Security Solutions Issue #114

Page 1

A U S T R A L A S I A’ S L E A DI N G S E C UR I T Y R E S OUR C E F O R BU S I N E S S A N D G O V E R N ME N T

OCT 2018 ISSUE 114

HOW TO CREATE

A CYBER SAFE

SURVEILLANCE SYSTEM


PA S 6 8 & I WA T E S T E D G U A R A N T E E D

W W W. E


25 YEARS OF BUILDING SMART AND SECURE OUTDOORS E zi Security Systems designs, manufactures and installs a premium range of perimeter security solutions for both vehicle and pedestrian access control, with specialised expertise in Hostile Vehicle Mitigation and protection of Crowded Spaces. With core competence established over 25 years, Ezi Security Systems provides innovations of our own invention, and via alliances with undisputed world leaders in our field, deliver sophisticated solutions at the leading edge of global technology. Over the past 5 years the world has changed dramatically. In collaboration with our strategic business partners, Ezi has responded with focus, mitigating hostile vehicle threats with our Crowded Spaces range of products. Ezi offers permanent solutions for risk categories from low to extreme, as well as rapid deployment products for crowded spaces and public events, such as the Impakt and Rapid Defender products.

Z I S E C U R I T Y. C O M . A U

All Ezi Security Systems Hostile Vehicle Barrirer solutions have been rigorously crash tested and certified to meet requisite ASTM, IWA and PAS 68 stipulations. Along with our global partners, Ezi Security Systems actively collaborate in the development and deployment of contemporary strategies such as VAAW (Vehicle as a Weapon) mitigation, deploying whole of environment solutions. Ezi have solutions to meet your very highest security requirements whilst maintaining an aesthetically compatible solution for your site. You can be confident that when serious security is your requirement, you need look no further than Ezi. We stand ready to be of expert service in an ever evolving environment, as global security risks increasingly demand local solutions.

1300 558 304 11 Cooper Street Smithfield, NSW, Australia 2164 sales@ezisecurity.com


ISSUE 113

FEATURES

40

CONTENTS

78

50

24 36

28

COVER STORY

In this issues cover story, we look at this topical question which runs deeper than simply questioning the cyber safety of the cameras themselves. Can a camera be used to spy on the very people it purports to protect? Can it be responsible for transmitting data to external parties such as a foreign government? In the modern world of IoT, where data is constantly being transmitted between IP-enabled devices, what can you do to protect your security systems?

62

24 RECOGNISING BRAVERY AND COMMITMENT

This year’s Australian Security Medals saw some of the most deserving and distinguished members of the security community recognised for outstanding acts of bravery and commitment to the security profession. Learn more about their amazing stories and become inspired to nominate a colleague for 2019.

44 UNDERSTANDING CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN

The manipulation of the built environment to reduce the opportunity for crime, disorder and the fear of crime is referred to as crime prevention through environmental design (CPTED), but does it really work?

48 THE WORLD'S MOST PROTECTED ARTEFACTS What does it take to protect some of the most prized and precious artefacts in the world?

64 REVERSING THE EFFECTS OF TERRORISM

When serving terrorism has become an ‘All In The Family’ affair, how can we recover children and spouses lost to the thrall of ISIS?

REGULARS 06 LETTER FROM THE EDITOR 08 LEADERSHIP

Are you asking the right questions as a leader?

10 CYBER SECURITY

Why traditional back-ups have become old-school?

12 MARKET ANALYSIS

We present a snap shot of the CCTV market in Australia and New Zealand.

14 HUMAN RESOURCES

Greg Byrne examines how we can better manage aging workers in the Australian security industry.

16 RISK MANAGEMENT

What is a Socio-Technical System and why is it important for risk management?

20 LEGAL

What is a Socio-Technical System and why is it important for risk management?

22 THINKING ABOUT SECURITY

Will security as we know it still exist a decade from now?

32 OPERATIONS

Richard Kay examines the normal responses that can occur to abnormal situations in order to help security staff better prepare for stressful situations.

36 BUSINESS

We look at ten useful Linkedin Tips you won’t find in the help pages?

52 AVIATION SECURITY

Is it time for another review of the aviation security sector?

56 ACCESS CONTROL

What role will Access Control play in Smart Building?

60 PROFESSIONAL DEVELOPMENT

We present the second of a two part special on behavioural interviewing.

72 ESSENTIAL SAFETY TOOLS 76 PRODUCT SHOWCASES 80 SPOTLIGHT 82 SHOP TALK

Company announcements from within the industry.

24 EVENTS CALENDAR

A look at upcoming industry events.

4 // SECURITY SOLUTIONS

securitysolutionsmagazine.com



FROM THE EDITOR FROM THE EDITOR www.securitysolutionsmagazine.com

EDITORIAL www.securitysolutionsmagazine.com

EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon

Jane Anderson, Christopher Bergey, Jacque Brittain, Jason Brown, Greg Byrne, Ryan Burnyeat, Garner CONTRIBUTORS Clancy, Jim Dearing, Kevin Foster, LukeKevin Frost,Foster, Alex Garry Barnes, Jason Brown, Greg Byrne, Ganin, Tony Elly Johnson, Richard Scott Kay, Richard Kay,Jacques, Steve Lawson, Justin Lawrence, Justin Lawrence, Steve Lawson, Leanne Monchuk, O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Tim Rippon, Adrian Anne Speckhard, Anne Speckard, AlexShajkovci, Sidernko, Ardian Shajkovci, Ami Don Williams Toben, Simeon Votier

ADVERTISING ADVERTISING

Keith KeithRozairo Rozairo PHONE PHONE 1300 1300300 300 552 552 EMAIL EMAIL keith@interactivemediasolutions.com.au keith@interactivemediasolutions.com.au

T D

he recent media attention around

vendors and end-users with regard to modern

the security of CCTV cameras has,

security systems and software and examine

if nothing simply reminded oes Australiaelse, really take security us that cybersecurity has claims well and seriously? Yes, Government

what can be help minimise potential Australian’s do done have atovery relaxed attitude Obviously, nothing foolproof todangers. security because they believe,isrightly or or

truly grown beyond the domain of IT networks. to, and some of the corporate This is not news. It demonstrate has been a constant sector a passingsource

impervious towill a cybersecurity Just wrongly, that “it never happenbreach. here”. This financialwe institutions, whoremains collectively is ask a sentiment can only hope true.

of discussion within the security interest from time-to-time, but whatindustry of the for some years If it has IPstreet? address, average man now. and woman onan the Dothen we it

probably cybersecurity However, as spend the oldmore axiommoney states,on one should than any other always expect thecommercial best but planmarket for thesegment. worst and

is vulnerable. So, whyseriously the sudden honestly take security or doattention? we, as a

And yet, they still occasionally fall victim to prepare to be surprised.

What has Put simply, the mainstream nation, justchanged? pay lip service to the idea

cybersecurity simple reality is, as Of course, oneattacks. should The not have to rely upon

media has found a new angle it can use to of security?

technology evolves in response customer some form of devastating incident totooccur in

create sensationalism thusbe sell papersthat or As we enter 2018, weand should thankful

demands forpeople more to and more complex features order to force take security seriously.

commercial spacesuffered on newsaprograms, or simply Australia has never major terrorist

and is functions, each new a product’s There a great deal that theversion securityof industry

incident likes of 9/11, the Boston bombings, bolster the their viewer numbers and ratings.

can do to educate business community about firmware and/orthe software introduces the risk

the bombings of July 2005 in–London the Yes, I sound like 7, a sceptic that is or because

the of taking security seriously. ofbenefits a potential vulnerability. Just lookInatpast some

terrorist of October 2002 I am andattacks for good reason. 12, That said,inI Bali. will save

issues Security Solutions Rod of the world’s leadingEditor-At-Large computer operating

PHONE 1300 1300300 300 552 552 PHONE EMAIL admin@interactivemediasolutions.com.au admin@interactivemediasolutions.com.au EMAIL

However, as a result, Australian journalism community you the rant about the investigative

Cowan has written about howwe security can act as systems. This is the price pay for continued

has complacent with regard thatbecome fails atsomewhat even the most basic levels to

a differentiator for business and give companies evolution, whether it be in computers, cars,

ACCOUNTS ACCOUNTS

to security. I often hear many of ourtoreaders who produce any empirical evidence support its are security managers within large corporations claims. The ship has sailed and, quite frankly,

a competitive edge. building automation or security. That said,

PUBLISHER PUBLISHER

comment onthat the poor differences between attitudes it appears standards in journalism to security in Australia and America, where they have become the accepted norm these days.

If weare have learned anything from tragic there strategies that end-users and events that have occurred globally in minimise recent manufacturers can adopt to help the years, it must thethat world changed – threats andbe wethat hope wehas have provided

often to travel and work. According to many Whathave is worthy of discussion is how end-users security managers, Americans understand thatraft can better understand how to mitigate the

permanently – andinsights. we cannot keep pretending some valuable that itPlease has not. 9/11 was not an isolated incident take a read through this issue’s cover

terrorism is a clearrisks and present and a of of cybersecurity arising danger from the use fact of daily life and thus, they treat security IP-based digital security systems.

and if groups like ISIS have such story and, as always, we their valueway, your feedback. attacks will become much more frequent. There Head over to Twitter and share your thoughts

attitude that makes us much more vulnerable

community that will enable Australian’s to be

to attack.

safe and secure. And the work must begin with

DESIGN DESIGNAND ANDPRODUCTION PRODUCTION

JonathanRudolph Rudolph Jonathan PHONE 1300 1300300 300 552 552 PHONE EMAIL graphics@interactivemediasolutions.com.au graphics@interactivemediasolutions.com.au EMAIL

MARKETINGANDAND SUBSCRIPTIONS MARKETING SUBSCRIPTIONS $62.00AUD AUDinside inside Aust. Aust. (6 (6 Issues) Issues) $62.00 $124.00AUD AUDoutside outside Aust. Aust. (6 (6 Issues) Issues) $124.00

PHONE 1300 1300300 300 552 552 PHONE EMAIL accounts@interactivemediasolutions.com.au accounts@interactivemediasolutions.com.au EMAIL

ABN 56 606 919463 ABN 561,606 Level 34 919463 Joseph St, Blackburn, Victoria 3130 Level 1, 34 Joseph St, Blackburn, Victoria 3130 PHONE 1300 300 552 PHONE 1300 300 552 EMAIL enquiries@interactivemediasolutions.com.au EMAIL enquiries@interactivemediasolutions.com.au WEBSITE www.securitysolutionsmagazine.com WEBSITE www.securitysolutionsmagazine.com DISCLAIMER DISCLAIMER The publisher takes due care in the preparation of this

The publisher care in theprecautions preparationand of this magazine andtakes takesdue all reasonable magazine takes alleffort reasonable precautions andof makes all and reasonable to ensure the accuracy makes all contained reasonable to ensure the of material ineffort this publication, butaccuracy is not liable for any mistake, misprint omission. The publisher material contained in this or publication, but is not liable does not assumemisprint any responsibility or liability for any for any mistake, or omission. The publisher loss or may result from any inaccuracy does notdamage assumewhich any responsibility or liability for any or omission in this publication, orfrom fromany the inaccuracy use of loss or damage which may result information contained herein. The publisher makes or omission in this publication, or from the use of no warranty, express or implied with respect to any of the information contained herein. The publisher makes no material contained warranty, express orherein. implied with respect to any of the material contained herein. The contents of this magazine may not be reproduced in ANY form of in this whole OR in part without The contents magazine may not beWRITTEN reproduced permission the publisher. includes in ANY formfrom in whole OR in partReproduction without WRITTEN copying, photocopying, translation or reducedincludes to any permission from the publisher. Reproduction electronic medium or machine-readable form. copying, photocopying, translation or reduced to any electronic medium or machine-readable form.

and security workers with the due respect. In In this issue’s cover story, we look at contrast, they believe that Australian’s have a some of the challenges facing manufacturers, very blasé attitude towards security and it is this

is a great deal more work to be done to ensure on the issues around cybersecurity with that we create the kind of effective security @SSM_Media. n culture within organisations and the broader

In my opinion, having recently travelled

security professionals. Let’s make 2018 the year

through Egypt and Jordan, they are correct.

that Australia begins to take security seriously. n

WRITTEN CORRESPONDENCE TO: 1, 34 Joseph St, Blackburn, Victoria 3130 WRITTEN TO:  LevelCORRESPONDENCE

PR O

SECURIT Y

PR

RALIA LTD UST FA RALIA LTD

Official Official Partners Partners O rigin a l Siz e Original Size

PR O

Y P R OV RYI TP R O V I D I D E E RCIUT

CU

SE SE

SECURITY

N

USTRA F SAT R A L L I A A OU IA

STRALIA LTD AU OF STRALIA LTD AU

SECURITY

O C I AT I ASS ON O C I AT I ASS O

RS

SPAAL SPAAL

OF

OF

PR O

RS

SSOCIAT RS A IO DE N SSOCIAT VI RS A IO DE N VI

D LT D LT

SECURIT Y

SSOCIATI ON O SSOCIATI RS A ON DE O VI

RS A DE VI

UST FA

O

1300 300 1, 34552 Joseph St, Blackburn, Victoria 3130 Level  enquiries@interactivemediasolutions.com.au 300 552 1300   enquiries@interactivemediasolutions.com.au

blue colour changed to this colour green. blue colour changed to this colour green.

COPY/ARTWORK/TYPESETTING APPROVAL COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE Please proof read carefully of this material BEFORE signing your approval to print.ALL Please paycopy/artwork/typesetting special attention to spelling, punctuation, signing your approval numbers, to print. Please pay special to spelling, punctuation, dates, times, telephone addresses etc, asattention well as layout.It is your responsibility to dates, times, telephone numbers, addresses etc,Press as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman assumes no responsibility our attention anybeen corrections. Minuteman Press assumes responsibility for bring errorstoafter a proof has authorised to print and print re-runsno will be at your cost. for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................ Signed.................................................................. Date........................

// SECURITY SECURITY SOLUTIONS SOLUTIONS 46 //

John Bigelow John Bigelow Editor Editor

securitysolutionsmagazine.com securitysolutionsmagazine.com


SECURE YOUR DATA & EQUIPMENT

A data enclosure is your last line of defence, so it needs to be strong enough to stop unauthorised access. CER TIF IE CLASS C

D

The MFB range of Class B and Class C enclosures are purpose built frames fitted with key locks and boltwork approved by the Australian Government Security Construction and Equipment Committee (SCEC)

INATION LOCK MB S CO

All enclosures are fitted with tamper evident cable entry systems, high impact clear polycarbonate panels on doors, secure venting systems and certified combination locks. CLASS B

An alternative product, the MFB range of High Security enclosures provides a lower level of security and is not SCEC approved. Effectively construction methods mirror the Class B and Class C series, however the doors are fitted with a cheaper bilock keying system. Also additional flexibility with the design regarding cable entry encourages effective quick installation and high volume data cable installations. With over 50 years in the business, and backed by the SCEC approval for manufacture, these Australian built 19”rack mount enclosures provide peace of mind in relation to the security your

data needs.

DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS

www.mfb.com.au

VIC (03) 9801 1044 / sales@mfb.com.au

AUSTRALIAN MADE MAKES AUSTRALIA NSW (02) 9749 1922 / sydney@mfb.com.au

fb.com/mfbproducts


LEADERSHIP

THE ART OF ASKING THE RIGHT QUESTIONS BY BOB ANSETT

sking employees the

perspective on the issue that you

effective when seeking information

simply respond and react; they

right questions is

are seeking information about.

from customers or clients.

are expected to take initiative and

indeed an art and

Clever questioning enables you to

requires special skills

connect with your customers and

should be designed to learn the

because not only do you need to

employees in a meaningful way.

other person’s way of thinking and

historic role of the manager, who

consider the content of the

Thoughtful questions can take

gather information – yet we so

traditionally relied on getting

question but how best to get the

the sting out of feedback or can

often fall into the habit of asking

results through the delegation of

most frank and honest response.

even be used to plant your own

leading questions to influence

tasks to his or her subordinates,

This usually requires some

ideas in the mind of customers

others towards our way of thinking.

and empirical evidence has

awareness of the personality and

and employees.

Sometimes this can be a useful tool

revealed that this common lack

in broadening a person’s outlook on

of leadership can greatly impact

A

general attitude of the person you

About 50 per cent of good

Remember, meaningful questions

generate action. This is a far cry from the

are seeking information from, as

communication comprises good

a particular issue, but as a general

on morale, productivity and

this will help shape the tone of the

listening; notice what they say

rule, it should be used sparingly.

employee motivation.

question and even the time and

as well as how they say it, as well

place for asking the question.

as what they value and what is

overlooked in assessing leadership

applying emotional intelligence and

The most effective questions

Questioning skills are often

Good leaders are skilled at

important to them. Listening

qualities but this is a mistake,

use it to gets the best results from

are open-ended and not leading,

requires your silence while the

as good leaders intuitively ask

their teams. The ability to frame

however, it is a common human trait

question is being answered, as well

searching questions, which

questions derived from observing

to ask leading questions in order

as offering them sufficient time to

open the door to knowledge

emotions and behaviour is a very

to influence others to subscribe

properly answer the question.

and understanding.

powerful tool.

to our way of thinking. This is

I found the best way of obtaining

Business owners today are

The art of asking the right

an ineffective way of obtaining

information from my staff on a whole

looking for leadership qualities in the

questions has never been more

information and it will often turn

range of issues was to question

candidates who apply for managerial

topical than it is today. In order to

the respondent off the question.

them on their turf rather than in my

positions in their organisations. It

maximise your knowledge about

Meaningful questions are designed

office, which tended to make things

is no longer sufficient to employ

your customers, competitors

to learn from the other person,

more formal. Responses to questions

the archetypical manager of years

and organisational culture, you

rather than influence.

by an employee seemed far more

gone who essentially gets things

must always be seeking accurate,

intuitive and relaxed when they

done by delegating to his or her

reliable and timely input from your

should you start your question by

were in a familiar and comfortable

subordinates. The expectation today

employees, and this can be achieved

revealing your opinion or personal

environment. This same principle is

is that managers can do more than

by asking the right questions. n

Under no circumstances

8 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


The Cobalt is an innovative low voltage motor driven door lock for swing doors. It has been designed to secure double acting doors and addresses the two biggest issues in door locking; the ability to align a misaligned door and the ability to release when requested, even with excessive load on the door. The Cobalt successfully overcomes these issues and offers the user an array of other features. To learn more about our complete range of smart and secure access solutions, contact dormakaba.

T: 1800 675 411 www.dormakaba.com.au

More than just a lock


CYBER SECURITY

WHY TRADITIONAL BACKUP IS OLD SCHOOL! BY TIM RIPPON

I

n today’s online

solution, ask yourself the following:

world, with

1. What options are available

cyberattacks

when a backup drive

In simple terms, the RPO is

becoming

becomes corrupted?

how much data you are willing to

available that you can easily

lose, whilst the RTO is how much

rollback to so that you can

downtime you can withstand.

recover prior to the data being

increasingly commonplace,

2. When did a test to restore

securing corporate data is very

information from one of the

important for every business.

backup media last occur?

6. Have automated snapshots

corrupted or lost.

data, others do not and that is even

business if critical data cannot

Consider Following these Steps

more of a problem. Having an

be restored?

By following the steps below you

machine (VM). This effectively

4. How long will it take to restore

may well improve the current

reduces your RTO significantly.

significantly reduce the impact of

data and be made available to

backup approach and be able

Combined with snapshots

cyberattacks or natural disasters

the business?

to reduce both the RPO and

mentioned above, this enables

RTO significantly:

rapid rollback to a restoration

1. If you have not already done

point prior to data corruption/

Whilst most businesses backup

effective data backup program can

and enhance the technology resilience in your business. Traditionally, data backup

3. What will be the impact to the

5. How much data could be lost and what is the impact on the reputation of our operations?

so, move to a fully automated

7. Have the ability to recover your environment onto a virtual

loss occurring.

has an integrity focus in the

Having data backed up is great;

backup process. This removes

confidentiality, integrity and

however, it is only the first step to a

any dependence on human

Where to from here?

availability (CIA) triad.

successful recovery. If this is critical

interaction to backup data sets.

A conversation with your

Those who only do regular

business data, then you really need

2. Ensure you regularly test a

infrastructure staff or local IT

backups are living with a false

to recover and be up and running

recovery of your current backup

technical contact can help identify

sense of security as the information

very quickly, preferably in minutes,

media: this is key to ensuring

areas for improvement to ensure

may not be able to be restored

not hours or even days.

the integrity of the data you

your business can get back and

plan to recover from should a

operational post-crisis, in the

major disaster occur.

shortest possible time. Additionally,

and if restored this may not occur in a timely manner, resulting in significant reputational fall-out. Some amazing and affordable

Introducing Recovery Time Objective and Recovery Point Objective

3. Do not just keep your latest

there are some great solutions on

copy of backup media. Should

the market that ease the burden of

technologies exist to mature our

The last two questions above open

that become corrupted too, then

restoring data when needed most.

approach to backup way beyond

up a very worthwhile discussion

you have nothing to restore!

Remember to promptly get things

the well proven grandfather-father-

about two key availability topics:

4. Investigate secure cloud-based

in place, so that your business can

son backup routine.

1. Recovery Point Objective (RPO):

backup services, being mindful

be back up and running! n

the point to which information

of any security requirements.

the maturity bar by moving from a

used by an activity must be

This is particularly useful if

Tim Rippon is the founder

backup-only mindset to including

restored to enable the activity

a site-wide loss occurs (for

and director of elasticus, advising

a business continuity concept to

to operate on resumption (aka

example, fire, flood or major

Australian-based executives on

improve availability. Returning the

maximum data loss).

natural disaster), providing the

how to best manage cybersecurity,

opportunity to recover critical

disaster recovery and business

information at an alternate site.

continuity before a major disaster

This article aims to help raise

system to an operational state in a

2. Recovery Time Objective (RTO):

timely manner is equally important,

the period of time following an

as is having the right data to

incident within which a) product

recover. This approach introduces

or service must be resumed, or

backup intervals. If the current

Master of Information Security (ISO

the availability focus, along with

b) activity must be resumed, or

backup of data occurs once per

27001), certified Master of Business

the integrity focus, in the CIA triad.

c) resources must be recovered.

day, then consider reducing it to

Continuity (ISO 22301) and Lead

every few hours. This effectively

Cyber Security Manager (ISO 27032)

5. Where possible, reduce the

or crisis occurs. He holds a certified

Consider the Following

This can be best summarised in the

reduces your RPO from 24 hours

from PECB. Tim can be contacted via

When enhancing your data backup

following table:

down to a few hours!

mobile 0417 036 026.

10 // SECURITY SOLUTIONS

securitysolutionsmagazine.com



MARKET ANALYSIS

CCTV MARKET OF AUSTRALIA AND NEW ZEALAND BY TIM RIPPON

T

his time we are

example, we do not see Samsung

mention each of the brand and if this

exploring the security

(Hanwha Techwin) in the list of

number is less than 20 – all those

market of Australia and

popular brands.

brands were combined into the ‘others’

New Zealand. The main

In order to build this report,

group. After this, we ended up with 21

players are still the same: Axis,

we took information about 3,611

Hikvision, Dahua. However, as you can

companies and several hundreds

notice, this market differs a lot from the

of CCTV brands. Then we checked

chart for Australia and New Zealand,

picture in Europe and the US; for

how many companies use or at least

August 2018.

popular brands and their shares. Here is the CCTV brand popularity

On the left, we have a pie chart, showing the share of each brand. On the right, we have the number of companies who offer the listed equipment. To view more brands, companies and so on, check the source at Global market for surveillance and security equipment. n

12 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Intelligent security solutions from Dahua Technology Discover Dahua, a world leader in video surveillance, offering high value total security solutions to safeguard assets, communities and infrastructures.

now available at Hills! Unified Management Platform Video Surveillance

Unified UnifiedManagement Management Platform Platform Video VideoSurveillance Surveillance

Unified Management Platform Video Intercom Video Intercom

Video Surveillance - Advanced video collecting and analysing - Wide coverage w/o blind angle

Video Surveillance Video Surveillance

Unified Management Platform Unified Management Platform

- Advanced video collecting and analysing - Advanced video collecting and analysing - Wide coverage w/o blind angle - Wide coverage w/o blind angle

- High reliability with low running cost - High reliability with low running cost - Scalable and customisable - Scalable and customisable

HSS0031-July18-version 1

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au

facebook.com/HillsLtd/ CONNECT

E N T E RTA I N

SECURE

- High reliability with low running cost - Scalable and customisable

Video Intercom Video Intercom - Support both IPIP and Analogue - Support both and Analogue - Attractive design - Attractive design

-


HUMAN RESOURCES

MANAGING AGEING WORKERS IN THE AUSTRALIAN SECURITY INDUSTRY BY GREG BYRNE

A

ustralia’s ageing

raising the age it can be accessed

they get older and cannot hold

older guards and employees.

workforce is having a

from 65½ to 67 by 2023 and to 70

their own at the door of the

This could also include training

profound effect on all

by 2035. However, provided you

licensed premises or run as fast as

for those working beside

industries, including

are permanently retired, you are

the younger guard.

the Australian security industry.

able to access your superannuation

Although it is the responsibility of

at age 60.

owners and managers of security

So, what does the ageing

Chris Anderson, CEO and

other generations. 3. Create opportunities and

founder of Silvertrac Software,

conditions for older guards.

states older guards tend to be more

This could mean redesigning

companies to develop strategies, it

population mean for employers in

suspicious of change, do not trust

position descriptions, job

is the also the role of human

the Australian security industry?

so readily and are more fearful

sharing, working from home

of job security due to a lack of

and phased retirement

understanding of technology.

plans, such as part-time

resources (HR) to assist and guide,

For the first time in our history

strategically and tactically, security

there could be five generations

companies in developing plans and

working together. This large age

responses to this issue.

span on one site has the potential

of what is emerging as a larger

of creating all sorts of management

issue for the Australian security

retirement awareness

and intergenerational conflict.

industry. To assist the HR manager

sessions, which could include

According to the 2016 census, nearly one in every six people in Australia (16 percent) were aged

How does a supervisor manage

These issues are just a snapshot

to support their managers and

65 and over. By the end of the next

a work site where not all guards

decade, it is expected that one

are physically equal, yet the

strategies are proposed:

in three Australians will be aged

expectations and pay are? Where

1. Undertake an age audit and

over 55.

one guard has superior speed,

succession plan – monitor

team leaders, the following

work arrangements. 4. Construct and deliver

financial counselling. 5. Re-skill and purchase tools that are more suited to older workers. 6. Introduce change slowly,

agility and strength and is working

the age of staff, especially in

take guards off-site to train

Government is playing its part. The

with a guard(s) who has age-related

areas that have traditionally

them and, where necessary,

Government recently announced

decline in speed, physical strength

been the domain of younger

force older guards to adapt

the provision of $17.4 million to

and cognitive ability. Further,

workers, such as crowd control,

establish the Skills Checkpoint

mature-aged workers tend to want

door and licensed premises.

for Older Workers program,

flexible working arrangements

Plan for future resourcing

implementing benchmarks

and $189.7 million to support

so they, for example, can care for

needs and the transfer of skills

for older guards that they

mature age workers adapting to

ageing parents or to transition

and knowledge.

understand and are realistic.

the transitioning economy. The

to retirement.

To a point, the Federal

Government is also easing the burden of the age pension by

14 // SECURITY SOLUTIONS

A security guard cannot simply be sacked or dismissed because

and change. 7. ASIS International also suggests

2. Develop mentoring/coaching programs to promote skill transfer between younger and

Greg Byrne is the CEO and founder of Multisec Consultancy.

securitysolutionsmagazine.com


YO U R AC C ESS TO REVO LUTION

FlowMotionÂŽ

For more information | 1300 364 864 | info@magnetic-oz.com | www.flowmotion-access.com |


RISK MANAGEMENT

WHAT IS A SOCIO-TECHNICAL SYSTEM AND WHY IS IT IMPORTANT FOR RISK MANAGEMENT? BY KEVIN J. FOSTER

Historical Context of Socio-Technical Systems

and operated the technology.

to improve the reliability of an

used the term

Unsurprisingly, labour disputes

engineered system. During the

socio-technical

The socio-technical concept first

were frequent. Weber’s principles

1960s, the idea of redundancy of

system for a long

arose in about 1949 during the

of bureaucracy and Taylor’s concept

functions developed, which led

time; however, risk and resilience

post-war reconstruction effort

of scientific management were

to the idea of multi-skilling of

practitioners are increasingly using

in Britain. In 1951, research was

seen as the best way to design an

individuals within the workforce.

this term. So, what exactly is this

published on how social systems

engineering organisation.

This was quite different to

type of system and what does it

behaved in organisations that built

have to do with risk management?

and operated engineering systems.

This article summarises the

Prior to the 1950s, engineers

O

Social scientists have

By the early 1960s, the technological imperative in organisation design was giving way

earlier ideas of Taylorism in technical organisations. The idea of socio-technical

characteristics of socio-technical

designed technologies for specific

to emphasis on positive economic

improvement developed to

systems in a way that is consistent

purposes. The organisations

and human results. The aim was

find the best match between

with descriptions published from

that built and operated these

to find the best ways to match the

the technological and social

the 1950s to the present day. It also

technologies were designed

requirements of both the social

components of a system. Hence,

discusses the distinction between

to suit the requirements of the

and technical systems. Emery and

the term socio-technical system

social resilience and technical

technology, often by translating

Trist studied this development

was coined to describe holistically

redundancy in the design of this

ideas from technological systems

in technological organisations

the functioning of these social and

type of system. To put these terms

into management systems.

and developed some principles.

technical components.

in a risk management context, it

Factories, mines and power stations

An important principle was that

is important first to understand

of the day are all examples. The

the work system was defined as

systems is concerned with

the evolution of ideas that led to

technical objectives of the system

a set of activities that made up a

interdependencies both internally

the development and use of these

tended to take priority over the

functioning whole.

and externally. Internally, self-

terms when describing socio-

social needs and requirements

technical systems.

of the workforce that built

16 // SECURITY SOLUTIONS

The idea of redundancy of parts is well known to engineers

The notion of socio-technical

regulating groups are dependent on one another in order to achieve

securitysolutionsmagazine.com


the desired output from the

the terminology that is widely used

by surprising disturbances in

whole system. However, whole

in the design of socio-technical

the operating environment.

Accidents: Living with High-Risk

enterprises also interact with

systems. These are not formal

Self-regulation is a key feature

Technologies. Princeton New

their external environment. The

definitions, but are an attempt to

of high reliability socio-

Jersey, Princeton University Press

enterprise as a socio-technical

describe the concepts generally

technical systems.

system is open to supplies and

understood by people who

services provided by other enterprises; it is also open to

Perrow, C. 1999 Normal

Rochlin, G.I. 1993 Defining

• Resilience is a social concept

‘High Reliability’ Organizations

design, operate or study socio-

that refers to the elasticity

in Practice. In Roberts, K.H. (ed.),

technical systems.

or adaptability of a socio-

New Challenges to Understanding

technical system so that

Organizations. New York, MacMillan

customers who rely on the

after a significant failure of

Sagan, Scott D. 1993 The

the system to self-regulate

Limits of Safety: Organizations,

(after a disturbance beyond

Accidents, and Nuclear Weapons.

or disruptions, sometimes with

Terminology Used by Designers and Operators of Socio-Technical Systems

the design parameters of the

Princeton New Jersey, Princeton

surprising consequences which

A socio-technical system is

system) it may in time resume

University Press

cause instability. This dynamic

a network of interconnected

the achievement of its goals

Schulman, P.R., Roe, E.,

instability is generally referred to

elements comprising groups

(reboot), or alternatively set

van Eeten, M. and de Bruijne,

as risk and, in extreme cases, can

of people and technology that

new goals (after a redesign).

M. 2004 High Reliability and

lead to a crisis.

functions as one simple or complex

Resilience is important

the Management of Critical

system designed to achieve

when high reliability is not

Infrastructures. In Journal

are dependent on technology to

specific goals.

achievable or not desirable.

of Contingencies and Crisis

achieve their goals, especially

For a socio-technical system:

Some important references that

Management, Vol 12, No 1, 14-28.

networked computer and

• Error is a technical concept

discuss these issues in more detail

Oxford, Blackwell Publishers

enterprise to provide goods or services. The socio-technical system is also open to disturbances

Today, almost all organisations

information-sharing technologies.

that describes the difference

However, unlike the earlier

between the system goal

socio-technical systems, many

and the actual output of

References

Conceptual Framework and Action

organisations today do not

the system.

Jarman, A. 2001 ‘Reliability’

Research Program. Occasional

Reconsidered: A Critique of the

paper No 2. The Ontario Quality of Working Life Centre, Canada

directly employ the designers and

• Redundancy is a technical

are listed below. n

Trist, E. 1981 The Evolution of Socio-Technical Systems: a

operators of the technologies. The

concept used to describe

Sagan-LaPorte Debate Concerning

interdependence of technologies,

certain processes or

Vulnerable High-Technology

both internal and external

components that improve the

Systems. Chisholm and Lerner

Theory of Open Systems in Physics

to the enterprise, is now far

reliability of the system as a

Paper, Canberra

and Biology. Science, Vol 3

more complex.

whole (for example, duplication

Landau, M. 1969 Redundancy,

Von Bertalanffy, L. 1950 The

Wildavsky, A. 1989 Searching

of elements or processes).

Rationality, and the Problem of

for Safety. New Brunswick USA,

systems were relatively simple

In a high reliability socio-

Duplication and Overlap. In Public

Transaction Publishers

(for example, the power station

technical system, the design

Administration Review, Vo. 29, No

of the 1960s), today’s complex

aim would be to have no errors

4, (July/August), 346-358

socio-technical systems are

in operations.

While earlier socio-technical

• Regulation is a technical

LaPorte, T.R. 1996 High

Dr Kevin J. Foster CPEng is an independent researcher studying

Reliability Organizations: Unlikely,

ways to improve risk management,

even the designers do not fully

concept that is used to refer

Demanding and At Risk. Journal

especially in complex security

understand (for example, the

to the process of detecting

of Contingencies and Crisis

domains where both people and

Internet of Things).

and responding to system

Management, Vol 4, No 2, 60-71.

technologies interact, sometimes in

errors, including those caused

Oxford, Blackwell Publishers

surprising ways.

interconnected in ways that

The next section summarises

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 17


COMMUNCATIONS

WE HAVE HAD A DATA BREACH. LET’S NOT TELL ANYONE. BY TONY JAQUES

I

t is a basic question

technology experts have been

in the face of a data

building a new online portal”.

The whole case seemed to be

with our values, but ultimately

captured in reporter Paul Penfold’s

chose to follow the advice of our

final question. “Doesn’t it seem

experts given our commitment to

months after the initial report

extraordinary that you had a whole

cybersecurity.”

we tell the world and risk the

and four months after the system

‘war room’ and were consulting with

consequences? A major fuel

was reinstated, it all began to

all these experts, yet one member

interpretation which can be put on

company was recently confronted

unravel. The dissatisfied customer

of the public was able to simply

this sorry story is that the company

by this challenge, and their

shared the story with local online

change an account number and a

tried to conceal an apparent

response and how they

news service Stuff Circuit, and

URL and get all this information?”

data breach; failed to advise the

communicated it provides a

the company response was

worrying lesson for issue and crisis

disingenuous and unhelpful. “Yes,

very, very disappointing and I

created a misleading narrative for

managers everywhere.

our Z Card Online system was taken

apologise to our customers. As

customers; seemingly did not keep

down for a period whilst we made

I said, sometimes these things

the CEO fully informed; and finally

person alerted New Zealand petrol

some improvements and changes.

happen… This is something that was

came clean only when there was

company Z Energy that a “critical

But it is now back up and running

missed on the way through and we

no other option. Compare this with

flaw” in its online fuel card system

and we really don’t have any more

are very sorry about that.” Hardly a

the value proudly stated in the

potentially exposed customer

to add on this.”

convincing apology or explanation.

company’s latest annual report:

breach. Do we fix it and keep quiet? Or do

In November 2017, an unnamed

Then in June 2018, seven

records, including names, vehicle

Bennetts replied, “Yes, certainly

On the basis of the ‘new

The most charitable

regulator in a timely fashion;

“We’re committed to being straight

registration details, where and

Detail

information’ presented, Z Energy –

up with journalists and the media.

when they bought petrol and, in

The reporters kept digging and

which provides about one third of

That means providing meaningful

some circumstances, even their

last month, Z Energy CEO Mike

New Zealand’s petrol – only then

information, giving straight answers,

home address.

Bennetts sat down for a video-

disclosed the breach to the market

and setting new standards of

taped interview. While confirming

and the Privacy Commissioner. Yet

transparency in our industry.” Great

yet mandatory in NZ and the

vulnerability had been identified

a company spokesperson admitted

promise. Poor delivery.

company decided to attempt a

in November 2017, he insisted

to Stuff Circuit that the very same

Footnote: A Bill introducing

discreet system patch. However,

their experts found no evidence

evidence had been emailed to the

mandatory data breach reporting is

the anonymous customer later

at the time that data had been

company by the original informant

currently before the NZ Parliament. n

contacted them again, saying the

compromised. Therefore, he

seven months earlier, when the CEO

so-called fix was “half baked”

argued, it was a vulnerability issue

was out of the country. Involvement

and data was still vulnerable.

not a breach and there was no

by the media “now meant we

by Tony Jaques, Director of Issue

The company then took the

need to tell customers. However,

chose to deal with this differently”.

Outcomes Pty Ltd, for people who

system down, telling their 45,000

when presented on camera with

The spokesperson added that the

work in issue and crisis management.

cardholders it was dealing

a screenshot showing data from

company did not want to keep quiet

He can be reached at tjaques@

with a “technical issue”. They

his own company’s vehicle fleet

about the incident, but did so on

issueoutcomes.com.au or you

subsequently told customers

account, he conceded, “It certainly is

advice. “We repeatedly challenged

can visit his website at www.

the site was down because “our

a security breach.”

this counsel as it did not sit well

issuesoutcomes.com.au

Data breach reporting is not

18 // SECURITY SOLUTIONS

Managing Outcomes is published

securitysolutionsmagazine.com


Smart Vehicle Identification

Photos credits: Shutterstock - aressy.com 04/18 - 10917

New Spectre reader: Let the good go, kick the bad out. Without delay. Meet the challenge of fast-track security at your vehicle gates. Spectre’s UHF-based vehicle ID reader is the first of a new generation: discreet by design, flexible in its configuration, secure and encrypted in its communication. Our new long-range reader is built to perform for up to 4 driveways, even in highly challenging environments. It’s the most robust reader on the market, yet intuitively easy to use. Welcome to speed and security - in a single solution.

SCALABLE | SMOOTH | SECURE | AGILE | STEALTH | INSTINCTIVE

www.stid-security.com Security Meetings Trophées de la sécurité Expoprotection ISC West APS


LEGAL has certain ongoing obligations in respect to safety within the workplace. Any risks that arise from time to time should be immediately communicated by the employee to the employer for assessment and action. The employer must have a written policy in that regard which must be handed to the employee as part of his/her training. Fourth, consider a trial of the arrangements. Set a fixed period and then review whether or not work-

BY JUSTIN LAWRENCE

THE LEGAL ISSUES SURROUNDING EMPLOYEES WORKING FROM HOME

from-home should continue. Obtain the employee’s feedback during the course of the review. At the time of the review have the workplace reassessed for on-going suitability. Fifth, establish agreed hours of work, communication requirements, reporting requirements and specifics of the role. These should

W

orking from home

There is no doubt that

workplace takes the more traditional

be recorded in writing and signed by both parties.

sounds like a great

employees are entitled to request

on-site form, or whether it is the

idea, doesn’t it? Just

flexible working arrangements.

worker’s own residence.

think, you walk from

Anti-discrimination legislation

So what should employers do

Sixth, remember that all employees, whether working in

the bedroom to the bathroom, then

prohibits employers from

if faced with a request from an

your office or more remotely, are

from the bathroom to the kitchen,

discriminating against employees.

employee that he be permitted

your responsibility. The Telstra case

and then from the kitchen to the

In some cases, a failure to provide

to work from home, and what

confirms this. You might therefore

office. No slapping together your

flexible working arrangements

steps should the employee take

want to pay a random visit to your

lunch and no sprinting out the door

has been found to amount to

to protect himself? Here are a few

employee’s home workplace from

on time. Better still - no traffic; just

discrimination. So it seems

tips that might assist employers in

time to time to ensure that your

a short stroll to the desk. It all

that workplace flexibility is in,

navigating through this complex

legal risks continue to be minimised

seems so easy, but if you are an

whether employers like it or

legal minefield.

even though you are not present

employer, think again.

not. But like any workplace, an

In a case decided some years

Firstly, when a work-from-home

in that workplace on a day-today basis.

employee’s home must comply with

request is received, assess whether

ago by the Administrative Appeals

relevant occupational health and

that employee’s duties are suitable

Tribunal, it was held that a worker

safety requirements.

for that type of environment.

employee that although he or

Finally, make it clear to your

The nature of tasks that need

she is working from home, during

at her house while having a

Safety Act, which commenced in

to be performed will be one of

normal working hours that home is

break from work should receive

all Australian jurisdictions around

many factors for consideration in

merely an extension of the existing

compensation from her employer

the beginning of 2012, defines a

that regard.

workplace and that both of you need

because she suffered her injuries

workplace as “a place where work

in her workplace and in the course

is carried out for a business and

equipment will be necessary for the

of employment.

includes any place where a worker

employee to safely undertake work

Justin Lawrence is a partner

goes, or is likely to go, while at

from home. For example, is there a

with Henderson & Ball Solicitors

claims that her employer (Telstra)

work”. There is a good chance that

dedicated space within the house

and practises in the areas of

insisted that she return to work

this definition covers places within a

for a desk, computer, telephone and

commercial litigation, criminal,

in their city office even though

house such as the bathroom, kitchen

chair? Is that space free of hazards?

family and property law. Henderson

several doctors had recommended

and meals areas.

Is it properly lit and ventilated?

& Ball have Law Institute of Victoria

Complete a detailed, documented

accredited specialists in the areas

who fell down the stairs twice

After her falls, the employee

against this. The Tribunal

The Model Work Health and

What this means for business

Secondly, establish what, if any,

to treat it accordingly. n

found that in so doing, Telstra

is that employers must be satisfied

risk assessment and have the

of business law, property law and

contributed to her psychological

that the workplace is free from

employee read, consider and sign it.

commercial litigation. Justin and

injury and that she should

all reasonably foreseeable risks

receive compensation.

irrespective of whether that

20 // SECURITY SOLUTIONS

Thirdly, make it clear to the employee that the employee

Henderson & Ball can be contacted on 03 9261 8000.

securitysolutionsmagazine.com


Pedestrian and Vehicular Access Control Automation

FAAC Simply Automatic Modular automation solutions

HUB Parking Technology Smart and flexible parking solutions

Magnetic Automation Pioneering access control solutions

Experts in Access | Discover the FAAC Group range of products at J14 | www.faacgroup.com


THINKING ABOUT SECURITY

WILL SECURITY EXIST? BY DON WILLIAMS

s we know, ever since

where the security system will

to meet any need. We are already

working understanding of how it

the first caveman had

become one element of the unified

seeing this with shared and service-

all fits together. It is also possible,

something he wanted

building/community/precinct

based ransomware.

if not probable, that the wheel will

to keep, security has

and will not require a specialist

been a concept and a practice. For

to design or install. Monitoring

‘arcane’ knowledge once held

physical security barriers as the

much of history, protective security

of and response to alarms will

closely by the specialist guilds/

IoT reveals its vulnerabilities,

has been about physical barriers

be automated to the point where

providers. For example, more people

requiring the specialists who know

and selection of trusted

the owner of the site may be

are using Dr Google every year and

how to design and implement

employees/slaves, even going as far

informed of the incident in real

YouTube will show you how to do

such systems.

as using eunuchs as specialists to

time (as already happens) but

just about anything. The role of

guard certain ‘attractive’ assets.

simultaneously the notification

security specialists (like medical

knowledge area will continue to

Security has evolved to match

being sent to police and possibly

practitioners) is to recognise that

exist as there will still be a need to

changes in need, capability

automatic protective measures

the user may have gained some

help others protect what they have

and society.

being implemented. With vehicle

knowledge and to recognise that but

from theft or damage, but doing it

monitoring systems it is already

to take them further along the path

in new operating, technological and

worked, to various degrees, for

possible to track stolen cars

of understanding and application.

social environments. We need to

millennia and followed us into the

and (legally or not) immobilise

The concept of in-house

look ahead rather than back to see

21st century. Are they still valid?

them and even trap the thief in

and external security providers

where we will fit at the end of this

We had an industrial revolution and

the vehicle.

may dissolve as individuals

year and at the end of this decade.

and organisations take on more

Those of us operating in the security

A

The basic concepts have

a century or so later a transport

For every advance there is a

Users have greater access to

return to stand-alone, simplistic

Security as a separate

revolution and, within decades,

vulnerability. Digital/Wi-Fi locks,

responsibility for their protection

sphere today may be the eunuchs of

an information/communication

be they for doors, windows or

and response. With Apple, Microsoft,

tomorrow.

revolution. Now, with quantum

padlocks, offer increased security

Google and others offering more

computing, the Internet of Things

over the issuing and management

and more individually controlled

(IoT) and ‘who knows what’

of keys, but also increased exposure

systems for the home and work

is a recognised thought leader in

beginning to appear, what will be

to digital copying and picking, if

environment, what will the security

security, emergency management

the role of security?

not now – then soon. Villains will

specialist do?

and related disciplines. His book

Building/home management

n

Don Williams CPP RSecP ASecM

Bomb Safety and Security: the

not need specialist knowledge to

It is possible that there

systems are becoming more

attack, enter or defeat systems as

will be an increased need for

Manager’s Guide is available from

integrated. The IoT will blur the

those with the skills will post, free

generalist/cross-discipline security

Amazon. Don can be contacted via

individuality of items to the point

or for a fee, the necessary tools

consultants, that is, those with a

email donwilliams@grapevine.net.au

22 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.

NEW!

ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.

+61 (3) 9544 2477

email: oz_sales@takex.com

HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.

BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.

INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.

OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .

1300 319 499 csd.com.au www.takex.com

TAKEX AMERICA


EVENTS

The 2018 Australian OSPAs

wp-content/uploads/2014/09/

Australia. AWE is dedicated to

conference and exhibition, real-

Aspiring-to-Excellence.pdf)

showcasing the latest products,

world challenges presented and a

18 October 2018

The OSPAs are being set-up

technology, equipment and

glimpse into the future of global

Doltone House,

in collaboration with security

services to this niche market. The

security integration and trends.

Hyde Park, Sydney

associations and groups across

Australian Warrior Expo is not like

The Outstanding Security

many countries.

any other trade show! With a huge

electronic security and safety

Performance Awards (OSPAs) are

The Congress will feature

focus on hospitality, it includes a

solutions for aviation, banking,

pleased to announce the dates

standardising the award categories

VIP Night and an AWE party, plus

infrastructure, industrial sites,

for the 2018 Australian awards.

and criteria, the OSPAs scheme

a full retail store. AWE will bring

mines, commercial buildings,

They will be working for the fourth

provides an opportunity for

both professionals and agencies

residential towers, building and

year in a row with the prestigious

countries to run their own

together, including government

development; the best of the best

Australian Security Industry

evidence-based OSPAs schemes

procurement managers, decision

in world class offering:

Association Limited (ASIAL).

while maintaining an ability to

makers and operators.

• intelligent CCTV, access control

The OSPAs recognise and reward companies and individuals across the security sector. They are

By researching and

compete on an international level in the future – World OSPAs.

Visit australianwarriorexpo.com.au

and alarms systems

for more information.

• advanced video surveillance solutions

Visit au.theospas.com for

designed to be both independent

more information or to make

SecTec PNG Congress

• intelligent traffic solutions

and inclusive, providing an

a nomination.

4–6 March 2019

• asset management systems

Port Moresby, Papua New Guinea

• drone capability

Now is the time to plan to attend a

• software cyber management

suppliers, to be recognised and for

Australian Warrior Expo 2018

their success to be celebrated.

15–17 November 2018

conference and exhibition – SecTec

• innovative video intercoms

Brisbane Showgrounds, Brisbane

PNG Congress.

• large enterprise systems

opportunity for outstanding performers, whether buyers or

The criteria for these awards

world-class security and technology

solutions

• mechanical locking integration

are based on extensive research

The Australian Warrior Expo

on key factors that contribute

(AWE) is Australia’s premier law

professionals will converge on Port

to and characterise outstanding

enforcement, military, emergency

Moresby, PNG, in March 2019 for

performance. (This research can be

services and security expo and

the first Oceania premier security

• emerging technologies.

found at perpetuityresearch.com/

is the only event of its type in

industry event, with a security

Do not miss out! Schedule, budget,

24 // SECURITY SOLUTIONS

Security industry specialists and

with electronic security solutions

securitysolutionsmagazine.com


plan to be there and stay informed.

Total Facilities

Early bird registration is open until

20–21 March 2019

12am 1st August 2018.

International Convention Centre,

Visit www.sectecpng.com/

Darling Harbour Sydney

register.html to register your interest

Total Facilities is a two-day live

or email info@sectecpng.com for

experience and celebration

more information.

of ideas, connections and opportunities for the nation’s FM

ISC West

and building-related communities.

10–12 April 2019

With an exciting new Smart Zone

Sands Expo Convention Center,

featuring innovative start-ups,

Las Vegas

lively speaker discussions and

ISC West is THE largest security

the very latest FM solutions, as

industry trade show in the U.S.

well as exclusive leadership and

At ISC West, you will have the

networking events, Total Facilities

chance to network with over

is the most valuable and rewarding

30,000 security professionals

destination for anyone in the FM &

through New Products &

CRE industry.

Technologies encompassing

Our 2019 event will feature a

everything from access control

Smart Zone designed as a thriving

to unmanned vehicles from over

hub of technological innovation

1,000 Exhibitors & Brands.

which presents new technologies

In 2019, ISC West will

and solutions to help you create

offer attendees a host of

smarter, greener buildings. The new

attractions including:

zone offers visitors a dedicated

• new products and

environment to look for integrated

technologies, encompassing

and cloud-based solutions to

everything from access control

improve operations and deliver

to unmanned vehicles.

business value.

• Unmanned Security Expo,

According to industry research,

introduced in 2017, is an event

IoT technologies will be more

within ISC West focusing on

pervasive in smart commercial

unmanned aerial vehicles

buildings than anywhere else over

(UAVs), unmanned ground

the next three years. This zone

robotics and vehicles (UGVs),

is designed to deliver visitors

and the various software

seeking industry-class solutions

and applications that

and strategic advice on how to

support them.

use technology and data to better

• Connected Security Expo (CSE) moved to the ISC West show

understand and manage their building performance.

floor in 2017! As the digital

For more information visit

and physical worlds collide,

www.totalfacilities.com.au for

days of quality networking and

it is increasingly important

more information.

unrivalled education alongside a

forward to once again reuniting +

for industry professionals to

The entire team is looking

showcase of the most innovative

than 4,500 security professionals

solutions to the Australian

with over 150 leading suppliers.

clients from both physical and

Security Exhibition & Conference 2019

market. For over three decades,

The 2019 show is set to see some

cyber threats. CSE provides

24–26 July

it has been the largest and most

interesting new innovations as well

holistic solutions for today’s

International Convention Centre,

established commercial event for

as a host of new attractions.

connected organisations.

Darling Harbour, Sydney

the security industry in Australia,

Working with SIA, ISC West also

In 2019, the Security Exhibition

bringing together the entire

in your diary. We look forward to

features world-class education

& Conference is heading back

supply chain of manufacturers,

seeing you again in Sydney in 2019

to learn about every facet of the

to Sydney.

distributors, security professionals

for the Security Exhibition & ASIAL

and end-users to connect

Conference!

protect their organisations and

security industry. Visit www.iscwest.com for more information.

securitysolutionsmagazine.com

The Security Exhibition & Conference is the industry’s annual

and create unparalleled

opportunity to reunite for three

business opportunities.

Make sure you put the dates

Visit securityexpo.com.au for more information. n

SECURITY SOLUTIONS // 25


FEAUSRE

INDUSTRY RECOGNISES BRAVERY AND COMMITMENT

24 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Now in its ninth year, the

to potential danger when he

Australian Security Medals

received notification that a male

Foundation Inc. (ASMF) has

had gained access to the secure

grown from what started as an

site where Downing was posted.

idea around a dinner table to an

Upon entering the site, the male

industry institution recognising

informed staff that he was in

bravery and contributions

possession of a bottle containing

to security.

petrol and intended to cause

With this year’s medals being presented during a sold-out black-

The male then walked into an

tie charity dinner at the Museum

adjoining room and proceeded to

of Contemporary Art at the Rocks

use the petrol to douse himself.

in Sydney, ASMF Chairman Paul

It was at this point that security

Maihi said, “Not only is it a huge

officers arrived, whereupon they

honour to recognise individuals

began negotiating with the male,

for their bravery and contribution,

who ignored their pleas and

but to be able to do so at such an

proceeded to ignite a cigarette

amazing venue and in front of a

lighter with the clear intent to set

room filled with their peers and

himself alight.

colleagues speaks volumes for

With little concern for his

how far the Foundation has come

own safety, security officer

in such a short space of time.”

Downing immediately leapt forth,

The ASMF awards two

attempting to knock the lighter

categories of medal each year:

from the person’s hand, receiving

the Australian Security Medal

burns to his hands and face in

of Valour and the Australian

the process. While Downing was

Security Medal. This year, three

unable to completely prevent the

Australian Security Medals for

male from setting himself alight,

Valour (ASMV) were awarded.

he was ultimately able to quell

According to the ASMF Patron,

the fire with the assistance of

former MP the Honorable Philip

the building’s fire suppression

Ruddock, “The ASMV is awarded

systems. Through his selfless

to recognise security operatives

actions, security officer Downing

for an outstanding act or acts

demonstrated considerable

of valour; an action or actions

bravery and courage, for which he

demonstrating valour, courage

was awarded the ASMV.

and decisiveness above and beyond the call of duty.” The first recipient of the ASMV

The second and third medals of valour for the evening were awarded to security officers

for the evening was security

Novica Ilic and Ahmad El Masri of

officer David Downing of MSS

Glad Group who, while working at

Security – who, despite significant

a large shopping centre in Sydney,

risk to his own safety, intervened

answered a call for assistance.

when an agitated male attempted

According to the report, two large

to set himself on fire.

groups totalling approximately

Security officer Downing’s

securitysolutionsmagazine.com

himself injury.

40 to 50 youths had been spotted

story exemplifies the types of

acting in a threatening manner on

stories and courage that have

the rooftop car park of the centre.

become the hallmark of the

Upon arriving at the location

Australian Security Medals.

of the youths, officers Ilic and El

According to reports, security

Masri witnessed the two groups

officer Downing was first alerted

commence brawling. Both officers

SECURITY SOLUTIONS // 25


FEAUSRE

immediately and without regard

serious injury to those present,

for their own safety placed

in addition to officer El Masri

successful, but is nonetheless

themselves between the groups

preventing a knife attack from

worthy of mention, in which

in an effort to separate them and

occurring. Both men exhibited

case a Certificate of Meritorious

behaviours, arrangements can

prevent further violence. Despite

considerable bravery with a

Conduct is sent to the person’s

be made to remove, reduce

their efforts, the brawl escalated,

disregard for their own safety.

employer for presentation to

or reassess conditions of the

the individual.

prohibition and banning notices.

spilling into the centre. At this

In addition to the ASMV, a

Not every nomination is

better understanding appropriate behaviours and consequences. Based on attendance and

point, security officer El Masri

number of Australian Security

spotted a male armed with a

Medals (ASM) were presented on

three Australian Security Medals.

has been measured through

knife moving towards a retreating

the evening.

The first was awarded to Brendan

its history of positive social

Noble who has demonstrated his

outcomes, including a reduction in

member of the other group.

“The ASM is awarded to

This year saw the awarding of

The success of the program

Even though security officer El

recognise the outstanding career

consistent commitment to the

incidents, improved employment

Masri was engaged in preventing

and character of the security

role of security, both in a crime

opportunities and improved

another male from entering the

professional receiving it,” said

prevention and a customer service

relationships through the

melee at that moment, he was

Ruddock. “ASM recipients have

capacity throughout his career. He

community and local council.

able to use his free hand to grab

demonstrated a consistent, high-

has received many written letters

and disarm the knife-wielding

level contribution to the wider

of thanks from both customers

program and in partnership with

male, preventing further harm

community, sometimes through

and staff of the centre where he

the HUB youth entertainment

and injury.

innovative non-core business

works and is held in high esteem

venue, Noah has also developed

activities and projects, or through

by all he meets.

Rising Stars Empowerment – a

At the same moment,

In addition to the TAP

martial arts training program

approximately 25 members

extraordinary performance in

from one of the groups began to

their professional role. This award

to security officer Noah Magnus

with a philosophy based on

pursue a number of retreating

is about more than how a person

who, in 2003, developed the

overcoming opposition, improving

members of the second group.

runs their business or operates in

Training Awareness Program

one’s position and rising above

Acting quickly and without regard

an organisation, but emphasises

(TAP) as a way of engaging with

adversity. This program has

for personal safety, security

what they do above and beyond

young people banned from the

produced a number of state,

officer Ilic immediately placed

their day-to-day responsibilities.”

Erina Fair Shopping Centre in an

national and world champions

Senior corporate security

effort to establish better working

in various martial arts. Program

himself at the top of an escalator,

The second ASM was awarded

using his body as a barricade to

managers form the judging panel

relationships with the people

participants have represented

prevent access by the first group

for the medals. “This means that

who had been subject to bans,

Australia and secured victories

to the second, exposing himself to

the nominations are carefully

in addition to their friends and

against champions from countries

great risk of physical assault by a

considered by major buyers

their families.

around the world.

large number of agitated youths.

of security and peers to fellow

Thankfully, back up and police

Through TAP., young people

Furthermore, Noah

security managers,” said Maihi.

who have been issued prohibition

has developed Rising Stars

assistance arrived quickly to help

“The panel not only discusses – at

notices are given the opportunity

Employment Strategy, a program

contain the scene.

length – the merits of each case,

to reduce the length of the notice

that provides a series of sessions

but follow up where necessary

by attending a TAP. workshop,

to assist young people to develop

quick and selfless actions of these

with further investigation and

where they interact with security

techniques to find gainful

officers almost certainly prevented

checking references.”

officers and others, with a view to

employment, including topics

According to their citations, the

26 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


on professional presentation,

investigator for the Bali Bombing

a successful interview strategy

(for which he was awarded the

and the importance of references

Medal of the Order of Australia)

and resumes.

and the operational commander

Over 100 attendees of the program have used the skills they gained through the experiences;

for the Sydney Olympics, among many other things. In addition to his role at

with more than 50 percent of

Qantas, Steve was an active

those participants having gone

participant in many industry

on to become security operatives.

associations, including roles

Noah’s partnerships and programs

as Chair of the International

have been extended beyond

Air Transport Association

Erina Fair and local council to

(IATA) Security Group; a

include NSW Government and

member of the oneworld

public education students with a

Security Committee; a member

history of disruptive behaviour,

of the International Security

at risk of alienation and

Management Association; an

community disengagement.

adviser to the Association of Asia

The third and final ASM

Pacific Airlines (AAPA) Security

of the evening was awarded

Committee; and a member of

posthumously to Steve Jackson,

the Australian Institute of Police

used their training to literally

of security by sharing stories

former Chairman of the ASMF and

Management Governance and

save a person’s life. St John

about its heroes and leaders,

Chief Security Officer for Qantas.

Risk Committee. He also played

Ambulance Chief Executive Len

doing good within the wider

Mr Jackson had been a senior

active roles in the Security

Fiori handed out three awards,

community and supporting those

leader, mentor and driving force

Professionals Association and

to Manatuki Pryor, Norman Hill,

that need help within its own

within the security industry for

was instrumental in establishing

Mary Theofanidis, Mohammad

community,” says Maihi.

almost two decades. In addition

the ASMF.

Boreh and Candan Baykan.

to his most recent role, in which

In attendance on the evening

“Security is an integral part

Funds raised from the night

of business and society, and

he served as the Chief Security

was Steve’s wife Marlene, who

will go to this year’s nominated

the Foundation is currently

Officer for the Qantas Group for

accepted his award on his behalf,

charity, The Chris O’Brien

formulating plans to raise

over 13 years, Steve enjoyed a long

along with his children Aaron,

Lifehouse – a not-for-profit,

further awareness about the

and illustrious career spanning

Beth and Emma. Steve’s loss is

independent comprehensive

work in the security domain,

the Royal Navy in the UK through

a great blow to the Australian

centre specialising in state-of-

which contributes to the security

to the Australian Federal Police.

security industry and he will be

the-art advanced treatment and

and wellbeing of millions of

sorely missed.

research for public and private

Australians.” n

Prior to his role with Qantas, Steve served with the Australian

The evening also saw the

patients who are suffering from

Federal Police where he undertook

awarding of numerous Save A

a range of significant assignments,

Life awards, bestowed upon

“The ASMF is very much

including acting as the lead

security personnel who have

about changing the perception

securitysolutionsmagazine.com

rare and complex cancer cases.

To find out more about the ASMF, please visit www. inspiringsecurity.com

SECURITY SOLUTIONS // 27


ALARMT

ARE YOU READY FOR THE YEAR AHEAD IN SECURITY? NEIL CAMPBELL, DIRECTOR OF GLOBAL SECURITY SOLUTIONS AT TELSTRA, SHARES HIS INSIGHTS INTO THE NEXT YEAR IN SECURITY.

28 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


It has been a big year for

Report was Telstra’s most

being able to resolve incidents

security, with outbreaks like

comprehensive, surveying

in a timely manner. We expect

the WannaCry ransomware,

more than 1,250 security

these two core challenges to

protecting this data is simply

NotPetya malware, as well as

professionals in 13 countries.

continue through the coming

understanding where it is. As

the Equifax hack dominating

What were its key findings?

year, as attacks increase

businesses move more of their

in sophistication.

data into the cloud, they cannot

headlines around the world and causing a stir in boardrooms. While awareness of the

Neil Campbell: The most interesting finding in our

Data Breaches (NDB) scheme. The first, crucial step to

think in terms of the old castle

Security Report this year was

What are the major attack

paradigm anymore: “If it is on

importance of security among

that 60 percent of respondents

types targeting Australian

the inside of my network it is

decision makers has never

had suffered a business-

businesses and how can they

safe, if it is on the outside it is

been higher, the Telstra

interrupting security incident in

keep their data secure?

not safe”.

Security Report 2018 found

the last 12 months, and that is

that businesses are still

quite significant because when

Business Email Compromise

their customers’ data are stored

having difficulty addressing

you think about a business

(BEC) and other phishing attacks,

in multiple places, both on

today’s security challenges

interruption, that means lost

together with ransomware, were

premises and off premises, they

and effectively preparing for

wages, lost productivity and

the most common threats to

have to adapt their thinking

the future.

lost opportunity. Not many

Australian businesses.

about data security, they have to

During a recent interview,

businesses can sustain an

Neil Campbell: In 2017,

We are also seeing more and

Now that their data and

adapt the controls that they use,

Neil Campbell, Telstra’s Director

interruption for multiple days

more it is also about the loss of

and they have to get a lot better

of Global Security Solutions,

without a huge impact on

the data that the businesses hold.

at having those security controls

spoke about the state of security

their viability.

Not just data about the business,

follow the data to wherever it

so things like intellectual

is needed.

in 2018, the Telstra Security

Additionally, 77 percent of

Report’s key findings and what

respondents suspected that

property, but in particular data

Australian businesses can expect

they had an incident in the

about their customers, which

a company to work out where

in the year ahead.

last 12 months but could not

is now under greater scrutiny

its critical information is that it

prove it. This speaks to the

through new legislation such as

needs to protect, and therefore

Prompted by what can only be

difficulty Australian businesses

the European Union’s General

difficult to allocate the resources

described as a turbulent year

are experiencing in rapidly

Data Protection regulation

to do so and I see this being an

in security, this year’s Security

identifying threats, and then

(GDPR) and Australia’s Notifiable

ongoing challenge.

securitysolutionsmagazine.com

It can be very difficult for

SECURITY SOLUTIONS // 29


ALARMT

In a world of increasingly

How will new legislation, such

requirements. Over the next year,

sophisticated attacks

as the GDPR and NDB, change

businesses should try and find

attempts to log on to an account in

targeting non-technical

the way businesses think about

overlaps in reporting to make it

a building in Melbourne, we would

staff, how can businesses

security in the coming year?

more efficient.

be able to check and see if that

best promote organisational

Neil Campbell: The NDB

So, for instance, if somebody

person had entered that building.

security awareness?

amendment to the Privacy Act

Another key trend identified

It is that kind of use case that is

Neil Campbell:

requires that businesses report

in the Security Report is the

driving convergence.

Cybersecurity is an ever-

both to the affected customers and

ongoing convergence of cyber

evolving field. New attacks

to the Privacy Commissioner on

and electronic security. Why

The emergence of Internet of

are created, new defences

any situation where they believe

are these two fields converging

Things (IoT) has been one of

must be created to counter

that a person’s information has

and what are the benefits for

the key stories in security over

them. One trend that remains

been accessed unlawfully by a

businesses that embrace the

the last few years. How can

consistent is the exploitation of

third party. The General Data

converged approach?

organisations adopting these

people. When we think about

Protection Regulation imposes

the two major findings from

even broader requirements.

the Telstra Security Report,

That is significant because

Neil Campbell: Security convergence is an interesting topic. What we are talking about

devices ensure that they are not a security liability? Neil Campbell: One of the

they were the rise of business

previously it was up to the

is bringing together the traditional

challenges with IoT devices is that

email compromise and the rise

organisation as to whether or

physical security world – alarms,

the firmware they are shipped with

of ransomware.

not they communicated a data

door access and CCTV – with the

is often the firmware they have for

breach. Now it is law, and what

cybersecurity world, and those

life. So, whatever vulnerabilities

tricking people into clicking on

that means is we will see a

two disciplines grew up in very

are present, and whatever

links. We will see that grow over

marked increase in the media

different ways over very different

vulnerabilities are subsequently

the following years, because

of announcements of hacking

time frames. What we are seeing

discovered, they are vulnerable

as technology gets better and

incidents, of access of personally

in the market is a trend toward

too for the life of the device. In

better, criminals will rely more

identifiable information, which

bringing those two disciplines

the world of cybersecurity, we are

and more on individuals and

will bring with it a lot more

together so that you can get a

used to dealing with that and we

their security awareness as a

consternation I think in the

much better visibility across your

patch regularly.

form of attack.

community. This means a lot more

entire security estate.

Both of those attacks rely on

One thing you can do in

inspection, but most beneficially

your organisation to help with

a lot more rigour in the way that

in Australia for security

this is make sure that you have

organisations protect personally

convergence. One reason is cost

a strong security education

identifiable information.

effectiveness, and the other reason

program that addresses both

In addition to the actual

There is a huge enthusiasm

In the world of IoT, we are not so sophisticated yet, but we will get there. n This article was prepared and

is that one and one equals three

originally published by Telstra

physical and cybersecurity, and

protection of data, this new

in this case – bringing together

IN:SIGHT, an online publication

also run cybersecurity drills

legislation will require companies

what were disparate disciplines

delivering business leaders the

and run tests. Do not single out

to spend more time dealing

means that you get a total view

trends, opinion and analysis that

individuals, but look for major

with compliance, whether it is

of security which creates a much

enables them to thrive through

change in security culture

new policies and procedures or

greater level of visibility for

technology. For more articles like

over time.

increasingly complex reporting

the organisation.

this, visit insight.telstra.com

30 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Some cheap solutions can end up being the most expensive. STENTOFON offer fully monitored IP communications solutions made to the highest standards from premium components and materials to ensure unparalleled performance in the most demanding conditions. When you need secure, safe, reliable communications that can integrate into existing systems and grow with your future needs, look no further than STENTOFON.

whencommunicationiscritical

www.stentofon.com.au


OPERATIONS

STRESS REACTIONS

NORMAL RESPONSES TO ABNORMAL SITUATIONS BY RICHARD KAY

Situations involving tactical response options are stressful. Everyone involved will be experiencing the effects of stress, though the reactions will vary from person to person. Stress reactions can occur during and after the event, either as ‘after shocks’ or in situations that trigger memories of the event. Fear and pain are positive instincts designed to assist us to survive. Pain tells us that something is wrong in our bodies; however, we can feel pain without ‘suffering’ – the negative mental state we create in response to pain. Likewise, fear is an instinctive wakeup call that we are in severe danger, a positive message that can spur us to incredible acts of strength, speed and determination to survive.

32 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Worry, the negative emotion, is

wounds during the confrontation,

specific sounds are tuned out

the eyes and ‘turn on’ the ears

the fear we manufacture, and it

these may start bleeding due

under high stress, then there is a

as it focuses on salient stimulus,

serves us no good at all. Worry

to vasodilation.

form of auditory ‘blink’ in which

which in the dark is sound.

loud noises are physically and

Sometimes the brain transitions

will not bring solutions, but it is more likely to distract us from

Loss of Near Vision

mechanically muted or silenced

back and forth between visual

finding solutions.

In a heart-pounding situation,

for a brief moment. There is not

and audio, depending on which

the loss of fine motor skills and

even the usual ringing in the ears

sense it feels it needs the most at a

to our physical and psychological

near vision makes it mandatory

afterward. This auditory blink

given moment.

makeup to protect us, but we

to drill those things that seem

can be roughly broken down into

can adopt strategies to adapt to

simple when you are calm and

three types:

Sensory Exclusion

it. Understanding how the body

collected. With loss of near vision,

• One response, which appears

Often, officers are not immediately

and mind change under stress is

officers may not be able to see

to happen at lower levels of

aware of injuries sustained during

critical for correct preparation

their firearm sights. Rather than

arousal (Condition Yellow)

a violent confrontation, because

to survive and thrive in the toxic

focus exclusively on aimed or

is to soften or shut down the

during the stressful event the

environment that is violence.

reactive shooting, the best solution

sounds of your shots (which,

sense of pain is shut down. It is

is to probably use a combination

at some level, are anticipated),

not until after the event and when

Vasoconstriction/ Vasodilation

of both. When you have time and

while the sounds of someone

the stress and adrenaline have

distance, use the sights, but at

shooting next to you can

subsided that the pain threshold

Vasoconstriction is when the

extreme close ranges there may

be deafening.

lowers and you experience the

blood vessels constrict or narrow.

be value in reactive shooting. Use

This can occur in response to

breathing to control heart rate and

seems to occur under extreme

physical stressors, such as cold,

maintain vision. Use the acronym

stress situations (Condition

Sensory Overload

which cause the capillaries in

BRASS: breathe, relax, aim,

Black), is to shut out all sounds

If the brain receives too much

your fingers and toes to constrict

sight, squeeze.

so that you do not remember

input from too many stimuli

hearing anything afterward.

at the same time, it can cause

The stress response is built in

so you do not lose heat through

• Another response, which

trauma received.

your extremities. The end result is

Auditory Exclusion

The greater the stress, the

sensory overload. When all five

your skin turns white as the blood

Our brains must constantly

more powerful this effect.

senses simultaneously send an

retreats towards the body’s core.

tune out sensory data or be

This is not an aural blink, but

emergency message to the brain,

It can also occur under stress. At

overwhelmed. In extreme stress

rather the auditory equivalent

the overloaded brain responds

low levels of vasoconstriction,

situations, this screening process

of squeezing your eyes shut

with ‘tilt, reboot’. This is the

only the little capillaries shut

can be even more intense, as we

until the threat goes away. This

concept behind diversionary

down, causing some loss of fine

tune out all senses except those

is associated with exceptional

devices such as a flashbang.

motor skills. As vasoconstriction

needed for survival. Usually that

stress, extreme heart rates and

Officers that carry a firearm

becomes more intense, blood flow

one sense is vision, but in low-

intense physiological arousal.

also possess a flashbang… when

to the complex motor muscles

light conditions the ears can turn

begins to shut down. The blood

‘on’ and the eyes turn ‘off’, as the

probably the most common,

and goes bang. Firearms are a

pools in the body’s core and large

combatants hear the gunshot but

occurs when you shut out

psychologically daunting device.

muscle groups, causing your blood

tune out the less salient muzzle

all gunshots, but you hear

In a violent confrontation, if

pressure to increase. The outer

flashes. Most of auditory exclusion

everything else. This appears

the subject fires first, the officer

layer of your body becomes almost

(like tunnel vision) is a matter

to be a Condition Red response,

begins the engagement on the

a layer of armour and, as long

of cortical perception. The ears

in which your body is capable

receiving end of a flashbang.

as an artery is not hit, you can

still hear and the eyes still see,

of biomechanically shutting

Proper mindset and realistic

take extensive damage without

but as it focuses on the survival

down your ear in a millisecond

training to develop autopilot

much blood loss. This appears

mission, the cortex of the brain is

in response to the leading

responses can help overcome

to be a survival mechanism

screening out awareness of what

edge of the shock wave of a

this problem.

intended to limit blood loss in

it deems insignificant to the goal,

gunshot, and then reopening

a combat situation. The price,

and the goal is survival. Research

immediately so you hear

Tunnel Vision

however, is a loss of motor control,

indicates that the ear can also

everything else around you.

Tunnel vision is sometimes

because when the muscles stop

physically shut out loud sounds,

getting blood, they stop working.

just as the eyelid can shut out

Intensified Sounds

narrowing. Under extreme stress,

Eventually, there is a backlash,

bright lights. It would appear that

Whilst many officers experience

such as occurs in a shooting, the

called vasodilation, where the

this biomechanical shut down in

diminished sound under stress,

area of visual focus narrows as

veins go wide open and often the

the ear can occur in a millisecond

some report having intensified

if you were viewing the situation

hands and face go red as the blood

in response to sudden, loud

sound. This most often occurs

through a tube. Tunnel vision,

flows back to the extremities.

noises. First, there is a form of

in low-light conditions, where

along with auditory exclusion

If the officer has sustained

auditory ‘tunnel vision’ in which

the brain chooses to ‘shut down’

and a host of other perceptual

securitysolutionsmagazine.com

• A third response, which is

you press the trigger, it flashes

referred to as perceptual

SECURITY SOLUTIONS // 33


OPERATIONS

distortions, is commonly

comes with baggage. It often

during violent encounters, but no

represent a powerful Condition

associated with the high levels

happens in Condition Black and

one has warned them that it might

Black response, indicative of

of anxiety normally present in

is accompanied by an extremely

happen. Suddenly, they cannot

extreme high levels of arousal,

everyone involved in a violent

elevated heart rate and loss of fine

move their legs and they panic.

that may predispose someone

confrontation. In most cases, the

and complex motor control.

They think they are paralysed.

toward a post-traumatic response.

subject. To take advantage of his

Scared Speechless Speech is a fine motor skill, and

Intrusive/Distracting Thoughts

Memory Loss

visual distortion, sidestep quickly so that you, in effect, disappear

the voice is one of the first places

Many officers in violent

in deadly force encounters

from his view. To visually

to observe stress in most people.

encounters had thoughts

experienced significant chunks

reacquire you, the subject has to

This appears to happen as a result

that were truly intrusive and

of memory loss from their event.

blink, draw back and move his

of the vasoconstriction effects of

distracting during their shootings.

It is common for there to be

head in your direction. This can

Condition Red shutting down the

Often, the intrusive thoughts were

some degree of memory loss in

buy critical moments. Officers

fine-motor control of the larynx.

bizarre. In the heat of battle, many

a deadly encounter, especially

can break out of tunnel vision

Unless officers have been properly

officers think of their family.

when the heart rate reaches the

by scanning and breathing after

trained, it is quite easy for them to

These intrusive thoughts are not

realm of Condition Black. This is

discharging the firearm. If officers

experience a profound breakdown

always distracting; sometimes

a phenomenon termed critical

are trained to scan and breathe on

of speaking ability and, in

they can serve as an inspiration or

incident amnesia. Interestingly,

the range every time after every

Condition Black, may literally be

motivation. It is useful for officers

if officers fire only one to two

engagement, the procedure soon

scared speechless when operating

to develop positive self-talk, the

shots, they usually remember

becomes a valuable and automatic

at extreme levels of stress.

most important of which is, ‘I will

the number. But as the number

conditioned response.

However, officers can partially

survive and keep going, no matter

increases, there is a tendency to

transcend these limitations

what’. These are the kind of

forget how many they shot, or

Visual Clarity

through training. Like most fine-

intrusive thoughts that you must

they underestimate the number.

Scientific research and volumes

motor skills, pre-rehearsal of what

program into your mind to survive

It is common within the first 24

of anecdotal evidence indicate

to say ahead of time increases

in combat.

hours to recall roughly 30 percent

that in many shooting situations

the likelihood that the skill will

there is a sudden visual clarity,

exist at the moment of truth

Dissociation

48 hours and 75–95 percent after

an incredible moment when the

when operating in Condition Red.

During high-threat situations,

72–100 hours. This is why it is

body dedicates all its resources

Officers are trained to verbalise

officers may experience a strange

important to interview officers of

to get maximum value out of the

repetitively in a variety of training

sense of detachment, as if the

a critical incident again after they

eyes. Like many combat stress

scenarios typical of what they

event were a dream, or they

have gotten one or more nights of

responses, the visual clarity

encounter on the job. It is because

were looking at themselves from

quality sleep.

effect can make it possible for

they train to use verbal commands

outside their body, going from that

the human body to do things that

in high-stress situations that

moment of intense awareness of

Memory Distortion

we previously would not have

they are able to use them when

fear, to feeling almost nothing as

When under great stress, officers

believed possible.

needed. Drilling specific verbal

they focus only on staying alive.

may envision their worst fear

commands dramatically increases

Afterward, when they snap back

and they see it so clearly in their

Slow-Motion Time

the likelihood that at the moment

to reality, it will seem as if the

mind that they are absolutely

There are numerous case studies

of truth those commands will be

event took place in the Twilight

convinced it really happened.

of officers who found slow-

available under stress.

Zone. Even hours later, they may

Sometimes people remember

have difficulty accepting that it

what actually happened,

same thing is happening to the

motion time so powerful that they

Nearly half of all officers involved

of the occurrence, 50 percent after

were able to see bullets pass by

Temporary Paralysis

happened, as if some part of them

and what they envisioned as

them. On several occasions, they

This paralysis, sometimes referred

is still in denial that it could really

happening, creating what is

were able to validate what they

to as freezing, is a phenomenon

happen to them. However, initial

referred to as a ‘parallel worlds’

perceived by pointing to where

that is clearly not a survival

conclusions from stress studies of

effect. Children are not usually

the rounds had hit. They were not

mechanism. Freezing does happen

soldiers indicate that dissociation

good witnesses, so great caution

implying that bullets moved by

sometimes in combat but, in

may be associated with less

must be exercised when there

them at a crawling pace; what they

some cases, we know that those

effective performance in combat

is no other choice but to use

meant was that the rounds passed

who think they are experiencing

and a predisposition to post-

them. Until a child is about nine

by the same way that low velocity

temporary paralysis are actually

traumatic stress disorder (PTSD)

years old, they are incredibly

non-lethal training ammunition

experiencing slow-motion time.

after combat. Data indicates that

suggestible; there is only a small

(NLTA) can be seen going past.

The problem is that there are

dissociation and slow-motion time

difference between the real

While slow-motion time can be a

officers experiencing temporary

often occur together in combat

world and fantasy. Is it so hard

survival mechanism, it frequently

paralysis and slow-motion time

situations, and that they may

to believe that the mind of a

34 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


frightened adult might, under

just a few feet, a 1/8” variance

Officers should accept in

great stress, be just as malleable

in the barrel of a firearm can

advance that they will feel fear,

as a child’s? In combat situations,

make the difference between a

but they can still perform during

people often envision possibilities

hit and a miss. We need precision

stress situations. Recognise

and sometimes those possibilities

control. The rule is do not fire

stress reactions and consciously

become reality in their minds.

any faster than you can hit the

adapt to these rather than fight

And seldom do they envision

target. But there is a tendency,

against them; consciously slow

positive things occurring when

upon occasion, for officers to

down and resist the urge to

people are trying to kill them

fire faster than they can hit.

rush. The best option to control

As you adopt strategies, they

and others.

When in a deadly struggle, it is

the adverse effects of stress is

should be tested under stress to see

not uncommon for an officer to

tactical breathing, which reduces

if they will work under realistic

Perseveration

fire as fast and long as he can

the heart rate, and once heart

conditions similar to those you

A normal, rational human

until the target goes away. The

rate lowers the stress response

will face on the job. If you do not

being will make rational, logical

solution to increasing the hit rate

diminishes, motor skills can be

train this way, chances are you will

decisions, taking into account

with fewer rounds fired is force-

employed more effectively and

not be prepared for the reality of

various factors and examining

on-force training that provides

rational thinking becomes easier.

a violent confrontation. Personal

different possibilities. Under

stress inoculation with marking

stress, the midbrain takes over

capsules. There is solid evidence

to instinct. To overcome adverse

The important thing to remember

and people can get trapped in

to believe that the problem of

reactions, realistic, appropriate

is that these are normal reactions

an endless ‘do-loop’, repeating

multiple shots with few hits is

and regular training combined

experienced by everybody. n

actions over and over. This is

partly the result of a fear-induced

with proper attitude and

called tactical fixation. We fixate

stress response. The solution,

awareness is essential. Strategies

on the current action and do not

therefore, is to inoculate against

for operating effectively under

certified tactical instructor-trainer,

consider other possibilities. This

the stressor to prevent or reduce

stress include:

Director and Senior Trainer of

is probably a survival mechanism

the fear. There is a powerful

• control breathing

Modern Combatives, a provider of

left over from our prehistoric

obligation to participate in this

• keep responses simple

operational safety training for the

ancestors. Today, we use

type of realistic training.

• understand the physiological

public safety sector. Visit www.

precision instruments in violent engagements. At a distance of

securitysolutionsmagazine.com

So, what can you do about stress?

Under stress, the brain resorts

• assess before acting or reacting • avoid sleep deprivation behaviour • have realistic expectations of operational risk • inoculate against stress – train for reality

safety is personal responsibility.

Richard Kay is an internationally

and psychological effects of

moderncombatives.com.au for

stress

more information.

SECURITY SOLUTIONS // 35


10 BUSINESS

LinkedIn

Tips That You Will Not Find In The Help Pages

BY JANE ANDERSON

36 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


The community of security

of their target audience. It really

a Google search! It will also

professionals now using LinkedIn

does only take a short amount

make you easy to recognise

across the globe as a means of

of time to ensure your profile is

at face-to-face events, making

connecting and communicating

working effectively. The benefits

it easier for people to come

is huge. In fact, it has become

to your business and brand

and chat to you because they

the number one social media

are significant.

remember your face. Also,

communications tool for the

The key is for your profile to contain a mixture of technical

you do. If you want to be seen

that end, we thought we should

expertise and some dynamic

as a credible expert, make sure

take a look at ways to maximise

front-end magic. This will really

the effectiveness of your

help you stand out against your

LinkedIn communications.

competitors. In order to do

an opinion; share your

this, you need to focus on both

knowledge, insights and

articles these days on improving

the back-end and front-end of

articles if you read something

your LinkedIn profile, but as a

your profile, so that it not only

of interest. It keeps you

career and LinkedIn coach who

looks great, but it also functions

current, fresh and memorable,

has one of the top one percent

correctly. This will ensure

and others are likely to think

viewed LinkedIn profiles, I still

that your business shows up

more highly of you based on

find the majority of people and

in those all-important search

your interests. If you have a

businesses are not taking the

results and contains appealing,

business blog then post this

time to ensure their profile stands

consistent messages.

as well. This is a great way

There are literally hundreds of

out and captures the attention

One of the best ways to do

your image reflects this. 2. Thought leadership. Have

to share fresh content and it

this is to start using LinkedIn

will also improve your search

as more of a personal branding

engine rankings. Blogs are

tool. In other words, make

great for engaging with your

sure you highlight what skills,

customers, while generating

qualifications and tasks that you

valuable leads for your

are willing to undertake for a fee. Based on other’s perception

sales team. 3. Join groups that reflect the

of your asset base of skills,

level you are operating.

qualifications and experience,

Some great groups include

you will then influence your

Australian Institute of

networks, your brand and your

Management, Harvard

perceived value.

Business Review, Wall Street

In my top 10 tips below, I have

Journal, TED, The Executive

included a range of personal

Connection, Australian

branding and technical tips in

Institute of Company Directors,

order to be perceived as a top

Women on Boards and

value business. By using these tips, you will be sending a clear

Executive Women. 4. Use media plugins. A great

message about who you are and

tool for any business is to

what you stand for. You will

have a two-minute video of an

attract more people like you or

interview with them. People

people who you want to connect

want to get a sense of who you

with who operate at your level,

are and your personality, so

and remember their networks get

share it with a video plugging

to know you too.

into your summary and make

1. Have a professional photo

it easy. There are some great

taken. Nowadays there are

agencies around who will film

so many great photographers

it for you. You do not have to

who have included headshot

be perfect. Natural “umms”

photography into their

and “aaahs” are okay, but have

business. It is a great way to

it professionally filmed and

look your best and remember, a first impression could be

securitysolutionsmagazine.com

make your image reflect what

private security industry. To

edited with good lighting. 5. Treat it as a marketing

SECURITY SOLUTIONS // 37


BUSINESS

“Treat your page like your business website and highlight what you can do to help other people and what other customers have said about you.” document. Write your profile

8. Ensure your title reflects

qualified with a wide

repackage your keywords

with purpose rather than a

the keywords that you want

variety of local and

and double your search

eulogy of your past jobs. Keep

to be found for. If your

international experience.”

in mind the clients you want

title is Director of Pickwick

These tasks also need to be

to attract in the future and

Associates, the likelihood of

the keywords you want to

others. This might seem

not what you have done in

someone trying to find you

be found for.

simple, but I see a lot of

the past.

is very low. Ensure your

6. Keywords and key skills.

• 2nd Paragraph: “Some of

engine optimisation. 10. Proactively connect with

profiles of clients who do

title reflects what you do.

our clients include…” If

not connect with anybody.

Regularly check on the

For example, if you are the

these brands elevate your

Research tells us that your

keywords that are being most

Director of Pickwick Associates

brand then list them here.

search results will start to kick

sought after and ensure those

but you are actually an IT

Ensure you put the most

in at about 120 connections.

words are in your profile. You

Director, ensure your title is IT

important information to

Also, you will only turn up in

can do this by checking on

Director, Sydney.

the top of the page.

search results where you are a

the www.linkedin.com/skills

9. Write a BOOM summary.

• 3rd Paragraph: “What

1st, 2nd or 3rd connection.

page. For example, Enterprise

This means it meets the

some of our clients have

In conclusion, treat your page

Architecture searches have

blend of keywords and of

said…” This is a great

like your business website and

currently increased by one

your brand. This section

spot to put your best

highlight what you can do to help

percent in the last year.

is limited to only 2,500

quote from a testimonial

other people and what other

However, the skill Enterprise

characters so I recommend the

or recommendation.

customers have said about you.

Governance is up 10 percent. It

following layout:

• 4th Paragraph: “Career

Then watch the benefits to your

is important to cover all bases

• 1st Paragraph: This is your

achievements include…”

business roll in. n

and the good news is that you

LinkedIn elevator speech

List your top three to five

can use up to 51 key skills.

and should cover your title,

achievements. How did you

years of experience and

help your clients? What

professional and experienced

The best way to get a

what you want to be doing.

goals did you achieve? Did

certified career and business

recommendation is to give

For example: “Professional

you increase turnover,

coach. She also assists businesses

one! For every 10 people you

IT Director with over

increase efficiency? Make

and individuals to explore their

ask, you normally get five

25 years of experience

sure there are numbers

personal brand and get the best

back, so do not feel nervous

in consulting, business

here that quantify what

out of their LinkedIn profile.

about asking. Also, if you

analysis, and enterprise

you are saying.

She is the author of How to use

can, ask for keywords to be

and solutions architecture

included in recommendations.

within which process

can help you…” or “Key

purposes. Jane is also a successful

If you have written references

improvement, performance

specialities…” Again,

speaker and runs regular

from people who are not on

management and business

these should be based on

LinkedIn workshops. More

LinkedIn, you can still add

process. Ability to liaise

the keywords someone

details can be found at http://

them as quotes into your

with internal and external

would be searching for

insideoutcoach.com.au/ or http://

employment history.

stakeholders. Tertiary

and it is a great way to

jane-anderson.com.au/

7. Ask for recommendations.

38 // SECURITY SOLUTIONS

• 5th Paragraph: “How I

Jane Anderson is a

your LinkedIn profile for career

securitysolutionsmagazine.com



COVER STORY

THE CHALLENGES OF ACHIEVING A CYBERSAFE SURVEILLANCE SYSTEM BY LUKE FROST

In recent times, the

modern world of IoT, where data

particular settings and base their

vendor, or even a pool of trusted

hyperconnected world of the

is constantly being transmitted

purchasing decision accordingly.

vendors, whose products will

Internet of Things (IoT) and smart

between IP-enabled devices, there

However, there are steps that a

cover a range of deployment

devices has produced a massive

are a host of new vulnerabilities

company or government body can

scenarios. It is also equally

shift in the way we think about

that simply did not exist in older

take to counter these concerns,

important to ensure that the

security – not just the security of

analogue security systems.

regardless of whether or not they

product is what it claims to be.

are founded.

There are numerous instances

a building or public space, but the

The risks from cyberthreats

security surrounding the devices

are increasing as criminals and

Firstly, know where the

themselves and the network that

dark forces posture to find new

components of a network come

country which, on the surface,

sits behind those devices. Whereas

attack vectors and looking for a

from. This may sound obvious,

look like they are the product of a

a surveillance solution was once

back-door entry to networked

but it is not always apparent that a

manufacturer when in fact they

a tool simply used to monitor

surveillance cameras is just one

device has been manufactured in

are not. If in doubt, always contact

and record an area, today’s IP-

of many ways that this virtual

a potentially risky environment.

the manufacturer and check the

enabled cameras, coupled with

jousting between vendors and

Companies can be quite evasive

serial numbers of the product

sophisticated video management

criminals plays out. Service

about where a camera is

in question.

software (VMS), are capable of

providers, resellers and end-

physically manufactured, often

exponentially more. However,

users need to be conscious of

calling on the credentials of where

from cyberthreats, another critical

these added layers of capability

the risk involved in all security

the parent company is based to

aspect is ensuring that any back-

give rise to added complexity, not

systems, including surveillance

lend the brand credibility.

end management system that will

the least of which is cybersecurity.

deployments, and should know

The question being asked by

that the component pieces of their

are sometimes described as

has a track record in countering

many people, including end-

security network are from reliable

being engineered in a particular

cybersafety issues. A robust

users and security professionals

and trusted sources, for whom

country such as Germany or

VMS coupled with cameras

is how safe are the cameras that

cyber defences are top of mind.

Scandinavia, for example, which

that are from a trusted source

are renowned for engineering

that have been through a rigid

media serve to highlight that there

prowess. However, while that

quality control process from a

is enough evidence to suggest that

may indeed be where the device

manufacturing and engineering

which runs deeper than simply

cybersafety is a major concern

was engineered, it is actually

aspect are more likely to provide

questioning the cybersafety of

across all levels of a surveillance

manufactured elsewhere in

an end-to-end solution that is

the cameras themselves. Can

network and exposing an

the world. This rule applies

more secure from cyberattacks.

a camera be used to spy on

organisation or even the country

to cameras, servers, switches,

Another important factor

the very people it purports to

to risk from cybercriminals or

media converters – anything

in developing a secure security

protect? Technically, yes. Can it

even foreign powers is a serious

that is capable of processing and

infrastructure is ensuring that

be responsible for transmitting

issue – and one that will affect

transmitting data. It is useful to at

any cameras used are backed by

data to external parties such as

a decision maker’s deployment

least check on the background of

an adequate level of support. For

a foreign government? Again,

choices. The fact remains that

a company, rather than reading

example, does the manufacturer

technically it can. But then, so

resellers, service providers and

the marketing brochures and

regularly test for newly

can many other components of a

end-users are going to question

assuming they are being upfront.

discovered vulnerabilities and

supposedly secure network. In the

the use of certain cameras in

It is important to find a trusted

exploited firmware and update

are, in essence, deployed to keep us secure. It is a fair question, and one

40 // SECURITY SOLUTIONS

Recent reports in mainstream

Cameras from some vendors

of ‘grey imports’ coming into the

In developing a system safe

be used is well established and

securitysolutionsmagazine.com


securitysolutionsmagazine.com

SECURITY SOLUTIONS // 41


COVER STORY

their firmware accordingly?

and upgrades in an effort to ward

manufacturing to include business

as there are many well-known

Furthermore, how are those

off the constantly evolving threat

development and support staff.

chip manufacturers, for example,

updates pushed out to end-users

of cyberattack.

This is essential, as any vendor

that support the highest quality

serious about cybersecurity

control standards. However,

and how often? When a camera

“As a company, we are

is new, it is, generally speaking,

acutely aware of the risk posed

should see being proactive

like any product, when a critical

protected by up-to-date firmware

by cyberattacks, especially in

in educating its partners and

component is outsourced, the

which guards against cyberattack.

the modern digital world of

soliciting feedback from end-users

parent company relinquishes

However, if that firmware is

hyperconnectivity,” states Wai

as critical to its long-term success.

control of its intellectual property

allowed to lapse, the camera might

King Wong, Country Manager at

become vulnerable to attack as

Axis Communications. “Long-term

users and the like are often the

some cases, introduce risk which

cybercriminals and other forces

firmware support is a critical

first people to discover issues

is not present when all intellectual

constantly manoeuvre to breach

part of building up trust that

that might lead to potential

property is kept in-house and

known defences. In situations

our cameras are protected, and

exploits or vulnerabilities in a

is as tightly controlled as the

where a camera’s firmware

safe from as many cyberthreats

camera or software. Therefore,

manufacturing and engineering

becomes out of date for security

as is manifestly possible. While

it is incumbent upon the

aspects of the product.

reasons as opposed to adding new

we acknowledge that nothing is

manufacturer to keep the lines

functionality, it is not uncommon

one-hundred percent secure, we

of communication open so that

themselves, any VMS should be

for the camera to still operate

need to commit to our customers

they can discuss and better

subject to the same stringent

as per normal. Unfortunately,

long term and assure them that

understand any issues and then

criteria in order to minimise

the old adage, “If it isn’t broken,

their hardware is up to date and

react accordingly.

risk. It is critical to base a video

don’t fix it”, lulls unwary or

as protected as possible.”

inexperienced administrators into

While quality manufacturing

Resellers, installers, end-

The more work that is done

to a third party which can, in

Beyond the cameras

management solution around a

in-house by a vendor when

VMS that has heritage, and one

thinking that the firmware is not

and engineering are obviously

designing, engineering and

that has a clearly defined strategy

in need of updating. However,

integral to developing a trusted

manufacturing all components of

and governance on cybersecurity.

just like the operating system on

solution, it is also important

a device, the lower the risk that it

a PC, cameras and other security

to ensure that any product is

might be vulnerable. This is not to

Protection Regulation (GDPR)

devices require constant vigilance

supported by a strong team, which

say that a company should never

rules form a strong basis for data

regarding the updating of patches

goes beyond software engineers to

outsource any of its production,

protection, so a GDPR-compliant

42 // SECURITY SOLUTIONS

The recent General Data

securitysolutionsmagazine.com


adopted into security solutions more frequently, the issue of data sovereignty will become more prevalent, which in turn is likely to lead to an even greater focus on cyber security. The general population will become increasingly aware that camera networks are able to recognise their facial features or their car’s number plate, and be conscious that the data is being recorded and transmitted from each camera they might see in any given network. The sanctity of that data will be under increasing scrutiny, and the integrity of the cameras, management platform and all other components of the system will be more closely appraised than ever before. Reporting on vulnerabilities needs to be a collaborative effort and requires vigilance across all levels of the system. Should a solution provider is a good start.

2. Hardening the surveillance

cybersecurity should seek to

vulnerability be detected, a strong

“There are stringent rules and

system components:

engage with other vendors, not

policy should enforce that it is

regulations associated with data

• harden the servers

just to sell products or collaborate

responded to within 48 hours and,

security, and it is very important

(physical and virtual)

on deployments together, but so

in the case of a critical vulnerability,

to leverage those to continue the

and client computers and

that they can work together to

an unscheduled service update

evolution of our cybersecurity

devices

build a trusted partnership, one

of the firmware may need to be

processes,” reports Jordan Cullis,

• harden the network

that considers all aspects of a

issued. Again, it is incumbent

Country Manager South Pacific at

• harden the cameras

deployment right through to the

upon all parties involved to have

integrity of its cyber defences.

clear guidelines for reporting and

Milestone Systems. A comprehensive hardening strategy evaluates all elements of a security solution, and

3. Documenting and maintaining security settings on each system. 4. Training and investing in

Ongoing testing of products

responding to a breach, and strong

will reduce risk as well, especially

communication on how to act if a

when looking at how they perform

response is required.

moves to continually assess and

people and skills, including the

in relation to other components

strengthen all components in

supply chain.

of a security system. For example,

surveillance solution should

Ultimately, an end-to-end

order to reduce risk. As Cullis

Customer and partner training is

testing how newly released

provide the consultant, end-user

points out, “Hardening is a

crucial to successful cybersecurity.

cameras will work on a VMS

and systems integrators with peace

continuous process of identifying

Any vendor whose platform

platform is important, as it will

of mind, knowing that the system

and understanding security risks,

integrates with other parts of a

allow both companies to identify

has been rigorously tested and

and taking appropriate steps

security solution should have a

any performance issues, as well

that both the physical hardware

to counter them. The process is

significant focus on employment

as establish that the device and

and back-end software work

dynamic because threats, and

best practices and teaching

the management suite will work

collaboratively to establish a secure,

the systems they target, are

people how to think in terms of

safely together, without any gaps

threat-averse network. While no

continuously evolving.”

security governance.

in either party’s cyber defences.

camera or management system is

A hardening strategy should

Clear channels of

The same goes for other

completely invulnerable, knowing

include steps such as:

communication between the

components of a surveillance

that the solution has a strong

1. Understanding the components

camera manufacturer and the

solution as well, and these days

pedigree in cyber protection and

to protect – evaluate every

VMS developer are integral

there are plenty of other elements

stringent rules in place to react to

part of a system or network,

to ensuring they work as a

to consider, such as facial and

the constantly evolving landscape

and map out strengths

team to counter threats. Any

licence plate recognition and data

of cyberthreats removes a lot of the

and weaknesses.

manufacturer committed to

analysis. As these components are

doubt. n

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 43


CCTV

42 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Smart Video Surveillance

DELIVER ACTIONABLE INSIGHTS BY CHRISTOPHER BERGEY

Security cameras represent a large

cases, it is about extracting value

global market driven primarily by

and intelligence from the video

the increased adoption of video

captured. This could include retail

surveillance systems for business

shopper behaviours, or managing

or public-sector intelligence and

a parking facility, or producing

rising threats associated with

manufactured products. Seeing

public safety. As such, surveillance

a drone flying through the air

cameras are now common in and

capturing images and video

around government buildings,

nowadays from a construction site

military posts, businesses, banks,

or farmland is no longer unusual.

transportation centres, casinos,

market is experiencing

historic landmarks, schools and

burgeoning growth and, as of

many more.

2016, it was valued at over US$30

Surveillance is not just about security any longer; in many

securitysolutionsmagazine.com

As such, the video surveillance

shopping centres, sports venues,

billion, with expectations of reaching US$75 billion in revenue

SECURITY SOLUTIONS // 43


CCTV

by 2022, at a compound annual

derived from Big Data to provide

gender and ages, in-store time

cameras at the network’s edge.

growth rate (CAGR) of 15.4 percent

immediate insights and forward-

spent, average spend and traffic

These edge-based cameras have

from 2017 to 2022. What has

looking predictions.

generated by the new kiosk.

a powerful computing element

• agricultural drone surveillance

changed in surveillance is not how

and capable storage device

data is captured, but how it can

These Fast Data examples include:

where analytics can be used to

implemented within that enables

be used to drive actions – not only

• parking space management

survey a farm and surrounding

local capture and analysis (where

as part of a Fast Data application

where analytics can be used

land, diagnose vegetation and

the data is generated and lives),

that analyses data as it is captured,

to determine peak hours of

crop health, determine possible

providing the valuable insights in

but also as part of a Big Data

operation, disabled parking

yields, track livestock and food

real time, without the effects of

application that analyses data when

use, areas of congestion,

consumption, as well as insect

network availability or latency.

required. It is no longer about

average parking durations and

and pest populations.

just storing data, but what can be done with it once captured that is

unmoved vehicles. • machine production analytics

• smart city scenarios where

Sample Use Case

analytics can be used to

Authorities are looking for a

fueling a new generation of ‘smart’

that can be used to determine

provide safety and evacuation

missing senior citizen with mental

video applications.

yields produced, failures

information, and can coordinate

incapacities who may need help.

that occurred or about to

with weather and traffic data

They believe he entered a store

What is Smart Video?

occur, machine issues and

to create the fastest evacuation

and left. In a Big Data application,

Smart video is about this shift from

inefficiencies, upcoming

routes out of a city.

someone would have to review

imagery to insights, from simply

maintenance and peak hours

The need to provide intelligent

tons of captured video, looking

collecting data for forensic and

of operation.

capabilities within video

backwards to find evidence of

surveillance, coupled with the

this lost soul in the store, and

backwards-viewing, to analysing

• customer retail buying

and understanding the context of

preferences where analytics can

development of cloud-based

possibly perform some additional

the data captured. It uses artificial

be used to determine how many

surveillance systems, has led to

analysis on the data to determine

intelligence (AI) and algorithms

people entered the store, their

the evolution of a smart breed of

his actions, identify the time he

44 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


content to the main server, which

Christopher Bergey is

the capacities, capabilities and

is expensive and dependent on

responsible for developing

applications of its products. These

network availability, but instead

and driving Western Digital’s

forward-looking statements are

use a combination that stores data

embedded storage solution

subject to risks and uncertainties

locally at the camera level, as well

strategies in the mobile and

that could cause actual results

as an edge gateway that enables

connected market segments,

to differ materially from those

video and data to be aggregated at

including smartphones and

expressed in the forward-looking

various distances from the edge,

tablets, automotive, industrial,

statements, including development

and back to the cloud where Big

connected home and other

challenges or delays, supply chain

entered or left the store, and take

Data content typically resides. A

connected, Internet of Things

and logistics issues, changes in

some action. In this example, Big

video surveillance system that

environments. Prior to joining

markets, demand, global economic

Data analysis is performed after the

uses edge cameras and this storage

Western Digital, Christopher

conditions and other risks and

event has occurred.

strategy will reap high system

served in senior management

uncertainties listed in Western

Utilising AI and algorithms

and service reliability, low total

and marketing roles for Luxtera,

Digital Corporation’s most recent

from Big Data, Fast Data responds

cost of ownership (TCO) and the

Broadcom, Multilink Technology

quarterly and annual reports

to events as they occur. Once the

ability to scale without adding

Corporation and Advanced Micro

filed with the Securities and

senior citizen enters the store, a

expensive recorders or servers to

Devices. He received his MBA

Exchange Commission, to which

Fast Data app can perform real-

the surveillance system.

degree from the University of

your attention is directed. Readers

Maryland and Bachelor degree

are cautioned not to place undue

time facial recognition from the video feed, comparing the senior’s

Final Thoughts

in Electrical and Computer

reliance on these forward-looking

face to a database library of facial

Fast Data applications for smart

Engineering from Drexel

statements and we undertake

signatures. If the facial signature is

video are endless and have only

University. Visit www.sandisk.

no obligation to update these

detected, the application can trigger

scratched the surface of real-world

com and www.wdc.com for

forward-looking statements

a security alert to help the senior

use. We amass and generate large

more information.

to reflect subsequent events

in distress and get him back to his

amounts of information from the

family safely.

increasing number of data points

Forward-Looking Statements:

captured by such edge devices as

This article may contain forward-

Corporation or its affiliates. All

The Data Storage Strategy

surveillance cameras. Applying

looking statements, including

rights reserved. Western Digital is

analytics to real-time captured

statements relating to expectations

a registered trademark of Western

As Big Data gets bigger and

data is driving new smart video

for Western Digital’s embedded

Digital Corporation or its affiliates

faster, and Fast Data gets faster

applications whose video streams

and integrated products, the

in the US and/or other countries.

and bigger, the storage strategy

extract value and intelligence that

market for these products,

All other marks are the property

is to not funnel all of the video

drive actionable insights. n

product development efforts, and

of their respective owners.

securitysolutionsmagazine.com

or circumstances. ©2018 Western Digital

SECURITY SOLUTIONS // 45


FEATURE

44 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Crime Prevention Through Environmental Design BY DR LEANNE MONCHUK AND DR GARNER CLANCEY

The manipulation of the built

Ensuring that residents feel a

design and concept stages (see

environment to reduce the

sense of attachment to space

www.securedbydesign.com for

opportunity for crime, disorder

helps to foster a willingness to

further information). Evaluations

and the fear of crime is referred

take control of the area. Physical

of the scheme demonstrate that

to as crime prevention through

security aims to ensure that robust

homes built to the SBD standard

environmental design (CPTED)

security measures (such as door

experience less crime and

(Crowe, 2000). CPTED is a

and window locks) are installed

disorder than those which are not

multi-disciplinary approach

on individual dwellings to

built to the standard (Armitage &

which draws upon key aspects

withstand attack from offenders.

Monchuk, 2011).

of environmental criminology,

Management and maintenance

architecture, planning and urban

relate to the importance of

reducing the opportunity for

design (Cozens, 2008). CPTED

ensuring that a development is

crime and disorder through the

is underpinned by a number

free from graďŹƒti, vandalism and

design and planning of the built

of principles: i) surveillance; ii)

litter. In doing so, it transmits

environment is documented

movement control; iii) defensible

signals to residents and visitors

in national policy (see, for

space; iv) physical security and v)

that the area is cared for.

example, Section 79c Guidelines

management and maintenance. Surveillance aims to ensure

securitysolutionsmagazine.com

Whilst the importance of

of the Environment Planning and CPTED depends for its

Assessment Act 1979 in New South

residents are able to observe the

realisation on a number of

Wales), there is little guidance to

areas surrounding their home

different agencies, notably the

state how it should be embedded

and their neighbourhood and

police, urban designers, planning

in practice. Undoubtedly, there is a

witness, challenge or report

authorities and developers. There

plethora of considerations during

any suspicious behaviour.

is no shortage of evidence that the

the design and planning stage of

Movement control aims to ensure

elements of CPTED are relevant

any development and CPTED is

that opportunities for access,

to the incidence of crime and an

merely one. However, research

egress and through movement

example of this is the findings

has highlighted that practitioners

are minimised to prevent

from evaluations of the Secured

responsible for reviewing

unauthorised access. Defensible

by Design (SBD) award scheme

development applications are

space refers to the clearly

in the UK. The scheme aims to

often frustrated that CPTED is

deďŹ ned ownership of space in a

encourage those involved in the

considered too late in the planning

neighbourhood and encourages

design of new developments to

process and that often this

and promotes residents to feel

design out crime by ensuring

consideration is merely tokenistic

a sense of responsibility for the

that the principles of CPTED

(Monchuk, 2016; Clancey et al,

areas adjacent to their home.

are considered throughout the

2018).

SECURITY SOLUTIONS // 45


FEATURE

We have conducted a number

requires engagement with key

developments in policy,

of research projects (both in the

stakeholders at the design/

UK and Australia) to examine the

concept stage to consider

process through which CPTED

how crime prevention can be

is a need for greater research

is applied and implemented.

seamlessly (and aesthetically)

within the field to establish a

Regardless of jurisdiction, key

embedded into the design of

dedicated evidence base to ensure

findings highlight a number of

new developments, whilst

that CPTED can improve and

areas that are frequently raised

addressing other key agendas.

evolve. The development of an

by practitioners tasked with the

• Understanding the local

practice and research. Finally, we believe that there

extensive suite of case studies

delivery and application of CPTED.

context is imperative. This can

is one way in which this can be

We believe that this connects to

be achieved by undertaking

achieved, as often developments

security practitioners and their

site visits, analysis of data

that have received CPTED

role in preparing security risk

(such as crime data) and

recommendations are rarely

assessments. Whilst the literature

consultation with key

revisited and systematically

states that CPTED is effective in

stakeholders (including

reviewed. Establishing a

reducing opportunities for crime

residents) familiar with the

comprehensive suite of case

and disorder, it is important

local area.

studies to regularly review and

to acknowledge: • Whilst the importance

• There is a lack of training

monitor developments over

provision for those

periods of time can help better

of considering CPTED is

implementing the principles

inform policy and practice and

documented in policy and

of CPTED. Current training

also identify training and CPD

guidance, a process is required

provision tends to be brief.

needs. n

to ensure that this is translated

Our research has identified

in practice and implemented

that the principles of CPTED

on the ground.

are applied inconsistently

references, email admin@

and that the terminology

interactivemediasolutions.com.au

• CPTED represents a multi-

For a full list of

Dr Leanne Monchuk is a

disciplinary approach to

used to describe CPTED

crime reduction and thus, it

varies significantly (Monchuk

senior lecturer in Criminology

must be a consideration for

et al, 2018). This needs to

& Policing at the University of

all the different stakeholders

be rectified.

Huddersfield (England). She can be

and agencies involved in the

• There is a need for the

design and planning process

provision of dedicated

hud.ac.uk or Twitter: @

(for example, urban designers,

professional training

LeanneMonchuk

planners, developers) as well

and ongoing continuing

as those with a specific crime

professional development

senior lecturer in Criminology at

prevention/security focus.

(CPD) to ensure that those

the University of Sydney. He can

practising CPTED do so

be contacted via email garner.

early in the design and

consistently, but also remain

clancey@sydney.edu.au or Twitter:

planning process. This

abreast of updates and

@GarnerClancey

• CPTED needs to be considered

46 // SECURITY SOLUTIONS

contacted via email l.y.monchuk@

Dr Garner Clancey is a

securitysolutionsmagazine.com



FEATURE

48 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


THE WORLD’S MOST PROTECTED ARTEFACTS BY LEON FOUCHE

From fine art to intricate jewels,

As well as this, the Guinness

returned a few hours later and the

of past vandalism attempts

we’ve acquired some precious

World Records has stated that the

painting had not been returned; it

(throwing stones, acid etc.). The

items over the years that come

painting has the highest known

had been stolen.

glass is reportedly almost two

with immense value and high

insurance valuation in history —

insurance costs. As heist movies

standing at $100 million in 1962.

entire week as investigations were

is held in a special sealed box

make their way back into our

However, the inflation rate takes

carried out. There were many now

that protects it from vibrations

cinemas — recently with the

this up to $821,746,666.67 in 2018,

famous-faces on the suspect list

and humidity. Public visitors are

Ocean’s reboot (Ocean’s 8) and

making it one of the most valuable

for the theft of this masterpiece,

separated from the piece by a

an epic sting scene in Marvel’s

items in the world.

including Guillaume Apollinaire

queue barrier, but that is only

and Pablo Picasso; but they were

one aspect of the state-of-the-art

both cleared of all charges.

security systems that the Louvre

Black Panther, you’re probably

The Mona Lisa was never

The Louvre closed for an

centimetres thick and the painting

wondering how we actually

delivered to its intended owner

protect these types of assets and

(and never signed by Da Vinci

keep those scenarios fictional.

himself) but was sold to King

Peruggia, was found two years

Francis I and supposedly entered

later when he attempted to sell the

of museum, there is 24-hour

security experts, we take

the Royal Collection in 1518.

painting to a museum in Florence.

surveillance of closed-circuit TV

a look at the world’s most

After the French Revolution,

It’s often described as one of the

cameras, access control systems

protected artefacts, the security

the painting was moved to the

greatest thefts in the 20th century,

and intruder-detection equipment

measures that are in place and

Louvre; what was thought to be a

as Peruggia stole the piece during

(including video analytics) to help

how these prevent any sort of

safe-haven for the piece — but it

working hours, hid in a broom

protect some of the finest pieces of

criminal activity.

wasn’t.

closet and waited until after hours

art in the world.

With the help of leading

In 1911, the painting was

The real thief, Vicenzo

has put in place. Covering 70,000 square meters

to walk out of the museum with

The Mona Lisa

stolen. However, it took a few

the painting positioned under his

Sweden’s Crown Jewels

The painting by Italian Renaissance

hours to realise so. French painter,

coat. However, the thief was only

You’d think that the protection

artist Leonardo Da Vinci was

Louis Béroud visited The Louvre

jailed for six months as it was

of the Crown Jewels in Sweden

crafted between 1503 and 1517

and found that the painting was

defined as an act of patriotism for

would follow suit of those

and is known as one of the most

missing — he asked the guards

Italy. The painting returned to its

in England, but the security

recognisable pieces of art in the

about its whereabouts and they

home in Paris.

measures that have been put

world. In fact, the piece itself is the

weren’t entirely sure and assumed

Now, the Mona Lisa attracts six

most known, most visited and most

that it was being photographed for

million visitors every year and sits

expectations. In August 2018, two

written about in modern times.

museum advertisements. Béroud

behind a bulletproof glass because

crowns and a royal orb which

securitysolutionsmagazine.com

in place do not live up to those

SECURITY SOLUTIONS // 49


FEATURE

belonged to King Charles IX of

for them — and no one wants

in 2012, people with the right

behalf of the Ministry of Defense.

Sweden and his wife Christina

to put themselves at risk of

credentials should only be able to

Additionally, these guards are

of Holstein-Gottorp were

being caught. As well as this,

enter certain areas of the palace.

accompanied by 38 Yeomen

stolen in what looked like an

they’re extremely valuable and

amateur heist.

the thieves would have to find

Warders, who are ex-military personnel who manage the large

the right buyers. The jewels are

The Crown Jewels of the United Kingdom

not always on public display at

made from the noblest metals

From the Imperial State Crown

are permanently present and live

Strangnas Cathedral though. The

and the gold value is worth

to the Sovereign’s Orb, the royal

in the tower itself.

gems were originally created as

around £43,000.

family has acquired many special

The 400-year-old jewels were

funeral pieces and were buried

But, this isn’t the first time

numbers of visitors. The Yeomen

The Crown Jewels are only

treasures over the centuries. With

used for special occasions, such

in the tomb with them but were

that royal jewels have been

23,578 delicate stones and over

as Coronation and State Opening

later unearthed. Although the

stolen in Sweden. In 2012, a

140 objects, putting an exact price

ceremonies, and can be only

theft was premediated, it was

19-year-old refugee claimed to

on the jewels has been difficult but

removed under the authority

extremely insufficient. Two men

be a friend of a member of the

estimates have been made stating

of the Lord Chamberlain who is

walked into the cathedral around

royal family and stole £73,700

that they are worth over £3bn.

the head of the Royal Household.

midday and smashed the glass

worth of jewels — but sold them

As well as this, it has also proven

However, when this type of

where the contents were held —

only for £730 to drug dealers

impossible to insure them because

activity occurs, armed police

causing alarms to go off around

for marijuana. As well as this,

of their immense value.

officers must be present. n

the building.

the thief also reportedly stole

The two men escaped from the crime scene by bicycles and then by a motorboat along Lake

Because of this, heightened

a £30,350 tiara and threw it off

security is required, and the

Sources:

a bridge.

collection is locked away in the

• www.thevintagenews.

Evidently, security is not at

Jewel House at the Tower of

com/2017/12/15/mona-lisa-wasstolen-in-1911-2

Malaren, entering Stockholm’s

its finest in Sweden. Although

London. Believe it or not, the

archipelago. However, one of

the stolen crown jewels from the

crown jewels are protected by

the thieves was soon tracked

cathedral were on public display,

bombproof glass and although the

down because of blood left at the

they weren’t properly protected,

tower is open to the public, they’re

• www.louvre.fr/en/security-officer

crime scene and the jewels were

and the thieves should have

watched by more than 100 hidden

• www.express.co.uk/news/

partly recovered.

been detected as they walked

CCTV cameras.

Although they intended to

in. With artefacts of immense

As well as this, the Tower of

steal the crown jewels, they

value situated in the building, the

London has its own 22-strong

would have been extremely

cathedral should be looking at

Tower Guard, which is a

hard to sell on the black market

installing walkthrough security

detachment of the British Army;

purely because government

door frames and regular visitor

who has a sole purpose of

authorities would be out looking

searches. In terms of the theft

protecting the Crown Jewels on

50 // SECURITY SOLUTIONS

• www.jerrysartarama.com/blog/ did-you-know-the-mona-lisa

world/999615/sweden-crownjewels-royal-swedish-policeheist-thieves-Stragnas-cathedral • www.mirror.co.uk/news/uknews/how-much-crown-jewelsworth-11855338 • en.wikipedia.org/wiki/Jewel_House

securitysolutionsmagazine.com


VIDEO DOESN’T HAVE TO BE EXPENSIVE TO BE EFFECTIVE

With years of experience across hundreds of clients, let us show you how we can help you generate more business than ever before. enquiries@interactivemediasolutions.com.au


AVIATION

52 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


DO WE NEED ANOTHER AVIATION SECURITY REVIEW? BY STEVE LAWSON

Between June and September

vulnerabilities, since insiders,

2005, the Rt Hon Sir John Wheeler

me included, tend to focus on

those areas of aviation security

PC DL JP KStJ undertook “an

areas that interest them or with

that are most vulnerable so

independent review of airport

which they are familiar. It is the

that resources and expenditure

security and policing for the

equivalent of the ‘you never see

could be most effectively

government of Australia” – that

what needs repairing in your own

applied. We thought that it was

was the last major external review

home’ syndrome.

counterproductive to continue

of aviation security in Australia.

to spend more and more money

I would respectfully suggest

familiar with what can and cannot

on aviation security unless it

that the Wheeler review was an

be exploited and you know the

was being spent wisely and

animal of its time; it engaged with

limitations of equipment and

addressing actual vulnerabilities.

industry rather than undertook

processes. I could walk through

Our proposal was that it would

tests to identify vulnerabilities.

any screening point in the world

be best to undertake the review

While I am not suggesting that

with a weapon. (I do not by the

at both a high level and at an

the recommendations of the

way, but I know I can.) I also know

operational level. At the high level,

review were not warranted, I

that it would be reasonably easy to

we proposed an oversight team

do hold a view about how they

destroy an aircraft at the boarding

that included:

were implemented, but that is for

gate and that most airports in

• Assistant Administrator for the

another article.

Australia do not have anything in

Office of Security Operations

place to stop the types of attacks

for the U.S. Transportation

security in the intervening 13

I can think of. (I am not going to

Security Administration

years, so it can be argued that

include here how to do that, you

(the person in charge of all

it is time for another external

will just have to take me on trust.)

review and perhaps one that

It is also less likely, but not

delves a little deeper than the

unfeasible, there is a threat from

Wheeler review.

industry insiders and attackers

A lot has happened in aviation

In the context of full disclosure,

securitysolutionsmagazine.com

More importantly, you are

Our proposal was to identify

are more likely to be from the

US airports) • Head of the Counter Terrorism Security Advisors (CTSAs) for the New Scotland Yard • National Security Adviser to

in July 2017 we contacted the

public. So, any review should look

the Prime Minister of Israel

then infrastructure minister

at what are attractive weapons or

and Head of Israel’s Counter

(among others) to propose an

systems to outsiders and where

external review that, unlike

they could use them to attack

the Wheeler review, had a very

aviation. The professional terrorist

for Ben Gurion Airport

strong operational focus. We

should not be forgotten, but again

• Head of Security for El Al

were not so much interested in

their view of what may be an easy

They were to be supported by

what the Government and local

way to attack aviation may be

equally eminent people from

aviation industry thought were

different from mine.

Australia’s aviation sector. It does

Terrorism Bureau • Security Operations Manager

SECURITY SOLUTIONS // 53


AVIATION

not matter how familiar you are

people in the high-level team were

that there are no major issues in

screening is among the best in the

with international aviation, there

giving us ‘mates rates’ (most have

Australian aviation security; in

world, but to be honest that is too

are nuances to local aviation, so

been friends for many years) and

fact, there are things that I think

obvious. Once the vulnerabilities

the local members would provide

as hard as it is to believe they are

are better here than elsewhere.

have been identified, the higher

the Australian operating context.

public servants in the truest sense,

For example, our Aviation Security

level panel can suggest changes

It was about a blue-ribbon group

they want to make a change for

Identification Card (ASIC) model

to legislation and regulations and

as you could get.

the better.

is probably the best in the world

where money and effort can be

and, as I have said earlier, I think

best spent to ensure Australian

For the operational part of

The answer we received from

the review, we proposed teams

the Federal Government was,

our screeners are among the best

aviation is not just secure, but

that would undertake a series

basically, thanks but we will

in the world. However, I do know

that it returns to being a leader in

of vulnerability tests. One team

undertake a review internally.

of vulnerabilities and I think that

the field. n

would undertake intelligence

At about this point, I expect

in the last decade or so as a sector,

gathering and the other

some readers may say that I

Australia has gone from being a

attempt to use the intelligence

am upset that our proposal

leader to a follower.

reports to exploit any identified

was not accepted; if I am to be

vulnerabilities. The teams we

honest, there is a little of that.

is to suggest that it is time to

with Qantas, Steve held a number

proposed using have conducted

However, this is not the greatest

undertake an external review of

of senior management roles

and do conduct similar exercises

disappointment we have had as

aviation security. After this article,

covering all aspects of aviation

in other parts of the world,

a business and if you graded my

I have no doubt that we would

security from policy development

including Europe and the US.

frustration, maybe 10 percent

be at the bottom of the list of

to airport operations. He was

You would expect that the

is disappointment that we did

organisations selected to undertake

sent to New York immediately

cost would be exorbitant, but we

not get the work, but 90 percent

such a review, but it needs to

following the 9/11 attacks to

thought we could undertake the

of my disappointment is that

be done by someone. Getting a

manage the Qantas response

review quite economically and, as

the Government thinks that

group like the one we proposed

and undertook a similar role

it turns out, our proposed budget

an internal review is at any

would be difficult, at the price we

following the 2002 Bali Bombings.

was just over half a percent of

level acceptable.

proposed probably impossible,

On his return to Australia, he

but something a little more than

was appointed Security Manager

the ‘injection’ that the Federal

I think a large part of the

So, the purpose of this article

Steve Lawson has over 20 years’ experience in aviation security. As a security executive

Government put into aviation

Government’s decision was based

the Wheeler review should

Freight for the Qantas Group. Since

security in that year’s budget.

on ‘what if they find something

be undertaken.

2007, he has been a director of

With respect to that injection, I do

wrong as a department?’ More

not have details of everywhere it

importantly, what if they find

be conducted in two parts.

with Bill Dent, a fellow former

is being spent, but I am not sure

that they have made errors

Firstly, a group should identify

Qantas security executive. Steve

that all of it is being spent in the

personally? Not so much the

vulnerabilities; not just, “I can

can be contacted via email

most effective areas.

minister, but those advising him.

get this through a screening

slawson@avsecconsulting.com or

point”; as I said earlier, Australian

on 0404685103.

I will confess that most of these

54 // SECURITY SOLUTIONS

Before I go further, I think

Most importantly, it should

AvSec Consulting in partnership

securitysolutionsmagazine.com


NEW!


ACCESS CONTROL

ELECTRONIC ACCESS CONTROL INTEGRATION IS THE FIRST STOP ON THE ROAD TO SMARTER BUILDINGS BY JIM DEARING

56 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


According to recent research by IHS Markit, one of the most influential tech analysis firms in the world today, electronic access control systems are the leading type of security system being integrated into building management system (BMS) platforms. In fact, 29.6 percent of access control equipment shipments – including readers, door controllers and electronic locks – were installed and connected to a BMS platform in 2017. Furthermore, unit shipments of access control equipment that is connected to a BMS platform are forecast to outpace the rest of the market by a considerable margin, increasing at a compound annual growth rate (CAGR) of 12.5 percent over the next five years. By comparison, total market unit shipments for access control equipment are forecast to rise at a CAGR of 8.8 percent.

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 57


ACCESS CONTROL

Our Analysis

allow access control providers

end-users to manage a

visualisation directly affect a

Partnering with BMS providers,

to protect themselves from this

wide variety of building

user’s experience with BMS

or developing proprietary

threat. However, outside the top

management functions via a

platforms, these tools have also

building management systems,

ten access control providers, few

single platform. As the process

become crucial differentiators

will become an important part of

companies possess the financial

is centralised and simplified,

for competing products in

access control providers’ product

resources and existing product

it can be completed using

roadmaps over the next five years.

portfolio to compete against the

fewer resources.

• Analytics – BMS platforms

This trend is especially relevant to

leading BMS market incumbents.

• Data visualisation –

offer automated testing,

providers aiming their solutions at

The primary reasons BMS

Accumulated data from

reporting and fault detection

platform integration is becoming

multiple domains can be

and preventative diagnostics

more popular are as follows:

categorised, structured and

functionality to end-users.

• Interoperability – BMS

presented to end-users in a

These offerings improve

will need to remain vigilant as

platforms are capable of

series of charts, graphs and

building security by ensuring

full command-and-control-style

aggregating significant

other visual tools designed to

all devices are working

BMS platforms become more

amounts of data from

easily communicate complex

optimally. They also allow

popular. Opting to develop a

equipment across many

information to viewers.

end-users to compare

proprietary solution would

domains, which allows

As dashboards and data

historical data and recalibrate

the enterprise segment. According to HIS Markit, leading access control providers

58 // SECURITY SOLUTIONS

the market.

securitysolutionsmagazine.com


exert ultimate authority, as the building’s intelligence and its analytics supersede orders from software in access control and other subordinate domains. However, access control suppliers are uncomfortable relinquishing this authority to third-party BMS platforms, because their software feature sets are what enables them to differentiate themselves from their competitors. Another barrier is the fact that end-users can often be slow to adapt to new technologies. During the past decade, the access control industry has struggled to bring security and IT departments together. Smart building integration would likely add a third entity into the mix: facility managers. Due to the slow speed at which large organisations often restructure, getting these three departments to effectively collaborate to leverage the true capability of full building integration is an issue that is unlikely to be resolved in the next five years. The information and statistics presented in this article are taken from the 2018 Smart Building Report by HIS Markit. individual subsystems to

platform regarding building

subsystems to respond to

This report examines the global

improve efficiency.

occupants’ whereabouts and how

individual occupants’ actions, the

market for the equipment and

they move through the building.

need for access control integration

BMS platforms installed in

grows exponentially. Physical

building projects and analyses

• Changes to the supplier base – Many leading security

BMS platform integration

manufacturers are investing

can allow the access control

access control systems and

significant trends, threats

heavily in developing their

authentication decision to become

identity management platforms

and opportunities for growth

wider building managing

smarter, by taking into account

are the key to initialising many

affecting this market through

portfolios, to ensure their

information from other connected

BMS processes, since they provide

2022. BMS platforms include

competitive advantages are not

security or building-management

the starting command that lists

any computer-based control

eroded by rivals offering more

systems. A simple example is using

the tasks users must accomplish

system that monitors some or all

complete solutions.

video surveillance feeds to verify

once a specific person has entered

of a building’s mechanical and

access control card swipes.

the building.

electrical systems, including a

Access Control Versus Other Security Equipment

is essential to unlocking the potential of higher level BMS

The Barriers to Wider Adoption

Access control systems are

platform functionality. As more

One of the main barriers to

considered to be an important

BMS solutions move towards

adoption are worries over who is

analyst, security and building

piece of the smart building puzzle,

command-and-control-style

actually in charge. In centralised

technology with IHS Markit. Visit

due to the quality of information

features, which allow buildings

architectures, the BMS platform

https://technology.ihs.com for

the system can provide the BMS

to adjust building management

provider will always want to

more information.

securitysolutionsmagazine.com

Access control integration

building’s energy, security and life safety domains. n Jim Dearing is a senior

SECURITY SOLUTIONS // 59


LOSS PREVENTION

GIFT CARDS HAVE BECOME A COMMON CURRENCY FOR ORGANISED RETAIL CRIME BY JACQUE BRITTAIN

60 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Organised retail crime (ORC) is

criminals are attacking retailers

by no means new to the retail

with a voracious appetite.

environment, but is rather a challenges us in new and different

High Value, High Demand

ways as it grows and evolves

Businesses targeted by ORC are as

at a rapid pace. With thieves

diverse as the types of products

and the supporting criminal

targeted, whether department

market urgently seeking new

stores, home improvement stores,

and creative ways to pilfer goods

specialty stores, supermarkets,

and maximise their profits, it

pharmacies, convenience

becomes increasingly important

stores, category killers, or other

for retailers to keep pace. A big

types of retailers. Every area

part of this involves keeping

of retail can be affected and no

current with both the means and

company is immune from the

the methods of the professional

prospective threats. Attacks can

theft enterprises invading the

come through the front door,

retail space.

back door, internally, over the

criminal element that consistently

For many years, there have been theft groups that have moved from store to store and market to

securitysolutionsmagazine.com

Internet, or anywhere along the supply chain. ORC groups can potentially steal

market, stealing large quantities

a wide array of products, including

of goods and selling product

over-the-counter drugs, razor

through a variety of different

blades, baby formula, cigarettes,

venues. However, while many

batteries, video games, CDs, DVDs,

of the basic concepts may be the

gift cards, jewellery, large or small

same, the execution – and the

electronics, designer clothing,

potential consequences – have

power tools, high-end meats, or

been greatly magnified. With the

any number of items that are in

reach and sophistication of these

high demand. Essentially, product

networks, the advancements

is only limited by the needs of the

in technology, the potential

criminal element, the ingenuity

profitability of the illegitimate

of those attempting to steal the

venture and the diverse ways

products and the expedience

that they can impact the retail

through which the product can be

business, today’s professional

sold and converted to cash.

SECURITY SOLUTIONS // 61


LOSS PREVENTION

police also tracked 83 to 98 overdoses to gift cards during a three-month period. Senator Briggs was stunned by these numbers. “It would be no different than if there was a rock lying there, and if you lifted it up, and this horrible smell came out, and this monster came out,” he said. “We had no idea that the organised retail theft was related so intimately with the opiate and drug trade in general in Appalachia. We have a crisis in Tennessee where goods are stolen and then returned to retailers for credit on a gift card. The cards are sold for cash, which in turn is fueling the illegal drug market.” Senator Briggs introduced new legislation approved by the their value, they can return

Ties to the Illegal Drug Market

Tennessee General Assembly this

limitations. Some products can be moved quickly and at

the merchandise to the store,

It is widely known that

two new theft offences to

high volumes, while others

receive a gift card and sell the

shoplifting is considered a

prosecute individuals who return

are largely dependent on the

gift card for up to 80 percent of

gateway crime, a criminal

stolen merchandise to receive

buying market to support the

its market value. Factoring in the

offence that, in general terms,

money, gift cards, or store credit.

criminal enterprise. So, in

sales tax portion of the return,

often leads to other more serious

order to maximise profits, ORC

which can bring an additional 5

or harmful criminal issues such

networks would also return

to 10 percent depending on the

as drug-related crimes and

Education and Awareness Are Critical

stolen merchandise back to

state, the thief can be looking

abuse, gun-related incidents,

Dealing with the many aspects

the retailer without a valid

at an 85 to 90 percent return

violent crimes and even

involved with ORC requires an

receipt. With many retailers

on their ‘investment’ for the

terrorism. There are now even

advanced level of skill and training,

previously providing cash back

stolen merchandise.

reports of a direct link between

but it also necessitates sound

gift card issues and the opioid

judgment and common sense. As

In some ways, this has its

for returns under a designated

market for 60 to 70 percent of

While these gift cards can be

year defining ORC and creating

dollar amount, this well-known

sold at physical locations such

epidemic, with addicts stating

is true with every aspect of loss

approach basically resulted in

as pawn shops and other outlets,

that drug dealers will often

prevention, including retail crime,

criminals selling back the stolen

online sales sites currently

accept gift cards as payment in

it is critically important that we

merchandise to the retailers for

provide an easy way for thieves

lieu of cash.

remain aware of recent trends by

substantial profit.

to convert the cards to cash. A

For example, State Senator

working closely with other retailers,

simple Google search using the

Richard Briggs of Tennessee

our law-enforcement partners and

Enter the Gift Card

phrase “sell gift cards” resulted

in the US reports a direct

local, state and federal legislators.

As retailers have responded

in more than 73 million results.

connection between gift cards

to the evolving needs of the

Gift cards can be bought and sold

and drug overdoses based on

to educate our teams, heighten

business, most have changed

on popular sites such as eBay,

reports received in his home

awareness amongst company

their return policies and typically

Amazon and even Craigslist.

state. Retail theft is prevalent

decision makers, and protect our

issue a gift card or store credit

But there are also sites that

in Tennessee, with Knoxville

customers and employees from

when returns are made without

are specifically dedicated to

reportedly ranking first in the

these incidents. Sound judgment,

a receipt. Unfortunately, this

purchasing ‘unwanted’ gift

nation per capita for card abuse

safety, prevention and awareness

still offers the thief a lucrative

cards such as Raise, Cardpool,

and theft. In Knox County, he

should be our ultimate objectives as

opportunity. Rather than fencing

CardCash, and even Gift Card

revealed that police linked 16 of

we develop the strategies necessary

the merchandise for 30 percent

Granny that offer various buy-it-

19 overdoses to the sale of gift

to help us detect issues, deter

of its value on the street or selling

now options that enable a quick

cards during a one-month period

incidents, protect resources and

the goods on the secondhand

turnaround for the gift cards.

in 2017. In the city of Knoxville,

resolve these issues. n

62 // SECURITY SOLUTIONS

Every effort must be made

securitysolutionsmagazine.com



PROFESSIONAL DEVELOPMENT

IF THE TRUTH BE TOLD… HOW TO UNCOVER A LIAR PART II ELLY JOHNSON

In the last edition of Security

is easy and the time he takes to

answer, “YES”. Jim does not want

Solutions Magazine, we posited

other five questions I promised

verbally respond will probably

to tell the truth, so the process of

a hypothetical scenario where

you to help uncover a liar.

be quite fast. He does not need to

lying commences.

Here we continue on with the

money was stolen from an office worker’s bag, which was stowed

put much thought into it because

Question 2: Did you take the $500?

Remember, in this scenario

the answer his honest brain

both people are denying

comes up with in less than a

knowledge or involvement, so

second is the same as the honest

Jim also answers no. But there

straightforward and direct

verbal answer he is about to give.

is a difference in his answer.

question and you are right, it

To this question, truthful people

Deceptive people may not be as

innocent, “Do you know why I

is. These questions are simple

usually offer spontaneous, direct

strong in the denial. They may

asked you here today?”, started

yet effective. One thing to

and sincere denials such as ‘no’

be evasive or even defensive. Be

to reveal the difference between

understand as you go through

or may add reinforcing language

sure to watch the body language

honest Eddy, who had nothing

the questions is that the brain

like ‘absolutely’ and ‘no way’.

and response in Jim’s face as

to hide, and Jim, who had to

always answers a question

Eddy looks you in the eye when

well. In this case, Jim pauses

deal with extra emotional and

truthfully at an unconscious

he says it and you do not see any

a little before he answers,

cognitive stress to try to second-

level. This happens before the

shift or change in his body. His

shifts in his chair, looks away

guess how an honest person

person consciously gets hold of

head shakes no at the same time

and says with a bit of a scoff

might answer the question. Jim

the question and starts to give

he says no.

in his response, “No”. (Do not

was more vague, used language

an answer.

under a desk. Now, you are tasked with identifying who stole the money. Our first question, a seemingly

to reduce the seriousness of the

This seems like a

So, imagine we ask Eddy, “Did

What if we ask Jim the same

make the mistake of jumping

question? Remember, the brain

to conclusions too early. Make

incident and used verbal fillers

you take the $500?” His brain

always answers the question

sure you are not showing signs

(“ummm…”) to buy himself more

can honestly and quickly answer,

truthfully first. So, what does

of judgement in your own

thinking time.

“No”, because that is the truth. It

Jim’s brain say? Of course, it will

behaviour.)

64 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


securitysolutionsmagazine.com

SECURITY SOLUTIONS // 65


PROFESSIONAL DEVELOPMENT

deceptive person thinks he

he thought for a moment. His

or she is doing very well with

verbal response was calm and

the answers and not giving

was accompanied by a shrug and

Question 4: Who would you eliminate from this investigation?

anything away.

a shake.

This question will not cause

that is what comes out of their

truthful Eddy much stress because

mouth first.

With these questions, a

who took it.” Before he answered,

Before we observe Jim’s

The other thing that truthful people often do at this stage is eliminate themselves. It seems like a natural thing to do and often

Question 3: Who do you think may have taken the money?

answer, stop and consider what

all he will naturally be doing is

his brain answered – his brain

pondering who is not involved for

effort in the thinking process that

answered, “I did”, but of course

sure. He will not have a problem

someone who is lying needs to go

The truthful person begins to

he does not want to say that.

naming people who can easily be

through, and how that impacts on

think and speculate about who

Jim needs to think through the

accessed for verification. Truthful

the responses that are given. You

might have taken it. If he has no

response more than Eddy did.

people usually vouch for people

ask Jim who he would eliminate

idea, he will say so. If he does have

“Should I just say I don’t know

they know, like or trust. Eddy

from the investigation. His brain

some thoughts or clues, he will

who took it, or should I try to point

might say something like, “I would

likes this question because there is

likely proffer that too. Truthful

the finger at someone else to get

rule out Betty, because she was

an opportunity for him to open up

people usually volunteer names

them off my tail?” After a long

with me all morning. And I guess

the investigation and push the heat

and information, or apologise

delay, Jim replies, “I don’t know

you can take Bobby out of the

away from himself. He can use this

if they have no information

who took it, or even if it was taken.

picture because he is out of action

question not to narrow the field by

or suspicion.

I guess it could’ve been anyone.”

laid up at home with a broken

eliminating the people he knows

See the difference in those

ankle, so he wasn’t there, that’s

did not do it, but by broadening

for sure!”

the scope of who may have been

Eddy’s response to the question is, “Sorry, I have no idea

66 // SECURITY SOLUTIONS

two responses?

The key is to consider the extra

securitysolutionsmagazine.com


to himself by the answers that

punishment that is imposed on

you’ve got no evidence and you

he is giving. He thinks he is

himself if he is found out at some

have no idea whatsoever that I

coming up with very logical and

point. Why would he start dishing

took the money”, or, if his guilt

practical answers that make

out big penalties when there is a

or remorse for what he did has

him seem wise and helpful. But,

chance that such penalties will fall

kicked in, he might be thinking,

because his brain is processing the

on him? So, Jim might answer the

“I wish I didn’t take the bloody

information differently than the

question with something like, “Oh,

money, I’m screwed if I get found

truthful person, he cannot help but

I don’t know, maybe they should

out, it was a stupid mistake.”

respond differently.

get a warning”, or, “They should

Question 5: What do you think should happen to the person who took the money?

Either way, Jim has to go

definitely repay the money”, or

through a process that Eddy does

maybe even, “Gee, I’m not sure, it’s

not go through. He has to decide

not really my place to say”.

on the best answer that will lead you away from suspecting that he is involved. But as he tries to come

here is truthful people offering

Question 6: What do you think the person who did this would be thinking now?

harsher judgments, penalties or

Truthful people with nothing to

with something like, “I don’t know,

punishments. Why? Because it

hide will not find this question

maybe they are sorry they took it

does not impact on them. If they

stressful. Their response shows

and maybe they made a mistake.”

think what happened was wrong,

that they are trying to imagine

or unjust, or illegal, then they

what another person might

questions I am not expecting an

are likely to be able to clearly

be thinking. They will likely

easy admission or confession. Of

express that and back it up with

ponder the question for a while

course, in real life, at any point the

the thinking or reasoning that

and might offer a response that

guilty party may decide to come

led them to that conclusion. They

is quite strong, for example, “I

clean and be truthful and spill

might say, “I think the person

imagine they are pretty worried

the beans. That is great because

should be fired from their job.” Or

at the moment, especially because

then you will have the truth and

maybe, “They should be charged

there is an investigation going

you can take it from there. What

with theft and lose their job as it is

on about this”, or maybe, “They

we are assuming in this case is

unacceptable behaviour.”

are probably wishing they didn’t

that there is no admission or

take the money right about now.”

confession at any stage of these

thinks the same way. Not every

Eddy is only speculating about

questions – but the fact is, even

truthful person is going to offer a

what another person is thinking

though both people are denying

involved. So he may respond,

harsh penalty, particularly if they

or feeling, and you can see that his

knowledge or involvement, you

“Who would I eliminate from the

are compassionate and forgiving

verbal and non-verbal behaviour

will have a pretty good idea who

investigation? Well, I wouldn’t

in the way they think and act. That

is congruent with someone who

is not being truthful just from

eliminate anyone at the moment.

is why these questions are used in

is not stressed by this question;

their responses.

In fact, I think you should consider

a bundle and answers should not

he is just coming up with ideas

anyone to be a suspect at this

be taken as standalone responses.

about how the guilty person may

are fantastic questions; use them

stage. And, let’s face it, there’s a lot

Remember to look at the responses

be thinking.

carefully, use them wisely, and

of people that come and go from

holistically, considering not only

the office around here. We’ve got

the words, but also the non-

exactly what he is thinking right

people on level 4 of the building

verbal responses such as body

now! This particular question

and I don’t know all the people

movements, eye movements and

poses a conundrum for the

who work with the company.”

changes in posture. You also need

deceptive person as he searches

Johnson is the Founder and

This question is a good one because what we typically see

Keep in mind that not everyone

Jim, on the other hand, knows

up with an answer, it is possible that Jim’s real line of thinking may ooze out and he might come out

Remember, throughout these

So, what do you think? These

get in touch if you want to know another six questions! n A former police officer, Elly

to think about the paralinguistics

for the best answer rather than

Managing Director of TruthAbility,

himself or vouched for anyone he

of the communication – that is the

the truthful answer. Remember

an organisation that for almost two

works with, he has opened up the

tone, pitch, speed, volume, pauses,

that the brain always answers the

decades has specialised in providing

enquiry to throw the investigator

ummms and the way in which the

question truthfully. That means

a unique mix of programs,

off the scent that leads to him.

words are expressed.

Jim’s brain will give an automatic

workshops and seminars, designed

truthful response first. So, when

to help people reduce the risk

Not only has Jim not eliminated

The great thing about these

What about the deceptive

simple questions is that the

person? He is less likely to come

he is asked the question, his brain

associated with harmful deception,

deceptive person does not even

up with a harsh penalty. Why?

might answer, “I’m thinking you’re

fraudulent behaviour and

realise that he is drawing attention

Because he is recommending the

not going to catch me because

hidden truth.

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 67


FEATURE

ISIS – When Serving Terrorism Is An ‘All In The Family’ Affair: How To Recover Lost Children And Spouses of ISIS BY ANNE SPECKHARD AND ARDIAN SHAJKOVCI

This paper was presented at the 2018 OSCE-wide Counter-Terrorism Conference – The Reverse Flow of Foreign Terrorist Fighters (FTFs): Challenges for the OSCE Area and Beyond in Rome May 11, 2018 Samantha Elhassani, a 32-year-old

to rape and treat as sex slaves.

to take them in. But what are

temporarily suspend, parental

American, is sitting in a People’s

She and her children endured and

the legal challenges of severing

rights of those parents who took

Protection Unit (YPG) camp near

witnessed horror on a daily basis.

paternal rights or awarding

their children into ISIS and who

temporary custody? Inside the

are not bringing them home. This

Al-Hasakah, Syria, with her four

Samantha and her four

children (two brought into ISIS

children are now in a YPG camp

US, such decisions are carried out

is necessary so that the children’s

and two born there), awaiting her

near Al-Hasakah, Syria. She is

on a local jurisdictional level, by

repatriation and return to the US

fate. In 2014, Samantha took her

not sure if she wants to come

cities and states, not the federal

and rehabilitation can be effected

two small children and followed

home and face prosecution, and

government. At present, the US

quickly rather than stall for

her Moroccan husband into ISIS,

her children’s fate appears to

federal government does not

months on end.

only to learn that she had entered

be subject by US policies to her

appear to follow normal child

a misogynist organisation that was

decisions. So, unlike journalist

protective services protocols that

Elhassani boy has begun to say

going to force her ten-year-old

James Foley, for example, who

would swiftly remove children

he wants to become a YPG fighter,

son into making a propaganda

was taken hostage by ISIS and

from mothers who are abusive

indicating he is aligning himself

video threatening his native land

deservedly had the US Navy SEALs

or negligent; there is no doubt

with available role models. We

and that she would be subjected

mount a rescue attempt on his

that it is both abusive and

should also expect that anytime

to forced marriage when her

behalf, the Elhassani children,

negligent parenting to willingly

we leave children in camps filled

husband died, witnessing

who managed to escape ISIS,

subject one’s children to the

with ISIS cadres, they will become

rape of other women and total

are not being rescued. Despite

horrors of ISIS where they could

more, not less, like those they are

subjugation of her son to ISIS.

the YPG being an ally of the US,

witness beheadings, crucifixions,

exposed to. At the International

Samantha was not an

the US government has not to

torture, floggings and themselves

Center for Study of Violent

emotionally healthy woman

our knowledge demanded the

be forced to participate in

Extremism (ICSVE), we have

when she left her native Indiana

children be turned over. Even if

these as well as undergo sick

encountered many cases where

for ISIS. She had fallen deeply

they were turned over, there are

ideological indoctrination.

young boys were recruited into

under the influence of an evil

many issues to surmount. The two

man who his sister-in-law claims

oldest children were US passport

recommendation is that the

When young boys have no active

dealt in weapons and who would

holders, but their identities have

U.S. Department of State, the

father figure, they will easily look

later become a media man for

to be verified. The two youngest

U.S. Department of Justice and

to the men around them for role

ISIS. When he died of shrapnel

were born in Raqqa and would

Congress (along with similar

models. And girls may fall prey

wounds, Samantha, like many

need genetic testing to link them

bodies in other countries that

to the same. Likewise, sexual

other ISIS widows, was passed to

to their US citizen mother or, if she

follow the same practice of

predation of both also occurs.

another ISIS cadre. Samantha had

refuses to cooperate, with a close

leaving the decision to return

two more children born in Raqqa.

American relative. The Elhassani

home up to the mothers) work

Her husbands also brought Yazidi

children have a maternal aunt at

quickly to devise policies and

children who had no part in their

women and girls into their home

home in the US ready and willing

laws that sever, or at a minimum

decision to end up in ISIS, they

68 // SECURITY SOLUTIONS

Based on this case, our

In this case, the eldest

ISIS in precisely these situations.

All the countries involved need to acknowledge that to save the

securitysolutionsmagazine.com


Western citizenship and can be repatriated to their father’s country, despite their mothers not being Westerners. While some of the mothers arrested in Syria and Iraq are requesting to be sent home, their countries are not always keen for them to return. France for instance has claimed that French citizens, including women, who can obtain a fair trial in Syria and Iraq will be left to face justice there. It is believed that France had anywhere from 300–400 children living under ISIScontrolled territory in Syria and Iraq and some of these have now been repatriated to France. In the case of German nationals, at least six children are being held with their mothers in Iraqi camps, while the number of female German nationals held in Syrian camps stands at 15. In the US, more than 45 women are reported to have either attempted to join or joined ISIS in Syria, with at least a dozen American children ending up in ISIS-controlled territory. A majority among the thousands of suspected ISIS need to be returned home swiftly

custody. At present, it is not clear

but their culture does not allow

members who survived and were

to start rehabilitation efforts,

what, if any rehabilitation these

converts or marrying outside the

arrested are now being prosecuted

regardless if their parents do or do

children are receiving for dealing

group and does not accept children

through specialised criminal

not return home with them.

with their time living under

born as a result of rape, so their

counterterrorism courts in Iraq

ISIS. According to one Justice

mothers are left with the horrible

or local and quasi-judicial courts

informed ICSVE researchers that

Ministry official, a German non-

choice of relinquishing their

run by different opposition groups

there are currently approximately

government official recently came

children to orphanages in Mosul in

in Syria. For example, since the

700 ISIS women in custody in Iraq;

to Iraq to provide aid boxes, which

order to return home. Counsellors

establishment of the Democratic

approximately four hundred of

included milk and diapers for

working with some of these

Federation of Northern Syria

them are from Turkey, 200 from

babies, to mothers and children.

women state that the women think

(DFNS), also known as Rojava,

often of their abandoned children

different courts were set up to

and wonder how they are faring.

handle civil and criminal cases,

Iraqi Justice Ministry officials

the Caucuses in Russia, eight from

Russians recently worked to

Belgium, an unknown number

return 71 children from custody

from France and Germany, and

back to concerned relatives in

With the huge influx of

ending in the prosecution of over

some from Syria, Jordan and

Russia, along with 26 mothers.

foreign fighters, many Western

700 terrorism-related cases since

Iraq. Nearly all ISIS women were

Yet between 70 and 120 children

men married local Arab women

its establishment in 2014. In Iraq,

married – remaining single was

remain in an orphanage in

and fellow female travellers

around 100 Europeans, among

not an option – and these women

Mosul and it is estimated that

from non-Western countries.

them Belgians, Russians and

are no exception. On average,

approximately 400 Russian

Children whose killed ISIS

Central Asians, are currently being

all of them have three or more

children are still being held in Iraq.

cadre fathers were Westerners

tried in Iraqi courts, including five

children. The Iraqi prison policy

Yazidi women who were forcibly

are currently undergoing DNA

German women – one already

is to remove any children over

taken into hostage with their young

testing in cooperation with their

sentenced to death for joining ISIS

three years old from their mothers

children and taken into Syria have

claimed homeland countries to

and another hung following her

and place them in protective

now been allowed to return home,

learn if they are eligible to claim

death sentence.

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 69


FEATURE

Many countries continue to

The Elhassani boy was forced

who managed to escape ISIS with

the dangers of such violent

struggle with the question of how

her infant daughters; though it

extremist groups.

to deal with female and children

remains uncertain whether she

returnees from the conflict zones

will face charges upon return

issue of repatriation persist,

threatened fellow Americans in an

in Iraq and Syria, including

to Canada.

especially in light of bureaucratic

ISIS propaganda video. He is likely

barriers imposed by the YPG-run

to encounter significant social

women and children who remain

The issue of children taken

Legal hurdles related to the

to dress up in a suicide vest and pose with weapons while he

in the ISIS-controlled territories

or born in the ISIS-controlled

camps and detention centres

stigma when he returns home.

or detention camps in Iraq and

territory is even more complex.

in Syria. Some argue that such

Social workers, psychologists,

Syria. Given the lack of clear legal

The issue of proving nationalities,

centres do not form a legally-

teachers and school counsellors

guidelines on how to address the

challenges posed to immigration

recognised state entity, meaning

will likely all need to be engaged

issue of such returnees, many

officials prior to travel – in regard

they lack the legal authority to

to help him. Likewise, his mother

countries are dealing with them

to being issued travel documents –

detain children and women in

who travelled to ISIS as a result of

on a case-by-case basis. Difficulties

and to social services and teachers

such camps. Some governments,

her own dependency, substance

in accessing evidence from the

upon their return, and the level

including France, have openly

abuse and emotional dysfunction

conflict zone, given the complex

of threat posed by older children

demanded that adults captured in

issues also needs to be put

nature of the environments in

who served ISIS, are all looming.

Syria be left there, provided they

in treatment.

Iraq and Syria, remains a primary

The exposure to ISIS’ extremist

are guaranteed a fair trial or, in

While each country has

obstacle, as well as the fact that

ideology and even militant

the case of children, “depending

different standards of evidence

the Syrian government is not

training for some children

on their parents’ preference,

and laws to prosecute on

functioning in a large part of

makes their return particularly

either stay with them while tried

a terrorism, criminal or

Syria. In addition, there is a lack

worrisome and unwelcome

locally or be repatriated, where

child protection basis, our

of clear understanding when

by some.

they will be cared for by social

recommendation is that, when

services”. Many other countries

possible, all ISIS wives and

it comes to the roles played by

Challenges for social services

women in ISIS. Many were never

include a lack of adequate

remain undecided and uncertain

mothers be prosecuted for

asked to swear allegiance (that is,

capacities and manpower to deal

about how to proceed, especially

material support for terrorism

give their bayat) and most were

with the return of women and

as it relates to children. The policy

where such laws and evidence

not employed; however, some took

children who are very likely to

of allowing nationals of other

exists or child endangerment at

part in the dreaded ISIS hisbah

be in a traumatised state after

countries to be tried or dealt with

a minimum for the purposes of

or morality police, acting as

living under ISIS rule. While

in Kurdish-run camps is found by

being able to force them into some

enforcers who were often sadistic

some have proposed removing

some to be flawed, considering

kind of treatment to avoid serving

in flogging and biting other

children from returnee parents

their lack of adequate resources,

prison time. Separating them from

women (with metal teeth). Others

who are tried on child abuse or

politicised nature of special courts

their children and serving prison

functioned as paid propagandists

negligence charges for having

and the lack of fair trial standards.

time is not the goal, but having a

and recruiters, and a small group

exposed their children to a

Such policies seem to be a way for

means of requiring these mothers

trained to be combatants and

terrorist group, such propositions

Western countries to avoid having

to engage in meaningful therapy

suicide bombers. Likewise, there

continue to face criticism on

to deal with female ISIS members

in order to avoid serving prison

are many questions regarding

the grounds that determining a

who would be likely to face

time is. These are women who

their desire to return home and

parent’s threat level towards a

criminal charges upon their return,

may go to one or two counselling

the possible threat level posed

child is often difficult, including

but who are difficult to successfully

sessions if invited, but they will

upon their return. In some cases,

the fact that governments are not

prosecute given the challenges of

not follow a thorough course of

such as that of 33-year-old French

best positioned to guarantee the

presenting evidence from a conflict

treatment unless compelled to do

woman Emily Koening, an online

best sponsorship of every child,

zone. Yet there are no guarantees

so. We know that many who left

recruiter for ISIS, the role played

nor even a simple upbringing.

of fair interrogation procedures or

for ISIS were either hopelessly

and the level of allegiance to

Some, like Belgian ISIS returnee

just proceedings and by remaining

naïve and overly dependent on

ISIS seems to determine certain

Laura Passoni’s children, were

in such camps, mothers and their

the men who groomed them for

countries’ responses to dealing

temporarily removed from her

innocent children in particular

travel – these women need to

with women. Currently held in

care and put in the care of their

are being exposed to additional

learn to be more independent

a Kurdish-run prison in Syria,

maternal grandparents while

risks in terms of their health and

and stronger. Others left for

she continues with her demands

she was prosecuted, but they

potential increased radicalization

opportunistic reasons, including

that she and her three children

were later returned to her. Laura

while surviving in a war zone

free housing, salaries and the

be repatriated to France from

(who ICSVE has made a counter

surrounded by other militant

potential to reap material benefits.

Syria. Despite her appeal, she

narrative video about) is a great

captives. Likewise, they may also

They need to be redirected

remains in Syria. In contrast,

example of a disillusioned ISIS

be viewed as potential perpetrators

and receive help in removing

Canadian authorities seem willing

returnee who now lectures

requiring adequate counselling

obstacles to legitimate ways of

to facilitate the return of a woman

to students to warn them of

and care.

earning a living. Those who were

70 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


produced by ICSVE, both locally and internationally, as well as studying the use of children as violent actors by groups such as ISIS and consulting on how to rehabilitate them. She regularly speaks and publishes on the topics of the psychology of radicalization and terrorism and is the author of several books, including Talking to Terrorists, Bride of ISIS, Undercover Jihadi and ISIS Defectors: Inside Stories of the Terrorist Caliphate. Follow Anne @AnneSpeckhard Ardian Shajkovci Ph.D. is the Director of Research and a Senior Research Fellow at the International Center for the Study of Violent Extremism (ICSVE). He has been collecting interviews with ISIS defectors and studying their trajectories into and out of terrorism as well as training key stakeholders in law enforcement, suffering from marginalization,

before making their way home.

the psychological and Islamic

intelligence, educators and other

discrimination, Islamaphobia

All are likely traumatised by what

challenge aspects of the Detainee

countering violent extremism

or other difficulties from being

they witnessed and experienced

Rehabilitation Program in Iraq to

professionals on the use of counter-

Muslim or of immigrant descent

inside ISIS and are now facing the

be applied to 20,000+ detainees and

narrative messaging materials

heritage need to receive assistance

same emotional and psycho-social

800 juveniles and has consulted to

produced by ICSVE both locally

in addressing these issues while

issues they faced before leaving,

NATO, OSCE, foreign governments

and internationally. He has also

also being helped to integrate

in addition to social stigma and

and to the U.S. Senate and House,

been studying the use of children

well into society. Many young

children that may be acting out

Departments of State, Defense,

as violent actors by groups such

women left for ISIS to throw

the traumas of having lived under

Justice, Homeland Security, Health

as ISIS and how to rehabilitate

off the chains of conservative

ISIS. They need our help. Our

and Human Services, CIA, FBI,

them. He has conducted fieldwork

families and seek adventure and

recommendation is that OSCE

CNN, BBC, NPR, Fox News, MSNBC,

in Western Europe, the Balkans,

romance, while some also went to

countries quickly deploy qualified

CTV and in Time, The New York

Central Asia and the Middle

escape from life’s problems. Many

mental health and educational

Times, The Washington Post,

East, mostly recently in Jordan

were looking for significance

support as well as career

London Times and many other

and Iraq. Ardian has presented

and purpose and believed that

counselling and community

publications. In the past two years,

at professional conferences

building an alternative world

support to these women to put an

she and ICSVE staff have been

and published on the topic of

governance was a good thing.

end to the cycle of terrorism and

collecting interviews with ISIS

radicalization and terrorism.

Those who left as ‘true believers’

social stigma in their lives and the

defectors, returnees and prisoners,

He holds a doctorate in Public

need to have their ideological

lives of their children. n

studying their trajectories into

Policy and Administration from

and out of terrorism, their

Walden University, with a focus

experiences inside ISIS, as well as

on Homeland Security Policy.

orientation redirected to nonviolence and those who still

Anne Speckhard Ph.D. is

adhere to the Takfir ideology

Director of the International Center

developing the Breaking the ISIS

He obtained his M.A. degree in

of ISIS and are truly hate-filled

for the Study of Violent Extremism

Brand Counter Narrative Project

Public Policy and Administration

may have to be imprisoned and

(ICSVE) and serves as an adjunct

materials from these interviews.

from Northwestern University

separated from their children.

associate professor of psychiatry

She has also been training key

and a B.A. degree in International

Many women were raped

at Georgetown University School

stakeholders in law enforcement,

Relations and Diplomacy from

inside ISIS, forced into repeated

of Medicine. She has interviewed

intelligence, educators and other

Dominican University. He is an

marriages, raped by smugglers

over 600 terrorists, their family

countering violent extremism

adjunct professor at Nichols

who helped them escape, or

members and supporters in various

professionals on the use of counter-

College, teaching cybersecurity and

molested or mistreated in prisons

parts of the world, designed

narrative messaging materials

counterterrorism courses.

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 71


ESSENTIAL SAFETY TOOLS In the last issue of Security

that theme by looking at a range

Solutions, we looked at a range of

of essential safety tools that we

than not, security will be the first

personnel to have their level 2 first

every day carry items that we felt

think security should have with

people on the scene at a work

aid. However, that knowledge is

every security officer should have

them either on their person or

site, shopping centre or major

of little use if they don’t have the

upon their person whilst on duty.

in their vehicle at all times when

event in the case of a medical

correct equipment with which to

In this issue, we have continued

on duty.

emergency. We all know that

apply that knowledge and skill.

The Double Duty Responder is a

• Ambidextrous carry clip

twin blade rescue knife. The main

• 24.64 cm. overall length with

THE DOUBLE DUTY RESPONDER

As first responders, more often

blade exhibits a 9.4cm combo edge satin finish Sheepsfoot while the secondary blade is a serrated safety seatbelt blade with carbide glass breaker, ideal for vehicle extrication.

it is a requirement for security

both blades deployed • Independent liner locks on both blades • Includes a Torx wrench for modifications An essential for any security

Features include:

vehicle, this rescue tool lets

• Twin blade first responders

you cut through seats belts and

knife

webbing quickly and easily,

• Combo edge main blade

break windows to access or

• Secondary seatbelt cutter blade

remove injured victims and

Specifications:

perform a range of other

• Main and secondary blades

necessary safety and emergency

are 3mm/1.8mm AUS 8 steel

tasks. n

• Integrated carbide glass breaker • Rubber moulded FRN grips

Available from tacmedaustralia.com.au

SOF TACTICAL TOURNIQUET- WIDE The SOFTT-W Tourniquet is a life saving

The design allows for rapid routing of the

device used to control massive extremity

tourniquet strap while eliminating need for

haemorrhage. With a true 1.5 inch tourniquet

re-threading the webbing through a buckle.

strap the SOFTT-W provides superior

By eliminating the requirement to re-route the

compression than most standard tourniquets.

webbing the tourniquet is easier to use when

High strength, light weight aluminium

operating under stress and reduces application

components are used in critical areas of

time, both of which can result in reduced levels

function ensuring reliability in the most

of blood loss and better quality patient care.

challenging of circumstances and on the largest of limbs. The SOFTT-W does not rely on any velcro.

This broader compression pattern allows for increased patient comfort and additional arterial compression. n

The high strength hook & buckle interface was designed for security, strength and ease of application.

72 // SECURITY SOLUTIONS

Available from tacmedaustralia.com.au

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmedia.com/newsletter

EMERGENCY BANDAGE (ISRAELI BANDAGE) The First Care Military & Civilian Wound Dressing raises haemorrhage control to the next level, consolidating numerous pieces of treatment equipment into a single, effective and easily applied unit. A ‘Standard’ issue to major military organisations worldwide. Quickly stanches haemorrhaging from injuries caused by traffic accidents, workplace accidents, home injuries, GSW, stab and other assault wounds. Available in numerous sizes and 2 colours (Military Green & Civilian White) n Available from tacmedaustralia. com.au

OPERATOR IFAK- KIT

The Operator IFAK is a compact

nylon pouch (in 3 colours) which

• Chest Seal (Twin Pack)

instead of the Halo Chest Seal

Immediate First Aid Kit (IFAK) that

can be worn on any platform

• 2 Pairs of Gloves, nitrile, Size:

as shown.

provides immediate trauma care

that has MOLLE or worn on

at the point of injury. Whether you

a belt. Complete with all the

• CPR Face shield

now comes with SOF Tactical

are on the pistol range, hunting

equipment required to treat

• Trauma shears

Tourniquet - Wide Rescue

in remote bushland or on duty

major causes of preventable

• Casualty Card

Orange and Operator IFAK

on the streets of Sydney - the

death from penetrating injuries.

In writing this review, we were

Kit - Multicam comes with SOF

Operator IFAK is the kit of choice

The kit contains:

also informed that the Operator

Tactical - Wide Tan. n

for operators around firearms.

• SOF Tactical Tourniquet

IFAK now contains a Hyfin Vent

The Operator IFAK comes complete in a compact MOLLE

securitysolutionsmagazine.com

Wide • 4 inch Olaes Bandage

Large

Compact Chest Seal (Twin Pack) from North American Rescue

The Operator IFAK Kit - Red

Available from tacmedaustralia.com.au

SECURITY SOLUTIONS // 73


ESSENTIAL SAFETY TOOLS

The Leatherman OHT The Leatherman OHT is a

2. Spring-action Regular Pliers

revolutionary multi-tool made in the

3. Spring-action 154CM

USA by legendary tool manufacturer Leatherman. The Leatherman OHT is a one-handed opening tool. No,

Replaceable Hard-wire Cutters 4. Spring-action 154CM Replaceable Wire Cutters

not one-handed blade or pliers but

5. 420HC Knife

everything! Why is that important?

6. 420HC Serrated Knife

Because when you are wearing

7. Saw

gloves, or trying to hold a bandage

8. Strap Cutter

in place, or doing anything else with

9. #8-32 Cleaning Rod/Brush

your second hand, you need to be

Adapter

able to access and use your tools

10. Can Opener

quickly and easily.

11. Bottle Opener

I could bore you to death with

12. Oxygen Tank Wrench

details on it’s 420HC Stainless Steel

13. Phillips Screwdriver

or black oxide but just know this

14. Large Screwdriver

thing is built to last and comes with

15. Medium Screwdriver

a 25 year warranty.

16. Small Screwdriver n

Features: 1. Spring-action Needle-nose Pliers

Available from tacmedaustralia. com.au

EMERGENCY BANDAGE (ISRAELI BANDAGE) The Eleven 10 PTAKS Medical Pouch is a small personal pouch designed to hold the bare minimum trauma consumables. Designed as a “Penetrating Trauma Aid Kit, Small”, the PTAKS pouch features a channelled back panel to allow both belt mounting and MOLLE/ PALS attachment of this small profile pouch to allow it to be kept in an easily accessible location on the user - without overcrowding security officers already heavily laden setups. The inside is an open compartment which has a quick access ribbon that can be loaded under your contents to allow for fast easy deployment when needed. A velcro square on the front holds a medical identifier cross patch (included). Available in ‘Pouch only’ and ‘Kit’ options. Optional Kit Contents : • SOF Tactical Tourniquet- Wide Black • Emergency Dressing Israeli Bandage 4 inch • Pair Black Talon Gloves n Available from tacmedaustralia.com.au

74 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry

instagram.com/securitysolutionsmag

SURVIVAL VEHICLE FIRST AID KIT The SURVIVAL Vehicle First Aid KIT has been designed with weight and space in mind, without compromising any of the items a security officer might need to successfully administer first aid in most situations. Designed in Australia by leading first aid experts, the colourcoded labelling system enables you to clearly identify first aid contents and explains the typical use for each item. This makes it quicker and easier to respond to any emergency situation. The kit also features a numbered labelling system which tells you how many of each item you should have – alerting you to replacement requirements and making it clear when you need to refill and restock. As with all Survival products, the Vehicle First Aid KIT is durable, rugged and water resistant. The zippers are strong and there is luminous piping on the bag to make it easier to see at night. In addition to the extensive selection of first aid items, the KIT contains CPR instructions to support your first aid training in the case of any on-the-road emergency. In our opinion, for just $79.95, this kit, or an equivalent, should be standard equipment in every security patrol vehicle. n Available from www.survivalfirstaidkits.net.au

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 75


LIKE US ON FACEBOOK facebook.com/ssmaust

SCAN CODE WITH YOUR CAMERA


FOLLOW US ON INSTAGRAM instagram.com/securitysolutionsmag

SCAN CODE WITH YOUR CAMERA


PRODUCT SHOWCASES

BOON EDAM BOOSTS SPEEDLANE APPLICATIONS AND VERSATILITY WITH ELEGANT NEW PEDESTAL MOUNT Global entrance security leader

Lifeline Boost comes in two models:

blending an elegant design with

to companies that require an

Boon Edam is introducing an

1. Standard Premium: Suitable

sophisticated security features, in

elegant and secure entrance solution,” says Mr Fisher.

elegant new multifunctional

for the integration of a card

a product that’s simple and easy to

pedestal mount to further enhance

reader, barcode reader or

use,” said Mr Fisher.

the versatility, application and

biometric devices.

access protection technologies

2. Card Collector: Suitable to

The Lifeline Boost’s slim

In keeping with the Lifeline series, the Lifeline Boost has been

design and easy installation make

engineered with the comfort of the

of its leading range of

integrate a third-party card

it a well-integrated speed gate

end-user in mind. It is ergonomic,

security speedgates.

collector device.

feature. Measuring just 106mm

set at a comfortable height and

The new Lifeline Boost is a

In addition to accommodating

where it touches the floor, the

features the classic tapered

well-designed, innovative and

a wide variety of authorisation

Lifeline Boost also removes

V-shape, to effortlessly blend in

unobtrusive pedestal mount that

technologies, the Boost pedestal

complications regarding under-

with the rest of the speedstile.

can accommodate an extensive

is easy and fast to install due to its

floor wiring through the ability

range of authorisation technologies,

unobtrusive, enclosed raceway that

to install the mount directly into

Energy-efficiency

to complement the Speedlane

can house an electrical and ACS

the Speedlane.

The outstanding energy-efficiency

Lifeline range of speed gates, which

conduit along the surface of any

has been proven across the globe,

finished floor. Its small footprint

intuitive operation guides users

extended to the Lifeline Boost.

including with household names

and sleek design complement the

as they provide their credentials

LED lights guide users from their

and Fortune 500 companies.

clean lines of the speed gate with

and then pass through the speed

initial approach, through the

minimal visual impact.

gate. Intuitive LED lights detect

authorisation steps and their exit

the visitor approaching and guide

into the secured side. When the

The Boost’s uncomplicated and

of the Lifeline range will be

Plug-and-play convenience

companies the freedom to use their

them through clearly and easily

speed gate isn’t in use, these lights

“Lifeline’s new Boost feature

access control partner of choice

– without any compromise to the

enter ‘sleep mode’ to save power,

extends the number of

and integrate almost any system

journey flow.

and energy costs. n

authorisation technologies that

into a pedestal mount that blends

can be integrated with the speed

in perfectly with the rest of the

Speedstile expertise

For Further Information,

gate, making it more versatile and

speed gates. It doesn’t look like an

“Boon Edam already has the most

Please Contact:

readily applicable to corporate

afterthought,” says Mr Fisher.

speedstiles installed in the world,

Alastair Russell

and now this new technology

National Sales Manager

allows them to accommodate

T +61 1300 689 905

private facilities,” says Boon Edam

Sophisticated and secure

almost any authorisation

M: +61 (0)450 924 882

Australia Managing Director, Mr

“A key consideration for the new

technology available, giving

E: alastair.russell@boonedam.com.au

Michael Fisher.

Lifeline Boost pedestal mount was

ultimate flexibility and accessibility

W: www.boonedam.com.au

“Lifeline Boost will give

HQs, government offices, education facilities, banks, healthcare and

76 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


ADVERTORIAL

ARE YOU CONCERNED ABOUT LOSING KEYS? David Ishak I AST PTY LTD

EXPANDED ELECTRONIC KEY CONTROL WITH CUSTOM MANAGEMENT REPORTS

access control system will know which users have keys and which do not. A user who has taken a specific key from KeyWatcher can be denied egress from the facility until the key is returned – and selected management can be alerted via email if a key has not been returned on time.

K

eyWatcher is a modular, scalable integrated key control and management solution that’s designed for interoperability with access control and other systems such as Contractor Management Kiosks and Fleet Management platforms. With a builtin 7” touch screen and up to 10,000+ assignable user codes with PINs (Personal Identification Numbers), KeyWatcher provides unmatched flexibility. The system allows administrators the discretion to appoint one of five different levels of access for each employee.

SMARTKEYS Key Control Data from Smart Keys Keys are secured to a SmartKeys which features an identification microchip and 1/8” stainless steel locking ring for additional security and functionality. Available in several different colours (black, brown, white, grey, red, yellow, blue, and green). This allows for keys to be organised by colour, which can be useful when utilising several KeyWatchers in a facility, or designating one group of keys from another within the system.

THE INTEGRATED ACCESS CONTROL SOLUTION KeyWatcher is designed for complete interactivity with your other business systems. For example, by intergrating your KeyWatcher system with your access control system, your

For more information email: sales@astpl.com.au

KeyWatcher

®

Key Control and Management Solutions

MORSE AUSTRALIA

> Are you tired of lost time looking for keys? > Do you need to restrict access? > Do you want to control high risk areas? > Do you need to know if a key isn’t returned on time? If the answer is YES then Morse Watchmans KeyWatcher Touch is the solution. Contact Australian Security Technology on

1300 539 928 for further information


PRODUCT SHOWCASES

Centaman Entrance Control introduces a portal to better security A new range of security portals

portal. Once this check is complete,

has been launched in Australia

and any additional security checks

and New Zealand to help

have been passed, the second door

improve the safety, security and

opens to let the authorised person

efficiency of corporate offices,

into the secure area.

government buildings and other facilities. Security portals are designed

Unlike simple infrared or camera-based tailgate detection systems that only alert to

to stop people illegally entering

unauthorised entry after the

facilities by ‘tailgating’ authorised

event, security portals are

users through entrance

designed to prevent these types

control gates. They are ideal

of events from happening in the

for unmanned entrances and

first place.

provide a greater level of security

Centaman Entrance Control’s

than traditional turnstiles

new security portal range

or speedgates.

features five different products,

The company’s new range of

each with its own strengths. All

security portals are simple and

feature voice instructions to guide

easy to use, despite the impressive

users, and can be set to have both

provide continued operation in

also come with an internal

technology and security features

doors open for certain hours or

case of power failures, an internal

intercom for communication with

behind them. The first door opens

for deliveries.

anti-panic button to power down

security or reception teams. n

the last door opened so it can be

and the authorised person proceeds

The portals feature attack and

into the portal. The first door closes,

bullet resistant glass. Other safety

manually opened, and IR safety

For more information visit

and the anti-tailgating system

features include integration to

sensors to check the doorway is

www.entrancecontrol.com.au or

checks only one person is in the

the fire alarm, battery back-up to

clear before closing. The portals

phone: +61 (02) 9906 7522.

78 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry

instagram.com/securitysolutionsmag

AirKey AirKey is an innovative electronic

business, track entry and exit times,

hardware, only requiring a change

lock system, created to give users

and even remotely send temporary

of the existing cylinder for quick

cylinder including professional

simple and smart control over

access to visitors and contractors.

set up. Wall readers, IP65 padlock,

certified installation at your door,

key tags, and card readers are

the smartphone application, and

also available.

the AirKey administration account

the security of their business.

AirKey is suited to the needs

An AirKey electronic lock

AirKey is the next evolution of

of all businesses and can be

locking systems, transforming a

used to manage shared office

smartphone into a key. Available

environments, areas with regular

doesn’t require a compromise on

approximate and will vary for each

on both iPhone and Android, the

visitors or even control access to

security, with drilling and plug

customer circumstance due to

AirKey system has been designed

sensitive stock such as alcohol

pulling protection, and end-to-end

current lock set up and current door

to meet the needs of business

or medicine. AirKey is not Wi-Fi

encryption utilising technologies

hardware installed. n

owners and office managers. Using

dependant. There is no hard wiring

such as HTTPs, SSL, ECDSA, and

the online administrator, you

or cabling to the AirKey cylinder.

AES-256-bit – simply as secure as

can manage who has access to a

AirKey can work with existing door

online banking.

EVVA’s innovative system

retail for $900 inc GST. Pricing is

For more information visit www. evva.com.au or call 1300 003 882

BREAKTHROUGH IN LOW PENETRATION, SHALLOW MOUNT HOSTILE VEHICLE BARRIERS The profusion of hostile

a significant breakthrough in

achieved in this class by a shallow

permitting individual socket

vehicle attacks directed at

shallow mount HVM technology.

mount bollard. The IWA test

boxes to be swiveled, allowing

credential recorded is deemed

the bollards to follow a curved

crowded public spaces both

Based on Safetyflex’s

internationally and here in

revolutionary active spring

equivalent to;

barrier line during installation,

Australia, has drawn focus upon

steel technology, the TS9-40 was

• PAS68-1:2013 Barrier

even accommodating ‘stepping’

capacity to arrest hostile vehicles

successfully tested at the UK’s MIRA

whilst conceding the absolute

Test Centre earlier this year. The

• ASTM F2656 M40:P2

minimum penetration possible,

system conceded unprecedented

• CWA 16221 Fixed bollard V/

beyond the line of security

minimal penetration of 2.4m

defence. This is particularly

(dynamic) and 2.2m (static) for

Compounding the complexity

the extreme performance TS9-

relevant where public spaces

a shallow foundation (200mm)

of mitigating this proliferating

40 HVB system, or any of Ezi’s

expose high density pedestrian

bollard system, impacted at

risk, many assessed target

comprehensive range of perimeter

volumes. Obviously, the less

40mph by an N2A 7500kg GVW

areas are located within

protection systems, contact Rod

penetration, the less potential for

Truck. The system was certified

CBDs and cityscapes, where

Acland on 0412 120 984, rod@

human collateral.

to the internationally recognised

underground services inhibit

ezisecurity.com, or sales@

standard; IWA 14-1 2013 Barrier

deep or extensive foundations.

ezisecurity.com

V/7200[N2A]/64/90:2.4.

The TS9-40 system performs

Ezi Security Systems have just released the Truckstopper 9-40 fixed or removable crash tested bollard system, representing

securitysolutionsmagazine.com

This represents the new world benchmark in low penetration

V/7500[N2]/64/90:2.2/15.0

[N2]7500/64/90:2.2/15.0

to elegantly follow the contour of sloping surfaces. n For further information about

Alternatively visit www.

successfully with a foundation

ezisecurity.com.au or call Ph 1

of only 200mm, as well as

300 558 304

SECURITY SOLUTIONS // 79


PRODUCT SHOWCASES

FLOWMOTION®

The requirements for pedestrian barriers have changed fundamentally. The focus is no longer on barring access to unauthorised persons. It is now necessary to manage flows of persons, to automatically detect how employees, customers and visitors are moving, as well as to optimise internal processes and thus increase security. In order to meet these requirements, Magnetic Automation have left the beaten track and developed a completely new access control system – the FlowMotion® generation of products. With mDure (an innovative malleable material with a comfortable feel), a radically simplified control concept, and a revolutionary lighting solution. n For more information on the FlowMotion® generation of products visit www.flowmotion-access.com or 1300 364 864

FlowMotion® www.flowmotion-access.com

MOBOTIX LAUNCHES NEW MOVE RANGE MOBOTIX has announced the launch of MOBOTIX MOVE, a new video surveillance camera family that supplements its current portfolio allowing end customers to benefit from additional features to meet a wider range of indoor and outdoor use cases. Now available in Australia, customers are be able to obtain MOBOTIX MOVE products, which provide standards-based technology, as

80 // SECURITY SOLUTIONS

well as products with unique MOBOTIX features, from a single trusted source backed by industryleading quality and reliability. The new MOBOTIX MOVE series are the first MOBOTIX cameras to support both the ONVIF S and G profiles with video streaming at 3 and 4 MP resolution up to 30 frames per second. Available in 4 models including bullet, vandal proof

bullet and fixed dome and two speed domes; all models are PoE powered and IP66/IK10 rated for flexible deployment. “MOBOTIX MOVE is a recognition that we need to bring the same level of MOBOTIX expertise to a wider range of projects that have a specific requirement,” explains Thomas Lausten, Chief Executive Officer of MOBOTIX. “We listened to our global customers and integrators and created a new product family that delivers standards-based features while retaining the build quality, reliability and innovation that MOBOTIX is renowned for within the security and access control market.” MOBOTIX MOVE also is the first MOBOTIX camera range with motorised varifocal lenses, high speed mechanical Pan-Tilt-Zoom, Speed Domes and Wide Dynamic Range sensors at up to 4MP resolution. The built-in software offers Smart Event functions, remote zoom and focus plus iris control on Autofocus Lens. Each device includes a built-in SD card

slot and certain models have integrated IR LED illumination. The true day/night feature with integrated movable IR cut filter technology provides colour images at day time and monochrome infrared sensitive images at night. With full ONVIF support, MOBOTIX MOVE cameras can natively support the widest range of video management software and NVR devices including PTZ control, audio, multicasting and relay outputs. All MOBOTIX MOVE devices can be controlled via integrated web GUI using PC based browsers and will also be natively supported in the upcoming 2.0 version of MOBOTIX Management Center due for release in Q4 of 2018. MOBOTIX MOVE will be available from MOBOTIX distributors at the end of July and will be supported by technical training events for registered partners. n For more information visit www.mobotix.com or call +61 2 85072000.

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmedia.com/newsletter

The Evolution of Outdoor Security Protect home’s and businesses with the world’s

smartphone, tablet or PC whenever it detects

only motion-activated security camera with

motion. And from the free Ring app, users can

built-in floodlights, a siren alarm and two-way

protect their property and monitor their home

audio, so client’s can see, hear and speak to

or business from anywhere. n

anyone on their property from anywhere. Available in Black or White

With the new Ring Floodlight Cam, customers can watch over their entire property

For more information visit www.ring.com

with object and facial detection. Floodlight Cam has the most advanced motion sensors in home security. Its 270° field-of-view will let you detect motion around corners and monitor all your blind spots. Simple setup with advanced controls Floodlight Cam easily replaces existing wired floodlights and connects to standard junction boxes. With the app, you can flash the lights, sound the alarm and zoom-in to focus on your most important areas. Home Security at your fingertips Floodlight Cam sends instant alerts to a

®

SEAGATE SKYHAWK Your security can take many forms - receiving notifications when the children arrive home from school, monitoring your business over a weekend or holiday closure, overseeing visitor activity at schools, and monitoring hospital traffic flow and patterns to prepare medical teams to react faster. There are many scenarios and possibilities. But no matter where you implement these security systems, storage is essential as data is captured and analysed 24 hours a day, 7 days a week. Smart, safe and secure, Seagate® SkyHawk™ HDDs are engineered for 24×7 video recording. They feature 3× the workload rating of desktop drives and store over 9,345 hours of video on capacities up to 14 TB.

securitysolutionsmagazine.com

ImagePerfect™ firmware supports 24×7 surveillance-optimised workloads and Rotational Vibration (RV) sensors allow drives to maintain performance in RAID and multi-drive systems. SkyHawk™ is built to keep systems in the field longer and reduce the need for post-deployment support. ImagePerfect™ firmware delivers reliable image integrity and reduction of frame loss for 24×7 workloads up to 180 TB/year while enabling multi-stream, writeintensive workloads for SDVR and NVR. SkyHawk HDDs also provide SkyHawk Health Management (SHM) which is an embedded software designed for prevention, intervention, and recovery. SHM

helps users manage the health of the drives and provides access to data recovery services should a catastrophic event damage the drive. To provide this functionality, SHM analyses multiple parameters related to drive health and uses proprietary algorithms to determine potential effects to the drive. With this output and info on additional operating conditions, such as temperature and humidity, SHM recommends preventive actions. It may also propose specific interventions when the drive health is likely to have been affected. Finally, SHM links the user to industry-leading Seagate® rescue and recovery plans, ensuring users have complete peace of mind in using their SkyHawk drive. n

SECURITY SOLUTIONS // 81


TALL. FAST. STYLISH. Our award winning speedgates combine state-of-the-art optical technology with a high barrier height to protect your building.

EASYGATE SPT

• • • •

Barrier heights up to 1800mm Fast throughput (up to one person per second) Ideal for Disability Discrimination Act compliance Choose from a number of models, including the LX, SPT, SG, IM or LG • Custom pedestals with an array of attractive finishes EASYGATE LX

Find out which security gate is right for you.

1300 858 840

www.entrancecontrol.com.au

EASYGATE IM

FULL HEIGHT TURNSTILE

TRIPOD TURNSTILE

SWING GATE


SPOTLIGHT

DAHUA TECHNOLOGY WINS TWO NEW PRODUCT OF THE YEAR AWARDS BY SECURITY TODAY

he New Product of

in combination to deliver a single

GPU architecture that combines

the Year Award,

video stream that captures 3D

video management functions

received not one, but two New

presented by

depth in the image with 98%

with traditional video storage

Product of the Year awards from

Security Today, is

accuracy. Dual-sensor technology

operations, all in one Intelligent

Security Today, recognizing our

now in its 10th successful year. The

captures a target’s height, allowing

Video Surveillance Server (IVSS).

advancements in the field of AI.”

award program honors the

the camera to better distinguish

The H.265/H.264 backwards

Said Jennifer Hackenburg, Sr.

outstanding product development

between people and other objects.

compatible IVSS supports 4K Ultra

Product Manager. “With these

achievements of security

With two distinct functionalities,

HD resolution for recording, live

high-performing AI solutions we

equipment manufacturers whose

Line Crossing and Regional, the

viewing and playback. With an

are constantly striving to provide

products are considered

camera can count the number

integrated GPU module and Dahua

multifaceted systems that create

particularly noteworthy in their

of people crossing a defined

Technology’s advanced deep

safer environments.”

ability to improve security.

line while offering a maximum/

learning algorithms, the device

minimum height detection to help

performs powerful video structure

the Year awards in AI categories

Counting Camera offers Artificial

filter objects that are too tall or

analysis utilizing metadata to

is a strong recognition to Dahua

Intelligence at the edge by

too small. The Regional function

achieve real-time, high-precision

Technology’s achievements in

utilizing complex real-time people

counts the number of people in ten

facial analysis on up to 16 channels

the field of AI. With a mission of

counting algorithms to deliver

distinct user-defined regions. The

simultaneously. IVSS technology

“Enabling a Safer Society and

accurate flow statistics. The

3MP Dual-sensor People Counting

captures, records and categorizes

Smarter Living”, Dahua Technology

camera uses an advanced Vision

AI Camera is ideal for business

various facial features, including

will continue to focus on

Processor Unit (VPU) to deliver

reporting, while simultaneously

age, gender, expression, and

“Innovation, Quality, and Service”,

high-performance machine vision

ensuring the safety of customers.

whether the target face wears

to serve partners and customers

and visual awareness that enables

As Dahua Technology’s first

glasses or sports facial hair;

around the world. n

T

Dahua 3MP Dual-lens People

advanced applications that are

AI NVR, the DHI-IVSS7016DR-4T

compares the data to up to 100,000

impossible with conventional

256-channel AI NVR is based

faces in the database, and displays

ISPs. The dual 3MP sensors work

on high performing CPU and

real-time facial recognition data.

80 // SECURITY SOLUTIONS

“We are honored to have

Winning two New Product of

For more information visit http://www.dahuasecurity.com

securitysolutionsmagazine.com


EASYGATE HELPS POWER STAGE 1 OF HOBART’S PARLIAMENT SQUARE REDEVELOPMENT

T

he first stage of

quietest, fastest and most reliable on

Hobart’s $150 million

the market.

Parliament Square redevelopment

They have a mean time between faults of 5,000,000 operations,

project was completed at the end of

which is higher than the entire

last year with the official opening of

product life of some security gates

the 5-star Green Star Design Rating

and critical in a high-traffic, high

Salamanca Building.

security environment.

The building, which is home to

It was also important the

employees of government agencies

security solution didn’t take away

and the Department of Premier and

from the building’s sleek, modern

Cabinet, features three EasyGate SPT

design, something the EasyGate

speedgates in the main reception

SPT’s slimline design was able to

area, and integrated OTIS destination

easily accommodate.

lift control system, which supports

Centaman Entrance Control

more efficient lift allocation, reducing

General Manager Michael

crowding in cars and delays resulting

Bystram said the EasyGate SPT

from conflicting destinations.

was the ideal choice for the new

The EasyGate SPT speedgates

Salamanca Building.

are part of Centaman Entrance

“It is reliable, unobtrusive

Control’s premium range and

and offers the high-level security

boast the unsurpassed tailgate

required in such an environment.” n

detection, speed and alarm accuracy synonymous with the EasyGate

securitysolutionsmagazine.com

For more information visit www.

brand. They feature magnetic direct

entrancecontrol.com.au or phone: +61

drive motors, which are among the

(02) 9906 7522.

SECURITY SOLUTIONS // 81


SPOTLIGHT

STID MOBILE ID® - SMARTPHONE-BASED ACCESS CONTROL

American technology

smartphone. Beyond this, we have

Access rights can be assigned,

data in the reseller and end

research firm Gartner

chosen a virtualization solution

revoked and updated in real time,

customer accounts – that would

predicts that in three

that requires no compromises

meaning you can quickly create a

be a major security vulnerability.

years’ time, more

to the philosophy undergirding

short-term visitor access card, and

Our clients will remain totally

than 20% of organizations will use

your organization’s security

later recover the credits to create

independent in managing their

smartphones instead of physical

policy. Why would you outsource

another virtual access card. It’s so

security after security.

access cards. Mobile access control

your data to a third party and

cost-effective and easy to use. We

is not just about a more user-

where is the data stored? Are

offer additional web services to

friendly way of opening doors. The

you independent in managing

connect our client access control

connectivity of smartphones opens

your security? No technical or

systems and applications to our

businesses work in an ever-more

the way to new real time solutions

technological constraints should

platform. It ensures an enhanced

mobile world, with a continually

for managing mobile identity.

prevent Directors of Security

and transparent management of

increasing threat of cyberattacks.

Vincent Dupart, CEO of STid, a

from managing their systems

virtual cards.

Security is a major challenge. In

leading manufacturer of secure

independently, with the freedom

How does this platform meet

addition to the security benefits

access control solutions, tells us

to host sensitive data in-house if

clients’ aspirations to manage their

of the client’s independence in

why the right management tools

that’s what they want. We offer

systems independently?

management, all data is stored in

are required to roll out this type

our clients an Offline & Online

of solution.

management tool, which keeps

solutions on the market and

with the tightest data protection.

them in control of their security.

most people’s preconceptions

Our Online architectures comply

your STid Mobile ID® badge

That’s a key issue in our line

about cloud technology, STid

with new European regulations on

virtualization solution has been

of work!

is not looking to tie its clients

personal data protection (GDPR) and

into a particular technology.

French CNIL recommendations. The

the Online management platform

Independence operates at many

information is stored in encrypted

Vincent Dupart: Our solution

that you have launched in April?

different levels. First and foremost,

formats and all server connections

is extremely user-friendly, with a

Vincent Dupart: Innovation is

we have always wanted to respect

use the secure https protocol. The

A

Since its launch in early 2017,

highly successful. How do you explain this success?

Can you tell us a bit more about

Vincent Dupart: Unlike many

How do you secure the data stored in your Web platform? Vincent Dupart: Today’s

our server in France, in accordance

range of different identification

the cornerstone of STid’s strategy.

our clients’ value chain. Anyone will

virtual access cards are managed in

methods available – your hand

We’ve continued to work to

be able to create an account and

real time so if an employee reports

becomes a card that you always

develop a secure Web platform

associate accounts for their own

the loss of a smartphone, the mobile

have on you, even while you

which will revolutionize the way

clients (dealers and end customers),

access rights can immediately be

are making a phone call and

we manage user virtual access

without any involvement on our

revoked, before the device ends up

without needing to take out your

cards and configure readers.

part. STid has no access to sensitive

in the wrong hands. n

82 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.