A U S T R A L A S I A’ S L E A DI N G S E C UR I T Y R E S OUR C E F O R BU S I N E S S A N D G O V E R N ME N T
MAY 2018 ISSUE 112
SECURITY AT THE GAMES:
AN INSIDER’S ANALYSIS
ISSUE 112
FEATURES
20
40
CONTENTS
78
50
46
28
COVER STORY
The complexity of delivering security arrangements for a major international multi-sport event run over 11 days, comprising 275 events in 19 sports, involving 4500 athletes from 72 nations and territories is a monumental task to say the least. In this issue’s cover story, Neil Fergus takes a retrospective look at the recent Gold Coast games to determine whether or not the security operation for the 2018 Commonwealth Games will be assessed as either a Bronze, Silver or Gold medal performance.
62
20 HOW HOLLYWOOD IS FIGHTING TERRORISM
How can Iraqi military forces and film makers work with Hollywood companies and celebrities to narrate and recreate powerful and appealing stories of Iraq’s recent war with ISIS? Anne Speckhard and Ardian Shajkovci of the International Center for the Study of Violent Extremism (ICSVE) talk about their recent participation in a joint venture led by the US Department of Defense, in conjunction with the Iraq Military and member of the entertainment industry from both nations, aimed at developing films to help youth recognise the lies of groups like ISIS and to redirect them to better paths to truly heroic acts, finding significance and to pursuing nationhood.
46 HOW I BECAME AN ISIS BRIDE
We present part two of our in-depth examination of how young women are being recruited and radicalised by groups like ISIS and sent back home as dangerous weapons.
50 NEW ISO31000 COMING THIS YEAR. ARE YOU READY?
After more than five years in the making and thousands of comments received from representatives of 54 participating and observing countries, as well as multiple liaison organisations, the updated ISO 31000 standard is going through the final stages of feedback and will likely be published in early 2018. This article summarises the key changes to the most popular standard in the risk management world, ISO 31000, and how the changes will impact businesses.
70 NATIONAL SECURITY CHANGES – AUSTRALIAN-STYLE INTELLIGENCE
Clive Williams looks at the June 2017 Independent Intelligence Review and its potential impact upon the Australian national security and intelligence apparatus.
REGULARS 04 LETTER FROM THE EDITOR 06 CYBER SECURITY
We look at the results of the recently released 2018 State of Cybersecurity Study by ISACA.
08 RESILIENCE
Dr Rita Parker looks at the benefits of exercises in developing a truly resilient organisation.
10 HUMAN RESOURCES
Greg Byrne examines the challenges of human resource management in private RTO’s operating in the security space.
12 RISK MANAGEMENT
Jason Brown looks at the ISO 31000 standard for Risk Management.
14 COMMUNICATIONS 16 THINKING ABOUT SECURITY
Does security as a separate body of knowledge even exist anymore?
18 EVENTS
A look at upcoming industry events.
28 OPERATIONS
Richard Kay examines the value of role playing in security training.
32 EVENTS
78 PRODUCT SHOWCASES 82 SHOPTALK
Company announcements from within the industry.
How can we achieve more effective screening at major events?
36 BUSINESS
How can you keep your business relevant in a rapidly changing industry?
44 LEGAL Q&A
Wills are an important safeguard for anyone who works in a dangerous role or owns a business. We look at the 10 most important things you need to know about wills.
54 AVIATION
Do body scanners work?
58 LOSS PREVENTION
What is the lawfulness or otherwise of filming people in public places and if security staff are filmed in the performance of their work, what is the appropriate response?
62 ACCESS CONTROL
How will Access Control as a Service (ACaaS) change the industry?
74 SEVEN WAYS TO EXHIBIT LIKE A PRO
With Security 2018 just around the corner, we talk to an expert to bring you some great tips and tricks to make your next exhibition a genuinely profitable experience. 2 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
FROM THE EDITOR FROM THE EDITOR www.securitysolutionsmagazine.com
EDITORIAL www.securitysolutionsmagazine.com
EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon
Jason Brown, Greg Byrne, Homer Enriquez,Neil Fergus, Richard Kay, Steve Lawson, Michael McQueen, CONTRIBUTORS Rita Parker, David Philips, Anna Don Foster, WilGarry Barnes, Jason Brown, GregRichards, Byrne, Kevin liams, Anne Alex Sidernko, Ami Toben, Richard Kay,Speckard, Steve Lawson, Justin Lawrence, Scott Jim Viscardi, Tony Zalewski O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Anne Speckard, Alex Sidernko, Ardian Shajkovci, Ami Toben, Simeon Votier
ADVERTISING
Keith Rozairo PHONE 1300 300 552 ADVERTISING Keith Rozairo EMAIL keith@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL keith@interactivemediasolutions.com.au Jonathan Rudolph DESIGN1300 AND300PRODUCTION PHONE 552 Jonathan Rudolph EMAIL graphics@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL graphics@interactivemediasolutions.com.au
DESIGN AND PRODUCTION
MARKETING AND SUBSCRIPTIONS PHONE 1300 300 552 MARKETING AND SUBSCRIPTIONS EMAIL admin@interactivemediasolutions.com.au PHONE AUD 1300inside 300 552 $62.00 Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues) EMAIL admin@interactivemediasolutions.com.au $62.00 AUD inside Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues)
ACCOUNTS PHONE 1300 300 552 ACCOUNTS EMAIL accounts@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL accounts@interactivemediasolutions.com.au
PUBLISHER PUBLISHER
ABN 56 606 919463 Level 1, 34 Joseph St, Blackburn, Victoria 3130 ABN 56 606 919463 PHONE 300 552 Level 1,1300 34 Joseph St, Blackburn, Victoria 3130 EMAIL PHONEenquiries@interactivemediasolutions.com.au 1300 300 552 WEBSITE www.securitysolutionsmagazine.com EMAIL enquiries@interactivemediasolutions.com.au WEBSITE www.securitysolutionsmagazine.com DISCLAIMER The publisher takes due care in the preparation of this DISCLAIMER magazine and takes all reasonable precautions and
The publisher takes due care in the preparation of this makes all reasonable effort to ensure the accuracy magazine and takes all reasonable precautions andof material in effort this publication, butaccuracy is not liable makes allcontained reasonable to ensure the of for any mistake, misprint omission. but Theispublisher material contained in thisor publication, not liable does notmistake, assume any responsibility or liability for any for any misprint or omission. The publisher loss or damage which may result from any inaccuracy does not assume any responsibility or liability for any or omission in this publication, orfrom fromany theinaccuracy use of loss or damage which may result information herein. The publisher makes or omission contained in this publication, or from the use of no warranty, express or implied to any of the information contained herein.with Therespect publisher makes no material contained herein. warranty, express or implied with respect to any of the material contained herein. The contents of this magazine may not be reproduced in ANY form in OR in part without The contents ofwhole this magazine may not be WRITTEN reproduced permission from the publisher. Reproduction includes in ANY form in whole OR in part without WRITTEN copying, photocopying, translation or reducedincludes to any permission from the publisher. Reproduction electronic medium or machine-readable form.to any copying, photocopying, translation or reduced electronic medium or machine-readable form.
WRITTEN CORRESPONDENCE TO: WRITTEN TO: Level CORRESPONDENCE 1, 34 Joseph St, Blackburn, Victoria 3130 Level300 1, 34 Joseph St, Blackburn, Victoria 3130 1300 552 1300 300 552 enquiries@interactivemediasolutions.com.au enquiries@interactivemediasolutions.com.au
A D
s the leading security resource in
issues everywhere you go. Of course, getting
Australia, we talk a lot about the
all the back issues will be a work in process.
need to be atreally the forefront of oes Australia take security technology. it isclaims only seriously? Yes,Therefore, Government
While do customer feedback provided Australian’s have a very relaxed attitude the motivation the change, togreatest security because theyfor believe, rightly we or were
fitting that weto,actually practise we preach, and some of thewhat corporate even if it is somewhat scary to doa so. To that end, sector demonstrate passing
also very of thehappen original mission wrongly, thatmindful “it will never here”. This the magazine, which was to get quality is of a sentiment we can only hope remains true.
we havefrom recently made some interest time-to-time, but significant what of thechanges to the magazine. average man and woman on the street? Do we
professional information However, as the development old axiom states, one shouldabout security practices into hands ofworst as many always expect the best butthe plan for the and
As most you are no doubt wea honestly takeof security seriously or aware, do we, as
working andsurprised. studying security professionals prepare to be
have been producing a digital of nation, just pay lip service to the version idea
asOf possible withshould a viewnot to have improving course, one to relystandards upon
Security Solutions since 2010. It is with great of security?
and form practices in the industry. mission some of devastating incidentThis to occur in was
excitement that we have notedbe the steadily As we enter 2018, we should thankful that
a large part people of whyto our subscription prices order to force take security seriously.
growinghas number digitalasubscribers over Australia neverof suffered major terrorist
haveisnot changed in almost 20 years. Our There a great deal that the security industry
incident of 9/11, the Boston bombings, the last the fewlikes years. Following the security expo
can do to educate the only business about subscription costs evercommunity covered the cost
the 7,time 2005since in London or the lastbombings year, for of theJuly first launching
the of distribution. taking securityNow, seriously. Inbring past ofbenefits print and we can
terrorist attacks of October 12, 2002 inwe Bali. the digital version of the magazine, finally
issues Security Solutions Editor-At-Large Rod that those costs down even further to ensure
However, result,where the Australian reached as thea point we havecommunity more digital
Cowan has written aboutSecurity how security can act everyone can access Solutions. Atas just
has become somewhat withled regard subscribers than printcomplacent readers. This us to
a differentiator foryear, business and give to companies $17.85 for the that equates a little
to I often hear many of our readers ansecurity. interesting juncture. Many of you havewho been are security managers within large corporations quizzing us for years as to why we still produce
a competitive under threeedge. dollars an issue. You cannot even
comment on the of differences between a print version the magazine. Ourattitudes response to security in Australia and America, where they was always that we wanted the magazine to be
If we have learned anything from tragic get a coffee for that! events that have occurred globally in recent If you have subscribed or renewed your years, it must be that the world has subscription to the print versionchanged of the –
often have to travel and work. According to many as accessible as possible to as many security security managers, Americans understand that professionals as possible. However, as the
permanently – and we keep pretending magazine within thecannot last two issues, your that it has not. 9/11 was not an isolated incident subscription will be extended to a two-year
terrorism is asmart clear devices, and present danger and a number of tablets, chrome fact of daily life and thus, they treat security books, laptops, iPads and the like have grown,
and if groups like ISIS have such digital subscription as oftheir thisway, issue, at no attacks will become much more frequent. There extra charge.
and security workers with the due respect. In we have seen a significant shift in the way contrast, they believe that Australian’s have a readers are interacting with the magazine. very blasé attitude towards security and it is this Given that we have come from a traditional attitude that makes us much more vulnerable print publishing background, the idea of to attack. abandoning the very model that has seen us In my opinion, having recently travelled establish a position as the leading resource through Egypt and Jordan, they are correct. for all things security seemed downright
is a great deal more work to be done to ensure If you are due to renew your that we create the kind of effective security subscription, then please visit www. culture within organisations and the broader securitysolutionsmagazine.com and click on community that will enable Australian’s to be the subscribe link at the top of the page. For safe and secure. And the work must begin with those of you who have been trying to renew security professionals. Let’s make 2018 the year from the website recently, I offer sincere that Australia begins to take security seriously. n apologies for any technical difficulties you
terrifying. However, we need to acknowledge
may have experienced while we were ironing
that we must move with the times and the
out the new system, but all is now working as
wishes of our readers. The shift we have
it should.
seen in the data showing us how people
I would welcome your feedback as we
interact with the magazine, combined with
continue to develop and improve our magazine
the feedback from readers and a desire for
in its digital format. If you have specific ideas
us to become more sustainable, has led us to
about things you would like to see more of in
make the decision that Security Solutions, from
the magazine, please do not hesitate to let us
the beginning of 2018, will continue in its
know. I would also encourage you to become
digital format.
part of our regular digital e-newsletter if you
So, what does this mean for you the reader?
have not already. It is full of great articles
Honestly, not much. You will still have access to
and information and is a great addition to
the same six issues per year. You will still have
the magazine.
all the same great articles from the best minds
PR SECURIT Y
RALIA LTD
Official Official Partners Partners Y P R OVI D RIT
CU
favourite device or computer but, and here is the thing, it will now cost you roughly one third
ON
SPAAL SE
STRALIA LTD AU
PR O
O C I AT I
of the price of the old print magazine. That
D LT
OF
SECURITY
ASS
AU S T R A L I A
SSOCIAT IO N
RS
OF
E
Original Size
RS A DE VI
To exciting times ahead. We look forward to seeing you at Security 2018 in July.
magazine so that you can read it offline on your
SSOCIATI RS A ON DE O VI UST FA
O
in security. You will be able to download the
is right – less than half what was already an blue colour changed to this colour green.
COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE signing your approval to print. Please pay special attention to spelling, punctuation, dates, times, telephone numbers, addresses etc, as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman Press assumes no responsibility for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................
// SECURITY SECURITY SOLUTIONS SOLUTIONS 46 //
extremely well-priced resource. Furthermore, John Bigelow you will have access to the back catalogue of Editor
John Bigelow Editor
securitysolutionsmagazine.com securitysolutionsmagazine.com
Increase your business intelligence Licence free! NO annual subscriptions
(S99659)
PPRO-VA-BOX1
4-Channel Video Analytics Box
Part of the PACOM Professional Series, the PPRO-VA-BOX1 is a 4 channel video analytics box that uses the video streams from select cameras to provide People Counting, Heat Mapping and Queue Management analytic functions, all of which can be exported as a report to help management better understand customers and their behaviours.
Queue Management
We’re live HCORP0025-May18-version 1
For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au
facebook.com/HillsLtd/ CONNECT
E N T E RTA I N
SECURE
Heat Mapping
People Counting
Visit our new website and buy online at hills.com.au
CYBER SECURITY
CYBER SECURITY GAP CONTINUES TO WIDEN A
ccording to the 2018
surveyed, about half (51 per
State of Cybersecurity
cent) of respondents report
Study recently
having diversity programs
released by ISACA,
in place to support women
the worldwide cybersecurity skills gap continues to present a
cybersecurity professionals. • Individual contributors with
significant challenge, with 59 per
strong technical skills continue
cent of information security
to be in high demand and
slight improvement in number
program to improve recruitment,
professionals reporting unfilled
short supply. More than 7
of qualified candidates. Last
advancement and retention of
cyber/information security
in 10 respondents say their
year, 37 per cent of security
positions within their organisation,
organisations are seeking this
professionals said fewer than
kind of candidate.
qualified individuals. 2. Invest in the talent you have,
25 per cent of candidates
to develop the skills you
Yet, there are several positive
for security positions were
need. The skills organisations
and promising insights in the
sufficiently qualified. This year,
need are in short supply, so
trends revealed in part 1 of the
ISACA data:
that number dropped to 30
organisations will need to close
recently released ISACA State of
• Time to fill open cybersecurity
per cent.
the gap through training and
according to ISACA’s new cybersecurity workforce research. Among the concerning
• Budgets are increasing. Sixty-
retention programs.
Cybersecurity 2018 Report:
positions has decreased
• High likelihood of cyberattack
slightly. This year, 54 per cent
four per cent of respondents
continues. Four in five security
of respondents say filling open
indicate that security budgets
and actionable reporting to the
professionals (81 per cent)
positions takes at least three
will increase this year, compared
board about security concerns.
surveyed indicated that their
months, compared to last year’s
to 50 per cent last year.
If the enterprises measure and
enterprise is likely or very likely
62 per cent.
to experience a cyberattack
• Gender disparity exists but can
3. Implement objective, consistent
“This research suggests that the
track risk systemically and
persistent cybersecurity staffing
holistically, board prioritisation of security is likely to improve.
this year, while 50 per cent
be mitigated through effective
problem is not a financial one.
of respondents indicate that
diversity programs. Diversity
Even though enterprises have
their organisation has already
programs clearly have an impact.
more budget than ever to hire,
About the State of Cybersecurity
experienced an increase in
In organisations that have one,
the available workforce lacks the
Study
attacks over the previous 12
men and women are much more
skills organisations critically need,”
More than 2,300 cybersecurity
months.;
likely to agree that men and
said ISACA CEO Matt Loeb, CGEIT,
professionals who hold ISACA’s
women have the same career
CAE. “More of those dollars will
Certified Information Security
(31 per cent) say their board
advancement opportunities.
need to be invested in technical
Manager (CISM) and/or Cybersecurity
has not adequately prioritised
Eighty-seven per cent of
cybersecurity training, along with
Nexus Practitioner™ (CSXP)
enterprise security.
men say they have the same
effective retention programs.
designations and positions in
• Men tend to think women have
opportunities, as compared to
Practitioners who acquire and
information in security participated
equal career advancement
77 per cent of women. While
demonstrate hands-on technical
in the online survey. The findings will
in security, while women say
a perception gap remains, it is
cybersecurity skills will find
be issued in three reports in 2018.
that’s not the case. A 31-point
significantly smaller than the
themselves in significant demand.”
To download a complimentary copy
perception gap exists between
37-point gap among men and
male and female respondents,
women in organisations without
with 82 per cent of male
diversity programs (73 per
respondents saying men
• Nearly 1 in 3 organisations
of part 1, visit https://cybersecurity. isaca.org/state-of-cybersecurity. The
cent of men in organisations
Reducing Risk and Strengthening Cybersecurity
and women are offered the
without diversity programs say
ISACA recommendations that
evolving threat landscapes, including
same opportunities for career
advancement opportunities are
can help enterprises address the
trends related to enterprise threats,
advancement in cybersecurity,
equal, compared to 36 per cent
skills gap and bolster security
defense mechanisms and more. The
compared to just 51 per cent of
of women).
programs include:
study is the latest research from
1. Develop a strong diversity
ISACA’s Cybersecurity Nexus. n
female respondents. Of those
6 // SECURITY SOLUTIONS
• Security managers are seeing a
second volume of the State of Cyber Security study will shed light on
securitysolutionsmagazine.com
SECURE YOUR DATA & EQUIPMENT
A data enclosure is your last line of defence, so it needs to be strong enough to stop unauthorised access. CER TIF IE CLASS C
D
The MFB range of Class B and Class C enclosures are purpose built frames fitted with key locks and boltwork approved by the Australian Government Security Construction and Equipment Committee (SCEC)
INATION LOCK MB S CO
All enclosures are fitted with tamper evident cable entry systems, high impact clear polycarbonate panels on doors, secure venting systems and certified combination locks. CLASS B
An alternative product, the MFB range of High Security enclosures provides a lower level of security and is not SCEC approved. Effectively construction methods mirror the Class B and Class C series, however the doors are fitted with a cheaper bilock keying system. Also additional flexibility with the design regarding cable entry encourages effective quick installation and high volume data cable installations. With over 50 years in the business, and backed by the SCEC approval for manufacture, these Australian built 19”rack mount enclosures provide peace of mind in relation to the security your
data needs.
DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS
www.mfb.com.au
VIC (03) 9801 1044 / sales@mfb.com.au
AUSTRALIAN MADE MAKES AUSTRALIA NSW (02) 9749 1922 / sydney@mfb.com.au
fb.com/mfbproducts
RESILIENCE relevant and timely exercises helps to evaluate organisational plans to ensure resilience processes are fit for purpose. The other key value of conducting exercises is that the findings provide valuable evidence, particularly for the security professionals in charge of the exercises. In this 21st century of global risks and threats unheard of by previous generations of
DR RITA PARKER
managers, the development of the human capacity of individual leaders
EXERCISES AND THE RESILIENT ORGANISATION
and their enabling teams to handle unplanned eventualities is critical. The use of well-thoughtout exercises helps people in organisations better understand the risks and threats, as well as their own vulnerabilities. Importantly, it allows them to put in place useful, tested and relevant plans that
ny business plan will
because it provides a response
for any organisation, whether it is
will help them achieve a resilient
not survive its first
to life-threatening situations and
a multi-national corporation or a
organisation that has demonstrated
encounter with
events that cannot be averted in
smaller company, so that people
its duty of care to its people and
reality. The reality
time. Organisations need to be
learn to function under duress in
other stakeholders. n
will always be different. It will
resilient to survive and thrive; they
a safe environment rather than be
never fit the plan.” Jeff Bezos,
need to be able to absorb an event
thrown in the deep end – with only
Amazon
that necessitates change, to adapt
an untested plan!
“A
That is why the key to planning
and continue to maintain their
lies in creating strategies that are
competitive edge and profitability.
resilient, particularly to deal with
The viability and sustainability
Conducting regular testing of
Dr Rita Parker is a consultant advisor to organisations seeking to increase their corporate and
existing corporate plans through
organisational resilience and crisis
exercises is part of an organisation’s
management ability. She is an
unlikely disruptions and events. The
of organisations continues to be
duty of care to its staff and other
adjunct lecturer at the University of
likelihood of a complex emergency
tested in a world that is constantly
stakeholders. However, the value
New South Wales at the Australian
or crisis situation is a very real
changing and with such change
of such exercises is often criticised
Defence Force Academy campus
consideration for senior managers
comes a range of new risks, threats
by some senior managers and
where she lectures on resilience and
and security professionals and such
and challenges – often unexpected
employees who argue that they
non‑traditional challenges to security
a situation can occur with little or
or unanticipated. This has led to
are too busy to be away from ‘their
from non‑state actors and arising
no warning, affecting a broad range
a shift in security management
real job’! They need to keep in mind
from non-human sources. Dr Parker
of people and resources. When such
practices for emergency events and
they will not have a job to do if the
is also a Distinguished Fellow at the
a situation occurs, people feel the
crisis situations. This new framework
organisation does not or cannot
Center for Infrastructure Protection
need to take action – to respond.
recognises that non-professionals
function properly.
at George Mason University Law
Therefore, the governance of
are directly and indirectly
emergencies or crisis situations has
involved in security practices.
activities develop the capabilities
former senior advisor to Australian
become part of everyday life.
Such involvement can range from
of managers and employees;
federal and state governments in
reporting suspicious behaviour to
they offer opportunities to make
the area of resilience and security.
traditional corporate strategies
more active participation in specific
mistakes and to learn from them
Dr Parker’s work and research has
are not protecting them from an
resilience practices, including
and, in doing so, validate the
been published in peer‑reviewed
unexpected event. Resilience – the
exercises that seek to educate
organisation’s resilience process
journals and as chapters in books
capacity to self-organise, to learn
and train potential or likely at-risk
and build confidence. Exercises
Australia, Malaysia, the United
and to adapt to disruption – offers
corporate populations.
provide an ideal opportunity to gain
States, Singapore and Germany
real hands-on experience in a safe
and presented and national and
Organisations are realising that
a useful mechanism of governing
The only way to know if a plan
Conducted effectively, exercise
School, Virginia, USA. She is a
emergency and crisis situations.
is effective is to use it. The next
and secure learning environment,
international conferences. Rita holds
Resilience has been adopted into
best thing is to test it through an
by using realistic and relevant
a PhD, MBA, Grad. Dip., BA, and a
policy and response strategies
exercise. Such exercises are critical
scenarios. Importantly, conducting
Security Risk Management Diploma.
8 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
The Cobalt is an innovative low voltage motor driven door lock for swing doors. It has been designed to secure double acting doors and addresses the two biggest issues in door locking; the ability to align a misaligned door and the ability to release when requested, even with excessive load on the door. The Cobalt successfully overcomes these issues and offers the user an array of other features. To learn more about our complete range of smart and secure access solutions, contact dormakaba.
T: 1800 675 411 www.dormakaba.com.au
More than just a lock
HUMAN RESOURCES
HUMAN RESOURCE MANAGEMENT IN PRIVATE RTOS OPERATING IN THE SECURITY INDUSTRY IN AUSTRALIA BY GREG BYRNE
he security industry
a vested interest in the effective
non-procedural; it was usually
larger small businesses, especially
in Australia is
management of RTOs, standard
run or controlled by the CEO (in
those that are operating as
dependent on
of education and standard of
other words, the CEO was the HR
RTOs in the security sector, it is
registered training
educators (trainers) that are
manager) rather than by an HR
vital. As the security industry in
organisations (RTOs) to provide
operating inside RTOs, and the
specialist. Which meant HR was
Australia continues to grow and
employees with the requisite
effective (and fair) government
not contributing effectively or
professionalise, so too will the
industry standard qualification to
oversight of these RTOs. One of
independently to the RTO because
pressure on RTOs to continue to
allow currently employed guards
the most important oversight and
it reflected the idiosyncrasies and,
grow and professionalise. Growth
and managers to continue
potentially consultative positions
at times, prejudices of the CEO. It
will force CEOs and their managers
professional growth, and also to
with RTOs is the human resources
also meant the HR role was in some
to formalise HR and build in
educate entry-level employees.
(HR) manager. The reason for this
cases relatively informal. Although
stronger principles of equity and
Anyone who wants to become a
is that one of the roles of HR in
this approach can offer private
fairness to attract and retain high-
security guard in Australia must
any organisation is education,
RTOs a degree of flexibility, it can
quality employees. The trick will
have completed an approved
compliance and recruitment. If HR
be a problem in the compliant-rich
be to do this in a way that does not
course conducted by a recognised
is doing their job in RTOs they will
world of RTOs in the security sector.
sacrifice the flexibilities on which
RTO. Anyone who wants to consult,
ensure the educational standard
Another problem with an overly
they have built their successes. A
teach or install in most states of
of trainers meets the needs and
flexible approach to HR is the
vital need exists in RTOs operating
Australia will need qualifications
requirements of the industry sector.
effective management of business
in security to develop new and
over those required for a guard’s
Further, they will ensure that the
growth, which in the growth
innovative approaches to HR
licence. In NSW, for example,
RTO is meeting the regulatory
industry that security in Australia
management that incorporate both
anyone installing, selling, teaching
requirements of state oversight
is, can be problematic. The reason
flexibility and equity principles. n
or consulting in security needs a
bodies, as well as ASQA. Finally,
for this is that growth heralds
class 2 licence. One of the
the HR manager will also ensure
the need for a more professional,
educational requirements for a
that they are recruiting competent,
less personal approach to
of Multiset Consultancy Pty Ltd, a
class 2 licence is, as a minimum, a
qualified and focused trainers and
management, including the need
multi-faceted consultancy advising
Cert IV in Security Risk Management
support staff.
for a more formal approach to
CEOs and boards of security
HR management.
organisations in Australia on best
T
offered by an RTO that has
A wide-ranging study conducted
Greg Byrne is CEO and director
approaches to manage business
Australian Skills Quality Authority
by an academic from a regional
(ASQA) approval to offer and run
NSW university on the role of HR
I have espoused the need for
risk, particularly operations, disaster
the course.
in RTOs made several interesting
dedicated HR positions in all
recovery, business continuity and
observations on how HR is
organisations. It may not be
human resources. Greg can be
on the training sector that the
operating in privately run RTOs.
possible in small businesses, but
contacted via email greg@multisec.
Australian security industry has
It found that HR was informal and
for medium businesses and the
com.au or on 0402 295 124.
It is because of this dependency
10 // SECURITY SOLUTIONS
In this column in the past
securitysolutionsmagazine.com
RISK MANAGEMENT
THE NEW ISO 31000 KEEPS RISK MANAGEMENT SIMPLE D
BY JASON BROWN
amage to reputation or
nature of risk management,
risk management to their needs
be developing the HB167 Security
brand, cybercrime,
drawing on new experiences,
and objectives – a key benefit
Risk Management Handbook
political risk and
knowledge and analysis for the
of the standard. Jason Brown
terrorism are some of
revision of process elements,
explains: “ISO 31000 provides a
ISO/TC 262, Risk management:
the risks that private and public
actions and controls at each stage
risk management framework that
https://www.iso.org/
organizations of all types and sizes
of the process
supports all activities, including
committee/629121.html
around the world must face with
• Streamlining of the content
decision making across all levels
News:
increasing frequency. The latest
with greater focus on sustaining
of the organization. The ISO 31000
https://www.iso.org/
version of ISO 31000 has just been
an open systems model that
framework and its processes
news/2017/02/Ref2165.html
unveiled to help manage
regularly exchanges feedback
should be integrated with
https://www.iso.org/
the uncertainty.
with its external environment to
management systems to ensure
news/2015/05/Ref1963.html
fit multiple needs and contexts
consistency and the effectiveness
Web page:
Risk enters every decision in life, but clearly some decisions need a
As Chair of technical committee ISO/
of management control across
https://www.iso.org/iso-31000-
structured approach. For example,
TC 262 on risk management that
all areas of the organization.”
risk-management.html
a senior executive or government
developed the standard, I suggest
This would include strategy and
TC website :
official may need to make risk
that the revised version of ISO
planning, organizational resilience,
https://isotc262.org/
judgements associated with very
31000 focuses on the integration
IT, corporate governance, HR,
complex situations. Dealing with risk
with the organization and the role of
compliance, quality, health and
ISO store
is part of governance and leadership,
leaders and their responsibility. Risk
safety, business continuity, crisis
ISO 31000 n
and is fundamental to how an
practitioners are often at the margins
management and security.
organization is managed at all levels.
of organizational management
The resulting standard is
Jason Brown is the National
and this emphasis will help them
not just a new version of ISO
Security Director for Thales in
practices are no longer adequate to
demonstrate that risk management is
31000. Reaching beyond a simple
Australia and New Zealand. He is
deal with today’s threats and they
an integral part of business.”
revision, it gives new meaning
responsible for security liaison
to the way we will manage risk
with government, law enforcement
Yesterday’s risk management
need to evolve. These considerations
Each section of the standard
were at the heart of the revision
was reviewed in the spirit of clarity,
tomorrow. As regards certification,
and intelligence communities to
of ISO 31000, Risk management –
using simpler language to facilitate
ISO 31000:2018 provides
develop cooperative arrangements
Guidelines, whose latest version has
understanding and make it accessible
guidelines, not requirements,
to minimise risk to Thales and
just been published. ISO 31000:2018
to all stakeholders. The 2018 version
and is therefore not intended
those in the community that it
delivers a clearer, shorter and
places a greater focus on creating
for certification purposes. This
supports. He is also responsible
more concise guide that will help
and protecting value as the key driver
gives managers the flexibility to
for ensuring compliance with
organizations use risk management
of risk management and features
implement the standard in a way
international and commonwealth
principles to improve planning and
other related principles such as
that suits the needs and objectives
requirements for national security
make better decisions. Following
continual improvement, the inclusion
of their organization.
and relevant federal and state
are the main changes since the
of stakeholders, being customized to
previous edition:
the organization and consideration of
TC 262 is to help organizations
of senior boards and committees,
• Review of the principles of risk
human and cultural factors.
ensure their viability and success
including Chair of the Security
over the longer term, in the
Professionals Australasia;
the “effect of uncertainty on
interests of all stakeholders, by
member of ASIS International
objectives”, which focuses on the
providing good risk management
Standards and Guidelines
management who should
effect of incomplete knowledge
practice. Because “failure to
Commission; Chair of Australian
ensure that risk management is
of events or circumstances on an
manage risks is inherently
Standards Committee for Security
integrated into all organizational
organization’s decision making.
risking failure.
and resilience. As of February 2017
activities, starting with the
This requires a change in the
governance of the organization
traditional understanding of risk,
the use of the ISO 31000 in the
of the International Standards
forcing organizations to tailor
security context and where we will
Committee for Risk Management.
management, which are the key criteria for its success • Focus on leadership by top
• Greater emphasis on the iterative
12 // SECURITY SOLUTIONS
Risk is now defined as
The principle objective of ISO/
In the next column I will address
laws. He has served on a number
Jason has been appointed Chair
securitysolutionsmagazine.com
Confidence in the detail of your design.
Complete doorway solution for residential, commercial and industrial premises. Nationwide. Woodpend Hardware stocks the market’s most trusted and cost effective brands in both architectural hardware, electronic access control security. We work side by side with our customers to design a robust and secure yet cost effective total door and installation solution.
AN ARA PRODUCTS COMPANY
08 8373 0311
www.woodpend.com.au
COMMUNICATIONS
TERRORISM – TOOLS AND GOALS BY AMI TOBEN
O
f the various
troops, granting independence,
of casualties might sound like a lot,
attacks have statistically longer
misconceptions
cutting economic ties and so on).
the idea is to affect tens of millions
planning stages than any other type
of people by convincing each and
of crime.
surrounding terrorism, a
This misconception is one which people should not be
every one of them that this could just
surprisingly common one is the
blamed for harbouring, because
as easily happen to them.
misunderstanding about the
this misconception is deliberately
political motivations behind
created by the perpetrators of such
crucial for terrorist organisations
rather than react to attacks. For this
terrorism. This might sound
attacks, and for very good reasons.
because political systems are
reason, it becomes more important
surprising because, as many readers
When people think that the only goal
much more effectively swayed by
than ever to understand the hostile
know, the political aim of terrorism
of terrorist attacks is the creation of
widespread public opinion than by
planning process of an attack.
actually appears in its dictionary
death and destruction, they usually
small-scale, localised ones. Case in
Only once security professionals
definition. And yet, the
assume – wrongly – that planning
point is the 2004 Madrid bombings.
understand this type of hostile
misunderstanding persists.
such attacks is a quick and simple
These attacks caused the deaths
planning, locate its weaknesses and
affair. What, after all, is so difficult
of 191 people and wounded over
learn from case studies (https://
reasons for this is because when
about placing a homemade bomb on
2000, but their real effect was in
protectioncircle.org/2013/07/05/
people think back to specific terrorist
a random busy street?
swaying millions of people to elect
terrorism-case-studies/) will they
the anti-war socialist party only three
be able to disrupt it and prevent it
Perhaps one of the biggest
attacks and recall the chilling
Most terrorist organisations want
This type of multiplier effect is
It is these planning stages that proactive security professionals seek to disrupt in an attempt to prevent
images that were portrayed in the
people to wrongly believe it is easy
days later. The newly elected Spanish
from manifesting itself into an actual
media, many tend to impulsively
for them to carry out such attacks.
government then proceeded to pull
attack. n
declare that the sole intent of such
Anyone who thinks it is easy to plan
its troops out of the Iraq war. This is
shocking attacks is to create death
and carry out a terrorist attack will
a prime example of the unfortunate
and destruction. Slightly more
be much more likely to believe the
effectiveness of terrorism and how it
consulting, training and special
reflective people will claim that
type of declarations terrorists make
enables relatively localised attacks
operations for HighCom Security
terrorists are indeed trying to create
after their attacks, in which they warn
to have profound national, and even
Services. He is one of the pioneer
death and destruction, but that
that individuals and everyone they
international, effects.
developers of the terrorist activity
this is in order for people to live in
know are never safe, that they can
terror – hence the term terrorism. The
be reached at any place at any time.
how difficult it actually is to plan and
and covert protection fields in Silicon
misconception that is contained in
The idea here is to convince as many
carry out a terrorist attack is to follow
Valley. Trained in Israel, Japan and
both of these claims is a classic case
people as possible that they too can
a deductive process and to reverse
the US, Ami has over 15 years of
of mistaking tools for goals.
be personally and physically affected
engineer the attack to figure out how
military (IDF) and private sector
by terrorist attacks, thereby creating
it was planned. Again, if the goal is
security experience. Currently based
a terrorising multiplier effect.
to simply create random death and
in the San Francisco Bay Area, Ami
destruction, then there might not
has been providing special protective
Yes, it is true that most terrorist attacks cause death and destruction, and that death and destruction
The reality of terrorist attacks
One way to start understanding
Ami Toben is the director of
prevention, surveillance detection
evoke feelings of terror, but these
is that, in relative terms, only very
be all that much planning involved,
services to Fortune 500 corporations,
are merely tools (or sub-goals at
few people can actually be harmed.
but if the goal is of a political nature,
foreign governments, foundations,
best). Terrorism’s ultimate goal is for
Casualty numbers from most terrorist
there is likely much more planning
political organisations and wealthy
the feeling of terror to affect public
attacks in the West usually range
behind it. Suddenly, every little detail
individuals. Ami’s new book,
opinion in such a way that it trickles
from single individuals to dozens.
becomes important – from the exact
Surveillance Zone: The Hidden World
into the political system, bringing
Only in very rare cases (like 9-11) will
location and timing to the scale, type
of Corporate Surveillance Detection
about the desirable political change
these casualty figures range up to the
of attack and profile of the victims.
Covert Special Operations, is available
(declaration of war, pulling out of
hundreds. While dozens or hundreds
Indeed, studies show that terrorist
now from amazon.com
14 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
TALL. FAST. STYLISH. Our award winning speedgates combine state-of-the-art optical technology with a high barrier height to protect your building.
EASYGATE SPT
• • • •
Barrier heights up to 1800mm Fast throughput (up to one person per second) Ideal for Disability Discrimination Act compliance Choose from a number of models, including the LX, SPT, SG, IM or LG • Custom pedestals with an array of attractive finishes EASYGATE LX
Find out which security gate is right for you.
1300 858 840
www.entrancecontrol.com.au
EASYGATE IM
FULL HEIGHT TURNSTILE
TRIPOD TURNSTILE
SWING GATE
THINKING ABOUT SECURITY
WHERE DO WE FIT? BY DON WILLIAMS C
t may seem like a silly
matter? With systems becoming
Drones are already being
The old differences between
question, but does
more interconnected, traditional
used for delivery of improvised
physical, personnel and information
security as a separate
delineations of management
munitions and drugs. Increases in
security will continue to blur as
body of knowledge
disciplines such as security,
battery and other on-board power
it did last century with IT and
personnel, facility and so on are
systems with aligned control
communications security. As the
disappearing. If things are linked,
and autonomous controls will
world becomes more interlinked
meld of physical, computing and
security being just one of the
increase the difficulty in controlling
and co-reliant, so will security
communications technologies, the
many functions of the automated,
who is doing what in the low-
specialists need to have a broader
distinction between deterrence,
intelligent BMS, why have any
level airspace.
view of what is being protected,
delay, detection, reporting and
security specialists at all? The same
Given human nature, there
from whom/what and how. The
response is becoming blurred.
question applies in the digital world
will remain a need for a physical
main challenge for security will
Security capability may be
with increased cloud security, and
presence at venues to separate
remain, as always, to be relevant
embedded in the software and its
personnel security where algorithms
antagonists and to calm or remove
and of value to senior management.
roll-out rather than at the site. If
looking at past employment
certain patrons. The ever-increasing
This is done through professional
every item in an Internet of Things
data, public records and so on
ability to record and instantly
development of individual skills
world could be a detector with video
will make the selection of future
transmit incidents with analytical
while looking outwards.
recording, capture and transmission
employees easier.
surveillance will perhaps even see
I
even exist anymore? With the ever-increasing
The answer to the question
capability to monitor the baby, pet or
On the other hand, new
intruder, why will a security specialist be needed to help with placement of CCTV, detection and alarm systems?
the increasing availability of
With improved authentication
Arduino and related hardware and
to provide specialist, detailed
on devices such as access tokens
software, anyone can make items
capabilities and to advise users on
linked into the broader intelligent
sophisticated enough to interface
how best to apply the technologies
building management systems (BMS),
with other systems and be operated
and the vulnerabilities those
is a recognised thought leader in
what need will there be for access
from around the globe. Combined
technologies generate. There
security, emergency management and
control providers?
with automated, remote building/
will probably be an increased
related disciplines. His book, Bomb
home control systems, new types of
need for assurance on the in-
Safety and Security: the Manager’s
via Apple, Microsoft, Google and
unauthorised surveillance, sensors,
place capabilities to see if they
Guide, is available from Amazon.
so on, will the concept of in-house
switches and disabling devices
are protecting the assets of the
Don can be contacted via email
versus external security advice
will appear.
organisation/person.
donwilliams@grapevine.net.au n
With commonality of systems
16 // SECURITY SOLUTIONS
this role evolve into something
is: security does exist as one of
technologies bring with them
more akin to mitigation and
the key protective disciplines,
new security challenges. With
evidence recording.
but it is becoming ever more
There will always be a need
interdependent. Are we sure it will exist in a few years’ time? Don Williams CPP RSecP ASecM
securitysolutionsmagazine.com
M
Y
CM
MY
CY
CMY
K
NEW!
EVENTS
ISC West
moved to the ISC West show
Held annually between
11–13 April 2018
floor in 2017! As the digital
Sydney and Melbourne, TFX is
Sands Expo Convention Center,
and physical worlds collide,
Australia’s largest learning and
Las Vegas
it is increasingly important
networking event for facilities
ISC West is the largest security
for industry professionals to
and workplace management
industry trade show in the US.
protect their organisations and
professions seeking solutions for
At ISC West you will have the
clients from both physical and
creating more efficient, sustainable
chance to meet with technical
cyber threats. CSE provides
and productive facilities
multidisciplinary professions
representatives from 1,000+
holistic solutions for today’s
and workplaces.
to have a voice and achieve
exhibitors and brands in the
connected organisations.
Total Facilities is
• bring new and leading solutions in operational efficiency to the market • deliver forefront trends for running more sustainable facilities and workplaces • foster a community of
recognition
security industry and network with
Working with SIA, ISC West also
comprehensive and efficient in
over 28,000 security professionals.
features world-class education
its delivery and provides real
industry and challenge
to learn about every facet of the
solutions to everyday operational
traditional perceptions of
security industry.
challenges by connecting buyers
In 2018, ISC West will offer attendees a host of attractions including: • new products and technologies,
Visit www.iscwest.com for more information.
encompassing everything
• redefine the future of the
facility management.
and sellers to source innovation,
Visit www.totalfacilities.com.au for
debate current issues, share
more information.
insights and create opportunities
from access control to
Total Facilities
for an invaluable community
CivSec 2018
unmanned vehicles.
18–19 April 2018
of professionals.
1–3 May 2018
• Unmanned Security Expo,
Melbourne Convention and
Melbourne Convention and
introduced in 2017, is an event
Exhibition Centre, Melbourne
Our vision
Exhibition Centre, Melbourne
within ISC West focusing on
Returning to Melbourne with
We champion professionals
Security, Safety and Sovereignty for
unmanned aerial vehicles
an exciting new proposition,
who support the built and work
the Indo-Asia-Pacific Region
(UAVs), unmanned ground
Total Facilities now unites
environment with a sense of
Building on the success of the
robotics and vehicles (UGVs),
both facilities and workplace
belonging and advocacy – the
inaugural CivSec event, 2018
and the various software and
professionals in the ultimate
unsung heroes and behind-the-
will bring together leaders and
applications that support them.
industry destination for the built
scenes forces. We will evolve and
decision makers, policy makers
and work environment.
grow our offer year on year to:
and advisers, managers and
• Connected Security Expo (CSE)
18 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
officials, operational professionals,
through developing a integrated
technical specialists, strategists
strategic focus. In particular, the
and academics, researchers and
conference will look at breaching
consultants, technology developers
the gap for sharing of information/
and industry suppliers.
intelligence, policy, tactics and
While focusing on the Indo-
capability. Recognising modern-
Asia-Pacific region, CivSec 2018
day thought in breaking down
will address issues of global
self-imposed barriers, allowing us
significance. The sovereignty,
to sufficiently structure to better
safety, prosperity and cohesion
secure Australia.
of societies and communities
Safeguarding Australia 2018
everywhere are threatened by
will draw on the knowledge of
natural disasters and emergencies,
domestic and international experts
by human catastrophe and civil
to contextualise the current
disorder, by criminal activity and
threat environment and look at
terrorism and by the movement
the development of Security and
of distressed populations across
Emergency Management structures.
porous frontiers.
The conference will culminate in a
This international congress
strategic snapshot looking at our
and exposition will zero-in on key
future direction and our ability to
themes, which will include:
evolve in-line with the threat posed
• human security and safety
to our way of living.
• public security, policing and protection • infrastructure, resource and environmental security
The approach of the conference
manufacturers, distributors, security
The OSPAs recognise and
is to engage and inform Security
professionals and end-users to
reward companies and individuals
and Emergency Management
connect and create unparalleled
across the security sector. They are
Leaders, Practitioners and Policy
business opportunities.
designed to be both independent
The entire team is looking
and inclusive, providing an
• cybersecurity and social media
makers at all levels of Government
• borders and sovereignty
and Industry on best practice today
forward to once again reuniting
opportunity for outstanding
• homeland security
and their thoughts for the future, so
more than 4,500 security
performers, whether buyers or
• community resilience
we may develop our shared vision
professionals with over 150
suppliers, to be recognised and for
• emergencies and disaster
and capacity to best Safeguard
leading suppliers. The 2018 show
their success to be celebrated.
Australia for our collective future.
is set to see some interesting new
management • catastrophes and humanitarian response
For more information, visit www. safeguardingaustraliasummit.org.au
are based on extensive research
new attractions.
on key factors that contribute
Make sure you put the dates
• innovation and technology.
The criteria for these awards
innovations, as well as a host of
to and characterise outstanding
in your diary. We look forward to
performance. (This research can be
Comprising an exposition of
Security Exhibition & Conference 2018
seeing you again in Melbourne in
found at https://perpetuityresearch.
equipment, technology and
25–27 July 2018
2018 for the Security Exhibition &
com/wp-content/uploads/2014/09/
services and a congress of
Melbourne Convention and
ASIAL Conference!
Aspiring-to-Excellence.pdf)
specialist conferences, CivSec
Exhibition Centre, Melbourne
2018 will confront the complex
In 2018, the Security Exhibition
and increasingly interconnected
& Conference is heading back
security and environmental
to Melbourne.
Visit securityexpo.com.au for more information.
The OSPAs are being set-up in collaboration with security associations and groups across
The 2018 Australian OSPAs
many countries.
Conference is the industry’s annual
18 October 2018
standardising the award categories
opportunity to reunite for three
Doltone House,
and criteria, the OSPAs scheme
days of quality networking and
Hyde Park, Sydney
provides an opportunity for
Safeguarding Australia 2018
unrivalled education alongside a
The Outstanding Security
countries to run their own
showcase of the most innovative
Performance Awards (OSPAs) are
evidence-based OSPAs schemes
9–10 May 2018
solutions to the Australian market.
pleased to announce the dates
while maintaining an ability to
Canberra
For over three decades, it has been
for the 2018 Australian awards.
compete on an international level
This year’s summit will address
the largest and most established
They will be working for the fourth
in the future – World OSPAs.
developments of contemporary
commercial event for the security
year in a row with the prestigious
interagency operations and focus
industry in Australia, bringing
Australian Security Industry
more information or to make a
on the friction points created
together the entire supply chain of
Association Limited (ASIAL).
nomination. n
challenges facing modern societies. Visit www.civsec.com.au/ for more information.
securitysolutionsmagazine.com
The Security Exhibition &
By researching and
Visit au.theospas.com for
SECURITY SOLUTIONS // 19
FEAUSRE
HOW CAN HOLLYWOOD HELP FIGHT ISIS AND SIMILAR TERRORIST GROUPS? BY ANNE SPECKHARD AND ARDIAN SHAJKOVCI
20 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
The International Center for
of courage, as they did those of
the Study of Violent Extremism
human suffering and tragedy in
(ICSVE) researchers recently took
equal measure. Many found such
part in a Department of Defense
stories emotional yet uplifting.
(DOD – CENTCOM) and Iraqi
Army soldier Hussein died while
government jointly sponsored
saving the weak and carrying
incubator program held in
injured companions to safety.
Baghdad, Iraq. Facilitated also by
In death, in the words of those
American Abroad Media (AAM),
who knew him personally, he
the program served to bring
gained fame as a national hero.
together Iraqi forces, Iraqi film-
Reminiscent of Mona Parson’s
makers and personalities from the
courage in hiding allied airmen
Hollywood film industry, such as
in her house in the outskirts
Bill Marsilii, Janet Batchler and
of Amsterdam during the Nazi
Tim Clemente. The participants
occupation, Umm Qusai, a brave
shared important ideas on how
Iraqi woman, courageously pulled
to narrate and recreate powerful
it off without being caught by
and appealing stories of Iraq’s
ISIS. She was determined to enter
recent war with ISIS, including
a clandestine world of rescuing
how to create appropriate images
the vulnerable, by some accounts
of struggle, heroism and unity
saving dozens of Iraqi soldiers
in a war against one of the most
from ISIS by sheltering them
barbaric terrorist groups to date,
in her home. The story of Baiji
and how to attract audiences to
refinery, just north of the capital,
such stories in a manner that
Baghdad, and the brave men
builds national unity, heals
who stoically fought back against
wounds of sectarianism and
ISIS was depicted as a symbol of
binds back a society torn apart by
national resistance against ISIS,
terrorist ideologies and actions.
while also serving to celebrate the
During the conference, Iraqi
government’s determination to
forces and film-makers featured a
prevail over the terrorist group.
number of intriguing war stories
also took centre stage in many
heroes who gave their all trying
of the presented documentaries,
to rescue their country out of the
as though the Iraqi military
hands of a brutal terrorist group,
and security establishment was
portraying them from different
seeking a way to eliminate future
perspectives and with varying
carnage. Hiding in plain sight,
objectives. The conference also
there were also images of those
shed light on the relationship
who seemed to want to go on
between the armed forces and
with their lives, exhausted and
the film industry. Both Hollywood
disinterested in revisiting the
participants and members of the
conflict. Some suggested injecting
Iraqi military reminded us of the
laughter in the midst of death
prevailing popularity of movies
and destruction found in the
and documentaries about heroic
recent conflict. As we listened to
men and women in the battlefield
numerous presentations by the
and the ordinary citizens whose
Iraqi military and young movie
amazing courage sets examples
producers, we also wondered if
for all of us.
images of peace, romance and
Members of the Iraqi military
securitysolutionsmagazine.com
ISIS-related horror stories
presented on film, particularly of
comedy often found during times
chronicled stories of honour,
of war could augment those of
heroism, patriotism and the
cinematic combat in restoring a
Iraqi army’s ability to protect the
sense of hope for the future. The
nation. They also portrayed acts
movie Life is Beautiful comes to
SECURITY SOLUTIONS // 21
FEAUSRE
collecting interviews with ISIS defectors, returnees and prisoners, studying their trajectories into and out of terrorism, their experiences inside ISIS, as well as developing the Breaking the ISIS Brand Counter Narrative Project materials from these interviews. She has been training key stakeholders in law enforcement, intelligence, educators and other countering violent extremism professionals on the use of counter-narrative messaging materials produced by ICSVE both locally and internationally as well as studying the use of children as violent actors by groups such as ISIS and consulting on how to mind; a touching fictional movie
and Iraq to cause devastation and
The presence of Hollywood film-
rehabilitate them. Follow Anne @
of a Jewish father determined to
suffering to so many.
makers in Baghdad this past week
AnneSpeckhard
shelter his son from the horrors of
Hollywood screenwriter Janet
was crucial to further strengthen
Ardian Shajkovci Ph.D is
the Holocaust by convincing him
Batchler reminded participants
the fight against terrorist groups
the Director of Research and a
that their time in a concentration
that many Westerners have stood
like ISIS and advance education
Senior Research Fellow at the
camp is merely a game.
up to neo-Nazism in modern
in film-making in ways relevant
International Center for the Study
day times precisely because
to furthering the Iraqi national
of Violent Extremism (ICSVE). He
these highlight not only the
they learned from movies
context. n
has been collecting interviews
importance of rebuilding national
that the symbols of Nazism
identity and solidarity through
represent evil. Similarly, today
documenting heroic stories of
Conferences such as
with ISIS defectors and studying Anne Speckhard Ph.D. is
their trajectories into and out of
we need new films to help youth
an adjunct associate professor
terrorism as well as training key
war and human suffering, but
recognise the lies of groups
of psychiatry at Georgetown
stakeholders in law enforcement,
also countering the narrative of
like ISIS and to redirect them
University School of Medicine
intelligence, educators and other
terrorist groups like ISIS. The
to better paths to truly heroic
and Director of the International
countering violent extremism
Hollywood screenwriters and
acts, finding significance and to
Center for the Study of Violent
professionals on the use of
producers offered their expertise
pursuing nationhood.
Extremism (ICSVE). She has
counter-narrative messaging
interviewed over 600 terrorists,
materials produced by ICSVE both
in creating story lines that could
At ICSVE, we continue to
challenge ISIS and other terrorist
understand the importance of
their family members and
locally and internationally. He has
groups’ powerful use of video and
generating theatrical productions
supporters in various parts of the
conducted CVE-related fieldwork
imagery, especially important in
that capture audience attention
world, designed the psychological
in Western Europe, the Balkans,
the face of ISIS’ prolific Internet
and imagination. In our
and Islamic challenge aspects
Central Asia and the Middle East,
distributed video productions and
Breaking the ISIS Brand Counter
of the Detainee Rehabilitation
mostly recently in Jordan and Iraq.
their clever use of social media to
Narratives Project, we use the
Program in Iraq to be applied
Ardian holds a doctorate in Public
identify and contact vulnerable
voices of actual ISIS insiders –
to 20,000+ detainees and 800
Policy and Administration from
youth who like, share, re-tweet or
defectors, returnees and ISIS
juveniles and has consulted to
Walden University, with a focus
otherwise endorse such products
cadre prisoners – we have
NATO, OSCE, foreign governments
on Homeland Security Policy. He
– swarming in to lure them
interviewed on film to denounce
and to the U.S. Senate and House,
obtained his M.A. degree in Public
further into the group. Given
the group as the un-Islamic,
Departments of State, Defense,
Policy and Administration from
Hollywood’s long-standing history
barbaric and corrupt group
Justice, Homeland Security,
Northwestern University and a B.A.
of countering enemy narratives,
they found it to be. We use ISIS
Health and Human Services, CIA,
degree in International Relations
it seems that they might have just
propaganda pictures and videos
FBI, CNN, BBC, NPR, Fox News,
and Diplomacy from Dominican
the ‘medicine’ for dealing with
to illustrate the horror stories
MSNBC, CTV and in Time, The New
University. He is also an Adjunct
the ISIS poison spewed out over
they tell, effectively turning ISIS’
York Times, The Washington Post,
Professor at Nichols College,
the Internet over the last five
propaganda back on them. At
London Times and many other
teaching undergraduate and
years and capable of luring over
ICSVE, we know the power of
publications. In the past two years,
graduate-level counterterrorism
30,000 foreign fighters to Syria
film to turn hearts and minds.
she and ICSVE staff have been
and cybersecurity courses.
22 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
25 – 27 JULY 2018
ASIAL SECURITY CONFERENCE
SECURING INNOVATION MELBOURNE CONVENTION + EXHIBITION CENTRE The 2018 Security Exhibition + Conference: Powered by ingenuity and invention, showcases the latest technology and cutting edge thinking. From physical and electronic solutions, to biometrics and cyber security. Australia’s largest security event offers three days of business networking and intelligence sharing. Take a first-hand look at what’s next for the security environment including intelligence on managing threats and identifying risks.
Your annual opportunity to receive fundamental updates from the organisations shaping todays security landscape.
HEADLINE SPEAKERS Dr Lisa Warren Clinical/Forensic Psychologist and Founder of Code Black Threat Philip Dimitriu Director of Systems Engineering, Australia and New Zealand, Palo Alto Networks Arye Kasten Chief Executive Officer, M.I.P Security
Danny Baade Head of Security, Gold Coast 2018 Commonwealth Games Corporation Commander Geoffrey Smith Tasmania Police
INNOVATIONS AND INVENTIONS Discover new products from 300 leading Australian and international brands including:
Jim Fidler Director, Secure Events & Assets P/L
CELEBRATE YOUR INDUSTRY David Crompton-Guard Business Continuity Manager Safety, Security & Resilience, Metro Trains
Make new connections and celebrate with colleagues at the ultimate networking evening – the Security Gala Dinner, held in partnership with ASIAL. For a less formal option, continue meaningful business conversations at the Networking Drinks.
BOOK NOW TO AVOID DISAPPOINTMENT Conference Passes, Gala Dinner and other networking event tickets are available to purchase
EXHIBITION HOURS
CONFERENCE HOURS
Wed 25 July 9:30am–5:00pm
Wed 25 July 9:00am–5:00pm
Thurs 26 July 9:30am–5:00pm
Thurs 26 July 9:00am–3:30pm
Fri 27 July 9:30am–3:30pm
Fri 27 July 9:00am–3:30pm
Principal Sponsor:
Lead Industry Partner:
T + 61 3 9261 4500 E securityexpo@divcom.net.au #security2018 secexpo
FREE EXHIBITION REGISTRATION – securityexpo.com.au
@Security_Expo Security Exhibition & Conference
ALARMT
24 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
PREVENTING OR STOPPING MASS
CASUALTY EVENTS BY DAVID PHILLIPS
If you are looking for an answer,
a part of, but have not yet heard
such as a school, day care, a
solutions being studied, but
it is here; it is just not what you
talked about as much, is solving
mall, office building, airport,
never delivered. If you are sick of
might expect. According to a
school shootings.
concert hall, sporting venue or
hearing the same explanations,
theatre. So, why has this not been
such as our courageous first
done already?
responders did not get there fast
recent 2018 Expedia article,
We can all agree that the way
among the top 10 list of 21st
we stop a mass casualty event is
century accomplishments in
by eliminating the threat as early
Well, we have all heard
science are: finding ice on Mars,
on in the timeline as we can. But
someone say, “If we can put a
should be more thorough, or
growing a new organ from a stem
that is difficult, because we cannot
man on the moon, then why
our overworked investigators
cell, breaking the petaflop barrier,
read people’s minds; we cannot
can’t we...”, followed by some
did not follow up leads, then
and turning water into fuel. My
intervene in a potential shooter’s
amazing idea they just came up
send this article to your elected
personal favourites, which did
life until he actually commits a
with. However, recently, when it
officials! Tell them this problem
not make the list, include Tesla
crime or tells us of his intent; we
came down to yet another violent
can be solved today and with
landing two re-usable Space-X
cannot predict who, when and
and indiscriminate mass killing
existing technology.
rockets safely back on Earth and
where, everywhere, all the time.
in a building with lots of people
Elon Musk sending his favourite
So, what is left? Make it very likely
in it, we predictably reacted with
projectiles to disrupt bad
sports car into outer space!
that when a homicidal maniac
horror as the parade of witnesses,
behaviour in humans in many
arrives at his chosen target, he
family, friends and television
different ways, like the pepper
are mostly easy to spot; they
will be incapacitated quickly and
crews all watched and listened as
ball gun you see here. We also
capture our imagination, help
with certainty. Make it extremely
law enforcement looked blankly
have robots that can spot-weld
save many lives and answer
likely he will fail, in ignominy.
into the cameras with the same
a car moving down an assembly
age-old questions. Very few can
An agile building can solve all of
old question we have all heard
line. We have cameras that can
be critical of their significance.
these problems.
too often, “How could we have
see what colour a person’s eyes
prevented this?”
are at 90 metres and lead us to
Such epic accomplishments
Finding such problems to solve is
An agile building is a building
enough, the background checks
Today, machines can shoot
not that hard, prioritising them is.
equipped with certain features
Higher priority problems should
that would make it nearly
this if we made our buildings
We have software that can sort/
appear high on the list, because
impossible for a person who has
agile! We could have prevented
target/locate, within 80 hours of
they are huge problems affecting
evil intent to wantonly take the
Columbine, Sandy Hook, Aurora,
video, the exact moment when the
countless lives. I wrote this article
precious lives of unsuspecting
Virginia Tech, and even the Vegas
burglar took a brick and broke
because the one I would like to be
innocent people in that building,
shooting. I am tired of the same
the window. We have control
securitysolutionsmagazine.com
We could have prevented
a missing shoe box on aisle 5.
SECURITY SOLUTIONS // 25
ALARMT
An agile building is a building equipped with certain features that would make it nearly impossible for a person who has evil intent to wantonly take the precious lives of unsuspecting innocent people in that building. rooms that can direct a national
2. Robotic response delivery
or persons, instantly, and with
was, “Where is the shooter?”,
security response, in real time,
systems: Currently, there exists
efficiency, which can make a
“Which way did he go?”,
on the other side of the planet. I
the technology to remotely
real difference in these types
“What does he look like?”.
am not telling you anything you
control a robotic device to
of situations. Trained human
A system like the one being
do not know already. But has
interfere with, report on and
beings are needed to control
suggested needs to have its
anyone connected the dots? An
stop a bad actor. The means
these defensive systems,
own dedicated network, like
agile building is a building that
to install this technology in an
in an appropriate manner,
fire and police have now – a
can ‘defend’ its occupants against
existing building could happen
within seconds, not minutes,
dedicated data pipe going
human threats, in real time.
tomorrow. Modern engineers
after a serious situation is
directly to large venues, either
can install machines in walls
detected. For example, it takes
by fast streaming wireless or
could keep our children safe.
or ceilings or on reinforced
a manager at a grocery store
by fibre. If the police cannot
We do not need to arm teachers,
pylons or tactical vehicles.
seconds to tell the security
see what is going on, then they
pay an army of armed security
They can be made tamper-
person in the control room
cannot know how to act on
guards, break down the doors of
proof and vandal-proof and
to direct his attention to the
that information. A path needs
law abiding gun owners or burden
be designed to deliver pepper
person with the booster bag
to be cleared so our society can
society with a massive program.
pellets, tear gas, rubber bullets,
in the beer aisle. What if that
All we have to do is deliver four
BBs or any other kind of
security person was a police
Agile building technology can
key component systems to every
non-lethal force to a single or
officer and that shoplifter
stop a shooter within minutes,
large venue we want to protect:
multiple targets with precision.
was a bad actor looking for
even seconds, after he is detected
1. Regulatory path forward:
Even a perpetrator with a
someone to injure or kill? If
by directing incapacitating force
Government needs to clear
gas mask on is vulnerable to
the camera had a non-lethal
at that individual, with accuracy
the path for schools, airports,
rubber bullets, grease paint
countermeasure attached
and effectiveness, in multiple
malls and sporting and
balls and BBs, which can
directly to it, then the person
places at the same time. A small
entertainment venues to
obscure or eliminate a bad
could be incapacitated or
group of controllers can police an
make their buildings agile.
actor’s will to continue or the
distracted long enough to give
entire school district and answer
Government can do this
ability to prosecute an assault.
the innocent bystanders time
every threat at any school within
3. Central control station:
to escape the danger.
their domain.
enough to prevent harm to the
Currently, there exists
4. Information processing
innocent, and loose enough to
the technology to build
and delivery: The dominant
video in the NBC News Report
give law enforcement the tools
communications centres
conversation over the radio
in the comments section of the
they need to preserve life and
capable of remotely applying
at the most recent horrific
online version of this article
prevent loss.
appropriate force to a person
mass shooting in Florida
is an example of everything I
With current technology, we
by creating standards tight
26 // SECURITY SOLUTIONS
allow these to be put in place.
The system illustrated in the
securitysolutionsmagazine.com
am talking about. It could have disoriented the intruder enough
one security professional.) I am a loss prevention
if this humble store detective
services and marketing service
can prove it could work with a
to enhance LPF’s operations.
to allow law enforcement time
professional. We study how to
few spec sheets, some proof of
David has a 15-year background
to intervene. (Author’s note:
keep people safe in large venues
concept video and some decent
in IT and Quality Assurance
A contact of mine originally
like department stores, malls,
science, what are we waiting
consulting. As a former U.S.
posted this video. This whole
markets and theme parks.
for? n
Army Officer – MP and Air
concept is not my original idea,
Active shooters are threats we
as much as it is an essential
take very seriously. I know
conversation. Although some
what it would take to turn this
Operations Manager for the Loss
combined military experience
of what I am suggesting is how
idea into a credible response
Prevention Foundation (LPF).
and police training. He has also
I was thinking, it most likely is
to something that should have
He is responsible for delivering
held loss prevention positions
intuitively obvious to more than
been solved years ago. And
customer service, technological
with Sears and The Bon Ton.
securitysolutionsmagazine.com
Force Enlisted - Security Police, David Phillips LPC is
David brings over nine years of
SECURITY SOLUTIONS // 27
OPERATIONS
The Role Player Unheralded Hero Of Reality-Based Training
28 // SECURITY SOLUTIONS
BY RICHARD KAY
securitysolutionsmagazine.com
Reality-based training is any
is given direct instructions
type of simulation training that
– information to provide,
prepares an individual for future
whether to volunteer it or
performance through experiential
simply respond to questions,
learning. Because of the
and any specific phrases to
immersive nature of the training,
use or specific points to use
the brain and body absorb and
them. Passive role players
process the experience as if it
should keep it simple, do their
were actually occurring. Proper
thing and get out, or they can
reality-based training provides
On scenario conclusion, role
skills and stress inoculation that
players follow instructions
saves lives in real-world scenarios.
for scenario debriefing to
Ensuring that participants are
point out tactical errors that
well trained in the optimisation of
participants made. Role players
those experiences is the essence of
perform exactly as in the
reality-based training, and the key
original scenario during any
to this is the role player.
re-enactment for remediation
The role player is responsible
purposes so participants can
for determining participant
perform correctly. Role players
behaviours and is the key to
do not change anything in a
success or failure in reality-based
scenario regardless of how often
training. The task is dependent
participants repeat to successfully
on scenario design and instructor
complete training objectives.
skill at directing scenario events
After instructors have debriefed
and the role player must know
participants, role players can
everything possible about his
add observations in response to
character, the desired outcome of
instructor request, and then only
the training situation and threat
add information not covered.
cues to which participants should adequately respond. The role
Role Player Development
balances creativity with the ability
The role player character
to follow specific instructions
contains information about the
and is directly responsible for the
subject/victim that role players
physical well-being of participants
use to make their characters
since the role player controls
more realistic, and includes the
any physical confrontations
following categories:
with them.
• Socio-economic characteristics
There are two types of
provide a background for
role player:
the character and a plausible
• Active role players are
reason for behaviour. Without
carefully chosen, properly trained and directly involved
this, role players invariably end up acting at random.
in the scenario. Although
• Emotional state covers eight
all role player actions are
primary emotions identified
important, active role players
by behavioural psychologists.
are critical to the presentation.
It helps guide role players
• Passive role players provide information, often as bystanders or accomplices,
securitysolutionsmagazine.com
waste time.
the conditioning, decision-making
by giving the character emotional depth. • Physical state provides clues of
as distractions and unknown
what body language to exhibit.
elements to create situations
This is useful because with
identical to those participants
protective gear, body language
would experience on the
is helpful in communicating
job. A passive role player
pre-attack cues to participants
SECURITY SOLUTIONS // 29
OPERATIONS
and provides experience in
steps back and call back to the
training so participants
presentation
reading the danger level of
participant on the radio, providing
recognise the situation when
Having the right type of person
an encounter through non-
them with the information
a threat cue is demonstrated
as a role player is important
verbal cues.
contained in the history. This
in a scenario. This approach
since he must be able to follow
forces participants to manage
provides a contextual setting
instructions, remember key
role player mindset and is
other equipment, which can
where earlier training
phrases and act out the character
useful for the same reason as
overwhelm conscious resources
experiences come together in
and history. It is difficult and takes
socio-economic information.
during a critical incident and
a realistic setting to provide
practice. Do not simply accept
Without it, many role players
allows instructors to see which
relevant experience.
anyone who applies to be a role
act crazy if left to their
skills are not honed to the level
own creativity.
• Psychological state defines
• Specific phrases for self, others,
player, as not everyone is suitable.
of unconscious competence. This
authorities provide specific
When choosing active role players
helps determine any remedial
role player language to be used
it is essential to only consider
more texture to role player
follow-up training that might
at predetermined scenario
those able to follow specific
behaviour and may assist
be necessary.
points, which helps ensure
instructions. Role players are like
training uniformity between
actors; instructors are the director.
• Behavioural state adds
participants in improving intuitive skills useful to
Role Player Guidelines
participants and keep role
conflict resolution.
Role player guidelines contain
players on track. Whilst overt
They must behave consistently
instructions role players need
language and actions might
This is a difficult task because it
that would normally cause
to effectively interact with
make a scenario seem too
becomes tedious doing the same
many of these behaviours.
participants. Role players should
simple for most participants,
thing over again, and some role
They also outline the levels of
lose, but not so easily as to instil
in the early stages of a training
players change things to keep it
resistance that participants
false confidence in participants,
program they are necessary
interesting. For a role player to
need to deal with, and to which
who should only prevail through
to build situational awareness
maintain consistent behaviours,
the actions of the participant
superior tactics or perseverance.
and allow participants to
the scenario must be well scripted,
process information as a threat
as the more latitude a role player
four sections:
and connect it to an approved
has to improvise the worse it is
• The situation overview is
response option. Start slow
for training. A proper script is
• Complicating factors are those
are ultimately directed. • Character summary/reason for contact functions as the outline
The role player guidelines has
of the role player. It describes
where the scenario outline
and simple, and progressively
essential to producing a quality
what is going on and why, who
meshes with the role player
increase the speed of the
scenario. The best role player
the role player is, and what
guidelines. The general idea
threat and make it less overt
cannot save a poorly written
they are supposed to do. It
from the scenario outline is
as participant situational
scenario. If the proper elements
provides the role player with
transferred onto individual
awareness improves and they
are not in place, training will fail,
his motivation.
role player guidelines.
have conditioned specific
often with dire consequences.
The role player history contains
• Participant action/role player
actions to various stimuli.
further background information,
response indicates how role
Properly trained and scripted
They dictate scenario outcomes
similar to what might be on
players respond to various
role players provide realism to
The role player is essentially a
file from previous encounters.
participant actions – engaging,
participants. Using structured
stimulus catalyst, scripted and
The more realistic the scenario,
disengaging or posturing.
role player behaviours ensures
directed to perform certain
the better the experience will
Each anticipated participant
effective experiential transfer
actions which cause a predictable
be for participants. This is why
action has a scripted role
throughout the training process.
response from participants,
this information is not simply
player response that drives
Good role playing is a blend
based on training received prior
handed to participants. They can
the scenario toward its
of good acting, athleticism
to the scenario. It is better to use
only get the information the way
predetermined conclusion.
and trust in the system. It is a
operational personnel as role
they would on the job. If they
This creates a well-structured
matter of professionalism to give
players, as reality-based training
use a vehicle computer terminal,
scenario with the built-in
participants the best training
should not be experimental. Role
print up sheets look like the
flexibility to add options. Role
experience possible. Ultimately,
players should know exactly
screenshots of the terminal so
players and instructors should
their skill level and enhanced
what participants are supposed
the participant has to look in the
always have a sense of what is
survivability will be directly
to do, so in the event they do not
same place as they would on the
going to happen next.
affected by the skill of role players.
do that, role players can exhibit
computer screen for various bits
• Deliberate actions describe
of information. If the participant
specific actions role players
Role Player Criteria
a correct response. The only
requests information from
must demonstrate to cause
There are important criteria for
unknown in a scenario should be
the dispatcher, if there is not a
a predictable response in
role player selection and scripting.
participant behaviours, and they
dedicated person for this task,
participants, conditioned
instructors can take a couple of
during low-level scenario
30 // SECURITY SOLUTIONS
behaviours likely to stimulate
should be relatively predictable. They are critical to scenario
Once proper responses from
securitysolutionsmagazine.com
“THE ROLE PLAYER IS RESPONSIBLE FOR DETERMINING PARTICIPANT BEHAVIOURS AND IS THE KEY TO SUCCESS OR FAILURE IN REALITY-BASED TRAINING.” participants are demonstrated, the
They must not improvise
They allow participants to
anything going on in the scenario
scenario is complete.
A role player script should leave
prevail
or interact with participants who
little room for improvisation.
Although it should never be
just finished the scenario.
They must be protected against
While creativity is essential to
easy for participants, there must
force
good role playing, make sure
always be a win for them at
becomes tiring and boring, and
There should be no obvious
they know in advance the
scenario end when they perform
improvisation often occurs for the
giveaways to a role player role in
limitations on improvisation. The
correctly. It is the role players’ job
sake of variety. The role player
the scenario so participants are
combination of inept participants
to lose every time, which may be
must understand the job is to lose,
not preconditioned for response.
and bored role players can be
tough from an ego perspective. A
but as a result of participants
Often, the clue is how a role player
dangerous. Instructors must
role players’ entire reward system
prevailing through superior
is dressed, so dress role players
carefully monitor the language
is based on selflessness, to help
performance or perseverance.
with similar levels of protection
and actions of role players; if
participants emerge from each
It takes a special individual and
to avoid this. Even though a
they depart from the script,
encounter better prepared for a
dedicated professionalism to
passive role player might be
redirect their actions. Sometimes
real situation. The role player is
constantly lose, but in so doing,
there to provide information and
participants are oblivious to a
the most difficult task in reality-
role players improve participant
then depart the area, it is better
threat, resulting in role players
based training and definitely
behaviour and know that
to have them in protective gear
demonstrating overt behaviour,
not for everybody; those with a
participants are better prepared
so participants are required to
so it is impossible to miss the
burning need to win during any
for challenges on the job as a
manage them in the same way. If a
cue. Although there are times
scenario must be re-educated
result of scenario experiences.
scenario contains physical contact
when it is valuable to provide a
or replaced.
The role players’ task is to
between participants and role
consequence for tactical error,
players, to avoid preconditioning
participants that are oblivious will
They re-set between
in participants, and it is a noble
participants to what is about to
not benefit from an overwhelming
participants
calling. n
happen by having the role player
consequence. If role players
After a scenario is complete,
geared up in a suit, pause the
have to improvise to keep
there might be evidence as
scenario and use questions to
participants on track, they should
to what happened during the
internationally certified tactical
ensure participants are choosing
not improvise so it becomes
confrontation, so these signs
instructor-trainer, Director
a physical force option, then swap
counterproductive to the scenario
should be removed so there is
and Senior Trainer of Modern
out an unprotected role player
goal. Letting a scenario go down
no preconditioning of the next
Combatives, a provider of
for a role player in a protective
a path that is counterproductive
participant. Make each scenario
operational safety training for the
suit and allow the scenario
to the training objective
as clean as possible for each
public safety sector. Visit www.
to continue.
wastes time and can result in a
participant. Make sure waiting
moderncombatives.com.au for
dangerous situation.
participants cannot hear or see
more information.
securitysolutionsmagazine.com
Being a role player
condition winning behaviour
Richard Kay is an
SECURITY SOLUTIONS // 31
EVENTS
CASTING A WIDER NET: MORE EFFECTIVE MASS SCREENINGS AT EVENTS BY JIM VISCARDI
32 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Ferromagnetic detection at a venue’s perimeter detects weapons of mass casualty before terrorists get too close Live events at large venues like
malefactors have known
halls – whether they involve
for centuries that any large
wrestlers breaking chairs over
gathering of people has inherent
each other’s heads, Axl and Slash
vulnerabilities on which they
letting bygones be bygones and
can prey: Crowds make it hard
reuniting Guns ‘n’ Roses, your
for security to keep track of any
favorite NFL team annihilating the
single person or spot unusual
opposition 62-3, or a convention
behaviour, and the number of
involving anything from politics
people congregated in one space
to food to Star Trek – are
amplifies the impact of any attack.
exciting affairs that channel the
securitysolutionsmagazine.com
Terrorists and other
arenas, stadiums or convention
In recent years, organisers
camaraderie of the crowd into a
of large events have augmented
powerful collective energy. But
the security methods they use to
they are also vulnerable to threats.
protect a venue, using both walk-
SECURITY SOLUTIONS // 33
EVENTS
through metal detectors and hand
secondary screening method
need to actually enter the venue;
of mass casualty. Most of the time,
wands, and deploying K9 and
for confirmation.
they just need to get close enough
a terrorist is trying to get closer
to injure or kill a large number
to the immediate perimeter of the
police units to patrol the lines to
Many facilities also use
enter security. But these current
observational methods to screen,
of people. That can happen – and
venue, to inflict the most damage
methods share a universal flaw:
such as drones, CCTV, security
has happened, such as with the
to large groups of people waiting
to be caught, evildoers have to be
officers or police walking the
Manchester Arena bombing
to get in; farther away, event
on the verge of actually entering
crowd and looking for suspicious
in 2017 – right at the security
attendees are walking toward
the venue with hundreds of
behaviour, or explosives-sniffing
point, where a terrorist will be
the entrance and thus are more
other people, which means they
K9 units patrolling the area.
surrounded by dozens or hundreds
dispersed, not standing in clusters
can still cause a massive amount
Each of these methods
of people and 10 to 20 yards away
or lines. This advance screening
has intrinsic limitations.
from the critical asset: the interior
is possible using ferromagnetic
Observational security methods
of the venue.
detection systems (FMDS).
of destruction.
Current Methods Are Not Enough
are just that – observation-based, not detection-based. They rely
of these pre-security-screening
FMDS uses passive sensors that
Conventional walk-through
much more heavily on human
vulnerabilities around the
evaluate disturbances in the
metal detectors are a
factors that introduce greater
perimeter of the venue. What they
earth’s magnetic field made by
compromise between effective
degrees of error and chance,
haven’t had until recently is a way
something magnetic moving
screening and high throughput,
and positive visual identification
to screen mass amounts of people
through its detection zone.
as they successfully detect metal
of a suspicious threat requires
for weapons of mass casualty as far
Everything else is invisible to it;
objects, but only can screen
a relatively close proximity to
away from the critical asset as they
it doesn’t see people, clothing,
about five or six people each
observe the threat. They’re also
can, and as far away from densely
backpacks, purses, etc. Nothing
minute. They are generally
slow and laborious.
populated areas as they can, all
can be used to shield the
while not impeding throughput
threat, because FMDS doesn’t
placed 10 to 20 yards from a
Walk-through detectors and
Security personnel are aware
In the most basic terms,
venue’s front façade, either
wands will catch someone trying
resulting from the requirement for
detect metallic mass; it detects
just outside or just inside, to
to enter a facility with a weapon,
patrons to divest their possessions.
a magnetic signature, down
screen people as they enter
but by the time they do, it may be
the facility. Hand wands are
too late – a terrorist will already
Expand Your Reach
used for anyone that sets off
be well within proximity to do
The far perimeter of a venue is an
the walk-through detector as a
a lot of damage. Bad guys don’t
ideal place to screen for weapons
34 // SECURITY SOLUTIONS
to a millionth of the earth’s magnetic field. It is also highly accurate – there is no false alarm rate,
securitysolutionsmagazine.com
because it is programmed
people to be organised into lines
large events, by expanding the
technology is at least partially
to find only what security
or groups; it simply detects a
secure perimeter and creating
responsible for both the breadth
personnel need to find (e.g.
magnetic signature on anything
a highly accurate way to detect
and depth of the increasingly
a weapon). Although it is a
that passes.
weapons of mass casualty farther
creative ways bad guys
away from a critical asset and
harm people.
passive technology, it is more
It runs on batteries – there
effective and reliable than
is no need for an electricity
large crowds. It does not replace
using observational security
source, as with a walk-through
screening for smaller items
are responsible for helping to
methods to screen a perimeter,
detector – and can be placed
necessarily, and all large venues
fight against those threats and
because the technology will
on just about any form factor
should use a layered security
make the world safer, and FMDS
never miss something the way a
(a pole, a stand, etc.). This gives
solution that also deploys tactics
is one of those. By providing a
human would.
security personnel flexibility
like roving security guards,
foolproof method of detecting
when deploying FMDS, allowing
walk-through metal detectors and
weapons of mass casualty before
system only works on moving
them to create a wide perimeter
hand wands. FMDS simply gives
terrorists get too close to an event
objects. This makes it immune
around a venue without
the opportunity to add a layer of
venue, FMDS gives event security
to environmental conflicts such
worrying about portability or
security where there currently is
personnel a way to better protect
as rebar that would trip up
a power source. Screening can
not an effective solution.
large events, making them less
conventional metal detectors, and
be as obvious or as concealed as
allowing people to be screened
personnel prefer for a particular
quickly and unobtrusively
situation, based on the form
without stopping to divest their
factor they select.
An important point is that the
possessions as they walk toward
All of these combine into a
But some technologies also
dangerous and keeping people
More Effective Mass Screening – Without Disruption
safe. n
Pessimists sometimes muse the
of global security for Metrasens.
Jim Viscardi is vice president
a venue – up to 50 or 60 people
solution that creates a way to
world is getting more dangerous
Viscardi can be reached at
a minute. FMDS does not need
close a gap in mass screenings at
with each passing year, and that
jviscardi@metrasens.com.
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 35
BUSINESS
Staying Relevant In The Face of Change BY MICHAEL MCQUEEN
36 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
In recent years, we have seen
indicators of many recently failed
scores of iconic businesses and
businesses masked the fact that
brands fall by the wayside. The
the underlying fundamentals of
demise of Kodak, Borders and
these companies were anything
HMV Music leaves us with little
but healthy. Kodak, for instance,
doubt – shift is happening and no
was still a darling of Wall Street
organisation or brand, no matter
long after it had begun to lose the
how well known, is immune to
digital war. It was a similar story
extinction. As once-lucrative
with Nortel, Allans Music and
revenue models increasingly
SAAB automotive.
come under siege and distribution
Herein lies a principle that
channels that have been stable for
ought to give every business
decades crumble before our eyes,
leader pause for thought:
it is becoming apparent that the
businesses, organisations and
rules of business have changed –
institutions are often way down
the goal posts have been moved.
the track toward decline and
Charles Darwin once observed,
obsolescence long before there is
“It is not the strongest that survive,
any tangible evidence of the fact.
nor the most intelligent. Rather, it
To put it more simply, it is possible
is those who are most responsive
to be on the brink of obsolescence
to change.” The challenge for
and have absolutely no idea at
every business and leader today
all. Further still, by the time the
is to evolve in the face of rapid
numbers indicate that there is
and widespread change. Simply
something wrong, it may be too
relying on conventional wisdom
late to do anything about it.
or assumptions that have held true in the past will set any brand or
2. Shift happens
organisation on a collision course
Management guru Peter Drucker
with obsolescence.
once noted, “Simply because the
In considering the litany of
status quo has been so for years or
businesses that have met their
even decades, we cannot depend
demise in recent times, there are
on the fact that it will remain
five lessons that can be extracted
so.” While Drucker made this
from their experience – lessons
observation in 1985, it is truer
that will put you in good stead to
today than ever. Whether it is
avoid the same fate:
changes in technology, competitive dynamics, legislation or
1. Do not trust the numbers
demography, fundamental shifts
While traditional business
successful businesses to falter in
metrics like sales figures or
recent years.
profit and loss statements are
The fate of video hire giant
somewhat useful in measuring
Blockbuster demonstrates just
the health of a business, they
how decisive and devastating
are also becoming increasingly
shifts can be for established
unreliable. The reason for this
businesses. In its heyday in the
is that these numeric measures
1990s, Blockbuster was opening a
of organisational health are
store somewhere in the US every
lagging indicators. As such, they
24 hours and, by 2005, had over
only gauge the effectiveness of
5,700 stores across America. A few
decisions made many months or
short years later, they teetered
years previous and are therefore
on the verge of bankruptcy
dangerously inadequate in an era
and closed stores countrywide.
of rapid change and disruption.
Why this turn of events? New
Consider how the numeric
securitysolutionsmagazine.com
have caused scores of previously
streaming services like Netflix
SECURITY SOLUTIONS // 37
BUSINESS
and Apple TV meant consumers
were in crisis. In the preceding
and creative ideas tend to come
3. The moment you think you have made it, you have passed it
decade and a half, the industry
from those who think very unlike
had shed almost 70 percent of
their peers and the prevailing
its workforce and two-thirds of
wisdom of the era.
A key factor in almost every
Swiss watchmakers had gone out
the recorded music industry
case of corporate demise is a
of business – all because they had
when a culture of conformity or
which, at the end of 2012, had
dynamic I call the Intoxication
arrogantly assumed that they had
closed-mindedness grows within
shrunk to almost half the size it
of Success. Put simply, this
been so successful for so long that
an organisation to the point where
was in 2000. As the digital age
phenomenon describes the way
they could never fail.
new points of view are silenced or
has obliterated the status quo,
in which enduring success leads
music manufacturers, product
to a toxic blend of complacency,
the ill-fated approach that Sony
breeding results in weaker genetic
distributors and retail outlets have
conceit and closed-mindedness
took as the post-CD age dawned.
strains, cultures lacking diversity
found themselves undermined
within organisations that blinds
Rather than embrace the MP3
weaken an organisation over time.
and undercut, with many,
leaders to potential opportunities
format, Sony arrogantly assumed
including British music retailer
and threats.
that their market dominance
no longer needed to rent the DVDs which had been Blockbuster’s bread and butter. Consider too the fate of
HMV, going under as a result.
It was this dynamic that
In a similar vein, consider
A dangerous dynamic unfolds
shunned. In the same way that in-
In his book Why Good
meant they could ‘own’ the entire
Companies Go Bad, Donald Sull
In early 2013, David Bowie
led to the obliteration of the
music ecosystem and therefore
argues that such a culture of
released his latest single straight
Swiss watchmaking industry
attempted to force consumers
conformity played a key role in
to iTunes, skipping the CD
in the 1970s and 1980s. Having
to use their proprietary ATRAC
the woes of businesses such as
format altogether. As physical
dominated the global timepiece
format. At the very time Sony was
Firestone Tires, Compaq and
music products almost entirely
market for decades, Swiss watch
attempting to force the market’s
failed automaker Daewoo. Prior
disappear, analysts believe
manufacturers had developed
hand, audio file-sharing services
to these companies’ fall from
Bowie’s move is a sign of things
a series of set beliefs about
like Napster were quickly making
greatness, Sull suggests that the
to come.
how watches were meant to be
the MP3 format ubiquitous. By
respective leadership teams
produced and what customers
the time Sony realised it could not
had become ‘like clones’, each
context, it is shifts in social
wanted in a timepiece. They
take consumers for granted, Apple
executive tending to reinforce
attitudes and values in the UK that
confidently assumed they were
had dealt it a final blow with the
a collegial point of view. In the
are decimating the iconic British
the masters of creating quality
release of the iPod – a product
case of Daewoo in particular, six
pub. While the traditional local
watches and no-one was going to
that all but killed off Sony’s
in 10 of the company’s senior
pub was once the place where
come in and tell them how to do
Minidisc range.
management graduated from
beer-loving blokes went to swig
what they did best.
Looking to a very different
the same university, and almost
away from ‘the missus’, the simple
company Seiko released the
4. Great minds do NOT necessarily think alike
fact is that this Anglo, blue-collar
Quartz watch in 1969, the Swiss
Although we were raised being
male archetype is no longer as
incumbents failed to recognise the
told that great minds think alike,
commonplace in modern-day
innovation as the game-changer
nothing could be further from
5. Innovation has a dark side
Britain. As a result, pubs in the
that it was – even dismissing
the truth. Historical figures like
Although innovation may be
UK are shutting their doors at an
it as a fad. By the mid-1980s,
Galileo, Copernicus and Thomas
the current buzzword, very
average of 25 per week.
however, the Swiss watchmakers
Edison show that revolutionary
few acknowledge the fact that
a few pints and get some time
38 // SECURITY SOLUTIONS
As a result, when Japanese
a third graduated from the same high school!
securitysolutionsmagazine.com
sometimes over-innovating is
to stay relevant over time,
Hirai also trimmed Sony’s global
new markets, or completely
as dangerous as inertia. HP
businesses and leaders must
workforce by roughly 10,000
overhauling a brand’s messaging.
co-founder David Packard
consistently be willing to:
employees and streamlined
recognised this when he
1. Re-Calibrate – While an
Consider how an enduring
manufacturing processes so that
brand like Lego has done this
observed, “A great company is
appetite for change is critical to
Sony’s TV business expenses
successfully over its 80-year
more likely to die of indigestion
staying ahead of the curve, it is
were slashed by half.
history. Far from the days of
from too much opportunity, than
first important to discern which
While it remains to be
starvation from too little.”
fundamentals in an organisation
seen how successful the steps
blocks, Lego has been quick
should never change. Just as it
Sony has taken will be, history
to embrace new technologies
was largely responsible for
is necessary to determine which
suggests that Kazuo Hirai is on
and approaches that have
the demise of the iconic brand
walls are load-bearing when
the right track. After all, he is
resulted in the brand remaining
Rubbermaid. Having prided
renovating a house, leaders
walking a similar path to the one
powerfully relevant. To its credit,
itself on its pace of invention and
must identify the non-negotiable
trod by the legendary CEO Lou
this process of re-invention
innovation, by the early 1990s,
values, principles and purpose
Gerstner, who successfully and
has never come at the cost of
Rubbermaid was introducing at
which must never change.
dramatically turned around IBM
its core DNA. Lego is still a
least one new product every day
Tamper with these ‘load-bearing’
during the mid-1990s.
company committed to inspiring
and was entering a new product
fundamentals and everything
category every 12 to 18 months.
may come crashing down.
Consider how such indigestion
3. Re-Frame – As highlighted
simply manufacturing plastic
imagination and play, but it has
above, being open to seeing the
brilliantly re-invented the way it
Before embarking on any
world from a different frame of
does this.
fatigue began to set in. By late
change agenda, it is vital to first
reference is the key to creativity
1995, Rubbermaid posted its first
re-calibrate an organisation with
and innovation. Leaders must
quarterly loss in decades and
its core DNA and allow this to be
pay particularly close attention
within three years, the company
a guidepost for strategy and a
to the views and perspectives
was sold off.
touchstone for decision making.
of those who have fresh eyes in
organisation up for enduring
By the mid-1990s, however,
Steve Jobs knew what it was
2. Re-Fresh – Any gardener
_______________________ Setting a brand or
an organisation – often owing
relevance involves a principle
like to want to do too many new
knows that regular pruning
to their lack of experience.
that every experienced surfer
things at once. “People think
is necessary to maintain the
Such fresh eyes have no trouble
understands well. In order to
‘focus’ means saying yes to the
health and vitality of a garden.
thinking outside the box and
catch the perfect wave, a good
thing you’ve got to focus on,” he
In the same way, organisations
seeing creative alternatives to the
surfer knows the importance of
once said. “But that’s not what it
require regular pruning of
status quo because they have no
keeping his eyes firmly on the
means at all. It means saying no
initiatives, traditions and even
idea what the ‘box’ even looks
horizon. While a wave is still
to the hundred other good ideas
people who are inhibiting future
like yet.
forming a long way off in the
that there are. You have to pick
growth. While pruning can be
carefully. I’m actually as proud
painful and even disruptive in
to survive, a company’s internal
is the time to move – to paddle
of the things we haven’t done as
the short-term, it is nonetheless
rate of change has to be greater
out and get in position. Move too
the things we have done,” Jobs
critically important.
than the external rate of
late, or not at all, and you will
change,” observed Paul Raines,
simply get washed up as the wave
Kazuo Hirai has embarked on
CEO of American electrical
crashes over you.
a series of necessary pruning
retailer GameStop.
continued. “Innovation is saying ‘no’ to 1,000 things.” ________________
Consider how Sony CEO
initiatives in recent months. In While it may be valuable
4. Re-Engineer – “In order
distance, surfers know that this
In much the same way,
Keeping pace with change will
winning the battle for relevance
the face of $6.4 billion loss for
require leaders and organisations
is about anticipating, preparing
to learn from the mistakes of
2012 and a dramatic downgrade
to continually re-engineer their
for and embracing change – no
organisations and brands that
of Sony’s credit rating, Hirai
internal systems and processes.
matter how uncomfortable or
have fallen from greatness
recognised that he would need
Too often, being ‘in a groove’
confronting it may be. n
in spectacular fashion, there
to act quickly to turn around
can easily turn into a rut and
is also much to be gained by
his ailing tech-giant’s fortunes.
simply repeating the habits that
Michael McQueen is the
studying those who emerge from
His first step was to end
have worked in the past can set
author of the recently launched
change and upheaval stronger
Sony’s decade-long marriage
a business on a collision course
book Winning the Battle for
than ever. Consider brands and
with Swedish mobile phone
with inefficiency and irrelevance.
Relevance. Michael is a leading
businesses such as McDonalds,
company, Ericsson. Next to go
Volvo and IBM – what do these
were any Sony-owned non-core
and needs evolve, so must
time bestselling author. Winning
enduring companies do that their
companies, including a chemical
the positioning of businesses
the Battle for Relevance is
endangered counterparts have
products business and a unit that
and brands. This could mean
available in bookstores across the
failed to do?
specialised in producing small
developing new products
country and through Michael’s
and mid-sized LCD displays.
and services, tapping into
website www.MichaelMcQueen.net
In order to win the battle
securitysolutionsmagazine.com
5. Re-Position – As times
social commentator and three-
SECURITY SOLUTIONS // 39
COVER STORY
SECURITY AT THE GOLD COAST
COMMONWEALTH GAMES: BRONZE, SILVER OR GOLD? BY NEIL FERGUS
A very important meeting
and Gold Coast guests on the
preceding one. The Glasgow 2014
is scheduled to take place
sports delivery program, venue
Commonwealth Games was an
a major international multi-sport
in Birmingham in June. A
design and operations, transport,
outstanding success – including
event over 11 days, comprising
multifunctional of the Gold Coast
the accreditation system, the
the security operation – and
275 events in 19 sports, involving
Games review is scheduled to
athletes’ village, broadcasting, the
Australian observers attended and
4500 athletes from 72 nations
occur and, given its importance
live sites and security. Like every
brought back lots of lessons for the
and territories should not be
to the delivery of the Games,
previous Games debrief, it should
Gold Coast.
underestimated. Similar to
the performance of security at
prove to be a frank, objective and
the Gold Coast Commonwealth
wide-ranging discussion.
There was a tidal wave of
The complexity of delivering
challenges confronted by the
international publicity generated
Sydney 2000 Olympics and the
by the recent Gold Coast Games.
Melbourne 2006 Commonwealth
aspects of the Gold Coast
Much of it, thankfully, was
Games, the Gold Coast commercial
Games met and even exceeded
about the sensational sporting
security operation was always
Federation, the CGF, will host
expectations. The sports program
achievements – the feats of
going to be a significant challenge
a meeting to discuss the key
was a sensational success.
strength, endurance, dignity and
for GOLDOC, the organising
learnings from the recent Gold
Similarly, athletes from the 72
courage. Five Commonwealth
committee contracted by the CGF.
Coast 2018 Commonwealth
nations and territories of the
teams won their first ever medals,
Games. Invitees from the Gold
Commonwealth were virtually
14 world records were broken,
was provided to GOLDOC by
Coast operation will participate
unanimous in their unstinting
there was a PNG weightlifting
its governmental partners,
and, facilitated by senior
praise for the organisation of
gold medal for the ages and the
particularly the Queensland Police
executives from the CGF, they
the Games.
unprecedented integration of
Service, to assist it discharge its
the Paralympic program into the
responsibilities. Nevertheless, it’s
Games was a massive success.
the organising committee which
Games is expected to be high on the agenda. The Commonwealth Games
will discuss the Games outcomes
There is little doubt most
There were lots of strong
Outstanding support
– the good and the bad – with
positives about the Gold Coast
the British stakeholders who will
Games but there is one truth
have key roles and responsibilities
about international major events –
reported the closing ceremony
of the security overlay around
delivering the next edition of
there is no such thing as a perfect
was a disaster of style, form and
venues and had to contract, train,
the Commonwealth Games in
event. There are too many moving
substance. And transport incurred
deploy and oversee the security
Birmingham in 2022.
parts, complex interdependencies
several days of challenges,
guard force for the Games.
and operational variables. Every
starting with long delays at
Birmingham City, the County
Games has its weaknesses and the
the Broadbeach transport
deal of media criticism over
of West Midlands and United
rationale for a Games debrief is
interchange on the evening of the
the no-show and attrition rates
Kingdom ministries and agencies
to identify them, discuss solutions
opening ceremony.
among its contracted guard force.
will have an opportunity to talk
and make the next edition of
with the CGF and its Queensland
the event even better than the
Representatives from
40 // SECURITY SOLUTIONS
On the negative, it was widely
So how is the CGF likely to rate security outcomes at the Games?
had to scope and install much
GOLDOC received a great
However, there are extenuating circumstances that need to
securitysolutionsmagazine.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 41
COVER STORY
be understood; and, frankly,
couldn’t provide the contracted
these risks were foreseen and
guard force required and the
initially concerned that less
the performance of security at the
largely mitigated by adept
British Army had come to the
than half the anticipated
Gold Coast venues quite positively.
contingency planning.
rescue). Apart from the Army
number of guards were
However, the Games security
The State Government
personnel undertaking vehicle
deployed at the Sheraton
operation is too big and complex,
and Gold Coast Council were
screening operations at selected
Mirage, the Games Family
it has too many “moving parts”, to
understandably keen for
locations like the International
Hotel and CGF headquarters,
ever be perfect. There will be some
the Games to generate local
Broadcast Centre, GOLDOC had
during the first few days of
quite specific issues discussed with
employment opportunities and
also arranged for several hundred
the Games. However, by the
the next hosts from Birmingham
the guard force was identified
Army Reserves to be on standby
time of the pre-Games meeting
– areas and issues for redress
as a pathway to train or reskill
at Enoggera Barracks in Brisbane.
of the Sports Ministers of the
or improvement.
unemployed people in south-east
If required, they would have
Commonwealth–and prior to
In particular, there were
Queensland. There were always
been back-filled into screening
the arrival of Prime Minister
constant worries about security
concerns about how many in this
operations at Games sports
Turnbull, Governor-General
breaches of access control
demographic were serious about
venues. As it happened, those
Cosgrove and CGF Vice-Patron
between the International Zone
entering or getting back into the
Reserves were not needed.
Prince Edward – an adequate
and the Residential Zone within
cohort of guards were deployed
the Athletes’ Village. Regrettably,
workforce, and those concerns
Despite the contingency
For example, the CGF was
The CGF is expected to evaluate
were validated as most of the no-
planning, there was an initial
at the venue and the GOLDOC
GOLDOC omitted to install
shows came from this local pool
delay in GOLDOC backfilling its
security operation proceeded
accreditation barcode reader
of people.
‘no-shows’ and this certainly
smoothly and effectively.
technology so security guards had
GOLDOC had the foresight
contributed to adverse media
Notwithstanding the initial
to try and match faces with the
to contract several of the most
coverage. The reason for the delay
challenges faced by GOLDOC,
photos on individual accreditation
reputable national guarding
was because the replacement
it needs to be emphasised the
cards. Given the many thousands
providers so it had the option
guards had to be brought in
security screening operations
of pedestrian movements through
to cover shortfalls by flying
from interstate, briefed, kitted
at key venues like Carrara and
that critical check point each
in additional personnel from
out and deployed. Consequently,
Robina met CGF and public
day, this proved to be a virtually
interstate or New Zealand. And
the first few days of the Games
expectations and, in fact, the
impossible task and it was,
that was exactly what happened.
were challenging for security,
conduct of venue screening
therefore, unsurprising some
and GOLDOC had to prioritise
operations and the throughputs
unauthorised people gained access
a plan to ensure there was no
its deployment decisions based
achieved were arguably as good
into the residential zone. This
possibility of a London 2012
on practical requirements and
as could be achieved at any
was a very disturbing and frankly
Games calamity (when G4S
risk assessments.
international major event.
unacceptable situation to occur
Moreover, there was always
42 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
in an Athletes’ Village – which is frankly the heart of every multisport Games. There was also a security issue about the use of drones over Games venues, including the Village, as the venues need to be regulated as restricted airspace under the terms of the Host City Contract (HCC) and drones present a security risk. Fortunately, due to the efforts of the Queensland Police, this situation was largely contained. Over a dozen drones
…the conduct of venue screening operations and the throughputs achieved were arguably as good as could be achieved at any international major event.
were seized by police at Gold Coast
General’s Department. One
appear to be positive. Early
matter that will be discussed in
indications are that both QPS
Birmingham next month involves
and GOLDOC did not exceed
the cooperative arrangements
their budget estimates and, as
with the Australian Border Force
mentioned earlier, there are
(ABF). As with any Games, there
some very worthwhile legacies
were a few allegations relating
including the new JESCC on the
to the misuse of accreditations to
Gold Coast. This is welcome news
gain visa access (into Australia).
for the Queensland Government
The CGF has developed and
but equally so for the CGF as
maintains oversight of the Games
it now moves on to work with
accreditation system and expected
Birmingham 2022.
to work closely with the ABF to
While there might be other
understand and address any
aspects of the security operation
anomalies or breaches in the
that will be raised and discussed
venues and this issue is going to
the Games–although it remains
system which might impact future
at the Birmingham debrief next
become an even greater security
to be seen if this organisational
editions of the Games.
month, the CGF executive team
challenge for future Games
arrangement contributed to the
security operations.
design problems at the Broadbeach
effectively declined to cooperate
issues, the key successes and the
Transport Hub that took several
with the CGF due to an internal
challenges that unfolded.
repeatedly for action by GOLDOC
days to rectify. Those particular
interpretation of its Act, despite
involved the need to refresh
transport challenges are likely to
ABF legislation containing
definitively what the CGF’s final
Emergency Management Plans
be analysed very closely at the June
provisions to enable cooperation
judgement will be in assessing the
(EMPs) for each Games venue.
meeting.
with international organisations.
success of the Gold Coast security
The CGF will probably refer some
operation. That will only be clear
An issue the CGF flagged
Once a Games overlay has been
Queensland Police Service
Unfortunately, the ABF
is very cognizant of the principal
It’s impossible to predict
installed around existing venues,
(QPS) played a pivotal role in
of the accreditation related matters
after the June meeting as it will
it is not uncommon for the ingress
the success of security at these
to its Governance and Integrity
depend largely on the views
and egress pathways and assembly
Games. Apart from providing
Committee (GIC) but its inquiries
of the senior CGF executives:
point for evacuation to change –
direct support to GOLDOC at all
will be made more difficult due to
CGF Chief Executive David
particularly when a venue has to
Games venues, including a level of
the situation with the ABF. This is
Grevemberg CBE, Chief Operating
transitioned from business as usual
assurance on screening operations,
an issue that might require further
Officer Darren Hall, President
into a configuration for an Opening
QPS performed an outstanding
CGF discussion and deliberation
Louise Martin CBE and Vice-
or Closing Ceremony. As has
role in traffic management and
with future host city governments.
President Bruce Robertson.
happened in previous Games cities,
VIP movements, including the
There is one last point on the
including Melbourne in 2006,
movements of athletes.
Queensland Fire and Emergency
One of the notable legacies
Nevertheless, it would be
security operation about which
fair to say we expect the CGF
the CGF is always cognizant – the
assessment to be positive. To
Services and GOLDOC arguably
of the Games is the state-of- the-
budget. Nobody wants to see
use the language of the Games,
took some time to fully appreciate
art Joint Emergency Services
a situation where the cost of
the security operation is almost
the changed Games context
Coordination Centre (JESCC) which
delivering an effective security
certainly going to be rated as “on
and requirements. However,
is now operating on the Gold Coast.
operation for the Games becomes
the podium” – a medal worthy
fortunately, the relevant EMPs
The purpose-built JESCC proved
so prohibitive it acts as a deterrent
effort. But it remains to be seen
were appropriately revised prior to
to be an extremely successful
to cities bidding to host this
if it will be assessed as either
the commencement of the Games.
command centre for police and
complex international major
Bronze, Silver or Gold. n
security agencies to discharge their
event. The CGF wants security to
raised with GOLDOC on several
responsibilities during the Games.
be kept proportionate, scoped on
occasions involved its concerns
It will provide benefits for the Gold
a risk management methodology
Executive of Intelligent Risks (IR);
about the budget and operational
Coast population and its visitors
consistent with ISO 31000, and
Australia’s leading provider of
risks of GOLDOC Security
very capably for many years
with CAPEX (Capital Expenditure)
management services for security,
managing the delivery and
to come.
investment leaving a legitimate
risk and crisis management. He has
legacy for public security rather
been involved in the planning and
Another planning issue the CGF
installation of the security overlay
National agencies also made
Neil Fergus is the Chief
at venues separately from the
an important contribution:
than gold-plating the capabilities
delivery of numerous international
venue development and overlay
particularly ASIO (Australia
of police and security agencies or
major events including eight
team in GOLDOC. The problems
Security & Intelligence
enriching entrepreneurs.
Olympics. He has been the Security
appear to have been deconflicted
Organisation), the AFP (Australian
successfully by GOLDOC during
Federal Police) and the Attorney-
securitysolutionsmagazine.com
The good news is the Gold
Adviser to the Commonwealth
Coast security budget outcomes
Games Federation since 2004.
SECURITY SOLUTIONS // 43
LEGAL Q&A
THE TOP 10 THINGS YOU NEED TO KNOW ABOUT WILLS BY ANNA RICHARDS
Anyone who owns a business or works in a dangerous role needs to think at some point about what they want to do with their assets in the event of their passing. In the last issue of Security Solutions we began our examination of things when planning out your estate. This issue we present the final three of our list of the top ten things you should know about Wills.
PART II
Point 7 – What are the Consequences of a Will being Invalid? If a will is not valid, the
whole estate (including
• siblings but no partner,
a. The will maker lacked
personal assets) to
children or parent – to such
capacity to make a will (for
his partner.
of his siblings as survive him
instance, had dementia
and if more than one in equal
or another ailment which
o if the estate is worth
consequences could include:
more than the partner’s
shares but if a predeceased
rendered him unable to
• an older valid will being treated
statutory legacy:
sibling leaves children of his
properly understand what
• personal chattels, the
own, then that sibling’s share
he was doing by making the
as the will maker’s final will, even though the older will may
amount of the partner’s
goes to such of that sibling’s
be significantly different in its
statutory legacy, interest
children as survive him and if
effect to the later invalid will.
on that amount from
• the will maker being deemed
date of death to date of
more than one in equal shares. • grandparents but no partner,
will in a particular way); or b. The will maker was pressured into making the will either via:
to have died intestate if he
payment and 50 percent
children, parents, siblings or
does not have another valid
of the balance of the
children or issue of siblings – to
older will.
residuary estate – to his
such of his grandparents as
partner; and
survive him and if more than
under the will maker’s current
one in equal shares.
will do not make adequate
When a person dies intestate, it basically means that there is no
• the balance of the estate
i. undue influence; or ii. duress. 2. that the distributions made
valid will in place, with the result
to such of his children as
• aunts or uncles but no partner,
that a statutory or government
survive him and if more
children, parents, siblings or
beneficiary or a person who
formula applies. The application of
than one in equal shares
children of siblings – between
is not a beneficiary under the
that statutory formula determines
but if a predeceased
such of his aunts and uncles
how the estate will be distributed,
child leaves children of
as survive him and if more
In the case of the validity
which may be in a completely
his own, then his share
than one equally but if a
argument, a challenger may allege
different way from what the will
goes to his children
predeceased aunt or uncle
that the will maker:
maker intended. It is especially
and if more than one
leaves children of his own,
• did not understand what
detrimental to the will maker if
in equal shares (with
then that aunt or uncle’s share
he did not wish to include certain
this formula continuing
goes to such of his children as
family members as beneficiaries
to the children of
survive him and if more than
under the will.
grandchildren until the
one in equal shares.
The following is a summary of Victoria if the will maker leaves:
to such of his children as
• a partner and no child or other
• children but no partner –
current will.
he was doing when making the will; • did not understand fully the consequences of the way in which he instructed the lawyer
benefit is exhausted).
Point 8 – Why do some Wills get Challenged?
the current formula applicable in
provision for a particular
to draft the will; • lacked the capacity to enter into
survive him and if more than
There are two main platforms
issue – the whole estate to
one in equal shares but if
upon which a person can apply to
his partner.
a predeceased child leaves
a court to either treat as invalid or
pressured to make a will
children of his own, then his
otherwise alter the way in which a
with particular consequences
issue who is a child of the
share goes to his children and if
will purports to distribute the will
because of:
partner – the whole estate to
more than one in equal shares
maker’s property and liabilities.
o unequal bargaining power
his partner.
(with this formula continuing to
These are:
exerted by another person
• a partner and child or other
the children of grandchildren
1. on the basis of validity. That
(for instance, the person
issue who is not the child or
until the benefit is exhausted).
is, there is an allegation that
putting pressure on the will
the will or certain clauses of
maker enjoyed holding a
children – the residuary estate
it should be held to be invalid
position of power over the
amount of the partner’s
to such of his parents as survive
(and hence not enforceable
statutory legacy (which is
him and if more than one in
by a court) on one of the
currently $451,909) – the
equal shares.
following bases:
• a partner and a child or other
other issue of the partner: o if the estate is less than the
44 // SECURITY SOLUTIONS
• parents but no partner or
any legal transaction; • did understand but felt
will maker); or o pressure from another person or persons whereby
securitysolutionsmagazine.com
the will maker did not really
will makers think should be
want to make a will in that
relevant (such as the challenger
manner but felt forced to
not having much contact with the
is that, if someone challenges
this could include evidence that
do so to appease a person
will maker) are not relevant under
a will, the person who would
the will maker paid school fees for
or people.
the legislation and hence are not
usually be the primary witness
the excluded person’s children,
factors which a court can seriously
provided free child care to the
Point 9 – How to Prevent a Will from being Challenged
(the will maker) will no longer be
take into account.
in existence and hence cannot give
excluded person’s children, or
evidence from the grave to assist
made gifts of value or wrote off
the executor!
loans to the excluded person.
Legislation which regulates
well be that they work against the
who is permitted to challenge
will maker and not is his favour.
executor may accept legal advice to
a will (for making insufficient
Careful attention should be made
provision for a particular person)
about what relevant reasons
has been tightened up to some
exist (if any) for the will maker
Point 10 – Why do so many Challenges to Wills get Settled out of Court?
extent. The good consequence of
to exclude or provide to a lesser
Many court cases seeking to
action and the legal costs involved
this change is that, at least under
extent for certain people under a
challenge either the validity
in defending the proceedings,
Victorian law, very few people
will and, further, whether any of
of a will or to request that the
which erodes the existing pool of
now have ‘standing’ to apply to a
those reasons should be stated in
distribution under a will be
assets required to be distributed to
court to challenge the adequacy
the will or in another document
altered on the basis that it does
the beneficiaries.
of the will in providing for a
which accompanies it.
not make adequate provision to
particular person.
Hence, if only legally irrelevant reasons are mentioned, it may
If there is an argument that
executor). What needs to be kept in mind
and otherwise) for the challenger during his lifetime. For instance,
Without such evidence, the compromise its position and settle the dispute because of the risk of the challenger succeeding in the
It is for these reasons that
a particular person end up being
careful attention should be paid to
the will maker made adequate
settled out of court. That is, such
the best way in which a will should
not qualifying as a person who can
provision for a particular person
court proceedings are usually
be drafted and to leaving evidence
challenge a will, the short answer
during that person’s lifetime as
resolved out of court by agreement
to assist an executor in having to
is that it is not possible to outright
the reason for excluding that
between the parties as opposed to
deal with any disputes about the
prevent anyone from challenging a
person as a beneficiary under the
a judge hearing the evidence and
estate in the will maker’s absence.
will, although certain strategies to
will (hence upon the will maker’s
determining the outcome of the
reduce the risk of such a challenge
death), then the will maker should
matter.
can be adopted.
leave extensive evidence of the
However, other than a person
The major reason for this is that
Anna Richards is the legal director and a lawyer from Victorian Legal Solutions Pty Ltd.
In the case of some people, a
financial provision that he made to
there is often not solid evidence
She practises in commercial law,
testamentary trust can be used,
that person during the will maker’s
to defend such a challenge.
including commercial litigation and
wholly or in part, to protect some
lifetime. For instance, this may
Obviously, the person who would
other areas. Anna and Victorian
of the assets. It does this by holding
include evidence of the payment
usually be the principal and most
Legal Solutions can be contacted
the assets of the estate (or some or
of expenses of the excluded person
important witness in the matter is
by telephone on (03) 9872 4381 or
part of them) upon trust with the
and payments made in favour
not available because, of course,
0419 229 142 or by email at info@
result that some or all of the assets
of the excluded person, bank
he has passed away. The only
victorianlegalsolutions.com
are not fully given to a beneficiary.
statements highlighting monies
other witnesses can only give
Usually, this mechanism provides
paid to the excluded person, loan
secondhand evidence of what they
taken to ensure its accuracy, the
for a beneficiary to receive an
agreements, receipts and the like.
heard the will maker say about his
information contained in this
income from the assets during
Ideally, the will maker should
intentions or about an excluded
article is intended to be used as a
his lifetime, but the assets
also provide either an affidavit or
beneficiary. Hence, much the
general guide only and should not
themselves are never owned by the
statutory declaration recording
evidence of such witnesses is often
be interpreted as being specific
beneficiary. However, this model is
such matters.
very indirect, unreliable and easy
advice, legal or otherwise. The
to challenge.
reader should seek professional
only suitable for some people.
This action will assist the
Whilst every effort has been
executor of the will with being able
Further, the will maker may
a particular person has been
to defend any challenge to the will.
have left very little clear written
practitioner before relying upon
excluded as a beneficiary is
Further, the production of such
evidence of pertinent matters.
any of the information contained
sometimes helpful. However,
evidence (by the executor to the
For instance, if the executor is
herein. This article and the opinions
those reasons need to tie in
excluded person) may potentially
attempting to defend a challenge
contained in it represent the
with legislative factors which
deter the excluded person from
on the basis that the will maker
opinions of the author and do not
are relevant to whether or not
commencing legal proceedings
did not make adequate provision
necessarily represent the views
adequate provision has been
and hence potentially save the
for the challenger during his
or opinions of Interactive Media
made by the will maker to that
estate significant expense (in the
lifetime, the executor would
Solutions Pty Ltd or any advertiser
beneficiary (during the will
form of avoiding significant legal
ideally need evidence of how the
or other contributor to Security
maker’s life). Many reasons which
costs from being incurred by the
will maker provided (financially
Solutions Magazine. n
Stating reasons for why
securitysolutionsmagazine.com
advice from a suitably qualified
SECURITY SOLUTIONS // 45
FEATURE
Many who joined ISIS, women
coupled with battlefield successes,
women question this gruesome
caters to them but instead takes
included, believed that the ISIS
in 2014 and 2015 it managed
spectacle, the ISIS response is, “All
over their lives.
caliphate would deliver a pure
to attract thousands of fighters
revolutions require bloodshed, but
Islamic lifestyle and that it
from all over the world, including
ultimately those who fight for the
reported in 2015, a young woman
would operate by pure Islamic
hundreds of women, to what it
cause will live by pure Islam.”
in Washington State, whose
ideals, despite the bloodshed
portrayed as a triumphant cause.
and brutality that have become
Part of its strength lies in its
In fact, ISIS recruiters operate
As the New York Times
alcoholic mother had left her in
much like cult recruiters, meeting
the care of her grandparents,
a defining characteristic of
ability to demonize the opponents
needs in the first interactions
tweeted out the question of why
the group.
and avoid the moral conflict that
and then gradually drawing their
ISIS would behead a journalist.
comes with killing and engaging
victims deeper into the group – to
She received an answer – from
in acts of brutality. When
a point where the group no longer
ISIS recruiters – who told her that
In fact, ISIS uses cruelty to communicate fearlessness and,
46 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
There Are Many, and They May Be More Dangerous Than the Men BY ANNE SPECKHARD, PH.D. & ARDIAN SHAJKOVCI, PH.D. / FROM DAILY BEAST
In the last issue of Security Solutions, the authors began their examination of issues around women returning from the ‘caliphate’, and whether or not, they can return at all, by looking at the techniques used by ISIS to lure in, indoctrinate and ultimately trap many female recruits. In this follow up article, Anne Speckhard and Ardian Shajkovci present their thoughts on the viability of rehabilitation for women returning from their experiences with ISIS.
all revolutions are characterised
of religion. They often want to
hero by leaving her job cleaning
by bloodshed and that this [ISIS
prove themselves, sometimes
bedpans, marrying him, and
struggle] was no different. They
by expressing loyalty through
working as a medic for ISIS.
then began to seduce her into the
violence. At the same time, they
Shannon attempted to travel to
movement by lavishing attention
may be alienated from family
Syria and was sadly disappointed
and gifts upon her.
members, which leaves them
when she was arrested on the
vulnerable to others who begin to
tarmac trying to board a plane
fill that gap.
out of Denver, Colorado. She
Similarly, a teen girl in London followed ISIS profiles on Twitter, only to find that they followed
is now held in a maximum-
her back, suddenly making her
Conley fell into this category. She
popular with many followers, and
converted from Catholicism to
they messaged her about joining
Islam at age 17 and then tried to
State often leave confused
the Islamic State. They told her
join ISIS at age 19. She found her
schoolmates and BFFs behind.
that, as a Muslim, she should
interpretations of Islam on the
Two young Bosnians who had
make hijrah – that is, travel to live
Internet and was convinced by
grown up in Vienna continued
in Islamic lands rather than live
violent extremists that Islam is
to contact at least one of their
sinfully in the kafr (unbelieving)
under attack and that the West is
friends via social media, likely
UK. When she protested that she
the enemy of Islam. Interviewed
inviting her to follow. A young
was too young to marry one of
by the FBI when she came to their
girl in a London school appears
the ‘brothers’, she was told she
attention, Shannon admitted to
to have influenced three of her
could come and marry after a
downloading instructions on how
schoolmates to follow her into the
year or so. When her case came
to carry out a VIP attack inside
Islamic State.
to the attention of authorities, she
the US and that she had come
admitted that from the pictures
to believe that military bases,
among young people, particularly
she was being sent of ISIS housing
and even civilians who frequent
teen girls, and have been
in Syria, she thought she would be
them, could be legitimate targets
observed in relation to suicide to
traveling to “Islamic Disneyland”.
of attacks.
psychosomatic health epidemics.
Converts to Islam are especially
securitysolutionsmagazine.com
American teen Shannon
She also Skyped and fell in
security prison. Girls who go to join Islamic
Contagion effects are normal
This is to be expected and should
vulnerable to ISIS recruitment, as
love with a Tunisian ISIS fighter
be guarded against in relation to
they often have limited knowledge
who convinced her to become a
terrorist recruitment as well.
SECURITY SOLUTIONS // 47
FEATURE
Women who join ISIS are
husband’s ‘martyrdom’, with some
her grandson back home who,
joining a misogynist organisation,
even welcoming their enhanced
according to her close associates
for logistical, propaganda,
but it is important to note that
status as a martyr’s widow as
interviewed in Kyrgyzstan,
recruitment and policing work.
they also are empowered in
a positive benefit. Moreover,
brought a message from the rest of
During the final battles for the
multiple ways by the group.
widowhood benefits are promised
the family, “He’s the only one we
recapture of Mosul, ISIS sent
Foreign women who join are
to ISIS wives in the event their
could get out, we are hopelessly
numerous females to blow
invited to serve in the ISIS hisbah
husbands are killed.
lost.”
themselves up in attacks on
(morality police). They are tasked
According to ISIS defectors we
Contrary to some societal
ISIS has relied on women
encroaching soldiers.
with enforcing dress codes and
interviewed, in reality, these are
assumptions that downplay the
the strict ISIS interpretations of
rarely paid with any consistency.
role of women as perpetrators
who joined the Islamic State group
sharia law. These women are
On the contrary, ISIS widows
of violence, women in ISIS
likely had some psychological
armed, operate above the status
found themselves handed off to
frequently are agents of violence
and social issues before leaving
of ordinary civilians, and answer
their husband’s friends or put into
within the group. Former
that made them vulnerable to
to practically no one – enjoying an
dire living situations until they
members of hisbah told us
recruitment and, once in, they
elevated status they may not have
agreed to marry again – some
themselves about flogging and
often also have been weaponised
found back home.
marrying as many as 13 times
biting other women with metal
and indoctrinated into a
in succession. One female ISIS
teeth as punishments. Similarly,
vicious ideology.
home might also enjoy a beautiful
defector with a baby in arms told
reports from those on the ground
home taken from the enemies
us she escaped the group because
in Syria state that women inside
sharia training told us of having
of ISIS or a captive forced into
she did not want to be forced to
ISIS have been trained to throw
to behead a prisoner before
slavery who does cooking and
marry a fourth time after her
grenades, use weapons and
giving their bayat [pledge of
housework, in some cases looking
third husband was killed.
have been indoctrinated for
allegiance] to the terrorist group
martyrdom missions.
while women in the hisbah told
Women who earn poorly back
after the husband’s sexual desires.
Most countries accept their
Independent of gender, anyone
Men who went through
Even among women, the ISIS true
female returnees from Iraq and
believer is taught to dehumanise
Syria, and many countries do not
certificate for ISIS wives was
torturers. While women are
these captive women and
prosecute these women – or if they
changed in recent years to state
less often weaponised, there is
legitimise their enslavement.
do, they receive lighter sentences.
that a woman does not have to
increasing evidence of weapons
This is due to the notion that they
seek her husband’s permission to
training for female cadres in the
young foreign women are
only followed their men as a result
become a martyr. She only needs
last year.
invited to join a group of women
of being tricked or coerced, which
the permission of the ISIS caliph,
operating out of Raqqa that draw
often is not the case.
Abu Bakr al Baghdadi.
If they are not in the hisbah,
other women, as well as men,
In the Balkans and Central
Indeed, the marriage
Following in the paths of
us of being turned into sadistic
As ISIS increasingly calls for homegrown attacks in the West, it is unclear if they will reach back
into the group. Females seducing
Asia, we were told by intelligence
many conservative terrorist
to females who have returned
men into the group are powerful
and law enforcement that women
groups that do not encourage
home. For instance, one wife of
indeed. American ISIS recruit
are ‘zombies’ (following their
female fighter roles, ISIS is no
an ISIS fighter in Kosovo was
Mohamad Jamal Khweis appears
men and controlled by their
different in pushing them into
not prosecuted for joining and
to have joined precisely for this
men). But our research shows
suicide missions when cornered,
travelling to a terrorist group,
female promise of marriage,
that ISIS women often followed
facts born out in the recent battle
while her husband was. He serves
having left the US on a purported
their men willingly into Syria and
for Mosul.
a four-and-a-half-year sentence
vacation but flown in a circuitous
Iraq, and in some cases willingly
route to Istanbul. He later claimed
joined them in homegrown
were forced to join the group, nor
while his wife lives freely in
to have met a woman whom he
terrorist attacks.
lacking in agency with regards to
society, although under police
the roles they played in it, we need
surveillance. She is known to
immediately married and with
Some may have agreed to
Given that not all ISIS females
and still avows loyalty to ISIS,
whom he travelled to Iraq to join
go out of fears of abandonment
to be cautious with both female
continue Internet contacts with
the group.
and financial ruin, yet others
and male returnees from the
the group as well as communicate
were instigators. In Kyrgyzstan,
Islamic State.
with her husband, who expressed
Contrary to some assumptions, females who get to the Islamic
for instance, two older women
While women who join
State are not gang-raped by ISIS
talked their extended families
ISIS are often portrayed as
men. But they are expected to
into travelling to Syria to join
brainwashed by men, cultural
There are ample other
have husbands and, indeed,
ISIS, believing that they would
biases that overlook the role of
examples of returned foreign
ISIS runs a marriage bureau
better their financial lot and be
women as willing participants,
fighters from ISIS and other
specifically for that purpose.
able to live by what they believed
including narratives that deny the
terrorist groups where the
Women who marry into ISIS
to be true Islamic ideals. When
role of political grievances that
returnee continued on at home
are indoctrinated into believing
disillusionment set in, one of these
drive women to join ISIS, may
as a ‘sleeper’ and reactivated over
in the spiritual benefits of their
grandmothers was able to smuggle
be dangerous.
time. The possibility that ISIS
48 // SECURITY SOLUTIONS
willingness to return to the group if released.
securitysolutionsmagazine.com
women would do the same is a
by virtue of the likelihood that
factor we cannot afford to ignore.
they are traumatised by what
In our experience, ISIS has
they experienced and may also
contacted members who defected,
be ideologically indoctrinated
insisting that they continue to
or weapons trained, should first
serve the group even when they
be prosecuted and, if judged
wish to sever ties. Similarly,
amenable to it, be allowed
returnees who may have had
to receive a lightened prison
difficulties that led to their
sentence, or sidestep prison
wish to travel to Syria and Iraq
time altogether by voluntarily
to join, are likely to face these
committing to engage in a
same difficulties, if not worse
psychological program.
stressors, upon their return. They
A well carried out
WOMEN WHO HAVE BORNE CHILDREN INSIDE ISIS TERRITORY HAVE ENCOUNTERED DIFFICULTIES ESCAPING WITH THEIR CHILDREN, WHO LACK OFFICIALLY RECOGNISED IDENTITY DOCUMENTS.
https://georgetown.academia.edu/
measures, we can ensure the
terrorism as well as training key
AnneSpeckhardWebsite:http:// www.icsve.org Ardian Shajkovci Ph.D. is the Director of Research and a Senior Research Fellow at the International Center for the Study of Violent Extremism (ICSVE). He has been collecting interviews with ISIS defectors and studying their trajectories into and out of
have also witnessed extreme
rehabilitation program can
safety of our citizens while ISIS
stakeholders in law enforcement,
brutality that may leave them in a
help them to understand and
tries to reconstitute itself in the
intelligence, educators and other
traumatised state.
address the personal reasons
face of territorial loss and the
countering violent extremism
that resonated with ISIS calls to
eventual return home of most of
professionals on the use of counter-
traumatised Palestinians often
recruitment and their violent
its foreign fighters.
narrative messaging materials
revealed how easy it was to
actions, as well as be moved to
volunteer for a suicide mission if
find other solutions to either their
one already was psychologically
psycho-social problems and/or
an adjunct associate professor
been studying the use of children
numb as a result of post-traumatic
concerns about their grievances.
of psychiatry at Georgetown
as violent actors by groups such
University in the School of Medicine
as ISIS and how to rehabilitate
Interviews in the past with
stress disorder (PTSD). As one
Some ISIS returnees may
produced by ICSVE both locally Anne Speckhard Ph.D. is
and internationally. He has also
interviewee said, “It’s a small step
not voluntarily take part in
and Director of the International
them. He has conducted fieldwork
to take if we are already dead.”
rehabilitation. Others may only
Center for the Study of Violent
in Western Europe, the Balkans,
pretend to cooperate. That said,
Extremism (ICSVE) where she
Central Asia and the Middle
serves as a kind of psychological
if carried out well and with
heads the Breaking the ISIS
East, mostly recently in Jordan
first aid when applied to people
careful assessments along the
Brand—ISIS Defectors Interviews
and Iraq. He has presented
suffering PTSD. The individuals
way, many can be rehabilitated
Project. She is the author of Talking
at professional conferences
gain immediate relief from painful
and reintegrated into society in a
to Terrorists, Bride of ISIS and
and published on the topic of
flashbacks and post-traumatic
psychological state that makes it
co-author of ISIS Defectors: Inside
radicalization and terrorism.
arousal states by escaping into
less likely that they would again
Stories of the Terrorist Caliphate;
Ardian holds a doctorate in Public
a death they believe is simply a
be manipulated or once again
Undercover Jihadi; and Warrior
Policy and Administration from
doorway to paradise and glory
answer the call to terrorism.
Princess. Anne has interviewed
Walden University, with a focus
nearly 500 terrorists, their
on Homeland Security Policy. He
Indeed, martyrdom ideology
and may even experience states of
While we are preparing for
euphoria in contemplating taking
the return of female foreign
family members and supporters
obtained his M.A. degree in Public
their own life in this manner.
fighters, we also need to educate
in various parts of the world,
Policy and Administration from
These same post-traumatic
youth, including female youth,
designed the psychological and
Northwestern University and a B.A.
vulnerabilities may be operating
regarding the truth about ISIS
Islamic challenge aspects of the
degree in International Relations
for ISIS female returnees who, in
and their virulent online and
Detainee Rehabilitation Program
and Diplomacy from Dominican
many cases, are not prosecuted
face-to-face recruitment. Despite
in Iraq to be applied to 20,000 +
University. He also holds several
nor mandated into any kind
rapidly losing its territory, ISIS has
detainees and 800 juveniles, is a
professional certifications in the
of treatment, despite likely
already produced innumerable
sought after counterterrorism
field of homeland security as well
suffering stigma, personal and
propaganda materials that are
expert and has consulted to NATO,
as a professional designation for
psycho-social problems, and
likely to continue to circulate on
OSCE, foreign governments and
his contributions to the field of
difficulties reintegrating.
the internet. The digital caliphate
to the U.S. Senate and House,
homeland security and homeland
will likely continue to recruit.
Departments of State, Defense,
security efforts in general. He is
Justice, Homeland Security,
also an adjunct professor teaching counterterrorism courses.
Public sympathies for ISIS female returnees, who are often
Initiatives like our Breaking
handed down shorter sentences
the ISIS Brand Counter Narrative
Health and Human Services, CIA
or pardoned, may only complicate
Project using insiders to denounce
and FBI and CNN, BBC, NPR,
the prospect of effectively dealing
the group will continue to be
Fox News, MSNBC, CTV, and in
with female returnees who
useful to interfere with and
Time, The New York Times, The
need special care and attention.
disrupt ISIS recruitment. Through
Washington Post, London Times
It is our view that anyone who
a combination of education,
and many other publications.
joins a terrorist group like ISIS,
prevention and direct intervention
Her publications are found here:
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 49
FEATURE
50 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
NEW ISO31000 COMING THIS YEAR. ARE YOU READY? BY ALEXEI SIDORENKO
After more than five years in
both and full credit should go to
They should ensure that risk
management framework
the making and thousands
the authors of the ISO31000 2009
management is integrated into
and the way the risk
of comments received from
version, because the document in
all organisational activities and
management process
representatives of 54 participating
its original form already listed all
should demonstrate leadership
and observing countries, as well
the right principles and concepts.
and commitment.
as multiple liaison organisations,
So, what has changed?
• The concept of integration
is integrated. o The risk management process should be
the updated ISO31000 standard
Here are some of the most
is reinforced throughout
an integral part of
is going through the final stages
important changes:
the document; here are just
management and decision
of feedback and will likely be
• The document is shorter. It is
few examples:
making and should
o Risk management
be integrated into the
published in early 2018. This article summarises the key changes to the most popular
now only 15 pages (excluding covers and bibliography). • The number of principles has
should be a part of, and
structure, operations
not separate from, the
and processes of
standard in the risk management
reduced from eleven to eight,
organisational purpose,
the organisation.
world, ISO31000, and how the
without losing any of the
governance, leadership
• The new standard explicitly
important messages.
and commitment, strategy,
states that there can be
objectives and operations.
many applications of the risk
changes will impact businesses.
• The standard reinforces the
Key Changes Proposed in the 2018 Version
purpose of risk management.
o Properly designed
management process within
According to the authors,
and implemented,
an organisation, customised
There are no significant changes.
the purpose of the risk
the risk management
to achieve objectives and
That is right. Five years in
management framework is
framework will ensure
to suit the external and
the making and thousands of
to assist an organisation in
that the risk management
internal context in which they
comments received and processed
integrating risk management
process is a part of all
and, at the end, all changes are
into all its activities and
activities throughout the
either cosmetic or reinforce the
functions. The effectiveness of
organisation, including
the dynamic and variable
messages that have been included
risk management will depend
decision making, and that
nature of human behaviour
since the 2009 version. This could
on its integration into the
changes in external and
and culture, which should be
either mean the 2009 version was
governance and all activities
internal contexts will be
considered throughout the risk
already great and just needed
of the organisation, including
adequately captured.
more emphasis, or it could mean
decision making.
that the members of the ISO
• The responsibility of top
o The organisation should
are applied. • The standard also addresses
management process. These messages are very
continually improve the
powerful. They are not new, but
TC262 did not have an appetite for
management and oversight
suitability, adequacy and
they reinforce the type of risk
change or innovation. It is actually
bodies has been added.
effectiveness of the risk
management that is integrated
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 51
FEATURE
into business activities and key
cosmetic, does that mean risk
objectives is assessed at
decision-making processes; the
managers do not have to do
the time the strategy is
type of risk management that is
anything? Yes for those risk
formulated and not after it
– while it is quite common
not done on a pre-determined
managers who have been applying
was approved by the board.
to budget using three
periodic basis (quarterly, monthly
the ISO31000 principles since its
Risk analysis becomes an
scenarios (optimistic,
and so on), but at the time of
publication in 2009. However,
important step of the actual
realistic and pessimistic), it
making an important business
in 14 years in risk management,
strategy setting and update
may not be sufficient from
decision or as part of the business
I have probably met less than
processes. Risk managers use
a risk management point of
process or activity.
10 people like that globally.
scenario analysis or simulation
view. These scenarios are
Nevertheless, here are some
modelling to present an
often formed without the
examples of successful practices:
independent opinion on
risk management team’s
• Integrating into strategic
strategic objectives, the
participation or even without
What does it mean for Businesses?
have on their achievement. • Integrating into budgeting
Since all the changes are either
planning – the effect of
likelihood of achieving them
due consideration of the
reinforcing existing ideas or
uncertainty on the strategic
and the impact the risks may
actual risks associated with
52 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
use of simulation modelling to make sure all important risks are captured and their impact on liquidity assessed. Risk analysis helps replace static, point-in-time budgets with a distribution of possible values. It also helps set management key performance indicators (KPIs) based on the risk information, thus improving the likelihood of them being achieved and reduces the conflict of interest the finance department and management team have in presenting an overly optimistic budget.
FIVE YEARS IN THE MAKING AND THOUSANDS OF COMMENTS RECEIVED AND PROCESSED AND, AT THE END, ALL CHANGES ARE EITHER COSMETIC OR REINFORCE THE MESSAGES THAT HAVE BEEN INCLUDED SINCE THE 2009 VERSION.
principles. So, for them, the new standard is a wonderful opportunity to re-evaluate current risk management methodologies and start building a business case on why risk management needs to be better integrated into decision-making and key business processes. National and international risk management associations have an important role to play in building awareness around the new ISO31000 to help integrate risk management principles into national legislation and government-issued guidelines. n Alex Sidorenko is an expert
Risk analysis helps to identify the most critical risks
with over 13 years of strategic,
affecting the budget, allowing
innovation, risk and performance
management to allocate
management experience across
ownership and determine the
Australia, Russia, Poland and
budget for risk mitigation.
Kazakhstan. In 2014 Alex was named the Risk Manager of
• Integrating into
the Year by the Russian Risk
performance management
Management Association.
– risk management could
As a Board member of
be integrated into the
mitigation, risk management
performance management
training grades or an internal
Institute for strategic risk
cycle of the organisation,
audit assessment of the risk
analysis in decision making,
both at the individual level
management effectiveness in
Alex is responsible for G31000
and the corporate level.
different business units.
risk management training and certification across Russia and
One of the risk managers
• Integrating into investment
we interviewed shared an
decision making – the use
CIS, running numerous risk
example where traditional
of simulation allows users
management classroom and
static corporate KPIs have
to estimate the range of
e-learning training programs.
been replaced with dynamic,
project costs and expected
Alex represents Russian risk
risk-based, ranged KPIs.
returns, along with the most
management community at the
This allowed management
significant assumptions made
ISO Technical Committee 262
to have bands of values
by management that affect
responsible for the update of
instead of a single value.
project KPIs.
ISO31000:20XX and Guide 73
the budget. Thus, even the
Some KPIs stayed as single
For these risk managers,
pessimistic scenarios often
value estimates; however,
ISO31000:2018 will be a nice
do not account for many
they were calculated as the
reinforcement of what they have
global PwC risk management
significant risks, creating
95 percent percentile of the
been doing for years.
methodology, the author of the
an overly optimistic and
distribution of possible values
misleading picture for
based on the Monte-Carlo
in non-financial companies,
SME (Russian standardization
executives and decision-
simulation. Triggers and key
however, choose to settle for
organization), risk management
makers. Proper risk analysis
risk indicators may also be set
regular risk register updates,
textbook (Russian Ministry of
can bring significant value to
for corporate KPIs to improve
period risk reporting and
Finance), risk management guide
the budgeting process. Risk
monitoring and performance
standalone risk management
(Australian Stock Exchange)
managers should review
tracking. At an individual
framework documents. All
and the award-winning training
and improve management
level, risk management KPIs
these practices are relatively
course on risk management (best
assumptions used in scenario
may be set around risk-based
ineffective and never did align
risk education program 2013,
analysis or introduce the
decision making, timely risk
well with the original ISO31000
2014 and 2015).
securitysolutionsmagazine.com
The majority of risk managers
since 2015. Alex is the co-author of the
risk management guidelines for
SECURITY SOLUTIONS // 53
AVIATION
ARE WE USING BODY SCANNERS CORRECTLY? BY STEVE LAWSON
54 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
While body scanners are still not
rest of the developed world. The
commonly used in Australian
European Union banned them in
airports, it is a subject that keep
2011. So when I talk about body
coming up time from time to time.
scanners in the rest of the article
Originally this article was going
I am only referring to millimeter
to examine their efficiency, but a
wave technology.
recent experience led me to instead
is again split into two: active and
even being used correctly in the
passive. Australia uses active
countries where such machines
scanners. Active simply means that
are in use. It is a pity that it does
the machine radiates energy from
not matter how good technology
a couple of antennae and then uses
is, its efficiency will always depend
the reflected energy to construct
on implementation.
an image.
Before we talk about how
securitysolutionsmagazine.com
Millimeter wave technology
look at whether this technology is
A number of countries
efficient body scanners are we
have conducted tests into the
should really understand how
effectiveness of body scanners,
they work. There are two types
both backscatter and millimeter,
of body scanners; millimeter
but obviously those tests are
and backscatter. Only millimeter
confidential. The issue was
wave machines are used within
publically discussed in a US
Australia and backscatter is
Congressional Research Service
gradually being phased out in the
report in 2012.
SECURITY SOLUTIONS // 55
AVIATION
As well as equipment
The Transportation Security
excel spreadsheet that includes
security equipment is used except
effectiveness, the report also
Administration (TSA) maintains
equipment ranging from rubber
to budget for consumables for the
addressed issues such as the cost
that this equates to approximately
mats to the x-ray machine. The
equipment. Checkpoints need to
per passenger in the US. I guess
US$1 per passenger. The report
final equipment list will depend
have a range of equipment and
that many people reading this
seems to question this figure
on the legislative requirements
facilities to be effective. I think
article would be interested in
by stating that it relates to the
and a risk assessment of the
that the cost suggested by the TSA
the price of the equipment. Each
total number of passengers
airport. The customer does know
is a fair estimation.
machine is roughly US$175,000
rather than those subjected to
the cost per item but they are
but the report suggests that
random screening using the
given a total cost of the equipment
concerns, firstly the machines
once on costs like installation,
body scanners. In my opinion
available to the aviation transport
used in Australia use non-ionizing
staffing, and maintenance are
that distinction is not really
security officers (screeners). It is
radiation. I hear that term a lot
included, the cost is more like
valid. When I am asked to cost
not broken down to the number
and in my mind it seems so non-
US$655,000 annually.
a screening point I have an
of times an individual piece of
threatening. Sort of like ‘organic’
56 // SECURITY SOLUTIONS
Let us consider health
securitysolutionsmagazine.com
products are automatically
Adonis or Aphrodite, the image
effectiveness of millimeter wave
and more than capable of hiding
believed to be healthy. Then
is really not titillating. However,
body scanners. In fact, I cannot
a weapon. I went to open for the
I remember that heroin and
I am certain that even given my
find anything definitive and,
operator but he waved me off,
cocaine could be described as
image’s lack of grace, I would not
as I said, the government does
same with the glasses case. If
‘organic’.
like it stored for any length of
not release that data. There are
you are going to spend loads of
time or looked at by security staff
a number of news articles that
money on such machinery then it
for their enjoyment.
try to question the effectiveness
should be used properly.
I only include this titbit since some of you may know enough about non-ionizing radiation to
Body scanners in Australia,
of millimeter wave machines
Are the machines effective?
apply my heroin and cocaine
the US and Europe have privacy
but when you read them they
I would suggest that they are
example. Non-ionizing simply
filters included so that the
are either about the use of the
and in the end what is the
means that the radiation is not
operator only sees a standard
equipment or refer to backscatter
alternative? The Walk Through
enough to remove an electron
‘cartoon’ of the body and the
body scanners. It is interesting
Metal Detector (WTMD) only
from an atom or molecule.
machine automatically highlights
that a study by the UK gave a
detects magnetic items and doing
However, non-ionizing radiation
potential threats. I was surprised
false alarm rate for a backscatter
a pat down of every passenger
includes part of the ultra-violet
to read in the Privacy Impact
machine of around 5 per cent,
is just not practical. To be
(UV) range and UV can cause
Statement prepared by the
while tests in Italy, Germany, and
honest, I would like to see them
things like skin cancers. Does
Department of Infrastructure on
the US resulted in a false alarm
eventually used as a replacement
that mean that the non-ionizing
body scanners used in Australia
rate for millimeter wave machine
for the WTMD but the time per
radiation used in millimeter
that “the data produced by
of 23-54 per cent. I suggest
passenger for a body scanner
wave body scanners since they
the scans cannot be stored or
that the difference in false
would need to be closer to 5
use Extremely High Frequency
transferred and is deleted once
alarm rates is not a reflection
seconds rather than the current
(EHF) radiation is dangerous?
the automated assessment
of the relative efficiency of the
20 seconds. Also, the false alarm
I am not a medical authority
processing is complete. No ‘raw’
equipment but rather that earlier
rate needs to be down under 10
or a technical expert on body
or ‘naked’ images are produced.”
backscatter machines allowed the
per cent. Most importantly, the
scanners but I cannot find
I am surprised that the images
operator to interpret the image
training of screeners needs to
anything that suggests that
are not stored for at least 48
but with the millimeter wave
be addressed. If something is
those used in Australia are a
hours so that in the event of
machines this is undertaken by
flagged, it must be checked. n
health hazard.
an incident investigators could
the machine. Consequently, the
In a very good information
Steve Lawson has over 20
access the images. Privacy
operator is presented with an
sheet issued by the Department
concerns have been raised in the
alarm that there is an item under
years’ experience in aviation
of Infrastructure on the Travel
US and Europe and there have
the person’s clothing. It could be
security. As a Security Executive
Secure website “There is
been allegations of breaches of
anything. Basically if you do not
with Qantas Airways, Steve
no evidence to suggest that
privacy, e.g. picking attractive
have anything on you it will not
held a number of senior
millimeter wave body scanners,
females. However, most of
alarm but if you have anything
management roles covering all
or other devices in this frequency
those issues seem to involve
on your body, a millimeter wave
aspects of aviation security from
and at the power density used
backscatter body scanners. Given
machine is likely to flag it.
policy development to airport
by scanners, are a health risk
that operators in Australia and
for the travelling public or the
in much of the world only see
experience with a body scanner.
York immediately following
operators”. I am not an apologist
cartoon images, I do not see that
I was at an airport in Australia
the 9/11 attacks to manage the
for the government but I would
as an issue unless the person
and had time to watch the body
Qantas response and undertook
suggest that to issue such a clear
is trying to make a political
scanner being used and was
a similar role following the 2002
statement in this information
statement or to bypass screening.
eager to try, notwithstanding
Bali Bombings. On his return
sheet does mean that all current
Similarly, there have been
knowing what my unadulterated
to Australia, he was appointed
information indicates that the
questions about taking scans of
image looks like. It is supposed to
Security Manager Freight for
equipment is safe.
children and the possible use of
be a random process but I asked
the Qantas Group. Since 2007
those images. Again, with current
if I could go through the scanner,
he has been a Director of AvSec
issue with body scanners –
systems it is unlikely that the
no problem. I was happy and
Consulting in partnership with
privacy. Those who know me will
images could be seen or obtained
disappointed, why scan someone
Bill Dent, a fellow former Qantas
attest that I am not an Adonis,
and even if they were they
who wants to be screened in a
Security Exec. Today Avsec
quite the opposite, and I have
are not, as I said above, in any
random process? The scanner
Consulting provides consultants
seen my unadulterated image in
way titillating.
found two things: a glasses case
from the US, NZ, ME, Israel
and my wallet. I showed both to
and Europe.
Now for the most contentious
a body scanner. It is not a pretty
Which brings me to the
Now we arrive at my
operations. He was sent to New
Steve can be contacted
sight, you see all the rolls of fat
effectiveness of the equipment.
the operator, he looked. Not that
and other more personal bits.
There is not much in the way
there was any money but my
on 0404685103 or slawson@
Even if the image were of an
of scholarly articles about the
wallet is rather thick with cards
avsecconsulting.com.
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 57
LOSS PREVENTION
FILMING OF SECURITY INTERVENTIONS IN AND AROUND PUBLIC PLACES DR TONY ZALEWSKI
58 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Filming of security interventions
confronted the witnesses, took
in and around public places is
possession of their mobile phones,
a common occurrence. We are
and deleted the recorded video
now familiar with broadcasts
files before returning the mobile
across the media of dash-cam and
phones to each respective witness.
mobile phone video images that
In one case the crowd controller
have been privately captured by
concerned was dismissed by
members of the public. In fact,
his employer and other crowd
police often call on members
controllers who assisted him were
of the public to provide them
disciplined. In the other case, the
with any privately captured
crowd controller was warned
video images to assist in their
by the licensee not to repeat the
investigation of crime and road
behaviour, albeit the licensee was
traffic incidents.
unclear whether such behaviour
However, two recent and separate security-related incidents
securitysolutionsmagazine.com
was unlawful or not. These incidents highlight
occurred in Victoria where
growing concerns about the
witnesses used their mobile
lawfulness or otherwise of filming
phones to visually record patron
people in public places and if
ejections from licensed premises.
security staff are filmed in the
On both occasions, and shortly
performance of their work, what
after the ejections, security staff
is the appropriate response.
SECURITY SOLUTIONS // 59
LOSS PREVENTION
circumstances where a person’s
legislation either way to allow
image constitutes “personal
or not allow filming in public
filming through mobile phones
Does a person have a right to privacy in a public place?
information” under the Privacy
places to protect a person’s image
in public places. It also explains
Situations where operational
Act 1988 (Cth) but the Act applies
or their privacy. There is no tort
practices that should be followed
security staff are filmed by a
to businesses and agencies,
of invasion of privacy and no
by security staff to ensure
member of the public during
not individuals who may film
precedents in Australia at this
unlawful or unprofessional
work are more likely than not,
activity of security staff. Similarly,
stage that allows for a civil action
acts are not committed when
especially in areas where there
under Australian consumer law,
to recover damages according to
filmed by members of the public.
are increased levels of public
celebrities may be protected when
ordinary principles governing
It should be noted there are
activity. Increased levels of public
filmed if reproducing their image
damages in tort.
many circumstances where a
activity are evidenced at public
misleads potential consumers into
“public place” involves activity
places listed above. However, do
thinking there is an endorsement
on private property such as
members of the public, including
of their products or services
Crime, surveillance and listening devices
a shopping centre, licensed
security staff, have a right to
by the celebrity. This applies to
Where the civil law addresses
premises, concert hall, sporting
privacy in a public place?
celebrities and trade practices, not
private disputes, the criminal law,
to filming of incidents or security
amongst other things, proscribes
staff working in public places.
conduct considered threatening,
This article explains the current position relating to
ground, airport and other places
In general terms, individuals
where the public are permitted
in Australia do not have a right
to enter, whether for payment
to privacy that protects the
or not.
person’s image. There may be
60 // SECURITY SOLUTIONS
Put simply, outside the examples above there is no
harmful and damaging to the good order of society. Many acts, such
securitysolutionsmagazine.com
involves a crime report to police
reasonably suspected of being
understanding the location and
or arrest of the perpetrator to be
stolen or unlawfully obtained,
coverage of CCTV cameras in your
handed to police.
irrespective of the reason for the
workplace you should ensure
taking or the time the personal
work is performed in areas under
and Territory has legislation
property was possessed. Unlawful
surveillance. This will enable
concerning use of surveillance and
possession is one of a few crimes
capture of CCTV images relevant
listening devices. The legislation
where the onus of proof is reversed
to the incident. Your supervisor
seeks to protect individuals
which means the person in
or manager should be informed
and their private activities and
possession of the personal property
of the incident, the relevant CCTV
conversations. Recording of private
must prove they lawfully possessed
files extracted and retained, and
conversations using listening
the property.
an appropriate report made in the
Each Australian State
devices is specifically prohibited. A
Further to the above, it must
incident register.
mobile phone could be considered
be remembered that any criminal
a listening device, however it
proceeding including assault or
that any recording is an accurate,
would be difficult to claim a private
a property-related offence can
independent and impartial
conversation was being unlawfully
impact upon an individual’s
witness irrespective of whether
recorded where a person is openly
eligibility to hold or retain a
the images have been captured by
filming activity in a public place
security licence. My advice is to
witnesses to incidents or not. Like
and is a party to the conversation.
avoid any circumstance where
mobile phone recordings, CCTV
Succinctly, the current legal
a phone is taken from another
images are also of value to show
person filming security activity.
exactly what behaviour occurred
position appears to be, subject to the above it is not unlawful to
It is important to remember
by persons present during an incident. Captured images can
in a public place using a mobile
What can be done if filming occurs?
phone. This then poses the
Where filming on a mobile
conduct during operational
question, what can be done when
phone is occurring during an
activity. Accurate incident
filming occurs?
ejection or other security activity,
reporting and identification of
security staff can ask or direct a
eye-witnesses can then corroborate
Can a phone be seized from a witness?
person not to film. However, this
assertions of professional conduct.
is unenforceable request if the
Collectively, filmed incidents
Seizing another person’s property
person filming does not desist.
captured on mobile phones or
openly film security staff working
must be in accordance with the
As filming cannot be prohibited,
provide evidence of professional
otherwise will disclose the actual
law. Seizing an exhibit to prove
it is important that security staff
course of conduct by security staff,
a crime is recognised by the
closely align with appropriate
irrespective of assertions made
common law, however seizing
practices in the selection of tactical
outside of private mobile phone
property where there is no crime is
options for any intervention or
filming. Where staff follow their
another matter.
ejection. If a trespasser is being
training and operating procedures,
Seizing a person’s phone
removed from premises, ensure
private filming in public places
action that is harmful and impacts
exposes the taker and any other
you align with your training and
is not to be discouraged as it will
upon the good order of society
person assisting the taker to
operating procedures in the use
merely confirm professional
hence is punishable under the
allegations of assault. By definition,
of force. If a shoplifter is being
conduct by security staff. n
criminal law.
assault not only involves physical
arrested and escorted back into the
as assault, may have individual victims however violence is an
Ongoing filming of the same
For over 20 years Dr Tony
application of force but also can
store, ensure you align with your
security staff may involve an
be committed in circumstances
training and operating procedures
Zalewski has provided expert
allegation of criminal “stalking”,
where a person is placed in fear
in managing the perpetrator. If
security reports to courts in all
albeit there must be some course
of immediate force through an
you are unsure about your legal
Australian jurisdictions. He has
of conduct upon which there
assailant’s conduct. If an injury
rights operationally then adopt
four degrees from Australian
is an intention or recklessness
results from the seizure, then the
a cautious approach rather than
Universities including law, has
about causing someone else
assault is deemed more serious.
be caught on film acting outside
worked on over 500 cases including
apprehension or fear. A person
The taker could also be charged
appropriate practices.
some of Australia’s leading
aggressively pushing their mobile
with a property-related crime such
phone into the face of a security
as unlawful possession. Unlawful
you are aware mobile phone
provides advice about security
officer may also unwittingly
possession is a crime in Victoria
recording is occurring you can
across industry sectors and is a
commit an assault. The response
and committed where a person
also rely on recorded images in
security adviser to governments
to stalking and assault typically
possesses personal property
the workplace. For example, by
locally and abroad.
securitysolutionsmagazine.com
Further to the above, if
security-related civil actions,
SECURITY SOLUTIONS // 61
ACCESS CONTROL
Strategic Positioning: How ACaaS Is About To Change The Marketplace BY HOMER ENRIQUEZ
Thrive or survive – a critical choice must be made before it is too late. Everyone who knows me, knows that I live, breathe and eat cloud-technology – cloud-based access control to be more specific. They also know that I am very passionate about this adoption and if you met me on the street, I would introduce you to ACaaS as if it were my own child. What is about to happen will change the security industry as we know it today, forcing some to fall from our ranks and others to emerge as powerhouses. When the dust settles from our industry’s transformation, how will you emerge? Will you thrive or struggle to survive? It is time to decide.
62 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Today’s competitive landscape
in annual revenue production,
is incredibly dynamic and the
muscling its way into second
industry’s growth thus far has
place behind the video segment.
been incredible. The emergence
Positioning an organisation in the
of cloud technology has changed
marketplace, right now, to play in
how efficiency, profitability and
this competitive landscape is of
revenue growth is gauged and
profound importance; the life or
has brought new metrics, such
death of the company may hang in
as user experience, capabilities
the balance.
and integrations, to the forefront
securitysolutionsmagazine.com
As is well known, for whatever
of what influences marketplace
the reason, the life safety and
decision makers. Analysts are
building security solutions
projecting that by 2025, cloud-
industry has been apathetic in the
based access control (ACaaS)
adoption of new and/or cutting-
will surpass traditional access
edge technology, which will soon
control in revenue share for
start to thin the industry’s ranks.
the access control segment and
Here are a couple of things for
that is not even the half of it.
readers to mull over. Think of
Analysts are also predicting
the last time you were driving
that the entire access control
somewhere and did not know
market segment, by 2025, will
exactly how to get there – did you
be driven by ACaaS, biometrics,
pull over to buy a map? When
visitor management and wireless
was the last time you went to the
locks; furthermore, the access
store to rent a movie for ‘movie
control segment as a whole will
night’? When was the last time
surpass the intrusion segment
you wrote a letter and mailed it?
SECURITY SOLUTIONS // 63
ACCESS CONTROL
The culprit in all these scenarios is cloud technology. Analysts are
cloud environments. Edge computing allows data
connectivity in a small-form
technology’s guinea pig – as a
factor. Data is processed at the
result, the access control industry
projecting that in five years’ time,
produced by Internet of Things
edge, and all or a portion of it is
is taking advantage of what was
cloud-based access control will be
(IoT) devices to be processed
sent to the central processing or
learned when they went through
at a compound annual growth rate
closer to where it is created
storage repository in a corporate
this process and its migration
(CAGR) of almost 29 percent and
instead of sending it across long
data centre, co-location facility
will happen much faster with
organisations need to claim their
routes to data centres or clouds
or Infrastructure as a Service
less stumbles. Today’s consumer
spot at this table now.
and, when it is combined with
(IaaS) cloud.
expects technology that is better, faster, easier, intuitive and for less
the anticipated smaller footprint,
Here is Why
higher processing capability
The history of technology, without
and lower cost of transistors,
Why does Edge Computing Matter?
exception, has consistently
computational processing
Edge computing deployments are
demonstrated that at some
previously done by servers in
ideal in a variety of circumstances.
technology will give birth to
point all technology eventually
cloud environments will now
One is when IoT devices have
devices that are more affordable
matures and takes that next step
be able to be executed by edge
poor connectivity and it is not
and more powerful. Smaller
in the evolution process. This
devices at a significantly lower
efficient for IoT devices to be
footprints on circuit boards will
critical window of opportunity is
cost, making cost to ownership
constantly connected to a central
provide room for enhanced
also influenced by the fact that
for access control end-users much
cloud. Other use cases have to do
capabilities and encryption,
development in transistors – their
more palatable. Sounds great?
with latency-sensitive processing
using less bandwidth, which will
processing power, capability, foot
It is, but organisations will have
of information. Edge computing
lower cloud environment costs.
print and costs – are reaching
to have a cloud environment,
reduces latency because data
The aggregate sum of all of this
a critical point simultaneous to
evolved to support edge devices,
does not have to traverse over
makes the industry segment more
the anticipated growth in the
operational. Doing this computing
a network to a data centre or
efficient, faster, stronger and,
ACaaS marketplace. Moore’s
closer to the edge of the network
cloud for processing. This is ideal
considering the lower cost that
Law is the observation that
lets organisations analyze
for situations where latencies of
will eventually come to fruition,
the number of transistors, or
important data in near real
milliseconds can be untenable,
bring into the fold an entirely
rather their performance, in a
time – an organisational need
such as in financial services
new vertical where access control
dense integrated circuit doubles
across many industries, including
or manufacturing.
was previously cost prohibitive.
approximately every two years;
manufacturing, health care,
some argue or revise to 18 months.
telecommunications and finance.
than they were previously paying for their ‘on-premises’ product. Developments in resistor
Based on this information,
Connecting the Dots
cloud-based access control will
Let’s make a few summary
have a huge advantage when
conclusions and put everything
compared to traditional-based
power to the consumer falls, the
What exactly is Edge Computing?
together. First, technology
access control and certainly when
cost for producers to fulfil Moore’s
Edge computing is a “mesh
evolves and consumers love it.
compared to what is currently in
law follows an opposite trend:
network of micro data centers
No more maps, no more running
the marketplace.
R&D, manufacturing and test
that processes or stores critical
to the movie rental store, no
costs have increased steadily with
data locally and pushes all
more records or record players;
each new generation of chips.
received data to a central data
consumers can have all of this
Most semiconductor industry
center or cloud storage repository
stuff faster, cheaper and better. In
Made your decision? Here is what the future holds.
forecasters, including Gordon
(today’s cloud environments), in a
short, customers love technology,
1. I have a cloud environment
Moore, expect Moore’s law will
footprint of less than 100 square
especially the enhanced feature
or am about to build one.
end by around 2025–2030. (The
feet,” according to research firm
sets that come with it. So many
Either way, yes, I am in. The
evolution of processing power will
IDC. It is typically referred to in
industries have already gone
first and most important
open the door to new technologies
IoT use cases, where edge devices
through this transformation,
rule to a successful ACaaS
such as bio-processing, synaptic
would collect data – sometimes
so consumers already expect
offering: if you do not
firing processing and other
massive amounts of it – and send
mobility, ease of use and an
follow it, do not expect to
‘science fiction coming to life’
it all to a data centre or cloud
enhanced user experience, all
be successful building a
scenarios, but that is another
for processing. Edge computing
of which cloud-based access
meaningful recurring monthly
topic for another day). The
triages the data locally, so some
control delivers.
revenue (RMR) engine. You
critical point at which the
of it is processed locally, reducing
development of transistors caps
the backhaul traffic to the central
already crawled, stumbled,
offering for all access control
out will lend rise to and create
repository. Typically, this is done
walked and eventually ran down
opportunities, every sales
the perfect environment for the
by the IoT devices transferring the
the cloud-based technology path
person in your company, no
prevalence of edge computing,
data to a local device that includes
before the access control industry
exceptions. Make a strategic
which will complement existing
computing, storage and network
– in essence, they were cloud-
product offering decision that
Additionally, Moore’s Second Law states that as the cost of computer
64 // SECURITY SOLUTIONS
Many other industries have
must lead with your ACaaS
securitysolutionsmagazine.com
drives every dollar for access
projections to 29 percent CAGR
such as Homeland Security,
and traditional access control
control opportunities to your
in five years, the showcasing
CIA, military, there are a
just cannot compete with
RMR engine, otherwise, your
of technology, apps, real-time
couple of things to consider.
cloud-based access control.
return on investment will be
management, aging of existing
In five years, traditional-based
Consumers’ expectations
too far out to compete. It is
traditional access control
access control is expected to
define the demand, not the
all about cornering market
systems, edge devices, lower
be at nine percent CAGR and
products you choose to offer
share for what is about to take
costs to consumers and, to
ACaaS at 29 percent. The CAGR
and, after so many different
place. If your ACaaS offering
top it all off, your very own
of the market you play in is
industries have already made
is just another screwdriver in
recurring monthly revenue
directly related to the growth
the migration to cloud-based
your tool chest of products,
engine that will allow you
potential of your company.
technology, consumers are
you will not be successful in
to be more aggressive on
When you bid against a
already expecting the feature
building a meaningful RMR
other lines of business since
company that has an ACaaS
sets and mobility that cloud-
engine, period. Ensure your
your RMR engine is reducing
offering and its associated
based access control can
sales team undergoes training
overhead, the best customer
RMR engine is churning away,
provide. Ask yourself this: Are
to transition from selling a
retention history for any
they can do the job for less
you offering what you want to
product to selling a service and
offering in any segment in our
than you can, they can offer a
sell or are you offering what
ensure they know your ACaaS
industry you are a part of the
greater stable of feature sets,
the consumer wants? Are you
product offering like the back
future where access control is
and can make just as much
acting in your end-user’s best
of their hand. Your sales team
concerned. Well done. Enjoy
net profit than you can, if not
interest? Will what you are
will need to become technology
building a legacy that is built
more, even though their bid
selling help the growth of your
consultants, helping clients to
for tomorrow.
is calculated using a lower
company? n
formulate a cloud strategy, not
2. I am comfortable selling
margin. Clients with aging
just security sales people in
traditional access control.
systems that are prime for
Homer Enriquez is the hattrix
order to be competitive in the
That is what I know. While
upgrade will want to know
National Sales Manager at Kantech
future. With ACaaS taking an
ACaaS will not play in certain
what new feature sets will
in the US. He can be contacted via
ever-growing market share,
scenarios and/or markets,
come with the upgrade/cost
email homer.enriquez@jci.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 65
PROFESSIONAL DEVELOPMENT
SECURITY INDUSTRY LICENSING time for a change
BY SCOTT O’DRISCOLL
66 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
securitysolutionsmagazine.com
Regulation and administration
A Brief History
of the private security industry
According to Prenzler and Sarre in
in Australia is currently the
an article published in the Criminal
responsibility of states and
Justice Journal in 2012, “The first
territories. For many years those
wave of industry specific regulation
working in the security industry
is associated with the New South
have been obliged under state and
Wales Security (Protection) Industry
territorial legislation to spend many
Act 1985, which introduced
hours at considerable cost to apply
licensing of security firms and
for multiple licences in order to
employees. Criteria included
conduct business in this country. At
‘prescribed qualifications and
one point in time, I had six different
experience’ and disqualification for
plastic licences in my wallet, which
10 years for offences against the
is nothing short of ludicrous. This
Act and convictions for indictable
article will challenge this approach
offences. The focus was on guards,
and offer an alternative solution.
consultants and some classes of
The article will be particularly
security equipment providers.”
relevant to those whose roles
This was the catalyst for change in
require them to operate across
the industry in Australia and other
different states or territories which
jurisdictions soon followed suit. I
for the purposes of this article I will
think we can all agree that licensing
refer to as jurisdictions.
was a good idea. Licencing has
SECURITY SOLUTIONS // 67
PROFESSIONAL DEVELOPMENT
allowed the industry to weed out persons of questionable character, those who are not qualified to provide services and those with a criminal history and or ties to organised crime. The article closes with this statement in regard to licensing at a national level:“From a national perspective, however, the system remains fragmentary, and there is little evidence of consistent improvements in the industry. It is clear that a much more proactive approach is needed that involves a mix of legislation and regulatory strategies designed to produce quality outcomes in the delivery of vital security and safety services.� I strongly believe the reason we have this problem is that nobody bothered to ask two very simple questions:-
68 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
1. What is the best way to enact
instances, applicants are still
which allows for electronic finger
and eligibility. The licence would
obliged to travel to the state
printing. Prints are scanned and
indicate the jurisdiction(s) they
or territory they wish to hold a
saved as a data file which could be
have chosen to operate and there
The answer to question one is
licence to have their finger prints
sent anywhere in the world and
you have it, one licence to cover all
obvious. Look to benchmark against
taken. Although, for some reason,
more than likely is. This covers off
the requirements Australia wide.
another successful licensing model.
I have found that this applies to
identity management and criminal
The same approach could
A classic example would of course
some applicants but not others
history checks at a national level.
be taken for the Master Licence.
be motor vehicle licensing. If I am
depending on who you speak to.
In New South Wales (NSW),
Complete the application on the
licensed to drive a car in my home
For example, where I have been
photos and issuing of licences is
same on-line portal, upload the
state, I can also drive a car in any
able to send a copy of my prints
managed by Service NSW. This
required documentation, select the
other state or territory in Australia.
in the old ink format as part of my
seems to work quite well and I
jurisdictions in which you intend
The answer to question two is,
application, I know of more than
don’t see any reason why this
to operate, upload the required
in my opinion, equally simple -
a few colleagues who have been
process should not continue and
documentation, pay the fee,
consult with your end users and key
instructed to travel to the state or
be rolled out across all states and
retrieve your finger print reference
stakeholders, i.e. those who operate
territory in which they are applying
territories. Regardless, I don’t think
number, book into your local police
in the Security Industry!
for a security license to have their
this is a show stopper. All driver’s
station for Live Scan, job done.
finger prints taken. This is another
licences in Australia are photo
The Question
example of the lack of uniformity
licences, so no matter how these
Summary
The question all cross-regional
of licensing requirements at
are obtained in other jurisdictions,
There you have it, a simple, fast,
security providers would like
regional level.
the same process could be applied
effective, burden free national
to security licences.
security licensing system. Most
security licensing in Australia? 2. Who are the best people to ask?
answered, and the subject of this article is:-
The current jurisdiction based
importantly it would encourage
system is a costly, admin heavy burden for the end user and
Application Management
rather than discourage compliance.
operative or business is licensed
completely avoidable in this day
Applications could quite easily
Industry associations such as ASIAL
to preform security duties in one
and age. I would also suggest that
be completed on line. It would
and ASIS International should
jurisdiction, they cannot perform
rather than promoting security
be a simple matter of putting
lobby federal government on
those same duties in any other
operatives to be compliant, the
together a web site or making
behalf of their members to push
jurisdiction without first obtaining
complexity of security licensing is
use of an existing on-line portal
for this change. We all know it is
another licence?
actually having the opposite effect
which allows the applicant to
needed, we all know it has been
in that those who work across
apply for a licence or licences
a hot topic for years and there
would know, the current system
regions would rather take the risk
in the jurisdictions they wish to
really is no excuse for not making
is direct result of the regulatory
of operating without a licence
operate in, upload the relevant
this happen with the technology
bodies in each state and or territory
particularly, if it is a simple day trip.
documents required to obtain a
available today. The burden
licence and book into the local
associated with the administration
Why is it that if a security
As all in the security industry
legislating in isolation. This prevents uniformed legislation from
Legislation
police station to have their finger
of multiple licences across
being developed, passed through
So how do we fix it? Simple, let’s
prints taken whereupon they
multiple jurisdictions is simply not
parliament and implemented.
start with legislation. It needs to
would quote a reference number
justifiable and must be addressed
be uniform across all states and
generated on-line as part of the
as a high priority.
legislation in Australia means each
territories. How do we do that? We
application process.
jurisdiction has different acts and
need a champion at a federal level
regulations. This means that if you
to get behind this initiative and
user the ability to select the states
Critique Prenzler and Sarre 2012.
operate across state or territorial
push for licensing to be legislated
and territories under which they
https://www.crimejusticejournal.
borders, you are obliged to hold a
at a federal level. Select the most
wish to operate and the type of
com/article/view/72 n
separate licence for each location
current, most generic state or
licence they wish to apply for. A
in which you wish to ply your
territory legislation and use it as
fee would be charged to cover
Scott O’Driscoll CPP, JP is a
trade. Even more farcical is the
the baseline for federal legislation.
administration costs for each
security professional with over 35
fact that if you are the business
This will allow for uniformed laws
jurisdiction and licence type
years’ experience in the industry.
owner, you are also obliged to
and regulations at a national level.
applied for. If successful, the
He is a licenced security consultant
applicant would receive a letter
and private investigator. Scott
advising them to report to a service
currently holds the position of
provider to have a photo taken.
Global Security Operations and
The lack of uniformed security
hold a Master Licence in each
The web site could offer the
Sources: The Evolution of the Security Industry in Australia: A
the revenue generated as a result
Criminal History Checks and Identification
of regionally controlled licensing is
Next, the criminal history and
just too enticing for the states and
identification problem. The police
applicant would receive a licence
world’s largest financial banking
territories to relinquish.
now use a national data base for
which details their licence type and
institutions. Scott can be contacted
finger printing known as ‘Live Scan’
class based on their qualifications
on +61 437 618 812.
jurisdiction. One has to wonder if
Further to this, in some
securitysolutionsmagazine.com
As per current practice, the
Risk Manager for one of the
SECURITY SOLUTIONS // 69
FEATURE
National Security Changes – Australian-Style Intelligence BY CLIVE WILLIAMS
70 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
The Independent Intelligence
has been with the Department
Review, released in June 2017,
of Defence.
was prepared by two respected
securitysolutionsmagazine.com
The AIC comprises six
‘insiders’, Michael L’Estrange
agencies, three of which are
and Steve Merchant, advised
Defence agencies: the Australian
by Sir Iain Lobban – the former
Signals Directorate (ASD), Defence
Director of the UK’s Government
Intelligence Organisation (DIO)
Communications Headquarters
and Australian Geospatial-
(GCHQ), so it cannot really be
Intelligence Organisation (AGO).
regarded as truly independent,
The other three agencies – the
but then it would be a difficult
Office of National Assessments
review to undertake for anyone
(ONA), Australian Security
who did not have a longstanding
Intelligence Organisation (ASIO)
and intimate knowledge of
and Australian Secret Intelligence
the Australian Intelligence
Service (ASIS) come under
Community (AIC). Michael
three other departments: the
L’Estrange’s career background
Department of Prime Minister
has been with the Department
and Cabinet (PM&C), Attorney
of Foreign Affairs and Trade
General’s Department (AGD) and
(DFAT), while Steve Merchant’s
DFAT respectively.
SECURITY SOLUTIONS // 71
FEATURE
Given the expansion of
and involved 150 significant
National Intelligence (ONI) as
can happen now, depending
Australian intelligence coverage
meetings, discussions with all ‘Five
a statutory authority within
on the interest of the Minister).
since 9/11, the review also
Eyes’ partners, consideration of 34
the Prime Minister’s portfolio,
The general upgrading of ASD’s
covered four agencies for whom
submissions, and interviews with
subsuming ONA, to be headed
responsibilities is, however, a
intelligence is now an important
21 interlocutors, many of whom
by a Director General (DG) of
recognition that cybersecurity
part of their business: the
were former agency heads.
departmental Secretary rank
challenges need more national
whose central coordinating
resources, particularly cybercrime
Australian Federal Police (AFP),
The review judged predictably
the Department of Immigration
that Australia’s intelligence
role would be an expanded and
and cyberespionage, which are
and Border Protection (DIBP), the
agencies are “highly capable
updated version of what the DG
continually evolving and proving
Australian Criminal Intelligence
and held in high regard by
ONA was expected to do when ONA
hard to deal with and seem beyond
Commission (ACIC) and the
their international partner
was established back in 1977; a role
the capacity of international
Australian Transaction Reports
agencies”. It also found that
subsequently reinforced by the
agencies to counter effectively.
and Analysis Centre (AUSTRAC).
“as a result of transforming
Flood Inquiry in 2004.
This broader six plus four
geopolitical, economic, societal
collection of agencies is referred
and technological changes, the
had little power over the heads
recommendations of the review as
to as the National Intelligence
intelligence community is faced
of Defence agencies whose
a sound basis to reform Australia’s
Community (NIC).
with challenges that will intensify
main priority was meeting
intelligence arrangements. As
over the coming decade”.
Defence needs. The DG ONI will
expected, it announced on the 18th
now, however, advise on the
of July that key changes would
There are about 7,000 staff spread across the 10 NIC
Consequently, the review made
The reality was that DG ONA
The Turnbull Government subsequently accepted the
agencies, with an annual budget
recommendations to cover four
appointment of senior NIC office-
be the establishment of an ONI,
approaching $2 billion. The three
priority areas: the co-ordinating
holders, which will provide him
headed by a Director General, and
Defence agencies absorb the bulk
structures of the AIC, new funding
or her with more leverage; but the
the transformation of the ASD
of the NIC funding.
mechanisms to address capability
most effective way for the DG to
into a statutory agency within the
issues, streamlining of legislative
influence agencies and their parent
Defence portfolio. (A statutory
document containing a great
arrangements, and measures
departments would be to have
agency is one authorised to enact
deal of detailed analysis and 23
to reinforce public trust in
some control over the NIC budget.
legislation on behalf of the state.)
recommendations that often
the agencies.
The review is a 132-page
contain sub-recommendations.
The review’s first
The review recommended that
The review did not address the
the ASD Director be upgraded to
issue of giving the AIC agencies –
It was conducted between
recommendation was the
DG level “reporting directly to
which were established during the
November 2016 and June 2017
establishment of an Office of
the Minister for Defence” (that
Cold War to concentrate on internal
72 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
or external issues – a broader
domestic security and law
and AUSTRAC, but continues to
against the establishment of
remit to allow them to operate
enforcement agencies to be similar
authorise warrants for ASIO’s
a Homeland Security/Home
both internally within Australia
to the Home Office in the UK: a
interception and other covert
Office-type arrangement. The
and externally. Today, of course,
central department providing
operations. Brandis has effectively
Government has not argued the
there is an electronic blurring
strategic planning, coordination
reverted to the role of Chief Law
case for change, and certainly
of national boundaries, while
and other support to a federation
Officer. The role of the Justice
not demonstrated that anything
many security challenges, such
of security and law enforcement
Minister, Michael Keenan, who
is broken and needs repair. It
as terrorism and transnational
agencies, including ASIO, the AFP,
until now reported to the AG
is reported that neither Foreign
crime, can be both internal and
the Australian Border Force (ABF),
on matters relating to the AFP
Minister Bishop nor Defence
external challenges at the same
ACIC, AUSTRAC and presumably
and other Commonwealth law
Minister Payne were present at the
time. This means that modern
the Office of Transport Security
enforcement agencies, is not
meeting of the National Security
intelligence needs to be more agile
(OTS). It obviously seeks to
altogether clear at this stage, but
Committee when these changes
and less constrained by national
avoid replicating the flawed
it looks like Dutton will have very
were considered.
boundaries and jurisdictions, and
US Department of Homeland
wide powers within the national
security countermeasures need
Security model.
security community. It may be
the Government is split on the
to be coordinated internationally.
As is now public knowledge,
According to my sources,
useful for the AFP to have its
Home Affairs issue, with Brandis,
Allowing agencies to access each
Peter Dutton was named
Minister inside Cabinet (Keenan is
Bishop and Keenan opposed to the
other’s databases is probably
Minister for the newly created
a junior Minister), but ASIO would
change, and Dutton and Finance
not the answer as it creates
mega-portfolio. The Home
probably not be happy about the
Minister Cormann strongly
potentially highly damaging
Affairs announcement seems to
loss of direct access to the AG,
in favour. Our politicians and
multi-agency ‘leak’ and espionage
have come out of left field and
except on warrant matters.
national security bureaucrats live
vulnerabilities, as has been
clearly favours Peter Dutton
seen with the Manning and
at the expense of the Attorney
happen because the Government
Snowden cases.
General (AG), George Brandis.
will force them to happen;
The Immigration side of the
however, there has been no
professor at the Centre for Military
Home Affairs
DIBP and some functions of the
expert review recommending the
and Security Law at the Australian
The Government also announced
AG’s Department are likely to be
changes, no support from the NIC
National University (ANU) and
on the 18th of July that it would
absorbed into Home Affairs.
for structural change (other than
an Associate Professor at the
from Immigration), while many
Australian Defence Force Academy,
past reviews have recommended
currently working in the UK.
establish a Home Affairs portfolio of immigration, border protection,
securitysolutionsmagazine.com
The AG has lost his supervisory powers over ASIO, the AFP, ACIC
The Home Affairs changes will
in interesting times! n Clive Williams is an honorary
SECURITY SOLUTIONS // 73
FEATURE
74 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
WAYS TO EXHIBIT LIKE A PRO BY WARWICK MERRY
In business, if you are not
sky is the limit. You then have
servicing the customer, you are
staffing costs, promotional items,
looking for new customers to
accomodation, travel, meals and
bring into your business. One way
onsite ‘surprise’ costs. It all adds
to do this is to exhibit at expos or
up very quickly.
exhibit at events as a sponsor. As a
Many businesses get
business owner, the question you
discouraged by the cost, but
MUST be asking yourself is: does
should not be. If you do it right,
exhibiting pay? And what better
exhibiting has proven to be one
time to ask this question than
of the most cost-effective ways to
right before the biggest security
market your business. The main
show of the year.
reason is that exhibiting is so
There are few ways in business
securitysolutionsmagazine.com
focused and the results are easily
that you can haemorrhage
measurable. Essentially, exhibiting
money as quickly as you can with
is speed dating. A bunch of people
exhibiting. For some shows, the
who want what you have turn up
booth space alone is five to ten
to a place where you will be and
thousand dollars. Realistically,
you have very quick conversations
your booth can start at a few
to see if you like each other and
hundred and from there the
want to take your relationship to
SECURITY SOLUTIONS // 75
FEATURE
the next level. You may not be surprised
the guest, either by some barcode, QR code or one of the new apps
to hear that the majority of
available on smartphones. The
exhibitors rarely evaluate the
second is to have a paper-based
success of their exhibiting effort
form of lead card.
by calculating the return on
It is not unusual to see the
THE UNFORTUNATE TRUTH IS THAT MOST LEADS COLLECTED BY EXHIBITORS ARE WASTED.
investment, return on objectives
staff on booths scan their mates
or return on energy. Their reasons
or other exhibitors because they
for being there are: “Well our
are ‘testing’ the scanners. More
competitor is here so we thought
often than not they are using
we should be too”, “It is good for
them to play cowboys and indians
our branding” or “We have always
and ‘shoot’ each other with the
done it and they gave us a good
scanners. Other booth staffers
deal”. To answer that essential
have simply scanned anyone
question of whether exhibiting
walking past. This results in a
pays, you need to make sure you
huge volume of unqualified leads
do the evaluations.
that all need to be followed up.
Stephen Covey talks about
just financially, but for other
Paper-based leads fare no better.
“beginning with the end
measurable reasons as well.
calculations you need to make
Too often, the lead cards are not
in mind”. What are you
Otherwise you will find
to ensure that you have made
complete, critical information is
exhibiting for? What are you
yourself at the expo again the
exhibiting pay for your business:
missing or it is simply illegible.
trying to achieve? Set a goal,
next year without making
Your leads are the most
share it with the team so they
Cost Per Lead (CPL)
a conscious decision about
valuable thing you will collect
know what they are there for
whether this is in the best
This is a very simple calculation.
when you exhibit, so there are
and then continually measure
Simply sum all of the expenses for
some key things you must do
your progress. What gets
the expo effort and divide it by
to maximise their value and
measured gets improved. It is
exhibiting. Too many people
the number of new leads you got
minimise your wasted resources:
no different for exhibiting.
are overconfident in their
at the show: CPL = total expense/
1. Select the right people to be
Here are some basic
number of new leads.
4. Listen to your guests. Whether
interest of your business. 7. Learn to get better at
skills. It is so important to ask
on the booth. Often, this is not
they are an existing customer
the questions, “What is new in
the sales people. Key staff from
Cost Per Acquisition (CPA)
or a prospect, you HAVE to
my industry?” and “Is there a
your team or select customers
listen better. Your customers
better way to be doing this?”.
can deliver fantastic results.
will tell you what they want.
Throwing a cloth on the table
This is another simple calculation
They just have to be passionate
They will tell you their
and having a few brochures
that can be done some time after
about your product, your
business pain. If you only listen
spread around is not enough.
the show. It is the same sum of all
service and your customers.
you will find significant details
You also do not need to spend
expenses from the CPL calculation,
Sales people are often too
about their business and how
divided by the number of new
busy checking emails, making
you can assist them to be more
If you do these things you will be
clients/sales you have made:
phone calls or following up
successful and enjoy success
able to determine if exhibiting
CPA= total expense/number of
‘normal’ sales deals to be
yourself. It may come as a
pays for you and your business.
new clients.
focused at the expo.
shock, but they really do not
Every event is different and
want to hear you regurgitate
every show is different. If you
your latest sales speil on them.
are discerning, focused and
These calculations can be done
2. Train your team. Too often, the
massive money to be effective.
per event and also for a period of
expo team are left to ‘get leads’
time. Research coming out of the
without training them on what
US-based Center for Exhibiting
the best methods are and how
to ignore the numbers. If you
you may find that it is your best
Industry Research (CEIR) has
to record them. Good training
can focus on the numbers,
form of marketing – many other
shown that when compared to
means that any sales lead will
measure your success
businesses have. n
traditional marketing forms such
be qualified. Ideally, they will
compared to your expenses
as advertising on TV and radio,
have some priority attached to
and calculate your return, you
exhibiting has one of the lowest
them – even if it is as simple as
will have more power over
More Guy’, an expert in how to
CPL figures.
A, B or C so the most important
being able to make the best
get more results. He is also the
get followed up first. New
decision in relation to your
co-founder of The Exhibiting
most leads collected by exhibitors
research from CEIR shows that
marketing efforts.
and Sponsorship Institute.
are wasted. There are essentially
only 30 percent of exhibitors
two key ways to collect leads. The
actually qualify their leads.
The unfortunate truth is that
first is to use technology to scan
76 // SECURITY SOLUTIONS
3. Measure your results. Dr
5. Do the numbers. It is too easy
6. Review your efforts. You
open to what exhibiting offers,
Warwick Merry is the ‘Get
Visit www.warwickmerry.com
have to ask yourself, “Has
or www.EASInstitute.com for
this been worthwhile?” Not
more information.
securitysolutionsmagazine.com
PRODUCT SHOWCASES
BOON EDAM SPEEDLANE SLIDE The harmony between graceful design and vital security features is a delicate balance that architects, engineers and facility managers are acutely aware of. Boon Edam’s Speedlane Slide, part of its Lifeline series of speed stiles, is one of its most functional entry solutions. It can provide a welcoming, yet secure entrance that guides only authorised personnel through the entrance to high rise buildings, corporate HQs, broadcasters, treasuries, diplomacies, embassies, legislature, parliaments and other government buildings. Boon Edam’s Speedlane Slide, which will be on display at this year’s Security Expo in Melbourne
(Stand G2 from July 25-27), is highly customisable to suit the diverse visual and security needs of building and facility entrances. Higher security options, disabled access and a large range of colours and finishes are all available in any possible combination to tailor the Speedlane Slide to each individual application. Other optional features include single lane or multiple lane set-up; jump-over detection sensors; barrier-free mode and an external control panel. Speedlane Features The Speedlane Slide – like its complementary Swing and Open models – has been designed
THE ALLINCLUSIVE FACE RECOGNITION SOLUTION 78 // SECURITY SOLUTIONS
to the highest standards and incorporates a range of modern features, including: • using unique sensors which detect visitors approaching • a sleep function to save energy • pulsing light strips to guide the user
• intuitive and proven symbols to make it user friendly • ergonomic design for customer comfort • customisation possibilities in fitting with interior design • premium quality materials. n For more information visit www.boonedam.com.au or call 1300 689 905
Cognitec’s FaceVACS-VideoScan
infrastructure; configuration
product, currently in use in
of the solution; funding and
various major casinos across
deploying the system — all
the globe, performs real-time
these components play an
matches against facial image
important part.
databases, and analyses faces to
Making them work
compute anonymous data about
together, and supporting
people count, age range, gender,
their continuous operation
and people movement in time
and maintenance, needs a
and space.
specialist face recognition
In short, Cognitec’s facial
company with a proven track
recognition system combines the
record in the gaming and
multi-faceted aims of security
entertainment industry.
and business insight in one comprehensive solution. But the software alone
Security may be the top concern for a casino or club when selecting a face recognition
won’t produce optimal results.
system, but a safe environment
Venues are looking for a
for all customers and employees,
cohesive, integrated system that
a profitable business, and
combines hardware, software,
support from the community,
and services, and that integrates
will provide true rewards for
seamlessly into their existing
investing in this leading-edge
systems and operations.
technology. n
Types of cameras, their positioning and tuning; high
For more information visit
performance server choice;
www.cognitec.com or call
setting up an optimal network
+61-2-9006-1510
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmagazine.biz/newsletter
EasyGate Elite One of the most recent products to arrive in Australia’s security solutions market is leading the charge in moving security gates beyond something purely functional, to something that adds to the look and feel of any space. Centaman Entrance Control’s awardwinning EasyGate Elite is among the most stylish and discrete security barriers available in the Australian market. At just 12cm wide and 140cm long, the EasyGate Elite’s slimline pedestals blend in seamlessly with any interior, while its bidirectional barriers range in height from 0.9m to 1.8m, depending on security requirements. The EasyGate Elite can also be customised to achieve a bespoke finish from an almost limitless choice of colours, textures and materials, allowing it to complement brand colours or a building’s interior design and features.
securitysolutionsmagazine.com
Popular customisation options include wing and edge lighting; pedestal tops made of coloured glass, Corian, stone, marble or wood; finishes for the metal panels such as polished, black or beaded stainless steel from Rimex; pedestal cladding materials such as stone, granite, wood or Corian; and changes to the shape, size or set-out of the speedgate. Centaman Entrance Control is the only provider offering such an extensive range of customisation options. The company’s in-house team of design experts can provide guidance and advice, as well as a 3D rendering service, allowing prospective customers to see how the EasyGate Elite might look and work in their space. However, the EasyGate Elite is more than just a pretty face. It features five safety and security settings, integrates with building
fire and emergency alarm systems and is fully compliant with Australia’s Disability Discrimination Act. What’s more, the EasyGate Elite also boasts 30 pairs of S-beam optical infrared sensors to prevent tailgating, a barrier opening time of 0.7 seconds and a mean time between faults of 3,000,000 operations. The EasyGate Elite comes with Centaman Entrance Control’s 36-month warranty for premium range products, triple the warranty period offered by many others in the sector, and with comprehensive customer care from Centaman Entrance Control’s 24/7 expert customer support team. n For more information visit: www.entrancecontrol.com.au or phone: +61 (02) 9906 7522.
SECURITY SOLUTIONS // 79
PRODUCT SHOWCASES
DAHUA DUAL-BIOMETRIC IDENTIFICATION TIME ATTENDANCE TERMINALS
Dahua Technology Co., Ltd
needed, users can add a card
quickly and cost-effectively.
government agencies, business
recently launched its new time
or password to provide multi-
Moreover, the DHI-ASA4214F
corporations and schools to
attendance terminals: the DHI-
factor authentication.
and DHI-ASA6214F can store up
plants, small retail stores, or
to 1,000 faces and 3,000 faces
restaurants. Powered by Dahua’s
respectively, with both units
unique Smart PSS system, the
able to store 30,000 different
new Dahua attendance terminals
identification for access
Rich functionalities simple to operate even for beginners
card holders, 3,000 fingerprint
support lock control, anti-pass
control and time attendance
Despite having multiple advanced
templates, and 150,000
back, interlock, first card,
in office scenarios, enabling
technologies, the new Dahua
transaction logs.
and six kinds of customisable
easy staff management and
attendance terminals are easy
security control.
to install. As the device supports
ASA4214F and DHI-ASA6214F. These highly intelligent devices support both face and fingerprint
attendance events, making it easy
infrared face recognition
users can choose wired or
Intelligent machine with personalised features
algorithms, these new time
wireless connection according
The new Dahua attendance
feature daylight saving time and
attendance terminals excel in
to their requirement. The new
terminals can be highly
NTP, which will be a great relief
poorly lit environments. Access
terminals also support P2P added
personalised thanks to the
for companies owning facilities in
to live face detection significantly
devices and 3rd party controller
addition of a wide range of
different time zones. n
improves safety, preventing
connection via Wiegand, allowing
intelligent features making
the use of “picture camouflage”
the property owner to build
these terminals ideal for use in
to deceive the system. If
comprehensive security systems
a variety of applications from
Embedded with advanced
80 // SECURITY SOLUTIONS
both TCP/IP and Wi-Fi connection,
for users to personalise their security protocols under different circumstances. The devices also
For more information visit www.dahuasecurity.com
securitysolutionsmagazine.com
F O L L O W U S O N I N S TA G R A M
instagram.com/securitysolutionsmag
For the latest news, products and events in the security industry
AXIS Q6155-E PTZ Network Camera
And with its ‘speed dry’ feature, the Q6155-E ensures crisp, clear images in rainy weather.
Sharp images. Low bandwidth. AXIS Q6155-E also features Axis’ Zipstream technology, which significantly lowers bandwidth and storage requirements while preserving high-quality images. Unlike most compression technology, Zipstream doesn’t just
High-speed PTZ with instant laser focus
Always in focus
Always in colour
limit bitrate. Instead, three kinds of
The Q6155-E’s built-in laser makes it
The Q6155-E utilises Axis’
intelligent algorithms ensure that
Ideal for city surveillance, critical
the fastest-focusing PTZ camera on the
Lightfinder technology which ‘finds’
relevant forensic information is
infrastructure and other applications
market. Under difficult circumstances,
light in the dark to deliver excellent
identified, recorded and sent in full
where instant focus on moving
like scenes with low light, low contrast,
image quality with superb detail and
resolution and at full frame rate. So
objects and fast-changing scenes
or point-shaped light, the Q6155-E
living colour. It also employs Axis’
the customer saves data space–and
is necessary, the AXIS Q6155-E
excels. Its 100% safe laser beam
Sharpdome technology which tilts
money–without sacrificing valuable
PTZ Dome Network Camera uses
measures the distance between the
the camera sphere at 39º, optimising
information. n
advanced laser technology to
camera and an object in a fraction of
image quality to ensure images
achieve flawless focus – even in
a second, delivering perfectly focused
above the horizon are as sharp and
the dark.
images every time.
clear as images below the horizon.
For more information visit www.hills.com.au
AMC K-LCD W900 Wireless Bi-Directional Keypad NFC With more than 30 years’ experience in
Like all AMC products, the K-LCD
the intrusion detection device market,
W900 Bidirectional Wireless Keypad
Italian manufacturer AMC have earned
was designed and manufactured in
a strong international reputation thanks
their production facility in Lurago
to their market leading design. And their
d’Erba, Italy.
new K-LCD W900 bidirectional wireless
Features include:
keypad looks to continue this trend
• Arm/disarm panel (in
of innovation. This wireless keypad is one of a
all configurations) • Not ready zones alert
host of bidirectional devices released in
• Bypass zones
recent months to complement the new
• Change/modify personal user code
XR900 wireless control panel. The keypad
• Allow technical access
supports both battery and wired power
• Log event reading
to give installers ultimate flexibility.
• Outputs triggering
It is equipped with a 32-character
• Tag readers management
LCD display across two lines as well as
• Battery powered (2 batteries AAA -
a programmable NFC/RFID tag reader.
Alkaline 1.5V) or external power (4
The tag reader makes it possible to arm/ disarm and enable/disable programmed
- 18 Vdc) • Dimensions: W 135, H 116, D 24 mm n
outputs. As it is a full bidirectional keypad, user can rely on real-time status
For more information visit:
updates of the system (not ready zones,
www.lscsecuritysupplies.com.au or
troubles, etc).
call 1300 646 269
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 81
STOPTALK Congratulations to Dahua Technology whose TPC-BF2120 Thermal Mini Hybrid Bullet Camera took 2nd place in the a&s Top 10 Popular Video Surveillance products. Dahua Technology TPC-BF2120 Thermal Camera - TOP 10 Most Popular Video Surveillance Products in 2017
The products on this list all
thermal imaging technology,
adhered to the strict guidelines.
which is ideal for dark, small
The ranking guidelines stipulate
area monitoring applications.
that all entries must have been
The series combines one thermal
uploaded to the asmag.com
camera for monitoring in total
database between January and
darkness and one visible camera
December of 2017. Second, the
with Smart IR for confirming
main purpose of the product
details. It also supports
must be for professional security:
behaviour analysis, fire detection
no Wi-Fi cameras, cube cameras,
and alarm functionalities.
DIY or cameras targeted at
Being recognised as one of
the smart home sector were
the 2017 top 10 popular video
included. Finally, only one
surveillance products is a
product per company was
strong recognition of Dahua’s
chosen. After a comprehensive
continuous effort on innovation.
assessment, Dahua’s TPC-BF2120
With a mission of “Enabling
thermal mini hybrid bullet
a Safer Society and Smarter
camera stood out and ranked
Living”, Dahua will continue to
The Top 10 popular Security
awards in the global security
second across a multitude of
focus on “Innovation, Quality,
Products by a&s, Asia’s largest
industry, and the top 10 video
entries with 45% views coming
and Service” to deliver world
source of information for security
surveillance products, based upon
from Asia.
class products and services
and automation, is one of the most
page views from asmag.com, was
Dahua Technology’s TPC-
watched and respected ranking
this year’s very first of this series.
BF2120 thermal camera uses
to customers and partners all around the world. n
Valen Energy solar panel poles for MOBOTIX cameras Valen Energy is now offering an
dig up the pavement at all, making
off-grid solar powered solution for
these poles great for public spaces,
MOBOTIX camera installations.
where underground services are
Their solar-powered poles, which
often a worry.
have already been widely used for
Solar is an ideal power source
street lighting across Australia,
for the cameras, particularly in
are now available in a specially
Australia with our high sunshine
pre-fabricated configuration for
hours and MOBOTIX cameras are a
MOBOTIX cameras.
particularly good fit, given their very
The lightweight aluminum
low power consumption and IP66
columns feature high-efficiency
certification for extreme outdoor
shatterproof glassless solar panels,
conditions. This off-grid solution
making them vandal-proof and
from Valen Energy has the potential
they are very easy to install. A pole
to significantly cut costs for outdoor
can be erected in as little as half
security camera installations. n
an hour and does not require any underground cabling. In fact, with
82 // SECURITY SOLUTIONS
For more information visit
a minimum foundation size of just
www.mobotix.com or call
300 by 500mm, there is no need to
+61 2 8507 2000.
securitysolutionsmagazine.com
L I K E U S O N FA C E B O O K For the latest news, products and events in the security industry
facebook.com/ssmaust
THE CAISSE D’EPARGNE ILE-DE-FRANCE BANK WINS THE BPCE “MAKE IT SIMPLE” AWARD WITH STID MOBILE ID®!
The “Mobile Pass Badge Virtuel
“We needed an innovative,
The CEIDF, systems integrator
smartphones, including in more
3.0” project integrating STid
practical and user-friendly
Synchronic and STid worked
regulated environments, such as
Mobile ID®, STid’s user- friendly
access control system. STid
together to quickly roll out
banking, which require higher
high-security access control
Mobile ID® is used for building
the smart solution with “test”
levels of security. “STid Mobile
solution, has received a “Make
security, to manage the flow of
installations of hundreds of
ID® leverages on the benefits
it Simple” award from the BPCE
thousands of staff and integrate
compact Architect® One Blue
of smartphones to create a
Banking Group.
all our applications into a single
readers. By 2019, this solution
unique user experience based on
system,” explains Guillaume
will be rolled out definitively to
intuitive identification methods
developed by STid, pioneering
MARTIN, Project Manager for the
all bank sites, including its head
that do not compromise user
leader in the design of secure
Caisse d’Epargne Ile-de-France
office in the 13th arrondissement
safety. Taking part in the “Make
solutions. It has reinvented
Security Department.
of Paris and its 455 bank
it Simple” contest organised by
branches. “Innovation is in our
the BPCE Group and winning
STid Mobile ID® is a solution
access control by integrating the
Security has also been
functions of a secure access card
simplified and improved,
DNA and the large-scale roll-out
this award has helped improve
within a smartphone. This user-
facilitating the management of
of over 1500 card readers with
the visibility of digital access
friendly solution has considerably
different branches without keys or
centralized management gave us
cards on the market. We are
improved the life of the 5,000
physical RFID cards. STid Mobile
extra motivation to ensure this
convinced that smartphones
employees and visitors at Caisse
ID® prevents the fraudulent
project was a complete success,”
will simplify identification and
d’Epargne Ile-de-France. They
use of data stored in the
explained Yves CLOUSIER,
significantly improve employee
can now use their smartphone
application through strong dual
Director of Technology and Sales
compliance with corporate
for all company applications,
authentication with the reader
at Synchronic.
security policies!” n
including building access,
and data encryption mechanisms
printing management and food
that establish a single-use,
CEO of STid, this new project is
services payments.
hidden exchange.
the result of the increasing use of
securitysolutionsmagazine.com
According to Vincent DUPART, For further information visit www.stid-security.com
SECURITY SOLUTIONS // 83
STOPTALK
dormakaba electromechanical locking solutions
dormakaba Pacific is proud
cobalt is available in a double
applications (up to 1000kgs
to introduce its new range of
door (SL30DBL) and Single door
holding force) or DB38 and
electromechanical locking
(SL30SGL) model as well as
DB38L (magnetic latching) for
solutions, with the introduction
various retrofit solutions and
heavy duty applications (up to
of the Cobalt side load locks,
suits vertical and horizontal
2000kgs of holding force, DB38L
drop bolts, roller door locks
installation. Offering a holding
for heavy duty applications with
and weather proof gate locks.
force of up to 1000kgs, a field
magnetic latching. As well as
Adding to an existing electric
adjustable fail safe/fail secure
DB25K for key override model.
strike and electromagnetic lock
option, door status and lock status
Accessories available include
range, dormakaba Australia can
outputs. Accessories available
surface fix mounting boxes and
now truly offer a comprehensive
include surface fix mounting
dress plates suitable for frameless
solution for electromechanical
boxes and dress plates suitable for
glass doors and timber or metal
locking requirements.
frameless glass doors and timber
constructed doors.
or metal constructed doors.
Cobalt Side Load Locks
Roller Door/Gate Lock
The Cobalt series of side load
Drop Bolts
locks boasts the ability to unlock
The DB series of drop bolts
offers an uncompromised
addition to this the GL10 offers a
with up to an impressive side
provides a comprehensive range
solution, achieving the right
weather proof solution with an
load pressure of 100kgs (powered
and offers unique optional
balance of physical strength and
IP65 rating. n
and un-powered). In addition
magnetic latching options to
function required to secure your
to this its unique motor driven
minimise misalignment issues
roller door, vehicle or pedestrian
To learn more about the
bolt design will pull a misaligned
inherent with the drop bolt locks.
gate. Both Roller door lock (RD10)
new rage of electromechanical
door in either direction by
Available as DB25 and DB25L
and Gate Lock (GL10) offer up to
solutions, please visit
up to 8mm (total 16mm). The
(Magnetic latching) for regular
3000Kg of holding force and in
www.dormakaba.com.au
84 // SECURITY SOLUTIONS
The roller door and gate lock
securitysolutionsmagazine.com
STOPTALK HILLS TO DISTRIBUTE DAHUA AS IT STRENGTHENS SECURITY PORTFOLIO Hills Limited (ASX:HIL) announced
over 180 countries and regions.
portfolio and create opportunities
today it has broadened its security
Its core video surveillance product
for sales and growth,” Mr Lenz said.
this partnership with Dahua
product offering and strengthened
line, including network cameras,
“As one of the largest value-
to provide solutions for our
its position as a complete solution
NVRs and HD over coax, are used
added building technologies
provider in the security sector by
across banking and finance,
distributor in the ANZ region, we
signing a distribution agreement
government, transport and
have a deep understanding of the
Director, Lyn Cheng, said Hills was
with Zhejiang Dahua Technology
retail sectors.
industry and what end-users want.
ideally suited to support Dahua’s
We see the Dahua product fitting
brand growth across ANZ.
Co., Ltd. (Dahua Technology) to
Hills CEO and Managing
“We look forward to developing
customers,” Mr Lenz added. Dahua Oceania Managing
market their range of integrated
Director, David Lenz, said signing
seamlessly alongside our existing
security technology solutions across
Dahua would round out the
brands and integrating with other
with Hills. They are a visionary
Australian and New Zealand (ANZ).
company’s security offering
vendor solutions like Genetec.”
distributor with solid support
Dahua Technology is one of
“Dahua is pleased to partner
and give Hills the opportunity
“Dahua offers one of the widest
the world’s leading providers of
to compete across all markets,
product ranges in the industry, with
region and demonstrate a deep
security and video surveillance
from low cost to enterprise
technologies that can interface and
understanding of security and video
equipment. Established in 2001,
level solutions.
integrate into existing analogue and
surveillance. We look forward to a
future IT-based infrastructures. It’s
long and successful partnership.”
the company has grown rapidly to
“Hills continues to build and
infrastructure across the ANZ
become the second largest global
invest in our security business,
an exciting opportunity to bring that
provider of video surveillance
attracting global technology leaders
expertise and innovation to the ANZ
visit https://au.linkedin.com/
products and services, supplying
with products that reinvigorate our
market,” Mr Lenz said.
company/dahua-australia n
86 // SECURITY SOLUTIONS
For more information, please
securitysolutionsmagazine.com