AUSTRALASIA’S LEADING SECURIT Y RESOURCE FOR BUSINESS AND GOVERNMENT SECURITY SOLUTIONS • ISSUE 111 • JAN/FEB 2018
ISSUE 111 JAN/FEB 2018
securitysolutionsmagazine.com
How to Use
PSYCHOLOGY
001_SSM111 Cover-FIN.indd All Pages
To Create Better Security Outcomes
21/12/17 3:44 pm
Are you working to resolve a hostile vehicle attack risk? Ezi Security Systems has an unrivalled, extensive offering of high to extreme security products and have the expertise to design a solution to secure any critical infrastructure or extreme risk assessed site. All Ezi Security Systems Active Vehicle Barriers (AVB) and Hostile Vehicle Barriers (HVB) have been rigorously crash tested and certified to meet relevant ASTM, IWA and PAS 68 stipulations. For further information, please visit our website www.ezisecurity.com or call 1300 558 304 to speak to our security specialist team.
If serious security is your requirement, you need look no further than Ezi
002-003_SSM111 DPS.indd 2
20/12/17 3:48 pm
1300 558 304 11 Cooper Street Smithfield NSW 2164 www.ezisecurity.com.au sales@ezisecurity.com
002-003_SSM111 DPS.indd 3
20/12/17 3:48 pm
ISSUE 111 R I S K Y
FEATURES
B U S I N E S S
26
46
CONTENTS
94
58
54
34
COVER STORY
Melissa K Weinberg, PhD of Deakin University looks at the science of Choice Architecture. How can we use psychology to influence decision making with a view to achieving more desirable security outcomes?
70
26 RISKY BUSINESS
How do you manage the risks associated with a facility being used for a heinous, criminal, public act such as the recent shootings at Mandalay Bay in Las Vegas?
54 BEWARE THE WOMEN OF ISIS
This new report by Anne Speckhard, PhD and Ardian Shajkovci, PhD, from the International Center for the Study of Violent Extremism, raises frightening questions about women returning from the ‘caliphate’ – if they can return at all.
58 CYBER RANSOM
Juniper Research predicts the cost of cybercrime will climb to an estimated US $2.1 trillion by 2019, far exceeding the revenue generated by more traditional criminal activity. How can you keep your business safe from cybercrime?
74 THE CHANGING SECURITY LANDSCAPE We explore the security landscape of the past and compare it to the landscape we see today. How have we arrived at where we are? What are the current security service delivery trends? Where might those trends lead and what opportunities might they present for the security industry?
REGULARS 06 LETTER FROM THE EDITOR 08 LEADERSHIP
Jason Brown looks at the role of governance in leadership.
10 CYBER SECURITY
Jason Brown looks at the role of governance in leadership.
12 RESILIENCE
Dr Rita Parker looks at the socio-technical imperative of a resilient organisation.
14 HUMAN RESOURCES
Greg Byrne examines the obligations of employers regarding full-time employees employed under the conditions of a contract.
16 RISK MANAGEMENT
Dr Kevin Foster examines the potential for borrowing ideas from CPTED to consider ways that we might mitigate the threat of vehicle attacks at places of mass gathering and mass transport facilities.
18 COMMUNICATIONS
34 OPERATIONS
Richard Kay presents the second part in his special look at the benefits of training beyond firearms qualifications.
38 CCTV
We examine the potential of a new low cost storage method for high quality CCTV surveillance.
42 BUSINESS
78 SECURITY STUFF 80 SPOTLIGHTS 84 PROFILES 94 PRODUCT SHOWCASES 98 SHOPTALK
Company announcements from within the industry.
In the first of a four-part series, Alex Sidorenko, founder and CEO of Risk-Academy, explains how the key to managing corporate risks is often through dealing with the individual risks of decision-makers first.
52 LEGAL Q&A
Wills are an important safeguard for anyone who works in a dangerous role or owns a business. We look at the 10 most important things you need to know about wills.
62 AVIATION
What is the real value of Air Marshals?
66 ACCESS CONTROL
What are the emerging trends in smart building security?
20 THINKING ABOUT SECURITY
What are the benefits of going back to security basics?
22 EVENTS
A look at upcoming industry events.
4 // SECURITY SOLUTIONS
004-005_SSM111 Contents.indd 4
securitysolutionsmagazine.com
20/12/17 3:46 pm
Series 400 is a fully welded 19” rack mount wall cabinet with heavy duty load carrying capabilities.
When you choose Australian made, you’re choosing more than quality and reliability, you’re choosing peace of mind.
DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS
MFB’s range of innovative racking solutions is proudly made onshore, to ensure quality and consistency above all others. Backed by constant development, unsurpassed customer support and expedited delivery. MFB proves a solid project partner whatever your requirements. Australian made, makes Australia. With a solid history of over 45 years of supplying innovative, off-the-shelf and custom built racking systems, you can rely on MFB to ensure when you buy Australian, you’re investing and supporting Australian industry.
AUSTRALIAN MADE MAKES AUSTRALIA
www.mfb.com.au
004-005_SSM111 Contents.indd 5
VIC NSW -
P (03) 9801 1044 P (02) 9749 1922
F (03) 9801 1176 F (02) 9749 1987
E sales@mfb.com.au E sydney@mfb.com.au
20/12/17 3:46 pm
FROM THE EDITOR www.securitysolutionsmagazine.com
EDITORIAL
EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen Sist, Ged McMahon
CONTRIBUTORS
Garry Barnes, Jason Brown, Greg Byrne, Kevin Foster, Richard Kay, Steve Lawson, Justin Lawrence, Scott O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Anne Speckard, Alex Sidernko, Ardian Shajkovci, Ami Toben, Simeon Votier
D
oes Australia really take security
Australian’s do have a very relaxed attitude
seriously? Yes, Government claims
to security because they believe, rightly or
to, and some of the corporate
wrongly, that “it will never happen here”. This
sector demonstrate a passing
is a sentiment we can only hope remains true.
interest from time-to-time, but what of the
However, as the old axiom states, one should
average man and woman on the street? Do we
always expect the best but plan for the worst and
honestly take security seriously or do we, as a
prepare to be surprised. Of course, one should not have to rely upon
nation, just pay lip service to the idea
ADVERTISING
Keith Rozairo PHONE 1300 300 552 EMAIL keith@interactivemediasolutions.com.au
DESIGN AND PRODUCTION
Jonathan Rudolph PHONE 1300 300 552 EMAIL graphics@interactivemediasolutions.com.au
MARKETING AND SUBSCRIPTIONS
PHONE 1300 300 552 EMAIL admin@interactivemediasolutions.com.au $62.00 AUD inside Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues)
ACCOUNTS
some form of devastating incident to occur in
of security? As we enter 2018, we should be thankful that
order to force people to take security seriously.
Australia has never suffered a major terrorist
There is a great deal that the security industry
incident the likes of 9/11, the Boston bombings,
can do to educate the business community about
the bombings of July 7, 2005 in London or the
the benefits of taking security seriously. In past
terrorist attacks of October 12, 2002 in Bali.
issues Security Solutions Editor-At-Large Rod
However, as a result, the Australian community
Cowan has written about how security can act as
has become somewhat complacent with regard
a differentiator for business and give companies
to security. I often hear many of our readers who
a competitive edge. If we have learned anything from tragic
PHONE 1300 300 552 EMAIL accounts@interactivemediasolutions.com.au
are security managers within large corporations comment on the differences between attitudes
events that have occurred globally in recent
PUBLISHER
to security in Australia and America, where they
years, it must be that the world has changed –
often have to travel and work. According to many
permanently – and we cannot keep pretending
security managers, Americans understand that
that it has not. 9/11 was not an isolated incident
terrorism is a clear and present danger and a
and if groups like ISIS have their way, such
fact of daily life and thus, they treat security
attacks will become much more frequent. There
and security workers with the due respect. In
is a great deal more work to be done to ensure
contrast, they believe that Australian’s have a
that we create the kind of effective security
very blasé attitude towards security and it is this
culture within organisations and the broader
attitude that makes us much more vulnerable
community that will enable Australian’s to be
to attack.
safe and secure. And the work must begin with
ABN 56 606 919463
Level 1, 34 Joseph St, Blackburn, Victoria 3130 PHONE 1300 300 552 EMAIL enquiries@interactivemediasolutions.com.au WEBSITE www.securitysolutionsmagazine.com
DISCLAIMER
The publisher takes due care in the preparation of this magazine and takes all reasonable precautions and makes all reasonable effort to ensure the accuracy of material contained in this publication, but is not liable for any mistake, misprint or omission. The publisher does not assume any responsibility or liability for any loss or damage which may result from any inaccuracy or omission in this publication, or from the use of information contained herein. The publisher makes no warranty, express or implied with respect to any of the material contained herein.
In my opinion, having recently travelled
security professionals. Let’s make 2018 the year
through Egypt and Jordan, they are correct.
that Australia begins to take security seriously. n
The contents of this magazine may not be reproduced in ANY form in whole OR in part without WRITTEN permission from the publisher. Reproduction includes copying, photocopying, translation or reduced to any electronic medium or machine-readable form.
WRITTEN CORRESPONDENCE TO:
RS A DE VI
SSOCIATI
ON
O
RALIA LTD
SECURIT Y
PR
UST FA
O
Level 1, 34 Joseph St, Blackburn, Victoria 3130 1300 300 552 enquiries@interactivemediasolutions.com.au
Official Partners O C I AT I
ON
Y P R OVI D
RIT CU
D LT
SE
STRALIA LTD AU
PR O
ASS
SPAAL
AU S T R A L I A
OF
SECURITY
RS
OF
E
O rigin a l Siz e
SSOCIAT RS A IO DE N VI
blue colour changed to this colour green.
COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE signing your approval to print. Please pay special attention to spelling, punctuation, dates, times, telephone numbers, addresses etc, as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman Press assumes no responsibility for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................
6 // SECURITY SOLUTIONS
006-007_SSM111 Editors Letter.indd 6
John Bigelow Editor
securitysolutionsmagazine.com
20/12/17 3:54 pm
EC - S
TALL. FAST. STYLISH. Our award winning speedgates combine state-of-the-art optical technology with a high barrier height to protect your building.
EASYGATE SPT
• • • •
Barrier heights up to 1800mm Fast throughput (up to one person per second) Ideal for Disability Discrimination Act compliance Choose from a number of models, including the LX, SPT, SG, IM or LG • Custom pedestals with an array of attractive finishes EASYGATE LX
Find out which security gate is right for you.
1300 858 840
www.entrancecontrol.com.au
EASYGATE IM
FULL HEIGHT TURNSTILE
EC - Security Solutions Ad.indd 1 006-007_SSM111 Editors Letter.indd 7
TRIPOD TURNSTILE
SWING GATE
6/02/2017 10:37:16 AMpm 20/12/17 3:54
LEADERSHIP
GOVERNANCE – THE RESPONSIBILITY OF LEADERS n recent articles, I
Although not an exhaustive
BY JASON BROWN
(known as Basel II). The governance
improvement, and the status of
talked about the role
list, it is good governance for
arrangements and metrics
efforts to improve previously
and attributes of
any organisation to establish a
suggested in the paper would have,
identified deficiencies.
leaders, managing
framework which provides for the
if not prevented, greatly mitigated
security through metrics and
following to meet organisational
the spread of the GFC.
leaders’ self-awareness. It is time to
and community expectations. There
talk about governance –
must also be a clear definition of
out the reference to banking and
must include risk profile against
accountability, responsibility,
roles and accountabilities for all
finance measures and substituted
expectations. Reporting frequencies
delegation – from the board and
decision makers and decision-
‘security’ in the governance
may vary with the significance and
chief executive officer down.
making bodies, such as committees.
section of the report. It makes a
type of information and the level of
This is especially true for the roles
useful structure for thinking about
the recipient.
the provision of good governance.
and accountabilities of leaders,
security governance.
“The concept of governance is
particularly at an executive
not new. It is as old as human
management level, which should be
civilization. Simply put, governance
articulated and documented.
All material aspects of the
A board exists to provide
security rating and estimation
to the operational level. It is the
I
Every leader is responsible for
means the process of decision
I have taken the liberty to take
Corporate governance (paraphrased from Basel II, p90):
Internal ratings must be an essential part of the reporting to these parties. Reporting
In summary, security is a core component of good governance
C
and should have appropriate attention from the board through
Y
making and the process by which
strategic oversight of its operations,
processes must be approved by the
job of leaders at all levels to
decisions are implemented (or
while the executive management
organisation’s board of directors
ensure good governance to achieve
not implemented). Governance
is responsible for the day-to-
or a designated committee thereof
organisational goals. n
can be used in several contexts
day operations of the business.
and senior management. These
CM
CY
Jason Brown is the National
Managers should be assisted in their
parties must possess a general
international governance, national
work through the establishment
understanding of the security
Security Director for Thales in
governance and local governance”
of key committees, such as an
risk rating system and detailed
Australia and New Zealand. He
(United Nations Economic and
audit and risk management which
comprehension of its associated
is responsible for security liaison
Social Commission for Asia and
may address a range of issues
management reports. Senior
with government, law enforcement
the Pacific, 2007 What is good
from financial to security risks
management must provide notice
and intelligence communities to
governance?).
and compliance. Such committees
to the board of directors or a
develop cooperative arrangements
should have appropriate terms
designated committee thereof of
to minimise risk to Thales and those
ground but, most importantly, it is
of reference or charters (not
material changes or exceptions
in the community that it supports.
about making decisions and getting
just activity statements) and be
from established policies that will
He is also responsible for ensuring
things done or, in the case of
geared towards achievement
materially impact the operations of
compliance with international
security risks, getting things done
of business objectives. Such
the security system.
and Commonwealth requirements
to stop other unpleasant things
objectives and structures should be
being done!
regularly reviewed.
Senior management also must
K
for national security and relevant
have a good understanding of the
federal and state laws. He has served
security rating system’s design
on a number of senior boards and
Good governance has nine
It is interesting to note that
major characteristics, as follows:
many commentators suggest that
and operation, and must approve
committees, including Chair of the
• anticipatory
the global financial crisis (GFC)
material differences between
Security Professionals Australasia;
• consensus oriented
resulted from systemic failures
established procedure and actual
member of ASIS International
• accountable
of governance in the financial
practice. Management must also
Standards and Guidelines
• transparent
institutions. Ironically, in 2004, three
ensure, on an ongoing basis, that the
Commission; Chair of Australian
• responsive
years before the GFC, the Basel
rating system is operating properly.
Standards Committee for Security
• effective and efficient
Committee on Banking Supervision
Management and staff in the
and resilience. As of February 2017,
• equitable
published International Convergence
security control function must meet
Jason has been appointed Chair of the
• inclusive
of Capital Measurement and Capital
regularly to discuss the performance
International Standards Committee
• follows the rule of law
Standards - A Revised Framework
of the rating process, areas needing
for Risk Management.
8 // SECURITY SOLUTIONS
008-025_SSM111 Regulars.indd 8
MY
CMY
such as corporate governance,
This definition covers a lot of
M
securitysolutionsmagazine.com
20/12/17 4:34 pm
C
M
Y
CM
MY
CY
CMY
K
NEW!
008-025_SSM111 Regulars.indd 9
20/12/17 4:34 pm
CYBER SECURITY
CYBERSECURITY PREDICTIONS FOR 2018 nline security is
come under attack. When one device
that requires telecommunications
determine if law enforcement
seemingly getting
is compromised, the hacker can
carriers to block users’ access to
authorities can have far-reaching
more compromised
easily overtake the whole system of
private, government unapproved
surveillance powers. Many privacy
with each passing
interconnected devices. One of the
VPNs (Virtual Private Networks) by
activists are striving to overturn
year. 2017 has witnessed some of
biggest fears is that hackers might
February 1. This would mean that
the law passed in July, which
the worst security breaches in
compromise medical IoT devices, and
lots of people in China will not be
allows government agencies to
history – such as the breach of
patients’ information can be leaked.
able to reach the global internet,
collect data from large groups of
Equifax, which impacted over 143
A connected smart home will be
as many sites – such as Google or
people at once.
million clients in the U.S. and
another popular target for hackers.
Facebook – are blocked in China.
abroad. There were also three major
What’s more, breached IoT devices
state-sponsored ransomware
can be used in vast scale DDoS
5. The EU is implementing General
How to secure your web presence in 2018
attacks, affecting hundreds of
attacks, putting down virtually any
Data Protection Regulation. GDPR,
Internet users can still take
thousands of targets around the
Internet-based service or website.
coming into force in May (2018),
matters into their own hands
is going to introduce stricter rules
and secure their own computers
2. Increase in travel data breach.
for companies on storing personal
or smart devices. It’s important
Hackers are discovering that
user data and on obtaining
not to click on strange emailed
getting increasingly dangerous,” said
travellers who book their trips
customer consent. The regulation
links, not to download from
Marty P. Kamden, CMO of NordVPN.
online share their passport and
will have global reach and force
unofficial app marketplaces, to
“Besides, system administrators are
credit card data, which can be
companies to protect user data –
always have strong passwords,
not ready to protect their networks
stolen. This marks the move
being one of the rare examples of
and to be generally cautious when
from more sophisticated breaches.
towards specific online breaches,
governments striving to actually
going online.
We believe that attacks will only
targeting groups of people – such
protect data privacy.
keep getting worse.”
as travellers, online shoppers,
O
world. Unfortunately, it looks like this is just the beginning. “Ransomware assaults seem to be
In addition, Internet freedom
and others.
has been on a steady decline. For
It’s also highly recommended to use online privacy tools, such
6. Digital Economy Bill in the UK.
as VPNs, which encrypt all the
The UK is planning to pass a bill
information that is being shared between the user and VPN server.
example, in the US, ISPs have the
3. New, larger ransomware attacks.
that requires age verification for
right to track customer data without
This year has shown the power of
adult site visitors. Age verification
consent and sell it to third parties,
one ransomware attack that can
is done through collecting various
security and privacy, cybersecurity
and net neutrality is under attack.
disable hundreds of thousands
data about the user, which poses
specialists will be in big demand,
Other countries are also passing
of computers around the world.
a huge risk of data leaks and
and companies will be looking
freedom-limiting laws.
Companies are not yet up to
data loss, with sensitive private
to fill new job openings for
speed with sophisticated hacker
information being stolen.
cybersecurity professionals. Those
Below are the top 7 predictions for cyber security threat in 2018.
who want to protect their own
technologies, so there is a huge risk of new, larger ransomware attacks.
1. Increase in IoT attacks. As Internet
7. Dutch referendum on
data at home need to learn simple
government surveillance
cybersecurity tricks themselves. n
of Things (IoT) devices become
4. China to ban VPNs. China’s
powers. The Netherlands will
common-use, they will continue to
government passed a regulation
hold a referendum next year to
10 // SECURITY SOLUTIONS
008-025_SSM111 Regulars.indd 10
With the decline in online
For more information, visit www.nordvpn.com
securitysolutionsmagazine.com
20/12/17 4:34 pm
ATTENTION INTEGRATORS GOLD CLASS MOBILE ACCESS PROMOTION Upgrade your customers to experience the benefits of GOLD CLASS MOBILE ACCESS on their mobile device.
Increase your own income.
AT NO COST
Complimentary award winning HID Readers and Credentials Exclusive to ISCS
“Only having to carry one device for so many daily tasks is excellent.” ALISON BROWN Facilities, Operations & Events Manager, Netflix
AN ARA PRODUCTS COMPANY
HID Mobile Access®
Secure, convenient access control via your mobile device
ISCS is Australia’s HID Platinum Partner distributor
Contact
goldclass@iscs.com.au or 1300 111 010 and quote code GOLDCLASS Any size company considered, new or existing customers
008-025_SSM111 Regulars.indd 11
20/12/17 4:34 pm
RESILIENCE
DR RITA PARKER
UNDERSTANDING THE SOCIOTECHNICAL IMPERATIVE OF A RESILIENT ORGANISATION T
he organisational
In resilient organisations, this
also cause people to be distracted,
fundamental quality of all security
landscape has
has led to a management cultural
overly stressed and potentially
managers and professionals. Just as
changed rapidly since
revolution and, given these
isolated in their work environment.
a good manager should not allow
the start of the 21st
imperatives, effective security
Part of the daily work of security
a valuable machine or other asset
century, leading to more demands on
professionals today are those
professionals and managers is
to break down because of lack of
security professionals who need to
who no longer embrace parochial
to deal with problems which
maintenance, similarly, a security
have a high-level and overarching
practices, but rather international
occur during everyday business
professional should not allow
understanding of the complexities of
security management practices,
and organisational operations.
a valuable human contribution
the organisation. Increasingly, there
including understanding and
These daily problems can be
to be lost or become vulnerable
is a greater need for awareness of the
being equipped to address socio-
about tangible issues such as
because of lack of proper care and
demands, and limitations, of the
technical challenges.
infrastructure, communication
appropriate attention.
socio-technical interface within
Technological advances
equipment, supply chains and so
Levels of job satisfaction,
organisations. This is within the
have improved communications,
on. Other problems can be less
job involvement, organisational
context of a culturally diverse, highly
encouraged innovation and
tangible, such as informal networks,
commitment, absenteeism and
mobile workforce, operating in a
creativity and saved time within
interpersonal communications,
turnover, as well as poor or
global competitive environment
an organisation. Technological
human relations, employee
inadequate performance, can
against a background of new and
gains have also changed the
discontent and passive-aggressive
be early and critical signs and
increased risks from multiple sources.
way people engage and interact
disruptive behaviour. While some
potential indicators of inhibitors of
with each other, especially in the
of these types of problems can
resilience within an organisation.
influenced the way organisations
workplace. Recognising the need to
appear, at least to the superficial
These types of indicators can also
operate in this century. Some factors
optimise the relationship between
observer, to be time consuming
help identify potential weaknesses
are intrinsic to the organisation,
the technology system and the
and not directly security related,
in the security of the organisation.
while many others are beyond the
social system is one of the most
some can be more insidious and
direct control of organisations.
demanding areas and pressing
destructive to the overall integrity
managers and professionals today
Several notable influencing factors
imperatives for security managers.
and resilience of the organisation
understand the complexity of the
are the pace of change, which seems
Some technological advances have
and its future if they are not
inter-relationships within each
certain to continue to increase;
redefined socially appropriate
detected, monitored and mitigated
organisation and do not view
global competition; additional and
and acceptable behaviours in
as soon as possible.
people or technology in isolation
different risks and threats, including
the workplace, such as sending
With the socio-technical
of each other, but recognise each
disruptive digital technologies;
emails to the person in the next
imperative in mind, an integral
component as part of the overall
changing vectors; and the changing
office or work cubicle instead of
aspect of a resilient organisation
socio-technological system
relationship and expectations
speaking to them directly. Yet, some
today is good human resource
contributing to organisational
between employers and employees.
technological developments can
management and it should be a
resilience. n
Several critical aspects have
12 // SECURITY SOLUTIONS
008-025_SSM111 Regulars.indd 12
It is imperative that all security
securitysolutionsmagazine.com
20/12/17 4:34 pm
We’re TRANSFORMING We’ve opened a new National Distribution Centre in Seven Hills, NSW – bringing our supply chain in house to give our customers faster service, and we’re developing a new website to make buying online easier. Stay tuned for more details…
HCORP0005-Dec17-V1
HCORP0005-Dec17-V1
We’re transforming our business to provide a better customer experience.
For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au
facebook.com/HillsLtd/ CONNECT
E N T E RTA I N
008-025_SSM111 Regulars.indd 13
SECURE
20/12/17 4:34 pm
CivSe
HUMAN RESOURCES
EMPLOYMENT CONTRACTS BY GREG BYRNE
have previously
of the employment, limitations on
the position title and reporting
could be a breach of contract
discussed the
the employee’s ability to compete
lines, along with restraint of trade
for an employer to fail to
National Employment
with the employer after they leave
(which protects the employer
take reasonable steps to
Standard and the
the company, specific grounds for
from an employee trading near to
ensure that employees are
rights and obligations of
termination, dispute resolution,
where they used to work) should
not exposed to bullying or
contractors, but I have not
terms of confidentiality and
also be built into the contract.
harassment, or to risk of
discussed the rights and obligations
rights to anything the employee
The management of contracts
of employers regarding full-time
produces while employed by the
of employment in Australia is not
employees employed under the
company. Employment contracts
without nuances and complexities,
work to certain categories of
conditions of a contract.
can also reference and rely on
about which employers should be
employees and/or in certain
other documents, including
aware. On the face of it, it would
policies and job descriptions.
seem quite a simple task to employ
I
An employment contract is an agreement between an employer and employee that sets out terms
Contracts offer benefits for
someone on contract and then
physical or mental injury • the employer’s duty to provide
circumstances • the employee’s duty of care and competence
and conditions of employment
both the employee and the
terminate them when the contract
or a professional relationship. A
employer, which is why they are
expires. This of course is true;
contract should be specific to the
becoming increasingly popular.
however, employers need to be
individual needs of the parties
For the employer, they offer the
aware that during the term of the
entering into the arrangement
advantage of engaging a worker
contract and at its end, they have
cooperate with the employer
and can be in writing or verbal, or
for a specific period of time, at
certain obligations. A longstanding
in the operation of the
partly in writing and partly verbal.
the end of which there are no
obligation was clarified in
The Fair Work Ombudsman advises
messy separation issues. For the
2014 when the High Court of
that an employment contract
employee, it guarantees (subject
Australia determined the case of
or the obligation of the
cannot provide for less than the
to performance, conduct and
Commonwealth Bank of Australia v
employee to desist from all
legal minimum set out in either the
competence issues) a set period
Barker [2014] CA 32 (10 September
actions causing commercial
National Employment Standards
of employment.
2014) and found there was no
detriment to an employer or to
implied mutual trust and confidence
have regard to the interests of
(NES), the associated award,
Awards do not cover such
• the employee’s duty to obey the lawful reasonable instructions of the employer • the employee’s duty to
employer’s business • the employee’s duty of fidelity
enterprise agreements or other
aspects as intellectual property,
automatically written into
registered agreements that may
confidential information,
employment contracts in Australia.
apply to particular workplaces. All
following employer’s policies or
Prior to this decision, it was assumed
there is no general implied
employees in Australia are covered
reasonable instructions, but these
that employers were not permitted
obligation to act in good faith;
by the NES, regardless of whether
can be written into employment
to breach the trust or confidence of
however, it can be imported
they have signed a contract,
contracts. Contracts should
employees. It has now been clarified
into a contract by express
are working under a workplace
contain clauses that protect
that this is not the case.
or implied provision to
agreement, or are casual workers.
confidential information and
A contract cannot make employees
intellectual property, state that
of law that everyone should be
It is important to understand that
worse off than their minimum legal
an employee is required to follow
aware of, including:
the requirements of these implied
entitlements (as established by
employer’s policies and that an
• the implied duty of care, which
terms will vary from one situation
the NES and an industrial award
employee is required to follow
requires that the employer
to another. Employers should seek
applicable to that industry).
the reasonable instructions of
take reasonable care for
out independent legal advice
The contract can include
the employer. Flexibility as to
the health and safety of its
if there is any doubt as to their
location of work, hours of work,
employees; for example, it
obligations. n
information regarding the duration
14 // SECURITY SOLUTIONS
008-025_SSM111 Regulars.indd 14
However, there are other areas
his employer • the duty of good faith –
that effect.
securitysolutionsmagazine.com
20/12/17 4:34 pm
CivSec 2018 Security Solutions.qxp_CivSec 2018 Security Solutions 5/12/2017 9:48 AM Page 1
CivSec 2018 CIVIL SECURITY CONGRESS AND EXPOSITION 1-3 MAY 2018 MELBOURNE CONVENTION AND EXHIBI TION CENTRE, AUSTRALIA
SECURITY, SAFETY AND SOVEREIGNTY FOR THE INDO-ASIA-PACIFIC
Human Security
Cyber Security
Law Enforcement
Border Security
www.civsec.com.au For further information and exhibition enquiries contact the Sales Team Telephone: +61 (0)3 5282 0500 Email: expo@amda.com.au
008-025_SSM111 Regulars.indd 15
20/12/17 4:34 pm
RISK MANAGEMENT
CREATIVE SECURITY NEEDED TO MITIGATE HOSTILE VEHICLE ATTACKS BY DR KEVIN J. FOSTER
n a previous article I
are sometimes used to reduce
outside a sports stadium, concert
state of CPTED might have a harder
wrote about the
the relative ‘capability’ of the
hall or convention centre.
edge, but with careful design the
‘wicked problem’ of
attacker to achieve his goal while
hostile vehicle (HV)
also achieving some degree of
designers are now considering
the intent of the attacker instead of
attacks and some of the relevant
psychological deterrent. However,
the use of hard security measures
trying to physically stop them in all
standards that might assist with the
as a general rule, the harder
like bollards and concrete blocks.
places at all times.
choice of bollards and other
the security measures the more
However, barriers that are rated to
barriers. In this article, I want to
expensive the security becomes
stop a car or a truck travelling at
designers to put forward creative
discuss the potential of borrowing
and often the uglier the built
a significant velocity can be very
ideas to solve this very dynamic
ideas from Crime Prevention
environment becomes. Perhaps it
expensive, especially if the barriers
design problem. Furthermore, risk
Through Environmental Design
is also important not to over-react
are required over significant
and security policy needs to be
(CPTED) to consider ways that we
to the terrorist threat in places
distances (e.g. around the entire
developed to encourage creative
might mitigate this threat at places
where the likelihood of an incident
perimeter of a sports stadium or
security infrastructure solutions
of mass gathering and mass
is relatively low and no greater
along the length of a purpose built
in order to subtly but effectively
transport facilities.
than at other similar places. It has
bicycle path).
protect our people as they go about
I
CPTED provides valuable
to be remembered that a ‘probable’
It is not surprising that many
Therefore, maybe we need
emphasis can still be on mitigating
I would like to challenge all
their business and leisure in public
design principles that can have a
threat at the national level does
to reframe CPTED to deter or
places. This security should not
mitigation effect on the ‘intent’ of
not equate to a ‘probable’ threat at
demotivate the hostile vehicle
change or hinder our way of life; it
a potential offender. These design
every place in Australia.
attacker. Sadly we might simply
should be designed to enhance it. n
principles usually emphasise ideas
However, the apparent increase
change the means that the Dr Kevin J. Foster is the
about territoriality (ownership
in the frequency of hostile vehicle
attacker uses to achieve his deadly
of the space), surveillance, and
attacks targeting pedestrians,
goals. However, we need to keep
managing director of Foster Risk
access control. CPTED designers
requires us to rethink what we
improving our security, in dynamic
Management Pty Ltd, an Australian
typically focus on softer ‘natural’
can do to protect people where
or agile ways, to counter these
company that provides independent
mitigation measures rather than
vehicles can come into close
evolving threats.
research aimed at finding better
hard structural barriers and
proximity with very large numbers
electronic security.
of people. This might be at a
could be modified to embrace ideas
public safety, and improving our
transport facility like a train or bus
of Terrorism Prevention Through
understanding of emerging threats
station, or it might be in an area
Environmental Design. This evolved
from ‘intelligent’ technologies.
Hard measures like bollards and other types of vehicle barriers
16 // SECURITY SOLUTIONS
008-025_SSM111 Regulars.indd 16
Perhaps the CPTED approach
ways to manage risk for security and
securitysolutionsmagazine.com
20/12/17 4:34 pm
25 – 27 JULY 2018
SECURING INNOVATION The 2018 Security Exhibition + Conference: Powered by ingenuity and invention, showcasing the latest technology and cutting edge thinking. From physical and electronic solutions to biometrics and AI, Australia’s largest security event offers unparalleled opportunities. Limited stand space still available, contact the team to find out more: securityexpo@divcom.net.au or call 03 9261 4500.
008-025_SSM111 Regulars.indd 17
MELBOURNE CONVENTION + EXHIBITION CENTRE Find out more at securityexpo.com.au
20/12/17 4:34 pm
COMMUNICATIONS
HOW TO STAND OUT FROM THE PACK BY SIIMON REYNOLDS
ecently, I went to one
Take the mobile phone industry
do any of this, you have a genuine
and brand identity stack up? Does
of the world’s biggest
as an example. Nokia and Motorola
opportunity to make your service
it shout, “Look at us, we’re really
markets. Over 2,500
were both making quite good
really shine, and thereby greatly
special!” Or does it whisper, “Hey,
vendors sell their
mobile phones. Then Apple came
increase both your sales and the
don’t take any notice of us, we’re
wares every week at the Rose Bowl
along with the iPhone, something
percentage of customers who
pretty much the same as everyone
Flea Market in Pasadena, California.
that not only transformed the entire
come back.
else”? If you don’t say something
You can buy almost anything, all of
mobile phone industry, but also
it old or used. My wife and I went
revolutionised how mobile phone
did at the last company I owned, an
remarkable, why on earth should
there expecting to walk away with a
software was developed.
advertising agency:
anyone call you?
R
mountain of bargains. Instead, we left with nothing. Why? Because, despite the fact there
Here are some of the things we
remarkable, or at least look
Pretend for a moment that you
How could you make your
• When clients came into our
product profoundly different from
office for meetings, they
are not the owner of your business.
that produced by your competitors?
weren’t just offered coffee or
Take a look at it as an outsider.
were over 50,000 items available
Rather than just slightly better,
tea. They were given an actual
When you peruse your website,
to buy, there was a dire shortage
as it probably now is. What could
menu of numerous coffees and
your ads, your brochures and sales
of stuff that was actually special or
you add to it, or subtract from it, to
six different teas they could
materials, do they startle you with
unique. If we are not careful, our
make it really stand out from the
choose from.
their freshness, energy, relevance
businesses will end up with the
sea of sameness in your industry?
same problem of offering plenty
Take a few minutes now to have
‘60-Second Monthly Review’,
of stuff, but nothing extraordinary;
a think about this. It will be time
where they ranked us in five
selling goods that aren’t that good;
exceedingly well spent.
different quality areas.
and presenting services that serve
• Every 30 days, they filled out a
• They were invited to boardroom
and uniqueness? No? Well maybe you should change them. Appearances count. Branding matters. Advertising can be the crucial point of difference if your
2. MAKE YOUR SERVICE REMARKABLE
lunches where interesting
product or service doesn’t stand
research was presented and, at
apart from your competition.
need another okay business.
What if, no matter how hard you
night, to concerts and movies.
Almost every industry is vastly
try, you cannot think of a way
over-catered for already. If we
to differentiate your product or
recently-published books about
to stand out from the pack. If you
are to thrive in this overcrowded
service? No matter, all is not lost.
business and marketing.
aspire to business greatness, they
marketplace, we must do
Just make amazing service your
something, anything, to stand out
point of differentiation. It is easy
beautiful cards with written
from the pack. There are three
to do – just look at every point the
messages from our team.
fundamental ways to do this:
customer comes into contact with
Were we the best advertising agency
you, and conjure up some way to
in the city? Maybe, maybe not, but
Australia’s foremost marketing
1. MAKE YOUR PRODUCT EXTRAORDINARY
make it special.
we certainly offered the finest, most
experts and coaches entrepreneurs
memorable service. And so can you.
from all over the world, increasing
Right now I’m betting you are
phone that would charm their socks
producing a reasonable product
off? How could you make their
at a reasonable price. But that is
nobody brilliantly. The truth is, the world doesn’t
What could you say on the
• They were sent important,
• On their birthdays, they received
So folks, they are the three areas to look at when evaluating how
are not just ‘nice-to-haves’, they are ‘must-haves’. n Siimon Reynolds is one of
their sales, improving their profits and helping them work more
experience at your office or store
3. MAKE YOUR MARKETING DIFFERENT
a dangerous place to be. The past
really great? What about after sales
Like it or not, potential customers
siimonreynoldscoaching.com. Siimon
10 years have shown us forcefully
service? How could you make that a
often choose who they buy from,
also offers online courses on business
that reasonably good does not cut
little more unusual and remarkable?
based on image. That being the
through The Fortune Institute. Find out
it anymore.
In a world where few companies
case, how does your marketing
more at www.thefortuneinstitute.com
18 // SECURITY SOLUTIONS
008-025_SSM111 Regulars.indd 18
effectively. To learn more, visit www.
securitysolutionsmagazine.com
20/12/17 4:34 pm
READ OUR FREE DIGITAL MAG subscribepage.com/ssm109
securitysolutionsmagazine.biz
008-025_SSM111 Regulars.indd 19
20/12/17 4:34 pm
THINKING ABOUT SECURITY
SECURITY BASICS BY DON WILLIAMS
O
ccasionally, there is
Additional questions:
assessment, risk assessment,
and technical terminology, but it
benefit in returning to
• What is really important to
security surveys, access control,
should not be used to befuddle
alarm monitoring and response,
the audience or to hide a lack of
cost benefit analysis, media
fundamental awareness.
the absolute basics of our knowledge set.
There are a number of reasons why this is of value: sometimes we have become so entrapped by the detail that we forget the basics, sometimes we become expert in a field and lose
our business? • Can we make it hard for villains to get to the assets? • Can we make it hard for them to move or damage the assets? • Can we know if they are doing it?
sight of the underlying principles,
• Can we record them doing it?
and sometimes we have come into
• Can we do this without
management, image protection,
Knowing the fundamentals
equipment selection, policies,
also provides a solid foundation
procedures, training, monitoring,
upon which to build our security
assurance reviews, risk transfer,
plans, processes and capabilities.
emergency and crisis management,
Without such a solid basis for what
business continuity and so on.
we do and why, there is the real
Understanding the basics not
likelihood, indeed probability,
security from another discipline and
damaging the image of
only reminds us of what we do,
that the organisation’s protective
never really comprehended the
our business?
how and why, but also allows
security will be flawed.
foundation on which protective security is built. Remember back to See Spot run? The building blocks of
• What measures do we have in place? • Is it costing, or going to cost,
us to present our case to other
Ours is a complex and multi-
managers and the executive in
faceted management discipline
simple terms. It was Einstein who
that overlaps and integrates with
the language of Shakespeare and
more to protect the asset than it
said, “If you can’t explain it to a
so many other aspects of providing
Dickens is in those books. So, if we
is worth?
six-year-old, you don’t understand
a safe and secure environment
it yourself.” While not suggesting
in which we can work, live and
that the executives are six-
play. Given the complexity and
year-olds, the principle applies.
importance of the role of the
Occasionally, there is a perception
security professional, perhaps
that the use of small words and
sometimes we should revisit the
simple concepts is somehow
basics. That way we know why Spot
• How do we recover
demeaning or uninspiring. On
is running. n
our reputation?
the other hand, the ability to
are all sitting comfortably, let us try to recapture the fundamentals. Basic questions: • Do we own anything? • Do we do anything? • Is there anyone who would want to take or damage what we have or do? (Really, is there?)
• Do we know how to respond appropriately? • Should something happen, can we repair or replace the asset? • If our functions are harmed, how do we look after our clients?
Don Williams CPP RSecP ASecM
• How could they do it?
The above are really simple
present a logical argument that
• What can we do to protect our
questions, but they reflect
is not bound up in jargon can be
is a recognised thought leader in the
everything we do: asset and
both refreshing and informative.
field of security. He can be contacted
function identification, threat
Certainly, there is a place for
at donwilliams@dswconsulting.
assessment, vulnerability
detailed, specialist knowledge
com.au
assets and functions? • How do we know the (security) measures are (really) working?
20 // SECURITY SOLUTIONS
008-025_SSM111 Regulars.indd 20
securitysolutionsmagazine.com
20/12/17 4:34 pm
“THE FIRST HAND-TRIGGERED ACCESS CONTROL READER“
STid Security presents
French expert in RFID, NFC, Bluetooth® and IoT, our contact free identification solutions have been designed to eliminate barriers in your business via innovative independence-focused technologies. Thanks to the STid Mobile ID® app and the Architect® Blue Bluetooth® reader, your smartphone turns your hand into a badge you have with you at all times. With the freedom to choose your favourite identification mode and make your access options both secure and much more intuitive.
Slide mode
TapTap mode
Remote mode
Hands-free mode
Security Meeting 2016 Trophées de la sécurité 2016 & 2017 Expoprotection 2014 & 2016 ISC West 2017 Trophées APS 2017
008-025_SSM111 Regulars.indd 21
www.stid-security.com
Photo credit: iStock - 08/17 - 10917
Badge mode
20/12/17 4:34 pm
EVENTS
Co Fo
ISC West
moved to the ISC West show
Held annually between
11–13 April 2018
floor in 2017! As the digital
Sydney and Melbourne, TFX is
Sands Expo Convention Center,
and physical worlds collide,
Australia’s largest learning and
Las Vegas
it is increasingly important
networking event for facilities
ISC West is the largest security
for industry professionals to
and workplace management
industry trade show in the US.
protect their organisations and
professions seeking solutions for
At ISC West you will have the
clients from both physical and
creating more efficient, sustainable
chance to meet with technical
cyber threats. CSE provides
and productive facilities
multidisciplinary professions
representatives from 1,000+
holistic solutions for today’s
and workplaces.
to have a voice and achieve
exhibitors and brands in the
connected organisations.
Total Facilities is
• bring new and leading solutions in operational efficiency to the market • deliver forefront trends for running more sustainable facilities and workplaces • foster a community of
recognition
security industry and network with
Working with SIA, ISC West also
comprehensive and efficient in
over 28,000 security professionals.
features world-class education
its delivery and provides real
industry and challenge
to learn about every facet of the
solutions to everyday operational
traditional perceptions of
security industry.
challenges by connecting buyers
In 2018, ISC West will offer attendees a host of attractions including: • new products and technologies,
Visit www.iscwest.com for more information.
encompassing everything
• redefine the future of the
facility management.
and sellers to source innovation,
Visit www.totalfacilities.com.au for
debate current issues, share
more information.
insights and create opportunities
from access control to
Total Facilities
for an invaluable community
CivSec 2018
unmanned vehicles.
18–19 April 2018
of professionals.
1–3 May 2018
• Unmanned Security Expo,
Melbourne Convention and
Melbourne Convention and
introduced in 2017, is an event
Exhibition Centre, Melbourne
Our vision
Exhibition Centre, Melbourne
within ISC West focusing on
Returning to Melbourne with
We champion professionals
Security, Safety and Sovereignty for
unmanned aerial vehicles
an exciting new proposition,
who support the built and work
the Indo-Asia-Pacific Region
(UAVs), unmanned ground
Total Facilities now unites
environment with a sense of
Building on the success of the
robotics and vehicles (UGVs),
both facilities and workplace
belonging and advocacy – the
inaugural CivSec event, 2018
and the various software and
professionals in the ultimate
unsung heroes and behind-the-
will bring together leaders and
applications that support them.
industry destination for the built
scenes forces. We will evolve and
decision makers, policy makers
and work environment.
grow our offer year on year to:
and advisers, managers and
• Connected Security Expo (CSE)
22 // SECURITY SOLUTIONS
008-025_SSM111 Regulars.indd 22
securitysolutionsmagazine.com
20/12/17 4:34 pm
Contact us on 1300 364 864 Follow us on
Delivering Proven Solutions for Security & Safety We Protect People & Assets www.magneticautomation.com.au 008-025_SSM111 Regulars.indd 23
20/12/17 4:34 pm
EVENTS officials, operational professionals,
through developing a integrated
technical specialists, strategists
strategic focus. In particular, the
and academics, researchers and
conference will look at breaching
consultants, technology developers
the gap for sharing of information/
and industry suppliers.
intelligence, policy, tactics and
While focusing on the Indo-
capability. Recognising modern-
Asia-Pacific region, CivSec 2018
day thought in breaking down
will address issues of global
self-imposed barriers, allowing us
significance. The sovereignty,
to sufficiently structure to better
safety, prosperity and cohesion
secure Australia.
of societies and communities
Safeguarding Australia 2018
everywhere are threatened by
will draw on the knowledge of
natural disasters and emergencies,
domestic and international experts
by human catastrophe and civil
to contextualise the current
disorder, by criminal activity and
threat environment and look at
terrorism and by the movement
the development of Security and
of distressed populations across
Emergency Management structures.
porous frontiers.
The conference will culminate in a
This international congress
strategic snapshot looking at our
and exposition will zero-in on key
future direction and our ability to
themes, which will include:
evolve in-line with the threat posed
• human security and safety
to our way of living.
• public security, policing and protection • infrastructure, resource and environmental security
The approach of the conference
manufacturers, distributors, security
The OSPAs recognise and
C
is to engage and inform Security
professionals and end-users to
reward companies and individuals
and Emergency Management
connect and create unparalleled
across the security sector. They are
Leaders, Practitioners and Policy
business opportunities.
designed to be both independent
The entire team is looking
and inclusive, providing an
• cybersecurity and social media
makers at all levels of Government
• borders and sovereignty
and Industry on best practice today
forward to once again reuniting
opportunity for outstanding
• homeland security
and their thoughts for the future, so
more than 4,500 security
performers, whether buyers or
• community resilience
we may develop our shared vision
professionals with over 150
suppliers, to be recognised and for
• emergencies and disaster
and capacity to best Safeguard
leading suppliers. The 2018 show
their success to be celebrated.
Australia for our collective future.
is set to see some interesting new
management • catastrophes and humanitarian response
For more information, visit www. safeguardingaustraliasummit.org.au
are based on extensive research
new attractions.
on key factors that contribute
Make sure you put the dates
• innovation and technology.
MY
K
to and characterise outstanding
in your diary. We look forward to
performance. (This research can be
Comprising an exposition of
seeing you again in Melbourne in
found at https://perpetuityresearch.
equipment, technology and
25–27 July 2018
2018 for the Security Exhibition &
com/wp-content/uploads/2014/09/
services and a congress of
Melbourne Convention and
ASIAL Conference!
Aspiring-to-Excellence.pdf)
specialist conferences, CivSec
Exhibition Centre, Melbourne
2018 will confront the complex
In 2018, the Security Exhibition
and increasingly interconnected
& Conference is heading back
security and environmental
to Melbourne.
more information.
The OSPAs are being set-up in collaboration with security associations and groups across
The 2018 Australian OSPAs
many countries.
Conference is the industry’s annual
18 October 2018
standardising the award categories
opportunity to reunite for three
Doltone House,
and criteria, the OSPAs scheme
days of quality networking and
Hyde Park, Sydney
provides an opportunity for
Safeguarding Australia 2018
unrivalled education alongside a
The Outstanding Security
countries to run their own
showcase of the most innovative
Performance Awards (OSPAs) are
evidence-based OSPAs schemes
9–10 May 2018
solutions to the Australian market.
pleased to announce the dates
while maintaining an ability to
Canberra
For over three decades, it has been
for the 2018 Australian awards.
compete on an international level
This year’s summit will address
the largest and most established
They will be working for the fourth
in the future – World OSPAs.
developments of contemporary
commercial event for the security
year in a row with the prestigious
interagency operations and focus
industry in Australia, bringing
Australian Security Industry
more information or to make a
on the friction points created
together the entire supply chain of
Association Limited (ASIAL).
nomination. n
challenges facing modern societies. Visit www.civsec.com.au/ for more information.
24 // SECURITY SOLUTIONS
008-025_SSM111 Regulars.indd 24
The Security Exhibition &
CY
CMY
Security Exhibition & Conference 2018
Visit securityexpo.com.au for
Y
CM
The criteria for these awards
innovations, as well as a host of
M
By researching and
Visit au.theospas.com for
securitysolutionsmagazine.com
20/12/17 4:34 pm
NEW INT-QUADIP For PB- Series Quad Beams
C
M
Y
CM
MY
CY
CMY
K
IP INTERFACE MODULE
LAN/WAN
With the new IP interface module, our intelligent PB- series Quad Beams are as easy as IP cameras to install and integrate with leading VMS solutions.
VMS
Most intruder detection systems rely on legacy technologies which require a number of third-party products and man-hours to install. The INT-QUADIP module utilises infrastructures already in place with CCTV, Access Control, and other security systems; dramatically reducing installation costs whilst providing a fully integrated security system which can be easily expanded and configured as desired.
KEY SPECIFICATIONS ● ● ● ●
PoE Class 3 IEEE 802.3af VMS Compatible Direct control for cameras including: - Axis - Bosch - Hikvision - Sony
● Plug & play web browser interface ● No software installation required ● One cable installation
PB-IN-HF/HFA The ultimate in trouble free perimeter detection for distances up to 200m.
1300 366 851 www.seadan.com.au 008-025_SSM111 Regulars.indd 25
PB-F/FA Single channel quad beams ideal for simple perimeter systems.
PB-IN-100AT Anti-crawl beam for high security perimeters up to 100m.
PB-KH TAKEX quad beam performance for use in beam towers.
(02) 9427 2677 www.sprintintercom.au
20/12/17 4:34 pm
FEATURE
R I S K Y
26 // SECURITY SOLUTIONS
026-029_SSM111 Article 1.indd 26
securitysolutionsmagazine.com
20/12/17 4:39 pm
B U S I N E S S BY SIMEON VOTIER Casino operators, like insurance
manage the risks associated with
companies, make their money
their facility being used for a
from the risk business. Statistics,
heinous, criminal, public act such
probabilities and the design of
as the shootings at Mandalay
games and machines all work
Bay in Las Vegas on the 1st of
to benefit them. Fraud, theft,
October 2017?
competition, card counters,
securitysolutionsmagazine.com
026-029_SSM111 Article 1.indd 27
This article does not seek
damage to reputation, gambling
to analyse or criticise the
software and disruptors – these
preparedness or response of
are negative risks that casino
Mandalay Bay, its owner MGM,
operators recognise, analyse
or any of the local, state and
and treat in various ways, such
federal authorities involved;
as through surveillance, rules,
however, this terrible incident
market intelligence, acceptance
should serve as a reminder to
and pricing. But how do they
businesses to comprehensively
SECURITY SOLUTIONS // 27
20/12/17 4:39 pm
FEATURE consider all risks, even those so outrageous so as to defy prediction and definition. Many will be familiar with ISO 31000:2009 Risk management – Principles and guidelines or the COSO Enterprise Risk Management-Integrated Framework or other frameworks. Fundamentally, they are similar in that they contain steps or processes to: • consider the context • identify the risks • analyse the risks • evaluate the risks • treat the risks • monitor and review. All enterprises and industries face comprehensive risks. While there are some risks peculiar to individual enterprises, there is much more in common between similar businesses, industries or activities. So, in the generic framework outlined above, the context is largely shared and the risks to business as usual are common, for a given industry in a particular location. For Mandalay Bay and its competitors, their shared context is that their revenue is a function
types of risks to their business on
exploited to perpetrate a mass
risk analysis. Alternatively, the
of their venue being accessible,
a daily basis.
casualty attack on the public’.
impact may be estimated using
At some point in time, the
Assume that this risk had been
some indirect metric, such as
People go to Las Vegas for positive
owners of all similar enterprises
expressed sometime previously
consumer confidence or visitor
experiences and businesses thrive
in a location have made a decision
in a risk management context.
numbers, or something like
on their positive appeal. Of the
on a business case to build, own
Having identified the risk, it
damage to a brand or reputation.
hazards, the amount of money
and/or operate them, having
should be analysed in terms of
The likelihood is ideally expressed
floating around Las Vegas and the
considered that the potential
its likelihood and impact. The
as a probability, but this is not as
tendency for the visiting public
risks are manageable given
goal is to understand the risk
easy as calculating the payoff for
to behave with less caution are
the expected return on their
and its components which might
a roulette wheel, nor is it always
a magnet for crime. Gun laws
investment. Where one enterprise
make it increase or decrease.
possible. Often a crude descriptive
in Nevada are not strict. Mass
then becomes distinguishable
In business, the impact is
scale is all that can be applied. The
shootings occur in the US often
from another is whether and how
usually measured in financial
point here is not to be exact, but to
enough. The terrorist threat level
risks are analysed and evaluated,
terms – this may be estimated
be as consistent as possible when
in the US is ‘elevated’ – there is a
the risk appetite of its leadership,
using analogous situations. For
analysing each risk.
significant risk of terrorist attacks
its values, how risk is treated, how
example, MGM Chief Executive
– and symbols of capitalism and
effectively it monitors risks and
Officer Jim Murren has openly
account the severity of the risk,
indulgence are appealing targets
reviews and adjusts its response,
reported the impact on its
what control a business might
for would-be terrorists. Some
and its resilience should a risk
business in Las Vegas and several
have over the risk, the cost of
parts of the US are more prone
event occur.
hundred of Mandalay Bay’s 7,400
any control, potential losses and
employees will be affected. Other
potential benefits or opportunities.
visible and well patronised.
to natural disaster than others.
The Las Vegas shootings were
Evaluating the risk takes into
But, as noted at the opening of
the manifestation of a risk to
similar businesses could use
Regardless of the methods used
this article, enterprises face other
Mandalay Bay that ‘the venue is
this information for their future
to analyse and evaluate the risks,
28 // SECURITY SOLUTIONS
026-029_SSM111 Article 1.indd 28
securitysolutionsmagazine.com
20/12/17 4:39 pm
evaluated such that the owner decides to do something about it and treat the risk: Can they avoid the activity? No, as it would be inconsistent with the business objectives to not operate the facility. Can they reduce the likelihood? Yes, as the operator of private premises, they have the right to decide who and what is permitted on the premises. The operator could introduce a
SOMETIMES A RISK MUST BE ACCEPTED WHEN THERE ARE NO VIABLE TREATMENT OPTIONS, BUT WHERE THE LIKELIHOOD OR IMPACT ARE STILL SUBSTANTIAL. IT IS CRITICAL FOR CONTINGENCY PLANS TO BE IN PLACE FOR SUCH RISKS AND FOR ADEQUATE RESOURCES TO BE AVAILABLE TO IMPLEMENT THOSE PLANS.
policy whereby firearms are not allowed to be brought on their
Practiced engagement and
must be accepted when there are
premises by members of the
cooperation with local law
no viable treatment options, but
public. This could be backed up
enforcement authorities shares
where the likelihood or impact are
by incentives or disincentives,
the burden of mitigation, as does
still substantial. It is critical for
or by a comprehensive security
the development and adherence to
contingency plans to be in place
checking regime, surveillance
industry codes and standardised
for such risks and for adequate
and weapons detection
policies in cooperation with
resources to be available to
equipment. Unenforced policy
other venues that make all of
implement those plans.
is inexpensive, but ineffectual.
them less appealing as a target
Strictly enforced security policy
or attack platform. In Australia,
response arrangements may not
is complex and obviously more
government seeks to transfer to
remain appropriate. Following
expensive to implement. Executed
the private sector some of the costs
the Las Vegas attack, one would
thoughtlessly, the policy could
and obligations arising from some
expect operators of hotels and
generate a new risk that the
terrorist risk through the recently
casinos in Las Vegas, as well as
‘positive experience’ that the
released document Australia’s
analogous operations elsewhere,
operator wants the guests to have
Strategy for Protecting Crowded
to have re-assessed this type of
is diminished. There is nothing
Places from Terrorism, which
risk and to have reviewed their
that a business could do to prevent
states, “Owners and operators of
response arrangements. It is the
the result is a list of risks which
a disturbed individual or terrorist
crowded places have the primary
cost of doing business, whether
can be ranked and a decision
group from deciding to carry out
responsibility for protecting their
for profit or otherwise, that
made on any treatment of the
an attack, but it is feasible that
sites, including a duty of care to
such monitoring and reviews
risks. The goal is to be able to
they could reduce the likelihood of
take steps to protect people that
be ongoing. So, while the Las
decide whether to do anything
them using their venue.
work, use, or visit their site from
Vegas tragedy reminds everyone
a range of foreseeable threats,
to comprehensively consider
about a risk and, if so, what to do?
Can they reduce the
Risks are not static and
Emerging from this process is a
impact? Yes. Physical response
including terrorism”, while
all risks, especially those that
list of risks to be treated.
arrangements and effective
encouraging and promoting
do not promise to deliver a
training and coordination of staff,
information sharing, guidance and
tangible, positive business benefit,
as well as cooperation with law
strong partnerships between the
operators should ensure that risk
enforcement agencies, can reduce
private and public sectors.
management is built into business
Risks can be treated by: • avoiding the activity that generates the risk • mitigating the risk by reducing its impact or likelihood • transferring the risk through
the physical impact. Business
Should they accept the risk?
continuity and contingency
Risks whose severity is low, whose
processes rather than bolted on. n Simeon Votier worked in
plans can reduce the financial
likelihood is remote or where
insurance, outsourcing
and operational impact on the
the cost of mitigation or transfer
public service for over 25 years,
or sharing, such as in a
business. It may even be possible
outweighs the impact, are usually
providing risk advice on a variety
partnership
to offset the cost of mitigation
accepted. This is different from
of domestic and international
• accepting the risk.
by attracting patronage due to it
ignoring the risks altogether, as
topics affecting both the private
Looking again at a hotel/casino
being a safer facility.
some degree of monitoring and
and public sector. He has had
Can they transfer (some of)
review should be ongoing. After
posts overseas in high-risk
where the risk that the venue is
the risk? Yes. Diversification of
mitigating a risk, it probably still
countries and is a member of the
exploited to perpetrate a mass
investment is an obvious strategy.
exists at a reduced level and is
Risk Management Institution of
casualty attack on the public is
Insurance may be worthwhile.
then accepted. Sometimes a risk
Australasia (RMIA).
operator on the Las Vegas strip
securitysolutionsmagazine.com
026-029_SSM111 Article 1.indd 29
SECURITY SOLUTIONS // 29
20/12/17 4:39 pm
ALARMS
30 // SECURITY SOLUTIONS
030-033_SSM111 Alarms.indd 30
securitysolutionsmagazine.com
20/12/17 4:50 pm
believes he could get something
security systems from cyber attack
of value and get away with it.
cannot be understated. There is
Remember, he is looking for a
no system anywhere in the world
‘payday’ and not just a challenge.
that is safe from hackers. No one
He then notices a home close by is
will ever be able to completely
in the dark, has its front door open
stop attackers, but they can make
and it is obvious that nobody is
it harder.
home. Which one will the burglar
Imagine a burglar is walking
030-033_SSM111 Alarms.indd 31
enter? The point is, everyone
down a suburban street looking
should have security and it is no
for a ‘payday’ and comes across
different online and with an IP-
a standard home with lights on,
based security solution.
a high fence with a locked gate,
securitysolutionsmagazine.com
BY EMANUEL STAFILIDIS
VULNERABILITIES TRUSTED OF PARTNERS The importance of protecting
Security system designers,
cameras, an alarm, and so on. He
administrators and operators
could break in; he is capable and
must carefully consider and
SECURITY SOLUTIONS // 31
20/12/17 4:50 pm
ALARMS
protect against threats to the
To protect against the
Even if the network is
as if the system is open to the
physical security network. It is
internal and external threats,
completely separate and not
conceivable that a vulnerable
some organisations are
connected to the outside world,
security system could be the
physically separating their IT
the trusted insider still has access
to consider who will have access
opening needed to breach the
infrastructure by creating a
and can facilitate remote access
to the security network, who
facility. The vulnerability could
network for physical security
through open ports or access
will administer the network
allow the perpetrator to access the
applications that is separate
points. Equipment lockdown is an
and whether it is separate or
security network to compromise
from all other network use.
important aspect of controlling
connected with other networks.
the security system or use it as the
However, this may not be
general user access to functions
Will the security installation
bridge to the corporate and other
practical because infrastructure
and software that can lead to
contractor or the end-user’s
networks. Security managers must
and workstations on alternative
unauthorised system changes or
preferred IT contractor be
ask what can be done to minimise
networks are utilised for the
interactions. Network security
authorised to access the security
the impact of a breach.
security application.
must be thoroughly implemented
network? Who is trusted and
32 // SECURITY SOLUTIONS
030-033_SSM111 Alarms.indd 32
outside world. The security manager needs
securitysolutionsmagazine.com
20/12/17 4:50 pm
SECURITY SYSTEM DESIGNERS, ADMINISTRATORS AND OPERATORS MUST CAREFULLY CONSIDER AND PROTECT AGAINST THREATS TO THE PHYSICAL SECURITY NETWORK. IT IS CONCEIVABLE THAT A VULNERABLE SECURITY SYSTEM COULD BE THE OPENING NEEDED TO BREACH THE FACILITY.
to protect the security system?
That begs the question, who was
cybersecurity and research
This form of login is single-factor
speaking about security matters
companies, discovered they had
authentication in that it only relies
at board meetings?
been under attack. They found
on something the user knows. If
It is reported that 40 million
malware in their networks
the user passes this single bit of
credit and debit card records
information to someone else, then
were stolen and over 70 million
that person is able to login. This
total records of Target shoppers
has in place a range of
policy is insufficient, particularly
stolen. Total records included
measures, including the Cyber
when protecting against the
name, address, email address and
Security Operation Centre
trusted insider.
phone number. Target suffered a
within the Defence Signals
46 percent drop in profits for the
Directorate and a dedicated
is still one of the best methods
fourth quarter of 2013 compared
cyber investigations unit
of protection – something the
with the year before as a result
within the Australian Security
user knows and something
of the breach. They also spent
Intelligence Organisation
the user has or, even better,
$100 million on upgrading their
(ASIO). The Daily Telegraph
something he is, like a biometric.
payment terminals. The estimated
reported in 2011 that the
A second factor, such as a card
cost to banks and credit unions to
Central Intelligence Agency
or biometric, greatly assists
re-issue cards was $200 million.
(CIA) and Federal Bureau of
Two-factor authentication
with the protection of the
A class action lawsuit against
designed to spy on them. The Australian Government
Investigation (FBI) advised the
security network. HID Global
Target has resulted in a further
Australian Government that
are promoting the use of tap
$10 million proposed settlement
at least 10 federal ministers’
authentication, where it is
with affected consumers.
emails had been hacked and
how do managers know they
possible to use an access control
The settlement also required
the compromise occurred over
are capable of always following
card to login to workstations and
Target to appoint a CISO and
a one-month period. Chinese
procedures? It may be better to
all other devices, such as mobiles
maintain a written information
intelligence agencies were
utilise the end-user’s existing
and tablets.
security program.
among a list of foreign hackers
IT department to conduct
Recent reports have shown
Wikipedia reports, “The Sony
that were/are under suspicion.
administrative services, including
that once in, the hacker can
Pictures Entertainment hack
security of the network, because
cause immense damage. A quick
was a release of confidential
has also documented that a
they are internal staff and are
Google search will discover
data belonging to Sony Pictures
CCTV system installed within
already responsible for securing
recent breaches at JP Morgan
Entertainment on November 24,
a significant site has suffered
the existing corporate network.
Chase, Sony, UPS, The Home
2014. The data included personal
failures in the past due to
The security applied to
Depot, Target (US), the citizens of
information about Sony Pictures
“external influences”.
the network must ensure that
New York City, Kaspersky and the
employees and their families,
perpetrators are caught before
Australian Government; the list
emails between employees,
network-based security systems
they achieve their goal. If a
goes on and on.
The Australian Government
It is very clear that all
information about executive
must be fully protected. Network
The majority of breaches
salaries at the company, copies
security must be thoroughly
security network, they must be
reported appear to be debit and
of (previously) unreleased Sony
implemented as if the system is
quarantined before they steal,
credit card data related. The news
films, and other information.”
open to the outside world. The
tamper, alter or deposit data. They
reports concentrate on breaches
must be restricted so they cannot
that impact large members of
were that the breach was a
must ensure that perpetrators
turn on/off items that could render
the general public, such as debit
super-sophisticated attack,
are caught before they
the physical and/or IT security
and credit card holders. This may
but Joseph Steinberg of Forbes
achieve their goal. Two-factor
systems useless.
give security managers of critical
magazine believes that this seems
authentication is still one of the
infrastructure a false sense of
to be an over-exaggeration. The
best methods of protection and
penetrate a network is with the
security. Further investigations
lesson from the Sony 2014 hack
should be implemented to login
use of someone’s login details.
reveal that every industry is
is that organisations without a
to the physical security system. n
The management of user details,
being breached.
security solution that can limit
perpetrator does access the
A very easy way a hacker can
including login information,
Target’s US CEO stepped down
Reports on the Sony hack
damage internally are taking
security applied to the network
Emanuel Stafilidis has worked
is a very important task. The
after the massive data breach at
remarkable risks and being
in the electronic security industry
security manager must analyse
the end of 2013. It was reported
extraordinarily naive about the
since 1988 as a security systems
his organisation’s policy and
at the time that Target did not
advanced capabilities of today’s
integrator and a security consultant.
procedures relating to logging
have either a chief information
cyber attackers.
Emanuel is an independent security
in to the network. Is entering a
security officer (CISO) or a chief
username and password sufficient
security officer (CSO) in place.
securitysolutionsmagazine.com
030-033_SSM111 Alarms.indd 33
In June 2015, Kaspersky, one of the world’s leading
adviser and can be contacted at manuelst2@gmail.com
SECURITY SOLUTIONS // 33
20/12/17 4:50 pm
OPERATIONS BY RICHARD KAY
ALTERNATE OPTIONS: FIREARMS BEYOND QUALIFICATION TRAINING
PART2 Part 1 of this article in the
sight alignment and be prepared
who poses a threat to life whilst
previous issue of Security Solutions
to fire once a new sight picture is
moving and officers need to
Magazine introduced readers to
acquired. Looking first and then
track the firearm horizontally to
the importance of officers who
moving the firearm may be safer
maintain a sight picture.
carry a lethal force option on the
in regard to an unintentional
job receiving training in combat
discharge, but it may be
of moving the firearm up or down
shooting and began to discuss
dangerous in terms of reactive
on a vertical plane. A possible
some of the options available,
shooting to stop the threat. Quick
situation may be when the subject
beyond qualification training,
and proper assessment, accurate
has been shot, but he continues
that can assist officers in the
firing and safe handling are all
to pose a threat to life due to body
operational use of firearms. The
key aspects of tracking.
armour, enhanced physiology
discussion continues below.
34 // SECURITY SOLUTIONS
034-037_SSM111 Operations.indd 34
Horizontal tracking is the
Vertical tracking is the process
(alcohol/drugs), or strong goal
process of moving the firearm
orientation despite severe trauma,
Tracking
from side to side on a horizontal
such that further shots at his torso
Tracking means moving the
plane. Possible situations include
may not effectively gain control.
firearm to acquire a new sight
when engaging multiple subjects
Tracking down to the pelvic girdle
picture, most commonly vertical
who pose a threat to life and,
increases the chances of shots
or horizontal, depending on the
after firing at the most immediate
hitting and limits the subject’s
circumstances. When tracking,
threat, officers have to track to
mobility, whilst tracking up to the
move the eyes and firearm
the next most impending threat,
head is a more difficult shot but
together to maintain consistent
or when engaging a single subject
offers a high potential of control.
securitysolutionsmagazine.com
20/12/17 4:55 pm
securitysolutionsmagazine.com
034-037_SSM111 Operations.indd 35
SECURITY SOLUTIONS // 35
20/12/17 4:55 pm
OPERATIONS
Another situation is when the
Static drills are important
should move only as fast as they
include turning with the whole
subject is shot and he diminishes
for marksmanship, but once
can effectively engage, with trigger
body and/or simply rotating the
in height, by bending, kneeling or
proficient, officers should
discipline until ready to shoot.
upper body only.
falling, but he continues to pose
progress to dynamic drills that
a threat to life. Vertical tracking
involve tactical decisions, such as
with balance, whilst maintaining
movement uses suppressive fire
in this case may not necessarily
movement, cover, multiple threats,
operational capability and
to decrease a subject’s ability
involve firing more rounds, but
malfunctions and officer down.
attaining accurate sight pictures,
to engage officers. It involves
may be used to cover the subject
Movement should be smooth and
is an important skill to master.
organised, coordinated movement
before taking further action.
balanced to minimise the effect
Officers may be required to
in the safety afforded by the
of body motion on the front sight.
identify and engage targets from
suppressive fire laid down on
Movement Dynamics
Keep the knees bent and posture
a variety of directions – forwards,
the subject, keeping him pinned
Movement is a critical aspect of
over the feet and transfer weight
backwards, left, right and
down and forcing him to take
operational skill development.
smoothly across the feet. Officers
diagonally. Options for turning
cover until flanking officers engage
36 // SECURITY SOLUTIONS
034-037_SSM111 Operations.indd 36
The ability to turn smoothly
The concept of fire and
securitysolutionsmagazine.com
20/12/17 4:55 pm
him. Trigger and muzzle discipline
so suppressed that they lose sight
not likely to notice other officers
should be maintained when
of the subject. Whilst cover is the
moving off to the side where they
moving between cover positions,
best protection, officers can use
can get control. Distracting the
and officers should maintain
concealment when moving or
subject with covering fire may
good balance so they can move
taking cover to mask their actions
give officers more time to aim or
and react quickly to a threat in
from the subject.
get closer.
Tactical Options
control subjects, as they do not
disengagement, where officers
If officers come under fire, they
want to be harmed any more than
use fire and movement to cover
may all take cover until they decide
officers do. The rate of fire is also
each other and allow officers
they are not the ones being shot
important. Greater incoming fire
to tactically disengage to a safe
at. However, even once they know
is more intimidating, but if officers
distance, where they can cordon
they are not a target, they may still
run out of ammunition they are
and contain the situation and wait
be reluctant to move out of cover
not going to suppress the subject
for responding assistance.
unless required to do so. Self-
for long. By controlling the rate of
preservation is a powerful instinct
fire and firing consistently, officers
harder for the subject to track
and, under stress, officers are in
can keep from running out of
officers, giving him less of a target
pure survival mode and under
ammunition at the wrong time.
to shoot and possibly causing
control of the mid-brain.
any direction. It can also be used for tactical
Countermeasures make it
confusion. Countermeasures
Accuracy is a key factor to
Covering fire is used to
Officers should use teamwork to cooperate with each other to
MOVEMENT IS A CRITICAL ASPECT OF OPERATIONAL SKILL DEVELOPMENT. STATIC DRILLS ARE IMPORTANT FOR MARKSMANSHIP, BUT ONCE PROFICIENT, OFFICERS SHOULD PROGRESS TO DYNAMIC DRILLS THAT INVOLVE TACTICAL DECISIONS.
do not work if officers remain
decrease subject accuracy and can
locate and suppress the subject,
stationary, so they should move
play an important role to control
make sure they do not run out
tactically in an evasive manner.
a deadly force encounter because
of ammunition at the same time
On the range, targets do not shoot
Be unpredictable. Officers should
it can deny the subject specific
and not get out-manoeuvred.
back. Shooting is a physical and
move from cover to cover and
firing requirements, such as officer
Everyone should have an area of
mental discipline that requires
return fire from a different place
location, target area and aim
responsibility they have to cover
practice in order to maintain
to where they entered. When firing
point. If the subject cannot shoot
(arcs of fire). Officers should
proficiency. Much of survival
from behind cover, change firing
accurately, it decreases the chance
know their designated arcs of fire
depends on mental preparation
positions and places. When moving
of officers getting shot. Incoming
and maintain muzzle discipline
prior to an actual situation.
under fire, zig-zag randomly.
fire tends to encourage people to
when working with other officers
Without the will to prevail,
take cover first and worry about
to ensure fellow officers are
practising tactical skills may not
accuracy second.
covered and everyone is safe from
help officers survive.
When firing around the right side of cover, brace the body on the right side, and vice versa
Preventing the subject from
indiscriminate fire. It also ensures
Firearms training should
for left, for balance and to avoid
firing is the ultimate goal of
economy of fire, as officers only
prepare officers for a critical
unnecessary body exposure. Avoid
covering fire. If the subject is
have to cover their designated
incident, but to put the odds in
creating a silhouette and look
intimidated by officer fire, then
arc, trusting that colleagues do
their favour they must prepare
around objects, not over them.
officers can move with relative
likewise. Before engaging in
properly for such an event. Train
Reload only behind full cover;
safety. Suppression means to
multiple-officer drills, officers must
beyond the simplistic qualification
if proper cover is not available,
discourage the subject from firing
learn to control their arc and rate
skills of static marksmanship and
then be mobile. If officers
accurately. It takes time to acquire
of fire.
create a plan so the event can be
remain stationary for too long,
a target and aim and, if bullets are
Combat is chaotic, so good
subjects may employ their own
hitting near him, he might not be
communication is critical. Officers
Using alternate options and simple
countermeasures, so endeavour to
willing to take that time. Accurate
should be constantly talking back
first responder guidelines can save
keep moving. Moving and firing at
fire is what prevails in a deadly
and forth, telling each other where
lives. Be prepared. n
the same time can be inaccurate
force encounter, which is why
the subject is, who is doing what,
and slow down movement whilst
marksmanship is important.
who is reloading, who is firing
being exposed. Maintain smooth,
Covering fire can force the
practiced before it even occurs.
Richard Kay is an
at who and so on. Any subject
internationally certified tactical
stable balance to give a consistent
subject to move in a certain
movement should draw counter-
instructor-trainer, Director
sight picture at all times.
way, allowing officers to deliver
fire – if the subject sticks his head
and Senior Trainer of Modern
Flanking is effective because
accurate shots, or forcing them to
up, he is shot at; if he tries to fire
Combatives, a provider of
of tunnel vision, so officers should
retreat to a position that is more
at officers, he is shot at; if he does
operational safety training for the
continue scanning all around
exposed. It can also confuse or
anything but cower, he is shot at.
public safety sector. Visit www.
to avoid this. Officers should
distract the subject from officer
maintain constant awareness of a
activity. If the subject is too busy
there may not be time for the
subject’s location and avoid getting
cowering from officer fire they are
nuances of precision shooting.
securitysolutionsmagazine.com
034-037_SSM111 Operations.indd 37
During a violent confrontation,
moderncombatives.com.au for more information.
SECURITY SOLUTIONS // 37
20/12/17 4:55 pm
CCTV
38 // SECURITY SOLUTIONS
038-041_SSM111 CCTV.indd 38
securitysolutionsmagazine.com
20/12/17 5:02 pm
A NEW LOW-COST STORAGE METHOD FOR
HIGH-QUALITY
CCTV SURVEILLANCE BY LAMIE SAIF
The most difficult part in
• the scene scenario
with 3MP resolution and a
high resolution CCTV camera
• the compression level.
retention period of 30 days. The
surveillance used in critical
configuration parameters, chosen
infrastructure projects is the
The following provides examples
to provide the best monitoring
storage of incoming data from
of storage requirements when
quality, are:
cameras, especially when a long
using AXIS Design Tool and
• frame rate: 30fps
retention period is needed. The
provides a preferred design
• video encoding: H.264
size of the storage can be very high,
solution that fulfils the need
• compression: 10 percent
even for a low number of CCTV
for storage of high-quality
• recording: 24 hours per day
cameras. The storage of such data
CCTV images.
The monitoring condition for this
depends on the following factors:
The camera chosen for this
example is the Station monitoring
• the camera resolution
example is the AXIS M3106-L
scenario from AXIS Design Tool,
• the number of frames per
network camera. A total of 24
which produces the highest
cameras are used in the example,
amount of streaming data.
second (fps)
Figure 1: AXIS Design Tool – storage needed for 24 cameras at 3MP resolution and 30-day retention
securitysolutionsmagazine.com
038-041_SSM111 CCTV.indd 39
SECURITY SOLUTIONS // 39
20/12/17 5:02 pm
CCTV According to AXIS Design Tool,
enough. The reliability can be
the required storage using 3MP
increased partially for the 24
resolution and 30-day retention is
cameras by implementing one of
one set of 3MP cameras and
another server as a safe
156TB, as shown in Figure 1. This
these arrangements:
one set of VGA cameras. The
redundant solution.
amount of data (36 hard drives
1. The cameras should be
cameras are mounted in
safe redundant solution. 2. Use two sets of cameras –
The VGA resolution data stream can be stored on
x 5TB) needs to be arranged in
configurable multi-streaming
twins and each pair consists
Using the same configuration
three RAID 5 sets, with each RAID
cameras, with one stream
of one 3MP camera and one
parameters as above, according
set consisting of 12 hard drives.
for 3MP configuration
VGA camera side by side,
to AXIS Design Tool, the required
and one stream for VGA
with the same lens and
storage for 24 cameras using
infrastructure requires a higher
configuration. The VGA
sensor characteristics so
VGA resolution and 30-day
level of reliability, so one
resolution data stream can be
the same area is monitored,
retention is 15.2TB, as shown in
CCTV data stream may not be
stored on another server as a
but at different resolutions.
Figure 2.
Dealing with critical
Figure 2: AXIS Design Tool – storage needed for 24 cameras with VGA resolution and 30-day retention
The number of hard disks
data storage. The reason for
Storage Procedure
(SSD RAID) and the tape should
required for the 156TB, 3MP
choosing SSD is the high read/
The success of this method is
be ejected and replaced with a
option is 36 (5MB) arranged in
write speeds.
related to the configuration of
new one.
• In the case of low-budget
the backup software, which
RAID 5 stores 11 x 5 = 55TB. The
conditions, one LTO-6
is the most important part in
The New Scenario
number of hard disks required for
tape drive.
implementing this method.
If the same parameters as above
The backup should start after
are used again, but the retention
conditions, one LTO-6 tape
midnight by one or two hours, but
period is changed to one day,
library that covers the
this timing can be changed after
according to AXIS Design Tool, the
retention period.
testing. It should be configured
required storage for 24 cameras
to backup only the files that have
using 3MP resolution is 5.19TB,
been created and completed
as shown in Figure 3. This is well
before the current date. For
covered by SSD hard disks 9–10TB RAID 5.
three RAID 5 sets, where each
the 15.2TB, VGA option is 5 (4MB) arranged as RAID 5, 4 x 4 = 16TB.
Preferred Method The second arrangement – using one 3MP resolution camera and
• In the case of high-budget
• The LTO-6 tape storage capacity is 6.25TB compressed.
one VGA resolution camera in each pair – is the best option for a
Required Software:
example, if the backup starts at
better redundancy level.
• A backup program, such as
2am on 20/9/17, files up to 19/9/17
Required Hardware:
• The server that is used for VGA
Arcserve from CA. • A server with 10–11 SSD (1TB) arranged in RAID 5 for
40 // SECURITY SOLUTIONS
038-041_SSM111 CCTV.indd 40
should be included in the backup; any file that is still open should
resolution data storage can be
not be included. The backup files
used for the backup program.
should be deleted from the server
securitysolutionsmagazine.com
20/12/17 5:02 pm
Figure 3: AXIS Design Tool – storage needed for 24 cameras with 3MP resolution and 1-day retention At the beginning of the day, after
The benefits of this method:
the data has been stored in the
1. Less hard disks are required,
5. The number of CCTV cameras can easily be doubled and
backup program, process the
which means lower probability
what is required is a new SSD
backup of the stored data into the
of a hard disk crash and lower
RAID 5 set and another LTO-6
LTO-6 tape 6.25TB compressed;
power consumption.
drive with LTO-6 tape set plus
the size of this data in the SSD RAID is about 5.19TB (the daily stored data). The backup program
2. A safe copy of the tape can be created and kept in another location.
then deletes all the original files
3. It is easier to restore the data
from the SSD RAID and enough
information from any day
storage space is ready for the new
for forensic requirements
incoming data from the cameras.
without affecting the data
To cover the storing of streamed data for the whole retention period, there should
maximum frame rate and low compression. n Lamie Saif is a communication engineer, expert in CCTV
resolution server.
surveillance and computer
4. The retention period can be easily extended by increasing
retention period; in case of a 30-
the number of LTO tapes and
day retention period, 30–31 tapes
the VGA resolution server
are required.
storage capacity.
038-041_SSM111 CCTV.indd 41
data is at the highest level,
streaming into the high-end
be enough tapes to cover the
securitysolutionsmagazine.com
a new 5 HD x 4 TB RAID 5 set. 6. The quality of the stored
“The most difficult part in high resolution CCTV camera surveillance used in critical infrastructure projects is the storage of incoming data from cameras, especially when a long retention period is needed.”
networks and an inventor with two patents.
SECURITY SOLUTIONS // 41
20/12/17 5:02 pm
BUSINESS
42 // SECURITY SOLUTIONS
042-045_SSM111 Business.indd 42
OPINION
securitysolutionsmagazine.com
21/12/17 3:58 pm
Individual And Corporate Risks Are Not The Same In the first of a four-part series, Alex Sidorenko, founder and CEO of Risk-Academy, explains how the key to managing corporate risks is often through dealing with the individual risks of decision makers first.
securitysolutionsmagazine.com
042-045_SSM111 Business.indd 43
BY ALEX SIDORENKO
SECURITY SOLUTIONS // 43
21/12/17 3:58 pm
BUSINESS If there is one thing I learned
impact the achievement of
these challenges, I aim to do
into account. This will help
in my previous role as head
strategic objectives as somewhat
the following:
to cement the message
of risk at a multibillion-dollar
remote or distant.
• Demonstrate how proactive
that risk management
sovereign investment fund, it is
The important lesson is that if
risk management can benefit
is a part of normal
that risk management is not about
risk managers want management
individuals within the firm
managing risks. It is about helping
to pay serious attention to
and solve their personal
management make strategic,
corporate risks, they should
risks. Even basic things like
corporate objectives and
operational and investment
first help them deal with their
creating a paper trail for key
KPIs are also set based on the
decisions while keeping the risks
individual or personal risks.
decisions and risks taken
outcomes of risk analysis to
in mind.
Personal risks include things
by management can protect
help make the targets more
like maintaining their area
against any future enquiries.
It sounds simple enough,
performance management. • Work with strategy to ensure
realistic and achievable.
but it is anything but. Over four
of influence, building a solid
columns, I will share four valuable
reputation, advancing their career,
policies and find out how the
roles and responsibilities
lessons about integrating risk
not losing their job and protecting
bonus payments are calculated
into existing job descriptions,
management principles and
themselves from investigations
to understand whether it
policies, procedures and
methodologies into day-to-day
or prosecution.
drives any excessively risky
committee charters to reinforce
decision making. There is a big difference
Another aspect that has a
• Review existing remuneration
behaviour and what periods
• Include risk management
ownership and accountability.
huge impact on the quality of
are particularly vulnerable. For
Risk managers need to be
between the risks that the board
decision making, and hence the
example, employees usually
prepared that some managers will
is concerned about, such as
quality of risk management,
make much riskier decisions
ignore risks and take uncalculated
corporate risks, and the risks
is remuneration policy. Many
just before bonus entitlements
risks for a reason. Therefore, it
that individual managers worry
people are driven by their
are calculated.
is critical to understand what
about – often their personal risks.
financial self-interest much
It is quite natural for humans to
more than any corporate values
resources to ensure existing
consider risks that can potentially
or best practices. This has a
individual objectives and
some practical suggestions on how
impact them personally as
huge implication on the work
key performance indicators
to overcome cognitive biases when
significant and the risks that
of risk managers. To address
(KPIs) adequately take risks
managing risks. n
44 // SECURITY SOLUTIONS
042-045_SSM111 Business.indd 44
• Work with human
motivates each individual. In my next column, I will share
securitysolutionsmagazine.com
21/12/17 3:58 pm
READ OUR FREE DIGITAL MAG subscribepage.com/ssm110
SCAN CODE WITH YOUR CAMERA
securitysolutionsmagazine.biz
042-045_SSM111 Business.indd 45
21/12/17 3:58 pm
COVER STORY
46 // SECURITY SOLUTIONS
046-051_SSM111 Cover Story.indd 46
securitysolutionsmagazine.com
21/12/17 3:37 pm
CHOICE ARCHITECTURE BY MELISSA K WEINBERG
Economist Richard Thaler and
Tversky, flipped this whole idea
simple changes, called “nudges”,
that the motivation to avoid loss
psychology professor Daniel
on its head. Through a series of
can make huge differences when
is often twice as strong as the
Kahneman have something very
research studies, they showed
it comes to purchasing behaviour.
motivation to gain a reward.
unique in common. Besides both
that consumers are mere humans,
They cited an example from a
In the new method, exercisers
being authors of best-selling
who do not always behave in ways
school canteen seeking to address
commit to hand over a sum
books, they are both recipients
that reflect a rational, considered
the unhealthy food choices
of money (for example, $100)
of the Nobel Prize in Economic
decision-making process. Rather,
typically made by students.
if they do not adhere to their
Sciences, reflecting their
they often make decisions that are
contributions to the advancement
specifically irrational with regard
their customers to make better
specified amount of weight. Since
of the field. It makes sense that
to their longer term economic,
meal choices for the sake of their
the motivation to avoid losing
an esteemed economist could be
financial or security interests.
longer term health, a hard sell
the money is so strong, people
recognised in this way, but how on
They are susceptible to making
to hungry teenagers in any case,
are more likely to comply with
earth does a psychology professor
errors based on cognitive or
canteen staff took a different
their exercise programs under
win a Nobel prize in economics
emotional responses. The good
approach. They made subtle
these conditions.
and what could either of these
news is that we are not just stupid
changes to the way the food
From the Nudge Unit that
people have to do with security?
when it comes to decision making;
options were presented, like
was initially set up as part of
we are predictably stupid.
varying the order of the menu, or
the Cabinet Office in the UK
rearranging the display so that
government, to creative marketing
Their contribution to the field of economics comes down, most
It was Kahneman and Tversky
Rather than trying to convince
exercise regime and lose a
simply, to consumer decision
who introduced us to the term
healthier options were positioned
agencies applying the principles
making. Traditionally, economists
“behavioural economics”, setting
at eye level, to nudge customers
of behavioural economics to sell
went about their field of study
the stage for a huge paradigm shift
toward making healthier choices.
more products, nudge tactics
working to the theoretical
and changing the way economists
In another example, Thaler
assumption that consumers make
thought about economics. Thaler
and Sunstein applied Kahneman
to affect the way that people
decisions by carefully weighing
took the concept a step further
and Tversky’s concept of loss
make decisions.
the pros and cons, the costs
and coined the term “choice
aversion (described later)
and benefits of each decision,
architecture” to describe the
to propose a better solution
architecture is fancy and you
and choosing to maximise their
process by which designers can
for weight loss than positive
are looking for extra titles to add
chances of success. Decision
influence decision makers by
reinforcement. Rather than
to your CV, you too can quite
making was thought to be a
manipulating the way that choices
rewarding exercisers for
easily become a choice architect.
rational, considered process.
are presented to them.
adherence to their routine and
According to Thaler, “If anything
kilograms lost per week, they
you do influences the way people
And then along came Daniel
In his best-selling book Nudge,
are being used across the globe
If you think the term choice
Kahneman who, together with
Thaler, together with co-author
devised an alternate intervention
choose, then you are a choice
his late research partner Amos
Cass Sunstein, explained how
based on the understanding
architect.”
securitysolutionsmagazine.com
046-051_SSM111 Cover Story.indd 47
SECURITY SOLUTIONS // 47
21/12/17 3:37 pm
COVER STORY Why does our Brain do Dumb things? The simple answer to why our brain makes mistakes is because it is trying to help us. It is trying to make our lives easier by taking the quickest, most efficient path to finding a solution. Unfortunately, this comes at a cost of our more composed and calculated cognitive processes, so we make errors. It is the equivalent of when we say something offensive or unintentional in the heat of the moment, and then when we are calm we say, “I can’t believe I said that”. We make mistakes because we are operating on a different system, and when our slower rational system kicks in, we cannot believe how dumb we have been. In Kahneman’s 2011 book Thinking Fast and Slow, he described the two systems of decision making. System 1 is the fast, impulsive system and System 2 is the slower, more deliberative system. From a neuroscientific perspective, these systems reflect different operations of the brain. When information first enters the brain, it does so via the limbic system. The thalamus receives sensory information from the nervous system and its job is to classify it as either safe or threatening, with the help of another brain structure called the hippocampus, which has the task of applying memory and context to identify the incoming information. When the sensory information is perceived as threatening, System 1 is activated. We go into survival mode and blood flows to the parts of our brain responsible for rational thinking and problem solving; decision making is compromised. We are more susceptible to making errors because we are simply not working to our full cognitive capacity. Our brain is focused on
48 // SECURITY SOLUTIONS
046-051_SSM111 Cover Story.indd 48
securitysolutionsmagazine.com
21/12/17 3:37 pm
046-051_SSM111 Cover Story.indd 49
21/12/17 3:37 pm
COVER STORY doing what it was designed to do –
happening to us in the air are
protect us from harm. In its search
greater than they are, because it
for any information that will help
just happened it is more readily
to reach a solution as quickly as
available in our mind. If a close
possible, we resort to heuristics.
friend or colleague’s computer
These are shortcuts that our
contracts a virus, we are more
brains take to solving a problem,
likely to take action to mitigate
but they are not particularly
the risk ourselves, because we
trustworthy. The more uncertain
can easily recall an instance of a
the situation, the more likely
security breach close to home.
we are to engage in this style of thinking. On the other hand, once our
Social proof Social proof draws on our innate
hippocampus is able to apply
human desire to connect to
context and mitigate any threat,
others. We are more likely to
we are free to engage in System
make a choice if we have seen
2 thinking. Blood flows to the
all our friends do it – it is the
prefrontal cortex and we can think
herd mentality. In the absence
clearly, logically and carefully to
of adequate information about a
make smarter decisions.
product or problem, we will likely
With this knowledge, designers
default to whatever our friends,
can apply the principles and
or people like us, are doing,
theories of choice architecture
because we figure they either
to not only change the way they
must know something we do not,
present their product to the
or if it turns out we are wrong,
consumer, but also to understand
we can share the blame.
why people make decisions that are, in the term given to us by
Temporal discounting
Duke University Professor of
We tend to overvalue things that
Behavioural Economics Dan
present an immediate solution
Ariely, “predictably irrational”.
and discount the value of things that present a reward further into
How Irrational are We?
the future. Superannuation is a
In our everyday lives, we succumb
the problem of temporal
to a range of heuristics, or
discounting – it is very hard to
cognitive biases, that inform our
convince people to put money
decision-making process. The list
away for their retirement when
of heuristics is constantly growing,
they are 30 years old and they
but here are a few of the most
would really like to spend their
common ones we hear talked
money on a relaxing vacation.
about in this space.
We figure everything will be
good example that counteracts
alright when we are older, so Availability bias
we would prefer to reap the
This refers to the tendency to
benefits now even at the sacrifice
believe that the more easily we
of our future wellbeing. Anyone
can think of something happening,
who has seen the famous
the more frequent it must be.
marshmallow experiment has
After the Malaysian Airlines Flight
seen the dilemma we face when
370 went missing, airline concerns
presented with one marshmallow
and flight phobias were at an
now, or the potential to earn two
all-time high because people could
marshmallows if we can wait 15
easily recall an instance of flying
minutes. The struggle that we
gone wrong. We quickly believe
go through to choose rationally
that the chances of something
over emotionally is evidently
50 // SECURITY SOLUTIONS
046-051_SSM111 Cover Story.indd 50
securitysolutionsmagazine.com
21/12/17 3:37 pm
SECURITY, AS ESSENTIALLY A FEAR-BASED INDUSTRY, DRIVES US TOWARD MAKING MORE EMOTIONAL, LESS RATIONAL DECISIONS.
displayed through this example.
Application to Security
gets plenty of media attention,
Taking shortcuts to ensure
In what may seem like a major
so it is easily recallable and
our immediate security at the
contradiction, a signal of a
prominent in our minds in
expense of our future security
healthy functioning brain is
the days that follow. That is
is common.
its ability to deceive us, or to
availability bias.
maintain what are referred to as “cognitive illusions”. These
person into your building via
This refers to the fact that even
illusions serve to motivate us by
the secret backdoor so they can
though we like to feel that we
encouraging us to believe that we
help you fix an IT issue, without
have the right to express our
are in control of things we are
considering the impact of a
freedom of choice when it comes
really not in control of, and that
possible future security breach –
to making a decision, by being
we are all generally happier than
that is temporal discounting.
exposed to every option available,
most other people.
it is actually really distressing to
Using the same password for all your accounts because you
are disproportionately affected
figure the chances of it being
up less likely to make a decision
by one major cognitive error:
uncovered and used against
and less satisfied with our
unrealistic optimism. This is
you are very slim – that is
choice if we do end up making
the belief that more good things
unrealistic optimism.
one. Consumers need to feel
are likely to happen to us in the
that they have the opportunity
future than bad, and that bad
we are humans. And we will
to see everything on offer, but
things are more likely to happen
fall victim to cognitive biases
narrowing the selection for them
to other people than to us.
and heuristics, often at the
that a decision will be made.
So, when it comes to being
We are not rational actors,
times when we are under most
robbed, having our passwords
pressure to make the ‘correct’
hacked, or having our identity
decision. So, what do you do
Loss aversion
stolen, we are all driven to do
about it? Armed with this
Even though we really like to win
little by way of prevention by
knowledge, how can you become
things, not losing is actually better.
insisting that these things will
an architect of choice to improve
This is best illustrated in a study
only happen to everyone else.
the security and wellbeing of
by Kahneman and Tversky where
Security, as essentially a fear-
those around you? n
they showed that if a person
based industry, drives us toward
loses $10, giving them back $10
making more emotional, less
Want to learn more? Download
does not equalise their emotional
rational decisions – to System
the Bad Decisions podcast from the
state, even if their bank balance is
1 thinking.
iTunes store, where Dr Weinberg
neutralised. Experiments showed
046-051_SSM111 Cover Story.indd 51
When it comes to security, we
have too much choice and we end
makes it a whole lot more likely
securitysolutionsmagazine.com
Letting an unauthorised
Choice paradox
Everyone thinks the likelihood
and her co-host, Dan Monheit,
that after losing $10, it took a gain
of a terrorist attack occurring is
explore why we choose what we
of $20 to recover the emotional
stronger immediately following
choose, why we think what we
loss and restore a person’s mood
another terrorist attack – it is an
think, and how to exploit this stuff
to where it was before the loss.
emotionally charged event that
for fun and commercial gains.
SECURITY SOLUTIONS // 51
21/12/17 3:37 pm
LEGAL Q&A
THE TOP 10 THINGS YOU NEED TO KNOW ABOUT WILLS BY ANNA RICHARDS
Many people involved in the
only has effect or is enforceable
maker with a certificate stating
lack capacity another day due to
security industry face greater risks
upon the death of the will maker.
that it is his opinion that the will
the course of his illness, his level
maker does or does not have the
of medication, his exposure to a
requisite capacity to validly make
particular medical treatment and
seemed relevant to write an article
Point 2 – Who Cannot Make a Will?
a will.
other matters.
about how a person can plan for
Generally speaking, a will cannot
If the will maker lacks such
the distribution and allocation
be made by:
capacity, it is not lawful for him
is that the will maker has
of assets, liabilities and financial
• a minor (person under the age
to make a will. That is, if he
capacity both:
proceeded to make a will, it could
• at the time of providing
of premature death than people who work in other industries, so it
resources upon his or her death. To provide readers with a basic understanding about wills
of 18 years); or • a person who lacks the capacity to make a will.
and issues to look out for, I will address some major points of interest, as they relate to Victoria, that tend to come up in repeat enquiries from clients.
Point 3 – How is a Person’s Capacity Relevant to Making a Will?
Hence, what is important
be challenged as being invalid
instructions about how he
due to his incapacity at the time of
wishes his will to dispose of
making it.
his assets and liabilities (and
In addition to medical evidence, lawyers are required to make their own assessment as to
hence how the will should be drafted); and • at the time of signing the will
whether a will maker does or does
and hence giving effect to
Where there is some concern
not have the capacity to make
those wishes.
into two parts; part 2 will be
about a will maker’s ‘capacity’ to
a will. In some cases, a medical
published in the next issue of
provide instructions about how
certificate may be provided
Security Solutions Magazine.
his will should be drafted and to
(which states that the will maker
Let’s get started with
understand the consequences of
had capacity at the time of the
Point 4 – Signing and Witnessing Requirements
those instructions, it is prudent
medical assessment), but the
Normally, for a will to be valid
to obtain some medical evidence
lawyer nevertheless assesses the
it has to comply with various
about the will maker’s capacity to
client as lacking capacity at the
statutory requirements pertinent
validly make a will.
particular time that the client
to the state in which it is made. In
attempts to provide instructions
Victoria, it must be:
The article has been divided
discussing what a will actually is.
Point 1 – What is a Will? A will is a document that sets
The starting point should be
out instructions about how the
for the will maker to have his GP
about what he wants to happen
• in writing; and
will maker wishes to dispose of
make that assessment (if the will
with his estate.
• signed by the will maker or
his assets (items of property),
maker clearly has full capacity) or
liabilities (debts) and financial
otherwise for the GP to refer the
uncommon because there are
resources (right to receive a
person to a specialist doctor, such
various degrees of incapacity
benefit which is not yet property,
as a geriatrician, to carry out an
and degrees of capacity can also
such as superannuation, pensions
assessment. The relevant doctor
change over time. A will maker
and the like) upon his death. A will
should then provide the will
may be lucid one day and then
52 // SECURITY SOLUTIONS
052-053_SSM111 Legal Q and A.indd 52
This situation is not that
someone on his behalf; and • signed by the person with the will maker’s intention of executing a will; and • signed by or on behalf of the will maker in the presence of
securitysolutionsmagazine.com
21/12/17 10:30 am
two or more witnesses, who
Secondly, that same exception
must be present at the same
also applies to a clause under an
time (hence, there needs to be
existing pre-marriage will which
at least three people present at
appoints the future spouse as an
the same time, including the
executor under the existing pre-
will maker); and
marriage will. The marriage of
• attested and signed in the
the will maker and executor will
presence of the will maker by
not then revoke the clause which
at least two of the witnesses,
appointed the future spouse as
but not necessarily in the
an executor.
presence of each other.
Also, if a new will is
NORMALLY, FOR A WILL TO BE VALID IT HAS TO COMPLY WITH VARIOUS STATUTORY REQUIREMENTS PERTINENT TO THE STATE IN WHICH IT IS MADE.
It is easy for any one of the
established to have been made
above requirements to be
in contemplation of marriage
or in his or her favour a power
the will, it is clear that it was the
overlooked and to result in a will
and hence in the context that the
of appointment, except where
will maker’s intention at the time
inadvertently being invalid.
will maker will be marrying a
the power of appointment can
of making his will that the act of
particular person, then the actual
be used by the divorced spouse
divorce should not affect those
marriage, in those circumstances,
in favour of children of the will
clauses of his will which relate to
would not have the effect of
maker and the divorced spouse;
his former spouse.
revoking the will.
and
Point 5 – What Effect does Marriage have on a Will? The general rule under Victorian
The best way of guarding
• it revokes any clause which
In the next issue, we will look at issues around the consequences
legislation is that an existing
against the risk of a pre-marriage
appoints the divorced spouse as
of an invalid will, why some wills
will is revoked by the marriage
will being revoked by marriage
an executor, trustee, advisory
get challenged, how to prevent a
of the will maker. For example,
is to include a clause in the will
trustee or guardian, except
will being challenged and why such
if the will maker (person A)
which states that the will is made
where it appoints the divorced
challeges are often settled out of
made a will prior to marriage
in contemplation of the future
spouse to be the trustee of
court. n
which appointed his siblings as
marriage of the will maker to the
property which is to be held
his executors and beneficiaries
particular person. That way, it is
upon trust for beneficiaries
under the pre-marriage will,
clear on the face of the existing
which include children
director and a lawyer from
then upon marrying his spouse
pre-marriage will that the will
of the will maker and the
Victorian Legal Solutions Pty Ltd.
(person B), the existing pre-
maker had fully considered the
divorced spouse.
She practises in commercial law,
marriage will would be revoked
consequences of marriage and had
Again, there is an exception to
including commercial litigation and
and hence not operate as a valid
made decisions about who were to
this general rule if it is clear that
other areas. Anna and Victorian
will. Therefore, if person A died
be the executors and beneficiaries
the will maker did not wish for
Legal Solutions can be contacted
after marriage but before making
under the pre-marriage will with
clauses in a pre-divorce will which
by telephone on (03) 9872 4381 or
a new will (a post-marriage or ‘in
that in mind. This removes the
related to the divorced spouse to
0419 229 142 or by email at info@
contemplation of marriage’ will),
potential argument that the will
be revoked.
victorianlegalsolutions.com
then person A would potentially
maker in fact wanted to benefit
die intestate. The consequences of
other people and not those stated
the will maker (person A) intended
taken to ensure its accuracy, the
dying intestate will be discussed
in his latest will, but just failed to
to divorce person B, person A
information contained in this
later in this article.
get around to formally changing
nevertheless wished to either
article is intended to be used as a
his will.
appoint person B as an executor
general guide only and should not
and/or trustee under the will and/or
be interpreted as being specific
as a beneficiary under the will. In
advice, legal or otherwise. The
such a case, the mere act of divorce
reader should seek professional
possible. However, there are
Point 6 – What Effect does Divorce have on a Will?
would not revoke those clauses of
advice from a suitably qualified
some exceptions to that general
Generally speaking, under
the will which relate to person B.
practitioner before relying upon
rule. Firstly, if a will made prior
Victorian law, the divorce of the
However, the best way of
any of the information contained
to marriage contains a clause
will maker has the following
guarding against the risk of divorce
herein. This article and the opinions
which states that the future
consequences on a will made by
affecting clauses of an existing will
contained in it represent the
spouse is a beneficiary under the
the will maker prior to the divorce:
which relate to the will maker’s
opinions of the author and do not
existing pre-marriage will, then
• it revokes any clause which
former spouse is to state, at the
necessarily represent the views
This means that upon marrying, a person with an existing will should generally make a new will as soon as
By way of example, even though
Anna Richards is the legal
Whilst every effort has been
that particular clause will not
benefits the divorced spouse;
time of making the will, that it is
or opinions of Interactive Media
be revoked upon the will maker
and
contemplated at that time that
Solutions Pty Ltd or any advertiser
the will maker and spouse may
or other contributor to Security
divorce. That way, on the face of
Solutions Magazine.
and beneficiary/future spouse getting married.
securitysolutionsmagazine.com
052-053_SSM111 Legal Q and A.indd 53
• it revokes any clause which grants to the divorced spouse
SECURITY SOLUTIONS // 53
21/12/17 10:30 am
FEATURE
54 // SECURITY SOLUTIONS
054-057_SSM111 Article 2.indd 54
securitysolutionsmagazine.com
20/12/17 5:23 pm
There Are Many, and They May Be More Dangerous Than the Men BY ANNE SPECKHARD, PH.D. & ARDIAN SHAJKOVCI, PH.D. / FROM DAILY BEAST
This report from the International Center for the Study of Violent Extremism raises frightening questions about women returning from the ‘caliphate’ – if they can return at all.
BRUSSELS – When she was
with their male counterparts, was
Laura Passoni was abandoned
have been beheaded, and she
rooted in grave concern about al-
by the father of her young son.
would have been returned to
Assad’s sheer brutality in Syria,
Determined to deepen her
Raqqa, then forced into marriage
and in response to the political
expression of faith and in hopes of
with another fighter. Other
impasse in the country.
attracting a man who would keep
women who have tried to escape
his commitments to marital and
have been raped and in some
by ISIS’s, and before that al-
family life, Laura responded by
cases murdered by smugglers,
Qaeda’s, narrative that Islam,
putting up a more devout Facebook
according to the accounts of eye
Muslim people, and Muslim lands
profile, and very quickly she was
witnesses in our ISIS Defectors
are under attack by Western
contacted by an ISIS recruiter.
Interview Project.
powers and that a defensive jihad
Passoni’s story follows
Others were already incited
is necessary.
would never leave her, a home
patterns similar to those of
in Syria, training as a nurse, and
many women who join ISIS. The
by graphic YouTube videos of
a good school for her toddler.
path to violence almost always
real suffering and injustices
Broken-hearted and wanting to
involves the classic interaction of
perpetrated against Muslims
believe, Passoni agreed to embark
four important factors: a group,
worldwide under dictators
on a journey to the Islamic State.
its ideology, social support,
propped up by Western powers.
and personal motivations and
The psychological impact of
State was far from what she had
vulnerabilities. But there are also,
images of wars prosecuted by
envisioned, however. She ended
commonly, more specific reasons.
Westerners combined with
Her induction into the Islamic
up staying in a “sisters’ house”
One is political outrage. Many
These women were lured
civilian casualties may have
while her husband went off
Muslim women as well as men
played an important role in their
to receive sharia training and
around the globe witnessed
decision to try to help defend
become a fighter. Passoni became
the whole of Syria collapse into
the weak.
deeply disappointed as she found
anarchy and violence under
herself confined at home while
Bashar al-Assad. They grew
judgment, women and girls
her husband was away battling
furious watching al-Assad’s
often make their assessments
for the group. None of the ISIS
scorched earth policy towards
more relationally than men, and
recruitment promises materialised
not only opposing combatants
may judge what might normally
– no nurse training and no riches.
but also against Syrian civilians.
be defined as an immoral act
That these atrocities continue
to be moral if it saves a life,
to convince her husband to join
to this day and often are just as
particularly the life of someone
her in an effort to flee, and with
brutal as what ISIS does to local
to whom a woman is related to.
the help of smugglers the little
populations that defy its rule is
family of three found its way back
not lost on potential recruits. The
successful at garnering loyalties
to Belgium.
motivation for some women who
in support of a transnational
Eventually, Passoni managed
054-057_SSM111 Article 2.indd 55
joined early in the conflict, as
her husband most likely would
He promised her a man who
securitysolutionsmagazine.com
If they had been caught,
just 19, and a convert to Islam,
In fact, in studies of moral
ISIS and al-Qaeda have been
SECURITY SOLUTIONS // 55
20/12/17 5:23 pm
FEATURE ummah (Muslim community) and building up the idea of a greater family (fictive kin, in the jargon of social science) through the formation of the so-called Islamic Caliphate. They have been successful tapping into various dimensions of populism and promote a doctrine that not only attempts to play on Muslim sentiments worldwide but also unifies Muslim demands against a common enemy – the West. Add to the mix the complex discourse on marginalisation and discrimination of Muslim women in the West. Women in Europe who want to wear headscarves or niqab (full-face covering), or a burkini for that matter, may find themselves on the wrong side of the law in some countries. They also may be sidelined in the workplace or passed over for jobs. Some may be harassed on the streets. Recruiters who are promising female empowerment and emancipation, both political and economic, can be very persuasive to women who are feeling disillusioned and distressed by living in the West. They are told of a utopian state where all Muslims are included and where being a Muslim is an advantage versus a disadvantage; where personal dignity, honour, purpose, significance, and the material benefits of free housing, job training, free health care, matchmaking and salaries are promised to all who join. For many women who join ISIS, the geographical relocation to Syria and Iraq serves as an attractive escape from personal and emotional problems – for example an overbearing, violent, and drunk father or husband – or the inability to attract a man considered a proper mate. Until very recently, when it started losing significant swaths of territories in Iraq and Syria,
56 // SECURITY SOLUTIONS
054-057_SSM111 Article 2.indd 56
securitysolutionsmagazine.com
20/12/17 5:23 pm
ISIS claimed to embody the
her child and nurse it, for, as
actualisation of Islamic ideals.
they texted, “The baby is ours.”
Women were invited to join in
She eventually made it out with
hopes they could win forgiveness
the child.
Anne Speckhard, Ph.D.
who has seriously “sinned” could
ICSVE researchers have been
redeem him or herself by joining
able to compile, foreign women
the Islamic State and, best of all,
who join ISIS return at a much
WOMEN WHO HAVE BORNE CHILDREN INSIDE ISIS TERRITORY HAVE ENCOUNTERED DIFFICULTIES ESCAPING WITH THEIR CHILDREN, WHO LACK OFFICIALLY RECOGNISED IDENTITY DOCUMENTS.
by volunteering for a suicide
lower rate than men. It is
ISIS internet recruiters such as
Defectors: Inside Stories of the
mission. There is nothing like
unlikely that’s because they
Umm Laith and Bird of Janna
Terrorist Caliphate; Undercover
“martyrdom” to guarantee to the
want to remain with the group.
[Paradis], they likely believed
Jihadi; and Warrior Princess.
person who comes to believe in it
It probably reflects the fact that
they were embarking on a
Dr. Speckhard has interviewed
an immediate place in paradise.
it is difficult for a woman to
romantic and heroic venture
nearly 500 terrorists, their
escape ISIS with no money of
to better the world and find
family members and supporters
to be coerced, or even forced,
her own, living constantly under
unconditional love, trust and
in various parts of the world
into following their men into
the control of men, going outside
loyalty. Promises of an Islamic
including Gaza, West Bank,
Islamic State. In some cases, fears
the house only with difficulty,
life, riches, and torrid love affairs
Chechnya, Iraq, Jordan, Turkey
of abandonment, loyalty, and
then facing the depredations
are common fare among male
and many countries in Europe.
coercion do play a role.
of smugglers once they are on
and female Internet recruiters.
In 2007, she was responsible
for their sins and thus attain
Laila, fortunately, did not face
paradise when they pass into the
the fate of many women who are
next life.
smuggled alone back to safety –
According to the caliphate’s preaching, any man or woman
Women are often believed
Such is the case of a European we’ll call Laila. When her fiancé
rape and coercion by criminals. According to the statistics
their way. Women who have borne
French journalist Anna Erelle,
is Adjunct Associate Professor of Psychiatry at Georgetown University in the School of Medicine and Director of the International Center for the Study of Violent Extremism (ICSVE) where she heads the Breaking the ISIS Brand – ISIS Defectors Interviews Project. She is the author of: Talking to Terrorists, Bride of ISIS and coauthor of ISIS
for designing the psychological
posing as a younger vulnerable
and Islamic challenge aspects
first flew to Istanbul to join the
children inside ISIS territory
teen, was contacted by a French
of the Detainee Rehabilitation
Islamic State, she turned him
have encountered difficulties
fighter the same day she posted
Program in Iraq to be applied to
in to police. Laila thought she
escaping with their children,
his video on her fake Facebook
over 20,000 detainees and 800
had saved him from going to
who lack officially recognised
profile. Internet relationships
juveniles. Her publications are
ISIS, only to find out after her
identity documents. A Belgian
can easily provide frequent
found here:https://georgetown.
marriage that he had not given
ISIS mother, for instance,
contact and convey caring and
academia.edu/AnneSpeckhard
up his dream.
contacted her consulate in
real intimacy. Her recruiter
Website:http://www.icsve.org
Turkey before attempting to
dogged her constantly, Skyping,
her with the difficult choice
escape ISIS territory, only to
texting and talking with her
the Director of Research and a
of divorce if she refused to let
be told that her husband, the
multiple times a day. To a lonely
Senior Research Fellow at the
him join ISIS, or, as he told her,
father of her babies, would
and confused young woman, this
International Center for the Study
“being a good Muslim wife who
also need to be present to
can be an intoxicating amount
of Violent Extremism (ICSVE). He
supports and follows the lead
apply for and receive papers
of attention. Internet recruiters
has been collecting interviews
of her husband.” Hoping that it
for her children. She decided
often talk to them more than
with ISIS defectors and studying
would be all he believed it could
to stay put rather than attempt
their own family members,
their trajectories into and out of
be, she followed him.
escape with no certainty of
honing in on vulnerabilities
terrorism, as well as training key
ensuring her children’s eventual
and needs.
stakeholders in law enforcement,
Laila’s husband presented
Laila’s husband was killed,
Ardian Shajkovci, Ph.D. is
leaving her pregnant and
documentation according to
fearing she would be forced,
interviews we conducted in
at some of the other motivating
countering violent extremism
like other ISIS widows, to marry
Belgium last year.
factors that lead women to join
professionals on the use of
ISIS as well as what can and
counter-narrative messaging
another fighter. Laila’s father
ISIS has managed to attract
In the next issue, we will look
intelligence, educators, and other
courageously struggled to hire a
both adults and teen girls.
should be done with returning
materials produced by ICSVE both
series of smugglers to get her out
Schoolgirls from London to
female recruits. n
locally and internationally. He is
before her baby was born inside
Scotland to the Netherlands to
the Islamic State, and she agreed.
Kyrgyzstan have run away to
The full article is available
holds a doctorate in Public Policy
But as she began her perilous
ISIS. Some were enamored of
from Daily Beast http://www.
and Administration, with a focus
road to freedom, ISIS, realising
adventure and excited by men
thedailybeast.com/beware-
on Homeland Security Policy,
she was on the run, messaged
who lured them with promises
the-women-of-isis-there-are-
from Walden University. He is
her parents demanding that she
of romance.
many-and-they-may-be-more-
also an adjunct professor teaching
dangerous-than-the-men
counterterrorism courses.
return to the group to first bear
securitysolutionsmagazine.com
054-057_SSM111 Article 2.indd 57
Turning to the blog posts of
fluent in several languages. He
SECURITY SOLUTIONS // 57
20/12/17 5:23 pm
FEATURE
58 // SECURITY SOLUTIONS
058-061_SSM111 Article 3.indd 58
securitysolutionsmagazine.com
21/12/17 10:34 am
HELD AT RANSOM How To Keep You And Your Business Safe From A Ransomware Attack BY GARRY BARNES
cybercrime. Juniper Research
What is Cyberextortion and Ransomware?
(2015) estimates the cost of
Cyberextortion is an attack or
cybercrime will climb to an
threat that is tied to a demand
estimated US $2.1 trillion by
for money to prevent or stop the
2019, far exceeding the revenue
attack. Cybercriminals implement
generated by more traditional
ransomware that encrypts data
criminal activity, such as the drug
on files, preventing users from
trade, estimated at US $600 billion
gaining access. The ransomware
(James, 2015).
contains a demand for payment
Every day, people are bombarded with more news about
According to Kaspersky
to unlock the system. These
ransomware attacks targeting
payments are routed through
organisations tripled from
untraceable digital currencies, via
January to September 2016,
SMS, Bitcoin or simply using cash
affecting one in every five
transfer systems.
businesses worldwide. They
securitysolutionsmagazine.com
058-061_SSM111 Article 3.indd 59
to obtain the decryption key
Lab (2016), the number of
Surprisingly, many enterprises
estimated a ransomware attack on
and individuals pay the
businesses occurred once every
ransom, finding it cheaper and
40 seconds, and for consumers
timelier than trying to break
once every 10 seconds.
the encryption, only to find out
SECURITY SOLUTIONS // 59
21/12/17 10:34 am
FEATURE
that payment of the ransom
Cybercriminals use a variety
does not always guarantee the
of techniques, including social
cybercriminals will provide the
engineering, email and web pop-
decryption key. The IBM X-Force
ups. The CTB-Locker, discovered
Ransomware report issued in
by McAfee in 2015, led to a rise
December 2016 found 70 percent
in attacks, using malware as a
of US businesses paid hackers
common distribution method,
to regain access to their files.
as well as enabling it to be easily
The majority of these businesses
added to phishing campaigns.
paid more than US $10,000 and
Recently, ransomware has been
20 percent paid more than US
detected in content management
$40,000.
systems, such as Joomla! and
Currently, ransomware
WordPress. And the SynoLocker
cybercriminals are targeting
strain of ransomware targets
the desktop and Android phone
network storage devices.
devices of both individuals and
being paid. But do not be fooled
Protecting your Business from becoming a Victim of Cyberextortion
that this is not happening on
There are a number of
Australian shores. In 2016,
requirements businesses and IT
TrendMicro reported more than
professionals should consider and
1.1 million ransomware threats
understand in order to protect
were detected in Australia from
the most valuable assets and data
January to June.
from being stolen. Education
organisations in North America and Europe, where there is a higher likelihood of the ransom
60 // SECURITY SOLUTIONS
058-061_SSM111 Article 3.indd 60
securitysolutionsmagazine.com
21/12/17 10:34 am
and security awareness training
regularly – patch on a regular,
Keeping current with the
is also needed throughout the
organisationally defined basis.
latest threats and updating the
organisation so that employees are
8. Apply distributed denial of
incident response plan and
vigilant and cautious with links
service (DDoS) armour – invest
security awareness training is
and attachments in unsolicited
in DDoS attack protection
just as important as updating
emails, and avoid clicking on pop-
to be able to absorb DDoS
quarterly sales forecasts and
ups on websites.
attacks without significant
business plans. n
In conjunction with ISACA’s Cybercrime: Defending Your
system degradation. 9. Develop an enterprise incident
For a full list of
Enterprise white paper released
response plan – create a plan
references, email admin@
earlier this year, here is a top 10
and exercise it regularly across
interactivemediasolutions.com.au
list to minimise the risk:
all departments to ensure
1. Know what constitutes your
effective communication and
lead, Governance Advisory at
enterprise data – understand
maintain basic continuity
Vital Interacts (Australia). He has
the data that you own and
of operations.
more than 20 years of experience
what is at risk. 2. Back up enterprise data – then back it up again. Create
10. Use a web pop-up blocker
in information and IT security, IT
to prevent clicking on
audit and risk management and
infected ads.
governance, having worked in a number of New South Wales public
data backups regularly. After
storage device until backing
What to do if your Business has been Attacked
up again, or consider using the
Hopefully, with the processes
cloud to backup data.
and protocols in place, your
successfully backing up the data, disconnect the backup
3. Conduct re-occurring
another statistic or make headline
– implement brief quarterly
news. However, if an employee
blocks of training that focus
at your business is successfully
on preventing phishing,
targeted, a quick response is
waterholing and other social
needed by the employee, hence
engineering attacks.
the value of security awareness
4. Restrict network access
training. Your organisation will
according to the principle of
need to activate its incident
least privilege – ensure that
response plan, including alerting
administrators and employees
the service desk so it can contain
only have access and privileges
the impact and prevent others in
on the network that are
your business from falling victim.
necessary for them to perform
The IT professionals will also need
their jobs.
to initiate recovery of data from backup and restoration of the
technical tools to mitigate
operation system and applications
intrusions – ensure the use
from a reliable copy, once the
of robust firewalls, intrusion
attack has been isolated and
detection systems, end-
thoroughly cleansed.
point protection and antivirus technology. 6. Evaluate security settings
Over the last 25 years, cybercrime silently evolved from an abstract idea into tangible,
of web browsers and email
real threats to corporations. Until
software to ensure that they
global cooperation from both
provide an appropriate level
public and private sectors can
of security to meet business
adequately combat cybercrime,
requirements (e.g. auto
just as businesses capitalise
scanning of all attachments
and use technology to enhance
and whitelisting websites).
services and remain competitive,
7. Update software patches
securitysolutionsmagazine.com
058-061_SSM111 Article 3.indd 61
sector agencies and in banking and consulting.
organisation will not become
security awareness training
5. Employ the appropriate
Garry Barnes is practice
KEEPING CURRENT WITH THE LATEST THREATS AND UPDATING THE INCIDENT RESPONSE PLAN AND SECURITY AWARENESS TRAINING IS JUST AS IMPORTANT AS UPDATING QUARTERLY SALES FORECASTS AND BUSINESS PLANS.
so too will cybercriminals.
SECURITY SOLUTIONS // 61
21/12/17 10:34 am
AVIATION
BY STEVE LAWSON
AIR MARSHALS A WORTHWHILE PROGRAM?
62 // SECURITY SOLUTIONS
062-065_SSM111 Aviation.indd 62
securitysolutionsmagazine.com
21/12/17 11:21 am
I have been in the interesting
aircraft to Tunis, but the Tunisian
position of going to both the US
authorities refused permission to
and Israeli air marshal schools,
land and the aircraft eventually
not as a student but as a member
returned to Beirut where the
of the team sent by the Australian
terrorists released the passengers
Government to assess the training
and destroyed the aircraft.
provided. It was not long after
So, why is this an interesting
September 11 and other countries
incident in a discussion about
also sent teams to look at these
air marshals? I cannot recall the
organisations, especially Israel’s
number of Jordanian air marshals
program. We met up with teams
on the aircraft, but I think there
from Europe and Asia, so I got
were about eight of them. They
quite a cross-section of the air
were quickly identified, captured
marshal community. Our hosts
and tortured to surrender the
were more than happy to show off
location of automatic weapons
their programs and facilities. I am
onboard the aircraft.
not going to give any confidential
Another incident of interest is
information, but I want to
El Al Flight 219 from Schiphol to
discuss the effectiveness of air
New York on 6 September 1970.
marshal programs.
That aircraft had armed Israeli
On 11 June 1985, Fawaz
security officers on board and
Younis, a Shiite Muslim, hijacked
an ‘interesting’ aircraft captain,
Royal Jordanian Airlines Flight
Uri Bar-Lev. Israeli airport
402 at Beirut Airport. In 1985,
security were suspicious of four
the presence of Palestinians in
passengers – two Senegalese
Lebanon was the cause of some
and two Honduran. The two
tension. At a meeting in Tunis that
Senegalese were barred from the
week, the Arab League passed a
aircraft and the two Honduran
resolution calling for a ceasefire
were to be subjected to additional
in and around Palestinian districts
inspection, but that did not
besieged by Shiite militiamen on
happen. Captain Bar-Lev was still
the outskirts of Beirut and for
suspicious and told one of the
the withdrawal of the Shiites. In
security officers that he wanted
protest, Younis intended to fly the
him on the flight deck rather
securitysolutionsmagazine.com
062-065_SSM111 Aviation.indd 63
SECURITY SOLUTIONS // 63
21/12/17 11:21 am
AVIATION
ON AVERAGE, US FAMS MAKE A LITTLE OVER FOUR ARRESTS EACH YEAR – THAT IS NOT EACH FAM MAKES FOUR ARRESTS; COMBINED THEY ONLY MAKE FOUR ARRESTS!
than sitting in first class. The
be taken, so he told the security
his return to Israel – apart from
would have been successful even if
security officer objected that this
officer to strap himself in and put
diverging from standard operating
no security officers were present.
was contrary to normal operating
the aircraft into a negative g dive
procedures (SOPs) and disobeying
procedures, or maybe he was not
and, when he pulled out of the dive,
a direct order from Israeli
happened so long ago as
keen on giving up his comfy seat
the security officer rushed into
authorities, his diversion to London
examples? To be honest, it is
for an uncomfortable jump seat. As
the main cabin, killed the terrorist
meant that a very high-value
because there have not been
the aircraft climbed from Schiphol,
with the handgun and arrested
terrorist was surrendered to the UK
many worthy examples since
the Honduran passengers, armed
the other – Leila Khaled, a famous
authorities and they released her
then – and that is not because of
with hand grenades and a pistol,
Palestinian terrorist, who had
within days as part of their own
successful air marshal programs.
demanded access to the flight
passed out. Unfortunately, the head
hostage negotiations.
You could argue that Israel’s
deck. Standard procedure for most
flight attendant had charged the
airlines at that time was to obey
hijackers and been shot multiple
story and, on the face of it, a
there is no evidence that others
hijackers so that the pilot did not
times. Captain Bar-Lev then
successful air marshal operation.
are. The US Federal Aviation
further endanger the passengers.
disobeyed instructions from Israel
However, if you think about it,
Administration (FAA) say that
As I said, Captain Bar-Lev was an
and took his aircraft to London to
the air marshal was incidental
within the US there are about
interesting captain and he decided
save the life of his flight attendant.
to the success of the operation. It
5,000 aircraft in the sky at any
that he would not let his aircraft
Captain Bar-Lev was censured on
is arguable that Captain Bar-Lev
given time and an average of
64 // SECURITY SOLUTIONS
062-065_SSM111 Aviation.indd 64
Again, reasonably interesting
Why pick incidents that
program is successful, but
securitysolutionsmagazine.com
21/12/17 11:21 am
that, within the US, they could
marshals are worth the effort, but
we were given quite a lot of
only cover a few hundred flights
for others I am not so sure. I am of
souvenirs, including badges. We
each day.
the school that says you should put
went to Washington and were to
all your efforts into not allowing
depart from there. My souvenirs,
arrests? Well, no. On average,
weapons onto the aircraft. A
including the FAM badge, were
US FAMs make a little over four
report by the US Transport
in my carry-on baggage and a
arrests each year – that is not each
Security Administration (TSA) on
screening agent opened my bag,
FAM makes four arrests; combined
6 December 2017 indicated that
looked inside and quickly closed
they only make four arrests!
the TSA, screening passengers
it. When I could not find my
nationwide, had found 3,733 guns
passport in my pocket and said
each year is not bad? Well, no.
this year, well above 2016’s total
to the other guy travelling with
Most of the people arrested are
of 3,391.
me that I could not find it, the
Even so, they make plenty of
Stopping four terrorist attacks
unruly passengers and one wag
Between 80 and 90 percent of
screening agent, in a voice loud
indicated that there are more
those weapons were loaded and
enough for those around me to
FAMs arrested each year for
the most common excuse was,
hear, said, “It’s next to your piece!”
various offences. According to
“Oops, I forgot it was in my bag.”
Now apart from not carrying a
US Homeland Security, the only
My view is that taking a weapon
‘piece’, if I were trying to be covert
time FAMs have fired weapons
on the aircraft is to provide a
that certainly ended!
was to shoot Rigoberto Alpizar, a
resource for potential terrorists
Costa Rican born US citizen, in an
(remember the Royal Jordanian
that I am not a fan of air marshal
aerobridge at Miami International
example). But, I hear you say,
programs. I am a fan of the people
Airport. The FAM agents said that
“Training and procedures will
involved and their training,
Alpizar stated he was carrying
mitigate that.” If training and SOPs
but I do not see it as either cost
a bomb and he was shot when
were followed, I wonder how my
effective or operationally effective,
he refused to put his bag down
second example, El Al, would have
although it is a nice policy concept
and made a movement towards
fared? Remember, I did not use the
that resonates with the public.
it. Subsequently, no explosives
singular when I said there were
were found.
armed security on the aircraft;
Do other countries have
I guess readers can tell by now
As a final observation, it is also the most boring job in the world! n
there were two officers – one was Steve Lawson has over 20
successful air marshal programs?
at the rear of the aircraft and
Well, no. There are professional,
nothing much is mentioned about
years’ experience in aviation
well-meaning air marshal
that officer. Yes, he was at the back
security. As a Security Executive
programs, but I would argue
of the aircraft and it went into a
with Qantas Airways, Steve
they are not successful. There is
dive and from beginning to end
held a number of senior
not much in the way of publicly
the whole incident took about two
management roles covering all
available information about any
minutes 30 seconds so, by the time
aspects of aviation security from
incidents involving air marshals,
he got to the front, the incident
policy development to airport
but you would expect that the
would have been over. But I
operations. He was sent to New
42,700 flights handled per day.
involvement of air marshals would
think it would have been quite a
York immediately following
I would suggest that between
be included in court records and,
different result if Captain Bar-Lev
the 9/11 attacks to manage the
a third and half of those flights
given the interest in air marshals,
had not been so unorthodox.
Qantas response and undertook
are US registered and not all are
any court attendances would be
passenger aircraft but, even so,
reported in the media – and those
cover. Well, not really. Yes,
Bali Bombings. On his return
it is rather a large number. At a
reports just do not exist.
passengers are not supposed to
to Australia, he was appointed
know, and some countries only tell
Security Manager Freight for
guess, it would be between 5,000
None of this is to say that any
But, air marshals fly under
a similar role following the 2002
and 10,000 each day and that does
air marshal is not well trained
the captain that there are armed
the Qantas Group. Since 2007
not include US-registered aircraft
or professional. The training
security officers on the aircraft
he has been a Director of AvSec
outside of the US.
that I am aware of is very good.
but do not provide any further
Consulting in partnership with
Israel’s training and processes
information. For others, the
Bill Dent, a fellow former Qantas
air marshal (FAM) on each of
especially are pragmatic, but are
security officers provide briefings
Security Exec. Today Avsec
those aircraft? Well, no. There are
air marshals worth the effort?
to crew before they board. But
Consulting provides consultants
about 4,000 FAMs and, according
Well, no.
many crew become quite good at
from the US, NZ, ME, Israel and
picking out air marshals.
Europe. Steve can be contacted
So, should there be a federal
to open source information,
If you are an Israeli and your
they operate in teams of two to
national airline only has about
Then there is the terminal.
four, so at best I would suggest
44 aircraft, then yes, armed air
When we left the US FAM school
securitysolutionsmagazine.com
062-065_SSM111 Aviation.indd 65
on 0404 685 103 or slawson@ avsecconsulting.com.
SECURITY SOLUTIONS // 65
21/12/17 11:21 am
ACCESS CONTROL
66 // SECURITY SOLUTIONS
066-069_SSM111 Access Control B.indd 66
securitysolutionsmagazine.com
16/2/18 10:30 am
THE FUTURE ACCESS CONTROL While at the ASIAL Security Expo
to security professionals. A
all about integration, and how a
the liveability, security, safety and
in Sydney’s Darling Harbour in
consensus was formed that while
flexible security solution blends
general functionality of a building
June, HID Global conducted a
smart buildings as a separate
seamlessly across all levels of an
or space.
high-level roundtable discussion
entity was a fairly recent term,
automated, connected building.
with some of Australia’s top
intelligent buildings has been
security consultants, in an effort
around since the 1990s when the
in order to achieve a seamless
better manage their business,
to better understand the top-line
need arose for greater levels of
integration, Levi Chayboub of WSP
better manage their building,
issues facing our rapidly-evolving
automation - and the subsequent
suggested:
manage their tenants. All those
industry. Hosted by John Bigelow
means to achieve it.
from Security Solutions, the forum
Shane Norton from ARUP
On what needs to take place
“What we need to see is
“That information is seen as an asset to help building owners
things come from having that
systems being able to integrate
information available within those
covered a wide range of current
states: “Now we are using that
with other systems, being open
systems out there. Probably in
topics in an attempt to harness the
term ‘Smart’ ubiquitously with
and being at the cutting edge of
the past it didn’t really interrelate
group’s critical thinking on pain
most buildings that we’re coming
integration. They have to be able
in any way, so we find it’s just a
points, solutions and proactive
across. The design requirements
to provide whatever security
natural evolution of the systems
approaches to cutting-edge issues
that we see these days requested
events occur in a format that is
being able to interoperate.”
in the security world.
by clients are all smart and
clear and understandable to a
innovative ideas, and it’s just a
building management system that
highlights the issue of open
discussion points, talk kept
matter of how do we actually
is also capable of achieving those
platforms not being adopted by
coming back to the drive towards
progress that thinking further in
energy reductions.”
customers due to members of the
smart buildings and cities, and
this day and age.”
Among a host of valuable
the need to be proactive rather
As to what is driving the
This in turn plays into the
Paul Graves from Jacobs
security industry being locked into
hands of the Internet of Things
proprietary systems which need
than reactive towards emerging
growth of the modern smart
(IoT) as Chayboub explains, with
to be maintained and serviced by
technologies driven by big data.
building, the equation turns to
a rapidly increasing number
their own company.
environmental factors, such as
of elements in building design
of Smart Buildings, discussion
a reduced energy requirement
able to ‘talk’ to one another,
the operation of smart, integrated,
focused initially on the definition
and smaller environmental
share data across platforms and
truly open platform buildings
of the term “Smart Building”, and
footprint. From the perspective of
departments, and build up a much
and systems,” suggests Graves.
what this phenomenon means
a security professional, the role is
larger, more focused picture on
“Customers want to implement
Looking first at the emergence
securitysolutionsmagazine.com
066-069_SSM111 Access Control B.indd 67
“This has been a roadblock for
SECURITY SOLUTIONS // 67
16/2/18 10:30 am
ACCESS CONTROL
THE CONCEPT OF ADDING VALUE TO A BUILDING – WHETHER THAT IS BY REDUCING THE ENVIRONMENTAL FOOTPRINT, MONETISING CERTAIN PARTS OF THE BUILDING’S FUNCTIONALITY OR BY SAVING MONEY THROUGH PREDICTIVE MAINTENANCE AND SO FORTH, IS NOT NEW.
need this? Because people are
systems being interconnected,
we’re discussing about security
looking for a service. And why
providing that benefit to the asset
needing to integrate with itself
do we need service? Because the
owners.”
with different subsystems, and
building owners have realised
Looking back to the nineteen
needing to integrate with other
that they could get more out of
nineties when the concept of
building management systems.
the building rather than just
smart buildings first began to
It will already be intrinsic to the
having the building and renting
emerge as a biproduct of the
design that we embark upon,”
it out. Can I get more asset
telecommunications industry,
said Chayboub.
value out of what I have, and be
Shane Norton from ARUP recalls
more attractive to my tenants
that circumstances, including the
that increased profits are not
because I have a connected
Global Financial Crisis, conspired
necessarily driving the rise of
system that can work for them,
to transform the smart building
connected buildings: “I also think
like booking their parking place,
into a smart city, then focus in
that with security, it’s difficult
booking their room, finding out
more detail on the smart occupant
to put a figure on what it can
if they are able to order food or
concept instead.
save you sometimes because it’s
Afiz Jabbar of NDY agrees
whatever in advance. Now we
“My observation is that the
basically an essential business
see new people coming in with
vendors that were able to keep up
function for some businesses. I
their applications, plugging into
with it saw some benefit, but as
think that’s where some of the
building management systems
the market continued to develop
change is coming through. We’ve
with services around that.”
you now have a scenario where
seen security as a service through
those vendors must become a
cloud, where we start moving
an interesting challenge to the
vendor that sits halfway between
away from cap ex investment to
security industry however, which
telecommunications and the
security becoming op ex expense.
is really still a long way behind
security space. I think the ones
I do see security as something
the IT industry in terms of its
that can breach that are the
that does pay for itself over time.
new innovative platforms that can
evolution. Security is still very
ones that are going to be around
It reduces risk, and if you put a
do things that their old systems
much working off proprietary
in the next ten years. The ones
dollar figure on the risk that it
can’t do, but they have to make
systems, which makes a truly
that don’t breach that and react
reduces then, depending on the
a big decision financially to
smart building difficult to
to what’s happening in the
organisation’s protocols, security
basically rip out those existing
achieve. Unless the lift controls
telecommunications industry will
has a finite value.”
systems and put in open platform
are talking to the security system,
probably be left behind.”
systems, which is where us, as
which in turn is talking to the
independent consultants, can say,
environmental HVAC system,
to a building – whether that is
contributing to the sophistication
‘well here are the advantages of
which is talking to the access
by reducing the environmental
and complexity of a security
maintaining a fully proprietary
control system, functionality is
footprint, monetising certain parts
design brief, there is still an
system, and on the other hand
going to be impaired. An open
of the building’s functionality
overriding understanding that
here are the advantages of
platform is necessary, one that
or by saving money through
security’s role is to act as the
opening it up, and here’s a list
allows other diverse systems
predictive maintenance and
buffer between a building’s
of products which you can get
to not just connect, but really
so forth, is not new. Saving
integrity and the business
multiple companies to install,
work in as part of a sophisticated
money on certain aspects of a
objectives of the management and
service, and maintain’.”
technology stack with each piece
tenant’s occupancy or simply by
tenants within.
of the solution working in tandem,
streamlining essential services
Shane Norton concludes:
the ways in which systems
sharing data and driving proper
can increase the profit margins
“Security remains an ingredient
can call on statistics and learn
‘smart’, connected outcomes.
that a building is able to provide.
in the bigger business resilience
However, there are more complex
and business continuity that we
issues at play as well.
contribute to in a small part. It’s
Big data continues to expand
from the various hardware
Interoperability remains
Levi Chayboub of WSP agrees:
The concept of adding value
While IoT, connected devices and smart buildings are
touchpoints inside a building
“The data, especially in the past,
to draw out better, safer, more
has generally been more reactive,
environmentally efficient ways of
then as things have evolved it
in an intelligent building or
security. It’s about ensuring that
managing a building. As described
allows us to become proactive.
a smart building, whatever
those organisations that are
by Serra Luck from HID Global,
And I think with more data you
you’d like to call it, will just
carrying out business legitimately
having a connected building adds
can actually become predictive
become an integrated piece of
are able to do so and continue
value for the building owner as
and really get a feel for what
the architecture - of the systems
under a whole range of different
well as the tenants.
might be happening in the future
that are embedded throughout
disruptions, not just from security
based on trends for data. I think
the building core. It won’t be
threats, but a number of different
that’s where you’ll see those
talked about in this way where
threat sources.” n
“Now what we are looking for is connection. Why do we
68 // SECURITY SOLUTIONS
066-069_SSM111 Access Control B.indd 68
“I think the security function
not just about providing protective
securitysolutionsmagazine.com
16/2/18 10:30 am
LIKE US ON FACEBOOK facebook.com/ssmaust
SCAN CODE WITH YOUR CAMERA
066-069_SSM111 Access Control B.indd 69
16/2/18 10:30 am
PROFESSIONAL DEVELOPMENT
Tips And Suggestions For
COVERT OPERATORS
70 // SECURITY SOLUTIONS
070-073_SSM111 Professional Development.indd 70
securitysolutionsmagazine.com
21/12/17 4:00 pm
BY AMI TOBIN The intention of this two-part
start with a good cover, and
movement attracts more attention
3. SIT DOWN!
article is to give some tips and
then work your way towards a
than non-movement; standing
The two main advantages that
suggestions for covert operators
good cover story. This order is
attracts more attention than
sitting down will give you are
and to point out some of the
important because the main idea
sitting. Bland and lazy are your
a less noticeable appearance,
more common, and therefore
is to visually embed yourself into
best friends here.
combined with the ability to
predictable – and therefore
the environment in such a bland
In my experience, most
see and notice more yourself.
detectable – indicators and
and boring way that no one ever
people who gravitate towards
That sitting will make you less
mistakes that many operators
pays any attention to you, much
covert operations tend to have
noticeable was already mentioned
tend to make. These indicators
less tries to question or talk to you.
backgrounds in military, law
in the category above, but I cannot
and mistakes apply to most types
A common mistake I have seen
enforcement, security or all of the
tell you how many times I have
of covert operations, from hostile
many people make when trying
above. The reason why I mention
heard myself repeat this simple
surveillance to surveillance
to establish a cover is to invest
this is because serious people
instruction during trainings. And
detection, covert security and
too much energy in appearing
with these types of backgrounds
though it might seem strange
protective surveillance. This
as harmless as they can, while
naturally move and posture
that such a basic idea would
article will cover many of the
forgetting that a cover that is
themselves in ways that are the
be so difficult to follow, this is
problems and mistakes you will
interesting, fun or attractive is
opposite of bland and lazy. For
precisely why field exercises
want to look for in others, while
almost always a bad one, since it
the exact same reasons that
are so crucial – to show you that
avoiding yourself. Though these
fails the boring test.
standing and moving around are
simple ideas in theory feel very
good military, law enforcement
different and are much more
insights come from my own
I have also seen many people
operational and instructional
spin elaborate stories about what
and security habits (allowing
difficult in practice. There are
experience, I want to make it clear
their cover story is, and then fail
the officer to project more of
relatively few reasons for being
that I am in no way an absolute
to fit a boring enough cover to go
a deterring presence, while
in a fixed position without sitting
authority on the subject (mostly
with it. Again, start with a cover
extending visual control), they are
down, and most of those reasons
because there is no such thing).
– make it boring – and then add a
bad habits for covert operations.
not only fail the boring cover
cover story to it. As for the cover
The tendency to maintain a
test, but keep you from being as
1. Cover and cover story
story itself, keep it simple, try to
command presence, and to want to
observant as you could otherwise
keep it within the boundaries of
visually control your environment,
be. Find somewhere to sit down,
Let us go over the basics first.
things you actually know from
will usually make you stick out;
get comfortable and relax.
A cover is the visual projection
experience (so you can talk about
as will any sudden movements,
of what a covert operator wants
it naturally and even elaborate, if
abrupt stops and quick head turns.
people to see, and therefore think
– and only if – you are asked to do
At the very least, these actions
4. No changing fixed positions
of him/her. For example, if you
so), while staying far enough away
will make you look interesting,
So you sat down. Great. Now, stay
want people to think you are a
from information that can actually
suggesting that there is something
there! It is often the case that only
homeless person, you dress and
lead to who you really are. Do
going on. As a covert operator, you
after you have already assumed
look the part, so that even from a
not volunteer too many details,
should want the exact opposite –
a vantage point (hopefully sitting
distance anyone looking your way
and keep it bland and boring so
bland, lazy and boring. You should
down), you notice an even better
should conclude – just by sight –
that the person you are talking to
also keep in mind that it will be
vantage point you could have
that you are a homeless person. A
will forget you as soon as he/she
difficult to look bland and lazy
picked. There is nothing ironic
cover story, as its name suggests,
walks away.
if you do not look comfortable.
about this – you will always be
And since it is hard to look
able to see and understand more
comfortable if you are not, make
after you stop moving and sit
what and how you might have
2. Posture and movement
sure you actually get physically
down (which is one of the main
to verbally explain who you are
There is a celebrated quote by
comfortable. A person that is
reasons you sit down in the first
and/or what you are doing. For
Winston Churchill who, after
physically uncomfortable probably
place). But as tempting as it is to
obvious reasons, the cover story
being asked to what he attributed
looks uncomfortable, and looking
move to that other position, do
has to fit, and even strengthen,
his success in life, answered,
uncomfortable can attract interest,
not do it. There might be many
the cover, otherwise it would
“Economy of effort. Never stand
curiosity and suspicion.
legitimate reasons for normal
seem suspicious or curious if
up when you can sit down, and
the person who looks homeless,
never sit down when you can
useful expression here is, “If
spot to another, but even in the
for example, talks like a law
lie down.” This little tongue-in-
you’re bored, you’re boring.” Sit
best-case scenario, doing this will
enforcement officer.
cheek answer does actually make
down, calm down, get comfortable
make you stick out more than if
a good point when applied to
and try to get bored. Which leads
you just stay at your original spot,
covert operations. In most cases,
us to the next point.
and in the worst-case scenario,
is the verbal representation of your cover. In other words,
One of the keys to the cover / cover story dynamic is to always
securitysolutionsmagazine.com
070-073_SSM111 Professional Development.indd 71
As for looking boring, another
people to move from one nearby
SECURITY SOLUTIONS // 71
21/12/17 4:00 pm
PROFESSIONAL DEVELOPMENT your movement from one vantage
on a bus. Either spending a long
point to a better one will be
period of time at a bus stop, or
picked up as a classic surveillance
walking away from a bus stop
indicator/mistake by someone
without having boarded a bus, can
who knows what to look for. You
get you detected by someone who
have made your bed, now lie in
knows what to look for.
it. Next time, try to find the better
Finally, if you absolutely
vantage point to begin with, but
have to use a bus stop (for a
for now – stay put.
relatively short amount of time, until you actually get on a bus),
5. The bus stop
pay attention to where the bus is
This one comes up a lot. You get
coming from. The other people
to a new location and quickly
at the bus stop will almost always
is facing away from the target) is
look for a good vantage point. As
look that way, and you do not
jotting down the information.
is often the case in urban areas,
want to enact the old surveillance
a bus stop just so happens to be
cliché of the single person looking
advantages of working together,
that is having a meal there), make
perfectly positioned for this. It
the wrong way.
let us consider what might get
sure to pay for your meal as soon
you in trouble. Perhaps the
as it arrives. You will not want to
even has a number of people
Now that we have covered the
As an aside, if you must take position in a restaurant (maybe in order to closely surveil a target
standing and sitting there – all the
6. Working with others
main thing to avoid is any type
frantically wave over your server
better for you to blend into. Good
From my experience, when most
of meeting or splitting up. If you
for the bill if your target begins
vantage point, right? Wrong! Or at
people consider what a covert
come alone, you leave alone,
to leave unexpectedly. Conversely
least almost always wrong (there
operator might look like, they
and if you come together, you
– from the SD or protective
are some exceptions, as usual).
tend to think of a single individual
leave together. Watching people
surveillance perspective – look
(usually male). When instructing
meet up or split up is much more
out for restaurant patrons who
logical justification for standing
a surveillance detection (SD)
interesting/memorable than
pay for their meals as soon as
(or hopefully sitting) in very
course, it usually takes trainees
seeing people arrive together and
they get them.
central locations, but this
a few days to come up with the
leave together. The absolute worst
justification only makes sense
idea that it might be beneficial
thing you could do – a classic
next issue of Security Solutions
if the bus stop is used for its
to work in pairs (or even groups
mistake – is arrive in the area
Magazine will continue the
intended purpose – to get on a
in some cases) – and indeed it is.
together and then split up to take
discussion of indicators and
bus. Using this vantage point for
The archetypal covert operator
different positions.
mistakes that apply to most types
an extended period of time will
is the lone male, and this should
not make sense because everyone
give you all the more reason to try
7. Coffee shops
else in the bus stop will eventually
to work together with someone
You have probably noticed how
get on a bus, leaving the covert
if possible and appropriate.
often coffee shops come up when
of the #1 Amazon best seller,
operator looking out of place. You
Few things are more innocuous
I discuss covert operations. This is
Surveillance Zone, and the
might be able to justify a good
looking than a man and a woman
because coffee shops often provide
director of consulting, training
20–30 minutes at a bus stop, but
sitting together in a coffee shop
some of the best vantage points.
and special operations for
eventually you will have to board
or walking down the street. What
For starters, there are quite a few
HighCom Security Services. He is
one of the buses that stops there.
are the man and the woman doing
of them around, and they tend to
one of the pioneer developers of
over there? They are sitting and
be even more prevalent in many
the terrorist activity prevention,
when conducting mobile
talking, right? Moreover, a couple
areas that might be of special
surveillance detection and
surveillance on foot. It is
can often take this innocuous
interest to potential surveillance
covert protection fields in Silicon
important to keep in mind that
appearance with them from one
entities. Part of what makes coffee
Valley. Trained in Israel, Japan
mobile surveillance will almost
location to another, pretty much
shops so ideal for surveillance
and the United States, Ami has
always contain stops, many of
bringing their own self-generated
and SD is that, unlike most other
over 15 years of military (IDF)
which will be short ones (traffic
covers with them.
businesses, they will let you spend
and private sector security
pretty much all day in them, more
experience. Currently based in
Bus stops do indeed provide a
The same principle applies
lights and so on). Blending into a
Yet another obvious advantage
Part two of this article in the
of covert operations. Ami Toben is the author
small group of people standing at
that working together can provide
or less unharassed. The closest
the San Francisco Bay Area,
a bus stop for some 30–40 seconds
is teamwork. Two people can sit
thing to a coffee shop situation
Ami has been providing special
until the target starts moving
facing each other, for example,
might be a restaurant, but those
protective services to Fortune
again might seem very inviting,
pretending to have a casual
usually have servers who will
500 corporations, foreign
but, once again, remember, there
conversation, as one is focusing on
keep checking on you, and who
governments, foundations,
is only one logical justification for
the target and describing what he
will eventually expect you to pay
political organisations and
standing at a bus stop – getting
sees and the other (the one who
for your meal and go on your way.
wealthy individuals.
72 // SECURITY SOLUTIONS
070-073_SSM111 Professional Development.indd 72
securitysolutionsmagazine.com
21/12/17 4:00 pm
FOLLOW US ON INSTAGRAM instagram.com/securitysolutionsmag
SCAN CODE WITH YOUR CAMERA
070-073_SSM111 Professional Development.indd 73
21/12/17 4:00 pm
FEATURE
THE
CHANGING SECURITY LANDSCAPE BY SCOTT O’DRISCOLL
74 // SECURITY SOLUTIONS
074-077_SSM111 Article 4.indd 74
securitysolutionsmagazine.com
21/12/17 11:41 am
nightclub or pub. For most of
procedures designed to manage
those engaged in this sector of the
the risks associated with criminal
industry, security would more
activity. Now, this is great news for
than likely have been a second
the security industry, but why is
job, something they did on the
this happening?
weekends or at night to bring in some extra cash. Many of these
Perceptions of Crime
people would have been employed
Statistics tell us that incidents of
directly by the venue and paid cash
crime are, in fact, decreasing. So, is
in hand. As for physical security,
it just a matter of the general public
go back a little further and nobody
having an incorrect perception of
bothered to lock their back door.
the threat of crime? Perceptions
Windows would have been left
that are perhaps being clouded by,
wide open to let in the fresh air
to quote a not-so-popular American
and the Internet had not even been
leader who shall remain nameless,
invented, so obviously there was
“false news”.
no requirement for cybersecurity. How times have changed. Now we live in a world where the threat
by the Director of the NSW Bureau
of a terror attack is very real, albeit
of Crime Statistics and Research
very rare, for the vast majority
(BOSCAR) and Adjunct Professor,
of us, and crime and crime
School of Social Science, UNSW,
prevention are now huge revenue-
Don Weatherburn in June 2016. In
generating beasts. There now
the article, Don refers to a claim
seems to be a general acceptance
made by Pauline Hanson whilst
that no matter where you go, you
she was campaigning for a senate
are likely to be captured by some
seat in Queensland in May 2016.
form of CCTV surveillance, and
During the campaign, Ms Hanson
that security officers are a common
stated the following, “I’ve spoken
In this article I will explore the
sight in our day-to-day lives. In fact,
to a lot of Australians who don’t
security landscape of the past
if you work in a city, odds are you
believe they are safe on the streets
and compare it to the landscape
will see more than one security
anymore… We’ve had bombs
we see today. The focus of the
officer just walking from your
and stabbings, it is happening.
article will be to discuss how we
local train station or bus stop to
You see murders every night on
have arrived at where we are,
the office.
our TV. The situation is growing
and to examine current security
securitysolutionsmagazine.com
074-077_SSM111 Article 4.indd 75
A classic example is documented in an article penned
Doors and windows to our
worse and I know in Sydney and
service delivery trends, where
homes are secured by key-
Melbourne the police won’t go into
those trends might lead, the
operated locks and are more
certain suburbs.”
opportunities they may present for
than likely locked even when our
our industry and the challenges
homes are occupied. Now, more
showed that, statistically, Ms
associated with the changes we are
than ever before, we see homes
Hanson’s claims were unfounded.
currently experiencing.
being secured by sophisticated
The article closed with the
back-to-base monitored security
following statement, “Research
Simpler Times
systems and standalone CCTV
shows that Australians’ perceptions
Wind back the hands of time
surveillance systems. Businesses
of crime and justice aren’t always
three or four decades to simpler
and governments are engaging
in line with what crime statistics
times and you would find that
security professionals to design
show. But rather than basing
the manpower discipline of
elaborate integrated security
judgements about crime trends
the security industry primarily
systems incorporating access
on a particular incident or spate
consisted of large intimidating men
control, intruder detection and
of incidents, or on how crime
and sometimes women, standing
CCTV, all of which are enforced by
is portrayed in the news, it’s
outside the door of your favourite
detailed policies, processes and
important to look at the trends for
The article emphatically
SECURITY SOLUTIONS // 75
21/12/17 11:41 am
FEATURE all crime – or, at the very least, all
effect is that these crimes are
reported crime.”
reported by the media, shared
Based on Don’s article, it would
on social media and, when
seem that the general public and
convenient, used for political
even Ms Hanson’s perception
gain by politicians, which in turn
of the occurrence of crime is
clouds the public’s perception
misguided. Is this a result of media
of the occurrence of crime. This
beat-up or false news, or is it that
is what is creating a consistent
we now, at the press of a button,
and increasing demand for
have access to information that
security, whether it be physical
was never available until the
security, manpower services
invention of the Internet and that
or cybersecurity.
STATISTICS TELL US THAT INCIDENTS OF CRIME ARE, IN FACT, DECREASING. SO, IS IT JUST A MATTER OF THE GENERAL PUBLIC HAVING AN INCORRECT PERCEPTION OF THE THREAT OF CRIME?
this information can be rapidly
M S
Service providers and the industry are not the only ones likely to benefit. The change also creates opportunities for security officers. More training equates to an increased skill set. An increased skill set makes an individual more employable, not only in the security industry but also in other service-related industries. It is a win/win scenario for all concerned, but there will be challenges.
disseminated via social media?
The Catalyst for Change
Whatever the reason, crime
Perhaps as a result of society’s
to be the first staff that guests and
Challenges
does and will occur and must be
misguided perception of crime,
clients will interact with when
The challenge for existing
managed as would any other social
the security industry is growing
they enter premises, this approach
providers and their employees is to
condition. Which raises another
at a rate of roughly 17 percent per
makes perfect sense. The end-user
not only upskill to enable them to
question, why do people still
annum globally. Therefore, it is not
sees this as value add and are
deliver in another service industry,
engage in criminal activity when
surprising to see large national and
only too happy to engage with
but to excel and succeed in another
the odds of being caught have
multi-national companies starting
providers to assist in facilitating
service industry. To do this, there
greatly increased?
security divisions or acquiring
these services. More importantly
will be a need for research and
existing security companies in an
for the industry, it raises the profile
a deep commitment to gain an
appears that the jury is still out on
attempt to capitalise on a growth
of security officers, elevating them
understanding of service delivery
the precise reasons why people
industry. This puts pressure
to what may be better described as
requirements in an unfamiliar
commit crimes. A Crime and
on those already operating
a security service officer.
market – not an easy task, but
Justice Bulletin written in February
in the sector to try to remain
2001 and posted on the BOSCAR
competitive. In a market which
Opportunities
website states the following, “It is
generally operates on the business
This change opens opportunities
considerable exposure to risk,
difficult to find a succinct, broad
model of high volume – low
for existing service providers.
particularly financial, in this type
non-technical discussion of the
margin, this can prove to be very
The demand for a higher multi-
of venture. On the other hand,
causes of crime.” It would be fair
challenging. So, what can existing
faceted service delivery should
there are risks associated with
to say that there are a number
service providers offer to remain
command increased rates for
not diversifying – you may be left
of broad socio-economic factors
competitive? The simple answer
services rendered. For those with
behind in the wake of those who
which influence people to commit
is to increase service levels. This
an entrepreneurial flare, this could
did not place all their eggs in one
criminal acts. At a high level, these
is commonly referred to in the
allow them to diversify into other
basket, those that took the leap
may include, but not be restricted
industry as ‘value add’.
sectors of the service industry
of faith, committed and worked
which dovetail into the security
through the challenges. These
Please pardon the pun, but it
to, the following:
Recently, we have witnessed
Given that security are likely
certainly not unachievable. There is also likely to be
• unemployment and poverty
the industry gradually drift away
sector. This may include health
are the winners, these are the
• substance (legal or illegal)
from the typical stereotypical
safety and environment, facilities
ones who will, through their own
availability and abuse
doorman to a more customer
management, concierge and
hard work and entrepreneurial
service focused model. Customer
reception, functions and events to
enterprise, succeed and be
service has now become as
name but a few. The challenge will
remembered as those that changed
important, if not equally as
be for the providers to deliver on
the security landscape. n
willingness of society as a
important, as asset protection.
promises made in an environment
whole to enforce discipline,
Many security officers now
they would not typically be used
report offences and levy
complete customer service
to operating in. Perhaps the best
security professional with over 35
appropriate and consistent
training programs to enhance the
approach in this instance would
years’ experience in the industry. He
punishment for those who
end-user experience. Furthermore,
be to head hunt expertise from the
is a licenced security consultant and
commit crime
at least in the corporate
service sector in which they intend
private investigator. Scott currently
environment, front-line guards are
to diversify. This will have the
holds the position of Global Security
perception that they will be the
now more likely to be deployed
knock-on effect of bringing new
Operations and Risk Manager for
one to get away with it.
wearing business attire and be
blood into the security industry,
one of the world’s largest financial
Regardless of the reasons people
required to perform duties similar
which can only be beneficial for
banking institutions. Scott can be
commit criminal acts, the flow-on
to that of a building concierge.
all concerned.
contacted on 0437 618 812.
• political ideologies and or religious beliefs • a general decline in the
• greed and a misguided
76 // SECURITY SOLUTIONS
074-077_SSM111 Article 4.indd 76
Scott O’Driscoll CPP, JP is a
securitysolutionsmagazine.com
21/12/17 11:41 am
MULTIPLE CAPABILITIES SUPERIOR SOLUTION
Volvo Group Governmental Sales Oceania
IN HOSTILE ENVIRONMENTS, IT’S IMPORTANT THE SYSTEMS THAT YOU DEPEND ON CAN
STAND THE TEST OF TIME.
At Volvo Group Governmental Sales Oceania, our core business is the manufacturing, delivery and the support of an unparalleled range of military and security vehicle platforms; a range of platforms that are backed by an experienced, reliable and global network with over one hundred years of experience
superior solutions, providing exceptional protected mobility www.governmentalsalesoceania.com 074-077_SSM111 Article 4.indd 77
21/12/17 11:41 am
SECURITY STUFF C O N T E N T S
SPOTLIGHT Dahua
PROFILE 080
SAAB
PRODUCT SHOWCASES
SHOP TALK
084
Altronix
094
Boon Edam
098
Stentofon
088
Dormakaba
094
Dahua
100
STid
090
CMPS
095
Ezi Security
095
FLIR
096
LSC Security
096
Magnetic Access 097 PathMinder 78 // SECURITY SOLUTIONS
078-079_SSM111 Security Stuff.indd 78
097 securitysolutionsmagazine.com
21/12/17 11:46 am
securitysolutionsmagazine.com
078-079_SSM111 Security Stuff.indd 79
SECURITY SOLUTIONS // 79
21/12/17 11:46 am
SPOTLIGHT
DAHUA CAMERAS: TOUGH TEST STANDARDS FOR ULTIMATE RELIABILITY
80 // SECURITY SOLUTIONS
080-083_SSM111 Product Spotlight.indd 80
securitysolutionsmagazine.com
21/12/17 11:54 am
A Dahua Dome in Qomolangma National Park looking at Mount Everest
W
securitysolutionsmagazine.com
080-083_SSM111 Product Spotlight.indd 81
idely used in over 180 countries and regions around the world, Dahua’s
Toughness: Withstanding Most Physical Impact whether Natural or Man Made
products and solutions must be
Dahua video surveillance solutions,
able to meet the demands of tough
such as Smart City and Intelligent
environments such as snowy
Building, are widely applied
mountains, plateaus, deserts,
in many countries worldwide.
wetlands, rainforests and coastal
Installed everywhere in our life,
regions. In order to achieve robust
Dahua cameras may be exposed to
performance in the environment for
physical impact. For example, when
which they were designed, Dahua’s
installed outdoors, the cameras are
products have undergone rigorous
exposed to numerous risks, ranging
tests to meet very tough standards
from being hit by a basketball,
which in most cases exceed the
small stones blowing in strong
normal industry practice and the
wind, to getting scratched by tree
datasheet specifications. The
branches. Indoor cameras may be
purpose is to provide sufficient
damaged by daily use or people
margins to ensure the product
intentionally throwing things at
provides the utmost reliability
them. As shown by the test results,
expected of Dahua products when
Dahua vandal proof cameras
performing in the field.
withstand the challenges in these
SECURITY SOLUTIONS // 81
21/12/17 11:54 am
SPOTLIGHT A Dahua Dome Camera Working Perfectly in Hobq Desert
scenarios, thereby reducing the cost of maintenance. Product Validation: Outdoor cameras have passed IK10 test (standard IEC62262) in which a steel ball weighing 5 kg is dropped from 40 cm above generating 20 joules of impact energy on five separated spots on every exposed surface (including 3 impacts to the lens). For indoor cameras, the test level ranges from IK06 to IK10 (both standard IEC62262), which covers most possible scenarios.
Vibration: Life Span is Unaffected In some cases, Dahua cameras are required to work somewhere with high frequency vibration. For instance, places near railways, bridges with fast driving cars and strong crosswinds, or construction sites with piling. Dahua cameras not only guarantee smooth operation, but are also able to maintain the same lifespan. Even in extreme circumstances such as car accidents, earthquakes or hurricanes, cameras will remain safely attached to the poles. Due to their strong structures, the possibility of accidents caused by falling cameras is eliminated. Product Validation: All cameras are tested against a frequency of up to 200 Hz with 1G acceleration from X, Y, Z axes for 4.5 hours, ensuring they can function as usual. When it comes to hanging dome cameras, in order to make sure they won’t fall down in even some extreme cases, an extra test which triples the vibration rate is conducted whereby Dahua’s cameras can endure several times longer than the standard average.
Temperature: Reliability 10 Degrees Beyond the Standard Range Inevitably, Dahua cameras are sometimes installed in extreme
82 // SECURITY SOLUTIONS
080-083_SSM111 Product Spotlight.indd 82
securitysolutionsmagazine.com
21/12/17 11:54 am
heat and freezing environments,
not the case for Dahua cameras.
be it factories that are hot during
Even when they are installed in
processing, or chilled-storage
the most extreme environments
warehouses that are maintained
imaginable, a snow mountain like
cold, or deserts that are scorching
Mount Everest, a tropic rainforest
hot during the day and freezing
like the Amazon Rainforest, or a
cold at night. Coldness and heat
desert like the Hobq Desert, where
will cause shrinkage, which may
there are dramatic weather shifts,
very likely shorten a camera’s
exacerbating humidity issues,
lifespan. In addition to long hours
they bring along smooth and
of usage, the cameras are also
condensation-free operation.
designed to enjoy long working
Product Validation: For fully
“In some cases, Dahua cameras are required to work somewhere with high frequency vibration.”
lifespans against these tough
enclosed cameras such as PTZ
temperatures, saving the costs
cameras, Eye Ball cameras, and
of repairing and replacing. One
Bullet cameras, Alternating
case is a Dahua dome camera
Temperature and Humidity
DHI-SD6AE230F-HNI that operates
Tests (Damp heat cyclic) with
water for three minutes. It is
then a 400C and 93% damp heat
smoothly on Mount Everest 5000m
temperatures varying between
worth mentioning that Dahua
test for 166 hours per cycle for
above sea level.
250C and 550C and relative
cameras are tested for at least 10
four cycles over a period of 28
humidity reaching a maximum
minutes in the same conditions,
days, a remarkable performance
cameras have been through Low
of 100% (camera surface allow
three times tougher than the
of quadruple the International
and High Temperature continuous
condensation) were conducted
standard one.
IEC Standards. It was in an effort
operation test for no less than 16
for two cycles lasting a total of
In addition, Dahua has
hours (standard IEC62599-1) with
48 hours. For cameras not fully
developed its own standards
environment in coastal cities and
spec temperature to guarantee
enclosed, Steady Damp-heat Tests
which include tests where, 5±0.5
to identify the likelihood of a
product performance. Besides, all
at 400C and 93% humidity (no
L/min of water (equivalent of
camera falling following possible
Dahua cameras have gone through
condensation) were conducted
middle rain in plum rain season)
metal corrosion.
intensified HALT (High Accelerated
for 96 hours. Both tests have
was sprayed to cameras for 192
Life Test) and ALT (Accelerated
been developed on the basis
hours from above. On top of the
Conclusion
Life Test) tests, to ensure that
of International IEC Standards,
water ingress tests, every Dahua
In addition to the tests above,
the cameras can properly work
ensuring that all cameras are
camera needs to go through an
Dahua cameras have also passed
in -500C to 800C, 10 degrees
capable of working with the
airtightness test, too, to make sure
a Drop Test that decreases
beyond the standard range (-400C
humidity varying from 0 to 100%.
that it is sufficiently water-proof.
the risks of damage during
improve the weaknesses and
Working in regions and countries
Corrosion Protection: Quadruple of International IEC Standards
that promises a life of at least four
stress, helping to locate and
Waterproof, be it Natural Rain or Man Made Spray
identify potential defects of our
like northeast India, Burma and
Dahua Port Solution and airport
dust. Together, all of these tests
cameras at the earliest possible
Sierra Leone which are known for
solution require the cameras
ensure Dahua delivers lasting
stage. No less than three cold
abundant rainfall, or Asian cities
to be installed in seaports and
performance for customers all
starts were required in each of
that experience weeklong plum
airports where it’s highly likely to
over the globe. Demonstrating the
the tests. Via these unique tests,
rains, Dahua cameras are able to
be wet and salty. Salt spray and
mission to enable a Safer Society
Dahua’s cameras come out as extra
resist long time waterfall as well
electrochemical effects may result
and Smarter Living, Dahua will
tough when used in practice.
as intentional or accidental man
in serious corrosion on metal
continue to focus on “Innovation,
made sprays.
surfaces, which may cause the fall
Quality and Service” to serve
of the cameras. However, Dahua
partners and customers around the world. n
Product Validation: All Dahua
transportation; a Life-span Test
to 700C). This aims to trigger potential product failures from increased extreme environmental
to simulate the cyclic salt spray
years in normal conditions; and a Dust Resistance Test ensuring a performance undisturbed by
Humidity Isn’t a Hindrance
cameras are required to go
cameras won’t be bothered by
Extreme temperature and
through IPX6 or IPX7 tests.
this problem.
humidity are major threats to the
Standard IEC62262 IPX6 test
smooth day-to-day functioning
requires camera surface to be
solution of 5% NaCl and pH 6.5
www.dahuasecurity.com or follow
of intricate devices. But this is
sprayed by 100±5 L/min of
to 7.2 was sprayed for two hours,
us on Facebook and LinkedIn.
securitysolutionsmagazine.com
080-083_SSM111 Product Spotlight.indd 83
Product Validation: Outdoor
Product Validation: A salt water
For more information visit
SECURITY SOLUTIONS // 83
21/12/17 11:54 am
PROFILE
ARE YOU PREPARED FOR A CYBER ATTACK?
Over the past few decades, digital
the associated risks to an acceptable
from the enormity of a cyber breach,
technology has transformed the
level without impacting upon the
only a combination of products,
scope, scale and potential for
organisation’s objectives.
services and activities can keep
business. Organisations have moved
Australian businesses don’t have
professional services to cover this
processes online to connect, share
the scale or resources for in-house
protection will look something like
and access data. Whilst this has
cyber security management teams.
the following:
created priceless efficiencies and
Further, there is a global shortage of
• PENETRATION TESTING
opportunities, it has also exposed
these skills. As of February 2018, the
Testing infrastructure,
organisations to some major
Privacy Amendment (Notifiable Data
operating systems, services
vulnerabilities.
Breaches) Act 2017 will come into
and applications to identify
force where all organisations must
vulnerabilities and assess risk
intellectual property theft and
report breaches of personal data to
financial fraud are just a few threats
the individual and the Australian
we face today. Information security
Information Commissioner. Is your
Similar to penetration
is not an ‘IT’ problem, its is a
company prepared?
testing without vulnerability
business risk and all business areas
084-093_SSM111 Profiles.indd 84
them safe. A comprehensive suite of
their systems, information and
The proliferation of ransomware,
84 // SECURITY SOLUTIONS
Ninety-five percent of all
Cyber security has progressed
through exploitation. • VULNERABILITY ASSESSMENTS
exploitation. A preliminary
are part of the solution. The key is to
well beyond firewalls and
exercise to identify
identify what is important, what are
virus protection software. For
vulnerabilities without
the threats, and how you can reduce
organisations to protect themselves
confirming their exploitability.
securitysolutionsmagazine.com
21/12/17 4:01 pm
084-093_SSM111 Profiles.indd 85
21/12/17 4:01 pm
PROFILE
• SOCIAL ENGINEERING
with IRAP (Information Security
people and processes by
NETWORK ACCESS REVIEW
Registered Assessors Program)
identifying staff awareness and
Assess appropriate technical
certified security assessors. IRAP
resilience to the most successful
controls and protection to
assessors (certified through
and commonly-used attack
handle information and services
the Australian Department of
vector today.
that meet current business and
Defence’s Australian Signals
regulatory requirements.
Directorate) conform to the
ARCHITECTURE REVIEWS
• GOVERNANCE, RISK AND
Australian Government’s stringent
Determine whether
COMPLIANCE REVIEWS
protocols, are highly qualified, and
controls within a network/
Measure organisations
endorsed to make independent
communications environment
commitment to standards (e.g.
information security assessments.
are effective and appropriate
ISO 27001 and the Department
Assessments that will help you
for current business
of Defence Information
understand, identify and manage
requirements, and aligned
Security Manual), policies
information security threats and
with vendor and industry best
and procedures to review an
the associated risks.
practice recommendations.
organisation’s maturity and
• SYSTEM CONFIGURATION & SECURITY REVIEWS
ability to manage risk. • RECOVERY SOLUTIONS
Saab Australia offers comprehensive information security advisory services to help
Assess server and IT system
A workflow management
you identify risk and safeguard
configurations against industry
system to guide organisations
your business from a devastating
and vendor best practise.
through crisis or emergency
information security breach. n
Typically cover security
situations. These systems can
configuration, password
be tailored to manage your
strength testing, software
unique tasks, resources and
Marc Tapping, Security and Risk
actions to restore.
Program Manager, Saab Australia
maintenance, firewalls, network
084-093_SSM111 Profiles.indd 86
a few reputable organisations
DATA ACQUISITION (SCADA)
• NETWORK DESIGN & SECURITY
86 // SECURITY SOLUTIONS
• SUPERVISORY CONTROL AND
Tests security controls through
For more information contact
infrastructure etc; tailored to
Do you think your organisation
(08) 8343 3800 or visit www.saab.
your needs.
is prepared? If not, there are
com.au
securitysolutionsmagazine.com
21/12/17 4:01 pm
TR
OR
084-093_SSM111 Profiles.indd 87
HÉE D’ OP
21/12/17 4:01 pm
PROFILE
TKIS-2 VOIP INTERCOM MODULE
STENTOFON Turbine Station
speakers while upgrading to
INTEGRATED SECURITY
drawn from either the spare line or
Series intercoms are specifically
Vingtor-Stentofon IP Intercom
Reliable communication between
signal line. If PoE is not available,
designed to provide intelligible
Technology. Our VoIP Interface
different systems is equally
the Turbine Compact Station can
hands-free audio. Every single
kits come with six programmable
important. Vingtor-Stentofon share
be connected to a 24 VDC local
Turbine station has a powerful
IOs, a built-in relay, a Class-D
information through common
power supply.
acoustic noise reduction feature
10W amplifier and support for an
protocols or dedicated drivers
Network Connection: There is a
built-in that eliminates interfering
induction loop.
with other parts of the security
RJ-45 port located on the TKIS-2
system like access control and
that is used for PoE/LAN Ethernet
background noise. The TKIS-2 VoIP Intercom Module utilises the latest
RETROFITTING?
video cameras to enable automated
connection to the network.
technology to create unparalleled
If you have a site that needs HD
processes. This makes it easier
Inputs & Outputs: There are six
audio quality, customised to
audio, this can be mounted behind
for the security team to work a
I/O connection options for the
your needs.
existing surfaces providing crystal
lot more efficiently in case of a
Turbine Compact Station. These
clear audio with no change to
critical event.
connections can be used to
The TKIS-2 VoIP Intercom Module is ideal for use in such
external aesthetics.
situations as:
interface with external I/O devices. The device includes:
The connections are typically used
INTELLIGIBLE AUDIO
Power/Relay Inputs: Programmable
as digital input (e.g. form a closing
IP PA INTERFACE
The core need is to be understood,
relay. Max: 250VAC/220VDC, 2A,
contact), digital output (5V), or LED
Upgrade an existing Public
loud and clear. Crystal-clear audio
60W
driving (20mA max) for connecting
Address system to IP whilst
is essential to this, especially in
I/O Interface: Interface for control
sensors, indicators or integration
utilising existing amplifiers.
a critical situation where every
inputs, control outputs and
to other systems. The TKIS-2 also
Create a Wide Area Notification
second counts.
analogue audio line out.
includes connections that can be
External Audio: Connection for
used for external audio such as a microphone or a loudspeaker. n
(WAN) system that spans multiple campuses or simply connect
INTEGRATED COMMUNICATION
microphone and loudspeaker.
zones using your existing
Efficient communication requires a
Ethernet Port: Ethernet connection
network infrastructure.
single integrated communication
with Power over Ethernet.
platform. Vingtor-Stentofon
DIN Mounting Clips: Plastic clips for
please contact STENTOFON
CAR PARK COMMUNICATIONS /
support open protocols such as SIP
mounting the device to a DIN rail.
Communications Australia on (03)
ELEVATOR CAR INTERCOM
that makes it simple and easy to
Power Supply: The TKIS-2 supports
9729-6600 or sales@stentofon.
Keep your existing communication
do all your communication from
Power over Ethernet (PoE, IEEE
com.au, or visit us on the web at
panel, buttons, microphone and
one central console.
802.3 a-f) where power can be
www.stentofon.com.au
88 // SECURITY SOLUTIONS
084-093_SSM111 Profiles.indd 88
For a demonstration,
securitysolutionsmagazine.com
21/12/17 4:01 pm
1300 133 366 - sales@uniguard.com.au
All the tools you need to ensure your staff are in the right place, at the right time! • Rugged Hardware • Mobile Applications • GPS Tracking • Incident Reporting • Exception Reporting • Mobile Forms • Photographic Evidence • Lone Worker • Bluetooth Beacons • KPI Tracking
What are your guards really doing?
Half
FREE INFO PACK Call Now
Follow us on Twitter Page Ad twitter.com/secsolutionsmag
SCAN CODE WITH YOUR CAMERA
084-093_SSM111 Profiles.indd 89
21/12/17 4:01 pm
PROFILE
Vincent Dupart, CEO of STid
STid: THE FRENCH RISING STAR STANDING UP TO THE GIANTS
As the leader on the French market,
we experienced 30% growth on
The manufacturer is reaping
this little phenomenon is playing in
a market that grew by 4.2% ,”
the benefits of its decision to
the big leagues with record growth
says Vincent Dupart, Managing
create a department dedicated to
in 2017. STid is now establishing
Director of STid. To support this
innovation a year ago. “Our quick
itself outside France with strategic
growth, STid is expanding its
reaction to changes in the sector
partnerships and cutting-edge
teams, opening up new support
and the user experience are what
access control solutions that are
and sales positions to ensure that
make us stand out on the market,”
eliciting unanimous praise.
quality and service levels remain
explains Dupart. Organisations may
on par with the aspirations of the
see access control as a necessary
Managing Director.
evil, but STid wanted to make
A key player STid is making a name for itself on
90 // SECURITY SOLUTIONS
084-093_SSM111 Profiles.indd 90
identification instinctive for users by creating STid Mobile ID®.
up prestigious clients, including
User-friendly innovations
the Airbus Group, Thalès Alenia
By placing innovation at the
of traditional access control, our
Space, LVMH, Caisse d’Epargne,
heart of its strategy, the French
solutions help all employees get on
Algiers Airport, the Ryadh Metro,
company has worked to respond
board with the company’s security
Umm Lulu refinery, ADECO, and
quickly on its market and offer
policy. Imagine no longer needing
CDBC in Abu Dhabi. “In 2017,
the most user-friendly solutions.
to take your telephone out of your
the international stage by racking
“By eliminating the constraints
securitysolutionsmagazine.com
21/12/17 4:01 pm
Sign up to our eNewsletter and receive up-to-date valuable information regarding all things Security.
www.securitysolutionsmagazine.biz/newsletter
084-093_SSM111 Profiles.indd 91
21/12/17 4:01 pm
PROFILE
“OUR QUICK REACTION TO CHANGES IN THE SECTOR AND THE USER EXPERIENCE ARE WHAT MAKE US STAND OUT ON THE MARKET.”
issue, ACTU-CCI, France’s network
smartphone becomes your access
Two questions for Vincent Dupart, Managing Director of STid
key is the now the most secure
Your new strategic partnerships
security one of its priorities for
and acclaimed solution out there,
are opening up the doors to the
2017 and 2018. Each user and
garnering seven awards across
North American market…
each business has increasingly
the world.
STid is in a great position to
specific and changing needs. Our
penetrate the North American
secure solutions, the use of open
Shifting away from proprietary technologies
market with strategic partners
technologies and our user-friendly
like Genetec. Clients are looking
systems convinced the 126
One of the challenges for Chief
for secure, open, user-friendly
chambers of commerce in France
Security Officers is to maintain as
solutions… three key success
and 115 abroad to choose STid as
much independence as possible in
factors which make STid
their security consultant.
managing their company’s security.
solutions stand-out. It is also
A Snapshot of 2017
72% of the time they are dependent
important to remember that
STid performance:
on a third party, which complicates
our development isn’t limited
• €10 million in sales
the ability to manage information
to the North American market.
• 30% growth in sales
exchanges within an organisation.
We’re also making a name for
• 50 employees
“Since STid’s creation in 1996, it has
ourselves on the French, UK and
• Offices in the UK, Australia,
continued to offer open solutions
Australian markets.
pocket or bag to identify yourself,” says Dupart. This solution where your
of Chambers of Commerce and Industry, has decided to make industrial and business
Mexico and the United States. n
that enable its clients to shift away
92 // SECURITY SOLUTIONS
084-093_SSM111 Profiles.indd 92
from proprietary technologies that
ACTU-CCI chooses STid as its
technologically and commercially
Security consultant
www.stid-security.com or email
block clients,” concludes Dupart.
With security becoming a major
info@stid.com
For more information, visit
securitysolutionsmagazine.com
21/12/17 4:01 pm
KeyWatcher is a reliable and extremely easy to use electronic key management system, designed to prevent mismanaged, misplaced, or stolen keys. KeyWatcher eliminates outdated metal boxes, unreliable manual logs and messy key identification tags utilising a computerised storage cabinet. The system releases keys only to the individuals with correct authorisation, recording each user transaction and providing total system accountability.
KEYWATCHER SYSTEM OFFERS l Up to 14,400 keys and 10,000 user per site l “Site” concept uses a common database l Numerous high level interfaces for access control, contractor management and vehicle fleet systems l Longer user IDs can be up to any 6 digits, plus a 4 digit PIN l Bright 7” full colour, touch screen l “Key Anywhere” allows keys to be returned to any KeyWatcher Touch within a site l On-screen guides for users, along with voice commands
Available in Australia through: AST Pty Ltd T: +61 2 8020 5555 | T: 1300 539 928 | F: +61 2 9624 7194 E: sales@astpl.com.au | www.astpl.com.au
084-093_SSM111 Profiles.indd 93
21/12/17 4:01 pm
PRODUCT SHOWCASES
NETWAY SPECTRUM 8-PORT ETHERNET TO FIBER PoE SWITCH
Altronix’s NetWaySP8WPX Hardened PoE Switch with Dual SFP (Fiber) Ports is the latest addition to the company’s recently introduced NetWay Spectrum Series. Designed for long distance applications, the NetWaySP8WP is a highly cost-effective all-in-one solution that includes an 8-Port hardened PoE switch, 115W power supply/charger with an enclosure that accommodates batteries. The unit features 2-SFP ports allowing you to connect multiple units and create a fiber ring. Each port is rated at 30W (PoE/PoE+), 2-ports are configurable for 60W (Hi-PoE) and embedded LINQ™ Network Communications Technology provides remote diagnostic monitoring, control and reporting. Proudly made in the U.S.A. and backed by a lifetime warranty. n For more information visit www.altronix.com
ARGUS SPEED BARRIERS AND GATES
Argus speed barriers and gates provide a sensor-controlled passage with automatic door elements in various configurations. They provide contactless passage, even with bags or luggage. Access is granted via the presentation of authorised media, for example, an access control card. Whether you choose
94 // SECURITY SOLUTIONS
094-097_SSM111 Product Showcase.indd 94
a speed barrier or gate version will depend on how you want the door wings to open.
Argus HSB (Half-height speed barrier) The ever popular HSB speed barriers are equipped with door leaves which swing open in the
direction of passage to allow authorised access. HSB speed barriers are highly customisable, thanks to the wide range of materials and finishes. You can choose between a stainless-steel housing or transparent side walls and configure either in a slender or wide profile, ensuring a design match to your existing entrance area. Moreover, the speed barriers are available in three different lengths, depending on the system used and the level of security desired. Argus HSBs provide a high throughput rate (up to 30 per minute) while maintaining a high level of personal safety. If unauthorised access is attempted, the gate will not open and an acoustic alarm will sound.
Designed for Disabled Access
Argus HSG (Half-height speed gate)
Part of a wider system
The HSG speed gates are equipped with door leaves that retract back into the side panels of the unit. HSG speed gates come standard with a stainless steel, satin finish housing and two barrier elements made of toughened glass. During
passage, the HSG’s sliding panels move swiftly into the housing. Like the Argus HSB, the HSG provides a high throughput rate (up to 30 per minute) while maintaining a high level of personal safety and can be configured to meet the desired level of security.
Argus HSB and HSG speed barriers and gates are available in a 900mm width to suit disabled users. These additional versions allow you to match the design of the speed barriers and gates, giving a seamless appearance to the entrance, whilst maintaining a convenient and secure access point for those with a disability.
Argus HSB and HSG speed barriers and gates can be programmed onto the same card as your existing access control system, making for a truly convenient solution. n For more information visit www.dormakaba.com/au
securitysolutionsmagazine.com
21/12/17 3:23 pm
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmagazine.biz/newsletter
CARBINE MULTI PADLOCK SOLUTION (CMPS)
Padlock daisy chaining is a common problem where someone cuts a link in a chain (usually securing a gate) and inserts another padlock in series, so that they can gain easy, continuous access to the property. It is often used by utilities to gain permissible entry to private property without having to bother the landholder or between different utilities, so that they each manage their own key system.
The problem comes when someone does this without permission. In of itself, a gate and chain typically does not present a high barrier to entry, gates and fences can be scaled and a determined criminal will simply angle-grind or cut the chain or padlock shackle. The issue is one of what an ordinary person might feel is ‘acceptable’ forced entry. Whereby a person feels by destroying a link and then ‘fixing’ it with their padlock to secure the chain is ‘acceptable’. A typical example of this is dirt-bike riders who wish to gain regular access to a secured parcel of land. The landowner then has to deal with all the attendant damage and liability issues this produces.
This then creates a control problem insofar as there is no sign of forced entry and confusion as to which padlocks are authorised. A simple solution would be to install a single padlock, but the logistics of key control for multiple utilities or other entities can quickly spiral out of control. The Carbine Multi Padlock Solution (CMPS) has been designed specifically to address the issue of padlock daisy chaining. While the CMPS can be designed to cater for many padlocks, the standard design accomodates seven padlocks. It is not a high security device, but is a very effective solution to counter daisy chaining. It allows the owner to control who adds a padlock. It has a simple control device to make unused
padlock eyes redundant. The chain used is high grade but not highly resistant to bolt cutters for good reason. The chain can be replaced more easily and cost effectively than a high security padlock. The idea is that attackers cut the chain and not the expensive padlocks. The owner can then see that there has been a forced entry and decide the next course of action. The CMPS is made from galvanised steel and can be welded or bolted to gates or posts. The chain is then fixed to the gate or post as required and the padlocks can be added by each authorised user. Recommended retail is $389.71 including GST. n For more information visit www.carbine.com.au
SAFETYFLEX PAS68 AND IWA14 CRASH TESTED SPRING TECHNOLOGY BOLLARDS Spectacular Breakthrough in Extreme Performance Hostile Vehicle Barriers Unlike standard steel tube bollards, which require massive foundations, Safetyflex’s unique bollards are manufactured using a special composition of spring steel specifically designed to absorb extreme levels of impact energy thanks to its flex technology. On impact, the spring steel bollard can move around the five Cartesian coordinates (x, y and z axis), in addition to being able to rotate on each axis. In an attack, a large proportion of kinetic energy is transferred from the attacking vehicle into the mitigation technology; arresting the attacking vehicle.
Safetyflex’s in house testing facility provides customers with a guarantee that the product they install is the same as the product that was actually tested at MIRA engineering’s research facilities in the UK. Each and every bollard is individually load tested before leaving the factory. Key features and benefits of the SafetyFlex Barrier include: • PAS 68, 69 and IWA 14 test certifications across 30, 40 and 50mph categories, up to 7,500kg • Spectacular reduction in foundation depths necessary compared to conventional steel tube technology; 200mm and 400mm versions available • Obvious reduction in consequence to underground services / utilities • Lower cost and time expended in installation • Vast and growing range of systems, fixed, removable and retractable (horizontal, shallow mount innovation requiring no power or manual lifting – battery drill operated) • An aesthetically pleasing design • Planters, street furniture and imaginative bespoke adaptations available • Capable of sustaining an attack without needing replacement of spring assembly or foundation in many cases. n For more information visit www.ezisecurity.com.au or call 1300 558 304.
securitysolutionsmagazine.com
094-097_SSM111 Product Showcase.indd 95
SECURITY SOLUTIONS // 95
21/12/17 3:23 pm
PRODUCT SHOWCASES FLIR FB-SERIES ID THERMAL FIXED BULLET CAMERA WITH BUILT-IN HUMAN AND VEHICLE RECOGNITION ANALYTICS FLIR Systems, Inc. recently introduced the FB-Series ID, the latest fixed bullet thermal security camera in the FB-Series family. Combining best-in-class thermal image detail and highperformance onboard analytics, the FB-Series ID is ideal for narrow to wide area perimeter detection and sterile-zone monitoring. The FB-Series ID features accurate video analytics that are capable of classifying human or vehicular intrusions. Combined with FLIR’s custom Automatic Gain Control (AGC) and Digital Detail Enhancement (DDE), the FB-Series ID provides unmatched image contrast and sharpness, which improves analytic performance, resulting in fewer false alarms.
The FB-Series ID is certified for integration with major third-party video management systems (VMS), as well as FLIR’s United VMS. Outfitted to act as a standalone security system, the FB-Series-ID can also handoff classified intrusions to FLIR pan-tilt-zoom cameras for autonomous tracking of intruders. Featuring FLIR’s superior 320x240 resolution thermal imaging sensor, the FB-Series ID can detect potential intruders in total darkness, and through sun glare, smoke, dust, and light fog. Five lens options – 93, 49, 24, 12 and 9-degree field of views – offer wide to narrow coverage and reduce the number of cameras needed to monitor fence lines, perimeters, and open areas.
“As the first FB-Series camera with built-in analytics, the FB-Series ID provides an all-in-one intrusion detection system that classifies human or vehicular intrusions with low false alarm rates,” said John Distelzweig, Vice President and General Manager of FLIR’s Security segment. “The FB-Series ID solidifies FLIRs initiative to
expand artificial intelligence and bring thermal imaging to more customers.” The FLIR FB-Series ID comes with FLIR’s industry-leading 10-year warranty on the thermal sensor and a three-year warranty on the camera. n For more information visit www. flir.com/security.
STORE UP TO 56 DEVICES ON THE NEW K-RADIO 900 KEYPAD FROM AMC The K-Radio 900 Keypad features an integrated radio receiver operating in the 916MHz band and the ability to store up to 56 two-way radio devices onboard (32 devices such as reed switches and PIRs, 20 remote controls and four sirens). The 128-bit AES encryption (Advanced Encryption Standard) ensures maximum protection against attempts at both signal cloning and masking. Communication between the control panel and its associated devices is bi-directional for each type of transmission, which must be confirmed by the receiver, allowing users to obtain the highest levels of safety concerning the outcome of communication while also avoiding congestion of radio signals. Installation and maintenance are made easy thanks to a total lack of switches and potentiometers hardware. All devices are configurable via the control panel while learning new devices into the control panel can achieved through the use of either an automated self-learning mode or manually coded into the system. n For more information contact LSC Security Supplies on 1300 646 269 or visit www.lscsecuritysupplies.com.au
96 // SECURITY SOLUTIONS
094-097_SSM111 Product Showcase.indd 96
securitysolutionsmagazine.com
21/12/17 3:23 pm
F O L L O W U S O N I N S TA G R A M
instagram.com/securitysolutionsmag
For the latest news, products and events in the security industry
FAAC J Series Bollard Range 1. Tested according to PAS 68:2013 and IWA 141:2013 Standards. 2. Impact resistance class N3 7.500-80 in SINGLE CONFIGURATION. 3. Able to stop a 7,500 kg lorry travelling at 80Km/h (=50M/h). 4. Raised position lock guaranteed even in the event of a power cut. 5. Also available in EFO (Emergency Fast Operation) version for very rapid rising. 6. Integrated hydraulic unit.
Increasing traffic levels and the associated lack of parking, especially in urban built up areas, lead to constant traffic management challenges. Even the protection of public, open spaces and highly accessed buildings are becoming more and more important to protect the safety of the general public. The new J Series Bollard range from
FAAC are the ideal supplement to the already extensive range of perimeter access control products available through Magnetic Automation, especially in cases where a particularly effective and preventive safety solution is required. Four models are available in different versions, including crash rated bollards tested to international
standards. Typical applications include building entrances, sports stadiums, universities, residential areas, inner cities, parking zones with restricted areas, high security perimeter areas, and so on. The FAAC J355 HA M50 is crash tested hydraulic, automatic retractable, high security bollard. Its features include:
Applications for this high security bollard include security sensitive areas such as government sites, airports, embassies, banks, port zones, prisons, industrial sites or wherever a high level of security is deemed necessary in terms of perimeter protection. n For further information visit www.magnetic-access.com.au or call 1300 364 864
PathMinder Launch The New HPJ Security Portal PathMinder are launching the HPJ Security Portal in Australia. The unique HPJ Security Portal is a half security portal designed to ‘cap’ any existing access controlled door that needs to increase its security level to stop any tailgating or unauthorised entry attempts through that doorway. The HPJ portal is an easy to deploy system that will turn any standard access controlled door into a high security door interlock. Following an authorised user through a door is known as tailgating and it is very easy to do. We have all been told that it is good manners to hold doors open for other people and often good manners win over the good security practice. Intruders may therefore be willingly let into a secure area thereby rendering the access control system redundant. PathMinder portals solves this problem by ensuring everyone who passes through a doorway must present their access control card. The HPJ Security Portal is made up of a curved set of doors that cap the
securitysolutionsmagazine.com
094-097_SSM111 Product Showcase.indd 97
exiting door and use the existing door to create a set of interlocking doors. The intelligent controller in the portal makes sure only one door is open at a time, thereby restricting access and a sophisticated ultra-sonic tailgate detection system to ensure access is limited to authorised people only. The HPJ140 features a 900mm opening for DDA compliance and is one of our few security portals that is fail safe in the event of power fail. The HPJ140 is the ideal solution to retrofit to an access control door where tailgating has become a problem. As standard, the units are designed to be burglary resistant and are certified as P1A. Options for each model include vandal, attack and bullet resistant solutions up to BR5 in certain models. Other customisations include metal detector to stop weapons being brought onto a premise. n For further information call 1300 750 740 or visit www.pathminder.com.au
SECURITY SOLUTIONS // 97
21/12/17 3:23 pm
STOPTALK
circlelock architectural revolving doors from boon edam show how high security entrances can be harmoniously elegant
An architectural revolving door that harmoniously combines elegant good looks with the highest-level security features available from global entrance specialist Royal Boon Edam is being introduced to Australia and New Zealand. The softly arched Boon Edam Circlelock series incorporates two bullet resistant curved glass sliding doors governing access to and egress from a glass portal that offers a spacious and comfortable entrance for the user, while the integrated security systems operating within it ensure only authorised people can pass through to the building or facility being protected. “Circlelock is used where it is imperative that only the right person enters an area of your building,” says Boon Edam Australia Managing Director Mr Michael Fisher. “The design blends beautifully with the décor of modern and classic buildings around the world, proving that
98 // SECURITY SOLUTIONS
098-102_SSM111 Shop Talk.indd 98
beautiful form can be combined with efficient function. Because of its good looks and high security combination, it is now proven in use globally in applications such as government and diplomatic buildings, banks, airports, prestige jewellery and high value retail outlets, computer and data server rooms and corporate offices and headquarters.”
Access control • Comprising a circular portal with two curved sliding doors, Circlelock opens the outside door upon authorisation of an access control system. • Once the user has entered the portal, a weight system or StereoVision system integrated into the door determines whether the user is alone in the door, providing an efficient antipiggybanking system. • After sensing the presence of the person in the Circlelock, and if there is no alarm
situation, the first door will close and lock after which the second door will automatically open. • When the person has left the Circlelock, the second door will close and lock again. • The Circlelock is now in rest position and ready (stand by) to start a new cycle. • A red/green LED indication on the end stiles shows the status of each door wing at each side of the Circlelock. An additional biometrics identification system can match the biometric data of the user to a database to ensure the right person is entering the area. Only when both security systems give a clear signal, will the second door open and can the secured area be entered. Circlelock can optionally incorporate StereoVision time of flight camera systems to create extremely accurate 3D images of the person in the door to determine whether they
are alone. StereoVision is even capable of discerning between a person and a briefcase or bag. The Circlelock system – available in stock internal diameters from 1000-15000mm and height under canopy of 2200mm – is one of the comprehensive product groups of the global Boon Edam group, which operates in 27 countries. Circlelock is also one of a suite of security entrance and revolving doors systems already in service in Australasia. For security reasons, these companies cannot be named, but Boon Edam can arrange a private visit to demonstrate its security entrance technologies in operation locally. n For further information, please contact: Michael Fisher Managing Director T +61 1300 689 905 M: +61 (0)415671884 E: michael.fisher@boonedam.com W: www.boonedam.com.au
securitysolutionsmagazine.com
21/12/17 4:17 pm
FREE EBOOK
securitysolutionsmagazine.biz/cybersecurityebook
098-102_SSM111 Shop Talk.indd 99
21/12/17 4:17 pm
STOPTALK
Dahua Technology Ranked Top 3 Globally by a&s Security 50 is one of the most comprehensive and influential reports in the industry that ranks the top security manufacturers in the world. The annual Security 50 ranking is based upon product sales revenue, gross profit, and profit margin during the previous fiscal year. With a sales revenue of CNY13.33 billion (US$1.93 billion) and 32.26% annual growth from 2015, Dahua jumped to the top 3 this year and moved one position higher than last year’s ranking. “It is a great honor to be recognised once again by the 2017 Security 50 and we are delighted to become one of the top three companies in the security industry,” said Fu Liquan, chairman of Dahua Technology. “This outstanding performance demonstrates Dahua’s continuing dedication to innovation in the application of video surveillance.”
100 // SECURITY SOLUTIONS
098-102_SSM111 Shop Talk.indd 100
In 2016, Dahua put forth new value propositions comprising innovation, quality and services, to create value for city management, business operations, and consumer living. Dahua’s continued high investment in R&D, which reached 10.69% of sales revenue this year, has culminated in a full series of innovative smart products based on deep learning technology, including front-end and backend products that support facial recognition, electronic police video check points, and structured video servers. The year also experienced rapid development within the security industry, which has led distributors and integrators to enhance business value by transforming their strategy from product sales to the construction of complete security systems. To meet changing and diverse customer needs around
the world, Dahua has released a series of customisable end-to-end security solutions. To better serve its customers and partners in over 180 countries and territories, Dahua has established 35 subsidiaries around the globe, covering the Asia & Pacific region, North America, South America, Europe, and Africa. To enhance localisation, Dahua overseas subsidiaries have recruited local talents to provide better sales, marketing, and technical support to local customers and partners. In 2017, the global security industry is facing an unprecedented opportunity presented by the era of AI, and Dahua has been strengthening its core capabilities, exploring adjacent technologies and business sectors, and integrating its business value
chain. Dahua is pragmatically driving the implementation of new technologies to help customers take advantage of this market transition. Dahua’s core strategy is globalisation. AI and IoT are the main themes of 2017. Dahua will continue its investment in globalisation and R&D to become a world leading video-centric smart IoT solution and service provider. With a mission of “Enabling a safer society and smarter living”, Dahua will continue to focus on “Innovation, Quality and Service”, to serve its partners and customers around the world. n Visit www.dahuasecurity.com to learn more and follow us on Facebook and LinkedIn. Media Contact: Vivid Gu, (Gu_Jun1@dahuatech.com) Tel:+86-571-28069750
securitysolutionsmagazine.com
21/12/17 4:17 pm
V T
VIDEO DOESN’T HAVE TO BE EXPENSIVE TO BE EFFECTIVE
With years of experience across hundreds of clients, let us show you how we can help you generate more business than ever before. enquiries@interactivemediasolutions.com.au
098-102_SSM111 Shop Talk.indd 101
21/12/17 4:17 pm
Security Solutions Magazine, Level 1, 34 Joseph St, Blackburn, Victoria 3130 | Tel: 1300 300 552
I wish to subscribe for: oONLY $62 per annum! Name: ............................................................................Company: ....................................................................................... Position: .........................................................................Address: ......................................................................................... Suburb:...........................................................................State: ................................. Postcode:............................................. Tel:..................................................................................Email: ................................................................. ........................... TERMS AND CONDITIONS For more information on subscriptions, or to contact Interactive Media Solutions, please phone 1300 300 552 or email to admin@interactivemediasolutions.com.au. Deductions will be made from your nominated credit card every year in advance of delivery. The direct debit request and subscription price may be changed by Interactive Media Solutions from time to time, however you will always be given at least 28 days notice. The authority to debit your account every year remains valid until you notify Interactive Media Solutions to cancel your subscription by contacting Interactive Media Solutions Customer Service. No refund is given after a payment is made. In the event of a cancellation of your subscription, the subscription will simply expire twelve months from when the last subscription payment was made. Information on how we handle your personal information is explained in our Privacy Policy Statement.
Credit Card oBankcard
oVisa
oMastercard
oAmex
oDiners
Card Number: ........................................................................................................................................................................ Exp: _ _ / _ _ Card Name: ......................................................................................................................................................................................................... Signature: ..............................................................................................................................................................................................................
When payment has been received and funds cleared, this document serves as a Tax Invoice. Interactive Media Solutions ABN 56 606 919 463. If this document is to be used for tax purposes, please retain a copy for your records.
Security Solutions Magazine digital version is now available via ISSUU on every platform, everywhere! Download it now and enjoy your favourite security magazine when you like, where you like, however you like. PC, MAC, Linux, Apple, Android, Google and more...
Subscribe to Security Solutions Magazine for
ONLY $62 per annum! Simply fill in the form or call 1300 300 552
098-102_SSM111 Shop Talk.indd 102
21/12/17 4:17 pm
115_SSM111 IBC.indd 1
20/12/17 3:51 pm
CRASH RATED SURFACE MOUNT & SHALLOW MOUNT SOLUTIONS
FIND OUT MORE ABOUT US!
AUSTRALIA NATIONAL
1300 558 304 11 Cooper Street Smithfield NSW 2164 www.ezisecurity.com.au sales@ezisecurity.com
116_SSM111 OBC.indd 1
20/12/17 3:52 pm