoe which enables the transmission of images between camera at distances of up to 800m over good quality cable. Until now, most traditional NVR’s had a maximum effective transmission range of 100 meters. That is an increase of eight times

the traditional distance – a massive improvement over existing systems. One of the major benefits of an increase in transmission distance of this size is the ease of installation for integrators who no longer need to worry about keeping cable distances under 100m. Furthermore,

integrator could potentially run all cables from a central point rather than having to install multiple switches in order to transmit images from cameras back to a central location effectively saving significant time, money and labour. For more information, visit www1.dahuasecurity.com n

TOURLOCK 180+90 REVOLVING DOOR SYSTEM Boom Edam recently launched the latest version of its Tourlock 180+90 revolving door system in Australia. Designed for mobility hotspots such as the entrances to company HQs and diplomatic and government agencies, as well as high-traffic tourist, transport, retail, logistics and healthcare facilities. This latest Tourlock 180+90 system is designed for use in 24/7 environments requiring high volume capabilities (20 people each way per door a minute). It is a flexible, non-intrusive way to control physical access and prevent problems arising from unauthorised access to sensitive facilities and areas. It is also a cost-effective and reliable way to overcome the problems inherent in expensive manned security systems.

securitysolutionsmagazine.com

108-111_SSM109 Product Showcase.indd 109

In addition to the latest BoomConnect software to configure the system to individual users’ needs, the system can be configured to include the StereoVision time of flight camera systems, which create extremely accurate 3D images of the person in the door to determine whether they are alone. StereoVision is even capable of discerning between a person and a briefcase or bag. The Tourlock 180+90 incorporates a revolving door where the rotation can only be started after an authorisation signal from an access control system such as a card reader or biometrics reader. Depending on user requirements, the highest security member of the Tourlock family can be

integrated with a variety of different security systems that accurately detect any form of piggybacking or tailgating. The Tourlock 180 + 90 4-wing automatic revolving security door offers many possible access control options, including: • Security In / Free Out • Security In / Security Out • Free In Day / Security In Night When combined with an external card reader or biometric device of the user’s choice, the Tourlock 180+90 provides a secured access point at a substantially lower cost than traditional manned stations. For Further Information, call1300 689 905 or visit www. boonedam.com.au n

SECURITY SOLUTIONS // 109

21/08/2017 4:59 pm


PRODUCT SHOWCASES

THE SALTO XS4 GEO CYLINDERS

The Salto XS4 range of Geo Cylinders comprises an extensive range of compact sized electronic cylinders designed for doors where fitting an electronic escutcheon is not possible or required. Totally wire-free and networked through SALTO Virtual Network and SALTO Wireless network, the Salto XS4 Geo Cylinders are available in a range of different models including a half cylinder, cylinder with thumb turn, double cylinder, cam lock cylinder, padlock, and with a wide offering of different

110 // SECURITY SOLUTIONS

108-111_SSM109 Product Showcase.indd 110

profiles, such as Euro profile, UK oval, Swiss Round, Australian oval, Scandinavian profiles, ANSI profiles. The beauty of the Salto XS4 Geo Cylinders is that they provide wireless access control from one to many doors without having to undertake massive infrastructure upgrades. The XS4 Geo Cylinders simply retrofit to replace existing lock cylinders. The Salto XS4 range of Geo Cylinders work in conjunction with the XS4 Wireless online solution. Designed for applications that

need high level real-time access control, SALTO Wireless can be used as an independent system or as a complement to SALTO Virtual Network (SVN) and hardwired IP solutions. It connects batterypowered electronic escutcheons and cylinders by means of low power radio transceivers (2.4 GHz). These interact with XS4 gateways, which are connected by Ethernet/ WiFi to the central management computer. With a single click of a mouse you can configure or make changes to the network in realtime. You can also download audit

trail information for real-time control, delete users remotely and securely, collect battery status for maintenance and much more, all from a single PC and all in real-time. We have been using these cylinder at the Security Solutions office for a number of months and find them to be reliable, easy to use, and a fantastic solution for situations where you need a solution that can grow with your business. For more information visit www.saltosystems.com n

securitysolutionsmagazine.com

21/08/2017 4:59 pm


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmagazine.biz/newsletter

IMPROVE ACCESS & KEY MANAGEMENT WITH KEYLOKR™ – SMART KEY SAFE.

Do you need a more efficient way to manage access to your infrastructure and assets? Improve access efficiency with KeyLokr™ from Astute Access – a unique, bluetooth smart key safe. KeyLokr™ gives authorised users access to physical keys stored on-location, in a robust & secure, stainless steel key safe. To unlock and lock the KeyLokr™, users simply open the

LockVue™ app on their mobile phone, to view the locks they have permission to access. Access is easily granted, revoked, and tracked, using LockVue™ – an enterprisegrade, secure cloud platform. LockVue™ tracks who accesses the KeyLokr™, when and where… Giving administrators a full audit trail. www.astutesmartlocks.com/keylokr n

Unika Touchscreen Keypad

securitysolutionsmagazine.com

108-111_SSM109 Product Showcase.indd 111

With more than 30 years’ experience in the intrusion detection device market, AMC Alarms have garnered a strong industry reputation for their userfriendly, market-leading design. Their new Unika touchscreen keypad is no exception. Equipped with an intuitive, user-friendly graphical interface, this 5” touchscreen display allows users to manage all alarm functions from keypad. The inbuilt SD card reader enables users to personalise their Unika with a screensaver of their favourite photo or image. Once loaded, users can enjoy a crystalclear image thanks to the high resolution (480 x 272) TFT display. Save time by arming/disarming the alarm using a card, fob or tag thanks to the NFC reader. The Unika includes an inbuilt speaker and microphone so users can utilise the audible alarm setting, available on all AMC control panels. Additionally, the speaker and microphone can be used to record voice memos that can be

stored on the Unika, for other users to playback at a later time. Other features such as a temperature gauge and alarm clock function position the Unika as control centre for life as well as your alarm system. LSC are proud to be the exclusive distributor for AMC products in Australia and New Zealand. Features: • Touchscreen 5 inch display • TFT high resolution (480 x 272) • User friendly icon interface • SD card reader for image loading • NFC reader (for smartphone recognition) • Microphone and speaker • Temperature sensor • Vocal memo • Alarm clock function • Compatible with all AMC panels • Dimensions: 155 x 100 x 18mm • Part number: AMUNIKP For more information visit unika. lsc.com.au or call 1300 626 269 n

SECURITY SOLUTIONS // 111

21/08/2017 4:59 pm


STOPTALK

Dahua Technology Integrates QNAP NAS System to Extend Video Surveillance Feasibility Dahua Technology, a leading solution provider in the global video surveillance industry, announced that its Eco-Savvy 3.0, H.265 Wi-Fi and H.265 PTZ series network cameras are now compatible with QNAP’s NAS surveillance applications. Featuring H.265 compression technology, Dahua’s network cameras ensure video recording with lower bandwidth and greater security efficiency. QNAP surveillance applications integrate comprehensive video surveillance features into the NAS system, providing storage expandability and storage space management functions to surveillance users. “It’s our honour to cooperate with Dahua Technology and QNAP is working on extending NAS surveillance application scale,” said Alan Kuo, product manager of QNAP. “We are pleased to announce that Dahua Technology’s Eco-Savvy 3.0, H.265 Wi-Fi and H.265 PTZ series network cameras are proven to integrate well with QNAP surveillance solutions. We will keep providing our users more flexibility in selecting suitable IP cameras when deploying their surveillance solution.”

Dahua Technology has one of the most comprehensive line ups of surveillance cameras in the industry. The integration with QNAP NAS offers customers more comprehensive functionalities to meet the requirement of every site. “Open, Integration and Innovation has been our guiding principle,” said Daniel Chau, Overseas Marketing Director of Dahua Technology.

“We are open to work with platform partners, like QNAP, to form an end-to-end solution for customers. We appreciate the value of our relationship and we expect the demand for this Cloud surveillance solution to grow rapidly.” Dahua Eco-Savvy 3.0 cameras provide an impressive range of smart detection features, including face detection, tripwire detection,

and intrusion detection. Dahua Wi-Fi 265 cameras support H.265 compression, human detection and also smart tracking. Featuring a powerful optical zoom and accurate pan/tilt/zoom performance, Dahua H.265 PTZ cameras provide large monitoring range in great detail. For more information about Dahua Technology, please visit http://www.dahuasecurity.com.

Ian Fuller Joins Sektor Australia’s Security Team as National Systems Manager. “Ian’s deep industry experience adds a valuable dimension to Sektor’s security initiatives. With his unique skills and experience, Ian will play a pivotal role in taking our business to the next level. We are proud to welcome Ian to the Green Machine!” says Tom Kinkade – Sektor Australia’s security business manager. Ian completed a Bachelor’s degree (Electrical

112 // SECURITY SOLUTIONS

112-115_SSM109 Shop Talk.indd 112

and Computer Systems Engineering) before commencing a 23-year career in electronic security, excelling in senior roles with Hills/Pacific Communications and Q Security Systems. Ian is widely recognised as the foremost expert on the FLIR Systems United VMS and is authorised to train and certify systems integrators on the platform.

Ian joined Sektor on the 24th of July, ready to hit the ground running at ASIAL 2017. Ian can be contacted on +61 407 666 634 and at ianf@sektor.com Sektor is the APAC market leading distributor of security thermal imaging, data capture, rugged and mobile computing, POS and ergonomic workspace solutions.

securitysolutionsmagazine.com

21/08/2017 11:15 am


L I K E U S O N FA C E B O O K

facebook.com/ssmaust

For the latest news, products and events in the security industry

STid Announces Technology and Distribution Partnership with Genetec Inc. STid, a French contactless door control innovator, today announced a technology integration and sales distribution partnership with Genetec Inc., a leading provider of open architecture IP security and public safety solutions. Through this partnership, Genetec has integrated the STid Architect® access control readers into its Synergis™ access control software, part of Genetec Security Center, the company’s unified IP security platform, to meet the increasing need for corporate security and to protect sensitive data. STid Architect® produces the latest generation of access control readers for MIFARE® DESFire® RFID tags and smartphones with Bluetooth®

Smart. “With the support of the Architect® range, Genetec can offer its customers total end-to-end control of their access control data securely, and in compliance with ANSSI certification. This is the result of several years of collaboration that makes STid an ideal partner for supporting our security initiatives”, said Thibaut Louvet, Access Control Systems Director at Genetec Inc. To implement the highest levels of security, Genetec and STid have combined Genetec Synergis Cloud Link, an intelligent PoE-enabled appliance, with the Secure Communication Protocol (SSCP) approved by ANSSI, the French Network and Information Security Agency. STid was

the first manufacturer to obtain Top-Level Security Certification (CSPN). Data communication is therefore secured end-to-end, from identifier to controller, using encryption and authentication methods recognised by the relevant authorities. “STid is in a great position to penetrate the North American market with strategic partners like Genetec Inc.,” said Vincent Dupart, Chief Executive at STid. “Customers are looking for secure, open, and userfriendly solutions – three key success factors that give STid and Genetec stand-out options in their respective markets,” added Vincent Dupart. For more information about STid, visit: www.stid.com

Hikvision Continues its Leading Position in IHS Markit 2017 Report Building on the company’s incredible year-on-year growth, and underlining the global level of support for its range of security surveillance products, Hikvision, the world’s leading supplier of video surveillance products and solutions, has announced that it has again achieved No.1 position in a recent IHS Markit report, based on 2016 data, with a dominant market share of 21.4% for CCTV and Video Surveillance Equipment worldwide, rising from last year’s 19.5%*. Hot off the press, IHS Markit, a world leader in critical information, analytics, and solutions, also reported that Hikvision technology ranks in the No.1 position for 2016 global market share in the categories

securitysolutionsmagazine.com

112-115_SSM109 Shop Talk.indd 113

of: Security Cameras (24.2%), Analogue +HD CCTV Security Cameras (23.9%), Network Security Cameras (25.6%), and Recorders (25.3%). Moreover, the company is continuing its leading position in the EMEA market, with 14.9% market share for CCTV and Video Surveillance Equipment, and achieved an 8.5% market share equating to the No.2 position for the Americas market. Supporting the rapid growth of a company that is now an acknowledged security industry technology leader, Hikvision attributes its IHS Markit ranking success to its continuous R&D investment in new product technologies, and the rapid response to market trends, and long-lasting partnerships that

the company’s been placing in its business core. “Creating value for its customers is our driving goal, and this latest achievement of being ranked number one for global market share in video surveillance is very exciting for the company,” enthused Keen Yao, VP at Hikvision International Business Centre. “We look forward to sharing our success with the people who help to make it all possible: our partners and customers. In addition to the video surveillance industry, Hikvision has extended its reach to industrial automation, smart home tech, and automotive electronics industries, to achieve its long-term vision.” Underlining the R&D investment, for those looking to

experience Hikvision products and technologies first-hand, the company will be showcasing their cutting-edge advances in surveillance technology at the upcoming IFSEC International exhibition, including brand new products and solutions, as well as an innovative new set of technologies derived from the IT industry’s ‘Deep Learning’ concept. * Information based on IHS Markit, Technology Group, Video Surveillance Intelligence Service, May 2017. Information is not an endorsement of Hikvision. Any reliance on these results is at the third party’s own risk. Visit technology.ihs.com for more details. For more information, please visit www.hikvision.com.

SECURITY SOLUTIONS // 113

23/08/2017 3:41 pm


SUBSCRIBE Security Solutions Magazine, Level 1, 34 Joseph St, Blackburn, Victoria 3130 | Tel: 1300 300 552

I wish to subscribe for:

oONLY $62 per annum!

Name: ............................................................................Company: ....................................................................................... Position: .........................................................................Address: ......................................................................................... Suburb:...........................................................................State: ................................. Postcode:............................................. Tel:..................................................................................Email: ................................................................. ........................... TERMS AND CONDITIONS For more information on subscriptions, or to contact Interactive Media Solutions, please phone 1300 300 552 or email to admin@interactivemediasolutions.com.au. Deductions will be made from your nominated credit card every year in advance of delivery. The direct debit request and subscription price may be changed by Interactive Media Solutions from time to time, however you will always be given at least 28 days notice. The authority to debit your account every year remains valid until you notify Interactive Media Solutions to cancel your subscription by contacting Interactive Media Solutions Customer Service. No refund is given after a payment is made. In the event of a cancellation of your subscription, the subscription will simply expire twelve months from when the last subscription payment was made. Information on how we handle your personal information is explained in our Privacy Policy Statement.

Credit Card oBankcard

oVisa

oMastercard

oAmex

oDiners

Card Number: ........................................................................................................................................................................ Exp: _ _ / _ _ Card Name: .................................................................................................................................................................................................................... Signature: ....................................................................................................................................................................................................................... When payment has been received and funds cleared, this document serves as a Tax Invoice. Interactive Media Solutions ABN 56 606 919 463. If this document is to be used for tax purposes, please retain a copy for your records.

Security Solutions Magazine digital version is now available via ISSUU on every platform, everywhere! Download it now and enjoy your favourite security magazine when you like, where you like, however you like. PC, MAC, Linux, Apple, Android, Google and more...

Subscribe to Security Solutions Magazine for

ONLY $62 per annum!

Simply fill in the form or call 1300 300 552

112-115_SSM109 Shop Talk.indd 114

21/08/2017 11:15 am


112-115_SSM109 Shop Talk.indd 115

21/08/2017 11:15 am


CRASH RATED SURFACE MOUNT & SHALLOW MOUNT SOLUTIONS

FIND OUT MORE ABOUT US!

AUSTRALIA NATIONAL

1300 558 304 11 Cooper Street Smithfield NSW 2164 www.ezisecurity.com.au sales@ezisecurity.com

FP Ad Template.indd 1

22/08/2017 1:19 pm


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.