AUSTRALASIA’S LEADING SECURIT Y RESOURCE FOR BUSINESS AND GOVERNMENT SECURITY SOLUTIONS • IS SU E 10 9 • SEPT/O C T 2017
ISSUE 109 SEPT/OCT 2017
securitysolutionsmagazine.com
WHAT ARE AUSTRALIANS REALLY AFRAID OF? 001 SSM109 Cover-FIN.indd 3
14/09/2017 10:44 am
CUSTOMISABLE ELECTRIC HEIGHT ADJUSTABLE SIT STAND CONSOLES
Does your control room meet
Australian Ergonomic Standards?
www.activconsole.com
002-003_SSM109 DPS.indd 2
Clayton VIC 3168
21/08/2017 9:39 am
Safe Work Australia, Nov 2015
“...in 2012-13 the cost impact of work-related injuries and illnesses was estimated to be just over $61 billion...�
State-of-the-art ergonomic lifting technology Lifetime Australia phone support AS/NZS 4443:1997 & ISO 11064
+61 3 9574 8044
002-003_SSM109 DPS.indd 3
sales@activconsole.com
21/08/2017 9:39 am
RECOGNISING EXCELLENCE
Australian Security Industry Awards Nominations close 1 September www.asial.com.au
2017 EVENT
C
M
Y
C
C
CM
M
M
MY
Y
Y
CY
CM
CM
CMY
MY
MY
CY
CMY
K
CY
CMY
K
K
Winners announced - 19 October 2017 The River Room, Crown Melbourne. The Australian Security Awards Ceremony & Dinner The night is an opportunity to celebrate excellence and innovation in the security industry, and network with likeminded security professionals.
Organised by
Lead dinner sponsor
Entertainment and centrepiece sponsor
2017
#securityawards 004-005_SSM109 DPS.indd 2
22/08/2017 10:17 am
Thermal2017-5-18.pdf 1 2017/7/14 14:29:40 R
R
R
You Might Think
It’s Magic You Think You Might Might Think It’s It’s Magic Magic C
M
Y
C CM
M MY
Y CY
CM CMY
MY K
CY
CMY
K
Hikvision Thermal Cameras Reveal What’s in the Dark It’s not magic. It’s simple: the heat is on, even when lights are off. Heat replaces light in the darkness and Hikvision’s Thermal Cameras capture everything in vivid images at up to 640 x 512 pixels. Powerful Hikvision Thermal Cameras Reveal What’s in the Dark features make these cameras perfect for 24/7 perimeter protection, unhindered by any weather or light condition – features like temperature-anomaly detection effectively prevent emergencies, and It’s not magic. It’s simple: the heat is on, even and whenfire lights are off. Heat replaces light in the darkness Hikvision Thermal Cameras Reveal What’s in the Dark Smart behavior analyses including line-crossing detection and intrusion detection in open and and Hikvision’s Thermal Cameras capture everything in vivid images at up to 640 x 512 pixels. Powerful expansive areas. Safeguard critical infrastructure and any other application, anywhere, anytime.or light features make these cameras perfect for 24/7 perimeter protection, unhindered by any weather It’s not magic. It’s simple: the heat is on, even when lights are off. Heat replaces light in the darkness condition – features like temperature-anomaly and fire detection effectively prevent emergencies, and andSmart Hikvision’s Thermal Cameras capture everythingdetection in vivid images at up todetection 640 x 512inpixels. behavior analyses including line-crossing and intrusion open Powerful and features make these cameras perfect for 24/7 perimeter protection, unhindered by any weather or light expansive areas. Safeguard critical infrastructure and any other application, anywhere, anytime.
condition – features like temperature-anomaly and fire detection effectively prevent emergencies, and Smart behavior analyses including line-crossing detection and intrusion detection in open and Hikvision Oceania expansive areas. Safeguard critical infrastructure and any other application, anywhere, anytime.
004-005_SSM109 DPS.indd 3
Unit 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Email:salesau@hikvision.com Hikvision Oceania Unit 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Email:salesau@hikvision.com
www.hikvision.com.au
www.hikvision.com.au
22/08/2017 10:17 am
ISSUE 109
34
FEATURES
54
CONTENTS
108
62
70
78
COVER STORY
At a time when the Australian public’s concern about security issues are at a decade high, John Kendall, director of the Border and National Security Program, Unisys, explores why concerns are so heightened and what organisations can do to restore consumer trust in their safety.
82
34 CISOS ON THE RISE, BUT MANY ORGANISATIONS STILL LACKING ADEQUATE CYBERSECURITY
According to ISACA’s State of Cyber Security 2017 research, 65 percent of organisations now have a dedicated chief information security officer (CISO) on staff. However, research also showed that, while cybersecurity budgets have expanded, the rate of growth is slowing. Why is this decreased growth occurring at a time when cyber threats are increasing and becoming more sophisticated?
62 FIXING SECURITY RISK MANAGEMENT:
FOCUS ON THE THREAT ACTOR
Government and private industry place enormous emphasis on the concept of Risk Management and Security Risk Management, despite the fact that it has been shown that in areas where the concepts of Risk Management and Security Risk Management were implemented, crime rates actually increased. Does such a significant trend mean we need to rethink the effectiveness of the concept, especially when applied against an actor with intent to harm?
70 THE SHAPE OF THINGS TO COME
We caught up with Serra Luck, Vice President, End-User Consultant Business for HID at this year’s Security Conference and Exhibition, and spoke to her about the future of access control.
82 CONFRONTING AN ISIS EMIR
Most experts agree that the most successful counter-messaging campaigns against ISIS are the ones that utilise the voices of insiders: the voices of ISIS victims and ISIS cadres themselves who have first-hand knowledge of the group’s brutality, corruption, religious manipulation and deception. We look at the work being done by The International Centre for the Study of Violent Extremism (ICSVE) who have spent the last two years interviewing ISIS defectors, ISIS prisoners and returnees from the Syrian and the Iraq conflict in Western Europe, Turkey, Iraq, Central Asia and the Balkans, capturing their stories on video and editing them down to short clips, interspersed with actual ISIS video footage and pictures, illustrating their stories to turn back against ISIS. 6 // SECURITY SOLUTIONS
006-009_SSM109 Contents.indd 6
REGULARS 10 LETTER FROM THE EDITOR 14 LEADERSHIP
Jason Brown looks at the responsibilities of leadership.
16 CYBER SECURITY
We bring you our top 10 cyber security blogs?
18 RESILIENCE
Dr Rita Parker looks at the issues around data privacy and resilience.
20 HUMAN RESOURCES
Greg Byrne presents the third part of his special on conducting workplace investigations.
22 RISK MANAGEMENT
Dr Kevin Foster asks, what is a Risk Assessment Context?
24 COMMUNICATIONS
How can you increase prices without driving away customers?
26 LEGAL
Our legal expert explains why owning your own business can be a mistake.
28 THINKING ABOUT SECURITY
Don Williams examines the pros and cons of red teams.
30 EVENTS
38 ALARMS
We bring you all the highlights from this year’s Security Exhibition and Conference.
42 OPERATIONS
Richard Kay examines fear and its impact on survival.
46 CCTV
How is deep learning making CCTV smarter?
94 SECURITY STUFF 96 SPOTLIGHTS 102 PROFILES 108 PRODUCT SHOWCASES 112 SHOPTALK
Company announcements from within the industry.
50 BUSINESS
Dr Gav Schneider and Kate Down look at Dynamic Risk Equilibrium.
60 LEGAL Q&A
We take a look at workplace health and safety laws in the context of security.
66 LOSS PREVENTION
We present the second of our two-part special on the role of loss prevention across the retail supply chain security program.
74 AVIATION
What is the most important part of addressing aviation security?
78 ACCESS CONTROL
Is a new threat emerging for access control brands?
90 GLOBAL SMART HOME MARKET
A look at upcoming industry events. securitysolutionsmagazine.com
21/08/2017 3:40 pm
Series 280 is an IP66 rated industrial 19” cabinet for harsh and unforgiving environments – air conditioning available.
The last thing on your mind is the first thing on ours.
DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS
Whether it’s ready-made, pre-configured or custom racking solutions, MFB’s short turnaround capabilities speed your product from the warehouse to where they should be – fast. Our unwavering commitment to timely delivery ensures your projects run on time, every time, reducing deadline pressures while maximising results. With a solid history of over 45 years supplying innovative, off-the-shelf and custom built racking systems, you can rely on MFB for consistent delivery, on time, every time.
AUSTRALIAN MADE MAKES AUSTRALIA
www.mfb.com.au
006-009_SSM109 Contents.indd 7
VIC NSW -
P (03) 9801 1044 P (02) 9749 1922
F (03) 9801 1176 F (02) 9749 1987
E sales@mfb.com.au E sydney@mfb.com.au
21/08/2017 3:40 pm
Sign up to our eNewsletter and receive up-to-date valuable information regarding all things Security.
www.securitysolutionsmagazine.biz/newsletter
006-009_SSM109 Contents.indd 8
21/08/2017 3:40 pm
EC - S
TALL. FAST. STYLISH. Our award winning speedgates combine state-of-the-art optical technology with a high barrier height to protect your building.
EASYGATE SPT
• • • •
Barrier heights up to 1800mm Fast throughput (up to one person per second) Ideal for Disability Discrimination Act compliance Choose from a number of models, including the LX, SPT, SG, IM or LG • Custom pedestals with an array of attractive finishes EASYGATE LX
Find out which security gate is right for you.
1300 858 840
www.entrancecontrol.com.au
EASYGATE IM
FULL HEIGHT TURNSTILE
EC - Security Solutions Ad.indd 1 9 006-009_SSM109 Contents.indd
TRIPOD TURNSTILE
SWING GATE
6/02/2017 10:37:16 AMpm 21/08/2017 3:40
FROM THE EDITOR www.securitysolutionsmagazine.com
EDITORIAL
EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen Sist, Ged McMahon
CONTRIBUTORS
Garry Barnes, Karissa Breen, Jason Brown, Greg Byrne, Kevin Foster, Steve Lawson, Justin Lawrence, Rita Parker, Don Williams, Richard Kay, Dr Gav Schneider, Kate Down, John Kendal, David Harding, Jac Brittain, Jim Dearing, Oliver Philippou, Jo StewartRattray, David Gregory, Ardian Shajkovci
T
here should be little doubt in
out that a significant number of respondents
anyone’s mind that the security
and businesses in the industry saw real
industry is set to experience
opportunities in automation, cloud services
significant change over the next
and IP technologies, but felt that cybersecurity
few years. The Australian Security Market Review
was a significant challenge to the immediate
2017 provides a number of interesting insights
development of such opportunities.
that, while not necessarily surprising, serve to
A number of reports by highly regarded
reinforce some important trends and changes
cybersecurity research groups, such as Gartner,
that anyone operating a business in security
have repeatedly pointed out a growing dearth
Keith Rozairo PHONE 1300 300 552 EMAIL keith@interactivemediasolutions.com.au
should be aware of.
of cybersecurity professionals globally, which
DESIGN AND PRODUCTION
(IoT), Internet Protocol (IP) based technology,
of concerns around the safety of online
cloud-based solutions, big data and mobile
technologies. However, with the work currently
technologies will be the sources of greatest
being done in areas like deep machine learning,
change, potential revenue opportunities and
where machines essentially get smarter over
innovation over the next three to five years.
time as they analyse increasingly larger volumes
While this may seem obvious, the real question
of data, it is not inconceivable that, in the near
should be, “How will these areas impact the
future, machine intelligences will be capable of
security market?”
bringing cybersecurity to a level where many of
ADVERTISING
Jonathan Rudolph PHONE 1300 300 552 EMAIL graphics@interactivemediasolutions.com.au
MARKETING AND SUBSCRIPTIONS
PHONE 1300 300 552 EMAIL admin@interactivemediasolutions.com.au $62.00 AUD inside Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues)
ACCOUNTS
PHONE 1300 300 552 EMAIL accounts@interactivemediasolutions.com.au
According to the report, the Internet of Things
Take, for example, the IoT and the introduction
PUBLISHER
on the surface could be seen as confirmation
today’s threats and challenges no longer pose
of IPv6, the most recent standard for the
a significant problem. Any business that opts to
addressing of IP devices (every device that has
wait until the IoT is safe runs the risk of being
an online connection). The original designers of
left well and truly behind. As Eric Rees, the father
the IP defined an IP address as a 32-bit number
of lean start-up methodology often says, “There
and this system, known as Internet Protocol
is little point planting saplings when you need
Level 1, 34 Joseph St, Blackburn, Victoria 3130 PHONE 1300 300 552 EMAIL enquiries@interactivemediasolutions.com.au WEBSITE www.securitysolutionsmagazine.com
Version 4 (IPv4), is still in use today. However,
shade.” Smart companies will take resources
`j
because of the growth of the Internet and the
like this year’s Australian Security Market Review
jv
predicted depletion of available addresses, a
2017 and not just look at its findings as they
DISCLAIMER
new version of IP (IPv6), using 128 bits for the
stand right now, but will instead read between
ABN 56 606 919463
The publisher takes due care in the preparation of this magazine and takes all reasonable precautions and makes all reasonable effort to ensure the accuracy of material contained in this publication, but is not liable for any mistake, misprint or omission. The publisher does not assume any responsibility or liability for any loss or damage which may result from any inaccuracy or omission in this publication, or from the use of information contained herein. The publisher makes no warranty, express or implied with respect to any of the material contained herein. The contents of this magazine may not be reproduced in ANY form in whole OR in part without WRITTEN permission from the publisher. Reproduction includes copying, photocopying, translation or reduced to any electronic medium or machine-readable form.
WRITTEN CORRESPONDENCE TO:
Level 1, 34 Joseph St, Blackburn, Victoria 3130 1300 300 552 enquiries@interactivemediasolutions.com.au
address, was developed in 1995. Mathematically,
the lines and ask, “What insights can I draw from
the new address space provides the potential for
these findings to better position my business
a maximum of two to the power of 128 (2128), or
to take advantage of emerging trends and
about 3.403×1038 addresses. In layman terms, that
opportunities in years to come?” Disrupt your
means we could effectively assign an individual IP
market before someone does it for you. n
`
j
v
`v
`jv
h
address to every single grain of sand on earth and still have plenty of addresses left over. With such unprecedented levels of connectivity now available, what does this mean in the context of market opportunities for the security industry? More importantly, how might this level of connectivity be deployed in a useful and useable fashion? Too often in the security industry we see engineers building solutions because they can, rather than focusing on customer needs. Smart businesses in the security industry will take new opportunities around
SSOCIATI
ON
big data and mobile technologies, and build
O
RALIA LTD
SECURIT Y
PR
UST FA
O
things like the IoT, cloud services and storage, RS A DE VI
Official Partners O C I AT I
ON
Y P R OVI D
RIT CU SE
PR O
ASS
SPAAL
frustrations rather than simply rehashing their current offering to make it fit the new paradigm.
D LT
STRALIA LTD AU
SECURITY
RS
AU S T R A L I A
SSOCIAT IO N OF
RS A DE VI
solutions based on customer pain points and
OF
E
O rigin a l Siz e
The security industry must also develop blue colour changed to this colour green.
COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE signing your approval to print. Please pay special attention to spelling, punctuation, dates, times, telephone numbers, addresses etc, as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman Press assumes no responsibility for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................
10 // SECURITY SOLUTIONS
010-013_SSM109 Editor's Letter.indd 10
the ability to look over the horizon. The
John Bigelow
Editor / Security Solutions
Australian Security Market Review 2017 points
securitysolutionsmagazine.com
22/08/2017 10:47 am
`
j
v
`j
jv
`v
`jv
h
THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.
NEW!
ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.
+61 (3) 9544 2477
email: oz_sales@takex.com
HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.
BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.
INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.
OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .
1300 319 499 csd.com.au www.takex.com
TAKEX AMERICA
VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta 010-013_SSM109 Editor's Letter.indd 11
22/08/2017 10:47 am
READ OUR FREE DIGITAL MAG Search ‘Security Solutions’ on issuu.com
Or go to goo.gl/A2BdNu
securitysolutionsmagazine.biz
010-013_SSM109 Editor's Letter.indd 12
22/08/2017 10:47 am
STOP TAILGATING AND OTHER UNAUTHORISED ENTRY ATTEMPTS
NOW AS EASY AS 1,2,... 1
2
1
Take 1 standard access controlled door with tailgating problems.
Tailgating is the art of unauthorised people following authorised people through an access controlled door.
www.pathminder.com.au
010-013_SSM109 Editor's Letter.indd 13
2
Add a PathMinder HPJ half portal.
The PathMinder HPJ half portal can ‘cap’ any access controlled door to turn it into a secure interlock, the highly sophisticated ultra sonic tailgate detection technology makes sure access is limited to one person at a time.
3
Sit back and relax, job done.
With over 40 portals in the range, PathMinder has a high security solution to controlling access at any entry point. Our portals include vandal, attack and bullet resistant certified designs, DDA compliant solutions and full customisable models to match your security needs.
Phone: 1300 750 740
22/08/2017 10:47 am
M S
LEADERSHIP
THE RESPONSIBILITIES OF LEADERSHIP BY JASON BROWN
I
was talking with some
know the answers, but the art is in
colleagues at the ASIAL
guiding and advising, not in directing;
conference about
the mentee needs to find his own
mentoring and related
course. The iLead project (https://
actions by leaders at all levels to help
www.ileadtalentexchange.com.au) is
others, particularly those just starting
a great way for security professionals
out, and it made me consider the
to get involved.
attributes of leadership that go to
VISION Creating a compelling vision for the future, combining the gathering of complex information from different sources with out-of-the-box thinking
by creating a shared sense of purpose and a learning culture CONNECTION Embracing and leveraging diversity across perspectives and cultures while creating positive emotions in others
Pay It Forward where the young hero
Number Two – Contributing to Teaching and Education
calls his plan “pay it forward”, which
Leaders who have managed to reach
means the recipient of a favour does
the dizzy heights have probably
a favour for three others rather than
learnt something along the way. It is
paying the favour back. The story,
time to pass on those experiences in
while emotionally manipulative,
a more formal way by contributing
made a point about the individual’s
to courses in the technical and
to being on a standards committee
for security, both here and
capacity to pass on knowledge,
further education sector, or at
in Australia or internationally. These
internationally. There are more
opportunity and advancement with
institutes and universities. Lecturers
are ways that experience can make
opportunities to contribute in the
no other thought other than the
and tutors are often in demand,
a difference for others and the future.
space coming your way.
person he assists will do good in turn.
especially if they are also doing
Along with the above, leaders
‘giving back’ and ‘paying forward’. Readers may remember the film
In thinking this through, consider
some study themselves.
ACTION Managing uncertainty and change effectively, while showing courage, resilience and the ability to make sound decisions IMPACT Inspiring others to unleash their potential and talent
DRIVE Confidently pursuing challenging career goals with a thirst for learning and appetite for feedback
Jason Brown is the National
can also write for the security and
Security Director for Thales in Australia
more general press to pass on their
and New Zealand. He is responsible
pay back for the opportunities he has
official positions on school and
knowledge. In the social media age,
for security liaison with government,
and pay forward to those that can
college boards or other community
it is not that difficult to join in by
law enforcement and intelligence
make a contribution in future.
organisations that will allow leaders
sharing information, responding
communities to develop cooperative
to contribute the management skills
to legitimate requests and linking
arrangements to minimise risk to
they have developed.
people together who can assist with
Thales and those in the community
their respective objectives.
that it supports. He is also responsible
three things that a leader can do to
Number One – Mentoring
Alternatively, there may be some
Mentoring is a relationship between
relationship is a non-reporting
Number Three – Engage with professional institutes and representative bodies
one and replaces none of the
Groups like ASIAL, ASIS International,
(http://au.hudson.com/talent-
served on a number of senior boards
organisational structures in place.
the Risk Management Institution
management/hudson-leadership-
and committees, including Chair of
It is additional to other forms of
Australasia (RMIA), Australian
model). Readers may also wish to
the Security Professionals Australasia;
assistance, such as developmental
Information Security Association
Google images for leadership models
member of ASIS International
assignments, classroom instruction,
(AISA) and the Security Professionals
– there is sure to be one to fit most
Standards and Guidelines Commission;
on-the-job training and coaching.
Australasia (SPA) are always in need
circumstances. Do not forget to do a
Chair of Australian Standards
It works best when a mentor
of those who can volunteer to take
bit of tailoring of the models; after
Committee for Security and resilience.
brings his professional and life
leadership roles. They can range from
all, everyone is a bit unique!
As of February 2017, Jason has been
experience to assist another person
judging the Outstanding Security
to chart his course in life. It is not
Performance awards or the best
the opportunity to participate in
Standards Committee for Risk
always easy, as the mentor may
new product in the Security show,
making and setting the standards
Management. n
two individuals based on a mutual desire for development towards career goals and objectives. The
14 // SECURITY SOLUTIONS
014-033_SSM109 Regulars.indd 14
In closing, these ideas fit in well
for ensuring compliance with
with a number of leadership models,
international and commonwealth
including the Hudson model shown
requirements for national security and
above, which deserves attention
relevant federal and state laws. He has
In the next article, I will discuss
appointed Chair of the International
securitysolutionsmagazine.com
21/08/2017 10:25 am
MULTIPLE CAPABILITIES SUPERIOR SOLUTION
Volvo Group Governmental Sales Oceania
IN HOSTILE ENVIRONMENTS, IT’S IMPORTANT THE SYSTEMS THAT YOU DEPEND ON CAN
STAND THE TEST OF TIME.
At Volvo Group Governmental Sales Oceania, our core business is the manufacturing, delivery and the support of an unparalleled range of military and security vehicle platforms; a range of platforms that are backed by an experienced, reliable and global network with over one hundred years of experience
superior solutions, providing exceptional protected mobility www.governmentalsalesoceania.com 014-033_SSM109 Regulars.indd 15
21/08/2017 10:25 am
CYBER SECURITY
TOP 10 CYBERSECURITY INFORMATION SOURCES T
here can be no doubt
malware discoveries, with insights
vulnerabilities, as well as strategies
Security, Sophos warn subscribers
that cybersecurity is
from experts.
for protecting enterprise data. It
about all kinds of bad computer
one of the hottest
Frequency – about eight
also offers guidance on setting
threats, including the latest
topics in the security
posts per week.
risk management and compliance
Facebook scams and rogue apps.
policies. However, be prepared
Frequency – about 34 posts per week.
world right now. In fact, it is one of the hottest topics around – period.
securingtomorrow.mcafee.com
for information overload as they
However, for the average physical
Just about everyone who has
post a lot.
security practitioner, staying
owned a computer is familiar with
Frequency – about 34
security.googleblog.com
informed about cybersecurity
McAfee, one of the best known
posts per week.
The latest news and insights from
trends, practices and technologies
names in anti-virus and computer
can be challenging to say the least;
security software. Now a part of
schneier.com
the Internet.
especially in a world where
Intel Security, McAfee produce this
Bruce Schneier is an internationally
Frequency – about three posts
information overload, a lack of time
fantastic blog full of security news
-renowned security technologist and
per month.
and an expectation that people
and resources on solutions for
author. Described by The Economist
should be able to do more with less
everyone from small business to
as a security guru, he is perhaps
grahamcluley.com
all make finding and digesting
enterprise organisations.
the only security practitioner to
A veteran anti-virus expert,
relevant information difficult. To that
Frequency – about 11 posts per week.
ever have been dubbed a ‘security
Graham Cluley specialises in data
rockstar’ by IFSEC. His blog covers
security, as well as the usual host of
end, we have compiled a list of what
Google on security and safety on
are, in our opinion, the top 10
krebsonsecurity.com
security and security technology.
computer security issues.
cybersecurity blogs from the leading
Brian Krebs is a household name
Frequency – about eight
Frequency – about 11
experts around the world. Why go
in information security, and his
posts per week.
posts per week.
looking for information when you
blog is among the most well
can have it delivered directly to your
known and respected in the space.
threatpost.com
infosecurity-magazine.com
smartphone, favourite device or
This is a daily blog dedicated to
Threatpost is an independent
Infosecurity Magazine is the award-
desktop? Check out some of these
investigative stories on cybercrime
news site and leading source of
winning online magazine dedicated
great blogs and simply subscribe to
and computer security.
information about IT and business
to the strategy, insight and
the ones you like. After all,
Frequency – about three
security for hundreds of thousands
technology of information security.
they are free.
posts per week.
of professionals.
This blog is an extension of the
Frequency – about 19
great work they produce through
posts per week.
their online magazine.
welivesecurity.com
darkreading.com
With around 1,838,316 Facebook
Dark Reading is the premier online
followers, WeLiveSecurity is one
resource helping information
nakedsecurity.sophos.com
of the most popular cybersecurity
security professionals manage the
Brought to you by Sophos, a world-
sites around. It is an IT security
balance between protection and
renowned provider of PC security
site covering the latest news,
access. It offers breaking news and
software, Naked Security is their
cybersecurity blogs. Check them
research, cyber threats and
analysis on attacks, breaches and
threat news room. Through Naked
out and get reading. n
16 // SECURITY SOLUTIONS
014-033_SSM109 Regulars.indd 16
Frequency – about 42 posts per week. So, there you have it, our top 10
securitysolutionsmagazine.com
21/08/2017 10:25 am
ATTENTION INTEGRATORS GOLD CLASS MOBILE ACCESS PROMOTION Upgrade your customers to experience the benefits of GOLD CLASS MOBILE ACCESS on their mobile device.
Increase your own income.
AT NO COST
Complimentary award winning HID Readers and Credentials Exclusive to ISCS
“Only having to carry one device for so many daily tasks is excellent.” ALISON BROWN Facilities, Operations & Events Manager, Netflix
AN ARA PRODUCTS COMPANY
HID Mobile Access®
Secure, convenient access control via your mobile device
ISCS is Australia’s HID Platinum Partner distributor
Contact
goldclass@iscs.com.au or 1300 111 010 and quote code GOLDCLASS Any size company considered, new or existing customers
014-033_SSM109 Regulars.indd 17
21/08/2017 10:25 am
RESILIENCE
DATA PRIVACY AND RESILIENCE – A CAUTIONARY NOTE BY DR RITA PARKER
he digital
information while maintaining
• the collection of solicited
transformation of
protection of data privacy and
personal information and
cloud-based data storage, while
society has added to
protecting the individual’s privacy
receipt of unsolicited personal
convenient for access, means
the complexity of
preferences and his personally
information, including giving
increased exposure to risks to the
doing business today for large
identifiable information from
notice about collection
data stored, which may belong to
corporations, international
inappropriate or unauthorised use.
conglomerates and small owner
This is particularly challenging
can be used and disclosed
business using the service. The
operators, as well as for individuals.
when data comes from a wide range
(including overseas)
increasing number of cyberattacks
Risks and threats are evolving on a
of information sources.
T
daily basis due to the widespread
In Australia, the Privacy Act
• how personal information
• maintaining the quality of personal information
For example, the trend to use
the online service as well as to the
on large and small organisations means that extra caution needs
use of internet-enabled devices and
1988 regulates how personal
processes. Recent high-profile
information is handled. The Privacy
cyberattacks demonstrate the
Act defines personal information
extent of possible losses to
as ‘… information or an opinion,
to access and correct their
specified data, as this would
institutions and business and their
whether true or not, and whether
personal information.
inhibit operational business
impact on civil society when the
recorded in a material form or not,
The challenge for many
needs. What is necessary is to
daily operations of banks, airlines,
about an identified individual, or
organisations is how to collect
ensure cybersecurity procedures
hospitals and other institutions
an individual who is reasonably
and use personal data without
are current and integrated into
have been compromised. This
identifiable’. The Privacy Act
breaching the Privacy Act. For
mainstream resilience management
situation has been further
includes 13 Privacy Principles that
example, while data collection
strategies and practices.
compounded by increasing physical
outline how all private sector and
agencies and marketers state they
Further information about
and financial damage relating to
not-for-profit organisations with an
keep users’ data private by viewing
the Privacy Act 1988 and Privacy
data privacy breaches. The
annual turnover of more than $3
it only in aggregate, the extensive
Principles can be obtained from the
challenge for business is to ensure
million and some small businesses
volume of data a cookie can collect
Office of the Australian Information
it protects personal and other
must handle, use and manage
about any individual can enable the
Commissioner.
information while simultaneously
personal information. These
cookie’s owner to infer a surprising
being able to utilise the information
Privacy Principles also apply to
amount about the individuals
the International Council of Security
for operational business needs.
most Australian and Norfolk Island
being tracked.
and Resilience Professionals and is
Online privacy faces new risks and threats with each emerging technology, which could affect
Government agencies and to all private health service providers. While the Privacy Principles are
• keeping personal
to be taken to protect personal
information secure
information and data. It is not
• the right for individuals
enough to simply ‘air-gap’ the
Obtaining consent from an
Dr Rita Parker is a member of
Centre Manager of the Australian
individual to a secondary use
Centre for Armed Conflict and
or disclosure is permissible,
Society. Rita is also a former
how web-based data is protected,
not prescriptive, each entity needs
but organisations need to be
Distinguished Fellow at the Center
or exposed. Privacy concerns exist
to consider how the principles
aware that under the Privacy Act,
for Infrastructure Protection at
wherever personally identifiable
apply to its own situation. The
the individual can reasonably
George Mason University, USA. She
information or other sensitive
principles cover:
expect that the secondary use or
provides advice to organisations
information is collected, stored and
• the open and transparent
disclosure is related to the primary
seeking to increase their corporate
used in digital form. The challenge
management of personal
purpose of collection or, in the case
and organisational resilience and
for business is to increase the
information, including having a
of sensitive information, directly
crisis management ability. Her
way it protects personal and
privacy policy
related to the primary purpose.
co-edited book, Global Insecurity,
other information, and thereby
• an individual having the option
enhance its business resilience.
of transacting anonymously
to understand and calibrate,
available in 2017, includes aspects
An additional challenge for many
or using a pseudonym where
especially given the significant
of her recent research about urgent
organisations is how to use
practicable
potential for related exposures.
global security policy issues. n
18 // SECURITY SOLUTIONS
014-033_SSM109 Regulars.indd 18
Cyber risks are complex
published by Palgrave McMillan and
securitysolutionsmagazine.com
21/08/2017 10:25 am
Presco™ Standard Keypad, Combination RFID Keypad and RFID reader New PrescoTM Range
Introducing the new range of Presco™ indoor keypads and readers. The Proximity reader and Combination keypad are advanced self contained RFID (Radio Frequency Identification) contactless devices. They are capable of interfacing to either a Wiegand input control panel or to the Presco range of PAC controllers. When any of these devices are coupled with the Presco™ PAC series of door access controllers you get the full benefits of a secure door access control solution with all of the features of the Presco™ protocol.
FEATURES The PSK16 is a direct replacement for the PRE keypad and outputs Presco™ data only. Installations require only 3 wires to the controller but can be made with 2 wires if the LED indication is not required The PSC16 & PSR16 output both Presco™ and Wiegand format data. Output type required is auto sensed via white wire connection. Read range of up to 20cm Compatible with Presco™ PAC access controllers and all other Presco™ decoders, the entire system uses low cost non-shielded cable and keypads and readers can be up to 1 kilometre from the door controller (power supply and cable dependent) Compatible with industry standard 26 bit wiegand systems, the keypad can output 8 to 64 bit or burst mode wiegand and custom proximity cards and tags are available for wiegand formats up to 64 bits
For more info www.presco.com.au
NIDAC SECURITY 2 Cromwell Street BURWOOD VICTORIA AUSTRALIA 3125
014-033_SSM109 Regulars.indd 19
Audible and visual confirmation of all actions. Designed and manufactured in Australia. 36 month manufacturer’s warranty
Phone: +61 3 9808 6244 Fax: +61 3 9808 9335 E-mail: sales@nidac.com
21/08/2017 10:25 am
HUMAN RESOURCES
CONDUCTING WORKPLACE INVESTIGATIONS – PART 3
BY GREG BYRNE
his is the third article
tribunal due to feelings of not
does not play any part in the
and all those involved. Sources of
on the correct and
being treated fairly. All parties
decision-making process.
evidence include:
(safe) method of
involved must be spoken to and
conducting an internal
provided the opportunity to have
‘sending a message’ to the
• informant information
investigation due to workplace
their say and present inculpatory
workforce play any part in the
• proceeds of a search
conflict or misconduct. The first two
or exculpatory evidence, as the
decision-making process.
• observations
articles in previous issues of Security
case may be.
T
Solutions Magazine outlined the
• It is possible to summarily
o Do not let the temptation of
• letters of complaints
• The HR manager should not be
• interviews
given the sole responsibility
• statements
steps involved in conducting an
dismiss (sack on the spot) an
in deciding the outcome of an
• documents
investigation. This article will outline
employee, but due process must
internal investigation. Before
• photographs
some common pitfalls with not
be followed. Employers have
taking any disciplinary action,
• emails
conducting an internal investigation
the right to summarily dismiss
ensure that the investigation
• forensic evidence
correctly or of not conducting
for conduct that is serious
has complied with any legal
• computer records
one at all.
enough to justify it. However,
obligations and that it has
• other physical items.
prior to doing this, all the
followed the organisation’s
Investigators are not bound to only
companies ignore the need to
evidence and all the available
policies and codes of conduct.
look at certain types of evidence;
conduct an internal investigation,
options must be considered. For
Failure to conduct competent
they are obliged to consider any
and that is because it is hard. The
the summarily dismissal to be
internal investigations could
evidence that is relevant, reliable
process is often referred to as
lawful, it must be established
have grave consequences for a
and fair. Failure to do this could
the dark side of human resources
that the actions of the employee
business. The following court
result in adverse and costly
(HR) and is something a lot of HR
being dismissed are serious
matters highlight some of the court
decisions against the business being
professionals and managers do
enough to warrant it. Before
decisions that have gone against
made by the Fair Work Commission.
not like to do. The reason for this
summary dismissal:
businesses who have not conducted
There is a plethora of decisions
is that investigations are complex,
o Ensure that the investigation
fair and reasonable investigations.
from the various industrial relations
There is one very good reason
involve expert knowledge, involve
is competent. If the matter
In one case, an employee was
tribunals in the country, as well as
some emotion (the perpetrator/s
being investigated might,
reinstated to his former role in the
from the various criminal and civil
and the investigators usually
if found to be true, warrant
company and, as compensation, his
courts that you could rely on to help
know each other) and are time
summary dismissal, an
employer was ordered to pay him
determine what is relevant, reliable
consuming. Without the correct
employer can consider
six month’s salary.
and fair. The terms are also defined
person conducting the investigation,
suspending the employee
• Bruce v AWB Ltd [2000] FCA
in the various evidence acts that
the outcome can be very costly to
subject to the investigation
• Concut Pty Ltd v Worrell
operate in each state of Australia.
all involved, including the company
until the outcome of the
as its employees and reputation
investigation is known.
• Smith v Aussie Waste
outline what bullying is, what effect
are dragged before the Industrial
o Be aware of the employee’s
Management Pty Ltd
it has on the workplace, what can be
[2015] FWC 1044
done about it and what happens if
Relations Commission. Some very important points to
employment record and establish if he has been
[2000] HCA
• John Pinawin t/a RoseVi Hair Face.
consider when either conducting an
subject to a previous
Body v Edwin Domingo [2012]
investigation or reviewing one are:
complaint or not and if that
FWAFB 1359
• The subject of the complaint must have been interviewed and been
previous incident was serious. o Be aware of and consider
• Lloyd & Co Pty Ltd v Shuttle ([2016] FWCFB 144)
My next series of articles will
nothing is done. Greg Byrne is CEO and director of Multiset Consultancy Pty Ltd, a multifaceted consultancy advising CEOs and boards of security organisations
offered the opportunity to defend
available options (including
himself or offer new evidence.
demotion, counselling,
Finally, ensure that the investigator
manage business risk, particularly
Failure to do this can result in
movement to another
has collected all available evidence.
operations, disaster recovery, business
an aggrieved employee who
workplace, or training) and
Evidence is any information that
continuity and human resources.
could become more of a problem
document the decision-
can be considered to assist in
Greg can be contacted via email
than previously was the case, or
making process.
determining a fair, reasonable
greg@multisec.com.au or on 0402
and just outcome for the business
295 124. n
who takes the matter before a
20 // SECURITY SOLUTIONS
014-033_SSM109 Regulars.indd 20
o Ensure that saving money
in Australia on best approaches to
securitysolutionsmagazine.com
21/08/2017 10:25 am
SMARTair™
Proximity access control Introducing ASSA ABLOY’s new Lockwood SMARTair™; a powerful access control system that is simple to install, simple to configure, simple to administer and maintain. SMARTair™ provides peace of mind for businesses small and large, knowing that lost credentials are no longer a risk, with the flexibility to restrict user movements within the building. Audit trails can show historical movement for reporting purposes. SMARTair™ offers an intelligent, yet simple, step up from keys, and a cost effective alternative to traditional access control. No bells, whistles, or wires, just sleek, reliable security. Available in standalone, offline, update on card and wireless online.
SMARTairTM Door Lock
SMARTairTM Knob Cylinder
SMARTairTM Wall Reader
SMARTairTM Cabinet Lock
S E C U R I T Y, S I M P L I C I T Y , C O N V E N I E N C E . Visit lockweb.com.au/smartair to learn more.
014-033_SSM109 Regulars.indd 21
21/08/2017 10:25 am
RISK MANAGEMENT
Co Fo
WHAT IS A RISK ASSESSMENT CONTEXT? BY DR KEVIN J. FOSTER
ecurity professionals
always a flurry of risk assessment
security and suggest a suitable
threats and vulnerabilities.
are often required to
activity because decision makers
budget to cover the cost. However,
For example, ISO31000:2009
conduct risk
want to know if their own
the strategic manager responsible
describes external context as the
assessments.
organisations or the societies they
for deciding what to do with the
key drivers and trends having an
Sometimes the security risk
protect are exposed to the changed
building might be more interested in
impact on the objectives of the
assessor might focus on
threat environment.
some other objective. For example,
organisation and includes the
Sometimes a societal or
there might be a strategic decision
values and perceptions of external
notices in his or her employer’s
organisational risk environment
to sell the building or lease it to a
stakeholders. For example, a security
facility or operations. For example,
might have changed due to other
tenant. The strategic manager may
intelligence agency or a central
if the risk assessor has an
factors that are not directly related
simply want to ensure that the
security policy agency might explain
electronics background, he might
to security, such as economic or
security systems are operational
the current threat environment
make quite a few suggestions about
political factors. For example,
and adequate for presentation
(such as terrorism) for a particular
how to improve access control
there could be an objective to
purposes. This is just one example;
industry sector at a national level.
systems, intrusion alarms and CCTV.
reduce expenditure through
there are many others where the risk
This context then needs to be
Of course, it might be useful for
efficiency gains. In this case,
analyst and the decision maker are
amended to fit the state level, the
decision makers in organisations to
the risk assessment might be
concerned about different issues.
market segment level and even
understand how security could be
requested to highlight potential
The risk assessor might think he is
the facility level. It all depends
improved in their facility or
savings in operational costs.
doing his job well, but the decision
on who the decision makers and
organisation. However, there is an
There are many reasons why a risk
maker could be presented with
stakeholders are.
important question that needs to
assessment could be needed in the
expensive security solutions to a
be asked: is an upgrade of security
decision process.
problem he does not want to solve!
S
vulnerabilities that he or she
really necessary? To answer this question, it
Clearly, it is important to
This strategic misalignment of
Senior decision makers need to consider which threats and risks might prevent their organisation
understand who the decision makers
security and business objectives can
from achieving its business
is important to understand the
might be and what their motivation
cause tension between the security
objectives. Security is only one
context of the decision problem. In
is for conducting a risk assessment.
operatives and the senior managers
category of risk that they need to
this article, I will try to explain this
In the absence of this information,
they advise. For this reason, it is very
consider. There can be many other
concept for people who are new
the risk analyst might be tempted
important for security professionals
categories. Security advisers need
to the risk assessment process and
to raise issues of concern to himself,
to understand the business
to ensure that their assessments
perhaps remind others.
instead of those that the decision
objectives of the organisation for
and advice are in the context of
maker wants to address. For
which they are providing security
the business objectives of the
dictionaries as the circumstances
example, a security consultant might
advice. They need to understand
organisation that they serve.
that form the setting for an
be concerned about the physical
what the senior managers are trying
event, statement, or idea. In
vulnerabilities of a particular
to achieve. The security goals need
managing director of Foster Risk
security reviews this generally
building that has poorly maintained
to align with those objectives in
Management Pty Ltd, an Australian
refers to threat events that might
security systems. The consultant
order for the security risk assessment
company that provides independent
present unacceptable outcomes
might explain how thieves could
to be in tune with the context.
research aimed at finding better
or unwanted impacts on the
exploit these vulnerabilities, and the
objectives of the decision makers. It
need for better physical security.
management standards emphasise
public safety, and improving our
seems that after any major terrorist
He might offer some good ideas
the need to define the context of
understanding of emerging threats
event in a Western country there is
about how to achieve more effective
the assessment before determining
from ‘intelligent’ technologies. n
Context is usually defined in
22 // SECURITY SOLUTIONS
014-033_SSM109 Regulars.indd 22
For this reason, most risk
Dr Kevin J. Foster is the
ways to manage risk for security and
securitysolutionsmagazine.com
21/08/2017 10:25 am
Contact us on 1300 364 864 Follow us on
Delivering Proven Solutions for Security & Safety We Protect People & Assets www.magneticautomation.com.au 014-033_SSM109 Regulars.indd 23
21/08/2017 10:25 am
COMMUNICATIONS
PUT YOUR PRICES UP? BY DAVID GREGORY
ricing is often
market will accept price change
ongoing understanding of what the
deemed as a black
before reacting against the product
market is doing.
art. It creates fear in
or business. Most businesses don’t
the hearts of
realise how diverse the pricing
of regular small increases rather
Secondly, many business
business owners and a sense that it
within their industry can be. To
than doing a substantial irregular
owners won’t raise prices out of
alone will decide on the success of
test the market, all a business
increase is far more appealing. To
fear of telling their customers.
their business. The reality can be
needs to do is ask the question.
this end, set yourself a timeframe.
You simply have to bite the bullet
quite different.
Call your opposition and ask for a
Have it diarised that each year on
and tell them. Where possible, tell
quote. Drop into an opposition’s
the 1st of July I will put my prices
them ahead of the price rise, but if
that told me he had “never” put up
business and look at their prices.
up. Then stick with it.
not possible, don’t apologise, just
his prices for existing customers.
Speak to the salesperson behind
His belief was that he would
P
I recently met with a business
For small business an approach
As a result, they will not leave for the devil they don’t know, for a measly 5-10%.
Advise the customers as part of
tell them. You will be surprised
the desk and ask what they charge.
the process. “Our annual price rise
at how many will just shrug, or
lose the customer, if they had to
While this seems simplistic, very
will take effect on the 1st of July,
say “about time”. They want you
pay more. When quizzed on his
few businesses actually do regular
come in now to take advantage of
around so they can buy from you
customer base, he said that many
market research. As a result they
the current prices”. This approach
again. As such, they expect you to
had become like friends and that
are robbing themselves blind in
not only trains the customers to
make a profit.
they all loved his service, but he
the process.
expect an annual increase, but also
was afraid of losing them. Progressively he had to keep
Statistically, most customers of small businesses will accept an
creates an incentive to buy now.
The greatest challenge you have to overcome in putting
Now that you have made a
up your prices is you and your
tabs on the prices he charged
increase of between 5 and 15%
commitment to yourself that price
confidence to do so. Believe in
because they had become different
without falling off their chairs in
increase will happen and you will
yourself and your product or
for each customer depending on
dismay. For a business with a large
manage their implementation, let’s
service. Your business and your
when they had begun buying from
and diverse customer base, it is
address your fears.
customers will be the beneficiaries
him. It had become a real headache
possible to test the impact of an
to manage.
increase by targeting a specific
buy from you because of price.
low risk group. If the prices are
Price may have been a factor
the Small Business Mentoring
would expect prices to rise and as
accepted, then expand the increase
originally but they have become
Service www.sbms.org.au , an
a business owner, you have to train
to the next group. For businesses
regular because of:
organisation that has supported
your customers to appreciate the
with a smaller base, perhaps a
• you
thousands of small businesses for
value you provide over and above
staged increase starting at 5% is
• your location
over 25 years. SBMS has over 140
the prices.
an easier entry point. The critical
• your service
Mentors in Victoria and NSW. He is
aspect is to start. A business needs
• your quality
also the Founder and CEO of The
price elasticity. This is a term that
to establish a regular approach
• your range
Small Business Institute. www.
reflects on the degree to which the
to their pricing aligned with an
• your uniqueness.
tsbi.com.au n
The reality is that the customers
Part of the approach is to test
24 // SECURITY SOLUTIONS
014-033_SSM109 Regulars.indd 24
Many regular customers do not
of your confidence. David Gregory is the CEO of
securitysolutionsmagazine.com
21/08/2017 10:25 am
TR
OR
014-033_SSM109 Regulars.indd 25
HÉE D’ OP
21/08/2017 10:25 am
LEGAL
STRUCTURING YOUR BUSINESS TO PROTECT YOUR ASSETS BY JUSTIN LAWRENCE
any people own their
and is unable to keep working or
name is owned by a company, that
bankruptcy as his greatest threat. To
own businesses, and
pay the rent – then anyone chasing
name could do. However, in an ideal
start with, Callum should not own
this is a mistake. At
the business for money will chase
world, a new company would be set
any assets of significance. His house
this point, you are
Callum. If he loses that fight, he is
up for that purpose. That company
and car should not be in his own
probably asking yourself what I’m
a good chance to lose the business
– let’s call it Doctor Callum Pty
name. As a proprietor of a business,
talking about.
and the lease.
Ltd – would apply for credit, issue
Callum’s assets are best held in
purchase orders and pay invoices
the names of others (even though
M
People should not own
If, however, the lease is held in
businesses in their personal
the name of a separate entity – let’s
on behalf of the business. If, for
Callum will be advised that holding
capacities. Businesses should
call his company Cal’s Security Stuff
any reason, the business had
his home in the name of a company
be owned not by the proprietors
Pty Ltd – then even if the business
insufficient funds available to pay
will have tax consequences which
of them, but by other people or
is sued, Callum has shielded the
creditors, then Doctor Callum Pty
would not otherwise apply if the
entities who are separated from
lease from the firing line as best
Ltd would be the entity sued for
house was in his own name). If he
the day-to-day operation of the
he can, and the business will still
the money. At the same time, the
can manage it, Callum should pay as
business. But how do business
have premises from which to
business name and lease would be
much money as he can afford into
owners structure themselves
trade. If Callum is the sole director
quarantined from that law suit.
his superannuation fund. He should
appropriately?
and shareholder of Cal’s Security
At any time during its trading
not go crazy with contributions,
Stuff Pty Ltd, then the company
life, Callum should undertake an
but they should be significant
Here’s a bit of an action plan:
will take whatever steps Callum
asset protection risk assessment.
and steady.
For starters, the business name
directs anyway, so he does not lose
As part of that assessment, Callum
should be registered in the name
any control.
should ask himself what is the
Callum is made bankrupt, he can
of a company or other entity. Take
Similarly, the business name
If, despite his best efforts,
most important thing he is trying
prevent the money paid into his
for example, Callum’s Security
of Callum’s Security Distribution
to protect and who represents the
superannuation fund being clawed
Distribution. Now, Callum is a
should also be held by an entity
greatest threat to that asset.
back by his trustee in bankruptcy.
young go-getter full of ideas about
other than Callum. Ideally, Callum
how to turn his online security
would have a separate company
protection structures may protect
be effective if it is put in place from
wholesale business into a multi-
that owns the business name – that
assets from creditors, but not from
the early days of Callum’s business
site, fully franchised operation.
is, a company other than Cal’s
matrimonial breakdown. Some
and the contributions are for
Callum intends to lease modest, yet
Security Stuff Pty Ltd. Then, even
structures may protect assets from
consistent and reasonable amounts.
comfortable premises in a semi-
if the company holding the lease
matrimonial breakdown, but may
Similar strategies exist if the
industrial part of the city and to
is wound up or liquidated, the
not protect from claims brought
risk assessment reveals matrimonial
throw his doors open for business.
business name would be kept free
against Callum’s estate after he
breakdown or claims against
from claims.
dies. Once Callum has undertaken
estates as Callum’s most pressing
his full assessment, he can structure
asset protection issue.
Who should be the tenant
For example, some asset
named on his lease? Not Callum,
When Callum’s Security
that’s for sure. Why? Because at
Distribution buys materials and
and plan his asset protection risk
this stage, the business is Callum. If
supplies, it should do so under a
strategy. Let’s look at one of those.
something happens to Callum – he
name other than Callum’s private
is sued or he is in a car accident
name. Given that the business
26 // SECURITY SOLUTIONS
014-033_SSM109 Regulars.indd 26
Let’s assume that Callum has assessed his own personal
While this strategy is limited, it can
Giving some thought to those things now, will greatly assist Callum – and his business – in the long run. n
securitysolutionsmagazine.com
21/08/2017 10:25 am
R
EasyIP 3.0 H.265+ EasyIP 3.0 H.265+
EasyIP 3.0 SERIES
Simple and Powerful The Easier Journey toEasyIP Better 3.0Security SERIES Simple and Powerful The Easier Journey to Better Security
The all-new Easy IP product range is simple to install and use, and is available at a budget-friendly price. Rarely does an affordable system come with such powerful functionality: 4K ultra HD with true WDR, H.265+ Smart Codec compression technology. New cameras in the range also provide greater analytic functions, featuring on-board Video Content Analysis options. Its power, combined with its easy installation and user-friendliness, means the Easy IP 3.0 solution requires significantly less operator input to deliver a significantly more efficient and effective security solution. - 4K Ultra HD with WDRrange is simple to install and use, and is available at a budget-friendly price. The all-new Easy IP true product Rarely does an affordable system come with such powerful functionality: 4K ultra HD with true WDR, H.265+ - H.265+/H.265 Compression technology Smart Codec compression technology. New cameras in the range also provide greater analytic functions, featuring on-board Video Content Analysis options. Its power, combined with its easy installation and Hikvision Oceania user-friendliness, means the Easy IP 3.0 solution requires significantly less operator input to deliver a significantly more efficient effective security solution. Unite 14a Eden Park Dr, Macquarie Parkand NSW 2113 Tel: +61 2 8599 4233 - 4K HD557 with true WDR Toll Ultra Free:1300 450( Australia only) Email:salesau@hikvision.com www.hikvision.com - H.265+/H.265 Compression technology 014-033_SSM109 Regulars.indd 27
Hikvision Oceania
21/08/2017 10:25 am
THINKING ABOUT SECURITY
RED TEAMS / TOO CLOSE TO SEE I
s it possible to be too
How can we find out if we
C
M
The client needs to clearly
possibly to assets and functions
Y
close to something?
have become blind or, at the least,
define how far the Red Team may
that have not been identified or
CM
To be so familiar with
blinkered? Two options present
go, are they allowed to conduct
considered.
the situation that the
themselves.
Social Engineering against staff?
view has become ordinary? I once
One option is to do another
MY
Obviously, it is essential
Can they cut fences or pop doors?
to ensure confidentiality
CY
asked the then security manager of
security risk review – this time
It is also necessary to remind the
is maintained and that the
Sydney Opera House, as we stepped
from first principles, putting
team that they are not to break any
weaknesses are only reported to
out onto the forecourt with the sun
previous assessments aside and
laws but can report on how illegal
those who need to know.
sparkling off the wakes of the
starting from absolute scratch. If
means could be used.
ferries, the Bridge towering off to
done objectively and as if for a new
one side and the Botanic Gardens
business it should produce, if not
vectors and motives and ensure
that dealt with sensitive corporate
lush on the other, if they ever forgot
a different range of security risks,
they are realistic and relevant in
data and had processes in place
where they worked. The answer was
at least an honest review of assets,
relation to the organisation. There
to manage and control the flow
“yes, sometimes”.
threats, risks and outcomes. As
has been a tendency to “Blue Sky”
of information, but had failed to
the potential for self-propagating
threat vectors and thereby include
notice that they employed foreign
become so familiar with our work
sameness will exist, perhaps the
all sorts of unrealistic scenarios.
nationals from countries that
environment, with normal business
use of an external consultant
Consideration should be given
were direct competitors. While
and the ‘usual suspects’ that we
to conduct an enterprise-level
to what is ‘probable’ rather than
there was no obvious evidence
can fail to see what has changed
security risk assessment, without
‘possible’.
of corporate espionage, the
or what has always been there and
access to the previous reports,
never noticed.
may assist.
It is the same with our risks. We
Managers all talk about
The second option is to
Discuss the possible attack
A ‘first principles’ review can help establish a new or revised baseline for security. However, it
CMY
One example where this was of benefit was an organisation
possibility certainly existed with great potential cost. We need to step back and
foreseeable risks; but foreseeable
have outsiders test the validity
can still be biased by corporate
see both the beauty and terror
to whom? What if we are so
of the existing risk mitigation
prejudices and blind spots. A Red
of the wider view and remember
comfortable that we don’t see the
methodologies. The use of a “Red
Team review, if appropriately
where we work.
things around us that others do,
Team”. However, care must be
managed and controlled without
particularly those in the future
taken when considering having an
inflicting ‘known wisdom’ on the
is a recognised thought leader
sitting in a court room who have had
external agency deliberately try to
external assessors, can provide a
in the field of security. He can
time to prepare with the advantage
identify and prosecute holes in the
valuable and relevant snapshot
be contacted at donwilliams@
of hindsight?
security structure.
of exposures and vulnerabilities,
dswconsulting.com.au. n
28 // SECURITY SOLUTIONS
014-033_SSM109 Regulars.indd 28
K
Don Williams CPP RSecP ASecM
securitysolutionsmagazine.com
21/08/2017 10:25 am
NEW INT-QUADIP For PB- Series Quad Beams
C
M
Y
CM
MY
CY
CMY
K
IP INTERFACE MODULE
LAN/WAN
With the new IP interface module, our intelligent PB- series Quad Beams are as easy as IP cameras to install and integrate with leading VMS solutions.
VMS
Most intruder detection systems rely on legacy technologies which require a number of third-party products and man-hours to install. The INT-QUADIP module utilises infrastructures already in place with CCTV, Access Control, and other security systems; dramatically reducing installation costs whilst providing a fully integrated security system which can be easily expanded and configured as desired.
KEY SPECIFICATIONS ● ● ● ●
PoE Class 3 IEEE 802.3af VMS Compatible Direct control for cameras including: - Axis - Bosch - Hikvision - Sony
● Plug & play web browser interface ● No software installation required ● One cable installation
PB-IN-HF/HFA The ultimate in trouble free perimeter detection for distances up to 200m.
1300 366 851 www.seadan.com.au 014-033_SSM109 Regulars.indd 29
PB-F/FA Single channel quad beams ideal for simple perimeter systems.
PB-IN-100AT Anti-crawl beam for high security perimeters up to 100m.
PB-KH TAKEX quad beam performance for use in beam towers.
(02) 9427 2677 www.sprintintercom.au
21/08/2017 10:25 am
EVENTS
Integrate
offers industry certification and
is invitation only and intended for
This conference will provide
29–31 August 2017
training with tailored programs
Australia’s most senior IT leaders
CISO professionals with a unique
Melbourne Convention and
from InfoComm International
to gather for a strategic event in
opportunity to learn and interact
Exhibition Centre
and CEDIA.
order to exchange knowledge
with their peers through a series of
and interact as one over a range
professionally-led sessions hosted
Now entering its ninth year,
• Experience – Integrate is your
Integrate is Australia’s premier AV
opportunity to interact and
of important issues facing the
by both international and local
and Integration trade show. The
test the latest cutting-edge
industry. The one-to-one meetings
experts, allowing all attendees the
event is a hub of activity for local
innovations in the industry and
with leading supplier companies
opportunity to be informed by front
and global brands to showcase
talk to the specialists behind
will also provide a wealth of
line executives while also having
solutions and products to AV
these leading products.
knowledge and offer opportunities
the opportunity to engage with
for all attending delegates, while
a unique group of key suppliers
technicians and corporate end-
• Network – As the leading AV
users, meet with buyers, integrators
event in the Australasia region,
the informal networking sessions
through targeted pre-arranged
and distributors, and celebrate the
with visitors and suppliers
promise to create a unique
meeting sessions.
latest industry developments.
coming from all corners of
interactive forum.
• Explore – With over 130
the globe. Integrate offers
exhibitors showcasing their
an unrivaled networking
latest products and services in
opportunity for the industry to
AV and solution technology, you
meet annually and exchange
are going to wish you had more
news and insights.
Visit cioleadersaustralia.com for
Visit cisoleaders.com.au for more information.
more information.
CISO Leaders Australia Summit
ASIS International Australia Conference Contemporary Security Leadership
than three days to explore the
Visit integrate-expo.com for more
7 September 2017
In Australia
Integrate show floor!
information.
Sydney, Australia
19 October 2017
The CISO Leaders Summit Australia
Melbourne Convention and
will highlight the emerging
Exhibition Centre
speakers, global brands and
CIO Leaders Summit Australia 2017
technologies that are leading the
The ASIS International Australia
product specialists as they share
6 September 2017
way and will examine current
Conference 2017 is the premier
their insight into the latest in
Sydney, Australia
challenges that CISOs are faced
gathering of security professionals.
AV technology. Integrate also
The CIO Leaders Summit Australia
with throughout 2017 and beyond.
The conference provides an
• Learn – Learn from internationally renowned
30 // SECURITY SOLUTIONS
014-033_SSM109 Regulars.indd 30
securitysolutionsmagazine.com
21/08/2017 10:25 am
dorma
Co m
es Sec at ee th urit st e yE xpo and H futur e , fo 2 r yo 2, ur cha nce
WI aG
oP
ro V
ide
N
to
oC am
era
The c-lever range -The perfect symbiosis of technology and design. Since the launch of the smartphone, it’s been clear that intelligent secure technology and design are not mutually exclusive.
Come see the future
Our designers have taken inspiration from such developments and created shapes that stylishly combine aesthetic and functional secure requirements. Come visit stand H22 at the Security Exhibition & Conference to learn more about our c-lever range and our security solutions to meet your business requirements.
1800 675 411 www.dormakaba.com.au
dormakaba_c-lever x 275mm_SS#107_108_240517.indd 2 014-033_SSM109air_210mm Regulars.indd 31
6/2/2017 9:21:54 AMam 21/08/2017 10:25
EVENTS established platform for education
suppliers, to be recognised and for
and business exchange, addressing
their success to be celebrated.
the key trends and issues facing
The criteria for these awards
• Connected Security Expo (CSE) moved to the ISC West show floor in 2017! As the digital
• bring new and leading solutions in operational efficiency to the market
security professionals locally
are based on extensive research
and physical worlds collide, it
and globally.
on key factors that contribute
is increasingly important for
Key topics:
to and characterise outstanding
industry professionals to protect
• terrorism
performance. This research can be
their organisations and clients
• cybersecurity
found at https://perpetuityresearch.
from both physical and cyber
multidisciplinary professions
• behavioural techniques
com/wp-content/uploads/2014/09/
threats. CSE provides holistic
to have a voice and achieve
• security management
Aspiring-to-Excellence.pdf
solutions for today’s connected
• emergency management.
The OSPAs are being set-up
organisations.
• deliver forefront trends for running more sustainable facilities and workplaces • foster a community of
recognition • redefine the future of the
in collaboration with security
Working with SIA, ISC West also
industry and challenge
The conference is a great
associations and groups across
features world-class education
traditional perceptions of
opportunity to:
many countries.
to learn about every facet of the
• engage with peers and
By researching and
colleagues from the public and
standardising the award categories
private sectors
and criteria, the OSPAs scheme
security industry. Visit www.iscwest.com for more
facility management. Visit www.totalfacilities.com.au for more information.
information.
accelerating the future of the
countries to run their own
Total Facilities
Security Exhibition & Conference 2018
security profession.
evidence-based OSPAs schemes
18–19 April 2018
25–27 July 2018
while maintaining an ability to
Melbourne Convention and
Melbourne Convention and
Who should attend the event:
compete on an international level
Exhibition Centre, Melbourne
Exhibition Centre, Melbourne
• security professionals across the
in the future – World OSPAs.
Returning to Melbourne with an
In 2018, the Security Exhibition
exciting new proposition, Total
& Conference is heading back to
more information or to make a
Facilities now unites both facilities
Melbourne.
nomination.
and workplace professionals in the
• join industry leaders
public and private sectors • security risk management professionals
provides an opportunity for
Visit au.theospas.com for
• security service providers • security consultants
ISC West
• government and law
11–13 April 2018
The Security Exhibition &
ultimate industry destination for
Conference is the industry’s annual
the built and work environment.
opportunity to reunite for three days
Held annually between Sydney
of quality networking and unrivalled
Sands Expo Convention
and Melbourne, TFX is Australia’s
education alongside a showcase of
Contact events@asisvictoria.org.au
Center, Las Vegas
largest learning and networking
the most innovative solutions to the
or visit www.asisvictoria.org.au for
ISC West is the largest security
event for facilities and workplace
Australian market. For over three
more information.
industry trade show in the US.
management professions seeking
decades, it has been the largest and
At ISC West you will have the
solutions for creating more efficient,
most established commercial event
The 2017 Australian OSPAs
chance to meet with technical
sustainable and productive facilities
for the security industry in Australia,
representatives from 1,000+
and workplaces.
bringing together the entire supply
19 October 2017
exhibitors and brands in the
The River Room
security industry and network with
and efficient in its delivery
security professionals and end-users
Crown Casino, Melbourne
over 28,000 security professionals.
and provides real solutions to
to connect and create unparalleled
The Outstanding Security
In 2018, ISC West will offer
everyday operational challenges
business opportunities.
enforcement professionals.
Total Facilities is comprehensive
chain of manufacturers, distributors,
Performance Awards (OSPAs) are
attendees a host of attractions,
by connecting buyers and sellers to
pleased to announce the dates
including:
source innovation, debate current
forward to once again reuniting more
for the 2017 Australian awards.
• New products and technologies,
The entire team is looking
issues, share insights and create
than 4,500 security professionals
They will be working for the third
encompassing everything
opportunities for an invaluable
with over 150 leading suppliers.
year in a row with the prestigious
from access control to
community of professionals.
The 2018 show is set to see some
Australian Security Industry
unmanned vehicles.
Association Limited (ASIAL). The OSPAs recognise and
• Unmanned Security Expo,
interesting new innovations as well Our vision
as a host of new attractions.
introduced in 2017, is an event
We champion professionals
reward companies and individuals
within ISC West focusing on
who support the built and work
your diary. We look forward to seeing
across the security sector. They are
unmanned aerial vehicles
environment with a sense of
you again in Melbourne in 2018
designed to be both independent
(UAVs), unmanned ground
belonging and advocacy – the
for the Security Exhibition & ASIAL
and inclusive, providing an
robotics and vehicles (UGVs),
unsung heroes and behind-the-
Conference!
opportunity for outstanding
and the various software and
scenes forces. We will evolve and
performers, whether buyers or
applications that support them.
grow our offer year-on-year to:
32 // SECURITY SOLUTIONS
014-033_SSM109 Regulars.indd 32
Make sure you put the dates in
Visit securityexpo.com.au for more information. n
securitysolutionsmagazine.com
21/08/2017 10:25 am
Recognize and Analyze How often was he here this month?
Is he a known suspect?
How old is she?
Are they employees?
When, where did she enter?
Is this valued customer Mia Clark?
How many people are here? Is it too crowded in this area? New: Recorded media import and advanced investigation tools upload sets of videos recorded at a specific location and time to track possible participants in a crime find a person enrolled in an image database or search for an unknown person locate appearances in multiple videos make use of filters that specify timeframe, camera location, age range, gender and glasses
See it in action at Security Expo in Sydney, stand K26! 014-033_SSM109 Regulars.indd 33
21/08/2017 10:25 am
FEATURE
CISO On The Rise But Many Organisations Still Lacking Adequate Cybersecurity
34 // SECURITY SOLUTIONS
034-037_SSM109 Article 1.indd 34
securitysolutionsmagazine.com
21/08/2017 4:53 pm
BY JO STEWART-RATTRAY
securitysolutionsmagazine.com
034-037_SSM109 Article 1.indd 35
In my discussions with colleagues
According to ISACA’s State of
and peers, it is pleasing to see
Cyber Security 2017 research,
the importance of cybersecurity
65 percent of organisations
awareness is growing among
now have a dedicated chief
business leaders and board
information security officer (CISO)
directors. Unfortunately, this
on staff. This is a 15 percent
awareness and understanding of
increase compared to last year.
cyber threats has come at a price,
Additionally, a recent study by The
as the recent WannaCry and Petya
Australian Computer Society and
ransomware attacks demonstrate
Deloitte Access Economics predicts
how vulnerable and unprepared
information and communications
many organisations remain.
technologies (ICT) management
SECURITY SOLUTIONS // 35
21/08/2017 4:53 pm
FEATURE
and operations roles will grow
executed their
in Australia by 2.4 percent per
incident response plan
annum, with ICT technical and
having their wallets stolen,
• 53 percent report an increase
professional workers growing at
in the year-over-year
1.9 percent per annum.
number of attacks.
However, the ISACA research
To take another example, consumers used to worry about
Stagnant or reduced budgets could
also showed that, while
lead to an inability to keep up with
cybersecurity budgets have
the growing threat landscape,
expanded, the rate of growth is
especially considering many
slowing. Only half of the survey
enterprises are still experiencing
respondents anticipated growth
a shortage of skilled cybersecurity
in their budget – down 11 percent
professionals. This may result in
compared to the previous year.
CISOs having less budget available
This decreased growth comes
to prevent and respond to attacks.
at a time when cyber threats are increasing and becoming
Data is the New Black
more sophisticated. As the
At the turn of the century, the
research highlights:
mantra for businesses was
• 80 percent of security
‘knowledge is power’. As the
resulting in loss of money and
HOWEVER, THE ISACA RESEARCH ALSO SHOWED THAT, WHILE CYBERSECURITY BUDGETS HAVE EXPANDED, THE RATE OF GROWTH IS SLOWING.
credit cards. Today, with credit card companies having systems in place to immediately deal with theft, while still an annoying and time-consuming process, consumers are more concerned about the theft of a mobile. This results in a higher value loss – the loss of personal information, such as contacts and photos, and sensitive financial and business-related data. Thankfully, with businesses addressing mobile security and encryption, this threat is
leaders believe their
knowledge economy continues
decreasing rapidly. Now, hackers
enterprise will experience a
to evolve, data is now a currency
see a viable opportunity in the
cyberattack this year
being traded on the darknet like
emergence of the Internet of
commodities on the stock market.
Things (IoT). IoT has overtaken
• 50 percent of enterprises
36 // SECURITY SOLUTIONS
034-037_SSM109 Article 1.indd 36
securitysolutionsmagazine.com
21/08/2017 4:53 pm
mobile as a primary focus for cyber defences, as 97 percent of organisations see a rise in its usage. The rise of sophisticated
STAGNANT OR REDUCED BUDGETS COULD LEAD TO AN INABILITY TO KEEP UP WITH THE GROWING THREAT LANDSCAPE, ESPECIALLY CONSIDERING MANY ENTERPRISES ARE STILL EXPERIENCING A SHORTAGE OF SKILLED CYBERSECURITY PROFESSIONALS.
What can Businesses do to Protect Data?
a significant and concerning
1. Information sharing is
organisation faces and its
gap between the threats an
paramount. Enterprises
readiness to address those
must consider expanding
threats in a timely or effective
participation in information
manner. Cybersecurity
sharing and collaborative-
professionals face huge demands
analysis venues. Both better
to secure organisational
dissemination of what is
infrastructure, and teams
known and better intelligence
need to be properly trained,
gathering so that more is
resourced and prepared.”
known is needed to ensure
Enterprises should begin
that organisations are as well
planning strategies now
connected to information
to ensure that they are
on the latest threats as their
prepared by investing in talent
adversaries are.
retention, professional growth
2. Build and maintain a strong
opportunities, cross-training and
cybersecurity workforce.
other activities that maximise
Security professionals must
current staff and minimise the
not only be trained, but have
impact of attrition. The future
their skills maintained using
viability of their organisations
hands-on technical training
could well depend on it.
and performance-based assessment, which is why
Jo Stewart-Rattray has
this year ISACA developed
over 25 years’ experience in
the Cybersecurity Nexus
the IT industry. She specialises
(CSX)™ Training Platform.
in consulting in information
And this must be done while
security issues, with a particular
also assuring that these
emphasis on governance in both
professionals understand the
the commercial and operational
nature of the businesses for
areas of businesses. Jo provides
which they work.
strategic advice to organisations
3. Provide cybersecurity the
across a number of industry
resources required. Sixteen
sectors, including banking and
percent of survey respondents
finance, utilities, automotive
stated they do not have an
manufacturing, tertiary education,
incident response plan, and
retail and government. Jo heads
motivation of attackers is most
one in four organisations
ISACA’s Connecting Women
likely to be financial gain, and
have training budgets of less
Leaders in Technology and chairs
recent research from IBM showed
than US$1,000 (A$1330) per
the Branch Executive Committee of
most organisations pay the ransom.
cybersecurity team member.
the Australian Computer Society.
Financial motivations by hackers
Companies still do not have
She is also past chair of ISACA’s
are likely to spur the development
the skills they need or the
Audit Committee, Leadership
of increasingly sophisticated
plans in place to prepare for
Development Committee and
ransomware in the future. This
advanced cyber threats. These
Security Management Committee.
may mean an uptick in the amount
things take resources.
ransomware further illustrates that data is now a currency. Half of respondents indicated that the
This article is an extract of
of malware and its complexity.
My colleague, Christos
the ISACA State of Cyber Security
Just as credit card companies have
Dimitriadis, Ph.D., CISA, CISM,
2017, Part 2: Current Trends in
systems and processes in place
past ISACA board chair and
the Threat Landscape. The full
to deal with theft, enterprises
group head of information
report can be read at: https://
need to treat data like money and
security at INTRALOT,
cybersecurity.isaca.org/state-
protect it vigorously.
commented recently, “There is
of-cybersecurity n
securitysolutionsmagazine.com
034-037_SSM109 Article 1.indd 37
SECURITY SOLUTIONS // 37
21/08/2017 4:53 pm
ALARMS
38 // SECURITY SOLUTIONS
038-041_SSM109 Alarms.indd 38
securitysolutionsmagazine.com
21/08/2017 10:22 am
Taking place at the new
evident, not just from the increase
Awards”, sponsored by Sony.
NVR5224-24P-4KS2, a 24 Channel
International Convention Centre
in visitor numbers, but also the
These awards are a celebration
NVR capable of transmitting over
Sydney, from 26 to 28 July, the
look of the show. This year’s event
of the most innovative products
cable distances of up to 800m
32nd annual Security Conference
saw exhibitors invest more than
to hit the Australian market in
between the camera and NVR, a
and Exhibition returned to Sydney
ever before in their stands, with
the last 12 months. This year’s
huge increase in distance when
after a three-year absence and the
Inner Range producing one of
competition included around
compared to the current 100m
atmosphere was electric.
the most impressive stands ever
50 entries. Products were
limitation experienced across
seen at the show. Awards for this
judged on originality, impact
most traditional IP networks.
attendance, including the return
year’s exhibitors went to Ness
of innovation, measurability of
of some big name brands such as
Corporation, who were awarded
the benefits, and applicability
awarded to Avigilon for their
FLIR Systems, HID Global, Inner
Best Custom Stand over 36sqm,
to the Australian market by a
Appearance Search™ technology,
Range, Dahua, HIK Vision, Bosch,
Alarm.com, who won Best Custom
panel of leading security experts
a sophisticated deep learning
and so on, this year’s event was
Stand under 36sqm and Sententia,
including General Manager of
artificial intelligence (AI) search
the largest yet. Over three days,
won the Best Shell Scheme Stand
ASIAL, John Fleming and Editor of
engine technology. Appearance
more than 5000 visitors attended
with their team dressed up as the
Security Solutions Magazine, John
Search™ sorts through hours of
the show, an increase of 14% on
Cyber Security A-Team!
Bigelow among others.
footage with ease, to quickly locate
With 153 exhibitors in
visitor numbers for 2016 and
The 2017 show also saw the
Dahua Technology, one of
First Runner Up was
specific people and vehicles across
13% more than attended the last
release of an amazing array of
the world’s largest providers of
Sydney show back in 2013.
new products and technologies
video surveillance products and
Second Runner Up
as highlighted by the “2017
services, took out this year’s Best
was awarded to Amaryllo
Security Best New Products
New Product Award for the Dahua
International’s ATOM AR3S, the
The growth in both size and popularity of the show was
securitysolutionsmagazine.com
038-041_SSM109 Alarms.indd 39
an entire site.
SECURITY SOLUTIONS // 39
21/08/2017 10:22 am
ALARMS
W i I a s
A m o a r i
T a e t s
A c m o
world’s first professional IP66
at Doltone House in Sydney’s
a diverse range of topics
Security Solutions at Telstra;
certified outdoor robot camera.
Jones Bay Wharf as part of the
shaping the current security
Assistant Commissioner Mark
The ATOM AR3S recognises faces
annual Security Gala Dinner.
landscape including cyber
Murdoch, Commander Counter
as well as deciphering military-
The dinner runs alongside the
security, crisis management,
Terrorism & Special Tactics at
grade 256-bit encryption. The
Security Exhibition & Conference
terror preparedness, the
NSW Police; and Shara Evans,
AR3S is also fast to set up as it
and was attended by over 400
Commonwealth Games security,
Founder at Market Clarity.
can be powered from a standard
industry professionals.
supply chain management
Edison light bulb socket. The standard of entries for this
Running in conjunction with the exhibition, this year’s
Next year’s event will return to
and security risk management
Melbourne, taking place from the
to name a few.
25–27 July 2018 at the Melbourne
year’s awards was second to none,
ASIAL Security Conference and
making the judging decisions
Executive Briefing program
industry experts such as Danny
Those people wanting more
harder than ever with a special
was completely sold out. The
Baade, Head of Security at Gold
information, looking to book
mention going out to all entries.
program brought together
Coast 2018 Commonwealth
space or attend the conference
The awards were announced on
local and international thought
Games Corporation; Neil
program can visit
the evening of Thursday 27 July
leaders who addressed
Campbell, Director of Global
www.securityexpo.com.au n
40 // SECURITY SOLUTIONS
038-041_SSM109 Alarms.indd 40
Among those speaking were
Convention & Exhibition Centre.
securitysolutionsmagazine.com
21/08/2017 10:22 am
W n R a b
A fu t d
We are a leading player in the biometric identification market by pioneering In Motion Identification (IMID) access, a multimodal verification for instant, seamless, and non-invasive verification. Ask us about advanced features such as multi-modality, speed of identification, our committed accuracy, anti-fraud algorithm, double factor availability, restricted people alerts, simultaneous identification.
The solution is designed for enterprise and can be easily integrated with existing infrastructure. It can be added to any existing door, turnstile or speed stile, and any access control solution. Ask us about high availability, scalability, cyber security and encryption, multi-site management, traceability and auditability, our APIs and ease of integration.
FST Biometrics is a leading identity management solutions provider. The company’s IMID™ product line offers access control through its proprietary In Motion Identification technology. This provides the ultimate security and convenience for users, who are accurately identified without having to stop or slow down. IMID™ solutions integrate a fusion of biometric and analytic technologies that include face recognition, body behavior analytics and voice verification. For more information, please visit http://www.fstbm.com.
With IMID Access, authorized users do not have to slow down, sign in or stop. Rather, they are identified in motion, and granted seamless access to buildings and facilities. Ask us about our rich out of the box functionality, such as visitor management, time attendance, notifications, digital doorman and mobile applications.
038-041_SSM109 Alarms.indd 41
Add-On APAC Innovative Solutions offers converged physical, cyber and communication security solutions. Operating across the Asia Pacific region, we harness advanced products and ground-breaking technologies, helping our customers transform the way they protect people, information and assets. Learn more about us at http://www.addonapac.com. Add-On APAC Australia Pty Ltd info@addonapac.com, 03 9607 8465
IMID is the future of access control. Prefer to take your own conclusions?
Ask us for a product demonstration, and see it for yourself.
21/08/2017 10:22 am
OPERATIONS
P R I M A 42 // SECURITY SOLUTIONS
042-047_SSM109 Operations.indd 42
securitysolutionsmagazine.com
21/08/2017 10:23 am
L F E A R Key Considerations For Operational Survival BY RICHARD KAY
Fear is a feeling induced by
or in anticipation or expectation of
emotions, with fear one of them,
responses, so it has been preserved
perceived danger or threat
a future threat perceived as a risk
but which also includes acute
throughout evolution.
that occurs in certain types of
to body or life. The fear response
stress reaction, anger, angst,
organisms, which causes a change
arises from the perception of
anxiety, fright, horror, joy, panic
danger; if people did not feel it, they
in metabolic and organ functions
danger leading to confrontation
and sadness. Fear is related to,
could not protect themselves from
and ultimately a change in
with, or escape/avoidance (fight-or-
but should be distinguished from,
legitimate threats. But often people
behaviour, such as fleeing, hiding or
flight response), which in extreme
anxiety, which occurs as the result
fear situations that are far from life
freezing from perceived traumatic
cases of fear (terror) can be a freeze
of threats that are perceived to be
or death, and thus hang back for
events. Fear in human beings may
response or paralysis.
uncontrollable or unavoidable. The
no good reason. In humans and
fear response serves survival by
animals, fear is modulated by the
generating appropriate behavioural
process of cognition and learning.
occur in response to a specific stimulus occurring in the present,
securitysolutionsmagazine.com
042-047_SSM109 Operations.indd 43
Psychologists suggest that there is only a small set of innate
Fear is a vital response to
SECURITY SOLUTIONS // 43
21/08/2017 10:23 am
OPERATIONS Thus fear is judged as rational
humans that were quick to fear
Fear in violent confrontations can
experiences necessary to ensure
or appropriate and irrational or
dangerous situations were more
take many forms:
a high level of survivability, but
inappropriate. An irrational fear is
likely to survive and reproduce,
• fear of getting harmed or
things can take a negative turn if
called a phobia.
preparedness is a genetic effect
Fear of the unknown
that is the result of natural
harming others • fear of harm to fellow officers
trainees are given the experience of losing, even in simulated
(irrational fear) can be defined
selection. From an evolutionary
as false evidence appearing
perspective, different fears may
real and is caused by negative
be adaptations that have been
thinking which arises from
useful in an evolutionary past.
anxiety, and it can branch out
Some fears, such as fear of heights,
to many areas. Being scared
may be common to all mammals.
makes people anticipate and
Other fears, such as fear of snakes,
aggravate of what may lie ahead
may be common to all simians.
These fears can exist
There are four levels of
rather than plan and evaluate.
Still others, such as fear of mice
simultaneously, clouding the
physiological performance.
The ambiguity of situations
and insects, may be unique to
focus of what needs to be
There is no specific heart rate
that tend to be uncertain and
humans. Fear is high only if the
accomplished. When dealing
associated with Condition White
unpredictable can cause anxiety
observed risk and seriousness
with violent confrontations,
and Yellow; the difference is more
and other psychological and
both are high, and is low if risk or
officers do not need these mental
psychological than physiological.
physical problems, especially in
seriousness is low.
distractions to cloud their
However, as the level of arousal
judgement and cause hesitation.
increases, the ‘conditions’ can
those who engage it constantly.
or bystanders • fear of legal litigation or procedural inquiry
encounters. It also creates neurological deficiency that can be difficult to overcome.
• fear of judgement after the fact • fear of issues relating to religious beliefs.
Consequences on Operational Performance
Ambiguous and mixed messages
Signs and Symptoms
can affect self-esteem and self-
Many physiological changes in
in four main ways – those who
rate levels.
confidence. Developing a sense
the body are associated with
have no fear (no time, caught by
• Condition White is the lowest
of equanimity to handle various
fear. An innate response for
surprise) and do the job, those
level of readiness, unfocused,
situations is often advocated as an
coping with danger, it works by:
who have fear and no one knows
unprepared, helpless and
antidote to irrational fear and is
accelerating the breathing rate
it and they do the job, those who
an essential skill.
(hyperventilation) and heart
have fear and everyone knows
Fear manifests itself in people
be associated with specific heart
vulnerable and in denial. • Condition Yellow is the
rate; constricting the peripheral
it, but it does not matter because
level of basic alertness and
as a result of learning, called fear
blood vessels, leading to blushing
they do the job, and those who
readiness, psychologically
conditioning in psychology. Fear
and vasodilation of the central
have fear and everyone knows it
can be learned by experiencing
vessels (pooling); increasing
because they failed to do the job.
or watching a traumatic accident.
muscle tension, including the
Humans usually vacillate between
optimal survival and combat
There are studies looking at areas
muscles attached to each hair
all four stages, with a propensity
performance (115–145bpm),
of the brain that are affected in
follicle to contract and causing
towards one or another.
where complex motor skills,
relation to fear. When looking at
goose bumps (piloerection) to
these areas, such as the amygdala,
make a cold person warmer or
is stress inoculation training,
cognitive reaction time are
it was proposed that people learn
a frightened animal look more
which places an obvious fork in
all at their peak, but there is
to fear regardless of whether they
impressive; sweating; increasing
a person’s survival psychology
a price – at about 115bpm,
themselves have experienced
blood glucose; increasing serum
pathway at the point of ‘harm’.
fine-motor skills begin to
trauma, or if they have observed
calcium; increasing white
If officers are conditioned to
the fear in others. Fear is also
blood cells called neutrophilic
stop when they are harmed,
affected by cultural and historical
leukocytes; heightening alertness,
they program an undesirable
accelerated heart rate levels
context. There are consistent
leading to sleep disturbance; and
and potentially self-destructive
(145–175bpm). For most
cross-cultural differences in how
creating a feeling of ‘butterflies’
action into their mind. Giving
officers, 145bpm represents
people respond to fear. Display
in the stomach (dyspepsia).
officers the experience of losing
a level at which performance
rules affect how likely people are
This primitive mechanism
in a simulation actually begins to
begins to break down, but
to show the facial expression of
may help an organism survive
condition a risk-aversion pathway
for some this is the optimal
fear and other emotions.
by either running away or
in the brain to which they may
level of arousal, enabling
fighting the danger. With the
turn during similar experiences
extraordinary performance,
learned, the capacity to fear is
series of physiological changes,
in the future – they may actually
a process called stress
part of human nature. Studies
the consciousness realises an
stop and give up as they were
have found that certain fears
emotion of fear.
programmed to do in training.
People develop specific fears
Although many fears are
In violent confrontations,
The key to managing fear
prepared for combat. • Condition Red is the level of
visual reaction time and
deteriorate. • Condition Grey exists at
acclimatisation. • Condition Black is when the
When properly structured,
sympathetic nervous system
– a phenomenon known as
everyone feels fear to some
reality-based training can provide
arousal induces a heart rate
preparedness. Because early
degree, even experienced officers.
officers with those essential
above 175bpm, and cognitive
are more common than others
44 // SECURITY SOLUTIONS
042-047_SSM109 Operations.indd 44
securitysolutionsmagazine.com
21/08/2017 10:23 am
Effects of FearInduced Heart Rate Increase (bpm)
adrenaline has been introduced
includes preparation for the
into the system, the resulting
possibility of being shot at and
startle response contraction (of
preparation for the possibility
There is a tremendous difference
For those who do not push
the hands) can generate as much
of being hit. It is about being
between the performance impact
the envelope through physical
as 25lbs of pressure. That amount
prepared ahead of time for
of heart rate increase from fear
fitness and repetitive training,
of force is approximately twice
operational reality.
and heart rate increase from
Condition Grey is generally a
the amount needed to discharge a
physical exercise. This data is
realm in which complex motor
double action handgun.
for hormonal induced heart
skills begin to break down and
rate increases resulting from
bilateral symmetry begins to set
to prevent this convulsive clutch
can act. The best equipment
sympathetic nervous system
in, meaning that what an officer
response. One is to keep the
and training in the world
arousal. Exercise-induced
does with one hand he is likely to
finger off the trigger until it
cannot make up for the officer
increases do not have the same
do with the other.
is time to engage the target, a
unprepared to use available
technique that has become the
assets. Officers must mentally
processing deteriorates as the midbrain takes over from the forebrain.
effect. Hormonal-induced
Bilateral symmetry can have
There are many safeguards
Mental conditioning is extremely important. The brain must decide before the body
performance and strength
grave consequences for an officer
standard for firearm training.
prepare themselves to deal
increases can achieve 100 percent
in a tense situation where he is
Even that is not a guarantee,
with any situation at any time.
of potential maximum within 10
holding a firearm on a subject.
since the clutch response can
A poor survival mindset leads
seconds, but drop 55 percent after
Say the subject attempts to flee
sometimes be so intense that
to indecisiveness that can
30 seconds, 35 percent after 60
and the officer grabs him with
the finger will slip back into
jeopardise all parties involved.
seconds and 31 percent after 90
his free hand. The accelerated
the trigger guard causing an
A strong survival mindset
seconds. It takes three minutes
heartbeat causes bilateral
unintentional discharge. Another
helps instil the confidence and
of rest to ‘recharge’ the system.
symmetry, so that as the officer
safeguard is to ensure muzzle
commitment necessary to survive
Any extended period of relaxation
grabs a fistful of the subject’s
discipline. The best safeguard,
and prevail.
after intense sympathetic nervous
shirt with his support hand, he
however, is for an officer to not
system arousal can result in a
has a convulsive clutch response
allow his heart rate to get too
occasion in operations; they sink
parasympathetic backlash, with
in his dominant hand, which may
high. Calm people are much less
to the level of their training.
significant drops in energy level,
cause an unintentional discharge
likely to make these kinds of
Whatever is drilled in training
heart rate and blood pressure.
of the weapon. Bilateral
mistakes. To remain calm, and
comes out the other end in
This can manifest itself as
symmetry can also happen when
control heart rate, officers should
operations. There must be a
normal shock symptoms and/or
a person is startled. If a person
engage in tactical breathing.
continual effort to develop
profound exhaustion.
is under extreme stress and
One tool to control
Officers do not rise to the
realistic simulations training so
physiological response is
that officers develop skill sets
autogenic breathing, a technique
that transfer to reality. Everyone
that can be used in a stressful
has good and bad days. Do not
situation to control sympathetic
let officers destroy themselves
nervous system reactions. The
because of a bad day, and do not
more an officer practises it, the
destroy others because they had
quicker the effects kick in. It
a bad one. Take pride in the good
can be used before, during and
days and strive to constantly
after a combat situation. When
improve. While it is acceptable to
used before, it quickly calms and
have a bad day, it is unacceptable
prepares an officer to function at
not to train and improve and to
his best in a hostile environment.
not use available resources to
After a critical incident, it is
make sure that the bad day never
a highly effective tool to help
happens again.
delink the physiological arousal from the memory of the event.
internationally certified tactical
it, he should keep tuning it
instructor-trainer, director
until he gets to the level that
and senior trainer of Modern
works for him.
Combatives, a provider of
Statistics show that over a
securitysolutionsmagazine.com
042-047_SSM109 Operations.indd 45
Richard Kay is an
Once an officer starts using
operational safety training for the
third of all officers killed on
public safety sector. Visit www.
duty did not defend themselves.
moderncombatives.com.au for
The solution lies in training that
more information. n
SECURITY SOLUTIONS // 45
21/08/2017 10:23 am
CCTV
46 // SECURITY SOLUTIONS
046-049_SSM109 CCTV B.indd 46
securitysolutionsmagazine.com
21/08/2017 10:26 am
A REVOLUTION IN
VIDEO
A N A LY T I C S How Deep-Learning Makes Video Surveillance Smarter BY OLIVER PHILIPPOU, Senior Analyst, Video Surveillance, IHS Markit
Why is the security industry talking about artificial intelligence? • IHS Markit forecasts the total market for paid-for video analytics market will reach $700 million in 2021. • This growth attributed to the widespread adoption of emerging analytics technologies, specifically deep learning architectures, which promise to alter not just the video analytics landscape, but the video surveillance industry as a whole. • The 2017 edition of the IHS Markit Report on Video Analytics in Security and Business Intelligence is now available.
securitysolutionsmagazine.com
046-049_SSM109 CCTV B.indd 47
SECURITY SOLUTIONS // 47
21/08/2017 10:26 am
CCTV
World Market For Deep-Learning Video Analytics Software by Application Type in 2021
Security - 53% Safety - 13% Business Intelligence - 22% Traffic Management - 12%
For a video camera, the world
facilitate a significant leap in the
1) Accuracy
need an analytics solution that is
is not a straightforward place.
capabilities of video analytics.
A long held complaint levied
100 percent accurate 100 percent
It is a mirage of complex detail,
The last couple of years has seen
against traditional analytics
of the time, many user require
subtle nuances, and ever-changing
a large increase in research and
products was that these
a security system be as close to
scenes. As such, for years the
development in deep-learning
algorithms were unable to
infallible as possible. Users in
reliability of video analytics has
neural networks, proving
distinguish between objects
the critical infrastructure sector,
been extremely variable, with
their capabilities, generating
and behaviours that a human
for instance, cannot afford to
vendors struggling to develop
considerable excitement, and
being would have no problem
miss a breach in their security;
algorithms that could function
putting them within reach of a
classifying. This lack of intuition
and can spend a large amount of
in complex real world scenes.
much wider user group.
on the part of computer vision
money investigating false alarms.
algorithms results either in
Deep learning algorithms have
However, the industry has come a
Deep learning appears to be
long way in recent years, and the
able to offer a level of accuracy
missed security breaches or
proven their ability to learn to
traditional “rules-based” video
and reliability in object and
false alarms. The ability of deep
achieve 99.9 percent accuracy
analytics have steadily improved
behaviour classification, which
learning algorithms to view a
in certain tasks, in controlled
their capability. These analytics
not only enables video analytics
scene intuitively, in the same way
environments like airport
are still not quite able to cope with
to finally deliver on some of the
as a human viewer, means that
immigration face recognition
the detailed and complex world
lofty but as yet unrealised claims
detection accuracy increases, and
applications, where conventional
in which we live, particularly
made in the past, but pushes
false alarm rates fall, dramatically.
systems would struggle to achieve
when dealing with scenarios
capabilities far beyond them.
Neural networks allow a
95 percent (according to Paul Sun,
outside a highly controlled
Broadly speaking, there are two
computer to apply a series of
CEO, IronYun – Deep learning
environment. Enter ‘deep-learning
main areas in which deep learning
assessments to a given situation.
technology applications for video
analytics’. Deep-learning analytics
analytics offer significant benefits
This is a significant development
surveillance). In many security
are poised to revolutionise
over the technology that has
for the video analytics industry.
use cases, these few percentage
the security industry, and
preceded it. They are:
Although some end-users may not
points make all the difference.
48 // SECURITY SOLUTIONS
046-049_SSM109 CCTV B.indd 48
securitysolutionsmagazine.com
21/08/2017 10:26 am
with approximately one billion
to radically increase the
So what is driving adoption of video analytics based on deep learning?
effectiveness of a computer to
There are numerous factors
power with even faster iteration.
reliably classify objects and
that appear likely to drive the
The rapid development of
behaviour. It is also making
widespread adoption of deep
GPUs, supercomputers, and
possible the processing and
learning analytics across a variety
cloud computing and other
analysis of increasing volumes
of video surveillance application
high performance hardware
of video footage in a fraction of
types. One major factor is the
platforms has facilitated the rise
the time that previous analytics
astonishing volume of data
of deep-learning analytics.
would need. Companies such as
generated by video surveillance
Avigilon, Qognify, and IronYun
systems each day. Hundreds of
are becoming more and more
are now marketing analytics that
petabytes of video footage are
common. China’s safe city
leverage deep learning to turn
recorded daily, and this figure
initiatives have, for example,
vast amounts of video footage into
is rising all the time. This is not
been expanding in complexity
usable information in a fraction of
just thanks to an increase in
and scope since their inception
the time it would have taken in the
resolution, but also a general
in 2003: this trend is reviewed
past. Video processing software
increase in the number of video
in depth in the Safe City 2017
that allows users to interact
feeds. Indeed, video surveillance
report from IHS Markit. Deep-
with their surveillance footage
data makes up over half of the
learning video analytics will be
using a Google-like interface and
volume of what could be referred
an essential facilitator to realise
natural language search terms
to as “big data” and the proportion
drastically reduces the amount
is rising significantly. While the
of time it takes to find relevant
volume of video data is huge and
video footage in an archive
increasing, the ability of security
that might store video from
companies and end-users to
thousands of feeds.
monitor and review it without
2) Power Not only has deep learning demonstrated its capacity
Facial recognition is also an
assistance is nowhere near up
neurons. Today, only a few GPUs are required to achieve the same sort of computational
Safe and smart city projects
FACIAL RECOGNITION IS ALSO AN AREA THAT HAS BENEFITTED THE MOST FROM DEEP LEARNING ARCHITECTURE.
the safe city concept. Indeed, we are increasingly seeing facial recognition, which more often than not requires deep-learning architecture to function reliably, become a required feature in Chinese tender documents.
area that has benefitted the most
to the task. Deep learning offers
from deep learning architecture.
a number of advantages in this
Indeed, most facial recognition
context, allowing faster, more
analytics on the market today
intuitive review and indexing of
feature some kind of deep
recorded footage, and reducing
learning. Not only does deep
the time it takes to find relevant
system that can operate efficiently
learning increase the accuracy of
images from days, weeks or even
in real time, with much of the
facial recognition sensors, it also
months, down to minutes.
process being automated. Highly
enables faces to be identified in
Computing power will also
Huge amounts of data will be generated from the thousands of sensors deployed across safe cities. A key element of the safe city concept is an integrated
reliable analytics, that are capable
larger and more crowded scenes.
play a significant facilitating
of making inferences on a more
In the wake of recent terrorist
role; deep learning video
abstract level than traditional
attacks on crowded venues,
analytics promise unprecedented
machine-vision algorithms,
this capability could radically
performance, but also require
in a wider variety of weather
change the whole approach to
significantly more computational
conditions, will be essential to
security monitoring, allowing law
power than many traditional
reduce false alarms and the
enforcement to track suspects with
video analytics products. The
level of manpower required to
far greater speed and efficiency.
deep-learning model requires
monitor video feeds.
Herta is one such company that
very many samples, and carries
specialises in facial recognition in
out very many calculations. In
large crowds. Because of this, IHS
the past, hardware devices were
Analytics in Security and
Markit expects verticals such as
incapable of processing complex
Business Intelligence Report –
large shopping malls, airports, and
deep-learning models with over
2017 includes dedicated in-depth
other transportation hubs, along
a hundred layers. For example,
research into deep-learning
with city surveillance projects,
in 2011, Google’s DeepMind used
video analytics market, and is
to be early adopters of this
1,000 devices with 16,000 CPUs
available for purchase through:
type of analytics.
to simulate a neural network
technology.ihs.com. n
securitysolutionsmagazine.com
046-049_SSM109 CCTV B.indd 49
The IHS Markit Video
SECURITY SOLUTIONS // 49
21/08/2017 10:26 am
BUSINESS
DYNAMIC RISK EQUILIBRIUM THE NEXT WAVE
50 // SECURITY SOLUTIONS
050-053_SSM109 Business.indd 50
securitysolutionsmagazine.com
21/08/2017 10:30 am
BY DR GAV SCHNEIDER AND KATE DOWN
The term ‘VUCA’, made popular
now face frustration due to a
risk professionals know that to
obviously these can be improved
by the United States military in
VUCA reality. Since Michael
succeed, business and cultural
and developed over time with
the late 1990s and now adopted
Porter’s groundbreaking work
change must be viewed from a
the right focus and intent. So,
by business schools all over the
in the 1980s, workers have
human psychology perspective.
how is this done? With focus on
world, shows the criticality of
become adept at developing
It takes organisational attributes
several aspects:
dynamic thinking and action.
strategy but unfortunately, as
such as agility and resilience
1. People need to be taught
VUCA stands for volatility,
most experienced leaders know,
to be able to adapt planning as
situational awareness – if
uncertainty, complexity and
they are not nearly as good
required to achieve objectives,
they cannot be present and
ambiguity. It highlights the key
at executing it. This has to do
or even to be wise enough to
orientate, how can they
underlying factors that everyone
with the persistent myth that
know when objectives should
know how to bounce back or
faces in everyday decision making
good execution means always
change. This presents the next
in the modern age. This also
sticking to a plan. It has been well
issue – every industry sector
makes sense from a sociocultural
documented that organisations
can now be seen starting to add
whole-of-person approach
evolutionary perspective because
spend huge amounts of time and
these catchy buzz words: “let’s
– flexible work structures
VUCA encapsulates the human
energy mapping out who should
be agile, let’s be resilient and
and changing trends mean
ancestral nature for adapting
do what and with what resources
because we said we are it has now
people cannot be controlled
to novelty and to change
(Sull et al, 2015). But they cannot
happened!” Or has it…
based on ‘when they are in
itself (Potts, 1998).
anticipate every event. In
Research in the field of brain
Since organisations are
where to move to? 2. It is necessary to embrace the
our buildings’ any more.
volatile markets, managers and
comprised of groups of people,
People need to be educated
science has shown the human
employees need to be agile and
the facets of group interaction
and empowered with the
brain is designed to:
that is not easy. Issues such as
combined with the individual
skills to apply ongoing
1. Solve problems relating
digital disruption, technological
attributes of the people who make
personal development
to survival in an
integration, globalisation and
up these groups is where the
and decision-making skills
unstable environment.
numerous other variables
disjoin seems to lie. People do not
continuously prove that long-term,
just become agile and resilient
3. Mindfulness needs to be
2. Do so in almost constant motion (Medina, 2014).
(Bernstein et al, 2016).
unbending plans serve as a great
because a mission statement is
developed so that people
However, much to the detriment
starting point, but if they are not
changed and catchy posters are
are present when they need
of workplace health, there is
structured with inbuilt flexibility
put up around the office. In fact,
to be (Csikszentmihalyi,
a gap between what science
they usually never work.
if one looks at the core connects
1990) – this has never
behind these two attributes from
been harder in a world of
knows and what businesses do.
Based on this it would seem
This has become increasingly
simple enough to focus planning
a definitional perspective, the
constant communications
evident through the upward
on shorter term cycles and have
complexity in assuming that
and distractions. How many
trend in stress and mental health
inbuilt flexibility. However,
people just get it can be seen:
readers want to check emails
issues and downward trend in
modern age humans struggle
• Resilience – the ability
or look on social media while
productivity. Business leaders and
for stability and continuity and
to bounce back and
strategy professionals who used
resist change, so this is much
exhibit toughness.
to be fixated with the ‘critical’
easier said than done. It is at
need for the three to five year
this point it makes sense to ask
course and direction quickly
they can mitigate the realities of
and longer strategic plan that
why there is resistance to change
and effectively.
cognitive and heuristics biases
factored all variables and strived
from a human psychological
It needs to be acknowledged that
that everyone has, and that
to minimise uncertainty so that
point of view; however,
everyone has different natural
impact decision making and
results could be guaranteed
organisations rarely do. Leading
abilities in these two aspects, but
performance (Ariely, 2008).
securitysolutionsmagazine.com
050-053_SSM109 Business.indd 51
• Agility – the ability to change
reading this article? 4. People need to be taught to understand themselves so that
SECURITY SOLUTIONS // 51
21/08/2017 10:30 am
BUSINESS 5. Enhanced understanding of others and empathy need to be taught so that people can
and governance activity that the
state of mind is now becoming
research supporting DRE that
business ‘has to do’.
well understood. Neuroscience
highly functional organisations
proposes the brain is organised
are those who operate not as a
The importance of cultivating
try and understand each other
DRE is reinforced when
to minimise threat and maximise
transactional network, but as an
better and play to each other’s
attention is focused towards
reward (Rock, 2008). Meaning,
evolved social network. Failed
strengths (Cuddy et al, 2013) to
how today’s workforce is faced
every person’s brain constantly
organisations tend to ignore
achieve workplace harmony
with increasingly complex
scans the environment for
the people dimension, treating
and organisational objectives.
environments, as well as
perceived threats, which leads
the human resource as simply
Only when the above has been
psychological and physical
to the acknowledgement that
cogs in the machine, which
achieved can businesses begin
demands that stem from a fast-
high performing workplaces
inevitably results in the loss of
to start expecting their people to
paced and volatile economy. A
are a by-product of two distinct
those resources. The leaders of
translate the relevant skills and
paper from Harvard Business
forces that mutually influence
industry are those who view their
attributes into the workplace,
School on building a resilient
one another. These forces
human assets as exactly that: an
and develop the ability to be
workplace culture highlights the
are positive organisations (or
asset to be maximised, a potential
organisationally agile and
particularly harsh toll on mental
environment and culture) and
to be utilised and an investment
resilient. Of course, it would be
health with workplace stress
positive individuals, based on
for return. The higher valued,
remiss to ignore the importance
and workforce disengagement
mindset and behaviours. It is
higher trained, higher engaged
of systems and processes but,
(Everly, 2011). In fact, a 2012
accepted that it is the mindset
the workforce, the greater return
in the end, it is people that have
Towers Watson study found that
of an individual that determines
on the investment. Dynamic risk
to use and apply these systems
in most organisations, only 35
their high levels of productivity,
equilibrium is thus the output of
and processes, so if the people
percent of employees said they
profitability, engagement,
a strategic and tactical balance
part is not right, the system
were engaged. In other words,
innovation and quality of life
between people and process that
and process is bound to fail. In
65 percent of employees have
(Kabat-Zinn, 1993). This is a
is constantly evolving.
order to drive this, a focused
mentally checked out, causing
double-edged sword: individual
cultural and behavioural change
productivity, innovation and
resilience can be developed
For a full list of
approach is needed, which
creativity to plummet. The study
through training the person
references, email info@
usually takes around three to
also found that 38 percent of
to focus on their thoughts and
interactivemediasolutions.com.au
five years to be successful in
employees felt stress and anxiety
feelings and examine their
Dr Gav Schneider is an
most organisations. This is where
about the future, and that less
actions and responses, but
acknowledged leader in the field
strategic planning and long-term
than half of the employees
resilience and agility can be
of human-based risk management
vision become critical.
surveyed agreed that senior
either assisted or disturbed by
and the psychology of risk. He
leaders had a sincere interest
the environment in which the
is a leading academic in his field
strive to create what is referred
in their wellbeing (Towers
individual finds themself.
and heads up the Postgraduate
to as a dynamic risk equilibrium
Watson staff, 2012).
The output of all of this is to
(DRE), which is the ability to
In most cases, when viewed
So what is it that makes some
Psychology of Risk program at
organisations able to not only
the Australian Catholic University
innovate and adapt, to take
through the lens of DRE,
survive but also thrive in the face
(ACU). Dr Gav is the CEO of the
calculated and educated risks so
the structure of the modern
of adversity? This is the challenge
Risk 2 Solution group of companies,
that opportunities can be seized.
organisation has not put the
the authors seek to solve through
which focus on delivering
It means that risk baselines
person at the heart of business
can be adjusted to match the
activities. Dr John Medina,
environment and people, based
a developmental molecular
on the opportunities and threats
biologist and author of Brain
that have to be managed. If DRE
Rules, has clearly highlighted that
cannot be achieved, people will
stress impacts people’s ability
constantly lose opportunities,
to perform in business (Medina,
fail to innovate and live in a
2008). There is a growing
risk-averse world where they
recognition that good mental
will steadily see themselves
health at work is a must, not a
and their organisations become
nice to have. This is not simply
obsolete. The challenge is to apply
altruistic, because of the upward
the embedded approach to risk
trend, mental ill health is a main
leadership in everyday life at all
cause of absenteeism. In fact,
levels of organisations so that
the growing recognition that
risk truly becomes opportunity
performance and engagement
and not just another compliance
can be affected by a worker’s
52 // SECURITY SOLUTIONS
050-053_SSM109 Business.indd 52
innovative and cutting-edge
LEADING RISK PROFESSIONALS KNOW THAT TO SUCCEED, BUSINESS AND CULTURAL CHANGE MUST BE VIEWED FROM A HUMAN PSYCHOLOGY PERSPECTIVE.
solutions in the risk, intelligence, safety, security, medical and emergency response sectors. Visit www.risk2solution.com for more information. Kate Down is a behavioural scientist and coach who specialises in social and emotional intelligence and rational thinking. Kate heads up Risk 2 Solution’s: People, Culture and Behavioural change division. She is an Associate Member of the Australian Psychological Society and a lecturer on ACU’s innovative Postgraduate Psychology of Risk program. n
securitysolutionsmagazine.com
21/08/2017 10:30 am
TR
OR
050-053_SSM109 Business.indd 53
HÉE D’ OP
21/08/2017 10:30 am
COVER STORY
C R S AVE TRUST N A I L A R T S U A
AS
SECURITY
CONCERNS
REACH DECADE HIGH BY JOHN KENDALL
At a time when the Australian public’s concern about security issues is at a decade high, John Kendall, director of the Border and National Security Program, Unisys, explores why concerns are so heightened and what organisations can do to restore consumer trust in their safety.
54 // SECURITY SOLUTIONS
054-059_SSM109 Cover Story.indd 54
securitysolutionsmagazine.com
21/08/2017 10:32 am
securitysolutionsmagazine.com
054-059_SSM109 Cover Story.indd 55
SECURITY SOLUTIONS // 55
21/08/2017 10:32 am
COVER STORY Security comes in many shapes
concerned about unauthorised
and forms, and an individual’s
access to, or misuse of, their
sense of security is complex and
personal information.
influenced by a wide range of
Perhaps this is not surprising
issues affecting the world. As the
when high-profile security
current environment grows even
breaches continue to make
more digitally interconnected,
headlines. It was just less than
a person’s online and physical
12 months ago that Australia
worlds continue to converge –
recorded its largest ever data
complicating an individual’s sense
breach when the Red Cross Blood
of vulnerability and safety.
Service lost over half a million
That sentiment is echoed in
personal and medical files. More
the findings from the 2017 Unisys
recently, the Department of
Security Index, which for over 10
Human Services requested an
years has measured the attitudes
investigation into reports that
of citizens around the world
Medicare card numbers are being
on a range of issues relating to
sold on the dark web.
national, personal, financial and internet security. Australians have typically had a fairly moderate level of concern when it comes to their security, which is why the 2017 findings of the Index are particularly interesting. The overall Security Index for Australia is 157 out of 300 (up from 106 recorded in the last survey, which took place in 2014) and is considered a serious level of concern. Despite constant headlines of war, terrorism and personal safety, it is concerns over identity theft, bank card fraud and
TO BE PREPARED FOR THE EVENT OF DATA BREACH, ORGANISATIONS MUST LEARN TO THINK AND BEHAVE LIKE THEY ARE ALREADY UNDER ATTACK.
computer viruses / unsolicited emails that reached a tipping
Most Australian organisations
point; causing Australians’
(90 percent) faced some form
concern for their security to
of cybersecurity compromise,
reach its highest level in a
whether attempted or successful,
decade. The findings strongly
during the 2015–16 financial year
suggest that Australians no longer
(Australian Cyber Security Centre).
believe that governments and
Instances of data loss have become
commercial organisations have
so prevalent that laws have been
the ability to protect them, and
introduced on how organisations
that there is work to be done by
must handle them. In February
all organisations to reassure the
2017, a mandatory data breach
public that they are on their side.
notification law was passed by the senate. Sitting back and
Personal Security
waiting for an attack is no longer
Since 2006, the top security
an option. Organisations must
concern for Australians has
be aware that security breaches
consistently related to identity
do not just impact their ability
theft. The 2017 Unisys Security
to deliver services. The negative
Index found 58 percent of
repercussions of a data breach can
Australians are extremely or very
change the way customers think
56 // SECURITY SOLUTIONS
054-059_SSM109 Cover Story.indd 56
securitysolutionsmagazine.com
21/08/2017 10:33 am
054-059_SSM109 Cover Story.indd 57
21/08/2017 10:33 am
COVER STORY about or trust the business. To
to minimise and contain the
be prepared for the event of data
impact on themselves and their
behaviour in real time to
breach, organisations must learn
customers. Such steps include
swiftly identify suspicious
to think and behave like they are
the use of microsegmentation
activity. This will limit
already under attack.
that hides resources from
exposure to loss and
Unisys recommends a five-step
• reactive: monitor transaction
mitigate future risk.
invasive scans and restricts
approach organisations can take
what parts of the system can
Ensuring all systems are working
to position themselves as a trusted
be accessed even if the ‘bad
in real time is the key to limiting
partner to consumers:
guys’ do get in.
risk and exposure. Self-learning
1. Educate – all too often it is
analytic technologies help banks to
humans who are the weak
Financial Security
actively monitor all transactions at
link in personal data security.
Ranking as the second biggest
all times and reassure customers
So, it is critical to educate
security concern for Australians
that they are in safe hands.
customers on the importance
since 2006, debit and credit card
of the basic steps they can
fraud continues to play heavily
Internet Security
take to protect their data. This
on the mind of Australians. The
Further findings from the Unisys
also provides an opportunity
findings reveal that 55 percent of
Security Index reveal that fears
to highlight what measures
Australians are extremely or very
regarding the safety of online
the organisation is taking to
concerned about other people
transactions and the threat of
protect sensitive information, a
obtaining or using their credit/debit
viruses have almost doubled
key way to build trust.
card details. According to figures
2. Analyse – organisations must
from the Australian Payments
understand their security
Clearing Association, Australians
posture. Know what threats
lost $521 million to credit card
and vulnerabilities exist
fraud in the 2016 financial year – a
within the current systems,
significant amount which has been
and address the security risks
increasing year-on-year.
before they become an issue. 3. Deter – prevention is the
For a financial services provider, there is more at stake
THE FINDINGS STRONGLY SUGGEST THAT AUSTRALIANS NO LONGER BELIEVE THAT GOVERNMENTS AND COMMERCIAL ORGANISATIONS HAVE THE ABILITY TO PROTECT THEM.
since 2014. The findings show that 54 percent of Australians are concerned about computer and Internet security (in relation to viruses, unsolicited emails or hacking), which has almost doubled (up from 28 percent) since the last Unisys Security Index in 2014 and now equals the level of concern about
first line of defence when
than just the loss of money.
facing an active cyber threat.
Reputational loss and disruption
Effective deterrence strategies
to the customer experience can
include strong and current
be equally as damaging for banks.
firewalls and anti-malware
From theft and fraud to money
software, timely installation of
laundering schemes, banks have
software updates and frequent
no option but to be firmly on high
changes to passwords.
alert for illegal activity that can
new malware scam, their fourth in
happen anytime, anywhere, as the
two months. The email scam was
quickly responding to cyber
evolution of technology continues
built so the ‘view bill’ button was
intrusions serves as the
to enable criminal activity to occur
a malicious link. It comes at the
second line of defence when
faster and easier than anticipated.
same time as the Australian Tax
facing an active cyber threat.
With multiple platforms, such as
Office fights a phone scam. It is not
Proactive monitoring using
ATMs, credit cards and mobile
just essential personal information
advanced data analytics can
apps that require protecting,
at risk either. Woolworths is
alert organisations to any
banks must make sure that the
currently investigating reports
suspicious activity that may be
solutions they have in place to
of its rewards cards being
a precursor to a cyberattack
detect, fight and protect customers
hacked and points stolen from
and automatically initiate
from financial crime are:
customers’ accounts using a
responses to potential threats.
• proactive: undertake risk
security vulnerability in the
4. Detect – monitoring and
5. Contain – even when
analysis to build transaction
war or terrorism. A further 51 percent are concerned about the security of online shopping and banking transactions. In the last month, Origin Energy customers were hit by a
Woolworths app. Cyberattacks are nothing
appropriate steps are taken
profiles. This will result in
to deter and detect cyber
fewer losses, reduce false
new and there will always be
intrusions, organisations
positives and improve early
criminals out there who want to
must assume that a breach is
detection rates in advance of
take advantage of people, but the
inevitable and must take steps
fraudulent attacks.
growing sophistication of hackers,
58 // SECURITY SOLUTIONS
054-059_SSM109 Cover Story.indd 58
securitysolutionsmagazine.com
21/08/2017 10:33 am
behaviour and knowing what to do when an incident does occur. These days, more police departments have apps and online social channels that Australians can access, which can help them have a direct line to emergency support.
Improving Security and Restoring Consumer Trust Reputation loss is not easily quantifiable, but is likely to erode future business opportunities. In today’s fast-paced and unforgiving business environment, there is no shortage of other operators waiting to collect disenchanted customers in the wake of a controversial security breach. The reputation and brand image of a business is a key corporate asset and when the balance of trust is compromised it remains to be seen whether this confidence can be fully restored. Transparency helps to build trust and organisations need to not only implement security measures, they need to be seen combined with the increase
will reinforce authority and
from the Unisys Security Index
taking such measures to build
in the number of high-profile
demonstrate an organisation’s
show that concerns have risen by
public confidence.
cyberattacks, such as WannaCry
desire to protect.
22 percent since 2014, possibly
and Petya, has highlighted
• Transparency – As the world
It is critical that organisations
driven by increased terror events
operating in Australia, both those
how vulnerable the online and
continues its shift towards a
in Europe and on home soil, such
in the commercial and public
digital world can be.
digital economy, one of the
as the Lindt Café siege in Sydney.
sector, understand what security
Consumer trust has become
growing trends is to push more
The London Metropolitan
issues concern their customers
increasingly fragile and there is
government and business
Police’s quick response to recent
and citizens most in order to
work to be done by organisations
services online. By increasing
London terror attacks was
address them, build upon them
who must be proactive in their
their digital services, criminals
to implement the ‘Run, Hide,
and then maintain public trust.
approach to security. There are
have more opportunities
Tell’ advice. These practical
two things organisations can do
to target customers.
instructions gave Londoners
to get on the front foot for online
Organisations must not only
guidance on how to behave
the Border and National Security
consumer security:
take the appropriate measures
during a terror attack. Even more
Program for the global public
• Education – Educate
to protect their internal
recently, Australia’s domestic
sector practice at Unisys. His
customers on the importance
systems from cyberattacks, but
and international airports have
particular area of focus is the
of taking basic steps to
they should be transparent
intensified security screenings
national security sector, helping
protect their digital world. It
with consumers about
following the thwarted terror plot
public sector organisations
is easy for customers to get
what has occurred.
in Sydney to blow up an airplane.
leverage innovative technologies
caught up in the convenience
As war and terrorism
John Kendall is the director of
such as biometrics, real-time
of new technologies;
National Security
continues to dominate the news
analytics and mobility to
however, reminding them
Concerns around national
agenda, it is important to let
provide secure and cost-effective
to be vigilant about any
security remain top-of-mind
Australians know that they too
services to their citizens and
suspicious online behaviour
for many Australians. Findings
can help by reporting suspicious
business communities. n
securitysolutionsmagazine.com
054-059_SSM109 Cover Story.indd 59
SECURITY SOLUTIONS // 59
21/08/2017 10:33 am
LEGAL Q&A
WORKPLACE HEALTH AND SAFETY IN THE SECURITY INDUSTRY: DO YOU KNOW YOUR DUTIES?
BY ANNA RICHARDS
The main legislation which
to far wider duties in so far as
an offence and/or being liable to
governs what duties employers
their duties will require them to
pay for compensation for any loss
owe and what duties contractors
contemplate all of the different
or damage suffered by the person
3.1 the hazard of the risk; and
and employees owe in relation to
workplace locations that might be
to whom the duty was owed.
3.2 ways of eliminating the risk
workplace safety is set out in the
relevant to their business.
4. the availability and suitability
knows, or ought reasonably to know, about:
or minimising the risk; and
(Commonwealth) (referred to as
employ security guards to assist
What are the Main Duties of Care?
“the Act” in this article).
in a waterfront dispute, then the
Definition Of The Duty To
workplace may be a wharf or dock
Manage Risks
Purpose of the Act
or even a ship – it could be as far
There is a general duty of care
risk and the available ways of
One of the main purposes of the
reaching as your personnel decide
imposed on persons to ensure
eliminating or minimising the
Act is obviously to eliminate as
to venture in the execution of their
health and safety. The Act states
risk, the cost associated with
far as possible, and otherwise
duties, providing they have not
that a duty imposed on a person to
available ways of eliminating
to minimise as far as possible,
gone against your instructions.
ensure health and safety requires
or minimising the risk,
the person:
including whether the cost is
1. to eliminate risks to health and
grossly disproportionate to
Work Health and Safety Act 2011
For instance, if you were to
risks to anyone who is present at a workplace.
Definition of “Workplace”
Definition of a “Worker” One of the classes of people to which certain duties of care
safety, so far as is reasonably practicable; and 2. if it is not practicable to
of ways to eliminate or minimise the risk; and 5. after assessing the extent of the
the risk. So, what does all of this mean for you? It means that you are
What exactly is the definition of a
are owed are “workers”. Who
eliminate those risks, to
required to assess what risks
“workplace” you might ask. The
is a “worker”? The Act once
minimise those risks so far as
workers and others may be
definition is wide ranging and
again defines “workers” very
reasonably practicable.
exposed to at a workplace and to
refers to virtually any place where
broadly. The definition includes
work is carried out for a business
an employee, a contractor or
and includes any place where
subcontractor, an employee of
a worker goes or is likely to be
take reasonable steps to prevent them occurring, as far as is
a contractor or subcontractor,
Definition of Reasonably Practicable
whilst at work. It even includes
an employee of a labour hire
It is common and reasonable
knowledge of the areas concerned
a vehicle, vessel, aircraft or
company who has been assigned
for people to ask what does
which may pose such risks, then
other mobile structure, amongst
to work in the business, an
“reasonably practicable” mean.
you should engage a person or
other things.
outworker, an apprentice or
The Act defines it as what was
body to provide an assessment of
trainee, even a student gaining
reasonably able to be done in
the risks and any strategies for
this rather vast definition of
work experience and a volunteer,
relation to ensuring health and
managing them.
“workplace” is due to the fact
amongst others.
safety, taking into account and
The point of outlining
that security services can cross
reasonably possible. If you don’t have enough
As an example, if you required
weighing up all relevant matters,
security personnel to ensure that unauthorised people do not enter
What is a Duty of Care?
including the following:
earth, as opposed to a number of other industries where the
Duty of care refers to the duties a
The relevant matters
not be required to provide those
workplace is often confined
person owes another person and
1. the likelihood of the hazard or
security staff with an armoured
to an office. This very broad
which, if breached, may expose
application of the meaning of
the person who owes the duty
“workplace” means that security
to certain repercussions, such as
industry personnel are exposed
being fined, being found guilty of
into virtually any location on this
60 // SECURITY SOLUTIONS
060-061_Legal Q and A.indd 60
a building, you would clearly
the risk concerned occurring;
vehicle to travel to and from
2. the degree of harm that might
work! Obviously, the cost of
result from the hazard or risk; 3. what the person concerned
doing so would be prohibitive in view of the small risk of them
securitysolutionsmagazine.com
21/08/2017 10:33 am
being shot at! The test is one of
security officer is required to
education and strategies that you
under the heading “The definition
‘reasonableness’.
carry a firearm but his employer
employ to minimise or eradicate
of reasonably practicable” in
has failed to provide adequate, or
such risks, including the times
this article. You should also
claims that you might have
any, training. That security then
and dates that you have done
keep very clear and legible hard
breached this duty, you should
discharges a firearm into a crowd
so. These pieces of evidence can
copy records of all the ways
make enquiries of those people
in order to stop an intruder but
obviously be used to assist you
in which you have discharged
with knowledge (conduct due
ends up injuring an occupant of
with establishing that you did in
your duties including keeping
diligence) in your specific area of
the bank.
fact discharge your duty of care.
all manuals, policies as well as
To assist in warding off any
concern (if you are not an expert).
This duty goes even beyond
any covering emails or letters under which they were sent to
requires a person conducting a
Duties Owed by Workers
have undertaken. You should also
business to do the following:
Luckily, it is not all a one-way
keep written or hard copy notes
record in writing your justification
1. provide and maintain a work
street. Workers also have to take
of any discussions that you have
for your belief that any training
environment without risks to
care in any action that they take
had with workers on issues
and or equipment you have
health and safety;
whilst being engaged in work for
relating to health and safety,
a business.
including the dates that the notes
Further, you should keep hard
what is outlined above. It also
copy records of any research you
provided to your personnel is adequate to eliminate or at least minimise any risk to their safety and health or the safety and health of others.
2. provide and maintain safe plant and equipment; 3. provide and maintain safe systems of work; 4. ensure the safe use, handling and storage of plant, structures
Primary Duty of Care The primary duty of care is
and substances; 5. provide adequate facilities for
The Act requires that whilst at
workers. Further, you should
were taken and full details of who
work, a worker must:
else was present as a witness at
1. take reasonable care for his or
the time that you provided the
her own health and safety; and 2. take reasonable care that his or
information. All of these pieces of evidence will help to establish
her acts or omissions (failing to
whether or not you discharged
do something) do not adversely
your duty of care in regard to health and safety.
that a person conducting a
the welfare at work of workers
affect the health and safety of
business must ensure, so far as
in carrying out work for the
other persons; and
is reasonably practicable, the
business, including ensuring
health and safety of workers
access to such facilities;
3. comply, so far as the worker
Anna Richards is the Legal
is reasonably able, with
Director and principal lawyer
engaged, or caused to be engaged,
6. provide any information,
any reasonable instruction
from Victorian Legal Solutions
by the person and workers whose
training, instruction or
that is given by the person
Pty Ltd and practices in the areas
activities in carrying out work,
supervision that is necessary
conducting the business to
of Commercial law including
are influenced or directed by the
to protect all persons from
allow the person to comply
Commercial litigation and
person while the workers are at
risks to their health and safety
with the Act; and
other areas. Anna Richards and
work in the business. (Say that
arising from work carried out
4. co-operate with any
Victorian Legal Solutions can be
three times quickly.)
as part of the business; and
Also, the person must extend
7. ensure that the health of
reasonable policy or procedure
contacted on (03) 9872 4381 or
of the person conducting the
0419 229 142.
this duty to other persons. What
workers and the conditions at
business relating to health and
does this mean? Put simply, it
the workplace are monitored
safety at the workplace that
taken to ensure its accuracy, the
means that if you have employed
for the purpose of preventing
has been notified to workers.
information contained in this
or contracted a worker to work
illness or injury to workers
In summary, everyone is
article is intended to be used as
at a workplace, then you must
arising from the conduct of
required to take care. The best
a general guide only and should
take care to not expose anyone
the business.
course of action is “overkill” in
not be interpreted to take as
Whilst every effort has been
else who might be present at that
In essence, this means that those
so far as it is better to be seen
being specific advice, legal or
workplace (even if he or she is not
people engaging others must
as having overdone the creation
otherwise. The reader should
a “worker”) to any such risk to his
consider the risks; take action
of procedures and policies
seek professional advice from a
or her safety or health.
to minimise or eliminate those
and providing equipment that
suitably qualified practitioner
risks; and constantly review
minimises or eliminates risks to
before relying upon any of the
contractors to provide security
the situation. In these days of
health and safety. However, it
information contained herein.
services to a bank, then you must
fast evolving technology, it is
is often prohibitive from a cost
This article and the opinions
take steps to train and equip
imperative to continue to review
position to do so. The next best
contained in it represent the
the contractor to minimise or
whether you are providing
step is to take action that you
opinions of the author and do not
eliminate him or his actions (for
a safe workplace. To protect
believe, within your reasonable
necessarily represent the views
instance, directing others) from
yourself, you should keep hard
capabilities, discharges your
or opinions of Interactive Media
harming the safety and health
copy records of all steps that you
duties taking into account the
Solutions Pty Ltd or any advertiser
of anyone present at the bank.
take to do so as well as copies of
factors referred to under the sub
or other contributor to Security
An example might be where a
all manuals, policies, means of
heading “The relevant matters”
Solutions Magazine. n
For instance, if you engage
securitysolutionsmagazine.com
060-061_Legal Q and A.indd 61
SECURITY SOLUTIONS // 61
21/08/2017 10:33 am
FEATURE
62 // SECURITY SOLUTIONS
062-065_SSM109 Article 2.indd 62
securitysolutionsmagazine.com
21/08/2017 10:34 am
FIXING SECURITY RISK MANAGEMENT Focus on the Threat Actor BY DAVID HARDING
G
overnment and
Institute of Criminology, the US
private industry
State Department, and this author
place enormous
have identified the limitations
emphasis on the
that situational crime prevention
concept of Risk Management and
and security risk treatment
Security Risk Management. In an
options have when applied
article published in Security
against a Threat Actor. These
Solutions Magazine in November
studies have also identified that
2016, it was identified how
a focus and assessment of the
dangerous and ineffective this
Threat Actor’s intentions to harm
concept actually is. It was shown
may allow for the refinement of
that in areas where the concepts
management options that can be
of Risk Management and Security
directed towards reducing the
Risk Management were
risk of attack, or lowering the
implemented, crime rates
incidence of criminal attacks.
actually increased. Such a
varying methodologies that seek
rethink into the effectiveness of
to identify and assess a Threat
the concept, especially when
Actor’s intentions, and their
applied against an actor with
capabilities to carry out those
intent to harm, hereafter called a
intentions. The article will also
Threat Actor.
outline varying management
Studies conducted by the
securitysolutionsmagazine.com
062-065_SSM109 Article 2.indd 63
This article will outline
significant trend requires a
strategies and methodologies that
United States Secret Service,
can be used to provide resources
American Psychological
that can reduce the risk and
Association, the Australian
incidence of criminal attack.
SECURITY SOLUTIONS // 63
21/08/2017 10:34 am
FEATURE
CRIMINAL THREAT MANAGEMENT HAS BEEN DEVELOPED FOR USE WITHIN THE PROTECTIVE SECURITY ENVIRONMENT
Definitions
Risk is different to threat.
of each segment and the whole
Virginia Student Threat
is determined.
Assessment guidelines, the United
So as to avoid confusion, it
Risk, according to ISO 31000:2009
is important to understand
Risk Management-Principle
that risk and threat are two
and guidelines, can be defined
and capabilities; risk focuses on
the Australian Standards
separate concepts. Both
as the effect of occurrences
likelihood and effect. A Threat
Handbook HB167:2006, and
concepts require two separate
on objectives. Risk is normally
Assessment requires behavioural,
Criminal Threat Management.
and different assessment tools
calculated by determining the
psychological, cultural and
and methodologies.
likelihood of a specific event and
intelligence assessment tools.
Association’s Virginia Student
Threat is defined as the
Threat focuses on intentions
States Secret Service guidelines,
The American Psychological
the effect that that event could
A Risk Assessment requires
Threat Assessment Guidelines
intention to harm. A Threat
have. The process of assessing
statistical, consequence,
have been developed to assist
Assessment determines an actor’s
Risk commences with identifying
historical assessment tools. The
in the identification and
intentions and the ability to carry
the varying occurrences that
two concepts should not be
management of school children
out those intentions. The first
could happen. The next step
intermingled.
who may have developed
stage of a Threat Assessment
includes analysing the varying
includes identifying and gathering
components, such as likelihood
The Threat Assessment
assessment process commences
specific information regarding
of the event based on previous
Several methodologies can be
when a student is identified as
the Threat Actor. Analysis is then
data, and the financial, personal
utilised that focus on a Threat
having intentions and behaviours
carried out on such components as
etc effects and outcomes, should
Actor’s intentions and capabilities.
to harm other students. Then, a
the actor’s intentions, capabilities,
the identified event occur. Finally,
These include the American
seven-step model is applied. This
and background history.
an evaluation of the significance
Psychological Association’s
model includes an interview with
64 // SECURITY SOLUTIONS
062-065_SSM109 Article 2.indd 64
intentions to harm others. The
securitysolutionsmagazine.com
21/08/2017 10:34 am
on such areas as the individual’s
Threat Management
cases this may mean the removal
motivations and goals, that
The aim of a Threat Assessment is
of the target, or the physical
individual’s communication with
to provide decision-makers with
control and management of the
others regarding their intentions,
the information that can allow for
Threat Actor.
previous deviant and mental
the development of management
history, interests and capabilities in
plans to prevent the incidence of
Threat Management model,
attack methodologies.
As outlined in the Criminal
crime, or for the Threat Actor’s
measures can be put in place that
In Australia, the Australian
intentions to find fulfilment.
will allow for the changing of the
Standards Handbook HB167:2006
Whichever method is
deviant belief system that the
Security Risk Management
selected, at the completion of the
Threat Actor has been identified
specifically mentions the inherent
process, the assessment should
with. Counter-arguments to the
issue of the actor with an intention
identify who has an intention to
deviant belief can also provide
to harm within the Protective
harm, and what type of harm is
preventative opportunities
Security Sphere. The Handbook
intended. What capabilities the
and finally, should all else fail,
then redefines a threat as being
group or person has. And when
neutralising the Threat Actor
‘anything that has the potential to
the Threat Actor will carry out
through law enforcement
prevent or hinder the achievement
their intentions, should they not
intercession, prior to the Threat
of objectives or disrupt the
encounter interference, and what
Actor’s attack, can provide
processes that support them’. It
methods the actor could use to
opportunities to prevent crime.
then identifies potential harmful
carry out their intentions.
events, and the effect the event
From the above assessment,
This article has outlined several methodologies that can
could have on the achievement
decision-makers can utilise
be used to assess a Threat Actor’s
of objectives. The assessment
available resources to manage
intentions and capabilities. Each
focuses on geographical influence,
the Threat Actor. Some options
methodology aims to assess the
threat source, threat targeting and
could include the provision of
information gained and provide
threat type.
alternative avenues of social and
decision-makers with additional
economic assistance to provide
knowledge and understanding
has been developed for use
persons the opportunity to achieve
of the Threat Actor. Such an
within the protective security
their goals without the need to
understanding can better align
environment. It primarily focuses
harm others. This could include
and manage resources allocated
on the asymmetric Threat Actor
the provision of funds to allow for
to prevent the incidence of
and utilises an assessment
the purchase of necessities rather
harm being actioned by the
methodology that allows the
that acquiring those necessities
Threat Actor.
organisation to identify those
through criminal means.
Criminal Threat Management
persons with an intention to harm
Alternatively, situational crime
David Harding is an
the subject. Then, a distinction
it. This model commences with the
prevention measures, or security
internationally experienced
between a transient threat
identification of the communities
risk treatment measures could
Threat Management consultant
(minor) and substantive threat
that the organisation is located
be implemented to prevent the
and advisor. He is a Research
(significant) is made. A response
within, and those communities that
opportunity that a Threat Actor
Associate with the Australian
is then developed, which includes
come into the organisation. The
has to carry out their intentions.
Security Research Centre (ASRC)
conducting and implementing a
model then focuses on identifying
These options, once refined
and has researched and written
safety plan.
those persons or groups from
through the development of an
about security, asymmetric and
within each community that may
appropriate Threat Assessment
non-state security threats. David
has conducted considerable
have beliefs that could lead persons
methodology, have the potential to
runs master classes throughout
research into assessing those
to harm the organisation. Once
achieve more beneficial and cost
Australia. Those people interested
persons who may wish to harm
a Threat Actor’s intentions have
effective outcomes than otherwise
in attending should visit the
either US government officials,
been identified, an assessment
may have been possible.
Australian Security Research
such as the US President, or
of the Threat Actor’s intelligence
US government facilities. The
gathering capabilities, the Threat
operations may indicate that
and information.
Secret Service utilise the input
Actor’s view of the vulnerability of
the Threat Actor has developed
You can also connect with David at:
of local law enforcement bodies
the target is conducted. In addition,
sufficiently along the Criminal
• criminalthreatmanagement.com
to identify a person of interest.
a counter-surveillance operation
Development Pathway to allow
• facebook.com/
The Secret Service then focus
is conducted to determine
law enforcement to intercede
its Protective Intelligence and
the immediacy of the Threat
and neutralise the Threat Actor’s
Threat Assessment Investigation
Actor’s intentions.
intentions or capabilities. In some
The United States Secret Service
securitysolutionsmagazine.com
062-065_SSM109 Article 2.indd 65
In addition, investigative
Centre at asrc.com.au for dates
winningstrategytactics • smashwords.com/profile/view/ davidjrharding n
SECURITY SOLUTIONS // 65
21/08/2017 10:34 am
LOSS PREVENTION
KEEPING PACE WITH THE GLOBAL RETAIL SUPPLY CHAIN - PART II
66 // SECURITY SOLUTIONS
066-069_SSM109 Loss Prevention Pt 2.indd 66
securitysolutionsmagazine.com
21/08/2017 4:40 pm
BY JAC BRITTAIN
The role of loss prevention across the retail supply chain has grown considerably in recent years. Part one of this article in the previous issue of Security Solutions Magazine introduced readers to supply chain management and began the discussion on points of potential risk to the supply chain. Jac Brittain continues the discussion in the final of this two-part article.
In-Transit Methods
rig stops, several individuals will
training programs that provide
of the larger facilities managing
For decades, members of
forcibly break into the cargo area
necessary and appropriate
the inventory for several hundred
organised groups have stolen full
and off-load as much product as
information to employees at every
stores in a single location,” said
and partial shipments and/or
they can. This is also a common
step along the way.
one industry expert. “Teams must
loaded trucks while they were in
technique used when employee
transit. These incidents can occur
vehicles are used to transport
Distribution Centres
freight at all times throughout the
in a number of different ways. For
valuable goods, such as jewellery,
Distribution centres are often
product cycle, to include accurate
example, many hijacking incidents
from one store to another.
viewed as the foundation of the
receiving protocols, proper storage
retail supply chain network,
of the freight in its designated
occur while a driver is away from
Deception is another common
ensure the accountability of the
the truck, such as at dinner or on
method. Thieves may tamper
establishing a centralised location
location, cycle counting, and
a break, and thieves simply break
with trailer/carton seals and/or
from which retailers can stock
order pulling and shipping of
into the vehicle and drive off with
locks in order to conceal trailer
and distribute products to the
merchandise to the correct
the goods. In other instances,
break-ins, or tamper directly with
stores or directly to customers.
location.”
hijackers will target a vehicle and
the container or trailer to commit
While designs and functions
forcibly enter the cab while the
these thefts. Leakage incidents
may be similar, each facility
in moving boxes from one site
driver is in the vehicle. Freeway
may involve the theft of entire
is also unique based on the
to another. This is about product
on- and off-ramps, rest stops and
cartons, or removing desired
organisation, the types of
flow and speed to market, driving
other common stopping points are
product from within a carton and
products and the special needs
replenishment, maximising sales
particularly dangerous.
resealing the packaging to attempt
of the business. These complex
and maintaining quality customer
Another common method is
to conceal the theft. ORC groups
operations can house volumes
service while minimising losses,
to coerce the driver into making
have even used individuals who
of merchandise, equipment,
damage and theft of goods. All
an unplanned stop by having
present themselves as legitimate
supplies and employees in order
of this requires cutting-edge
someone gain the driver’s
drivers at shipping facilities, using
to meet and maintain primary
loss prevention management,
attention while he is driving. This
counterfeit paperwork or even
business objectives.
with progressive programs that
individual may falsely inform the
electronic shipment information
driver that something is wrong
in order to gain access to and
a project-specific, labour-intensive
and supply chain management
with his vehicle or may use other
make off with valuable loads.
venture, the actual mission of the
strategies and design. Every
persuasive tactics to convince the
Effective, well-planned
distribution centre operation is
function, process and practice
While often viewed as simply
This is not simply an exercise
build on modern technologies
driver to stop the vehicle. Once the
strategies must be developed,
strategic and tactically calculated.
must be continuously re-
driver pulls over and the vehicle
combining the latest
Coordinating the concurrent
evaluated to help control costs and
stops, accomplices arrive to steal
advancements in technology
needs of the stores, customers,
maximise efficiency.
the rig.
with industry best practices,
suppliers, buyers, inventory
robust security procedures and
control, transportation systems
a retailer may purchase and sell
organised retail crime (ORC)
fundamental loss prevention
and other services and service
tens of thousands of products.
groups targeting trucks or
methodologies. Such practices
providers is a formidable
Goods typically arrive in bulk
containers loaded with high-tech
would include enhanced
task to keep product moving
and are stored in the distribution
and high-value merchandise is the
awareness efforts, improved
efficiently and contributing to a
centre until needed by the retail
‘grab and run’. Often travelling
response, advanced information
company’s profits.
location. Products are then
in vans or similar vehicles, they
and communication management,
follow a targeted vehicle, waiting
safety practices, employee
can house thousands of SKUs
shipments before being forwarded
for the vehicle to stop. Once the
screening programs, and robust
[stock keeping units], with some
to stores or directly to customers.
A technique favoured by
securitysolutionsmagazine.com
066-069_SSM109 Loss Prevention Pt 2.indd 67
“Today’s distribution centre
Depending on the company,
retrieved and assembled into
SECURITY SOLUTIONS // 67
21/08/2017 4:40 pm
LOSS PREVENTION Throughout every stage of the
away from the dock. With
Establishing a Culture
place the roles of loss prevention
process, there are opportunities
attention focused on labour and
The retail supply chain network
in the stores and in the retail
for loss.
speed, employee interest can be
demands control to drive
supply chain in very different
diverted, leading to enhanced
efficiency and productivity.
buckets. However, closer
risks and greater opportunity.
Setting the tone early and
inspection definitely puts things
often by maintaining direction
into a different perspective, as
The efficient processing of goods through the distribution centre plays an essential role in
The possible infiltration of
the business operation. Every
associates by organised criminal
and enforcing rules sends an
these roles are often much more
facility must be designed to
groups is also a threat within the
important message and helps
similar than they are different. I
provide for the safest, fastest,
distribution centre environment.
establish a culture of safety,
would encourage each of you to
most secure, most efficient
Perpetrators may gain access
control and honesty. This is why
pause for a moment and reflect
and cost-effective control and
through temporary agencies
the fundamental aspects of loss
on some of your dealings with
movement of retail products,
when services are needed,
prevention provide such an
your fellow loss prevention peers
and loss prevention efforts
such as during peak selling
important barometer of program
who work in the supply chain. If
must complement the process.
seasons. Employees with ORC
success. Failure to control basic
you haven’t already done so, take
Vulnerabilities extend well
ties may simply hire into the
support functions is an indicator
some time and get to learn more
beyond basic physical security
company in order to gain access
of greater opportunities, which in
about this aspect of the business.
measures and access controls,
to merchandise, information
turn can significantly influence
If possible, look for opportunities
and the same proactive,
and opportunity. Existing
the scale of involvement
to do some cross-training in these
cooperative insights that have
employees may be recruited by
throughout the entire network.
partner departments. Make the
helped to build success in other
ORC operations to participate in
areas of the business must
illicit activities. Individuals who
policies that serve to establish
horizons. These lessons will go a
be shown.
hired in with honest intentions
workable controls is an important
long way in building relationships
may also observe and exploit
step, but this must be coupled
and adding value to your
opportunity, and make poor life
with appropriate resources to
organisation and your future.”
decisions as a result.
support the control measures
Distribution Centre Risks Identifying the potential source
While the direct theft of
Creating and implementing
effort to expand your professional
For some, this may open
as necessary, to include
the doors of opportunity that
of theft risks within a distribution
merchandise is an ongoing
adequate attention and staffing.
lie within the supply chain for
facility is typically not hard to
concern, the theft or disclosure
Programs must be regularly
growth and development. For
determine. Access to the facility
of information can be just as
reviewed and monitored to
others, it may serve as a simple
is managed. Activities within
problematic. Shipment and
ensure effectiveness, efficiency,
reminder of a side of the business
the facility are controlled. In
product information, seals
relevance and application.
that does not always hold their
the stores, there is public access
and seal sequences, delivery
Most importantly, this must
full attention. For all retailers,
to the building. However, this
schedules, truck routes and other
have the support of all levels
it should serve as a notice that
is clearly not the case in the
relevant information can be
of management, to include
the role of loss prevention
distribution centre environment.
divulged to assist with hijackings
implementation, maintenance,
is expanding and they have
In plain terms, the most likely
and similar operations. Blank
enforcement and resolution.
a definitive responsibility to
way for theft activity to be
forms may be pilfered to create
successful in distribution centres
fraudulent documents. Alarm
knowledge, awareness and
is if employees are involved.
information, CCTV placement,
education regarding the entire
internal layouts, rosters,
retail supply chain network must
is editorial director, digital for LP
opportunities for losses in the
schedules and shift changes,
be improved. Programs such as
Magazine. He has worked in the
distribution centre involve
and other important operational
the supply chain course within
loss prevention industry for over
collusion between multiple
information may be shared or
the LPC certification coursework
30 years and was instrumental in
parties – especially between
exposed. Additional actions may
provide a tremendous resource;
the development of the industry’s
drivers and the employees
include intentionally damaging
however, retailers must also
only internationally sanctioned
that load and unload trailers.
or blocking CCTV or other
open more effective channels
LP credentials – the LPQualified
Merchandise within the
security equipment, removing
of communication with subject-
(LPQ) and LPCertified (LPC)
distribution centre is at its
batteries from alarmed doors,
matter experts, especially those
courses in collaboration with
greatest risk when trucks are
leaving outside doors or security
within their own organisations,
the Loss Prevention Foundation.
being loaded and unloaded,
enclosures opened or unlocked,
to gain a more comprehensive
Jacque can be contacted via email
which is a timeframe that
purposeful distractions, or simply
understanding of this critical
jacb@Ipportal.com
is particularly chaotic, with
looking the other way. Any and all
aspect of the retail business.
individuals largely concerned
opportunities may be exploited
with emptying or filling the
depending on the complexity and
industry leader, “Within our
the website of the US-based Loss
trailer and getting the truck
motivations of those involved.
industry, there is a tendency to
Prevention Magazine. n
Often, the greatest
68 // SECURITY SOLUTIONS
066-069_SSM109 Loss Prevention Pt 2.indd 68
Finally, as an industry,
As emphasised by one
keep pace. Jacque (Jac) Brittain, LPC
This article first appeared on losspreventionmedia.com,
securitysolutionsmagazine.com
21/08/2017 4:40 pm
LIKE US ON FACEBOOK facebook.com/ssmaust
066-069_SSM109 Loss Prevention Pt 2.indd 69
21/08/2017 4:40 pm
FEATURE
THE
SHAPE THINGS TO
OF
COME
BY JOHN BIGELOW
There should be little doubt that security technology is evolving at a rapid rate. One need only look at the depth and range of new solutions on display at this year’s Security Conference and Exhibition, held at the International Conventional Centre in Darling Harbour Sydney in late July. One area that seems to be experiencing significant change is that of access control. The introduction of newer and more effective biometrics, mobile access and data analytics has seen a myriad of interesting products emerge. In order to better understand where the industry is heading, we spoke with Serra Luck, Vice President, End-User and Consultant Business for HID Global, a global leader in in trusted identity solutions.
70 // SECURITY SOLUTIONS
070-073_SSM109 Article 3 B.indd 70
securitysolutionsmagazine.com
21/08/2017 3:05 pm
securitysolutionsmagazine.com
070-073_SSM109 Article 3 B.indd 71
SECURITY SOLUTIONS // 71
21/08/2017 3:06 pm
FEATURE John Bigelow: From the point of
from its traditional business
efficient, and again, more user-
view of HID and access control,
model involving reader controllers
friendly for security staff and
there have obviously been some
installed on site, requiring the use
facility owners while enabling
significant changes in the last
of a card, to a cloud based model
better risk management.
few years. What is HID’s vision
which enabled users to issue a
for access control? Where
virtual identity in a matter of
focusing on is data analytics.
do you see the market going,
seconds to a person’s smartphone
If we can better understand
and why?
which that person is then able to
the data that we capture, then
use just like a traditional access
we know that we can help our
on powering trusted identities.
card. That is a completely new
customers make better decisions
We know and we’re thankful
concept for the end-user, and it
based on understanding when
that millions of users are using
introduced new economies of
service demands peak within a
HID every day for physical and
scale as well as new level of user
building, where and when greater
digital access around the world.
convenience, without hampering
investment and action might be
We also have more than two
the trusted identity use in security.
required, how the building is
Serra Luck: At HID, we focus
Another area that HID is
billion things that are identified,
As a natural extension to
verified and connected with HID
this, HID is now moving ahead
security is. With this knowledge,
technology around the world. We
with more innovations - location
we are able to use data analytics
have a large and trusted install
services being the latest. We’re
to make better decisions for
base in education, critical national
very happy with the growth we are
the tenants.
infrastructure, healthcare, utilities,
seeing in location-based services
transportation and financial
in the Asia region especially.
information and services to the
services. I think it’s important to
HID acquired a company called
cloud brings different challenges
mention that we work with some
Bluvision at the end of December
of the most innovative companies
2016, and through this acquisition,
around the world. That is quite
we are bringing an array of other
important for us because it means
services to the end-users who what
we need to innovate to remain
to be able to do more with the
attractive to the installers and
access control infrastructure in
systems integrators that we are
the security space to help improve
serving today.
operational efficiencies.
In the few last years, we have
For example, location services
being utilised and what the role of
And finally, moving
HID GLOBAL POWERS THE TRUSTED IDENTITIES OF THE WORLD’S PEOPLE, PLACES AND THINGS.
that we, as a company, are tackling from a data security point of view. This is yet another example of why trusted identities are extremely important. Moving service to the cloud can provide companies with a significant advantage as they are able to reduce their total cost of ownership for specific services.
seen a lot of changes happening
will enable people to know at a
in the access control market that
glance things like which rooms are
some of the services they currently
are reflected in the evolution of
currently available for a meeting,
maintain on site up to the cloud.
HID as a business. We are seeing
or how to get to a meeting. This
Examples include mobile access,
the emergence of trends such
sort of functionality allows
expansion of services to the
as artificial intelligence and the
building owners, facility managers
cloud, changing the operational
Internet of Things connected
and enterprise security managers
model and or getting into location
to smart buildings. We see a
to optimise the use of the building.
services. The more services we
growth in robotics and changes in
Also, connected to this, if you know
can offer around that security
demographics happening around
where people are going, where the
and safety model, the better the
the world, so we are very much
meetings are happening, then you
experience for users.
aware of the macro-trends that are
can steer the use of heat, lightning
impacting the global workplace as
and other services around those
John Bigelow: In 2014, HID
well as the security industry.
needs. Good service, better user
introduced mobile access
experience, and of course there’s
which, at the time was seen
customers are able to do many
lot of energy efficiency that
as a significant disruption to
things they were not able to do
comes from knowing this sort of
the traditional access control
only a few years ago. Take, for
information.
market. At this year’s Security
This is exciting because our
example, the introduction of
Connected to that, we also
This is achieved by removing
Conference and Exhibition,
mobile access back in 2014. That
envision that if, during an
we saw HID launch Location
was a turning point for HID and
emergency, you are able to
Services, but you’ve also spoken
the broader access control market.
determine where people are in
at this event about things
HID, as a business, began to move
your building, it is much more
like artificial intelligence, the
72 // SECURITY SOLUTIONS
070-073_SSM109 Article 3 B.indd 72
securitysolutionsmagazine.com
21/08/2017 3:06 pm
I THINK WE WILL ALSO SEE A MOVE FROM THE TRADITIONAL CAPITAL EXPENDITURE MODEL FOR ACCESS TO CONTROL MORE OF AN OPERATIONAL EXPENDITURE MODEL.
securitysolutionsmagazine.com
070-073_SSM109 Article 3 B.indd 73
Internet of Things, and robotics.
How do you make this convergence
and don’t necessarily all possess
What do you envision the next
seamless for the user?
the same capabilities. We have
major disruption will be for the access control market?
also seen in corporations that John Bigelow: So between mobile
some staff have a corporate phone
access, biometrics and data
capable of being enabled with
not new in the traditional IT space,
analytics, is HID moving away
mobile access technology, while
it is definitely an area that is still
from traditional physical access
other staff don’t. We also see sites
new to traditional physical access
control measure such as cards in
where employees and contractors
control security. However, making
favour of virtual credentials?
work side-by-side along with
services like those available in the
Serra Luck: With mobile
IT space available on the cloud for
access, we have already brought
visits, in this scenario, how do you
physical security is something that
the idea of using a virtual
manage the technology when only
takes time but it is an area HID are
credential. Our mobile access
some people have mobile access
putting a lot of effort into.
products are being used in 58
capable devices. To that end, we
different countries, with more than
believe physical access card and
move from the traditional capital
130 different phones supporting
virtual credentials will continue
expenditure model for access to
mobile access at present. However,
to reside next to each other for
control more of an operational
we believe that cards, readers,
some time to come. However, with
expenditure model. This will mean
and controllers will continue to
the launch of our HID Location
that companies do not necessarily
be a significant part of both our
Services, virtual credentials and
have to pay upfront to fit out an
business and the industry for many
mobile access are areas they we
entire building but rather, can
years to come. I say this because
expect to see significant growth in
manage expenses through a user
when we work with our large
across the access control industry
pays type of system. Combine with
corporate clients; we see time and
in the next few years.
this will be a challenge around how
again, how different mobile phones
we combine the trusted identity in
bring differing complexities to
about HID Location Services:
IT space with the trusted identity in
access control because the devices
https://www.youtube.com/
the physical access control space.
are manufactured by a third party
watch?v=sZjdJdro2TI n
Serra Luck: While the Cloud is
I think we will also see a
people who come for temporary
To understand more
SECURITY SOLUTIONS // 73
21/08/2017 3:06 pm
AVIATION
ASK THE QUE S
74 // SECURITY SOLUTIONS
074-077_SSM109 Aviation.indd 74
securitysolutionsmagazine.com
21/08/2017 4:47 pm
E STION FIRST BY STEVE LAWSON
I was going to write an article
is old and not fit for purpose’;
the equipment. What is done if
about the new US rules on the
“the number of casual employees
someone arrives with a prohibited
carriage of electronics. That idea
should be reduced on the airside”;
item in his bag? Where is it put
was overtaken by the arrests in
“we should present ID to travel
while the person is at work?
Sydney in relation to a suspected
domestically”; “catering is a hole”;
Should people be stopped taking
attack on Australian aviation.
“there should be screening onto
anything onto the airside? What
As such, I will write about the
the airside”; or “there should be
about vehicles? Then the question
electronics ban in a later article.
more training” and on and on.
I really like: how do I stop people
I am always amazed that
securitysolutionsmagazine.com
074-077_SSM109 Aviation.indd 75
Take the comment that people
just throwing something over
after any major incident, and for
should be screened onto the
the airside boundary fence
Australia this is a major incident,
airside. Do not get me wrong, I
for someone to pick up after
there is so much information
think people should be screened
airside screening?
put out to the media by so many
onto the airside. I would like them
Throwaway lines are easy,
people pushing their own agenda.
screened off the airside as well as
implementing effective measures,
I have heard comments like
a theft prevention measure, but it
not so much.
“screening should be taken out
is easier said than done. There are
of the private sector and given to
infrastructure issues associated
from one person who said that
the government”; “the equipment
with that decision, not simply
the explosive detection equipment
My favourite comment was
SECURITY SOLUTIONS // 75
21/08/2017 4:47 pm
AVIATION used in Australia does not detect
fluid used to carry contact lenses
be, “How do the Australian
they become private charters!
tri-acetone tri-peroxide (TATP).
– a medical device.
screeners measure up against
I can use a Boeing 737 or even
other overseas organisations?”
an A380 in that category. How
That is just plain wrong. The
Is it time for a new look at
equipment here is mostly ion
aviation security? Yes, aviation
My understanding is that our
about I put a weight restriction on
mobility spectrometry (IMS)
security is a moving feast and
screeners are up there with
the aircraft? Guess what, that is
equipment, the majority of which
it should be looked at all the
the best.
already done!
can detect TATP – I say majority
time, but without the blinkers
because some time ago I looked
of agendas and with a modicum
commentary about introducing
but I really get fed up with the
at one model and at that time I
of common sense. There is
security to regional airports.
media and talking heads just
was not sure how it could detect
no reason for implementing
One commentator said, with a
using throwaway lines and
TATP, but it was in the process of
a process unless it provides a
straight face, that he travelled
then running with those lines
being upgraded. I have not seen
security outcome.
to Sydney from a regional
as if they have the answer to
airport with “hundreds” of other
aviation security.
that particular machine being
Everyone is providing a
Then I hear media
I am not trying to be difficult,
used during my travels around
solution when the first question
passengers on the same aircraft
Australia, so I feel happy saying
that should always be asked is,
and no security checks. Reality
really do not know and for me
the majority. The same person
“What is the threat?” Identifying
check! Aircraft over 20,000kg
that is a big confession. What I
talked about bypassing liquids,
the threat is to a large extent
are screened and the number
do know is that security is like
aerosols and gels screening
the role of government and
of passengers on aircraft under
any other business decision; the
(LAGs) and ‘mixing’ TATP on
that information should, where
that weight is in the tens not
market needs to be identified
board the aircraft. I think that
possible, be passed to industry,
hundreds. Really, it is about
first or the problem needs to
is possible, but hardly feasible.
not least because industry must
50 passengers.
be defined. Do not provide
TATP is extremely volatile and
make long-term purchasing
the solution and then ask
the perpetrator would most likely
decisions. Information is shared
the question.
end up blowing up the toilet and
as specific threats are known
becoming a smelly corpse while
and government will say they do
mixing the TATP, as opposed to
pass on strategic information,
destroying the whole aircraft.
but I would suggest, not from my
Destroying an aircraft with an
experience but from talking to
improvised explosive device
those who should know, that the
(IED) in the cabin relies to a large
information is so ‘cleansed’ as to
extent on placing the IED in the
be useless for long-term decisions.
best location and, contrary to
Once the threat is identified,
the popular media, aircraft are
the second question should
really strong.
then be, “Is what we are doing
I will let readers in on a
sufficient to counter the threat?”
‘secret’ – a single person can
Throwaway lines like the
carry any number of 100ml
“equipment is 15 years behind
containers in a one-litre plastic
Europe and the US” mean nothing
sealable bag onto the aircraft.
on their own. A better question is,
That is, at most, a person can
“What am I trying to find and is
have a little under one litre of
the equipment able to find it?”
liquids, aerosols and gels in his
Should screening be moved
or her possession. The rules do
WHAT I DO KNOW IS THAT SECURITY IS LIKE ANY OTHER BUSINESS DECISION; THE MARKET NEEDS TO BE IDENTIFIED FIRST OR THE PROBLEM NEEDS TO BE DEFINED.
So, what should be done? I
In this instance, I go back to the questions I included earlier in this article: 1. What is the threat? 2. What do we do to effectively counter that threat? Steve Lawson has over 20 years’ experience in aviation security. As a security executive with Qantas, Steve held a number of senior management roles covering all aspects of aviation security from policy development to airport operations. He was sent to New York immediately following the 9/11 attacks to manage the
Again, ask the question and do
Qantas response and undertook
not provide the solution before
a similar role following the 2002
from the terminal operator to a
doing so. Is there a need to screen
Bali Bombings. On his return
not say that the LAGs in those
government organisation? That
all passenger aircraft irrespective
to Australia, he was appointed
containers must be different,
may be a reasonable result and
of the number of passengers?
Security Manager Freight for the
just under 100ml per container.
I think workable, but it is not
Be very, very careful before
Qantas Group. Since 2007 he has
The explosive in Oplan Bojinka
necessarily the answer. Look at
answering that question, as a
been a Director of AvSec Consulting
(which is the classic example
the issues with the Transportation
commercial passenger aircraft
in partnership with Bill Dent, a
for building an explosive on an
Security Administration (TSA)
could have as few as two or three
fellow former Qantas security
aircraft) was nowhere near one
in the US! How does one stop
passengers! Is that going to be
executive. AvSec has recently
litre, so it could have been carried
a government organisation
screened? How about if passenger
evolved outside of just aviation
through a screening point under
turning into a bureaucracy
screening is restricted to what are
security and is now operating as
the current rules; in any case, it
that does not consider the
known as regular public transport
Paradym. Steve can be contacted
would likely be exempt since it
needs of the travelling public?
(RPT) flights? Not a problem – I
via email stephen.lawson@
was reportedly disguised as the
Again, the question should
will modify my operations so that
paradym.co or on 0404 685 103. n
76 // SECURITY SOLUTIONS
074-077_SSM109 Aviation.indd 76
securitysolutionsmagazine.com
21/08/2017 4:47 pm
For more information, please contact
Jeff Park on 0424 185 880
074-077_SSM109 Aviation.indd 77
21/08/2017 4:47 pm
ACCESS CONTROL
IS A NEW THREAT
EMERGING FOR
AC C E S S CONTROL BRANDS? BY JIM DEARING
Is the Rise of PIAM a Threat to Access Control Equipment Manufacturers?
(IAM) system. This means the
Could PIAM be a Threat to Suppliers?
across an enterprise installation –
system is able to deploy identities (cardholders) and credentials
The projected high growth of
of credentials and active directory
(cards) as well as assign access
PIAM is potentially alarming,
integration. The catch is that the
Physical Identity Access
rights into one or more vendor-
as a PIAM system’s capacity
enterprise has to exclusively adopt
Management (PIAM) systems
independent physical access
to link together and manage
that supplier’s brand.
essentially add a decision-
control systems.
multiple brands of access
making identity management
According to new research
layer on top of access control systems. This is done by
for example, central management
Because PIAM makes it
control hardware essentially
easy to control multiple brands
from IHS Markit, global PIAM
undermines the allure of some
of equipment across a single
market revenues, excluding Asia
large manufacturers’ offerings.
installation, it also makes it easier
changing the authoritative
Pacific and Africa, amounted
One of the unique selling points
for the end-user to change the
decision-making database or
to just $136 million in 2016.
that large multinational access
access control equipment over
location to a higher authority
However, this is forecast to
control suppliers tout is the fact
time by using the PIAM to ease the
like an active directory or an
grow rapidly to nearly $500
that they can offer some of the
transition. Historically, suppliers
identity and access management
million by 2021.
functionality of a PIAM system
have always fought extremely
78 // SECURITY SOLUTIONS
078-081_SSM109 Access Control.indd 78
securitysolutionsmagazine.com
21/08/2017 10:41 am
securitysolutionsmagazine.com
078-081_SSM109 Access Control.indd 79
SECURITY SOLUTIONS // 79
21/08/2017 10:41 am
ACCESS CONTROL hard for ‘greenfield projects’.
budgets large enough to afford
maintenance needs. This means
with the company is compromised.
The first access control brand
implementing such a system.
there is a cost involved for the
As a result, IT departments want to
entire lifecycle that the system
be assured that PIAM systems are
is in place. These costs, and the
completely devoid of cybersecurity
easiest way to expand that system
Barriers to Wider Adoption
lengthy implementation process,
vulnerabilities. On the other hand,
later was to buy the same brand
There are still a number of
present a huge barrier to adoption
physical security managers want
again. PIAM software, however,
barriers that PIAM providers
in smaller projects.
to be assured that the building’s
potentially eliminates this
must overcome before true mass-
advantage for manufacturers.
market adoption occurs. After all,
system implementation factors
following a simple network hack,
just two percent of all commercial
continue to stifle adoption.
or that their system is rendered
What could Happen as Adoption of PIAM Grows?
access control projects included
Installing and servicing PIAM
unusable due to a distributed
some form of PIAM system
software requires a high level of
denial of service (DDoS) attack.
in 2016. First and foremost,
collaboration and communication
If the adoption of PIAM systems
complexity remains the bane of
between the enterprise’s physical
continues to grow as expected,
PIAM system implementation.
security and IT departments.
larger suppliers may begin to see
Early adopters often have a clear
Historically, these two
Opportunity for Physical Access Control Suppliers
their grip on high-value projects
picture of what they would like
departments tend to disagree on
Despite these barriers and the
from the transportation, corporate
the system to do. The problems
where the equilibrium lies for
threat of increased competition,
enterprise and utilities sectors
arise when they start to realise
the conventional security versus
PIAM also presents a huge
weaken – especially considering
that their pre-existing physical
convenience balancing act that
opportunity for suppliers of
that these high-value projects
and logical security infrastructure
every company faces. Working
physical access control systems.
seem to be the earliest adopters
is not able to meet their own
on a PIAM system together is
The addition of logical integration
of PIAM. For example, IHS Markit
requirements. This usually comes
often no different.
adds a variety of unique selling
estimates that the number of
in one of two forms: access
transportation sector access
control hardware limitations or
security systems poses a variety
control system offering, allowing
control projects that include
weaknesses in their corporate
of potential vulnerabilities
the supplier to become more
some form of PIAM system will
governance and workflows. Both
on both sides of the equation.
competitive. Additionally, if a
quadruple during the next five
result in delays to PIAM system
Connecting every access control
large number of suppliers add
years. End-users from these
implementation.
system to the IT network and then
some form of logical integration
also managing all the identities
to their offerings, it may help
deployed had a huge advantage over the competition because the
industries are increasingly seeing
Due to their complexity, PIAM
Even for larger projects, other
Integrating logical and physical
perimeter is not left vulnerable
points to a standard access
the benefits of being able to
solutions currently require large
associated with the company via
to slow market adoption of full
automate credential management
commissioning and design efforts,
one system creates huge network
PIAM systems. It is unlikely that a
and comply with legislation.
not only initially but also post-
risk. If the system is hacked,
particularly cost-sensitive end-user
Additionally, they possess
implementation due to system
suddenly every identity associated
would opt for a bespoke solution when they are already getting some
PIAM vs Physical Access Control World (excluding Asia and Africa) revenues for 2016 and 2021 and growth forecast for 2017
level of logical integration from the physical security manufacturer. Furthermore, a traditional supplier that fully commits to developing its logical integration capabilities may be also able to provide a true off-the-shelf solution. This would be more affordable than the current PIAM systems on the market and would have the potential to drive greater adoption in small- and mediumsized enterprise projects. For more information, refer to the IHS Markit Physical Identity
PIAM
PIAM Growth
Access Control
Access Control Growth
Electronic Locks
Electronic Locks Growth
Notes: 1) The physical identity access management (PIAM) market size includes revenues from services, software and software maintenance 2) The access control market size includes revenues from equipment (readers, cards and controllers) and software. 3) The electronic lock market size includes revenues from equipment (mechatronic, electromechanical and digital cylinders) only 4) The final set of columns in the chart are the forecasted growth rates for each market in 2017. Source: IHS Markit © 2017
80 // SECURITY SOLUTIONS
078-081_SSM109 Access Control.indd 80
Access Management – 2017 report. Jim Dearing is a senior analyst, access control and fire, for IHS Markit. n
securitysolutionsmagazine.com
21/08/2017 10:41 am
KeyWatcher is a reliable and extremely easy to use electronic key management system, designed to prevent mismanaged, misplaced, or stolen keys. KeyWatcher eliminates outdated metal boxes, unreliable manual logs and messy key identification tags utilising a computerised storage cabinet. The system releases keys only to the individuals with correct authorisation, recording each user transaction and providing total system accountability.
KEYWATCHER SYSTEM OFFERS l Up to 14,400 keys and 10,000 user per site l “Site” concept uses a common database l Numerous high level interfaces for access control, contractor management and vehicle fleet systems l Longer user IDs can be up to any 6 digits, plus a 4 digit PIN l Bright 7” full colour, touch screen l “Key Anywhere” allows keys to be returned to any KeyWatcher Touch within a site l On-screen guides for users, along with voice commands
Available in Australia through: AST Pty Ltd T: +61 2 8020 5555 | M: +61 417 089 608 | F: +61 2 9624 7194 E: di@astpl.com.au | www.astpl.com.au
078-081_SSM109 Access Control.indd 81
21/08/2017 10:41 am
FEATURE
82 // SECURITY SOLUTIONS
082-089_SSM109 Article 4.indd 82
securitysolutionsmagazine.com
21/08/2017 4:52 pm
CONFRONTING
AN ISIS EMIR ICSVE’s Breaking The ISIS Brand Counter-Narrative Videos BY ANNE SPECKHARD AND ARDIAN SHAJKOVCI
Most experts agree that the most
ideology before turning away
models. Often, they are not easily
he takes his seat. Abu Islam’s
successful counter-messaging
and infiltrating a Canadian
accessible and reachable.
dark, wavy hair, medium-length
campaigns against ISIS are
terrorist cell to help take it
the ones that use the voices of
In April 2017, we spoke to
curly beard and burning brown
down (Speckhard & Shaikh,
an ISIS emir (high in military
eyes are revealed. His eyes dart
insiders: the voices of ISIS victims
2015). Usama Hasan, a former
command) in a prison in
quickly around the room, taking
and ISIS cadres themselves who
radical Salafi extremist and
Sulaymaniyah, the Kurdistan
everyone in, focus briefly on me,
have first-hand knowledge of
mujahidin in the Afghan jihad
region of Iraq.
burn momentarily into mine and
the group’s brutality, corruption,
against the country’s communist
religious manipulation and
government in the early 90s, is
and wearing a black mask over
waits to begin. They know each
deception. The International
another example of someone
his face, Abu Islam is brought
other. Alaz has already repeatedly
Center for the Study of Violent
who has turned against Salafi-
into the faux wood-panelled room
interrogated him.
Extremism (ICSVE) has spent
jihadi ideology and is dedicated
of the Special Forces Security
the last two years interviewing
to fighting violent extremism
compound in Sulaymaniyah, Iraq.
Islam has been heavily hunted for
ISIS defectors, ISIS prisoners
in the United Kingdom (www.
His hands are cuffed and feet
two years by the Peshmerga forces
and returnees from the Syrian
quilliaminternational.com).
shackled together.
who credit him with running
and the Iraq conflict in Western
Using formers is rife with
Dressed in an orange jumpsuit
There are five of us in the
then dart back again to Alaz as he
Only in his mid-twenties, Abu
a network of cells of suicide
Europe, Turkey, Iraq, Central Asia
problems, however. Those
room: myself, Ardian, Alice
bombers, sending some as young
and the Balkans. Their stories
returned from ISIS were often
(a Kurdish handler) and our
as 12 to explode themselves in
are captured on video and edited
psychologically unhealthy before
Peshmerga interpreter, Alaz. I am
suicide missions. He is credited
down to short clips, interspersed
they joined and are deeply
seated at the front corner of the
with either directly or indirectly
with actual ISIS video footage and
traumatised upon their return.
desk with my laptop unfolded.
organising attacks that killed
pictures, illustrating their stories
Some do not want to speak about
Ardian is seated to my side. Alice
over 250 victims, although some
to turn back against ISIS.
their experiences, while others
and our interpreter sit behind
of the high-ranking Peshmerga
fear retribution from ISIS if they
the desk. Alaz takes the hooded
counterterrorism officials we
terrorism is a well-established
speak out against the group. Some
Abu Islam from the prison
spoke to believe that number to
practice. Mubin Shaikh is a
of them fear further prosecution
guards and guides him gently to
be at 500. “He’s a guy we chased
good example of someone who
and social stigma. Others are
the centre chair in front of the
for more than two years,” stated
nearly joined Al Qaeda and
unstable, reverse their positions
desk next to me, where he gently
the head of Kurdistan’s Zanyari
imbibed deeply of the jihadist
frequently, or are not good role
lifts the mask from his face as
intelligence service in a recent
Using formers to talk back to
securitysolutionsmagazine.com
082-089_SSM109 Article 4.indd 83
SECURITY SOLUTIONS // 83
21/08/2017 4:52 pm
FEATURE interview with journalist Robin
came to Iraq and established their
Wright (2017). “To pick him up
Islamic State.
and realise that we finally got
“I got into the brotherhood at
him, it was a big catch for us,”
the mosque,” Abu Islam explains.
he explained.
“They were against Islamic State,
Born as Mazan Nazhan
but for me I saw that the Islamic
Ahmed al-Obeidi, Abu Islam is
State was living by shariah law.
the second oldest in his family.
They were throwing homosexual
He is the oldest male and has
people from high buildings. If you
eight siblings. His father served
steal, they cut your hand. They are
in Saddam’s army. He describes
really living it.”
his childhood as both “safe” and
When asked where he saw
“nice”. Growing up in the oil-rich
this, Abu Islam answers, “It was
area of Kirkuk, Iraq, Abu Islam
on social media, YouTube. It
first finished high school and then
made sense for me. I watched
pursued university studies in
a lot of their videos.” As we
shariah (Islamic law) at the local
listen to him speak, we become
university. With only one year left
aware of ISIS’s powerful online
to go before graduation, in 2014
presence and online propaganda
Abu Islam abruptly left his studies
machine that recruits youth via
to join the so-called Islamic State.
the Internet here in Iraq as well.
“I wasn’t Salafi growing up,”
Even in Iraq, ISIS propaganda
Abu Islam explains. The legs of his
videos reached a university
orange jumpsuit are rolled up to
student, persuading him of their
mid-calf – Salafi style – to match
righteousness, “I was convinced
the dress worn by the Companions
and made up my mind.”
also bypassed military training
and teach them. I moved from
since they needed shariah
place to place to give shariah
also. They had a territory twice
teachers to train the others. “They
lessons,” Abu Islam explains.
in university when I read the book
the size of Great Britain. At the
didn’t teach me weapons. In the
“It was mostly fiqh [principles
Tawhid by Wahhab. It convinced
time I joined, I was 22 or 23. A lot
beginning, they asked me if I knew
and understanding of Islamic
me,” he adds.
of my relatives were in the area
how to use an AK, and of course,
practices]. How to pray properly.
Abu Islam is referring to
they [ISIS] took over, and some of
I did.” The knowledge of assault
How to fast. How to help other
Kitab at-Tawhid (The Book of the
my cousins and family members
rifles is common among Iraqis,
Muslims, how to pay zakat
Unity of God) by Muhammad ibn
were already in [ISIS]. It was easy
notes our Peshmerga interpreter.
[obligatory charity] and about the
Abd al-Wahhab, an 18th century
to join. I got a recommendation,”
“I gave lessons in shariah.”
Saudi religious reformer who
Abu Islam explains, referring to
This is how Abu Islam initially
worked to purify Islam by turning
the ISIS practice of trusting their
describes his role in the
interviewed in our ISIS Defectors
back to following the original
potential recruits based on the
Islamic State.
Interview Project described their
practices of the Prophet and his
recommendation of another ISIS
Companions. The violent followers
member. “They knew I don’t drink
there are not large camps for
charismatics” and were heartened
of Wahhab, including Al Qaeda
or smoke and that I’m a shariah
the Cubs of the Caliphate in Iraq,
by learning “true Islam” from
and ISIS, interpret his teachings
student. That made my CV look
where hundreds of youth are
them (Speckhard & Yayla, 2016). I
to justify killing those who do not
really good,” he explains while
gathered, trained and taught to
ask if the Iraqis already knew their
follow their strict interpretation
smiling enthusiastically.
fight – with some being trained
religion or were also gladdened
and prepared to become suicide
by these teachings. His answer,
of the Prophet Muhammed. He is
“They were on the streets
also bearded. “I got that mentality
of Islam. ISIS, and groups like
“I didn’t take shariah training,”
Compared to Syria, it appears
Islamic State.” In Syria, ISIS defectors
shariah trainers as “shining
them, practise Takfir – that is, an
Abu Islam answers proudly when
bombers – after they graduate
“They didn’t know the right way.
extreme extension of Wahhabi-
asked about ISIS’s known practice
(Ibid). In Iraq, it seems the Cubs
We taught them the right ways.
Salafi doctrine that sanctions
of putting new recruits through
are gathered into smaller groups.
We talked about what it could
violence against both Muslims and
two weeks of shariah training
Individuals like Abu Islam
[Islamic State] be. Hopefully, we’ll
non-Muslims who are deemed as
to learn the basics of Islam as
appear to serve as their itinerate
expand our territory. According
infidels (non-believers). This is the
they preach it and to take on
preachers, travelling from one
to our beliefs, we can’t say we are
type of Islam and ideology that
their ‘hear and obey’ philosophy
group to another.
definitely doing it. Instead, we say,
Abu Islam had already embraced
(Speckhard & Yayla, 2016). “I
in his university studies, thus
became the teacher because of my
five or six to seven [individuals].
expand our territory. Open the
he was ready for ISIS when they
background,” he continues. He
It depended. I’d go to the villages
walls. Take down Europe.”
84 // SECURITY SOLUTIONS
082-089_SSM109 Article 4.indd 84
“Sometimes there were four to
inshallah [by God’s will] we will
securitysolutionsmagazine.com
21/08/2017 4:52 pm
FP Ad
Pre-installed software ready to go ! SECURING YOUR BUSINESS HAS NEVER BEEN SO SIMPLE
Easy Installation
Mini-PC with AxTraxNG UltraLight
Pre configured cards
Flexible grow together with your business
The most advanced mainstream readers in the market. TRY THE NEW 2017 VERSION... • ALL THE FLEXIBILiTY YOU WANTED IN 13.65 MULTI CREDENTIAL CSN • CONFIGURATION CARD SUPPORT
• TWO NEW ANTI-VANDAL MODELS • NOW WITH NFC-ID CARDHOLDER APP FOR ANDROID OS
OFFICIAL DISTRIBUTOR
www.seadan.com.au TEL 1300-366-851 EMAIL seadan@seadan.com.au
FP Ad Template.indd 1 4.indd 85 082-089_SSM109 Article
23/06/2017 am 21/08/2017 11:47 4:52 pm
FEATURE question was asked and explains that ISIS never takes children into its ranks, “In Iraq, you have to be 18 to sign up for the Army. We
MOST EXPERTS AGREE THAT THE MOST SUCCESSFUL COUNTER-MESSAGING CAMPAIGNS AGAINST ISIS ARE THE ONES THAT USE THE VOICES OF INSIDERS: THE VOICES OF ISIS VICTIMS AND ISIS CADRES THEMSELVES WHO HAVE FIRST-HAND KNOWLEDGE OF THE GROUP’S BRUTALITY, CORRUPTION, RELIGIOUS MANIPULATION AND DECEPTION.
[ISIS] don’t have any age limit. Instead, we believe that when a man’s semen develops, then he’s considered a grown-up man. We only take them when they get to that point. They were never children. They were men.” Cynical about how he answered the question, I further probe, “How old were these men according to your criteria?” “A fully-grown man has to have his semen,” Abu Islam reiterates. “This is according to shariah.” The translator interjects by explaining that, according to Abu Islam’s definition, a young boy who begins with wet dreams is already
Abu Islam tells us that there
Picking them up and handling
die. All this I already know from
a man ready for battle and mature
were “young fighters from foreign
them gave each of us a chill down
our Syrian defector interviews
enough to sign his life over for a
places”, in his classes, but “they
the spine – touching the same
(Speckhard & Yayla, 2016).
‘martyrdom’ mission.
didn’t understand much Arabic”,
books ISIS cadres had handed out
which reminds us of an Albanian
to children under their control.
I interviewed in Kosovo who
The schools in the area
“We used to tell them,” Abu
While Abu Islam denies
Islam begins, but then quickly
there was any pressure in ISIS
detours into denial. “It was not
for children to become martyrs,
also recalled taking ISIS shariah
continued to run even when ISIS
my job exactly.” He hesitates and
we know from ISIS defector
training in Arabic – it all went
took over, Abu Islam explains,
then continues, “Study and learn
interviews that in the Syrian
over his head.
adding, “They used to study
your future. We want to expand
training camps youth are heavily
English. It was good for us,
our territories and put shariah
pressured into driving explosive-
just spoken at the Prime Minister’s
knowing English, but we denied
over the whole earth. Most of the
laden cars into enemy lines and
conference, Education in Iraq
books that we didn’t like. After a
time they came as volunteers,
lied to about the painfulness of
Post Daesh-ISIL Territory. The
while, we denied all the existing
self- motivated.” Remembering
their deaths – sometimes failing
conference brought together
books. We changed all the books
how the kids chose themselves
to even tell them their mission
both local and international
over to our mentality.”
as martyrs, he gains confidence
involves death. “There is an office.
again, “They have read the book.
If anyone volunteers… ‘I want to
We are in Iraq this trip having
experts to address the issue of
“How did you talk to the
the 250–500,000 youth that the
kids who are going on suicide
We make the way for them. We
my give my bayat [pledge]’ then
government of Iraq estimates lived
missions?” I ask, going back to
never told anyone they have to go.
he signs up for a martyrdom
and served under ISIS over the
his role as a shariah trainer.
It’s voluntary. It’s never forced. I
mission at the same time. It’s like
past three years in the Nineveh
“What did you teach them to
didn’t see anyone forced, ever.”
a regular recruiting process,” Abu
and the Mosul regions of Iraq.
persuade them to go on suicide
Universities were closed under
missions?” already knowing from
children to take martyrdom
ISIS. Libraries were burnt to the
our interviews with Syrian ISIS
missions – driving explosive-laden
training camps and how they
ground. Textbooks, even for the
defectors that ISIS leaders fill
cars or wearing vests into enemy
have a steady stream of explosive-
very young, were replaced by texts
the children’s minds with bright
lines or checkpoints – what did
rigged cars being made to put
that taught them how to behead
visions of paradise and promise
you teach them? How did you
the children in and send them to
and indoctrinated them from the
them they will feel no pain when
prepare them?” I ask, having
their deaths at checkpoints and
earliest of ages into Islamic State’s
they push the button to explode
already learned from Peshmerga
the front lines. “There is a training
barbarity and refusal to recognise
themselves – that they go instantly
counterterrorism officials that he
camp they take them to and teach
anyone else’s views as legitimate
to paradise. The faint-hearted ones
sent them as young as 12 years old
them how to set up and use these
but their own. At the conference,
are even offered a sedative and,
on suicide missions.
cars,” he explains. “It’s a regular
we viewed the exhibit of some
in many cases, the youngest do
of these captured ISIS textbooks.
not even realise they are about to
86 // SECURITY SOLUTIONS
082-089_SSM109 Article 4.indd 86
“So, when you prepared young
Abu Islam exudes disagreement with how the
Islam explains. He is further asked about the
camp they tell them…” he hesitates again. “The car manufacturing is
securitysolutionsmagazine.com
21/08/2017 4:52 pm
in a different place,” he detours. “But what do they tell these children?” I push. “They instruct them. They
“Both,” he answers. “They wear the belt in the car just in case one goes down,” he adds. “What are their instructions?”
“Were you scared?” I ask.
produced videos denouncing ISIS.
“Yes,” he admits. “I was scared.
I open my computer and ask if
Every human being is scared.” I ask Abu Islam about ISIS’s
he would be willing to watch the video of another ISIS cadre (a
know what will happen. They’re
I further ask. “Kill as many as
policy toward captured women,
defector) speaking on this subject.
happy. It’s like a kid on Christmas.
possible?”
a question that instantly grabs
I inform him that it is a short
You know how happy they are?
“Yes.”
his attention. He is in his element
video – only four minutes – and
Calmly happy, knowing something
“Any special conditions? What
spouting out shariah law on the
with his agreement, I begin to play
good is going to happen,” Abu
if there are women and children
rights of ISIS cadres with regards
it. Abu Islam watches intently as a
Islam explains as we realise he
at a checkpoint?” I probe.
to captured women. “It becomes
Syrian former ISIS cadre explains
a right,” he says, while looking
his horror and post-traumatic
an enemy. Everyone is a target,”
around the room in which three
stress after being the guard for 475
this?” I further ask, wondering
Abu Islam intones, but quickly
out of five in the room are women,
Yezidi, Shia and Sunni sex slaves,
exactly how they send a kid off to
adds, “In cities, we tell them to try
waving his arm to bring us all
including his role in organising
his horrific death.
avoid targeting the markets and
into his sweeping gesture. “If I
mass institutionalised rape.
civilians, and they have specific
dominate everything in this room,
list of serial numbers and names.
targets – military and government
then it becomes mine. I do as I
the pictures in the video taken
If I’m set to go next, then I’m next.
targets.”
want. It all becomes the property
from ISIS, taking in faces and
of the Islamic State,” he adds.
places he may recognise, just as
truly embraces this sickness. “Is there any ritual to go with
“They [the ISIS senders] have a
If something changes the order
“In the front line, everyone is
“And you?” I ask about his
Abu Islam’s eyes dart along
and they aren’t sent, they start
recent arrest in which he was
crying. If they are the next one,
wearing, but did not detonate, his
of listening to anything without
Huthaifa Azzam did when we
they actually cry and get angry,
suicide vest. “I didn’t sign up to
having much of a reaction during
showed him the same video. “He
and even complain, ‘My name is
be one. I did fight.” He goes on to
the interview, we felt suddenly
is an Iraqi speaking,” Abu Islam
set to go!’ I’ve seen this with my
say that he has fought in all three
sickened, imagining how close
comments. I tell him no, this is a
own eyes,” Abu Islam explains,
ISIS tactical military formations,
to Mosul we have been in the
Syrian, but he has got a similar
as his eyes appear to shine in
including in the very front line
past days – barely an hour’s
accent as he is from Deir ez-Zor.
admiration for their zeal.
where the fighters go in wearing
drive – and how this mindset has
The video plays as Ibn Ahmed
vests and martyr themselves
been a harsh reality for so many
(the ISIS defector in the video)
if overtaken, killing everyone
captured women, whether they be
paints a grim picture of rape
around them to avoid capture. He
Yazidis, Christians, Shia or Sunni
and horror for young captured
was never one of those cadres,
women alike.
women separated from their men
“What happens right before you go?” I ask again. “There is nothing special they do.” “Pray? Wash? Celebrate? Make
While we are usually capable
the Free Syrian Army (FSA) fighter
yet he states, “I always had my
Abu Islam denies that he
a video?” I press, as in the past I
suicide belt on. We jump into
had a sabaya (sex slave). He also
images of Yazidi and other women
have sat with relatives of bombers
the [Peshmerga] helicopters and
explains that very few Iraqis
abused by ISIS appear on the
who have seen the videos of their
explode ourselves. There is no
had them. He can think of only
video, Abu Islam’s gaze falls to
children wrapped up in explosive
surrender. No surrender. Just
one man in their area of ISIS,
the floor. Suddenly, he is silent
vests or jammed into explosive-
push the button.”
Dr Mahavia, who had one. This
and stunned to see his version of
is likely similar to the Syrian
his glorified ISIS described in this graphic manner.
laden vehicles, with some crying
“But you did surrender?” I
and others seemingly jubilant
press. “You wore the belt. Did
experience where married Iraqis
about going as martyrs.
you have it in your mind, when
who served from home are not
captured?”
seen by ISIS leadership as needing
“There is nothing special. They wash up to be clean. Everyone
“You didn’t have time to
to be supplied with a woman.
and children. As more horrifying
“How do you feel watching this video?” I gently ask. “I was against that idea,”
prays. Everyone says goodbye.
detonate or didn’t want to do it?”
Yet, we will hear next from an
he says. His voice appears flat
There are tears of joy. We make
inquires Alaz, our Peshmerga
unmarried Iraqi who took full
by what he has just viewed. “It
a video,” he admits, but again
translator, while explaining to us
sexual advantage of the enslaved
doesn’t matter. When I see this
adds a denial, which is possibly
how he never had the chance to
women held in this region of Iraq.
video… this is the outcome of this
self-protective given he is in prison
ask him this question and would
As we continue interviewing
and does not want to incriminate
like to know the answer as well.
himself. “I didn’t make the
“I didn’t want to die. I wanted
practice – this video. It’s not the
Abu Islam, though calm, I feel
proper way to turn you to Islam.
increasingly agitated and irritated
It’s not a good way to spread our
videos. I sent them to Kirkuk,”
to live, so I didn’t do it,” Abu Islam
at how he is able to justify the
beliefs.” Referring back to the
he explains.
states matter-of-factly, despite
brutal and inhumane practices
rapes, he adds, “Not everyone
“Do they receive a sedative?”
the fact that he has sent plenty of
of ISIS and offer arguments in
listens [to objections]. They
“No sedative, ever.”
others to do just that. “I wanted
support of their activities. Just
just go with it. There are more
“What’s the usual way to go?
to finish the project, spreading
before my next question, I decide
that like it [raping of captured
shariah,” he adds.
to show him one of our ICSVE-
women] than are against it.”
Car or belt?”
securitysolutionsmagazine.com
082-089_SSM109 Article 4.indd 87
SECURITY SOLUTIONS // 87
21/08/2017 4:52 pm
FEATURE “How about the beheadings?” I ask. “It was a law,” he answers. We cannot help but see discomfort in his face as he patiently awaits his next question. “Is it not the same thing? Does
again studying everything in it. At the end, the boy denounces ISIS, calling them kafirs (unbelievers) and infidels. “He [the boy] is calling you the kafir. How do you feel about that?” I ask after we view the clip.
it not also spread a negative view
“These are little kids. Do these
of Islam?” I further push.
children have their semen? Are
“I got convinced,” Abu Islam answers defensively. “How do you feel now?” “It’s not right,” he says gazing down at his hands, and adds, “We were wrong.” “Is there a way to get there
they men?” I challenge, feeling angry with his denials. Abu Islam is stunned into silence as he again begins to stare at the floor. “How do you make this right between you and Allah?” I ask
without all this violence?” I ask
softly, wondering if he will open
softly, knowing he harbours the
up more.
dream of spreading shariah and
“Allah will accept everything
AFTER BEING CHALLENGED WITH THE HARSH REALITIES OF ISIS AND OTHER ISIS CADRES DENOUNCING THE GROUP, HE ADMITS TO NOT KNOWING WHETHER ISIS WAS RIGHT.
and Bride of ISIS and coauthor
We have focus tested the
FBI, CNN, BBC, NPR, Fox News,
of ISIS Defectors: Inside Stories of the Terrorist Caliphate, Undercover Jihadi, and Warrior Princess. Anne has interviewed nearly 500 terrorists, their family members and supporters in various parts of the world, designed the psychological and Islamic challenge aspects of the Detainee Rehabilitation Program in Iraq to be applied to 20,000+ detainees and 800 juveniles and has consulted to NATO, OSCE, foreign governments and to the U.S. Senate and House, Departments of State, Defense, Justice, Homeland Security, Health and Human Services, the CIA,
making a utopian world where
– if you admit it,” he answers
Islam reigns above all else.
back, and continues to stare at
Breaking the ISIS Brand videos
MSNBC, CTV and in Time, The
the floor.
in the Balkans, Central Asia,
New York Times, The Washington
Western Europe and the Middle
Post, London Times and many
East, and overwhelmingly they
other publications.
“Yes, of course.” “Why did you sign up to violence?” I ask, although I know that the US and the US-led coalition security blunder in Iraq that led to the ousting of Saddam
“Did you make a mistake?” I ask. “Yes. We were mistaken,” are his last words. We end our interview. The
have hit their mark. No one
Ardian Shajkovci Ph.D. is
we spoke to questioned their
the Director of Research and a
authenticity or viewed the
Senior Research Fellow at the
Hussein’s senior military and
guards come into the room and
message as being wrong. Many
International Center for the Study
intelligence officials, coupled
Abu Islam’s black mask is once
are sobered by them, including
of Violent Extremism (ICSVE). He
with more than a decade of
again placed back over his face
the ISIS emir we discussed in
has been collecting interviews
sectarian killings, gave birth
as he lets them guide him blindly
this article.
with ISIS defectors and studying
to ISIS.
out of the room.
If readers want to support
their trajectories into and out of
Abu Islam is by no means
ISCVE’s Breaking the ISIS Brand –
terrorism as well as training key
time,” Abu Islam explains. “I got
rehabilitated from watching two
ISIS Defectors Counter-Narratives
stakeholders in law enforcement,
convinced,” he adds. He explains
counter-narrative videos. That
Project, please contact us at
intelligence, educators and
about how ISIS appeared as a
being said, capture, interrogation
info@ICSVE.org or donate on our
other professionals on the use
righteous and Islamic answer to
and imprisonment have all
webpage www.icsve.org
of counter-narrative messaging
sectarian power struggles and
begun to work on him. After
security issues, “I didn’t know it
being challenged with the harsh
was going to be that way.”
“I believed back in that
We ask Abu Islam if he is
materials produced by ICSVE both The names of participants
locally and internationally. He
realities of ISIS and other ISIS
other than the authors and Abu
has also been studying the use
cadres denouncing the group, he
Islam have been changed.
of children as violent actors by
willing to watch another ICSVE-
admits to not knowing whether
produced video. When he agrees,
ISIS was right. After all, joining
references, email info@
rehabilitate them. Ardian holds
we show him our four-minute
ISIS has not worked out that
interactivemediasolutions.com.au
a doctorate in Public Policy and
video clip of a 15-year-old
well for him. Arguably, once
Anne Speckhard Ph.D. is
Administration, with a focus on
Syrian boy describing his time
confronted with other former
Adjunct Associate Professor
Homeland Security Policy. He
in the Cubs of the Caliphate and
ISIS cadres telling the truth, he
of Psychiatry at Georgetown
also holds several professional
how the leaders sent children
is unable to keep up his false
University in the School of
certifications in the field of
as young as six years old in
bravado and unquestioned
Medicine and Director of the
homeland security, as well as
explosive-laden vehicles to their
beliefs in ISIS’s interpretation
International Center for the Study
a professional designation for
deaths – many having no idea
of shariah law. His arguments
of Violent Extremism (ICSVE)
his contributions to the field of
they were about to die. There
fall flat. He is backed into
where she heads the Breaking
homeland security and homeland
are pictures of children younger
submission, as evidenced through
the ISIS Brand – ISIS Defectors
security efforts in general. He is
than eight in the film. Abu Islam
his responses after watching
Interviews Project. She is the
also an Adjunct Professor teaching
watches this clip intently as well,
the videos.
author of Talking to Terrorists
counterterrorism courses. n
88 // SECURITY SOLUTIONS
082-089_SSM109 Article 4.indd 88
For a full list of
groups such as ISIS and how to
securitysolutionsmagazine.com
21/08/2017 4:52 pm
L P
NEW UniGuard+Real Time Guard Duress
RFID NFC
Long Range
Supports Bluetooth long range beacons
CALL FOR A FREE INFO PACK 1300 133366 Locally supported by DelTonic Pty Ltd – Po Box 359 Plumpton NSW 2761 – ABN 69 108 465 550 Phone 1300 133366 Email Sales@uniguard.com.au – Web: www.UniGuard.com.au
Follow us on Twitter twitter.com/secsolutionsmag
082-089_SSM109 Article 4.indd 89
23/08/2017 5:19 pm
FEATURE
GLOBAL
MARKET TO EXCEED $14 BILLION IN 2017, ACCORDING TO IHS MARKIT BY BLAKE KOZAK, PRINCIPAL ANALYST, IHS TECHNOLOGY
10 percent of households will be smart by 2025
Smart home device revenue will exceed $14 billion in 2017
The smart home market has seen
The global market for smart
significant growth since 2010,
home was worth $14.7 billion in
when fewer than 0.5 percent of
2017, with the Americas region
homes in the Americas region
representing 48 percent of
had connected devices such as
global revenues.
thermostats, lighting, security and
90 // SECURITY SOLUTIONS
090-093_IHS Markit Editorial.indd 90
In 2021, the EMEA region will
entertainment, according to the
represent the largest portion of
device database of the IHS Markit
device revenue with a 42 percent
smart home intelligence service. By
global share.
the end of 2017, nearly 7 percent of
When excluding large ticket
households in the region will have
items, such as major appliances, the
a connected home, averaging six
global market size for smart home
devices per home. Globally, in 2025,
devices is forecast to be worth $3.3
10 percent of households will be
billion by the end of 2017, reaching
smart homes.
$9.4 billion in 2021.
securitysolutionsmagazine.com
23/08/2017 3:30 pm
securitysolutionsmagazine.com
090-093_IHS Markit Editorial.indd 91
SECURITY SOLUTIONS // 91
21/08/2017 3:17 pm
FEATURE
Although the EMEA and
radiator valves were shipped
The top five players for unit
Americas regions are expected to
shipments in 2016 accounted
into Europe. By 2021, about
represent more than 70 percent
for 34 percent of global unit
75 percent of radiator valves
of revenues for smart devices
shipments and included Xiaomi,
will be shipped into Europe,
over the next five years, Asia is
Amazon, Honeywell, Nest and
expected to dominate in terms
Koninklijke Philips N.V.
of unit shipments. In 2021,
Globally, 19 manufacturers
the Asia region is expected to
had more than 500 thousand
represent about 46 percent of
annual smart home device
unit shipments. Leading the unit
shipments in 2016. 46
shipments in Asia in 2021 will
manufacturers had more than
include light bulbs, air quality
$10 million in revenue in 2016,
sensors and video cameras.
when excluding appliances.
Top five players account for 36 percent of revenue
Top products to watch
Nest, Amazon, Honeywell,
growth include radiator valves,
Xiaomi and Netgear rounded
air quality sensors, smart
out the top five for smart
speakers and appliances.
The top smart home devices to watch in terms of unit shipment
home revenue accounting
IN 2016, 90 PERCENT OF SMART RADIATOR VALVES WERE SHIPPED INTO EUROPE. BY 2021, ABOUT 75 PERCENT OF RADIATOR VALVES WILL BE SHIPPED INTO EUROPE
with Asia gaining traction, representing 24 percent of shipments in 2021. With the increased awareness of energy savings, radiator valves are expected to become part of smart home systems, especially in Germany and in other countries where district/ common heating is popular. Air quality sensors Air quality sensors are gaining traction across the three major regions but are mostly a device for the Asia region. In 2016, Asia represented about 64 percent
for 36 percent in 2016 when
Radiator valves
of air quality device shipments.
excluding appliances.
In 2016, 90 percent of smart
However, in 2021, the Asia region
92 // SECURITY SOLUTIONS
090-093_IHS Markit Editorial.indd 92
securitysolutionsmagazine.com
21/08/2017 3:17 pm
will represent 95 percent of the air
enhancement to in-home displays
that many appliances are already
WeMo switch not connected to
quality device market.
(IHDs) that will likely be placed
embedded with Wi-Fi capabilities
the network would be useless.
through the home.
that only need to be turned on by
As a result, many connected
the manufacturer.
appliances are not actually
Air quality sensors are devices that measure Volatile organic
Although smart speakers
compounds (VOCs) and Particulate
will remain the primary form-
Matter (PM2.5). There are only a
factor for voice assistants in the
manufacturers of appliances to
few device brands that measure
smart home, home audio is also
the smart home will be the data
VOCs and even fewer that
expected to gain traction. Several
that can be collected but this will
manufacturers need to make
measure PM2.5; however, the list
manufacturers and service
be a challenge for many because
the setup dead simple and
will continue to expand over the
providers are already integrating
most manufacturers are not well
need to educate the customer
next five years.
with leading speaker platforms to
placed to manage and service
on use cases in order to justify
bring audio into the smart home.
connected devices. For appliance
the process of connecting the
sensors available to the smart
This is significant because to-
manufacturers to be successful,
appliance to a network.
home market focus only on CO2,
date, the consumer smart home
partnerships will be critical,
air temperature and humidity.
has not included audio (speaker
especially for voice control
By 2021, IHS Markit expects
systems) in any format. Audio
because many appliances are not
Analyst for the Security
that more consumers will be
has been reserved for the ultra-
well suited for embedded voice
Technology Group at IHS. Blake is
purchasing air purifiers in
high-end automated households
activation or control.
responsible for all research across
addition to these sensors that
only but it is expected audio will
detect air quality, especially in
become more mainstream and
shipments, the quantity of
business models, platforms,
the major cities across Asia such
offered by service providers
appliances that are actually being
devices, consumer video and
as Beijing.
(telcos and security companies)
used with a mobile app remains
competitive analysis. Since joining
by 2021.
very small, despite many models
IHS in 2008, he has authored
and brands of appliances being
numerous syndicated reports and
were about 7 million smart
shipped with the feature option.
intelligence services on intruder
speakers shipped.
The reason for low percentage
alarms, electronic physical
of connected appliances actually
access control, Access Control
Currently, many air quality
Globally, there were about 1.1 million air quality sensors shipped in 2016.
Globally in 2016, there
Smart speakers
What will drive
In term of activations versus
connected to a network and the reason is it remains cumbersome. Overall, appliance
Blake Kozak is a Principal
the smart home which includes
Home audio (smart speakers)
Appliances
being used goes back to the
as a Service (ACaaS), perimeter
will continue to be one of the
Globally appliances were the
use cases and ease of setup.
security and residential security.
most disruptive trends in smart
fourth largest device type in
For most major appliances, a
Blake is also a regular speaker at
home through 2021. The primary
terms of unit shipments in 2016
refrigerator or dishwasher will
industry events.
reason voice assistants in the
but will be the most shipped
work without connectivity to the
smart home will gain significant
device type in 2021. The reason is
network. In comparison, a Belkin
For more information visit https://technology.ihs.com n
traction across all three regions is the ability for these devices to aggregate disparate systems. So instead of using five different mobile applications in order to control the smart home features, voice can be used to aggregate all control, reducing the need to interact with a mobile device once the product is setup. Voice reduces complexity by removing the need for additional hardware such as tablets and mobile phones, so anyone that can speak can potentially interact with the home. This is significant because, today, most smart home solutions sit in one app (usually an aggregator app) and one single device behind a passcode. This limits family interaction with the smart home system. Voice is an
securitysolutionsmagazine.com
090-093_IHS Markit Editorial.indd 93
SECURITY SOLUTIONS // 93
23/08/2017 3:34 pm
SECURITY STUFF C O N T E N T S
SPOTLIGHT Dahua
096
HID
098
Add-on
100
94 // SECURITY SOLUTIONS
094-095_SSM109 Security Stuff.indd 94
PROFILE
PRODUCT SHOWCASES
SHOP TALK
Hills Limited and Genetec
Amaryllo
108
Dahua
112
Dahua
109
Sektor
112
Boom Edam
109
STid
113
Salto
110
Hikvision
113
KeyLokrâ„¢
111
AMC Alarms
111
VIVOTEK and Genetec
102 104
securitysolutionsmagazine.com
21/08/2017 2:28 pm
securitysolutionsmagazine.com
094-095_SSM109 Security Stuff.indd 95
SECURITY SOLUTIONS // 95
21/08/2017 2:28 pm
SPOTLIGHT
DAHUA RETAIL SOLUTION
Dahua Retail Security Solution
Dahua Retail Security Solution
It calculates foot traffic at the
June 26, 2017 With the impact of a
Dahua Technology, a world leading
export of daily / monthly / yearly
rapidly developing
provider of intelligent video
reports, providing highly valuable
online shopping industry through
surveillance products and solutions,
data as a reference for future
PC and mobile devices, retail
launched the Dahua Retail Security
business decisions.
stores are facing great
Solution. Dahua Retail Security
challenges. In a fiercely
improves customer satisfaction,
The video feed and corresponding
competitive market, enlarging
secures the shopping environment,
POS information can be shown
the customer base and
and optimises business results –
simultaneously, both in the real-
maintaining their loyalty become
which keep OPEX low, enhance
time and in playback mode. Text
increasingly important and at the
store operating efficiency, and
search is supported to retrieve
same time – very difficult.
increase profits. The solution is
specific order and associated video
Improving customer satisfaction,
customised for you.
recording data.
transactions, ensuring a safe
Technical Highlights
series cameras provide up to a
environment, and reducing
People Counting & Height
140dB Wide Dynamic Range for
unnecessary loss have become a
Detection The 3D Camera
obtaining a crystal clear image
major focus of retail owners and
provides people counting and
even in high contrast, sunny
chain store companies.
height detection functionalities.
environments. Clearly monitor
H
ANGZHOU, CHINA /
096-101_SSM109 Product Spotlight.indd 96
POS (Point of Sale) Integration
Super WDR Dahua Ultra Smart
maximising per-customer
96 // SECURITY SOLUTIONS
store entrance, and supports the
securitysolutionsmagazine.com
21/08/2017 3:29 pm
store entrances under various
enabling them to manage and
conditions, day or night.
operate according to data like an
Heat Map Fisheye cameras
e-commerce storefront.
identifying the cause of problems. Store Room Starlight cameras
(Dahua Security Software), managers can view the latest store information
make sure your store room is under
and access video through mobile
provide Heat Map functionality for
Store Floor As a major area
careful surveillance 24 hours a day,
devices even when they are on
areas throughout the store, helping
center of the shopping experience
performing well under any lighting
business trips.
businesses analyse and adjust to
and customer traffic, the shelf area
conditions and greatly reducing the
customer traffic. A fisheye camera
tends to have differentiated visitor
probability of being robbed. Day
Summary
also can capture images around the
flow and requires great efforts
and night, starlight cameras provide
The Dahua Retail Security Solution
store floor.
in enacting security measures.
complete coverage of the store
provides more details without blind
Monitoring coverage contributes
room, preventing theft.
spots, ensuring the safety of your
Dewarping Modes Dewarping
employees, customers and property.
modes allow fisheye cameras
to reducing theft of customer
to capture a full view of the
property and retail goods, providing
application scenarios are mainly
It also helps provide valuable
stores. One fisheye camera has a
a reassuring shopping environment.
used to help retailers manage the
statistics to aid your future business
field of view equivalent to eight
Meanwhile, visitor flow data helps
store more efficiently with valuable
decisions. It is cost-effective,
standard cameras.
shopkeepers understand visitor flow
data. It utilises data processing
customisable, and cross-functional,
distribution so they can prolong the
to reduce time and labor cost,
and is an ideal solution for retail shop
suitable for narrow shopping aisles,
time of customer stay and visitor
and relies on a visualisation of
owners and chain store companies.
enabling minimal camera usage to
flow coverage by rearranging goods
various data to get an intuitive
With a mission of “Safer Society,
monitor the same area.
and shelves.
understanding of previous and
Smarter Living”, Dahua will continue
current status of the store as well as
to focus on “Innovation, Quality,
its future trend.
and Service” to serve partners and
Corridor Mode Corridor mode is
Checkout Counter Customer
Office DSS business analysis
Application Areas
disputes and salesperson fraud
Entrance Port People counting
occur frequently at the checkout
& Height Detection helps retail
counter. High-definition video,
time, with remote access to the
stores acquire customer flow data,
audio, and POS overlay can improve
management client in Dahua DSS
securitysolutionsmagazine.com
096-101_SSM109 Product Spotlight.indd 97
Remote Access At the same
customers around the world. Visit www.dahuasecurity.com to learn more. n
SECURITY SOLUTIONS // 97
21/08/2017 3:30 pm
SPOTLIGHT
ATTENTION INTEGRATORS MIGRATING YOUR CUSTOMERS TO GOLD CLASS MOBILE ACCESS HAS NEVER BEEN EASIER!
n a world where we
experienced the benefits of ISCS
end users will enjoy using HID
the Gold Class Mobile Access
rely so heavily upon
Gold Class mobile technology.
Mobile Access so much, that they
system offers user convenience,
Managing Director of ISCS,
will seriously consider rolling the
operational efficiency and
Stuart Harmer, said the organisation
system out throughout their entire
higher security.
your security and access control
is so excited by the technology,
business.”
should follow suit.
that it is offering a limited time
I
our mobile devices, it makes sense that
From smartphones and tablets
Just like the traditional access
By ‘tapping’ their mobile device or using the ‘twist and go’
promotion that will not only
control, the Gold Class Mobile
gesture, employees will have more
to wearable devices, leveraging
allow end users to experience the
Access system works with Gold
convenient and efficient access.
mobile technology for door
convenience of Gold Class Mobile
Class Mobile Access Credentials
Administrators can also save time
access, parking facilities, gates,
Access, but integrators will have
which are assigned to staff
through using the Secure Identity
as well as networks and other
the opportunity to increase their
members via email. By simply
Services portal, which allows
enterprise applications, is an
passive income.
downloading the Mobile Access
operators to create, manage, issue
App, staff will have instant access to
and revoke credentials over the air.
obvious progression in the world of access control. According to Netflix Facilities
“The convenience that mobile connectivity offers is changing
a range of secure access points and
the way we live, work and play.
network access points.
Using a cloud-based Trusted Services Manager, Seos® allows
Operations and Events Manager,
For a limited time, ISCS is offering
Alison Brown, “Only having to carry
new and existing customers and
control convenient for staff, it also
security protections, as overall
one device for so many daily tasks
integrators the option to install one
positions businesses with a more
facility security is elevated by the
is excellent.”
free HID Mobile Access Reader for
modern and professional image.
simple notion that users generally
It’s seems surprising then, that many businesses have not yet
98 // SECURITY SOLUTIONS
096-101_SSM109 Product Spotlight.indd 98
up to five users,” Mr Harmer said. “We are so confident that
This not only makes access
Leveraging Seos® as its underlying credential technology,
operators to go beyond technical
guard their mobile phones more closely than their access cards.
securitysolutionsmagazine.com
21/08/2017 3:30 pm
“By extending access control to
allows users to open gates and
a mobile device, we are allowing
doors, but allows users to log
the end user to securely access
on, open electronic locks and
the workplace using a device that
securely release documents from
is almost always on hand,” Mr
the printer.
Harmer said. “From the parking gate, to the
The award-winning technology is based on ISO standards and used by
front door and the network, Mobile
organisations around the world to
Access can help organisations
encrypt classified or sensitive data.
meet the growing demand for convenience.” Integrators and end users
The solution also supports the widest variety of mobile devices in the industry, so you can define the
have the option to implement the
mobile experience that is right for
system as a pure mobile solution
your organisation.
or integrate it into an existing
To find out more, email us at
card-based access control system,
goldclass@iscs.com.au, visit http://
allowing flexibility among users.
www.iscs.com.au/contact/gold-
The technology, which supports
class-mobile-promotion/ or phone
the widest variety of mobile
1300 111 010 and quote the code
devices in the industry, not only
GOLDCLASS. n
securitysolutionsmagazine.com
096-101_SSM109 Product Spotlight.indd 99
SECURITY SOLUTIONS // 99
21/08/2017 3:30 pm
SPOTLIGHT
ON INNOVATION IN SECURITY FROM FACIAL RECOGNITION TO VISUAL IDENTIFICATION
T
hey say necessity is
moment. This insight would later
the mother of
form the basis upon which FST would
invention. This simple
build its security paradigm and its
proverb provides a
biometric solutions. In short, Gen.
great insight into why a small
Farkas realised in that one defining
country like Israel is becoming a
moment that it would be far faster
hotbed of technology innovation
and easier to develop a solution
competing in the global economy.
which would quickly identify and
Israel, with very little in the way of
validated trusted or known workers,
resources, a small domestic market
thus saving the costly, manual
and a myriad of security challenges,
and slower screening approaches
has reinvented itself in recent years
for cases where technology is not
through the creation of a hub of
available to provide the solution.
advanced industries. Many of those
Upon retiring from the armed
industries are now challenging tech
forces, after spending most of his
titans found in more traditional
life in service of defense of Israel,
tech hotbeds such as Silicon Valley.
Gen. Farkas turned his attention
An example of the innovation
to a challenge that has troubled
and commercialisation process
him throughout most of his career
in Israel’s own ‘Silicon Wadi’ can
– creating a technological solution
this challenge. Instead of spending
Using face recognition, as well as
be seen in the emergence of FST
that would help ease the pain of the
an enormous amount of resources
body behaviour analytics to assess
Biometrics, a leader in the space
security measures imposed upon
looking for and identifying the few
body gait, and optional secondary
of in-motion visual identification.
Palestinians entering into Israel in
bad apples in the orchard, making
modules such as voice biometrics,
The idea itself was born out of a
the hope that such a solution might
everybody’s life difficult in the
personal pins or physical cards,
need, following the Second Intifada,
reduce anger among young people
process, this technology can and
IMID access creates a fusion of
where upon Israel had to institute
whom were merely trying to make
is being adopted by the public
identification technology which is
onerous security checks for the tens
a living. This is how FST Biometrics
to “self-screen”, allowing scarce
highly accurate, and second to none
of thousands of Palestinians who
originally started, and later evolved
resources to be spent on the ones
regarding ease-of-use and speed,
work in Israel. General A. Farkas,
into the solution it is today.
who do not cooperate or participate
allowing users to be identified in
in this effort.
motion, without stopping, while
founder of FST Biometrics and
Now, because of significant
former head of the Israeli Military
increase in global terror combined
Intelligence Directorate, watched as
with increased crime rates as a side
in the quest for widespread
that could be a door, a speed stile,
approximately 35,000 Palestinians
effect of urbanisation, security has
biometric technology adoption
or even a self-serve kiosk.
crossed from Gaza into Israel each
become a global issue. Countries
has always been the cost in terms
day, waiting in long lines for hours
and organisations alike struggle
of inconvenience for the user. This
to recognise FST Biometrics with
at the security checkpoints. While
to find solutions that strike an
is the reason why, IMID Access,
the Visionary Award for leading
there has been a mutual benefit to
appropriate balance between
FST Biometrics’ product, has been
the market in Biometric-based in
both Palestinians and Israel allowing
security, privacy and freedom. How
designed from the ground up to
motion identification in November
Palestinians to cross into Israel for
to balance the constant threat of
provide non-intrusive and seamless
of 2016, it was yet a further proof
work, boarder checkpoints had
criminal and terrorist attacks against
user experience for access control.
the FST was on the right track. This
become an unfortunate necessity
the fear that we might end up living
Through investing in In-Motion
award is presented annually to the
in the wake of rising Islamic
in a police state if security becomes
Visual Identification, and the power
company that demonstrates the
Fundamentalism. It was while
too pervasive?
of a fusion of biometric modules,
understanding to leverage global
IMID Access promises visual
mega trends, integrating a vision
identification at the speed of life.
into processes to achieve strategic
observing one such check point that Gen. Farkas had his “Eureka”
100 // SECURITY SOLUTIONS
096-101_SSM109 Product Spotlight.indd 100
Biometric technology is possibly the best, least intrusive solution to
In the past, the biggest obstacle
they walk towards an access point
When Frost & Sullivan decided
securitysolutionsmagazine.com
21/08/2017 3:30 pm
www.addonapac.com
photos to each other. Image acquisition for non-stationary individuals is not perfect, with many of the individual frame photos being blurred, with people looking towards a camera at an angle. As such, the entire image acquisitions task requires that every image taken from the video stream must first be optimised through a process of applying appropriate cleaning technologies and filters before attempting to identify a face. In addition, the face is only one aspect which can be used to identify an individual. Every person has a specific way of moving through space which is unique to us, referred to as body gait, and this information is, in many cases available to the camera from a further distance, and is less impacted by external factors such as lighting and the angle of the camera. The fusion of these modules is what enables the solution from FST biometrics to be so fast and so accurate, enabling a truly innovative solution to be so effective. In the case of the IMID Access solution, this identification is then used to provide secure access control through secure gates, at the speed of life. FST Biometrics is represented in Asia Pacific by Add-On Apac Innovative Solutions. We offer converged physical, cyber and communication security solutions. Operating across the Asia Pacific region, we harness advanced products and groundexcellence. In this case, the award
progress. In the case of FST, they
so quickly and accurately. The
breaking technologies, helping
signals the recognition of the
decide to think outside the box by
answer is simple, FST biometrics
our customers transform the way
significance of a product that is
redefining what the box is. Most
operates on a completely different
they protect people, information
non-invasive, instantaneous for end
people considering their solution
paradigm. One based on visual
and assets.
users, yet still meets the security
tend to ask initially “How does
identification as opposed to simple
and identification needs of today’s
this solution compare to the other
facial recognition.
range of organisations.
main facial recognition players?”
Except necessity, a different
Compared to facial recognition,
For more information of FST Biometrics, please visit www. fstbm.com. For more information
After seeing the product in action,
visual identification is an approach
on Add-On Apac, please visit www.
approach to solve a problem is
most people wonder how is it
that seeks to identify a person
addonapac.com, or call us on 03
sometimes required to make real
possible for their solution to work
and not simply compare two
9607 8465. n
securitysolutionsmagazine.com
096-101_SSM109 Product Spotlight.indd 101
SECURITY SOLUTIONS // 101
21/08/2017 3:30 pm
PROFILE
Hills Limited and Genetec Inc. Announce New Australian Application Development Centre
Hills Limited and Genetec Inc.
Partner in Asia Pacific, Hills’ strong
(“Genetec”), a leading provider
performance means it was the
common vision for delivering
of open architecture security
obvious choice to drive Genetec
unified, innovative security
and public safety solutions, have
SDK growth in the ANZ region. Hills
solutions that help ‘Protect the
announced plans to create the
is one of a few strategic Genetec
Everyday’,” said Philippe Ouimette,
Genetec™ Australian Application
partners worldwide that has been
Genetec Country Manager–Australia
Development Centre to support the
selected to support systems
and New Zealand. “We are excited
ongoing growth of both companies’
integration and delivery services.
to open the new Genetec Australian
joint security integration business
partnership to date, both Hills and
which will allow Australian and
(ANZ) market.
Genetec are keen to announce this
New Zealand customers to have
new initiative which will accelerate
custom and optimised applications
a unified IP security platform that
growth across ANZ,” said Hills CEO,
in their security and operational
blends security systems within a
David Lenz. “Our focus will be on
environments. Together with Hills,
single intuitive interface to simplify
expansion into application solutions
we will be very well positioned
the management of access control,
for the industry verticals of retail,
to cultivate and win new
video surveillance, automatic
banking, public safety, government
business opportunities in ANZ,”
license plate recognition (ALPR),
and transport,” said Lenz.
added Ouimette.
VoIP communications, intrusion,
“By collaborating with Genetec
“World leading technology
and analytics. Its open architecture
to develop a strategic plan that
from Genetec, supported by
enables organisations to customise
drives sales growth for the next
Hills expertise and technical
their security and operations using
three years, with a strong focus
support, is a winning combination
the Genetec software developer’s
on pre-sales capabilities, we’ll be
for customers – we can create
kit (SDK) with support from trusted
able to provide a state-of-the-art,
unified security solutions that
partners like Hills.
purpose-built security solution
are customised, future proof and
for the diverse markets we serve,”
ensure best practices,” concluded
added Lenz.
Lenz. n
Named by Genetec Inc. as Best Distributor and Best Development
102-107_SSM109 Profile.indd 102
Application Development Centre,
in the Australia and New Zealand Genetec™ Security Centre is
102 // SECURITY SOLUTIONS
“Based on the success of our
“Genetec and Hills share a
securitysolutionsmagazine.com
22/08/2017 1:28 pm
Some cheap solutions can end up being the most expensive. STENTOFON offer fully monitored IP communications solutions made to the highest standards from premium components and materials to ensure unparalleled performance in the most demanding conditions. When you need secure, safe, reliable communications that can integrate into existing systems and grow with your future needs, look no further than STENTOFON.
whencommunicationiscritical
102-107_SSM109 Profile.indd 103
www.stentofon.com.au
21/08/2017 4:18 pm
PROFILE
VIVOTEK and Genetec™ (Stratocast) Unite to Ensure Travelers’ Safety at Hotel Gran Marquise One of Fortaleza’s largest hotels,
Championship. In addition, the
of IP surveillance software,
which hosts thousands of people
Gran Marquise was the first hotel
access control and license plate
each year and holds hundreds
in Brazil to achieve the ISO 22000,
recognition solutions.
of events, has reinvented itself
certificate that ensures adherence
and converted analog technology
to extremely high standards of food
the goal of the project was to
to IP surveillance. Upon project
quality and safety.
enable the total unification of
completion, it is expected that
Divided into four stages,
management, security, marketing and commercial operations. In
integrated and linked with all other
The Challenge: Enable the Unification of the Management
hotel devices under Genetec’s
The Gran Marquise realised that
48 VIVOTEK network cameras.
cloud-based video-surveillance-
its security system needed to
Also installed was the Genetec™
as-a-service (VSaaS) solution,
be renewed. The hotel had 500
Stratocast ™ software, a cloud-
Stratocast™.
analog cameras and 22 digital
based video recorder tool that
video recorders installed – an
eliminates the need for any local
About the Gran Marquise Hotel
extensive system, but one
server, making it possible to
which only provided low-quality
monitor and share images with
The Gran Marquise is a five-star
images and demanded heavy
fully encrypted data. Two models
hotel of 18 thousand square
workload when it was necessary
of network cameras were installed
metres located on the seafront
to locate and retrieve footage of
throughout the hotel: one is the
of Fortaleza (Ceará). With a 23-
a recorded event. “We looked at
IB8369A, a 2-megapixel camera
year history, the hotel has a large
the hotel and realised that we had
capable of capturing high quality
infrastructure of 230 apartments
good internet, excellent rooms,
video, with IR illuminators effective
ranging in size from 29 to 131
perfect service, but if a customer
up to 30 metres for superior image
square metres, two presidential
asked for footage from security
quality throughout the day and
suites and 21 floors in total, of
cameras, the only thing we could
night. The camera also features
which 14 are dedicated to guest
offer were noisy images,” said
Smart Stream II technology, which
rooms 7 are retained for events,
Jussieudo Gomes, Security and
optimises image quality for the
recreation and administration.
Information Technology Division
most important regions in any
It is one of the most in-demand
chief of the Grand Marquise. To
scene; in doing so it can reduce
destinations among national and
solve this dilemma and improve
network bandwidth consumption
international authorities, artists and
the management and security of
and storage requirements by up to
athletes, such as Bill Clinton, former
the hotel, a plan was formulated
50%. The other camera installed
president of the United States,
to develop a pilot project with
was the small-scale, but big-
Vladimir Putin, current president
VIVOTEK – a global provider of
featured FD8166, an ultra-mini
of Russia, singer Paul McCartney,
network cameras, PoE switches,
fixed dome network camera with a
rapper Snoop Dogg, as well as the
and network video recorders,
tiny diameter of only 90mm.
fighters of the Ultimate Fighting
and Genetec™, a global provider
the Gran Marquise will have 250 VIVOTEK network cameras installed,
the first phase, 250 analogue cameras were replaced by a mere
“Because of the ‘L’ shaped layout of the hotel, we previously had five analog cameras installed on each floor: two in the corridor, because the distance from one side to the other was too long to be monitored by a single analog camera; one in front of the elevator; another covering the ‘L’ and one
104 // SECURITY SOLUTIONS
102-107_SSM109 Profile.indd 104
securitysolutionsmagazine.com
22/08/2017 1:28 pm
102-107_SSM109 Profile.indd 105
21/08/2017 4:18 pm
PROFILE more covering the maid’s service area. Now, each floor has only three cameras: one camera that serves the ‘L’ and the elevator; another that serves the corridor and one more observing the service area. At the reception area, the same thing happens, we put a different camera on the ceiling, and with just that solution we managed to cover the lobby, the bar, a part of the reception and the stairs of the restaurant,” explained Gomes. In the second phase, the Genetec™ Security Center solution was implemented for the internal parts of the hotel. With this platform, Gran Marquise can unify operations by combining all IP surveillance systems into
THE THIRD AND FOURTH STAGES ARE STILL IN PROGRESS. THE GOAL IS TO INSTALL 250 NETWORK CAMERAS IN TOTAL AND UNIFY THE SECURITY SYSTEM WITH ACCESS CONTROLS AND THE FIRE ALARM SYSTEM.
entire investigation process, finding the images and resolve the case, took only 15 minutes, but saved a very important day” said the security chief.
Public-Private Partnership The Hotel Gran Marquise’s new security system is part of Genetec’s private-public sharing initiative, which enables the sharing of certain cloud-recorded images with police forces. The Military Police, the Ceará State Government and the ABIH (Brazilian Hotels Industry Association in Ceará) are partners in this project along with the hotel. public partnership is that, with the
control and video surveillance
New System Producing Immediate and Tangible Results
monitoring carried out by private
are still in progress. The goal is
The new IP surveillance
speedily curbing the action of
to install 250 network cameras
infrastructure has already proven
criminals in monitored places.
in total and unify the security
effective during a wedding held at
The private-public partnership
system with access controls and
the hotel. The bride had been in
is founded on the belief that
the fire alarm system. In addition,
the spa area enjoying the luxurious
such sharing of private company
the KiwiVision analytical software
Day of the Bride service. However
surveillance with the public sector
was also installed, a system which
when she went to dress up for
will enable a more expedient
counts people automatically
the ceremony, she did not find
and effective curbing of criminal
through cameras and 3D sensors
the jewellery she had prepared
activity in such monitored areas.
and detects objects added or
for the wedding. Security staffs
In this way, it is possible to expand
removed from a scene. This way it is
were triggered to investigate the
monitored areas and reduce
possible to automatically detect if a
occurrence. ”Through descriptions
crime without direct public sector
dangerous object has left behind or
of the bag that carried the jewellery
investment. Recorded images are
if something has been stolen from a
and the time when the bride last
transmitted in real time to the
particular area.
saw it, we were able to locate the
police, and a two-way relationship
footage though the synergy of
benefits both sectors.
are connected to, and accessible through, the cloud. The third and fourth stages
“The new security system
102-107_SSM109 Profile.indd 106
day would have been ruined. This
The purpose of this private
one interface. Now all access
106 // SECURITY SOLUTIONS
only after the ceremony, and her
companies, the public sector can achieve a more effective action,
has come to improve the image
VIVOTEK’s camera and the Genetec™
quality of surveillance, the layout
system, and then proceed to point
public-private partnerships is
of the hotel and the promptness
of precise relevance in the video.
prevention. It is possible to increase
of response to the customer. In the
We noticed that the bride carried
public safety with little investment
past, if we needed an image we had
the purse into the car, but on exiting
from the private sector,” explained
to expend great effort in searching
the car she was no longer carrying it.
Country Manager of Genetec
whole files and spend hours
When we showed her the pictures,
Brazil, Denis André Côté. With
watching videos to be able to select
she went to the car and the purse
such initiatives, we are beginning
and retrieve the relevant event –
was there. If it wasn’t for the new IP
to see the benefits of advances in
not to mention the impact power
surveillance solution, we would not
total surveillance systems expand
failures, and malfunctions issues in
have been able to ascertain what
beyond those companies who take
power supplies, recorders and hard
had happened, the bride would
the initiative to invest in them, and
disk drives,” said Gomes.
remember and find the jewellery
begin to serve the broader public. n
“The goal of projects with
securitysolutionsmagazine.com
22/08/2017 1:28 pm
IMS-A
WE’RE VIDEO HEADS
In a digital and fast paced world, video is an ever advancing asset to your arsenal. Whether you’re in need of a promotional, corporate or explainer video, a motion graphic or animation, IMS has you covered. Show the world what you can do, harness the power of video today.
www.interactivemediasolutions.com.au
102-107_SSM109 Profile.indd2 107 IMS-Ad.Video-working.indd
Interactive Media Solutions 21/08/2017 10:02 4:18 am pm 2/10/2014
PRODUCT SHOWCASES
KOOVA BY AMARYLLO The world’s most advanced, yet smallest security system is now available to protect you and your family 24-hours a day. Implementing 256-bit encryption, the same security level that NASA employs, your privacy will be under lock and key at all times. Measuring a mere 4-inches tall, the Koova security robot can auto-track humans at 240° and recognize people’s faces to ensure your home or business is smoothly and expertly guarded while recording or sounding an alarm if needed. A built-in speech function will greet you and even allows a two-way talk feature to communicate with people or scare off intruders. A front-facing LED light acts as an additional deterrent when danger is detected. With remote functionality that can control the Koova from your smart device, panning and zooming of the camera can be done with a swipe of your finger. Easily review all videos and alerts in your timeline to monitor what happened while you were away. Bring the most advanced monitoring technology into your home or office and live life with the security of knowing you’re always protected. One of the finalists for Product of the Year at this year’s Security Conference and Expo, the Koova is a great new innovation in home and office security. For more information visit www.amaryllo.eu n
108 // SECURITY SOLUTIONS
108-111_SSM109 Product Showcase.indd 108
securitysolutionsmagazine.com
21/08/2017 4:59 pm
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmagazine.biz/newsletter
THE DAHUA NVR5224-24P-4KS2
Winner of Best New Product at this year’s Security Exhibition and Conference in Sydney, the Dahua NVR5224-24P-4KS2 is a 24 Channel NVR which also has 24 built-in POE ports which is an expansion over the traditional maximum of 16. However, the standout feature of this new Dahua NVR is a
new technology called ePoe which enables the transmission of images between camera at distances of up to 800m over good quality cable. Until now, most traditional NVR’s had a maximum effective transmission range of 100 meters. That is an increase of eight times
the traditional distance – a massive improvement over existing systems. One of the major benefits of an increase in transmission distance of this size is the ease of installation for integrators who no longer need to worry about keeping cable distances under 100m. Furthermore,
integrator could potentially run all cables from a central point rather than having to install multiple switches in order to transmit images from cameras back to a central location effectively saving significant time, money and labour. For more information, visit www1.dahuasecurity.com n
TOURLOCK 180+90 REVOLVING DOOR SYSTEM Boom Edam recently launched the latest version of its Tourlock 180+90 revolving door system in Australia. Designed for mobility hotspots such as the entrances to company HQs and diplomatic and government agencies, as well as high-traffic tourist, transport, retail, logistics and healthcare facilities. This latest Tourlock 180+90 system is designed for use in 24/7 environments requiring high volume capabilities (20 people each way per door a minute). It is a flexible, non-intrusive way to control physical access and prevent problems arising from unauthorised access to sensitive facilities and areas. It is also a cost-effective and reliable way to overcome the problems inherent in expensive manned security systems.
securitysolutionsmagazine.com
108-111_SSM109 Product Showcase.indd 109
In addition to the latest BoomConnect software to configure the system to individual users’ needs, the system can be configured to include the StereoVision time of flight camera systems, which create extremely accurate 3D images of the person in the door to determine whether they are alone. StereoVision is even capable of discerning between a person and a briefcase or bag. The Tourlock 180+90 incorporates a revolving door where the rotation can only be started after an authorisation signal from an access control system such as a card reader or biometrics reader. Depending on user requirements, the highest security member of the Tourlock family can be
integrated with a variety of different security systems that accurately detect any form of piggybacking or tailgating. The Tourlock 180 + 90 4-wing automatic revolving security door offers many possible access control options, including: • Security In / Free Out • Security In / Security Out • Free In Day / Security In Night When combined with an external card reader or biometric device of the user’s choice, the Tourlock 180+90 provides a secured access point at a substantially lower cost than traditional manned stations. For Further Information, call1300 689 905 or visit www. boonedam.com.au n
SECURITY SOLUTIONS // 109
21/08/2017 4:59 pm
PRODUCT SHOWCASES
THE SALTO XS4 GEO CYLINDERS
The Salto XS4 range of Geo Cylinders comprises an extensive range of compact sized electronic cylinders designed for doors where fitting an electronic escutcheon is not possible or required. Totally wire-free and networked through SALTO Virtual Network and SALTO Wireless network, the Salto XS4 Geo Cylinders are available in a range of different models including a half cylinder, cylinder with thumb turn, double cylinder, cam lock cylinder, padlock, and with a wide offering of different
110 // SECURITY SOLUTIONS
108-111_SSM109 Product Showcase.indd 110
profiles, such as Euro profile, UK oval, Swiss Round, Australian oval, Scandinavian profiles, ANSI profiles. The beauty of the Salto XS4 Geo Cylinders is that they provide wireless access control from one to many doors without having to undertake massive infrastructure upgrades. The XS4 Geo Cylinders simply retrofit to replace existing lock cylinders. The Salto XS4 range of Geo Cylinders work in conjunction with the XS4 Wireless online solution. Designed for applications that
need high level real-time access control, SALTO Wireless can be used as an independent system or as a complement to SALTO Virtual Network (SVN) and hardwired IP solutions. It connects batterypowered electronic escutcheons and cylinders by means of low power radio transceivers (2.4 GHz). These interact with XS4 gateways, which are connected by Ethernet/ WiFi to the central management computer. With a single click of a mouse you can configure or make changes to the network in realtime. You can also download audit
trail information for real-time control, delete users remotely and securely, collect battery status for maintenance and much more, all from a single PC and all in real-time. We have been using these cylinder at the Security Solutions office for a number of months and find them to be reliable, easy to use, and a fantastic solution for situations where you need a solution that can grow with your business. For more information visit www.saltosystems.com n
securitysolutionsmagazine.com
21/08/2017 4:59 pm
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmagazine.biz/newsletter
IMPROVE ACCESS & KEY MANAGEMENT WITH KEYLOKR™ – SMART KEY SAFE.
Do you need a more efficient way to manage access to your infrastructure and assets? Improve access efficiency with KeyLokr™ from Astute Access – a unique, bluetooth smart key safe. KeyLokr™ gives authorised users access to physical keys stored on-location, in a robust & secure, stainless steel key safe. To unlock and lock the KeyLokr™, users simply open the
LockVue™ app on their mobile phone, to view the locks they have permission to access. Access is easily granted, revoked, and tracked, using LockVue™ – an enterprisegrade, secure cloud platform. LockVue™ tracks who accesses the KeyLokr™, when and where… Giving administrators a full audit trail. www.astutesmartlocks.com/keylokr n
Unika Touchscreen Keypad
securitysolutionsmagazine.com
108-111_SSM109 Product Showcase.indd 111
With more than 30 years’ experience in the intrusion detection device market, AMC Alarms have garnered a strong industry reputation for their userfriendly, market-leading design. Their new Unika touchscreen keypad is no exception. Equipped with an intuitive, user-friendly graphical interface, this 5” touchscreen display allows users to manage all alarm functions from keypad. The inbuilt SD card reader enables users to personalise their Unika with a screensaver of their favourite photo or image. Once loaded, users can enjoy a crystalclear image thanks to the high resolution (480 x 272) TFT display. Save time by arming/disarming the alarm using a card, fob or tag thanks to the NFC reader. The Unika includes an inbuilt speaker and microphone so users can utilise the audible alarm setting, available on all AMC control panels. Additionally, the speaker and microphone can be used to record voice memos that can be
stored on the Unika, for other users to playback at a later time. Other features such as a temperature gauge and alarm clock function position the Unika as control centre for life as well as your alarm system. LSC are proud to be the exclusive distributor for AMC products in Australia and New Zealand. Features: • Touchscreen 5 inch display • TFT high resolution (480 x 272) • User friendly icon interface • SD card reader for image loading • NFC reader (for smartphone recognition) • Microphone and speaker • Temperature sensor • Vocal memo • Alarm clock function • Compatible with all AMC panels • Dimensions: 155 x 100 x 18mm • Part number: AMUNIKP For more information visit unika. lsc.com.au or call 1300 626 269 n
SECURITY SOLUTIONS // 111
21/08/2017 4:59 pm
STOPTALK
Dahua Technology Integrates QNAP NAS System to Extend Video Surveillance Feasibility Dahua Technology, a leading solution provider in the global video surveillance industry, announced that its Eco-Savvy 3.0, H.265 Wi-Fi and H.265 PTZ series network cameras are now compatible with QNAP’s NAS surveillance applications. Featuring H.265 compression technology, Dahua’s network cameras ensure video recording with lower bandwidth and greater security efficiency. QNAP surveillance applications integrate comprehensive video surveillance features into the NAS system, providing storage expandability and storage space management functions to surveillance users. “It’s our honour to cooperate with Dahua Technology and QNAP is working on extending NAS surveillance application scale,” said Alan Kuo, product manager of QNAP. “We are pleased to announce that Dahua Technology’s Eco-Savvy 3.0, H.265 Wi-Fi and H.265 PTZ series network cameras are proven to integrate well with QNAP surveillance solutions. We will keep providing our users more flexibility in selecting suitable IP cameras when deploying their surveillance solution.”
Dahua Technology has one of the most comprehensive line ups of surveillance cameras in the industry. The integration with QNAP NAS offers customers more comprehensive functionalities to meet the requirement of every site. “Open, Integration and Innovation has been our guiding principle,” said Daniel Chau, Overseas Marketing Director of Dahua Technology.
“We are open to work with platform partners, like QNAP, to form an end-to-end solution for customers. We appreciate the value of our relationship and we expect the demand for this Cloud surveillance solution to grow rapidly.” Dahua Eco-Savvy 3.0 cameras provide an impressive range of smart detection features, including face detection, tripwire detection,
and intrusion detection. Dahua Wi-Fi 265 cameras support H.265 compression, human detection and also smart tracking. Featuring a powerful optical zoom and accurate pan/tilt/zoom performance, Dahua H.265 PTZ cameras provide large monitoring range in great detail. For more information about Dahua Technology, please visit http://www.dahuasecurity.com.
Ian Fuller Joins Sektor Australia’s Security Team as National Systems Manager. “Ian’s deep industry experience adds a valuable dimension to Sektor’s security initiatives. With his unique skills and experience, Ian will play a pivotal role in taking our business to the next level. We are proud to welcome Ian to the Green Machine!” says Tom Kinkade – Sektor Australia’s security business manager. Ian completed a Bachelor’s degree (Electrical
112 // SECURITY SOLUTIONS
112-115_SSM109 Shop Talk.indd 112
and Computer Systems Engineering) before commencing a 23-year career in electronic security, excelling in senior roles with Hills/Pacific Communications and Q Security Systems. Ian is widely recognised as the foremost expert on the FLIR Systems United VMS and is authorised to train and certify systems integrators on the platform.
Ian joined Sektor on the 24th of July, ready to hit the ground running at ASIAL 2017. Ian can be contacted on +61 407 666 634 and at ianf@sektor.com Sektor is the APAC market leading distributor of security thermal imaging, data capture, rugged and mobile computing, POS and ergonomic workspace solutions.
securitysolutionsmagazine.com
21/08/2017 11:15 am
L I K E U S O N FA C E B O O K
facebook.com/ssmaust
For the latest news, products and events in the security industry
STid Announces Technology and Distribution Partnership with Genetec Inc. STid, a French contactless door control innovator, today announced a technology integration and sales distribution partnership with Genetec Inc., a leading provider of open architecture IP security and public safety solutions. Through this partnership, Genetec has integrated the STid Architect® access control readers into its Synergis™ access control software, part of Genetec Security Center, the company’s unified IP security platform, to meet the increasing need for corporate security and to protect sensitive data. STid Architect® produces the latest generation of access control readers for MIFARE® DESFire® RFID tags and smartphones with Bluetooth®
Smart. “With the support of the Architect® range, Genetec can offer its customers total end-to-end control of their access control data securely, and in compliance with ANSSI certification. This is the result of several years of collaboration that makes STid an ideal partner for supporting our security initiatives”, said Thibaut Louvet, Access Control Systems Director at Genetec Inc. To implement the highest levels of security, Genetec and STid have combined Genetec Synergis Cloud Link, an intelligent PoE-enabled appliance, with the Secure Communication Protocol (SSCP) approved by ANSSI, the French Network and Information Security Agency. STid was
the first manufacturer to obtain Top-Level Security Certification (CSPN). Data communication is therefore secured end-to-end, from identifier to controller, using encryption and authentication methods recognised by the relevant authorities. “STid is in a great position to penetrate the North American market with strategic partners like Genetec Inc.,” said Vincent Dupart, Chief Executive at STid. “Customers are looking for secure, open, and userfriendly solutions – three key success factors that give STid and Genetec stand-out options in their respective markets,” added Vincent Dupart. For more information about STid, visit: www.stid.com
Hikvision Continues its Leading Position in IHS Markit 2017 Report Building on the company’s incredible year-on-year growth, and underlining the global level of support for its range of security surveillance products, Hikvision, the world’s leading supplier of video surveillance products and solutions, has announced that it has again achieved No.1 position in a recent IHS Markit report, based on 2016 data, with a dominant market share of 21.4% for CCTV and Video Surveillance Equipment worldwide, rising from last year’s 19.5%*. Hot off the press, IHS Markit, a world leader in critical information, analytics, and solutions, also reported that Hikvision technology ranks in the No.1 position for 2016 global market share in the categories
securitysolutionsmagazine.com
112-115_SSM109 Shop Talk.indd 113
of: Security Cameras (24.2%), Analogue +HD CCTV Security Cameras (23.9%), Network Security Cameras (25.6%), and Recorders (25.3%). Moreover, the company is continuing its leading position in the EMEA market, with 14.9% market share for CCTV and Video Surveillance Equipment, and achieved an 8.5% market share equating to the No.2 position for the Americas market. Supporting the rapid growth of a company that is now an acknowledged security industry technology leader, Hikvision attributes its IHS Markit ranking success to its continuous R&D investment in new product technologies, and the rapid response to market trends, and long-lasting partnerships that
the company’s been placing in its business core. “Creating value for its customers is our driving goal, and this latest achievement of being ranked number one for global market share in video surveillance is very exciting for the company,” enthused Keen Yao, VP at Hikvision International Business Centre. “We look forward to sharing our success with the people who help to make it all possible: our partners and customers. In addition to the video surveillance industry, Hikvision has extended its reach to industrial automation, smart home tech, and automotive electronics industries, to achieve its long-term vision.” Underlining the R&D investment, for those looking to
experience Hikvision products and technologies first-hand, the company will be showcasing their cutting-edge advances in surveillance technology at the upcoming IFSEC International exhibition, including brand new products and solutions, as well as an innovative new set of technologies derived from the IT industry’s ‘Deep Learning’ concept. * Information based on IHS Markit, Technology Group, Video Surveillance Intelligence Service, May 2017. Information is not an endorsement of Hikvision. Any reliance on these results is at the third party’s own risk. Visit technology.ihs.com for more details. For more information, please visit www.hikvision.com.
SECURITY SOLUTIONS // 113
23/08/2017 3:41 pm
SUBSCRIBE Security Solutions Magazine, Level 1, 34 Joseph St, Blackburn, Victoria 3130 | Tel: 1300 300 552
I wish to subscribe for:
oONLY $62 per annum!
Name: ............................................................................Company: ....................................................................................... Position: .........................................................................Address: ......................................................................................... Suburb:...........................................................................State: ................................. Postcode:............................................. Tel:..................................................................................Email: ................................................................. ........................... TERMS AND CONDITIONS For more information on subscriptions, or to contact Interactive Media Solutions, please phone 1300 300 552 or email to admin@interactivemediasolutions.com.au. Deductions will be made from your nominated credit card every year in advance of delivery. The direct debit request and subscription price may be changed by Interactive Media Solutions from time to time, however you will always be given at least 28 days notice. The authority to debit your account every year remains valid until you notify Interactive Media Solutions to cancel your subscription by contacting Interactive Media Solutions Customer Service. No refund is given after a payment is made. In the event of a cancellation of your subscription, the subscription will simply expire twelve months from when the last subscription payment was made. Information on how we handle your personal information is explained in our Privacy Policy Statement.
Credit Card oBankcard
oVisa
oMastercard
oAmex
oDiners
Card Number: ........................................................................................................................................................................ Exp: _ _ / _ _ Card Name: .................................................................................................................................................................................................................... Signature: ....................................................................................................................................................................................................................... When payment has been received and funds cleared, this document serves as a Tax Invoice. Interactive Media Solutions ABN 56 606 919 463. If this document is to be used for tax purposes, please retain a copy for your records.
Security Solutions Magazine digital version is now available via ISSUU on every platform, everywhere! Download it now and enjoy your favourite security magazine when you like, where you like, however you like. PC, MAC, Linux, Apple, Android, Google and more...
Subscribe to Security Solutions Magazine for
ONLY $62 per annum!
Simply fill in the form or call 1300 300 552
112-115_SSM109 Shop Talk.indd 114
21/08/2017 11:15 am
112-115_SSM109 Shop Talk.indd 115
21/08/2017 11:15 am
CRASH RATED SURFACE MOUNT & SHALLOW MOUNT SOLUTIONS
FIND OUT MORE ABOUT US!
AUSTRALIA NATIONAL
1300 558 304 11 Cooper Street Smithfield NSW 2164 www.ezisecurity.com.au sales@ezisecurity.com
FP Ad Template.indd 1
22/08/2017 1:19 pm