Security Solutions Issue #113

Page 1

A U S T R A L A S I A’ S L E A DI N G S E C UR I T Y R E S OUR C E F O R BU S I N E S S A N D G O V E R N ME N T

JULY 2018 ISSUE 113

HOW WILL

MACHINE LEARNING CHANGE SECURITY?


PA S 6 8 & I WA T E S T E D G U A R A N T E E D

W W W. E


25 YEARS OF BUILDING SMART AND SECURE OUTDOORS E zi Security Systems designs, manufactures and installs a premium range of perimeter security solutions for both vehicle and pedestrian access control, with specialised expertise in Hostile Vehicle Mitigation and protection of Crowded Spaces. With core competence established over 25 years, Ezi Security Systems provides innovations of our own invention, and via alliances with undisputed world leaders in our field, deliver sophisticated solutions at the leading edge of global technology. Over the past 5 years the world has changed dramatically. In collaboration with our strategic business partners, Ezi has responded with focus, mitigating hostile vehicle threats with our Crowded Spaces range of products. Ezi offers permanent solutions for risk categories from low to extreme, as well as rapid deployment products for crowded spaces and public events, such as the Impakt and Rapid Defender products.

Z I S E C U R I T Y. C O M . A U

All Ezi Security Systems Hostile Vehicle Barrirer solutions have been rigorously crash tested and certified to meet requisite ASTM, IWA and PAS 68 stipulations. Along with our global partners, Ezi Security Systems actively collaborate in the development and deployment of contemporary strategies such as VAAW (Vehicle as a Weapon) mitigation, deploying whole of environment solutions. Ezi have solutions to meet your very highest security requirements whilst maintaining an aesthetically compatible solution for your site. You can be confident that when serious security is your requirement, you need look no further than Ezi. We stand ready to be of expert service in an ever evolving environment, as global security risks increasingly demand local solutions.

1300 558 304 11 Cooper Street Smithfield, NSW, Australia 2164 sales@ezisecurity.com


ISSUE 113

FEATURES

40

24

CONTENTS

78

50

46

28

COVER STORY

Artificial Intelligence (AI) is transforming every industry it touches, from healthcare to transportation to agriculture. So it should come as no surprise that the security industry is starting to be transformed through AI as well. In fact, security, automotive and healthcare are in the top tier of industry verticals to benefit from this amazing technology. Security has some major influences driving the adoption of AI, including the increasing threat of terrorism and more sophisticated security perpetrators. What exactly is AI and what role might it play in the future of security?

24 STANDARDS INCREASING SECURITY

We look at the role of Standards Australia in the evolution of security in Australia. What are they doing in the areas of traditional security standards and how are they innovating in response to the needs of the sector, including developing standards at an international level?

44 FAMILIES THAT SLAY TOGETHER

Anne Speckhard and Adrian Shajkovci of the International Center for the Study of Violent Extremism (ICSVE) look at the recent terrorist incidents in Indonesia – three nearly simultaneous suicide attacks on three separate churches in Surabaya, all carried out by members of the same family.

48 UNDERSTANDING AUSTRALIAN BUSINESS ATTITUDES TO CYBER SECURITY

We look at the results of the BDO and AusCERT 2017/2018 Cyber Security Survey which delivers insights into the cyber resilience and maturity of Australian and New Zealand businesses, as well as the cybersecurity risks and realities faced by Australian and New Zealand businesses across a range of organisation sizes and industry verticals.

64 PERSONAL PROTECTION IN THE LAND

OF THE DRAGON

Paul Johnstone looks at the booming private protection industry in China.

68 SEVEN WAYS TO EXHIBIT LIKE A PRO

Get all the information you need to make your visit to this year’s Security Expo and Conference in Melbourne a success.

62

REGULARS 06 LETTER FROM THE EDITOR 08 LEADERSHIP

How can you lead through empowerment?

10 STRATEGY

32 OPERATIONS

Richard Kay examines the value of reality-based training.

36 BUSINESS

How can you keep your business relevant in a rapidly changing industry?

What is the relationship between enterprise risk management and security?

52 AVIATION SECURITY

12 CYBER SECURITY

56 ACCESS CONTROL

14 HUMAN RESOURCES

60 PROFESSIONAL DEVELOPMENT

What is a cyber resilience assessment and why do you need one?

Greg Byrne examines the responsibility of employers regarding superannuation.

16 RISK MANAGEMENT

Do body scanners work?

How will Access Control as a Service (ACaaS) change the industry?

We present the first of a two-part special on behavioural interviewing.

72 EVERYDAY CARRY

Kevin Foster explores the foundation for a dynamic model of risk control.

As an active security operative, you need to be prepared. We look at some of the best everyday carry gear for security professionals.

18 LEGAL

76 PRODUCT SHOWCASES

Justin Lawrence looks at what happens when a business fails.

20 THINKING ABOUT SECURITY

Don Williams looks at the latest Australian New Zealand Counter Terrorism Committee guidelines for protection of crowded places.

80 SPOTLIGHT 82 SHOP TALK

Company announcements from within the industry.

22 EVENTS CALENDAR

A look at upcoming industry events.

4 // SECURITY SOLUTIONS

securitysolutionsmagazine.com



FROM THE EDITOR FROM THE EDITOR www.securitysolutionsmagazine.com

EDITORIAL www.securitysolutionsmagazine.com

EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon

Jason Brown, Tim Rippon, Bob Ansett, Greg Byrne, Kevin Foster, Justin Lawrence, Don Williams, Scott CONTRIBUTORS McGrath, AnnaJason Silwon, Richard Anne Speckhard, Garry Barnes, Brown, GregKay, Byrne, Kevin Foster, Adrian Johnston, McGiffin, Steve RichardShajkovci, Kay, StevePaul Lawson, JustinJohn Lawrence, Scott Lawson, Scott Lindley, Elly Johnson O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Anne Speckard, Alex Sidernko, Ardian Shajkovci, Ami Toben, Simeon Votier

ADVERTISING

Keith Rozairo PHONE 1300 300 552 ADVERTISING Keith Rozairo EMAIL keith@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL keith@interactivemediasolutions.com.au Jonathan Rudolph DESIGN1300 AND300PRODUCTION PHONE 552 Jonathan Rudolph EMAIL graphics@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL graphics@interactivemediasolutions.com.au

DESIGN AND PRODUCTION

MARKETING AND SUBSCRIPTIONS PHONE 1300 300 552 MARKETING AND SUBSCRIPTIONS EMAIL admin@interactivemediasolutions.com.au PHONE AUD 1300inside 300 552 $62.00 Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues) EMAIL admin@interactivemediasolutions.com.au $62.00 AUD inside Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues)

ACCOUNTS PHONE 1300 300 552 ACCOUNTS EMAIL accounts@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL accounts@interactivemediasolutions.com.au

PUBLISHER PUBLISHER

ABN 56 606 919463 Level 1, 34 Joseph St, Blackburn, Victoria 3130 ABN 56 606 919463 PHONE 300 552 Level 1,1300 34 Joseph St, Blackburn, Victoria 3130 EMAIL PHONEenquiries@interactivemediasolutions.com.au 1300 300 552 WEBSITE www.securitysolutionsmagazine.com EMAIL enquiries@interactivemediasolutions.com.au WEBSITE www.securitysolutionsmagazine.com DISCLAIMER The publisher takes due care in the preparation of this DISCLAIMER magazine and takes all reasonable precautions and

The publisher takes due care in the preparation of this makes all reasonable effort to ensure the accuracy magazine and takes all reasonable precautions andof material in effort this publication, butaccuracy is not liable makes allcontained reasonable to ensure the of for any mistake, misprint omission. but Theispublisher material contained in thisor publication, not liable does notmistake, assume any responsibility or liability for any for any misprint or omission. The publisher loss or damage which may result from any inaccuracy does not assume any responsibility or liability for any or omission in this publication, orfrom fromany theinaccuracy use of loss or damage which may result information herein. The publisher makes or omission contained in this publication, or from the use of no warranty, express or implied to any of the information contained herein.with Therespect publisher makes no material contained herein. warranty, express or implied with respect to any of the material contained herein. The contents of this magazine may not be reproduced in ANY form in OR in part without The contents ofwhole this magazine may not be WRITTEN reproduced permission from the publisher. Reproduction includes in ANY form in whole OR in part without WRITTEN copying, photocopying, translation or reducedincludes to any permission from the publisher. Reproduction electronic medium or machine-readable form.to any copying, photocopying, translation or reduced electronic medium or machine-readable form.

WRITTEN CORRESPONDENCE TO: WRITTEN TO: Level CORRESPONDENCE 1, 34 Joseph St, Blackburn, Victoria 3130 

It would seem, according to many of the

world is changing rapidly.

world’s leading experts in AI, that the difference

Long-established oes Australia really technologies take security and professions are giving wayclaims to new seriously? Yes, Government

and exciting fields endeavour and to, andofsome of the corporate technologicalsector advancement faster than many demonstrate a passing industries can keep up. Just aswhat analogue interest from time-to-time, but of thesecurity systemsman gaveand way to digital technologies, new average woman on the street? Do we IP-basedtake systems are seriously rapidly displacing honestly security or do we, more as a

between ado bright in whichattitude life is safer Australian’s have future a very relaxed morebecause secure, they or a world inrightly which or we are all toand security believe, nuked out Skynet, could be as wrongly, thatof “itexistence will neverby happen here”. This as the of autonomy giventrue. to is simple a sentiment welevel can only hope remains AI-based Do we let intelligent However, assystems. the old axiom states, one should machines and how they always expect thesystems best butdetermine plan for the worst and will react tosurprised. a given situation and, if so, what prepare to be level of control will wenot allow them over the Of course, one should have to rely upon

traditional coax-based systems. Similarly, the nation, just pay lip service to the idea emergence of security? of Deep Learning and Artificial

actions For example, if a to drone some formtaken? of devastating incident occurisinable to

Intelligence (AI)2018, are set replace of the As we enter weto should be many thankful that

circle major to event use AI to identify order to over forceapeople takeand security seriously.

existing technologies we view as cutting edge. Australia has never suffered a major terrorist

potential threats warn security There is a great dealand thatthen the security industry

incident the likesnow, of 9/11, the only Boston bombings, Ten years from one can begin to

can do to educate the business community services of those threats, that would beabout an

the bombings of July 2005 inand London or the imagine the sorts of 7, systems technologies

the benefits of taking security seriously. improvement in security. However, inIn a past more

terrorist of October 12, 2002 in Bali. that willattacks have become commonplace.

issues Security Solutions Editor-At-Large Rod extreme example, what if the drone determines

However, as a result, Australian community The 2002 Steventhe Spielberg movie Minority

Cowan has written about can act as the detected threat to how be a security suicide bomber,

has become somewhat complacent with regard Report, starring Tom Cruise, demonstrated

a differentiator and give companies and believes for thatbusiness the suicide bomber is within

to security. I often hear many of our readers the use of gesture control, amongst other who are security managers within large corporations technologies, which at the time seemed so

a competitive edge. seconds of detonating an explosive? Should the

comment onfuturistic the differences between Now, attitudes amazingly and innovative. less to security in Australia and America, where they than two decades later, gesture control has

If we be have learned from tragic drone fitted withanything the capability to neutralise events that have occurred globally in recent such a threat? If so, should the drone be given years, it must be that the world has changed – the autonomy to make split-second decisions

often have to travel and According to many become a common waywork. of life. From smart TVs in security managers, Americans understand that and our homes to smartphones, tablet computers

permanently – andorwe cannot keep pretending about whether not it is necessary to that it has not. 9/11 was not an isolated incident I neutralise the threat and then act accordingly?

terrorism a clearand andbrowse presentinformation danger andwith a so on, weisaccess a fact of daily life and thus, they treat security flick of the wrist, we choose potential dates by

and groups way, such amifsure youlike canISIS seehave the their difference. attacks will become much more frequent. There To help better understand AI and how our

and security workers with the due respect. In swiping left or right and we zoom in and out of contrast, they believe that Australian’s have a images and text with a pinch of our fingers. very blasé attitude towards security and it is this Imagine a world in which intelligent software attitude that makes us much more vulnerable is able to sort through petaflops of information to attack. from thousands of sources in the blink of an In my opinion, having recently travelled eye to identify people intent on doing harm or through Egypt and Jordan, they are correct. committing unlawful acts. Those same resources

is a great deal more work to be done to ensure security systems are getting smarter, we asked that we create the kind of effective security John McGiffin of Deep Recognition, experts culture within organisations and the broader in the field of deep machine learning and community that will enable Australian’s to be systems, to write this issue’s cover story. John safe and secure. And the work must begin with has provided a great introduction to how AI and security professionals. Let’s make 2018 the year deep machine learning work to help people that Australia begins to take security seriously. n like me get their head around where the future

could then more accurately direct security

of security technology is going. Be sure to

resources to maximise their effectiveness

check it out. If you are attending the Security Expo from

and provide better security outcomes. The possibilities are both exhilarating and terrifying

25th–27th July in Melbourne, be sure to drop by

at the same time.

and say hi. n

SSOCIATI RS A ON DE O VI

RALIA LTD

SECURIT Y

PR

UST FA

O

Level300 1, 34 Joseph St, Blackburn, Victoria 3130 1300 552  1300 300 552 enquiries@interactivemediasolutions.com.au   enquiries@interactivemediasolutions.com.au

M D

uch like Security Solutions, the

Official Official Partners Partners O C I AT I

ON

Y P R OVI D RIT

CU SE

STRALIA LTD AU

PR O

ASS

SPAAL D LT

OF

SECURITY

RS

AU S T R A L I A

SSOCIAT IO N

OF

E

Original Size

RS A DE VI

blue colour changed to this colour green.

COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE signing your approval to print. Please pay special attention to spelling, punctuation, dates, times, telephone numbers, addresses etc, as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman Press assumes no responsibility for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................

// SECURITY SECURITY SOLUTIONS SOLUTIONS 46 //

John Bigelow John Bigelow Editor Editor

securitysolutionsmagazine.com securitysolutionsmagazine.com


SECURE YOUR DATA & EQUIPMENT

A data enclosure is your last line of defence, so it needs to be strong enough to stop unauthorised access. CER TIF IE CLASS C

D

The MFB range of Class B and Class C enclosures are purpose built frames fitted with key locks and boltwork approved by the Australian Government Security Construction and Equipment Committee (SCEC)

INATION LOCK MB S CO

All enclosures are fitted with tamper evident cable entry systems, high impact clear polycarbonate panels on doors, secure venting systems and certified combination locks. CLASS B

An alternative product, the MFB range of High Security enclosures provides a lower level of security and is not SCEC approved. Effectively construction methods mirror the Class B and Class C series, however the doors are fitted with a cheaper bilock keying system. Also additional flexibility with the design regarding cable entry encourages effective quick installation and high volume data cable installations. With over 50 years in the business, and backed by the SCEC approval for manufacture, these Australian built 19”rack mount enclosures provide peace of mind in relation to the security your

data needs.

DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS

www.mfb.com.au

VIC (03) 9801 1044 / sales@mfb.com.au

AUSTRALIAN MADE MAKES AUSTRALIA NSW (02) 9749 1922 / sydney@mfb.com.au

fb.com/mfbproducts


LEADERSHIP

LEADING BY EMPOWERING BY BOB ANSETT

F

or many, the thought

restraint to keep from meddling

do. If this is not possible for some

of a leader

with them while they do it.”

reason, make sure they understand

have the right attitude. Insecurity

To empower people, you must

empowering

Great leaders know the value

the overall purpose of the task.

will cripple your ability to empower

followers to make

of involving people as much as

This includes defining exactly

others. You cannot be afraid. Do

decisions is almost a contradiction

possible in all aspects of work

what you want them to do. Then

not let the fear of empowering a

in terms. The common perception

and planning decisions. This is

ask questions, watch the tasks

person make you feel like you will

of leadership is that of the

because involvement increases

performed and have the individual

be displaced. Empowering people is

micromanager who finds it difficult

ownership commitment and fosters

assigned the responsibility give

incredibly fulfilling in so many ways.

to empower others to take decisive

an environment in which people

you feedback to make sure your

When you empower people, you are

steps and accept the responsibility

choose to be motivated and to

instructions were understood.

not just influencing them; you are

that goes along with it.

contribute. It is also a key element

But hey, wait a minute! When we

in team building. As a leader, you

look through the annals of history

are ultimately accountable for

and examine the role of great

the performance of your team, so

leaders, we inevitably discover the

you must have in place a method

really great ones were effective

for holding your team members

delegators. Here is a brief sample

accountable for the roles they play

of what some of them have to say

in the organisation.

about empowerment: • Bill Gates – “As we look further

It takes time and commitment to build a team that is based on

influencing all those around them. In essence, great leaders succeed in delegation by: • providing clear instructions to their followers • describing clear expectations of the task at hand • allowing their team members to make decisions • providing clear deadlines for

And it is always useful to remember there is no success without a successor. So, the process of empowering others is critical to the achievement of the overall objective. In the final analysis, delegation is a critical aspect of leadership, which is defined as a process whereby an individual influences a group of

into this century, great leaders

trust, respect and hard work. It is

will be those who empower

not always easy, but the pay-off is

• setting up their followers for

goal. The effective leader intuitively

others.”

worth the effort. When the going

success through playing to

knows that delegation of tasks and

gets tough and you hit a snag in

their strengths.

responsibilities to others expands

• Abraham Lincoln – “Nearly all

task completion

individuals to achieve a common

men can stand adversity, but

your delegation process, do not

Effective leaders trust and believe

his/her capacity to take on even

if you want to test a man’s

throw in the towel. Analyse what

their followers are going to

greater responsibilities and thus

character, give him power.”

went wrong and what needs to

succeed until proven differently.

become a better leader. n

change to fix it. Getting an effective

When failure does occur, they

tell people how to do things.

delegation mindset can take time,

first look to themselves to see if

Tell them what to do and they

but once you have clarity on what

they provided clear expectations,

Ansett Marketing, a consulting firm

will surprise you with their

you should and should not do to

direction and the tools necessary

in the field of customer service. Bob

ingenuity.”

manage your team, you are on the

for the delegated task to be

is also a familiar name in Australian

path to delegation success.

completed successfully. Great

business, synonymous with Budget

leaders know that the buck stops

Rent a Car, which he established in

• General George Patton – “Never

• Theodore Roosevelt – “The best leader is the one who has sense

When delegating

Bob Ansett is the founder of Bob

enough to pick good men to do

responsibilities, where possible,

with them. Micromanagers tend to

1965. Bob can be contacted at

what he wants done, and self-

give the recipient a whole task to

assign blame.

bob@bobansett.com.au

8 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Intelligent security solutions from Dahua Technology Discover Dahua, a world leader in video surveillance, offering high value total security solutions to safeguard assets, communities and infrastructures.

now available at Hills! Unified Management Platform Video Surveillance

Unified UnifiedManagement Management Platform Platform Video VideoSurveillance Surveillance

Unified Management Platform Video Intercom Video Intercom

Video Surveillance - Advanced video collecting and analysing - Wide coverage w/o blind angle

Video Surveillance Video Surveillance

Unified Management Platform Unified Management Platform

- Advanced video collecting and analysing - Advanced video collecting and analysing - Wide coverage w/o blind angle - Wide coverage w/o blind angle

- High reliability with low running cost - High reliability with low running cost - Scalable and customisable - Scalable and customisable

HSS0031-July18-version 1

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au

facebook.com/HillsLtd/ CONNECT

E N T E RTA I N

SECURE

- High reliability with low running cost - Scalable and customisable

Video Intercom Video Intercom - Support both IPIP and Analogue - Support both and Analogue - Attractive design - Attractive design


STRATEGY

ENTERPRISE RISK MANAGEMENT AND SECURITY Good risk management can result in value creation and contribute to sustainable organisational performance that helps organisations achieve their strategic objectives. It must permeate all levels of an organisation and hence it needs to be addressed.

of updating guidance and developing supporting materials, where appropriate. Enterprise Risk Management — Integrating with Strategy and Performance provides a framework for boards and management in entities of all sizes. It builds on the current level of risk management that exists in the normal course of business. Further, it demonstrates how integrating enterprise risk management practices throughout an entity helps to accelerate growth and

Risks at an Enterprise Level

all the activities of an organisation; it

with a right and wrong answer.

enhance performance. It also contains

In the case of security, there are a range

is a responsibility of all employees.

Organisations encounter challenges

principles that can be applied, from

of malicious actors who will endeavour

Legislation, regulation and governance

that impact reliability, relevancy and

strategic decision making through

to achieve their own goals at the expense

codes expect appropriate evidence of

trust. Stakeholders are more engaged

to performance.

of the enterprise, and often society as

responsible risk management processes

today, seeking greater transparency

Risk is not an easy term to define,

a whole. Security professionals must

being applied and managed across all

and accountability for managing the

so there are various definitions. While

ensure that the risks they seek to control

areas of the organisation’s activities to be

impact of risk while also critically

risk is often considered in terms of the

and mitigate are adequately addressed

available on an ongoing basis, with clear

evaluating leadership’s ability to

likelihood of something happening

throughout the enterprise, hence

communication on policies, procedures

crystallize opportunities. Even success

and the severity of the outcome, risk

an understanding of enterprise risk

and processes expected.

can bring with it additional downside

as a concept is more complex, and that

risk – the risk of not being able to fulfil

complexity needs to be understood.

management is important. In the first of

The Changing Risk Landscape

unexpectedly high demand, or maintain

examine the role of risk management

The 21st century multi-polar, hyper-

expected business momentum, for

of uncertainty on objectives’, where

in the enterprise and burrow down to

connected, social media driven, fast-

example. Organisations need to be more

uncertainty may relate to a deficiency

frameworks for managing security risks

paced world in which we live presents

adaptive to change. They need to think

of information, understanding or

at all levels of enterprise.

an environment in which we need to

strategically about how to manage the

knowledge of an event, its consequences

understand and master complexities and

increasing volatility, complexity and

or its likelihood. When making decisions

uncertain, chaotic and ambiguous.

uncertainties on a scale never before

ambiguity of the world, particularly at

as part of managing risk, it is important

These elements collectively feed the

encountered by the average person.

the senior levels in the organisation

to remember that this is not an absolute

and in the boardroom where the stakes

science; it is about managing uncertainty

are highest.

to achieve objectives that may include

what will be a series of articles, we will

We live in a world that is volatile,

uncertainty which plagues decision

Business models from the most

ISO 31000 defines risk as the ‘effect

makers seeking to get the best results.

sophisticated in banking to the most

Organisations of all sizes and types need

rudimentary in transportation in the

to recognise and manage the uncertainty

developed world and financial services in

Risk Management Frameworks

objectives. Risk is also circumstance-

present in the world and impacting

the underdeveloped, are being disrupted

The management standard ISO 31000

specific and has to be dynamic, iterative

all organisational activities in order

as never before. Survival today requires

provides a risk management framework

and responsive to change.

to optimise performance. Developing

agility, flexibility and automation.

that supports all organisational activities,

insight into how risk may affect the

The Global Financial Crisis

social, environmental and economic

Such uncertainties may relate

including decision making at all levels

to technical and human factors;

objectives of organisations and their

(GFC) of 2008 and the international

of the organisation. The ISO 31000

environmental impacts; social

stakeholders, and managing this well, is a

failure to achieve strategic

framework and its processes should be

benefits; economic factors, such as

key performance factor that contributes

objectives in Afghanistan, Iraq and

integrated with management systems to

the cost of energy, commodity prices

to the success of the organisation. Good

Syria powerfully demonstrated

ensure consistency and the effectiveness

and exchange rates; geological and

risk management is an expectation of all

complex interdependencies which

of management control across all areas of

climate conditions; and political

stakeholders, both internal and external.

were not understood by even the

the organisation.

risks. To manage risk effectively,

To build sustainable performance, organisations have to clearly understand the relationships and links between

most sophisticated organisations and countries. This changing risk landscape, our

The principle objective of the

uncertainty and unpredictability must

International Standards Committee ISO/

be recognised and information gaps

TC 262 – Risk management is to help

filled to reduce uncertainty. In addition

their objectives, strategies and risk

understanding of the nature of risk,

organisations ensure their viability and

to comprehensive technical work, this

management processes in the interests

and the art and science of choice lies

success over the longer term in the

requires engagement with relevant

of all stakeholders.

at the core of our modern economy.

interests of all stakeholders by providing

stakeholders who will have different

Every choice we make in the pursuit

good risk management practice. The

perceptions of uncertainty.

has overall accountability for the

of objectives has its risks. As we

committee regularly reviews the needs of

management of risk. The management

seek to optimise a range of possible

end-users and risk professionals, across

Enterprise Risk Management Model and

of risk should be integrated across

outcomes, decisions are rarely binary,

markets and sectors, with the intention

look to specific security examples. n

The board, or its equivalent,

10 // SECURITY SOLUTIONS

In the next article I will expand on the

securitysolutionsmagazine.com


The Cobalt is an innovative low voltage motor driven door lock for swing doors. It has been designed to secure double acting doors and addresses the two biggest issues in door locking; the ability to align a misaligned door and the ability to release when requested, even with excessive load on the door. The Cobalt successfully overcomes these issues and offers the user an array of other features. To learn more about our complete range of smart and secure access solutions, contact dormakaba.

T: 1800 675 411 www.dormakaba.com.au

More than just a lock


CYBER SECURITY

WHY YOU NEED A CYBER RESILIENCE ASSESSMENT BY TIM RIPPON

C

ybersecurity is the

clients, ensuing lawsuits, along

preservation of

with the significant reputational

of-service attacks, including the

confidentiality,

damage, is real and may result in

takedown of entire websites

integrity and

this company suffering huge losses,

• unwanted disruption or denial-

• changes to the characteristics of

availability (CIA) of all electronic

with a real potential that it may

a computer system’s hardware,

information (digital assets) in

have to cease trading.

firmware or software without

the cyberspace.

All company executives and

the owner’s knowledge,

organisation’s cybersecurity program • development of strategy and budgets for future business plans and objectives • recognition if the business is already compromised

Cyberattacks, including the

the leadership teams are under

hacking of business websites and

increasing pressure to prevent

The procedures for investigating

computer systems, are becoming

these attacks and must act

and responding to a cyberattack

increasingly common. These attacks

immediately to contain any damage

usually depend on the nature

can be extremely damaging to

once an attack occurs.

of the attack itself and how

A conversation with your

businesses, particularly if security is

A cyberattack, as most

instruction or consent.

• identification of critical supplier dependencies • improvement of cyber awareness culture.

prepared an organisation is for

cybersecurity staff or a trusted

breached and confidential business

readers will be aware, is an attack

such an attack. The response

consultant can commence the

and personal data becomes

initiated from a computer against

taken by the business will depend

journey to becoming more cyber

compromised. Cyberattacks, and

a website, computer system

on the maturity, awareness and

resilient, with the first step

the resulting security breaches,

or individual computer that

senior leadership endorsement

progressing through an essential

are part of a rapidly expanding

compromises the confidentiality,

for cybersecurity.

cyber resilient assessment that

international cyberthreat that costs

integrity or availability of the

companies and taxpayers billions of

computer, or information stored

assessment has many benefits and

dollars each year in lost information

on it. Cyberattacks take many

may enable:

and downtime, impacting staff

forms, including:

• continuity of critical business

productivity and the bottom line.

• unauthorised use of a computer

In the current local media, we have observed the fallout of thousands, if not millions, of

system for processing or storing data • installation of viruses or

records breached by an Australian

malicious code (malware) on a

software-as-a-service vendor that

computer system

has provided human resources

• gaining, or attempting to

(HR) software to many well-known

gain, unauthorised access to a

companies and government

computer system or its data

agencies. This one breach has the

• inappropriate use of computer

recruitment industry standing up

systems by employees, former

and taking note. The threat of losing

employees, or agency staff

12 // SECURITY SOLUTIONS

Conducting a cyber resilience

process • informed cybersecurity decisions to be made • identification of vulnerabilities and mitigation of risks • alignment of cybersecurity with the business plan • compliance with regulatory,

determines what is already in place to protect your digital assets. n Tim Rippon is the founder and director of elasticus, advising Australian-based executives on how to best manage cybersecurity, disaster recovery and business continuity before a major disaster or crisis occurs. He holds a certified Master of Information Security (ISO 27001), certified Master of Business

legal and compliance

Continuity (ISO 22301) and Lead

obligations

Cyber Security Manager (ISO 27032)

• understanding of the effectiveness of the

from PECB. Tim can be contacted via mobile 0417 036 026.

securitysolutionsmagazine.com


YO UR AC CES S TO REVO LUTI O N

FlowMotionÂŽ

For more information | 1300 364 864 | info@magnetic-oz.com | www.flowmotion-access.com |


HUMAN RESOURCES

THE RESPONSIBILITY OF EMPLOYERS TO PAY SUPERANNUATION BY GREG BYRNE

he compulsory

bills that proposed employers

compliance obligations. If any of

payments to the appropriate

employer

who disobey ATO directions to pay

your employees earn more than

superannuation fund(s) within

contribution scheme

superannuation entitlements be

$450.00 per calendar month, you

the 28-day requirement. SG

was introduced in

subject to court-ordered financial

must, as a minimum, pay each of

obligations are not satisfied on

1992 by the Keating Labor

penalties as well as up to 12 months

your employees the SGC, which as

payment to the clearinghouse;

Government. The reform created

imprisonment. All directors will also

at May 2018 is 9.5 percent of their

they are met when the

the Super Guarantee Charge (SGC)

be issued a director identification

ordinary time earnings. The SGC will

superannuation fund receives

obligation and was part of a more

number that will enable the ATO to

increase to 10 percent on the 1st of

the contributions, with the

comprehensive reform package.

identify those directors who are not

July 2021 and to 12 percent on the

exception of the Small Business

The Government’s intent was to

paying employee superannuation.

1st of July 2025.

Superannuation Clearing House.

T

ensure the financial future of all

The superannuation compliance

(see ato.gov.au/rates/key-

Most clearinghouses require up

Australians and to ease the burden

bills also propose making single

superannuation-rates-and-thresh

on Australia’s strained welfare

touch payroll mandatory for all

olds/?anchor=Superguaranteeper

Advice from AHRI is for employers

system into the future.

employers from the middle of

centage)

to conduct a review of their

Despite this, on the 30th of

2019. Superannuation funds will

Research conducted by the

to 10 days to process.

processes and payments to ensure

August 2017, the Australian Taxation

also be required, from the middle

Australian Human Resources

they are complying with their legal

Office (ATO) announced that $17

of 2019, to report to the ATO every

Institute (AHRI) identified areas

obligations. For further information

billion in unpaid superannuation

superannuation payment that is

where employers mostly trip up.

on these proposals, it is advised

was owed to Australia’s workforce.

made to every employer.

They include:

to speak to your solicitor or

1. Incorrect treatment of

accountant. n

One of the reasons for this was

Other proposed changes include

the fact the onus was placed on

forcing monthly superannuation

contractors – a contractor

employees to bring any non-

payments by employers instead

can still be deemed to be

compliance to the attention of their

of the now required quarterly

an employee for super

Director of Multisec Consultancy Pty

employers or the ATO. Cowed by

payments, increased powers

guarantee (SG) purposes,

Ltd. He also lectures part-time at the

job insecurity, many are reluctant to

to seek court order penalties,

depending on the nature of the

Western Sydney University, where he

rock the boat.

encouraging the reporting of non-

contractual arrangements.

teaches an undergraduate diploma

The ATO announced in January

Greg Byrne is the Managing

in policing. He works as a subeditor

compliance, and the introduction

2. Missing payments from the

2018 that in response to this

of a single touch payroll payment

definition of ordinary times

for the Australian Police Journal and

extraordinary debt, it was forming

system that will give the ATO

earnings when calculating

is a serving member of the board of

a task force to crack down on this

real-time visibility over wage and

9.5 percent superannuation

directors. He possesses a number of

non-compliance for superannuation

superannuation payments.

contributions, notably the

academic qualifications, including:

omission of specific allowances

Master of Management, Diploma

and directors’ fees.

of HR, Grad Cert in Leadership

laws and to protect the future of employees. In support of the task force,

With the penalties for SGC non-compliance dramatically increasing, it is essential for all

3. Employers using clearinghouses

and Diploma in Security Risk

in 2018 the Government tabled

employers in the Australian security

must ensure that sufficient

Management. Greg can be contacted

draft superannuation compliance

industry to be fully aware of their

time is allowed for it to make

via email greg@multisec.com.au

14 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Smart Vehicle Identification

Photos credits: Shutterstock - aressy.com 04/18 - 10917

New Spectre reader: Let the good go, kick the bad out. Without delay. Meet the challenge of fast-track security at your vehicle gates. Spectre’s UHF-based vehicle ID reader is the first of a new generation: discreet by design, flexible in its configuration, secure and encrypted in its communication. Our new long-range reader is built to perform for up to 4 driveways, even in highly challenging environments. It’s the most robust reader on the market, yet intuitively easy to use. Welcome to speed and security - in a single solution.

SCALABLE | SMOOTH | SECURE | AGILE | STEALTH | INSTINCTIVE

www.stid-security.com Security Meetings Trophées de la sécurité Expoprotection ISC West APS


RISK MANAGEMENT

THE FOUNDATION FOR A DYNAMIC MODEL OF RISK CONTROL BY KEVIN J. FOSTER

O

rganisations and

event. It is a cognitive failure which

may follow a systemic increase

complexity and simplicity are also

individuals constantly

can occur due to a multitude of

in disordered data (entropy) or a

important within the context of

collect and interpret

factors. Politico-cultural biases

systemic increase in noise.

cultural biases. A contingency-

messages from their

will determine what data should

Communication in complex

based risk control model relating

operational environment. The

be collected, how it should be

operational environments can

different cultures to differing types

messages may be accurate and

interpreted, and what action should

affect not only the psychological

of decision processes is needed to

complete, or they may be distorted.

be taken.

environment but also the

develop a new model for the study

The risk image is compared

operational environment. Biases

of the dynamical behaviour of risk

the transmitter, the communication

with a datum reference perception

are ubiquitous whenever security

management systems.

channel, or the receiver. Such

of acceptable risk. The difference

analysts and decision makers

communication problems might be

between the acceptable risk and

attempt to monitor operational

modelling process which involves

unavoidable and they may be

the risk image may be amplified

environments. These biases can

the fusion of numerous theoretical

deliberate. The data in the

socially and by various overt and

affect risk data indexing systems,

concepts from several disciplines

messages is used to develop an

implicit actions or decisions.

which in turn affect images of risk

into a unified and dynamic

hypothesis about an entity’s intent

These amplifications, or gain, will

and the operational environment

cybernetic model for describing

and capability, or of the likelihood

affect the operational and future

itself. They also have an indirect

risk and surprises in a simple and

of some random event. The

environments. There will also be

effect on the future environment.

practical way. n

hypothesis will indicate that the

other disturbances which may

These biases may be imposed on

entity or event is, or is not, a threat.

affect the environments.

the analyst and decision maker

The distortion may be caused by

Any new data that becomes

The dominant cosmology of the

To do so requires a deductive

This new model of dynamic risk

by matters of complexity, social

analysis and its application will

available may be categorised in

risk decision maker will determine

context, political culture and

be explained in later editions of

such a way that it supports the

the importance of organisation

routinised heuristics. Issues of

Security Solutions Magazine.

popular hypothesis.

design, lead times, lag times, the

Risk analysis failure is an

load on the risk control system

inability to predict the potential

and the degree of gain introduced

or actual behaviour of an entity or

into the operational environment.

the likely occurrence of a random

Risk analysis failure and surprise

16 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Pedestrian and Vehicular Access Control Automation

FAAC Simply Automatic Modular automation solutions

HUB Parking Technology Smart and flexible parking solutions

Magnetic Automation Pioneering access control solutions

Experts in Access | Discover the FAAC Group range of products at J14 | www.faacgroup.com


LEGAL there is often very little left for payment to unsecured creditors. If, however, the directors of the company are deemed to have allowed the company to trade whilst insolvent (that is, to have incurred debts where the company had no prospect of being able to repay them), they can be held personally liable for those debts. This can mean that the liquidation

BY JUSTIN LAWRENCE

of the company might not be the end of the matter. Directors can be

THE LEGALITIES OF A FAILED BUSINESS

sued for those debts. The liquidator will only commence court action for insolvent trading with the financial backing of one or more creditors. If the court orders that the directors are indeed liable for those debts, the liquidator will have a number of recovery options available to him, including having the directors

o, you have received a

The receiver’s first duty is to

letter stating that one

the secured creditor. Much like a

enjoyed by the company from time

of your creditors has

mortgagee who takes possession

to time), then the receiver must pay

an undischarged bankrupt is

entered either

of and sells real estate following

the proceeds of sale in the following

automatically disqualified from

receivership, liquidation or

the default of a mortgagor, the

order: firstly to priority claims (such

managing a corporation or being a

`j

bankruptcy. We hear these terms all

receiver must ensure that the

as employee entitlements), secondly

director or secretary of a company.

jv

the time, but what do they actually

property is not sold for less than

to the secured creditor and thirdly to

A breach of this law can lead to

mean and, most importantly, what

its market value. If a receiver is

the company.

fines of up to $5,500 or one-

do they mean for the owners and

appointed to a company, it must

controllers of those businesses?

report to the Australian Securities

fails to gain sufficient funds

S

When a business is not

over all cash and stock-in-trade

If the process of receivership

declared bankrupt. Under the Corporations Act,

year imprisonment. If a person who is a sole director

and Investments Commission (ASIC)

to repay the debt owed to the

of a company becomes bankrupt,

succeeding it may firstly be placed

every six months as to the amount

secured creditor, the business (if

the company will be wound up,

into receivership. This means that

of its receipts and payments. Other

a company) will usually then be

irrespective of whether or not it has

a secured creditor has appointed

(unsecured) creditors are able to

placed into liquidation. In that case,

first been placed into liquidation.

an external party (the receiver)

obtain a copy of those statements

a liquidator will be appointed to

to administer the assets of the

from ASIC.

take control of all of the assets of

any business to do is to ensure

business. Usually, the business will

A secured creditor may hold a

Of course, the best thing for

the company and to sell them. The

that its financial position is such

continue to trade as normal whilst

‘fixed charge’ over the assets of a

proceeds of sale will then be paid

that the closest that it will ever

the receivership is underway.

business (that is, a charge over fixed

to secured creditors. Anything left

come to receivership, liquidation or

assets such as land, buildings, plant

over will then be divided between

bankruptcy is to read about them

hold security over some or all of the

and equipment). If those assets

unsecured creditors according

on the pages of this magazine. n

assets of the business. The secured

are sold, the proceeds of sale of

to their entitlements. This is the

creditor will often be a bank or

the charged assets must firstly be

often well-publicised situation in

other financial institution.

paid to the secured creditor and

which creditors receive ‘5 cents

with Henderson & Ball Solicitors

any balance will then be paid to

in the dollar’ or some similarly

and practises in the areas of

the company.

trifling amount.

commercial litigation, criminal,

The secured creditor will usually

The primary role of the receiver is to call in and sell as many of those assets as are necessary

If the secured creditor holds a

Once all funds are paid out, the

Justin Lawrence is a partner

family and property law. Henderson

to repay the debt owed by the

‘fixed and floating charge’ (that is,

liquidation will usually come to

& Ball have Law Institute of Victoria

business to the secured creditor.

a charge over all of the non-trading

an end and the company will be

accredited specialists in the areas

Once those assets are sold and

assets of the company – real estate,

wound up. The liquidator’s fees will

of business law, property law and

the secured creditor is repaid, the

plant and equipment, intellectual

be paid as a priority, so once those

commercial litigation. Justin and

receivership will usually end and

property rights, book debts,

fees and the costs of liquidation are

Henderson & Ball can be contacted

the business will continue to trade.

contractual rights – plus a charge

extracted from the sale proceeds,

on 03 9261 8000.

18 // SECURITY SOLUTIONS

securitysolutionsmagazine.com

`

j

v

`v

`jv

h


THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.

NEW!

ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.

+61 (3) 9544 2477

email: oz_sales@takex.com

HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.

BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.

INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.

OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .

1300 319 499 csd.com.au www.takex.com

TAKEX AMERICA

VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta


THINKING ABOUT SECURITY

CROWDED PLACES BY DON WILLIAMS

I

This table groups types of venues and considerations for managing crowds during a security/emergency event. Some facilities may contain a number of these venues, such as a shopping complex with cinemas and an indoor sports arena. The following are generalisations and the ability for patrons to escape or hide will depend on the specific built environment.

n 2017, the Australian New Zealand Counter Terrorism Committee (ANZCTC) released new

guidance on protection of crowded places (nationalsecurity.gov.au/Mediaand-publications/Publications/Pages/ default.aspx). This document is a significant improvement over previous ANZCTC guidance which had a strong law-enforcement bias with an emphasis on what would happen after police arrived, by which time it was probably all over. The 2017 guidance provided some useful self-assessment tools which, to the eyes of subject matter experts, may be open to debate but are of value to those seeking to establish a baseline and compliance with government expectations. The 2017 document also had an excellent section on resilience. As mentioned previously in this column, earlier guidance had little respect for owners and operators

Definitions: Good: Probable, is expected to happen or be available. Limited: Possible, might occur or be available. Poor: Unlikely, not expected to occur or be available.

of venues and contained many

facility management sectors have

staff. Once this is known, the relevant

to prevent (if possible) and certainly

statements of the blindingly obvious,

long been concerned with safety,

protective and response plans can be

to respond to mass casualty events.

reminding owners that they had a

security and response options.

assessed or revised. For example: an

It is unlikely that any place where

underground railway station has good

crowds gather has failed to plan; what

duty to protect those on-site. The

International associations

latest version at least recognises

such as ASIS International and the

communication with those on-site,

security advisors need to do is help

that owners and operators are not

International Association of Venue

but little capability to move or hide

them make sensible and practical

only aware of their responsibilities

Managers have thousands, sometimes

them; at a long linear event such as a

decisions and plans that not only fit

but have measures in place to deal

tens of thousands, of members and

parade or marathon, people can easily

within but support their particular

with them. The policy requires the

have established sub-committees

move away and possibly hide, but

operating environment. This is done

establishment of a Business Advisory

looking at these issues. Such

trying to communicate with everyone

by understanding their environment

Group and a Crowded Places Advisory

organisations could be a source of

along the track may be impossible

as well as fundamental concepts such

Group. Let us hope the voice of the

information to the ANZCTC. It would

and unnecessary; some sporting

as the ability to communicate, move

commercial sector is both heard and

also be of interest to know how many

and theatrical venues allow for easy

and hide. n

listened to.

members of the ANZCTC are members

movement of people, but others

of relevant professional associations.

result in the potential for crowd crush.

It also recognises that the professional and industry associations

While published guidance will

The ANZCTC has provided useful

Don Williams CPP RSecP ASecM is a recognised thought leader in

have a role to play. Unfortunately,

always be general in its nature, there

information and tools for those

security, emergency management and

according to the information flow

are a few basic concepts that may

owners, operators and advisors

related disciplines. His book Bomb

diagram, their role is to receive

help any venue. One step is to identify

responsible for the safety of people

Safety and Security: the Manager’s

information from government.

the ability of the venue or event

in crowded places. Obviously, all

Guide is available from Amazon.

Associations such as those for the

security to communicate and move or

venue operators need to continue

Don can be contacted via email

security, emergency, venue and

hide patrons, performers/athletes and

to assess and improve their ability

donwilliams@grapevine.net.au

20 // SECURITY SOLUTIONS

securitysolutionsmagazine.com



EVENTS

Security Exhibition & Conference 2018

leading suppliers. The 2018 show

government protective security

of the ANU Southeast Asia

is set to see some interesting new

in Australia to be updated on

Institute and, since March 2017,

25–27 July 2018

innovations, as well as a host of

urgent issues.

Acting Head of the Strategic

Melbourne Convention and

new attractions.

Exhibition Centre, Melbourne

Make sure you put the dates

The PSG Conference also

and Defence Studies Centre at

provides an opportunity for

ANU, overseeing its three-

In 2018, the Security Exhibition

in your diary. We look forward to

everyone involved in government

degree programs. He is also

& Conference is heading back

seeing you again in Melbourne in

security to network, update

a Senior Fellow of the Higher

to Melbourne.

2018 for the Security Exhibition &

knowledge and skills, and gain

Education Academy and Fellow

ASIAL Conference!

exposure to new trends and

of the Royal Society of New

technology, as well as hear

South Wales. In addition, he is a

directly from representatives of

member of the ANU Academic

days of quality networking and

the Protective Security Policy

Board as well as the Australian

unrivalled education alongside a

Framework (PSPF) review team

Army Journal editorial

about the reforms and what

board and an occasional

they mean.

commentator in the media. He

For over three decades, it has been

Protective Security in Government Conference and Trade Show 2018

the largest and most established

13–15 August 2018

is the collaboration between

commercial event for the security

National Convention Centre,

Australian Security Research

industry in Australia, bringing

Canberra

Centre and the Federal Attorney

together the entire supply chain of

The Australian Security Research

General’s Department to jointly

acknowledged leader in

manufacturers, distributors, security

Centre will this year launch the

develop content and a program

the field of human-based

professionals and end-users to

Protective Security in Government

relevant to today’s Australian

risk management and the

connect and create unparalleled

(PSG) Conference and Trade Show.

security professionals.

business opportunities.

The PSG Conference is designed to

The Security Exhibition & Conference is the industry’s annual opportunity to reunite for three

showcase of the most innovative solutions to the Australian market.

Visit securityexpo.com.au for more information.

A cornerstone of this event

Speakers at this year’s

fill the gap from where the Security

event include:

forward to once again reuniting

in Government (SIG) Conference

• John Blaxland, Professor of

more than 4,500 security

left off in 2016 and to provide an

International Security and

professionals with over 150

opportunity for those involved in

Intelligence Studies, Director

The entire team is looking

22 // SECURITY SOLUTIONS

is a US Department of Defense Minerva Research Initiative grant recipient. • Dr Gav Schneider, an

psychology of risk. • Scott Ryrie, CEO of the Risk Management Institute of Australia. • Mark Carrick, one of Australia’s most experienced

securitysolutionsmagazine.com


counterterrorism practitioners

performance. (This research can be

with more than 20 years of

found at perpetuityresearch.com/

law enforcement experience

wp-content/uploads/2014/09/

that includes crisis

Aspiring-to-Excellence.pdf)

management and response,

The OSPAs are being set-up

general policing, witness

in collaboration with security

protection, close personal

associations and groups across

protection, crime management,

many countries.

change management and counterterrorism intelligence. • Mr Sven Bluemmel,

By researching and standardising the award categories and criteria, the OSPAs scheme

the inaugural Victorian

provides an opportunity for

Information Commissioner.

countries to run their own

• Jason Brown, National Security

evidence-based OSPAs schemes

Director Thales and Chairman

while maintaining an ability to

of the Board at Security

compete on an international level

Professionals Australasia.

in the future – World OSPAs.

• Tony McGuirk CBE, QFSM, MSc,

Visit au.theospas.com for

FIFireE, FIIRSM, Director (Hazmat

more information or to make

and Specialised Support) at

a nomination.

NSW Environment Protection Authority (EPA). • Brett Dobbie, Protective Security at NSW Government. …to name just a few. Visit psgconference.com or

Australian Warrior Expo 2018 15–17 November 2018 Brisbane Showgrounds, Brisbane The Australian Warrior Expo

email info@psgconference.com for

(AWE) is Australia’s premier law

more information.

enforcement, military, emergency services and security expo and

The 2018 Australian OSPAs

is the only event of its type in

18 October 2018

showcasing the latest products,

Doltone House,

technology, equipment and

Hyde Park, Sydney

services to this niche market. The

The Outstanding Security

Australian Warrior Expo is not like

Performance Awards (OSPAs) are

any other trade show! With a huge

pleased to announce the dates

focus on hospitality, it includes a

Moresby, PNG, in March 2019 for

• intelligent traffic solutions

for the 2018 Australian awards.

VIP Night and an AWE party, plus

the first Oceania premier security

• asset management systems

They will be working for the fourth

a full retail store. AWE will bring

industry event, with a security

• drone capability

year in a row with the prestigious

both professionals and agencies

conference and exhibition, real-

• software cyber management

Australian Security Industry

together, including government

world challenges presented and a

Association Limited (ASIAL).

procurement managers, decision

glimpse into the future of global

• innovative video intercoms

makers and operators.

security integration and trends.

• large enterprise systems

The OSPAs recognise and reward companies and individuals across the security sector. They are

Australia. AWE is dedicated to

Visit australianwarriorexpo.com.au for more information.

designed to be both independent

The Congress will feature electronic security and safety solutions for aviation, banking,

solutions

• mechanical locking integration with electronic security solutions

and inclusive, providing an

SecTec PNG Congress

infrastructure, industrial sites,

• emerging technologies.

opportunity for outstanding

4–6 March 2019

mines, commercial buildings,

Do not miss out! Schedule, budget,

performers, whether buyers or

Port Moresby, Papua New Guinea

residential towers, building and

plan to be there and stay informed.

suppliers, to be recognised and for

Now is the time to plan to attend a

development; the best of the best

Early bird registration is open until

their success to be celebrated.

world-class security and technology

in world class offering:

12am 1st August 2018.

conference and exhibition – SecTec

• intelligent CCTV, access control

The criteria for these awards are based on extensive research on key factors that contribute to and characterise outstanding

securitysolutionsmagazine.com

PNG Congress. Security industry specialists and professionals will converge on Port

and alarms systems • advanced video surveillance solutions

Visit www.sectecpng.com/ register.html to register your interest or email info@sectecpng.com for more information. n

SECURITY SOLUTIONS // 23


FEAUSRE

STANDARDS INCREASING SECURITY Standards Australia has been contributing to Australian life for nearly 100 years. The growing emphasis on a secure society is placing more and more of the organisation’s projects into the security sector. With this comes a focus on areas of traditional security standards, as well as the need to be innovative in responding to the needs of the sector, including developing standards at an international level.

24 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Standards in the Sector

incidents, it is plain to see the

A number of projects in the

aspects of crowd management.

security sector are at different stages of development.

industry need for guidance in all Standards Australia is working with industry stakeholders to develop a handbook, SA HB

1. Building increased security

183 Crowd Management for

The physical security of buildings

Crowded Places. The handbook

has been the focus of a recent

intends to replace the common

proposal approved by Standards

industry practice of using

Australia, which will result

guidance not designed for the

in a handbook to guide those

Australian context, including

responsible for managing the

from Europe and particularly the

security of a physical premises.

United Kingdom, and give those

The handbook, Physical

responsible for managing crowds

Protective Security Treatment for

a one-stop document to help plan

Buildings Handbook, is intended

and respond to concerns relating

to collate resources and directions

to crowds.

of existing guidance. Ideally, the

The handbook aims to

handbook will provide advice to

work with industry to address

facility managers to proactively

the key issues of crowd

minimise the risk of security

management, being:

incidents and not just react to

• arrival

threats as they arise.

• ingress

Examples of physical security threats considered in this

• circulation • egress and dispersal.

handbook include vehicle attack, bombings and armed attack,

The proposal identified a lack

among many others. Given the

of planning and implementation

nature of these incidents, it is

before events as a key factor in

vital for those responsible for

injuries and fatalities at previous

security and design to be proactive

incidents. This risk was made

in keeping a facility and its

even more prominent in terms of

occupants safe.

risk assessment and emergency

The handbook will serve

management procedures, which

as an expert guide for security

will feature in the handbook being

professionals to use in assessing

developed. Some of the focal

and determining risk mitigation

areas are:

activities. While impossible to

• definitions and terminology

completely eradicate risk, all

• purpose of a crowd

available guidance being in one place is a step towards the security industry being provided a clear

management plan • risk assessment and identification

direction on as many challenges

• roles and responsibilities

as possible, backed by experts.

• crowd demographics and

2. Scaled up security

• site design

All of the complexities of security

• communication and

behaviour

are intensified when it comes to

• accessibility

events are taking place in Australia

• emergency and

and, with recent deaths and major

securitysolutionsmagazine.com

information

managing a crowd. More large-scale

incident management.

SECURITY SOLUTIONS // 25


FEAUSRE

The document will be

a secretariat responsibility of

Committee. The document is to

adjacent to the security sector,

structured in a way that gives

a Technical Committee for the

be presented at the next meeting

but one which will directly

the end-user clear guidance

International Organisation

in Norway at the end of 2018 and

impact a large number of

and practical steps to increase

for Standardisation (ISO), TC

will be used to assist in defining

security professionals across

security when dealing

292 Security and Resilience,

and contextualising these terms

the industry.

with crowds. Industry and

Standards Australia played host

in all ISO TC 292 documents.

government representatives

to the international gathering of

This group will also coordinate

screening was the centrepiece

have already come together to

this committee earlier this year.

with the United Nations’

of a forum recently held in

Cooperation Group to refine

Melbourne. With a change in

urban resilience.

the nature of work in Australia,

form a committee and work with

Sydney hosted 130 experts

The issue of employment

Standards Australia to push this

from more than 20 countries

handbook towards publication.

for meaningful dialogue on the

As is common practice for

international effort towards

can often appear to be long

standards in this space to

Standards Australia, before it is

security standards. This was

conversations with little gains, it

change with it. One of the early

published there will be a period

a particularly timely meeting

is a huge achievement to be able

identified areas of change is

of public comment to ensure the

for Australia with government

to have so many international

the shift from a methodology

entire security industry, and

and the private sector currently

experts in Australia developing

approach to one based on

the broader community, has a

working towards enhanced

guidance around best practice

principles. The need to ensure

chance to influence what this

security and resilience across a

for the security industry.

participants in an organisation’s

handbook will look like in its

number of common areas.

With interest already shown

entire workforce, not just those

by a number of government

deemed as ‘employed’, was also

conversations took place,

agencies and some of the

an important discussion in

Cybersecurity

with some of the topics

largest security firms in the

moving the standard forward

Organisations of every size

discussed being:

world, this meeting has a lot to

– taking account of Australia’s

and across every industry are

• continuity and organisational

deliver, but with some of the

changing workplaces.

final format.

placing a growing emphasis on cybersecurity. A number of international projects have

A wide range of

resilience • protective securities architecture and framework

been undertaken to respond to

• interoperability

this growing threat, resulting

• emergency management

in the development of a series

While international work

leading international experts

there is a clear need for the

The increasing role of data

involved there is little doubt it is

security and privacy was also

all achievable.

discussed as needing an update. This work is in very early stages, but it has drawn the attention

• community resilience

Not your Traditional Security Standard

of International Standards,

• security terminology

Despite working nationally

from government and the

ISO 27000.

• fraud risk

and internationally to develop

private sector – all of whom

standards for traditional areas

are eager for the standard to be

of security, there is also a

progressed quickly.

The ISO 27000 series provides

and countermeasures.

best practice recommendations on information security

Once the meetings came to

management within the context

an end, the delegates returned

of an overall information

home to discuss what is next

security management system.

for their respective countries.

Standards Australia has been

For Australia, forums are

working at an international level

planned to bring industry

to encourage more countries to

together and discuss what is of

adopt the use of this standard,

highest importance to Australia;

meaning the global digital

however, there was also one

economy will be better protected

particular piece of international

against the risk of cyberattacks.

work allocated to some of the Australian delegates.

An International Perspective on Security Standards

meeting was to develop a project

Standards Australia has

to study the terms “security” and

long been involved in the

“resilience”. Two Australians

development of international

will lead this work, following

standards, with security

on from their initial research

standards being a field of

and presentation of a draft

heightened activity of late. With

whitepaper to the Technical

26 // SECURITY SOLUTIONS

One of the resolutions of the team based on Australian work

of a number of key stakeholders

project being pursued in a field

Standards Evolve

While international work can often appear to be long conversations with little gains, it is a huge achievement to be able to have so many international experts in Australia developing guidance around best practice for the security industry.

Having been around for over 96 years, Standards Australia has seen changes in every sector and the standards being published have changed as a result. The security industry is one of many arenas in which technology is drastically shaping its future, and Standards Australia remains committed to addressing the traditional areas of security practices, as well as the new and exciting areas open to the industry. n Visit www.standards.org. au for more information on any of the standards mentioned in this article.

securitysolutionsmagazine.com



ALARMT

VOICE-OPERATED ALARM SYSTEMS

EXPECTED TO GROW AT A 7 PERCENT CAGR THROUGH 2022 BY ANNA SLIWON

28 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


The Intruder Alarms and

comfortable using voice features,

to disarm the system, and the

Monitoring Services Database

residential professionally

the share of alarm systems relying

voice assistant then asks for

2018 study provides a

monitored intruder alarm

on more traditional methods

a security password or a PIN

comprehensive assessment of the

systems had additional

will decline.

code. The password feature was

intruder alarm and monitoring

connectivity and functionality

market, including a discussion of

beyond primary alarm

Smart Revolution

outside users’ homes could not

significant trends over the next

signalling, which will grow at a

Using voice commands to operate

instruct the systems to disarm.

five years. The report provides

CAGR of 17 percent to reach 35

intruder alarm systems makes the

This process could be improved

detailed estimates of market

percent by 2022.

process easier and quicker, as it

with the use of advanced

eliminates the need to physically

voice-recognition technologies,

• In 2017, 21 percent of

revenue and shipments from

added so strangers standing

2016, with a base year of 2017,

Our Analysis

interact with the alarm itself.

which would eliminate the need

and forecasts through 2022.

Home assistants developed by

With voice commands, there is

for dedicated passwords. The

It also estimates the market

Amazon, Google and others are

no need to locate a key fob or

system would instead use voice

share of major suppliers in each

changing how consumers interact

type a personal identification

biometrics to verify the user’s

product category.

with connected home devices,

number (PIN) code into a keypad.

identity, which could be done

including intruder alarms. More

Voice features can also be useful

automatically, thereby simplifying

Highlights

alarm systems now offer a voice-

when a keypad or a smartphone

the process.

• Globally, 92 percent of intruder

command option, allowing users

malfunctions, or if the key fob is

alarm systems sold in 2017

to use Alexa and other smart

misplaced. Likewise, arming the

currently occurs while users

were operated by either

assistants to arm and disarm their

system for the night can be done

are physically in their homes,

keypad or key fob; however,

alarm systems.

from a user’s bedroom, without

in-car entertainment systems of

the need to physically engage with

the future could also be used to

the security system.

disarm home security systems

this category is expected fall to 81 percent by 2022. • The share of voice-operated

Internet of Things (IoT) technologies have profoundly influenced the way consumers

Although voice interaction

on the road or while pulling into

alarm systems is expected

select home security systems,

Voice is here to Stay

to increase at a compound

leading to increased connectivity

Currently available voice features

annual growth rate (CAGR) of

and integration with voice

in intruder alarms offer a basic

Not an Easy Path

7 percent from 2017 through

assistants and other smart

level of interaction. The user

A number of challenges preclude

to 2022.

devices. As consumers get more

speaks a predetermined command

voice features from becoming

securitysolutionsmagazine.com

the driveway.

SECURITY SOLUTIONS // 29


ALARMT

a more popular method of

manufacturers integrate voice

can simplify interactions with

operating intruder alarms.

functionality of home assistants

assistants into their offerings,

the intruder alarm systems. One

For example, the need to

requires users to directly address

adding a smart device to an

way to overcome this hurdle is

use PIN codes prolongs the

their smart home assistants. On

intruder-alarm package may

to bundle products with smart

process. Some non-tech-savvy

a more advanced level, users

create an additional incentive to

devices, offering all the necessary

users might also struggle

would not have to directly

purchasing an alarm system.

configuration support needed to

to communicate with voice

address the voice assistant or

assistants, as they require the

the control panel to disarm the

manufacturers could attempt to

use of specific commands for

system; instead, once the assistant

acquire companies that specialise

the devices to listen. Another

recognised the voices in the

in voice recognition software

downside is their reliance on

household, it could automatically

– or partner with providers

IHS Markit. She has a background

home Wi-Fi connections to

disarm the system. However, this

of these products – to speed

in security and defence studies

connect and process commands.

type of functionality could lead to

the introduction of advanced

and has previously worked

If the home network goes down,

even more privacy concerns, as

voice features.

in a variety of research and

the assistant stops working.

smart devices actively listen for

Should voice recognition

Currently, the voice

house members’ activity.

become available in home alarm

On the other hand,

However, many current

facilitate a smooth transition to connected systems. n Anna Sliwon is an analyst for

analytical roles across security

users of intruder alarm systems

and weapons of mass destruction

are still reluctant to test the

(WMD) non-proliferation fields.

systems, additional privacy

Added Value

benefits of voice interaction

Anna has an MA in Intelligence

concerns will arise, including

Enhanced connectivity and

or connect smart devices

and International Security from

where the voice samples are

functionality have become

to intruder alarm systems.

Kings College London and a

stored – either in the cloud or

important differentiating

Installers will need to focus on

BA in International Relations

on local servers operated by

factors for intruder alarm

changing these perceptions by

and Security Studies from the

alarm companies.

systems. As more intruder alarm

explaining how smart devices

University of Bradford.

30 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


| ACT

Â?

 �  �

With the new Protective Security Policy Framework taking effect in the second half of 2018, there is an urgent requirement to build knowledge and share information. The PSG Conference provides an opportunityfor everyoneinvolved in government security to network, update knowledge and skills, gain exposure to new trends and technology, as well as hear directly from representatives of the PSPF review team about the reforms and what they mean.

Â? Â? (  ­ €

+ )

e: info@psgconference.com w: www.psgconference.com

‚ Â? Â? (  ­ €

+ + Â Â? )

Â?

Â? Â? ( )

Brought to you by


OPERATIONS

REALITY TRAINING PROCESS What Goes In To Training Comes Out In Operations

BY RICHARD KAY

To see the positive effects of realitybased training at operational level, it is important to understand the underlying psychology of human behaviour. The methodology used in a progressive training program should function at both the physical skill level as well as at the cognitive and pre-cognitive level. Instructors should understand the psychology of encounters and be able to dissect participant actions to effect any necessary changes through remedial training. The scenarios should be simple: advanced training is just the basics done smoother and faster. The goal of a scenario is to expose operational weaknesses, and strict scenario development protocols should be in place to effectively accomplish this goal. Instructors should have the skills

32 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


to help participants transcend

most likely to cause future

judgment in training without

process by integrating previously

inappropriate responses; they

trouble and get input from

correction may be unintentional

processed information with

should understand that these

different personnel.

by instructors, and the problems

experientially integrated

probably would have been

information. The five levels of

erratic behaviours may occur and

• Unrealistic surprises: boredom

why they occur. By changing the

can affect role players and cause

corrected had they been observed.

integration in the brain and body

underlying training philosophy and

counterproductive behaviour.

The way that scenarios are often

for processing information are

restructuring training, unsuitable

If participants are doing well,

run does not allow for this level

data, information, knowledge,

responses can be clearly observed

do not mess with them. Add

of observation because there is

understanding and conditioning.

during the scenario, thus changing

intensity in future scenarios,

often so much activity occurring

Data is analogous to a person

training from experimental

but do not allow role players

during a scenario that instructors

doing an internet keyword search.

to experiential.

to make things up. Impromptu

look more at the big picture rather

Then he sifts through data for

surprises are not useful in

than analysing specific behaviours.

information, which is specific

effective reality-based scenarios

building situational awareness,

Controlling all aspects of a scenario,

and relevant to his needs. He can

are: define reality, enforce safety,

but they can undermine the

from design and predictable

then choose specific information

train to policy, train for reality,

training program.

role player behaviours, frees

for knowledge, but it does not

instructors to focus attention on

provide practical experience.

participant behaviours.

Understanding requires hands-

The six principles for designing

include stress, and train to prevail. Having several different endings

Define Reality

for a scenario allows it to branch to

It is unnecessary to invent

different conclusions depending on

Train to Policy

competence, which is unlikely

situations when developing

participant responses. It provides

Instructors often unintentionally

in a confrontation as forebrain

scenarios. Statistically, it is in the

role players with variety to break

violate policies in the interest of

functioning is substantially

routine situations where issues

up the monotony of doing the same

scenario flow. Participants should

curtailed during survival stress.

occur or poor decisions are made.

thing over again, and challenges

be commended for demonstrating

Conditioning involves repetitions

Use situations that officers are

participants at their own level.

good judgment, even if it breaks

of a desired action to create

going to deal with. If there are not

There is also the possibility that

the continuity of the scenario,

unconscious competence for proper

many problems internally, look to

they might discuss scenarios with

as the objective is not only to

performance under stress. There

industry trends and statistics.

others, so alternate endings limits

integrate knowledge and skills into

must be a clear neural pathway

Do not waste training time

the ability of participants to come

functional operational strategies,

predicated upon experience to

for something unlikely to occur

in forewarned to various threat

but to get participants thinking. If

achieve a desired action. Without

in operational reality. Avoid

cues and makes each participant

participants do something right,

substantial repetitions or an

the following situations when

determine the correct action.

give them praise not criticism.

emotionally significant experience

writing scenarios:

Enforce Safety

• Catastrophic events: sometimes

Writing scenarios so responses

participants understand and

stimulating situation, performance

all possible tactical challenges

and outcomes are known allows

function within policy, scenarios

of the optimal response is unlikely

are combined into a single

instructors to focus on participant

can clarify policies in situations

to occur.

scenario, but this overwhelms

behaviours, especially various

that are unclear, controversial, or

participants. Observe

mechanical and tactical errors that

conflict with operational safety

to cause failure, it programs

participant deficiencies in

many participants demonstrate

principles. If a policy requires

an aversion response to real-

simple scenarios and fix them

during scenarios. Instructors should

revision, write a scenario around

world situations similar to those

progressively by connecting

bring them to the participants’

it, put some people through it,

experienced in the scenario.

proper decision making

attention during training. If unsafe

catalogue the results and present

with effective action in a

training practices are allowed in

them to administration, asking for

Train for Reality

stressful setting to create a

training, there is a possibility that

clarification on the policy governing

In reality-based training, the

neural pathway to successful

in a real confrontation that issue

such an occurrence. Engaging

abstract aspects of a training

future responses in similar

may lead to a safety infraction.

in discussions about different

situation are more important than

real-life circumstances. This

It is not just firearms handling;

situations, tactics and strategies

the concrete aspects, although

is accomplished with drills

improper use of radios, batons,

begins the process of conditioning

both are important. The question

that build in speed and

tasers, chemical agents, or even

a potential response for a future

is whether a participant is actually

complexity once mastered at the

verbalisation can cause issues if not

event. People function better in

going to make a decision to use a

lower levels.

corrected in training.

situations that they have experience

force response and if that decision

with, even if it is simply having

is the correct decision for that

thought through an issue.

situation. Technical proficiency is

on experience for conscious

In addition to assuring

• Single source experiences: one

If legal process follows an

person writing all scenarios

incident, the training participants

presents a myopic view of

received will invariably be

problems. Define the problems

scrutinised. A participant using

intellectually and experientially

an agency is facing and those

questionable techniques or poor

helps future decision-making

securitysolutionsmagazine.com

Cataloguing decisions

tying the desired response to the

When training is designed

second to that. It is common in scenarios to observe bad habits formed during

SECURITY SOLUTIONS // 33


OPERATIONS

conventional training which are

to determine if a stream, cone or

be used as the current can jump up

for conditioning proper participant

detrimental in real-life encounters.

fog pattern hits role players in an

to two inches.

responses. A realistic setting should

Proper habits should be developed

effective manner if participants

so that equipment management

are taking environmental factors

has a positive effect, as making

and available training locations are

skills can be tested under stress.

into consideration. Make sure

participants communicate through

often passed over for use because

Using the actual operational gear

participants know they are to react

the radio makes them manage a

agencies believe they have to find

permits instructors to observe

to everything happening during a

piece of essential equipment just

a site to fit their training devices,

deficiencies a participant might

scenario as if it were real. If their

like reality. After the scenario

instead of the other way around.

have in working with personal

chemical agent is inoperative

begins, direct all communication

With the various training aids

equipment. Functional training

or ineffective, they must do

with the participant through

available, instructors should be

versions of personal equipment

something else.

the radio, with the exception of

able to utilise actual structures

administrative discussions. If they

and environments to provide

demonstrate how well a participant

Impact weapons: there are

Radios: using operative radios

be easy to find since many excellent

will employ them on the street.

training versions for expandable,

do not communicate clearly, do not

participants with appropriate

Participants who perform well

straight and side handle batons. If

respond or request clarification.

realism. The training philosophy

under normal training conditions

a baton is a reasonable response

Some training facilities use a

hierarchy is performance

often struggle to perform relatively

during the scenario, role players

dispatcher, which creates radio

objectives, setting, training devices

simple actions under simulated

can be safeguarded against the

traffic, so each participant has to

– start with the training objective,

stress, such as drawing a weapon

‘force relation to target’ principle.

pay attention to the calls that are

find an appropriate setting and

or switching between force

Some protective suits are designed

directed specifically to them just as

then choose the training devices

options. During scenarios, watch

to withstand the impact from

they would on the job.

friendly to that environment. Not all

participants and observe their

actual baton strikes, but this is not

thought processes at certain

recommended as there are areas of

are various items and devices

will permit marking cartridges,

critical points. Failing to ask about

the body still unprotected.

that may be present during actual

but not all training scenarios

situations. It is not necessary to use

necessitate the use of these. Choose

curious or questionable behaviours

Handcuffs: there are training

Miscellaneous items: there

structures or training environments

loses much of the value of using

versions of handcuffs modified

an actual distraction device; beyond

devices to fit the setting, not the

functional training props to

with a release feature that permits

the physical danger, a role player

other way around.

highlight deficiencies.

them to be opened without the need

dealing with the effects of an actual

for a key. Searching for a handcuff

distraction device is less effective.

role player actions often result from

training versions of equipment is a

key and bending a role player

Role players can be scripted to do

instructor boredom, inadequate

valuable source of information for

into position to unlock handcuffs

anything, including how to respond

preparation, lack of training or

trainers since they can observe all

can be inconvenient and often

once a tool is employed.

experience of instructors, but they

kinds of inappropriate behaviours

unnecessarily painful.

Using realistic props and

from participants. The more

Role player props: using

Silly scenarios and clownish

dilute the scenario and indicate

Tasers: there are training

realistic props for role players is

to participants that training is not

realistic the situation and the more

cartridges that do not conduct

essential. A real driver’s licence

serious. If the scenario retains its

authentic the props, the higher the

electricity for use with actual units.

with the role player name and

realism and professionalism, the

quality of the learning experience.

However, the probes are still the

photo permits them to produce

participant can focus on solving

Participants should be issued with

same as operational cartridges, so

actual documents, helping

the training problem and develop

all response options, regardless of

proper protective equipment and

participants focus on the situation

operational confidence.

the level of force required during

role player training is important.

and stay in scenario. Investigate

a scenario. There are numerous

Firing actual darts at role players in

local thrift stores for role player

Include Stress

training versions of duty equipment

a suit provides the best realism, but

clothing and props. Casualty

Under stress, a person’s ‘animal’

available, as follows.

some agencies cannot afford this

simulation is difficult, given the

brain resorts to primitive instinct.

quality of training all the time, so an

level of protective equipment role

Actions learnt during stress are

should be the actual duty firearm

alternative is to take the cartridge

players wear, but dummies that are

difficult to displace, but there are

which has been modified

off the firing device. When a

bloodied up make excellent training

positive effects conditioned through

using a conversion device, or a

participant points the taser and the

props for simulated trauma victims.

effective use of stress in training,

dedicated training version of the

red dot appears in an area of an

Applying make-up to role players

since the brain chemistry present in

identical weapon.

effective hit, they pull the trigger

under a mask is not effective and

stress is similar to that experienced

Chemical agent: a training

and the taser sound activates.

using full-face shields so that the

during an emotionally significant

version of operational spray should

There should be a line written

face is visible is dangerous inside

event. To understand the power

be used to simulate a chemical

into the scenario as to whether

a training environment where

of this, think of phobias. People

agent, with the same actuator

the taser ‘works/does not work’,

non-lethal training ammunition is

are born with three innate fears

and nozzle type so handling and

and role player scripting should

in use.

– sudden motion, loud or abrupt

spray pattern effectiveness can be

occur whether darts are fired or

evaluated. This allows instructors

simulated. Contact stuns should not

Firearm: a training firearm

34 // SECURITY SOLUTIONS

Environment: the more realistic the setting, the better it is

noises and sudden approach; everything else is learned. Phobias

securitysolutionsmagazine.com


result from powerful learning

and connecting the decisions

experiences and can affect a person

to specific actions; effective

training integrates skills with

prevailed through superior tactics

for life.

responses under stress must

emotional/cognitive aspects of

or perseverance. Allowing role

emanate from a programmed

an encounter.

players to give up when participants

It is possible to condition

• be comprehensive so

emerge from a scenario having

survival skills and responses as

dominant response. To best assist

Reality-based training allows

have not prevailed conditions

deeply as some phobic responses.

participants to identify and respond

instructors to observe participants

dangerous behaviour. Participants

Repetition in training takes time to

to certain threats, role players

using judgment to make decisions

might get beaten/stabbed/shot

create a pathway that eventually

should initially present threats

and take actions based on

during the scenario, but this is

becomes the route of choice for

slower than in real-life situations,

experience. The desired outcome

appropriate if it is written into the

actions. It takes a significant event

which permits participants to

is to provide the participant with

scenario. When these events occur,

to change that path. An emotionally

program dominant responses.

experience on which to draw

the scenario does not end until the

significant event in the psyche

Responding successfully to a

in future encounters. Through

participant does something that

is an instant, clear and obvious

simulated experience where they

experiential training, instructors

contributes to their survival, after

deeper pathway carved into the

are challenged at a stressful but not

are able to ascertain the areas

which it continues until it reaches

psyche. The brain creates neural

catastrophic level means they own

where participants need additional

a natural conclusion. The negative

connections between the forebrain

that experience in the future, and

practice and experience. The brain

response of participants giving up

(cognitive thought) and midbrain

the speed and efficiency of future

does not differentiate between good

should always be replaced with a

(autonomic functioning) so that,

actions will improve since skills

and bad performance – it merely

positive survival response.

given a certain stimulus, there is

are being moved from conscious to

catalogues actions in response to

a direct and pervasive connection

unconscious competence.

stimuli. Poor performance must be

means not letting a scenario

Teaching participants to succeed

to action. This is perhaps the most

Build a foundation slowly

corrected experientially. Immediate

conclude until they prevail. The

convincing argument for making

and improve by building speed.

remediation is essential to program

objective of reality-based training

participants prevail during a

Without basic conditioned skills,

an optimum response, correcting

is to develop a participant’s

stressful training experience. The

increasing speed only leads to

behaviours before the negative

ability to respond to critical and

pathway can either lead to success

failure. Once a skill is mastered,

experience gels in the subconscious.

life-threatening encounters by

or failure; it places a fork in a

there must be maintenance training

participant survival psychology, and

to maintain proficiency, and there

stress inoculation for participants.

there is a powerful obligation for

should be skill development by

Knowing what the physiological

instructors to send the participant

placing stressors on it to improve.

effects are in advance of a

reality is highly rewarding.

down the correct path.

That is where advanced training

stressful encounter and having the

In scenarios where both the

has its place and how participants

awareness to recognise the physical

knowledge and tactical abilities

without sacrificing safety creates a

progress from the simple to the

manifestations of stress when

of participants are tested in

powerful learning agent and also

complex. Long-term retention

they occur provides participants

context, it is important to create a

functions as stress inoculation.

of learned skills is due to the

with critical information. But

sufficiently stressful situation to

Once participants have a sense of

progressive nature, as well as the

simply knowing about those

provide them with the experience

using strengths to deal with fears,

intensity levels of training. It is

effects is not enough; they should

of physiological and emotional

they can recall it for assistance in

impossible to progress without

be experienced.

arousal and ensure they have the

new territory. Training that does

dedicated practice periods. The

not instill confidence is wasted and

learning occurs between the peaks,

Train to Prevail

effects of stress. It is then essential

can create an aversion to respond

so participants must learn to keep

Making it difficult or impossible

they emerge from that encounter as

appropriately to critical incidents.

practising rather than give in to

for participants to successfully

winners. It is through this process

frustration and quit.

complete a scenario is a result

that participants are programmed

of untrained role players, badly

with solid survival skills available to

Making training realistic

Start with simple scenarios that test one or two simple

For competency-based training

Reality-based training provides

basing future responses on past successful experiences. Preparing participants for

strategies to overcome the negative

choices prior to moving into more

to be successful, it must:

designed scenarios, lack of training

them during decisive moments in

complex issues. This process helps

• start with basic skills until

preparation from instructors, or

real-life situations. n

participants understand and condition simple, tactically correct responses to stimuli presented by

proper form is developed • be progressive so skills

unclear training objectives. The tendency of instructors to stop a

Richard Kay is an

perfected are combined into

scenario immediately after force

internationally certified tactical

complex combinations

is used deprives participants of

instructor-trainer, Director

clear and simple choices, their

• be realistic so state-dependent

positive training experiences and

and Senior Trainer of Modern

decision loop speeds up (Hick’s

learning is transferred into

giving participants the experience

Combatives, a provider of

Law), confidence levels are higher

similar real-world situations

of death during a simulation

operational safety training for the

exercise is not an effective way to

public safety sector. Visit

teach operational survival.

wwww.moderncombatives.com.au

a subject. When participants have

and success is more predictable. Competency training requires building a simple decision tree

securitysolutionsmagazine.com

• be relevant so training is focused on events likely to occur within job parameters

Participants should always

for more information.

SECURITY SOLUTIONS // 35


BUSINESS

Terrorist Attacks On Public Mass Gatherings: The Threat To Australian Beaches BY PAUL JOHNSTONE AND RICK PACKER

36 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Crowded places such as stadiums,

attacks to occur. The Australian

shopping centres, pedestrian malls

Federal Police has reported that,

vulnerable and a weakness can

believers), smashing their bodies

and major events will continue to

since the 12th of September 2014,

be exploited by a terrorist group

with the vehicle’s strong outer

be attractive targets for terrorists.

when the national terrorism

and/or lone wolf adversary to gain

frame while advancing forward –

The current National Terrorism

threat level was raised, police

access and damage our freedoms

crushing their heads, torsos and

Threat Level in Australia is

have charged 85 people as a result

and way of life. They can disrupt

limbs under the vehicle’s wheels

PROBABLE (as outlined on

of 36 counterterrorism-related

a critical function because, when

and chassis – and leaving behind a

www.nationalsecurity.gov.

operations around Australia. Only

there is a weakness in identifying

trail of carnage”.

au). This reflects the advice

as recently as July 2017, police and

potential threats and a failure to

of the Australian Security

intelligence officials disrupted a

act of adequate security practices,

beachside areas are large open

Intelligence Organisation (ASIO)

plot to conduct a terrorist attack

then the likelihood of a successful

areas, frequently packed with

that individuals and groups

using an improvised explosive

attack is increased.

large numbers of people and

continue to possess the intent and

device (IED) against the aviation

capability to conduct a terrorist

sector, and a plot to develop an

even in this fast-paced modern

perfect targets for an attack

attack in Australia. The elevated

improvised chemical dispersion

world, very casual and laidback.

and the terror, pandemonium

terrorist threat is likely to persist

device for use in a terrorist attack

Enriched in Australian culture

and collateral damage to

for the foreseeable future and it

on Australian soil.

is summer time spent playing

infrastructure and loss of human

sports and enjoying barbecues

life would be huge. These areas

attacks, if successful, would

and parties at the many beautiful

would allow a terrorist group

have created mass casualties

beaches of the Australian

or lone wolf to cause as much

other cities around the world

and fear within our community.

coastline. We also have many

damage as possible in a very short

sounds familiar, it is because there

Although these attacks have been

local and overseas tourists that

timeframe prior to intervention

is a disturbing trend of terrorism

successfully thwarted by the

visit our beaches, beachside

by police. Unlike many other

that requires little organisation,

excellent work of our intelligence

markets and shopping precincts

countries in the world, Australian

manpower or technological know-

and policing agencies, Australia

and they are places where people

security guards at these types

how. Whatever the attacker’s

is no longer protected from

enjoy summer and life in general.

of locations are not armed with

identity, the method has become

terrorism by our distance from

They are in fact areas of public

firearms, so would be of little

commonplace. Terrorist groups

the rest of the world. The Internet

mass gatherings.

assistance in stopping the threat.

no longer must use sophisticated

and social media has challenged

methods or weaponry to cause

and changed this advantage,

for new targets to inflict their

visited several beaches and

widespread terror and fear within

coupled with the threat of foreign

terror attacks. ‘Soft targets’ are

beachside communities in the

society. The use of firearms,

fighters returning to Australia,

always in their sights, and places

Gold Coast and Sunshine Coast

bladed weapons, explosive

and we are no longer safer than

of mass gatherings are these

areas of Queensland. It has

devices and chemical/biological

any other country.

types of targets. World leaders

been observed and recorded

are growing increasingly worried

how a terrorist attack could be

is not confined to any one city or metropolitan area. If a vehicle terror attack in

agents are still the main methods

These planned terrorist

There is still a very complacent

As a nation we are still

Australian lifestyle is still,

Terrorists are always searching

large congregation of kuffar (non-

Australian beaches and

especially families. They are

Last summer, the authors

of these attacks; however, as

‘head in the sand’ attitude in

about vehicles being used as

perpetrated easily using motor

highlighted over the past several

Australian general society,

weapons of mass murder after a

vehicle/s and a combination of

years, vehicle terror attacks have

business and communities that

spate of similar attacks over the

motor vehicle/s and IEDs, vehicle-

been effectively used in Australia,

we are safe from terrorism and

past several years.

borne improvised explosive

Europe, England and the US.

that “it won’t happen to us”. Our

Terrorist groups have realised

intelligence and policing agencies

intelligence and policing agencies

improvised explosive devices

that a simple motor vehicle is

are fully aware of the threats and

that Islamic State’s magazine,

(PIEDs/suicide bombers).

now a new and very simple, very

are acting accordingly to combat

Rumiyah, has reported the virtues

accessible and very effective

and contain these threats/attacks.

of using large trucks in these sorts

to the beaches and beach

method to cause terror.

Attacks on crowded places

It is widely known throughout

devices (VBIEDs) and personal

It was noted that access

of attacks that would help result

areas (carparks, picnic areas,

overseas, including London Bridge

in a “bloodbath”. A three-page

playgrounds) is very open and

to these types of threats and,

and Borough Market in June 2017,

article in Rumiyah, headlined

not very restricted, with no

although fortunate thus far not

Manchester Arena in May 2017,

“Just Terror Tactics”, included

locked gates, bollards/barricades

to have a major terrorist attack

the Berlin Christmas market in

instructions on how to maximise

or control points. It can be

on our soil, terrorists have

December 2016 and the Bastille

casualties in a truck attack, the

appreciated and assumed that

plotted similar attacks here,

Day parade in Nice in July 2016,

best vehicles to use, the targets

these are not high security areas

including several ‘lone wolf’

demonstrate how basic weapons

and the way to prepare and plan

but, in the context of this article,

attacks inspired by ISIS to attack

– including vehicles, knives

such an attack. The disturbing and

they are high-risk areas for a

crowded places, and we should

and firearms – can be used by

explicit article calls for a vehicle

terrorist attack.

expect more plots and attempted

terrorists to devastating effect.

to be “plunged at high speed into a

Australia is not immune

securitysolutionsmagazine.com

It was also observed that at

SECURITY SOLUTIONS // 37


BUSINESS

many beachside markets there

to Breitscheidplatz in Berlin,

was very limited and, in some

leaving 12 people dead and 56

cases, no adequate security

along the length of the beach.

plans for incidents occurring

He could either then exit the

at their venues. These plans

others injured. The terrorist

vehicle and commence shooting

should include responses to

measures apart from very

was Anis Amri, a Tunisian

or stabbing people who may not

possible terrorist attacks against

limited traffic control. A highly

failed asylum seeker, who was

realise it is a terrorist attack and

their infrastructure, events and

motivated person/s inspired by a

identified as being a supporter

go to the aid of those injured.

facilities. They may need to be

terrorist group could easily breach

of Islamic State.

The attacker could then attempt

reviewed and upgraded to take

to exit at one of the many beach

further action to upgrade actual

basic traffic control and cause

• In March 2017, Khalid Masood,

maximum casualties in a very

a 52-year-old convert to

exits and drive away, or remain

physical elements of protection

short time, similar to the terrorist

Islam, drove a car at high

on the beach attacking people

for persons on their properties.

attack on Bastille Day in July

speed into pedestrians on

until confronted by responding

Plans should also include ongoing

2016 when Mohamed Lahouaiej-

London’s Westminster Bridge.

police officers.

education and training for

Bouhlel crashed a truck into a

He then exited the vehicle

Scenario 2:

their employees.

crowd in the Mediterranean resort

and commenced a frenzied

This scenario would involve

of Nice, killing 86 people. Islamic

knife attack on a policeman

either a lone wolf or small group

are fictitious, there is a possibility

State claimed responsibility for

guarding the parliament

attack where a small watercraft

that an attack of this nature or

the attack.

building. The British Prime

loaded with explosives is backed

similar could happen at a public

Minister, Theresa May,

onto the main flagged area of the

mass gathering here in Australia.

there has been an increase in

immediately ordered that

beach and detonated amongst the

To think otherwise is merely being

the number of terrorist attacks

bollards be erected around

crowd. To enable this to occur, the

complacent and we only need

against public mass gatherings,

Westminster to prevent this

watercraft and/or attacker/s could

to look at the latest in a string of

where vehicles have been used

sort of attack happening again

easily be disguised as members of

attacks where a vehicle was used

directly or in conjunction with

in the same area.

a surf livesaving organisation.

as a weapon to understand that,

Over the past several years

attackers exiting the vehicle

In the aftermath of the

and using firearms and edged

Whilst these three scenarios

Terrorist groups are well

as terrorist groups become more

Westminster attack, which killed

known to conduct surveillance

sophisticated with their attacks,

weapons to attack innocent

five people, Australian Foreign

and have dedicated planning prior

so too does the attraction of soft

persons. These attacks have only

Minister Julie Bishop said there

to an attack and there have been

targets such as beaches and

continued to compound fears.

was no guarantee that Australia

many examples where they have

beachside markets and festivals.

Several other examples include:

would not be subjected to a

been disguised as police officers,

• The attack in Sweden, where a

similar style vehicle-attack. She

security personnel, couriers and

Berlin, New York or London

truck was used to mow down

told The Australian newspaper,

so on. This method of attack could

thought it would happen there.

people in Stockholm, was just

“As we saw today in the United

be a controlled detonation or a

Australian society, organisations

the latest in a string of attacks

Kingdom these events can occur,

suicide attack.

and the public need to start

where a vehicle was used as

what we have to do is to take

a weapon.

every step including providing the

Scenario 3:

we approach the threat and risk

resources and legislative power to

This attack would involve a much

of terrorism in our country. It

December 2014, two men

our law enforcement agencies in

more organised structure. Either

is here amongst us and it will

crashed cars into groups of

Australia.”

scenario 1 or 2 would be used,

become more prevalent unless

along with a secondary attack

we educate ourselves, prepare

• On the 21st and 22nd of

pedestrians on successive

Although the above attacks

Nobody in Nice, Stockholm,

thinking and looking at the way

days in France. On the 21st, 11

in London, Berlin and Stockholm

off the beach area as the public

ourselves, work with our

people were injured in Dijon.

were not near a beach, we will put

run from the beach in panic and

intelligence and policing agencies

The following day, one person

forward the following scenarios

confusion to so-called safe areas

with even the simplest action of

was killed and nine others

of attacks that could happen here

where the use of further vehicles,

reporting something that does not

injured in Nantes. Witnesses

in Australia.

shooters or explosive devices

look right.

to both incidents reported

are used to cause further terror,

Education and awareness of

that both men – who have

Scenario 1:

confusion, damage and loss of

the threats and risks is the best

never been publicly identified

This scenario would involve a

lives. This form of attack would

defence that the community can

– screamed “Allahu Akbar”

lone wolf attack by vehicle (for

also be aimed at the arrival and

use to help fight terrorists and

as they raced toward their

example, a 4WD) where beach

setup of responding emergency

terrorism. If the community

targets, but authorities said

access is via the open roadway

services personnel attending to

continues to work together with

in both cases the men were

that exists around most beach

the scene/s.

our policing and intelligence

mentally ill.

surf clubhouses. The attacker

• In December 2016, a truck

Local councils and relevant

agencies, then collectively we can

enters onto the beach, crashes

organisations located at the

ensure the safety and security of

was deliberately driven into a

into the lifesaver station first then

beach will have emergency

the community and protect our

Berlin Christmas market next

proceeds to run down beachgoers

action and crisis management

way of life in Australia. n

38 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


SecTec

PNG

SECURITY CONFERENCE + EXHIBITION

4-6 MARCH 2019

PORT MORESBY

Electronic, Cyber & Physical Security Identifying Risk & Real World Technologies Join us where security industry specialists and professionals will converge on Port Moresby, PNG in March 2019 for the first Oceania premier security industry event with a Security Conference & Exhibition.

Register your Interest at www.sectecpng.com/register.html or email: info@sectecpng.com

Early Bird Registration: 1st Sept 2018 Principal Sponsor

Welcome Reception Sponsor Gold Corporate Sponsors

Media Partner


COVER STORY

TRANSFORMATIONAL ARTIFICIAL INTELLIGENCE FOR THE SECURITY INDUSTRY BY JOHN MCGIFFIN

Artificial Intelligence (AI) is

its ability to eliminate mundane

routine tasks will rely on AI to

transforming every industry

and boring tasks. Imagine you

do a job.

it touches, from healthcare, to

had the job of sifting through a

transportation to agriculture.

photo taken every 10 metres of

around the world will increase

break it down into its various

So, it should come as no surprise

every road in Australia and your

as AI can support doctors to

components. Tractica, a

that the security industry is

job was to recognise where street

recognise illness and disease

specialist research company in

starting to be transformed

signs were placed (or those that

which may have been previously

the AI area, have put together

through AI as well. In fact,

had gone missing), as well as

missed. X-Rays or MRI scans,

a list (as seen below) of the

security, automotive and

the type of road barriers and

for example, may be double-

main AI functions in order of

healthcare are in the top

any pot holes. You would soon

checked by an AI engine which

anticipated worldwide revenue

tier of industry verticals to

become rather bored. AI-enabled

understands what a good knee

size. I have added a column to

benefit from this amazing

computers do not get bored

should look like, thereby letting

indicate if this component will

technology. Security has some

and do not need to be supplied

doctors know if a patient’s is less

impact security – most are a

major influences driving the

with food and water (other than

than optimal.

‘yes’.

adoption of AI, including the

power), so they will happily

increasing threat of terrorism

process every photo, and at a

to demonstrate why AI is

How does AI Work?

and more sophisticated

much faster rate than humans.

transformational and beneficial,

This article will focus on the areas

security perpetrators.

The person previously assigned

think of the farmer who may

from the below table offering

to this task can then perform

have previously sprayed his

the biggest level of value to the

more stimulating activities.

entire crop with weed killer/

security industry, which are areas

insecticide to eliminate weeds

1 and 5. A subcomponent of AI,

If this technology scares you a bit, then read on – this article will help you understand AI

AI will take jobs, but only

The quality of life for people

To better understand AI and its possible applications in security, it is necessary to

If you need another example

in a bit more detail, why the

certain types of jobs, so it is

and bugs, which is costly and

which deals directly with image

impact for security will be so

more about an overall change of

adds unwanted chemicals to

recognition, is a technology called

profound and why it is your

the job mix. Gartner, a leading

food. Using AI, this same farmer

Deep Learning. From this point

friend rather than something to

analyst company, are predicting

can now find just the weeds

onwards, this term will be used

be concerned about.

that in the US alone, AI will

and bugs by using cameras

rather than AI as it is the most

create 2.3 million jobs in 2020

monitored by AI to deliver a dose

relevant of all AI capabilities for

into a wide range of different

while eliminating 1.8 million,

of weed/bug killer only to the

the security industry.

technologies. Unfortunately,

and that by 2022 one in five

target area, without impacting

while many software and

workers engaged in mostly non-

the entire crop.

AI is being incorporated

Why is Deep Learning so important? Think of facial,

hardware companies advise that their product utilises AI, they have simply added a few more ‘smarts’ to their software and claim it is AI ready to go. In light of this, the following will also help you identify true AI capabilities. A standout capability of AI is

40 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


securitysolutionsmagazine.com

SECURITY SOLUTIONS // 41


COVER STORY

IMAGE 1

IMAGE 2

IMAGE 3

behaviour, gesture, licence plate

I so proudly used to distinguish

and weapon recognition as an

between the two types of fruit

example, which all use a form

in image 1 is no longer relevant

of image recognition from still

as I have no colours other than

images or video.

white, black and shades of

Deep Learning solutions

grey. To address this problem,

typically outperform traditional

I will need to add more logic to

recognition technologies, which

describe the fruit without the

is one of the main reasons why

use of colour. Where do I start?

and apple, this time I am going to

important for the following

the level of interest is so high.

Is the orange more round than

provide a Deep Learning training

reasons:

In fact, when trained properly,

the apple? Perhaps that can

computer with 50–100 pictures of

1. Mathematical models can be

Deep Learning has now reached

be my logic now, albeit not the

oranges in different orientations

utilised to calculate with a

the point where its capability to

best logic, particularly as some

and different lighting conditions.

high degree of precision how

recognise an object or person is

oranges are not perfectly round.

The Deep Learning engine

well an item appearing in

equivalent to or better than that

Image 3 brings additional

utilises something called a

an image or video matches

challenges as I have now added

neural network, with typically

the stored representation

a new piece of fruit, which has

five to six layers of intelligence,

The AI Knowledge Journey

of that image. In the case

both green and orange in it. My

with each layer responsible for

of the orange example in

existing fruit differentiation logic

recognising something about

image 6, the Deep Learning

In the image above (image 1),

is now almost worthless, and the

the image. The first layer might

engine obviously matched

there is obviously an orange

recognition process is becoming

be responsible for recognising

the orange on the left with

and an apple. If I was a software

more and more complex, which

squares, rectangles and triangles

a high level of accuracy.

developer and I had to develop

often leads to accuracy issues.

before passing onto the next

Because the orange on the

layer which performs another

right has a lot of mould, the

task and so on.

Deep Learning model still

of a human.

IMAGE 4

some software code to tell the

This time, I want to write

difference between these two

some logic to tell the difference

kinds of fruit, I could simply ask

between a dog and a mop, as per

the computer to work out the

image 4. You would think this

against a reference image, Deep

this time the confidence

colours of each fruit and say the

would be easy.

Learning builds a mathematical

level has dropped. In this

model of the item it has

case, additional reference

been trained on. As a result,

images of oranges with mould

it is essentially recognising

could be added and the Deep

job is done. However, in image 2, it is exactly the same fruit but this

But what happens if my dog looks like image 5? All of these issues, plus

Rather than comparing

believes it is an orange, but

time the colour on my camera

many others, are addressed by

something by utilising the

Learning system would then

was not working and so the

Deep Learning. Rather than

mathematical representation

improve on its capability

two different types of fruit are

writing computer code to tell the

of that item. The fact that it is

to recognise oranges even

now black and white. The logic

difference between the orange

a mathematical model is very

with mould. This confidence-

42 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


IMAGE 6

IMAGE 5

based approach enables

each layer being responsible for

organisations to only trigger

recognising a specific aspect of

alerts when a high level of

the image. There are various

confidence exists, thereby

neural network models, with

reducing false positive

some simply passing the image

event alerts.

mathematical from one layer to

2. Rather than utilising the

another and others involving a

Central Processing Unit (CPU)

looping process between some

of a computer to calculate

layers to enhance accuracy.

if something is an orange

To ensure your software

with 25 frames of video

provider is utilising Deep

relying on the security officer’s

the Deep Learning training

being sent to it, researchers

Learning, it is best to ask them if

ability to make the observation

engine, typically being 60–100

have found that a Graphical

their software requires at least

for himself.

images of each vehicle, so that

Processor Unit (GPU) with

one GPU to run and if they utilise

Further to this, because of

many hundreds of cores

neural networks. There are some

the large number of recognition

Ultima and many other vehicles

can process Deep Learning

solutions which utilise neural

technologies available, security

look like.

mathematics at a much

networks without GPU, which

can choose multiple ways to

higher rate than a CPU. The

are either not actually utilising

recognise a person or a vehicle

provided you with an easy

rise of powerful GPUs has

Deep Learning or will most likely

and the like, correlated together.

way to understand AI and

brought Deep Learning to

be slow.

As an example, with the rise

Deep Learning and why this

of people printing their own

technology is set to be so

it can learn what a Nissan

I hope this article has

life, as computers have not

In a previous article

had the processing power

published in this magazine,

vehicle licence plates as a copy

transformational to the security

in the past to process this

I wrote about the arrival

from another vehicle with a

industry. n

type of workload. GPUs are

of Security 4.0, which is

3D printer, organisations will

enhancing other areas of the

the next evolution of the

need to utilise more than one

security industry as they also

security industry. GPUs and

technology to determine the

Managing Director at Deep

enable Visual Management

Deep Learning have enabled

correct vehicle.

Recognition (previously

System (VMS) platforms to

the industry to evolve into

process a higher number of

this next phase of security,

the use of Deep Learning,

recognition company which

video streams than a CPU

particularly with the rise of

albeit this time for marketing,

covers technologies such

only system.

off-the-shelf Deep Learning

a Melbourne-based company

as Facial Recognition, LPR,

Lastly, the final concept to

solutions like Briefcam. Deep

called Deep Recognition utilised

Demographics Recognition,

understand: Deep Learning

Learning enables security to

Deep Learning to recognise the

People Counting, Gesture

actually emulates the way that

be event driven rather than

make and model of cars being

Recognition, Entity Relationship

the human brain recognises

observational, where the Deep

driven on the road. Rather than

Analysis and Deep Learning/AI-

something. It does this through

Learning engine trigger is

trying to describe the vehicle to

based recognition to recognise

the use of neural networks

informing a security operator

the computer system, they used

people, things and situations. He

which are a series of layers in

of an event he or she needs

a database of many different

can be contact at john.mcgiffin@

the mathematical model, with

to be aware of rather than

vehicles which are added into

deeprecognition.io

securitysolutionsmagazine.com

As a real-life example of

John McGiffin is the

Intelliscape), a specialist

SECURITY SOLUTIONS // 43


FEATURE

44 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


The Family that Slays Together

Mother’s Deadly Day: She Blew Up Herself and Her Two Girls to Murder Christians BY ANNE SPECKHARD AND ARDIAN SHAJKOVCI

The deadly attacks during Sunday services in Indonesia were the work of a whole family. They reportedly had returned from ISIS-land – a cautionary lesson as others seek to head home.

While Mother’s Day was

strap bombs on herself as

being celebrated in the United

well as on the bodies of her

already has claimed credit for

States, Canada and Australia,

two daughters, Fadila Sari, 12,

the attack, while Surabaya Police

a gruesome ‘celebration’

and Pamela Rizkita, nine, and

Chief Tito Karnavian confirmed

of another kind took place

take them to the Diponegoro

to the BBC that the family

in Indonesia: three nearly

Indonesian Christian Church to

belonged to an Indonesian

simultaneous suicide attacks

blow themselves and others up.

ISIS-inspired network, Jemaah

on three separate churches in

Ansharut Daulah (JAD). While

Surabaya, all carried out by

Yusuf, 18, and Alif, 16, rode

al Qaeda killed 202 people in

members of the same family.

motorcycles into Santa Maria

the Bali bombings in 2002, since

Catholic Church and detonated

then, ISIS attacks in Indonesia

at killing morning service goers

explosives they were carrying.

have been smaller scale and

rocked the Indonesian city,

Their father, Dita Sopriyanto,

foiled. Recent prison riots set off

killing at least 11 people and

drove his bomb-laden car into

with ISIS incitement may have

injuring another 40. People

the grounds of Surabaya Centre

spurred these attacks.

around the world asked how a

Pentecostal Church, where he

mother, Puji Kuswanti, could

self-detonated.

The wave of carnage aimed

securitysolutionsmagazine.com

Meanwhile, the family’s sons,

The so-called Islamic State

The family of six suicide attackers is thought to be among

SECURITY SOLUTIONS // 45


FEATURE

more than 500 Indonesian

should be allowed to return

ISIS sympathisers who have

home at all and, if so, whether

published in the Daily Beast on

regularly speaks and publishes

returned from Syria and

they might represent a danger

13 May 2018.

on the topics of the psycholog y

Iraq. If true, they must have

to society. Questions also linger

imbibed the ISIS Takfir ideology

over whether they need to be

Ph.D. is Director of the

and is the author of several

according to which all those

prosecuted – in the case of adult

International Center for the

books, including Talking

who do not adhere to ISIS’s

women – and if they can be

Study of Violent Extremism

to Terrorists, Bride of ISIS,

strict interpretations of Islam

successfully rehabilitated and

(ICSVE) and serves as an

Undercover Jihadi and ISIS

are enemies worthy to be killed,

reintegrated, in the case of both

adjunct associate professor

Defectors: Inside Stories of the

even if they are other Muslims.

women and children.

of psychiatry at Georgetown

Terrorist Caliphate. Follow

University School of Medicine.

Anne @AnneSpeckhard

The members of this family,

Given that ISIS routinely

This article was first

Anne Speckhard

how to rehabilitate them. She

of radicalisation and terrorism

or at least the parents, believed

separated boys as young as six

She has interviewed over

they were taking a short-cut

from their parents in camps

600 terrorists, their family

is the Director of Research

to paradise, faithful to the

where they were ideologically

members and supporters in

and a Senior Research Fellow

militant jihadi teaching that

indoctrinated and weapons

various parts of the world,

at the International Center

self-martyrdom and the killing

trained, it is not inconceivable

designed the psychological

for the Study of Violent

of the enemies of ISIS brings

that teenage male returnees

and Islamic challenge aspects

Extremism (ICSVE). He has

about the instant reward of

might pose a grave danger. ISIS

of the Detainee Rehabilitation

been collecting interviews with

bypassing the Judgment Day,

also routinely invited foreign

Program in Iraq to be applied

ISIS defectors and studying

forgiveness of all sins, 72 virgins

fighters’ wives to join the

to 20,000+ detainees and 800

their trajectories into and

for male martyrs and eternal

dreaded ISIS hisbah (morality

juveniles and has consulted

out of terrorism as well as

beauty for females. This also

police), in which they were

to NATO, OSCE, foreign

training key stakeholders in

includes the opportunity for

issued Kalashnikovs, were

governments and to the U.S.

law enforcement, intelligence,

the martyr to grant entry to

given great power over others

Senate and House, Departments

educators and other countering

paradise to another 70-plus

and took part in brutal abuse

of State, Defense, Justice,

violent extremism professionals

family members.

of other women for violating

Homeland Security, Health and

on the use of counter-narrative

ISIS-mandated dress codes and

Human Services, CIA, FBI, CNN,

messaging materials produced

other infringements.

BBC, NPR, Fox News, MSNBC,

by ICSVE both locally and

CTV and in Time, The New

internationally. He has also

Thus far, no Indonesian women or children have previously taken part in terror

Similarly, foreign women

Ardian Shajkovci Ph.D.

attacks – this one now opens

were invited to become ISIS’s

York Times, The Washington

been studying the use of

the door for such participation

online recruiters, writing blogs,

Post, London Times and many

children as violent actors by

and underlines the dangers

contacting others online and

other publications. In the

groups such as ISIS and how

of female and child returnees

seducing them into joining. And

past two years, she and ICSVE

to rehabilitate them. He has

from ISIS.

our interviews doing research

staff have been collecting

conducted fieldwork in Western

The issue of ISIS returnees

for the International Center for

interviews with ISIS defectors,

Europe, the Balkans, Central

remains a hotly debated topic.

the Study of Violent Extremism

returnees and prisoners,

Asia and the Middle East,

Many governments worldwide

make it clear that some women

studying their trajectories into

mostly recently in Jordan and

are openly expressing their

were also combat trained,

and out of terrorism, their

Iraq. Ardian has presented

concerns over a flood of

particularly as ISIS faced the

experiences inside ISIS, as well

at professional conferences

weapons-trained ideologically

US-led coalition’s onslaught,

as developing the Breaking the

and published on the topic of

militant men returning home

with women being trained

ISIS Brand Counter Narrative

radicalisation and terrorism.

since the territorial defeat of

to throw grenades, place and

Project materials from these

He holds a doctorate in Public

ISIS in Iraq and much of Syria.

detonate explosives, and fire

interviews. She has also been

Policy and Administration

While that deluge has not

rifles. Some were issued suicide

training key stakeholders

from Walden University,

materialised – most of the men

vests and were also sent to

in law enforcement,

with a focus on Homeland

have been killed, arrested, or

detonate themselves.

intelligence, educators and

Security Policy. He obtained

other countering violent

his M.A. degree in Public Policy

remain at large in the region –

Whether that was the case

the question of how to deal with

with Puji Kuswanti is still not

extremism professionals on

and Administration from

women and children returnees

clear and it is too early to say

the use of counter-narrative

Northwestern University and

has no clear answer.

whether her suicide and the

messaging materials produced

a B.A. degree in International

martyrdom of her children

by ICSVE, both locally and

Relations and Diplomacy from

problem of female returnees

will be the exception or the

internationally, as well as

Dominican University. He is an

are trying to decide on a case-

rule for mothers and children

studying the use of children

adjunct professor at Nichols

by-case basis. The debates

indoctrinated by the blood cult

as violent actors by groups

College, teaching cybersecurity

continue over whether they

that is ISIS. n

such as ISIS and consulting on

and counterterrorism courses.

Governments facing the

46 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


NEW!


FEATURE

48 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


LATEST SURVEY SHOWS THAT ATTITUDES AND ADOPTION HAVE BOTH SHIFTED IN FAVOUR OF CYBERSECURITY BEST PRACTICE BY LEON FOUCHE

came into effect. Companies

in favour of cybersecurity best

New Legislation Creates Real and Significant Penalties for Businesses

with more than 500 board,

practice. However, still only 56

Since the 2016/2017 Cyber

or in the EU, or marketing goods

business and IT executives across

percent of organisations have a

Security Survey Report, it has

and services to EU residents,

Australia and New Zealand. The

cyber incident response plan in

been revealed that Equifax,

must comply with the new

BDO and AusCERT 2017/2018

place, which is a slight increase

Uber, Facebook and Cambridge

regulations or risk facing heavy

Cyber Security Survey delivers

from 48 percent last year. The

Analytica compromised the

fines and criminal penalties. Even

insights into the cyber resilience

survey also found that the top

personal information of more

companies that are not located in

and maturity of Australian and

three cybersecurity incidents

than 150 million users. It is

the EU may be impacted, as their

New Zealand businesses for

experienced by Australian and

understandable then that the

EU client companies and suppliers

the second year in a row. This

New Zealand organisations were

general public’s expectations

may require compliance as a

annual survey gives organisations

ransomware (17.8 percent),

of organisations protecting

condition of continued business.

the opportunity to benchmark

phishing (19.3 percent) and

their privacy has never been

themselves against their peers

malware (17.9 percent). Thirty

higher. The level of government

Amendment (Notifiable Data

and equip them to ask the right

percent of respondents were

and public scrutiny brings

Breaches [NDP]) Act 2017 became

questions on how to improve

affected by a cyber incident of

cybersecurity to the attention

effective in February this year.

their cybersecurity environment.

some kind; and it is important to

of boards and executives. It can

Despite financial penalties for

The resulting report contains

note that these incidents were not

no longer be regarded as simply

non-compliance – up to $420,000

valuable benchmarking data,

confined to large corporations.

an IT activity – cybersecurity

for individuals and $2.1M for

identifying the current state of

The survey found that almost 18

now needs to firmly reside as an

organisations – this year’s Cyber

play in the local cyber landscape

percent of small- to medium-sized

embedded part of organisational

Security Survey found that more

and capturing views on what

businesses were impacted by a

risk strategy, and this change

than a third of respondents did

may lay ahead. The report also

cyber incident. A cyber incident

is occurring.

not know if their organisation

reveals the cybersecurity risks and

can come at a great financial

realities faced by Australian and

and reputational cost to the

make businesses accountable for

data breaches scheme. Australian

New Zealand businesses across

business, yet only 37 percent of

protecting their data. In May 2018,

businesses need to be acting now

a range of organisation sizes and

survey respondents had cyber

the European Union (EU) General

to have cybersecurity practices

industry verticals.

insurance cover.

Data Privacy Regulation (GDPR)

and processes in place, should

BDO Australia and BDO New

The main trend observed in

Zealand, in partnership with

this year’s report is that attitudes

AusCERT, conducted the second

and adoption have both shifted

annual Cyber Security Survey

securitysolutionsmagazine.com

Governments are starting to

in the EU will be required to demonstrate compliance, while companies doing business with,

In Australia, the Privacy

must comply with the notifiable

SECURITY SOLUTIONS // 49


FEATURE

they be required to report any actual or perceived breach to the regulator once the legislation comes into effect.

Leadership and Strategy are Important Roles Most of these regulatory changes will require business owners and leaders to take accountability for their cybersecurity arrangements and provide leadership and

Finally, we expect more organisations will invest in staff education and training, as they are often the weakest link within the organisation.

direction for ensuring compliance against regulatory changes. Increasingly, boards and

Email Compromise (BEC) scams

vendor risk assessments

organisations report data

executives play an important

have grown more prevalent and

increased 20 percent from the

breaches. Whilst there might be

role in ensuring cyber resilience

sophisticated. In these scams,

previous year.

initial difficulties to adopt these

within their organisations. The

the cybercriminals use social

results from this year’s survey

• Adoption of IT/cybersecurity

changes, compliance with these

engineering tactics to trick

standards/baselines for third

regulations is raising awareness

show that business owners

employees authorised to request

parties increased 18 percent

on data leaks and privacy

and executives recognise the

or conduct wire/bank transfers.

from the previous year.

concerns for corporates and

importance of cybersecurity,

Fraudsters usually spoof or hack

which is evident in improvements

the emails of senior executives at

cybersecurity risk assessments

to seeing improved maturity over

noted on a number of leadership-

the organisation and use email

increased 18 percent from the

the coming year.

related activities from prior

to instruct lower level employees

previous year.

years: a 17 percent increase in the

to conduct a bank transfer to

adoption of cyber risk reporting

a fraudulent account (aka CEO

identify critical systems and

staff education and training,

to boards, 18 percent increase

fraud). In other forms of BEC, the

data increased 14 percent

as they are often the weakest

in the adoption of cybersecurity

criminals compromise the email

from the previous year.

link within the organisation.

awareness programs and 29

of a finance officer and request

percent increase in the adoption

invoice payments from vendors

cybersecurity policy

management teams requiring

of CISO roles.

to their own bank accounts.

increased 12 percent from the

specialist training on cyber risk

Scammers can also pose as a

previous year.

management, which we predict

Phishing and Email Attacks are on the Rise

supplier to the organisation

Phishing and email attacks are still the most prevalent form

• Adoption of a process to

• Adoption of an IT/

individuals and we look forward

Finally, we expect more organisations will invest in

We are seeing more boards and

is likely to increase further this year. We are also expecting to

fraudulent account (aka bogus

Our Predictions for the Coming Year

invoice scheme).

Despite the view from survey

corporates and multinational

respondents, phishing,

organisations provide basic

ransomware and malware

cybersecurity risk assessment

remain a concern. We believe

training to their suppliers and

that ransomware will continue

service providers in an effort to

and request a wire transfer to a

of cybersecurity incidents by ransomware and malware

The Visibility of Risk is Improving

coming in a close second and

One of the most important

affecting respondents, followed

• Adoption of regular

see larger and more mature

third. Email is the primary online

components of a successful

to be successful due to its

improve the security maturity of

method used for communications

cyber resilience program is to

effectiveness in extorting money

their supply chain. n

and information sharing for

have a clear and end-to-end

out of corporations. We also

private and business users.

understanding of cybersecurity.

anticipate an increase in wiper-

Symantec reported that in 2017,

Compared to last year’s survey,

based malware masquerading

Leader for cybersecurity. He is

55 percent of all emails sent

this year’s survey showed a year-

as ransomware, aiming to

a cybersecurity and technology

were spam and that phishing

on-year increase in adoption of

disrupt businesses.

risk specialist with more than 20

emails are the most widely used

visibility of cybersecurity risk:

infection vector employed by 71

• Adoption of cloud security

Survey respondents indicated

Leon Fouche is BDO National

years’ experience, having worked

that they expect to see an increase

extensively with the board and

percent of all threat actor groups.

standards increased

in data breach-related incidents.

C-level leaders in government and

The BDO survey found similar

by 7 percent from the

With the implementation of

the private sector. Leon can be

trends for Australia.

previous year.

the Australian NDB and EU’s

contacted by email leon.fouche@

GDPR, we expect to see more

bdo.com.au

Over the past year, Business

50 // SECURITY SOLUTIONS

• Adoption of third party/

securitysolutionsmagazine.com


M2M & IoT Solutions are revolutionising the security industry. M2M One SIM cards power security solutions nationwide, including:

Access Control

Wireless IP Cameras

IP Alarm Panels & Dialers

Failover & Redundancy

Lone Worker Safety

Vehicle & Asset Tracking

Contact M2M One now to get connected: www.m2mone.com.au | info@m2mone.com.au | +61 3 9696 3011 Expo Stand: C27

Recognize AND Analyze Is she an employee?

When, where did she enter? How often was she here this month?

Is she a banned person?

Premier face recognition technology for real-time video surveillance, recorded video investigation, crowd detection, and anonymous people analytics

See how it works at Security Expo in Melbourne, stand J8!

Does she appear in videos recorded last week?

How old is she?


AVIATION

TRAVEL SECURITY BY STEVE LAWSON

52 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


It is getting towards the holiday

broken and that was by New

part of the year and about this

Zealand Customs, who decided

time last year I wrote an article

they needed to get into my locked

about travel security, so it seems

bag so they broke the locks and it

appropriate to revisit the subject.

was never the same.

Most of this article is aimed at the international traveller, but much

Do Some Research

is appropriate to domestic travel

There are so many sites that

as well. As a director of a company

provide information that it can

which provides travel advice

be overwhelming and often the

(www.paradym.co), I have access

security advice on many sites is

to a range of resources.

not particularly good. However, if

I can say that in almost 30

securitysolutionsmagazine.com

you are travelling overseas, look at

years of travel, I have never had

Smartraveller (smartraveller.gov.

an issue, and I have travelled to a

au) and the UK equivalent (gov.

few places that could be described

uk/foreign-travel-advice). I do find

as less than desirable. I have lost

the detail on the UK site is a little

one bag, when I was on my way

better, but that is probably just a

to New York to handle Qantas’

personal preference. It only takes

on-ground response to September

10 minutes to check both and it

11 and I did not have a ticket for

is good practice to register your

one sector. I have had one bag

travel on Smartraveller.

SECURITY SOLUTIONS // 53


AVIATION

Insurance

Kmart, Target or similar and

marking it with nail polish

that I did not use, to make sure

I often watch the news and

get a bargain. There is not

or similar.

I have not left anything. To be

see travellers stranded in

much use paying a fortune

various places and whining that

for a designer bag just to use

tag on your bag so that you

my bag unless I am in a room for

something has gone wrong and

once every year or two. Even

can recognise it easily. It not

more than a week. A checklist is

the airline is not helping. The

if you travel a lot, do not buy

only makes it quicker to get the

a good way to make sure that you

short answer is to get travel

expensive bags. If your bag

bag off the arrivals carousel,

have accounted for all your items

insurance! It is not the answer

stands out as being ‘expensive’

but it means that you can see

before checking out.

to all problems, but it will help

then thieves (who are not

if someone tries to steal the

stupid) may target it.

bag off the carousel. There

in most cases. I also do not suggest you skimp on paying

2. The most basic rule of travel

3. Put a ribbon or coloured bag

completely frank, I do not unpack

are also electronic tags that

General Security Advice 1. Always be aware of your

for insurance; it is amazing how

– do not put anything that

track your bag. I have not tried

many Australians get injured

you do not want to lose into

them, but we did experiment

surroundings. It is not possible

overseas and then find that their

checked baggage! I often

with something similar for

to teach situational awareness

basic insurance is not sufficient. It

show people how easy it is to

air cargo a few years ago and

in this article, but a couple of

is the same if you are holidaying

open and close a zippered bag

I cannot see any reason they

pieces of advice:

domestically – get insurance.

without letting someone know

would not work. To be honest,

• Look around – there is no

If you travel regularly, get an

that you have been inside. If

given the first sentence of

hard and fast rule about

annual policy.

you do use a zippered bag, you

this paragraph, you should

who is acting suspiciously,

need to make sure the slider

not need them. I also carry at

but if someone keeps

Baggage

(pull tab) does not move. The

least a set of underwear in my

looking at you, and like

1. Buy a bag that is suitable for

locks on some modern bags

carry-on bag, just in case my

me you are not the most

the travel you do. I buy good

fix them in place, but some

bag is lost.

attractive person in the

bags because I travel a lot

soft-sided bags have multiple

and they last. I do not buy

zips. You should fasten them

Checklists

or she may only be trying

bags because they are status

to a fixed point (like a handle)

I do not do this but I should. Keep

to sell you something, but

symbols. I got my latest bag

on your bag. You do not

a checklist of your valuables,

in Thailand and it is perfectly

need to use anything fancy

even if it is on your phone or

good. My cabin bag came from

or expensive – zip ties work,

tablet. When I checkout, I always

points are and, where

Costco. If you do not intend

but I would make sure you

do two walk arounds and look

possible, make sure there is

travelling a lot, go to Big W,

can identify your zip tie by

everywhere, including drawers

more than one.

54 // SECURITY SOLUTIONS

area, avoid that person. He

avoid him. • Know where your exit

securitysolutionsmagazine.com


places, photography of

4. Local customs:

public buildings, ports,

• When you research your trip, make sure you look at what

not recommended.

is acceptable behaviour. That

money exchanges. People

may include what is acceptable

may be observing and noting

avoid conspicuous displays

dress. I have been in a shopping

the amount of money you are

of wealth such as expensive

centre with a police officer who

carrying – go inside a bank or

clothing, flashy jewellery,

reminded some Western girls

electronics or displaying

that they should dress modestly.

• You are responsible for the

large amounts of cash

In many countries, men should

security of your baggage

(bearing in mind, what

not touch women or be alone

while checking in or out of a

we may consider a small

with them and, in several places,

hotel – ensure that it is under

amount of money may be

homosexuality is illegal.

a considerable fortune to

5. Drinking and alcohol:

others). Only take with you

• Watch out for ‘tourist drugging’

items that you are prepared

and other drink spiking. If

to lose.

alcohol is consumed, the

• Watch out for strangers

preferred alcohol is beer or

• Take care using ATMs or

convert money at your hotel.

constant supervision. • If you are unfortunate enough to be the victim of crime, do not put up a fight. Do as the person says. • Maintain a small ‘emergency

‘offering help’ or ‘needing

wine from sealed bottles that

kit’ to hand when staying in

help’.

are opened in your presence.

hotels in case there is a fire,

• Try not to travel on your

• Stay away from the

deposit box.

airports or bridges is also • Do not look too wealthy –

2. Areas to avoid:

room safe or the hotel safety

• Drinks (including water) should

earthquake or other emergency

own; it is best to be part

only be consumed from closed

or where electricity supplies are

of a group. That does not

and sealed bottles, including

unreliable. This should consist

mean a tour group, but if

in hotel bars. Opened bottles

of at least a torch, a whistle, a

you become friends with

and glasses should not be left

people during your travel,

unattended at any time. If they

It seems a long list of do nots,

are, discard the contents.

especially from someone who

bottle of water and some food.

immediate environs of

stay as a group. Look to join

Western diplomatic missions,

tours provided by your agent

6. Things to do:

says he has had almost 30 years of

including embassies, high

or the hotel. To be blunt,

• You must carry a form of ID

travelling without an issue, but if

commissions, consulate

many are rip-offs because

with you always. I do not leave

you look at the article, almost all is

generals and consulates,

they take you to businesses

my passport in the hotel – I

common sense and, other than the

unless you have a reason

associated with them where

always carry it with me and

checklist, things I mostly do. Have a

to visit.

they get a cut, but they are

keep it in my front pocket. If

great trip, wherever you go. n

usually safer than randomly

someone does brush against

parts of town such as red-

wandering on your own.

you and you think you have

light districts.

An alternative is to offer a

been pickpocketed, do not

experience in aviation security. As a

• Stay away from ‘seedy’

Steve Lawson has over 20 years’

cab driver a day rate. Some

automatically check one pocket

security executive with Qantas, Steve

gatherings and

of the best tours I have

for your wallet. That just signals

held a number of senior management

demonstrations; they may

had were in cabs where I

where you keep your valuables.

roles covering all aspects of aviation

appear benign, but they can

negotiated a day rate. That

turn violent quickly.

included a great tour of San

thieves may pose as police

to airport operations. He was sent

Francisco, so try in first

officers or private security

to New York immediately following

shopping venues carefully –

world countries as well.

guards. Always ask to

the 9/11 attacks to manage the

venues with a higher level of

• Having said to use cabs, do

see identification.

Qantas response and undertook

• Do not go near political

• Choose entertainment and

• Beware that in some places

security from policy development

a similar role following the 2002

visible security are generally

not hail them in many third

safer than venues with no,

world countries. It is best to

someone knows where you are

Bali Bombings. On his return to

or obviously poor, security

use vehicles pre-booked by

going and when you can be

Australia, he was appointed Security

as criminals and terrorists

the hotel rather than hailing

expected to return.

Manager Freight for the Qantas

are more likely to attack the

them in the street. This is

‘softer’ target.

important at the airport. Be

phone numbers of the hotel

a director of AvSec Consulting in

aware that in many places

and anyone in your group

partnership with Bill Dent, a fellow

• Photography of police and

the cab can be a shared ride

programmed in your phone.

former Qantas security executive.

military infrastructure

and the drivers may stop to

and personnel is not

collect people until the cab

recommended. In many

is full.

3. Things not to do:

securitysolutionsmagazine.com

• If you go out, make sure

• Make sure that you have the

• Ensure your mobile phone is always charged. • Leave your valuables in your

Group. Since 2007, he has been

Steve can be contacted via email slawson@avsecconsulting.com or on 0404685103.

SECURITY SOLUTIONS // 55


ACCESS CONTROL

The Role Of Bluetooth In Mobile Access Control BY SCOTT LINDLEY

As you join in the trend to use smartphones in access control, be sure to select the right communications protocol.

56 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Using smartphones in access

systems. Not proximity. Not smart

control systems is the new

cards. Phones!

buzz in discussing readers and

Besides the fact that just

credentials. Electronic access

about everyone has one, what

control manufacturers are

are other reasons? To arrive at

promoting the various ways that

that answer, let us review the

mobile technology, soft or virtual

basics of access control. Access

credentials can be used to replace

control authenticates a person by

cards. It is not surprising that all

following three things:

are trying to get on board.

• recognises something he has

According to Gartner Research, 95-plus percent of all adults aged 18–44 years own smartphones. That is not all – 69 percent of the entire population already uses

(RFID tag/card/key) • recognises something he knows (PIN) • recognises something he is (biometrics).

smartphones. That is babies through seniors. Gartner suggests

securitysolutionsmagazine.com

Smartphones have all three

that, by 2020, 20 percent of

authentication parameters. This

organisations will use mobile

soft credential, by definition, is

credentials for physical access

already a multi-factor solution.

in place of traditional ID cards.

Mobile credentials remain

To rephrase that last sentence:

protected behind a smartphone’s

in less than 18 months, one-fifth

security parameters, such

of all organisations will use the

as biometrics and personal

smartphone as the focal point of

identification numbers (PINs).

their electronic access control

Once a biometric, PIN or password

SECURITY SOLUTIONS // 57


ACCESS CONTROL

is entered to access the phone,

mobile access, there are a

the user automatically has set up

few things to consider before

to a closer read range. NFC

longer read range, perhaps six

2-factor access control verification

deciding on the type of reader

eliminates any chances of having

feet, can be provided so users

– what he knows and what he has

to invest in. The installed base

the smartphone unknowingly

do not have to open their car

or what he has and a second form

of mobile devices can affect the

being read, such as can happen

window to reach the reader. At 15

of what he has.

technology choice, as iPhones 5s

with a longer read range. There

feet, the reader can open parking

and earlier do not support NFC. In

are also those applications where

garage doors or gates that allow

access to the credential without

organisations with a large base of

multiple access readers are

entrance to the facility, such as at

having access to the phone. If

iPhones and Androids, Bluetooth

installed very near to one another

gated communities.

the phone does not work, the

is the only option.

due to many doors being close

To emphasise, one cannot have

credential does not work. The

Bluetooth technology is quite

There are other advantages

entering the facility gate, a still

There is yet another advantage

together. One reader could open

to a longer reader range. Since

credential works just like any

popular and anyone who has

multiple doors simultaneously.

NFC readers have such a short

other app on the phone. The

ever tried to sync smartphones,

The shorter read range or tap of

and limited read range, they must

phone must be on and unlocked.

computers and/or headphones

an NFC-enabled device would

be mounted on the unsecure side

has probably used it. Bluetooth

stop such problems. However,

of the door and encounter all

availability and built-in multi-

readers are less expensive because

in defense of NFC, it must also

the problems such exposure can

factor verification – are why

almost every smartphone already

be understood that Bluetooth-

breed. Bluetooth readers mount

organisations want to use

has Bluetooth. Not even 50 percent

enabled readers can provide

on the secure sides of doors and

smartphones in their upcoming

of all smartphones yet have NFC.

various read ranges of no longer

can be kept protected out of sight.

These two factors –

access control implementations.

In most instances, NFC uses

than a tap as well.

Why Bluetooth has become the Popular Communications Protocol

that the smartphone needs to

advantage for Bluetooth. Read

Other Information about Bluetooth

come into much closer nearness

range can be from an inch to over

The Bluetooth technology used in

to the reader, like a proximity

15 feet. Installers can provide

access control is called Bluetooth

card versus a longer range

adjustable read ranges and differ

Low Energy (BLE). It is very

Bluetooth and Near Field

transmitter. The good news is that

them for various applications.

efficient; a single cell battery

Communications (NFC) are the

such closer proximity prevents

For instance, they could choose

could operate for months on end.

most popular short-range radio

interference from other devices

a reader requiring presentation

For those technically inclined,

wave communication standards

communicating from farther

at the computer server room.

it operates with a maximum

used in smartphone credential

away. The negative is that the

Three feet may be the preferred

speed of 1Mbps with actual

systems. When implementing

reader can seem more finicky.

range at the front door. When

throughput of 10 ~ 35 Kbps. Thus,

less power. As a result, this means

58 // SECURITY SOLUTIONS

This leads to a major

securitysolutionsmagazine.com


access control using Bluetooth

use. From that point on, the user

Door access – register. Parking

continuing to expand in use to

BLE technology with today’s

simply presents his smartphone

access – register again. Data access

the point where those not having

smartphone offers the promise of

to the BLE-enabled reader. Forget

– register again. And so on.

them are already the exceptions.

lowering the cost of hardware.

having to enter a PIN or password

Newer solutions provide an

They are unquestionably going to

to authenticate identity (as with a

easier way to distribute credentials

be a major component in physical

there needs to be a direct

card). Henceforward, a person’s

with features that allow the user

and logical access control. If they

connection between the Bluetooth-

smartphone is his identity. Once

to register only once and need no

are going to constitute 20 percent

enabled device and the Internet.

the phone is operational, so too is

other portal accounts or activation

of all card-based access control

This is done very simply through

the credential!

features. By removing these

within the next 18 months, it can

additional information disclosures,

be expected that the numbers

To make the system work,

the cellular data network or a secure Wi-Fi connection. To

A Couple of Caveats

vendors have eliminated privacy

will be much higher by the end of

install a mobile credential, a user

As when implementing any new

concerns that have been slowing

2020. n

needs to first have the Wallet

technology, become familiar

down acceptance of mobile

app installed on a supported

with it. What are the benefits?

access systems.

smartphone. Next, the user

Where are the potential pitfalls?

launches the app and selects the

Organisations should make

hackers listening to their Bluetooth

to Farpointe, Scott was Director

‘+’ button, indicating that he would

sure the manufacturer not only

transmissions, replaying them

RFID Products at Keri Systems

like to load a new credential.

understands Bluetooth, but knows

and getting into their buildings, so

and Sales Manager North America

A registration key certificate is

how to coach them through the

they should make very sure that

at Motorola Indala Corporation.

provided for each credential

initial installations.

the system is immunised against

Scott holds a Master of Business

such replays. That is simple to

Administration (MBA) from

Do not forget about

ordered. He then enters the

Scott Lindley is the General Manager of Farpointe Data. Prior

Organisations do not want

unique 16-character key from the

cybersecurity responsibilities. For

do. The manufacturer will advise

Thunderbird School of Global

certificate and taps ‘submit’.

instance, some older Bluetooth-

which system will be best for

Management in Glendale, Arizona

enabled systems force users to

each application.

and a Bachelor of Arts from

Once successfully registered, the new mobile credential will

register themselves and their

appear in the Wallet app ready for

integrators for every application.

big sizes for blokey wrists

only lsc

$ ACSS iClass Silicone Wristband [Dark Blue] Large PART CODE: ACICSWDBL

12

Research shows that Bluetooth-

super comfy silicone

perfect for gyms and pools

only lsc

$

00 ACSS iClass Silicone Wristband [Dark Blue] Extra Large

12

$ ACSS iClass Silicone Wristband [Black] Large PART CODE: ACICSWBLKL

c s l t a y l on

only lsc

only lsc

00

PART CODE: ACICSWDBXL

California State University in Sacramento, California.

enabled smartphones are

12

$

00

12

00

ACSS iClass Silicone Wristband [Black] Extra Large PART CODE: ACICSWBLKXL

iClass wristbands

You can now purchase our quality all-in-one silicone wristband with an integrated HID Global iClass credential. These robust waterproof wristbands are perfect for gyms, swimming pools, surf clubs and anywhere where water or moisture is an issue. They are also perfect for gaming and hospitality installations where a free hand isn’t always available.

6 LOCATIONS ACROSS AUSTRALIA & NEW ZEALAND CALL 1300 646 269 OR SHOP LSCSECURITYSUPPLIES.COM.AU

They are stocked in Black and Dark Blue. Other colours are available but may attract a minimum order quantity. Talk to your local Account Manager for more details.


PROFESSIONAL DEVELOPMENT

IF THE TRUTH BE TOLD… HOW TO UNCOVER A LIAR PART I ELLY JOHNSON

60 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


There has been a theft of $500

not all questions are born equal.

from an office. The money was

How well a question ‘works’ in

taken from an employee’s bag,

a given situation depends on

which was stowed under a desk.

many factors, and one of them is

You are the person running

how well the asker understands

the initial investigation and

the mind of a typical liar when

you have little or no evidence

questioned. There is a strong

as to who took the money that

psychological basis to why certain

morning. Your job is to identify

questions work and, once you

the culprit and if there were any

understand how people think

witnesses or anyone else involved.

when they are presented with

Predictably, everyone is denying

them, it can transform the way

any knowledge of or involvement

you look at questions in general.

in the theft, but someone is

moment into the mindset of a

for certain, just by analysing the

person who has something to

response to a series of simple

hide. Let us call that person

questions, that a person is lying

the DECEPTIVE person. That

even if they were denying the

is, someone who has guilty

offence? Yes, definitely!

knowledge and a guilty mindset

When it comes to evaluating the truthfulness of an answer,

securitysolutionsmagazine.com

Immerse yourself for a

lying. Could you know, almost

because they are hiding the truth about something. Put simply, they

SECURITY SOLUTIONS // 61


PROFESSIONAL DEVELOPMENT

do not want to get caught and they

the truth.

They are primarily designed to

was taken. There have been no

If you think this sounds

be used in situations where you

witnesses come forward, there is

might include lies about illegal

implausible, consider for a

have little or no other evidence

no CCTV or any other evidence

activities, deceptive behaviour

moment that the approach I

and are relying purely on the

pointing to the person who

and activities such as fraud,

use works even in a training

information you gather from

took the money. What we do

theft, assault, security issues,

environment where I enlist some

questioning the people who

know is that the money was in

or enquiries and investigations

volunteers and brief them on a

might have been involved. Once

Lucy’s handbag.

into unacceptable workplace

simulated situation. The people

you can confidently deduce who

In our scenario, each person

behaviour such as harassment

are not really involved in the

was involved in an incident, you

will be interviewed in the same

and bullying.

are lying. In the real world, this

incident or scenario that I place

can then focus on developing

way, using exactly the same

I am also going to ask you to

them in and yet, even if someone

a strategy to get to the truth of

questions. If you had no other

jump into the mindset of a person

only has a ‘pretend’ guilty mind,

the matter and encourage an

information about who took the

who has nothing to hide, someone

we are still usually able to

admission or confession.

money, but asked these questions

who is not hiding the truth at all

distinguish between them lying or

Back to the theft from the

or carrying any concern about

telling the truth, just by analysing

office. Two of the people you

person you are likely, at the end

getting caught out. We will call

elements of the responses to

interview in an attempt to

of the interview, to have enough

that person a TRUTHFUL person.

certain questions.

uncover who took the $500 are

information to feel strongly about

These questions, when used

Jim and Eddy. Jim is, in fact, the

which person was involved with

what is going on inside each of

correctly, can and will give you

person who took the money, but

the theft of the money. Keep in

these minds, it becomes a lot more

reliable insight as to who the

you would not start out knowing

mind that both people are denying

feasible to differentiate a lie from

person is that is not being truthful.

this. You just know the money

taking the money. The innocent

Once you start to understand

62 // SECURITY SOLUTIONS

of an innocent person and a guilty

securitysolutionsmagazine.com


nobody was looking. The money

stress and load that the deceptive

leads toward blaming Lucy rather

is now in his wallet, which is in

person is experiencing.

than the acknowledgement that

his back pocket. It was almost

Not only does Jim have to lie,

someone stole it. He uses softer

time to go home when the

he has to go through a process

language about the incident.

missing money was reported,

where he is trying to think how

He also tagged on the end “or

and the staff were called in one

a truthful person might respond.

something” in an effort to keep

by one to be questioned about

Then he has to choose how to

things vague and distance himself

the theft.

answer it to sound believable. A

from revealing he has any

truthful person, with nothing to

knowledge of what happened.

Eddy is the other person who is being interviewed. Eddy knows

hide, does not have to go through

that the money is missing from

that same process.

Lucy’s handbag because it is

So, with this first question,

Deceptive people are more likely to be vague and evasive; they may claim not to know

common knowledge amongst his

Eddy – who did not take the

why. They may use words like

colleagues at the office. But he

money and has no idea who

“apparently”, “from what I was

has no guilty knowledge. He did

did – responds with an honest

told”, “something went missing –

not take it and he does not know

explanation of what he knows

or was taken”.

who did.

and why he was asked into the

There is a significant

room. He easily responds, “Sure,

difference between the ways

continuing in the next edition

there’s an investigation going on

that Jim and Eddy responded.

of Security Solutions Magazine,

about the money that was stolen

Not everyone will answer the

I am going to share with you

from Lucy’s bag today.” Truthful

questions exactly like this. But

six powerful investigative

people may use an accurate

people are often surprised

behavioural questions I use to

description of what they know.

how close to the textbook the

confidently ascertain who took

They often use words like steal

responses are when used in the

the money or at least had some

and theft. They are more open

real world. They do work! After

knowledge about the theft, and

and have nothing to hide. The

your very first question, you are

I will explain the psychology

question does not pose a threat.

already able to notice an initial

that turns these seemingly

Eddy has no reason to overthink

difference in the responses of the

innocent questions into treasure

the question or the response

two men.

troves of information. (Asking

and the answer flows. He also

questions such as these is only

uses words that reflect his

are assessing truthfulness or

one part of the puzzle when it

understanding that the money

otherwise, you need to resist the

comes to eliciting information,

was stolen.

temptation to jump too quickly

Starting below, and

reading behaviour and analysing

Now let us compare that

In any scenario where you

into concluding that you KNOW

person is denying because he did

responses. You want to listen to

with what happens when Jim

for sure who is guilty or who was

not take it and the person who

the answers to the questions but,

is asked the same question.

involved with only a little bit of

did take it is denying because he

in the real world, you should be

Glancing away for a moment, he

information or a ‘hunch’.

does not want to get caught!

using a five-part multi-channel

answers, “Umm, yeah, apparently

analysis process – find out more

Lucy is missing some money or

edition of Security Solutions

at www.truthability.com)

something.” First there was a

Magazine for Part 2 of this article,

pause, and umm. Not a sign of

where I will share five more

deception on its own, but when

incredibly powerful questions to

we are analysing behaviour

help you uncover a liar! n

you a more accurate picture. As

Question 1: [Jim/Eddy] Do you know why I asked you here today?

we work through the scenario,

In this case, the question relates

delay, pauses and verbal fillers

A former police officer,

I want you to imagine the

to being asked into the office

like umms are things we listen

Elly Johnson is the Founder

differences in the thinking of

where the interviews about

out for.

and Managing Director of

these two people I am going to

the theft of the money are

separately interview.

being conducted.

It is important not to draw conclusions from the response to one question alone. You should instead analyse the responses to all questions holistically to give

Although Jim is usually a

Take a moment to consider

Join me again in the next

to assess honesty, response

Jim also said in his response

TruthAbility, an organisation

“apparently Lucy is missing some

that for almost two decades has

money or something”. He uses

specialised in providing a unique

pretty honest guy, he seized the

what happens differently in

the word apparently, when he

mix of programs, workshops and

opportunity today to take the

the minds of Jim and Eddy. The

knows full well there is no doubt

seminars, designed to help people

money from Lucy’s handbag

key to understanding these

as to what happened. He also

reduce the risk associated with

when nobody was looking.

questions is recognising the

said that Lucy is “missing” some

harmful deception, fraudulent

At least, he is pretty sure that

extra emotional and cognitive

money. That is language that

behaviour and hidden truth.

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 63


FEATURE

The Chinese Bodyguards: Personal Protection In The Land Of The Dragon BY PAUL JOHNSTONE

Being rich in China can be dangerous – unless you have a bodyguard. The security business in China is booming.

On a cold January morning,

occupational hazards for China’s

President of the Public Safety

that employers of bodyguards

visitors streamed in and out of

emerging ultra-rich; assassination

Institute and the Director of

in China are successful people,

the Southern Chinese Shanxi

and kidnapping are a reason

Operations for Street Edge Krav

like senior executives of foreign

office of Li Haicang. Nothing was

why many of China’s rich are

Maga International (China), which

or private businesses, as well

out of the ordinary until a lone

undertaking precautionary

provides authentic Israeli Krav

as entertainers and a growing

assassin produced a sawn-off rifle

measures, which are becoming

Maga and Public Safety, Policing

number of entrepreneurs.

and fired a bullet into Li’s body.

more and more necessary. With

and Counterterrorism training.

Until that fateful moment, Li was

around 30 percent of China’s

During his 15 years in China,

there are bodyguard training

the chairman of a multi-national

millionaires believed to be

Wazen has trained officers from

programs designed specifically

company and 27th on the Forbes

women and a widening wealth

the police, law enforcement and

for females advertised at martial

list of China’s richest people. Only

gap, safety has become an issue

the growing number of corporate

arts schools where the training

several weeks later on the 12th of

for the rich. It is easy to see that

firms offering bodyguards. He

curriculum includes instruction

February, a Chinese millionaire

private security and, in particular,

has also been instrumental in

in driving, computer skills, self-

from the wealthy enclave on

baobiao (the Chinese word for

designing training programs

defence related laws and “polite

Wenzhou in Zhejiang Province

bodyguard) is taking off as the

for a number of organisations,

conversation”. The teachers at

was stabbed to death outside

nation struggles with some of

including the Beijing Tourism

these schools are veteran martial

his home by five men in a pre-

the side effects of its booming

Group in preparation for the 2008

arts specialists, former special

planned assassination attack.

growth. A 2004 media report

Beijing Olympic Games.

forces soldiers and operational

Various media reports indicated

in the China Daily newspaper

Wazen states that a large

According to Wazen,

bodyguards. Female bodyguards

that in 2004 alone, around 4,000

stated that in Guangzhou alone,

number of China’s private

are becoming more and more

people were kidnapped in China.

the private security industry

bodyguards are retired police

popular as businessmen want

Well-known actor Wu Ruofu was

employed no fewer than 5,000

and/or soldiers from elite units,

them to protect wives, girlfriends

abducted whilst driving his BMW

personal bodyguards.

or former Chinese secret-service

and children.

and hidden in the north of Beijing

Australian Eddie Wazen is

members; however, a large

A female bodyguard from one

by a notorious Chinese organised

an industry expert based in

number of wealthy Chinese are

of Wazen’s former bodyguard

crime group who demanded a

Beijing who is leading the way

turning to female bodyguards.

team said that woman in China

ransom, but police were able to

in developing new training

He recalls a local executive, who

today are more confident in

track them down after several

programs and services for the

had received threats that his

venturing into careers that in

hours and freed Wu.

Chinese market. He is the Director

child would be kidnapped, hired

years gone past would have been

of Strategic Risk, Business and

a female bodyguard to escort his

forbidden or perceived as male

Education for the TA Group, Vice

child to and from school. He says

dominated. He says that there has

These incidents are just several in part of a growing number of

64 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


securitysolutionsmagazine.com

SECURITY SOLUTIONS // 65


FEATURE

also been a growing demand for

Many lawyers believe that what

services have surfaced and are

relations officer and a bodyguard,

private bodyguards being hired

is not specifically forbidden by

increasing each year.

so in a female they can have all

by Taiwanese pop singers and

law should be legal; however,

prominent entertainers when

government officials claim that

counterparts, many Chinese

visiting mainland China.

no firm can legally be registered

performers and business

that Wazen and his team has

When asked who makes the

Like their Western

roles put into one. The director of a firm

as a private bodyguard service.

executives employ bodyguards

previously trained stated that

best bodyguard, he is quick to note

There have been a number of

as a symbol of their status and

he dresses his bodyguards in

that the Chinese have long prized

occasions where firms have been

prestige. However, another reason

matching designer suits and long

Manchurian bodyguards for their

shut down by the Public Security

for the increase in popularity of

black coats as a symbol of status

physical size, loyalty and bravery,

Bureau (PSB).

having a bodyguard is the crime

and, as far as he is concerned,

rate. Whilst serious crimes such

if people see this in conjunction

but female bodyguards have

Wazen states that as far

many advantages of their own.

back as the early 1990s there

as robbery, theft and murder are

with his latest European designer

Furthermore, many bodyguard

was a special course in Wuhan,

still less frequent then in Western

car then it means success and

training programs place a

Central China, which offered

society, they are becoming more

that they will want to do business

large emphasis on fitness and

young women the opportunity

and more common in China.

with him.

physical exercise, and often the

to train as bodyguards. In 1999,

bodyguard will double as a coach

he was invited to teach at the

also now renowned for carrying

to train students undertaking

in fitness training.

Dalian Peoples Police College

weapons, including firearms,

specialist bodyguard training

where he witnessed firsthand a

allegedly bought illegally from

in the lead up to the Beijing

and police officers turned

large number of young, fit and

corrupt police or military

Olympic Games. He also oversees

entrepreneur have identified

attractive females being trained

personnel. Furthermore, there

several Chinese bodyguard teams

the specialist market of private

as bodyguards by a specialist unit

have been a number of major

for visiting movie stars and

security and its success in Western

within the police. These ladies

incidents over the past several

celebrities, as well as company

society and have now turned

had been trained in all aspects of

years, including during the

directors and banking executives.

their focus on China. Just over a

bodyguarding, including firearms

countdown to the Summer

A client of Wazen, who asked

decade ago, the industry did not

and Chinese martial arts.

Olympic Games in Beijing. Some

not to be identified, said he had

of those included the March

decided to get protection after

Many former career military

legally exist. Although there have

An example of the popularity

Chinese criminal gangs are

In 2008, Wazen was invited

been several security firms who

of females attending these

2008 hijacking of a bus in Xian,

a close friend was abducted

have received China’s Ministry

programs was highlighted in a

which was carrying Australian

and killed when the ransom

of State approval to do business

Chinese media report, which

passengers, by a Chinese

exchange was compromised. He

if their founders have at least

stated that a College of Physical

man wearing explosives and

now employs 15 bodyguards and

five years of security experience,

Education in Wuhan received

threatening to blow it up. There

pays approximately 400,000 Yuan

the employment of personal

3,000 enquiries when it first

was an alleged attempt by Uighur

($68,800 AUD) for each bodyguard.

bodyguards in China is still a

announced that it would begin

minorities in China to hijack a

grey area as far as the law goes

offering a six-month training

plane traveling to Beijing in the

bodyguards rely too much on

and there are no laws yet that

program to teach women how to

same year.

traditional and outdated martial

completely govern the industry.

become bodyguards. The report

The word “bodyguard”

Many Chinese are rushing

Wazen states that the Chinese

arts skills, which are not relevant

stated that of that number, over

to join the ranks of one of

to the modern bodyguard.

previously had a very negative

700 women formally applied and

China’s newest and best paid

Whilst having these skills is an

image in China and, because

150 were accepted.

professions – Chinese bodyguards

advantage, they are not suited to

can look forward to salaries of

the close-quarter and dynamic

of the lack of legal clarity

The past decade has been a

surrounding private bodyguards,

special time in the history of China

about $200–$5000 USD a month,

situations of the modern era.

their work is often described as

and the country has been and is

depending on their military/police

Instead, systems such as Street

personal assistant or advisor,

still in an economic transition.

background, formal bodyguard

Edge Krav Maga are much more

with their multi functions

As such, China is no different to

training, education, appearance,

suited to the bodyguard/high risk

reflected in the job description.

many other countries, and crimes

knowledge of martial arts and

protection industry due to its

Some firms have also resorted

towards rich people are inevitable.

foreign languages. However,

close-quarter effectiveness.

to calling their bodyguard

Furthermore, a widening gap

whilst many sign up to a world

firm a business etiquette firm,

between the rich and poor,

of glamour, there are many

and the Western world, there

although of late, the Ministry

the 2008 Olympic Games, the

underlying problems, including

are some schools which are

of State insists that the term

global market and the rise in

exploitation of female bodyguards

professional and understand the

“security consultant” be used

international terrorism have all

as nothing more than an attractive

complexities of what constitutes

to avoid comparisons with the

raised safety concerns among

fashion accessory or ornament.

the role of a bodyguard, whilst

bodyguard image in America

the nation’s elite. This is another

However, some companies

there are many other courses that

and other Western nations.

reason why private bodyguard

also require a secretary, public

use an outdated training manual

66 // SECURITY SOLUTIONS

Wazen said that, like Australia

securitysolutionsmagazine.com


without any formal experience

was counterproductive, as the

government officials to turn the

specialist fields such as personal

or training.

law prohibits private security

other way.

protection is being sought from

Over the past several years,

guards from carrying guns, and

With the increase of crime in

renowned subject matter expert

there have been prominent

there are also very strict laws in

China, the government is not in a

countries such as Australia, Israel

media reports throughout China

relation to carrying knives. In

position to send police and troops

and the US.

which have shown young female

theory, Chinese bodyguards do

to provide personal protection to

students at a bodyguard training

not have any special privileges

private entrepreneurs, local and

Government is moving

school having bottles smashed

and they have the same rights

foreign business executives and

aggressively to punish

over their heads. It is designed to

and responsibilities as civilians,

for those that require around-

kidnappers, often by the death

prepare them in the event they

including having no right or

the-clock safety measures.

penalty, the threat of the

may encounter this type of attack

entitlement to carry firearms.

Furthermore, there are an

kidnapping boom continues to

when they are bodyguards. As

However, it is often the case

increasing number of foreign

grow, as does the increase of

Wazen states, this type of training

that many do carry weapons in

executives, entertainment and

incidents involving less well-off

is more for show than having

complete violation of the law

corporate businesses conducting

people attacking luxury cars and

any real learning outcomes

and they are often ‘protected’ by

business in China and many of

causing accidents or personal

for the students. Students can

corrupt government officials or

these expect the same type of

attacks from employees.

expect to pay up to 12,000 Yuan

because they ‘know’ someone.

private security found in their

($2,100 AUD) for a three- or

There are unconfirmed

native countries.

Although the Chinese

According to Wazen, the gap between rich and poor is getting

four-week course, which results

reports that there may be over

Over the past decade,

in little more than the students’

20,000 companies throughout

and in particular since China

be ongoing problems in Chinese

ability to crawl through mud,

China who are involved in

became a member of the World

society. He said that there is a

dive through fire, immerse

security, bodyguarding and

Trade Organization, Wazen

saying in China: You will laugh

themselves in freezing water, and

private investigation work.

has noticed a trend in Chinese

at those poorer than you and

use nunchucks.

Although there are some that

bodyguard firms seeking formal

hate those richer than you. In a

are licensed by the state PSB,

educational accreditation for

country where the Forbes’ China

students were often subjected to

Wazen believes that there

their bodyguards and security

Rich List estimates there are 168

physical abuse from instructors

are many firms operating

specialists. As China continues

billionaires, the bodyguard and

and that undertaking training

underground or in a grey

to open up to the modern

security industry has broken

with replica Chinese 95 semi-

area, with little regulation

international world, education

from the shadows of the dragon

automatic rifles and pistols

or by paying bribes to local

and formal qualifications in

and is now in high demand. n

Furthermore, he said that

securitysolutionsmagazine.com

spread further and there will

SECURITY SOLUTIONS // 67


25 – 27 JULY 2018

SECURING INNOVATION SHOW PREVIEW The 2018 Security Exhibition + Conference: Powered by ingenuity and invention, showcases the latest technology and cutting edge thinking. From physical and electronic solutions to biometrics and AI, Australia’s largest security event offers unparalleled opportunities.

MELBOURNE CONVENTION + EXHIBITION CENTRE EXHIBITION IS FREE REGISTER NOW securityexpo.com.au

Take a first-hand look at what’s next for the security environment including intelligence on managing threats and identifying risks. Lead Industry Partner:

#security2018


SECURITY EXHIBITION INNOVATIONS AND INVENTIONS Over 5,000 industry professionals will discover new products from 300 leading Australian and international brands. Explore the latest in access control, alarms and perimeter protection, CCTV and surveillance, cyber and information security, home automation, information and communication technologies, IP security, locks, safes and hardware, and networking and integration products.

DRONE DEMO ZONE From aerial surveillance to licence plate identification and thermal imaging, drones, referred to as UAVs (unmanned aerial vehicles), are already widely used in the security industry with further growth expected. New in 2018 the CSD Drone Demonstration will area will present the latest in drone technology with exciting displays every half hour right on the exhibition floor.

CYBER SECURITY ZONE For the first time in Melbourne, the ‘Cyber Zone’ will host dedicated suppliers of solutions to protect your integrated hardware. With the rise in malicious cyber-attacks, ensure your networked devices are protected from the threat of breach with cutting-edge products from Exhibition Partner, Axis and new exhibitors Sententia and Performanta.

EXHIBITION HOURS

Principal Exhibition Sponsor

Wed 25 July 9:30am-5:00pm Thurs 26 July 9:30am-5:00pm Fri 27 July 9:30am-3:30pm

SEMINAR THEATRE

Seminar Theatre Sponsor

NEW IN 2018 The new Security Exhibition & Conference Seminar Theatre hosts a number of industry specific security sessions addressing the issues impacting security installers and integrators.

The sessions will expertly target key areas addressing data storage, licensing and regulations, biometrics developments, lock picking and many more key industry issues and technology advancements, all delivered by industry specialists.

DAILY SESSIONS 10:30 - 10:50

How to reduce costs and improve the bottom line through licensing and regulations

11:00 - 11:20

Improving margin with the right data storage solutions

11:30 - 11:50

Secure wearables and body worn camera options

12:00 - 12:20

Career Pathways and opportunities for advancement in security careers

12:30 - 12:50

What is the best digital access control option and panel for you

13:00 - 13:20

What the security future looks like with biometric developments

13:30 - 13:50

An NBN Network Update and how it impacts the installer

14:00 - 02:20

Lock Picking (breaking physical security systems using cyber hacking)

14:30 - 14:50

The top 5 things every installer needs to know about IT jargon

SEMINAR PASS $30 Includes a lunch voucher

REGISTER NOW securityexpo.com.au


CELEBRATE YOUR INDUSTRY Re-connect with your colleagues and peers at the ultimate networking evening,the Security Gala Dinner, held in partnership with ASIAL. Or for a less formal option, continue meaningful business conversations over a drink or two at the Networking Drinks.

GALA DINNER The annual Gala Dinner hosted in partnership with ASIAL recognises achievements from the year in the security industry. This ultimate networking evening brings together security professionals from across the globe to celebrate, engage and socialise with colleagues, suppliers and clients.

Etihad Medallion Room, Etihad Stadium Thursday 26 July 6.30pm – 10.30pm

TABLE OF TEN $1,850 INDIVIDUAL TICKET $195

Incorporating a three-course meal and fine wine, the evening recognises the Best New Product Awards and features great entertainment.

Book your tickets early – this event sold out in 2017

NETWORKING DRINKS Held at the iconic Cargo Hall on Melbourne’s South Wharf, just a few minutes walk from Exhibition, the Networking Drinks reception is the ideal place to network with clients and suppliers in a more social environment after day one wraps up.

Cargo Hall, South Wharf Wednesday 25 July 5:15pm - 6:45pm INDIVIDUAL TICKET $55

BOOK TICKETS securityexpo.com.au Gala Dinner Sponsor

Gala Dinner Entertainment Sponsor


RD BI LE Y B RL ILA EA VA ED A IT ES M S LI AS P

2018 ASIAL SECURITY CONFERENCE

INTELLIGENCE AND APPLICATIONS TO MITIGATE RISK AND VULNERABILITY The ASIAL Security Conference hosts a compelling program of renowned local and international experts, and academics with case study evidence on how to protect your business, brand reputation and vital assets along with mitigating risk and vulnerability.

It is your annual opportunity to receive fundamental updates from the organisations shaping today’s security landscape in a program carefully curated by the industry’s peak body. Learn proven strategies to tackle your security challenges with crucial intelligence on the ever-changing landscape.

HEADLINE SPEAKERS CONFERENCE

Caroline Sapriel Managing Director, CS & A International

Philip Dimitriu Director of Systems Engineering, Australia and New Zealand, Palo Alto Networks

Arye Kasten Chief Executive Officer, M.I.P Security

Danny Baade Head of Security, Gold Coast 2018 Commonwealth Games Corporation

Jim Fidler Director, Secure Events & Assets P/L

David Crompton-Guard Business Continuity Manager, Safety, Security & Resilience, Metro Trains

Dr Gavriel Schneider Group CEO, Risk 2 Solutions Group & Head Lecturer of Psychology of Risk, ACU

EXECUTIVE BRIEFINGS

Commander Geoffrey Smith Tasmania Police

SECURITYEXPO.COM.AU FOR FULL SESSION DETAILS Early Bird Conference Pass benefits: Save $100 off the cost of your Pass for a limited time only. Spend the night in luxury after celebrating and networking at the Gala Dinner. Go into the draw to win a night’s accommodation in the Crown Towers Melbourne in a King Deluxe Room*. *Terms and conditions apply. VIC and NSW only. See securityexpo.com.au for full details. NSW LTPS/18/23623

Lead Industry Partner:

SECURE YOUR PASS securityexpo.com.au Don’t miss out – Conference sold out in 2016 and 2017

CONFERENCE HOURS Wed 25 July 9:00am-5:00pm Thurs 26 July 9:00am-3:30pm Fri 27 July 9:00am-3:30pm


EVERYDAY CARRY There is a great deal of contention

In the case of security, no one

security will almost inevitably

potential threats and hazards,

around how to properly define

has ever suggested that such a

be the first on scene because,

observe and report and provide

the role of security personnel.

definition should be applied. In

more often than not, they are

customer assistance.

Often, they are referred to as

reference to security, the term

already there. That is the role of

To that end, we have put

first responders. However, many

first responder alludes to the fact

security. What security do upon

together a list of items that we

law enforcement and military

that security are often the first

arrival is a different matter.

believe all security officers need

officials bristle at this suggestion

people to respond to an incident

No one expects security to kick

to have as part of their everyday

because they automatically think

because, more often than not,

in a door and clear a room. In

carry, both on and off the job.

of the traditional definition of a

they are the first people on the

fact, to do so would be seen as

Because in reality, the job does

first responder as someone who

scene. Be it a major event, a

dangerous and foolish, but they

not end when the shift is over. If

is called to respond to an armed

shopping centre, a place of mass

are expected to render first

something needs doing, you get

conflict or terrorist situation.

gathering or a business facility,

aid, render assistance, detect

it done.

First and foremost, a good

PowerTac decided to launch

flashlight is every security

their own dedicated brand and

officer’s best friend. Most

the results have been nothing

of the work that security do

short of impressive. Over the

happens at night in dimly lit or

years, we have reviewed every

dark places. So, a good torch is

brand imaginable, from Surefire

essential. Furthermore, a great

through to LedLenser and

torch can be a fantastic personal

everything in between, and the

safety tool. It can be used to

PowerTac E20 compares with the

signal emergency services. It

best of them.

POWERTAC E20 1180 LUMENS RECHARGEABLE EDC LED FLASHLIGHT

can be used to stun attackers

everyday carry (EDC) Flashlight,

advantage you need to escape

packing performance,

or effect an arrest. However,

functionality, reliability

all of these things are only

and lifetime warranty like

possible with a good, high-power

PowerTac’s other higher end

flashlight. Which is the number

models. Use the magnetic tail-cap

one reason no security officer

to stick the E20 to any ferrous

should ever rely on his or her

metal to illuminate your field

mobile phone. Your phone is

of view. Both waterproof (to 2

often your primary source of

metres) and impact resistant, the

communication and is too easily

E20 is perfect for security duty.

damaged if dropped or knocked

Furthermore, the E20 produces a

out of your hand in a scuffle.

whopping1,180 lumens, making

Furthermore, few things drain a

it one of the brightest lights on

phone’s power faster than using

the market. However, the thing

it as a flash light. Too often, a

we love most about this light is

dead phone can mean a dead

that it is rechargeable! Many

security officer.

other tactical lights use CR123A

PowerTac are seen by many

78 // SECURITY SOLUTIONS

The E20 is the ultimate

and give you the split-second

batteries, which cost a small

as a relatively new player in

fortune to replace and require

the tactical flashlight market.

you to make sure you always

However, prior to developing

have a spare set or ten on hand.

their own range of high-quality

However, with the E20, just drop

tactical flashlights, they had been

the rechargeable battery into

designing and building products

the USB cradle and away you

for a wide range of well-known

go. For a rechargeable tactical

brands. Wanting to produce the

light of this build quality and

best product they could without

power output, this is amazingly

outside interference, in 2006

affordable. n

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER

securitysolutionsmedia.com/newsletter

For the latest news, products and events in the security industry

RITE-IN-THE-RAIN TACTICAL NOTEBOOK KIT To observe and report, recording

(or 50 sheets). Each sheet features

off, so you can take notes in any

Celsius. But let’s face it, if it is 120

accurate, contemporaneous notes

a universal pattern consisting of

weather conditions. No more

degrees outside, you are probably

and detailed information in any

horizontal lines and faint dotted

soggy notes with running ink.

more worried about your face

given situation is the one of the

vertical lines like a grid so you

primary roles of any security

can write notes or create accurate

notebook that can be used in the

style than you are about taking

officer. This is why we felt the Rite-

scaled drawings. Useful reference

rain, then you need a pen that can

good notes!

In-The-Rain Tactical Notebook Kit

material is also printed on the

write in the rain. Featuring a non-

was worthy of a place in our list of

back and inside covers. However,

reflective, flat black metal barrel,

together, the kit also features a

everyday carry items.

the best feature of this notebook

the No. 97 All-Weather Tactical

black CORDURA® fabric cover.

is that the pages, whilst being

Black Clicker Pen with black ink

These CORDURA® fabric covers

we chose the 946B-KITm, which

traditional paper, are treated with

writes on wet paper and upside

also feature a rugged zipper

consists of a 4x6″ spiral-bound

a patented coating that makes

down in temperatures from -30

closure and hold up to four

notebook with 100 universal pages

water and other liquids run right

degrees Celsius to 120 degrees

writing utensils. n

For the purpose of this article,

Of course, if you have a

melting off Raiders of The Lost Ark

To keep your pad and pen

ResQme Car Escape Tool with Glass Breaker and Seat Belt Cutter It is not uncommon for a security

for first responders (firefighters

officer to end up being the first on

EMTs, law enforcement agencies),

scene at a motor accident. In such

ResQme has become an essential

cases, people can often be trapped

safety solution for all safety-

in their vehicle. Time is short, you

conscious drivers.

need to act. What can you do? The ResQme Rescue and Escape

securitysolutionsmagazine.com

About the size of a key remote and just 2.93″ long, the ResQme

Tool with Glass Breaker and Seat

tool is the smallest car escape tool

Belt Cutter is carried by over three

that you can find. It is lightweight

million motorists worldwide and

and fits in the palm of your hand.

for good reason. This two-in-one

Its three conical cylindrical shape

safety and survival tool allows

makes it very distinctive. It comes

you to cut a jammed seatbelt

in a variety of trendy colours – but

and to break a side window in

we only care about black, because

your car. Originally developed

we are tough. n

SECURITY SOLUTIONS // 79


PRODUCT SHOWCASES

Multitasker Series 3 Multitools Every security officer needs a good

the plier head snap off when

multitool. From mending a gate to

actually putting the tool to use.

opening boxes, fixing equipment, or

The Multitasker Series 3 plier

conducting running repairs, there

heads feature aggressive teeth

are all manner of odd jobs and

towards the back, while getting

tasks that can present themselves

progressively finer towards the

to a busy security officer every

tip for more detail-oriented

single day.

needs. For added benefit and

Unlike other mass-produced

longevity, replaceable wire

multitools, Multitasker utilises ‘best

cutter blades are included. The

in class’ materials and production

pliers are maintenance free and

methods to achieve build quality

provide ultra-smooth pivoting.

that is head and shoulders above

• Knife/blade – A multitool knife

the competition. For example,

that is actually made to use.

instead of cost-saving investment

Built from tough D2 tool steel

castings, Multitasker employs

for strength and durability, it

computer numerical control (CNC)

holds a sharp edge longer. The

machining (and solid billet steel

3″ blade is easily deployable

material) to make the plier head

by its outside positioning and

and other major components. G10

thumb stud.

scales, commonly used for tactical

• Magnetic 1/4″ bit driver – The

knives, are selected to help ensure

Series 3 comes with a 1/4″

a slip-resistant gripping surface.

driver into which any of the

Aluminium-bronze washers and

bits that come with the tool

rust-resistant Ti CarboNitride (TiCN)

can be installed. Alternatively,

treatment on the pliers help provide

if you have custom needs, you

for maintenance-free operation.

can build your own kit as the 1/4″ driver will fit any 1/4″ bit

The Series 3 Multitasker features: • D2 tool steel pliers – CNC

you need. These are just some or our

machined from D2 tool steel,

favourite features of the

you will not need to worry about

Multitasker 3 Series but the list

a surprise failure and have half

goes on. n

Maxpedition Micro Wallet When you are on shift, you do not necessarily want to carry your wallet for fear of losing it, but you still need to carry some essentials. Enter the Maxpedition Micro Wallet. Made from 1000-Denier water-resistant and abrasionresistant lightweight ballistic nylon fabric, the Micro Wallet is truly a minimalist’s wallet, with an ID window, two internal card compartments and one external slip compartment. It is perfect for your security licence and debit card, some cash and a spare key. Measuring just 4.5″x0.5″x3″, some call this the ‘bikini’ of wallets. n

80 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry

instagram.com/securitysolutionsmag

MAXPEDITION MALAGA GEARSLINGER Of course, to carry all this and

always preferred a gearslinger

supplies. Pockets and pouches

on this bag, like all Maxpedition

more, you will need a bag ideally

to a backpack because, unlike a

accommodate everything from

equipment, is amazing. All

suited to the rigours of everyday

backpack, which requires you to

your wallet or ID, briefing notes

stress points are double stitched,

duty; something that can take a

take the pack off if you need to

and personal items.

bartacked or ‘box-and-X’ stitched

reasonable amount of gear without

access items, the gearslinger, as the

looking like you are heading off on

name would suggest, allows you to

and features a host of inner

to the use of YKK high-strength

a three-day patrol, which can give

simply sling the pack around from

organiser pockets, YKK zipper

zippers and zipper tracks as

you quick access to everything you

your back to your front, providing

closures, a drainage grommet, an

mentioned earlier, Maxpedition

need, when you need it and which

quick and easy access to pens,

adjustable cross strap for stability,

also use UTX-Duraflex nylon

is comfortable to carry both to and

notepads, documents, equipment

quick-release access for easy on

buckles for low-sound closures

from work as well as during your

and so on. Additionally, being

and off, a rear compartment that

and then coat the entire bag with

normal day-to-day activities. My

ambidextrous means that you can

can double as 50oz/1.5L reservoir

a Teflon fabric protector for grime

choice is the ambidextrous Malaga

switch the bag between shoulders

and three rows of 5-channel PALS

resistance and easy maintenance.

gearslinger from Maxpedition.

if you get sore, which is really

webbing plus four 2.25″x1″ loop

handy if you are carrying the bag

field points for patches.

I have been using Maxpedition gear for years and it has never, ever failed me. I have used it on

for long periods. The Malaga is packed with

The Malaga is tough as nails

Measuring just 10.5″x6.5″x14″

for added strength. In addition

So, there you have it, that is our bare essentials list of everyday carry items for security officers.

with a main compartment which

All these items and more are

duty, I have hiked across continents

added features, including both

is 10″x5″x13″, it has plenty of

available in person or online from

in some of the worst conditions

side- and Y-compression straps,

room. I carry a 13″ MacBook Pro,

Outdoor Tactical, a leading supplier

and Maxpedition has always seen

so you can load it up and strap

an iPad, various leads and cables,

of military, law enforcement and

me through.

it down to increase your carry

everything you see in this article,

outdoor products in Australia.

potential. There is plenty of take-

plus an umbrella, phone, jacket

You can find them at www.

ambidextrous gearslinger in

along room for your laptop, jacket,

and a multitude of other items.

outdoortactical.com.au or by

the Maxpedition range. I have

emergency gear and other essential

The Malaga is the largest

securitysolutionsmagazine.com

Lastly, the construction quality

calling 1300 511 000. n

SECURITY SOLUTIONS // 81


PRODUCT SHOWCASES

FLIR SAROS FLIR Saros™ is FLIR Systems’

but also reduces false positives

next generation outdoor security

with built-in advanced analytics,

product line that combines

expanding the outdoor perimeter

Accurate target detection and

overall affordability, FLIR Saros

multiple traditional perimeter

protection market for security

classification, to help reduce

opens the door to new business

protection technologies into a

alarm monitoring companies.

false alarms

opportunities, revenue sources,

unified solution. Saros delivers

A single FLIR Saros unit

with white light illumination • Advanced onboard analytics –

• Two-way audio and digital

With its high-performing security technologies and

and customer base expansion for

accurate, actionable alerts and

combines numerous security

input/outputs – Enables real-

the security channel. FLIR Saros

verified alarm data.

technologies, including:

time audio response

also increases crime prevention

The FLIR Saros camera line

• Multiple FLIR Lepton®

The FLIR Saros line of security

and cost-savings for the end user,

enables commercial businesses

thermal sensors – Provides

cameras was designed and

saving companies from losses

to implement state-of-the-art

the ability to deliver wide-

engineered with today’s

in equipment, merchandise

outdoor intrusion detection in a

area monitoring regardless

cybersecurity risks in mind,

and interruptions in business.

cost-effective manner. Traditional

of unfavorable lighting or

with end-to-end encryption for

Optimal applications for FLIR

perimeter security systems can

weather conditions

setup, web, and video streams,

Saros include car dealerships,

require substantial investment,

• High-definition optical

and configuration lockdown

construction sites, marinas,

both in infrastructure and in

cameras – Option of 1080p

after initial setup for increased

utility substations, and critical

ongoing expenses stemming from

or 4K resolution to realize

tamper prevention. FLIR Saros

infrastructure locations.

false alarms. FLIR Saros not only

accurate visual identification

also eliminates the need for

of intruders

port-forwarding, so devices

greatly reduces the cost of initial deployment by minimizing the amount of equipment required,

76 // SECURITY SOLUTIONS

• IR and visible LED illuminators – Ability to deter intruders

For more information visit flir.

are less exposed to remote

com.au/saros or call +805-690-

security attacks.

6600 n

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmedia.com/newsletter

World’s First Crash Tested Bi-Fold Gate Leda Security Products in conjunction with Cova Security Gates Ltd (UK) is releasing in Australia the world’s first Crash Tested Speed Gates (CSG 10640 and 10650). They have been designed to prevent vehicle borne terrorist attacks to a range of building or perimeter entrances. They offer

• Model 10650 crash tested to 7500kg (7.5tonne) @ 80km/h (50mph) PAS68: 2010 V/7500[N3]/80/90:6.8/9.1* *V/test weight [vehicle class]/speed [kmh]/angle:penetration/dispersion. The crash tested Hi-speed Bi-fold gates are a new product to

a 9 second unlock and open time, 11 second close and fully lock time

the Australian Market. Applications include: Government Buildings,

and deliver a continuous operation – 100% duty cycle.

Corporate Head Offices, Embassies, Industries, Military and Defence site

Benefits can be measured in terms of the gates’ test and impact

location, Construction and Mining sites. For more information contact your nearest LEDA sales office. Simply

ratings • Model 10640 crash tested to 7500kg (7.5tonne) @ 64km/h (40mph) PAS68: 2010 V/7500[N2]/64/90:2.2/0.0*

visit www.ledasecurity.com.au email sales@ledasecurity.com.au or call 1300 780 450 n

EKA CYBERLOCK What do you do when; • your ‘bullet proof’ master key system is compromised because of a lost key. • you want to provide secure audited access control to your employees or contractors in the middle of country NSW on a padlock that’s not connected to any network • you want real time reports of access to locks and revoke permission instantaneously ensuring you have the maximum security your assets need EKA CyberLock is a key-centric access control system perfect for any company assets. For utility companies, CyberLock can secure access to substations, reservoirs, equipment, and storage areas.

securitysolutionsmagazine.com

For the unsung heroes in supply chain, CyberLock can secure access to containers, depots, warehouses, and even gates. Data Centres, multi-level offices, manufacturing sites – if you have a mechanical lock, then EKA CyberLock is a perfect fit since the cylinders retrofit into existing door hardware, without any power or wiring needed. Featuring 350 different lock cylinders in the range, several CyberKey options, full audit reporting at both the CyberLock cylinder (1100 activities) and CyberKey (3900 to 12,000 activities depending on the CyberKey type), ability to manage user access rights, and customised reporting. The EKA CyberLock system

is fully backed by a global team of experts and has just released a new Bluetooth CyberKey and mobile app for smartphones allowing practically real time access privileges and audit logs. The beauty of the new mobile app, is that the Bluetooth CyberKey permissions can be uploaded on to the app whilst in a 3G/4G area and then the user can use the CyberKey in no

3G/4G signal areas, making this extremely attractive for remote site access management All your user data, audit logs, reports and more are hosted on Amazon Web Services (AWS) where you’re in control, making the EKA solution scalable to your needs. For more information visit www.ekasecurity.com.au or call 1300 722 311 n

SECURITY SOLUTIONS // 77


PRODUCT SHOWCASES

Southwest Microwave Introduces IP-Based Digital Microwave Detection Sensor Southwest Microwave has

mitigating risk of site compromise

deployed perimeter security

expanded its suite of intelligent

while preventing nuisance alarms.

devices, cameras and access

Model 336-POE is handled via

microwave sensor technologies

Proprietary algorithms recognize

control systems. The sensor

Southwest Microwave’s server-

with the introduction of the

the unique profiles of intruders

features an on-board Ethernet

based POE control module (CM-

INTREPID™ Model 336-POE

walking, running or jumping

server that supports multiple ports

POE) or through an available no-

Long Range Digital Microwave

through the detection field,

and sessions.

cost SDK that simplifies high-level

Link. This all-weather, IP-based

and offers enhanced crawl and

POE detection sensor makes

vehicle detection.

reliable perimeter security more

Designed for maximum

Graphical configuration of

Alarm monitoring for the

interface to third-party physical

each device and monitoring

security information management

of sensor status and control

(PSIM) or video management systems (VMS).

accessible than ever¬ – coupling

protection against sabotage,

parameters are handled locally

field-proven RF detection

Model 336-POE features heavy-

or remotely via an embedded

performance with secure network

duty components and packaging,

browser-based Installation

over Ethernet is an important

connectivity for increased

plus integrated random tamper

Setup Tool (IST), simplifying

feature of this sensor, the

system design flexibility and

switches to impede physical

administration and diagnostics.

primary benefit of the Model

simplified sensor configuration

abuse. Sensor electronics

and monitoring.

are shielded against extreme

an alarm when a legitimate

sources of electromagnetic and

target is detected, the sensor

336-POE is ideal for the protection

RF interference, and protected

alerts on enclosure tampering

Microwave’s INTREPID Model

of fence lines, open areas, gates,

against lightning induced surges.

and on changes to microwave

336-POE Long Range Digital

path alignment. A configuration

Microwave Link at Perimeter

With a range of 457 m, Model

entryways, walls or rooftop

Employing a single Ethernet

Along with instantly triggering

While DC power transmission

336-POE is its IP connectivity for communications. Learn more about Southwest

applications. The sensor employs

cable for data and power

security feature provides

Systems Australia Pty Ltd

advanced digital signal processing

transmission, each Model 336-

notification when changes to

stand #E83 at ASIAL Security

(DSP) to optimize discrimination

POE sensor operates as a unique

device settings are attempted,

2018 in Melbourne, visit www.

between intrusion attempts and

network element, seamlessly

ensuring that only approved

perimetersystems.com.au or call

environmental disturbances,

integrating with other IP/POE-

modifications are implemented.

+61 2 9150 0651. n

78 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry

instagram.com/securitysolutionsmag

New MOBOTIX Mx6 Camera Line With Integrated MxBus Functionality MOBOTIX recently launched its

Within a MOBOTIX video system,

structures as the corresponding

Indoor cameras c26B, i26B, p26B

second generation Mx6 camera line

Mx6 cameras without MxBus can

first- generation Mx6 cameras.

and v26B, as well as to add two

with integrated MxBus functionality

also process and use the data from

This means that all of the sensor

additional inputs and two outputs

(camera types x16B/x26B).

an MxBus module that is connected

modules, mounts and system

to the camera, an additional

to a camera within the same

components that they contain

MxIOBoard-IC is required.

on an extended camera board. This

network. For example, they can

can also be used for the latest

two-wire cable system developed

access the time signal from a GPS-

generation of MOBOTIX cameras.

by MOBOTIX is encrypted against

Box or activate their own recording

cyberattacks and expands camera

through MxMultiSense modules

models (x16A/x26A) are also

functions by including practical

placed at the ceiling of a room

available as corresponding second-

additional MOBOTIX modules such

via MxMessageSystem.

generation camera models with

The MxBus technology is based

as the MX-GPS-Box, a reliable time server for a complete video system.

The new x16B/x26B models feature the same exterior

All first-generation Mx6 camera

A corresponding T26B successor for the T25 Door Station camera is planned for release by the end of Q3/2018. For more information, visit www.

MxBus (x16B/x26B). In order to use

mobotix.com or call +61 2 8507

the MxBus functionality with the

2000 n

smartphone, tablet and PC.

great product for anyone looking

VIDEO DOORBELL 2 Doorbells might not seem like

Can they all afford it? Once again,

a particularly sexy product to

in the case of the Ring Video

feature in a professional security

Doorbell, it is a resounding yes

motion sensors so they can find

I liked it so much that I know

publication but in the reality

all around.

the ideal setting for their home.

have one both at the office and

They get instant alerts when

at home.

demand drives sales and sales

The Ring Video Doorbel 2

Ring lets users adjust the

determine profit. Therefore, as

represents the next-level in

motion is detected, allowing them

an installer, integrator, locksmith

simple security and convenience

to protect their property from the

or security operator, if you want

that works on any home or office

comfort of their smartphone.

good profit, you need good sales

and includes a rechargeable

which means you need products

battery pack.

that people want to buy. The Ring Video Doorbell ticks all the boxes.

The beauty of the Ring Video

Video Doorbell 2 works on a quick-release rechargeable battery, so users can charge

relatively easy to install given

their Doorbell without removing

see that just seem so obvious,

its wireless functionality. Once

the device. Sell them two

once you have seen them.

installed, customers can watch

battery packs, and they’ll never

However, coming up with the

over their home in crystal-clear

worry about power. However,

idea is only half the challenge.

1080HD video, (the original Ring

for those people who prefer

The other, equally important part

Video Doorbell was 720p) and see,

constant power, the Ring can also

of the equation is how well you

hear and speak to visitors from

be hardwired.

execute the idea. Does it work?

anywhere. With instant mobile

Does it work well. Can anyone

alerts and two-way talk, users

Mac and Windows 10 compatible,

use it. Does everyone want it?

can answer the door from their

The Ring 2 Video Doorbell is a

securitysolutionsmagazine.com

For more information visit www.lsc.com.au n

any home or office and includes

doorbell is that it is simple and

There are some products you

for solutions that sell themselves.

Compatible with iOS, Android,

SECURITY SOLUTIONS // 79


SPOTLIGHT

RISK MITIGATION STRATEGIES: A VARIETY OF LEVELS TO SECURING ENTRANCES TO PUBLIC AND PRIVATE BUILDINGS AND FACILITIES Security entrances selected for some of the world’s landmark public and private buildings and facilities will be featured at this year’s Security Expo (Stand G2) in Melbourne by security entrance and architectural revolving door specialist, Boon Edam Australia. Highlighted among exhibits at the Convention Centre Event from July 25-27 will be Lifeline Speedlane entrances and other technologies featured in this article by Gary Schreiber, a security entrance authority from the Boon Edam global network. Adding security cameras does not

to cope with a large numbers of

necessarily ensure security either

authorised people who have to

– it often just makes it possible

enter or leave a secured area in

to replay what happened after

a short space of time. These low

the security breech has actually

security systems are designed to

taken place. Employing security

slow down and organise the entry

officers is expensive, and these

point, while also serving as visual

guards may have a limited impact

deterrents to potential infiltrators

as they can be distracted, misled

and preserving a relatively open

or overwhelmed.

appearance for authorised people.

Security entrance solutions Holding a door or gate open for another person is a nice thing to do – but it’s certainly not good security

Typical applications include sports

provide the most effective way to

stadium entries, factory shift

allow passage of authorised people,

changes, transit terminals and high-

while acting as a deterrent or a

occupancy skyscraper buildings.

physical barrier for unauthorised omething we should

even safer way to secure their

people. More than that, security

never complain about

space and keep their valuables

entrances can provide companies

is that people are too

safe as well. Several solutions are

with valuable metrics to determine

nice. They let people

often considered such as: locks

the traffic flow, monitor tailgating

in behind them without a second

on doors or gates, access control

statistics, biometrics, and more.

thought in most cases. Most of us

systems to control electronic door

are not brought up to close a door

locks, security officers posted at key

entrances in terms of four

in someone’s face, so we hold a

locations and security cameras to

groupings to achieve a variety of

door open for them, or we let them

monitor access.

risk mitigation strategies: crowd

S

in behind us – especially if they

You can think of security

control, deterrence, detection,

authorisation or access device at

Mitigating Risk with Security Entrances

home. Good manners indeed, but

As with all things in life, all of the

Crowd Control

certainly not good security.

above-mentioned options have

The lowest level of security

their flaws. An access control

entrances, such as waist-high

security – at an entrance point – are

system can manage who can open

turnstiles, can count the number of

part of what makes an organisation

a door, but once it is open, anyone

people exiting or entering a facility,

aware that they need to find an

is able to freely enter or exit.

which helps staffed entrances

have forgotten their personal

These weakness in a company’s

80 // SECURITY SOLUTIONS

and prevention.

Crowd Control technologies include Boon Edam’s Turnlock turnstiles

securitysolutionsmagazine.com


individual’s face, iris or fingerprint as

Alastair Russell

their credentials.

National Sales Manager

With the integration of

T +61 1300 689 905

sophisticated near-infrared sensors

M: +61 (0)450 924 882

and optic technologies, such as the

E: michael.fisher@boonedam.com

StereoVision, these entrances can

W: www.boonedam.com.au

provide a rich assortment of metrics, including authorisation received, passage completed, tailgating / Deterrent technologies include Boon Edam’s Lifeline Speedgates

About Royal Boon Edam With work environments becoming

piggybacking rejections inbound or

increasingly global and dynamic,

outbound, biometric access control

smart, safe entry has become the

rejections, safety rejections, and

centre of activity in and around

Deter

when a tailgating or piggybacking

emergency button rejections. They

many buildings. Royal Boon Edam

The next level up in the security

incidence occurs. If this happens,

can also detect and send alerts for a

is a global market leader in reliable

entrance grading is designed with

an audio, visual and silent alarm

variety of events such as an object

entry solutions. Headquartered in

an increase in the deterrent factor.

are activated to alert the right

left behind.

the Netherlands, with 140 years of

These incorporate a full-height barrier

security personnel quickly. At this

Securing an entrance can take

that deters casual attempts to defeat

security level, speed gates, which

many forms, but the overall goal is to

have gained extensive expertise in

the system by means of climbing or

are particularly popular in corporate

establish risk mitigation strategies

managing the transit of people through

crawling. A full height barrier is often

reception areas or foyers, can be

to keep unauthorised entry at bay.

office buildings, airports, healthcare

installed at a perimeter fence line

equipped with presence detection

Security entrance solutions are the

facilities, hotels and many other

as a first layer of physical security,

sensors, and can provide accurate

answer for protecting a company

types of buildings. We are focussed

or an “exit only” to allow people to

metrics including the number of

while, at the same time, providing

on providing an optimal, sustainable

leave – but deter them from entering.

authorised personnel inbound and

critical metrics to further reduce

experience for our clients and their

Here, when integrated with an access

outbound as well as the number of

risk. At the end of the day, security

clients. By working together with you,

control system, metrics such as the

tailgating incidents or alarms. Certain

entrances are a good investment

our client, we help determine the exact

number of inbound and/or outbound

models equipped with dense sensor

for any organisation that needs to

requirements for the entry point in and

people, in addition to credentials, can

arrays and can be set up to alarm and

control access to any points in their

around your building.

be tracked.

count jumping or crawling attempts.

facilities. n

Detect

Prevent

Medium level security entrances rely

This is the highest level of security

on sensor technology to accurately

entrances available and it introduces

detect objects moving through an

true tailgating and piggybacking

currently is the Senior Vice President of

to ensure the security of your entry

opening, and can determine whether

prevention. We see products such

Sales in the United States of America.

and perimeter.

one or two people are passing

as high security doors and portals

through. In this way, they can detect

typically fall in this area. The

For Further Information,

solutions in this category are most

Please Contact:

experience in engineering quality, we

Please take a look at our range About the Author

of revolving doors, security doors &

Greg Schreiber has been with

portals, speed gates, tripod turnstiles,

Boon Edam for a total of 15 years and

access gates and full height turnstiles

You can find more news about Boon Edam on www.boonedam.com.au/news

suitable for facilities such as data centres, and for locations where security staffing is impractical. These security entrances not only serve as a visual deterrent, but also physically deny all forms of unauthorised entry completely. By integrating facial recognition analytics, it is possible to ensure that the person traveling through the entrance Detection technologies include Boon Edam’s Tourlock security revolving door

securitysolutionsmagazine.com

matches the credentials which have been presented. Biometrics serve the same function by utilising the

Prevention technologies include Boon Edam’s Circlelock high security portal

SECURITY SOLUTIONS // 81


STOPTALK

Dahua launches its first Deeplearning Powered NVR IVSS

Dahua Deep-learning Powered NVR - IVSS

82 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


L I K E U S O N FA C E B O O K For the latest news, products and events in the security industry

facebook.com/ssmaust

Dahua Technology, a leading

The integrated GPU module

solution provider in the global

and advanced deep-learning

Optimized GUI for easy operation

has lower complexity, better

video surveillance industry,

algorithms perform powerful

The all new GUI of IVSS features

cost-to-performance, and fewer

officially launched its first deep-

video structure analysis using

a unified design for local and

operator training requirements.

learning powered Network Video

metadata, achieving precise facial

remote users, greatly improving

As for users, IVSS improves

Recorder (NVR), offering advanced

analysis. Powered by a Dual-core

usability, and making it friendly

real-time monitoring efficiency,

Artificial Intelligence features for

Intel processor, IVSS supports

and familiar to project level

while providing an easy and

a variety of applications.

up to 4 channels of real-time

customers. The unified GUI also

efficient approach to pinpoint

facial recognition based on 20

helps significantly cut down the

when and where a person of

Intelligence technology enables

face libraries with 100,000 face

training cost and time of system

interest appeared. Dahua IVSS,

faster video content inquiry and

images each.

operators, and the addition of

which caught visitors’ eyes at

an independent PC client for

IFSEC International, showcased

Dahua’s powerful Artificial

rapid discovery of target objects.

For system integrators IVSS

This opens up new possibilities

Identify Intruders

remote access saves worries

great potential regarding

for danger prevention, along

IVSS supports a stranger detection

about browser compatibility and

the company’s AI technology

with real-time alerts for the video

mode, which triggers alarms when

plug-ins.

innovation. Dahua Technology,

surveillance industry.

a face not stored in the database

embracing the mission of “Enabling a Safer Society and

triggers an alarm when a face

Variety of applications and wide compatibility

is detected. IVSS also supports

AI-powered facial recognition and analysis

a Similarity Threshold, which that does not meet the minimum

IVSS is ideal for applications that

Quality, and Service” to serve

IVSS combines Deep-learning

similarity level. The Stranger

require entry/exit management,

partners and customers around

Algorithms, industrial grade

Mode and the Similarity Threshold

where knowing who is coming

the world.

GPUs, and advanced Network

were designed for critical

and going is a valuable asset,

Video Recorder into an all-in-one

infrastructure sites, where access

such as business parks, schools,

Artificial Intelligence server.

control is of vital importance.

banks, prisons and so on.

securitysolutionsmagazine.com

Smarter Living”, will certainly continue to focus on “Innovation,

For more information visit / www.dahuasecurity.com n

SECURITY SOLUTIONS // 83


2018 #SecurityAwards Call for Nominations g By

Anna Ho, Marketing and Communications Officer, Australian Security Industry Association Limited (ASIAL)

T

he vital role performed by Australia’s private security industry will be recognised later this year at a special awards ceremony in Sydney organised by ASIAL. The 2018 Australian Security Industry Awards for Excellence and Outstanding Security Performance Awards will recognise excellence in the security industry. Nominations are open to all and provide an opportunity to recognise individuals, including frontline security personnel who have gone beyond what could reasonably expected of them in providing a level of service that exceeds client’s expectations. Likewise, organisations and teams who have demonstrated leadership and innovation will also be recognised. Judging of the awards will be undertaken by an independent panel of judges, that includes Damian McMeekin, Managing Director of CT Intelligence & Insight; John Adams, Editor, Security Electronics and Networks Magazine; John Curtis, Director, IPP Consulting Pty Ltd; Michael Walker, Senior Manager, Security Services, Facilities Management, Reserve Bank of Australia; Rachell DeLuca, Senior Security Consultant, ARUP and Vlado

Damjanovski, CCTV Expert Specialist and MD, ViDi Labs. Nominations open 1 July and close 31 August. Winners will be presented at a special awards ceremony to be held at Sydney’s Doltone House Hyde Park on Thursday 18 October 2018.

2018 AWARD CATEGORIES INCLUDE: • Individual Achievement – General • Individual Achievement – Technical • Gender Diversity • Indigenous Employment • Special Security Event or Project – Under $500,000 – Over $500,000 • Integrated Security Solution – Under $500,000 – Over $500,000 • Product of the Year – Alarm – Access Control – CCTV – Camera – CCTV – IP System/Solution – Communication /Transmission System

– Physical security (bollard, gate, barrier, lock)

AWARD CATEGORIES INCLUDE: • Outstanding In-house Security Manager/ Director • Outstanding Contract Security Manager/ Director • Outstanding Security Team • Outstanding Security Training Initiative • Outstanding Security Partnership • Outstanding Security Officer • Outstanding Female Security Professional • Outstanding Guarding Company • Outstanding Security Consultant • Outstanding Security Installer • Outstanding Information Security Company For more detailed information on the award nomination criteria and process visit www.asial.com.au/ securityawards2018


RECOGNISING EXCELLENCE

#securityawards

2018

AUSTRALIAN

Security Industry

2018

Organised by:

The Australian Security Awards Ceremony & Dinner The night is an opportunity to celebrate excellence and innovation in the security industry, and network with likeminded security professionals. www.asial.com.au/securityawards2018 Date: Thursday 18 October 2018 | Venue: Sydney’s Doltone House Hyde Park Entertainment Sponsor:

2018

Lead Dinner Sponsor:


VIDEO DOESN’T HAVE TO BE EXPENSIVE TO BE EFFECTIVE

With years of experience across hundreds of clients, let us show you how we can help you generate more business than ever before. enquiries@interactivemediasolutions.com.au


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.