A U S T R A L A S I A’ S L E A DI N G S E C UR I T Y R E S OUR C E F O R BU S I N E S S A N D G O V E R N ME N T
OCT 2018 ISSUE 114
HOW TO CREATE
A CYBER SAFE
SURVEILLANCE SYSTEM
PA S 6 8 & I WA T E S T E D G U A R A N T E E D
W W W. E
25 YEARS OF BUILDING SMART AND SECURE OUTDOORS E zi Security Systems designs, manufactures and installs a premium range of perimeter security solutions for both vehicle and pedestrian access control, with specialised expertise in Hostile Vehicle Mitigation and protection of Crowded Spaces. With core competence established over 25 years, Ezi Security Systems provides innovations of our own invention, and via alliances with undisputed world leaders in our field, deliver sophisticated solutions at the leading edge of global technology. Over the past 5 years the world has changed dramatically. In collaboration with our strategic business partners, Ezi has responded with focus, mitigating hostile vehicle threats with our Crowded Spaces range of products. Ezi offers permanent solutions for risk categories from low to extreme, as well as rapid deployment products for crowded spaces and public events, such as the Impakt and Rapid Defender products.
Z I S E C U R I T Y. C O M . A U
All Ezi Security Systems Hostile Vehicle Barrirer solutions have been rigorously crash tested and certified to meet requisite ASTM, IWA and PAS 68 stipulations. Along with our global partners, Ezi Security Systems actively collaborate in the development and deployment of contemporary strategies such as VAAW (Vehicle as a Weapon) mitigation, deploying whole of environment solutions. Ezi have solutions to meet your very highest security requirements whilst maintaining an aesthetically compatible solution for your site. You can be confident that when serious security is your requirement, you need look no further than Ezi. We stand ready to be of expert service in an ever evolving environment, as global security risks increasingly demand local solutions.
1300 558 304 11 Cooper Street Smithfield, NSW, Australia 2164 sales@ezisecurity.com
ISSUE 113
FEATURES
40
CONTENTS
78
50
24 36
28
COVER STORY
In this issues cover story, we look at this topical question which runs deeper than simply questioning the cyber safety of the cameras themselves. Can a camera be used to spy on the very people it purports to protect? Can it be responsible for transmitting data to external parties such as a foreign government? In the modern world of IoT, where data is constantly being transmitted between IP-enabled devices, what can you do to protect your security systems?
62
24 RECOGNISING BRAVERY AND COMMITMENT
This year’s Australian Security Medals saw some of the most deserving and distinguished members of the security community recognised for outstanding acts of bravery and commitment to the security profession. Learn more about their amazing stories and become inspired to nominate a colleague for 2019.
44 UNDERSTANDING CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
The manipulation of the built environment to reduce the opportunity for crime, disorder and the fear of crime is referred to as crime prevention through environmental design (CPTED), but does it really work?
48 THE WORLD'S MOST PROTECTED ARTEFACTS What does it take to protect some of the most prized and precious artefacts in the world?
64 REVERSING THE EFFECTS OF TERRORISM
When serving terrorism has become an ‘All In The Family’ affair, how can we recover children and spouses lost to the thrall of ISIS?
REGULARS 06 LETTER FROM THE EDITOR 08 LEADERSHIP
Are you asking the right questions as a leader?
10 CYBER SECURITY
Why traditional back-ups have become old-school?
12 MARKET ANALYSIS
We present a snap shot of the CCTV market in Australia and New Zealand.
14 HUMAN RESOURCES
Greg Byrne examines how we can better manage aging workers in the Australian security industry.
16 RISK MANAGEMENT
What is a Socio-Technical System and why is it important for risk management?
20 LEGAL
What is a Socio-Technical System and why is it important for risk management?
22 THINKING ABOUT SECURITY
Will security as we know it still exist a decade from now?
32 OPERATIONS
Richard Kay examines the normal responses that can occur to abnormal situations in order to help security staff better prepare for stressful situations.
36 BUSINESS
We look at ten useful Linkedin Tips you won’t find in the help pages?
52 AVIATION SECURITY
Is it time for another review of the aviation security sector?
56 ACCESS CONTROL
What role will Access Control play in Smart Building?
60 PROFESSIONAL DEVELOPMENT
We present the second of a two part special on behavioural interviewing.
72 ESSENTIAL SAFETY TOOLS 76 PRODUCT SHOWCASES 80 SPOTLIGHT 82 SHOP TALK
Company announcements from within the industry.
24 EVENTS CALENDAR
A look at upcoming industry events.
4 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
FROM THE EDITOR FROM THE EDITOR www.securitysolutionsmagazine.com
EDITORIAL www.securitysolutionsmagazine.com
EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon
Jane Anderson, Christopher Bergey, Jacque Brittain, Jason Brown, Greg Byrne, Ryan Burnyeat, Garner CONTRIBUTORS Clancy, Jim Dearing, Kevin Foster, LukeKevin Frost,Foster, Alex Garry Barnes, Jason Brown, Greg Byrne, Ganin, Tony Elly Johnson, Richard Scott Kay, Richard Kay,Jacques, Steve Lawson, Justin Lawrence, Justin Lawrence, Steve Lawson, Leanne Monchuk, O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Tim Rippon, Adrian Anne Speckhard, Anne Speckard, AlexShajkovci, Sidernko, Ardian Shajkovci, Ami Don Williams Toben, Simeon Votier
ADVERTISING ADVERTISING
Keith KeithRozairo Rozairo PHONE PHONE 1300 1300300 300 552 552 EMAIL EMAIL keith@interactivemediasolutions.com.au keith@interactivemediasolutions.com.au
T D
he recent media attention around
vendors and end-users with regard to modern
the security of CCTV cameras has,
security systems and software and examine
if nothing simply reminded oes Australiaelse, really take security us that cybersecurity has claims well and seriously? Yes, Government
what can be help minimise potential Australian’s do done have atovery relaxed attitude Obviously, nothing foolproof todangers. security because they believe,isrightly or or
truly grown beyond the domain of IT networks. to, and some of the corporate This is not news. It demonstrate has been a constant sector a passingsource
impervious towill a cybersecurity Just wrongly, that “it never happenbreach. here”. This financialwe institutions, whoremains collectively is ask a sentiment can only hope true.
of discussion within the security interest from time-to-time, but whatindustry of the for some years If it has IPstreet? address, average man now. and woman onan the Dothen we it
probably cybersecurity However, as spend the oldmore axiommoney states,on one should than any other always expect thecommercial best but planmarket for thesegment. worst and
is vulnerable. So, whyseriously the sudden honestly take security or doattention? we, as a
And yet, they still occasionally fall victim to prepare to be surprised.
What has Put simply, the mainstream nation, justchanged? pay lip service to the idea
cybersecurity simple reality is, as Of course, oneattacks. should The not have to rely upon
media has found a new angle it can use to of security?
technology evolves in response customer some form of devastating incident totooccur in
create sensationalism thusbe sell papersthat or As we enter 2018, weand should thankful
demands forpeople more to and more complex features order to force take security seriously.
commercial spacesuffered on newsaprograms, or simply Australia has never major terrorist
and is functions, each new a product’s There a great deal that theversion securityof industry
incident likes of 9/11, the Boston bombings, bolster the their viewer numbers and ratings.
can do to educate business community about firmware and/orthe software introduces the risk
the bombings of July 2005 in–London the Yes, I sound like 7, a sceptic that is or because
the of taking security seriously. ofbenefits a potential vulnerability. Just lookInatpast some
terrorist of October 2002 I am andattacks for good reason. 12, That said,inI Bali. will save
issues Security Solutions Rod of the world’s leadingEditor-At-Large computer operating
PHONE 1300 1300300 300 552 552 PHONE EMAIL admin@interactivemediasolutions.com.au admin@interactivemediasolutions.com.au EMAIL
However, as a result, Australian journalism community you the rant about the investigative
Cowan has written about howwe security can act as systems. This is the price pay for continued
has complacent with regard thatbecome fails atsomewhat even the most basic levels to
a differentiator for business and give companies evolution, whether it be in computers, cars,
ACCOUNTS ACCOUNTS
to security. I often hear many of ourtoreaders who produce any empirical evidence support its are security managers within large corporations claims. The ship has sailed and, quite frankly,
a competitive edge. building automation or security. That said,
PUBLISHER PUBLISHER
comment onthat the poor differences between attitudes it appears standards in journalism to security in Australia and America, where they have become the accepted norm these days.
If weare have learned anything from tragic there strategies that end-users and events that have occurred globally in minimise recent manufacturers can adopt to help the years, it must thethat world changed – threats andbe wethat hope wehas have provided
often to travel and work. According to many Whathave is worthy of discussion is how end-users security managers, Americans understand thatraft can better understand how to mitigate the
permanently – andinsights. we cannot keep pretending some valuable that itPlease has not. 9/11 was not an isolated incident take a read through this issue’s cover
terrorism is a clearrisks and present and a of of cybersecurity arising danger from the use fact of daily life and thus, they treat security IP-based digital security systems.
and if groups like ISIS have such story and, as always, we their valueway, your feedback. attacks will become much more frequent. There Head over to Twitter and share your thoughts
attitude that makes us much more vulnerable
community that will enable Australian’s to be
to attack.
safe and secure. And the work must begin with
DESIGN DESIGNAND ANDPRODUCTION PRODUCTION
JonathanRudolph Rudolph Jonathan PHONE 1300 1300300 300 552 552 PHONE EMAIL graphics@interactivemediasolutions.com.au graphics@interactivemediasolutions.com.au EMAIL
MARKETINGANDAND SUBSCRIPTIONS MARKETING SUBSCRIPTIONS $62.00AUD AUDinside inside Aust. Aust. (6 (6 Issues) Issues) $62.00 $124.00AUD AUDoutside outside Aust. Aust. (6 (6 Issues) Issues) $124.00
PHONE 1300 1300300 300 552 552 PHONE EMAIL accounts@interactivemediasolutions.com.au accounts@interactivemediasolutions.com.au EMAIL
ABN 56 606 919463 ABN 561,606 Level 34 919463 Joseph St, Blackburn, Victoria 3130 Level 1, 34 Joseph St, Blackburn, Victoria 3130 PHONE 1300 300 552 PHONE 1300 300 552 EMAIL enquiries@interactivemediasolutions.com.au EMAIL enquiries@interactivemediasolutions.com.au WEBSITE www.securitysolutionsmagazine.com WEBSITE www.securitysolutionsmagazine.com DISCLAIMER DISCLAIMER The publisher takes due care in the preparation of this
The publisher care in theprecautions preparationand of this magazine andtakes takesdue all reasonable magazine takes alleffort reasonable precautions andof makes all and reasonable to ensure the accuracy makes all contained reasonable to ensure the of material ineffort this publication, butaccuracy is not liable for any mistake, misprint omission. The publisher material contained in this or publication, but is not liable does not assumemisprint any responsibility or liability for any for any mistake, or omission. The publisher loss or may result from any inaccuracy does notdamage assumewhich any responsibility or liability for any or omission in this publication, orfrom fromany the inaccuracy use of loss or damage which may result information contained herein. The publisher makes or omission in this publication, or from the use of no warranty, express or implied with respect to any of the information contained herein. The publisher makes no material contained warranty, express orherein. implied with respect to any of the material contained herein. The contents of this magazine may not be reproduced in ANY form of in this whole OR in part without The contents magazine may not beWRITTEN reproduced permission the publisher. includes in ANY formfrom in whole OR in partReproduction without WRITTEN copying, photocopying, translation or reducedincludes to any permission from the publisher. Reproduction electronic medium or machine-readable form. copying, photocopying, translation or reduced to any electronic medium or machine-readable form.
and security workers with the due respect. In In this issue’s cover story, we look at contrast, they believe that Australian’s have a some of the challenges facing manufacturers, very blasé attitude towards security and it is this
is a great deal more work to be done to ensure on the issues around cybersecurity with that we create the kind of effective security @SSM_Media. n culture within organisations and the broader
In my opinion, having recently travelled
security professionals. Let’s make 2018 the year
through Egypt and Jordan, they are correct.
that Australia begins to take security seriously. n
WRITTEN CORRESPONDENCE TO: 1, 34 Joseph St, Blackburn, Victoria 3130 WRITTEN TO: LevelCORRESPONDENCE
PR O
SECURIT Y
PR
RALIA LTD UST FA RALIA LTD
Official Official Partners Partners O rigin a l Siz e Original Size
PR O
Y P R OV RYI TP R O V I D I D E E RCIUT
CU
SE SE
SECURITY
N
USTRA F SAT R A L L I A A OU IA
STRALIA LTD AU OF STRALIA LTD AU
SECURITY
O C I AT I ASS ON O C I AT I ASS O
RS
SPAAL SPAAL
OF
OF
PR O
RS
SSOCIAT RS A IO DE N SSOCIAT VI RS A IO DE N VI
D LT D LT
SECURIT Y
SSOCIATI ON O SSOCIATI RS A ON DE O VI
RS A DE VI
UST FA
O
1300 300 1, 34552 Joseph St, Blackburn, Victoria 3130 Level enquiries@interactivemediasolutions.com.au 300 552 1300 enquiries@interactivemediasolutions.com.au
blue colour changed to this colour green. blue colour changed to this colour green.
COPY/ARTWORK/TYPESETTING APPROVAL COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE Please proof read carefully of this material BEFORE signing your approval to print.ALL Please paycopy/artwork/typesetting special attention to spelling, punctuation, signing your approval numbers, to print. Please pay special to spelling, punctuation, dates, times, telephone addresses etc, asattention well as layout.It is your responsibility to dates, times, telephone numbers, addresses etc,Press as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman assumes no responsibility our attention anybeen corrections. Minuteman Press assumes responsibility for bring errorstoafter a proof has authorised to print and print re-runsno will be at your cost. for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................ Signed.................................................................. Date........................
// SECURITY SECURITY SOLUTIONS SOLUTIONS 46 //
John Bigelow John Bigelow Editor Editor
securitysolutionsmagazine.com securitysolutionsmagazine.com
SECURE YOUR DATA & EQUIPMENT
A data enclosure is your last line of defence, so it needs to be strong enough to stop unauthorised access. CER TIF IE CLASS C
D
The MFB range of Class B and Class C enclosures are purpose built frames fitted with key locks and boltwork approved by the Australian Government Security Construction and Equipment Committee (SCEC)
INATION LOCK MB S CO
All enclosures are fitted with tamper evident cable entry systems, high impact clear polycarbonate panels on doors, secure venting systems and certified combination locks. CLASS B
An alternative product, the MFB range of High Security enclosures provides a lower level of security and is not SCEC approved. Effectively construction methods mirror the Class B and Class C series, however the doors are fitted with a cheaper bilock keying system. Also additional flexibility with the design regarding cable entry encourages effective quick installation and high volume data cable installations. With over 50 years in the business, and backed by the SCEC approval for manufacture, these Australian built 19”rack mount enclosures provide peace of mind in relation to the security your
data needs.
DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS
www.mfb.com.au
VIC (03) 9801 1044 / sales@mfb.com.au
AUSTRALIAN MADE MAKES AUSTRALIA NSW (02) 9749 1922 / sydney@mfb.com.au
fb.com/mfbproducts
LEADERSHIP
THE ART OF ASKING THE RIGHT QUESTIONS BY BOB ANSETT
sking employees the
perspective on the issue that you
effective when seeking information
simply respond and react; they
right questions is
are seeking information about.
from customers or clients.
are expected to take initiative and
indeed an art and
Clever questioning enables you to
requires special skills
connect with your customers and
should be designed to learn the
because not only do you need to
employees in a meaningful way.
other person’s way of thinking and
historic role of the manager, who
consider the content of the
Thoughtful questions can take
gather information – yet we so
traditionally relied on getting
question but how best to get the
the sting out of feedback or can
often fall into the habit of asking
results through the delegation of
most frank and honest response.
even be used to plant your own
leading questions to influence
tasks to his or her subordinates,
This usually requires some
ideas in the mind of customers
others towards our way of thinking.
and empirical evidence has
awareness of the personality and
and employees.
Sometimes this can be a useful tool
revealed that this common lack
in broadening a person’s outlook on
of leadership can greatly impact
A
general attitude of the person you
About 50 per cent of good
Remember, meaningful questions
generate action. This is a far cry from the
are seeking information from, as
communication comprises good
a particular issue, but as a general
on morale, productivity and
this will help shape the tone of the
listening; notice what they say
rule, it should be used sparingly.
employee motivation.
question and even the time and
as well as how they say it, as well
place for asking the question.
as what they value and what is
overlooked in assessing leadership
applying emotional intelligence and
The most effective questions
Questioning skills are often
Good leaders are skilled at
important to them. Listening
qualities but this is a mistake,
use it to gets the best results from
are open-ended and not leading,
requires your silence while the
as good leaders intuitively ask
their teams. The ability to frame
however, it is a common human trait
question is being answered, as well
searching questions, which
questions derived from observing
to ask leading questions in order
as offering them sufficient time to
open the door to knowledge
emotions and behaviour is a very
to influence others to subscribe
properly answer the question.
and understanding.
powerful tool.
to our way of thinking. This is
I found the best way of obtaining
Business owners today are
The art of asking the right
an ineffective way of obtaining
information from my staff on a whole
looking for leadership qualities in the
questions has never been more
information and it will often turn
range of issues was to question
candidates who apply for managerial
topical than it is today. In order to
the respondent off the question.
them on their turf rather than in my
positions in their organisations. It
maximise your knowledge about
Meaningful questions are designed
office, which tended to make things
is no longer sufficient to employ
your customers, competitors
to learn from the other person,
more formal. Responses to questions
the archetypical manager of years
and organisational culture, you
rather than influence.
by an employee seemed far more
gone who essentially gets things
must always be seeking accurate,
intuitive and relaxed when they
done by delegating to his or her
reliable and timely input from your
should you start your question by
were in a familiar and comfortable
subordinates. The expectation today
employees, and this can be achieved
revealing your opinion or personal
environment. This same principle is
is that managers can do more than
by asking the right questions. n
Under no circumstances
8 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
The Cobalt is an innovative low voltage motor driven door lock for swing doors. It has been designed to secure double acting doors and addresses the two biggest issues in door locking; the ability to align a misaligned door and the ability to release when requested, even with excessive load on the door. The Cobalt successfully overcomes these issues and offers the user an array of other features. To learn more about our complete range of smart and secure access solutions, contact dormakaba.
T: 1800 675 411 www.dormakaba.com.au
More than just a lock
CYBER SECURITY
WHY TRADITIONAL BACKUP IS OLD SCHOOL! BY TIM RIPPON
I
n today’s online
solution, ask yourself the following:
world, with
1. What options are available
cyberattacks
when a backup drive
In simple terms, the RPO is
becoming
becomes corrupted?
how much data you are willing to
available that you can easily
lose, whilst the RTO is how much
rollback to so that you can
downtime you can withstand.
recover prior to the data being
increasingly commonplace,
2. When did a test to restore
securing corporate data is very
information from one of the
important for every business.
backup media last occur?
6. Have automated snapshots
corrupted or lost.
data, others do not and that is even
business if critical data cannot
Consider Following these Steps
more of a problem. Having an
be restored?
By following the steps below you
machine (VM). This effectively
4. How long will it take to restore
may well improve the current
reduces your RTO significantly.
significantly reduce the impact of
data and be made available to
backup approach and be able
Combined with snapshots
cyberattacks or natural disasters
the business?
to reduce both the RPO and
mentioned above, this enables
RTO significantly:
rapid rollback to a restoration
1. If you have not already done
point prior to data corruption/
Whilst most businesses backup
effective data backup program can
and enhance the technology resilience in your business. Traditionally, data backup
3. What will be the impact to the
5. How much data could be lost and what is the impact on the reputation of our operations?
so, move to a fully automated
7. Have the ability to recover your environment onto a virtual
loss occurring.
has an integrity focus in the
Having data backed up is great;
backup process. This removes
confidentiality, integrity and
however, it is only the first step to a
any dependence on human
Where to from here?
availability (CIA) triad.
successful recovery. If this is critical
interaction to backup data sets.
A conversation with your
Those who only do regular
business data, then you really need
2. Ensure you regularly test a
infrastructure staff or local IT
backups are living with a false
to recover and be up and running
recovery of your current backup
technical contact can help identify
sense of security as the information
very quickly, preferably in minutes,
media: this is key to ensuring
areas for improvement to ensure
may not be able to be restored
not hours or even days.
the integrity of the data you
your business can get back and
plan to recover from should a
operational post-crisis, in the
major disaster occur.
shortest possible time. Additionally,
and if restored this may not occur in a timely manner, resulting in significant reputational fall-out. Some amazing and affordable
Introducing Recovery Time Objective and Recovery Point Objective
3. Do not just keep your latest
there are some great solutions on
copy of backup media. Should
the market that ease the burden of
technologies exist to mature our
The last two questions above open
that become corrupted too, then
restoring data when needed most.
approach to backup way beyond
up a very worthwhile discussion
you have nothing to restore!
Remember to promptly get things
the well proven grandfather-father-
about two key availability topics:
4. Investigate secure cloud-based
in place, so that your business can
son backup routine.
1. Recovery Point Objective (RPO):
backup services, being mindful
be back up and running! n
the point to which information
of any security requirements.
the maturity bar by moving from a
used by an activity must be
This is particularly useful if
Tim Rippon is the founder
backup-only mindset to including
restored to enable the activity
a site-wide loss occurs (for
and director of elasticus, advising
a business continuity concept to
to operate on resumption (aka
example, fire, flood or major
Australian-based executives on
improve availability. Returning the
maximum data loss).
natural disaster), providing the
how to best manage cybersecurity,
opportunity to recover critical
disaster recovery and business
information at an alternate site.
continuity before a major disaster
This article aims to help raise
system to an operational state in a
2. Recovery Time Objective (RTO):
timely manner is equally important,
the period of time following an
as is having the right data to
incident within which a) product
recover. This approach introduces
or service must be resumed, or
backup intervals. If the current
Master of Information Security (ISO
the availability focus, along with
b) activity must be resumed, or
backup of data occurs once per
27001), certified Master of Business
the integrity focus, in the CIA triad.
c) resources must be recovered.
day, then consider reducing it to
Continuity (ISO 22301) and Lead
every few hours. This effectively
Cyber Security Manager (ISO 27032)
5. Where possible, reduce the
or crisis occurs. He holds a certified
Consider the Following
This can be best summarised in the
reduces your RPO from 24 hours
from PECB. Tim can be contacted via
When enhancing your data backup
following table:
down to a few hours!
mobile 0417 036 026.
10 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
MARKET ANALYSIS
CCTV MARKET OF AUSTRALIA AND NEW ZEALAND BY TIM RIPPON
T
his time we are
example, we do not see Samsung
mention each of the brand and if this
exploring the security
(Hanwha Techwin) in the list of
number is less than 20 – all those
market of Australia and
popular brands.
brands were combined into the ‘others’
New Zealand. The main
In order to build this report,
group. After this, we ended up with 21
players are still the same: Axis,
we took information about 3,611
Hikvision, Dahua. However, as you can
companies and several hundreds
notice, this market differs a lot from the
of CCTV brands. Then we checked
chart for Australia and New Zealand,
picture in Europe and the US; for
how many companies use or at least
August 2018.
popular brands and their shares. Here is the CCTV brand popularity
On the left, we have a pie chart, showing the share of each brand. On the right, we have the number of companies who offer the listed equipment. To view more brands, companies and so on, check the source at Global market for surveillance and security equipment. n
12 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Intelligent security solutions from Dahua Technology Discover Dahua, a world leader in video surveillance, offering high value total security solutions to safeguard assets, communities and infrastructures.
now available at Hills! Unified Management Platform Video Surveillance
Unified UnifiedManagement Management Platform Platform Video VideoSurveillance Surveillance
Unified Management Platform Video Intercom Video Intercom
Video Surveillance - Advanced video collecting and analysing - Wide coverage w/o blind angle
Video Surveillance Video Surveillance
Unified Management Platform Unified Management Platform
- Advanced video collecting and analysing - Advanced video collecting and analysing - Wide coverage w/o blind angle - Wide coverage w/o blind angle
- High reliability with low running cost - High reliability with low running cost - Scalable and customisable - Scalable and customisable
HSS0031-July18-version 1
For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au
facebook.com/HillsLtd/ CONNECT
E N T E RTA I N
SECURE
- High reliability with low running cost - Scalable and customisable
Video Intercom Video Intercom - Support both IPIP and Analogue - Support both and Analogue - Attractive design - Attractive design
-
HUMAN RESOURCES
MANAGING AGEING WORKERS IN THE AUSTRALIAN SECURITY INDUSTRY BY GREG BYRNE
A
ustralia’s ageing
raising the age it can be accessed
they get older and cannot hold
older guards and employees.
workforce is having a
from 65½ to 67 by 2023 and to 70
their own at the door of the
This could also include training
profound effect on all
by 2035. However, provided you
licensed premises or run as fast as
for those working beside
industries, including
are permanently retired, you are
the younger guard.
the Australian security industry.
able to access your superannuation
Although it is the responsibility of
at age 60.
owners and managers of security
So, what does the ageing
Chris Anderson, CEO and
other generations. 3. Create opportunities and
founder of Silvertrac Software,
conditions for older guards.
states older guards tend to be more
This could mean redesigning
companies to develop strategies, it
population mean for employers in
suspicious of change, do not trust
position descriptions, job
is the also the role of human
the Australian security industry?
so readily and are more fearful
sharing, working from home
of job security due to a lack of
and phased retirement
understanding of technology.
plans, such as part-time
resources (HR) to assist and guide,
For the first time in our history
strategically and tactically, security
there could be five generations
companies in developing plans and
working together. This large age
responses to this issue.
span on one site has the potential
of what is emerging as a larger
of creating all sorts of management
issue for the Australian security
retirement awareness
and intergenerational conflict.
industry. To assist the HR manager
sessions, which could include
According to the 2016 census, nearly one in every six people in Australia (16 percent) were aged
How does a supervisor manage
These issues are just a snapshot
to support their managers and
65 and over. By the end of the next
a work site where not all guards
decade, it is expected that one
are physically equal, yet the
strategies are proposed:
in three Australians will be aged
expectations and pay are? Where
1. Undertake an age audit and
over 55.
one guard has superior speed,
succession plan – monitor
team leaders, the following
work arrangements. 4. Construct and deliver
financial counselling. 5. Re-skill and purchase tools that are more suited to older workers. 6. Introduce change slowly,
agility and strength and is working
the age of staff, especially in
take guards off-site to train
Government is playing its part. The
with a guard(s) who has age-related
areas that have traditionally
them and, where necessary,
Government recently announced
decline in speed, physical strength
been the domain of younger
force older guards to adapt
the provision of $17.4 million to
and cognitive ability. Further,
workers, such as crowd control,
establish the Skills Checkpoint
mature-aged workers tend to want
door and licensed premises.
for Older Workers program,
flexible working arrangements
Plan for future resourcing
implementing benchmarks
and $189.7 million to support
so they, for example, can care for
needs and the transfer of skills
for older guards that they
mature age workers adapting to
ageing parents or to transition
and knowledge.
understand and are realistic.
the transitioning economy. The
to retirement.
To a point, the Federal
Government is also easing the burden of the age pension by
14 // SECURITY SOLUTIONS
A security guard cannot simply be sacked or dismissed because
and change. 7. ASIS International also suggests
2. Develop mentoring/coaching programs to promote skill transfer between younger and
Greg Byrne is the CEO and founder of Multisec Consultancy.
securitysolutionsmagazine.com
YO U R AC C ESS TO REVO LUTION
FlowMotionÂŽ
For more information | 1300 364 864 | info@magnetic-oz.com | www.flowmotion-access.com |
RISK MANAGEMENT
WHAT IS A SOCIO-TECHNICAL SYSTEM AND WHY IS IT IMPORTANT FOR RISK MANAGEMENT? BY KEVIN J. FOSTER
Historical Context of Socio-Technical Systems
and operated the technology.
to improve the reliability of an
used the term
Unsurprisingly, labour disputes
engineered system. During the
socio-technical
The socio-technical concept first
were frequent. Weber’s principles
1960s, the idea of redundancy of
system for a long
arose in about 1949 during the
of bureaucracy and Taylor’s concept
functions developed, which led
time; however, risk and resilience
post-war reconstruction effort
of scientific management were
to the idea of multi-skilling of
practitioners are increasingly using
in Britain. In 1951, research was
seen as the best way to design an
individuals within the workforce.
this term. So, what exactly is this
published on how social systems
engineering organisation.
This was quite different to
type of system and what does it
behaved in organisations that built
have to do with risk management?
and operated engineering systems.
This article summarises the
Prior to the 1950s, engineers
O
Social scientists have
By the early 1960s, the technological imperative in organisation design was giving way
earlier ideas of Taylorism in technical organisations. The idea of socio-technical
characteristics of socio-technical
designed technologies for specific
to emphasis on positive economic
improvement developed to
systems in a way that is consistent
purposes. The organisations
and human results. The aim was
find the best match between
with descriptions published from
that built and operated these
to find the best ways to match the
the technological and social
the 1950s to the present day. It also
technologies were designed
requirements of both the social
components of a system. Hence,
discusses the distinction between
to suit the requirements of the
and technical systems. Emery and
the term socio-technical system
social resilience and technical
technology, often by translating
Trist studied this development
was coined to describe holistically
redundancy in the design of this
ideas from technological systems
in technological organisations
the functioning of these social and
type of system. To put these terms
into management systems.
and developed some principles.
technical components.
in a risk management context, it
Factories, mines and power stations
An important principle was that
is important first to understand
of the day are all examples. The
the work system was defined as
systems is concerned with
the evolution of ideas that led to
technical objectives of the system
a set of activities that made up a
interdependencies both internally
the development and use of these
tended to take priority over the
functioning whole.
and externally. Internally, self-
terms when describing socio-
social needs and requirements
technical systems.
of the workforce that built
16 // SECURITY SOLUTIONS
The idea of redundancy of parts is well known to engineers
The notion of socio-technical
regulating groups are dependent on one another in order to achieve
securitysolutionsmagazine.com
the desired output from the
the terminology that is widely used
by surprising disturbances in
whole system. However, whole
in the design of socio-technical
the operating environment.
Accidents: Living with High-Risk
enterprises also interact with
systems. These are not formal
Self-regulation is a key feature
Technologies. Princeton New
their external environment. The
definitions, but are an attempt to
of high reliability socio-
Jersey, Princeton University Press
enterprise as a socio-technical
describe the concepts generally
technical systems.
system is open to supplies and
understood by people who
services provided by other enterprises; it is also open to
Perrow, C. 1999 Normal
Rochlin, G.I. 1993 Defining
• Resilience is a social concept
‘High Reliability’ Organizations
design, operate or study socio-
that refers to the elasticity
in Practice. In Roberts, K.H. (ed.),
technical systems.
or adaptability of a socio-
New Challenges to Understanding
technical system so that
Organizations. New York, MacMillan
customers who rely on the
after a significant failure of
Sagan, Scott D. 1993 The
the system to self-regulate
Limits of Safety: Organizations,
(after a disturbance beyond
Accidents, and Nuclear Weapons.
or disruptions, sometimes with
Terminology Used by Designers and Operators of Socio-Technical Systems
the design parameters of the
Princeton New Jersey, Princeton
surprising consequences which
A socio-technical system is
system) it may in time resume
University Press
cause instability. This dynamic
a network of interconnected
the achievement of its goals
Schulman, P.R., Roe, E.,
instability is generally referred to
elements comprising groups
(reboot), or alternatively set
van Eeten, M. and de Bruijne,
as risk and, in extreme cases, can
of people and technology that
new goals (after a redesign).
M. 2004 High Reliability and
lead to a crisis.
functions as one simple or complex
Resilience is important
the Management of Critical
system designed to achieve
when high reliability is not
Infrastructures. In Journal
are dependent on technology to
specific goals.
achievable or not desirable.
of Contingencies and Crisis
achieve their goals, especially
For a socio-technical system:
Some important references that
Management, Vol 12, No 1, 14-28.
networked computer and
• Error is a technical concept
discuss these issues in more detail
Oxford, Blackwell Publishers
enterprise to provide goods or services. The socio-technical system is also open to disturbances
Today, almost all organisations
information-sharing technologies.
that describes the difference
However, unlike the earlier
between the system goal
socio-technical systems, many
and the actual output of
References
Conceptual Framework and Action
organisations today do not
the system.
Jarman, A. 2001 ‘Reliability’
Research Program. Occasional
Reconsidered: A Critique of the
paper No 2. The Ontario Quality of Working Life Centre, Canada
directly employ the designers and
• Redundancy is a technical
are listed below. n
Trist, E. 1981 The Evolution of Socio-Technical Systems: a
operators of the technologies. The
concept used to describe
Sagan-LaPorte Debate Concerning
interdependence of technologies,
certain processes or
Vulnerable High-Technology
both internal and external
components that improve the
Systems. Chisholm and Lerner
Theory of Open Systems in Physics
to the enterprise, is now far
reliability of the system as a
Paper, Canberra
and Biology. Science, Vol 3
more complex.
whole (for example, duplication
Landau, M. 1969 Redundancy,
Von Bertalanffy, L. 1950 The
Wildavsky, A. 1989 Searching
of elements or processes).
Rationality, and the Problem of
for Safety. New Brunswick USA,
systems were relatively simple
In a high reliability socio-
Duplication and Overlap. In Public
Transaction Publishers
(for example, the power station
technical system, the design
Administration Review, Vo. 29, No
of the 1960s), today’s complex
aim would be to have no errors
4, (July/August), 346-358
socio-technical systems are
in operations.
While earlier socio-technical
• Regulation is a technical
LaPorte, T.R. 1996 High
Dr Kevin J. Foster CPEng is an independent researcher studying
Reliability Organizations: Unlikely,
ways to improve risk management,
even the designers do not fully
concept that is used to refer
Demanding and At Risk. Journal
especially in complex security
understand (for example, the
to the process of detecting
of Contingencies and Crisis
domains where both people and
Internet of Things).
and responding to system
Management, Vol 4, No 2, 60-71.
technologies interact, sometimes in
errors, including those caused
Oxford, Blackwell Publishers
surprising ways.
interconnected in ways that
The next section summarises
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 17
COMMUNCATIONS
WE HAVE HAD A DATA BREACH. LET’S NOT TELL ANYONE. BY TONY JAQUES
I
t is a basic question
technology experts have been
in the face of a data
building a new online portal”.
The whole case seemed to be
with our values, but ultimately
captured in reporter Paul Penfold’s
chose to follow the advice of our
final question. “Doesn’t it seem
experts given our commitment to
months after the initial report
extraordinary that you had a whole
cybersecurity.”
we tell the world and risk the
and four months after the system
‘war room’ and were consulting with
consequences? A major fuel
was reinstated, it all began to
all these experts, yet one member
interpretation which can be put on
company was recently confronted
unravel. The dissatisfied customer
of the public was able to simply
this sorry story is that the company
by this challenge, and their
shared the story with local online
change an account number and a
tried to conceal an apparent
response and how they
news service Stuff Circuit, and
URL and get all this information?”
data breach; failed to advise the
communicated it provides a
the company response was
worrying lesson for issue and crisis
disingenuous and unhelpful. “Yes,
very, very disappointing and I
created a misleading narrative for
managers everywhere.
our Z Card Online system was taken
apologise to our customers. As
customers; seemingly did not keep
down for a period whilst we made
I said, sometimes these things
the CEO fully informed; and finally
person alerted New Zealand petrol
some improvements and changes.
happen… This is something that was
came clean only when there was
company Z Energy that a “critical
But it is now back up and running
missed on the way through and we
no other option. Compare this with
flaw” in its online fuel card system
and we really don’t have any more
are very sorry about that.” Hardly a
the value proudly stated in the
potentially exposed customer
to add on this.”
convincing apology or explanation.
company’s latest annual report:
breach. Do we fix it and keep quiet? Or do
In November 2017, an unnamed
Then in June 2018, seven
records, including names, vehicle
Bennetts replied, “Yes, certainly
On the basis of the ‘new
The most charitable
regulator in a timely fashion;
“We’re committed to being straight
registration details, where and
Detail
information’ presented, Z Energy –
up with journalists and the media.
when they bought petrol and, in
The reporters kept digging and
which provides about one third of
That means providing meaningful
some circumstances, even their
last month, Z Energy CEO Mike
New Zealand’s petrol – only then
information, giving straight answers,
home address.
Bennetts sat down for a video-
disclosed the breach to the market
and setting new standards of
taped interview. While confirming
and the Privacy Commissioner. Yet
transparency in our industry.” Great
yet mandatory in NZ and the
vulnerability had been identified
a company spokesperson admitted
promise. Poor delivery.
company decided to attempt a
in November 2017, he insisted
to Stuff Circuit that the very same
Footnote: A Bill introducing
discreet system patch. However,
their experts found no evidence
evidence had been emailed to the
mandatory data breach reporting is
the anonymous customer later
at the time that data had been
company by the original informant
currently before the NZ Parliament. n
contacted them again, saying the
compromised. Therefore, he
seven months earlier, when the CEO
so-called fix was “half baked”
argued, it was a vulnerability issue
was out of the country. Involvement
and data was still vulnerable.
not a breach and there was no
by the media “now meant we
by Tony Jaques, Director of Issue
The company then took the
need to tell customers. However,
chose to deal with this differently”.
Outcomes Pty Ltd, for people who
system down, telling their 45,000
when presented on camera with
The spokesperson added that the
work in issue and crisis management.
cardholders it was dealing
a screenshot showing data from
company did not want to keep quiet
He can be reached at tjaques@
with a “technical issue”. They
his own company’s vehicle fleet
about the incident, but did so on
issueoutcomes.com.au or you
subsequently told customers
account, he conceded, “It certainly is
advice. “We repeatedly challenged
can visit his website at www.
the site was down because “our
a security breach.”
this counsel as it did not sit well
issuesoutcomes.com.au
Data breach reporting is not
18 // SECURITY SOLUTIONS
Managing Outcomes is published
securitysolutionsmagazine.com
Smart Vehicle Identification
Photos credits: Shutterstock - aressy.com 04/18 - 10917
New Spectre reader: Let the good go, kick the bad out. Without delay. Meet the challenge of fast-track security at your vehicle gates. Spectre’s UHF-based vehicle ID reader is the first of a new generation: discreet by design, flexible in its configuration, secure and encrypted in its communication. Our new long-range reader is built to perform for up to 4 driveways, even in highly challenging environments. It’s the most robust reader on the market, yet intuitively easy to use. Welcome to speed and security - in a single solution.
SCALABLE | SMOOTH | SECURE | AGILE | STEALTH | INSTINCTIVE
www.stid-security.com Security Meetings Trophées de la sécurité Expoprotection ISC West APS
LEGAL has certain ongoing obligations in respect to safety within the workplace. Any risks that arise from time to time should be immediately communicated by the employee to the employer for assessment and action. The employer must have a written policy in that regard which must be handed to the employee as part of his/her training. Fourth, consider a trial of the arrangements. Set a fixed period and then review whether or not work-
BY JUSTIN LAWRENCE
THE LEGAL ISSUES SURROUNDING EMPLOYEES WORKING FROM HOME
from-home should continue. Obtain the employee’s feedback during the course of the review. At the time of the review have the workplace reassessed for on-going suitability. Fifth, establish agreed hours of work, communication requirements, reporting requirements and specifics of the role. These should
W
orking from home
There is no doubt that
workplace takes the more traditional
be recorded in writing and signed by both parties.
sounds like a great
employees are entitled to request
on-site form, or whether it is the
idea, doesn’t it? Just
flexible working arrangements.
worker’s own residence.
think, you walk from
Anti-discrimination legislation
So what should employers do
Sixth, remember that all employees, whether working in
the bedroom to the bathroom, then
prohibits employers from
if faced with a request from an
your office or more remotely, are
from the bathroom to the kitchen,
discriminating against employees.
employee that he be permitted
your responsibility. The Telstra case
and then from the kitchen to the
In some cases, a failure to provide
to work from home, and what
confirms this. You might therefore
office. No slapping together your
flexible working arrangements
steps should the employee take
want to pay a random visit to your
lunch and no sprinting out the door
has been found to amount to
to protect himself? Here are a few
employee’s home workplace from
on time. Better still - no traffic; just
discrimination. So it seems
tips that might assist employers in
time to time to ensure that your
a short stroll to the desk. It all
that workplace flexibility is in,
navigating through this complex
legal risks continue to be minimised
seems so easy, but if you are an
whether employers like it or
legal minefield.
even though you are not present
employer, think again.
not. But like any workplace, an
In a case decided some years
Firstly, when a work-from-home
in that workplace on a day-today basis.
employee’s home must comply with
request is received, assess whether
ago by the Administrative Appeals
relevant occupational health and
that employee’s duties are suitable
Tribunal, it was held that a worker
safety requirements.
for that type of environment.
employee that although he or
Finally, make it clear to your
The nature of tasks that need
she is working from home, during
at her house while having a
Safety Act, which commenced in
to be performed will be one of
normal working hours that home is
break from work should receive
all Australian jurisdictions around
many factors for consideration in
merely an extension of the existing
compensation from her employer
the beginning of 2012, defines a
that regard.
workplace and that both of you need
because she suffered her injuries
workplace as “a place where work
in her workplace and in the course
is carried out for a business and
equipment will be necessary for the
of employment.
includes any place where a worker
employee to safely undertake work
Justin Lawrence is a partner
goes, or is likely to go, while at
from home. For example, is there a
with Henderson & Ball Solicitors
claims that her employer (Telstra)
work”. There is a good chance that
dedicated space within the house
and practises in the areas of
insisted that she return to work
this definition covers places within a
for a desk, computer, telephone and
commercial litigation, criminal,
in their city office even though
house such as the bathroom, kitchen
chair? Is that space free of hazards?
family and property law. Henderson
several doctors had recommended
and meals areas.
Is it properly lit and ventilated?
& Ball have Law Institute of Victoria
Complete a detailed, documented
accredited specialists in the areas
who fell down the stairs twice
After her falls, the employee
against this. The Tribunal
The Model Work Health and
What this means for business
Secondly, establish what, if any,
to treat it accordingly. n
found that in so doing, Telstra
is that employers must be satisfied
risk assessment and have the
of business law, property law and
contributed to her psychological
that the workplace is free from
employee read, consider and sign it.
commercial litigation. Justin and
injury and that she should
all reasonably foreseeable risks
receive compensation.
irrespective of whether that
20 // SECURITY SOLUTIONS
Thirdly, make it clear to the employee that the employee
Henderson & Ball can be contacted on 03 9261 8000.
securitysolutionsmagazine.com
Pedestrian and Vehicular Access Control Automation
FAAC Simply Automatic Modular automation solutions
HUB Parking Technology Smart and flexible parking solutions
Magnetic Automation Pioneering access control solutions
Experts in Access | Discover the FAAC Group range of products at J14 | www.faacgroup.com
THINKING ABOUT SECURITY
WILL SECURITY EXIST? BY DON WILLIAMS
s we know, ever since
where the security system will
to meet any need. We are already
working understanding of how it
the first caveman had
become one element of the unified
seeing this with shared and service-
all fits together. It is also possible,
something he wanted
building/community/precinct
based ransomware.
if not probable, that the wheel will
to keep, security has
and will not require a specialist
been a concept and a practice. For
to design or install. Monitoring
‘arcane’ knowledge once held
physical security barriers as the
much of history, protective security
of and response to alarms will
closely by the specialist guilds/
IoT reveals its vulnerabilities,
has been about physical barriers
be automated to the point where
providers. For example, more people
requiring the specialists who know
and selection of trusted
the owner of the site may be
are using Dr Google every year and
how to design and implement
employees/slaves, even going as far
informed of the incident in real
YouTube will show you how to do
such systems.
as using eunuchs as specialists to
time (as already happens) but
just about anything. The role of
guard certain ‘attractive’ assets.
simultaneously the notification
security specialists (like medical
knowledge area will continue to
Security has evolved to match
being sent to police and possibly
practitioners) is to recognise that
exist as there will still be a need to
changes in need, capability
automatic protective measures
the user may have gained some
help others protect what they have
and society.
being implemented. With vehicle
knowledge and to recognise that but
from theft or damage, but doing it
monitoring systems it is already
to take them further along the path
in new operating, technological and
worked, to various degrees, for
possible to track stolen cars
of understanding and application.
social environments. We need to
millennia and followed us into the
and (legally or not) immobilise
The concept of in-house
look ahead rather than back to see
21st century. Are they still valid?
them and even trap the thief in
and external security providers
where we will fit at the end of this
We had an industrial revolution and
the vehicle.
may dissolve as individuals
year and at the end of this decade.
and organisations take on more
Those of us operating in the security
A
The basic concepts have
a century or so later a transport
For every advance there is a
Users have greater access to
return to stand-alone, simplistic
Security as a separate
revolution and, within decades,
vulnerability. Digital/Wi-Fi locks,
responsibility for their protection
sphere today may be the eunuchs of
an information/communication
be they for doors, windows or
and response. With Apple, Microsoft,
tomorrow.
revolution. Now, with quantum
padlocks, offer increased security
Google and others offering more
computing, the Internet of Things
over the issuing and management
and more individually controlled
(IoT) and ‘who knows what’
of keys, but also increased exposure
systems for the home and work
is a recognised thought leader in
beginning to appear, what will be
to digital copying and picking, if
environment, what will the security
security, emergency management
the role of security?
not now – then soon. Villains will
specialist do?
and related disciplines. His book
Building/home management
n
Don Williams CPP RSecP ASecM
Bomb Safety and Security: the
not need specialist knowledge to
It is possible that there
systems are becoming more
attack, enter or defeat systems as
will be an increased need for
Manager’s Guide is available from
integrated. The IoT will blur the
those with the skills will post, free
generalist/cross-discipline security
Amazon. Don can be contacted via
individuality of items to the point
or for a fee, the necessary tools
consultants, that is, those with a
email donwilliams@grapevine.net.au
22 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.
NEW!
ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.
+61 (3) 9544 2477
email: oz_sales@takex.com
HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.
BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.
INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.
OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .
1300 319 499 csd.com.au www.takex.com
TAKEX AMERICA
EVENTS
The 2018 Australian OSPAs
wp-content/uploads/2014/09/
Australia. AWE is dedicated to
conference and exhibition, real-
Aspiring-to-Excellence.pdf)
showcasing the latest products,
world challenges presented and a
18 October 2018
The OSPAs are being set-up
technology, equipment and
glimpse into the future of global
Doltone House,
in collaboration with security
services to this niche market. The
security integration and trends.
Hyde Park, Sydney
associations and groups across
Australian Warrior Expo is not like
The Outstanding Security
many countries.
any other trade show! With a huge
electronic security and safety
Performance Awards (OSPAs) are
The Congress will feature
focus on hospitality, it includes a
solutions for aviation, banking,
pleased to announce the dates
standardising the award categories
VIP Night and an AWE party, plus
infrastructure, industrial sites,
for the 2018 Australian awards.
and criteria, the OSPAs scheme
a full retail store. AWE will bring
mines, commercial buildings,
They will be working for the fourth
provides an opportunity for
both professionals and agencies
residential towers, building and
year in a row with the prestigious
countries to run their own
together, including government
development; the best of the best
Australian Security Industry
evidence-based OSPAs schemes
procurement managers, decision
in world class offering:
Association Limited (ASIAL).
while maintaining an ability to
makers and operators.
• intelligent CCTV, access control
The OSPAs recognise and reward companies and individuals across the security sector. They are
By researching and
compete on an international level in the future – World OSPAs.
Visit australianwarriorexpo.com.au
and alarms systems
for more information.
• advanced video surveillance solutions
Visit au.theospas.com for
designed to be both independent
more information or to make
SecTec PNG Congress
• intelligent traffic solutions
and inclusive, providing an
a nomination.
4–6 March 2019
• asset management systems
Port Moresby, Papua New Guinea
• drone capability
Now is the time to plan to attend a
• software cyber management
suppliers, to be recognised and for
Australian Warrior Expo 2018
their success to be celebrated.
15–17 November 2018
conference and exhibition – SecTec
• innovative video intercoms
Brisbane Showgrounds, Brisbane
PNG Congress.
• large enterprise systems
opportunity for outstanding performers, whether buyers or
The criteria for these awards
world-class security and technology
solutions
• mechanical locking integration
are based on extensive research
The Australian Warrior Expo
on key factors that contribute
(AWE) is Australia’s premier law
professionals will converge on Port
to and characterise outstanding
enforcement, military, emergency
Moresby, PNG, in March 2019 for
performance. (This research can be
services and security expo and
the first Oceania premier security
• emerging technologies.
found at perpetuityresearch.com/
is the only event of its type in
industry event, with a security
Do not miss out! Schedule, budget,
24 // SECURITY SOLUTIONS
Security industry specialists and
with electronic security solutions
securitysolutionsmagazine.com
plan to be there and stay informed.
Total Facilities
Early bird registration is open until
20–21 March 2019
12am 1st August 2018.
International Convention Centre,
Visit www.sectecpng.com/
Darling Harbour Sydney
register.html to register your interest
Total Facilities is a two-day live
or email info@sectecpng.com for
experience and celebration
more information.
of ideas, connections and opportunities for the nation’s FM
ISC West
and building-related communities.
10–12 April 2019
With an exciting new Smart Zone
Sands Expo Convention Center,
featuring innovative start-ups,
Las Vegas
lively speaker discussions and
ISC West is THE largest security
the very latest FM solutions, as
industry trade show in the U.S.
well as exclusive leadership and
At ISC West, you will have the
networking events, Total Facilities
chance to network with over
is the most valuable and rewarding
30,000 security professionals
destination for anyone in the FM &
through New Products &
CRE industry.
Technologies encompassing
Our 2019 event will feature a
everything from access control
Smart Zone designed as a thriving
to unmanned vehicles from over
hub of technological innovation
1,000 Exhibitors & Brands.
which presents new technologies
In 2019, ISC West will
and solutions to help you create
offer attendees a host of
smarter, greener buildings. The new
attractions including:
zone offers visitors a dedicated
• new products and
environment to look for integrated
technologies, encompassing
and cloud-based solutions to
everything from access control
improve operations and deliver
to unmanned vehicles.
business value.
• Unmanned Security Expo,
According to industry research,
introduced in 2017, is an event
IoT technologies will be more
within ISC West focusing on
pervasive in smart commercial
unmanned aerial vehicles
buildings than anywhere else over
(UAVs), unmanned ground
the next three years. This zone
robotics and vehicles (UGVs),
is designed to deliver visitors
and the various software
seeking industry-class solutions
and applications that
and strategic advice on how to
support them.
use technology and data to better
• Connected Security Expo (CSE) moved to the ISC West show
understand and manage their building performance.
floor in 2017! As the digital
For more information visit
and physical worlds collide,
www.totalfacilities.com.au for
days of quality networking and
it is increasingly important
more information.
unrivalled education alongside a
forward to once again reuniting +
for industry professionals to
The entire team is looking
showcase of the most innovative
than 4,500 security professionals
solutions to the Australian
with over 150 leading suppliers.
clients from both physical and
Security Exhibition & Conference 2019
market. For over three decades,
The 2019 show is set to see some
cyber threats. CSE provides
24–26 July
it has been the largest and most
interesting new innovations as well
holistic solutions for today’s
International Convention Centre,
established commercial event for
as a host of new attractions.
connected organisations.
Darling Harbour, Sydney
the security industry in Australia,
Working with SIA, ISC West also
In 2019, the Security Exhibition
bringing together the entire
in your diary. We look forward to
features world-class education
& Conference is heading back
supply chain of manufacturers,
seeing you again in Sydney in 2019
to learn about every facet of the
to Sydney.
distributors, security professionals
for the Security Exhibition & ASIAL
and end-users to connect
Conference!
protect their organisations and
security industry. Visit www.iscwest.com for more information.
securitysolutionsmagazine.com
The Security Exhibition & Conference is the industry’s annual
and create unparalleled
opportunity to reunite for three
business opportunities.
Make sure you put the dates
Visit securityexpo.com.au for more information. n
SECURITY SOLUTIONS // 25
FEAUSRE
INDUSTRY RECOGNISES BRAVERY AND COMMITMENT
24 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Now in its ninth year, the
to potential danger when he
Australian Security Medals
received notification that a male
Foundation Inc. (ASMF) has
had gained access to the secure
grown from what started as an
site where Downing was posted.
idea around a dinner table to an
Upon entering the site, the male
industry institution recognising
informed staff that he was in
bravery and contributions
possession of a bottle containing
to security.
petrol and intended to cause
With this year’s medals being presented during a sold-out black-
The male then walked into an
tie charity dinner at the Museum
adjoining room and proceeded to
of Contemporary Art at the Rocks
use the petrol to douse himself.
in Sydney, ASMF Chairman Paul
It was at this point that security
Maihi said, “Not only is it a huge
officers arrived, whereupon they
honour to recognise individuals
began negotiating with the male,
for their bravery and contribution,
who ignored their pleas and
but to be able to do so at such an
proceeded to ignite a cigarette
amazing venue and in front of a
lighter with the clear intent to set
room filled with their peers and
himself alight.
colleagues speaks volumes for
With little concern for his
how far the Foundation has come
own safety, security officer
in such a short space of time.”
Downing immediately leapt forth,
The ASMF awards two
attempting to knock the lighter
categories of medal each year:
from the person’s hand, receiving
the Australian Security Medal
burns to his hands and face in
of Valour and the Australian
the process. While Downing was
Security Medal. This year, three
unable to completely prevent the
Australian Security Medals for
male from setting himself alight,
Valour (ASMV) were awarded.
he was ultimately able to quell
According to the ASMF Patron,
the fire with the assistance of
former MP the Honorable Philip
the building’s fire suppression
Ruddock, “The ASMV is awarded
systems. Through his selfless
to recognise security operatives
actions, security officer Downing
for an outstanding act or acts
demonstrated considerable
of valour; an action or actions
bravery and courage, for which he
demonstrating valour, courage
was awarded the ASMV.
and decisiveness above and beyond the call of duty.” The first recipient of the ASMV
The second and third medals of valour for the evening were awarded to security officers
for the evening was security
Novica Ilic and Ahmad El Masri of
officer David Downing of MSS
Glad Group who, while working at
Security – who, despite significant
a large shopping centre in Sydney,
risk to his own safety, intervened
answered a call for assistance.
when an agitated male attempted
According to the report, two large
to set himself on fire.
groups totalling approximately
Security officer Downing’s
securitysolutionsmagazine.com
himself injury.
40 to 50 youths had been spotted
story exemplifies the types of
acting in a threatening manner on
stories and courage that have
the rooftop car park of the centre.
become the hallmark of the
Upon arriving at the location
Australian Security Medals.
of the youths, officers Ilic and El
According to reports, security
Masri witnessed the two groups
officer Downing was first alerted
commence brawling. Both officers
SECURITY SOLUTIONS // 25
FEAUSRE
immediately and without regard
serious injury to those present,
for their own safety placed
in addition to officer El Masri
successful, but is nonetheless
themselves between the groups
preventing a knife attack from
worthy of mention, in which
in an effort to separate them and
occurring. Both men exhibited
case a Certificate of Meritorious
behaviours, arrangements can
prevent further violence. Despite
considerable bravery with a
Conduct is sent to the person’s
be made to remove, reduce
their efforts, the brawl escalated,
disregard for their own safety.
employer for presentation to
or reassess conditions of the
the individual.
prohibition and banning notices.
spilling into the centre. At this
In addition to the ASMV, a
Not every nomination is
better understanding appropriate behaviours and consequences. Based on attendance and
point, security officer El Masri
number of Australian Security
spotted a male armed with a
Medals (ASM) were presented on
three Australian Security Medals.
has been measured through
knife moving towards a retreating
the evening.
The first was awarded to Brendan
its history of positive social
Noble who has demonstrated his
outcomes, including a reduction in
member of the other group.
“The ASM is awarded to
This year saw the awarding of
The success of the program
Even though security officer El
recognise the outstanding career
consistent commitment to the
incidents, improved employment
Masri was engaged in preventing
and character of the security
role of security, both in a crime
opportunities and improved
another male from entering the
professional receiving it,” said
prevention and a customer service
relationships through the
melee at that moment, he was
Ruddock. “ASM recipients have
capacity throughout his career. He
community and local council.
able to use his free hand to grab
demonstrated a consistent, high-
has received many written letters
and disarm the knife-wielding
level contribution to the wider
of thanks from both customers
program and in partnership with
male, preventing further harm
community, sometimes through
and staff of the centre where he
the HUB youth entertainment
and injury.
innovative non-core business
works and is held in high esteem
venue, Noah has also developed
activities and projects, or through
by all he meets.
Rising Stars Empowerment – a
At the same moment,
In addition to the TAP
martial arts training program
approximately 25 members
extraordinary performance in
from one of the groups began to
their professional role. This award
to security officer Noah Magnus
with a philosophy based on
pursue a number of retreating
is about more than how a person
who, in 2003, developed the
overcoming opposition, improving
members of the second group.
runs their business or operates in
Training Awareness Program
one’s position and rising above
Acting quickly and without regard
an organisation, but emphasises
(TAP) as a way of engaging with
adversity. This program has
for personal safety, security
what they do above and beyond
young people banned from the
produced a number of state,
officer Ilic immediately placed
their day-to-day responsibilities.”
Erina Fair Shopping Centre in an
national and world champions
Senior corporate security
effort to establish better working
in various martial arts. Program
himself at the top of an escalator,
The second ASM was awarded
using his body as a barricade to
managers form the judging panel
relationships with the people
participants have represented
prevent access by the first group
for the medals. “This means that
who had been subject to bans,
Australia and secured victories
to the second, exposing himself to
the nominations are carefully
in addition to their friends and
against champions from countries
great risk of physical assault by a
considered by major buyers
their families.
around the world.
large number of agitated youths.
of security and peers to fellow
Thankfully, back up and police
Through TAP., young people
Furthermore, Noah
security managers,” said Maihi.
who have been issued prohibition
has developed Rising Stars
assistance arrived quickly to help
“The panel not only discusses – at
notices are given the opportunity
Employment Strategy, a program
contain the scene.
length – the merits of each case,
to reduce the length of the notice
that provides a series of sessions
but follow up where necessary
by attending a TAP. workshop,
to assist young people to develop
quick and selfless actions of these
with further investigation and
where they interact with security
techniques to find gainful
officers almost certainly prevented
checking references.”
officers and others, with a view to
employment, including topics
According to their citations, the
26 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
on professional presentation,
investigator for the Bali Bombing
a successful interview strategy
(for which he was awarded the
and the importance of references
Medal of the Order of Australia)
and resumes.
and the operational commander
Over 100 attendees of the program have used the skills they gained through the experiences;
for the Sydney Olympics, among many other things. In addition to his role at
with more than 50 percent of
Qantas, Steve was an active
those participants having gone
participant in many industry
on to become security operatives.
associations, including roles
Noah’s partnerships and programs
as Chair of the International
have been extended beyond
Air Transport Association
Erina Fair and local council to
(IATA) Security Group; a
include NSW Government and
member of the oneworld
public education students with a
Security Committee; a member
history of disruptive behaviour,
of the International Security
at risk of alienation and
Management Association; an
community disengagement.
adviser to the Association of Asia
The third and final ASM
Pacific Airlines (AAPA) Security
of the evening was awarded
Committee; and a member of
posthumously to Steve Jackson,
the Australian Institute of Police
used their training to literally
of security by sharing stories
former Chairman of the ASMF and
Management Governance and
save a person’s life. St John
about its heroes and leaders,
Chief Security Officer for Qantas.
Risk Committee. He also played
Ambulance Chief Executive Len
doing good within the wider
Mr Jackson had been a senior
active roles in the Security
Fiori handed out three awards,
community and supporting those
leader, mentor and driving force
Professionals Association and
to Manatuki Pryor, Norman Hill,
that need help within its own
within the security industry for
was instrumental in establishing
Mary Theofanidis, Mohammad
community,” says Maihi.
almost two decades. In addition
the ASMF.
Boreh and Candan Baykan.
to his most recent role, in which
In attendance on the evening
“Security is an integral part
Funds raised from the night
of business and society, and
he served as the Chief Security
was Steve’s wife Marlene, who
will go to this year’s nominated
the Foundation is currently
Officer for the Qantas Group for
accepted his award on his behalf,
charity, The Chris O’Brien
formulating plans to raise
over 13 years, Steve enjoyed a long
along with his children Aaron,
Lifehouse – a not-for-profit,
further awareness about the
and illustrious career spanning
Beth and Emma. Steve’s loss is
independent comprehensive
work in the security domain,
the Royal Navy in the UK through
a great blow to the Australian
centre specialising in state-of-
which contributes to the security
to the Australian Federal Police.
security industry and he will be
the-art advanced treatment and
and wellbeing of millions of
sorely missed.
research for public and private
Australians.” n
Prior to his role with Qantas, Steve served with the Australian
The evening also saw the
patients who are suffering from
Federal Police where he undertook
awarding of numerous Save A
a range of significant assignments,
Life awards, bestowed upon
“The ASMF is very much
including acting as the lead
security personnel who have
about changing the perception
securitysolutionsmagazine.com
rare and complex cancer cases.
To find out more about the ASMF, please visit www. inspiringsecurity.com
SECURITY SOLUTIONS // 27
ALARMT
ARE YOU READY FOR THE YEAR AHEAD IN SECURITY? NEIL CAMPBELL, DIRECTOR OF GLOBAL SECURITY SOLUTIONS AT TELSTRA, SHARES HIS INSIGHTS INTO THE NEXT YEAR IN SECURITY.
28 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
It has been a big year for
Report was Telstra’s most
being able to resolve incidents
security, with outbreaks like
comprehensive, surveying
in a timely manner. We expect
the WannaCry ransomware,
more than 1,250 security
these two core challenges to
protecting this data is simply
NotPetya malware, as well as
professionals in 13 countries.
continue through the coming
understanding where it is. As
the Equifax hack dominating
What were its key findings?
year, as attacks increase
businesses move more of their
in sophistication.
data into the cloud, they cannot
headlines around the world and causing a stir in boardrooms. While awareness of the
Neil Campbell: The most interesting finding in our
Data Breaches (NDB) scheme. The first, crucial step to
think in terms of the old castle
Security Report this year was
What are the major attack
paradigm anymore: “If it is on
importance of security among
that 60 percent of respondents
types targeting Australian
the inside of my network it is
decision makers has never
had suffered a business-
businesses and how can they
safe, if it is on the outside it is
been higher, the Telstra
interrupting security incident in
keep their data secure?
not safe”.
Security Report 2018 found
the last 12 months, and that is
that businesses are still
quite significant because when
Business Email Compromise
their customers’ data are stored
having difficulty addressing
you think about a business
(BEC) and other phishing attacks,
in multiple places, both on
today’s security challenges
interruption, that means lost
together with ransomware, were
premises and off premises, they
and effectively preparing for
wages, lost productivity and
the most common threats to
have to adapt their thinking
the future.
lost opportunity. Not many
Australian businesses.
about data security, they have to
During a recent interview,
businesses can sustain an
Neil Campbell: In 2017,
We are also seeing more and
Now that their data and
adapt the controls that they use,
Neil Campbell, Telstra’s Director
interruption for multiple days
more it is also about the loss of
and they have to get a lot better
of Global Security Solutions,
without a huge impact on
the data that the businesses hold.
at having those security controls
spoke about the state of security
their viability.
Not just data about the business,
follow the data to wherever it
so things like intellectual
is needed.
in 2018, the Telstra Security
Additionally, 77 percent of
Report’s key findings and what
respondents suspected that
property, but in particular data
Australian businesses can expect
they had an incident in the
about their customers, which
a company to work out where
in the year ahead.
last 12 months but could not
is now under greater scrutiny
its critical information is that it
prove it. This speaks to the
through new legislation such as
needs to protect, and therefore
Prompted by what can only be
difficulty Australian businesses
the European Union’s General
difficult to allocate the resources
described as a turbulent year
are experiencing in rapidly
Data Protection regulation
to do so and I see this being an
in security, this year’s Security
identifying threats, and then
(GDPR) and Australia’s Notifiable
ongoing challenge.
securitysolutionsmagazine.com
It can be very difficult for
SECURITY SOLUTIONS // 29
ALARMT
In a world of increasingly
How will new legislation, such
requirements. Over the next year,
sophisticated attacks
as the GDPR and NDB, change
businesses should try and find
attempts to log on to an account in
targeting non-technical
the way businesses think about
overlaps in reporting to make it
a building in Melbourne, we would
staff, how can businesses
security in the coming year?
more efficient.
be able to check and see if that
best promote organisational
Neil Campbell: The NDB
So, for instance, if somebody
person had entered that building.
security awareness?
amendment to the Privacy Act
Another key trend identified
It is that kind of use case that is
Neil Campbell:
requires that businesses report
in the Security Report is the
driving convergence.
Cybersecurity is an ever-
both to the affected customers and
ongoing convergence of cyber
evolving field. New attacks
to the Privacy Commissioner on
and electronic security. Why
The emergence of Internet of
are created, new defences
any situation where they believe
are these two fields converging
Things (IoT) has been one of
must be created to counter
that a person’s information has
and what are the benefits for
the key stories in security over
them. One trend that remains
been accessed unlawfully by a
businesses that embrace the
the last few years. How can
consistent is the exploitation of
third party. The General Data
converged approach?
organisations adopting these
people. When we think about
Protection Regulation imposes
the two major findings from
even broader requirements.
the Telstra Security Report,
That is significant because
Neil Campbell: Security convergence is an interesting topic. What we are talking about
devices ensure that they are not a security liability? Neil Campbell: One of the
they were the rise of business
previously it was up to the
is bringing together the traditional
challenges with IoT devices is that
email compromise and the rise
organisation as to whether or
physical security world – alarms,
the firmware they are shipped with
of ransomware.
not they communicated a data
door access and CCTV – with the
is often the firmware they have for
breach. Now it is law, and what
cybersecurity world, and those
life. So, whatever vulnerabilities
tricking people into clicking on
that means is we will see a
two disciplines grew up in very
are present, and whatever
links. We will see that grow over
marked increase in the media
different ways over very different
vulnerabilities are subsequently
the following years, because
of announcements of hacking
time frames. What we are seeing
discovered, they are vulnerable
as technology gets better and
incidents, of access of personally
in the market is a trend toward
too for the life of the device. In
better, criminals will rely more
identifiable information, which
bringing those two disciplines
the world of cybersecurity, we are
and more on individuals and
will bring with it a lot more
together so that you can get a
used to dealing with that and we
their security awareness as a
consternation I think in the
much better visibility across your
patch regularly.
form of attack.
community. This means a lot more
entire security estate.
Both of those attacks rely on
One thing you can do in
inspection, but most beneficially
your organisation to help with
a lot more rigour in the way that
in Australia for security
this is make sure that you have
organisations protect personally
convergence. One reason is cost
a strong security education
identifiable information.
effectiveness, and the other reason
program that addresses both
In addition to the actual
There is a huge enthusiasm
In the world of IoT, we are not so sophisticated yet, but we will get there. n This article was prepared and
is that one and one equals three
originally published by Telstra
physical and cybersecurity, and
protection of data, this new
in this case – bringing together
IN:SIGHT, an online publication
also run cybersecurity drills
legislation will require companies
what were disparate disciplines
delivering business leaders the
and run tests. Do not single out
to spend more time dealing
means that you get a total view
trends, opinion and analysis that
individuals, but look for major
with compliance, whether it is
of security which creates a much
enables them to thrive through
change in security culture
new policies and procedures or
greater level of visibility for
technology. For more articles like
over time.
increasingly complex reporting
the organisation.
this, visit insight.telstra.com
30 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Some cheap solutions can end up being the most expensive. STENTOFON offer fully monitored IP communications solutions made to the highest standards from premium components and materials to ensure unparalleled performance in the most demanding conditions. When you need secure, safe, reliable communications that can integrate into existing systems and grow with your future needs, look no further than STENTOFON.
whencommunicationiscritical
www.stentofon.com.au
OPERATIONS
STRESS REACTIONS
NORMAL RESPONSES TO ABNORMAL SITUATIONS BY RICHARD KAY
Situations involving tactical response options are stressful. Everyone involved will be experiencing the effects of stress, though the reactions will vary from person to person. Stress reactions can occur during and after the event, either as ‘after shocks’ or in situations that trigger memories of the event. Fear and pain are positive instincts designed to assist us to survive. Pain tells us that something is wrong in our bodies; however, we can feel pain without ‘suffering’ – the negative mental state we create in response to pain. Likewise, fear is an instinctive wakeup call that we are in severe danger, a positive message that can spur us to incredible acts of strength, speed and determination to survive.
32 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Worry, the negative emotion, is
wounds during the confrontation,
specific sounds are tuned out
the eyes and ‘turn on’ the ears
the fear we manufacture, and it
these may start bleeding due
under high stress, then there is a
as it focuses on salient stimulus,
serves us no good at all. Worry
to vasodilation.
form of auditory ‘blink’ in which
which in the dark is sound.
loud noises are physically and
Sometimes the brain transitions
will not bring solutions, but it is more likely to distract us from
Loss of Near Vision
mechanically muted or silenced
back and forth between visual
finding solutions.
In a heart-pounding situation,
for a brief moment. There is not
and audio, depending on which
the loss of fine motor skills and
even the usual ringing in the ears
sense it feels it needs the most at a
to our physical and psychological
near vision makes it mandatory
afterward. This auditory blink
given moment.
makeup to protect us, but we
to drill those things that seem
can be roughly broken down into
can adopt strategies to adapt to
simple when you are calm and
three types:
Sensory Exclusion
it. Understanding how the body
collected. With loss of near vision,
• One response, which appears
Often, officers are not immediately
and mind change under stress is
officers may not be able to see
to happen at lower levels of
aware of injuries sustained during
critical for correct preparation
their firearm sights. Rather than
arousal (Condition Yellow)
a violent confrontation, because
to survive and thrive in the toxic
focus exclusively on aimed or
is to soften or shut down the
during the stressful event the
environment that is violence.
reactive shooting, the best solution
sounds of your shots (which,
sense of pain is shut down. It is
is to probably use a combination
at some level, are anticipated),
not until after the event and when
Vasoconstriction/ Vasodilation
of both. When you have time and
while the sounds of someone
the stress and adrenaline have
distance, use the sights, but at
shooting next to you can
subsided that the pain threshold
Vasoconstriction is when the
extreme close ranges there may
be deafening.
lowers and you experience the
blood vessels constrict or narrow.
be value in reactive shooting. Use
This can occur in response to
breathing to control heart rate and
seems to occur under extreme
physical stressors, such as cold,
maintain vision. Use the acronym
stress situations (Condition
Sensory Overload
which cause the capillaries in
BRASS: breathe, relax, aim,
Black), is to shut out all sounds
If the brain receives too much
your fingers and toes to constrict
sight, squeeze.
so that you do not remember
input from too many stimuli
hearing anything afterward.
at the same time, it can cause
The stress response is built in
so you do not lose heat through
• Another response, which
trauma received.
your extremities. The end result is
Auditory Exclusion
The greater the stress, the
sensory overload. When all five
your skin turns white as the blood
Our brains must constantly
more powerful this effect.
senses simultaneously send an
retreats towards the body’s core.
tune out sensory data or be
This is not an aural blink, but
emergency message to the brain,
It can also occur under stress. At
overwhelmed. In extreme stress
rather the auditory equivalent
the overloaded brain responds
low levels of vasoconstriction,
situations, this screening process
of squeezing your eyes shut
with ‘tilt, reboot’. This is the
only the little capillaries shut
can be even more intense, as we
until the threat goes away. This
concept behind diversionary
down, causing some loss of fine
tune out all senses except those
is associated with exceptional
devices such as a flashbang.
motor skills. As vasoconstriction
needed for survival. Usually that
stress, extreme heart rates and
Officers that carry a firearm
becomes more intense, blood flow
one sense is vision, but in low-
intense physiological arousal.
also possess a flashbang… when
to the complex motor muscles
light conditions the ears can turn
begins to shut down. The blood
‘on’ and the eyes turn ‘off’, as the
probably the most common,
and goes bang. Firearms are a
pools in the body’s core and large
combatants hear the gunshot but
occurs when you shut out
psychologically daunting device.
muscle groups, causing your blood
tune out the less salient muzzle
all gunshots, but you hear
In a violent confrontation, if
pressure to increase. The outer
flashes. Most of auditory exclusion
everything else. This appears
the subject fires first, the officer
layer of your body becomes almost
(like tunnel vision) is a matter
to be a Condition Red response,
begins the engagement on the
a layer of armour and, as long
of cortical perception. The ears
in which your body is capable
receiving end of a flashbang.
as an artery is not hit, you can
still hear and the eyes still see,
of biomechanically shutting
Proper mindset and realistic
take extensive damage without
but as it focuses on the survival
down your ear in a millisecond
training to develop autopilot
much blood loss. This appears
mission, the cortex of the brain is
in response to the leading
responses can help overcome
to be a survival mechanism
screening out awareness of what
edge of the shock wave of a
this problem.
intended to limit blood loss in
it deems insignificant to the goal,
gunshot, and then reopening
a combat situation. The price,
and the goal is survival. Research
immediately so you hear
Tunnel Vision
however, is a loss of motor control,
indicates that the ear can also
everything else around you.
Tunnel vision is sometimes
because when the muscles stop
physically shut out loud sounds,
getting blood, they stop working.
just as the eyelid can shut out
Intensified Sounds
narrowing. Under extreme stress,
Eventually, there is a backlash,
bright lights. It would appear that
Whilst many officers experience
such as occurs in a shooting, the
called vasodilation, where the
this biomechanical shut down in
diminished sound under stress,
area of visual focus narrows as
veins go wide open and often the
the ear can occur in a millisecond
some report having intensified
if you were viewing the situation
hands and face go red as the blood
in response to sudden, loud
sound. This most often occurs
through a tube. Tunnel vision,
flows back to the extremities.
noises. First, there is a form of
in low-light conditions, where
along with auditory exclusion
If the officer has sustained
auditory ‘tunnel vision’ in which
the brain chooses to ‘shut down’
and a host of other perceptual
securitysolutionsmagazine.com
• A third response, which is
you press the trigger, it flashes
referred to as perceptual
SECURITY SOLUTIONS // 33
OPERATIONS
distortions, is commonly
comes with baggage. It often
during violent encounters, but no
represent a powerful Condition
associated with the high levels
happens in Condition Black and
one has warned them that it might
Black response, indicative of
of anxiety normally present in
is accompanied by an extremely
happen. Suddenly, they cannot
extreme high levels of arousal,
everyone involved in a violent
elevated heart rate and loss of fine
move their legs and they panic.
that may predispose someone
confrontation. In most cases, the
and complex motor control.
They think they are paralysed.
toward a post-traumatic response.
subject. To take advantage of his
Scared Speechless Speech is a fine motor skill, and
Intrusive/Distracting Thoughts
Memory Loss
visual distortion, sidestep quickly so that you, in effect, disappear
the voice is one of the first places
Many officers in violent
in deadly force encounters
from his view. To visually
to observe stress in most people.
encounters had thoughts
experienced significant chunks
reacquire you, the subject has to
This appears to happen as a result
that were truly intrusive and
of memory loss from their event.
blink, draw back and move his
of the vasoconstriction effects of
distracting during their shootings.
It is common for there to be
head in your direction. This can
Condition Red shutting down the
Often, the intrusive thoughts were
some degree of memory loss in
buy critical moments. Officers
fine-motor control of the larynx.
bizarre. In the heat of battle, many
a deadly encounter, especially
can break out of tunnel vision
Unless officers have been properly
officers think of their family.
when the heart rate reaches the
by scanning and breathing after
trained, it is quite easy for them to
These intrusive thoughts are not
realm of Condition Black. This is
discharging the firearm. If officers
experience a profound breakdown
always distracting; sometimes
a phenomenon termed critical
are trained to scan and breathe on
of speaking ability and, in
they can serve as an inspiration or
incident amnesia. Interestingly,
the range every time after every
Condition Black, may literally be
motivation. It is useful for officers
if officers fire only one to two
engagement, the procedure soon
scared speechless when operating
to develop positive self-talk, the
shots, they usually remember
becomes a valuable and automatic
at extreme levels of stress.
most important of which is, ‘I will
the number. But as the number
conditioned response.
However, officers can partially
survive and keep going, no matter
increases, there is a tendency to
transcend these limitations
what’. These are the kind of
forget how many they shot, or
Visual Clarity
through training. Like most fine-
intrusive thoughts that you must
they underestimate the number.
Scientific research and volumes
motor skills, pre-rehearsal of what
program into your mind to survive
It is common within the first 24
of anecdotal evidence indicate
to say ahead of time increases
in combat.
hours to recall roughly 30 percent
that in many shooting situations
the likelihood that the skill will
there is a sudden visual clarity,
exist at the moment of truth
Dissociation
48 hours and 75–95 percent after
an incredible moment when the
when operating in Condition Red.
During high-threat situations,
72–100 hours. This is why it is
body dedicates all its resources
Officers are trained to verbalise
officers may experience a strange
important to interview officers of
to get maximum value out of the
repetitively in a variety of training
sense of detachment, as if the
a critical incident again after they
eyes. Like many combat stress
scenarios typical of what they
event were a dream, or they
have gotten one or more nights of
responses, the visual clarity
encounter on the job. It is because
were looking at themselves from
quality sleep.
effect can make it possible for
they train to use verbal commands
outside their body, going from that
the human body to do things that
in high-stress situations that
moment of intense awareness of
Memory Distortion
we previously would not have
they are able to use them when
fear, to feeling almost nothing as
When under great stress, officers
believed possible.
needed. Drilling specific verbal
they focus only on staying alive.
may envision their worst fear
commands dramatically increases
Afterward, when they snap back
and they see it so clearly in their
Slow-Motion Time
the likelihood that at the moment
to reality, it will seem as if the
mind that they are absolutely
There are numerous case studies
of truth those commands will be
event took place in the Twilight
convinced it really happened.
of officers who found slow-
available under stress.
Zone. Even hours later, they may
Sometimes people remember
have difficulty accepting that it
what actually happened,
same thing is happening to the
motion time so powerful that they
Nearly half of all officers involved
of the occurrence, 50 percent after
were able to see bullets pass by
Temporary Paralysis
happened, as if some part of them
and what they envisioned as
them. On several occasions, they
This paralysis, sometimes referred
is still in denial that it could really
happening, creating what is
were able to validate what they
to as freezing, is a phenomenon
happen to them. However, initial
referred to as a ‘parallel worlds’
perceived by pointing to where
that is clearly not a survival
conclusions from stress studies of
effect. Children are not usually
the rounds had hit. They were not
mechanism. Freezing does happen
soldiers indicate that dissociation
good witnesses, so great caution
implying that bullets moved by
sometimes in combat but, in
may be associated with less
must be exercised when there
them at a crawling pace; what they
some cases, we know that those
effective performance in combat
is no other choice but to use
meant was that the rounds passed
who think they are experiencing
and a predisposition to post-
them. Until a child is about nine
by the same way that low velocity
temporary paralysis are actually
traumatic stress disorder (PTSD)
years old, they are incredibly
non-lethal training ammunition
experiencing slow-motion time.
after combat. Data indicates that
suggestible; there is only a small
(NLTA) can be seen going past.
The problem is that there are
dissociation and slow-motion time
difference between the real
While slow-motion time can be a
officers experiencing temporary
often occur together in combat
world and fantasy. Is it so hard
survival mechanism, it frequently
paralysis and slow-motion time
situations, and that they may
to believe that the mind of a
34 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
frightened adult might, under
just a few feet, a 1/8” variance
Officers should accept in
great stress, be just as malleable
in the barrel of a firearm can
advance that they will feel fear,
as a child’s? In combat situations,
make the difference between a
but they can still perform during
people often envision possibilities
hit and a miss. We need precision
stress situations. Recognise
and sometimes those possibilities
control. The rule is do not fire
stress reactions and consciously
become reality in their minds.
any faster than you can hit the
adapt to these rather than fight
And seldom do they envision
target. But there is a tendency,
against them; consciously slow
positive things occurring when
upon occasion, for officers to
down and resist the urge to
people are trying to kill them
fire faster than they can hit.
rush. The best option to control
As you adopt strategies, they
and others.
When in a deadly struggle, it is
the adverse effects of stress is
should be tested under stress to see
not uncommon for an officer to
tactical breathing, which reduces
if they will work under realistic
Perseveration
fire as fast and long as he can
the heart rate, and once heart
conditions similar to those you
A normal, rational human
until the target goes away. The
rate lowers the stress response
will face on the job. If you do not
being will make rational, logical
solution to increasing the hit rate
diminishes, motor skills can be
train this way, chances are you will
decisions, taking into account
with fewer rounds fired is force-
employed more effectively and
not be prepared for the reality of
various factors and examining
on-force training that provides
rational thinking becomes easier.
a violent confrontation. Personal
different possibilities. Under
stress inoculation with marking
stress, the midbrain takes over
capsules. There is solid evidence
to instinct. To overcome adverse
The important thing to remember
and people can get trapped in
to believe that the problem of
reactions, realistic, appropriate
is that these are normal reactions
an endless ‘do-loop’, repeating
multiple shots with few hits is
and regular training combined
experienced by everybody. n
actions over and over. This is
partly the result of a fear-induced
with proper attitude and
called tactical fixation. We fixate
stress response. The solution,
awareness is essential. Strategies
on the current action and do not
therefore, is to inoculate against
for operating effectively under
certified tactical instructor-trainer,
consider other possibilities. This
the stressor to prevent or reduce
stress include:
Director and Senior Trainer of
is probably a survival mechanism
the fear. There is a powerful
• control breathing
Modern Combatives, a provider of
left over from our prehistoric
obligation to participate in this
• keep responses simple
operational safety training for the
ancestors. Today, we use
type of realistic training.
• understand the physiological
public safety sector. Visit www.
precision instruments in violent engagements. At a distance of
securitysolutionsmagazine.com
So, what can you do about stress?
Under stress, the brain resorts
• assess before acting or reacting • avoid sleep deprivation behaviour • have realistic expectations of operational risk • inoculate against stress – train for reality
safety is personal responsibility.
Richard Kay is an internationally
and psychological effects of
moderncombatives.com.au for
stress
more information.
SECURITY SOLUTIONS // 35
10 BUSINESS
Tips That You Will Not Find In The Help Pages
BY JANE ANDERSON
36 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
The community of security
of their target audience. It really
a Google search! It will also
professionals now using LinkedIn
does only take a short amount
make you easy to recognise
across the globe as a means of
of time to ensure your profile is
at face-to-face events, making
connecting and communicating
working effectively. The benefits
it easier for people to come
is huge. In fact, it has become
to your business and brand
and chat to you because they
the number one social media
are significant.
remember your face. Also,
communications tool for the
The key is for your profile to contain a mixture of technical
you do. If you want to be seen
that end, we thought we should
expertise and some dynamic
as a credible expert, make sure
take a look at ways to maximise
front-end magic. This will really
the effectiveness of your
help you stand out against your
LinkedIn communications.
competitors. In order to do
an opinion; share your
this, you need to focus on both
knowledge, insights and
articles these days on improving
the back-end and front-end of
articles if you read something
your LinkedIn profile, but as a
your profile, so that it not only
of interest. It keeps you
career and LinkedIn coach who
looks great, but it also functions
current, fresh and memorable,
has one of the top one percent
correctly. This will ensure
and others are likely to think
viewed LinkedIn profiles, I still
that your business shows up
more highly of you based on
find the majority of people and
in those all-important search
your interests. If you have a
businesses are not taking the
results and contains appealing,
business blog then post this
time to ensure their profile stands
consistent messages.
as well. This is a great way
There are literally hundreds of
out and captures the attention
One of the best ways to do
your image reflects this. 2. Thought leadership. Have
to share fresh content and it
this is to start using LinkedIn
will also improve your search
as more of a personal branding
engine rankings. Blogs are
tool. In other words, make
great for engaging with your
sure you highlight what skills,
customers, while generating
qualifications and tasks that you
valuable leads for your
are willing to undertake for a fee. Based on other’s perception
sales team. 3. Join groups that reflect the
of your asset base of skills,
level you are operating.
qualifications and experience,
Some great groups include
you will then influence your
Australian Institute of
networks, your brand and your
Management, Harvard
perceived value.
Business Review, Wall Street
In my top 10 tips below, I have
Journal, TED, The Executive
included a range of personal
Connection, Australian
branding and technical tips in
Institute of Company Directors,
order to be perceived as a top
Women on Boards and
value business. By using these tips, you will be sending a clear
Executive Women. 4. Use media plugins. A great
message about who you are and
tool for any business is to
what you stand for. You will
have a two-minute video of an
attract more people like you or
interview with them. People
people who you want to connect
want to get a sense of who you
with who operate at your level,
are and your personality, so
and remember their networks get
share it with a video plugging
to know you too.
into your summary and make
1. Have a professional photo
it easy. There are some great
taken. Nowadays there are
agencies around who will film
so many great photographers
it for you. You do not have to
who have included headshot
be perfect. Natural “umms”
photography into their
and “aaahs” are okay, but have
business. It is a great way to
it professionally filmed and
look your best and remember, a first impression could be
securitysolutionsmagazine.com
make your image reflect what
private security industry. To
edited with good lighting. 5. Treat it as a marketing
SECURITY SOLUTIONS // 37
BUSINESS
“Treat your page like your business website and highlight what you can do to help other people and what other customers have said about you.” document. Write your profile
8. Ensure your title reflects
qualified with a wide
repackage your keywords
with purpose rather than a
the keywords that you want
variety of local and
and double your search
eulogy of your past jobs. Keep
to be found for. If your
international experience.”
in mind the clients you want
title is Director of Pickwick
These tasks also need to be
to attract in the future and
Associates, the likelihood of
the keywords you want to
others. This might seem
not what you have done in
someone trying to find you
be found for.
simple, but I see a lot of
the past.
is very low. Ensure your
6. Keywords and key skills.
• 2nd Paragraph: “Some of
engine optimisation. 10. Proactively connect with
profiles of clients who do
title reflects what you do.
our clients include…” If
not connect with anybody.
Regularly check on the
For example, if you are the
these brands elevate your
Research tells us that your
keywords that are being most
Director of Pickwick Associates
brand then list them here.
search results will start to kick
sought after and ensure those
but you are actually an IT
Ensure you put the most
in at about 120 connections.
words are in your profile. You
Director, ensure your title is IT
important information to
Also, you will only turn up in
can do this by checking on
Director, Sydney.
the top of the page.
search results where you are a
the www.linkedin.com/skills
9. Write a BOOM summary.
• 3rd Paragraph: “What
1st, 2nd or 3rd connection.
page. For example, Enterprise
This means it meets the
some of our clients have
In conclusion, treat your page
Architecture searches have
blend of keywords and of
said…” This is a great
like your business website and
currently increased by one
your brand. This section
spot to put your best
highlight what you can do to help
percent in the last year.
is limited to only 2,500
quote from a testimonial
other people and what other
However, the skill Enterprise
characters so I recommend the
or recommendation.
customers have said about you.
Governance is up 10 percent. It
following layout:
• 4th Paragraph: “Career
Then watch the benefits to your
is important to cover all bases
• 1st Paragraph: This is your
achievements include…”
business roll in. n
and the good news is that you
LinkedIn elevator speech
List your top three to five
can use up to 51 key skills.
and should cover your title,
achievements. How did you
years of experience and
help your clients? What
professional and experienced
The best way to get a
what you want to be doing.
goals did you achieve? Did
certified career and business
recommendation is to give
For example: “Professional
you increase turnover,
coach. She also assists businesses
one! For every 10 people you
IT Director with over
increase efficiency? Make
and individuals to explore their
ask, you normally get five
25 years of experience
sure there are numbers
personal brand and get the best
back, so do not feel nervous
in consulting, business
here that quantify what
out of their LinkedIn profile.
about asking. Also, if you
analysis, and enterprise
you are saying.
She is the author of How to use
can, ask for keywords to be
and solutions architecture
included in recommendations.
within which process
can help you…” or “Key
purposes. Jane is also a successful
If you have written references
improvement, performance
specialities…” Again,
speaker and runs regular
from people who are not on
management and business
these should be based on
LinkedIn workshops. More
LinkedIn, you can still add
process. Ability to liaise
the keywords someone
details can be found at http://
them as quotes into your
with internal and external
would be searching for
insideoutcoach.com.au/ or http://
employment history.
stakeholders. Tertiary
and it is a great way to
jane-anderson.com.au/
7. Ask for recommendations.
38 // SECURITY SOLUTIONS
• 5th Paragraph: “How I
Jane Anderson is a
your LinkedIn profile for career
securitysolutionsmagazine.com
COVER STORY
THE CHALLENGES OF ACHIEVING A CYBERSAFE SURVEILLANCE SYSTEM BY LUKE FROST
In recent times, the
modern world of IoT, where data
particular settings and base their
vendor, or even a pool of trusted
hyperconnected world of the
is constantly being transmitted
purchasing decision accordingly.
vendors, whose products will
Internet of Things (IoT) and smart
between IP-enabled devices, there
However, there are steps that a
cover a range of deployment
devices has produced a massive
are a host of new vulnerabilities
company or government body can
scenarios. It is also equally
shift in the way we think about
that simply did not exist in older
take to counter these concerns,
important to ensure that the
security – not just the security of
analogue security systems.
regardless of whether or not they
product is what it claims to be.
are founded.
There are numerous instances
a building or public space, but the
The risks from cyberthreats
security surrounding the devices
are increasing as criminals and
Firstly, know where the
themselves and the network that
dark forces posture to find new
components of a network come
country which, on the surface,
sits behind those devices. Whereas
attack vectors and looking for a
from. This may sound obvious,
look like they are the product of a
a surveillance solution was once
back-door entry to networked
but it is not always apparent that a
manufacturer when in fact they
a tool simply used to monitor
surveillance cameras is just one
device has been manufactured in
are not. If in doubt, always contact
and record an area, today’s IP-
of many ways that this virtual
a potentially risky environment.
the manufacturer and check the
enabled cameras, coupled with
jousting between vendors and
Companies can be quite evasive
serial numbers of the product
sophisticated video management
criminals plays out. Service
about where a camera is
in question.
software (VMS), are capable of
providers, resellers and end-
physically manufactured, often
exponentially more. However,
users need to be conscious of
calling on the credentials of where
from cyberthreats, another critical
these added layers of capability
the risk involved in all security
the parent company is based to
aspect is ensuring that any back-
give rise to added complexity, not
systems, including surveillance
lend the brand credibility.
end management system that will
the least of which is cybersecurity.
deployments, and should know
The question being asked by
that the component pieces of their
are sometimes described as
has a track record in countering
many people, including end-
security network are from reliable
being engineered in a particular
cybersafety issues. A robust
users and security professionals
and trusted sources, for whom
country such as Germany or
VMS coupled with cameras
is how safe are the cameras that
cyber defences are top of mind.
Scandinavia, for example, which
that are from a trusted source
are renowned for engineering
that have been through a rigid
media serve to highlight that there
prowess. However, while that
quality control process from a
is enough evidence to suggest that
may indeed be where the device
manufacturing and engineering
which runs deeper than simply
cybersafety is a major concern
was engineered, it is actually
aspect are more likely to provide
questioning the cybersafety of
across all levels of a surveillance
manufactured elsewhere in
an end-to-end solution that is
the cameras themselves. Can
network and exposing an
the world. This rule applies
more secure from cyberattacks.
a camera be used to spy on
organisation or even the country
to cameras, servers, switches,
Another important factor
the very people it purports to
to risk from cybercriminals or
media converters – anything
in developing a secure security
protect? Technically, yes. Can it
even foreign powers is a serious
that is capable of processing and
infrastructure is ensuring that
be responsible for transmitting
issue – and one that will affect
transmitting data. It is useful to at
any cameras used are backed by
data to external parties such as
a decision maker’s deployment
least check on the background of
an adequate level of support. For
a foreign government? Again,
choices. The fact remains that
a company, rather than reading
example, does the manufacturer
technically it can. But then, so
resellers, service providers and
the marketing brochures and
regularly test for newly
can many other components of a
end-users are going to question
assuming they are being upfront.
discovered vulnerabilities and
supposedly secure network. In the
the use of certain cameras in
It is important to find a trusted
exploited firmware and update
are, in essence, deployed to keep us secure. It is a fair question, and one
40 // SECURITY SOLUTIONS
Recent reports in mainstream
Cameras from some vendors
of ‘grey imports’ coming into the
In developing a system safe
be used is well established and
securitysolutionsmagazine.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 41
COVER STORY
their firmware accordingly?
and upgrades in an effort to ward
manufacturing to include business
as there are many well-known
Furthermore, how are those
off the constantly evolving threat
development and support staff.
chip manufacturers, for example,
updates pushed out to end-users
of cyberattack.
This is essential, as any vendor
that support the highest quality
serious about cybersecurity
control standards. However,
and how often? When a camera
“As a company, we are
is new, it is, generally speaking,
acutely aware of the risk posed
should see being proactive
like any product, when a critical
protected by up-to-date firmware
by cyberattacks, especially in
in educating its partners and
component is outsourced, the
which guards against cyberattack.
the modern digital world of
soliciting feedback from end-users
parent company relinquishes
However, if that firmware is
hyperconnectivity,” states Wai
as critical to its long-term success.
control of its intellectual property
allowed to lapse, the camera might
King Wong, Country Manager at
become vulnerable to attack as
Axis Communications. “Long-term
users and the like are often the
some cases, introduce risk which
cybercriminals and other forces
firmware support is a critical
first people to discover issues
is not present when all intellectual
constantly manoeuvre to breach
part of building up trust that
that might lead to potential
property is kept in-house and
known defences. In situations
our cameras are protected, and
exploits or vulnerabilities in a
is as tightly controlled as the
where a camera’s firmware
safe from as many cyberthreats
camera or software. Therefore,
manufacturing and engineering
becomes out of date for security
as is manifestly possible. While
it is incumbent upon the
aspects of the product.
reasons as opposed to adding new
we acknowledge that nothing is
manufacturer to keep the lines
functionality, it is not uncommon
one-hundred percent secure, we
of communication open so that
themselves, any VMS should be
for the camera to still operate
need to commit to our customers
they can discuss and better
subject to the same stringent
as per normal. Unfortunately,
long term and assure them that
understand any issues and then
criteria in order to minimise
the old adage, “If it isn’t broken,
their hardware is up to date and
react accordingly.
risk. It is critical to base a video
don’t fix it”, lulls unwary or
as protected as possible.”
inexperienced administrators into
While quality manufacturing
Resellers, installers, end-
The more work that is done
to a third party which can, in
Beyond the cameras
management solution around a
in-house by a vendor when
VMS that has heritage, and one
thinking that the firmware is not
and engineering are obviously
designing, engineering and
that has a clearly defined strategy
in need of updating. However,
integral to developing a trusted
manufacturing all components of
and governance on cybersecurity.
just like the operating system on
solution, it is also important
a device, the lower the risk that it
a PC, cameras and other security
to ensure that any product is
might be vulnerable. This is not to
Protection Regulation (GDPR)
devices require constant vigilance
supported by a strong team, which
say that a company should never
rules form a strong basis for data
regarding the updating of patches
goes beyond software engineers to
outsource any of its production,
protection, so a GDPR-compliant
42 // SECURITY SOLUTIONS
The recent General Data
securitysolutionsmagazine.com
adopted into security solutions more frequently, the issue of data sovereignty will become more prevalent, which in turn is likely to lead to an even greater focus on cyber security. The general population will become increasingly aware that camera networks are able to recognise their facial features or their car’s number plate, and be conscious that the data is being recorded and transmitted from each camera they might see in any given network. The sanctity of that data will be under increasing scrutiny, and the integrity of the cameras, management platform and all other components of the system will be more closely appraised than ever before. Reporting on vulnerabilities needs to be a collaborative effort and requires vigilance across all levels of the system. Should a solution provider is a good start.
2. Hardening the surveillance
cybersecurity should seek to
vulnerability be detected, a strong
“There are stringent rules and
system components:
engage with other vendors, not
policy should enforce that it is
regulations associated with data
• harden the servers
just to sell products or collaborate
responded to within 48 hours and,
security, and it is very important
(physical and virtual)
on deployments together, but so
in the case of a critical vulnerability,
to leverage those to continue the
and client computers and
that they can work together to
an unscheduled service update
evolution of our cybersecurity
devices
build a trusted partnership, one
of the firmware may need to be
processes,” reports Jordan Cullis,
• harden the network
that considers all aspects of a
issued. Again, it is incumbent
Country Manager South Pacific at
• harden the cameras
deployment right through to the
upon all parties involved to have
integrity of its cyber defences.
clear guidelines for reporting and
Milestone Systems. A comprehensive hardening strategy evaluates all elements of a security solution, and
3. Documenting and maintaining security settings on each system. 4. Training and investing in
Ongoing testing of products
responding to a breach, and strong
will reduce risk as well, especially
communication on how to act if a
when looking at how they perform
response is required.
moves to continually assess and
people and skills, including the
in relation to other components
strengthen all components in
supply chain.
of a security system. For example,
surveillance solution should
Ultimately, an end-to-end
order to reduce risk. As Cullis
Customer and partner training is
testing how newly released
provide the consultant, end-user
points out, “Hardening is a
crucial to successful cybersecurity.
cameras will work on a VMS
and systems integrators with peace
continuous process of identifying
Any vendor whose platform
platform is important, as it will
of mind, knowing that the system
and understanding security risks,
integrates with other parts of a
allow both companies to identify
has been rigorously tested and
and taking appropriate steps
security solution should have a
any performance issues, as well
that both the physical hardware
to counter them. The process is
significant focus on employment
as establish that the device and
and back-end software work
dynamic because threats, and
best practices and teaching
the management suite will work
collaboratively to establish a secure,
the systems they target, are
people how to think in terms of
safely together, without any gaps
threat-averse network. While no
continuously evolving.”
security governance.
in either party’s cyber defences.
camera or management system is
A hardening strategy should
Clear channels of
The same goes for other
completely invulnerable, knowing
include steps such as:
communication between the
components of a surveillance
that the solution has a strong
1. Understanding the components
camera manufacturer and the
solution as well, and these days
pedigree in cyber protection and
to protect – evaluate every
VMS developer are integral
there are plenty of other elements
stringent rules in place to react to
part of a system or network,
to ensuring they work as a
to consider, such as facial and
the constantly evolving landscape
and map out strengths
team to counter threats. Any
licence plate recognition and data
of cyberthreats removes a lot of the
and weaknesses.
manufacturer committed to
analysis. As these components are
doubt. n
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 43
CCTV
42 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Smart Video Surveillance
DELIVER ACTIONABLE INSIGHTS BY CHRISTOPHER BERGEY
Security cameras represent a large
cases, it is about extracting value
global market driven primarily by
and intelligence from the video
the increased adoption of video
captured. This could include retail
surveillance systems for business
shopper behaviours, or managing
or public-sector intelligence and
a parking facility, or producing
rising threats associated with
manufactured products. Seeing
public safety. As such, surveillance
a drone flying through the air
cameras are now common in and
capturing images and video
around government buildings,
nowadays from a construction site
military posts, businesses, banks,
or farmland is no longer unusual.
transportation centres, casinos,
market is experiencing
historic landmarks, schools and
burgeoning growth and, as of
many more.
2016, it was valued at over US$30
Surveillance is not just about security any longer; in many
securitysolutionsmagazine.com
As such, the video surveillance
shopping centres, sports venues,
billion, with expectations of reaching US$75 billion in revenue
SECURITY SOLUTIONS // 43
CCTV
by 2022, at a compound annual
derived from Big Data to provide
gender and ages, in-store time
cameras at the network’s edge.
growth rate (CAGR) of 15.4 percent
immediate insights and forward-
spent, average spend and traffic
These edge-based cameras have
from 2017 to 2022. What has
looking predictions.
generated by the new kiosk.
a powerful computing element
• agricultural drone surveillance
changed in surveillance is not how
and capable storage device
data is captured, but how it can
These Fast Data examples include:
where analytics can be used to
implemented within that enables
be used to drive actions – not only
• parking space management
survey a farm and surrounding
local capture and analysis (where
as part of a Fast Data application
where analytics can be used
land, diagnose vegetation and
the data is generated and lives),
that analyses data as it is captured,
to determine peak hours of
crop health, determine possible
providing the valuable insights in
but also as part of a Big Data
operation, disabled parking
yields, track livestock and food
real time, without the effects of
application that analyses data when
use, areas of congestion,
consumption, as well as insect
network availability or latency.
required. It is no longer about
average parking durations and
and pest populations.
just storing data, but what can be done with it once captured that is
unmoved vehicles. • machine production analytics
• smart city scenarios where
Sample Use Case
analytics can be used to
Authorities are looking for a
fueling a new generation of ‘smart’
that can be used to determine
provide safety and evacuation
missing senior citizen with mental
video applications.
yields produced, failures
information, and can coordinate
incapacities who may need help.
that occurred or about to
with weather and traffic data
They believe he entered a store
What is Smart Video?
occur, machine issues and
to create the fastest evacuation
and left. In a Big Data application,
Smart video is about this shift from
inefficiencies, upcoming
routes out of a city.
someone would have to review
imagery to insights, from simply
maintenance and peak hours
The need to provide intelligent
tons of captured video, looking
collecting data for forensic and
of operation.
capabilities within video
backwards to find evidence of
surveillance, coupled with the
this lost soul in the store, and
backwards-viewing, to analysing
• customer retail buying
and understanding the context of
preferences where analytics can
development of cloud-based
possibly perform some additional
the data captured. It uses artificial
be used to determine how many
surveillance systems, has led to
analysis on the data to determine
intelligence (AI) and algorithms
people entered the store, their
the evolution of a smart breed of
his actions, identify the time he
44 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
content to the main server, which
Christopher Bergey is
the capacities, capabilities and
is expensive and dependent on
responsible for developing
applications of its products. These
network availability, but instead
and driving Western Digital’s
forward-looking statements are
use a combination that stores data
embedded storage solution
subject to risks and uncertainties
locally at the camera level, as well
strategies in the mobile and
that could cause actual results
as an edge gateway that enables
connected market segments,
to differ materially from those
video and data to be aggregated at
including smartphones and
expressed in the forward-looking
various distances from the edge,
tablets, automotive, industrial,
statements, including development
and back to the cloud where Big
connected home and other
challenges or delays, supply chain
entered or left the store, and take
Data content typically resides. A
connected, Internet of Things
and logistics issues, changes in
some action. In this example, Big
video surveillance system that
environments. Prior to joining
markets, demand, global economic
Data analysis is performed after the
uses edge cameras and this storage
Western Digital, Christopher
conditions and other risks and
event has occurred.
strategy will reap high system
served in senior management
uncertainties listed in Western
Utilising AI and algorithms
and service reliability, low total
and marketing roles for Luxtera,
Digital Corporation’s most recent
from Big Data, Fast Data responds
cost of ownership (TCO) and the
Broadcom, Multilink Technology
quarterly and annual reports
to events as they occur. Once the
ability to scale without adding
Corporation and Advanced Micro
filed with the Securities and
senior citizen enters the store, a
expensive recorders or servers to
Devices. He received his MBA
Exchange Commission, to which
Fast Data app can perform real-
the surveillance system.
degree from the University of
your attention is directed. Readers
Maryland and Bachelor degree
are cautioned not to place undue
time facial recognition from the video feed, comparing the senior’s
Final Thoughts
in Electrical and Computer
reliance on these forward-looking
face to a database library of facial
Fast Data applications for smart
Engineering from Drexel
statements and we undertake
signatures. If the facial signature is
video are endless and have only
University. Visit www.sandisk.
no obligation to update these
detected, the application can trigger
scratched the surface of real-world
com and www.wdc.com for
forward-looking statements
a security alert to help the senior
use. We amass and generate large
more information.
to reflect subsequent events
in distress and get him back to his
amounts of information from the
family safely.
increasing number of data points
Forward-Looking Statements:
captured by such edge devices as
This article may contain forward-
Corporation or its affiliates. All
The Data Storage Strategy
surveillance cameras. Applying
looking statements, including
rights reserved. Western Digital is
analytics to real-time captured
statements relating to expectations
a registered trademark of Western
As Big Data gets bigger and
data is driving new smart video
for Western Digital’s embedded
Digital Corporation or its affiliates
faster, and Fast Data gets faster
applications whose video streams
and integrated products, the
in the US and/or other countries.
and bigger, the storage strategy
extract value and intelligence that
market for these products,
All other marks are the property
is to not funnel all of the video
drive actionable insights. n
product development efforts, and
of their respective owners.
securitysolutionsmagazine.com
or circumstances. ©2018 Western Digital
SECURITY SOLUTIONS // 45
FEATURE
44 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Crime Prevention Through Environmental Design BY DR LEANNE MONCHUK AND DR GARNER CLANCEY
The manipulation of the built
Ensuring that residents feel a
design and concept stages (see
environment to reduce the
sense of attachment to space
www.securedbydesign.com for
opportunity for crime, disorder
helps to foster a willingness to
further information). Evaluations
and the fear of crime is referred
take control of the area. Physical
of the scheme demonstrate that
to as crime prevention through
security aims to ensure that robust
homes built to the SBD standard
environmental design (CPTED)
security measures (such as door
experience less crime and
(Crowe, 2000). CPTED is a
and window locks) are installed
disorder than those which are not
multi-disciplinary approach
on individual dwellings to
built to the standard (Armitage &
which draws upon key aspects
withstand attack from offenders.
Monchuk, 2011).
of environmental criminology,
Management and maintenance
architecture, planning and urban
relate to the importance of
reducing the opportunity for
design (Cozens, 2008). CPTED
ensuring that a development is
crime and disorder through the
is underpinned by a number
free from graďŹƒti, vandalism and
design and planning of the built
of principles: i) surveillance; ii)
litter. In doing so, it transmits
environment is documented
movement control; iii) defensible
signals to residents and visitors
in national policy (see, for
space; iv) physical security and v)
that the area is cared for.
example, Section 79c Guidelines
management and maintenance. Surveillance aims to ensure
securitysolutionsmagazine.com
Whilst the importance of
of the Environment Planning and CPTED depends for its
Assessment Act 1979 in New South
residents are able to observe the
realisation on a number of
Wales), there is little guidance to
areas surrounding their home
different agencies, notably the
state how it should be embedded
and their neighbourhood and
police, urban designers, planning
in practice. Undoubtedly, there is a
witness, challenge or report
authorities and developers. There
plethora of considerations during
any suspicious behaviour.
is no shortage of evidence that the
the design and planning stage of
Movement control aims to ensure
elements of CPTED are relevant
any development and CPTED is
that opportunities for access,
to the incidence of crime and an
merely one. However, research
egress and through movement
example of this is the findings
has highlighted that practitioners
are minimised to prevent
from evaluations of the Secured
responsible for reviewing
unauthorised access. Defensible
by Design (SBD) award scheme
development applications are
space refers to the clearly
in the UK. The scheme aims to
often frustrated that CPTED is
deďŹ ned ownership of space in a
encourage those involved in the
considered too late in the planning
neighbourhood and encourages
design of new developments to
process and that often this
and promotes residents to feel
design out crime by ensuring
consideration is merely tokenistic
a sense of responsibility for the
that the principles of CPTED
(Monchuk, 2016; Clancey et al,
areas adjacent to their home.
are considered throughout the
2018).
SECURITY SOLUTIONS // 45
FEATURE
We have conducted a number
requires engagement with key
developments in policy,
of research projects (both in the
stakeholders at the design/
UK and Australia) to examine the
concept stage to consider
process through which CPTED
how crime prevention can be
is a need for greater research
is applied and implemented.
seamlessly (and aesthetically)
within the field to establish a
Regardless of jurisdiction, key
embedded into the design of
dedicated evidence base to ensure
findings highlight a number of
new developments, whilst
that CPTED can improve and
areas that are frequently raised
addressing other key agendas.
evolve. The development of an
by practitioners tasked with the
• Understanding the local
practice and research. Finally, we believe that there
extensive suite of case studies
delivery and application of CPTED.
context is imperative. This can
is one way in which this can be
We believe that this connects to
be achieved by undertaking
achieved, as often developments
security practitioners and their
site visits, analysis of data
that have received CPTED
role in preparing security risk
(such as crime data) and
recommendations are rarely
assessments. Whilst the literature
consultation with key
revisited and systematically
states that CPTED is effective in
stakeholders (including
reviewed. Establishing a
reducing opportunities for crime
residents) familiar with the
comprehensive suite of case
and disorder, it is important
local area.
studies to regularly review and
to acknowledge: • Whilst the importance
• There is a lack of training
monitor developments over
provision for those
periods of time can help better
of considering CPTED is
implementing the principles
inform policy and practice and
documented in policy and
of CPTED. Current training
also identify training and CPD
guidance, a process is required
provision tends to be brief.
needs. n
to ensure that this is translated
Our research has identified
in practice and implemented
that the principles of CPTED
on the ground.
are applied inconsistently
references, email admin@
and that the terminology
interactivemediasolutions.com.au
• CPTED represents a multi-
For a full list of
Dr Leanne Monchuk is a
disciplinary approach to
used to describe CPTED
crime reduction and thus, it
varies significantly (Monchuk
senior lecturer in Criminology
must be a consideration for
et al, 2018). This needs to
& Policing at the University of
all the different stakeholders
be rectified.
Huddersfield (England). She can be
and agencies involved in the
• There is a need for the
design and planning process
provision of dedicated
hud.ac.uk or Twitter: @
(for example, urban designers,
professional training
LeanneMonchuk
planners, developers) as well
and ongoing continuing
as those with a specific crime
professional development
senior lecturer in Criminology at
prevention/security focus.
(CPD) to ensure that those
the University of Sydney. He can
practising CPTED do so
be contacted via email garner.
early in the design and
consistently, but also remain
clancey@sydney.edu.au or Twitter:
planning process. This
abreast of updates and
@GarnerClancey
• CPTED needs to be considered
46 // SECURITY SOLUTIONS
contacted via email l.y.monchuk@
Dr Garner Clancey is a
securitysolutionsmagazine.com
FEATURE
48 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
THE WORLD’S MOST PROTECTED ARTEFACTS BY LEON FOUCHE
From fine art to intricate jewels,
As well as this, the Guinness
returned a few hours later and the
of past vandalism attempts
we’ve acquired some precious
World Records has stated that the
painting had not been returned; it
(throwing stones, acid etc.). The
items over the years that come
painting has the highest known
had been stolen.
glass is reportedly almost two
with immense value and high
insurance valuation in history —
insurance costs. As heist movies
standing at $100 million in 1962.
entire week as investigations were
is held in a special sealed box
make their way back into our
However, the inflation rate takes
carried out. There were many now
that protects it from vibrations
cinemas — recently with the
this up to $821,746,666.67 in 2018,
famous-faces on the suspect list
and humidity. Public visitors are
Ocean’s reboot (Ocean’s 8) and
making it one of the most valuable
for the theft of this masterpiece,
separated from the piece by a
an epic sting scene in Marvel’s
items in the world.
including Guillaume Apollinaire
queue barrier, but that is only
and Pablo Picasso; but they were
one aspect of the state-of-the-art
both cleared of all charges.
security systems that the Louvre
Black Panther, you’re probably
The Mona Lisa was never
The Louvre closed for an
centimetres thick and the painting
wondering how we actually
delivered to its intended owner
protect these types of assets and
(and never signed by Da Vinci
keep those scenarios fictional.
himself) but was sold to King
Peruggia, was found two years
Francis I and supposedly entered
later when he attempted to sell the
of museum, there is 24-hour
security experts, we take
the Royal Collection in 1518.
painting to a museum in Florence.
surveillance of closed-circuit TV
a look at the world’s most
After the French Revolution,
It’s often described as one of the
cameras, access control systems
protected artefacts, the security
the painting was moved to the
greatest thefts in the 20th century,
and intruder-detection equipment
measures that are in place and
Louvre; what was thought to be a
as Peruggia stole the piece during
(including video analytics) to help
how these prevent any sort of
safe-haven for the piece — but it
working hours, hid in a broom
protect some of the finest pieces of
criminal activity.
wasn’t.
closet and waited until after hours
art in the world.
With the help of leading
In 1911, the painting was
The real thief, Vicenzo
has put in place. Covering 70,000 square meters
to walk out of the museum with
The Mona Lisa
stolen. However, it took a few
the painting positioned under his
Sweden’s Crown Jewels
The painting by Italian Renaissance
hours to realise so. French painter,
coat. However, the thief was only
You’d think that the protection
artist Leonardo Da Vinci was
Louis Béroud visited The Louvre
jailed for six months as it was
of the Crown Jewels in Sweden
crafted between 1503 and 1517
and found that the painting was
defined as an act of patriotism for
would follow suit of those
and is known as one of the most
missing — he asked the guards
Italy. The painting returned to its
in England, but the security
recognisable pieces of art in the
about its whereabouts and they
home in Paris.
measures that have been put
world. In fact, the piece itself is the
weren’t entirely sure and assumed
Now, the Mona Lisa attracts six
most known, most visited and most
that it was being photographed for
million visitors every year and sits
expectations. In August 2018, two
written about in modern times.
museum advertisements. Béroud
behind a bulletproof glass because
crowns and a royal orb which
securitysolutionsmagazine.com
in place do not live up to those
SECURITY SOLUTIONS // 49
FEATURE
belonged to King Charles IX of
for them — and no one wants
in 2012, people with the right
behalf of the Ministry of Defense.
Sweden and his wife Christina
to put themselves at risk of
credentials should only be able to
Additionally, these guards are
of Holstein-Gottorp were
being caught. As well as this,
enter certain areas of the palace.
accompanied by 38 Yeomen
stolen in what looked like an
they’re extremely valuable and
amateur heist.
the thieves would have to find
Warders, who are ex-military personnel who manage the large
the right buyers. The jewels are
The Crown Jewels of the United Kingdom
not always on public display at
made from the noblest metals
From the Imperial State Crown
are permanently present and live
Strangnas Cathedral though. The
and the gold value is worth
to the Sovereign’s Orb, the royal
in the tower itself.
gems were originally created as
around £43,000.
family has acquired many special
The 400-year-old jewels were
funeral pieces and were buried
But, this isn’t the first time
numbers of visitors. The Yeomen
The Crown Jewels are only
treasures over the centuries. With
used for special occasions, such
in the tomb with them but were
that royal jewels have been
23,578 delicate stones and over
as Coronation and State Opening
later unearthed. Although the
stolen in Sweden. In 2012, a
140 objects, putting an exact price
ceremonies, and can be only
theft was premediated, it was
19-year-old refugee claimed to
on the jewels has been difficult but
removed under the authority
extremely insufficient. Two men
be a friend of a member of the
estimates have been made stating
of the Lord Chamberlain who is
walked into the cathedral around
royal family and stole £73,700
that they are worth over £3bn.
the head of the Royal Household.
midday and smashed the glass
worth of jewels — but sold them
As well as this, it has also proven
However, when this type of
where the contents were held —
only for £730 to drug dealers
impossible to insure them because
activity occurs, armed police
causing alarms to go off around
for marijuana. As well as this,
of their immense value.
officers must be present. n
the building.
the thief also reportedly stole
The two men escaped from the crime scene by bicycles and then by a motorboat along Lake
Because of this, heightened
a £30,350 tiara and threw it off
security is required, and the
Sources:
a bridge.
collection is locked away in the
• www.thevintagenews.
Evidently, security is not at
Jewel House at the Tower of
com/2017/12/15/mona-lisa-wasstolen-in-1911-2
Malaren, entering Stockholm’s
its finest in Sweden. Although
London. Believe it or not, the
archipelago. However, one of
the stolen crown jewels from the
crown jewels are protected by
the thieves was soon tracked
cathedral were on public display,
bombproof glass and although the
down because of blood left at the
they weren’t properly protected,
tower is open to the public, they’re
• www.louvre.fr/en/security-officer
crime scene and the jewels were
and the thieves should have
watched by more than 100 hidden
• www.express.co.uk/news/
partly recovered.
been detected as they walked
CCTV cameras.
Although they intended to
in. With artefacts of immense
As well as this, the Tower of
steal the crown jewels, they
value situated in the building, the
London has its own 22-strong
would have been extremely
cathedral should be looking at
Tower Guard, which is a
hard to sell on the black market
installing walkthrough security
detachment of the British Army;
purely because government
door frames and regular visitor
who has a sole purpose of
authorities would be out looking
searches. In terms of the theft
protecting the Crown Jewels on
50 // SECURITY SOLUTIONS
• www.jerrysartarama.com/blog/ did-you-know-the-mona-lisa
world/999615/sweden-crownjewels-royal-swedish-policeheist-thieves-Stragnas-cathedral • www.mirror.co.uk/news/uknews/how-much-crown-jewelsworth-11855338 • en.wikipedia.org/wiki/Jewel_House
securitysolutionsmagazine.com
VIDEO DOESN’T HAVE TO BE EXPENSIVE TO BE EFFECTIVE
With years of experience across hundreds of clients, let us show you how we can help you generate more business than ever before. enquiries@interactivemediasolutions.com.au
AVIATION
52 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
DO WE NEED ANOTHER AVIATION SECURITY REVIEW? BY STEVE LAWSON
Between June and September
vulnerabilities, since insiders,
2005, the Rt Hon Sir John Wheeler
me included, tend to focus on
those areas of aviation security
PC DL JP KStJ undertook “an
areas that interest them or with
that are most vulnerable so
independent review of airport
which they are familiar. It is the
that resources and expenditure
security and policing for the
equivalent of the ‘you never see
could be most effectively
government of Australia” – that
what needs repairing in your own
applied. We thought that it was
was the last major external review
home’ syndrome.
counterproductive to continue
of aviation security in Australia.
to spend more and more money
I would respectfully suggest
familiar with what can and cannot
on aviation security unless it
that the Wheeler review was an
be exploited and you know the
was being spent wisely and
animal of its time; it engaged with
limitations of equipment and
addressing actual vulnerabilities.
industry rather than undertook
processes. I could walk through
Our proposal was that it would
tests to identify vulnerabilities.
any screening point in the world
be best to undertake the review
While I am not suggesting that
with a weapon. (I do not by the
at both a high level and at an
the recommendations of the
way, but I know I can.) I also know
operational level. At the high level,
review were not warranted, I
that it would be reasonably easy to
we proposed an oversight team
do hold a view about how they
destroy an aircraft at the boarding
that included:
were implemented, but that is for
gate and that most airports in
• Assistant Administrator for the
another article.
Australia do not have anything in
Office of Security Operations
place to stop the types of attacks
for the U.S. Transportation
security in the intervening 13
I can think of. (I am not going to
Security Administration
years, so it can be argued that
include here how to do that, you
(the person in charge of all
it is time for another external
will just have to take me on trust.)
review and perhaps one that
It is also less likely, but not
delves a little deeper than the
unfeasible, there is a threat from
Wheeler review.
industry insiders and attackers
A lot has happened in aviation
In the context of full disclosure,
securitysolutionsmagazine.com
More importantly, you are
Our proposal was to identify
are more likely to be from the
US airports) • Head of the Counter Terrorism Security Advisors (CTSAs) for the New Scotland Yard • National Security Adviser to
in July 2017 we contacted the
public. So, any review should look
the Prime Minister of Israel
then infrastructure minister
at what are attractive weapons or
and Head of Israel’s Counter
(among others) to propose an
systems to outsiders and where
external review that, unlike
they could use them to attack
the Wheeler review, had a very
aviation. The professional terrorist
for Ben Gurion Airport
strong operational focus. We
should not be forgotten, but again
• Head of Security for El Al
were not so much interested in
their view of what may be an easy
They were to be supported by
what the Government and local
way to attack aviation may be
equally eminent people from
aviation industry thought were
different from mine.
Australia’s aviation sector. It does
Terrorism Bureau • Security Operations Manager
SECURITY SOLUTIONS // 53
AVIATION
not matter how familiar you are
people in the high-level team were
that there are no major issues in
screening is among the best in the
with international aviation, there
giving us ‘mates rates’ (most have
Australian aviation security; in
world, but to be honest that is too
are nuances to local aviation, so
been friends for many years) and
fact, there are things that I think
obvious. Once the vulnerabilities
the local members would provide
as hard as it is to believe they are
are better here than elsewhere.
have been identified, the higher
the Australian operating context.
public servants in the truest sense,
For example, our Aviation Security
level panel can suggest changes
It was about a blue-ribbon group
they want to make a change for
Identification Card (ASIC) model
to legislation and regulations and
as you could get.
the better.
is probably the best in the world
where money and effort can be
and, as I have said earlier, I think
best spent to ensure Australian
For the operational part of
The answer we received from
the review, we proposed teams
the Federal Government was,
our screeners are among the best
aviation is not just secure, but
that would undertake a series
basically, thanks but we will
in the world. However, I do know
that it returns to being a leader in
of vulnerability tests. One team
undertake a review internally.
of vulnerabilities and I think that
the field. n
would undertake intelligence
At about this point, I expect
in the last decade or so as a sector,
gathering and the other
some readers may say that I
Australia has gone from being a
attempt to use the intelligence
am upset that our proposal
leader to a follower.
reports to exploit any identified
was not accepted; if I am to be
vulnerabilities. The teams we
honest, there is a little of that.
is to suggest that it is time to
with Qantas, Steve held a number
proposed using have conducted
However, this is not the greatest
undertake an external review of
of senior management roles
and do conduct similar exercises
disappointment we have had as
aviation security. After this article,
covering all aspects of aviation
in other parts of the world,
a business and if you graded my
I have no doubt that we would
security from policy development
including Europe and the US.
frustration, maybe 10 percent
be at the bottom of the list of
to airport operations. He was
You would expect that the
is disappointment that we did
organisations selected to undertake
sent to New York immediately
cost would be exorbitant, but we
not get the work, but 90 percent
such a review, but it needs to
following the 9/11 attacks to
thought we could undertake the
of my disappointment is that
be done by someone. Getting a
manage the Qantas response
review quite economically and, as
the Government thinks that
group like the one we proposed
and undertook a similar role
it turns out, our proposed budget
an internal review is at any
would be difficult, at the price we
following the 2002 Bali Bombings.
was just over half a percent of
level acceptable.
proposed probably impossible,
On his return to Australia, he
but something a little more than
was appointed Security Manager
the ‘injection’ that the Federal
I think a large part of the
So, the purpose of this article
Steve Lawson has over 20 years’ experience in aviation security. As a security executive
Government put into aviation
Government’s decision was based
the Wheeler review should
Freight for the Qantas Group. Since
security in that year’s budget.
on ‘what if they find something
be undertaken.
2007, he has been a director of
With respect to that injection, I do
wrong as a department?’ More
not have details of everywhere it
importantly, what if they find
be conducted in two parts.
with Bill Dent, a fellow former
is being spent, but I am not sure
that they have made errors
Firstly, a group should identify
Qantas security executive. Steve
that all of it is being spent in the
personally? Not so much the
vulnerabilities; not just, “I can
can be contacted via email
most effective areas.
minister, but those advising him.
get this through a screening
slawson@avsecconsulting.com or
point”; as I said earlier, Australian
on 0404685103.
I will confess that most of these
54 // SECURITY SOLUTIONS
Before I go further, I think
Most importantly, it should
AvSec Consulting in partnership
securitysolutionsmagazine.com
NEW!
ACCESS CONTROL
ELECTRONIC ACCESS CONTROL INTEGRATION IS THE FIRST STOP ON THE ROAD TO SMARTER BUILDINGS BY JIM DEARING
56 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
According to recent research by IHS Markit, one of the most influential tech analysis firms in the world today, electronic access control systems are the leading type of security system being integrated into building management system (BMS) platforms. In fact, 29.6 percent of access control equipment shipments – including readers, door controllers and electronic locks – were installed and connected to a BMS platform in 2017. Furthermore, unit shipments of access control equipment that is connected to a BMS platform are forecast to outpace the rest of the market by a considerable margin, increasing at a compound annual growth rate (CAGR) of 12.5 percent over the next five years. By comparison, total market unit shipments for access control equipment are forecast to rise at a CAGR of 8.8 percent.
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 57
ACCESS CONTROL
Our Analysis
allow access control providers
end-users to manage a
visualisation directly affect a
Partnering with BMS providers,
to protect themselves from this
wide variety of building
user’s experience with BMS
or developing proprietary
threat. However, outside the top
management functions via a
platforms, these tools have also
building management systems,
ten access control providers, few
single platform. As the process
become crucial differentiators
will become an important part of
companies possess the financial
is centralised and simplified,
for competing products in
access control providers’ product
resources and existing product
it can be completed using
roadmaps over the next five years.
portfolio to compete against the
fewer resources.
• Analytics – BMS platforms
This trend is especially relevant to
leading BMS market incumbents.
• Data visualisation –
offer automated testing,
providers aiming their solutions at
The primary reasons BMS
Accumulated data from
reporting and fault detection
platform integration is becoming
multiple domains can be
and preventative diagnostics
more popular are as follows:
categorised, structured and
functionality to end-users.
• Interoperability – BMS
presented to end-users in a
These offerings improve
will need to remain vigilant as
platforms are capable of
series of charts, graphs and
building security by ensuring
full command-and-control-style
aggregating significant
other visual tools designed to
all devices are working
BMS platforms become more
amounts of data from
easily communicate complex
optimally. They also allow
popular. Opting to develop a
equipment across many
information to viewers.
end-users to compare
proprietary solution would
domains, which allows
As dashboards and data
historical data and recalibrate
the enterprise segment. According to HIS Markit, leading access control providers
58 // SECURITY SOLUTIONS
the market.
securitysolutionsmagazine.com
exert ultimate authority, as the building’s intelligence and its analytics supersede orders from software in access control and other subordinate domains. However, access control suppliers are uncomfortable relinquishing this authority to third-party BMS platforms, because their software feature sets are what enables them to differentiate themselves from their competitors. Another barrier is the fact that end-users can often be slow to adapt to new technologies. During the past decade, the access control industry has struggled to bring security and IT departments together. Smart building integration would likely add a third entity into the mix: facility managers. Due to the slow speed at which large organisations often restructure, getting these three departments to effectively collaborate to leverage the true capability of full building integration is an issue that is unlikely to be resolved in the next five years. The information and statistics presented in this article are taken from the 2018 Smart Building Report by HIS Markit. individual subsystems to
platform regarding building
subsystems to respond to
This report examines the global
improve efficiency.
occupants’ whereabouts and how
individual occupants’ actions, the
market for the equipment and
they move through the building.
need for access control integration
BMS platforms installed in
grows exponentially. Physical
building projects and analyses
• Changes to the supplier base – Many leading security
BMS platform integration
manufacturers are investing
can allow the access control
access control systems and
significant trends, threats
heavily in developing their
authentication decision to become
identity management platforms
and opportunities for growth
wider building managing
smarter, by taking into account
are the key to initialising many
affecting this market through
portfolios, to ensure their
information from other connected
BMS processes, since they provide
2022. BMS platforms include
competitive advantages are not
security or building-management
the starting command that lists
any computer-based control
eroded by rivals offering more
systems. A simple example is using
the tasks users must accomplish
system that monitors some or all
complete solutions.
video surveillance feeds to verify
once a specific person has entered
of a building’s mechanical and
access control card swipes.
the building.
electrical systems, including a
Access Control Versus Other Security Equipment
is essential to unlocking the potential of higher level BMS
The Barriers to Wider Adoption
Access control systems are
platform functionality. As more
One of the main barriers to
considered to be an important
BMS solutions move towards
adoption are worries over who is
analyst, security and building
piece of the smart building puzzle,
command-and-control-style
actually in charge. In centralised
technology with IHS Markit. Visit
due to the quality of information
features, which allow buildings
architectures, the BMS platform
https://technology.ihs.com for
the system can provide the BMS
to adjust building management
provider will always want to
more information.
securitysolutionsmagazine.com
Access control integration
building’s energy, security and life safety domains. n Jim Dearing is a senior
SECURITY SOLUTIONS // 59
LOSS PREVENTION
GIFT CARDS HAVE BECOME A COMMON CURRENCY FOR ORGANISED RETAIL CRIME BY JACQUE BRITTAIN
60 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Organised retail crime (ORC) is
criminals are attacking retailers
by no means new to the retail
with a voracious appetite.
environment, but is rather a challenges us in new and different
High Value, High Demand
ways as it grows and evolves
Businesses targeted by ORC are as
at a rapid pace. With thieves
diverse as the types of products
and the supporting criminal
targeted, whether department
market urgently seeking new
stores, home improvement stores,
and creative ways to pilfer goods
specialty stores, supermarkets,
and maximise their profits, it
pharmacies, convenience
becomes increasingly important
stores, category killers, or other
for retailers to keep pace. A big
types of retailers. Every area
part of this involves keeping
of retail can be affected and no
current with both the means and
company is immune from the
the methods of the professional
prospective threats. Attacks can
theft enterprises invading the
come through the front door,
retail space.
back door, internally, over the
criminal element that consistently
For many years, there have been theft groups that have moved from store to store and market to
securitysolutionsmagazine.com
Internet, or anywhere along the supply chain. ORC groups can potentially steal
market, stealing large quantities
a wide array of products, including
of goods and selling product
over-the-counter drugs, razor
through a variety of different
blades, baby formula, cigarettes,
venues. However, while many
batteries, video games, CDs, DVDs,
of the basic concepts may be the
gift cards, jewellery, large or small
same, the execution – and the
electronics, designer clothing,
potential consequences – have
power tools, high-end meats, or
been greatly magnified. With the
any number of items that are in
reach and sophistication of these
high demand. Essentially, product
networks, the advancements
is only limited by the needs of the
in technology, the potential
criminal element, the ingenuity
profitability of the illegitimate
of those attempting to steal the
venture and the diverse ways
products and the expedience
that they can impact the retail
through which the product can be
business, today’s professional
sold and converted to cash.
SECURITY SOLUTIONS // 61
LOSS PREVENTION
police also tracked 83 to 98 overdoses to gift cards during a three-month period. Senator Briggs was stunned by these numbers. “It would be no different than if there was a rock lying there, and if you lifted it up, and this horrible smell came out, and this monster came out,” he said. “We had no idea that the organised retail theft was related so intimately with the opiate and drug trade in general in Appalachia. We have a crisis in Tennessee where goods are stolen and then returned to retailers for credit on a gift card. The cards are sold for cash, which in turn is fueling the illegal drug market.” Senator Briggs introduced new legislation approved by the their value, they can return
Ties to the Illegal Drug Market
Tennessee General Assembly this
limitations. Some products can be moved quickly and at
the merchandise to the store,
It is widely known that
two new theft offences to
high volumes, while others
receive a gift card and sell the
shoplifting is considered a
prosecute individuals who return
are largely dependent on the
gift card for up to 80 percent of
gateway crime, a criminal
stolen merchandise to receive
buying market to support the
its market value. Factoring in the
offence that, in general terms,
money, gift cards, or store credit.
criminal enterprise. So, in
sales tax portion of the return,
often leads to other more serious
order to maximise profits, ORC
which can bring an additional 5
or harmful criminal issues such
networks would also return
to 10 percent depending on the
as drug-related crimes and
Education and Awareness Are Critical
stolen merchandise back to
state, the thief can be looking
abuse, gun-related incidents,
Dealing with the many aspects
the retailer without a valid
at an 85 to 90 percent return
violent crimes and even
involved with ORC requires an
receipt. With many retailers
on their ‘investment’ for the
terrorism. There are now even
advanced level of skill and training,
previously providing cash back
stolen merchandise.
reports of a direct link between
but it also necessitates sound
gift card issues and the opioid
judgment and common sense. As
In some ways, this has its
for returns under a designated
market for 60 to 70 percent of
While these gift cards can be
year defining ORC and creating
dollar amount, this well-known
sold at physical locations such
epidemic, with addicts stating
is true with every aspect of loss
approach basically resulted in
as pawn shops and other outlets,
that drug dealers will often
prevention, including retail crime,
criminals selling back the stolen
online sales sites currently
accept gift cards as payment in
it is critically important that we
merchandise to the retailers for
provide an easy way for thieves
lieu of cash.
remain aware of recent trends by
substantial profit.
to convert the cards to cash. A
For example, State Senator
working closely with other retailers,
simple Google search using the
Richard Briggs of Tennessee
our law-enforcement partners and
Enter the Gift Card
phrase “sell gift cards” resulted
in the US reports a direct
local, state and federal legislators.
As retailers have responded
in more than 73 million results.
connection between gift cards
to the evolving needs of the
Gift cards can be bought and sold
and drug overdoses based on
to educate our teams, heighten
business, most have changed
on popular sites such as eBay,
reports received in his home
awareness amongst company
their return policies and typically
Amazon and even Craigslist.
state. Retail theft is prevalent
decision makers, and protect our
issue a gift card or store credit
But there are also sites that
in Tennessee, with Knoxville
customers and employees from
when returns are made without
are specifically dedicated to
reportedly ranking first in the
these incidents. Sound judgment,
a receipt. Unfortunately, this
purchasing ‘unwanted’ gift
nation per capita for card abuse
safety, prevention and awareness
still offers the thief a lucrative
cards such as Raise, Cardpool,
and theft. In Knox County, he
should be our ultimate objectives as
opportunity. Rather than fencing
CardCash, and even Gift Card
revealed that police linked 16 of
we develop the strategies necessary
the merchandise for 30 percent
Granny that offer various buy-it-
19 overdoses to the sale of gift
to help us detect issues, deter
of its value on the street or selling
now options that enable a quick
cards during a one-month period
incidents, protect resources and
the goods on the secondhand
turnaround for the gift cards.
in 2017. In the city of Knoxville,
resolve these issues. n
62 // SECURITY SOLUTIONS
Every effort must be made
securitysolutionsmagazine.com
PROFESSIONAL DEVELOPMENT
IF THE TRUTH BE TOLD… HOW TO UNCOVER A LIAR PART II ELLY JOHNSON
In the last edition of Security
is easy and the time he takes to
answer, “YES”. Jim does not want
Solutions Magazine, we posited
other five questions I promised
verbally respond will probably
to tell the truth, so the process of
a hypothetical scenario where
you to help uncover a liar.
be quite fast. He does not need to
lying commences.
Here we continue on with the
money was stolen from an office worker’s bag, which was stowed
put much thought into it because
Question 2: Did you take the $500?
Remember, in this scenario
the answer his honest brain
both people are denying
comes up with in less than a
knowledge or involvement, so
second is the same as the honest
Jim also answers no. But there
straightforward and direct
verbal answer he is about to give.
is a difference in his answer.
question and you are right, it
To this question, truthful people
Deceptive people may not be as
innocent, “Do you know why I
is. These questions are simple
usually offer spontaneous, direct
strong in the denial. They may
asked you here today?”, started
yet effective. One thing to
and sincere denials such as ‘no’
be evasive or even defensive. Be
to reveal the difference between
understand as you go through
or may add reinforcing language
sure to watch the body language
honest Eddy, who had nothing
the questions is that the brain
like ‘absolutely’ and ‘no way’.
and response in Jim’s face as
to hide, and Jim, who had to
always answers a question
Eddy looks you in the eye when
well. In this case, Jim pauses
deal with extra emotional and
truthfully at an unconscious
he says it and you do not see any
a little before he answers,
cognitive stress to try to second-
level. This happens before the
shift or change in his body. His
shifts in his chair, looks away
guess how an honest person
person consciously gets hold of
head shakes no at the same time
and says with a bit of a scoff
might answer the question. Jim
the question and starts to give
he says no.
in his response, “No”. (Do not
was more vague, used language
an answer.
under a desk. Now, you are tasked with identifying who stole the money. Our first question, a seemingly
to reduce the seriousness of the
This seems like a
So, imagine we ask Eddy, “Did
What if we ask Jim the same
make the mistake of jumping
question? Remember, the brain
to conclusions too early. Make
incident and used verbal fillers
you take the $500?” His brain
always answers the question
sure you are not showing signs
(“ummm…”) to buy himself more
can honestly and quickly answer,
truthfully first. So, what does
of judgement in your own
thinking time.
“No”, because that is the truth. It
Jim’s brain say? Of course, it will
behaviour.)
64 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 65
PROFESSIONAL DEVELOPMENT
deceptive person thinks he
he thought for a moment. His
or she is doing very well with
verbal response was calm and
the answers and not giving
was accompanied by a shrug and
Question 4: Who would you eliminate from this investigation?
anything away.
a shake.
This question will not cause
that is what comes out of their
truthful Eddy much stress because
mouth first.
With these questions, a
who took it.” Before he answered,
Before we observe Jim’s
The other thing that truthful people often do at this stage is eliminate themselves. It seems like a natural thing to do and often
Question 3: Who do you think may have taken the money?
answer, stop and consider what
all he will naturally be doing is
his brain answered – his brain
pondering who is not involved for
effort in the thinking process that
answered, “I did”, but of course
sure. He will not have a problem
someone who is lying needs to go
The truthful person begins to
he does not want to say that.
naming people who can easily be
through, and how that impacts on
think and speculate about who
Jim needs to think through the
accessed for verification. Truthful
the responses that are given. You
might have taken it. If he has no
response more than Eddy did.
people usually vouch for people
ask Jim who he would eliminate
idea, he will say so. If he does have
“Should I just say I don’t know
they know, like or trust. Eddy
from the investigation. His brain
some thoughts or clues, he will
who took it, or should I try to point
might say something like, “I would
likes this question because there is
likely proffer that too. Truthful
the finger at someone else to get
rule out Betty, because she was
an opportunity for him to open up
people usually volunteer names
them off my tail?” After a long
with me all morning. And I guess
the investigation and push the heat
and information, or apologise
delay, Jim replies, “I don’t know
you can take Bobby out of the
away from himself. He can use this
if they have no information
who took it, or even if it was taken.
picture because he is out of action
question not to narrow the field by
or suspicion.
I guess it could’ve been anyone.”
laid up at home with a broken
eliminating the people he knows
See the difference in those
ankle, so he wasn’t there, that’s
did not do it, but by broadening
for sure!”
the scope of who may have been
Eddy’s response to the question is, “Sorry, I have no idea
66 // SECURITY SOLUTIONS
two responses?
The key is to consider the extra
securitysolutionsmagazine.com
to himself by the answers that
punishment that is imposed on
you’ve got no evidence and you
he is giving. He thinks he is
himself if he is found out at some
have no idea whatsoever that I
coming up with very logical and
point. Why would he start dishing
took the money”, or, if his guilt
practical answers that make
out big penalties when there is a
or remorse for what he did has
him seem wise and helpful. But,
chance that such penalties will fall
kicked in, he might be thinking,
because his brain is processing the
on him? So, Jim might answer the
“I wish I didn’t take the bloody
information differently than the
question with something like, “Oh,
money, I’m screwed if I get found
truthful person, he cannot help but
I don’t know, maybe they should
out, it was a stupid mistake.”
respond differently.
get a warning”, or, “They should
Question 5: What do you think should happen to the person who took the money?
Either way, Jim has to go
definitely repay the money”, or
through a process that Eddy does
maybe even, “Gee, I’m not sure, it’s
not go through. He has to decide
not really my place to say”.
on the best answer that will lead you away from suspecting that he is involved. But as he tries to come
here is truthful people offering
Question 6: What do you think the person who did this would be thinking now?
harsher judgments, penalties or
Truthful people with nothing to
with something like, “I don’t know,
punishments. Why? Because it
hide will not find this question
maybe they are sorry they took it
does not impact on them. If they
stressful. Their response shows
and maybe they made a mistake.”
think what happened was wrong,
that they are trying to imagine
or unjust, or illegal, then they
what another person might
questions I am not expecting an
are likely to be able to clearly
be thinking. They will likely
easy admission or confession. Of
express that and back it up with
ponder the question for a while
course, in real life, at any point the
the thinking or reasoning that
and might offer a response that
guilty party may decide to come
led them to that conclusion. They
is quite strong, for example, “I
clean and be truthful and spill
might say, “I think the person
imagine they are pretty worried
the beans. That is great because
should be fired from their job.” Or
at the moment, especially because
then you will have the truth and
maybe, “They should be charged
there is an investigation going
you can take it from there. What
with theft and lose their job as it is
on about this”, or maybe, “They
we are assuming in this case is
unacceptable behaviour.”
are probably wishing they didn’t
that there is no admission or
take the money right about now.”
confession at any stage of these
thinks the same way. Not every
Eddy is only speculating about
questions – but the fact is, even
truthful person is going to offer a
what another person is thinking
though both people are denying
involved. So he may respond,
harsh penalty, particularly if they
or feeling, and you can see that his
knowledge or involvement, you
“Who would I eliminate from the
are compassionate and forgiving
verbal and non-verbal behaviour
will have a pretty good idea who
investigation? Well, I wouldn’t
in the way they think and act. That
is congruent with someone who
is not being truthful just from
eliminate anyone at the moment.
is why these questions are used in
is not stressed by this question;
their responses.
In fact, I think you should consider
a bundle and answers should not
he is just coming up with ideas
anyone to be a suspect at this
be taken as standalone responses.
about how the guilty person may
are fantastic questions; use them
stage. And, let’s face it, there’s a lot
Remember to look at the responses
be thinking.
carefully, use them wisely, and
of people that come and go from
holistically, considering not only
the office around here. We’ve got
the words, but also the non-
exactly what he is thinking right
people on level 4 of the building
verbal responses such as body
now! This particular question
and I don’t know all the people
movements, eye movements and
poses a conundrum for the
who work with the company.”
changes in posture. You also need
deceptive person as he searches
Johnson is the Founder and
This question is a good one because what we typically see
Keep in mind that not everyone
Jim, on the other hand, knows
up with an answer, it is possible that Jim’s real line of thinking may ooze out and he might come out
Remember, throughout these
So, what do you think? These
get in touch if you want to know another six questions! n A former police officer, Elly
to think about the paralinguistics
for the best answer rather than
Managing Director of TruthAbility,
himself or vouched for anyone he
of the communication – that is the
the truthful answer. Remember
an organisation that for almost two
works with, he has opened up the
tone, pitch, speed, volume, pauses,
that the brain always answers the
decades has specialised in providing
enquiry to throw the investigator
ummms and the way in which the
question truthfully. That means
a unique mix of programs,
off the scent that leads to him.
words are expressed.
Jim’s brain will give an automatic
workshops and seminars, designed
truthful response first. So, when
to help people reduce the risk
Not only has Jim not eliminated
The great thing about these
What about the deceptive
simple questions is that the
person? He is less likely to come
he is asked the question, his brain
associated with harmful deception,
deceptive person does not even
up with a harsh penalty. Why?
might answer, “I’m thinking you’re
fraudulent behaviour and
realise that he is drawing attention
Because he is recommending the
not going to catch me because
hidden truth.
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 67
FEATURE
ISIS – When Serving Terrorism Is An ‘All In The Family’ Affair: How To Recover Lost Children And Spouses of ISIS BY ANNE SPECKHARD AND ARDIAN SHAJKOVCI
This paper was presented at the 2018 OSCE-wide Counter-Terrorism Conference – The Reverse Flow of Foreign Terrorist Fighters (FTFs): Challenges for the OSCE Area and Beyond in Rome May 11, 2018 Samantha Elhassani, a 32-year-old
to rape and treat as sex slaves.
to take them in. But what are
temporarily suspend, parental
American, is sitting in a People’s
She and her children endured and
the legal challenges of severing
rights of those parents who took
Protection Unit (YPG) camp near
witnessed horror on a daily basis.
paternal rights or awarding
their children into ISIS and who
temporary custody? Inside the
are not bringing them home. This
Al-Hasakah, Syria, with her four
Samantha and her four
children (two brought into ISIS
children are now in a YPG camp
US, such decisions are carried out
is necessary so that the children’s
and two born there), awaiting her
near Al-Hasakah, Syria. She is
on a local jurisdictional level, by
repatriation and return to the US
fate. In 2014, Samantha took her
not sure if she wants to come
cities and states, not the federal
and rehabilitation can be effected
two small children and followed
home and face prosecution, and
government. At present, the US
quickly rather than stall for
her Moroccan husband into ISIS,
her children’s fate appears to
federal government does not
months on end.
only to learn that she had entered
be subject by US policies to her
appear to follow normal child
a misogynist organisation that was
decisions. So, unlike journalist
protective services protocols that
Elhassani boy has begun to say
going to force her ten-year-old
James Foley, for example, who
would swiftly remove children
he wants to become a YPG fighter,
son into making a propaganda
was taken hostage by ISIS and
from mothers who are abusive
indicating he is aligning himself
video threatening his native land
deservedly had the US Navy SEALs
or negligent; there is no doubt
with available role models. We
and that she would be subjected
mount a rescue attempt on his
that it is both abusive and
should also expect that anytime
to forced marriage when her
behalf, the Elhassani children,
negligent parenting to willingly
we leave children in camps filled
husband died, witnessing
who managed to escape ISIS,
subject one’s children to the
with ISIS cadres, they will become
rape of other women and total
are not being rescued. Despite
horrors of ISIS where they could
more, not less, like those they are
subjugation of her son to ISIS.
the YPG being an ally of the US,
witness beheadings, crucifixions,
exposed to. At the International
Samantha was not an
the US government has not to
torture, floggings and themselves
Center for Study of Violent
emotionally healthy woman
our knowledge demanded the
be forced to participate in
Extremism (ICSVE), we have
when she left her native Indiana
children be turned over. Even if
these as well as undergo sick
encountered many cases where
for ISIS. She had fallen deeply
they were turned over, there are
ideological indoctrination.
young boys were recruited into
under the influence of an evil
many issues to surmount. The two
man who his sister-in-law claims
oldest children were US passport
recommendation is that the
When young boys have no active
dealt in weapons and who would
holders, but their identities have
U.S. Department of State, the
father figure, they will easily look
later become a media man for
to be verified. The two youngest
U.S. Department of Justice and
to the men around them for role
ISIS. When he died of shrapnel
were born in Raqqa and would
Congress (along with similar
models. And girls may fall prey
wounds, Samantha, like many
need genetic testing to link them
bodies in other countries that
to the same. Likewise, sexual
other ISIS widows, was passed to
to their US citizen mother or, if she
follow the same practice of
predation of both also occurs.
another ISIS cadre. Samantha had
refuses to cooperate, with a close
leaving the decision to return
two more children born in Raqqa.
American relative. The Elhassani
home up to the mothers) work
Her husbands also brought Yazidi
children have a maternal aunt at
quickly to devise policies and
children who had no part in their
women and girls into their home
home in the US ready and willing
laws that sever, or at a minimum
decision to end up in ISIS, they
68 // SECURITY SOLUTIONS
Based on this case, our
In this case, the eldest
ISIS in precisely these situations.
All the countries involved need to acknowledge that to save the
securitysolutionsmagazine.com
Western citizenship and can be repatriated to their father’s country, despite their mothers not being Westerners. While some of the mothers arrested in Syria and Iraq are requesting to be sent home, their countries are not always keen for them to return. France for instance has claimed that French citizens, including women, who can obtain a fair trial in Syria and Iraq will be left to face justice there. It is believed that France had anywhere from 300–400 children living under ISIScontrolled territory in Syria and Iraq and some of these have now been repatriated to France. In the case of German nationals, at least six children are being held with their mothers in Iraqi camps, while the number of female German nationals held in Syrian camps stands at 15. In the US, more than 45 women are reported to have either attempted to join or joined ISIS in Syria, with at least a dozen American children ending up in ISIS-controlled territory. A majority among the thousands of suspected ISIS need to be returned home swiftly
custody. At present, it is not clear
but their culture does not allow
members who survived and were
to start rehabilitation efforts,
what, if any rehabilitation these
converts or marrying outside the
arrested are now being prosecuted
regardless if their parents do or do
children are receiving for dealing
group and does not accept children
through specialised criminal
not return home with them.
with their time living under
born as a result of rape, so their
counterterrorism courts in Iraq
ISIS. According to one Justice
mothers are left with the horrible
or local and quasi-judicial courts
informed ICSVE researchers that
Ministry official, a German non-
choice of relinquishing their
run by different opposition groups
there are currently approximately
government official recently came
children to orphanages in Mosul in
in Syria. For example, since the
700 ISIS women in custody in Iraq;
to Iraq to provide aid boxes, which
order to return home. Counsellors
establishment of the Democratic
approximately four hundred of
included milk and diapers for
working with some of these
Federation of Northern Syria
them are from Turkey, 200 from
babies, to mothers and children.
women state that the women think
(DFNS), also known as Rojava,
often of their abandoned children
different courts were set up to
and wonder how they are faring.
handle civil and criminal cases,
Iraqi Justice Ministry officials
the Caucuses in Russia, eight from
Russians recently worked to
Belgium, an unknown number
return 71 children from custody
from France and Germany, and
back to concerned relatives in
With the huge influx of
ending in the prosecution of over
some from Syria, Jordan and
Russia, along with 26 mothers.
foreign fighters, many Western
700 terrorism-related cases since
Iraq. Nearly all ISIS women were
Yet between 70 and 120 children
men married local Arab women
its establishment in 2014. In Iraq,
married – remaining single was
remain in an orphanage in
and fellow female travellers
around 100 Europeans, among
not an option – and these women
Mosul and it is estimated that
from non-Western countries.
them Belgians, Russians and
are no exception. On average,
approximately 400 Russian
Children whose killed ISIS
Central Asians, are currently being
all of them have three or more
children are still being held in Iraq.
cadre fathers were Westerners
tried in Iraqi courts, including five
children. The Iraqi prison policy
Yazidi women who were forcibly
are currently undergoing DNA
German women – one already
is to remove any children over
taken into hostage with their young
testing in cooperation with their
sentenced to death for joining ISIS
three years old from their mothers
children and taken into Syria have
claimed homeland countries to
and another hung following her
and place them in protective
now been allowed to return home,
learn if they are eligible to claim
death sentence.
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 69
FEATURE
Many countries continue to
The Elhassani boy was forced
who managed to escape ISIS with
the dangers of such violent
struggle with the question of how
her infant daughters; though it
extremist groups.
to deal with female and children
remains uncertain whether she
returnees from the conflict zones
will face charges upon return
issue of repatriation persist,
threatened fellow Americans in an
in Iraq and Syria, including
to Canada.
especially in light of bureaucratic
ISIS propaganda video. He is likely
barriers imposed by the YPG-run
to encounter significant social
women and children who remain
The issue of children taken
Legal hurdles related to the
to dress up in a suicide vest and pose with weapons while he
in the ISIS-controlled territories
or born in the ISIS-controlled
camps and detention centres
stigma when he returns home.
or detention camps in Iraq and
territory is even more complex.
in Syria. Some argue that such
Social workers, psychologists,
Syria. Given the lack of clear legal
The issue of proving nationalities,
centres do not form a legally-
teachers and school counsellors
guidelines on how to address the
challenges posed to immigration
recognised state entity, meaning
will likely all need to be engaged
issue of such returnees, many
officials prior to travel – in regard
they lack the legal authority to
to help him. Likewise, his mother
countries are dealing with them
to being issued travel documents –
detain children and women in
who travelled to ISIS as a result of
on a case-by-case basis. Difficulties
and to social services and teachers
such camps. Some governments,
her own dependency, substance
in accessing evidence from the
upon their return, and the level
including France, have openly
abuse and emotional dysfunction
conflict zone, given the complex
of threat posed by older children
demanded that adults captured in
issues also needs to be put
nature of the environments in
who served ISIS, are all looming.
Syria be left there, provided they
in treatment.
Iraq and Syria, remains a primary
The exposure to ISIS’ extremist
are guaranteed a fair trial or, in
While each country has
obstacle, as well as the fact that
ideology and even militant
the case of children, “depending
different standards of evidence
the Syrian government is not
training for some children
on their parents’ preference,
and laws to prosecute on
functioning in a large part of
makes their return particularly
either stay with them while tried
a terrorism, criminal or
Syria. In addition, there is a lack
worrisome and unwelcome
locally or be repatriated, where
child protection basis, our
of clear understanding when
by some.
they will be cared for by social
recommendation is that, when
services”. Many other countries
possible, all ISIS wives and
it comes to the roles played by
Challenges for social services
women in ISIS. Many were never
include a lack of adequate
remain undecided and uncertain
mothers be prosecuted for
asked to swear allegiance (that is,
capacities and manpower to deal
about how to proceed, especially
material support for terrorism
give their bayat) and most were
with the return of women and
as it relates to children. The policy
where such laws and evidence
not employed; however, some took
children who are very likely to
of allowing nationals of other
exists or child endangerment at
part in the dreaded ISIS hisbah
be in a traumatised state after
countries to be tried or dealt with
a minimum for the purposes of
or morality police, acting as
living under ISIS rule. While
in Kurdish-run camps is found by
being able to force them into some
enforcers who were often sadistic
some have proposed removing
some to be flawed, considering
kind of treatment to avoid serving
in flogging and biting other
children from returnee parents
their lack of adequate resources,
prison time. Separating them from
women (with metal teeth). Others
who are tried on child abuse or
politicised nature of special courts
their children and serving prison
functioned as paid propagandists
negligence charges for having
and the lack of fair trial standards.
time is not the goal, but having a
and recruiters, and a small group
exposed their children to a
Such policies seem to be a way for
means of requiring these mothers
trained to be combatants and
terrorist group, such propositions
Western countries to avoid having
to engage in meaningful therapy
suicide bombers. Likewise, there
continue to face criticism on
to deal with female ISIS members
in order to avoid serving prison
are many questions regarding
the grounds that determining a
who would be likely to face
time is. These are women who
their desire to return home and
parent’s threat level towards a
criminal charges upon their return,
may go to one or two counselling
the possible threat level posed
child is often difficult, including
but who are difficult to successfully
sessions if invited, but they will
upon their return. In some cases,
the fact that governments are not
prosecute given the challenges of
not follow a thorough course of
such as that of 33-year-old French
best positioned to guarantee the
presenting evidence from a conflict
treatment unless compelled to do
woman Emily Koening, an online
best sponsorship of every child,
zone. Yet there are no guarantees
so. We know that many who left
recruiter for ISIS, the role played
nor even a simple upbringing.
of fair interrogation procedures or
for ISIS were either hopelessly
and the level of allegiance to
Some, like Belgian ISIS returnee
just proceedings and by remaining
naïve and overly dependent on
ISIS seems to determine certain
Laura Passoni’s children, were
in such camps, mothers and their
the men who groomed them for
countries’ responses to dealing
temporarily removed from her
innocent children in particular
travel – these women need to
with women. Currently held in
care and put in the care of their
are being exposed to additional
learn to be more independent
a Kurdish-run prison in Syria,
maternal grandparents while
risks in terms of their health and
and stronger. Others left for
she continues with her demands
she was prosecuted, but they
potential increased radicalization
opportunistic reasons, including
that she and her three children
were later returned to her. Laura
while surviving in a war zone
free housing, salaries and the
be repatriated to France from
(who ICSVE has made a counter
surrounded by other militant
potential to reap material benefits.
Syria. Despite her appeal, she
narrative video about) is a great
captives. Likewise, they may also
They need to be redirected
remains in Syria. In contrast,
example of a disillusioned ISIS
be viewed as potential perpetrators
and receive help in removing
Canadian authorities seem willing
returnee who now lectures
requiring adequate counselling
obstacles to legitimate ways of
to facilitate the return of a woman
to students to warn them of
and care.
earning a living. Those who were
70 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
produced by ICSVE, both locally and internationally, as well as studying the use of children as violent actors by groups such as ISIS and consulting on how to rehabilitate them. She regularly speaks and publishes on the topics of the psychology of radicalization and terrorism and is the author of several books, including Talking to Terrorists, Bride of ISIS, Undercover Jihadi and ISIS Defectors: Inside Stories of the Terrorist Caliphate. Follow Anne @AnneSpeckhard Ardian Shajkovci Ph.D. is the Director of Research and a Senior Research Fellow at the International Center for the Study of Violent Extremism (ICSVE). He has been collecting interviews with ISIS defectors and studying their trajectories into and out of terrorism as well as training key stakeholders in law enforcement, suffering from marginalization,
before making their way home.
the psychological and Islamic
intelligence, educators and other
discrimination, Islamaphobia
All are likely traumatised by what
challenge aspects of the Detainee
countering violent extremism
or other difficulties from being
they witnessed and experienced
Rehabilitation Program in Iraq to
professionals on the use of counter-
Muslim or of immigrant descent
inside ISIS and are now facing the
be applied to 20,000+ detainees and
narrative messaging materials
heritage need to receive assistance
same emotional and psycho-social
800 juveniles and has consulted to
produced by ICSVE both locally
in addressing these issues while
issues they faced before leaving,
NATO, OSCE, foreign governments
and internationally. He has also
also being helped to integrate
in addition to social stigma and
and to the U.S. Senate and House,
been studying the use of children
well into society. Many young
children that may be acting out
Departments of State, Defense,
as violent actors by groups such
women left for ISIS to throw
the traumas of having lived under
Justice, Homeland Security, Health
as ISIS and how to rehabilitate
off the chains of conservative
ISIS. They need our help. Our
and Human Services, CIA, FBI,
them. He has conducted fieldwork
families and seek adventure and
recommendation is that OSCE
CNN, BBC, NPR, Fox News, MSNBC,
in Western Europe, the Balkans,
romance, while some also went to
countries quickly deploy qualified
CTV and in Time, The New York
Central Asia and the Middle
escape from life’s problems. Many
mental health and educational
Times, The Washington Post,
East, mostly recently in Jordan
were looking for significance
support as well as career
London Times and many other
and Iraq. Ardian has presented
and purpose and believed that
counselling and community
publications. In the past two years,
at professional conferences
building an alternative world
support to these women to put an
she and ICSVE staff have been
and published on the topic of
governance was a good thing.
end to the cycle of terrorism and
collecting interviews with ISIS
radicalization and terrorism.
Those who left as ‘true believers’
social stigma in their lives and the
defectors, returnees and prisoners,
He holds a doctorate in Public
need to have their ideological
lives of their children. n
studying their trajectories into
Policy and Administration from
and out of terrorism, their
Walden University, with a focus
experiences inside ISIS, as well as
on Homeland Security Policy.
orientation redirected to nonviolence and those who still
Anne Speckhard Ph.D. is
adhere to the Takfir ideology
Director of the International Center
developing the Breaking the ISIS
He obtained his M.A. degree in
of ISIS and are truly hate-filled
for the Study of Violent Extremism
Brand Counter Narrative Project
Public Policy and Administration
may have to be imprisoned and
(ICSVE) and serves as an adjunct
materials from these interviews.
from Northwestern University
separated from their children.
associate professor of psychiatry
She has also been training key
and a B.A. degree in International
Many women were raped
at Georgetown University School
stakeholders in law enforcement,
Relations and Diplomacy from
inside ISIS, forced into repeated
of Medicine. She has interviewed
intelligence, educators and other
Dominican University. He is an
marriages, raped by smugglers
over 600 terrorists, their family
countering violent extremism
adjunct professor at Nichols
who helped them escape, or
members and supporters in various
professionals on the use of counter-
College, teaching cybersecurity and
molested or mistreated in prisons
parts of the world, designed
narrative messaging materials
counterterrorism courses.
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 71
ESSENTIAL SAFETY TOOLS In the last issue of Security
that theme by looking at a range
Solutions, we looked at a range of
of essential safety tools that we
than not, security will be the first
personnel to have their level 2 first
every day carry items that we felt
think security should have with
people on the scene at a work
aid. However, that knowledge is
every security officer should have
them either on their person or
site, shopping centre or major
of little use if they don’t have the
upon their person whilst on duty.
in their vehicle at all times when
event in the case of a medical
correct equipment with which to
In this issue, we have continued
on duty.
emergency. We all know that
apply that knowledge and skill.
The Double Duty Responder is a
• Ambidextrous carry clip
twin blade rescue knife. The main
• 24.64 cm. overall length with
THE DOUBLE DUTY RESPONDER
As first responders, more often
blade exhibits a 9.4cm combo edge satin finish Sheepsfoot while the secondary blade is a serrated safety seatbelt blade with carbide glass breaker, ideal for vehicle extrication.
it is a requirement for security
both blades deployed • Independent liner locks on both blades • Includes a Torx wrench for modifications An essential for any security
Features include:
vehicle, this rescue tool lets
• Twin blade first responders
you cut through seats belts and
knife
webbing quickly and easily,
• Combo edge main blade
break windows to access or
• Secondary seatbelt cutter blade
remove injured victims and
Specifications:
perform a range of other
• Main and secondary blades
necessary safety and emergency
are 3mm/1.8mm AUS 8 steel
tasks. n
• Integrated carbide glass breaker • Rubber moulded FRN grips
Available from tacmedaustralia.com.au
SOF TACTICAL TOURNIQUET- WIDE The SOFTT-W Tourniquet is a life saving
The design allows for rapid routing of the
device used to control massive extremity
tourniquet strap while eliminating need for
haemorrhage. With a true 1.5 inch tourniquet
re-threading the webbing through a buckle.
strap the SOFTT-W provides superior
By eliminating the requirement to re-route the
compression than most standard tourniquets.
webbing the tourniquet is easier to use when
High strength, light weight aluminium
operating under stress and reduces application
components are used in critical areas of
time, both of which can result in reduced levels
function ensuring reliability in the most
of blood loss and better quality patient care.
challenging of circumstances and on the largest of limbs. The SOFTT-W does not rely on any velcro.
This broader compression pattern allows for increased patient comfort and additional arterial compression. n
The high strength hook & buckle interface was designed for security, strength and ease of application.
72 // SECURITY SOLUTIONS
Available from tacmedaustralia.com.au
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmedia.com/newsletter
EMERGENCY BANDAGE (ISRAELI BANDAGE) The First Care Military & Civilian Wound Dressing raises haemorrhage control to the next level, consolidating numerous pieces of treatment equipment into a single, effective and easily applied unit. A ‘Standard’ issue to major military organisations worldwide. Quickly stanches haemorrhaging from injuries caused by traffic accidents, workplace accidents, home injuries, GSW, stab and other assault wounds. Available in numerous sizes and 2 colours (Military Green & Civilian White) n Available from tacmedaustralia. com.au
OPERATOR IFAK- KIT
The Operator IFAK is a compact
nylon pouch (in 3 colours) which
• Chest Seal (Twin Pack)
instead of the Halo Chest Seal
Immediate First Aid Kit (IFAK) that
can be worn on any platform
• 2 Pairs of Gloves, nitrile, Size:
as shown.
provides immediate trauma care
that has MOLLE or worn on
at the point of injury. Whether you
a belt. Complete with all the
• CPR Face shield
now comes with SOF Tactical
are on the pistol range, hunting
equipment required to treat
• Trauma shears
Tourniquet - Wide Rescue
in remote bushland or on duty
major causes of preventable
• Casualty Card
Orange and Operator IFAK
on the streets of Sydney - the
death from penetrating injuries.
In writing this review, we were
Kit - Multicam comes with SOF
Operator IFAK is the kit of choice
The kit contains:
also informed that the Operator
Tactical - Wide Tan. n
for operators around firearms.
• SOF Tactical Tourniquet
IFAK now contains a Hyfin Vent
The Operator IFAK comes complete in a compact MOLLE
securitysolutionsmagazine.com
Wide • 4 inch Olaes Bandage
Large
Compact Chest Seal (Twin Pack) from North American Rescue
The Operator IFAK Kit - Red
Available from tacmedaustralia.com.au
SECURITY SOLUTIONS // 73
ESSENTIAL SAFETY TOOLS
The Leatherman OHT The Leatherman OHT is a
2. Spring-action Regular Pliers
revolutionary multi-tool made in the
3. Spring-action 154CM
USA by legendary tool manufacturer Leatherman. The Leatherman OHT is a one-handed opening tool. No,
Replaceable Hard-wire Cutters 4. Spring-action 154CM Replaceable Wire Cutters
not one-handed blade or pliers but
5. 420HC Knife
everything! Why is that important?
6. 420HC Serrated Knife
Because when you are wearing
7. Saw
gloves, or trying to hold a bandage
8. Strap Cutter
in place, or doing anything else with
9. #8-32 Cleaning Rod/Brush
your second hand, you need to be
Adapter
able to access and use your tools
10. Can Opener
quickly and easily.
11. Bottle Opener
I could bore you to death with
12. Oxygen Tank Wrench
details on it’s 420HC Stainless Steel
13. Phillips Screwdriver
or black oxide but just know this
14. Large Screwdriver
thing is built to last and comes with
15. Medium Screwdriver
a 25 year warranty.
16. Small Screwdriver n
Features: 1. Spring-action Needle-nose Pliers
Available from tacmedaustralia. com.au
EMERGENCY BANDAGE (ISRAELI BANDAGE) The Eleven 10 PTAKS Medical Pouch is a small personal pouch designed to hold the bare minimum trauma consumables. Designed as a “Penetrating Trauma Aid Kit, Small”, the PTAKS pouch features a channelled back panel to allow both belt mounting and MOLLE/ PALS attachment of this small profile pouch to allow it to be kept in an easily accessible location on the user - without overcrowding security officers already heavily laden setups. The inside is an open compartment which has a quick access ribbon that can be loaded under your contents to allow for fast easy deployment when needed. A velcro square on the front holds a medical identifier cross patch (included). Available in ‘Pouch only’ and ‘Kit’ options. Optional Kit Contents : • SOF Tactical Tourniquet- Wide Black • Emergency Dressing Israeli Bandage 4 inch • Pair Black Talon Gloves n Available from tacmedaustralia.com.au
74 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry
instagram.com/securitysolutionsmag
SURVIVAL VEHICLE FIRST AID KIT The SURVIVAL Vehicle First Aid KIT has been designed with weight and space in mind, without compromising any of the items a security officer might need to successfully administer first aid in most situations. Designed in Australia by leading first aid experts, the colourcoded labelling system enables you to clearly identify first aid contents and explains the typical use for each item. This makes it quicker and easier to respond to any emergency situation. The kit also features a numbered labelling system which tells you how many of each item you should have – alerting you to replacement requirements and making it clear when you need to refill and restock. As with all Survival products, the Vehicle First Aid KIT is durable, rugged and water resistant. The zippers are strong and there is luminous piping on the bag to make it easier to see at night. In addition to the extensive selection of first aid items, the KIT contains CPR instructions to support your first aid training in the case of any on-the-road emergency. In our opinion, for just $79.95, this kit, or an equivalent, should be standard equipment in every security patrol vehicle. n Available from www.survivalfirstaidkits.net.au
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 75
LIKE US ON FACEBOOK facebook.com/ssmaust
SCAN CODE WITH YOUR CAMERA
FOLLOW US ON INSTAGRAM instagram.com/securitysolutionsmag
SCAN CODE WITH YOUR CAMERA
PRODUCT SHOWCASES
BOON EDAM BOOSTS SPEEDLANE APPLICATIONS AND VERSATILITY WITH ELEGANT NEW PEDESTAL MOUNT Global entrance security leader
Lifeline Boost comes in two models:
blending an elegant design with
to companies that require an
Boon Edam is introducing an
1. Standard Premium: Suitable
sophisticated security features, in
elegant and secure entrance solution,” says Mr Fisher.
elegant new multifunctional
for the integration of a card
a product that’s simple and easy to
pedestal mount to further enhance
reader, barcode reader or
use,” said Mr Fisher.
the versatility, application and
biometric devices.
access protection technologies
2. Card Collector: Suitable to
The Lifeline Boost’s slim
In keeping with the Lifeline series, the Lifeline Boost has been
design and easy installation make
engineered with the comfort of the
of its leading range of
integrate a third-party card
it a well-integrated speed gate
end-user in mind. It is ergonomic,
security speedgates.
collector device.
feature. Measuring just 106mm
set at a comfortable height and
The new Lifeline Boost is a
In addition to accommodating
where it touches the floor, the
features the classic tapered
well-designed, innovative and
a wide variety of authorisation
Lifeline Boost also removes
V-shape, to effortlessly blend in
unobtrusive pedestal mount that
technologies, the Boost pedestal
complications regarding under-
with the rest of the speedstile.
can accommodate an extensive
is easy and fast to install due to its
floor wiring through the ability
range of authorisation technologies,
unobtrusive, enclosed raceway that
to install the mount directly into
Energy-efficiency
to complement the Speedlane
can house an electrical and ACS
the Speedlane.
The outstanding energy-efficiency
Lifeline range of speed gates, which
conduit along the surface of any
has been proven across the globe,
finished floor. Its small footprint
intuitive operation guides users
extended to the Lifeline Boost.
including with household names
and sleek design complement the
as they provide their credentials
LED lights guide users from their
and Fortune 500 companies.
clean lines of the speed gate with
and then pass through the speed
initial approach, through the
minimal visual impact.
gate. Intuitive LED lights detect
authorisation steps and their exit
the visitor approaching and guide
into the secured side. When the
The Boost’s uncomplicated and
of the Lifeline range will be
Plug-and-play convenience
companies the freedom to use their
them through clearly and easily
speed gate isn’t in use, these lights
“Lifeline’s new Boost feature
access control partner of choice
– without any compromise to the
enter ‘sleep mode’ to save power,
extends the number of
and integrate almost any system
journey flow.
and energy costs. n
authorisation technologies that
into a pedestal mount that blends
can be integrated with the speed
in perfectly with the rest of the
Speedstile expertise
For Further Information,
gate, making it more versatile and
speed gates. It doesn’t look like an
“Boon Edam already has the most
Please Contact:
readily applicable to corporate
afterthought,” says Mr Fisher.
speedstiles installed in the world,
Alastair Russell
and now this new technology
National Sales Manager
allows them to accommodate
T +61 1300 689 905
private facilities,” says Boon Edam
Sophisticated and secure
almost any authorisation
M: +61 (0)450 924 882
Australia Managing Director, Mr
“A key consideration for the new
technology available, giving
E: alastair.russell@boonedam.com.au
Michael Fisher.
Lifeline Boost pedestal mount was
ultimate flexibility and accessibility
W: www.boonedam.com.au
“Lifeline Boost will give
HQs, government offices, education facilities, banks, healthcare and
76 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
ADVERTORIAL
ARE YOU CONCERNED ABOUT LOSING KEYS? David Ishak I AST PTY LTD
EXPANDED ELECTRONIC KEY CONTROL WITH CUSTOM MANAGEMENT REPORTS
access control system will know which users have keys and which do not. A user who has taken a specific key from KeyWatcher can be denied egress from the facility until the key is returned – and selected management can be alerted via email if a key has not been returned on time.
K
eyWatcher is a modular, scalable integrated key control and management solution that’s designed for interoperability with access control and other systems such as Contractor Management Kiosks and Fleet Management platforms. With a builtin 7” touch screen and up to 10,000+ assignable user codes with PINs (Personal Identification Numbers), KeyWatcher provides unmatched flexibility. The system allows administrators the discretion to appoint one of five different levels of access for each employee.
SMARTKEYS Key Control Data from Smart Keys Keys are secured to a SmartKeys which features an identification microchip and 1/8” stainless steel locking ring for additional security and functionality. Available in several different colours (black, brown, white, grey, red, yellow, blue, and green). This allows for keys to be organised by colour, which can be useful when utilising several KeyWatchers in a facility, or designating one group of keys from another within the system.
THE INTEGRATED ACCESS CONTROL SOLUTION KeyWatcher is designed for complete interactivity with your other business systems. For example, by intergrating your KeyWatcher system with your access control system, your
For more information email: sales@astpl.com.au
KeyWatcher
®
Key Control and Management Solutions
MORSE AUSTRALIA
> Are you tired of lost time looking for keys? > Do you need to restrict access? > Do you want to control high risk areas? > Do you need to know if a key isn’t returned on time? If the answer is YES then Morse Watchmans KeyWatcher Touch is the solution. Contact Australian Security Technology on
1300 539 928 for further information
PRODUCT SHOWCASES
Centaman Entrance Control introduces a portal to better security A new range of security portals
portal. Once this check is complete,
has been launched in Australia
and any additional security checks
and New Zealand to help
have been passed, the second door
improve the safety, security and
opens to let the authorised person
efficiency of corporate offices,
into the secure area.
government buildings and other facilities. Security portals are designed
Unlike simple infrared or camera-based tailgate detection systems that only alert to
to stop people illegally entering
unauthorised entry after the
facilities by ‘tailgating’ authorised
event, security portals are
users through entrance
designed to prevent these types
control gates. They are ideal
of events from happening in the
for unmanned entrances and
first place.
provide a greater level of security
Centaman Entrance Control’s
than traditional turnstiles
new security portal range
or speedgates.
features five different products,
The company’s new range of
each with its own strengths. All
security portals are simple and
feature voice instructions to guide
easy to use, despite the impressive
users, and can be set to have both
provide continued operation in
also come with an internal
technology and security features
doors open for certain hours or
case of power failures, an internal
intercom for communication with
behind them. The first door opens
for deliveries.
anti-panic button to power down
security or reception teams. n
the last door opened so it can be
and the authorised person proceeds
The portals feature attack and
into the portal. The first door closes,
bullet resistant glass. Other safety
manually opened, and IR safety
For more information visit
and the anti-tailgating system
features include integration to
sensors to check the doorway is
www.entrancecontrol.com.au or
checks only one person is in the
the fire alarm, battery back-up to
clear before closing. The portals
phone: +61 (02) 9906 7522.
78 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry
instagram.com/securitysolutionsmag
AirKey AirKey is an innovative electronic
business, track entry and exit times,
hardware, only requiring a change
lock system, created to give users
and even remotely send temporary
of the existing cylinder for quick
cylinder including professional
simple and smart control over
access to visitors and contractors.
set up. Wall readers, IP65 padlock,
certified installation at your door,
key tags, and card readers are
the smartphone application, and
also available.
the AirKey administration account
the security of their business.
AirKey is suited to the needs
An AirKey electronic lock
AirKey is the next evolution of
of all businesses and can be
locking systems, transforming a
used to manage shared office
smartphone into a key. Available
environments, areas with regular
doesn’t require a compromise on
approximate and will vary for each
on both iPhone and Android, the
visitors or even control access to
security, with drilling and plug
customer circumstance due to
AirKey system has been designed
sensitive stock such as alcohol
pulling protection, and end-to-end
current lock set up and current door
to meet the needs of business
or medicine. AirKey is not Wi-Fi
encryption utilising technologies
hardware installed. n
owners and office managers. Using
dependant. There is no hard wiring
such as HTTPs, SSL, ECDSA, and
the online administrator, you
or cabling to the AirKey cylinder.
AES-256-bit – simply as secure as
can manage who has access to a
AirKey can work with existing door
online banking.
EVVA’s innovative system
retail for $900 inc GST. Pricing is
For more information visit www. evva.com.au or call 1300 003 882
BREAKTHROUGH IN LOW PENETRATION, SHALLOW MOUNT HOSTILE VEHICLE BARRIERS The profusion of hostile
a significant breakthrough in
achieved in this class by a shallow
permitting individual socket
vehicle attacks directed at
shallow mount HVM technology.
mount bollard. The IWA test
boxes to be swiveled, allowing
credential recorded is deemed
the bollards to follow a curved
crowded public spaces both
Based on Safetyflex’s
internationally and here in
revolutionary active spring
equivalent to;
barrier line during installation,
Australia, has drawn focus upon
steel technology, the TS9-40 was
• PAS68-1:2013 Barrier
even accommodating ‘stepping’
capacity to arrest hostile vehicles
successfully tested at the UK’s MIRA
whilst conceding the absolute
Test Centre earlier this year. The
• ASTM F2656 M40:P2
minimum penetration possible,
system conceded unprecedented
• CWA 16221 Fixed bollard V/
beyond the line of security
minimal penetration of 2.4m
defence. This is particularly
(dynamic) and 2.2m (static) for
Compounding the complexity
the extreme performance TS9-
relevant where public spaces
a shallow foundation (200mm)
of mitigating this proliferating
40 HVB system, or any of Ezi’s
expose high density pedestrian
bollard system, impacted at
risk, many assessed target
comprehensive range of perimeter
volumes. Obviously, the less
40mph by an N2A 7500kg GVW
areas are located within
protection systems, contact Rod
penetration, the less potential for
Truck. The system was certified
CBDs and cityscapes, where
Acland on 0412 120 984, rod@
human collateral.
to the internationally recognised
underground services inhibit
ezisecurity.com, or sales@
standard; IWA 14-1 2013 Barrier
deep or extensive foundations.
ezisecurity.com
V/7200[N2A]/64/90:2.4.
The TS9-40 system performs
Ezi Security Systems have just released the Truckstopper 9-40 fixed or removable crash tested bollard system, representing
securitysolutionsmagazine.com
This represents the new world benchmark in low penetration
V/7500[N2]/64/90:2.2/15.0
[N2]7500/64/90:2.2/15.0
to elegantly follow the contour of sloping surfaces. n For further information about
Alternatively visit www.
successfully with a foundation
ezisecurity.com.au or call Ph 1
of only 200mm, as well as
300 558 304
SECURITY SOLUTIONS // 79
PRODUCT SHOWCASES
FLOWMOTION®
The requirements for pedestrian barriers have changed fundamentally. The focus is no longer on barring access to unauthorised persons. It is now necessary to manage flows of persons, to automatically detect how employees, customers and visitors are moving, as well as to optimise internal processes and thus increase security. In order to meet these requirements, Magnetic Automation have left the beaten track and developed a completely new access control system – the FlowMotion® generation of products. With mDure (an innovative malleable material with a comfortable feel), a radically simplified control concept, and a revolutionary lighting solution. n For more information on the FlowMotion® generation of products visit www.flowmotion-access.com or 1300 364 864
FlowMotion® www.flowmotion-access.com
MOBOTIX LAUNCHES NEW MOVE RANGE MOBOTIX has announced the launch of MOBOTIX MOVE, a new video surveillance camera family that supplements its current portfolio allowing end customers to benefit from additional features to meet a wider range of indoor and outdoor use cases. Now available in Australia, customers are be able to obtain MOBOTIX MOVE products, which provide standards-based technology, as
80 // SECURITY SOLUTIONS
well as products with unique MOBOTIX features, from a single trusted source backed by industryleading quality and reliability. The new MOBOTIX MOVE series are the first MOBOTIX cameras to support both the ONVIF S and G profiles with video streaming at 3 and 4 MP resolution up to 30 frames per second. Available in 4 models including bullet, vandal proof
bullet and fixed dome and two speed domes; all models are PoE powered and IP66/IK10 rated for flexible deployment. “MOBOTIX MOVE is a recognition that we need to bring the same level of MOBOTIX expertise to a wider range of projects that have a specific requirement,” explains Thomas Lausten, Chief Executive Officer of MOBOTIX. “We listened to our global customers and integrators and created a new product family that delivers standards-based features while retaining the build quality, reliability and innovation that MOBOTIX is renowned for within the security and access control market.” MOBOTIX MOVE also is the first MOBOTIX camera range with motorised varifocal lenses, high speed mechanical Pan-Tilt-Zoom, Speed Domes and Wide Dynamic Range sensors at up to 4MP resolution. The built-in software offers Smart Event functions, remote zoom and focus plus iris control on Autofocus Lens. Each device includes a built-in SD card
slot and certain models have integrated IR LED illumination. The true day/night feature with integrated movable IR cut filter technology provides colour images at day time and monochrome infrared sensitive images at night. With full ONVIF support, MOBOTIX MOVE cameras can natively support the widest range of video management software and NVR devices including PTZ control, audio, multicasting and relay outputs. All MOBOTIX MOVE devices can be controlled via integrated web GUI using PC based browsers and will also be natively supported in the upcoming 2.0 version of MOBOTIX Management Center due for release in Q4 of 2018. MOBOTIX MOVE will be available from MOBOTIX distributors at the end of July and will be supported by technical training events for registered partners. n For more information visit www.mobotix.com or call +61 2 85072000.
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmedia.com/newsletter
The Evolution of Outdoor Security Protect home’s and businesses with the world’s
smartphone, tablet or PC whenever it detects
only motion-activated security camera with
motion. And from the free Ring app, users can
built-in floodlights, a siren alarm and two-way
protect their property and monitor their home
audio, so client’s can see, hear and speak to
or business from anywhere. n
anyone on their property from anywhere. Available in Black or White
With the new Ring Floodlight Cam, customers can watch over their entire property
For more information visit www.ring.com
with object and facial detection. Floodlight Cam has the most advanced motion sensors in home security. Its 270° field-of-view will let you detect motion around corners and monitor all your blind spots. Simple setup with advanced controls Floodlight Cam easily replaces existing wired floodlights and connects to standard junction boxes. With the app, you can flash the lights, sound the alarm and zoom-in to focus on your most important areas. Home Security at your fingertips Floodlight Cam sends instant alerts to a
®
™
SEAGATE SKYHAWK Your security can take many forms - receiving notifications when the children arrive home from school, monitoring your business over a weekend or holiday closure, overseeing visitor activity at schools, and monitoring hospital traffic flow and patterns to prepare medical teams to react faster. There are many scenarios and possibilities. But no matter where you implement these security systems, storage is essential as data is captured and analysed 24 hours a day, 7 days a week. Smart, safe and secure, Seagate® SkyHawk™ HDDs are engineered for 24×7 video recording. They feature 3× the workload rating of desktop drives and store over 9,345 hours of video on capacities up to 14 TB.
securitysolutionsmagazine.com
ImagePerfect™ firmware supports 24×7 surveillance-optimised workloads and Rotational Vibration (RV) sensors allow drives to maintain performance in RAID and multi-drive systems. SkyHawk™ is built to keep systems in the field longer and reduce the need for post-deployment support. ImagePerfect™ firmware delivers reliable image integrity and reduction of frame loss for 24×7 workloads up to 180 TB/year while enabling multi-stream, writeintensive workloads for SDVR and NVR. SkyHawk HDDs also provide SkyHawk Health Management (SHM) which is an embedded software designed for prevention, intervention, and recovery. SHM
helps users manage the health of the drives and provides access to data recovery services should a catastrophic event damage the drive. To provide this functionality, SHM analyses multiple parameters related to drive health and uses proprietary algorithms to determine potential effects to the drive. With this output and info on additional operating conditions, such as temperature and humidity, SHM recommends preventive actions. It may also propose specific interventions when the drive health is likely to have been affected. Finally, SHM links the user to industry-leading Seagate® rescue and recovery plans, ensuring users have complete peace of mind in using their SkyHawk drive. n
SECURITY SOLUTIONS // 81
TALL. FAST. STYLISH. Our award winning speedgates combine state-of-the-art optical technology with a high barrier height to protect your building.
EASYGATE SPT
• • • •
Barrier heights up to 1800mm Fast throughput (up to one person per second) Ideal for Disability Discrimination Act compliance Choose from a number of models, including the LX, SPT, SG, IM or LG • Custom pedestals with an array of attractive finishes EASYGATE LX
Find out which security gate is right for you.
1300 858 840
www.entrancecontrol.com.au
EASYGATE IM
FULL HEIGHT TURNSTILE
TRIPOD TURNSTILE
SWING GATE
SPOTLIGHT
DAHUA TECHNOLOGY WINS TWO NEW PRODUCT OF THE YEAR AWARDS BY SECURITY TODAY
he New Product of
in combination to deliver a single
GPU architecture that combines
the Year Award,
video stream that captures 3D
video management functions
received not one, but two New
presented by
depth in the image with 98%
with traditional video storage
Product of the Year awards from
Security Today, is
accuracy. Dual-sensor technology
operations, all in one Intelligent
Security Today, recognizing our
now in its 10th successful year. The
captures a target’s height, allowing
Video Surveillance Server (IVSS).
advancements in the field of AI.”
award program honors the
the camera to better distinguish
The H.265/H.264 backwards
Said Jennifer Hackenburg, Sr.
outstanding product development
between people and other objects.
compatible IVSS supports 4K Ultra
Product Manager. “With these
achievements of security
With two distinct functionalities,
HD resolution for recording, live
high-performing AI solutions we
equipment manufacturers whose
Line Crossing and Regional, the
viewing and playback. With an
are constantly striving to provide
products are considered
camera can count the number
integrated GPU module and Dahua
multifaceted systems that create
particularly noteworthy in their
of people crossing a defined
Technology’s advanced deep
safer environments.”
ability to improve security.
line while offering a maximum/
learning algorithms, the device
minimum height detection to help
performs powerful video structure
the Year awards in AI categories
Counting Camera offers Artificial
filter objects that are too tall or
analysis utilizing metadata to
is a strong recognition to Dahua
Intelligence at the edge by
too small. The Regional function
achieve real-time, high-precision
Technology’s achievements in
utilizing complex real-time people
counts the number of people in ten
facial analysis on up to 16 channels
the field of AI. With a mission of
counting algorithms to deliver
distinct user-defined regions. The
simultaneously. IVSS technology
“Enabling a Safer Society and
accurate flow statistics. The
3MP Dual-sensor People Counting
captures, records and categorizes
Smarter Living”, Dahua Technology
camera uses an advanced Vision
AI Camera is ideal for business
various facial features, including
will continue to focus on
Processor Unit (VPU) to deliver
reporting, while simultaneously
age, gender, expression, and
“Innovation, Quality, and Service”,
high-performance machine vision
ensuring the safety of customers.
whether the target face wears
to serve partners and customers
and visual awareness that enables
As Dahua Technology’s first
glasses or sports facial hair;
around the world. n
T
Dahua 3MP Dual-lens People
advanced applications that are
AI NVR, the DHI-IVSS7016DR-4T
compares the data to up to 100,000
impossible with conventional
256-channel AI NVR is based
faces in the database, and displays
ISPs. The dual 3MP sensors work
on high performing CPU and
real-time facial recognition data.
80 // SECURITY SOLUTIONS
“We are honored to have
Winning two New Product of
For more information visit http://www.dahuasecurity.com
securitysolutionsmagazine.com
EASYGATE HELPS POWER STAGE 1 OF HOBART’S PARLIAMENT SQUARE REDEVELOPMENT
T
he first stage of
quietest, fastest and most reliable on
Hobart’s $150 million
the market.
Parliament Square redevelopment
They have a mean time between faults of 5,000,000 operations,
project was completed at the end of
which is higher than the entire
last year with the official opening of
product life of some security gates
the 5-star Green Star Design Rating
and critical in a high-traffic, high
Salamanca Building.
security environment.
The building, which is home to
It was also important the
employees of government agencies
security solution didn’t take away
and the Department of Premier and
from the building’s sleek, modern
Cabinet, features three EasyGate SPT
design, something the EasyGate
speedgates in the main reception
SPT’s slimline design was able to
area, and integrated OTIS destination
easily accommodate.
lift control system, which supports
Centaman Entrance Control
more efficient lift allocation, reducing
General Manager Michael
crowding in cars and delays resulting
Bystram said the EasyGate SPT
from conflicting destinations.
was the ideal choice for the new
The EasyGate SPT speedgates
Salamanca Building.
are part of Centaman Entrance
“It is reliable, unobtrusive
Control’s premium range and
and offers the high-level security
boast the unsurpassed tailgate
required in such an environment.” n
detection, speed and alarm accuracy synonymous with the EasyGate
securitysolutionsmagazine.com
For more information visit www.
brand. They feature magnetic direct
entrancecontrol.com.au or phone: +61
drive motors, which are among the
(02) 9906 7522.
SECURITY SOLUTIONS // 81
SPOTLIGHT
STID MOBILE ID® - SMARTPHONE-BASED ACCESS CONTROL
American technology
smartphone. Beyond this, we have
Access rights can be assigned,
data in the reseller and end
research firm Gartner
chosen a virtualization solution
revoked and updated in real time,
customer accounts – that would
predicts that in three
that requires no compromises
meaning you can quickly create a
be a major security vulnerability.
years’ time, more
to the philosophy undergirding
short-term visitor access card, and
Our clients will remain totally
than 20% of organizations will use
your organization’s security
later recover the credits to create
independent in managing their
smartphones instead of physical
policy. Why would you outsource
another virtual access card. It’s so
security after security.
access cards. Mobile access control
your data to a third party and
cost-effective and easy to use. We
is not just about a more user-
where is the data stored? Are
offer additional web services to
friendly way of opening doors. The
you independent in managing
connect our client access control
connectivity of smartphones opens
your security? No technical or
systems and applications to our
businesses work in an ever-more
the way to new real time solutions
technological constraints should
platform. It ensures an enhanced
mobile world, with a continually
for managing mobile identity.
prevent Directors of Security
and transparent management of
increasing threat of cyberattacks.
Vincent Dupart, CEO of STid, a
from managing their systems
virtual cards.
Security is a major challenge. In
leading manufacturer of secure
independently, with the freedom
How does this platform meet
addition to the security benefits
access control solutions, tells us
to host sensitive data in-house if
clients’ aspirations to manage their
of the client’s independence in
why the right management tools
that’s what they want. We offer
systems independently?
management, all data is stored in
are required to roll out this type
our clients an Offline & Online
of solution.
management tool, which keeps
solutions on the market and
with the tightest data protection.
them in control of their security.
most people’s preconceptions
Our Online architectures comply
your STid Mobile ID® badge
That’s a key issue in our line
about cloud technology, STid
with new European regulations on
virtualization solution has been
of work!
is not looking to tie its clients
personal data protection (GDPR) and
into a particular technology.
French CNIL recommendations. The
the Online management platform
Independence operates at many
information is stored in encrypted
Vincent Dupart: Our solution
that you have launched in April?
different levels. First and foremost,
formats and all server connections
is extremely user-friendly, with a
Vincent Dupart: Innovation is
we have always wanted to respect
use the secure https protocol. The
A
Since its launch in early 2017,
highly successful. How do you explain this success?
Can you tell us a bit more about
Vincent Dupart: Unlike many
How do you secure the data stored in your Web platform? Vincent Dupart: Today’s
our server in France, in accordance
range of different identification
the cornerstone of STid’s strategy.
our clients’ value chain. Anyone will
virtual access cards are managed in
methods available – your hand
We’ve continued to work to
be able to create an account and
real time so if an employee reports
becomes a card that you always
develop a secure Web platform
associate accounts for their own
the loss of a smartphone, the mobile
have on you, even while you
which will revolutionize the way
clients (dealers and end customers),
access rights can immediately be
are making a phone call and
we manage user virtual access
without any involvement on our
revoked, before the device ends up
without needing to take out your
cards and configure readers.
part. STid has no access to sensitive
in the wrong hands. n
82 // SECURITY SOLUTIONS
securitysolutionsmagazine.com