Security Solutions Issue #112

Page 1

A U S T R A L A S I A’ S L E A DI N G S E C UR I T Y R E S OUR C E F O R BU S I N E S S A N D G O V E R N ME N T

MAY 2018 ISSUE 112

SECURITY AT THE GAMES:

AN INSIDER’S ANALYSIS


ISSUE 112

FEATURES

20

40

CONTENTS

78

50

46

28

COVER STORY

The complexity of delivering security arrangements for a major international multi-sport event run over 11 days, comprising 275 events in 19 sports, involving 4500 athletes from 72 nations and territories is a monumental task to say the least. In this issue’s cover story, Neil Fergus takes a retrospective look at the recent Gold Coast games to determine whether or not the security operation for the 2018 Commonwealth Games will be assessed as either a Bronze, Silver or Gold medal performance.

62

20 HOW HOLLYWOOD IS FIGHTING TERRORISM

How can Iraqi military forces and film makers work with Hollywood companies and celebrities to narrate and recreate powerful and appealing stories of Iraq’s recent war with ISIS? Anne Speckhard and Ardian Shajkovci of the International Center for the Study of Violent Extremism (ICSVE) talk about their recent participation in a joint venture led by the US Department of Defense, in conjunction with the Iraq Military and member of the entertainment industry from both nations, aimed at developing films to help youth recognise the lies of groups like ISIS and to redirect them to better paths to truly heroic acts, finding significance and to pursuing nationhood.

46 HOW I BECAME AN ISIS BRIDE

We present part two of our in-depth examination of how young women are being recruited and radicalised by groups like ISIS and sent back home as dangerous weapons.

50 NEW ISO31000 COMING THIS YEAR. ARE YOU READY?

After more than five years in the making and thousands of comments received from representatives of 54 participating and observing countries, as well as multiple liaison organisations, the updated ISO 31000 standard is going through the final stages of feedback and will likely be published in early 2018. This article summarises the key changes to the most popular standard in the risk management world, ISO 31000, and how the changes will impact businesses.

70 NATIONAL SECURITY CHANGES – AUSTRALIAN-STYLE INTELLIGENCE

Clive Williams looks at the June 2017 Independent Intelligence Review and its potential impact upon the Australian national security and intelligence apparatus.

REGULARS 04 LETTER FROM THE EDITOR 06 CYBER SECURITY

We look at the results of the recently released 2018 State of Cybersecurity Study by ISACA.

08 RESILIENCE

Dr Rita Parker looks at the benefits of exercises in developing a truly resilient organisation.

10 HUMAN RESOURCES

Greg Byrne examines the challenges of human resource management in private RTO’s operating in the security space.

12 RISK MANAGEMENT

Jason Brown looks at the ISO 31000 standard for Risk Management.

14 COMMUNICATIONS 16 THINKING ABOUT SECURITY

Does security as a separate body of knowledge even exist anymore?

18 EVENTS

A look at upcoming industry events.

28 OPERATIONS

Richard Kay examines the value of role playing in security training.

32 EVENTS

78 PRODUCT SHOWCASES 82 SHOPTALK

Company announcements from within the industry.

How can we achieve more effective screening at major events?

36 BUSINESS

How can you keep your business relevant in a rapidly changing industry?

44 LEGAL Q&A

Wills are an important safeguard for anyone who works in a dangerous role or owns a business. We look at the 10 most important things you need to know about wills.

54 AVIATION

Do body scanners work?

58 LOSS PREVENTION

What is the lawfulness or otherwise of filming people in public places and if security staff are filmed in the performance of their work, what is the appropriate response?

62 ACCESS CONTROL

How will Access Control as a Service (ACaaS) change the industry?

74 SEVEN WAYS TO EXHIBIT LIKE A PRO

With Security 2018 just around the corner, we talk to an expert to bring you some great tips and tricks to make your next exhibition a genuinely profitable experience. 2 // SECURITY SOLUTIONS

securitysolutionsmagazine.com



FROM THE EDITOR FROM THE EDITOR www.securitysolutionsmagazine.com

EDITORIAL www.securitysolutionsmagazine.com

EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon

Jason Brown, Greg Byrne, Homer Enriquez,Neil Fergus, Richard Kay, Steve Lawson, Michael McQueen, CONTRIBUTORS Rita Parker, David Philips, Anna Don Foster, WilGarry Barnes, Jason Brown, GregRichards, Byrne, Kevin liams, Anne Alex Sidernko, Ami Toben, Richard Kay,Speckard, Steve Lawson, Justin Lawrence, Scott Jim Viscardi, Tony Zalewski O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Anne Speckard, Alex Sidernko, Ardian Shajkovci, Ami Toben, Simeon Votier

ADVERTISING

Keith Rozairo PHONE 1300 300 552 ADVERTISING Keith Rozairo EMAIL keith@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL keith@interactivemediasolutions.com.au Jonathan Rudolph DESIGN1300 AND300PRODUCTION PHONE 552 Jonathan Rudolph EMAIL graphics@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL graphics@interactivemediasolutions.com.au

DESIGN AND PRODUCTION

MARKETING AND SUBSCRIPTIONS PHONE 1300 300 552 MARKETING AND SUBSCRIPTIONS EMAIL admin@interactivemediasolutions.com.au PHONE AUD 1300inside 300 552 $62.00 Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues) EMAIL admin@interactivemediasolutions.com.au $62.00 AUD inside Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues)

ACCOUNTS PHONE 1300 300 552 ACCOUNTS EMAIL accounts@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL accounts@interactivemediasolutions.com.au

PUBLISHER PUBLISHER

ABN 56 606 919463 Level 1, 34 Joseph St, Blackburn, Victoria 3130 ABN 56 606 919463 PHONE 300 552 Level 1,1300 34 Joseph St, Blackburn, Victoria 3130 EMAIL PHONEenquiries@interactivemediasolutions.com.au 1300 300 552 WEBSITE www.securitysolutionsmagazine.com EMAIL enquiries@interactivemediasolutions.com.au WEBSITE www.securitysolutionsmagazine.com DISCLAIMER The publisher takes due care in the preparation of this DISCLAIMER magazine and takes all reasonable precautions and

The publisher takes due care in the preparation of this makes all reasonable effort to ensure the accuracy magazine and takes all reasonable precautions andof material in effort this publication, butaccuracy is not liable makes allcontained reasonable to ensure the of for any mistake, misprint omission. but Theispublisher material contained in thisor publication, not liable does notmistake, assume any responsibility or liability for any for any misprint or omission. The publisher loss or damage which may result from any inaccuracy does not assume any responsibility or liability for any or omission in this publication, orfrom fromany theinaccuracy use of loss or damage which may result information herein. The publisher makes or omission contained in this publication, or from the use of no warranty, express or implied to any of the information contained herein.with Therespect publisher makes no material contained herein. warranty, express or implied with respect to any of the material contained herein. The contents of this magazine may not be reproduced in ANY form in OR in part without The contents ofwhole this magazine may not be WRITTEN reproduced permission from the publisher. Reproduction includes in ANY form in whole OR in part without WRITTEN copying, photocopying, translation or reducedincludes to any permission from the publisher. Reproduction electronic medium or machine-readable form.to any copying, photocopying, translation or reduced electronic medium or machine-readable form.

WRITTEN CORRESPONDENCE TO: WRITTEN TO: Level CORRESPONDENCE 1, 34 Joseph St, Blackburn, Victoria 3130  Level300 1, 34 Joseph St, Blackburn, Victoria 3130 1300 552  1300 300 552 enquiries@interactivemediasolutions.com.au   enquiries@interactivemediasolutions.com.au

A D

s the leading security resource in

issues everywhere you go. Of course, getting

Australia, we talk a lot about the

all the back issues will be a work in process.

need to be atreally the forefront of oes Australia take security technology. it isclaims only seriously? Yes,Therefore, Government

While do customer feedback provided Australian’s have a very relaxed attitude the motivation the change, togreatest security because theyfor believe, rightly we or were

fitting that weto,actually practise we preach, and some of thewhat corporate even if it is somewhat scary to doa so. To that end, sector demonstrate passing

also very of thehappen original mission wrongly, thatmindful “it will never here”. This the magazine, which was to get quality is of a sentiment we can only hope remains true.

we havefrom recently made some interest time-to-time, but significant what of thechanges to the magazine. average man and woman on the street? Do we

professional information However, as the development old axiom states, one shouldabout security practices into hands ofworst as many always expect the best butthe plan for the and

As most you are no doubt wea honestly takeof security seriously or aware, do we, as

working andsurprised. studying security professionals prepare to be

have been producing a digital of nation, just pay lip service to the version idea

asOf possible withshould a viewnot to have improving course, one to relystandards upon

Security Solutions since 2010. It is with great of security?

and form practices in the industry. mission some of devastating incidentThis to occur in was

excitement that we have notedbe the steadily As we enter 2018, we should thankful that

a large part people of whyto our subscription prices order to force take security seriously.

growinghas number digitalasubscribers over Australia neverof suffered major terrorist

haveisnot changed in almost 20 years. Our There a great deal that the security industry

incident of 9/11, the Boston bombings, the last the fewlikes years. Following the security expo

can do to educate the only business about subscription costs evercommunity covered the cost

the 7,time 2005since in London or the lastbombings year, for of theJuly first launching

the of distribution. taking securityNow, seriously. Inbring past ofbenefits print and we can

terrorist attacks of October 12, 2002 inwe Bali. the digital version of the magazine, finally

issues Security Solutions Editor-At-Large Rod that those costs down even further to ensure

However, result,where the Australian reached as thea point we havecommunity more digital

Cowan has written aboutSecurity how security can act everyone can access Solutions. Atas just

has become somewhat withled regard subscribers than printcomplacent readers. This us to

a differentiator foryear, business and give to companies $17.85 for the that equates a little

to I often hear many of our readers ansecurity. interesting juncture. Many of you havewho been are security managers within large corporations quizzing us for years as to why we still produce

a competitive under threeedge. dollars an issue. You cannot even

comment on the of differences between a print version the magazine. Ourattitudes response to security in Australia and America, where they was always that we wanted the magazine to be

If we have learned anything from tragic get a coffee for that! events that have occurred globally in recent If you have subscribed or renewed your years, it must be that the world has subscription to the print versionchanged of the –

often have to travel and work. According to many as accessible as possible to as many security security managers, Americans understand that professionals as possible. However, as the

permanently – and we keep pretending magazine within thecannot last two issues, your that it has not. 9/11 was not an isolated incident subscription will be extended to a two-year

terrorism is asmart clear devices, and present danger and a number of tablets, chrome fact of daily life and thus, they treat security books, laptops, iPads and the like have grown,

and if groups like ISIS have such digital subscription as oftheir thisway, issue, at no attacks will become much more frequent. There extra charge.

and security workers with the due respect. In we have seen a significant shift in the way contrast, they believe that Australian’s have a readers are interacting with the magazine. very blasé attitude towards security and it is this Given that we have come from a traditional attitude that makes us much more vulnerable print publishing background, the idea of to attack. abandoning the very model that has seen us In my opinion, having recently travelled establish a position as the leading resource through Egypt and Jordan, they are correct. for all things security seemed downright

is a great deal more work to be done to ensure If you are due to renew your that we create the kind of effective security subscription, then please visit www. culture within organisations and the broader securitysolutionsmagazine.com and click on community that will enable Australian’s to be the subscribe link at the top of the page. For safe and secure. And the work must begin with those of you who have been trying to renew security professionals. Let’s make 2018 the year from the website recently, I offer sincere that Australia begins to take security seriously. n apologies for any technical difficulties you

terrifying. However, we need to acknowledge

may have experienced while we were ironing

that we must move with the times and the

out the new system, but all is now working as

wishes of our readers. The shift we have

it should.

seen in the data showing us how people

I would welcome your feedback as we

interact with the magazine, combined with

continue to develop and improve our magazine

the feedback from readers and a desire for

in its digital format. If you have specific ideas

us to become more sustainable, has led us to

about things you would like to see more of in

make the decision that Security Solutions, from

the magazine, please do not hesitate to let us

the beginning of 2018, will continue in its

know. I would also encourage you to become

digital format.

part of our regular digital e-newsletter if you

So, what does this mean for you the reader?

have not already. It is full of great articles

Honestly, not much. You will still have access to

and information and is a great addition to

the same six issues per year. You will still have

the magazine.

all the same great articles from the best minds

PR SECURIT Y

RALIA LTD

Official Official Partners Partners Y P R OVI D RIT

CU

favourite device or computer but, and here is the thing, it will now cost you roughly one third

ON

SPAAL SE

STRALIA LTD AU

PR O

O C I AT I

of the price of the old print magazine. That

D LT

OF

SECURITY

ASS

AU S T R A L I A

SSOCIAT IO N

RS

OF

E

Original Size

RS A DE VI

To exciting times ahead. We look forward to seeing you at Security 2018 in July.

magazine so that you can read it offline on your

SSOCIATI RS A ON DE O VI UST FA

O

in security. You will be able to download the

is right – less than half what was already an blue colour changed to this colour green.

COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE signing your approval to print. Please pay special attention to spelling, punctuation, dates, times, telephone numbers, addresses etc, as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman Press assumes no responsibility for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................

// SECURITY SECURITY SOLUTIONS SOLUTIONS 46 //

extremely well-priced resource. Furthermore, John Bigelow you will have access to the back catalogue of Editor

John Bigelow Editor

securitysolutionsmagazine.com securitysolutionsmagazine.com


Increase your business intelligence Licence free! NO annual subscriptions

(S99659)

PPRO-VA-BOX1

4-Channel Video Analytics Box

Part of the PACOM Professional Series, the PPRO-VA-BOX1 is a 4 channel video analytics box that uses the video streams from select cameras to provide People Counting, Heat Mapping and Queue Management analytic functions, all of which can be exported as a report to help management better understand customers and their behaviours.

Queue Management

We’re live HCORP0025-May18-version 1

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au

facebook.com/HillsLtd/ CONNECT

E N T E RTA I N

SECURE

Heat Mapping

People Counting

Visit our new website and buy online at hills.com.au


CYBER SECURITY

CYBER SECURITY GAP CONTINUES TO WIDEN A

ccording to the 2018

surveyed, about half (51 per

State of Cybersecurity

cent) of respondents report

Study recently

having diversity programs

released by ISACA,

in place to support women

the worldwide cybersecurity skills gap continues to present a

cybersecurity professionals. • Individual contributors with

significant challenge, with 59 per

strong technical skills continue

cent of information security

to be in high demand and

slight improvement in number

program to improve recruitment,

professionals reporting unfilled

short supply. More than 7

of qualified candidates. Last

advancement and retention of

cyber/information security

in 10 respondents say their

year, 37 per cent of security

positions within their organisation,

organisations are seeking this

professionals said fewer than

kind of candidate.

qualified individuals. 2. Invest in the talent you have,

25 per cent of candidates

to develop the skills you

Yet, there are several positive

for security positions were

need. The skills organisations

and promising insights in the

sufficiently qualified. This year,

need are in short supply, so

trends revealed in part 1 of the

ISACA data:

that number dropped to 30

organisations will need to close

recently released ISACA State of

• Time to fill open cybersecurity

per cent.

the gap through training and

according to ISACA’s new cybersecurity workforce research. Among the concerning

• Budgets are increasing. Sixty-

retention programs.

Cybersecurity 2018 Report:

positions has decreased

• High likelihood of cyberattack

slightly. This year, 54 per cent

four per cent of respondents

continues. Four in five security

of respondents say filling open

indicate that security budgets

and actionable reporting to the

professionals (81 per cent)

positions takes at least three

will increase this year, compared

board about security concerns.

surveyed indicated that their

months, compared to last year’s

to 50 per cent last year.

If the enterprises measure and

enterprise is likely or very likely

62 per cent.

to experience a cyberattack

• Gender disparity exists but can

3. Implement objective, consistent

“This research suggests that the

track risk systemically and

persistent cybersecurity staffing

holistically, board prioritisation of security is likely to improve.

this year, while 50 per cent

be mitigated through effective

problem is not a financial one.

of respondents indicate that

diversity programs. Diversity

Even though enterprises have

their organisation has already

programs clearly have an impact.

more budget than ever to hire,

About the State of Cybersecurity

experienced an increase in

In organisations that have one,

the available workforce lacks the

Study

attacks over the previous 12

men and women are much more

skills organisations critically need,”

More than 2,300 cybersecurity

months.;

likely to agree that men and

said ISACA CEO Matt Loeb, CGEIT,

professionals who hold ISACA’s

women have the same career

CAE. “More of those dollars will

Certified Information Security

(31 per cent) say their board

advancement opportunities.

need to be invested in technical

Manager (CISM) and/or Cybersecurity

has not adequately prioritised

Eighty-seven per cent of

cybersecurity training, along with

Nexus Practitioner™ (CSXP)

enterprise security.

men say they have the same

effective retention programs.

designations and positions in

• Men tend to think women have

opportunities, as compared to

Practitioners who acquire and

information in security participated

equal career advancement

77 per cent of women. While

demonstrate hands-on technical

in the online survey. The findings will

in security, while women say

a perception gap remains, it is

cybersecurity skills will find

be issued in three reports in 2018.

that’s not the case. A 31-point

significantly smaller than the

themselves in significant demand.”

To download a complimentary copy

perception gap exists between

37-point gap among men and

male and female respondents,

women in organisations without

with 82 per cent of male

diversity programs (73 per

respondents saying men

• Nearly 1 in 3 organisations

of part 1, visit https://cybersecurity. isaca.org/state-of-cybersecurity. The

cent of men in organisations

Reducing Risk and Strengthening Cybersecurity

and women are offered the

without diversity programs say

ISACA recommendations that

evolving threat landscapes, including

same opportunities for career

advancement opportunities are

can help enterprises address the

trends related to enterprise threats,

advancement in cybersecurity,

equal, compared to 36 per cent

skills gap and bolster security

defense mechanisms and more. The

compared to just 51 per cent of

of women).

programs include:

study is the latest research from

1. Develop a strong diversity

ISACA’s Cybersecurity Nexus. n

female respondents. Of those

6 // SECURITY SOLUTIONS

• Security managers are seeing a

second volume of the State of Cyber Security study will shed light on

securitysolutionsmagazine.com


SECURE YOUR DATA & EQUIPMENT

A data enclosure is your last line of defence, so it needs to be strong enough to stop unauthorised access. CER TIF IE CLASS C

D

The MFB range of Class B and Class C enclosures are purpose built frames fitted with key locks and boltwork approved by the Australian Government Security Construction and Equipment Committee (SCEC)

INATION LOCK MB S CO

All enclosures are fitted with tamper evident cable entry systems, high impact clear polycarbonate panels on doors, secure venting systems and certified combination locks. CLASS B

An alternative product, the MFB range of High Security enclosures provides a lower level of security and is not SCEC approved. Effectively construction methods mirror the Class B and Class C series, however the doors are fitted with a cheaper bilock keying system. Also additional flexibility with the design regarding cable entry encourages effective quick installation and high volume data cable installations. With over 50 years in the business, and backed by the SCEC approval for manufacture, these Australian built 19”rack mount enclosures provide peace of mind in relation to the security your

data needs.

DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS

www.mfb.com.au

VIC (03) 9801 1044 / sales@mfb.com.au

AUSTRALIAN MADE MAKES AUSTRALIA NSW (02) 9749 1922 / sydney@mfb.com.au

fb.com/mfbproducts


RESILIENCE relevant and timely exercises helps to evaluate organisational plans to ensure resilience processes are fit for purpose. The other key value of conducting exercises is that the findings provide valuable evidence, particularly for the security professionals in charge of the exercises. In this 21st century of global risks and threats unheard of by previous generations of

DR RITA PARKER

managers, the development of the human capacity of individual leaders

EXERCISES AND THE RESILIENT ORGANISATION

and their enabling teams to handle unplanned eventualities is critical. The use of well-thoughtout exercises helps people in organisations better understand the risks and threats, as well as their own vulnerabilities. Importantly, it allows them to put in place useful, tested and relevant plans that

ny business plan will

because it provides a response

for any organisation, whether it is

will help them achieve a resilient

not survive its first

to life-threatening situations and

a multi-national corporation or a

organisation that has demonstrated

encounter with

events that cannot be averted in

smaller company, so that people

its duty of care to its people and

reality. The reality

time. Organisations need to be

learn to function under duress in

other stakeholders. n

will always be different. It will

resilient to survive and thrive; they

a safe environment rather than be

never fit the plan.” Jeff Bezos,

need to be able to absorb an event

thrown in the deep end – with only

Amazon

that necessitates change, to adapt

an untested plan!

“A

That is why the key to planning

and continue to maintain their

lies in creating strategies that are

competitive edge and profitability.

resilient, particularly to deal with

The viability and sustainability

Conducting regular testing of

Dr Rita Parker is a consultant advisor to organisations seeking to increase their corporate and

existing corporate plans through

organisational resilience and crisis

exercises is part of an organisation’s

management ability. She is an

unlikely disruptions and events. The

of organisations continues to be

duty of care to its staff and other

adjunct lecturer at the University of

likelihood of a complex emergency

tested in a world that is constantly

stakeholders. However, the value

New South Wales at the Australian

or crisis situation is a very real

changing and with such change

of such exercises is often criticised

Defence Force Academy campus

consideration for senior managers

comes a range of new risks, threats

by some senior managers and

where she lectures on resilience and

and security professionals and such

and challenges – often unexpected

employees who argue that they

non‑traditional challenges to security

a situation can occur with little or

or unanticipated. This has led to

are too busy to be away from ‘their

from non‑state actors and arising

no warning, affecting a broad range

a shift in security management

real job’! They need to keep in mind

from non-human sources. Dr Parker

of people and resources. When such

practices for emergency events and

they will not have a job to do if the

is also a Distinguished Fellow at the

a situation occurs, people feel the

crisis situations. This new framework

organisation does not or cannot

Center for Infrastructure Protection

need to take action – to respond.

recognises that non-professionals

function properly.

at George Mason University Law

Therefore, the governance of

are directly and indirectly

emergencies or crisis situations has

involved in security practices.

activities develop the capabilities

former senior advisor to Australian

become part of everyday life.

Such involvement can range from

of managers and employees;

federal and state governments in

reporting suspicious behaviour to

they offer opportunities to make

the area of resilience and security.

traditional corporate strategies

more active participation in specific

mistakes and to learn from them

Dr Parker’s work and research has

are not protecting them from an

resilience practices, including

and, in doing so, validate the

been published in peer‑reviewed

unexpected event. Resilience – the

exercises that seek to educate

organisation’s resilience process

journals and as chapters in books

capacity to self-organise, to learn

and train potential or likely at-risk

and build confidence. Exercises

Australia, Malaysia, the United

and to adapt to disruption – offers

corporate populations.

provide an ideal opportunity to gain

States, Singapore and Germany

real hands-on experience in a safe

and presented and national and

Organisations are realising that

a useful mechanism of governing

The only way to know if a plan

Conducted effectively, exercise

School, Virginia, USA. She is a

emergency and crisis situations.

is effective is to use it. The next

and secure learning environment,

international conferences. Rita holds

Resilience has been adopted into

best thing is to test it through an

by using realistic and relevant

a PhD, MBA, Grad. Dip., BA, and a

policy and response strategies

exercise. Such exercises are critical

scenarios. Importantly, conducting

Security Risk Management Diploma.

8 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


The Cobalt is an innovative low voltage motor driven door lock for swing doors. It has been designed to secure double acting doors and addresses the two biggest issues in door locking; the ability to align a misaligned door and the ability to release when requested, even with excessive load on the door. The Cobalt successfully overcomes these issues and offers the user an array of other features. To learn more about our complete range of smart and secure access solutions, contact dormakaba.

T: 1800 675 411 www.dormakaba.com.au

More than just a lock


HUMAN RESOURCES

HUMAN RESOURCE MANAGEMENT IN PRIVATE RTOS OPERATING IN THE SECURITY INDUSTRY IN AUSTRALIA BY GREG BYRNE

he security industry

a vested interest in the effective

non-procedural; it was usually

larger small businesses, especially

in Australia is

management of RTOs, standard

run or controlled by the CEO (in

those that are operating as

dependent on

of education and standard of

other words, the CEO was the HR

RTOs in the security sector, it is

registered training

educators (trainers) that are

manager) rather than by an HR

vital. As the security industry in

organisations (RTOs) to provide

operating inside RTOs, and the

specialist. Which meant HR was

Australia continues to grow and

employees with the requisite

effective (and fair) government

not contributing effectively or

professionalise, so too will the

industry standard qualification to

oversight of these RTOs. One of

independently to the RTO because

pressure on RTOs to continue to

allow currently employed guards

the most important oversight and

it reflected the idiosyncrasies and,

grow and professionalise. Growth

and managers to continue

potentially consultative positions

at times, prejudices of the CEO. It

will force CEOs and their managers

professional growth, and also to

with RTOs is the human resources

also meant the HR role was in some

to formalise HR and build in

educate entry-level employees.

(HR) manager. The reason for this

cases relatively informal. Although

stronger principles of equity and

Anyone who wants to become a

is that one of the roles of HR in

this approach can offer private

fairness to attract and retain high-

security guard in Australia must

any organisation is education,

RTOs a degree of flexibility, it can

quality employees. The trick will

have completed an approved

compliance and recruitment. If HR

be a problem in the compliant-rich

be to do this in a way that does not

course conducted by a recognised

is doing their job in RTOs they will

world of RTOs in the security sector.

sacrifice the flexibilities on which

RTO. Anyone who wants to consult,

ensure the educational standard

Another problem with an overly

they have built their successes. A

teach or install in most states of

of trainers meets the needs and

flexible approach to HR is the

vital need exists in RTOs operating

Australia will need qualifications

requirements of the industry sector.

effective management of business

in security to develop new and

over those required for a guard’s

Further, they will ensure that the

growth, which in the growth

innovative approaches to HR

licence. In NSW, for example,

RTO is meeting the regulatory

industry that security in Australia

management that incorporate both

anyone installing, selling, teaching

requirements of state oversight

is, can be problematic. The reason

flexibility and equity principles. n

or consulting in security needs a

bodies, as well as ASQA. Finally,

for this is that growth heralds

class 2 licence. One of the

the HR manager will also ensure

the need for a more professional,

educational requirements for a

that they are recruiting competent,

less personal approach to

of Multiset Consultancy Pty Ltd, a

class 2 licence is, as a minimum, a

qualified and focused trainers and

management, including the need

multi-faceted consultancy advising

Cert IV in Security Risk Management

support staff.

for a more formal approach to

CEOs and boards of security

HR management.

organisations in Australia on best

T

offered by an RTO that has

A wide-ranging study conducted

Greg Byrne is CEO and director

approaches to manage business

Australian Skills Quality Authority

by an academic from a regional

(ASQA) approval to offer and run

NSW university on the role of HR

I have espoused the need for

risk, particularly operations, disaster

the course.

in RTOs made several interesting

dedicated HR positions in all

recovery, business continuity and

observations on how HR is

organisations. It may not be

human resources. Greg can be

on the training sector that the

operating in privately run RTOs.

possible in small businesses, but

contacted via email greg@multisec.

Australian security industry has

It found that HR was informal and

for medium businesses and the

com.au or on 0402 295 124.

It is because of this dependency

10 // SECURITY SOLUTIONS

In this column in the past

securitysolutionsmagazine.com



RISK MANAGEMENT

THE NEW ISO 31000 KEEPS RISK MANAGEMENT SIMPLE D

BY JASON BROWN

amage to reputation or

nature of risk management,

risk management to their needs

be developing the HB167 Security

brand, cybercrime,

drawing on new experiences,

and objectives – a key benefit

Risk Management Handbook

political risk and

knowledge and analysis for the

of the standard. Jason Brown

terrorism are some of

revision of process elements,

explains: “ISO 31000 provides a

ISO/TC 262, Risk management:

the risks that private and public

actions and controls at each stage

risk management framework that

https://www.iso.org/

organizations of all types and sizes

of the process

supports all activities, including

committee/629121.html

around the world must face with

• Streamlining of the content

decision making across all levels

News:

increasing frequency. The latest

with greater focus on sustaining

of the organization. The ISO 31000

https://www.iso.org/

version of ISO 31000 has just been

an open systems model that

framework and its processes

news/2017/02/Ref2165.html

unveiled to help manage

regularly exchanges feedback

should be integrated with

https://www.iso.org/

the uncertainty.

with its external environment to

management systems to ensure

news/2015/05/Ref1963.html

fit multiple needs and contexts

consistency and the effectiveness

Web page:

Risk enters every decision in life, but clearly some decisions need a

As Chair of technical committee ISO/

of management control across

https://www.iso.org/iso-31000-

structured approach. For example,

TC 262 on risk management that

all areas of the organization.”

risk-management.html

a senior executive or government

developed the standard, I suggest

This would include strategy and

TC website :

official may need to make risk

that the revised version of ISO

planning, organizational resilience,

https://isotc262.org/

judgements associated with very

31000 focuses on the integration

IT, corporate governance, HR,

complex situations. Dealing with risk

with the organization and the role of

compliance, quality, health and

ISO store

is part of governance and leadership,

leaders and their responsibility. Risk

safety, business continuity, crisis

ISO 31000 n

and is fundamental to how an

practitioners are often at the margins

management and security.

organization is managed at all levels.

of organizational management

The resulting standard is

Jason Brown is the National

and this emphasis will help them

not just a new version of ISO

Security Director for Thales in

practices are no longer adequate to

demonstrate that risk management is

31000. Reaching beyond a simple

Australia and New Zealand. He is

deal with today’s threats and they

an integral part of business.”

revision, it gives new meaning

responsible for security liaison

to the way we will manage risk

with government, law enforcement

Yesterday’s risk management

need to evolve. These considerations

Each section of the standard

were at the heart of the revision

was reviewed in the spirit of clarity,

tomorrow. As regards certification,

and intelligence communities to

of ISO 31000, Risk management –

using simpler language to facilitate

ISO 31000:2018 provides

develop cooperative arrangements

Guidelines, whose latest version has

understanding and make it accessible

guidelines, not requirements,

to minimise risk to Thales and

just been published. ISO 31000:2018

to all stakeholders. The 2018 version

and is therefore not intended

those in the community that it

delivers a clearer, shorter and

places a greater focus on creating

for certification purposes. This

supports. He is also responsible

more concise guide that will help

and protecting value as the key driver

gives managers the flexibility to

for ensuring compliance with

organizations use risk management

of risk management and features

implement the standard in a way

international and commonwealth

principles to improve planning and

other related principles such as

that suits the needs and objectives

requirements for national security

make better decisions. Following

continual improvement, the inclusion

of their organization.

and relevant federal and state

are the main changes since the

of stakeholders, being customized to

previous edition:

the organization and consideration of

TC 262 is to help organizations

of senior boards and committees,

• Review of the principles of risk

human and cultural factors.

ensure their viability and success

including Chair of the Security

over the longer term, in the

Professionals Australasia;

the “effect of uncertainty on

interests of all stakeholders, by

member of ASIS International

objectives”, which focuses on the

providing good risk management

Standards and Guidelines

management who should

effect of incomplete knowledge

practice. Because “failure to

Commission; Chair of Australian

ensure that risk management is

of events or circumstances on an

manage risks is inherently

Standards Committee for Security

integrated into all organizational

organization’s decision making.

risking failure.

and resilience. As of February 2017

activities, starting with the

This requires a change in the

governance of the organization

traditional understanding of risk,

the use of the ISO 31000 in the

of the International Standards

forcing organizations to tailor

security context and where we will

Committee for Risk Management.

management, which are the key criteria for its success • Focus on leadership by top

• Greater emphasis on the iterative

12 // SECURITY SOLUTIONS

Risk is now defined as

The principle objective of ISO/

In the next column I will address

laws. He has served on a number

Jason has been appointed Chair

securitysolutionsmagazine.com


Confidence in the detail of your design.

Complete doorway solution for residential, commercial and industrial premises. Nationwide. Woodpend Hardware stocks the market’s most trusted and cost effective brands in both architectural hardware, electronic access control security. We work side by side with our customers to design a robust and secure yet cost effective total door and installation solution.

AN ARA PRODUCTS COMPANY

08 8373 0311

www.woodpend.com.au


COMMUNICATIONS

TERRORISM – TOOLS AND GOALS BY AMI TOBEN

O

f the various

troops, granting independence,

of casualties might sound like a lot,

attacks have statistically longer

misconceptions

cutting economic ties and so on).

the idea is to affect tens of millions

planning stages than any other type

of people by convincing each and

of crime.

surrounding terrorism, a

This misconception is one which people should not be

every one of them that this could just

surprisingly common one is the

blamed for harbouring, because

as easily happen to them.

misunderstanding about the

this misconception is deliberately

political motivations behind

created by the perpetrators of such

crucial for terrorist organisations

rather than react to attacks. For this

terrorism. This might sound

attacks, and for very good reasons.

because political systems are

reason, it becomes more important

surprising because, as many readers

When people think that the only goal

much more effectively swayed by

than ever to understand the hostile

know, the political aim of terrorism

of terrorist attacks is the creation of

widespread public opinion than by

planning process of an attack.

actually appears in its dictionary

death and destruction, they usually

small-scale, localised ones. Case in

Only once security professionals

definition. And yet, the

assume – wrongly – that planning

point is the 2004 Madrid bombings.

understand this type of hostile

misunderstanding persists.

such attacks is a quick and simple

These attacks caused the deaths

planning, locate its weaknesses and

affair. What, after all, is so difficult

of 191 people and wounded over

learn from case studies (https://

reasons for this is because when

about placing a homemade bomb on

2000, but their real effect was in

protectioncircle.org/2013/07/05/

people think back to specific terrorist

a random busy street?

swaying millions of people to elect

terrorism-case-studies/) will they

the anti-war socialist party only three

be able to disrupt it and prevent it

Perhaps one of the biggest

attacks and recall the chilling

Most terrorist organisations want

This type of multiplier effect is

It is these planning stages that proactive security professionals seek to disrupt in an attempt to prevent

images that were portrayed in the

people to wrongly believe it is easy

days later. The newly elected Spanish

from manifesting itself into an actual

media, many tend to impulsively

for them to carry out such attacks.

government then proceeded to pull

attack. n

declare that the sole intent of such

Anyone who thinks it is easy to plan

its troops out of the Iraq war. This is

shocking attacks is to create death

and carry out a terrorist attack will

a prime example of the unfortunate

and destruction. Slightly more

be much more likely to believe the

effectiveness of terrorism and how it

consulting, training and special

reflective people will claim that

type of declarations terrorists make

enables relatively localised attacks

operations for HighCom Security

terrorists are indeed trying to create

after their attacks, in which they warn

to have profound national, and even

Services. He is one of the pioneer

death and destruction, but that

that individuals and everyone they

international, effects.

developers of the terrorist activity

this is in order for people to live in

know are never safe, that they can

terror – hence the term terrorism. The

be reached at any place at any time.

how difficult it actually is to plan and

and covert protection fields in Silicon

misconception that is contained in

The idea here is to convince as many

carry out a terrorist attack is to follow

Valley. Trained in Israel, Japan and

both of these claims is a classic case

people as possible that they too can

a deductive process and to reverse

the US, Ami has over 15 years of

of mistaking tools for goals.

be personally and physically affected

engineer the attack to figure out how

military (IDF) and private sector

by terrorist attacks, thereby creating

it was planned. Again, if the goal is

security experience. Currently based

a terrorising multiplier effect.

to simply create random death and

in the San Francisco Bay Area, Ami

destruction, then there might not

has been providing special protective

Yes, it is true that most terrorist attacks cause death and destruction, and that death and destruction

The reality of terrorist attacks

One way to start understanding

Ami Toben is the director of

prevention, surveillance detection

evoke feelings of terror, but these

is that, in relative terms, only very

be all that much planning involved,

services to Fortune 500 corporations,

are merely tools (or sub-goals at

few people can actually be harmed.

but if the goal is of a political nature,

foreign governments, foundations,

best). Terrorism’s ultimate goal is for

Casualty numbers from most terrorist

there is likely much more planning

political organisations and wealthy

the feeling of terror to affect public

attacks in the West usually range

behind it. Suddenly, every little detail

individuals. Ami’s new book,

opinion in such a way that it trickles

from single individuals to dozens.

becomes important – from the exact

Surveillance Zone: The Hidden World

into the political system, bringing

Only in very rare cases (like 9-11) will

location and timing to the scale, type

of Corporate Surveillance Detection

about the desirable political change

these casualty figures range up to the

of attack and profile of the victims.

Covert Special Operations, is available

(declaration of war, pulling out of

hundreds. While dozens or hundreds

Indeed, studies show that terrorist

now from amazon.com

14 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


TALL. FAST. STYLISH. Our award winning speedgates combine state-of-the-art optical technology with a high barrier height to protect your building.

EASYGATE SPT

• • • •

Barrier heights up to 1800mm Fast throughput (up to one person per second) Ideal for Disability Discrimination Act compliance Choose from a number of models, including the LX, SPT, SG, IM or LG • Custom pedestals with an array of attractive finishes EASYGATE LX

Find out which security gate is right for you.

1300 858 840

www.entrancecontrol.com.au

EASYGATE IM

FULL HEIGHT TURNSTILE

TRIPOD TURNSTILE

SWING GATE


THINKING ABOUT SECURITY

WHERE DO WE FIT? BY DON WILLIAMS C

t may seem like a silly

matter? With systems becoming

Drones are already being

The old differences between

question, but does

more interconnected, traditional

used for delivery of improvised

physical, personnel and information

security as a separate

delineations of management

munitions and drugs. Increases in

security will continue to blur as

body of knowledge

disciplines such as security,

battery and other on-board power

it did last century with IT and

personnel, facility and so on are

systems with aligned control

communications security. As the

disappearing. If things are linked,

and autonomous controls will

world becomes more interlinked

meld of physical, computing and

security being just one of the

increase the difficulty in controlling

and co-reliant, so will security

communications technologies, the

many functions of the automated,

who is doing what in the low-

specialists need to have a broader

distinction between deterrence,

intelligent BMS, why have any

level airspace.

view of what is being protected,

delay, detection, reporting and

security specialists at all? The same

Given human nature, there

from whom/what and how. The

response is becoming blurred.

question applies in the digital world

will remain a need for a physical

main challenge for security will

Security capability may be

with increased cloud security, and

presence at venues to separate

remain, as always, to be relevant

embedded in the software and its

personnel security where algorithms

antagonists and to calm or remove

and of value to senior management.

roll-out rather than at the site. If

looking at past employment

certain patrons. The ever-increasing

This is done through professional

every item in an Internet of Things

data, public records and so on

ability to record and instantly

development of individual skills

world could be a detector with video

will make the selection of future

transmit incidents with analytical

while looking outwards.

recording, capture and transmission

employees easier.

surveillance will perhaps even see

I

even exist anymore? With the ever-increasing

The answer to the question

capability to monitor the baby, pet or

On the other hand, new

intruder, why will a security specialist be needed to help with placement of CCTV, detection and alarm systems?

the increasing availability of

With improved authentication

Arduino and related hardware and

to provide specialist, detailed

on devices such as access tokens

software, anyone can make items

capabilities and to advise users on

linked into the broader intelligent

sophisticated enough to interface

how best to apply the technologies

building management systems (BMS),

with other systems and be operated

and the vulnerabilities those

is a recognised thought leader in

what need will there be for access

from around the globe. Combined

technologies generate. There

security, emergency management and

control providers?

with automated, remote building/

will probably be an increased

related disciplines. His book, Bomb

home control systems, new types of

need for assurance on the in-

Safety and Security: the Manager’s

via Apple, Microsoft, Google and

unauthorised surveillance, sensors,

place capabilities to see if they

Guide, is available from Amazon.

so on, will the concept of in-house

switches and disabling devices

are protecting the assets of the

Don can be contacted via email

versus external security advice

will appear.

organisation/person.

donwilliams@grapevine.net.au n

With commonality of systems

16 // SECURITY SOLUTIONS

this role evolve into something

is: security does exist as one of

technologies bring with them

more akin to mitigation and

the key protective disciplines,

new security challenges. With

evidence recording.

but it is becoming ever more

There will always be a need

interdependent. Are we sure it will exist in a few years’ time? Don Williams CPP RSecP ASecM

securitysolutionsmagazine.com

M

Y

CM

MY

CY

CMY

K


NEW!


EVENTS

ISC West

moved to the ISC West show

Held annually between

11–13 April 2018

floor in 2017! As the digital

Sydney and Melbourne, TFX is

Sands Expo Convention Center,

and physical worlds collide,

Australia’s largest learning and

Las Vegas

it is increasingly important

networking event for facilities

ISC West is the largest security

for industry professionals to

and workplace management

industry trade show in the US.

protect their organisations and

professions seeking solutions for

At ISC West you will have the

clients from both physical and

creating more efficient, sustainable

chance to meet with technical

cyber threats. CSE provides

and productive facilities

multidisciplinary professions

representatives from 1,000+

holistic solutions for today’s

and workplaces.

to have a voice and achieve

exhibitors and brands in the

connected organisations.

Total Facilities is

• bring new and leading solutions in operational efficiency to the market • deliver forefront trends for running more sustainable facilities and workplaces • foster a community of

recognition

security industry and network with

Working with SIA, ISC West also

comprehensive and efficient in

over 28,000 security professionals.

features world-class education

its delivery and provides real

industry and challenge

to learn about every facet of the

solutions to everyday operational

traditional perceptions of

security industry.

challenges by connecting buyers

In 2018, ISC West will offer attendees a host of attractions including: • new products and technologies,

Visit www.iscwest.com for more information.

encompassing everything

• redefine the future of the

facility management.

and sellers to source innovation,

Visit www.totalfacilities.com.au for

debate current issues, share

more information.

insights and create opportunities

from access control to

Total Facilities

for an invaluable community

CivSec 2018

unmanned vehicles.

18–19 April 2018

of professionals.

1–3 May 2018

• Unmanned Security Expo,

Melbourne Convention and

Melbourne Convention and

introduced in 2017, is an event

Exhibition Centre, Melbourne

Our vision

Exhibition Centre, Melbourne

within ISC West focusing on

Returning to Melbourne with

We champion professionals

Security, Safety and Sovereignty for

unmanned aerial vehicles

an exciting new proposition,

who support the built and work

the Indo-Asia-Pacific Region

(UAVs), unmanned ground

Total Facilities now unites

environment with a sense of

Building on the success of the

robotics and vehicles (UGVs),

both facilities and workplace

belonging and advocacy – the

inaugural CivSec event, 2018

and the various software and

professionals in the ultimate

unsung heroes and behind-the-

will bring together leaders and

applications that support them.

industry destination for the built

scenes forces. We will evolve and

decision makers, policy makers

and work environment.

grow our offer year on year to:

and advisers, managers and

• Connected Security Expo (CSE)

18 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


officials, operational professionals,

through developing a integrated

technical specialists, strategists

strategic focus. In particular, the

and academics, researchers and

conference will look at breaching

consultants, technology developers

the gap for sharing of information/

and industry suppliers.

intelligence, policy, tactics and

While focusing on the Indo-

capability. Recognising modern-

Asia-Pacific region, CivSec 2018

day thought in breaking down

will address issues of global

self-imposed barriers, allowing us

significance. The sovereignty,

to sufficiently structure to better

safety, prosperity and cohesion

secure Australia.

of societies and communities

Safeguarding Australia 2018

everywhere are threatened by

will draw on the knowledge of

natural disasters and emergencies,

domestic and international experts

by human catastrophe and civil

to contextualise the current

disorder, by criminal activity and

threat environment and look at

terrorism and by the movement

the development of Security and

of distressed populations across

Emergency Management structures.

porous frontiers.

The conference will culminate in a

This international congress

strategic snapshot looking at our

and exposition will zero-in on key

future direction and our ability to

themes, which will include:

evolve in-line with the threat posed

• human security and safety

to our way of living.

• public security, policing and protection • infrastructure, resource and environmental security

The approach of the conference

manufacturers, distributors, security

The OSPAs recognise and

is to engage and inform Security

professionals and end-users to

reward companies and individuals

and Emergency Management

connect and create unparalleled

across the security sector. They are

Leaders, Practitioners and Policy

business opportunities.

designed to be both independent

The entire team is looking

and inclusive, providing an

• cybersecurity and social media

makers at all levels of Government

• borders and sovereignty

and Industry on best practice today

forward to once again reuniting

opportunity for outstanding

• homeland security

and their thoughts for the future, so

more than 4,500 security

performers, whether buyers or

• community resilience

we may develop our shared vision

professionals with over 150

suppliers, to be recognised and for

• emergencies and disaster

and capacity to best Safeguard

leading suppliers. The 2018 show

their success to be celebrated.

Australia for our collective future.

is set to see some interesting new

management • catastrophes and humanitarian response

For more information, visit www. safeguardingaustraliasummit.org.au

are based on extensive research

new attractions.

on key factors that contribute

Make sure you put the dates

• innovation and technology.

The criteria for these awards

innovations, as well as a host of

to and characterise outstanding

in your diary. We look forward to

performance. (This research can be

Comprising an exposition of

Security Exhibition & Conference 2018

seeing you again in Melbourne in

found at https://perpetuityresearch.

equipment, technology and

25–27 July 2018

2018 for the Security Exhibition &

com/wp-content/uploads/2014/09/

services and a congress of

Melbourne Convention and

ASIAL Conference!

Aspiring-to-Excellence.pdf)

specialist conferences, CivSec

Exhibition Centre, Melbourne

2018 will confront the complex

In 2018, the Security Exhibition

and increasingly interconnected

& Conference is heading back

security and environmental

to Melbourne.

Visit securityexpo.com.au for more information.

The OSPAs are being set-up in collaboration with security associations and groups across

The 2018 Australian OSPAs

many countries.

Conference is the industry’s annual

18 October 2018

standardising the award categories

opportunity to reunite for three

Doltone House,

and criteria, the OSPAs scheme

days of quality networking and

Hyde Park, Sydney

provides an opportunity for

Safeguarding Australia 2018

unrivalled education alongside a

The Outstanding Security

countries to run their own

showcase of the most innovative

Performance Awards (OSPAs) are

evidence-based OSPAs schemes

9–10 May 2018

solutions to the Australian market.

pleased to announce the dates

while maintaining an ability to

Canberra

For over three decades, it has been

for the 2018 Australian awards.

compete on an international level

This year’s summit will address

the largest and most established

They will be working for the fourth

in the future – World OSPAs.

developments of contemporary

commercial event for the security

year in a row with the prestigious

interagency operations and focus

industry in Australia, bringing

Australian Security Industry

more information or to make a

on the friction points created

together the entire supply chain of

Association Limited (ASIAL).

nomination. n

challenges facing modern societies. Visit www.civsec.com.au/ for more information.

securitysolutionsmagazine.com

The Security Exhibition &

By researching and

Visit au.theospas.com for

SECURITY SOLUTIONS // 19


FEAUSRE

HOW CAN HOLLYWOOD HELP FIGHT ISIS AND SIMILAR TERRORIST GROUPS? BY ANNE SPECKHARD AND ARDIAN SHAJKOVCI

20 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


The International Center for

of courage, as they did those of

the Study of Violent Extremism

human suffering and tragedy in

(ICSVE) researchers recently took

equal measure. Many found such

part in a Department of Defense

stories emotional yet uplifting.

(DOD – CENTCOM) and Iraqi

Army soldier Hussein died while

government jointly sponsored

saving the weak and carrying

incubator program held in

injured companions to safety.

Baghdad, Iraq. Facilitated also by

In death, in the words of those

American Abroad Media (AAM),

who knew him personally, he

the program served to bring

gained fame as a national hero.

together Iraqi forces, Iraqi film-

Reminiscent of Mona Parson’s

makers and personalities from the

courage in hiding allied airmen

Hollywood film industry, such as

in her house in the outskirts

Bill Marsilii, Janet Batchler and

of Amsterdam during the Nazi

Tim Clemente. The participants

occupation, Umm Qusai, a brave

shared important ideas on how

Iraqi woman, courageously pulled

to narrate and recreate powerful

it off without being caught by

and appealing stories of Iraq’s

ISIS. She was determined to enter

recent war with ISIS, including

a clandestine world of rescuing

how to create appropriate images

the vulnerable, by some accounts

of struggle, heroism and unity

saving dozens of Iraqi soldiers

in a war against one of the most

from ISIS by sheltering them

barbaric terrorist groups to date,

in her home. The story of Baiji

and how to attract audiences to

refinery, just north of the capital,

such stories in a manner that

Baghdad, and the brave men

builds national unity, heals

who stoically fought back against

wounds of sectarianism and

ISIS was depicted as a symbol of

binds back a society torn apart by

national resistance against ISIS,

terrorist ideologies and actions.

while also serving to celebrate the

During the conference, Iraqi

government’s determination to

forces and film-makers featured a

prevail over the terrorist group.

number of intriguing war stories

also took centre stage in many

heroes who gave their all trying

of the presented documentaries,

to rescue their country out of the

as though the Iraqi military

hands of a brutal terrorist group,

and security establishment was

portraying them from different

seeking a way to eliminate future

perspectives and with varying

carnage. Hiding in plain sight,

objectives. The conference also

there were also images of those

shed light on the relationship

who seemed to want to go on

between the armed forces and

with their lives, exhausted and

the film industry. Both Hollywood

disinterested in revisiting the

participants and members of the

conflict. Some suggested injecting

Iraqi military reminded us of the

laughter in the midst of death

prevailing popularity of movies

and destruction found in the

and documentaries about heroic

recent conflict. As we listened to

men and women in the battlefield

numerous presentations by the

and the ordinary citizens whose

Iraqi military and young movie

amazing courage sets examples

producers, we also wondered if

for all of us.

images of peace, romance and

Members of the Iraqi military

securitysolutionsmagazine.com

ISIS-related horror stories

presented on film, particularly of

comedy often found during times

chronicled stories of honour,

of war could augment those of

heroism, patriotism and the

cinematic combat in restoring a

Iraqi army’s ability to protect the

sense of hope for the future. The

nation. They also portrayed acts

movie Life is Beautiful comes to

SECURITY SOLUTIONS // 21


FEAUSRE

collecting interviews with ISIS defectors, returnees and prisoners, studying their trajectories into and out of terrorism, their experiences inside ISIS, as well as developing the Breaking the ISIS Brand Counter Narrative Project materials from these interviews. She has been training key stakeholders in law enforcement, intelligence, educators and other countering violent extremism professionals on the use of counter-narrative messaging materials produced by ICSVE both locally and internationally as well as studying the use of children as violent actors by groups such as ISIS and consulting on how to mind; a touching fictional movie

and Iraq to cause devastation and

The presence of Hollywood film-

rehabilitate them. Follow Anne @

of a Jewish father determined to

suffering to so many.

makers in Baghdad this past week

AnneSpeckhard

shelter his son from the horrors of

Hollywood screenwriter Janet

was crucial to further strengthen

Ardian Shajkovci Ph.D is

the Holocaust by convincing him

Batchler reminded participants

the fight against terrorist groups

the Director of Research and a

that their time in a concentration

that many Westerners have stood

like ISIS and advance education

Senior Research Fellow at the

camp is merely a game.

up to neo-Nazism in modern

in film-making in ways relevant

International Center for the Study

day times precisely because

to furthering the Iraqi national

of Violent Extremism (ICSVE). He

these highlight not only the

they learned from movies

context. n

has been collecting interviews

importance of rebuilding national

that the symbols of Nazism

identity and solidarity through

represent evil. Similarly, today

documenting heroic stories of

Conferences such as

with ISIS defectors and studying Anne Speckhard Ph.D. is

their trajectories into and out of

we need new films to help youth

an adjunct associate professor

terrorism as well as training key

war and human suffering, but

recognise the lies of groups

of psychiatry at Georgetown

stakeholders in law enforcement,

also countering the narrative of

like ISIS and to redirect them

University School of Medicine

intelligence, educators and other

terrorist groups like ISIS. The

to better paths to truly heroic

and Director of the International

countering violent extremism

Hollywood screenwriters and

acts, finding significance and to

Center for the Study of Violent

professionals on the use of

producers offered their expertise

pursuing nationhood.

Extremism (ICSVE). She has

counter-narrative messaging

interviewed over 600 terrorists,

materials produced by ICSVE both

in creating story lines that could

At ICSVE, we continue to

challenge ISIS and other terrorist

understand the importance of

their family members and

locally and internationally. He has

groups’ powerful use of video and

generating theatrical productions

supporters in various parts of the

conducted CVE-related fieldwork

imagery, especially important in

that capture audience attention

world, designed the psychological

in Western Europe, the Balkans,

the face of ISIS’ prolific Internet

and imagination. In our

and Islamic challenge aspects

Central Asia and the Middle East,

distributed video productions and

Breaking the ISIS Brand Counter

of the Detainee Rehabilitation

mostly recently in Jordan and Iraq.

their clever use of social media to

Narratives Project, we use the

Program in Iraq to be applied

Ardian holds a doctorate in Public

identify and contact vulnerable

voices of actual ISIS insiders –

to 20,000+ detainees and 800

Policy and Administration from

youth who like, share, re-tweet or

defectors, returnees and ISIS

juveniles and has consulted to

Walden University, with a focus

otherwise endorse such products

cadre prisoners – we have

NATO, OSCE, foreign governments

on Homeland Security Policy. He

– swarming in to lure them

interviewed on film to denounce

and to the U.S. Senate and House,

obtained his M.A. degree in Public

further into the group. Given

the group as the un-Islamic,

Departments of State, Defense,

Policy and Administration from

Hollywood’s long-standing history

barbaric and corrupt group

Justice, Homeland Security,

Northwestern University and a B.A.

of countering enemy narratives,

they found it to be. We use ISIS

Health and Human Services, CIA,

degree in International Relations

it seems that they might have just

propaganda pictures and videos

FBI, CNN, BBC, NPR, Fox News,

and Diplomacy from Dominican

the ‘medicine’ for dealing with

to illustrate the horror stories

MSNBC, CTV and in Time, The New

University. He is also an Adjunct

the ISIS poison spewed out over

they tell, effectively turning ISIS’

York Times, The Washington Post,

Professor at Nichols College,

the Internet over the last five

propaganda back on them. At

London Times and many other

teaching undergraduate and

years and capable of luring over

ICSVE, we know the power of

publications. In the past two years,

graduate-level counterterrorism

30,000 foreign fighters to Syria

film to turn hearts and minds.

she and ICSVE staff have been

and cybersecurity courses.

22 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


25 – 27 JULY 2018

ASIAL SECURITY CONFERENCE

SECURING INNOVATION MELBOURNE CONVENTION + EXHIBITION CENTRE The 2018 Security Exhibition + Conference: Powered by ingenuity and invention, showcases the latest technology and cutting edge thinking. From physical and electronic solutions, to biometrics and cyber security. Australia’s largest security event offers three days of business networking and intelligence sharing. Take a first-hand look at what’s next for the security environment including intelligence on managing threats and identifying risks.

Your annual opportunity to receive fundamental updates from the organisations shaping todays security landscape.

HEADLINE SPEAKERS Dr Lisa Warren Clinical/Forensic Psychologist and Founder of Code Black Threat Philip Dimitriu Director of Systems Engineering, Australia and New Zealand, Palo Alto Networks Arye Kasten Chief Executive Officer, M.I.P Security

Danny Baade Head of Security, Gold Coast 2018 Commonwealth Games Corporation Commander Geoffrey Smith Tasmania Police

INNOVATIONS AND INVENTIONS Discover new products from 300 leading Australian and international brands including:

Jim Fidler Director, Secure Events & Assets P/L

CELEBRATE YOUR INDUSTRY David Crompton-Guard Business Continuity Manager Safety, Security & Resilience, Metro Trains

Make new connections and celebrate with colleagues at the ultimate networking evening – the Security Gala Dinner, held in partnership with ASIAL. For a less formal option, continue meaningful business conversations at the Networking Drinks.

BOOK NOW TO AVOID DISAPPOINTMENT Conference Passes, Gala Dinner and other networking event tickets are available to purchase

EXHIBITION HOURS

CONFERENCE HOURS

Wed 25 July 9:30am–5:00pm

Wed 25 July 9:00am–5:00pm

Thurs 26 July 9:30am–5:00pm

Thurs 26 July 9:00am–3:30pm

Fri 27 July 9:30am–3:30pm

Fri 27 July 9:00am–3:30pm

Principal Sponsor:

Lead Industry Partner:

T + 61 3 9261 4500 E securityexpo@divcom.net.au #security2018 secexpo

FREE EXHIBITION REGISTRATION – securityexpo.com.au

@Security_Expo Security Exhibition & Conference


ALARMT

24 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


PREVENTING OR STOPPING MASS

CASUALTY EVENTS BY DAVID PHILLIPS

If you are looking for an answer,

a part of, but have not yet heard

such as a school, day care, a

solutions being studied, but

it is here; it is just not what you

talked about as much, is solving

mall, office building, airport,

never delivered. If you are sick of

might expect. According to a

school shootings.

concert hall, sporting venue or

hearing the same explanations,

theatre. So, why has this not been

such as our courageous first

done already?

responders did not get there fast

recent 2018 Expedia article,

We can all agree that the way

among the top 10 list of 21st

we stop a mass casualty event is

century accomplishments in

by eliminating the threat as early

Well, we have all heard

science are: finding ice on Mars,

on in the timeline as we can. But

someone say, “If we can put a

should be more thorough, or

growing a new organ from a stem

that is difficult, because we cannot

man on the moon, then why

our overworked investigators

cell, breaking the petaflop barrier,

read people’s minds; we cannot

can’t we...”, followed by some

did not follow up leads, then

and turning water into fuel. My

intervene in a potential shooter’s

amazing idea they just came up

send this article to your elected

personal favourites, which did

life until he actually commits a

with. However, recently, when it

officials! Tell them this problem

not make the list, include Tesla

crime or tells us of his intent; we

came down to yet another violent

can be solved today and with

landing two re-usable Space-X

cannot predict who, when and

and indiscriminate mass killing

existing technology.

rockets safely back on Earth and

where, everywhere, all the time.

in a building with lots of people

Elon Musk sending his favourite

So, what is left? Make it very likely

in it, we predictably reacted with

projectiles to disrupt bad

sports car into outer space!

that when a homicidal maniac

horror as the parade of witnesses,

behaviour in humans in many

arrives at his chosen target, he

family, friends and television

different ways, like the pepper

are mostly easy to spot; they

will be incapacitated quickly and

crews all watched and listened as

ball gun you see here. We also

capture our imagination, help

with certainty. Make it extremely

law enforcement looked blankly

have robots that can spot-weld

save many lives and answer

likely he will fail, in ignominy.

into the cameras with the same

a car moving down an assembly

age-old questions. Very few can

An agile building can solve all of

old question we have all heard

line. We have cameras that can

be critical of their significance.

these problems.

too often, “How could we have

see what colour a person’s eyes

prevented this?”

are at 90 metres and lead us to

Such epic accomplishments

Finding such problems to solve is

An agile building is a building

enough, the background checks

Today, machines can shoot

not that hard, prioritising them is.

equipped with certain features

Higher priority problems should

that would make it nearly

this if we made our buildings

We have software that can sort/

appear high on the list, because

impossible for a person who has

agile! We could have prevented

target/locate, within 80 hours of

they are huge problems affecting

evil intent to wantonly take the

Columbine, Sandy Hook, Aurora,

video, the exact moment when the

countless lives. I wrote this article

precious lives of unsuspecting

Virginia Tech, and even the Vegas

burglar took a brick and broke

because the one I would like to be

innocent people in that building,

shooting. I am tired of the same

the window. We have control

securitysolutionsmagazine.com

We could have prevented

a missing shoe box on aisle 5.

SECURITY SOLUTIONS // 25


ALARMT

An agile building is a building equipped with certain features that would make it nearly impossible for a person who has evil intent to wantonly take the precious lives of unsuspecting innocent people in that building. rooms that can direct a national

2. Robotic response delivery

or persons, instantly, and with

was, “Where is the shooter?”,

security response, in real time,

systems: Currently, there exists

efficiency, which can make a

“Which way did he go?”,

on the other side of the planet. I

the technology to remotely

real difference in these types

“What does he look like?”.

am not telling you anything you

control a robotic device to

of situations. Trained human

A system like the one being

do not know already. But has

interfere with, report on and

beings are needed to control

suggested needs to have its

anyone connected the dots? An

stop a bad actor. The means

these defensive systems,

own dedicated network, like

agile building is a building that

to install this technology in an

in an appropriate manner,

fire and police have now – a

can ‘defend’ its occupants against

existing building could happen

within seconds, not minutes,

dedicated data pipe going

human threats, in real time.

tomorrow. Modern engineers

after a serious situation is

directly to large venues, either

can install machines in walls

detected. For example, it takes

by fast streaming wireless or

could keep our children safe.

or ceilings or on reinforced

a manager at a grocery store

by fibre. If the police cannot

We do not need to arm teachers,

pylons or tactical vehicles.

seconds to tell the security

see what is going on, then they

pay an army of armed security

They can be made tamper-

person in the control room

cannot know how to act on

guards, break down the doors of

proof and vandal-proof and

to direct his attention to the

that information. A path needs

law abiding gun owners or burden

be designed to deliver pepper

person with the booster bag

to be cleared so our society can

society with a massive program.

pellets, tear gas, rubber bullets,

in the beer aisle. What if that

All we have to do is deliver four

BBs or any other kind of

security person was a police

Agile building technology can

key component systems to every

non-lethal force to a single or

officer and that shoplifter

stop a shooter within minutes,

large venue we want to protect:

multiple targets with precision.

was a bad actor looking for

even seconds, after he is detected

1. Regulatory path forward:

Even a perpetrator with a

someone to injure or kill? If

by directing incapacitating force

Government needs to clear

gas mask on is vulnerable to

the camera had a non-lethal

at that individual, with accuracy

the path for schools, airports,

rubber bullets, grease paint

countermeasure attached

and effectiveness, in multiple

malls and sporting and

balls and BBs, which can

directly to it, then the person

places at the same time. A small

entertainment venues to

obscure or eliminate a bad

could be incapacitated or

group of controllers can police an

make their buildings agile.

actor’s will to continue or the

distracted long enough to give

entire school district and answer

Government can do this

ability to prosecute an assault.

the innocent bystanders time

every threat at any school within

3. Central control station:

to escape the danger.

their domain.

enough to prevent harm to the

Currently, there exists

4. Information processing

innocent, and loose enough to

the technology to build

and delivery: The dominant

video in the NBC News Report

give law enforcement the tools

communications centres

conversation over the radio

in the comments section of the

they need to preserve life and

capable of remotely applying

at the most recent horrific

online version of this article

prevent loss.

appropriate force to a person

mass shooting in Florida

is an example of everything I

With current technology, we

by creating standards tight

26 // SECURITY SOLUTIONS

allow these to be put in place.

The system illustrated in the

securitysolutionsmagazine.com


am talking about. It could have disoriented the intruder enough

one security professional.) I am a loss prevention

if this humble store detective

services and marketing service

can prove it could work with a

to enhance LPF’s operations.

to allow law enforcement time

professional. We study how to

few spec sheets, some proof of

David has a 15-year background

to intervene. (Author’s note:

keep people safe in large venues

concept video and some decent

in IT and Quality Assurance

A contact of mine originally

like department stores, malls,

science, what are we waiting

consulting. As a former U.S.

posted this video. This whole

markets and theme parks.

for? n

Army Officer – MP and Air

concept is not my original idea,

Active shooters are threats we

as much as it is an essential

take very seriously. I know

conversation. Although some

what it would take to turn this

Operations Manager for the Loss

combined military experience

of what I am suggesting is how

idea into a credible response

Prevention Foundation (LPF).

and police training. He has also

I was thinking, it most likely is

to something that should have

He is responsible for delivering

held loss prevention positions

intuitively obvious to more than

been solved years ago. And

customer service, technological

with Sears and The Bon Ton.

securitysolutionsmagazine.com

Force Enlisted - Security Police, David Phillips LPC is

David brings over nine years of

SECURITY SOLUTIONS // 27


OPERATIONS

The Role Player Unheralded Hero Of Reality-Based Training

28 // SECURITY SOLUTIONS

BY RICHARD KAY

securitysolutionsmagazine.com


Reality-based training is any

is given direct instructions

type of simulation training that

– information to provide,

prepares an individual for future

whether to volunteer it or

performance through experiential

simply respond to questions,

learning. Because of the

and any specific phrases to

immersive nature of the training,

use or specific points to use

the brain and body absorb and

them. Passive role players

process the experience as if it

should keep it simple, do their

were actually occurring. Proper

thing and get out, or they can

reality-based training provides

On scenario conclusion, role

skills and stress inoculation that

players follow instructions

saves lives in real-world scenarios.

for scenario debriefing to

Ensuring that participants are

point out tactical errors that

well trained in the optimisation of

participants made. Role players

those experiences is the essence of

perform exactly as in the

reality-based training, and the key

original scenario during any

to this is the role player.

re-enactment for remediation

The role player is responsible

purposes so participants can

for determining participant

perform correctly. Role players

behaviours and is the key to

do not change anything in a

success or failure in reality-based

scenario regardless of how often

training. The task is dependent

participants repeat to successfully

on scenario design and instructor

complete training objectives.

skill at directing scenario events

After instructors have debriefed

and the role player must know

participants, role players can

everything possible about his

add observations in response to

character, the desired outcome of

instructor request, and then only

the training situation and threat

add information not covered.

cues to which participants should adequately respond. The role

Role Player Development

balances creativity with the ability

The role player character

to follow specific instructions

contains information about the

and is directly responsible for the

subject/victim that role players

physical well-being of participants

use to make their characters

since the role player controls

more realistic, and includes the

any physical confrontations

following categories:

with them.

• Socio-economic characteristics

There are two types of

provide a background for

role player:

the character and a plausible

• Active role players are

reason for behaviour. Without

carefully chosen, properly trained and directly involved

this, role players invariably end up acting at random.

in the scenario. Although

• Emotional state covers eight

all role player actions are

primary emotions identified

important, active role players

by behavioural psychologists.

are critical to the presentation.

It helps guide role players

• Passive role players provide information, often as bystanders or accomplices,

securitysolutionsmagazine.com

waste time.

the conditioning, decision-making

by giving the character emotional depth. • Physical state provides clues of

as distractions and unknown

what body language to exhibit.

elements to create situations

This is useful because with

identical to those participants

protective gear, body language

would experience on the

is helpful in communicating

job. A passive role player

pre-attack cues to participants

SECURITY SOLUTIONS // 29


OPERATIONS

and provides experience in

steps back and call back to the

training so participants

presentation

reading the danger level of

participant on the radio, providing

recognise the situation when

Having the right type of person

an encounter through non-

them with the information

a threat cue is demonstrated

as a role player is important

verbal cues.

contained in the history. This

in a scenario. This approach

since he must be able to follow

forces participants to manage

provides a contextual setting

instructions, remember key

role player mindset and is

other equipment, which can

where earlier training

phrases and act out the character

useful for the same reason as

overwhelm conscious resources

experiences come together in

and history. It is difficult and takes

socio-economic information.

during a critical incident and

a realistic setting to provide

practice. Do not simply accept

Without it, many role players

allows instructors to see which

relevant experience.

anyone who applies to be a role

act crazy if left to their

skills are not honed to the level

own creativity.

• Psychological state defines

• Specific phrases for self, others,

player, as not everyone is suitable.

of unconscious competence. This

authorities provide specific

When choosing active role players

helps determine any remedial

role player language to be used

it is essential to only consider

more texture to role player

follow-up training that might

at predetermined scenario

those able to follow specific

behaviour and may assist

be necessary.

points, which helps ensure

instructions. Role players are like

training uniformity between

actors; instructors are the director.

• Behavioural state adds

participants in improving intuitive skills useful to

Role Player Guidelines

participants and keep role

conflict resolution.

Role player guidelines contain

players on track. Whilst overt

They must behave consistently

instructions role players need

language and actions might

This is a difficult task because it

that would normally cause

to effectively interact with

make a scenario seem too

becomes tedious doing the same

many of these behaviours.

participants. Role players should

simple for most participants,

thing over again, and some role

They also outline the levels of

lose, but not so easily as to instil

in the early stages of a training

players change things to keep it

resistance that participants

false confidence in participants,

program they are necessary

interesting. For a role player to

need to deal with, and to which

who should only prevail through

to build situational awareness

maintain consistent behaviours,

the actions of the participant

superior tactics or perseverance.

and allow participants to

the scenario must be well scripted,

process information as a threat

as the more latitude a role player

four sections:

and connect it to an approved

has to improvise the worse it is

• The situation overview is

response option. Start slow

for training. A proper script is

• Complicating factors are those

are ultimately directed. • Character summary/reason for contact functions as the outline

The role player guidelines has

of the role player. It describes

where the scenario outline

and simple, and progressively

essential to producing a quality

what is going on and why, who

meshes with the role player

increase the speed of the

scenario. The best role player

the role player is, and what

guidelines. The general idea

threat and make it less overt

cannot save a poorly written

they are supposed to do. It

from the scenario outline is

as participant situational

scenario. If the proper elements

provides the role player with

transferred onto individual

awareness improves and they

are not in place, training will fail,

his motivation.

role player guidelines.

have conditioned specific

often with dire consequences.

The role player history contains

• Participant action/role player

actions to various stimuli.

further background information,

response indicates how role

Properly trained and scripted

They dictate scenario outcomes

similar to what might be on

players respond to various

role players provide realism to

The role player is essentially a

file from previous encounters.

participant actions – engaging,

participants. Using structured

stimulus catalyst, scripted and

The more realistic the scenario,

disengaging or posturing.

role player behaviours ensures

directed to perform certain

the better the experience will

Each anticipated participant

effective experiential transfer

actions which cause a predictable

be for participants. This is why

action has a scripted role

throughout the training process.

response from participants,

this information is not simply

player response that drives

Good role playing is a blend

based on training received prior

handed to participants. They can

the scenario toward its

of good acting, athleticism

to the scenario. It is better to use

only get the information the way

predetermined conclusion.

and trust in the system. It is a

operational personnel as role

they would on the job. If they

This creates a well-structured

matter of professionalism to give

players, as reality-based training

use a vehicle computer terminal,

scenario with the built-in

participants the best training

should not be experimental. Role

print up sheets look like the

flexibility to add options. Role

experience possible. Ultimately,

players should know exactly

screenshots of the terminal so

players and instructors should

their skill level and enhanced

what participants are supposed

the participant has to look in the

always have a sense of what is

survivability will be directly

to do, so in the event they do not

same place as they would on the

going to happen next.

affected by the skill of role players.

do that, role players can exhibit

computer screen for various bits

• Deliberate actions describe

of information. If the participant

specific actions role players

Role Player Criteria

a correct response. The only

requests information from

must demonstrate to cause

There are important criteria for

unknown in a scenario should be

the dispatcher, if there is not a

a predictable response in

role player selection and scripting.

participant behaviours, and they

dedicated person for this task,

participants, conditioned

instructors can take a couple of

during low-level scenario

30 // SECURITY SOLUTIONS

behaviours likely to stimulate

should be relatively predictable. They are critical to scenario

Once proper responses from

securitysolutionsmagazine.com


“THE ROLE PLAYER IS RESPONSIBLE FOR DETERMINING PARTICIPANT BEHAVIOURS AND IS THE KEY TO SUCCESS OR FAILURE IN REALITY-BASED TRAINING.” participants are demonstrated, the

They must not improvise

They allow participants to

anything going on in the scenario

scenario is complete.

A role player script should leave

prevail

or interact with participants who

little room for improvisation.

Although it should never be

just finished the scenario.

They must be protected against

While creativity is essential to

easy for participants, there must

force

good role playing, make sure

always be a win for them at

becomes tiring and boring, and

There should be no obvious

they know in advance the

scenario end when they perform

improvisation often occurs for the

giveaways to a role player role in

limitations on improvisation. The

correctly. It is the role players’ job

sake of variety. The role player

the scenario so participants are

combination of inept participants

to lose every time, which may be

must understand the job is to lose,

not preconditioned for response.

and bored role players can be

tough from an ego perspective. A

but as a result of participants

Often, the clue is how a role player

dangerous. Instructors must

role players’ entire reward system

prevailing through superior

is dressed, so dress role players

carefully monitor the language

is based on selflessness, to help

performance or perseverance.

with similar levels of protection

and actions of role players; if

participants emerge from each

It takes a special individual and

to avoid this. Even though a

they depart from the script,

encounter better prepared for a

dedicated professionalism to

passive role player might be

redirect their actions. Sometimes

real situation. The role player is

constantly lose, but in so doing,

there to provide information and

participants are oblivious to a

the most difficult task in reality-

role players improve participant

then depart the area, it is better

threat, resulting in role players

based training and definitely

behaviour and know that

to have them in protective gear

demonstrating overt behaviour,

not for everybody; those with a

participants are better prepared

so participants are required to

so it is impossible to miss the

burning need to win during any

for challenges on the job as a

manage them in the same way. If a

cue. Although there are times

scenario must be re-educated

result of scenario experiences.

scenario contains physical contact

when it is valuable to provide a

or replaced.

The role players’ task is to

between participants and role

consequence for tactical error,

players, to avoid preconditioning

participants that are oblivious will

They re-set between

in participants, and it is a noble

participants to what is about to

not benefit from an overwhelming

participants

calling. n

happen by having the role player

consequence. If role players

After a scenario is complete,

geared up in a suit, pause the

have to improvise to keep

there might be evidence as

scenario and use questions to

participants on track, they should

to what happened during the

internationally certified tactical

ensure participants are choosing

not improvise so it becomes

confrontation, so these signs

instructor-trainer, Director

a physical force option, then swap

counterproductive to the scenario

should be removed so there is

and Senior Trainer of Modern

out an unprotected role player

goal. Letting a scenario go down

no preconditioning of the next

Combatives, a provider of

for a role player in a protective

a path that is counterproductive

participant. Make each scenario

operational safety training for the

suit and allow the scenario

to the training objective

as clean as possible for each

public safety sector. Visit www.

to continue.

wastes time and can result in a

participant. Make sure waiting

moderncombatives.com.au for

dangerous situation.

participants cannot hear or see

more information.

securitysolutionsmagazine.com

Being a role player

condition winning behaviour

Richard Kay is an

SECURITY SOLUTIONS // 31


EVENTS

CASTING A WIDER NET: MORE EFFECTIVE MASS SCREENINGS AT EVENTS BY JIM VISCARDI

32 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Ferromagnetic detection at a venue’s perimeter detects weapons of mass casualty before terrorists get too close Live events at large venues like

malefactors have known

halls – whether they involve

for centuries that any large

wrestlers breaking chairs over

gathering of people has inherent

each other’s heads, Axl and Slash

vulnerabilities on which they

letting bygones be bygones and

can prey: Crowds make it hard

reuniting Guns ‘n’ Roses, your

for security to keep track of any

favorite NFL team annihilating the

single person or spot unusual

opposition 62-3, or a convention

behaviour, and the number of

involving anything from politics

people congregated in one space

to food to Star Trek – are

amplifies the impact of any attack.

exciting affairs that channel the

securitysolutionsmagazine.com

Terrorists and other

arenas, stadiums or convention

In recent years, organisers

camaraderie of the crowd into a

of large events have augmented

powerful collective energy. But

the security methods they use to

they are also vulnerable to threats.

protect a venue, using both walk-

SECURITY SOLUTIONS // 33


EVENTS

through metal detectors and hand

secondary screening method

need to actually enter the venue;

of mass casualty. Most of the time,

wands, and deploying K9 and

for confirmation.

they just need to get close enough

a terrorist is trying to get closer

to injure or kill a large number

to the immediate perimeter of the

police units to patrol the lines to

Many facilities also use

enter security. But these current

observational methods to screen,

of people. That can happen – and

venue, to inflict the most damage

methods share a universal flaw:

such as drones, CCTV, security

has happened, such as with the

to large groups of people waiting

to be caught, evildoers have to be

officers or police walking the

Manchester Arena bombing

to get in; farther away, event

on the verge of actually entering

crowd and looking for suspicious

in 2017 – right at the security

attendees are walking toward

the venue with hundreds of

behaviour, or explosives-sniffing

point, where a terrorist will be

the entrance and thus are more

other people, which means they

K9 units patrolling the area.

surrounded by dozens or hundreds

dispersed, not standing in clusters

can still cause a massive amount

Each of these methods

of people and 10 to 20 yards away

or lines. This advance screening

has intrinsic limitations.

from the critical asset: the interior

is possible using ferromagnetic

Observational security methods

of the venue.

detection systems (FMDS).

of destruction.

Current Methods Are Not Enough

are just that – observation-based, not detection-based. They rely

of these pre-security-screening

FMDS uses passive sensors that

Conventional walk-through

much more heavily on human

vulnerabilities around the

evaluate disturbances in the

metal detectors are a

factors that introduce greater

perimeter of the venue. What they

earth’s magnetic field made by

compromise between effective

degrees of error and chance,

haven’t had until recently is a way

something magnetic moving

screening and high throughput,

and positive visual identification

to screen mass amounts of people

through its detection zone.

as they successfully detect metal

of a suspicious threat requires

for weapons of mass casualty as far

Everything else is invisible to it;

objects, but only can screen

a relatively close proximity to

away from the critical asset as they

it doesn’t see people, clothing,

about five or six people each

observe the threat. They’re also

can, and as far away from densely

backpacks, purses, etc. Nothing

minute. They are generally

slow and laborious.

populated areas as they can, all

can be used to shield the

while not impeding throughput

threat, because FMDS doesn’t

placed 10 to 20 yards from a

Walk-through detectors and

Security personnel are aware

In the most basic terms,

venue’s front façade, either

wands will catch someone trying

resulting from the requirement for

detect metallic mass; it detects

just outside or just inside, to

to enter a facility with a weapon,

patrons to divest their possessions.

a magnetic signature, down

screen people as they enter

but by the time they do, it may be

the facility. Hand wands are

too late – a terrorist will already

Expand Your Reach

used for anyone that sets off

be well within proximity to do

The far perimeter of a venue is an

the walk-through detector as a

a lot of damage. Bad guys don’t

ideal place to screen for weapons

34 // SECURITY SOLUTIONS

to a millionth of the earth’s magnetic field. It is also highly accurate – there is no false alarm rate,

securitysolutionsmagazine.com


because it is programmed

people to be organised into lines

large events, by expanding the

technology is at least partially

to find only what security

or groups; it simply detects a

secure perimeter and creating

responsible for both the breadth

personnel need to find (e.g.

magnetic signature on anything

a highly accurate way to detect

and depth of the increasingly

a weapon). Although it is a

that passes.

weapons of mass casualty farther

creative ways bad guys

away from a critical asset and

harm people.

passive technology, it is more

It runs on batteries – there

effective and reliable than

is no need for an electricity

large crowds. It does not replace

using observational security

source, as with a walk-through

screening for smaller items

are responsible for helping to

methods to screen a perimeter,

detector – and can be placed

necessarily, and all large venues

fight against those threats and

because the technology will

on just about any form factor

should use a layered security

make the world safer, and FMDS

never miss something the way a

(a pole, a stand, etc.). This gives

solution that also deploys tactics

is one of those. By providing a

human would.

security personnel flexibility

like roving security guards,

foolproof method of detecting

when deploying FMDS, allowing

walk-through metal detectors and

weapons of mass casualty before

system only works on moving

them to create a wide perimeter

hand wands. FMDS simply gives

terrorists get too close to an event

objects. This makes it immune

around a venue without

the opportunity to add a layer of

venue, FMDS gives event security

to environmental conflicts such

worrying about portability or

security where there currently is

personnel a way to better protect

as rebar that would trip up

a power source. Screening can

not an effective solution.

large events, making them less

conventional metal detectors, and

be as obvious or as concealed as

allowing people to be screened

personnel prefer for a particular

quickly and unobtrusively

situation, based on the form

without stopping to divest their

factor they select.

An important point is that the

possessions as they walk toward

All of these combine into a

But some technologies also

dangerous and keeping people

More Effective Mass Screening – Without Disruption

safe. n

Pessimists sometimes muse the

of global security for Metrasens.

Jim Viscardi is vice president

a venue – up to 50 or 60 people

solution that creates a way to

world is getting more dangerous

Viscardi can be reached at

a minute. FMDS does not need

close a gap in mass screenings at

with each passing year, and that

jviscardi@metrasens.com.

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 35


BUSINESS

Staying Relevant In The Face of Change BY MICHAEL MCQUEEN

36 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


In recent years, we have seen

indicators of many recently failed

scores of iconic businesses and

businesses masked the fact that

brands fall by the wayside. The

the underlying fundamentals of

demise of Kodak, Borders and

these companies were anything

HMV Music leaves us with little

but healthy. Kodak, for instance,

doubt – shift is happening and no

was still a darling of Wall Street

organisation or brand, no matter

long after it had begun to lose the

how well known, is immune to

digital war. It was a similar story

extinction. As once-lucrative

with Nortel, Allans Music and

revenue models increasingly

SAAB automotive.

come under siege and distribution

Herein lies a principle that

channels that have been stable for

ought to give every business

decades crumble before our eyes,

leader pause for thought:

it is becoming apparent that the

businesses, organisations and

rules of business have changed –

institutions are often way down

the goal posts have been moved.

the track toward decline and

Charles Darwin once observed,

obsolescence long before there is

“It is not the strongest that survive,

any tangible evidence of the fact.

nor the most intelligent. Rather, it

To put it more simply, it is possible

is those who are most responsive

to be on the brink of obsolescence

to change.” The challenge for

and have absolutely no idea at

every business and leader today

all. Further still, by the time the

is to evolve in the face of rapid

numbers indicate that there is

and widespread change. Simply

something wrong, it may be too

relying on conventional wisdom

late to do anything about it.

or assumptions that have held true in the past will set any brand or

2. Shift happens

organisation on a collision course

Management guru Peter Drucker

with obsolescence.

once noted, “Simply because the

In considering the litany of

status quo has been so for years or

businesses that have met their

even decades, we cannot depend

demise in recent times, there are

on the fact that it will remain

five lessons that can be extracted

so.” While Drucker made this

from their experience – lessons

observation in 1985, it is truer

that will put you in good stead to

today than ever. Whether it is

avoid the same fate:

changes in technology, competitive dynamics, legislation or

1. Do not trust the numbers

demography, fundamental shifts

While traditional business

successful businesses to falter in

metrics like sales figures or

recent years.

profit and loss statements are

The fate of video hire giant

somewhat useful in measuring

Blockbuster demonstrates just

the health of a business, they

how decisive and devastating

are also becoming increasingly

shifts can be for established

unreliable. The reason for this

businesses. In its heyday in the

is that these numeric measures

1990s, Blockbuster was opening a

of organisational health are

store somewhere in the US every

lagging indicators. As such, they

24 hours and, by 2005, had over

only gauge the effectiveness of

5,700 stores across America. A few

decisions made many months or

short years later, they teetered

years previous and are therefore

on the verge of bankruptcy

dangerously inadequate in an era

and closed stores countrywide.

of rapid change and disruption.

Why this turn of events? New

Consider how the numeric

securitysolutionsmagazine.com

have caused scores of previously

streaming services like Netflix

SECURITY SOLUTIONS // 37


BUSINESS

and Apple TV meant consumers

were in crisis. In the preceding

and creative ideas tend to come

3. The moment you think you have made it, you have passed it

decade and a half, the industry

from those who think very unlike

had shed almost 70 percent of

their peers and the prevailing

its workforce and two-thirds of

wisdom of the era.

A key factor in almost every

Swiss watchmakers had gone out

the recorded music industry

case of corporate demise is a

of business – all because they had

when a culture of conformity or

which, at the end of 2012, had

dynamic I call the Intoxication

arrogantly assumed that they had

closed-mindedness grows within

shrunk to almost half the size it

of Success. Put simply, this

been so successful for so long that

an organisation to the point where

was in 2000. As the digital age

phenomenon describes the way

they could never fail.

new points of view are silenced or

has obliterated the status quo,

in which enduring success leads

music manufacturers, product

to a toxic blend of complacency,

the ill-fated approach that Sony

breeding results in weaker genetic

distributors and retail outlets have

conceit and closed-mindedness

took as the post-CD age dawned.

strains, cultures lacking diversity

found themselves undermined

within organisations that blinds

Rather than embrace the MP3

weaken an organisation over time.

and undercut, with many,

leaders to potential opportunities

format, Sony arrogantly assumed

including British music retailer

and threats.

that their market dominance

no longer needed to rent the DVDs which had been Blockbuster’s bread and butter. Consider too the fate of

HMV, going under as a result.

It was this dynamic that

In a similar vein, consider

A dangerous dynamic unfolds

shunned. In the same way that in-

In his book Why Good

meant they could ‘own’ the entire

Companies Go Bad, Donald Sull

In early 2013, David Bowie

led to the obliteration of the

music ecosystem and therefore

argues that such a culture of

released his latest single straight

Swiss watchmaking industry

attempted to force consumers

conformity played a key role in

to iTunes, skipping the CD

in the 1970s and 1980s. Having

to use their proprietary ATRAC

the woes of businesses such as

format altogether. As physical

dominated the global timepiece

format. At the very time Sony was

Firestone Tires, Compaq and

music products almost entirely

market for decades, Swiss watch

attempting to force the market’s

failed automaker Daewoo. Prior

disappear, analysts believe

manufacturers had developed

hand, audio file-sharing services

to these companies’ fall from

Bowie’s move is a sign of things

a series of set beliefs about

like Napster were quickly making

greatness, Sull suggests that the

to come.

how watches were meant to be

the MP3 format ubiquitous. By

respective leadership teams

produced and what customers

the time Sony realised it could not

had become ‘like clones’, each

context, it is shifts in social

wanted in a timepiece. They

take consumers for granted, Apple

executive tending to reinforce

attitudes and values in the UK that

confidently assumed they were

had dealt it a final blow with the

a collegial point of view. In the

are decimating the iconic British

the masters of creating quality

release of the iPod – a product

case of Daewoo in particular, six

pub. While the traditional local

watches and no-one was going to

that all but killed off Sony’s

in 10 of the company’s senior

pub was once the place where

come in and tell them how to do

Minidisc range.

management graduated from

beer-loving blokes went to swig

what they did best.

Looking to a very different

the same university, and almost

away from ‘the missus’, the simple

company Seiko released the

4. Great minds do NOT necessarily think alike

fact is that this Anglo, blue-collar

Quartz watch in 1969, the Swiss

Although we were raised being

male archetype is no longer as

incumbents failed to recognise the

told that great minds think alike,

commonplace in modern-day

innovation as the game-changer

nothing could be further from

5. Innovation has a dark side

Britain. As a result, pubs in the

that it was – even dismissing

the truth. Historical figures like

Although innovation may be

UK are shutting their doors at an

it as a fad. By the mid-1980s,

Galileo, Copernicus and Thomas

the current buzzword, very

average of 25 per week.

however, the Swiss watchmakers

Edison show that revolutionary

few acknowledge the fact that

a few pints and get some time

38 // SECURITY SOLUTIONS

As a result, when Japanese

a third graduated from the same high school!

securitysolutionsmagazine.com


sometimes over-innovating is

to stay relevant over time,

Hirai also trimmed Sony’s global

new markets, or completely

as dangerous as inertia. HP

businesses and leaders must

workforce by roughly 10,000

overhauling a brand’s messaging.

co-founder David Packard

consistently be willing to:

employees and streamlined

recognised this when he

1. Re-Calibrate – While an

Consider how an enduring

manufacturing processes so that

brand like Lego has done this

observed, “A great company is

appetite for change is critical to

Sony’s TV business expenses

successfully over its 80-year

more likely to die of indigestion

staying ahead of the curve, it is

were slashed by half.

history. Far from the days of

from too much opportunity, than

first important to discern which

While it remains to be

starvation from too little.”

fundamentals in an organisation

seen how successful the steps

blocks, Lego has been quick

should never change. Just as it

Sony has taken will be, history

to embrace new technologies

was largely responsible for

is necessary to determine which

suggests that Kazuo Hirai is on

and approaches that have

the demise of the iconic brand

walls are load-bearing when

the right track. After all, he is

resulted in the brand remaining

Rubbermaid. Having prided

renovating a house, leaders

walking a similar path to the one

powerfully relevant. To its credit,

itself on its pace of invention and

must identify the non-negotiable

trod by the legendary CEO Lou

this process of re-invention

innovation, by the early 1990s,

values, principles and purpose

Gerstner, who successfully and

has never come at the cost of

Rubbermaid was introducing at

which must never change.

dramatically turned around IBM

its core DNA. Lego is still a

least one new product every day

Tamper with these ‘load-bearing’

during the mid-1990s.

company committed to inspiring

and was entering a new product

fundamentals and everything

category every 12 to 18 months.

may come crashing down.

Consider how such indigestion

3. Re-Frame – As highlighted

simply manufacturing plastic

imagination and play, but it has

above, being open to seeing the

brilliantly re-invented the way it

Before embarking on any

world from a different frame of

does this.

fatigue began to set in. By late

change agenda, it is vital to first

reference is the key to creativity

1995, Rubbermaid posted its first

re-calibrate an organisation with

and innovation. Leaders must

quarterly loss in decades and

its core DNA and allow this to be

pay particularly close attention

within three years, the company

a guidepost for strategy and a

to the views and perspectives

was sold off.

touchstone for decision making.

of those who have fresh eyes in

organisation up for enduring

By the mid-1990s, however,

Steve Jobs knew what it was

2. Re-Fresh – Any gardener

_______________________ Setting a brand or

an organisation – often owing

relevance involves a principle

like to want to do too many new

knows that regular pruning

to their lack of experience.

that every experienced surfer

things at once. “People think

is necessary to maintain the

Such fresh eyes have no trouble

understands well. In order to

‘focus’ means saying yes to the

health and vitality of a garden.

thinking outside the box and

catch the perfect wave, a good

thing you’ve got to focus on,” he

In the same way, organisations

seeing creative alternatives to the

surfer knows the importance of

once said. “But that’s not what it

require regular pruning of

status quo because they have no

keeping his eyes firmly on the

means at all. It means saying no

initiatives, traditions and even

idea what the ‘box’ even looks

horizon. While a wave is still

to the hundred other good ideas

people who are inhibiting future

like yet.

forming a long way off in the

that there are. You have to pick

growth. While pruning can be

carefully. I’m actually as proud

painful and even disruptive in

to survive, a company’s internal

is the time to move – to paddle

of the things we haven’t done as

the short-term, it is nonetheless

rate of change has to be greater

out and get in position. Move too

the things we have done,” Jobs

critically important.

than the external rate of

late, or not at all, and you will

change,” observed Paul Raines,

simply get washed up as the wave

Kazuo Hirai has embarked on

CEO of American electrical

crashes over you.

a series of necessary pruning

retailer GameStop.

continued. “Innovation is saying ‘no’ to 1,000 things.” ________________

Consider how Sony CEO

initiatives in recent months. In While it may be valuable

4. Re-Engineer – “In order

distance, surfers know that this

In much the same way,

Keeping pace with change will

winning the battle for relevance

the face of $6.4 billion loss for

require leaders and organisations

is about anticipating, preparing

to learn from the mistakes of

2012 and a dramatic downgrade

to continually re-engineer their

for and embracing change – no

organisations and brands that

of Sony’s credit rating, Hirai

internal systems and processes.

matter how uncomfortable or

have fallen from greatness

recognised that he would need

Too often, being ‘in a groove’

confronting it may be. n

in spectacular fashion, there

to act quickly to turn around

can easily turn into a rut and

is also much to be gained by

his ailing tech-giant’s fortunes.

simply repeating the habits that

Michael McQueen is the

studying those who emerge from

His first step was to end

have worked in the past can set

author of the recently launched

change and upheaval stronger

Sony’s decade-long marriage

a business on a collision course

book Winning the Battle for

than ever. Consider brands and

with Swedish mobile phone

with inefficiency and irrelevance.

Relevance. Michael is a leading

businesses such as McDonalds,

company, Ericsson. Next to go

Volvo and IBM – what do these

were any Sony-owned non-core

and needs evolve, so must

time bestselling author. Winning

enduring companies do that their

companies, including a chemical

the positioning of businesses

the Battle for Relevance is

endangered counterparts have

products business and a unit that

and brands. This could mean

available in bookstores across the

failed to do?

specialised in producing small

developing new products

country and through Michael’s

and mid-sized LCD displays.

and services, tapping into

website www.MichaelMcQueen.net

In order to win the battle

securitysolutionsmagazine.com

5. Re-Position – As times

social commentator and three-

SECURITY SOLUTIONS // 39


COVER STORY

SECURITY AT THE GOLD COAST

COMMONWEALTH GAMES: BRONZE, SILVER OR GOLD? BY NEIL FERGUS

A very important meeting

and Gold Coast guests on the

preceding one. The Glasgow 2014

is scheduled to take place

sports delivery program, venue

Commonwealth Games was an

a major international multi-sport

in Birmingham in June. A

design and operations, transport,

outstanding success – including

event over 11 days, comprising

multifunctional of the Gold Coast

the accreditation system, the

the security operation – and

275 events in 19 sports, involving

Games review is scheduled to

athletes’ village, broadcasting, the

Australian observers attended and

4500 athletes from 72 nations

occur and, given its importance

live sites and security. Like every

brought back lots of lessons for the

and territories should not be

to the delivery of the Games,

previous Games debrief, it should

Gold Coast.

underestimated. Similar to

the performance of security at

prove to be a frank, objective and

the Gold Coast Commonwealth

wide-ranging discussion.

There was a tidal wave of

The complexity of delivering

challenges confronted by the

international publicity generated

Sydney 2000 Olympics and the

by the recent Gold Coast Games.

Melbourne 2006 Commonwealth

aspects of the Gold Coast

Much of it, thankfully, was

Games, the Gold Coast commercial

Games met and even exceeded

about the sensational sporting

security operation was always

Federation, the CGF, will host

expectations. The sports program

achievements – the feats of

going to be a significant challenge

a meeting to discuss the key

was a sensational success.

strength, endurance, dignity and

for GOLDOC, the organising

learnings from the recent Gold

Similarly, athletes from the 72

courage. Five Commonwealth

committee contracted by the CGF.

Coast 2018 Commonwealth

nations and territories of the

teams won their first ever medals,

Games. Invitees from the Gold

Commonwealth were virtually

14 world records were broken,

was provided to GOLDOC by

Coast operation will participate

unanimous in their unstinting

there was a PNG weightlifting

its governmental partners,

and, facilitated by senior

praise for the organisation of

gold medal for the ages and the

particularly the Queensland Police

executives from the CGF, they

the Games.

unprecedented integration of

Service, to assist it discharge its

the Paralympic program into the

responsibilities. Nevertheless, it’s

Games was a massive success.

the organising committee which

Games is expected to be high on the agenda. The Commonwealth Games

will discuss the Games outcomes

There is little doubt most

There were lots of strong

Outstanding support

– the good and the bad – with

positives about the Gold Coast

the British stakeholders who will

Games but there is one truth

have key roles and responsibilities

about international major events –

reported the closing ceremony

of the security overlay around

delivering the next edition of

there is no such thing as a perfect

was a disaster of style, form and

venues and had to contract, train,

the Commonwealth Games in

event. There are too many moving

substance. And transport incurred

deploy and oversee the security

Birmingham in 2022.

parts, complex interdependencies

several days of challenges,

guard force for the Games.

and operational variables. Every

starting with long delays at

Birmingham City, the County

Games has its weaknesses and the

the Broadbeach transport

deal of media criticism over

of West Midlands and United

rationale for a Games debrief is

interchange on the evening of the

the no-show and attrition rates

Kingdom ministries and agencies

to identify them, discuss solutions

opening ceremony.

among its contracted guard force.

will have an opportunity to talk

and make the next edition of

with the CGF and its Queensland

the event even better than the

Representatives from

40 // SECURITY SOLUTIONS

On the negative, it was widely

So how is the CGF likely to rate security outcomes at the Games?

had to scope and install much

GOLDOC received a great

However, there are extenuating circumstances that need to

securitysolutionsmagazine.com


securitysolutionsmagazine.com

SECURITY SOLUTIONS // 41


COVER STORY

be understood; and, frankly,

couldn’t provide the contracted

these risks were foreseen and

guard force required and the

initially concerned that less

the performance of security at the

largely mitigated by adept

British Army had come to the

than half the anticipated

Gold Coast venues quite positively.

contingency planning.

rescue). Apart from the Army

number of guards were

However, the Games security

The State Government

personnel undertaking vehicle

deployed at the Sheraton

operation is too big and complex,

and Gold Coast Council were

screening operations at selected

Mirage, the Games Family

it has too many “moving parts”, to

understandably keen for

locations like the International

Hotel and CGF headquarters,

ever be perfect. There will be some

the Games to generate local

Broadcast Centre, GOLDOC had

during the first few days of

quite specific issues discussed with

employment opportunities and

also arranged for several hundred

the Games. However, by the

the next hosts from Birmingham

the guard force was identified

Army Reserves to be on standby

time of the pre-Games meeting

– areas and issues for redress

as a pathway to train or reskill

at Enoggera Barracks in Brisbane.

of the Sports Ministers of the

or improvement.

unemployed people in south-east

If required, they would have

Commonwealth–and prior to

In particular, there were

Queensland. There were always

been back-filled into screening

the arrival of Prime Minister

constant worries about security

concerns about how many in this

operations at Games sports

Turnbull, Governor-General

breaches of access control

demographic were serious about

venues. As it happened, those

Cosgrove and CGF Vice-Patron

between the International Zone

entering or getting back into the

Reserves were not needed.

Prince Edward – an adequate

and the Residential Zone within

cohort of guards were deployed

the Athletes’ Village. Regrettably,

workforce, and those concerns

Despite the contingency

For example, the CGF was

The CGF is expected to evaluate

were validated as most of the no-

planning, there was an initial

at the venue and the GOLDOC

GOLDOC omitted to install

shows came from this local pool

delay in GOLDOC backfilling its

security operation proceeded

accreditation barcode reader

of people.

‘no-shows’ and this certainly

smoothly and effectively.

technology so security guards had

GOLDOC had the foresight

contributed to adverse media

Notwithstanding the initial

to try and match faces with the

to contract several of the most

coverage. The reason for the delay

challenges faced by GOLDOC,

photos on individual accreditation

reputable national guarding

was because the replacement

it needs to be emphasised the

cards. Given the many thousands

providers so it had the option

guards had to be brought in

security screening operations

of pedestrian movements through

to cover shortfalls by flying

from interstate, briefed, kitted

at key venues like Carrara and

that critical check point each

in additional personnel from

out and deployed. Consequently,

Robina met CGF and public

day, this proved to be a virtually

interstate or New Zealand. And

the first few days of the Games

expectations and, in fact, the

impossible task and it was,

that was exactly what happened.

were challenging for security,

conduct of venue screening

therefore, unsurprising some

and GOLDOC had to prioritise

operations and the throughputs

unauthorised people gained access

a plan to ensure there was no

its deployment decisions based

achieved were arguably as good

into the residential zone. This

possibility of a London 2012

on practical requirements and

as could be achieved at any

was a very disturbing and frankly

Games calamity (when G4S

risk assessments.

international major event.

unacceptable situation to occur

Moreover, there was always

42 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


in an Athletes’ Village – which is frankly the heart of every multisport Games. There was also a security issue about the use of drones over Games venues, including the Village, as the venues need to be regulated as restricted airspace under the terms of the Host City Contract (HCC) and drones present a security risk. Fortunately, due to the efforts of the Queensland Police, this situation was largely contained. Over a dozen drones

…the conduct of venue screening operations and the throughputs achieved were arguably as good as could be achieved at any international major event.

were seized by police at Gold Coast

General’s Department. One

appear to be positive. Early

matter that will be discussed in

indications are that both QPS

Birmingham next month involves

and GOLDOC did not exceed

the cooperative arrangements

their budget estimates and, as

with the Australian Border Force

mentioned earlier, there are

(ABF). As with any Games, there

some very worthwhile legacies

were a few allegations relating

including the new JESCC on the

to the misuse of accreditations to

Gold Coast. This is welcome news

gain visa access (into Australia).

for the Queensland Government

The CGF has developed and

but equally so for the CGF as

maintains oversight of the Games

it now moves on to work with

accreditation system and expected

Birmingham 2022.

to work closely with the ABF to

While there might be other

understand and address any

aspects of the security operation

anomalies or breaches in the

that will be raised and discussed

venues and this issue is going to

the Games–although it remains

system which might impact future

at the Birmingham debrief next

become an even greater security

to be seen if this organisational

editions of the Games.

month, the CGF executive team

challenge for future Games

arrangement contributed to the

security operations.

design problems at the Broadbeach

effectively declined to cooperate

issues, the key successes and the

Transport Hub that took several

with the CGF due to an internal

challenges that unfolded.

repeatedly for action by GOLDOC

days to rectify. Those particular

interpretation of its Act, despite

involved the need to refresh

transport challenges are likely to

ABF legislation containing

definitively what the CGF’s final

Emergency Management Plans

be analysed very closely at the June

provisions to enable cooperation

judgement will be in assessing the

(EMPs) for each Games venue.

meeting.

with international organisations.

success of the Gold Coast security

The CGF will probably refer some

operation. That will only be clear

An issue the CGF flagged

Once a Games overlay has been

Queensland Police Service

Unfortunately, the ABF

is very cognizant of the principal

It’s impossible to predict

installed around existing venues,

(QPS) played a pivotal role in

of the accreditation related matters

after the June meeting as it will

it is not uncommon for the ingress

the success of security at these

to its Governance and Integrity

depend largely on the views

and egress pathways and assembly

Games. Apart from providing

Committee (GIC) but its inquiries

of the senior CGF executives:

point for evacuation to change –

direct support to GOLDOC at all

will be made more difficult due to

CGF Chief Executive David

particularly when a venue has to

Games venues, including a level of

the situation with the ABF. This is

Grevemberg CBE, Chief Operating

transitioned from business as usual

assurance on screening operations,

an issue that might require further

Officer Darren Hall, President

into a configuration for an Opening

QPS performed an outstanding

CGF discussion and deliberation

Louise Martin CBE and Vice-

or Closing Ceremony. As has

role in traffic management and

with future host city governments.

President Bruce Robertson.

happened in previous Games cities,

VIP movements, including the

There is one last point on the

including Melbourne in 2006,

movements of athletes.

Queensland Fire and Emergency

One of the notable legacies

Nevertheless, it would be

security operation about which

fair to say we expect the CGF

the CGF is always cognizant – the

assessment to be positive. To

Services and GOLDOC arguably

of the Games is the state-of- the-

budget. Nobody wants to see

use the language of the Games,

took some time to fully appreciate

art Joint Emergency Services

a situation where the cost of

the security operation is almost

the changed Games context

Coordination Centre (JESCC) which

delivering an effective security

certainly going to be rated as “on

and requirements. However,

is now operating on the Gold Coast.

operation for the Games becomes

the podium” – a medal worthy

fortunately, the relevant EMPs

The purpose-built JESCC proved

so prohibitive it acts as a deterrent

effort. But it remains to be seen

were appropriately revised prior to

to be an extremely successful

to cities bidding to host this

if it will be assessed as either

the commencement of the Games.

command centre for police and

complex international major

Bronze, Silver or Gold. n

security agencies to discharge their

event. The CGF wants security to

raised with GOLDOC on several

responsibilities during the Games.

be kept proportionate, scoped on

occasions involved its concerns

It will provide benefits for the Gold

a risk management methodology

Executive of Intelligent Risks (IR);

about the budget and operational

Coast population and its visitors

consistent with ISO 31000, and

Australia’s leading provider of

risks of GOLDOC Security

very capably for many years

with CAPEX (Capital Expenditure)

management services for security,

managing the delivery and

to come.

investment leaving a legitimate

risk and crisis management. He has

legacy for public security rather

been involved in the planning and

Another planning issue the CGF

installation of the security overlay

National agencies also made

Neil Fergus is the Chief

at venues separately from the

an important contribution:

than gold-plating the capabilities

delivery of numerous international

venue development and overlay

particularly ASIO (Australia

of police and security agencies or

major events including eight

team in GOLDOC. The problems

Security & Intelligence

enriching entrepreneurs.

Olympics. He has been the Security

appear to have been deconflicted

Organisation), the AFP (Australian

successfully by GOLDOC during

Federal Police) and the Attorney-

securitysolutionsmagazine.com

The good news is the Gold

Adviser to the Commonwealth

Coast security budget outcomes

Games Federation since 2004.

SECURITY SOLUTIONS // 43


LEGAL Q&A

THE TOP 10 THINGS YOU NEED TO KNOW ABOUT WILLS BY ANNA RICHARDS

Anyone who owns a business or works in a dangerous role needs to think at some point about what they want to do with their assets in the event of their passing. In the last issue of Security Solutions we began our examination of things when planning out your estate. This issue we present the final three of our list of the top ten things you should know about Wills.

PART II

Point 7 – What are the Consequences of a Will being Invalid? If a will is not valid, the

whole estate (including

• siblings but no partner,

a. The will maker lacked

personal assets) to

children or parent – to such

capacity to make a will (for

his partner.

of his siblings as survive him

instance, had dementia

and if more than one in equal

or another ailment which

o if the estate is worth

consequences could include:

more than the partner’s

shares but if a predeceased

rendered him unable to

• an older valid will being treated

statutory legacy:

sibling leaves children of his

properly understand what

• personal chattels, the

own, then that sibling’s share

he was doing by making the

as the will maker’s final will, even though the older will may

amount of the partner’s

goes to such of that sibling’s

be significantly different in its

statutory legacy, interest

children as survive him and if

effect to the later invalid will.

on that amount from

• the will maker being deemed

date of death to date of

more than one in equal shares. • grandparents but no partner,

will in a particular way); or b. The will maker was pressured into making the will either via:

to have died intestate if he

payment and 50 percent

children, parents, siblings or

does not have another valid

of the balance of the

children or issue of siblings – to

older will.

residuary estate – to his

such of his grandparents as

partner; and

survive him and if more than

under the will maker’s current

one in equal shares.

will do not make adequate

When a person dies intestate, it basically means that there is no

• the balance of the estate

i. undue influence; or ii. duress. 2. that the distributions made

valid will in place, with the result

to such of his children as

• aunts or uncles but no partner,

that a statutory or government

survive him and if more

children, parents, siblings or

beneficiary or a person who

formula applies. The application of

than one in equal shares

children of siblings – between

is not a beneficiary under the

that statutory formula determines

but if a predeceased

such of his aunts and uncles

how the estate will be distributed,

child leaves children of

as survive him and if more

In the case of the validity

which may be in a completely

his own, then his share

than one equally but if a

argument, a challenger may allege

different way from what the will

goes to his children

predeceased aunt or uncle

that the will maker:

maker intended. It is especially

and if more than one

leaves children of his own,

• did not understand what

detrimental to the will maker if

in equal shares (with

then that aunt or uncle’s share

he did not wish to include certain

this formula continuing

goes to such of his children as

family members as beneficiaries

to the children of

survive him and if more than

under the will.

grandchildren until the

one in equal shares.

The following is a summary of Victoria if the will maker leaves:

to such of his children as

• a partner and no child or other

• children but no partner –

current will.

he was doing when making the will; • did not understand fully the consequences of the way in which he instructed the lawyer

benefit is exhausted).

Point 8 – Why do some Wills get Challenged?

the current formula applicable in

provision for a particular

to draft the will; • lacked the capacity to enter into

survive him and if more than

There are two main platforms

issue – the whole estate to

one in equal shares but if

upon which a person can apply to

his partner.

a predeceased child leaves

a court to either treat as invalid or

pressured to make a will

children of his own, then his

otherwise alter the way in which a

with particular consequences

issue who is a child of the

share goes to his children and if

will purports to distribute the will

because of:

partner – the whole estate to

more than one in equal shares

maker’s property and liabilities.

o unequal bargaining power

his partner.

(with this formula continuing to

These are:

exerted by another person

• a partner and child or other

the children of grandchildren

1. on the basis of validity. That

(for instance, the person

issue who is not the child or

until the benefit is exhausted).

is, there is an allegation that

putting pressure on the will

the will or certain clauses of

maker enjoyed holding a

children – the residuary estate

it should be held to be invalid

position of power over the

amount of the partner’s

to such of his parents as survive

(and hence not enforceable

statutory legacy (which is

him and if more than one in

by a court) on one of the

currently $451,909) – the

equal shares.

following bases:

• a partner and a child or other

other issue of the partner: o if the estate is less than the

44 // SECURITY SOLUTIONS

• parents but no partner or

any legal transaction; • did understand but felt

will maker); or o pressure from another person or persons whereby

securitysolutionsmagazine.com


the will maker did not really

will makers think should be

want to make a will in that

relevant (such as the challenger

manner but felt forced to

not having much contact with the

is that, if someone challenges

this could include evidence that

do so to appease a person

will maker) are not relevant under

a will, the person who would

the will maker paid school fees for

or people.

the legislation and hence are not

usually be the primary witness

the excluded person’s children,

factors which a court can seriously

provided free child care to the

Point 9 – How to Prevent a Will from being Challenged

(the will maker) will no longer be

take into account.

in existence and hence cannot give

excluded person’s children, or

evidence from the grave to assist

made gifts of value or wrote off

the executor!

loans to the excluded person.

Legislation which regulates

well be that they work against the

who is permitted to challenge

will maker and not is his favour.

executor may accept legal advice to

a will (for making insufficient

Careful attention should be made

provision for a particular person)

about what relevant reasons

has been tightened up to some

exist (if any) for the will maker

Point 10 – Why do so many Challenges to Wills get Settled out of Court?

extent. The good consequence of

to exclude or provide to a lesser

Many court cases seeking to

action and the legal costs involved

this change is that, at least under

extent for certain people under a

challenge either the validity

in defending the proceedings,

Victorian law, very few people

will and, further, whether any of

of a will or to request that the

which erodes the existing pool of

now have ‘standing’ to apply to a

those reasons should be stated in

distribution under a will be

assets required to be distributed to

court to challenge the adequacy

the will or in another document

altered on the basis that it does

the beneficiaries.

of the will in providing for a

which accompanies it.

not make adequate provision to

particular person.

Hence, if only legally irrelevant reasons are mentioned, it may

If there is an argument that

executor). What needs to be kept in mind

and otherwise) for the challenger during his lifetime. For instance,

Without such evidence, the compromise its position and settle the dispute because of the risk of the challenger succeeding in the

It is for these reasons that

a particular person end up being

careful attention should be paid to

the will maker made adequate

settled out of court. That is, such

the best way in which a will should

not qualifying as a person who can

provision for a particular person

court proceedings are usually

be drafted and to leaving evidence

challenge a will, the short answer

during that person’s lifetime as

resolved out of court by agreement

to assist an executor in having to

is that it is not possible to outright

the reason for excluding that

between the parties as opposed to

deal with any disputes about the

prevent anyone from challenging a

person as a beneficiary under the

a judge hearing the evidence and

estate in the will maker’s absence.

will, although certain strategies to

will (hence upon the will maker’s

determining the outcome of the

reduce the risk of such a challenge

death), then the will maker should

matter.

can be adopted.

leave extensive evidence of the

However, other than a person

The major reason for this is that

Anna Richards is the legal director and a lawyer from Victorian Legal Solutions Pty Ltd.

In the case of some people, a

financial provision that he made to

there is often not solid evidence

She practises in commercial law,

testamentary trust can be used,

that person during the will maker’s

to defend such a challenge.

including commercial litigation and

wholly or in part, to protect some

lifetime. For instance, this may

Obviously, the person who would

other areas. Anna and Victorian

of the assets. It does this by holding

include evidence of the payment

usually be the principal and most

Legal Solutions can be contacted

the assets of the estate (or some or

of expenses of the excluded person

important witness in the matter is

by telephone on (03) 9872 4381 or

part of them) upon trust with the

and payments made in favour

not available because, of course,

0419 229 142 or by email at info@

result that some or all of the assets

of the excluded person, bank

he has passed away. The only

victorianlegalsolutions.com

are not fully given to a beneficiary.

statements highlighting monies

other witnesses can only give

Usually, this mechanism provides

paid to the excluded person, loan

secondhand evidence of what they

taken to ensure its accuracy, the

for a beneficiary to receive an

agreements, receipts and the like.

heard the will maker say about his

information contained in this

income from the assets during

Ideally, the will maker should

intentions or about an excluded

article is intended to be used as a

his lifetime, but the assets

also provide either an affidavit or

beneficiary. Hence, much the

general guide only and should not

themselves are never owned by the

statutory declaration recording

evidence of such witnesses is often

be interpreted as being specific

beneficiary. However, this model is

such matters.

very indirect, unreliable and easy

advice, legal or otherwise. The

to challenge.

reader should seek professional

only suitable for some people.

This action will assist the

Whilst every effort has been

executor of the will with being able

Further, the will maker may

a particular person has been

to defend any challenge to the will.

have left very little clear written

practitioner before relying upon

excluded as a beneficiary is

Further, the production of such

evidence of pertinent matters.

any of the information contained

sometimes helpful. However,

evidence (by the executor to the

For instance, if the executor is

herein. This article and the opinions

those reasons need to tie in

excluded person) may potentially

attempting to defend a challenge

contained in it represent the

with legislative factors which

deter the excluded person from

on the basis that the will maker

opinions of the author and do not

are relevant to whether or not

commencing legal proceedings

did not make adequate provision

necessarily represent the views

adequate provision has been

and hence potentially save the

for the challenger during his

or opinions of Interactive Media

made by the will maker to that

estate significant expense (in the

lifetime, the executor would

Solutions Pty Ltd or any advertiser

beneficiary (during the will

form of avoiding significant legal

ideally need evidence of how the

or other contributor to Security

maker’s life). Many reasons which

costs from being incurred by the

will maker provided (financially

Solutions Magazine. n

Stating reasons for why

securitysolutionsmagazine.com

advice from a suitably qualified

SECURITY SOLUTIONS // 45


FEATURE

Many who joined ISIS, women

coupled with battlefield successes,

women question this gruesome

caters to them but instead takes

included, believed that the ISIS

in 2014 and 2015 it managed

spectacle, the ISIS response is, “All

over their lives.

caliphate would deliver a pure

to attract thousands of fighters

revolutions require bloodshed, but

Islamic lifestyle and that it

from all over the world, including

ultimately those who fight for the

reported in 2015, a young woman

would operate by pure Islamic

hundreds of women, to what it

cause will live by pure Islam.”

in Washington State, whose

ideals, despite the bloodshed

portrayed as a triumphant cause.

and brutality that have become

Part of its strength lies in its

In fact, ISIS recruiters operate

As the New York Times

alcoholic mother had left her in

much like cult recruiters, meeting

the care of her grandparents,

a defining characteristic of

ability to demonize the opponents

needs in the first interactions

tweeted out the question of why

the group.

and avoid the moral conflict that

and then gradually drawing their

ISIS would behead a journalist.

comes with killing and engaging

victims deeper into the group – to

She received an answer – from

in acts of brutality. When

a point where the group no longer

ISIS recruiters – who told her that

In fact, ISIS uses cruelty to communicate fearlessness and,

46 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


There Are Many, and They May Be More Dangerous Than the Men BY ANNE SPECKHARD, PH.D. & ARDIAN SHAJKOVCI, PH.D. / FROM DAILY BEAST

In the last issue of Security Solutions, the authors began their examination of issues around women returning from the ‘caliphate’, and whether or not, they can return at all, by looking at the techniques used by ISIS to lure in, indoctrinate and ultimately trap many female recruits. In this follow up article, Anne Speckhard and Ardian Shajkovci present their thoughts on the viability of rehabilitation for women returning from their experiences with ISIS.

all revolutions are characterised

of religion. They often want to

hero by leaving her job cleaning

by bloodshed and that this [ISIS

prove themselves, sometimes

bedpans, marrying him, and

struggle] was no different. They

by expressing loyalty through

working as a medic for ISIS.

then began to seduce her into the

violence. At the same time, they

Shannon attempted to travel to

movement by lavishing attention

may be alienated from family

Syria and was sadly disappointed

and gifts upon her.

members, which leaves them

when she was arrested on the

vulnerable to others who begin to

tarmac trying to board a plane

fill that gap.

out of Denver, Colorado. She

Similarly, a teen girl in London followed ISIS profiles on Twitter, only to find that they followed

is now held in a maximum-

her back, suddenly making her

Conley fell into this category. She

popular with many followers, and

converted from Catholicism to

they messaged her about joining

Islam at age 17 and then tried to

State often leave confused

the Islamic State. They told her

join ISIS at age 19. She found her

schoolmates and BFFs behind.

that, as a Muslim, she should

interpretations of Islam on the

Two young Bosnians who had

make hijrah – that is, travel to live

Internet and was convinced by

grown up in Vienna continued

in Islamic lands rather than live

violent extremists that Islam is

to contact at least one of their

sinfully in the kafr (unbelieving)

under attack and that the West is

friends via social media, likely

UK. When she protested that she

the enemy of Islam. Interviewed

inviting her to follow. A young

was too young to marry one of

by the FBI when she came to their

girl in a London school appears

the ‘brothers’, she was told she

attention, Shannon admitted to

to have influenced three of her

could come and marry after a

downloading instructions on how

schoolmates to follow her into the

year or so. When her case came

to carry out a VIP attack inside

Islamic State.

to the attention of authorities, she

the US and that she had come

admitted that from the pictures

to believe that military bases,

among young people, particularly

she was being sent of ISIS housing

and even civilians who frequent

teen girls, and have been

in Syria, she thought she would be

them, could be legitimate targets

observed in relation to suicide to

traveling to “Islamic Disneyland”.

of attacks.

psychosomatic health epidemics.

Converts to Islam are especially

securitysolutionsmagazine.com

American teen Shannon

She also Skyped and fell in

security prison. Girls who go to join Islamic

Contagion effects are normal

This is to be expected and should

vulnerable to ISIS recruitment, as

love with a Tunisian ISIS fighter

be guarded against in relation to

they often have limited knowledge

who convinced her to become a

terrorist recruitment as well.

SECURITY SOLUTIONS // 47


FEATURE

Women who join ISIS are

husband’s ‘martyrdom’, with some

her grandson back home who,

joining a misogynist organisation,

even welcoming their enhanced

according to her close associates

for logistical, propaganda,

but it is important to note that

status as a martyr’s widow as

interviewed in Kyrgyzstan,

recruitment and policing work.

they also are empowered in

a positive benefit. Moreover,

brought a message from the rest of

During the final battles for the

multiple ways by the group.

widowhood benefits are promised

the family, “He’s the only one we

recapture of Mosul, ISIS sent

Foreign women who join are

to ISIS wives in the event their

could get out, we are hopelessly

numerous females to blow

invited to serve in the ISIS hisbah

husbands are killed.

lost.”

themselves up in attacks on

(morality police). They are tasked

According to ISIS defectors we

Contrary to some societal

ISIS has relied on women

encroaching soldiers.

with enforcing dress codes and

interviewed, in reality, these are

assumptions that downplay the

the strict ISIS interpretations of

rarely paid with any consistency.

role of women as perpetrators

who joined the Islamic State group

sharia law. These women are

On the contrary, ISIS widows

of violence, women in ISIS

likely had some psychological

armed, operate above the status

found themselves handed off to

frequently are agents of violence

and social issues before leaving

of ordinary civilians, and answer

their husband’s friends or put into

within the group. Former

that made them vulnerable to

to practically no one – enjoying an

dire living situations until they

members of hisbah told us

recruitment and, once in, they

elevated status they may not have

agreed to marry again – some

themselves about flogging and

often also have been weaponised

found back home.

marrying as many as 13 times

biting other women with metal

and indoctrinated into a

in succession. One female ISIS

teeth as punishments. Similarly,

vicious ideology.

home might also enjoy a beautiful

defector with a baby in arms told

reports from those on the ground

home taken from the enemies

us she escaped the group because

in Syria state that women inside

sharia training told us of having

of ISIS or a captive forced into

she did not want to be forced to

ISIS have been trained to throw

to behead a prisoner before

slavery who does cooking and

marry a fourth time after her

grenades, use weapons and

giving their bayat [pledge of

housework, in some cases looking

third husband was killed.

have been indoctrinated for

allegiance] to the terrorist group

martyrdom missions.

while women in the hisbah told

Women who earn poorly back

after the husband’s sexual desires.

Most countries accept their

Independent of gender, anyone

Men who went through

Even among women, the ISIS true

female returnees from Iraq and

believer is taught to dehumanise

Syria, and many countries do not

certificate for ISIS wives was

torturers. While women are

these captive women and

prosecute these women – or if they

changed in recent years to state

less often weaponised, there is

legitimise their enslavement.

do, they receive lighter sentences.

that a woman does not have to

increasing evidence of weapons

This is due to the notion that they

seek her husband’s permission to

training for female cadres in the

young foreign women are

only followed their men as a result

become a martyr. She only needs

last year.

invited to join a group of women

of being tricked or coerced, which

the permission of the ISIS caliph,

operating out of Raqqa that draw

often is not the case.

Abu Bakr al Baghdadi.

If they are not in the hisbah,

other women, as well as men,

In the Balkans and Central

Indeed, the marriage

Following in the paths of

us of being turned into sadistic

As ISIS increasingly calls for homegrown attacks in the West, it is unclear if they will reach back

into the group. Females seducing

Asia, we were told by intelligence

many conservative terrorist

to females who have returned

men into the group are powerful

and law enforcement that women

groups that do not encourage

home. For instance, one wife of

indeed. American ISIS recruit

are ‘zombies’ (following their

female fighter roles, ISIS is no

an ISIS fighter in Kosovo was

Mohamad Jamal Khweis appears

men and controlled by their

different in pushing them into

not prosecuted for joining and

to have joined precisely for this

men). But our research shows

suicide missions when cornered,

travelling to a terrorist group,

female promise of marriage,

that ISIS women often followed

facts born out in the recent battle

while her husband was. He serves

having left the US on a purported

their men willingly into Syria and

for Mosul.

a four-and-a-half-year sentence

vacation but flown in a circuitous

Iraq, and in some cases willingly

route to Istanbul. He later claimed

joined them in homegrown

were forced to join the group, nor

while his wife lives freely in

to have met a woman whom he

terrorist attacks.

lacking in agency with regards to

society, although under police

the roles they played in it, we need

surveillance. She is known to

immediately married and with

Some may have agreed to

Given that not all ISIS females

and still avows loyalty to ISIS,

whom he travelled to Iraq to join

go out of fears of abandonment

to be cautious with both female

continue Internet contacts with

the group.

and financial ruin, yet others

and male returnees from the

the group as well as communicate

were instigators. In Kyrgyzstan,

Islamic State.

with her husband, who expressed

Contrary to some assumptions, females who get to the Islamic

for instance, two older women

While women who join

State are not gang-raped by ISIS

talked their extended families

ISIS are often portrayed as

men. But they are expected to

into travelling to Syria to join

brainwashed by men, cultural

There are ample other

have husbands and, indeed,

ISIS, believing that they would

biases that overlook the role of

examples of returned foreign

ISIS runs a marriage bureau

better their financial lot and be

women as willing participants,

fighters from ISIS and other

specifically for that purpose.

able to live by what they believed

including narratives that deny the

terrorist groups where the

Women who marry into ISIS

to be true Islamic ideals. When

role of political grievances that

returnee continued on at home

are indoctrinated into believing

disillusionment set in, one of these

drive women to join ISIS, may

as a ‘sleeper’ and reactivated over

in the spiritual benefits of their

grandmothers was able to smuggle

be dangerous.

time. The possibility that ISIS

48 // SECURITY SOLUTIONS

willingness to return to the group if released.

securitysolutionsmagazine.com


women would do the same is a

by virtue of the likelihood that

factor we cannot afford to ignore.

they are traumatised by what

In our experience, ISIS has

they experienced and may also

contacted members who defected,

be ideologically indoctrinated

insisting that they continue to

or weapons trained, should first

serve the group even when they

be prosecuted and, if judged

wish to sever ties. Similarly,

amenable to it, be allowed

returnees who may have had

to receive a lightened prison

difficulties that led to their

sentence, or sidestep prison

wish to travel to Syria and Iraq

time altogether by voluntarily

to join, are likely to face these

committing to engage in a

same difficulties, if not worse

psychological program.

stressors, upon their return. They

A well carried out

WOMEN WHO HAVE BORNE CHILDREN INSIDE ISIS TERRITORY HAVE ENCOUNTERED DIFFICULTIES ESCAPING WITH THEIR CHILDREN, WHO LACK OFFICIALLY RECOGNISED IDENTITY DOCUMENTS.

https://georgetown.academia.edu/

measures, we can ensure the

terrorism as well as training key

AnneSpeckhardWebsite:http:// www.icsve.org Ardian Shajkovci Ph.D. is the Director of Research and a Senior Research Fellow at the International Center for the Study of Violent Extremism (ICSVE). He has been collecting interviews with ISIS defectors and studying their trajectories into and out of

have also witnessed extreme

rehabilitation program can

safety of our citizens while ISIS

stakeholders in law enforcement,

brutality that may leave them in a

help them to understand and

tries to reconstitute itself in the

intelligence, educators and other

traumatised state.

address the personal reasons

face of territorial loss and the

countering violent extremism

that resonated with ISIS calls to

eventual return home of most of

professionals on the use of counter-

traumatised Palestinians often

recruitment and their violent

its foreign fighters.

narrative messaging materials

revealed how easy it was to

actions, as well as be moved to

volunteer for a suicide mission if

find other solutions to either their

one already was psychologically

psycho-social problems and/or

an adjunct associate professor

been studying the use of children

numb as a result of post-traumatic

concerns about their grievances.

of psychiatry at Georgetown

as violent actors by groups such

University in the School of Medicine

as ISIS and how to rehabilitate

Interviews in the past with

stress disorder (PTSD). As one

Some ISIS returnees may

produced by ICSVE both locally Anne Speckhard Ph.D. is

and internationally. He has also

interviewee said, “It’s a small step

not voluntarily take part in

and Director of the International

them. He has conducted fieldwork

to take if we are already dead.”

rehabilitation. Others may only

Center for the Study of Violent

in Western Europe, the Balkans,

pretend to cooperate. That said,

Extremism (ICSVE) where she

Central Asia and the Middle

serves as a kind of psychological

if carried out well and with

heads the Breaking the ISIS

East, mostly recently in Jordan

first aid when applied to people

careful assessments along the

Brand—ISIS Defectors Interviews

and Iraq. He has presented

suffering PTSD. The individuals

way, many can be rehabilitated

Project. She is the author of Talking

at professional conferences

gain immediate relief from painful

and reintegrated into society in a

to Terrorists, Bride of ISIS and

and published on the topic of

flashbacks and post-traumatic

psychological state that makes it

co-author of ISIS Defectors: Inside

radicalization and terrorism.

arousal states by escaping into

less likely that they would again

Stories of the Terrorist Caliphate;

Ardian holds a doctorate in Public

a death they believe is simply a

be manipulated or once again

Undercover Jihadi; and Warrior

Policy and Administration from

doorway to paradise and glory

answer the call to terrorism.

Princess. Anne has interviewed

Walden University, with a focus

nearly 500 terrorists, their

on Homeland Security Policy. He

Indeed, martyrdom ideology

and may even experience states of

While we are preparing for

euphoria in contemplating taking

the return of female foreign

family members and supporters

obtained his M.A. degree in Public

their own life in this manner.

fighters, we also need to educate

in various parts of the world,

Policy and Administration from

These same post-traumatic

youth, including female youth,

designed the psychological and

Northwestern University and a B.A.

vulnerabilities may be operating

regarding the truth about ISIS

Islamic challenge aspects of the

degree in International Relations

for ISIS female returnees who, in

and their virulent online and

Detainee Rehabilitation Program

and Diplomacy from Dominican

many cases, are not prosecuted

face-to-face recruitment. Despite

in Iraq to be applied to 20,000 +

University. He also holds several

nor mandated into any kind

rapidly losing its territory, ISIS has

detainees and 800 juveniles, is a

professional certifications in the

of treatment, despite likely

already produced innumerable

sought after counterterrorism

field of homeland security as well

suffering stigma, personal and

propaganda materials that are

expert and has consulted to NATO,

as a professional designation for

psycho-social problems, and

likely to continue to circulate on

OSCE, foreign governments and

his contributions to the field of

difficulties reintegrating.

the internet. The digital caliphate

to the U.S. Senate and House,

homeland security and homeland

will likely continue to recruit.

Departments of State, Defense,

security efforts in general. He is

Justice, Homeland Security,

also an adjunct professor teaching counterterrorism courses.

Public sympathies for ISIS female returnees, who are often

Initiatives like our Breaking

handed down shorter sentences

the ISIS Brand Counter Narrative

Health and Human Services, CIA

or pardoned, may only complicate

Project using insiders to denounce

and FBI and CNN, BBC, NPR,

the prospect of effectively dealing

the group will continue to be

Fox News, MSNBC, CTV, and in

with female returnees who

useful to interfere with and

Time, The New York Times, The

need special care and attention.

disrupt ISIS recruitment. Through

Washington Post, London Times

It is our view that anyone who

a combination of education,

and many other publications.

joins a terrorist group like ISIS,

prevention and direct intervention

Her publications are found here:

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 49


FEATURE

50 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


NEW ISO31000 COMING THIS YEAR. ARE YOU READY? BY ALEXEI SIDORENKO

After more than five years in

both and full credit should go to

They should ensure that risk

management framework

the making and thousands

the authors of the ISO31000 2009

management is integrated into

and the way the risk

of comments received from

version, because the document in

all organisational activities and

management process

representatives of 54 participating

its original form already listed all

should demonstrate leadership

and observing countries, as well

the right principles and concepts.

and commitment.

as multiple liaison organisations,

So, what has changed?

• The concept of integration

is integrated. o The risk management process should be

the updated ISO31000 standard

Here are some of the most

is reinforced throughout

an integral part of

is going through the final stages

important changes:

the document; here are just

management and decision

of feedback and will likely be

• The document is shorter. It is

few examples:

making and should

o Risk management

be integrated into the

published in early 2018. This article summarises the key changes to the most popular

now only 15 pages (excluding covers and bibliography). • The number of principles has

should be a part of, and

structure, operations

not separate from, the

and processes of

standard in the risk management

reduced from eleven to eight,

organisational purpose,

the organisation.

world, ISO31000, and how the

without losing any of the

governance, leadership

• The new standard explicitly

important messages.

and commitment, strategy,

states that there can be

objectives and operations.

many applications of the risk

changes will impact businesses.

• The standard reinforces the

Key Changes Proposed in the 2018 Version

purpose of risk management.

o Properly designed

management process within

According to the authors,

and implemented,

an organisation, customised

There are no significant changes.

the purpose of the risk

the risk management

to achieve objectives and

That is right. Five years in

management framework is

framework will ensure

to suit the external and

the making and thousands of

to assist an organisation in

that the risk management

internal context in which they

comments received and processed

integrating risk management

process is a part of all

and, at the end, all changes are

into all its activities and

activities throughout the

either cosmetic or reinforce the

functions. The effectiveness of

organisation, including

the dynamic and variable

messages that have been included

risk management will depend

decision making, and that

nature of human behaviour

since the 2009 version. This could

on its integration into the

changes in external and

and culture, which should be

either mean the 2009 version was

governance and all activities

internal contexts will be

considered throughout the risk

already great and just needed

of the organisation, including

adequately captured.

more emphasis, or it could mean

decision making.

that the members of the ISO

• The responsibility of top

o The organisation should

are applied. • The standard also addresses

management process. These messages are very

continually improve the

powerful. They are not new, but

TC262 did not have an appetite for

management and oversight

suitability, adequacy and

they reinforce the type of risk

change or innovation. It is actually

bodies has been added.

effectiveness of the risk

management that is integrated

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 51


FEATURE

into business activities and key

cosmetic, does that mean risk

objectives is assessed at

decision-making processes; the

managers do not have to do

the time the strategy is

type of risk management that is

anything? Yes for those risk

formulated and not after it

– while it is quite common

not done on a pre-determined

managers who have been applying

was approved by the board.

to budget using three

periodic basis (quarterly, monthly

the ISO31000 principles since its

Risk analysis becomes an

scenarios (optimistic,

and so on), but at the time of

publication in 2009. However,

important step of the actual

realistic and pessimistic), it

making an important business

in 14 years in risk management,

strategy setting and update

may not be sufficient from

decision or as part of the business

I have probably met less than

processes. Risk managers use

a risk management point of

process or activity.

10 people like that globally.

scenario analysis or simulation

view. These scenarios are

Nevertheless, here are some

modelling to present an

often formed without the

examples of successful practices:

independent opinion on

risk management team’s

• Integrating into strategic

strategic objectives, the

participation or even without

What does it mean for Businesses?

have on their achievement. • Integrating into budgeting

Since all the changes are either

planning – the effect of

likelihood of achieving them

due consideration of the

reinforcing existing ideas or

uncertainty on the strategic

and the impact the risks may

actual risks associated with

52 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


use of simulation modelling to make sure all important risks are captured and their impact on liquidity assessed. Risk analysis helps replace static, point-in-time budgets with a distribution of possible values. It also helps set management key performance indicators (KPIs) based on the risk information, thus improving the likelihood of them being achieved and reduces the conflict of interest the finance department and management team have in presenting an overly optimistic budget.

FIVE YEARS IN THE MAKING AND THOUSANDS OF COMMENTS RECEIVED AND PROCESSED AND, AT THE END, ALL CHANGES ARE EITHER COSMETIC OR REINFORCE THE MESSAGES THAT HAVE BEEN INCLUDED SINCE THE 2009 VERSION.

principles. So, for them, the new standard is a wonderful opportunity to re-evaluate current risk management methodologies and start building a business case on why risk management needs to be better integrated into decision-making and key business processes. National and international risk management associations have an important role to play in building awareness around the new ISO31000 to help integrate risk management principles into national legislation and government-issued guidelines. n Alex Sidorenko is an expert

Risk analysis helps to identify the most critical risks

with over 13 years of strategic,

affecting the budget, allowing

innovation, risk and performance

management to allocate

management experience across

ownership and determine the

Australia, Russia, Poland and

budget for risk mitigation.

Kazakhstan. In 2014 Alex was named the Risk Manager of

• Integrating into

the Year by the Russian Risk

performance management

Management Association.

– risk management could

As a Board member of

be integrated into the

mitigation, risk management

performance management

training grades or an internal

Institute for strategic risk

cycle of the organisation,

audit assessment of the risk

analysis in decision making,

both at the individual level

management effectiveness in

Alex is responsible for G31000

and the corporate level.

different business units.

risk management training and certification across Russia and

One of the risk managers

• Integrating into investment

we interviewed shared an

decision making – the use

CIS, running numerous risk

example where traditional

of simulation allows users

management classroom and

static corporate KPIs have

to estimate the range of

e-learning training programs.

been replaced with dynamic,

project costs and expected

Alex represents Russian risk

risk-based, ranged KPIs.

returns, along with the most

management community at the

This allowed management

significant assumptions made

ISO Technical Committee 262

to have bands of values

by management that affect

responsible for the update of

instead of a single value.

project KPIs.

ISO31000:20XX and Guide 73

the budget. Thus, even the

Some KPIs stayed as single

For these risk managers,

pessimistic scenarios often

value estimates; however,

ISO31000:2018 will be a nice

do not account for many

they were calculated as the

reinforcement of what they have

global PwC risk management

significant risks, creating

95 percent percentile of the

been doing for years.

methodology, the author of the

an overly optimistic and

distribution of possible values

misleading picture for

based on the Monte-Carlo

in non-financial companies,

SME (Russian standardization

executives and decision-

simulation. Triggers and key

however, choose to settle for

organization), risk management

makers. Proper risk analysis

risk indicators may also be set

regular risk register updates,

textbook (Russian Ministry of

can bring significant value to

for corporate KPIs to improve

period risk reporting and

Finance), risk management guide

the budgeting process. Risk

monitoring and performance

standalone risk management

(Australian Stock Exchange)

managers should review

tracking. At an individual

framework documents. All

and the award-winning training

and improve management

level, risk management KPIs

these practices are relatively

course on risk management (best

assumptions used in scenario

may be set around risk-based

ineffective and never did align

risk education program 2013,

analysis or introduce the

decision making, timely risk

well with the original ISO31000

2014 and 2015).

securitysolutionsmagazine.com

The majority of risk managers

since 2015. Alex is the co-author of the

risk management guidelines for

SECURITY SOLUTIONS // 53


AVIATION

ARE WE USING BODY SCANNERS CORRECTLY? BY STEVE LAWSON

54 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


While body scanners are still not

rest of the developed world. The

commonly used in Australian

European Union banned them in

airports, it is a subject that keep

2011. So when I talk about body

coming up time from time to time.

scanners in the rest of the article

Originally this article was going

I am only referring to millimeter

to examine their efficiency, but a

wave technology.

recent experience led me to instead

is again split into two: active and

even being used correctly in the

passive. Australia uses active

countries where such machines

scanners. Active simply means that

are in use. It is a pity that it does

the machine radiates energy from

not matter how good technology

a couple of antennae and then uses

is, its efficiency will always depend

the reflected energy to construct

on implementation.

an image.

Before we talk about how

securitysolutionsmagazine.com

Millimeter wave technology

look at whether this technology is

A number of countries

efficient body scanners are we

have conducted tests into the

should really understand how

effectiveness of body scanners,

they work. There are two types

both backscatter and millimeter,

of body scanners; millimeter

but obviously those tests are

and backscatter. Only millimeter

confidential. The issue was

wave machines are used within

publically discussed in a US

Australia and backscatter is

Congressional Research Service

gradually being phased out in the

report in 2012.

SECURITY SOLUTIONS // 55


AVIATION

As well as equipment

The Transportation Security

excel spreadsheet that includes

security equipment is used except

effectiveness, the report also

Administration (TSA) maintains

equipment ranging from rubber

to budget for consumables for the

addressed issues such as the cost

that this equates to approximately

mats to the x-ray machine. The

equipment. Checkpoints need to

per passenger in the US. I guess

US$1 per passenger. The report

final equipment list will depend

have a range of equipment and

that many people reading this

seems to question this figure

on the legislative requirements

facilities to be effective. I think

article would be interested in

by stating that it relates to the

and a risk assessment of the

that the cost suggested by the TSA

the price of the equipment. Each

total number of passengers

airport. The customer does know

is a fair estimation.

machine is roughly US$175,000

rather than those subjected to

the cost per item but they are

but the report suggests that

random screening using the

given a total cost of the equipment

concerns, firstly the machines

once on costs like installation,

body scanners. In my opinion

available to the aviation transport

used in Australia use non-ionizing

staffing, and maintenance are

that distinction is not really

security officers (screeners). It is

radiation. I hear that term a lot

included, the cost is more like

valid. When I am asked to cost

not broken down to the number

and in my mind it seems so non-

US$655,000 annually.

a screening point I have an

of times an individual piece of

threatening. Sort of like ‘organic’

56 // SECURITY SOLUTIONS

Let us consider health

securitysolutionsmagazine.com


products are automatically

Adonis or Aphrodite, the image

effectiveness of millimeter wave

and more than capable of hiding

believed to be healthy. Then

is really not titillating. However,

body scanners. In fact, I cannot

a weapon. I went to open for the

I remember that heroin and

I am certain that even given my

find anything definitive and,

operator but he waved me off,

cocaine could be described as

image’s lack of grace, I would not

as I said, the government does

same with the glasses case. If

‘organic’.

like it stored for any length of

not release that data. There are

you are going to spend loads of

time or looked at by security staff

a number of news articles that

money on such machinery then it

for their enjoyment.

try to question the effectiveness

should be used properly.

I only include this titbit since some of you may know enough about non-ionizing radiation to

Body scanners in Australia,

of millimeter wave machines

Are the machines effective?

apply my heroin and cocaine

the US and Europe have privacy

but when you read them they

I would suggest that they are

example. Non-ionizing simply

filters included so that the

are either about the use of the

and in the end what is the

means that the radiation is not

operator only sees a standard

equipment or refer to backscatter

alternative? The Walk Through

enough to remove an electron

‘cartoon’ of the body and the

body scanners. It is interesting

Metal Detector (WTMD) only

from an atom or molecule.

machine automatically highlights

that a study by the UK gave a

detects magnetic items and doing

However, non-ionizing radiation

potential threats. I was surprised

false alarm rate for a backscatter

a pat down of every passenger

includes part of the ultra-violet

to read in the Privacy Impact

machine of around 5 per cent,

is just not practical. To be

(UV) range and UV can cause

Statement prepared by the

while tests in Italy, Germany, and

honest, I would like to see them

things like skin cancers. Does

Department of Infrastructure on

the US resulted in a false alarm

eventually used as a replacement

that mean that the non-ionizing

body scanners used in Australia

rate for millimeter wave machine

for the WTMD but the time per

radiation used in millimeter

that “the data produced by

of 23-54 per cent. I suggest

passenger for a body scanner

wave body scanners since they

the scans cannot be stored or

that the difference in false

would need to be closer to 5

use Extremely High Frequency

transferred and is deleted once

alarm rates is not a reflection

seconds rather than the current

(EHF) radiation is dangerous?

the automated assessment

of the relative efficiency of the

20 seconds. Also, the false alarm

I am not a medical authority

processing is complete. No ‘raw’

equipment but rather that earlier

rate needs to be down under 10

or a technical expert on body

or ‘naked’ images are produced.”

backscatter machines allowed the

per cent. Most importantly, the

scanners but I cannot find

I am surprised that the images

operator to interpret the image

training of screeners needs to

anything that suggests that

are not stored for at least 48

but with the millimeter wave

be addressed. If something is

those used in Australia are a

hours so that in the event of

machines this is undertaken by

flagged, it must be checked. n

health hazard.

an incident investigators could

the machine. Consequently, the

In a very good information

Steve Lawson has over 20

access the images. Privacy

operator is presented with an

sheet issued by the Department

concerns have been raised in the

alarm that there is an item under

years’ experience in aviation

of Infrastructure on the Travel

US and Europe and there have

the person’s clothing. It could be

security. As a Security Executive

Secure website “There is

been allegations of breaches of

anything. Basically if you do not

with Qantas Airways, Steve

no evidence to suggest that

privacy, e.g. picking attractive

have anything on you it will not

held a number of senior

millimeter wave body scanners,

females. However, most of

alarm but if you have anything

management roles covering all

or other devices in this frequency

those issues seem to involve

on your body, a millimeter wave

aspects of aviation security from

and at the power density used

backscatter body scanners. Given

machine is likely to flag it.

policy development to airport

by scanners, are a health risk

that operators in Australia and

for the travelling public or the

in much of the world only see

experience with a body scanner.

York immediately following

operators”. I am not an apologist

cartoon images, I do not see that

I was at an airport in Australia

the 9/11 attacks to manage the

for the government but I would

as an issue unless the person

and had time to watch the body

Qantas response and undertook

suggest that to issue such a clear

is trying to make a political

scanner being used and was

a similar role following the 2002

statement in this information

statement or to bypass screening.

eager to try, notwithstanding

Bali Bombings. On his return

sheet does mean that all current

Similarly, there have been

knowing what my unadulterated

to Australia, he was appointed

information indicates that the

questions about taking scans of

image looks like. It is supposed to

Security Manager Freight for

equipment is safe.

children and the possible use of

be a random process but I asked

the Qantas Group. Since 2007

those images. Again, with current

if I could go through the scanner,

he has been a Director of AvSec

issue with body scanners –

systems it is unlikely that the

no problem. I was happy and

Consulting in partnership with

privacy. Those who know me will

images could be seen or obtained

disappointed, why scan someone

Bill Dent, a fellow former Qantas

attest that I am not an Adonis,

and even if they were they

who wants to be screened in a

Security Exec. Today Avsec

quite the opposite, and I have

are not, as I said above, in any

random process? The scanner

Consulting provides consultants

seen my unadulterated image in

way titillating.

found two things: a glasses case

from the US, NZ, ME, Israel

and my wallet. I showed both to

and Europe.

Now for the most contentious

a body scanner. It is not a pretty

Which brings me to the

Now we arrive at my

operations. He was sent to New

Steve can be contacted

sight, you see all the rolls of fat

effectiveness of the equipment.

the operator, he looked. Not that

and other more personal bits.

There is not much in the way

there was any money but my

on 0404685103 or slawson@

Even if the image were of an

of scholarly articles about the

wallet is rather thick with cards

avsecconsulting.com.

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 57


LOSS PREVENTION

FILMING OF SECURITY INTERVENTIONS IN AND AROUND PUBLIC PLACES DR TONY ZALEWSKI

58 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Filming of security interventions

confronted the witnesses, took

in and around public places is

possession of their mobile phones,

a common occurrence. We are

and deleted the recorded video

now familiar with broadcasts

files before returning the mobile

across the media of dash-cam and

phones to each respective witness.

mobile phone video images that

In one case the crowd controller

have been privately captured by

concerned was dismissed by

members of the public. In fact,

his employer and other crowd

police often call on members

controllers who assisted him were

of the public to provide them

disciplined. In the other case, the

with any privately captured

crowd controller was warned

video images to assist in their

by the licensee not to repeat the

investigation of crime and road

behaviour, albeit the licensee was

traffic incidents.

unclear whether such behaviour

However, two recent and separate security-related incidents

securitysolutionsmagazine.com

was unlawful or not. These incidents highlight

occurred in Victoria where

growing concerns about the

witnesses used their mobile

lawfulness or otherwise of filming

phones to visually record patron

people in public places and if

ejections from licensed premises.

security staff are filmed in the

On both occasions, and shortly

performance of their work, what

after the ejections, security staff

is the appropriate response.

SECURITY SOLUTIONS // 59


LOSS PREVENTION

circumstances where a person’s

legislation either way to allow

image constitutes “personal

or not allow filming in public

filming through mobile phones

Does a person have a right to privacy in a public place?

information” under the Privacy

places to protect a person’s image

in public places. It also explains

Situations where operational

Act 1988 (Cth) but the Act applies

or their privacy. There is no tort

practices that should be followed

security staff are filmed by a

to businesses and agencies,

of invasion of privacy and no

by security staff to ensure

member of the public during

not individuals who may film

precedents in Australia at this

unlawful or unprofessional

work are more likely than not,

activity of security staff. Similarly,

stage that allows for a civil action

acts are not committed when

especially in areas where there

under Australian consumer law,

to recover damages according to

filmed by members of the public.

are increased levels of public

celebrities may be protected when

ordinary principles governing

It should be noted there are

activity. Increased levels of public

filmed if reproducing their image

damages in tort.

many circumstances where a

activity are evidenced at public

misleads potential consumers into

“public place” involves activity

places listed above. However, do

thinking there is an endorsement

on private property such as

members of the public, including

of their products or services

Crime, surveillance and listening devices

a shopping centre, licensed

security staff, have a right to

by the celebrity. This applies to

Where the civil law addresses

premises, concert hall, sporting

privacy in a public place?

celebrities and trade practices, not

private disputes, the criminal law,

to filming of incidents or security

amongst other things, proscribes

staff working in public places.

conduct considered threatening,

This article explains the current position relating to

ground, airport and other places

In general terms, individuals

where the public are permitted

in Australia do not have a right

to enter, whether for payment

to privacy that protects the

or not.

person’s image. There may be

60 // SECURITY SOLUTIONS

Put simply, outside the examples above there is no

harmful and damaging to the good order of society. Many acts, such

securitysolutionsmagazine.com


involves a crime report to police

reasonably suspected of being

understanding the location and

or arrest of the perpetrator to be

stolen or unlawfully obtained,

coverage of CCTV cameras in your

handed to police.

irrespective of the reason for the

workplace you should ensure

taking or the time the personal

work is performed in areas under

and Territory has legislation

property was possessed. Unlawful

surveillance. This will enable

concerning use of surveillance and

possession is one of a few crimes

capture of CCTV images relevant

listening devices. The legislation

where the onus of proof is reversed

to the incident. Your supervisor

seeks to protect individuals

which means the person in

or manager should be informed

and their private activities and

possession of the personal property

of the incident, the relevant CCTV

conversations. Recording of private

must prove they lawfully possessed

files extracted and retained, and

conversations using listening

the property.

an appropriate report made in the

Each Australian State

devices is specifically prohibited. A

Further to the above, it must

incident register.

mobile phone could be considered

be remembered that any criminal

a listening device, however it

proceeding including assault or

that any recording is an accurate,

would be difficult to claim a private

a property-related offence can

independent and impartial

conversation was being unlawfully

impact upon an individual’s

witness irrespective of whether

recorded where a person is openly

eligibility to hold or retain a

the images have been captured by

filming activity in a public place

security licence. My advice is to

witnesses to incidents or not. Like

and is a party to the conversation.

avoid any circumstance where

mobile phone recordings, CCTV

Succinctly, the current legal

a phone is taken from another

images are also of value to show

person filming security activity.

exactly what behaviour occurred

position appears to be, subject to the above it is not unlawful to

It is important to remember

by persons present during an incident. Captured images can

in a public place using a mobile

What can be done if filming occurs?

phone. This then poses the

Where filming on a mobile

conduct during operational

question, what can be done when

phone is occurring during an

activity. Accurate incident

filming occurs?

ejection or other security activity,

reporting and identification of

security staff can ask or direct a

eye-witnesses can then corroborate

Can a phone be seized from a witness?

person not to film. However, this

assertions of professional conduct.

is unenforceable request if the

Collectively, filmed incidents

Seizing another person’s property

person filming does not desist.

captured on mobile phones or

openly film security staff working

must be in accordance with the

As filming cannot be prohibited,

provide evidence of professional

otherwise will disclose the actual

law. Seizing an exhibit to prove

it is important that security staff

course of conduct by security staff,

a crime is recognised by the

closely align with appropriate

irrespective of assertions made

common law, however seizing

practices in the selection of tactical

outside of private mobile phone

property where there is no crime is

options for any intervention or

filming. Where staff follow their

another matter.

ejection. If a trespasser is being

training and operating procedures,

Seizing a person’s phone

removed from premises, ensure

private filming in public places

action that is harmful and impacts

exposes the taker and any other

you align with your training and

is not to be discouraged as it will

upon the good order of society

person assisting the taker to

operating procedures in the use

merely confirm professional

hence is punishable under the

allegations of assault. By definition,

of force. If a shoplifter is being

conduct by security staff. n

criminal law.

assault not only involves physical

arrested and escorted back into the

as assault, may have individual victims however violence is an

Ongoing filming of the same

For over 20 years Dr Tony

application of force but also can

store, ensure you align with your

security staff may involve an

be committed in circumstances

training and operating procedures

Zalewski has provided expert

allegation of criminal “stalking”,

where a person is placed in fear

in managing the perpetrator. If

security reports to courts in all

albeit there must be some course

of immediate force through an

you are unsure about your legal

Australian jurisdictions. He has

of conduct upon which there

assailant’s conduct. If an injury

rights operationally then adopt

four degrees from Australian

is an intention or recklessness

results from the seizure, then the

a cautious approach rather than

Universities including law, has

about causing someone else

assault is deemed more serious.

be caught on film acting outside

worked on over 500 cases including

apprehension or fear. A person

The taker could also be charged

appropriate practices.

some of Australia’s leading

aggressively pushing their mobile

with a property-related crime such

phone into the face of a security

as unlawful possession. Unlawful

you are aware mobile phone

provides advice about security

officer may also unwittingly

possession is a crime in Victoria

recording is occurring you can

across industry sectors and is a

commit an assault. The response

and committed where a person

also rely on recorded images in

security adviser to governments

to stalking and assault typically

possesses personal property

the workplace. For example, by

locally and abroad.

securitysolutionsmagazine.com

Further to the above, if

security-related civil actions,

SECURITY SOLUTIONS // 61


ACCESS CONTROL

Strategic Positioning: How ACaaS Is About To Change The Marketplace BY HOMER ENRIQUEZ

Thrive or survive – a critical choice must be made before it is too late. Everyone who knows me, knows that I live, breathe and eat cloud-technology – cloud-based access control to be more specific. They also know that I am very passionate about this adoption and if you met me on the street, I would introduce you to ACaaS as if it were my own child. What is about to happen will change the security industry as we know it today, forcing some to fall from our ranks and others to emerge as powerhouses. When the dust settles from our industry’s transformation, how will you emerge? Will you thrive or struggle to survive? It is time to decide.

62 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Today’s competitive landscape

in annual revenue production,

is incredibly dynamic and the

muscling its way into second

industry’s growth thus far has

place behind the video segment.

been incredible. The emergence

Positioning an organisation in the

of cloud technology has changed

marketplace, right now, to play in

how efficiency, profitability and

this competitive landscape is of

revenue growth is gauged and

profound importance; the life or

has brought new metrics, such

death of the company may hang in

as user experience, capabilities

the balance.

and integrations, to the forefront

securitysolutionsmagazine.com

As is well known, for whatever

of what influences marketplace

the reason, the life safety and

decision makers. Analysts are

building security solutions

projecting that by 2025, cloud-

industry has been apathetic in the

based access control (ACaaS)

adoption of new and/or cutting-

will surpass traditional access

edge technology, which will soon

control in revenue share for

start to thin the industry’s ranks.

the access control segment and

Here are a couple of things for

that is not even the half of it.

readers to mull over. Think of

Analysts are also predicting

the last time you were driving

that the entire access control

somewhere and did not know

market segment, by 2025, will

exactly how to get there – did you

be driven by ACaaS, biometrics,

pull over to buy a map? When

visitor management and wireless

was the last time you went to the

locks; furthermore, the access

store to rent a movie for ‘movie

control segment as a whole will

night’? When was the last time

surpass the intrusion segment

you wrote a letter and mailed it?

SECURITY SOLUTIONS // 63


ACCESS CONTROL

The culprit in all these scenarios is cloud technology. Analysts are

cloud environments. Edge computing allows data

connectivity in a small-form

technology’s guinea pig – as a

factor. Data is processed at the

result, the access control industry

projecting that in five years’ time,

produced by Internet of Things

edge, and all or a portion of it is

is taking advantage of what was

cloud-based access control will be

(IoT) devices to be processed

sent to the central processing or

learned when they went through

at a compound annual growth rate

closer to where it is created

storage repository in a corporate

this process and its migration

(CAGR) of almost 29 percent and

instead of sending it across long

data centre, co-location facility

will happen much faster with

organisations need to claim their

routes to data centres or clouds

or Infrastructure as a Service

less stumbles. Today’s consumer

spot at this table now.

and, when it is combined with

(IaaS) cloud.

expects technology that is better, faster, easier, intuitive and for less

the anticipated smaller footprint,

Here is Why

higher processing capability

The history of technology, without

and lower cost of transistors,

Why does Edge Computing Matter?

exception, has consistently

computational processing

Edge computing deployments are

demonstrated that at some

previously done by servers in

ideal in a variety of circumstances.

technology will give birth to

point all technology eventually

cloud environments will now

One is when IoT devices have

devices that are more affordable

matures and takes that next step

be able to be executed by edge

poor connectivity and it is not

and more powerful. Smaller

in the evolution process. This

devices at a significantly lower

efficient for IoT devices to be

footprints on circuit boards will

critical window of opportunity is

cost, making cost to ownership

constantly connected to a central

provide room for enhanced

also influenced by the fact that

for access control end-users much

cloud. Other use cases have to do

capabilities and encryption,

development in transistors – their

more palatable. Sounds great?

with latency-sensitive processing

using less bandwidth, which will

processing power, capability, foot

It is, but organisations will have

of information. Edge computing

lower cloud environment costs.

print and costs – are reaching

to have a cloud environment,

reduces latency because data

The aggregate sum of all of this

a critical point simultaneous to

evolved to support edge devices,

does not have to traverse over

makes the industry segment more

the anticipated growth in the

operational. Doing this computing

a network to a data centre or

efficient, faster, stronger and,

ACaaS marketplace. Moore’s

closer to the edge of the network

cloud for processing. This is ideal

considering the lower cost that

Law is the observation that

lets organisations analyze

for situations where latencies of

will eventually come to fruition,

the number of transistors, or

important data in near real

milliseconds can be untenable,

bring into the fold an entirely

rather their performance, in a

time – an organisational need

such as in financial services

new vertical where access control

dense integrated circuit doubles

across many industries, including

or manufacturing.

was previously cost prohibitive.

approximately every two years;

manufacturing, health care,

some argue or revise to 18 months.

telecommunications and finance.

than they were previously paying for their ‘on-premises’ product. Developments in resistor

Based on this information,

Connecting the Dots

cloud-based access control will

Let’s make a few summary

have a huge advantage when

conclusions and put everything

compared to traditional-based

power to the consumer falls, the

What exactly is Edge Computing?

together. First, technology

access control and certainly when

cost for producers to fulfil Moore’s

Edge computing is a “mesh

evolves and consumers love it.

compared to what is currently in

law follows an opposite trend:

network of micro data centers

No more maps, no more running

the marketplace.

R&D, manufacturing and test

that processes or stores critical

to the movie rental store, no

costs have increased steadily with

data locally and pushes all

more records or record players;

each new generation of chips.

received data to a central data

consumers can have all of this

Most semiconductor industry

center or cloud storage repository

stuff faster, cheaper and better. In

Made your decision? Here is what the future holds.

forecasters, including Gordon

(today’s cloud environments), in a

short, customers love technology,

1. I have a cloud environment

Moore, expect Moore’s law will

footprint of less than 100 square

especially the enhanced feature

or am about to build one.

end by around 2025–2030. (The

feet,” according to research firm

sets that come with it. So many

Either way, yes, I am in. The

evolution of processing power will

IDC. It is typically referred to in

industries have already gone

first and most important

open the door to new technologies

IoT use cases, where edge devices

through this transformation,

rule to a successful ACaaS

such as bio-processing, synaptic

would collect data – sometimes

so consumers already expect

offering: if you do not

firing processing and other

massive amounts of it – and send

mobility, ease of use and an

follow it, do not expect to

‘science fiction coming to life’

it all to a data centre or cloud

enhanced user experience, all

be successful building a

scenarios, but that is another

for processing. Edge computing

of which cloud-based access

meaningful recurring monthly

topic for another day). The

triages the data locally, so some

control delivers.

revenue (RMR) engine. You

critical point at which the

of it is processed locally, reducing

development of transistors caps

the backhaul traffic to the central

already crawled, stumbled,

offering for all access control

out will lend rise to and create

repository. Typically, this is done

walked and eventually ran down

opportunities, every sales

the perfect environment for the

by the IoT devices transferring the

the cloud-based technology path

person in your company, no

prevalence of edge computing,

data to a local device that includes

before the access control industry

exceptions. Make a strategic

which will complement existing

computing, storage and network

– in essence, they were cloud-

product offering decision that

Additionally, Moore’s Second Law states that as the cost of computer

64 // SECURITY SOLUTIONS

Many other industries have

must lead with your ACaaS

securitysolutionsmagazine.com


drives every dollar for access

projections to 29 percent CAGR

such as Homeland Security,

and traditional access control

control opportunities to your

in five years, the showcasing

CIA, military, there are a

just cannot compete with

RMR engine, otherwise, your

of technology, apps, real-time

couple of things to consider.

cloud-based access control.

return on investment will be

management, aging of existing

In five years, traditional-based

Consumers’ expectations

too far out to compete. It is

traditional access control

access control is expected to

define the demand, not the

all about cornering market

systems, edge devices, lower

be at nine percent CAGR and

products you choose to offer

share for what is about to take

costs to consumers and, to

ACaaS at 29 percent. The CAGR

and, after so many different

place. If your ACaaS offering

top it all off, your very own

of the market you play in is

industries have already made

is just another screwdriver in

recurring monthly revenue

directly related to the growth

the migration to cloud-based

your tool chest of products,

engine that will allow you

potential of your company.

technology, consumers are

you will not be successful in

to be more aggressive on

When you bid against a

already expecting the feature

building a meaningful RMR

other lines of business since

company that has an ACaaS

sets and mobility that cloud-

engine, period. Ensure your

your RMR engine is reducing

offering and its associated

based access control can

sales team undergoes training

overhead, the best customer

RMR engine is churning away,

provide. Ask yourself this: Are

to transition from selling a

retention history for any

they can do the job for less

you offering what you want to

product to selling a service and

offering in any segment in our

than you can, they can offer a

sell or are you offering what

ensure they know your ACaaS

industry you are a part of the

greater stable of feature sets,

the consumer wants? Are you

product offering like the back

future where access control is

and can make just as much

acting in your end-user’s best

of their hand. Your sales team

concerned. Well done. Enjoy

net profit than you can, if not

interest? Will what you are

will need to become technology

building a legacy that is built

more, even though their bid

selling help the growth of your

consultants, helping clients to

for tomorrow.

is calculated using a lower

company? n

formulate a cloud strategy, not

2. I am comfortable selling

margin. Clients with aging

just security sales people in

traditional access control.

systems that are prime for

Homer Enriquez is the hattrix

order to be competitive in the

That is what I know. While

upgrade will want to know

National Sales Manager at Kantech

future. With ACaaS taking an

ACaaS will not play in certain

what new feature sets will

in the US. He can be contacted via

ever-growing market share,

scenarios and/or markets,

come with the upgrade/cost

email homer.enriquez@jci.com

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 65


PROFESSIONAL DEVELOPMENT

SECURITY INDUSTRY LICENSING time for a change

BY SCOTT O’DRISCOLL

66 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


securitysolutionsmagazine.com

Regulation and administration

A Brief History

of the private security industry

According to Prenzler and Sarre in

in Australia is currently the

an article published in the Criminal

responsibility of states and

Justice Journal in 2012, “The first

territories. For many years those

wave of industry specific regulation

working in the security industry

is associated with the New South

have been obliged under state and

Wales Security (Protection) Industry

territorial legislation to spend many

Act 1985, which introduced

hours at considerable cost to apply

licensing of security firms and

for multiple licences in order to

employees. Criteria included

conduct business in this country. At

‘prescribed qualifications and

one point in time, I had six different

experience’ and disqualification for

plastic licences in my wallet, which

10 years for offences against the

is nothing short of ludicrous. This

Act and convictions for indictable

article will challenge this approach

offences. The focus was on guards,

and offer an alternative solution.

consultants and some classes of

The article will be particularly

security equipment providers.”

relevant to those whose roles

This was the catalyst for change in

require them to operate across

the industry in Australia and other

different states or territories which

jurisdictions soon followed suit. I

for the purposes of this article I will

think we can all agree that licensing

refer to as jurisdictions.

was a good idea. Licencing has

SECURITY SOLUTIONS // 67


PROFESSIONAL DEVELOPMENT

allowed the industry to weed out persons of questionable character, those who are not qualified to provide services and those with a criminal history and or ties to organised crime. The article closes with this statement in regard to licensing at a national level:“From a national perspective, however, the system remains fragmentary, and there is little evidence of consistent improvements in the industry. It is clear that a much more proactive approach is needed that involves a mix of legislation and regulatory strategies designed to produce quality outcomes in the delivery of vital security and safety services.� I strongly believe the reason we have this problem is that nobody bothered to ask two very simple questions:-

68 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


1. What is the best way to enact

instances, applicants are still

which allows for electronic finger

and eligibility. The licence would

obliged to travel to the state

printing. Prints are scanned and

indicate the jurisdiction(s) they

or territory they wish to hold a

saved as a data file which could be

have chosen to operate and there

The answer to question one is

licence to have their finger prints

sent anywhere in the world and

you have it, one licence to cover all

obvious. Look to benchmark against

taken. Although, for some reason,

more than likely is. This covers off

the requirements Australia wide.

another successful licensing model.

I have found that this applies to

identity management and criminal

The same approach could

A classic example would of course

some applicants but not others

history checks at a national level.

be taken for the Master Licence.

be motor vehicle licensing. If I am

depending on who you speak to.

In New South Wales (NSW),

Complete the application on the

licensed to drive a car in my home

For example, where I have been

photos and issuing of licences is

same on-line portal, upload the

state, I can also drive a car in any

able to send a copy of my prints

managed by Service NSW. This

required documentation, select the

other state or territory in Australia.

in the old ink format as part of my

seems to work quite well and I

jurisdictions in which you intend

The answer to question two is,

application, I know of more than

don’t see any reason why this

to operate, upload the required

in my opinion, equally simple -

a few colleagues who have been

process should not continue and

documentation, pay the fee,

consult with your end users and key

instructed to travel to the state or

be rolled out across all states and

retrieve your finger print reference

stakeholders, i.e. those who operate

territory in which they are applying

territories. Regardless, I don’t think

number, book into your local police

in the Security Industry!

for a security license to have their

this is a show stopper. All driver’s

station for Live Scan, job done.

finger prints taken. This is another

licences in Australia are photo

The Question

example of the lack of uniformity

licences, so no matter how these

Summary

The question all cross-regional

of licensing requirements at

are obtained in other jurisdictions,

There you have it, a simple, fast,

security providers would like

regional level.

the same process could be applied

effective, burden free national

to security licences.

security licensing system. Most

security licensing in Australia? 2. Who are the best people to ask?

answered, and the subject of this article is:-

The current jurisdiction based

importantly it would encourage

system is a costly, admin heavy burden for the end user and

Application Management

rather than discourage compliance.

operative or business is licensed

completely avoidable in this day

Applications could quite easily

Industry associations such as ASIAL

to preform security duties in one

and age. I would also suggest that

be completed on line. It would

and ASIS International should

jurisdiction, they cannot perform

rather than promoting security

be a simple matter of putting

lobby federal government on

those same duties in any other

operatives to be compliant, the

together a web site or making

behalf of their members to push

jurisdiction without first obtaining

complexity of security licensing is

use of an existing on-line portal

for this change. We all know it is

another licence?

actually having the opposite effect

which allows the applicant to

needed, we all know it has been

in that those who work across

apply for a licence or licences

a hot topic for years and there

would know, the current system

regions would rather take the risk

in the jurisdictions they wish to

really is no excuse for not making

is direct result of the regulatory

of operating without a licence

operate in, upload the relevant

this happen with the technology

bodies in each state and or territory

particularly, if it is a simple day trip.

documents required to obtain a

available today. The burden

licence and book into the local

associated with the administration

Why is it that if a security

As all in the security industry

legislating in isolation. This prevents uniformed legislation from

Legislation

police station to have their finger

of multiple licences across

being developed, passed through

So how do we fix it? Simple, let’s

prints taken whereupon they

multiple jurisdictions is simply not

parliament and implemented.

start with legislation. It needs to

would quote a reference number

justifiable and must be addressed

be uniform across all states and

generated on-line as part of the

as a high priority.

legislation in Australia means each

territories. How do we do that? We

application process.

jurisdiction has different acts and

need a champion at a federal level

regulations. This means that if you

to get behind this initiative and

user the ability to select the states

Critique Prenzler and Sarre 2012.

operate across state or territorial

push for licensing to be legislated

and territories under which they

https://www.crimejusticejournal.

borders, you are obliged to hold a

at a federal level. Select the most

wish to operate and the type of

com/article/view/72 n

separate licence for each location

current, most generic state or

licence they wish to apply for. A

in which you wish to ply your

territory legislation and use it as

fee would be charged to cover

Scott O’Driscoll CPP, JP is a

trade. Even more farcical is the

the baseline for federal legislation.

administration costs for each

security professional with over 35

fact that if you are the business

This will allow for uniformed laws

jurisdiction and licence type

years’ experience in the industry.

owner, you are also obliged to

and regulations at a national level.

applied for. If successful, the

He is a licenced security consultant

applicant would receive a letter

and private investigator. Scott

advising them to report to a service

currently holds the position of

provider to have a photo taken.

Global Security Operations and

The lack of uniformed security

hold a Master Licence in each

The web site could offer the

Sources: The Evolution of the Security Industry in Australia: A

the revenue generated as a result

Criminal History Checks and Identification

of regionally controlled licensing is

Next, the criminal history and

just too enticing for the states and

identification problem. The police

applicant would receive a licence

world’s largest financial banking

territories to relinquish.

now use a national data base for

which details their licence type and

institutions. Scott can be contacted

finger printing known as ‘Live Scan’

class based on their qualifications

on +61 437 618 812.

jurisdiction. One has to wonder if

Further to this, in some

securitysolutionsmagazine.com

As per current practice, the

Risk Manager for one of the

SECURITY SOLUTIONS // 69


FEATURE

National Security Changes – Australian-Style Intelligence BY CLIVE WILLIAMS

70 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


The Independent Intelligence

has been with the Department

Review, released in June 2017,

of Defence.

was prepared by two respected

securitysolutionsmagazine.com

The AIC comprises six

‘insiders’, Michael L’Estrange

agencies, three of which are

and Steve Merchant, advised

Defence agencies: the Australian

by Sir Iain Lobban – the former

Signals Directorate (ASD), Defence

Director of the UK’s Government

Intelligence Organisation (DIO)

Communications Headquarters

and Australian Geospatial-

(GCHQ), so it cannot really be

Intelligence Organisation (AGO).

regarded as truly independent,

The other three agencies – the

but then it would be a difficult

Office of National Assessments

review to undertake for anyone

(ONA), Australian Security

who did not have a longstanding

Intelligence Organisation (ASIO)

and intimate knowledge of

and Australian Secret Intelligence

the Australian Intelligence

Service (ASIS) come under

Community (AIC). Michael

three other departments: the

L’Estrange’s career background

Department of Prime Minister

has been with the Department

and Cabinet (PM&C), Attorney

of Foreign Affairs and Trade

General’s Department (AGD) and

(DFAT), while Steve Merchant’s

DFAT respectively.

SECURITY SOLUTIONS // 71


FEATURE

Given the expansion of

and involved 150 significant

National Intelligence (ONI) as

can happen now, depending

Australian intelligence coverage

meetings, discussions with all ‘Five

a statutory authority within

on the interest of the Minister).

since 9/11, the review also

Eyes’ partners, consideration of 34

the Prime Minister’s portfolio,

The general upgrading of ASD’s

covered four agencies for whom

submissions, and interviews with

subsuming ONA, to be headed

responsibilities is, however, a

intelligence is now an important

21 interlocutors, many of whom

by a Director General (DG) of

recognition that cybersecurity

part of their business: the

were former agency heads.

departmental Secretary rank

challenges need more national

whose central coordinating

resources, particularly cybercrime

Australian Federal Police (AFP),

The review judged predictably

the Department of Immigration

that Australia’s intelligence

role would be an expanded and

and cyberespionage, which are

and Border Protection (DIBP), the

agencies are “highly capable

updated version of what the DG

continually evolving and proving

Australian Criminal Intelligence

and held in high regard by

ONA was expected to do when ONA

hard to deal with and seem beyond

Commission (ACIC) and the

their international partner

was established back in 1977; a role

the capacity of international

Australian Transaction Reports

agencies”. It also found that

subsequently reinforced by the

agencies to counter effectively.

and Analysis Centre (AUSTRAC).

“as a result of transforming

Flood Inquiry in 2004.

This broader six plus four

geopolitical, economic, societal

collection of agencies is referred

and technological changes, the

had little power over the heads

recommendations of the review as

to as the National Intelligence

intelligence community is faced

of Defence agencies whose

a sound basis to reform Australia’s

Community (NIC).

with challenges that will intensify

main priority was meeting

intelligence arrangements. As

over the coming decade”.

Defence needs. The DG ONI will

expected, it announced on the 18th

now, however, advise on the

of July that key changes would

There are about 7,000 staff spread across the 10 NIC

Consequently, the review made

The reality was that DG ONA

The Turnbull Government subsequently accepted the

agencies, with an annual budget

recommendations to cover four

appointment of senior NIC office-

be the establishment of an ONI,

approaching $2 billion. The three

priority areas: the co-ordinating

holders, which will provide him

headed by a Director General, and

Defence agencies absorb the bulk

structures of the AIC, new funding

or her with more leverage; but the

the transformation of the ASD

of the NIC funding.

mechanisms to address capability

most effective way for the DG to

into a statutory agency within the

issues, streamlining of legislative

influence agencies and their parent

Defence portfolio. (A statutory

document containing a great

arrangements, and measures

departments would be to have

agency is one authorised to enact

deal of detailed analysis and 23

to reinforce public trust in

some control over the NIC budget.

legislation on behalf of the state.)

recommendations that often

the agencies.

The review is a 132-page

contain sub-recommendations.

The review’s first

The review recommended that

The review did not address the

the ASD Director be upgraded to

issue of giving the AIC agencies –

It was conducted between

recommendation was the

DG level “reporting directly to

which were established during the

November 2016 and June 2017

establishment of an Office of

the Minister for Defence” (that

Cold War to concentrate on internal

72 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


or external issues – a broader

domestic security and law

and AUSTRAC, but continues to

against the establishment of

remit to allow them to operate

enforcement agencies to be similar

authorise warrants for ASIO’s

a Homeland Security/Home

both internally within Australia

to the Home Office in the UK: a

interception and other covert

Office-type arrangement. The

and externally. Today, of course,

central department providing

operations. Brandis has effectively

Government has not argued the

there is an electronic blurring

strategic planning, coordination

reverted to the role of Chief Law

case for change, and certainly

of national boundaries, while

and other support to a federation

Officer. The role of the Justice

not demonstrated that anything

many security challenges, such

of security and law enforcement

Minister, Michael Keenan, who

is broken and needs repair. It

as terrorism and transnational

agencies, including ASIO, the AFP,

until now reported to the AG

is reported that neither Foreign

crime, can be both internal and

the Australian Border Force (ABF),

on matters relating to the AFP

Minister Bishop nor Defence

external challenges at the same

ACIC, AUSTRAC and presumably

and other Commonwealth law

Minister Payne were present at the

time. This means that modern

the Office of Transport Security

enforcement agencies, is not

meeting of the National Security

intelligence needs to be more agile

(OTS). It obviously seeks to

altogether clear at this stage, but

Committee when these changes

and less constrained by national

avoid replicating the flawed

it looks like Dutton will have very

were considered.

boundaries and jurisdictions, and

US Department of Homeland

wide powers within the national

security countermeasures need

Security model.

security community. It may be

the Government is split on the

to be coordinated internationally.

As is now public knowledge,

According to my sources,

useful for the AFP to have its

Home Affairs issue, with Brandis,

Allowing agencies to access each

Peter Dutton was named

Minister inside Cabinet (Keenan is

Bishop and Keenan opposed to the

other’s databases is probably

Minister for the newly created

a junior Minister), but ASIO would

change, and Dutton and Finance

not the answer as it creates

mega-portfolio. The Home

probably not be happy about the

Minister Cormann strongly

potentially highly damaging

Affairs announcement seems to

loss of direct access to the AG,

in favour. Our politicians and

multi-agency ‘leak’ and espionage

have come out of left field and

except on warrant matters.

national security bureaucrats live

vulnerabilities, as has been

clearly favours Peter Dutton

seen with the Manning and

at the expense of the Attorney

happen because the Government

Snowden cases.

General (AG), George Brandis.

will force them to happen;

The Immigration side of the

however, there has been no

professor at the Centre for Military

Home Affairs

DIBP and some functions of the

expert review recommending the

and Security Law at the Australian

The Government also announced

AG’s Department are likely to be

changes, no support from the NIC

National University (ANU) and

on the 18th of July that it would

absorbed into Home Affairs.

for structural change (other than

an Associate Professor at the

from Immigration), while many

Australian Defence Force Academy,

past reviews have recommended

currently working in the UK.

establish a Home Affairs portfolio of immigration, border protection,

securitysolutionsmagazine.com

The AG has lost his supervisory powers over ASIO, the AFP, ACIC

The Home Affairs changes will

in interesting times! n Clive Williams is an honorary

SECURITY SOLUTIONS // 73


FEATURE

74 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


WAYS TO EXHIBIT LIKE A PRO BY WARWICK MERRY

In business, if you are not

sky is the limit. You then have

servicing the customer, you are

staffing costs, promotional items,

looking for new customers to

accomodation, travel, meals and

bring into your business. One way

onsite ‘surprise’ costs. It all adds

to do this is to exhibit at expos or

up very quickly.

exhibit at events as a sponsor. As a

Many businesses get

business owner, the question you

discouraged by the cost, but

MUST be asking yourself is: does

should not be. If you do it right,

exhibiting pay? And what better

exhibiting has proven to be one

time to ask this question than

of the most cost-effective ways to

right before the biggest security

market your business. The main

show of the year.

reason is that exhibiting is so

There are few ways in business

securitysolutionsmagazine.com

focused and the results are easily

that you can haemorrhage

measurable. Essentially, exhibiting

money as quickly as you can with

is speed dating. A bunch of people

exhibiting. For some shows, the

who want what you have turn up

booth space alone is five to ten

to a place where you will be and

thousand dollars. Realistically,

you have very quick conversations

your booth can start at a few

to see if you like each other and

hundred and from there the

want to take your relationship to

SECURITY SOLUTIONS // 75


FEATURE

the next level. You may not be surprised

the guest, either by some barcode, QR code or one of the new apps

to hear that the majority of

available on smartphones. The

exhibitors rarely evaluate the

second is to have a paper-based

success of their exhibiting effort

form of lead card.

by calculating the return on

It is not unusual to see the

THE UNFORTUNATE TRUTH IS THAT MOST LEADS COLLECTED BY EXHIBITORS ARE WASTED.

investment, return on objectives

staff on booths scan their mates

or return on energy. Their reasons

or other exhibitors because they

for being there are: “Well our

are ‘testing’ the scanners. More

competitor is here so we thought

often than not they are using

we should be too”, “It is good for

them to play cowboys and indians

our branding” or “We have always

and ‘shoot’ each other with the

done it and they gave us a good

scanners. Other booth staffers

deal”. To answer that essential

have simply scanned anyone

question of whether exhibiting

walking past. This results in a

pays, you need to make sure you

huge volume of unqualified leads

do the evaluations.

that all need to be followed up.

Stephen Covey talks about

just financially, but for other

Paper-based leads fare no better.

“beginning with the end

measurable reasons as well.

calculations you need to make

Too often, the lead cards are not

in mind”. What are you

Otherwise you will find

to ensure that you have made

complete, critical information is

exhibiting for? What are you

yourself at the expo again the

exhibiting pay for your business:

missing or it is simply illegible.

trying to achieve? Set a goal,

next year without making

Your leads are the most

share it with the team so they

Cost Per Lead (CPL)

a conscious decision about

valuable thing you will collect

know what they are there for

whether this is in the best

This is a very simple calculation.

when you exhibit, so there are

and then continually measure

Simply sum all of the expenses for

some key things you must do

your progress. What gets

the expo effort and divide it by

to maximise their value and

measured gets improved. It is

exhibiting. Too many people

the number of new leads you got

minimise your wasted resources:

no different for exhibiting.

are overconfident in their

at the show: CPL = total expense/

1. Select the right people to be

Here are some basic

number of new leads.

4. Listen to your guests. Whether

interest of your business. 7. Learn to get better at

skills. It is so important to ask

on the booth. Often, this is not

they are an existing customer

the questions, “What is new in

the sales people. Key staff from

Cost Per Acquisition (CPA)

or a prospect, you HAVE to

my industry?” and “Is there a

your team or select customers

listen better. Your customers

better way to be doing this?”.

can deliver fantastic results.

will tell you what they want.

Throwing a cloth on the table

This is another simple calculation

They just have to be passionate

They will tell you their

and having a few brochures

that can be done some time after

about your product, your

business pain. If you only listen

spread around is not enough.

the show. It is the same sum of all

service and your customers.

you will find significant details

You also do not need to spend

expenses from the CPL calculation,

Sales people are often too

about their business and how

divided by the number of new

busy checking emails, making

you can assist them to be more

If you do these things you will be

clients/sales you have made:

phone calls or following up

successful and enjoy success

able to determine if exhibiting

CPA= total expense/number of

‘normal’ sales deals to be

yourself. It may come as a

pays for you and your business.

new clients.

focused at the expo.

shock, but they really do not

Every event is different and

want to hear you regurgitate

every show is different. If you

your latest sales speil on them.

are discerning, focused and

These calculations can be done

2. Train your team. Too often, the

massive money to be effective.

per event and also for a period of

expo team are left to ‘get leads’

time. Research coming out of the

without training them on what

US-based Center for Exhibiting

the best methods are and how

to ignore the numbers. If you

you may find that it is your best

Industry Research (CEIR) has

to record them. Good training

can focus on the numbers,

form of marketing – many other

shown that when compared to

means that any sales lead will

measure your success

businesses have. n

traditional marketing forms such

be qualified. Ideally, they will

compared to your expenses

as advertising on TV and radio,

have some priority attached to

and calculate your return, you

exhibiting has one of the lowest

them – even if it is as simple as

will have more power over

More Guy’, an expert in how to

CPL figures.

A, B or C so the most important

being able to make the best

get more results. He is also the

get followed up first. New

decision in relation to your

co-founder of The Exhibiting

most leads collected by exhibitors

research from CEIR shows that

marketing efforts.

and Sponsorship Institute.

are wasted. There are essentially

only 30 percent of exhibitors

two key ways to collect leads. The

actually qualify their leads.

The unfortunate truth is that

first is to use technology to scan

76 // SECURITY SOLUTIONS

3. Measure your results. Dr

5. Do the numbers. It is too easy

6. Review your efforts. You

open to what exhibiting offers,

Warwick Merry is the ‘Get

Visit www.warwickmerry.com

have to ask yourself, “Has

or www.EASInstitute.com for

this been worthwhile?” Not

more information.

securitysolutionsmagazine.com



PRODUCT SHOWCASES

BOON EDAM SPEEDLANE SLIDE The harmony between graceful design and vital security features is a delicate balance that architects, engineers and facility managers are acutely aware of. Boon Edam’s Speedlane Slide, part of its Lifeline series of speed stiles, is one of its most functional entry solutions. It can provide a welcoming, yet secure entrance that guides only authorised personnel through the entrance to high rise buildings, corporate HQs, broadcasters, treasuries, diplomacies, embassies, legislature, parliaments and other government buildings. Boon Edam’s Speedlane Slide, which will be on display at this year’s Security Expo in Melbourne

(Stand G2 from July 25-27), is highly customisable to suit the diverse visual and security needs of building and facility entrances. Higher security options, disabled access and a large range of colours and finishes are all available in any possible combination to tailor the Speedlane Slide to each individual application. Other optional features include single lane or multiple lane set-up; jump-over detection sensors; barrier-free mode and an external control panel. Speedlane Features The Speedlane Slide – like its complementary Swing and Open models – has been designed

THE ALLINCLUSIVE FACE RECOGNITION SOLUTION 78 // SECURITY SOLUTIONS

to the highest standards and incorporates a range of modern features, including: • using unique sensors which detect visitors approaching • a sleep function to save energy • pulsing light strips to guide the user

• intuitive and proven symbols to make it user friendly • ergonomic design for customer comfort • customisation possibilities in fitting with interior design • premium quality materials. n For more information visit www.boonedam.com.au or call 1300 689 905

Cognitec’s FaceVACS-VideoScan

infrastructure; configuration

product, currently in use in

of the solution; funding and

various major casinos across

deploying the system — all

the globe, performs real-time

these components play an

matches against facial image

important part.

databases, and analyses faces to

Making them work

compute anonymous data about

together, and supporting

people count, age range, gender,

their continuous operation

and people movement in time

and maintenance, needs a

and space.

specialist face recognition

In short, Cognitec’s facial

company with a proven track

recognition system combines the

record in the gaming and

multi-faceted aims of security

entertainment industry.

and business insight in one comprehensive solution. But the software alone

Security may be the top concern for a casino or club when selecting a face recognition

won’t produce optimal results.

system, but a safe environment

Venues are looking for a

for all customers and employees,

cohesive, integrated system that

a profitable business, and

combines hardware, software,

support from the community,

and services, and that integrates

will provide true rewards for

seamlessly into their existing

investing in this leading-edge

systems and operations.

technology. n

Types of cameras, their positioning and tuning; high

For more information visit

performance server choice;

www.cognitec.com or call

setting up an optimal network

+61-2-9006-1510

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmagazine.biz/newsletter

EasyGate Elite One of the most recent products to arrive in Australia’s security solutions market is leading the charge in moving security gates beyond something purely functional, to something that adds to the look and feel of any space. Centaman Entrance Control’s awardwinning EasyGate Elite is among the most stylish and discrete security barriers available in the Australian market. At just 12cm wide and 140cm long, the EasyGate Elite’s slimline pedestals blend in seamlessly with any interior, while its bidirectional barriers range in height from 0.9m to 1.8m, depending on security requirements. The EasyGate Elite can also be customised to achieve a bespoke finish from an almost limitless choice of colours, textures and materials, allowing it to complement brand colours or a building’s interior design and features.

securitysolutionsmagazine.com

Popular customisation options include wing and edge lighting; pedestal tops made of coloured glass, Corian, stone, marble or wood; finishes for the metal panels such as polished, black or beaded stainless steel from Rimex; pedestal cladding materials such as stone, granite, wood or Corian; and changes to the shape, size or set-out of the speedgate. Centaman Entrance Control is the only provider offering such an extensive range of customisation options. The company’s in-house team of design experts can provide guidance and advice, as well as a 3D rendering service, allowing prospective customers to see how the EasyGate Elite might look and work in their space. However, the EasyGate Elite is more than just a pretty face. It features five safety and security settings, integrates with building

fire and emergency alarm systems and is fully compliant with Australia’s Disability Discrimination Act. What’s more, the EasyGate Elite also boasts 30 pairs of S-beam optical infrared sensors to prevent tailgating, a barrier opening time of 0.7 seconds and a mean time between faults of 3,000,000 operations. The EasyGate Elite comes with Centaman Entrance Control’s 36-month warranty for premium range products, triple the warranty period offered by many others in the sector, and with comprehensive customer care from Centaman Entrance Control’s 24/7 expert customer support team. n For more information visit: www.entrancecontrol.com.au or phone: +61 (02) 9906 7522.

SECURITY SOLUTIONS // 79


PRODUCT SHOWCASES

DAHUA DUAL-BIOMETRIC IDENTIFICATION TIME ATTENDANCE TERMINALS

Dahua Technology Co., Ltd

needed, users can add a card

quickly and cost-effectively.

government agencies, business

recently launched its new time

or password to provide multi-

Moreover, the DHI-ASA4214F

corporations and schools to

attendance terminals: the DHI-

factor authentication.

and DHI-ASA6214F can store up

plants, small retail stores, or

to 1,000 faces and 3,000 faces

restaurants. Powered by Dahua’s

respectively, with both units

unique Smart PSS system, the

able to store 30,000 different

new Dahua attendance terminals

identification for access

Rich functionalities simple to operate even for beginners

card holders, 3,000 fingerprint

support lock control, anti-pass

control and time attendance

Despite having multiple advanced

templates, and 150,000

back, interlock, first card,

in office scenarios, enabling

technologies, the new Dahua

transaction logs.

and six kinds of customisable

easy staff management and

attendance terminals are easy

security control.

to install. As the device supports

ASA4214F and DHI-ASA6214F. These highly intelligent devices support both face and fingerprint

attendance events, making it easy

infrared face recognition

users can choose wired or

Intelligent machine with personalised features

algorithms, these new time

wireless connection according

The new Dahua attendance

feature daylight saving time and

attendance terminals excel in

to their requirement. The new

terminals can be highly

NTP, which will be a great relief

poorly lit environments. Access

terminals also support P2P added

personalised thanks to the

for companies owning facilities in

to live face detection significantly

devices and 3rd party controller

addition of a wide range of

different time zones. n

improves safety, preventing

connection via Wiegand, allowing

intelligent features making

the use of “picture camouflage”

the property owner to build

these terminals ideal for use in

to deceive the system. If

comprehensive security systems

a variety of applications from

Embedded with advanced

80 // SECURITY SOLUTIONS

both TCP/IP and Wi-Fi connection,

for users to personalise their security protocols under different circumstances. The devices also

For more information visit www.dahuasecurity.com

securitysolutionsmagazine.com


F O L L O W U S O N I N S TA G R A M

instagram.com/securitysolutionsmag

For the latest news, products and events in the security industry

AXIS Q6155-E PTZ Network Camera

And with its ‘speed dry’ feature, the Q6155-E ensures crisp, clear images in rainy weather.

Sharp images. Low bandwidth. AXIS Q6155-E also features Axis’ Zipstream technology, which significantly lowers bandwidth and storage requirements while preserving high-quality images. Unlike most compression technology, Zipstream doesn’t just

High-speed PTZ with instant laser focus

Always in focus

Always in colour

limit bitrate. Instead, three kinds of

The Q6155-E’s built-in laser makes it

The Q6155-E utilises Axis’

intelligent algorithms ensure that

Ideal for city surveillance, critical

the fastest-focusing PTZ camera on the

Lightfinder technology which ‘finds’

relevant forensic information is

infrastructure and other applications

market. Under difficult circumstances,

light in the dark to deliver excellent

identified, recorded and sent in full

where instant focus on moving

like scenes with low light, low contrast,

image quality with superb detail and

resolution and at full frame rate. So

objects and fast-changing scenes

or point-shaped light, the Q6155-E

living colour. It also employs Axis’

the customer saves data space–and

is necessary, the AXIS Q6155-E

excels. Its 100% safe laser beam

Sharpdome technology which tilts

money–without sacrificing valuable

PTZ Dome Network Camera uses

measures the distance between the

the camera sphere at 39º, optimising

information. n

advanced laser technology to

camera and an object in a fraction of

image quality to ensure images

achieve flawless focus – even in

a second, delivering perfectly focused

above the horizon are as sharp and

the dark.

images every time.

clear as images below the horizon.

For more information visit www.hills.com.au

AMC K-LCD W900 Wireless Bi-Directional Keypad NFC With more than 30 years’ experience in

Like all AMC products, the K-LCD

the intrusion detection device market,

W900 Bidirectional Wireless Keypad

Italian manufacturer AMC have earned

was designed and manufactured in

a strong international reputation thanks

their production facility in Lurago

to their market leading design. And their

d’Erba, Italy.

new K-LCD W900 bidirectional wireless

Features include:

keypad looks to continue this trend

• Arm/disarm panel (in

of innovation. This wireless keypad is one of a

all configurations) • Not ready zones alert

host of bidirectional devices released in

• Bypass zones

recent months to complement the new

• Change/modify personal user code

XR900 wireless control panel. The keypad

• Allow technical access

supports both battery and wired power

• Log event reading

to give installers ultimate flexibility.

• Outputs triggering

It is equipped with a 32-character

• Tag readers management

LCD display across two lines as well as

• Battery powered (2 batteries AAA -

a programmable NFC/RFID tag reader.

Alkaline 1.5V) or external power (4

The tag reader makes it possible to arm/ disarm and enable/disable programmed

- 18 Vdc) • Dimensions: W 135, H 116, D 24 mm n

outputs. As it is a full bidirectional keypad, user can rely on real-time status

For more information visit:

updates of the system (not ready zones,

www.lscsecuritysupplies.com.au or

troubles, etc).

call 1300 646 269

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 81


STOPTALK Congratulations to Dahua Technology whose TPC-BF2120 Thermal Mini Hybrid Bullet Camera took 2nd place in the a&s Top 10 Popular Video Surveillance products. Dahua Technology TPC-BF2120 Thermal Camera - TOP 10 Most Popular Video Surveillance Products in 2017

The products on this list all

thermal imaging technology,

adhered to the strict guidelines.

which is ideal for dark, small

The ranking guidelines stipulate

area monitoring applications.

that all entries must have been

The series combines one thermal

uploaded to the asmag.com

camera for monitoring in total

database between January and

darkness and one visible camera

December of 2017. Second, the

with Smart IR for confirming

main purpose of the product

details. It also supports

must be for professional security:

behaviour analysis, fire detection

no Wi-Fi cameras, cube cameras,

and alarm functionalities.

DIY or cameras targeted at

Being recognised as one of

the smart home sector were

the 2017 top 10 popular video

included. Finally, only one

surveillance products is a

product per company was

strong recognition of Dahua’s

chosen. After a comprehensive

continuous effort on innovation.

assessment, Dahua’s TPC-BF2120

With a mission of “Enabling

thermal mini hybrid bullet

a Safer Society and Smarter

camera stood out and ranked

Living”, Dahua will continue to

The Top 10 popular Security

awards in the global security

second across a multitude of

focus on “Innovation, Quality,

Products by a&s, Asia’s largest

industry, and the top 10 video

entries with 45% views coming

and Service” to deliver world

source of information for security

surveillance products, based upon

from Asia.

class products and services

and automation, is one of the most

page views from asmag.com, was

Dahua Technology’s TPC-

watched and respected ranking

this year’s very first of this series.

BF2120 thermal camera uses

to customers and partners all around the world. n

Valen Energy solar panel poles for MOBOTIX cameras Valen Energy is now offering an

dig up the pavement at all, making

off-grid solar powered solution for

these poles great for public spaces,

MOBOTIX camera installations.

where underground services are

Their solar-powered poles, which

often a worry.

have already been widely used for

Solar is an ideal power source

street lighting across Australia,

for the cameras, particularly in

are now available in a specially

Australia with our high sunshine

pre-fabricated configuration for

hours and MOBOTIX cameras are a

MOBOTIX cameras.

particularly good fit, given their very

The lightweight aluminum

low power consumption and IP66

columns feature high-efficiency

certification for extreme outdoor

shatterproof glassless solar panels,

conditions. This off-grid solution

making them vandal-proof and

from Valen Energy has the potential

they are very easy to install. A pole

to significantly cut costs for outdoor

can be erected in as little as half

security camera installations. n

an hour and does not require any underground cabling. In fact, with

82 // SECURITY SOLUTIONS

For more information visit

a minimum foundation size of just

www.mobotix.com or call

300 by 500mm, there is no need to

+61 2 8507 2000.

securitysolutionsmagazine.com


L I K E U S O N FA C E B O O K For the latest news, products and events in the security industry

facebook.com/ssmaust

THE CAISSE D’EPARGNE ILE-DE-FRANCE BANK WINS THE BPCE “MAKE IT SIMPLE” AWARD WITH STID MOBILE ID®!

The “Mobile Pass Badge Virtuel

“We needed an innovative,

The CEIDF, systems integrator

smartphones, including in more

3.0” project integrating STid

practical and user-friendly

Synchronic and STid worked

regulated environments, such as

Mobile ID®, STid’s user- friendly

access control system. STid

together to quickly roll out

banking, which require higher

high-security access control

Mobile ID® is used for building

the smart solution with “test”

levels of security. “STid Mobile

solution, has received a “Make

security, to manage the flow of

installations of hundreds of

ID® leverages on the benefits

it Simple” award from the BPCE

thousands of staff and integrate

compact Architect® One Blue

of smartphones to create a

Banking Group.

all our applications into a single

readers. By 2019, this solution

unique user experience based on

system,” explains Guillaume

will be rolled out definitively to

intuitive identification methods

developed by STid, pioneering

MARTIN, Project Manager for the

all bank sites, including its head

that do not compromise user

leader in the design of secure

Caisse d’Epargne Ile-de-France

office in the 13th arrondissement

safety. Taking part in the “Make

solutions. It has reinvented

Security Department.

of Paris and its 455 bank

it Simple” contest organised by

branches. “Innovation is in our

the BPCE Group and winning

STid Mobile ID® is a solution

access control by integrating the

Security has also been

functions of a secure access card

simplified and improved,

DNA and the large-scale roll-out

this award has helped improve

within a smartphone. This user-

facilitating the management of

of over 1500 card readers with

the visibility of digital access

friendly solution has considerably

different branches without keys or

centralized management gave us

cards on the market. We are

improved the life of the 5,000

physical RFID cards. STid Mobile

extra motivation to ensure this

convinced that smartphones

employees and visitors at Caisse

ID® prevents the fraudulent

project was a complete success,”

will simplify identification and

d’Epargne Ile-de-France. They

use of data stored in the

explained Yves CLOUSIER,

significantly improve employee

can now use their smartphone

application through strong dual

Director of Technology and Sales

compliance with corporate

for all company applications,

authentication with the reader

at Synchronic.

security policies!” n

including building access,

and data encryption mechanisms

printing management and food

that establish a single-use,

CEO of STid, this new project is

services payments.

hidden exchange.

the result of the increasing use of

securitysolutionsmagazine.com

According to Vincent DUPART, For further information visit www.stid-security.com

SECURITY SOLUTIONS // 83


STOPTALK

dormakaba electromechanical locking solutions

dormakaba Pacific is proud

cobalt is available in a double

applications (up to 1000kgs

to introduce its new range of

door (SL30DBL) and Single door

holding force) or DB38 and

electromechanical locking

(SL30SGL) model as well as

DB38L (magnetic latching) for

solutions, with the introduction

various retrofit solutions and

heavy duty applications (up to

of the Cobalt side load locks,

suits vertical and horizontal

2000kgs of holding force, DB38L

drop bolts, roller door locks

installation. Offering a holding

for heavy duty applications with

and weather proof gate locks.

force of up to 1000kgs, a field

magnetic latching. As well as

Adding to an existing electric

adjustable fail safe/fail secure

DB25K for key override model.

strike and electromagnetic lock

option, door status and lock status

Accessories available include

range, dormakaba Australia can

outputs. Accessories available

surface fix mounting boxes and

now truly offer a comprehensive

include surface fix mounting

dress plates suitable for frameless

solution for electromechanical

boxes and dress plates suitable for

glass doors and timber or metal

locking requirements.

frameless glass doors and timber

constructed doors.

or metal constructed doors.

Cobalt Side Load Locks

Roller Door/Gate Lock

The Cobalt series of side load

Drop Bolts

locks boasts the ability to unlock

The DB series of drop bolts

offers an uncompromised

addition to this the GL10 offers a

with up to an impressive side

provides a comprehensive range

solution, achieving the right

weather proof solution with an

load pressure of 100kgs (powered

and offers unique optional

balance of physical strength and

IP65 rating. n

and un-powered). In addition

magnetic latching options to

function required to secure your

to this its unique motor driven

minimise misalignment issues

roller door, vehicle or pedestrian

To learn more about the

bolt design will pull a misaligned

inherent with the drop bolt locks.

gate. Both Roller door lock (RD10)

new rage of electromechanical

door in either direction by

Available as DB25 and DB25L

and Gate Lock (GL10) offer up to

solutions, please visit

up to 8mm (total 16mm). The

(Magnetic latching) for regular

3000Kg of holding force and in

www.dormakaba.com.au

84 // SECURITY SOLUTIONS

The roller door and gate lock

securitysolutionsmagazine.com



STOPTALK HILLS TO DISTRIBUTE DAHUA AS IT STRENGTHENS SECURITY PORTFOLIO Hills Limited (ASX:HIL) announced

over 180 countries and regions.

portfolio and create opportunities

today it has broadened its security

Its core video surveillance product

for sales and growth,” Mr Lenz said.

this partnership with Dahua

product offering and strengthened

line, including network cameras,

“As one of the largest value-

to provide solutions for our

its position as a complete solution

NVRs and HD over coax, are used

added building technologies

provider in the security sector by

across banking and finance,

distributor in the ANZ region, we

signing a distribution agreement

government, transport and

have a deep understanding of the

Director, Lyn Cheng, said Hills was

with Zhejiang Dahua Technology

retail sectors.

industry and what end-users want.

ideally suited to support Dahua’s

We see the Dahua product fitting

brand growth across ANZ.

Co., Ltd. (Dahua Technology) to

Hills CEO and Managing

“We look forward to developing

customers,” Mr Lenz added. Dahua Oceania Managing

market their range of integrated

Director, David Lenz, said signing

seamlessly alongside our existing

security technology solutions across

Dahua would round out the

brands and integrating with other

with Hills. They are a visionary

Australian and New Zealand (ANZ).

company’s security offering

vendor solutions like Genetec.”

distributor with solid support

Dahua Technology is one of

“Dahua is pleased to partner

and give Hills the opportunity

“Dahua offers one of the widest

the world’s leading providers of

to compete across all markets,

product ranges in the industry, with

region and demonstrate a deep

security and video surveillance

from low cost to enterprise

technologies that can interface and

understanding of security and video

equipment. Established in 2001,

level solutions.

integrate into existing analogue and

surveillance. We look forward to a

future IT-based infrastructures. It’s

long and successful partnership.”

the company has grown rapidly to

“Hills continues to build and

infrastructure across the ANZ

become the second largest global

invest in our security business,

an exciting opportunity to bring that

provider of video surveillance

attracting global technology leaders

expertise and innovation to the ANZ

visit https://au.linkedin.com/

products and services, supplying

with products that reinvigorate our

market,” Mr Lenz said.

company/dahua-australia n

86 // SECURITY SOLUTIONS

For more information, please

securitysolutionsmagazine.com



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.