A U S T R A L A S I A’ S L E A DI N G S E C UR I T Y R E S OUR C E F O R BU S I N E S S A N D G O V E R N ME N T
JULY 2018 ISSUE 113
HOW WILL
MACHINE LEARNING CHANGE SECURITY?
PA S 6 8 & I WA T E S T E D G U A R A N T E E D
W W W. E
25 YEARS OF BUILDING SMART AND SECURE OUTDOORS E zi Security Systems designs, manufactures and installs a premium range of perimeter security solutions for both vehicle and pedestrian access control, with specialised expertise in Hostile Vehicle Mitigation and protection of Crowded Spaces. With core competence established over 25 years, Ezi Security Systems provides innovations of our own invention, and via alliances with undisputed world leaders in our field, deliver sophisticated solutions at the leading edge of global technology. Over the past 5 years the world has changed dramatically. In collaboration with our strategic business partners, Ezi has responded with focus, mitigating hostile vehicle threats with our Crowded Spaces range of products. Ezi offers permanent solutions for risk categories from low to extreme, as well as rapid deployment products for crowded spaces and public events, such as the Impakt and Rapid Defender products.
Z I S E C U R I T Y. C O M . A U
All Ezi Security Systems Hostile Vehicle Barrirer solutions have been rigorously crash tested and certified to meet requisite ASTM, IWA and PAS 68 stipulations. Along with our global partners, Ezi Security Systems actively collaborate in the development and deployment of contemporary strategies such as VAAW (Vehicle as a Weapon) mitigation, deploying whole of environment solutions. Ezi have solutions to meet your very highest security requirements whilst maintaining an aesthetically compatible solution for your site. You can be confident that when serious security is your requirement, you need look no further than Ezi. We stand ready to be of expert service in an ever evolving environment, as global security risks increasingly demand local solutions.
1300 558 304 11 Cooper Street Smithfield, NSW, Australia 2164 sales@ezisecurity.com
ISSUE 113
FEATURES
40
24
CONTENTS
78
50
46
28
COVER STORY
Artificial Intelligence (AI) is transforming every industry it touches, from healthcare to transportation to agriculture. So it should come as no surprise that the security industry is starting to be transformed through AI as well. In fact, security, automotive and healthcare are in the top tier of industry verticals to benefit from this amazing technology. Security has some major influences driving the adoption of AI, including the increasing threat of terrorism and more sophisticated security perpetrators. What exactly is AI and what role might it play in the future of security?
24 STANDARDS INCREASING SECURITY
We look at the role of Standards Australia in the evolution of security in Australia. What are they doing in the areas of traditional security standards and how are they innovating in response to the needs of the sector, including developing standards at an international level?
44 FAMILIES THAT SLAY TOGETHER
Anne Speckhard and Adrian Shajkovci of the International Center for the Study of Violent Extremism (ICSVE) look at the recent terrorist incidents in Indonesia – three nearly simultaneous suicide attacks on three separate churches in Surabaya, all carried out by members of the same family.
48 UNDERSTANDING AUSTRALIAN BUSINESS ATTITUDES TO CYBER SECURITY
We look at the results of the BDO and AusCERT 2017/2018 Cyber Security Survey which delivers insights into the cyber resilience and maturity of Australian and New Zealand businesses, as well as the cybersecurity risks and realities faced by Australian and New Zealand businesses across a range of organisation sizes and industry verticals.
64 PERSONAL PROTECTION IN THE LAND
OF THE DRAGON
Paul Johnstone looks at the booming private protection industry in China.
68 SEVEN WAYS TO EXHIBIT LIKE A PRO
Get all the information you need to make your visit to this year’s Security Expo and Conference in Melbourne a success.
62
REGULARS 06 LETTER FROM THE EDITOR 08 LEADERSHIP
How can you lead through empowerment?
10 STRATEGY
32 OPERATIONS
Richard Kay examines the value of reality-based training.
36 BUSINESS
How can you keep your business relevant in a rapidly changing industry?
What is the relationship between enterprise risk management and security?
52 AVIATION SECURITY
12 CYBER SECURITY
56 ACCESS CONTROL
14 HUMAN RESOURCES
60 PROFESSIONAL DEVELOPMENT
What is a cyber resilience assessment and why do you need one?
Greg Byrne examines the responsibility of employers regarding superannuation.
16 RISK MANAGEMENT
Do body scanners work?
How will Access Control as a Service (ACaaS) change the industry?
We present the first of a two-part special on behavioural interviewing.
72 EVERYDAY CARRY
Kevin Foster explores the foundation for a dynamic model of risk control.
As an active security operative, you need to be prepared. We look at some of the best everyday carry gear for security professionals.
18 LEGAL
76 PRODUCT SHOWCASES
Justin Lawrence looks at what happens when a business fails.
20 THINKING ABOUT SECURITY
Don Williams looks at the latest Australian New Zealand Counter Terrorism Committee guidelines for protection of crowded places.
80 SPOTLIGHT 82 SHOP TALK
Company announcements from within the industry.
22 EVENTS CALENDAR
A look at upcoming industry events.
4 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
FROM THE EDITOR FROM THE EDITOR www.securitysolutionsmagazine.com
EDITORIAL www.securitysolutionsmagazine.com
EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon
Jason Brown, Tim Rippon, Bob Ansett, Greg Byrne, Kevin Foster, Justin Lawrence, Don Williams, Scott CONTRIBUTORS McGrath, AnnaJason Silwon, Richard Anne Speckhard, Garry Barnes, Brown, GregKay, Byrne, Kevin Foster, Adrian Johnston, McGiffin, Steve RichardShajkovci, Kay, StevePaul Lawson, JustinJohn Lawrence, Scott Lawson, Scott Lindley, Elly Johnson O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Anne Speckard, Alex Sidernko, Ardian Shajkovci, Ami Toben, Simeon Votier
ADVERTISING
Keith Rozairo PHONE 1300 300 552 ADVERTISING Keith Rozairo EMAIL keith@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL keith@interactivemediasolutions.com.au Jonathan Rudolph DESIGN1300 AND300PRODUCTION PHONE 552 Jonathan Rudolph EMAIL graphics@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL graphics@interactivemediasolutions.com.au
DESIGN AND PRODUCTION
MARKETING AND SUBSCRIPTIONS PHONE 1300 300 552 MARKETING AND SUBSCRIPTIONS EMAIL admin@interactivemediasolutions.com.au PHONE AUD 1300inside 300 552 $62.00 Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues) EMAIL admin@interactivemediasolutions.com.au $62.00 AUD inside Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues)
ACCOUNTS PHONE 1300 300 552 ACCOUNTS EMAIL accounts@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL accounts@interactivemediasolutions.com.au
PUBLISHER PUBLISHER
ABN 56 606 919463 Level 1, 34 Joseph St, Blackburn, Victoria 3130 ABN 56 606 919463 PHONE 300 552 Level 1,1300 34 Joseph St, Blackburn, Victoria 3130 EMAIL PHONEenquiries@interactivemediasolutions.com.au 1300 300 552 WEBSITE www.securitysolutionsmagazine.com EMAIL enquiries@interactivemediasolutions.com.au WEBSITE www.securitysolutionsmagazine.com DISCLAIMER The publisher takes due care in the preparation of this DISCLAIMER magazine and takes all reasonable precautions and
The publisher takes due care in the preparation of this makes all reasonable effort to ensure the accuracy magazine and takes all reasonable precautions andof material in effort this publication, butaccuracy is not liable makes allcontained reasonable to ensure the of for any mistake, misprint omission. but Theispublisher material contained in thisor publication, not liable does notmistake, assume any responsibility or liability for any for any misprint or omission. The publisher loss or damage which may result from any inaccuracy does not assume any responsibility or liability for any or omission in this publication, orfrom fromany theinaccuracy use of loss or damage which may result information herein. The publisher makes or omission contained in this publication, or from the use of no warranty, express or implied to any of the information contained herein.with Therespect publisher makes no material contained herein. warranty, express or implied with respect to any of the material contained herein. The contents of this magazine may not be reproduced in ANY form in OR in part without The contents ofwhole this magazine may not be WRITTEN reproduced permission from the publisher. Reproduction includes in ANY form in whole OR in part without WRITTEN copying, photocopying, translation or reducedincludes to any permission from the publisher. Reproduction electronic medium or machine-readable form.to any copying, photocopying, translation or reduced electronic medium or machine-readable form.
WRITTEN CORRESPONDENCE TO: WRITTEN TO: Level CORRESPONDENCE 1, 34 Joseph St, Blackburn, Victoria 3130
It would seem, according to many of the
world is changing rapidly.
world’s leading experts in AI, that the difference
Long-established oes Australia really technologies take security and professions are giving wayclaims to new seriously? Yes, Government
and exciting fields endeavour and to, andofsome of the corporate technologicalsector advancement faster than many demonstrate a passing industries can keep up. Just aswhat analogue interest from time-to-time, but of thesecurity systemsman gaveand way to digital technologies, new average woman on the street? Do we IP-basedtake systems are seriously rapidly displacing honestly security or do we, more as a
between ado bright in whichattitude life is safer Australian’s have future a very relaxed morebecause secure, they or a world inrightly which or we are all toand security believe, nuked out Skynet, could be as wrongly, thatof “itexistence will neverby happen here”. This as the of autonomy giventrue. to is simple a sentiment welevel can only hope remains AI-based Do we let intelligent However, assystems. the old axiom states, one should machines and how they always expect thesystems best butdetermine plan for the worst and will react tosurprised. a given situation and, if so, what prepare to be level of control will wenot allow them over the Of course, one should have to rely upon
traditional coax-based systems. Similarly, the nation, just pay lip service to the idea emergence of security? of Deep Learning and Artificial
actions For example, if a to drone some formtaken? of devastating incident occurisinable to
Intelligence (AI)2018, are set replace of the As we enter weto should be many thankful that
circle major to event use AI to identify order to over forceapeople takeand security seriously.
existing technologies we view as cutting edge. Australia has never suffered a major terrorist
potential threats warn security There is a great dealand thatthen the security industry
incident the likesnow, of 9/11, the only Boston bombings, Ten years from one can begin to
can do to educate the business community services of those threats, that would beabout an
the bombings of July 2005 inand London or the imagine the sorts of 7, systems technologies
the benefits of taking security seriously. improvement in security. However, inIn a past more
terrorist of October 12, 2002 in Bali. that willattacks have become commonplace.
issues Security Solutions Editor-At-Large Rod extreme example, what if the drone determines
However, as a result, Australian community The 2002 Steventhe Spielberg movie Minority
Cowan has written about can act as the detected threat to how be a security suicide bomber,
has become somewhat complacent with regard Report, starring Tom Cruise, demonstrated
a differentiator and give companies and believes for thatbusiness the suicide bomber is within
to security. I often hear many of our readers the use of gesture control, amongst other who are security managers within large corporations technologies, which at the time seemed so
a competitive edge. seconds of detonating an explosive? Should the
comment onfuturistic the differences between Now, attitudes amazingly and innovative. less to security in Australia and America, where they than two decades later, gesture control has
If we be have learned from tragic drone fitted withanything the capability to neutralise events that have occurred globally in recent such a threat? If so, should the drone be given years, it must be that the world has changed – the autonomy to make split-second decisions
often have to travel and According to many become a common waywork. of life. From smart TVs in security managers, Americans understand that and our homes to smartphones, tablet computers
permanently – andorwe cannot keep pretending about whether not it is necessary to that it has not. 9/11 was not an isolated incident I neutralise the threat and then act accordingly?
terrorism a clearand andbrowse presentinformation danger andwith a so on, weisaccess a fact of daily life and thus, they treat security flick of the wrist, we choose potential dates by
and groups way, such amifsure youlike canISIS seehave the their difference. attacks will become much more frequent. There To help better understand AI and how our
and security workers with the due respect. In swiping left or right and we zoom in and out of contrast, they believe that Australian’s have a images and text with a pinch of our fingers. very blasé attitude towards security and it is this Imagine a world in which intelligent software attitude that makes us much more vulnerable is able to sort through petaflops of information to attack. from thousands of sources in the blink of an In my opinion, having recently travelled eye to identify people intent on doing harm or through Egypt and Jordan, they are correct. committing unlawful acts. Those same resources
is a great deal more work to be done to ensure security systems are getting smarter, we asked that we create the kind of effective security John McGiffin of Deep Recognition, experts culture within organisations and the broader in the field of deep machine learning and community that will enable Australian’s to be systems, to write this issue’s cover story. John safe and secure. And the work must begin with has provided a great introduction to how AI and security professionals. Let’s make 2018 the year deep machine learning work to help people that Australia begins to take security seriously. n like me get their head around where the future
could then more accurately direct security
of security technology is going. Be sure to
resources to maximise their effectiveness
check it out. If you are attending the Security Expo from
and provide better security outcomes. The possibilities are both exhilarating and terrifying
25th–27th July in Melbourne, be sure to drop by
at the same time.
and say hi. n
SSOCIATI RS A ON DE O VI
RALIA LTD
SECURIT Y
PR
UST FA
O
Level300 1, 34 Joseph St, Blackburn, Victoria 3130 1300 552 1300 300 552 enquiries@interactivemediasolutions.com.au enquiries@interactivemediasolutions.com.au
M D
uch like Security Solutions, the
Official Official Partners Partners O C I AT I
ON
Y P R OVI D RIT
CU SE
STRALIA LTD AU
PR O
ASS
SPAAL D LT
OF
SECURITY
RS
AU S T R A L I A
SSOCIAT IO N
OF
E
Original Size
RS A DE VI
blue colour changed to this colour green.
COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE signing your approval to print. Please pay special attention to spelling, punctuation, dates, times, telephone numbers, addresses etc, as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman Press assumes no responsibility for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................
// SECURITY SECURITY SOLUTIONS SOLUTIONS 46 //
John Bigelow John Bigelow Editor Editor
securitysolutionsmagazine.com securitysolutionsmagazine.com
SECURE YOUR DATA & EQUIPMENT
A data enclosure is your last line of defence, so it needs to be strong enough to stop unauthorised access. CER TIF IE CLASS C
D
The MFB range of Class B and Class C enclosures are purpose built frames fitted with key locks and boltwork approved by the Australian Government Security Construction and Equipment Committee (SCEC)
INATION LOCK MB S CO
All enclosures are fitted with tamper evident cable entry systems, high impact clear polycarbonate panels on doors, secure venting systems and certified combination locks. CLASS B
An alternative product, the MFB range of High Security enclosures provides a lower level of security and is not SCEC approved. Effectively construction methods mirror the Class B and Class C series, however the doors are fitted with a cheaper bilock keying system. Also additional flexibility with the design regarding cable entry encourages effective quick installation and high volume data cable installations. With over 50 years in the business, and backed by the SCEC approval for manufacture, these Australian built 19”rack mount enclosures provide peace of mind in relation to the security your
data needs.
DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS
www.mfb.com.au
VIC (03) 9801 1044 / sales@mfb.com.au
AUSTRALIAN MADE MAKES AUSTRALIA NSW (02) 9749 1922 / sydney@mfb.com.au
fb.com/mfbproducts
LEADERSHIP
LEADING BY EMPOWERING BY BOB ANSETT
F
or many, the thought
restraint to keep from meddling
do. If this is not possible for some
of a leader
with them while they do it.”
reason, make sure they understand
have the right attitude. Insecurity
To empower people, you must
empowering
Great leaders know the value
the overall purpose of the task.
will cripple your ability to empower
followers to make
of involving people as much as
This includes defining exactly
others. You cannot be afraid. Do
decisions is almost a contradiction
possible in all aspects of work
what you want them to do. Then
not let the fear of empowering a
in terms. The common perception
and planning decisions. This is
ask questions, watch the tasks
person make you feel like you will
of leadership is that of the
because involvement increases
performed and have the individual
be displaced. Empowering people is
micromanager who finds it difficult
ownership commitment and fosters
assigned the responsibility give
incredibly fulfilling in so many ways.
to empower others to take decisive
an environment in which people
you feedback to make sure your
When you empower people, you are
steps and accept the responsibility
choose to be motivated and to
instructions were understood.
not just influencing them; you are
that goes along with it.
contribute. It is also a key element
But hey, wait a minute! When we
in team building. As a leader, you
look through the annals of history
are ultimately accountable for
and examine the role of great
the performance of your team, so
leaders, we inevitably discover the
you must have in place a method
really great ones were effective
for holding your team members
delegators. Here is a brief sample
accountable for the roles they play
of what some of them have to say
in the organisation.
about empowerment: • Bill Gates – “As we look further
It takes time and commitment to build a team that is based on
influencing all those around them. In essence, great leaders succeed in delegation by: • providing clear instructions to their followers • describing clear expectations of the task at hand • allowing their team members to make decisions • providing clear deadlines for
And it is always useful to remember there is no success without a successor. So, the process of empowering others is critical to the achievement of the overall objective. In the final analysis, delegation is a critical aspect of leadership, which is defined as a process whereby an individual influences a group of
into this century, great leaders
trust, respect and hard work. It is
will be those who empower
not always easy, but the pay-off is
• setting up their followers for
goal. The effective leader intuitively
others.”
worth the effort. When the going
success through playing to
knows that delegation of tasks and
gets tough and you hit a snag in
their strengths.
responsibilities to others expands
• Abraham Lincoln – “Nearly all
task completion
individuals to achieve a common
men can stand adversity, but
your delegation process, do not
Effective leaders trust and believe
his/her capacity to take on even
if you want to test a man’s
throw in the towel. Analyse what
their followers are going to
greater responsibilities and thus
character, give him power.”
went wrong and what needs to
succeed until proven differently.
become a better leader. n
change to fix it. Getting an effective
When failure does occur, they
tell people how to do things.
delegation mindset can take time,
first look to themselves to see if
Tell them what to do and they
but once you have clarity on what
they provided clear expectations,
Ansett Marketing, a consulting firm
will surprise you with their
you should and should not do to
direction and the tools necessary
in the field of customer service. Bob
ingenuity.”
manage your team, you are on the
for the delegated task to be
is also a familiar name in Australian
path to delegation success.
completed successfully. Great
business, synonymous with Budget
leaders know that the buck stops
Rent a Car, which he established in
• General George Patton – “Never
• Theodore Roosevelt – “The best leader is the one who has sense
When delegating
Bob Ansett is the founder of Bob
enough to pick good men to do
responsibilities, where possible,
with them. Micromanagers tend to
1965. Bob can be contacted at
what he wants done, and self-
give the recipient a whole task to
assign blame.
bob@bobansett.com.au
8 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Intelligent security solutions from Dahua Technology Discover Dahua, a world leader in video surveillance, offering high value total security solutions to safeguard assets, communities and infrastructures.
now available at Hills! Unified Management Platform Video Surveillance
Unified UnifiedManagement Management Platform Platform Video VideoSurveillance Surveillance
Unified Management Platform Video Intercom Video Intercom
Video Surveillance - Advanced video collecting and analysing - Wide coverage w/o blind angle
Video Surveillance Video Surveillance
Unified Management Platform Unified Management Platform
- Advanced video collecting and analysing - Advanced video collecting and analysing - Wide coverage w/o blind angle - Wide coverage w/o blind angle
- High reliability with low running cost - High reliability with low running cost - Scalable and customisable - Scalable and customisable
HSS0031-July18-version 1
For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au
facebook.com/HillsLtd/ CONNECT
E N T E RTA I N
SECURE
- High reliability with low running cost - Scalable and customisable
Video Intercom Video Intercom - Support both IPIP and Analogue - Support both and Analogue - Attractive design - Attractive design
STRATEGY
ENTERPRISE RISK MANAGEMENT AND SECURITY Good risk management can result in value creation and contribute to sustainable organisational performance that helps organisations achieve their strategic objectives. It must permeate all levels of an organisation and hence it needs to be addressed.
of updating guidance and developing supporting materials, where appropriate. Enterprise Risk Management — Integrating with Strategy and Performance provides a framework for boards and management in entities of all sizes. It builds on the current level of risk management that exists in the normal course of business. Further, it demonstrates how integrating enterprise risk management practices throughout an entity helps to accelerate growth and
Risks at an Enterprise Level
all the activities of an organisation; it
with a right and wrong answer.
enhance performance. It also contains
In the case of security, there are a range
is a responsibility of all employees.
Organisations encounter challenges
principles that can be applied, from
of malicious actors who will endeavour
Legislation, regulation and governance
that impact reliability, relevancy and
strategic decision making through
to achieve their own goals at the expense
codes expect appropriate evidence of
trust. Stakeholders are more engaged
to performance.
of the enterprise, and often society as
responsible risk management processes
today, seeking greater transparency
Risk is not an easy term to define,
a whole. Security professionals must
being applied and managed across all
and accountability for managing the
so there are various definitions. While
ensure that the risks they seek to control
areas of the organisation’s activities to be
impact of risk while also critically
risk is often considered in terms of the
and mitigate are adequately addressed
available on an ongoing basis, with clear
evaluating leadership’s ability to
likelihood of something happening
throughout the enterprise, hence
communication on policies, procedures
crystallize opportunities. Even success
and the severity of the outcome, risk
an understanding of enterprise risk
and processes expected.
can bring with it additional downside
as a concept is more complex, and that
risk – the risk of not being able to fulfil
complexity needs to be understood.
management is important. In the first of
The Changing Risk Landscape
unexpectedly high demand, or maintain
examine the role of risk management
The 21st century multi-polar, hyper-
expected business momentum, for
of uncertainty on objectives’, where
in the enterprise and burrow down to
connected, social media driven, fast-
example. Organisations need to be more
uncertainty may relate to a deficiency
frameworks for managing security risks
paced world in which we live presents
adaptive to change. They need to think
of information, understanding or
at all levels of enterprise.
an environment in which we need to
strategically about how to manage the
knowledge of an event, its consequences
understand and master complexities and
increasing volatility, complexity and
or its likelihood. When making decisions
uncertain, chaotic and ambiguous.
uncertainties on a scale never before
ambiguity of the world, particularly at
as part of managing risk, it is important
These elements collectively feed the
encountered by the average person.
the senior levels in the organisation
to remember that this is not an absolute
and in the boardroom where the stakes
science; it is about managing uncertainty
are highest.
to achieve objectives that may include
what will be a series of articles, we will
We live in a world that is volatile,
uncertainty which plagues decision
Business models from the most
ISO 31000 defines risk as the ‘effect
makers seeking to get the best results.
sophisticated in banking to the most
Organisations of all sizes and types need
rudimentary in transportation in the
to recognise and manage the uncertainty
developed world and financial services in
Risk Management Frameworks
objectives. Risk is also circumstance-
present in the world and impacting
the underdeveloped, are being disrupted
The management standard ISO 31000
specific and has to be dynamic, iterative
all organisational activities in order
as never before. Survival today requires
provides a risk management framework
and responsive to change.
to optimise performance. Developing
agility, flexibility and automation.
that supports all organisational activities,
insight into how risk may affect the
The Global Financial Crisis
social, environmental and economic
Such uncertainties may relate
including decision making at all levels
to technical and human factors;
objectives of organisations and their
(GFC) of 2008 and the international
of the organisation. The ISO 31000
environmental impacts; social
stakeholders, and managing this well, is a
failure to achieve strategic
framework and its processes should be
benefits; economic factors, such as
key performance factor that contributes
objectives in Afghanistan, Iraq and
integrated with management systems to
the cost of energy, commodity prices
to the success of the organisation. Good
Syria powerfully demonstrated
ensure consistency and the effectiveness
and exchange rates; geological and
risk management is an expectation of all
complex interdependencies which
of management control across all areas of
climate conditions; and political
stakeholders, both internal and external.
were not understood by even the
the organisation.
risks. To manage risk effectively,
To build sustainable performance, organisations have to clearly understand the relationships and links between
most sophisticated organisations and countries. This changing risk landscape, our
The principle objective of the
uncertainty and unpredictability must
International Standards Committee ISO/
be recognised and information gaps
TC 262 – Risk management is to help
filled to reduce uncertainty. In addition
their objectives, strategies and risk
understanding of the nature of risk,
organisations ensure their viability and
to comprehensive technical work, this
management processes in the interests
and the art and science of choice lies
success over the longer term in the
requires engagement with relevant
of all stakeholders.
at the core of our modern economy.
interests of all stakeholders by providing
stakeholders who will have different
Every choice we make in the pursuit
good risk management practice. The
perceptions of uncertainty.
has overall accountability for the
of objectives has its risks. As we
committee regularly reviews the needs of
management of risk. The management
seek to optimise a range of possible
end-users and risk professionals, across
Enterprise Risk Management Model and
of risk should be integrated across
outcomes, decisions are rarely binary,
markets and sectors, with the intention
look to specific security examples. n
The board, or its equivalent,
10 // SECURITY SOLUTIONS
In the next article I will expand on the
securitysolutionsmagazine.com
The Cobalt is an innovative low voltage motor driven door lock for swing doors. It has been designed to secure double acting doors and addresses the two biggest issues in door locking; the ability to align a misaligned door and the ability to release when requested, even with excessive load on the door. The Cobalt successfully overcomes these issues and offers the user an array of other features. To learn more about our complete range of smart and secure access solutions, contact dormakaba.
T: 1800 675 411 www.dormakaba.com.au
More than just a lock
CYBER SECURITY
WHY YOU NEED A CYBER RESILIENCE ASSESSMENT BY TIM RIPPON
C
ybersecurity is the
clients, ensuing lawsuits, along
preservation of
with the significant reputational
of-service attacks, including the
confidentiality,
damage, is real and may result in
takedown of entire websites
integrity and
this company suffering huge losses,
• unwanted disruption or denial-
• changes to the characteristics of
availability (CIA) of all electronic
with a real potential that it may
a computer system’s hardware,
information (digital assets) in
have to cease trading.
firmware or software without
the cyberspace.
All company executives and
the owner’s knowledge,
organisation’s cybersecurity program • development of strategy and budgets for future business plans and objectives • recognition if the business is already compromised
Cyberattacks, including the
the leadership teams are under
hacking of business websites and
increasing pressure to prevent
The procedures for investigating
computer systems, are becoming
these attacks and must act
and responding to a cyberattack
increasingly common. These attacks
immediately to contain any damage
usually depend on the nature
can be extremely damaging to
once an attack occurs.
of the attack itself and how
A conversation with your
businesses, particularly if security is
A cyberattack, as most
instruction or consent.
• identification of critical supplier dependencies • improvement of cyber awareness culture.
prepared an organisation is for
cybersecurity staff or a trusted
breached and confidential business
readers will be aware, is an attack
such an attack. The response
consultant can commence the
and personal data becomes
initiated from a computer against
taken by the business will depend
journey to becoming more cyber
compromised. Cyberattacks, and
a website, computer system
on the maturity, awareness and
resilient, with the first step
the resulting security breaches,
or individual computer that
senior leadership endorsement
progressing through an essential
are part of a rapidly expanding
compromises the confidentiality,
for cybersecurity.
cyber resilient assessment that
international cyberthreat that costs
integrity or availability of the
companies and taxpayers billions of
computer, or information stored
assessment has many benefits and
dollars each year in lost information
on it. Cyberattacks take many
may enable:
and downtime, impacting staff
forms, including:
• continuity of critical business
productivity and the bottom line.
• unauthorised use of a computer
In the current local media, we have observed the fallout of thousands, if not millions, of
system for processing or storing data • installation of viruses or
records breached by an Australian
malicious code (malware) on a
software-as-a-service vendor that
computer system
has provided human resources
• gaining, or attempting to
(HR) software to many well-known
gain, unauthorised access to a
companies and government
computer system or its data
agencies. This one breach has the
• inappropriate use of computer
recruitment industry standing up
systems by employees, former
and taking note. The threat of losing
employees, or agency staff
12 // SECURITY SOLUTIONS
Conducting a cyber resilience
process • informed cybersecurity decisions to be made • identification of vulnerabilities and mitigation of risks • alignment of cybersecurity with the business plan • compliance with regulatory,
determines what is already in place to protect your digital assets. n Tim Rippon is the founder and director of elasticus, advising Australian-based executives on how to best manage cybersecurity, disaster recovery and business continuity before a major disaster or crisis occurs. He holds a certified Master of Information Security (ISO 27001), certified Master of Business
legal and compliance
Continuity (ISO 22301) and Lead
obligations
Cyber Security Manager (ISO 27032)
• understanding of the effectiveness of the
from PECB. Tim can be contacted via mobile 0417 036 026.
securitysolutionsmagazine.com
YO UR AC CES S TO REVO LUTI O N
FlowMotionÂŽ
For more information | 1300 364 864 | info@magnetic-oz.com | www.flowmotion-access.com |
HUMAN RESOURCES
THE RESPONSIBILITY OF EMPLOYERS TO PAY SUPERANNUATION BY GREG BYRNE
he compulsory
bills that proposed employers
compliance obligations. If any of
payments to the appropriate
employer
who disobey ATO directions to pay
your employees earn more than
superannuation fund(s) within
contribution scheme
superannuation entitlements be
$450.00 per calendar month, you
the 28-day requirement. SG
was introduced in
subject to court-ordered financial
must, as a minimum, pay each of
obligations are not satisfied on
1992 by the Keating Labor
penalties as well as up to 12 months
your employees the SGC, which as
payment to the clearinghouse;
Government. The reform created
imprisonment. All directors will also
at May 2018 is 9.5 percent of their
they are met when the
the Super Guarantee Charge (SGC)
be issued a director identification
ordinary time earnings. The SGC will
superannuation fund receives
obligation and was part of a more
number that will enable the ATO to
increase to 10 percent on the 1st of
the contributions, with the
comprehensive reform package.
identify those directors who are not
July 2021 and to 12 percent on the
exception of the Small Business
The Government’s intent was to
paying employee superannuation.
1st of July 2025.
Superannuation Clearing House.
T
ensure the financial future of all
The superannuation compliance
(see ato.gov.au/rates/key-
Most clearinghouses require up
Australians and to ease the burden
bills also propose making single
superannuation-rates-and-thresh
on Australia’s strained welfare
touch payroll mandatory for all
olds/?anchor=Superguaranteeper
Advice from AHRI is for employers
system into the future.
employers from the middle of
centage)
to conduct a review of their
Despite this, on the 30th of
2019. Superannuation funds will
Research conducted by the
to 10 days to process.
processes and payments to ensure
August 2017, the Australian Taxation
also be required, from the middle
Australian Human Resources
they are complying with their legal
Office (ATO) announced that $17
of 2019, to report to the ATO every
Institute (AHRI) identified areas
obligations. For further information
billion in unpaid superannuation
superannuation payment that is
where employers mostly trip up.
on these proposals, it is advised
was owed to Australia’s workforce.
made to every employer.
They include:
to speak to your solicitor or
1. Incorrect treatment of
accountant. n
One of the reasons for this was
Other proposed changes include
the fact the onus was placed on
forcing monthly superannuation
contractors – a contractor
employees to bring any non-
payments by employers instead
can still be deemed to be
compliance to the attention of their
of the now required quarterly
an employee for super
Director of Multisec Consultancy Pty
employers or the ATO. Cowed by
payments, increased powers
guarantee (SG) purposes,
Ltd. He also lectures part-time at the
job insecurity, many are reluctant to
to seek court order penalties,
depending on the nature of the
Western Sydney University, where he
rock the boat.
encouraging the reporting of non-
contractual arrangements.
teaches an undergraduate diploma
The ATO announced in January
Greg Byrne is the Managing
in policing. He works as a subeditor
compliance, and the introduction
2. Missing payments from the
2018 that in response to this
of a single touch payroll payment
definition of ordinary times
for the Australian Police Journal and
extraordinary debt, it was forming
system that will give the ATO
earnings when calculating
is a serving member of the board of
a task force to crack down on this
real-time visibility over wage and
9.5 percent superannuation
directors. He possesses a number of
non-compliance for superannuation
superannuation payments.
contributions, notably the
academic qualifications, including:
omission of specific allowances
Master of Management, Diploma
and directors’ fees.
of HR, Grad Cert in Leadership
laws and to protect the future of employees. In support of the task force,
With the penalties for SGC non-compliance dramatically increasing, it is essential for all
3. Employers using clearinghouses
and Diploma in Security Risk
in 2018 the Government tabled
employers in the Australian security
must ensure that sufficient
Management. Greg can be contacted
draft superannuation compliance
industry to be fully aware of their
time is allowed for it to make
via email greg@multisec.com.au
14 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Smart Vehicle Identification
Photos credits: Shutterstock - aressy.com 04/18 - 10917
New Spectre reader: Let the good go, kick the bad out. Without delay. Meet the challenge of fast-track security at your vehicle gates. Spectre’s UHF-based vehicle ID reader is the first of a new generation: discreet by design, flexible in its configuration, secure and encrypted in its communication. Our new long-range reader is built to perform for up to 4 driveways, even in highly challenging environments. It’s the most robust reader on the market, yet intuitively easy to use. Welcome to speed and security - in a single solution.
SCALABLE | SMOOTH | SECURE | AGILE | STEALTH | INSTINCTIVE
www.stid-security.com Security Meetings Trophées de la sécurité Expoprotection ISC West APS
RISK MANAGEMENT
THE FOUNDATION FOR A DYNAMIC MODEL OF RISK CONTROL BY KEVIN J. FOSTER
O
rganisations and
event. It is a cognitive failure which
may follow a systemic increase
complexity and simplicity are also
individuals constantly
can occur due to a multitude of
in disordered data (entropy) or a
important within the context of
collect and interpret
factors. Politico-cultural biases
systemic increase in noise.
cultural biases. A contingency-
messages from their
will determine what data should
Communication in complex
based risk control model relating
operational environment. The
be collected, how it should be
operational environments can
different cultures to differing types
messages may be accurate and
interpreted, and what action should
affect not only the psychological
of decision processes is needed to
complete, or they may be distorted.
be taken.
environment but also the
develop a new model for the study
The risk image is compared
operational environment. Biases
of the dynamical behaviour of risk
the transmitter, the communication
with a datum reference perception
are ubiquitous whenever security
management systems.
channel, or the receiver. Such
of acceptable risk. The difference
analysts and decision makers
communication problems might be
between the acceptable risk and
attempt to monitor operational
modelling process which involves
unavoidable and they may be
the risk image may be amplified
environments. These biases can
the fusion of numerous theoretical
deliberate. The data in the
socially and by various overt and
affect risk data indexing systems,
concepts from several disciplines
messages is used to develop an
implicit actions or decisions.
which in turn affect images of risk
into a unified and dynamic
hypothesis about an entity’s intent
These amplifications, or gain, will
and the operational environment
cybernetic model for describing
and capability, or of the likelihood
affect the operational and future
itself. They also have an indirect
risk and surprises in a simple and
of some random event. The
environments. There will also be
effect on the future environment.
practical way. n
hypothesis will indicate that the
other disturbances which may
These biases may be imposed on
entity or event is, or is not, a threat.
affect the environments.
the analyst and decision maker
The distortion may be caused by
Any new data that becomes
The dominant cosmology of the
To do so requires a deductive
This new model of dynamic risk
by matters of complexity, social
analysis and its application will
available may be categorised in
risk decision maker will determine
context, political culture and
be explained in later editions of
such a way that it supports the
the importance of organisation
routinised heuristics. Issues of
Security Solutions Magazine.
popular hypothesis.
design, lead times, lag times, the
Risk analysis failure is an
load on the risk control system
inability to predict the potential
and the degree of gain introduced
or actual behaviour of an entity or
into the operational environment.
the likely occurrence of a random
Risk analysis failure and surprise
16 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Pedestrian and Vehicular Access Control Automation
FAAC Simply Automatic Modular automation solutions
HUB Parking Technology Smart and flexible parking solutions
Magnetic Automation Pioneering access control solutions
Experts in Access | Discover the FAAC Group range of products at J14 | www.faacgroup.com
LEGAL there is often very little left for payment to unsecured creditors. If, however, the directors of the company are deemed to have allowed the company to trade whilst insolvent (that is, to have incurred debts where the company had no prospect of being able to repay them), they can be held personally liable for those debts. This can mean that the liquidation
BY JUSTIN LAWRENCE
of the company might not be the end of the matter. Directors can be
THE LEGALITIES OF A FAILED BUSINESS
sued for those debts. The liquidator will only commence court action for insolvent trading with the financial backing of one or more creditors. If the court orders that the directors are indeed liable for those debts, the liquidator will have a number of recovery options available to him, including having the directors
o, you have received a
The receiver’s first duty is to
letter stating that one
the secured creditor. Much like a
enjoyed by the company from time
of your creditors has
mortgagee who takes possession
to time), then the receiver must pay
an undischarged bankrupt is
entered either
of and sells real estate following
the proceeds of sale in the following
automatically disqualified from
receivership, liquidation or
the default of a mortgagor, the
order: firstly to priority claims (such
managing a corporation or being a
`j
bankruptcy. We hear these terms all
receiver must ensure that the
as employee entitlements), secondly
director or secretary of a company.
jv
the time, but what do they actually
property is not sold for less than
to the secured creditor and thirdly to
A breach of this law can lead to
mean and, most importantly, what
its market value. If a receiver is
the company.
fines of up to $5,500 or one-
do they mean for the owners and
appointed to a company, it must
controllers of those businesses?
report to the Australian Securities
fails to gain sufficient funds
S
When a business is not
over all cash and stock-in-trade
If the process of receivership
declared bankrupt. Under the Corporations Act,
year imprisonment. If a person who is a sole director
and Investments Commission (ASIC)
to repay the debt owed to the
of a company becomes bankrupt,
succeeding it may firstly be placed
every six months as to the amount
secured creditor, the business (if
the company will be wound up,
into receivership. This means that
of its receipts and payments. Other
a company) will usually then be
irrespective of whether or not it has
a secured creditor has appointed
(unsecured) creditors are able to
placed into liquidation. In that case,
first been placed into liquidation.
an external party (the receiver)
obtain a copy of those statements
a liquidator will be appointed to
to administer the assets of the
from ASIC.
take control of all of the assets of
any business to do is to ensure
business. Usually, the business will
A secured creditor may hold a
Of course, the best thing for
the company and to sell them. The
that its financial position is such
continue to trade as normal whilst
‘fixed charge’ over the assets of a
proceeds of sale will then be paid
that the closest that it will ever
the receivership is underway.
business (that is, a charge over fixed
to secured creditors. Anything left
come to receivership, liquidation or
assets such as land, buildings, plant
over will then be divided between
bankruptcy is to read about them
hold security over some or all of the
and equipment). If those assets
unsecured creditors according
on the pages of this magazine. n
assets of the business. The secured
are sold, the proceeds of sale of
to their entitlements. This is the
creditor will often be a bank or
the charged assets must firstly be
often well-publicised situation in
other financial institution.
paid to the secured creditor and
which creditors receive ‘5 cents
with Henderson & Ball Solicitors
any balance will then be paid to
in the dollar’ or some similarly
and practises in the areas of
the company.
trifling amount.
commercial litigation, criminal,
The secured creditor will usually
The primary role of the receiver is to call in and sell as many of those assets as are necessary
If the secured creditor holds a
Once all funds are paid out, the
Justin Lawrence is a partner
family and property law. Henderson
to repay the debt owed by the
‘fixed and floating charge’ (that is,
liquidation will usually come to
& Ball have Law Institute of Victoria
business to the secured creditor.
a charge over all of the non-trading
an end and the company will be
accredited specialists in the areas
Once those assets are sold and
assets of the company – real estate,
wound up. The liquidator’s fees will
of business law, property law and
the secured creditor is repaid, the
plant and equipment, intellectual
be paid as a priority, so once those
commercial litigation. Justin and
receivership will usually end and
property rights, book debts,
fees and the costs of liquidation are
Henderson & Ball can be contacted
the business will continue to trade.
contractual rights – plus a charge
extracted from the sale proceeds,
on 03 9261 8000.
18 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
`
j
v
`v
`jv
h
THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.
NEW!
ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.
+61 (3) 9544 2477
email: oz_sales@takex.com
HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.
BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.
INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.
OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .
1300 319 499 csd.com.au www.takex.com
TAKEX AMERICA
VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta
THINKING ABOUT SECURITY
CROWDED PLACES BY DON WILLIAMS
I
This table groups types of venues and considerations for managing crowds during a security/emergency event. Some facilities may contain a number of these venues, such as a shopping complex with cinemas and an indoor sports arena. The following are generalisations and the ability for patrons to escape or hide will depend on the specific built environment.
n 2017, the Australian New Zealand Counter Terrorism Committee (ANZCTC) released new
guidance on protection of crowded places (nationalsecurity.gov.au/Mediaand-publications/Publications/Pages/ default.aspx). This document is a significant improvement over previous ANZCTC guidance which had a strong law-enforcement bias with an emphasis on what would happen after police arrived, by which time it was probably all over. The 2017 guidance provided some useful self-assessment tools which, to the eyes of subject matter experts, may be open to debate but are of value to those seeking to establish a baseline and compliance with government expectations. The 2017 document also had an excellent section on resilience. As mentioned previously in this column, earlier guidance had little respect for owners and operators
Definitions: Good: Probable, is expected to happen or be available. Limited: Possible, might occur or be available. Poor: Unlikely, not expected to occur or be available.
of venues and contained many
facility management sectors have
staff. Once this is known, the relevant
to prevent (if possible) and certainly
statements of the blindingly obvious,
long been concerned with safety,
protective and response plans can be
to respond to mass casualty events.
reminding owners that they had a
security and response options.
assessed or revised. For example: an
It is unlikely that any place where
underground railway station has good
crowds gather has failed to plan; what
duty to protect those on-site. The
International associations
latest version at least recognises
such as ASIS International and the
communication with those on-site,
security advisors need to do is help
that owners and operators are not
International Association of Venue
but little capability to move or hide
them make sensible and practical
only aware of their responsibilities
Managers have thousands, sometimes
them; at a long linear event such as a
decisions and plans that not only fit
but have measures in place to deal
tens of thousands, of members and
parade or marathon, people can easily
within but support their particular
with them. The policy requires the
have established sub-committees
move away and possibly hide, but
operating environment. This is done
establishment of a Business Advisory
looking at these issues. Such
trying to communicate with everyone
by understanding their environment
Group and a Crowded Places Advisory
organisations could be a source of
along the track may be impossible
as well as fundamental concepts such
Group. Let us hope the voice of the
information to the ANZCTC. It would
and unnecessary; some sporting
as the ability to communicate, move
commercial sector is both heard and
also be of interest to know how many
and theatrical venues allow for easy
and hide. n
listened to.
members of the ANZCTC are members
movement of people, but others
of relevant professional associations.
result in the potential for crowd crush.
It also recognises that the professional and industry associations
While published guidance will
The ANZCTC has provided useful
Don Williams CPP RSecP ASecM is a recognised thought leader in
have a role to play. Unfortunately,
always be general in its nature, there
information and tools for those
security, emergency management and
according to the information flow
are a few basic concepts that may
owners, operators and advisors
related disciplines. His book Bomb
diagram, their role is to receive
help any venue. One step is to identify
responsible for the safety of people
Safety and Security: the Manager’s
information from government.
the ability of the venue or event
in crowded places. Obviously, all
Guide is available from Amazon.
Associations such as those for the
security to communicate and move or
venue operators need to continue
Don can be contacted via email
security, emergency, venue and
hide patrons, performers/athletes and
to assess and improve their ability
donwilliams@grapevine.net.au
20 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
EVENTS
Security Exhibition & Conference 2018
leading suppliers. The 2018 show
government protective security
of the ANU Southeast Asia
is set to see some interesting new
in Australia to be updated on
Institute and, since March 2017,
25–27 July 2018
innovations, as well as a host of
urgent issues.
Acting Head of the Strategic
Melbourne Convention and
new attractions.
Exhibition Centre, Melbourne
Make sure you put the dates
The PSG Conference also
and Defence Studies Centre at
provides an opportunity for
ANU, overseeing its three-
In 2018, the Security Exhibition
in your diary. We look forward to
everyone involved in government
degree programs. He is also
& Conference is heading back
seeing you again in Melbourne in
security to network, update
a Senior Fellow of the Higher
to Melbourne.
2018 for the Security Exhibition &
knowledge and skills, and gain
Education Academy and Fellow
ASIAL Conference!
exposure to new trends and
of the Royal Society of New
technology, as well as hear
South Wales. In addition, he is a
directly from representatives of
member of the ANU Academic
days of quality networking and
the Protective Security Policy
Board as well as the Australian
unrivalled education alongside a
Framework (PSPF) review team
Army Journal editorial
about the reforms and what
board and an occasional
they mean.
commentator in the media. He
For over three decades, it has been
Protective Security in Government Conference and Trade Show 2018
the largest and most established
13–15 August 2018
is the collaboration between
commercial event for the security
National Convention Centre,
Australian Security Research
industry in Australia, bringing
Canberra
Centre and the Federal Attorney
together the entire supply chain of
The Australian Security Research
General’s Department to jointly
acknowledged leader in
manufacturers, distributors, security
Centre will this year launch the
develop content and a program
the field of human-based
professionals and end-users to
Protective Security in Government
relevant to today’s Australian
risk management and the
connect and create unparalleled
(PSG) Conference and Trade Show.
security professionals.
business opportunities.
The PSG Conference is designed to
The Security Exhibition & Conference is the industry’s annual opportunity to reunite for three
showcase of the most innovative solutions to the Australian market.
Visit securityexpo.com.au for more information.
A cornerstone of this event
Speakers at this year’s
fill the gap from where the Security
event include:
forward to once again reuniting
in Government (SIG) Conference
• John Blaxland, Professor of
more than 4,500 security
left off in 2016 and to provide an
International Security and
professionals with over 150
opportunity for those involved in
Intelligence Studies, Director
The entire team is looking
22 // SECURITY SOLUTIONS
is a US Department of Defense Minerva Research Initiative grant recipient. • Dr Gav Schneider, an
psychology of risk. • Scott Ryrie, CEO of the Risk Management Institute of Australia. • Mark Carrick, one of Australia’s most experienced
securitysolutionsmagazine.com
counterterrorism practitioners
performance. (This research can be
with more than 20 years of
found at perpetuityresearch.com/
law enforcement experience
wp-content/uploads/2014/09/
that includes crisis
Aspiring-to-Excellence.pdf)
management and response,
The OSPAs are being set-up
general policing, witness
in collaboration with security
protection, close personal
associations and groups across
protection, crime management,
many countries.
change management and counterterrorism intelligence. • Mr Sven Bluemmel,
By researching and standardising the award categories and criteria, the OSPAs scheme
the inaugural Victorian
provides an opportunity for
Information Commissioner.
countries to run their own
• Jason Brown, National Security
evidence-based OSPAs schemes
Director Thales and Chairman
while maintaining an ability to
of the Board at Security
compete on an international level
Professionals Australasia.
in the future – World OSPAs.
• Tony McGuirk CBE, QFSM, MSc,
Visit au.theospas.com for
FIFireE, FIIRSM, Director (Hazmat
more information or to make
and Specialised Support) at
a nomination.
NSW Environment Protection Authority (EPA). • Brett Dobbie, Protective Security at NSW Government. …to name just a few. Visit psgconference.com or
Australian Warrior Expo 2018 15–17 November 2018 Brisbane Showgrounds, Brisbane The Australian Warrior Expo
email info@psgconference.com for
(AWE) is Australia’s premier law
more information.
enforcement, military, emergency services and security expo and
The 2018 Australian OSPAs
is the only event of its type in
18 October 2018
showcasing the latest products,
Doltone House,
technology, equipment and
Hyde Park, Sydney
services to this niche market. The
The Outstanding Security
Australian Warrior Expo is not like
Performance Awards (OSPAs) are
any other trade show! With a huge
pleased to announce the dates
focus on hospitality, it includes a
Moresby, PNG, in March 2019 for
• intelligent traffic solutions
for the 2018 Australian awards.
VIP Night and an AWE party, plus
the first Oceania premier security
• asset management systems
They will be working for the fourth
a full retail store. AWE will bring
industry event, with a security
• drone capability
year in a row with the prestigious
both professionals and agencies
conference and exhibition, real-
• software cyber management
Australian Security Industry
together, including government
world challenges presented and a
Association Limited (ASIAL).
procurement managers, decision
glimpse into the future of global
• innovative video intercoms
makers and operators.
security integration and trends.
• large enterprise systems
The OSPAs recognise and reward companies and individuals across the security sector. They are
Australia. AWE is dedicated to
Visit australianwarriorexpo.com.au for more information.
designed to be both independent
The Congress will feature electronic security and safety solutions for aviation, banking,
solutions
• mechanical locking integration with electronic security solutions
and inclusive, providing an
SecTec PNG Congress
infrastructure, industrial sites,
• emerging technologies.
opportunity for outstanding
4–6 March 2019
mines, commercial buildings,
Do not miss out! Schedule, budget,
performers, whether buyers or
Port Moresby, Papua New Guinea
residential towers, building and
plan to be there and stay informed.
suppliers, to be recognised and for
Now is the time to plan to attend a
development; the best of the best
Early bird registration is open until
their success to be celebrated.
world-class security and technology
in world class offering:
12am 1st August 2018.
conference and exhibition – SecTec
• intelligent CCTV, access control
The criteria for these awards are based on extensive research on key factors that contribute to and characterise outstanding
securitysolutionsmagazine.com
PNG Congress. Security industry specialists and professionals will converge on Port
and alarms systems • advanced video surveillance solutions
Visit www.sectecpng.com/ register.html to register your interest or email info@sectecpng.com for more information. n
SECURITY SOLUTIONS // 23
FEAUSRE
STANDARDS INCREASING SECURITY Standards Australia has been contributing to Australian life for nearly 100 years. The growing emphasis on a secure society is placing more and more of the organisation’s projects into the security sector. With this comes a focus on areas of traditional security standards, as well as the need to be innovative in responding to the needs of the sector, including developing standards at an international level.
24 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Standards in the Sector
incidents, it is plain to see the
A number of projects in the
aspects of crowd management.
security sector are at different stages of development.
industry need for guidance in all Standards Australia is working with industry stakeholders to develop a handbook, SA HB
1. Building increased security
183 Crowd Management for
The physical security of buildings
Crowded Places. The handbook
has been the focus of a recent
intends to replace the common
proposal approved by Standards
industry practice of using
Australia, which will result
guidance not designed for the
in a handbook to guide those
Australian context, including
responsible for managing the
from Europe and particularly the
security of a physical premises.
United Kingdom, and give those
The handbook, Physical
responsible for managing crowds
Protective Security Treatment for
a one-stop document to help plan
Buildings Handbook, is intended
and respond to concerns relating
to collate resources and directions
to crowds.
of existing guidance. Ideally, the
The handbook aims to
handbook will provide advice to
work with industry to address
facility managers to proactively
the key issues of crowd
minimise the risk of security
management, being:
incidents and not just react to
• arrival
threats as they arise.
• ingress
Examples of physical security threats considered in this
• circulation • egress and dispersal.
handbook include vehicle attack, bombings and armed attack,
The proposal identified a lack
among many others. Given the
of planning and implementation
nature of these incidents, it is
before events as a key factor in
vital for those responsible for
injuries and fatalities at previous
security and design to be proactive
incidents. This risk was made
in keeping a facility and its
even more prominent in terms of
occupants safe.
risk assessment and emergency
The handbook will serve
management procedures, which
as an expert guide for security
will feature in the handbook being
professionals to use in assessing
developed. Some of the focal
and determining risk mitigation
areas are:
activities. While impossible to
• definitions and terminology
completely eradicate risk, all
• purpose of a crowd
available guidance being in one place is a step towards the security industry being provided a clear
management plan • risk assessment and identification
direction on as many challenges
• roles and responsibilities
as possible, backed by experts.
• crowd demographics and
2. Scaled up security
• site design
All of the complexities of security
• communication and
behaviour
are intensified when it comes to
• accessibility
events are taking place in Australia
• emergency and
and, with recent deaths and major
securitysolutionsmagazine.com
information
managing a crowd. More large-scale
incident management.
SECURITY SOLUTIONS // 25
FEAUSRE
The document will be
a secretariat responsibility of
Committee. The document is to
adjacent to the security sector,
structured in a way that gives
a Technical Committee for the
be presented at the next meeting
but one which will directly
the end-user clear guidance
International Organisation
in Norway at the end of 2018 and
impact a large number of
and practical steps to increase
for Standardisation (ISO), TC
will be used to assist in defining
security professionals across
security when dealing
292 Security and Resilience,
and contextualising these terms
the industry.
with crowds. Industry and
Standards Australia played host
in all ISO TC 292 documents.
government representatives
to the international gathering of
This group will also coordinate
screening was the centrepiece
have already come together to
this committee earlier this year.
with the United Nations’
of a forum recently held in
Cooperation Group to refine
Melbourne. With a change in
urban resilience.
the nature of work in Australia,
form a committee and work with
Sydney hosted 130 experts
The issue of employment
Standards Australia to push this
from more than 20 countries
handbook towards publication.
for meaningful dialogue on the
As is common practice for
international effort towards
can often appear to be long
standards in this space to
Standards Australia, before it is
security standards. This was
conversations with little gains, it
change with it. One of the early
published there will be a period
a particularly timely meeting
is a huge achievement to be able
identified areas of change is
of public comment to ensure the
for Australia with government
to have so many international
the shift from a methodology
entire security industry, and
and the private sector currently
experts in Australia developing
approach to one based on
the broader community, has a
working towards enhanced
guidance around best practice
principles. The need to ensure
chance to influence what this
security and resilience across a
for the security industry.
participants in an organisation’s
handbook will look like in its
number of common areas.
With interest already shown
entire workforce, not just those
by a number of government
deemed as ‘employed’, was also
conversations took place,
agencies and some of the
an important discussion in
Cybersecurity
with some of the topics
largest security firms in the
moving the standard forward
Organisations of every size
discussed being:
world, this meeting has a lot to
– taking account of Australia’s
and across every industry are
• continuity and organisational
deliver, but with some of the
changing workplaces.
final format.
placing a growing emphasis on cybersecurity. A number of international projects have
A wide range of
resilience • protective securities architecture and framework
been undertaken to respond to
• interoperability
this growing threat, resulting
• emergency management
in the development of a series
While international work
leading international experts
there is a clear need for the
The increasing role of data
involved there is little doubt it is
security and privacy was also
all achievable.
discussed as needing an update. This work is in very early stages, but it has drawn the attention
• community resilience
Not your Traditional Security Standard
of International Standards,
• security terminology
Despite working nationally
from government and the
ISO 27000.
• fraud risk
and internationally to develop
private sector – all of whom
standards for traditional areas
are eager for the standard to be
of security, there is also a
progressed quickly.
The ISO 27000 series provides
and countermeasures.
best practice recommendations on information security
Once the meetings came to
management within the context
an end, the delegates returned
of an overall information
home to discuss what is next
security management system.
for their respective countries.
Standards Australia has been
For Australia, forums are
working at an international level
planned to bring industry
to encourage more countries to
together and discuss what is of
adopt the use of this standard,
highest importance to Australia;
meaning the global digital
however, there was also one
economy will be better protected
particular piece of international
against the risk of cyberattacks.
work allocated to some of the Australian delegates.
An International Perspective on Security Standards
meeting was to develop a project
Standards Australia has
to study the terms “security” and
long been involved in the
“resilience”. Two Australians
development of international
will lead this work, following
standards, with security
on from their initial research
standards being a field of
and presentation of a draft
heightened activity of late. With
whitepaper to the Technical
26 // SECURITY SOLUTIONS
One of the resolutions of the team based on Australian work
of a number of key stakeholders
project being pursued in a field
Standards Evolve
While international work can often appear to be long conversations with little gains, it is a huge achievement to be able to have so many international experts in Australia developing guidance around best practice for the security industry.
Having been around for over 96 years, Standards Australia has seen changes in every sector and the standards being published have changed as a result. The security industry is one of many arenas in which technology is drastically shaping its future, and Standards Australia remains committed to addressing the traditional areas of security practices, as well as the new and exciting areas open to the industry. n Visit www.standards.org. au for more information on any of the standards mentioned in this article.
securitysolutionsmagazine.com
ALARMT
VOICE-OPERATED ALARM SYSTEMS
EXPECTED TO GROW AT A 7 PERCENT CAGR THROUGH 2022 BY ANNA SLIWON
28 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
The Intruder Alarms and
comfortable using voice features,
to disarm the system, and the
Monitoring Services Database
residential professionally
the share of alarm systems relying
voice assistant then asks for
2018 study provides a
monitored intruder alarm
on more traditional methods
a security password or a PIN
comprehensive assessment of the
systems had additional
will decline.
code. The password feature was
intruder alarm and monitoring
connectivity and functionality
market, including a discussion of
beyond primary alarm
Smart Revolution
outside users’ homes could not
significant trends over the next
signalling, which will grow at a
Using voice commands to operate
instruct the systems to disarm.
five years. The report provides
CAGR of 17 percent to reach 35
intruder alarm systems makes the
This process could be improved
detailed estimates of market
percent by 2022.
process easier and quicker, as it
with the use of advanced
eliminates the need to physically
voice-recognition technologies,
• In 2017, 21 percent of
revenue and shipments from
added so strangers standing
2016, with a base year of 2017,
Our Analysis
interact with the alarm itself.
which would eliminate the need
and forecasts through 2022.
Home assistants developed by
With voice commands, there is
for dedicated passwords. The
It also estimates the market
Amazon, Google and others are
no need to locate a key fob or
system would instead use voice
share of major suppliers in each
changing how consumers interact
type a personal identification
biometrics to verify the user’s
product category.
with connected home devices,
number (PIN) code into a keypad.
identity, which could be done
including intruder alarms. More
Voice features can also be useful
automatically, thereby simplifying
Highlights
alarm systems now offer a voice-
when a keypad or a smartphone
the process.
• Globally, 92 percent of intruder
command option, allowing users
malfunctions, or if the key fob is
alarm systems sold in 2017
to use Alexa and other smart
misplaced. Likewise, arming the
currently occurs while users
were operated by either
assistants to arm and disarm their
system for the night can be done
are physically in their homes,
keypad or key fob; however,
alarm systems.
from a user’s bedroom, without
in-car entertainment systems of
the need to physically engage with
the future could also be used to
the security system.
disarm home security systems
this category is expected fall to 81 percent by 2022. • The share of voice-operated
Internet of Things (IoT) technologies have profoundly influenced the way consumers
Although voice interaction
on the road or while pulling into
alarm systems is expected
select home security systems,
Voice is here to Stay
to increase at a compound
leading to increased connectivity
Currently available voice features
annual growth rate (CAGR) of
and integration with voice
in intruder alarms offer a basic
Not an Easy Path
7 percent from 2017 through
assistants and other smart
level of interaction. The user
A number of challenges preclude
to 2022.
devices. As consumers get more
speaks a predetermined command
voice features from becoming
securitysolutionsmagazine.com
the driveway.
SECURITY SOLUTIONS // 29
ALARMT
a more popular method of
manufacturers integrate voice
can simplify interactions with
operating intruder alarms.
functionality of home assistants
assistants into their offerings,
the intruder alarm systems. One
For example, the need to
requires users to directly address
adding a smart device to an
way to overcome this hurdle is
use PIN codes prolongs the
their smart home assistants. On
intruder-alarm package may
to bundle products with smart
process. Some non-tech-savvy
a more advanced level, users
create an additional incentive to
devices, offering all the necessary
users might also struggle
would not have to directly
purchasing an alarm system.
configuration support needed to
to communicate with voice
address the voice assistant or
assistants, as they require the
the control panel to disarm the
manufacturers could attempt to
use of specific commands for
system; instead, once the assistant
acquire companies that specialise
the devices to listen. Another
recognised the voices in the
in voice recognition software
downside is their reliance on
household, it could automatically
– or partner with providers
IHS Markit. She has a background
home Wi-Fi connections to
disarm the system. However, this
of these products – to speed
in security and defence studies
connect and process commands.
type of functionality could lead to
the introduction of advanced
and has previously worked
If the home network goes down,
even more privacy concerns, as
voice features.
in a variety of research and
the assistant stops working.
smart devices actively listen for
Should voice recognition
Currently, the voice
house members’ activity.
become available in home alarm
On the other hand,
However, many current
facilitate a smooth transition to connected systems. n Anna Sliwon is an analyst for
analytical roles across security
users of intruder alarm systems
and weapons of mass destruction
are still reluctant to test the
(WMD) non-proliferation fields.
systems, additional privacy
Added Value
benefits of voice interaction
Anna has an MA in Intelligence
concerns will arise, including
Enhanced connectivity and
or connect smart devices
and International Security from
where the voice samples are
functionality have become
to intruder alarm systems.
Kings College London and a
stored – either in the cloud or
important differentiating
Installers will need to focus on
BA in International Relations
on local servers operated by
factors for intruder alarm
changing these perceptions by
and Security Studies from the
alarm companies.
systems. As more intruder alarm
explaining how smart devices
University of Bradford.
30 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
| ACT
Â?
 �  �
With the new Protective Security Policy Framework taking effect in the second half of 2018, there is an urgent requirement to build knowledge and share information. The PSG Conference provides an opportunityfor everyoneinvolved in government security to network, update knowledge and skills, gain exposure to new trends and technology, as well as hear directly from representatives of the PSPF review team about the reforms and what they mean.
� � (   €
+ )
e: info@psgconference.com w: www.psgconference.com
‚ � � (   €
+ + Â Â? )
Â?
Â? Â? ( )
Brought to you by
OPERATIONS
REALITY TRAINING PROCESS What Goes In To Training Comes Out In Operations
BY RICHARD KAY
To see the positive effects of realitybased training at operational level, it is important to understand the underlying psychology of human behaviour. The methodology used in a progressive training program should function at both the physical skill level as well as at the cognitive and pre-cognitive level. Instructors should understand the psychology of encounters and be able to dissect participant actions to effect any necessary changes through remedial training. The scenarios should be simple: advanced training is just the basics done smoother and faster. The goal of a scenario is to expose operational weaknesses, and strict scenario development protocols should be in place to effectively accomplish this goal. Instructors should have the skills
32 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
to help participants transcend
most likely to cause future
judgment in training without
process by integrating previously
inappropriate responses; they
trouble and get input from
correction may be unintentional
processed information with
should understand that these
different personnel.
by instructors, and the problems
experientially integrated
probably would have been
information. The five levels of
erratic behaviours may occur and
• Unrealistic surprises: boredom
why they occur. By changing the
can affect role players and cause
corrected had they been observed.
integration in the brain and body
underlying training philosophy and
counterproductive behaviour.
The way that scenarios are often
for processing information are
restructuring training, unsuitable
If participants are doing well,
run does not allow for this level
data, information, knowledge,
responses can be clearly observed
do not mess with them. Add
of observation because there is
understanding and conditioning.
during the scenario, thus changing
intensity in future scenarios,
often so much activity occurring
Data is analogous to a person
training from experimental
but do not allow role players
during a scenario that instructors
doing an internet keyword search.
to experiential.
to make things up. Impromptu
look more at the big picture rather
Then he sifts through data for
surprises are not useful in
than analysing specific behaviours.
information, which is specific
effective reality-based scenarios
building situational awareness,
Controlling all aspects of a scenario,
and relevant to his needs. He can
are: define reality, enforce safety,
but they can undermine the
from design and predictable
then choose specific information
train to policy, train for reality,
training program.
role player behaviours, frees
for knowledge, but it does not
instructors to focus attention on
provide practical experience.
participant behaviours.
Understanding requires hands-
The six principles for designing
include stress, and train to prevail. Having several different endings
Define Reality
for a scenario allows it to branch to
It is unnecessary to invent
different conclusions depending on
Train to Policy
competence, which is unlikely
situations when developing
participant responses. It provides
Instructors often unintentionally
in a confrontation as forebrain
scenarios. Statistically, it is in the
role players with variety to break
violate policies in the interest of
functioning is substantially
routine situations where issues
up the monotony of doing the same
scenario flow. Participants should
curtailed during survival stress.
occur or poor decisions are made.
thing over again, and challenges
be commended for demonstrating
Conditioning involves repetitions
Use situations that officers are
participants at their own level.
good judgment, even if it breaks
of a desired action to create
going to deal with. If there are not
There is also the possibility that
the continuity of the scenario,
unconscious competence for proper
many problems internally, look to
they might discuss scenarios with
as the objective is not only to
performance under stress. There
industry trends and statistics.
others, so alternate endings limits
integrate knowledge and skills into
must be a clear neural pathway
Do not waste training time
the ability of participants to come
functional operational strategies,
predicated upon experience to
for something unlikely to occur
in forewarned to various threat
but to get participants thinking. If
achieve a desired action. Without
in operational reality. Avoid
cues and makes each participant
participants do something right,
substantial repetitions or an
the following situations when
determine the correct action.
give them praise not criticism.
emotionally significant experience
writing scenarios:
Enforce Safety
• Catastrophic events: sometimes
Writing scenarios so responses
participants understand and
stimulating situation, performance
all possible tactical challenges
and outcomes are known allows
function within policy, scenarios
of the optimal response is unlikely
are combined into a single
instructors to focus on participant
can clarify policies in situations
to occur.
scenario, but this overwhelms
behaviours, especially various
that are unclear, controversial, or
participants. Observe
mechanical and tactical errors that
conflict with operational safety
to cause failure, it programs
participant deficiencies in
many participants demonstrate
principles. If a policy requires
an aversion response to real-
simple scenarios and fix them
during scenarios. Instructors should
revision, write a scenario around
world situations similar to those
progressively by connecting
bring them to the participants’
it, put some people through it,
experienced in the scenario.
proper decision making
attention during training. If unsafe
catalogue the results and present
with effective action in a
training practices are allowed in
them to administration, asking for
Train for Reality
stressful setting to create a
training, there is a possibility that
clarification on the policy governing
In reality-based training, the
neural pathway to successful
in a real confrontation that issue
such an occurrence. Engaging
abstract aspects of a training
future responses in similar
may lead to a safety infraction.
in discussions about different
situation are more important than
real-life circumstances. This
It is not just firearms handling;
situations, tactics and strategies
the concrete aspects, although
is accomplished with drills
improper use of radios, batons,
begins the process of conditioning
both are important. The question
that build in speed and
tasers, chemical agents, or even
a potential response for a future
is whether a participant is actually
complexity once mastered at the
verbalisation can cause issues if not
event. People function better in
going to make a decision to use a
lower levels.
corrected in training.
situations that they have experience
force response and if that decision
with, even if it is simply having
is the correct decision for that
thought through an issue.
situation. Technical proficiency is
on experience for conscious
In addition to assuring
• Single source experiences: one
If legal process follows an
person writing all scenarios
incident, the training participants
presents a myopic view of
received will invariably be
problems. Define the problems
scrutinised. A participant using
intellectually and experientially
an agency is facing and those
questionable techniques or poor
helps future decision-making
securitysolutionsmagazine.com
Cataloguing decisions
tying the desired response to the
When training is designed
second to that. It is common in scenarios to observe bad habits formed during
SECURITY SOLUTIONS // 33
OPERATIONS
conventional training which are
to determine if a stream, cone or
be used as the current can jump up
for conditioning proper participant
detrimental in real-life encounters.
fog pattern hits role players in an
to two inches.
responses. A realistic setting should
Proper habits should be developed
effective manner if participants
so that equipment management
are taking environmental factors
has a positive effect, as making
and available training locations are
skills can be tested under stress.
into consideration. Make sure
participants communicate through
often passed over for use because
Using the actual operational gear
participants know they are to react
the radio makes them manage a
agencies believe they have to find
permits instructors to observe
to everything happening during a
piece of essential equipment just
a site to fit their training devices,
deficiencies a participant might
scenario as if it were real. If their
like reality. After the scenario
instead of the other way around.
have in working with personal
chemical agent is inoperative
begins, direct all communication
With the various training aids
equipment. Functional training
or ineffective, they must do
with the participant through
available, instructors should be
versions of personal equipment
something else.
the radio, with the exception of
able to utilise actual structures
administrative discussions. If they
and environments to provide
demonstrate how well a participant
Impact weapons: there are
Radios: using operative radios
be easy to find since many excellent
will employ them on the street.
training versions for expandable,
do not communicate clearly, do not
participants with appropriate
Participants who perform well
straight and side handle batons. If
respond or request clarification.
realism. The training philosophy
under normal training conditions
a baton is a reasonable response
Some training facilities use a
hierarchy is performance
often struggle to perform relatively
during the scenario, role players
dispatcher, which creates radio
objectives, setting, training devices
simple actions under simulated
can be safeguarded against the
traffic, so each participant has to
– start with the training objective,
stress, such as drawing a weapon
‘force relation to target’ principle.
pay attention to the calls that are
find an appropriate setting and
or switching between force
Some protective suits are designed
directed specifically to them just as
then choose the training devices
options. During scenarios, watch
to withstand the impact from
they would on the job.
friendly to that environment. Not all
participants and observe their
actual baton strikes, but this is not
thought processes at certain
recommended as there are areas of
are various items and devices
will permit marking cartridges,
critical points. Failing to ask about
the body still unprotected.
that may be present during actual
but not all training scenarios
situations. It is not necessary to use
necessitate the use of these. Choose
curious or questionable behaviours
Handcuffs: there are training
Miscellaneous items: there
structures or training environments
loses much of the value of using
versions of handcuffs modified
an actual distraction device; beyond
devices to fit the setting, not the
functional training props to
with a release feature that permits
the physical danger, a role player
other way around.
highlight deficiencies.
them to be opened without the need
dealing with the effects of an actual
for a key. Searching for a handcuff
distraction device is less effective.
role player actions often result from
training versions of equipment is a
key and bending a role player
Role players can be scripted to do
instructor boredom, inadequate
valuable source of information for
into position to unlock handcuffs
anything, including how to respond
preparation, lack of training or
trainers since they can observe all
can be inconvenient and often
once a tool is employed.
experience of instructors, but they
kinds of inappropriate behaviours
unnecessarily painful.
Using realistic props and
from participants. The more
Role player props: using
Silly scenarios and clownish
dilute the scenario and indicate
Tasers: there are training
realistic props for role players is
to participants that training is not
realistic the situation and the more
cartridges that do not conduct
essential. A real driver’s licence
serious. If the scenario retains its
authentic the props, the higher the
electricity for use with actual units.
with the role player name and
realism and professionalism, the
quality of the learning experience.
However, the probes are still the
photo permits them to produce
participant can focus on solving
Participants should be issued with
same as operational cartridges, so
actual documents, helping
the training problem and develop
all response options, regardless of
proper protective equipment and
participants focus on the situation
operational confidence.
the level of force required during
role player training is important.
and stay in scenario. Investigate
a scenario. There are numerous
Firing actual darts at role players in
local thrift stores for role player
Include Stress
training versions of duty equipment
a suit provides the best realism, but
clothing and props. Casualty
Under stress, a person’s ‘animal’
available, as follows.
some agencies cannot afford this
simulation is difficult, given the
brain resorts to primitive instinct.
quality of training all the time, so an
level of protective equipment role
Actions learnt during stress are
should be the actual duty firearm
alternative is to take the cartridge
players wear, but dummies that are
difficult to displace, but there are
which has been modified
off the firing device. When a
bloodied up make excellent training
positive effects conditioned through
using a conversion device, or a
participant points the taser and the
props for simulated trauma victims.
effective use of stress in training,
dedicated training version of the
red dot appears in an area of an
Applying make-up to role players
since the brain chemistry present in
identical weapon.
effective hit, they pull the trigger
under a mask is not effective and
stress is similar to that experienced
Chemical agent: a training
and the taser sound activates.
using full-face shields so that the
during an emotionally significant
version of operational spray should
There should be a line written
face is visible is dangerous inside
event. To understand the power
be used to simulate a chemical
into the scenario as to whether
a training environment where
of this, think of phobias. People
agent, with the same actuator
the taser ‘works/does not work’,
non-lethal training ammunition is
are born with three innate fears
and nozzle type so handling and
and role player scripting should
in use.
– sudden motion, loud or abrupt
spray pattern effectiveness can be
occur whether darts are fired or
evaluated. This allows instructors
simulated. Contact stuns should not
Firearm: a training firearm
34 // SECURITY SOLUTIONS
Environment: the more realistic the setting, the better it is
noises and sudden approach; everything else is learned. Phobias
securitysolutionsmagazine.com
result from powerful learning
and connecting the decisions
experiences and can affect a person
to specific actions; effective
training integrates skills with
prevailed through superior tactics
for life.
responses under stress must
emotional/cognitive aspects of
or perseverance. Allowing role
emanate from a programmed
an encounter.
players to give up when participants
It is possible to condition
• be comprehensive so
emerge from a scenario having
survival skills and responses as
dominant response. To best assist
Reality-based training allows
have not prevailed conditions
deeply as some phobic responses.
participants to identify and respond
instructors to observe participants
dangerous behaviour. Participants
Repetition in training takes time to
to certain threats, role players
using judgment to make decisions
might get beaten/stabbed/shot
create a pathway that eventually
should initially present threats
and take actions based on
during the scenario, but this is
becomes the route of choice for
slower than in real-life situations,
experience. The desired outcome
appropriate if it is written into the
actions. It takes a significant event
which permits participants to
is to provide the participant with
scenario. When these events occur,
to change that path. An emotionally
program dominant responses.
experience on which to draw
the scenario does not end until the
significant event in the psyche
Responding successfully to a
in future encounters. Through
participant does something that
is an instant, clear and obvious
simulated experience where they
experiential training, instructors
contributes to their survival, after
deeper pathway carved into the
are challenged at a stressful but not
are able to ascertain the areas
which it continues until it reaches
psyche. The brain creates neural
catastrophic level means they own
where participants need additional
a natural conclusion. The negative
connections between the forebrain
that experience in the future, and
practice and experience. The brain
response of participants giving up
(cognitive thought) and midbrain
the speed and efficiency of future
does not differentiate between good
should always be replaced with a
(autonomic functioning) so that,
actions will improve since skills
and bad performance – it merely
positive survival response.
given a certain stimulus, there is
are being moved from conscious to
catalogues actions in response to
a direct and pervasive connection
unconscious competence.
stimuli. Poor performance must be
means not letting a scenario
Teaching participants to succeed
to action. This is perhaps the most
Build a foundation slowly
corrected experientially. Immediate
conclude until they prevail. The
convincing argument for making
and improve by building speed.
remediation is essential to program
objective of reality-based training
participants prevail during a
Without basic conditioned skills,
an optimum response, correcting
is to develop a participant’s
stressful training experience. The
increasing speed only leads to
behaviours before the negative
ability to respond to critical and
pathway can either lead to success
failure. Once a skill is mastered,
experience gels in the subconscious.
life-threatening encounters by
or failure; it places a fork in a
there must be maintenance training
participant survival psychology, and
to maintain proficiency, and there
stress inoculation for participants.
there is a powerful obligation for
should be skill development by
Knowing what the physiological
instructors to send the participant
placing stressors on it to improve.
effects are in advance of a
reality is highly rewarding.
down the correct path.
That is where advanced training
stressful encounter and having the
In scenarios where both the
has its place and how participants
awareness to recognise the physical
knowledge and tactical abilities
without sacrificing safety creates a
progress from the simple to the
manifestations of stress when
of participants are tested in
powerful learning agent and also
complex. Long-term retention
they occur provides participants
context, it is important to create a
functions as stress inoculation.
of learned skills is due to the
with critical information. But
sufficiently stressful situation to
Once participants have a sense of
progressive nature, as well as the
simply knowing about those
provide them with the experience
using strengths to deal with fears,
intensity levels of training. It is
effects is not enough; they should
of physiological and emotional
they can recall it for assistance in
impossible to progress without
be experienced.
arousal and ensure they have the
new territory. Training that does
dedicated practice periods. The
not instill confidence is wasted and
learning occurs between the peaks,
Train to Prevail
effects of stress. It is then essential
can create an aversion to respond
so participants must learn to keep
Making it difficult or impossible
they emerge from that encounter as
appropriately to critical incidents.
practising rather than give in to
for participants to successfully
winners. It is through this process
frustration and quit.
complete a scenario is a result
that participants are programmed
of untrained role players, badly
with solid survival skills available to
Making training realistic
Start with simple scenarios that test one or two simple
For competency-based training
Reality-based training provides
basing future responses on past successful experiences. Preparing participants for
strategies to overcome the negative
choices prior to moving into more
to be successful, it must:
designed scenarios, lack of training
them during decisive moments in
complex issues. This process helps
• start with basic skills until
preparation from instructors, or
real-life situations. n
participants understand and condition simple, tactically correct responses to stimuli presented by
proper form is developed • be progressive so skills
unclear training objectives. The tendency of instructors to stop a
Richard Kay is an
perfected are combined into
scenario immediately after force
internationally certified tactical
complex combinations
is used deprives participants of
instructor-trainer, Director
clear and simple choices, their
• be realistic so state-dependent
positive training experiences and
and Senior Trainer of Modern
decision loop speeds up (Hick’s
learning is transferred into
giving participants the experience
Combatives, a provider of
Law), confidence levels are higher
similar real-world situations
of death during a simulation
operational safety training for the
exercise is not an effective way to
public safety sector. Visit
teach operational survival.
wwww.moderncombatives.com.au
a subject. When participants have
and success is more predictable. Competency training requires building a simple decision tree
securitysolutionsmagazine.com
• be relevant so training is focused on events likely to occur within job parameters
Participants should always
for more information.
SECURITY SOLUTIONS // 35
BUSINESS
Terrorist Attacks On Public Mass Gatherings: The Threat To Australian Beaches BY PAUL JOHNSTONE AND RICK PACKER
36 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Crowded places such as stadiums,
attacks to occur. The Australian
shopping centres, pedestrian malls
Federal Police has reported that,
vulnerable and a weakness can
believers), smashing their bodies
and major events will continue to
since the 12th of September 2014,
be exploited by a terrorist group
with the vehicle’s strong outer
be attractive targets for terrorists.
when the national terrorism
and/or lone wolf adversary to gain
frame while advancing forward –
The current National Terrorism
threat level was raised, police
access and damage our freedoms
crushing their heads, torsos and
Threat Level in Australia is
have charged 85 people as a result
and way of life. They can disrupt
limbs under the vehicle’s wheels
PROBABLE (as outlined on
of 36 counterterrorism-related
a critical function because, when
and chassis – and leaving behind a
www.nationalsecurity.gov.
operations around Australia. Only
there is a weakness in identifying
trail of carnage”.
au). This reflects the advice
as recently as July 2017, police and
potential threats and a failure to
of the Australian Security
intelligence officials disrupted a
act of adequate security practices,
beachside areas are large open
Intelligence Organisation (ASIO)
plot to conduct a terrorist attack
then the likelihood of a successful
areas, frequently packed with
that individuals and groups
using an improvised explosive
attack is increased.
large numbers of people and
continue to possess the intent and
device (IED) against the aviation
capability to conduct a terrorist
sector, and a plot to develop an
even in this fast-paced modern
perfect targets for an attack
attack in Australia. The elevated
improvised chemical dispersion
world, very casual and laidback.
and the terror, pandemonium
terrorist threat is likely to persist
device for use in a terrorist attack
Enriched in Australian culture
and collateral damage to
for the foreseeable future and it
on Australian soil.
is summer time spent playing
infrastructure and loss of human
sports and enjoying barbecues
life would be huge. These areas
attacks, if successful, would
and parties at the many beautiful
would allow a terrorist group
have created mass casualties
beaches of the Australian
or lone wolf to cause as much
other cities around the world
and fear within our community.
coastline. We also have many
damage as possible in a very short
sounds familiar, it is because there
Although these attacks have been
local and overseas tourists that
timeframe prior to intervention
is a disturbing trend of terrorism
successfully thwarted by the
visit our beaches, beachside
by police. Unlike many other
that requires little organisation,
excellent work of our intelligence
markets and shopping precincts
countries in the world, Australian
manpower or technological know-
and policing agencies, Australia
and they are places where people
security guards at these types
how. Whatever the attacker’s
is no longer protected from
enjoy summer and life in general.
of locations are not armed with
identity, the method has become
terrorism by our distance from
They are in fact areas of public
firearms, so would be of little
commonplace. Terrorist groups
the rest of the world. The Internet
mass gatherings.
assistance in stopping the threat.
no longer must use sophisticated
and social media has challenged
methods or weaponry to cause
and changed this advantage,
for new targets to inflict their
visited several beaches and
widespread terror and fear within
coupled with the threat of foreign
terror attacks. ‘Soft targets’ are
beachside communities in the
society. The use of firearms,
fighters returning to Australia,
always in their sights, and places
Gold Coast and Sunshine Coast
bladed weapons, explosive
and we are no longer safer than
of mass gatherings are these
areas of Queensland. It has
devices and chemical/biological
any other country.
types of targets. World leaders
been observed and recorded
are growing increasingly worried
how a terrorist attack could be
is not confined to any one city or metropolitan area. If a vehicle terror attack in
agents are still the main methods
These planned terrorist
There is still a very complacent
As a nation we are still
Australian lifestyle is still,
Terrorists are always searching
large congregation of kuffar (non-
Australian beaches and
especially families. They are
Last summer, the authors
of these attacks; however, as
‘head in the sand’ attitude in
about vehicles being used as
perpetrated easily using motor
highlighted over the past several
Australian general society,
weapons of mass murder after a
vehicle/s and a combination of
years, vehicle terror attacks have
business and communities that
spate of similar attacks over the
motor vehicle/s and IEDs, vehicle-
been effectively used in Australia,
we are safe from terrorism and
past several years.
borne improvised explosive
Europe, England and the US.
that “it won’t happen to us”. Our
Terrorist groups have realised
intelligence and policing agencies
intelligence and policing agencies
improvised explosive devices
that a simple motor vehicle is
are fully aware of the threats and
that Islamic State’s magazine,
(PIEDs/suicide bombers).
now a new and very simple, very
are acting accordingly to combat
Rumiyah, has reported the virtues
accessible and very effective
and contain these threats/attacks.
of using large trucks in these sorts
to the beaches and beach
method to cause terror.
Attacks on crowded places
It is widely known throughout
devices (VBIEDs) and personal
It was noted that access
of attacks that would help result
areas (carparks, picnic areas,
overseas, including London Bridge
in a “bloodbath”. A three-page
playgrounds) is very open and
to these types of threats and,
and Borough Market in June 2017,
article in Rumiyah, headlined
not very restricted, with no
although fortunate thus far not
Manchester Arena in May 2017,
“Just Terror Tactics”, included
locked gates, bollards/barricades
to have a major terrorist attack
the Berlin Christmas market in
instructions on how to maximise
or control points. It can be
on our soil, terrorists have
December 2016 and the Bastille
casualties in a truck attack, the
appreciated and assumed that
plotted similar attacks here,
Day parade in Nice in July 2016,
best vehicles to use, the targets
these are not high security areas
including several ‘lone wolf’
demonstrate how basic weapons
and the way to prepare and plan
but, in the context of this article,
attacks inspired by ISIS to attack
– including vehicles, knives
such an attack. The disturbing and
they are high-risk areas for a
crowded places, and we should
and firearms – can be used by
explicit article calls for a vehicle
terrorist attack.
expect more plots and attempted
terrorists to devastating effect.
to be “plunged at high speed into a
Australia is not immune
securitysolutionsmagazine.com
It was also observed that at
SECURITY SOLUTIONS // 37
BUSINESS
many beachside markets there
to Breitscheidplatz in Berlin,
was very limited and, in some
leaving 12 people dead and 56
cases, no adequate security
along the length of the beach.
plans for incidents occurring
He could either then exit the
at their venues. These plans
others injured. The terrorist
vehicle and commence shooting
should include responses to
measures apart from very
was Anis Amri, a Tunisian
or stabbing people who may not
possible terrorist attacks against
limited traffic control. A highly
failed asylum seeker, who was
realise it is a terrorist attack and
their infrastructure, events and
motivated person/s inspired by a
identified as being a supporter
go to the aid of those injured.
facilities. They may need to be
terrorist group could easily breach
of Islamic State.
The attacker could then attempt
reviewed and upgraded to take
to exit at one of the many beach
further action to upgrade actual
basic traffic control and cause
• In March 2017, Khalid Masood,
maximum casualties in a very
a 52-year-old convert to
exits and drive away, or remain
physical elements of protection
short time, similar to the terrorist
Islam, drove a car at high
on the beach attacking people
for persons on their properties.
attack on Bastille Day in July
speed into pedestrians on
until confronted by responding
Plans should also include ongoing
2016 when Mohamed Lahouaiej-
London’s Westminster Bridge.
police officers.
education and training for
Bouhlel crashed a truck into a
He then exited the vehicle
Scenario 2:
their employees.
crowd in the Mediterranean resort
and commenced a frenzied
This scenario would involve
of Nice, killing 86 people. Islamic
knife attack on a policeman
either a lone wolf or small group
are fictitious, there is a possibility
State claimed responsibility for
guarding the parliament
attack where a small watercraft
that an attack of this nature or
the attack.
building. The British Prime
loaded with explosives is backed
similar could happen at a public
Minister, Theresa May,
onto the main flagged area of the
mass gathering here in Australia.
there has been an increase in
immediately ordered that
beach and detonated amongst the
To think otherwise is merely being
the number of terrorist attacks
bollards be erected around
crowd. To enable this to occur, the
complacent and we only need
against public mass gatherings,
Westminster to prevent this
watercraft and/or attacker/s could
to look at the latest in a string of
where vehicles have been used
sort of attack happening again
easily be disguised as members of
attacks where a vehicle was used
directly or in conjunction with
in the same area.
a surf livesaving organisation.
as a weapon to understand that,
Over the past several years
attackers exiting the vehicle
In the aftermath of the
and using firearms and edged
Whilst these three scenarios
Terrorist groups are well
as terrorist groups become more
Westminster attack, which killed
known to conduct surveillance
sophisticated with their attacks,
weapons to attack innocent
five people, Australian Foreign
and have dedicated planning prior
so too does the attraction of soft
persons. These attacks have only
Minister Julie Bishop said there
to an attack and there have been
targets such as beaches and
continued to compound fears.
was no guarantee that Australia
many examples where they have
beachside markets and festivals.
Several other examples include:
would not be subjected to a
been disguised as police officers,
• The attack in Sweden, where a
similar style vehicle-attack. She
security personnel, couriers and
Berlin, New York or London
truck was used to mow down
told The Australian newspaper,
so on. This method of attack could
thought it would happen there.
people in Stockholm, was just
“As we saw today in the United
be a controlled detonation or a
Australian society, organisations
the latest in a string of attacks
Kingdom these events can occur,
suicide attack.
and the public need to start
where a vehicle was used as
what we have to do is to take
a weapon.
every step including providing the
Scenario 3:
we approach the threat and risk
resources and legislative power to
This attack would involve a much
of terrorism in our country. It
December 2014, two men
our law enforcement agencies in
more organised structure. Either
is here amongst us and it will
crashed cars into groups of
Australia.”
scenario 1 or 2 would be used,
become more prevalent unless
along with a secondary attack
we educate ourselves, prepare
• On the 21st and 22nd of
pedestrians on successive
Although the above attacks
Nobody in Nice, Stockholm,
thinking and looking at the way
days in France. On the 21st, 11
in London, Berlin and Stockholm
off the beach area as the public
ourselves, work with our
people were injured in Dijon.
were not near a beach, we will put
run from the beach in panic and
intelligence and policing agencies
The following day, one person
forward the following scenarios
confusion to so-called safe areas
with even the simplest action of
was killed and nine others
of attacks that could happen here
where the use of further vehicles,
reporting something that does not
injured in Nantes. Witnesses
in Australia.
shooters or explosive devices
look right.
to both incidents reported
are used to cause further terror,
Education and awareness of
that both men – who have
Scenario 1:
confusion, damage and loss of
the threats and risks is the best
never been publicly identified
This scenario would involve a
lives. This form of attack would
defence that the community can
– screamed “Allahu Akbar”
lone wolf attack by vehicle (for
also be aimed at the arrival and
use to help fight terrorists and
as they raced toward their
example, a 4WD) where beach
setup of responding emergency
terrorism. If the community
targets, but authorities said
access is via the open roadway
services personnel attending to
continues to work together with
in both cases the men were
that exists around most beach
the scene/s.
our policing and intelligence
mentally ill.
surf clubhouses. The attacker
• In December 2016, a truck
Local councils and relevant
agencies, then collectively we can
enters onto the beach, crashes
organisations located at the
ensure the safety and security of
was deliberately driven into a
into the lifesaver station first then
beach will have emergency
the community and protect our
Berlin Christmas market next
proceeds to run down beachgoers
action and crisis management
way of life in Australia. n
38 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
SecTec
PNG
SECURITY CONFERENCE + EXHIBITION
4-6 MARCH 2019
PORT MORESBY
Electronic, Cyber & Physical Security Identifying Risk & Real World Technologies Join us where security industry specialists and professionals will converge on Port Moresby, PNG in March 2019 for the first Oceania premier security industry event with a Security Conference & Exhibition.
Register your Interest at www.sectecpng.com/register.html or email: info@sectecpng.com
Early Bird Registration: 1st Sept 2018 Principal Sponsor
Welcome Reception Sponsor Gold Corporate Sponsors
Media Partner
COVER STORY
TRANSFORMATIONAL ARTIFICIAL INTELLIGENCE FOR THE SECURITY INDUSTRY BY JOHN MCGIFFIN
Artificial Intelligence (AI) is
its ability to eliminate mundane
routine tasks will rely on AI to
transforming every industry
and boring tasks. Imagine you
do a job.
it touches, from healthcare, to
had the job of sifting through a
transportation to agriculture.
photo taken every 10 metres of
around the world will increase
break it down into its various
So, it should come as no surprise
every road in Australia and your
as AI can support doctors to
components. Tractica, a
that the security industry is
job was to recognise where street
recognise illness and disease
specialist research company in
starting to be transformed
signs were placed (or those that
which may have been previously
the AI area, have put together
through AI as well. In fact,
had gone missing), as well as
missed. X-Rays or MRI scans,
a list (as seen below) of the
security, automotive and
the type of road barriers and
for example, may be double-
main AI functions in order of
healthcare are in the top
any pot holes. You would soon
checked by an AI engine which
anticipated worldwide revenue
tier of industry verticals to
become rather bored. AI-enabled
understands what a good knee
size. I have added a column to
benefit from this amazing
computers do not get bored
should look like, thereby letting
indicate if this component will
technology. Security has some
and do not need to be supplied
doctors know if a patient’s is less
impact security – most are a
major influences driving the
with food and water (other than
than optimal.
‘yes’.
adoption of AI, including the
power), so they will happily
increasing threat of terrorism
process every photo, and at a
to demonstrate why AI is
How does AI Work?
and more sophisticated
much faster rate than humans.
transformational and beneficial,
This article will focus on the areas
security perpetrators.
The person previously assigned
think of the farmer who may
from the below table offering
to this task can then perform
have previously sprayed his
the biggest level of value to the
more stimulating activities.
entire crop with weed killer/
security industry, which are areas
insecticide to eliminate weeds
1 and 5. A subcomponent of AI,
If this technology scares you a bit, then read on – this article will help you understand AI
AI will take jobs, but only
The quality of life for people
To better understand AI and its possible applications in security, it is necessary to
If you need another example
in a bit more detail, why the
certain types of jobs, so it is
and bugs, which is costly and
which deals directly with image
impact for security will be so
more about an overall change of
adds unwanted chemicals to
recognition, is a technology called
profound and why it is your
the job mix. Gartner, a leading
food. Using AI, this same farmer
Deep Learning. From this point
friend rather than something to
analyst company, are predicting
can now find just the weeds
onwards, this term will be used
be concerned about.
that in the US alone, AI will
and bugs by using cameras
rather than AI as it is the most
create 2.3 million jobs in 2020
monitored by AI to deliver a dose
relevant of all AI capabilities for
into a wide range of different
while eliminating 1.8 million,
of weed/bug killer only to the
the security industry.
technologies. Unfortunately,
and that by 2022 one in five
target area, without impacting
while many software and
workers engaged in mostly non-
the entire crop.
AI is being incorporated
Why is Deep Learning so important? Think of facial,
hardware companies advise that their product utilises AI, they have simply added a few more ‘smarts’ to their software and claim it is AI ready to go. In light of this, the following will also help you identify true AI capabilities. A standout capability of AI is
40 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 41
COVER STORY
IMAGE 1
IMAGE 2
IMAGE 3
behaviour, gesture, licence plate
I so proudly used to distinguish
and weapon recognition as an
between the two types of fruit
example, which all use a form
in image 1 is no longer relevant
of image recognition from still
as I have no colours other than
images or video.
white, black and shades of
Deep Learning solutions
grey. To address this problem,
typically outperform traditional
I will need to add more logic to
recognition technologies, which
describe the fruit without the
is one of the main reasons why
use of colour. Where do I start?
and apple, this time I am going to
important for the following
the level of interest is so high.
Is the orange more round than
provide a Deep Learning training
reasons:
In fact, when trained properly,
the apple? Perhaps that can
computer with 50–100 pictures of
1. Mathematical models can be
Deep Learning has now reached
be my logic now, albeit not the
oranges in different orientations
utilised to calculate with a
the point where its capability to
best logic, particularly as some
and different lighting conditions.
high degree of precision how
recognise an object or person is
oranges are not perfectly round.
The Deep Learning engine
well an item appearing in
equivalent to or better than that
Image 3 brings additional
utilises something called a
an image or video matches
challenges as I have now added
neural network, with typically
the stored representation
a new piece of fruit, which has
five to six layers of intelligence,
The AI Knowledge Journey
of that image. In the case
both green and orange in it. My
with each layer responsible for
of the orange example in
existing fruit differentiation logic
recognising something about
image 6, the Deep Learning
In the image above (image 1),
is now almost worthless, and the
the image. The first layer might
engine obviously matched
there is obviously an orange
recognition process is becoming
be responsible for recognising
the orange on the left with
and an apple. If I was a software
more and more complex, which
squares, rectangles and triangles
a high level of accuracy.
developer and I had to develop
often leads to accuracy issues.
before passing onto the next
Because the orange on the
layer which performs another
right has a lot of mould, the
task and so on.
Deep Learning model still
of a human.
IMAGE 4
some software code to tell the
This time, I want to write
difference between these two
some logic to tell the difference
kinds of fruit, I could simply ask
between a dog and a mop, as per
the computer to work out the
image 4. You would think this
against a reference image, Deep
this time the confidence
colours of each fruit and say the
would be easy.
Learning builds a mathematical
level has dropped. In this
model of the item it has
case, additional reference
been trained on. As a result,
images of oranges with mould
it is essentially recognising
could be added and the Deep
job is done. However, in image 2, it is exactly the same fruit but this
But what happens if my dog looks like image 5? All of these issues, plus
Rather than comparing
believes it is an orange, but
time the colour on my camera
many others, are addressed by
something by utilising the
Learning system would then
was not working and so the
Deep Learning. Rather than
mathematical representation
improve on its capability
two different types of fruit are
writing computer code to tell the
of that item. The fact that it is
to recognise oranges even
now black and white. The logic
difference between the orange
a mathematical model is very
with mould. This confidence-
42 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
IMAGE 6
IMAGE 5
based approach enables
each layer being responsible for
organisations to only trigger
recognising a specific aspect of
alerts when a high level of
the image. There are various
confidence exists, thereby
neural network models, with
reducing false positive
some simply passing the image
event alerts.
mathematical from one layer to
2. Rather than utilising the
another and others involving a
Central Processing Unit (CPU)
looping process between some
of a computer to calculate
layers to enhance accuracy.
if something is an orange
To ensure your software
with 25 frames of video
provider is utilising Deep
relying on the security officer’s
the Deep Learning training
being sent to it, researchers
Learning, it is best to ask them if
ability to make the observation
engine, typically being 60–100
have found that a Graphical
their software requires at least
for himself.
images of each vehicle, so that
Processor Unit (GPU) with
one GPU to run and if they utilise
Further to this, because of
many hundreds of cores
neural networks. There are some
the large number of recognition
Ultima and many other vehicles
can process Deep Learning
solutions which utilise neural
technologies available, security
look like.
mathematics at a much
networks without GPU, which
can choose multiple ways to
higher rate than a CPU. The
are either not actually utilising
recognise a person or a vehicle
provided you with an easy
rise of powerful GPUs has
Deep Learning or will most likely
and the like, correlated together.
way to understand AI and
brought Deep Learning to
be slow.
As an example, with the rise
Deep Learning and why this
of people printing their own
technology is set to be so
it can learn what a Nissan
I hope this article has
life, as computers have not
In a previous article
had the processing power
published in this magazine,
vehicle licence plates as a copy
transformational to the security
in the past to process this
I wrote about the arrival
from another vehicle with a
industry. n
type of workload. GPUs are
of Security 4.0, which is
3D printer, organisations will
enhancing other areas of the
the next evolution of the
need to utilise more than one
security industry as they also
security industry. GPUs and
technology to determine the
Managing Director at Deep
enable Visual Management
Deep Learning have enabled
correct vehicle.
Recognition (previously
System (VMS) platforms to
the industry to evolve into
process a higher number of
this next phase of security,
the use of Deep Learning,
recognition company which
video streams than a CPU
particularly with the rise of
albeit this time for marketing,
covers technologies such
only system.
off-the-shelf Deep Learning
a Melbourne-based company
as Facial Recognition, LPR,
Lastly, the final concept to
solutions like Briefcam. Deep
called Deep Recognition utilised
Demographics Recognition,
understand: Deep Learning
Learning enables security to
Deep Learning to recognise the
People Counting, Gesture
actually emulates the way that
be event driven rather than
make and model of cars being
Recognition, Entity Relationship
the human brain recognises
observational, where the Deep
driven on the road. Rather than
Analysis and Deep Learning/AI-
something. It does this through
Learning engine trigger is
trying to describe the vehicle to
based recognition to recognise
the use of neural networks
informing a security operator
the computer system, they used
people, things and situations. He
which are a series of layers in
of an event he or she needs
a database of many different
can be contact at john.mcgiffin@
the mathematical model, with
to be aware of rather than
vehicles which are added into
deeprecognition.io
securitysolutionsmagazine.com
As a real-life example of
John McGiffin is the
Intelliscape), a specialist
SECURITY SOLUTIONS // 43
FEATURE
44 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
The Family that Slays Together
Mother’s Deadly Day: She Blew Up Herself and Her Two Girls to Murder Christians BY ANNE SPECKHARD AND ARDIAN SHAJKOVCI
The deadly attacks during Sunday services in Indonesia were the work of a whole family. They reportedly had returned from ISIS-land – a cautionary lesson as others seek to head home.
While Mother’s Day was
strap bombs on herself as
being celebrated in the United
well as on the bodies of her
already has claimed credit for
States, Canada and Australia,
two daughters, Fadila Sari, 12,
the attack, while Surabaya Police
a gruesome ‘celebration’
and Pamela Rizkita, nine, and
Chief Tito Karnavian confirmed
of another kind took place
take them to the Diponegoro
to the BBC that the family
in Indonesia: three nearly
Indonesian Christian Church to
belonged to an Indonesian
simultaneous suicide attacks
blow themselves and others up.
ISIS-inspired network, Jemaah
on three separate churches in
Ansharut Daulah (JAD). While
Surabaya, all carried out by
Yusuf, 18, and Alif, 16, rode
al Qaeda killed 202 people in
members of the same family.
motorcycles into Santa Maria
the Bali bombings in 2002, since
Catholic Church and detonated
then, ISIS attacks in Indonesia
at killing morning service goers
explosives they were carrying.
have been smaller scale and
rocked the Indonesian city,
Their father, Dita Sopriyanto,
foiled. Recent prison riots set off
killing at least 11 people and
drove his bomb-laden car into
with ISIS incitement may have
injuring another 40. People
the grounds of Surabaya Centre
spurred these attacks.
around the world asked how a
Pentecostal Church, where he
mother, Puji Kuswanti, could
self-detonated.
The wave of carnage aimed
securitysolutionsmagazine.com
Meanwhile, the family’s sons,
The so-called Islamic State
The family of six suicide attackers is thought to be among
SECURITY SOLUTIONS // 45
FEATURE
more than 500 Indonesian
should be allowed to return
ISIS sympathisers who have
home at all and, if so, whether
published in the Daily Beast on
regularly speaks and publishes
returned from Syria and
they might represent a danger
13 May 2018.
on the topics of the psycholog y
Iraq. If true, they must have
to society. Questions also linger
imbibed the ISIS Takfir ideology
over whether they need to be
Ph.D. is Director of the
and is the author of several
according to which all those
prosecuted – in the case of adult
International Center for the
books, including Talking
who do not adhere to ISIS’s
women – and if they can be
Study of Violent Extremism
to Terrorists, Bride of ISIS,
strict interpretations of Islam
successfully rehabilitated and
(ICSVE) and serves as an
Undercover Jihadi and ISIS
are enemies worthy to be killed,
reintegrated, in the case of both
adjunct associate professor
Defectors: Inside Stories of the
even if they are other Muslims.
women and children.
of psychiatry at Georgetown
Terrorist Caliphate. Follow
University School of Medicine.
Anne @AnneSpeckhard
The members of this family,
Given that ISIS routinely
This article was first
Anne Speckhard
how to rehabilitate them. She
of radicalisation and terrorism
or at least the parents, believed
separated boys as young as six
She has interviewed over
they were taking a short-cut
from their parents in camps
600 terrorists, their family
is the Director of Research
to paradise, faithful to the
where they were ideologically
members and supporters in
and a Senior Research Fellow
militant jihadi teaching that
indoctrinated and weapons
various parts of the world,
at the International Center
self-martyrdom and the killing
trained, it is not inconceivable
designed the psychological
for the Study of Violent
of the enemies of ISIS brings
that teenage male returnees
and Islamic challenge aspects
Extremism (ICSVE). He has
about the instant reward of
might pose a grave danger. ISIS
of the Detainee Rehabilitation
been collecting interviews with
bypassing the Judgment Day,
also routinely invited foreign
Program in Iraq to be applied
ISIS defectors and studying
forgiveness of all sins, 72 virgins
fighters’ wives to join the
to 20,000+ detainees and 800
their trajectories into and
for male martyrs and eternal
dreaded ISIS hisbah (morality
juveniles and has consulted
out of terrorism as well as
beauty for females. This also
police), in which they were
to NATO, OSCE, foreign
training key stakeholders in
includes the opportunity for
issued Kalashnikovs, were
governments and to the U.S.
law enforcement, intelligence,
the martyr to grant entry to
given great power over others
Senate and House, Departments
educators and other countering
paradise to another 70-plus
and took part in brutal abuse
of State, Defense, Justice,
violent extremism professionals
family members.
of other women for violating
Homeland Security, Health and
on the use of counter-narrative
ISIS-mandated dress codes and
Human Services, CIA, FBI, CNN,
messaging materials produced
other infringements.
BBC, NPR, Fox News, MSNBC,
by ICSVE both locally and
CTV and in Time, The New
internationally. He has also
Thus far, no Indonesian women or children have previously taken part in terror
Similarly, foreign women
Ardian Shajkovci Ph.D.
attacks – this one now opens
were invited to become ISIS’s
York Times, The Washington
been studying the use of
the door for such participation
online recruiters, writing blogs,
Post, London Times and many
children as violent actors by
and underlines the dangers
contacting others online and
other publications. In the
groups such as ISIS and how
of female and child returnees
seducing them into joining. And
past two years, she and ICSVE
to rehabilitate them. He has
from ISIS.
our interviews doing research
staff have been collecting
conducted fieldwork in Western
The issue of ISIS returnees
for the International Center for
interviews with ISIS defectors,
Europe, the Balkans, Central
remains a hotly debated topic.
the Study of Violent Extremism
returnees and prisoners,
Asia and the Middle East,
Many governments worldwide
make it clear that some women
studying their trajectories into
mostly recently in Jordan and
are openly expressing their
were also combat trained,
and out of terrorism, their
Iraq. Ardian has presented
concerns over a flood of
particularly as ISIS faced the
experiences inside ISIS, as well
at professional conferences
weapons-trained ideologically
US-led coalition’s onslaught,
as developing the Breaking the
and published on the topic of
militant men returning home
with women being trained
ISIS Brand Counter Narrative
radicalisation and terrorism.
since the territorial defeat of
to throw grenades, place and
Project materials from these
He holds a doctorate in Public
ISIS in Iraq and much of Syria.
detonate explosives, and fire
interviews. She has also been
Policy and Administration
While that deluge has not
rifles. Some were issued suicide
training key stakeholders
from Walden University,
materialised – most of the men
vests and were also sent to
in law enforcement,
with a focus on Homeland
have been killed, arrested, or
detonate themselves.
intelligence, educators and
Security Policy. He obtained
other countering violent
his M.A. degree in Public Policy
remain at large in the region –
Whether that was the case
the question of how to deal with
with Puji Kuswanti is still not
extremism professionals on
and Administration from
women and children returnees
clear and it is too early to say
the use of counter-narrative
Northwestern University and
has no clear answer.
whether her suicide and the
messaging materials produced
a B.A. degree in International
martyrdom of her children
by ICSVE, both locally and
Relations and Diplomacy from
problem of female returnees
will be the exception or the
internationally, as well as
Dominican University. He is an
are trying to decide on a case-
rule for mothers and children
studying the use of children
adjunct professor at Nichols
by-case basis. The debates
indoctrinated by the blood cult
as violent actors by groups
College, teaching cybersecurity
continue over whether they
that is ISIS. n
such as ISIS and consulting on
and counterterrorism courses.
Governments facing the
46 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
NEW!
FEATURE
48 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
LATEST SURVEY SHOWS THAT ATTITUDES AND ADOPTION HAVE BOTH SHIFTED IN FAVOUR OF CYBERSECURITY BEST PRACTICE BY LEON FOUCHE
came into effect. Companies
in favour of cybersecurity best
New Legislation Creates Real and Significant Penalties for Businesses
with more than 500 board,
practice. However, still only 56
Since the 2016/2017 Cyber
or in the EU, or marketing goods
business and IT executives across
percent of organisations have a
Security Survey Report, it has
and services to EU residents,
Australia and New Zealand. The
cyber incident response plan in
been revealed that Equifax,
must comply with the new
BDO and AusCERT 2017/2018
place, which is a slight increase
Uber, Facebook and Cambridge
regulations or risk facing heavy
Cyber Security Survey delivers
from 48 percent last year. The
Analytica compromised the
fines and criminal penalties. Even
insights into the cyber resilience
survey also found that the top
personal information of more
companies that are not located in
and maturity of Australian and
three cybersecurity incidents
than 150 million users. It is
the EU may be impacted, as their
New Zealand businesses for
experienced by Australian and
understandable then that the
EU client companies and suppliers
the second year in a row. This
New Zealand organisations were
general public’s expectations
may require compliance as a
annual survey gives organisations
ransomware (17.8 percent),
of organisations protecting
condition of continued business.
the opportunity to benchmark
phishing (19.3 percent) and
their privacy has never been
themselves against their peers
malware (17.9 percent). Thirty
higher. The level of government
Amendment (Notifiable Data
and equip them to ask the right
percent of respondents were
and public scrutiny brings
Breaches [NDP]) Act 2017 became
questions on how to improve
affected by a cyber incident of
cybersecurity to the attention
effective in February this year.
their cybersecurity environment.
some kind; and it is important to
of boards and executives. It can
Despite financial penalties for
The resulting report contains
note that these incidents were not
no longer be regarded as simply
non-compliance – up to $420,000
valuable benchmarking data,
confined to large corporations.
an IT activity – cybersecurity
for individuals and $2.1M for
identifying the current state of
The survey found that almost 18
now needs to firmly reside as an
organisations – this year’s Cyber
play in the local cyber landscape
percent of small- to medium-sized
embedded part of organisational
Security Survey found that more
and capturing views on what
businesses were impacted by a
risk strategy, and this change
than a third of respondents did
may lay ahead. The report also
cyber incident. A cyber incident
is occurring.
not know if their organisation
reveals the cybersecurity risks and
can come at a great financial
realities faced by Australian and
and reputational cost to the
make businesses accountable for
data breaches scheme. Australian
New Zealand businesses across
business, yet only 37 percent of
protecting their data. In May 2018,
businesses need to be acting now
a range of organisation sizes and
survey respondents had cyber
the European Union (EU) General
to have cybersecurity practices
industry verticals.
insurance cover.
Data Privacy Regulation (GDPR)
and processes in place, should
BDO Australia and BDO New
The main trend observed in
Zealand, in partnership with
this year’s report is that attitudes
AusCERT, conducted the second
and adoption have both shifted
annual Cyber Security Survey
securitysolutionsmagazine.com
Governments are starting to
in the EU will be required to demonstrate compliance, while companies doing business with,
In Australia, the Privacy
must comply with the notifiable
SECURITY SOLUTIONS // 49
FEATURE
they be required to report any actual or perceived breach to the regulator once the legislation comes into effect.
Leadership and Strategy are Important Roles Most of these regulatory changes will require business owners and leaders to take accountability for their cybersecurity arrangements and provide leadership and
Finally, we expect more organisations will invest in staff education and training, as they are often the weakest link within the organisation.
direction for ensuring compliance against regulatory changes. Increasingly, boards and
Email Compromise (BEC) scams
vendor risk assessments
organisations report data
executives play an important
have grown more prevalent and
increased 20 percent from the
breaches. Whilst there might be
role in ensuring cyber resilience
sophisticated. In these scams,
previous year.
initial difficulties to adopt these
within their organisations. The
the cybercriminals use social
results from this year’s survey
• Adoption of IT/cybersecurity
changes, compliance with these
engineering tactics to trick
standards/baselines for third
regulations is raising awareness
show that business owners
employees authorised to request
parties increased 18 percent
on data leaks and privacy
and executives recognise the
or conduct wire/bank transfers.
from the previous year.
concerns for corporates and
importance of cybersecurity,
Fraudsters usually spoof or hack
which is evident in improvements
the emails of senior executives at
cybersecurity risk assessments
to seeing improved maturity over
noted on a number of leadership-
the organisation and use email
increased 18 percent from the
the coming year.
related activities from prior
to instruct lower level employees
previous year.
years: a 17 percent increase in the
to conduct a bank transfer to
adoption of cyber risk reporting
a fraudulent account (aka CEO
identify critical systems and
staff education and training,
to boards, 18 percent increase
fraud). In other forms of BEC, the
data increased 14 percent
as they are often the weakest
in the adoption of cybersecurity
criminals compromise the email
from the previous year.
link within the organisation.
awareness programs and 29
of a finance officer and request
percent increase in the adoption
invoice payments from vendors
cybersecurity policy
management teams requiring
of CISO roles.
to their own bank accounts.
increased 12 percent from the
specialist training on cyber risk
Scammers can also pose as a
previous year.
management, which we predict
Phishing and Email Attacks are on the Rise
supplier to the organisation
Phishing and email attacks are still the most prevalent form
• Adoption of a process to
• Adoption of an IT/
individuals and we look forward
Finally, we expect more organisations will invest in
We are seeing more boards and
is likely to increase further this year. We are also expecting to
fraudulent account (aka bogus
Our Predictions for the Coming Year
invoice scheme).
Despite the view from survey
corporates and multinational
respondents, phishing,
organisations provide basic
ransomware and malware
cybersecurity risk assessment
remain a concern. We believe
training to their suppliers and
that ransomware will continue
service providers in an effort to
and request a wire transfer to a
of cybersecurity incidents by ransomware and malware
The Visibility of Risk is Improving
coming in a close second and
One of the most important
affecting respondents, followed
• Adoption of regular
see larger and more mature
third. Email is the primary online
components of a successful
to be successful due to its
improve the security maturity of
method used for communications
cyber resilience program is to
effectiveness in extorting money
their supply chain. n
and information sharing for
have a clear and end-to-end
out of corporations. We also
private and business users.
understanding of cybersecurity.
anticipate an increase in wiper-
Symantec reported that in 2017,
Compared to last year’s survey,
based malware masquerading
Leader for cybersecurity. He is
55 percent of all emails sent
this year’s survey showed a year-
as ransomware, aiming to
a cybersecurity and technology
were spam and that phishing
on-year increase in adoption of
disrupt businesses.
risk specialist with more than 20
emails are the most widely used
visibility of cybersecurity risk:
infection vector employed by 71
• Adoption of cloud security
Survey respondents indicated
Leon Fouche is BDO National
years’ experience, having worked
that they expect to see an increase
extensively with the board and
percent of all threat actor groups.
standards increased
in data breach-related incidents.
C-level leaders in government and
The BDO survey found similar
by 7 percent from the
With the implementation of
the private sector. Leon can be
trends for Australia.
previous year.
the Australian NDB and EU’s
contacted by email leon.fouche@
GDPR, we expect to see more
bdo.com.au
Over the past year, Business
50 // SECURITY SOLUTIONS
• Adoption of third party/
securitysolutionsmagazine.com
M2M & IoT Solutions are revolutionising the security industry. M2M One SIM cards power security solutions nationwide, including:
Access Control
Wireless IP Cameras
IP Alarm Panels & Dialers
Failover & Redundancy
Lone Worker Safety
Vehicle & Asset Tracking
Contact M2M One now to get connected: www.m2mone.com.au | info@m2mone.com.au | +61 3 9696 3011 Expo Stand: C27
Recognize AND Analyze Is she an employee?
When, where did she enter? How often was she here this month?
Is she a banned person?
Premier face recognition technology for real-time video surveillance, recorded video investigation, crowd detection, and anonymous people analytics
See how it works at Security Expo in Melbourne, stand J8!
Does she appear in videos recorded last week?
How old is she?
AVIATION
TRAVEL SECURITY BY STEVE LAWSON
52 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
It is getting towards the holiday
broken and that was by New
part of the year and about this
Zealand Customs, who decided
time last year I wrote an article
they needed to get into my locked
about travel security, so it seems
bag so they broke the locks and it
appropriate to revisit the subject.
was never the same.
Most of this article is aimed at the international traveller, but much
Do Some Research
is appropriate to domestic travel
There are so many sites that
as well. As a director of a company
provide information that it can
which provides travel advice
be overwhelming and often the
(www.paradym.co), I have access
security advice on many sites is
to a range of resources.
not particularly good. However, if
I can say that in almost 30
securitysolutionsmagazine.com
you are travelling overseas, look at
years of travel, I have never had
Smartraveller (smartraveller.gov.
an issue, and I have travelled to a
au) and the UK equivalent (gov.
few places that could be described
uk/foreign-travel-advice). I do find
as less than desirable. I have lost
the detail on the UK site is a little
one bag, when I was on my way
better, but that is probably just a
to New York to handle Qantas’
personal preference. It only takes
on-ground response to September
10 minutes to check both and it
11 and I did not have a ticket for
is good practice to register your
one sector. I have had one bag
travel on Smartraveller.
SECURITY SOLUTIONS // 53
AVIATION
Insurance
Kmart, Target or similar and
marking it with nail polish
that I did not use, to make sure
I often watch the news and
get a bargain. There is not
or similar.
I have not left anything. To be
see travellers stranded in
much use paying a fortune
various places and whining that
for a designer bag just to use
tag on your bag so that you
my bag unless I am in a room for
something has gone wrong and
once every year or two. Even
can recognise it easily. It not
more than a week. A checklist is
the airline is not helping. The
if you travel a lot, do not buy
only makes it quicker to get the
a good way to make sure that you
short answer is to get travel
expensive bags. If your bag
bag off the arrivals carousel,
have accounted for all your items
insurance! It is not the answer
stands out as being ‘expensive’
but it means that you can see
before checking out.
to all problems, but it will help
then thieves (who are not
if someone tries to steal the
stupid) may target it.
bag off the carousel. There
in most cases. I also do not suggest you skimp on paying
2. The most basic rule of travel
3. Put a ribbon or coloured bag
completely frank, I do not unpack
are also electronic tags that
General Security Advice 1. Always be aware of your
for insurance; it is amazing how
– do not put anything that
track your bag. I have not tried
many Australians get injured
you do not want to lose into
them, but we did experiment
surroundings. It is not possible
overseas and then find that their
checked baggage! I often
with something similar for
to teach situational awareness
basic insurance is not sufficient. It
show people how easy it is to
air cargo a few years ago and
in this article, but a couple of
is the same if you are holidaying
open and close a zippered bag
I cannot see any reason they
pieces of advice:
domestically – get insurance.
without letting someone know
would not work. To be honest,
• Look around – there is no
If you travel regularly, get an
that you have been inside. If
given the first sentence of
hard and fast rule about
annual policy.
you do use a zippered bag, you
this paragraph, you should
who is acting suspiciously,
need to make sure the slider
not need them. I also carry at
but if someone keeps
Baggage
(pull tab) does not move. The
least a set of underwear in my
looking at you, and like
1. Buy a bag that is suitable for
locks on some modern bags
carry-on bag, just in case my
me you are not the most
the travel you do. I buy good
fix them in place, but some
bag is lost.
attractive person in the
bags because I travel a lot
soft-sided bags have multiple
and they last. I do not buy
zips. You should fasten them
Checklists
or she may only be trying
bags because they are status
to a fixed point (like a handle)
I do not do this but I should. Keep
to sell you something, but
symbols. I got my latest bag
on your bag. You do not
a checklist of your valuables,
in Thailand and it is perfectly
need to use anything fancy
even if it is on your phone or
good. My cabin bag came from
or expensive – zip ties work,
tablet. When I checkout, I always
points are and, where
Costco. If you do not intend
but I would make sure you
do two walk arounds and look
possible, make sure there is
travelling a lot, go to Big W,
can identify your zip tie by
everywhere, including drawers
more than one.
54 // SECURITY SOLUTIONS
area, avoid that person. He
avoid him. • Know where your exit
securitysolutionsmagazine.com
places, photography of
4. Local customs:
public buildings, ports,
• When you research your trip, make sure you look at what
not recommended.
is acceptable behaviour. That
money exchanges. People
may include what is acceptable
may be observing and noting
avoid conspicuous displays
dress. I have been in a shopping
the amount of money you are
of wealth such as expensive
centre with a police officer who
carrying – go inside a bank or
clothing, flashy jewellery,
reminded some Western girls
electronics or displaying
that they should dress modestly.
• You are responsible for the
large amounts of cash
In many countries, men should
security of your baggage
(bearing in mind, what
not touch women or be alone
while checking in or out of a
we may consider a small
with them and, in several places,
hotel – ensure that it is under
amount of money may be
homosexuality is illegal.
a considerable fortune to
5. Drinking and alcohol:
others). Only take with you
• Watch out for ‘tourist drugging’
items that you are prepared
and other drink spiking. If
to lose.
alcohol is consumed, the
• Watch out for strangers
preferred alcohol is beer or
• Take care using ATMs or
convert money at your hotel.
constant supervision. • If you are unfortunate enough to be the victim of crime, do not put up a fight. Do as the person says. • Maintain a small ‘emergency
‘offering help’ or ‘needing
wine from sealed bottles that
kit’ to hand when staying in
help’.
are opened in your presence.
hotels in case there is a fire,
• Try not to travel on your
• Stay away from the
deposit box.
airports or bridges is also • Do not look too wealthy –
2. Areas to avoid:
room safe or the hotel safety
• Drinks (including water) should
earthquake or other emergency
own; it is best to be part
only be consumed from closed
or where electricity supplies are
of a group. That does not
and sealed bottles, including
unreliable. This should consist
mean a tour group, but if
in hotel bars. Opened bottles
of at least a torch, a whistle, a
you become friends with
and glasses should not be left
people during your travel,
unattended at any time. If they
It seems a long list of do nots,
are, discard the contents.
especially from someone who
bottle of water and some food.
immediate environs of
stay as a group. Look to join
Western diplomatic missions,
tours provided by your agent
6. Things to do:
says he has had almost 30 years of
including embassies, high
or the hotel. To be blunt,
• You must carry a form of ID
travelling without an issue, but if
commissions, consulate
many are rip-offs because
with you always. I do not leave
you look at the article, almost all is
generals and consulates,
they take you to businesses
my passport in the hotel – I
common sense and, other than the
unless you have a reason
associated with them where
always carry it with me and
checklist, things I mostly do. Have a
to visit.
they get a cut, but they are
keep it in my front pocket. If
great trip, wherever you go. n
usually safer than randomly
someone does brush against
parts of town such as red-
wandering on your own.
you and you think you have
light districts.
An alternative is to offer a
been pickpocketed, do not
experience in aviation security. As a
• Stay away from ‘seedy’
Steve Lawson has over 20 years’
cab driver a day rate. Some
automatically check one pocket
security executive with Qantas, Steve
gatherings and
of the best tours I have
for your wallet. That just signals
held a number of senior management
demonstrations; they may
had were in cabs where I
where you keep your valuables.
roles covering all aspects of aviation
appear benign, but they can
negotiated a day rate. That
turn violent quickly.
included a great tour of San
thieves may pose as police
to airport operations. He was sent
Francisco, so try in first
officers or private security
to New York immediately following
shopping venues carefully –
world countries as well.
guards. Always ask to
the 9/11 attacks to manage the
venues with a higher level of
• Having said to use cabs, do
see identification.
Qantas response and undertook
• Do not go near political
• Choose entertainment and
• Beware that in some places
security from policy development
a similar role following the 2002
visible security are generally
not hail them in many third
safer than venues with no,
world countries. It is best to
someone knows where you are
Bali Bombings. On his return to
or obviously poor, security
use vehicles pre-booked by
going and when you can be
Australia, he was appointed Security
as criminals and terrorists
the hotel rather than hailing
expected to return.
Manager Freight for the Qantas
are more likely to attack the
them in the street. This is
‘softer’ target.
important at the airport. Be
phone numbers of the hotel
a director of AvSec Consulting in
aware that in many places
and anyone in your group
partnership with Bill Dent, a fellow
• Photography of police and
the cab can be a shared ride
programmed in your phone.
former Qantas security executive.
military infrastructure
and the drivers may stop to
and personnel is not
collect people until the cab
recommended. In many
is full.
3. Things not to do:
securitysolutionsmagazine.com
• If you go out, make sure
• Make sure that you have the
• Ensure your mobile phone is always charged. • Leave your valuables in your
Group. Since 2007, he has been
Steve can be contacted via email slawson@avsecconsulting.com or on 0404685103.
SECURITY SOLUTIONS // 55
ACCESS CONTROL
The Role Of Bluetooth In Mobile Access Control BY SCOTT LINDLEY
As you join in the trend to use smartphones in access control, be sure to select the right communications protocol.
56 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Using smartphones in access
systems. Not proximity. Not smart
control systems is the new
cards. Phones!
buzz in discussing readers and
Besides the fact that just
credentials. Electronic access
about everyone has one, what
control manufacturers are
are other reasons? To arrive at
promoting the various ways that
that answer, let us review the
mobile technology, soft or virtual
basics of access control. Access
credentials can be used to replace
control authenticates a person by
cards. It is not surprising that all
following three things:
are trying to get on board.
• recognises something he has
According to Gartner Research, 95-plus percent of all adults aged 18–44 years own smartphones. That is not all – 69 percent of the entire population already uses
(RFID tag/card/key) • recognises something he knows (PIN) • recognises something he is (biometrics).
smartphones. That is babies through seniors. Gartner suggests
securitysolutionsmagazine.com
Smartphones have all three
that, by 2020, 20 percent of
authentication parameters. This
organisations will use mobile
soft credential, by definition, is
credentials for physical access
already a multi-factor solution.
in place of traditional ID cards.
Mobile credentials remain
To rephrase that last sentence:
protected behind a smartphone’s
in less than 18 months, one-fifth
security parameters, such
of all organisations will use the
as biometrics and personal
smartphone as the focal point of
identification numbers (PINs).
their electronic access control
Once a biometric, PIN or password
SECURITY SOLUTIONS // 57
ACCESS CONTROL
is entered to access the phone,
mobile access, there are a
the user automatically has set up
few things to consider before
to a closer read range. NFC
longer read range, perhaps six
2-factor access control verification
deciding on the type of reader
eliminates any chances of having
feet, can be provided so users
– what he knows and what he has
to invest in. The installed base
the smartphone unknowingly
do not have to open their car
or what he has and a second form
of mobile devices can affect the
being read, such as can happen
window to reach the reader. At 15
of what he has.
technology choice, as iPhones 5s
with a longer read range. There
feet, the reader can open parking
and earlier do not support NFC. In
are also those applications where
garage doors or gates that allow
access to the credential without
organisations with a large base of
multiple access readers are
entrance to the facility, such as at
having access to the phone. If
iPhones and Androids, Bluetooth
installed very near to one another
gated communities.
the phone does not work, the
is the only option.
due to many doors being close
To emphasise, one cannot have
credential does not work. The
Bluetooth technology is quite
There are other advantages
entering the facility gate, a still
There is yet another advantage
together. One reader could open
to a longer reader range. Since
credential works just like any
popular and anyone who has
multiple doors simultaneously.
NFC readers have such a short
other app on the phone. The
ever tried to sync smartphones,
The shorter read range or tap of
and limited read range, they must
phone must be on and unlocked.
computers and/or headphones
an NFC-enabled device would
be mounted on the unsecure side
has probably used it. Bluetooth
stop such problems. However,
of the door and encounter all
availability and built-in multi-
readers are less expensive because
in defense of NFC, it must also
the problems such exposure can
factor verification – are why
almost every smartphone already
be understood that Bluetooth-
breed. Bluetooth readers mount
organisations want to use
has Bluetooth. Not even 50 percent
enabled readers can provide
on the secure sides of doors and
smartphones in their upcoming
of all smartphones yet have NFC.
various read ranges of no longer
can be kept protected out of sight.
These two factors –
access control implementations.
In most instances, NFC uses
than a tap as well.
Why Bluetooth has become the Popular Communications Protocol
that the smartphone needs to
advantage for Bluetooth. Read
Other Information about Bluetooth
come into much closer nearness
range can be from an inch to over
The Bluetooth technology used in
to the reader, like a proximity
15 feet. Installers can provide
access control is called Bluetooth
card versus a longer range
adjustable read ranges and differ
Low Energy (BLE). It is very
Bluetooth and Near Field
transmitter. The good news is that
them for various applications.
efficient; a single cell battery
Communications (NFC) are the
such closer proximity prevents
For instance, they could choose
could operate for months on end.
most popular short-range radio
interference from other devices
a reader requiring presentation
For those technically inclined,
wave communication standards
communicating from farther
at the computer server room.
it operates with a maximum
used in smartphone credential
away. The negative is that the
Three feet may be the preferred
speed of 1Mbps with actual
systems. When implementing
reader can seem more finicky.
range at the front door. When
throughput of 10 ~ 35 Kbps. Thus,
less power. As a result, this means
58 // SECURITY SOLUTIONS
This leads to a major
securitysolutionsmagazine.com
access control using Bluetooth
use. From that point on, the user
Door access – register. Parking
continuing to expand in use to
BLE technology with today’s
simply presents his smartphone
access – register again. Data access
the point where those not having
smartphone offers the promise of
to the BLE-enabled reader. Forget
– register again. And so on.
them are already the exceptions.
lowering the cost of hardware.
having to enter a PIN or password
Newer solutions provide an
They are unquestionably going to
to authenticate identity (as with a
easier way to distribute credentials
be a major component in physical
there needs to be a direct
card). Henceforward, a person’s
with features that allow the user
and logical access control. If they
connection between the Bluetooth-
smartphone is his identity. Once
to register only once and need no
are going to constitute 20 percent
enabled device and the Internet.
the phone is operational, so too is
other portal accounts or activation
of all card-based access control
This is done very simply through
the credential!
features. By removing these
within the next 18 months, it can
additional information disclosures,
be expected that the numbers
To make the system work,
the cellular data network or a secure Wi-Fi connection. To
A Couple of Caveats
vendors have eliminated privacy
will be much higher by the end of
install a mobile credential, a user
As when implementing any new
concerns that have been slowing
2020. n
needs to first have the Wallet
technology, become familiar
down acceptance of mobile
app installed on a supported
with it. What are the benefits?
access systems.
smartphone. Next, the user
Where are the potential pitfalls?
launches the app and selects the
Organisations should make
hackers listening to their Bluetooth
to Farpointe, Scott was Director
‘+’ button, indicating that he would
sure the manufacturer not only
transmissions, replaying them
RFID Products at Keri Systems
like to load a new credential.
understands Bluetooth, but knows
and getting into their buildings, so
and Sales Manager North America
A registration key certificate is
how to coach them through the
they should make very sure that
at Motorola Indala Corporation.
provided for each credential
initial installations.
the system is immunised against
Scott holds a Master of Business
such replays. That is simple to
Administration (MBA) from
Do not forget about
ordered. He then enters the
Scott Lindley is the General Manager of Farpointe Data. Prior
Organisations do not want
unique 16-character key from the
cybersecurity responsibilities. For
do. The manufacturer will advise
Thunderbird School of Global
certificate and taps ‘submit’.
instance, some older Bluetooth-
which system will be best for
Management in Glendale, Arizona
enabled systems force users to
each application.
and a Bachelor of Arts from
Once successfully registered, the new mobile credential will
register themselves and their
appear in the Wallet app ready for
integrators for every application.
big sizes for blokey wrists
only lsc
$ ACSS iClass Silicone Wristband [Dark Blue] Large PART CODE: ACICSWDBL
12
Research shows that Bluetooth-
super comfy silicone
perfect for gyms and pools
only lsc
$
00 ACSS iClass Silicone Wristband [Dark Blue] Extra Large
12
$ ACSS iClass Silicone Wristband [Black] Large PART CODE: ACICSWBLKL
c s l t a y l on
only lsc
only lsc
00
PART CODE: ACICSWDBXL
California State University in Sacramento, California.
enabled smartphones are
12
$
00
12
00
ACSS iClass Silicone Wristband [Black] Extra Large PART CODE: ACICSWBLKXL
iClass wristbands
You can now purchase our quality all-in-one silicone wristband with an integrated HID Global iClass credential. These robust waterproof wristbands are perfect for gyms, swimming pools, surf clubs and anywhere where water or moisture is an issue. They are also perfect for gaming and hospitality installations where a free hand isn’t always available.
6 LOCATIONS ACROSS AUSTRALIA & NEW ZEALAND CALL 1300 646 269 OR SHOP LSCSECURITYSUPPLIES.COM.AU
They are stocked in Black and Dark Blue. Other colours are available but may attract a minimum order quantity. Talk to your local Account Manager for more details.
PROFESSIONAL DEVELOPMENT
IF THE TRUTH BE TOLD… HOW TO UNCOVER A LIAR PART I ELLY JOHNSON
60 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
There has been a theft of $500
not all questions are born equal.
from an office. The money was
How well a question ‘works’ in
taken from an employee’s bag,
a given situation depends on
which was stowed under a desk.
many factors, and one of them is
You are the person running
how well the asker understands
the initial investigation and
the mind of a typical liar when
you have little or no evidence
questioned. There is a strong
as to who took the money that
psychological basis to why certain
morning. Your job is to identify
questions work and, once you
the culprit and if there were any
understand how people think
witnesses or anyone else involved.
when they are presented with
Predictably, everyone is denying
them, it can transform the way
any knowledge of or involvement
you look at questions in general.
in the theft, but someone is
moment into the mindset of a
for certain, just by analysing the
person who has something to
response to a series of simple
hide. Let us call that person
questions, that a person is lying
the DECEPTIVE person. That
even if they were denying the
is, someone who has guilty
offence? Yes, definitely!
knowledge and a guilty mindset
When it comes to evaluating the truthfulness of an answer,
securitysolutionsmagazine.com
Immerse yourself for a
lying. Could you know, almost
because they are hiding the truth about something. Put simply, they
SECURITY SOLUTIONS // 61
PROFESSIONAL DEVELOPMENT
do not want to get caught and they
the truth.
They are primarily designed to
was taken. There have been no
If you think this sounds
be used in situations where you
witnesses come forward, there is
might include lies about illegal
implausible, consider for a
have little or no other evidence
no CCTV or any other evidence
activities, deceptive behaviour
moment that the approach I
and are relying purely on the
pointing to the person who
and activities such as fraud,
use works even in a training
information you gather from
took the money. What we do
theft, assault, security issues,
environment where I enlist some
questioning the people who
know is that the money was in
or enquiries and investigations
volunteers and brief them on a
might have been involved. Once
Lucy’s handbag.
into unacceptable workplace
simulated situation. The people
you can confidently deduce who
In our scenario, each person
behaviour such as harassment
are not really involved in the
was involved in an incident, you
will be interviewed in the same
and bullying.
are lying. In the real world, this
incident or scenario that I place
can then focus on developing
way, using exactly the same
I am also going to ask you to
them in and yet, even if someone
a strategy to get to the truth of
questions. If you had no other
jump into the mindset of a person
only has a ‘pretend’ guilty mind,
the matter and encourage an
information about who took the
who has nothing to hide, someone
we are still usually able to
admission or confession.
money, but asked these questions
who is not hiding the truth at all
distinguish between them lying or
Back to the theft from the
or carrying any concern about
telling the truth, just by analysing
office. Two of the people you
person you are likely, at the end
getting caught out. We will call
elements of the responses to
interview in an attempt to
of the interview, to have enough
that person a TRUTHFUL person.
certain questions.
uncover who took the $500 are
information to feel strongly about
These questions, when used
Jim and Eddy. Jim is, in fact, the
which person was involved with
what is going on inside each of
correctly, can and will give you
person who took the money, but
the theft of the money. Keep in
these minds, it becomes a lot more
reliable insight as to who the
you would not start out knowing
mind that both people are denying
feasible to differentiate a lie from
person is that is not being truthful.
this. You just know the money
taking the money. The innocent
Once you start to understand
62 // SECURITY SOLUTIONS
of an innocent person and a guilty
securitysolutionsmagazine.com
nobody was looking. The money
stress and load that the deceptive
leads toward blaming Lucy rather
is now in his wallet, which is in
person is experiencing.
than the acknowledgement that
his back pocket. It was almost
Not only does Jim have to lie,
someone stole it. He uses softer
time to go home when the
he has to go through a process
language about the incident.
missing money was reported,
where he is trying to think how
He also tagged on the end “or
and the staff were called in one
a truthful person might respond.
something” in an effort to keep
by one to be questioned about
Then he has to choose how to
things vague and distance himself
the theft.
answer it to sound believable. A
from revealing he has any
truthful person, with nothing to
knowledge of what happened.
Eddy is the other person who is being interviewed. Eddy knows
hide, does not have to go through
that the money is missing from
that same process.
Lucy’s handbag because it is
So, with this first question,
Deceptive people are more likely to be vague and evasive; they may claim not to know
common knowledge amongst his
Eddy – who did not take the
why. They may use words like
colleagues at the office. But he
money and has no idea who
“apparently”, “from what I was
has no guilty knowledge. He did
did – responds with an honest
told”, “something went missing –
not take it and he does not know
explanation of what he knows
or was taken”.
who did.
and why he was asked into the
There is a significant
room. He easily responds, “Sure,
difference between the ways
continuing in the next edition
there’s an investigation going on
that Jim and Eddy responded.
of Security Solutions Magazine,
about the money that was stolen
Not everyone will answer the
I am going to share with you
from Lucy’s bag today.” Truthful
questions exactly like this. But
six powerful investigative
people may use an accurate
people are often surprised
behavioural questions I use to
description of what they know.
how close to the textbook the
confidently ascertain who took
They often use words like steal
responses are when used in the
the money or at least had some
and theft. They are more open
real world. They do work! After
knowledge about the theft, and
and have nothing to hide. The
your very first question, you are
I will explain the psychology
question does not pose a threat.
already able to notice an initial
that turns these seemingly
Eddy has no reason to overthink
difference in the responses of the
innocent questions into treasure
the question or the response
two men.
troves of information. (Asking
and the answer flows. He also
questions such as these is only
uses words that reflect his
are assessing truthfulness or
one part of the puzzle when it
understanding that the money
otherwise, you need to resist the
comes to eliciting information,
was stolen.
temptation to jump too quickly
Starting below, and
reading behaviour and analysing
Now let us compare that
In any scenario where you
into concluding that you KNOW
person is denying because he did
responses. You want to listen to
with what happens when Jim
for sure who is guilty or who was
not take it and the person who
the answers to the questions but,
is asked the same question.
involved with only a little bit of
did take it is denying because he
in the real world, you should be
Glancing away for a moment, he
information or a ‘hunch’.
does not want to get caught!
using a five-part multi-channel
answers, “Umm, yeah, apparently
analysis process – find out more
Lucy is missing some money or
edition of Security Solutions
at www.truthability.com)
something.” First there was a
Magazine for Part 2 of this article,
pause, and umm. Not a sign of
where I will share five more
deception on its own, but when
incredibly powerful questions to
we are analysing behaviour
help you uncover a liar! n
you a more accurate picture. As
Question 1: [Jim/Eddy] Do you know why I asked you here today?
we work through the scenario,
In this case, the question relates
delay, pauses and verbal fillers
A former police officer,
I want you to imagine the
to being asked into the office
like umms are things we listen
Elly Johnson is the Founder
differences in the thinking of
where the interviews about
out for.
and Managing Director of
these two people I am going to
the theft of the money are
separately interview.
being conducted.
It is important not to draw conclusions from the response to one question alone. You should instead analyse the responses to all questions holistically to give
Although Jim is usually a
Take a moment to consider
Join me again in the next
to assess honesty, response
Jim also said in his response
TruthAbility, an organisation
“apparently Lucy is missing some
that for almost two decades has
money or something”. He uses
specialised in providing a unique
pretty honest guy, he seized the
what happens differently in
the word apparently, when he
mix of programs, workshops and
opportunity today to take the
the minds of Jim and Eddy. The
knows full well there is no doubt
seminars, designed to help people
money from Lucy’s handbag
key to understanding these
as to what happened. He also
reduce the risk associated with
when nobody was looking.
questions is recognising the
said that Lucy is “missing” some
harmful deception, fraudulent
At least, he is pretty sure that
extra emotional and cognitive
money. That is language that
behaviour and hidden truth.
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 63
FEATURE
The Chinese Bodyguards: Personal Protection In The Land Of The Dragon BY PAUL JOHNSTONE
Being rich in China can be dangerous – unless you have a bodyguard. The security business in China is booming.
On a cold January morning,
occupational hazards for China’s
President of the Public Safety
that employers of bodyguards
visitors streamed in and out of
emerging ultra-rich; assassination
Institute and the Director of
in China are successful people,
the Southern Chinese Shanxi
and kidnapping are a reason
Operations for Street Edge Krav
like senior executives of foreign
office of Li Haicang. Nothing was
why many of China’s rich are
Maga International (China), which
or private businesses, as well
out of the ordinary until a lone
undertaking precautionary
provides authentic Israeli Krav
as entertainers and a growing
assassin produced a sawn-off rifle
measures, which are becoming
Maga and Public Safety, Policing
number of entrepreneurs.
and fired a bullet into Li’s body.
more and more necessary. With
and Counterterrorism training.
Until that fateful moment, Li was
around 30 percent of China’s
During his 15 years in China,
there are bodyguard training
the chairman of a multi-national
millionaires believed to be
Wazen has trained officers from
programs designed specifically
company and 27th on the Forbes
women and a widening wealth
the police, law enforcement and
for females advertised at martial
list of China’s richest people. Only
gap, safety has become an issue
the growing number of corporate
arts schools where the training
several weeks later on the 12th of
for the rich. It is easy to see that
firms offering bodyguards. He
curriculum includes instruction
February, a Chinese millionaire
private security and, in particular,
has also been instrumental in
in driving, computer skills, self-
from the wealthy enclave on
baobiao (the Chinese word for
designing training programs
defence related laws and “polite
Wenzhou in Zhejiang Province
bodyguard) is taking off as the
for a number of organisations,
conversation”. The teachers at
was stabbed to death outside
nation struggles with some of
including the Beijing Tourism
these schools are veteran martial
his home by five men in a pre-
the side effects of its booming
Group in preparation for the 2008
arts specialists, former special
planned assassination attack.
growth. A 2004 media report
Beijing Olympic Games.
forces soldiers and operational
Various media reports indicated
in the China Daily newspaper
Wazen states that a large
According to Wazen,
bodyguards. Female bodyguards
that in 2004 alone, around 4,000
stated that in Guangzhou alone,
number of China’s private
are becoming more and more
people were kidnapped in China.
the private security industry
bodyguards are retired police
popular as businessmen want
Well-known actor Wu Ruofu was
employed no fewer than 5,000
and/or soldiers from elite units,
them to protect wives, girlfriends
abducted whilst driving his BMW
personal bodyguards.
or former Chinese secret-service
and children.
and hidden in the north of Beijing
Australian Eddie Wazen is
members; however, a large
A female bodyguard from one
by a notorious Chinese organised
an industry expert based in
number of wealthy Chinese are
of Wazen’s former bodyguard
crime group who demanded a
Beijing who is leading the way
turning to female bodyguards.
team said that woman in China
ransom, but police were able to
in developing new training
He recalls a local executive, who
today are more confident in
track them down after several
programs and services for the
had received threats that his
venturing into careers that in
hours and freed Wu.
Chinese market. He is the Director
child would be kidnapped, hired
years gone past would have been
of Strategic Risk, Business and
a female bodyguard to escort his
forbidden or perceived as male
Education for the TA Group, Vice
child to and from school. He says
dominated. He says that there has
These incidents are just several in part of a growing number of
64 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 65
FEATURE
also been a growing demand for
Many lawyers believe that what
services have surfaced and are
relations officer and a bodyguard,
private bodyguards being hired
is not specifically forbidden by
increasing each year.
so in a female they can have all
by Taiwanese pop singers and
law should be legal; however,
prominent entertainers when
government officials claim that
counterparts, many Chinese
visiting mainland China.
no firm can legally be registered
performers and business
that Wazen and his team has
When asked who makes the
Like their Western
roles put into one. The director of a firm
as a private bodyguard service.
executives employ bodyguards
previously trained stated that
best bodyguard, he is quick to note
There have been a number of
as a symbol of their status and
he dresses his bodyguards in
that the Chinese have long prized
occasions where firms have been
prestige. However, another reason
matching designer suits and long
Manchurian bodyguards for their
shut down by the Public Security
for the increase in popularity of
black coats as a symbol of status
physical size, loyalty and bravery,
Bureau (PSB).
having a bodyguard is the crime
and, as far as he is concerned,
rate. Whilst serious crimes such
if people see this in conjunction
but female bodyguards have
Wazen states that as far
many advantages of their own.
back as the early 1990s there
as robbery, theft and murder are
with his latest European designer
Furthermore, many bodyguard
was a special course in Wuhan,
still less frequent then in Western
car then it means success and
training programs place a
Central China, which offered
society, they are becoming more
that they will want to do business
large emphasis on fitness and
young women the opportunity
and more common in China.
with him.
physical exercise, and often the
to train as bodyguards. In 1999,
bodyguard will double as a coach
he was invited to teach at the
also now renowned for carrying
to train students undertaking
in fitness training.
Dalian Peoples Police College
weapons, including firearms,
specialist bodyguard training
where he witnessed firsthand a
allegedly bought illegally from
in the lead up to the Beijing
and police officers turned
large number of young, fit and
corrupt police or military
Olympic Games. He also oversees
entrepreneur have identified
attractive females being trained
personnel. Furthermore, there
several Chinese bodyguard teams
the specialist market of private
as bodyguards by a specialist unit
have been a number of major
for visiting movie stars and
security and its success in Western
within the police. These ladies
incidents over the past several
celebrities, as well as company
society and have now turned
had been trained in all aspects of
years, including during the
directors and banking executives.
their focus on China. Just over a
bodyguarding, including firearms
countdown to the Summer
A client of Wazen, who asked
decade ago, the industry did not
and Chinese martial arts.
Olympic Games in Beijing. Some
not to be identified, said he had
of those included the March
decided to get protection after
Many former career military
legally exist. Although there have
An example of the popularity
Chinese criminal gangs are
In 2008, Wazen was invited
been several security firms who
of females attending these
2008 hijacking of a bus in Xian,
a close friend was abducted
have received China’s Ministry
programs was highlighted in a
which was carrying Australian
and killed when the ransom
of State approval to do business
Chinese media report, which
passengers, by a Chinese
exchange was compromised. He
if their founders have at least
stated that a College of Physical
man wearing explosives and
now employs 15 bodyguards and
five years of security experience,
Education in Wuhan received
threatening to blow it up. There
pays approximately 400,000 Yuan
the employment of personal
3,000 enquiries when it first
was an alleged attempt by Uighur
($68,800 AUD) for each bodyguard.
bodyguards in China is still a
announced that it would begin
minorities in China to hijack a
grey area as far as the law goes
offering a six-month training
plane traveling to Beijing in the
bodyguards rely too much on
and there are no laws yet that
program to teach women how to
same year.
traditional and outdated martial
completely govern the industry.
become bodyguards. The report
The word “bodyguard”
Many Chinese are rushing
Wazen states that the Chinese
arts skills, which are not relevant
stated that of that number, over
to join the ranks of one of
to the modern bodyguard.
previously had a very negative
700 women formally applied and
China’s newest and best paid
Whilst having these skills is an
image in China and, because
150 were accepted.
professions – Chinese bodyguards
advantage, they are not suited to
can look forward to salaries of
the close-quarter and dynamic
of the lack of legal clarity
The past decade has been a
surrounding private bodyguards,
special time in the history of China
about $200–$5000 USD a month,
situations of the modern era.
their work is often described as
and the country has been and is
depending on their military/police
Instead, systems such as Street
personal assistant or advisor,
still in an economic transition.
background, formal bodyguard
Edge Krav Maga are much more
with their multi functions
As such, China is no different to
training, education, appearance,
suited to the bodyguard/high risk
reflected in the job description.
many other countries, and crimes
knowledge of martial arts and
protection industry due to its
Some firms have also resorted
towards rich people are inevitable.
foreign languages. However,
close-quarter effectiveness.
to calling their bodyguard
Furthermore, a widening gap
whilst many sign up to a world
firm a business etiquette firm,
between the rich and poor,
of glamour, there are many
and the Western world, there
although of late, the Ministry
the 2008 Olympic Games, the
underlying problems, including
are some schools which are
of State insists that the term
global market and the rise in
exploitation of female bodyguards
professional and understand the
“security consultant” be used
international terrorism have all
as nothing more than an attractive
complexities of what constitutes
to avoid comparisons with the
raised safety concerns among
fashion accessory or ornament.
the role of a bodyguard, whilst
bodyguard image in America
the nation’s elite. This is another
However, some companies
there are many other courses that
and other Western nations.
reason why private bodyguard
also require a secretary, public
use an outdated training manual
66 // SECURITY SOLUTIONS
Wazen said that, like Australia
securitysolutionsmagazine.com
without any formal experience
was counterproductive, as the
government officials to turn the
specialist fields such as personal
or training.
law prohibits private security
other way.
protection is being sought from
Over the past several years,
guards from carrying guns, and
With the increase of crime in
renowned subject matter expert
there have been prominent
there are also very strict laws in
China, the government is not in a
countries such as Australia, Israel
media reports throughout China
relation to carrying knives. In
position to send police and troops
and the US.
which have shown young female
theory, Chinese bodyguards do
to provide personal protection to
students at a bodyguard training
not have any special privileges
private entrepreneurs, local and
Government is moving
school having bottles smashed
and they have the same rights
foreign business executives and
aggressively to punish
over their heads. It is designed to
and responsibilities as civilians,
for those that require around-
kidnappers, often by the death
prepare them in the event they
including having no right or
the-clock safety measures.
penalty, the threat of the
may encounter this type of attack
entitlement to carry firearms.
Furthermore, there are an
kidnapping boom continues to
when they are bodyguards. As
However, it is often the case
increasing number of foreign
grow, as does the increase of
Wazen states, this type of training
that many do carry weapons in
executives, entertainment and
incidents involving less well-off
is more for show than having
complete violation of the law
corporate businesses conducting
people attacking luxury cars and
any real learning outcomes
and they are often ‘protected’ by
business in China and many of
causing accidents or personal
for the students. Students can
corrupt government officials or
these expect the same type of
attacks from employees.
expect to pay up to 12,000 Yuan
because they ‘know’ someone.
private security found in their
($2,100 AUD) for a three- or
There are unconfirmed
native countries.
Although the Chinese
According to Wazen, the gap between rich and poor is getting
four-week course, which results
reports that there may be over
Over the past decade,
in little more than the students’
20,000 companies throughout
and in particular since China
be ongoing problems in Chinese
ability to crawl through mud,
China who are involved in
became a member of the World
society. He said that there is a
dive through fire, immerse
security, bodyguarding and
Trade Organization, Wazen
saying in China: You will laugh
themselves in freezing water, and
private investigation work.
has noticed a trend in Chinese
at those poorer than you and
use nunchucks.
Although there are some that
bodyguard firms seeking formal
hate those richer than you. In a
are licensed by the state PSB,
educational accreditation for
country where the Forbes’ China
students were often subjected to
Wazen believes that there
their bodyguards and security
Rich List estimates there are 168
physical abuse from instructors
are many firms operating
specialists. As China continues
billionaires, the bodyguard and
and that undertaking training
underground or in a grey
to open up to the modern
security industry has broken
with replica Chinese 95 semi-
area, with little regulation
international world, education
from the shadows of the dragon
automatic rifles and pistols
or by paying bribes to local
and formal qualifications in
and is now in high demand. n
Furthermore, he said that
securitysolutionsmagazine.com
spread further and there will
SECURITY SOLUTIONS // 67
25 – 27 JULY 2018
SECURING INNOVATION SHOW PREVIEW The 2018 Security Exhibition + Conference: Powered by ingenuity and invention, showcases the latest technology and cutting edge thinking. From physical and electronic solutions to biometrics and AI, Australia’s largest security event offers unparalleled opportunities.
MELBOURNE CONVENTION + EXHIBITION CENTRE EXHIBITION IS FREE REGISTER NOW securityexpo.com.au
Take a first-hand look at what’s next for the security environment including intelligence on managing threats and identifying risks. Lead Industry Partner:
#security2018
SECURITY EXHIBITION INNOVATIONS AND INVENTIONS Over 5,000 industry professionals will discover new products from 300 leading Australian and international brands. Explore the latest in access control, alarms and perimeter protection, CCTV and surveillance, cyber and information security, home automation, information and communication technologies, IP security, locks, safes and hardware, and networking and integration products.
DRONE DEMO ZONE From aerial surveillance to licence plate identification and thermal imaging, drones, referred to as UAVs (unmanned aerial vehicles), are already widely used in the security industry with further growth expected. New in 2018 the CSD Drone Demonstration will area will present the latest in drone technology with exciting displays every half hour right on the exhibition floor.
CYBER SECURITY ZONE For the first time in Melbourne, the ‘Cyber Zone’ will host dedicated suppliers of solutions to protect your integrated hardware. With the rise in malicious cyber-attacks, ensure your networked devices are protected from the threat of breach with cutting-edge products from Exhibition Partner, Axis and new exhibitors Sententia and Performanta.
EXHIBITION HOURS
Principal Exhibition Sponsor
Wed 25 July 9:30am-5:00pm Thurs 26 July 9:30am-5:00pm Fri 27 July 9:30am-3:30pm
SEMINAR THEATRE
Seminar Theatre Sponsor
NEW IN 2018 The new Security Exhibition & Conference Seminar Theatre hosts a number of industry specific security sessions addressing the issues impacting security installers and integrators.
The sessions will expertly target key areas addressing data storage, licensing and regulations, biometrics developments, lock picking and many more key industry issues and technology advancements, all delivered by industry specialists.
DAILY SESSIONS 10:30 - 10:50
How to reduce costs and improve the bottom line through licensing and regulations
11:00 - 11:20
Improving margin with the right data storage solutions
11:30 - 11:50
Secure wearables and body worn camera options
12:00 - 12:20
Career Pathways and opportunities for advancement in security careers
12:30 - 12:50
What is the best digital access control option and panel for you
13:00 - 13:20
What the security future looks like with biometric developments
13:30 - 13:50
An NBN Network Update and how it impacts the installer
14:00 - 02:20
Lock Picking (breaking physical security systems using cyber hacking)
14:30 - 14:50
The top 5 things every installer needs to know about IT jargon
SEMINAR PASS $30 Includes a lunch voucher
REGISTER NOW securityexpo.com.au
CELEBRATE YOUR INDUSTRY Re-connect with your colleagues and peers at the ultimate networking evening,the Security Gala Dinner, held in partnership with ASIAL. Or for a less formal option, continue meaningful business conversations over a drink or two at the Networking Drinks.
GALA DINNER The annual Gala Dinner hosted in partnership with ASIAL recognises achievements from the year in the security industry. This ultimate networking evening brings together security professionals from across the globe to celebrate, engage and socialise with colleagues, suppliers and clients.
Etihad Medallion Room, Etihad Stadium Thursday 26 July 6.30pm – 10.30pm
TABLE OF TEN $1,850 INDIVIDUAL TICKET $195
Incorporating a three-course meal and fine wine, the evening recognises the Best New Product Awards and features great entertainment.
Book your tickets early – this event sold out in 2017
NETWORKING DRINKS Held at the iconic Cargo Hall on Melbourne’s South Wharf, just a few minutes walk from Exhibition, the Networking Drinks reception is the ideal place to network with clients and suppliers in a more social environment after day one wraps up.
Cargo Hall, South Wharf Wednesday 25 July 5:15pm - 6:45pm INDIVIDUAL TICKET $55
BOOK TICKETS securityexpo.com.au Gala Dinner Sponsor
Gala Dinner Entertainment Sponsor
RD BI LE Y B RL ILA EA VA ED A IT ES M S LI AS P
2018 ASIAL SECURITY CONFERENCE
INTELLIGENCE AND APPLICATIONS TO MITIGATE RISK AND VULNERABILITY The ASIAL Security Conference hosts a compelling program of renowned local and international experts, and academics with case study evidence on how to protect your business, brand reputation and vital assets along with mitigating risk and vulnerability.
It is your annual opportunity to receive fundamental updates from the organisations shaping today’s security landscape in a program carefully curated by the industry’s peak body. Learn proven strategies to tackle your security challenges with crucial intelligence on the ever-changing landscape.
HEADLINE SPEAKERS CONFERENCE
Caroline Sapriel Managing Director, CS & A International
Philip Dimitriu Director of Systems Engineering, Australia and New Zealand, Palo Alto Networks
Arye Kasten Chief Executive Officer, M.I.P Security
Danny Baade Head of Security, Gold Coast 2018 Commonwealth Games Corporation
Jim Fidler Director, Secure Events & Assets P/L
David Crompton-Guard Business Continuity Manager, Safety, Security & Resilience, Metro Trains
Dr Gavriel Schneider Group CEO, Risk 2 Solutions Group & Head Lecturer of Psychology of Risk, ACU
EXECUTIVE BRIEFINGS
Commander Geoffrey Smith Tasmania Police
SECURITYEXPO.COM.AU FOR FULL SESSION DETAILS Early Bird Conference Pass benefits: Save $100 off the cost of your Pass for a limited time only. Spend the night in luxury after celebrating and networking at the Gala Dinner. Go into the draw to win a night’s accommodation in the Crown Towers Melbourne in a King Deluxe Room*. *Terms and conditions apply. VIC and NSW only. See securityexpo.com.au for full details. NSW LTPS/18/23623
Lead Industry Partner:
SECURE YOUR PASS securityexpo.com.au Don’t miss out – Conference sold out in 2016 and 2017
CONFERENCE HOURS Wed 25 July 9:00am-5:00pm Thurs 26 July 9:00am-3:30pm Fri 27 July 9:00am-3:30pm
EVERYDAY CARRY There is a great deal of contention
In the case of security, no one
security will almost inevitably
potential threats and hazards,
around how to properly define
has ever suggested that such a
be the first on scene because,
observe and report and provide
the role of security personnel.
definition should be applied. In
more often than not, they are
customer assistance.
Often, they are referred to as
reference to security, the term
already there. That is the role of
To that end, we have put
first responders. However, many
first responder alludes to the fact
security. What security do upon
together a list of items that we
law enforcement and military
that security are often the first
arrival is a different matter.
believe all security officers need
officials bristle at this suggestion
people to respond to an incident
No one expects security to kick
to have as part of their everyday
because they automatically think
because, more often than not,
in a door and clear a room. In
carry, both on and off the job.
of the traditional definition of a
they are the first people on the
fact, to do so would be seen as
Because in reality, the job does
first responder as someone who
scene. Be it a major event, a
dangerous and foolish, but they
not end when the shift is over. If
is called to respond to an armed
shopping centre, a place of mass
are expected to render first
something needs doing, you get
conflict or terrorist situation.
gathering or a business facility,
aid, render assistance, detect
it done.
First and foremost, a good
PowerTac decided to launch
flashlight is every security
their own dedicated brand and
officer’s best friend. Most
the results have been nothing
of the work that security do
short of impressive. Over the
happens at night in dimly lit or
years, we have reviewed every
dark places. So, a good torch is
brand imaginable, from Surefire
essential. Furthermore, a great
through to LedLenser and
torch can be a fantastic personal
everything in between, and the
safety tool. It can be used to
PowerTac E20 compares with the
signal emergency services. It
best of them.
POWERTAC E20 1180 LUMENS RECHARGEABLE EDC LED FLASHLIGHT
can be used to stun attackers
everyday carry (EDC) Flashlight,
advantage you need to escape
packing performance,
or effect an arrest. However,
functionality, reliability
all of these things are only
and lifetime warranty like
possible with a good, high-power
PowerTac’s other higher end
flashlight. Which is the number
models. Use the magnetic tail-cap
one reason no security officer
to stick the E20 to any ferrous
should ever rely on his or her
metal to illuminate your field
mobile phone. Your phone is
of view. Both waterproof (to 2
often your primary source of
metres) and impact resistant, the
communication and is too easily
E20 is perfect for security duty.
damaged if dropped or knocked
Furthermore, the E20 produces a
out of your hand in a scuffle.
whopping1,180 lumens, making
Furthermore, few things drain a
it one of the brightest lights on
phone’s power faster than using
the market. However, the thing
it as a flash light. Too often, a
we love most about this light is
dead phone can mean a dead
that it is rechargeable! Many
security officer.
other tactical lights use CR123A
PowerTac are seen by many
78 // SECURITY SOLUTIONS
The E20 is the ultimate
and give you the split-second
batteries, which cost a small
as a relatively new player in
fortune to replace and require
the tactical flashlight market.
you to make sure you always
However, prior to developing
have a spare set or ten on hand.
their own range of high-quality
However, with the E20, just drop
tactical flashlights, they had been
the rechargeable battery into
designing and building products
the USB cradle and away you
for a wide range of well-known
go. For a rechargeable tactical
brands. Wanting to produce the
light of this build quality and
best product they could without
power output, this is amazingly
outside interference, in 2006
affordable. n
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER
securitysolutionsmedia.com/newsletter
For the latest news, products and events in the security industry
RITE-IN-THE-RAIN TACTICAL NOTEBOOK KIT To observe and report, recording
(or 50 sheets). Each sheet features
off, so you can take notes in any
Celsius. But let’s face it, if it is 120
accurate, contemporaneous notes
a universal pattern consisting of
weather conditions. No more
degrees outside, you are probably
and detailed information in any
horizontal lines and faint dotted
soggy notes with running ink.
more worried about your face
given situation is the one of the
vertical lines like a grid so you
primary roles of any security
can write notes or create accurate
notebook that can be used in the
style than you are about taking
officer. This is why we felt the Rite-
scaled drawings. Useful reference
rain, then you need a pen that can
good notes!
In-The-Rain Tactical Notebook Kit
material is also printed on the
write in the rain. Featuring a non-
was worthy of a place in our list of
back and inside covers. However,
reflective, flat black metal barrel,
together, the kit also features a
everyday carry items.
the best feature of this notebook
the No. 97 All-Weather Tactical
black CORDURA® fabric cover.
is that the pages, whilst being
Black Clicker Pen with black ink
These CORDURA® fabric covers
we chose the 946B-KITm, which
traditional paper, are treated with
writes on wet paper and upside
also feature a rugged zipper
consists of a 4x6″ spiral-bound
a patented coating that makes
down in temperatures from -30
closure and hold up to four
notebook with 100 universal pages
water and other liquids run right
degrees Celsius to 120 degrees
writing utensils. n
For the purpose of this article,
Of course, if you have a
melting off Raiders of The Lost Ark
To keep your pad and pen
ResQme Car Escape Tool with Glass Breaker and Seat Belt Cutter It is not uncommon for a security
for first responders (firefighters
officer to end up being the first on
EMTs, law enforcement agencies),
scene at a motor accident. In such
ResQme has become an essential
cases, people can often be trapped
safety solution for all safety-
in their vehicle. Time is short, you
conscious drivers.
need to act. What can you do? The ResQme Rescue and Escape
securitysolutionsmagazine.com
About the size of a key remote and just 2.93″ long, the ResQme
Tool with Glass Breaker and Seat
tool is the smallest car escape tool
Belt Cutter is carried by over three
that you can find. It is lightweight
million motorists worldwide and
and fits in the palm of your hand.
for good reason. This two-in-one
Its three conical cylindrical shape
safety and survival tool allows
makes it very distinctive. It comes
you to cut a jammed seatbelt
in a variety of trendy colours – but
and to break a side window in
we only care about black, because
your car. Originally developed
we are tough. n
SECURITY SOLUTIONS // 79
PRODUCT SHOWCASES
Multitasker Series 3 Multitools Every security officer needs a good
the plier head snap off when
multitool. From mending a gate to
actually putting the tool to use.
opening boxes, fixing equipment, or
The Multitasker Series 3 plier
conducting running repairs, there
heads feature aggressive teeth
are all manner of odd jobs and
towards the back, while getting
tasks that can present themselves
progressively finer towards the
to a busy security officer every
tip for more detail-oriented
single day.
needs. For added benefit and
Unlike other mass-produced
longevity, replaceable wire
multitools, Multitasker utilises ‘best
cutter blades are included. The
in class’ materials and production
pliers are maintenance free and
methods to achieve build quality
provide ultra-smooth pivoting.
that is head and shoulders above
• Knife/blade – A multitool knife
the competition. For example,
that is actually made to use.
instead of cost-saving investment
Built from tough D2 tool steel
castings, Multitasker employs
for strength and durability, it
computer numerical control (CNC)
holds a sharp edge longer. The
machining (and solid billet steel
3″ blade is easily deployable
material) to make the plier head
by its outside positioning and
and other major components. G10
thumb stud.
scales, commonly used for tactical
• Magnetic 1/4″ bit driver – The
knives, are selected to help ensure
Series 3 comes with a 1/4″
a slip-resistant gripping surface.
driver into which any of the
Aluminium-bronze washers and
bits that come with the tool
rust-resistant Ti CarboNitride (TiCN)
can be installed. Alternatively,
treatment on the pliers help provide
if you have custom needs, you
for maintenance-free operation.
can build your own kit as the 1/4″ driver will fit any 1/4″ bit
The Series 3 Multitasker features: • D2 tool steel pliers – CNC
you need. These are just some or our
machined from D2 tool steel,
favourite features of the
you will not need to worry about
Multitasker 3 Series but the list
a surprise failure and have half
goes on. n
Maxpedition Micro Wallet When you are on shift, you do not necessarily want to carry your wallet for fear of losing it, but you still need to carry some essentials. Enter the Maxpedition Micro Wallet. Made from 1000-Denier water-resistant and abrasionresistant lightweight ballistic nylon fabric, the Micro Wallet is truly a minimalist’s wallet, with an ID window, two internal card compartments and one external slip compartment. It is perfect for your security licence and debit card, some cash and a spare key. Measuring just 4.5″x0.5″x3″, some call this the ‘bikini’ of wallets. n
80 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry
instagram.com/securitysolutionsmag
MAXPEDITION MALAGA GEARSLINGER Of course, to carry all this and
always preferred a gearslinger
supplies. Pockets and pouches
on this bag, like all Maxpedition
more, you will need a bag ideally
to a backpack because, unlike a
accommodate everything from
equipment, is amazing. All
suited to the rigours of everyday
backpack, which requires you to
your wallet or ID, briefing notes
stress points are double stitched,
duty; something that can take a
take the pack off if you need to
and personal items.
bartacked or ‘box-and-X’ stitched
reasonable amount of gear without
access items, the gearslinger, as the
looking like you are heading off on
name would suggest, allows you to
and features a host of inner
to the use of YKK high-strength
a three-day patrol, which can give
simply sling the pack around from
organiser pockets, YKK zipper
zippers and zipper tracks as
you quick access to everything you
your back to your front, providing
closures, a drainage grommet, an
mentioned earlier, Maxpedition
need, when you need it and which
quick and easy access to pens,
adjustable cross strap for stability,
also use UTX-Duraflex nylon
is comfortable to carry both to and
notepads, documents, equipment
quick-release access for easy on
buckles for low-sound closures
from work as well as during your
and so on. Additionally, being
and off, a rear compartment that
and then coat the entire bag with
normal day-to-day activities. My
ambidextrous means that you can
can double as 50oz/1.5L reservoir
a Teflon fabric protector for grime
choice is the ambidextrous Malaga
switch the bag between shoulders
and three rows of 5-channel PALS
resistance and easy maintenance.
gearslinger from Maxpedition.
if you get sore, which is really
webbing plus four 2.25″x1″ loop
handy if you are carrying the bag
field points for patches.
I have been using Maxpedition gear for years and it has never, ever failed me. I have used it on
for long periods. The Malaga is packed with
The Malaga is tough as nails
Measuring just 10.5″x6.5″x14″
for added strength. In addition
So, there you have it, that is our bare essentials list of everyday carry items for security officers.
with a main compartment which
All these items and more are
duty, I have hiked across continents
added features, including both
is 10″x5″x13″, it has plenty of
available in person or online from
in some of the worst conditions
side- and Y-compression straps,
room. I carry a 13″ MacBook Pro,
Outdoor Tactical, a leading supplier
and Maxpedition has always seen
so you can load it up and strap
an iPad, various leads and cables,
of military, law enforcement and
me through.
it down to increase your carry
everything you see in this article,
outdoor products in Australia.
potential. There is plenty of take-
plus an umbrella, phone, jacket
You can find them at www.
ambidextrous gearslinger in
along room for your laptop, jacket,
and a multitude of other items.
outdoortactical.com.au or by
the Maxpedition range. I have
emergency gear and other essential
The Malaga is the largest
securitysolutionsmagazine.com
Lastly, the construction quality
calling 1300 511 000. n
SECURITY SOLUTIONS // 81
PRODUCT SHOWCASES
FLIR SAROS FLIR Saros™ is FLIR Systems’
but also reduces false positives
next generation outdoor security
with built-in advanced analytics,
product line that combines
expanding the outdoor perimeter
Accurate target detection and
overall affordability, FLIR Saros
multiple traditional perimeter
protection market for security
classification, to help reduce
opens the door to new business
protection technologies into a
alarm monitoring companies.
false alarms
opportunities, revenue sources,
unified solution. Saros delivers
A single FLIR Saros unit
with white light illumination • Advanced onboard analytics –
• Two-way audio and digital
With its high-performing security technologies and
and customer base expansion for
accurate, actionable alerts and
combines numerous security
input/outputs – Enables real-
the security channel. FLIR Saros
verified alarm data.
technologies, including:
time audio response
also increases crime prevention
The FLIR Saros camera line
• Multiple FLIR Lepton®
The FLIR Saros line of security
and cost-savings for the end user,
enables commercial businesses
thermal sensors – Provides
cameras was designed and
saving companies from losses
to implement state-of-the-art
the ability to deliver wide-
engineered with today’s
in equipment, merchandise
outdoor intrusion detection in a
area monitoring regardless
cybersecurity risks in mind,
and interruptions in business.
cost-effective manner. Traditional
of unfavorable lighting or
with end-to-end encryption for
Optimal applications for FLIR
perimeter security systems can
weather conditions
setup, web, and video streams,
Saros include car dealerships,
require substantial investment,
• High-definition optical
and configuration lockdown
construction sites, marinas,
both in infrastructure and in
cameras – Option of 1080p
after initial setup for increased
utility substations, and critical
ongoing expenses stemming from
or 4K resolution to realize
tamper prevention. FLIR Saros
infrastructure locations.
false alarms. FLIR Saros not only
accurate visual identification
also eliminates the need for
of intruders
port-forwarding, so devices
greatly reduces the cost of initial deployment by minimizing the amount of equipment required,
76 // SECURITY SOLUTIONS
• IR and visible LED illuminators – Ability to deter intruders
For more information visit flir.
are less exposed to remote
com.au/saros or call +805-690-
security attacks.
6600 n
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmedia.com/newsletter
World’s First Crash Tested Bi-Fold Gate Leda Security Products in conjunction with Cova Security Gates Ltd (UK) is releasing in Australia the world’s first Crash Tested Speed Gates (CSG 10640 and 10650). They have been designed to prevent vehicle borne terrorist attacks to a range of building or perimeter entrances. They offer
• Model 10650 crash tested to 7500kg (7.5tonne) @ 80km/h (50mph) PAS68: 2010 V/7500[N3]/80/90:6.8/9.1* *V/test weight [vehicle class]/speed [kmh]/angle:penetration/dispersion. The crash tested Hi-speed Bi-fold gates are a new product to
a 9 second unlock and open time, 11 second close and fully lock time
the Australian Market. Applications include: Government Buildings,
and deliver a continuous operation – 100% duty cycle.
Corporate Head Offices, Embassies, Industries, Military and Defence site
Benefits can be measured in terms of the gates’ test and impact
location, Construction and Mining sites. For more information contact your nearest LEDA sales office. Simply
ratings • Model 10640 crash tested to 7500kg (7.5tonne) @ 64km/h (40mph) PAS68: 2010 V/7500[N2]/64/90:2.2/0.0*
visit www.ledasecurity.com.au email sales@ledasecurity.com.au or call 1300 780 450 n
EKA CYBERLOCK What do you do when; • your ‘bullet proof’ master key system is compromised because of a lost key. • you want to provide secure audited access control to your employees or contractors in the middle of country NSW on a padlock that’s not connected to any network • you want real time reports of access to locks and revoke permission instantaneously ensuring you have the maximum security your assets need EKA CyberLock is a key-centric access control system perfect for any company assets. For utility companies, CyberLock can secure access to substations, reservoirs, equipment, and storage areas.
securitysolutionsmagazine.com
For the unsung heroes in supply chain, CyberLock can secure access to containers, depots, warehouses, and even gates. Data Centres, multi-level offices, manufacturing sites – if you have a mechanical lock, then EKA CyberLock is a perfect fit since the cylinders retrofit into existing door hardware, without any power or wiring needed. Featuring 350 different lock cylinders in the range, several CyberKey options, full audit reporting at both the CyberLock cylinder (1100 activities) and CyberKey (3900 to 12,000 activities depending on the CyberKey type), ability to manage user access rights, and customised reporting. The EKA CyberLock system
is fully backed by a global team of experts and has just released a new Bluetooth CyberKey and mobile app for smartphones allowing practically real time access privileges and audit logs. The beauty of the new mobile app, is that the Bluetooth CyberKey permissions can be uploaded on to the app whilst in a 3G/4G area and then the user can use the CyberKey in no
3G/4G signal areas, making this extremely attractive for remote site access management All your user data, audit logs, reports and more are hosted on Amazon Web Services (AWS) where you’re in control, making the EKA solution scalable to your needs. For more information visit www.ekasecurity.com.au or call 1300 722 311 n
SECURITY SOLUTIONS // 77
PRODUCT SHOWCASES
Southwest Microwave Introduces IP-Based Digital Microwave Detection Sensor Southwest Microwave has
mitigating risk of site compromise
deployed perimeter security
expanded its suite of intelligent
while preventing nuisance alarms.
devices, cameras and access
Model 336-POE is handled via
microwave sensor technologies
Proprietary algorithms recognize
control systems. The sensor
Southwest Microwave’s server-
with the introduction of the
the unique profiles of intruders
features an on-board Ethernet
based POE control module (CM-
INTREPID™ Model 336-POE
walking, running or jumping
server that supports multiple ports
POE) or through an available no-
Long Range Digital Microwave
through the detection field,
and sessions.
cost SDK that simplifies high-level
Link. This all-weather, IP-based
and offers enhanced crawl and
POE detection sensor makes
vehicle detection.
reliable perimeter security more
Designed for maximum
Graphical configuration of
Alarm monitoring for the
interface to third-party physical
each device and monitoring
security information management
of sensor status and control
(PSIM) or video management systems (VMS).
accessible than ever¬ – coupling
protection against sabotage,
parameters are handled locally
field-proven RF detection
Model 336-POE features heavy-
or remotely via an embedded
performance with secure network
duty components and packaging,
browser-based Installation
over Ethernet is an important
connectivity for increased
plus integrated random tamper
Setup Tool (IST), simplifying
feature of this sensor, the
system design flexibility and
switches to impede physical
administration and diagnostics.
primary benefit of the Model
simplified sensor configuration
abuse. Sensor electronics
and monitoring.
are shielded against extreme
an alarm when a legitimate
sources of electromagnetic and
target is detected, the sensor
336-POE is ideal for the protection
RF interference, and protected
alerts on enclosure tampering
Microwave’s INTREPID Model
of fence lines, open areas, gates,
against lightning induced surges.
and on changes to microwave
336-POE Long Range Digital
path alignment. A configuration
Microwave Link at Perimeter
With a range of 457 m, Model
entryways, walls or rooftop
Employing a single Ethernet
Along with instantly triggering
While DC power transmission
336-POE is its IP connectivity for communications. Learn more about Southwest
applications. The sensor employs
cable for data and power
security feature provides
Systems Australia Pty Ltd
advanced digital signal processing
transmission, each Model 336-
notification when changes to
stand #E83 at ASIAL Security
(DSP) to optimize discrimination
POE sensor operates as a unique
device settings are attempted,
2018 in Melbourne, visit www.
between intrusion attempts and
network element, seamlessly
ensuring that only approved
perimetersystems.com.au or call
environmental disturbances,
integrating with other IP/POE-
modifications are implemented.
+61 2 9150 0651. n
78 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry
instagram.com/securitysolutionsmag
New MOBOTIX Mx6 Camera Line With Integrated MxBus Functionality MOBOTIX recently launched its
Within a MOBOTIX video system,
structures as the corresponding
Indoor cameras c26B, i26B, p26B
second generation Mx6 camera line
Mx6 cameras without MxBus can
first- generation Mx6 cameras.
and v26B, as well as to add two
with integrated MxBus functionality
also process and use the data from
This means that all of the sensor
additional inputs and two outputs
(camera types x16B/x26B).
an MxBus module that is connected
modules, mounts and system
to the camera, an additional
to a camera within the same
components that they contain
MxIOBoard-IC is required.
on an extended camera board. This
network. For example, they can
can also be used for the latest
two-wire cable system developed
access the time signal from a GPS-
generation of MOBOTIX cameras.
by MOBOTIX is encrypted against
Box or activate their own recording
cyberattacks and expands camera
through MxMultiSense modules
models (x16A/x26A) are also
functions by including practical
placed at the ceiling of a room
available as corresponding second-
additional MOBOTIX modules such
via MxMessageSystem.
generation camera models with
The MxBus technology is based
as the MX-GPS-Box, a reliable time server for a complete video system.
The new x16B/x26B models feature the same exterior
All first-generation Mx6 camera
A corresponding T26B successor for the T25 Door Station camera is planned for release by the end of Q3/2018. For more information, visit www.
MxBus (x16B/x26B). In order to use
mobotix.com or call +61 2 8507
the MxBus functionality with the
2000 n
smartphone, tablet and PC.
great product for anyone looking
VIDEO DOORBELL 2 Doorbells might not seem like
Can they all afford it? Once again,
a particularly sexy product to
in the case of the Ring Video
feature in a professional security
Doorbell, it is a resounding yes
motion sensors so they can find
I liked it so much that I know
publication but in the reality
all around.
the ideal setting for their home.
have one both at the office and
They get instant alerts when
at home.
demand drives sales and sales
The Ring Video Doorbel 2
Ring lets users adjust the
determine profit. Therefore, as
represents the next-level in
motion is detected, allowing them
an installer, integrator, locksmith
simple security and convenience
to protect their property from the
or security operator, if you want
that works on any home or office
comfort of their smartphone.
good profit, you need good sales
and includes a rechargeable
which means you need products
battery pack.
that people want to buy. The Ring Video Doorbell ticks all the boxes.
The beauty of the Ring Video
Video Doorbell 2 works on a quick-release rechargeable battery, so users can charge
relatively easy to install given
their Doorbell without removing
see that just seem so obvious,
its wireless functionality. Once
the device. Sell them two
once you have seen them.
installed, customers can watch
battery packs, and they’ll never
However, coming up with the
over their home in crystal-clear
worry about power. However,
idea is only half the challenge.
1080HD video, (the original Ring
for those people who prefer
The other, equally important part
Video Doorbell was 720p) and see,
constant power, the Ring can also
of the equation is how well you
hear and speak to visitors from
be hardwired.
execute the idea. Does it work?
anywhere. With instant mobile
Does it work well. Can anyone
alerts and two-way talk, users
Mac and Windows 10 compatible,
use it. Does everyone want it?
can answer the door from their
The Ring 2 Video Doorbell is a
securitysolutionsmagazine.com
For more information visit www.lsc.com.au n
any home or office and includes
doorbell is that it is simple and
There are some products you
for solutions that sell themselves.
Compatible with iOS, Android,
SECURITY SOLUTIONS // 79
SPOTLIGHT
RISK MITIGATION STRATEGIES: A VARIETY OF LEVELS TO SECURING ENTRANCES TO PUBLIC AND PRIVATE BUILDINGS AND FACILITIES Security entrances selected for some of the world’s landmark public and private buildings and facilities will be featured at this year’s Security Expo (Stand G2) in Melbourne by security entrance and architectural revolving door specialist, Boon Edam Australia. Highlighted among exhibits at the Convention Centre Event from July 25-27 will be Lifeline Speedlane entrances and other technologies featured in this article by Gary Schreiber, a security entrance authority from the Boon Edam global network. Adding security cameras does not
to cope with a large numbers of
necessarily ensure security either
authorised people who have to
– it often just makes it possible
enter or leave a secured area in
to replay what happened after
a short space of time. These low
the security breech has actually
security systems are designed to
taken place. Employing security
slow down and organise the entry
officers is expensive, and these
point, while also serving as visual
guards may have a limited impact
deterrents to potential infiltrators
as they can be distracted, misled
and preserving a relatively open
or overwhelmed.
appearance for authorised people.
Security entrance solutions Holding a door or gate open for another person is a nice thing to do – but it’s certainly not good security
Typical applications include sports
provide the most effective way to
stadium entries, factory shift
allow passage of authorised people,
changes, transit terminals and high-
while acting as a deterrent or a
occupancy skyscraper buildings.
physical barrier for unauthorised omething we should
even safer way to secure their
people. More than that, security
never complain about
space and keep their valuables
entrances can provide companies
is that people are too
safe as well. Several solutions are
with valuable metrics to determine
nice. They let people
often considered such as: locks
the traffic flow, monitor tailgating
in behind them without a second
on doors or gates, access control
statistics, biometrics, and more.
thought in most cases. Most of us
systems to control electronic door
are not brought up to close a door
locks, security officers posted at key
entrances in terms of four
in someone’s face, so we hold a
locations and security cameras to
groupings to achieve a variety of
door open for them, or we let them
monitor access.
risk mitigation strategies: crowd
S
in behind us – especially if they
You can think of security
control, deterrence, detection,
authorisation or access device at
Mitigating Risk with Security Entrances
home. Good manners indeed, but
As with all things in life, all of the
Crowd Control
certainly not good security.
above-mentioned options have
The lowest level of security
their flaws. An access control
entrances, such as waist-high
security – at an entrance point – are
system can manage who can open
turnstiles, can count the number of
part of what makes an organisation
a door, but once it is open, anyone
people exiting or entering a facility,
aware that they need to find an
is able to freely enter or exit.
which helps staffed entrances
have forgotten their personal
These weakness in a company’s
80 // SECURITY SOLUTIONS
and prevention.
Crowd Control technologies include Boon Edam’s Turnlock turnstiles
securitysolutionsmagazine.com
individual’s face, iris or fingerprint as
Alastair Russell
their credentials.
National Sales Manager
With the integration of
T +61 1300 689 905
sophisticated near-infrared sensors
M: +61 (0)450 924 882
and optic technologies, such as the
E: michael.fisher@boonedam.com
StereoVision, these entrances can
W: www.boonedam.com.au
provide a rich assortment of metrics, including authorisation received, passage completed, tailgating / Deterrent technologies include Boon Edam’s Lifeline Speedgates
About Royal Boon Edam With work environments becoming
piggybacking rejections inbound or
increasingly global and dynamic,
outbound, biometric access control
smart, safe entry has become the
rejections, safety rejections, and
centre of activity in and around
Deter
when a tailgating or piggybacking
emergency button rejections. They
many buildings. Royal Boon Edam
The next level up in the security
incidence occurs. If this happens,
can also detect and send alerts for a
is a global market leader in reliable
entrance grading is designed with
an audio, visual and silent alarm
variety of events such as an object
entry solutions. Headquartered in
an increase in the deterrent factor.
are activated to alert the right
left behind.
the Netherlands, with 140 years of
These incorporate a full-height barrier
security personnel quickly. At this
Securing an entrance can take
that deters casual attempts to defeat
security level, speed gates, which
many forms, but the overall goal is to
have gained extensive expertise in
the system by means of climbing or
are particularly popular in corporate
establish risk mitigation strategies
managing the transit of people through
crawling. A full height barrier is often
reception areas or foyers, can be
to keep unauthorised entry at bay.
office buildings, airports, healthcare
installed at a perimeter fence line
equipped with presence detection
Security entrance solutions are the
facilities, hotels and many other
as a first layer of physical security,
sensors, and can provide accurate
answer for protecting a company
types of buildings. We are focussed
or an “exit only” to allow people to
metrics including the number of
while, at the same time, providing
on providing an optimal, sustainable
leave – but deter them from entering.
authorised personnel inbound and
critical metrics to further reduce
experience for our clients and their
Here, when integrated with an access
outbound as well as the number of
risk. At the end of the day, security
clients. By working together with you,
control system, metrics such as the
tailgating incidents or alarms. Certain
entrances are a good investment
our client, we help determine the exact
number of inbound and/or outbound
models equipped with dense sensor
for any organisation that needs to
requirements for the entry point in and
people, in addition to credentials, can
arrays and can be set up to alarm and
control access to any points in their
around your building.
be tracked.
count jumping or crawling attempts.
facilities. n
Detect
Prevent
Medium level security entrances rely
This is the highest level of security
on sensor technology to accurately
entrances available and it introduces
detect objects moving through an
true tailgating and piggybacking
currently is the Senior Vice President of
to ensure the security of your entry
opening, and can determine whether
prevention. We see products such
Sales in the United States of America.
and perimeter.
one or two people are passing
as high security doors and portals
through. In this way, they can detect
typically fall in this area. The
For Further Information,
solutions in this category are most
Please Contact:
experience in engineering quality, we
Please take a look at our range About the Author
of revolving doors, security doors &
Greg Schreiber has been with
portals, speed gates, tripod turnstiles,
Boon Edam for a total of 15 years and
access gates and full height turnstiles
You can find more news about Boon Edam on www.boonedam.com.au/news
suitable for facilities such as data centres, and for locations where security staffing is impractical. These security entrances not only serve as a visual deterrent, but also physically deny all forms of unauthorised entry completely. By integrating facial recognition analytics, it is possible to ensure that the person traveling through the entrance Detection technologies include Boon Edam’s Tourlock security revolving door
securitysolutionsmagazine.com
matches the credentials which have been presented. Biometrics serve the same function by utilising the
Prevention technologies include Boon Edam’s Circlelock high security portal
SECURITY SOLUTIONS // 81
STOPTALK
Dahua launches its first Deeplearning Powered NVR IVSS
Dahua Deep-learning Powered NVR - IVSS
82 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
L I K E U S O N FA C E B O O K For the latest news, products and events in the security industry
facebook.com/ssmaust
Dahua Technology, a leading
The integrated GPU module
solution provider in the global
and advanced deep-learning
Optimized GUI for easy operation
has lower complexity, better
video surveillance industry,
algorithms perform powerful
The all new GUI of IVSS features
cost-to-performance, and fewer
officially launched its first deep-
video structure analysis using
a unified design for local and
operator training requirements.
learning powered Network Video
metadata, achieving precise facial
remote users, greatly improving
As for users, IVSS improves
Recorder (NVR), offering advanced
analysis. Powered by a Dual-core
usability, and making it friendly
real-time monitoring efficiency,
Artificial Intelligence features for
Intel processor, IVSS supports
and familiar to project level
while providing an easy and
a variety of applications.
up to 4 channels of real-time
customers. The unified GUI also
efficient approach to pinpoint
facial recognition based on 20
helps significantly cut down the
when and where a person of
Intelligence technology enables
face libraries with 100,000 face
training cost and time of system
interest appeared. Dahua IVSS,
faster video content inquiry and
images each.
operators, and the addition of
which caught visitors’ eyes at
an independent PC client for
IFSEC International, showcased
Dahua’s powerful Artificial
rapid discovery of target objects.
For system integrators IVSS
This opens up new possibilities
Identify Intruders
remote access saves worries
great potential regarding
for danger prevention, along
IVSS supports a stranger detection
about browser compatibility and
the company’s AI technology
with real-time alerts for the video
mode, which triggers alarms when
plug-ins.
innovation. Dahua Technology,
surveillance industry.
a face not stored in the database
embracing the mission of “Enabling a Safer Society and
triggers an alarm when a face
Variety of applications and wide compatibility
is detected. IVSS also supports
AI-powered facial recognition and analysis
a Similarity Threshold, which that does not meet the minimum
IVSS is ideal for applications that
Quality, and Service” to serve
IVSS combines Deep-learning
similarity level. The Stranger
require entry/exit management,
partners and customers around
Algorithms, industrial grade
Mode and the Similarity Threshold
where knowing who is coming
the world.
GPUs, and advanced Network
were designed for critical
and going is a valuable asset,
Video Recorder into an all-in-one
infrastructure sites, where access
such as business parks, schools,
Artificial Intelligence server.
control is of vital importance.
banks, prisons and so on.
securitysolutionsmagazine.com
Smarter Living”, will certainly continue to focus on “Innovation,
For more information visit / www.dahuasecurity.com n
SECURITY SOLUTIONS // 83
2018 #SecurityAwards Call for Nominations g By
Anna Ho, Marketing and Communications Officer, Australian Security Industry Association Limited (ASIAL)
T
he vital role performed by Australia’s private security industry will be recognised later this year at a special awards ceremony in Sydney organised by ASIAL. The 2018 Australian Security Industry Awards for Excellence and Outstanding Security Performance Awards will recognise excellence in the security industry. Nominations are open to all and provide an opportunity to recognise individuals, including frontline security personnel who have gone beyond what could reasonably expected of them in providing a level of service that exceeds client’s expectations. Likewise, organisations and teams who have demonstrated leadership and innovation will also be recognised. Judging of the awards will be undertaken by an independent panel of judges, that includes Damian McMeekin, Managing Director of CT Intelligence & Insight; John Adams, Editor, Security Electronics and Networks Magazine; John Curtis, Director, IPP Consulting Pty Ltd; Michael Walker, Senior Manager, Security Services, Facilities Management, Reserve Bank of Australia; Rachell DeLuca, Senior Security Consultant, ARUP and Vlado
Damjanovski, CCTV Expert Specialist and MD, ViDi Labs. Nominations open 1 July and close 31 August. Winners will be presented at a special awards ceremony to be held at Sydney’s Doltone House Hyde Park on Thursday 18 October 2018.
2018 AWARD CATEGORIES INCLUDE: • Individual Achievement – General • Individual Achievement – Technical • Gender Diversity • Indigenous Employment • Special Security Event or Project – Under $500,000 – Over $500,000 • Integrated Security Solution – Under $500,000 – Over $500,000 • Product of the Year – Alarm – Access Control – CCTV – Camera – CCTV – IP System/Solution – Communication /Transmission System
– Physical security (bollard, gate, barrier, lock)
AWARD CATEGORIES INCLUDE: • Outstanding In-house Security Manager/ Director • Outstanding Contract Security Manager/ Director • Outstanding Security Team • Outstanding Security Training Initiative • Outstanding Security Partnership • Outstanding Security Officer • Outstanding Female Security Professional • Outstanding Guarding Company • Outstanding Security Consultant • Outstanding Security Installer • Outstanding Information Security Company For more detailed information on the award nomination criteria and process visit www.asial.com.au/ securityawards2018
RECOGNISING EXCELLENCE
#securityawards
2018
AUSTRALIAN
Security Industry
2018
Organised by:
The Australian Security Awards Ceremony & Dinner The night is an opportunity to celebrate excellence and innovation in the security industry, and network with likeminded security professionals. www.asial.com.au/securityawards2018 Date: Thursday 18 October 2018 | Venue: Sydney’s Doltone House Hyde Park Entertainment Sponsor:
2018
Lead Dinner Sponsor:
VIDEO DOESN’T HAVE TO BE EXPENSIVE TO BE EFFECTIVE
With years of experience across hundreds of clients, let us show you how we can help you generate more business than ever before. enquiries@interactivemediasolutions.com.au