Security Solutions Magazine Issue #115

Page 1

A U S T R A L A S I A’ S L E A DI N G S E C UR I T Y R E S OUR C E F O R BU S I N E S S A N D G O V E R N ME N T

FEB 2019 ISSUE 115

THE ROLE OF PRIVATE SECURITY

IN COUNTER-TERRORISM


Prepared to

support you

at every level.

Effective cybersecurity is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And it’s about partnering with a solutions provider who’s prepared to support you at every level. Which is where we enter the picture. We are 100% focused on cybersecurity, and we do everything in our power to mitigate its risks. We have strict requirements for our own products and we work diligently with our partners—and you—to fight this threat.

Learn about our layers of protection at www.axis.com/cybersecurity


V SA E TH E E AT D

GAIN YOUR COMPETITIVE ADVANTAGE AT AUSTRALIA’S LEADING INDUSTRY EVENT For over three decades the Security Exhibition & Conference has been the most established and respected trade event for the security industry in Australia, bringing together the full spectrum of manufacturers, distributors, security professionals and end users. Position your business and amplify your brand among the industry’s most powerful influencers. Network with the most established names, discover the latest technology and create profitable opportunities.

To book a stand contact the team Melissa Clendinen Event Manager 03 9261 4662 mclendinen@divcom.net.au

Lead Industry Partner

Abigail Ford Account Manager 03 9261 4650 aford@divcom.net.au

FIND OUT MORE AT

SECURITYEXPO.COM.AU    #SECURITY2019 The peak body for security professionals


ISSUE 115

CONTENTS

86

FEATURES

46

26 34

cover story

74

50

There are more than 120,000 licensed security guards in Australia. Security personnel are the eyes and ears on the ground; they are the day-to-day interface with the community and, when an incident does occur, they are the real first responders. Why then is the private security sector not mentioned in any of the top-level strategic counter-terrorist plans?

60

26 IDENTIFYING SOMEONE WHO MAY BECOME A THREAT

Insider threats to an organisation come from a number of sources and there is no absolute distinction that classifies someone as high risk. However, there are patterns of behaviour that can trigger a warning.

38 NEW VIDEO COMPRESSION

Internationally renowned CCTV author, lecturer, innovator and consultant Vlado Damjanovski explains HEIC and its potential future impact on IP CCTV.

56 PROVE CYBERSECURITY VALUE TO BUILD A

REGULARS 06 LETTER FROM THE EDITOR 08 LEADERSHIP

How do you apply an Enterprise Risk Management model to security?

CULTURE OF CYBERSECURITY

If you want senior executives to buy into cybersecurity, you need to prove the value cybersecurity brings to the core business. But how exactly should you do that?

68 PRISON: MILITANT JIHADIST RECRUITING GROUNDS OR REFUGE FOR REHABILITATION?

We look at issues of recruiting for violent extremism in prisons and examine vulnerabilities for prison radicalization and potential prevention and intervention strategies for the management of violent extremism in prisons.

10 CYBER SECURITY

Why does cyber security need to extend beyond the security department to be successful?

12 MARKET ANALYSIS 14 HUMAN RESOURCES

Greg Byrne examines the challenges around dismissing an employee for under performance.

16 RISK MANAGEMENT

How we can improve risk management through the use of pictures.

18 STRATEGY

Can you grow your business by helping improve your client’s sales processes?

20 LEGAL

How should you structure your business to better protect your assets?

22 THINKING ABOUT SECURITY

What are the realities of protecting people in crowded places?

30 ALARMS

Is 5G the future of intruder alarms?

34 OPERATIONS

Richard Kay examines procedures to help improve public safety around the use of firearms.

42 BUSINESS

How can you create the ultimate competitive advantage for your security business?

52 AVIATION SECURITY

Steve Lawson looks at the challenges around securing airside access.

60 CCTV

How To Minimise Roulette Wheel Motion Blur

64 PROFESSIONAL DEVELOPMENT

Why do people deliberately set fires?

74 LOSS PREVENTION 78 PRODUCT SPOTLIGHT 82 PRODUCT SHOWCASES 86 SHOP TALK

Company announcements from within the industry.

24 EVENTS CALENDAR

A look at upcoming industry events.

4 // SECURITY SOLUTIONS

securitysolutionsmagazine.com



FROM THE EDITOR FROM THE EDITOR www.securitysolutionsmagazine.com

EDITORIAL www.securitysolutionsmagazine.com

EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon

Bob Ansett, Jacque Brittain, Jason Brown, Greg Byrne, Brian Contos, Vlado Damjanovski, Rebekah CONTRIBUTORS Doley, Alex Ganin, Richard Kay,Foster, Garry Kevin Barnes,Foster, Jason Brown, Greg Byrne, Kevin Stephen Lawrence, Steve Lawson, Richard Johnson, Kay, SteveJustin Lawson, Justin Lawrence, Scott Tim Rippon, Adrian Shajkovci, Anna Silwon, Anne O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Speckhard, Lisa Alex Warren, Don Williams Anne Speckard, Sidernko, Ardian Shajkovci, Ami Toben, Simeon Votier

ADVERTISING Keith Rozairo ADVERTISING

Keith Rozairo PHONE 1300 300 552 PHONEkeith@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL keith@interactivemediasolutions.com.au

W D

hen we first launched Security

changed significantly and dramatically in the last

Solutions back in February of 1999

20 years. Terrorism has become a very real concern

under its original title Security Oz oes Australia really take security Magazine, there were around 27,000 seriously? Yes, Government claims

for the Western world, Australia included. And while Australian’s do have a very relaxed attitude we may have seen a significant increase in to security because they believe, rightly orsecurity

licensed security another to, personnel and some in ofVictoria, the corporate 33,000 ‘thereabouts’ in New South Wales, a further sector demonstrate a passing

infrastructure andhappen planning across both the wrongly, that “itspending will never here”. This corporate and government sectors, it would seem is a sentiment we can only hope remains true.

12,000 or so in Queensland and unknown interest from time-to-time, but an what of the number across the rest of the country. I say unknown average man and woman on the street? Dobecause we

that oneas of the the old country’s powerful, effective and However, axiommost states, one should available resources is still being treated as something always expect the best but plan for the worst and

these were thesecurity basic and approximate honestly take seriously or donumbers we, as awe

akin toto a drunken uncle with a proclivity for politically prepare be surprised.

were working offlip after initialtoenquiries nation, just pay service the ideato various licensing and regulatory bodies when researching the of security? sizeAsofwe theenter market withwe a view to establishing 2018, should be thankfulthe that

incorrect statements at your 16th birthday. Of course, one should notdaughter’s have to rely upon we of head into a newincident year andto new election someAs form devastating occur in cycle, is finally timeto fortake whichever party that ends order toitforce people security seriously.

viability of such a magazine. Australia has never suffered a major terrorist

up running Australia for the future to There is a great deal that theforeseeable security industry

Jonathan Rudolph PHONE 1300 300 552 PHONEgraphics@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL graphics@interactivemediasolutions.com.au

incident the likes of 9/11, the BostonPolicy bombings, Last year, The Australian Strategic Institute

can do toget educate business community about finally seriousthe about our security and, if nothing

the bombings of July 7,issues 2005related in London or the and (ASPI), which examines to defence

the benefits ofsome taking seriously. In past else, address ofsecurity the fundamental issues that

MARKETING AND SUBSCRIPTIONS MARKETING AND PHONE 1300 300 552SUBSCRIPTIONS

terrorist October 12, 2002 in Bali. national attacks security,of released a Special Report Safety in

issues Security Solutions Editor-At-Large would go a long way toward bringing the Rod private

PHONEadmin@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL AUD admin@interactivemediasolutions.com.au $62.00 inside Aust. (6 Issues)

However, a result, the Australian Numbers as – Australia’s private securitycommunity guard force and

Cowan hasindustry writteninto about security canfold, act as security thehow national security such

$62.00 AUD Aust. (6 (6 Issues) $124.00 AUDinside outside Aust. Issues) $124.00 AUD outside Aust. (6 Issues)

has become somewhat complacent with regard counter-terrorism. The report was launched on 17

a differentiator for business and give companies as a national licensing scheme and standardised

ACCOUNTS ACCOUNTS PHONE 1300 300 552

to security. I often hear manythe of our readers who October by Senator Reynolds, Assistant Minister are managers withincover largestory, corporations for security Home Affairs. This issue’s written by

a competitive edge. across the country. training requirements

DESIGN AND PRODUCTION Jonathan Rudolph DESIGN AND PRODUCTION

PHONEaccounts@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL accounts@interactivemediasolutions.com.au

PUBLISHER PUBLISHER

ABN 919463 ABN56561,606 606Joseph 919463 Blackburn, Victoria 3130 Level Level 1,34 34 Joseph St, St, Blackburn, Victoria 3130 PHONE PHONE 1300 1300300 300 552 552 EMAIL enquiries@interactivemediasolutions.com.au EMAIL enquiries@interactivemediasolutions.com.au WEBSITE WEBSITE www.securitysolutionsmagazine.com www.securitysolutionsmagazine.com DISCLAIMER DISCLAIMER

The of this this Thepublisher publishertakes takes due due care care in in the the preparation preparation of magazine and magazineand andtakes takes all all reasonable reasonable precautions precautions and makes the accuracy accuracy of of makesall allreasonable reasonable effort effort to to ensure ensure the material but is is not not liable liable materialcontained contained in in this this publication, publication, but for The publisher publisher forany anymistake, mistake, misprint misprint or or omission. omission. The does not assume any responsibility or liability for any does not assume any responsibility for any loss inaccuracy lossor ordamage damage which which may may result from any inaccuracy or use of of oromission omissionin inthis this publication, publication, or from the use information makes no no informationcontained contained herein. herein. The publisher makes warranty, any of of the the warranty,express express or or implied implied with respect to any material materialcontained contained herein. herein. The reproduced Thecontents contentsof of this this magazine magazine may not be reproduced inANY ANYform formin in whole whole OR OR in in part without WRITTEN in WRITTEN permissionfrom from the the publisher. publisher. Reproduction includes permission includes copying,photocopying, photocopying, translation translation or reduced to copying, to any any electronicmedium medium or or machine-readable machine-readable form. electronic form.

WRITTENCORRESPONDENCE CORRESPONDENCE TO: WRITTEN Level1, 1,34 34 Joseph Joseph St, St, Blackburn, Blackburn, Victoria Level Victoria 3130 3130  1300300 300552 552 1300  enquiries@interactivemediasolutions.com.au  enquiries@interactivemediasolutions.com.au 

comment on the between attitudes Don Williams, onedifferences of the original authors of the report to security in Australia and to America, they and a long-time contributor Securitywhere Solutions,

If we havewe learned anything from been tragicat least 14 To date, know that there have events have plots occurred globally in recent majorthat terrorism foiled in Australia by our various years, it must be that worldagencies has changed – law enforcement andthe security over recent

often have travelof and According tohis many provides anto outline thework. report’s finding. In security understand thatmore openingmanagers, comments,Americans Williams writes, “There are

permanently – and cannot keep pretending years. However, as we former US Secretary of Defense that it hasRumsfeld not. 9/11 wasrightly not anand isolated incident Donald once so eloquently

terrorism is a clear andsecurity presentguards danger a than 120,000 licensed in and Australia. fact of daily life and thus, they treat security No one knows the exact number, as each jurisdiction

and if groups ISIS against have their way, such pointed out, like defence terrorism requires a attacks will become There government to get itmuch right more every frequent. time. A successful

and security workers with the due respect. In has a different way of defining security operators, contrast, they believe that Australian’s have a determining who should be licensed and how.” very blasé attitude towards security and it is this However loose that figure might be, 120,000 attitude that makes us much more vulnerable is still a significant increase in the number of to attack. licensed security personnel in Australia from the In my opinion, having recently travelled ‘guesstimated’ 80,000 of two decades earlier. through Egypt and Jordan, they are correct. However you choose to count them, licensed security

is a great deal more work to be done to ensure terrorist attack only requires the perpetrators to get it that we create the kind of effective security right once. Therefore, it is reasonable to conclude that culture within organisations and the broader if hostile groups intent on causing significant harm community that will enable Australian’s to be continue in their efforts, at some point in Australia’s safe and secure. And the work must begin with future we will inevitably join the rest of the Western security professionals. Let’s make 2018 the year world in experiencing a major terrorism incident. that Australia begins to take security seriously. n When that time comes, the question must and will

personnel have come to represent a significant

be asked, “Was everything that could be done to

portion of Australia’s national security apparatus.

prevent this incident actually done?” In reality,

A 2016 Productivity Commission report puts

until significant changes are made in the way that

police numbers, as of 2018, at more than 70,000. That

government and law enforcement across Australia

would mean that there are currently almost double

view the private security sector and the contribution

the number of licensed private security operatives

it can and does make to national security, then the

than there are sworn police in Australia. And yet,

answer must be no.

according to the ASPI report, the private security

The report outlines the issues, the actual and

sector is not mentioned in any of the top-level

potential capabilities and the problems that are

strategic counter-terrorist plans. The first and only

holding the sector back from being an active

mention is in the Mass Gathering Strategy issued

participant in the national counter-terrorist plans,

by the Australian New Zealand Counter Terrorist

and presents recommendations to enable the

Committee issued in 2017.

private security industry to become a recognised and

Both this issue’s cover story and the ASPI report

effective part of the counter-terrorist capability. n

PR O

SECURIT Y

PR

RALIA LTD UST FA RALIA LTD

Official Official Partners Partners O rigin a l Siz e Original Size

PR O

Y P R OV RYI TP R O V I D I D E E RCIUT

CU

SE SE

SECURITY

illuminating. However, my point is this: almost 20

N

USTRA F SAT R A L L I A A OU IA

STRALIA LTD AU OF STRALIA LTD AU

SECURITY

O C I AT I ASS ON O C I AT I ASS O

RS

SPAAL SPAAL

read both as they are extremely interesting and

OF

OF

PR O

RS

SSOCIAT RS A IO DE N SSOCIAT VI RS A IO DE N VI

years later, I find it frustrating to find that government

D LT D LT

SECURIT Y

why this is the case, and I would encourage you to

SSOCIATI ON O SSOCIATI RS A ON DE O VI

RS A DE VI

UST FA

O

go on to outline a wide variety of reasons as to

and law enforcement across the country still espouse blue colour changed to this colour green. blue colour changed to this colour green.

COPY/ARTWORK/TYPESETTING APPROVAL COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE Please proof read carefully of this material BEFORE signing your approval to print.ALL Please paycopy/artwork/typesetting special attention to spelling, punctuation, signing your approval numbers, to print. Please pay special to spelling, punctuation, dates, times, telephone addresses etc, asattention well as layout.It is your responsibility to dates, times, telephone numbers, addresses etc,Press as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman assumes no responsibility our attention anybeen corrections. Minuteman Press assumes responsibility for bring errorstoafter a proof has authorised to print and print re-runsno will be at your cost. for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................ Signed.................................................................. Date........................

// SECURITY SECURITY SOLUTIONS SOLUTIONS 46 //

the same prejudices towards, and dismissal of, the John Bigelow value of private security in Australia. The world has Editor

John Bigelow Editor

securitysolutionsmagazine.com securitysolutionsmagazine.com


MFB are certified manufacturers of Class C and Class B cabinets including custom sizes upon request.

Nothing except craftsmanship. This has been the uncompromising tradition for more than 45 years as MFB builds its sought-after data cabinets and server/equipment racks.

DESIGNERS & MANUFACTURERS OF 19� RACK SYSTEMS

MFB’s products are practically designed and skilfully handcrafted to suit any need in any environment. And, importantly, they are made from quality materials. MFB is backed with years of experience in meeting specifications for all types of industries, matched with additional in-house quality standards and customer reporting, MFB stand proud as a leader to military, air traffic control and navy industries. MFB - an Australian Design Award recipient - is justifiably proud of its products. There is no need to accept second best.

AUSTRALIAN MADE MAKES AUSTRALIA

www.mfb.com.au

VIC NSW -

P (03) 9801 1044 P (02) 9749 1922

E sales@mfb.com.au E sydney@mfb.com.au


LEADERSHIP

ENTERPRISE RISK MANAGEMENT I

n this article, I will

Defining Risk Criteria

expand on the Enterprise

The organisation should specify the

Risk Management Model

amount and type of security risk that

and look at the process

it may or may not take relative to

as applied to security. As

objectives. It should also define criteria

readers of the previous article will recall,

to evaluate the significance of the risk

ISO31000 is the Australian Standard for

and to support the decision-making

Risk Management and the basis for

processes. Risk criteria should reflect

security risk planning, but there are other

the organisation’s values, objectives

models that can contribute.

and resources and be consistent with

COSO is an Enterprise Risk

BY JASON BROWN

policies and statements about risk

Management – Integrated Framework

management. The criteria should be

expands on internal control, providing

defined, taking into consideration

a more robust and extensive focus on

the organisation’s legal, regulatory

the broader subject of enterprise risk

and all other obligations, along with

management. It is not intended to and

stakeholder views.

does not replace the internal control framework, but rather incorporates the

Risk Assessment and Analysis

internal control framework within it;

The purpose of risk identification is

companies may decide to look to this

to find, recognise and describe risks

enterprise risk management framework

associated with security that might help

both to satisfy their internal control

or prevent an organisation achieving its

needs and to move toward a fuller risk

objectives. Relevant, appropriate and

management process.

up-to-date information is important in

COBIT 4.1 is an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. COBIT enables clear policy development and good practice for IT control throughout organisations. COBIT emphasises regulatory compliance, helps organisations to increase the value attained from IT, enables alignment and simplifies implementation of the enterprises’ IT governance and control framework. The risk management process applied to security involves the systematic application of policies, procedures and practices to the activities of communicating and consulting, establishing the context and assessing,

identifying risks. Risk assessment should be conducted systematically, iteratively and collaboratively, drawing on the

Risk Treatment

outcomes should be a planned part

The purpose of risk treatment is to select

of the risk management process, with

and implement options for addressing

responsibilities clearly defined.

risk. Risk treatment involves an iterative process of: • • •

knowledge and views of stakeholders. It should use the best available information supplemented by further enquiry as necessary. The purpose of security risk analysis is to comprehend the nature of risk arising from security and its characteristics including, where appropriate, the level of risk. Risk analysis involves a detailed consideration of uncertainties, risk sources, consequences, likelihood, events, scenarios, controls and

The risk management process for security

treatment options

and its outcomes should be documented

planning and implementing risk

and reported through appropriate

treatment

mechanisms. Decisions concerning

assessing the effectiveness of that

the creation, retention and handling of

treatment; deciding whether residual

documented information should take

risks are acceptable •

Recording and Reporting

formulating and selecting risk

if not acceptable, taking further treatment.

Selection of Risk Treatment Options Selecting the most appropriate risk treatment option(s) involves balancing the potential benefits derived in relation to the achievement of the objectives against costs, effort or disadvantages of implementation. Risk treatment can also introduce new risks that need to be managed.

their effectiveness. Preparing and Implementing Risk

into account, but not be limited to, their use, information sensitivity, and internal and external context. Over the 2019 edition, each of these process steps will be looked at in detail to assist in building your risk management process for security. n Jason Brown is the National Security Director for Thales in Australia and New Zealand. He is responsible for security liaison with government, law enforcement and intelligence communities to develop cooperative arrangements to

Risk Evaluation

Treatment Plans

The purpose of risk evaluation is to

The purpose of risk treatment plans is

support decisions. Risk evaluation

to specify how the chosen treatment

involves comparing the results of the

options will be implemented so that

risk analysis with the established risk

arrangements are understood by those

criteria to determine the significance

involved and progress against the plan

of risk. Decisions should take account

can be monitored. The treatment plan

process is often presented as sequential,

of the wider context and the actual

should clearly identify the order in which

served on a number of senior boards

in practice it is iterative.

and perceived consequences for

risk treatments should be implemented.

and committees, including Chair of

treating, monitoring, reviewing, recording and reporting risk. The dynamic and variable nature of human behaviour and culture should also be considered throughout the risk management process. Although the risk management

The organisation should define

minimise risk to Thales and those in the community that it supports. He is also responsible for ensuring compliance with international and Commonwealth requirements for national security and relevant federal and state laws. He has

the Security Professionals Australasia;

internal and external stakeholders.

the purpose and scope of its risk

Decisions should be made in

Monitoring and Review

member of ASIS International Standards

management for business security.

accordance with legal, regulatory and

The purpose of monitoring and review

and Guidelines Commission; Chair of

The internal and external context

other requirements.

is to assure and improve the quality

Australian Standards Committee for

and effectiveness of process design,

Security and resilience. As of February

is the environment in which the

The outcome of risk evaluation

organisation seeks to define and

should be recorded, communicated and

implementation and outcomes. Ongoing

2017, Jason has been appointed Chair of

achieve its objectives arising from

then validated at appropriate levels of

monitoring and periodic review of

the International Standards Committee for

security activities.

the organisation.

the risk management process and its

Risk Management.

8 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


The Cobalt is an innovative low voltage motor driven door lock for swing doors. It has been designed to secure double acting doors and addresses the two biggest issues in door locking; the ability to align a misaligned door and the ability to release when requested, even with excessive load on the door. The Cobalt successfully overcomes these issues and offers the user an array of other features. To learn more about our complete range of smart and secure access solutions, contact dormakaba.

T: 1800 675 411 www.dormakaba.com.au

More than just a lock


CYBER SECURITY

CYBERSECURITY IS EVERYONE’S RESPONSIBILITY

BY TIM RIPPON

• Do not use the same passwords for multiple applications or online accounts. • Educate employees on what websites are okay to visit and what is to be avoided. • Use due diligence online when opening emails, clicking on links or downloading attachments. • Run continual email phishing campaigns with employees who are obliged to report suspect messages to the technology team. e work in an always

effective way to reduce the number

on, digital world

and ferocity of cyberattacks. Having

security-based information

cybersecurity awareness

where we are

a sound cyber awareness program

at hand, in a timely manner?

campaign so employees become

electronically

in place helps the integrity of

For example, are they aware

aware of what they can do and

connected every minute of every

sensitive corporate information to

of current threats and

day. Company reputation and

be better maintained.

vulnerabilities or have a

A conversation with your

W

fortune is based on all employees

• Technology: Do technology have

• Have an ‘it is personal’

what to avoid.

security information and event

cybersecurity staff or consultant

and suppliers maintaining effective

cybersecurity awareness program

management (SIEM) solution for

can enhance your cyber awareness

security practices. To develop

at every level of the organisation is

timely analytics?

footprint, where the first step is

cybersecure maturity, some simple

required to effectively mitigate risks

questions are required to be asked,

relating to cyberattacks.

Therefore, a holistic

for example: 1. Do employees adhere to policies

The Executive

• Legal: Are they actively

educating your executive to sponsor a

involved with security incidents

cyber awareness program in order to

when required?

protect your digital online assets. n

At the executive level, there should

Every Employee

be regular standing security items

It is personal!

and trainer of cybersecurity and

that are actively discussed in

Often, employee online security

business continuity. He holds a certified

meetings on a regular basis. Security

behaviours at home can determine

Master of Information Security (ISO

cybersecurity practices across

should be discussed frequently and

how they operate in the work

27001), certified Master of Business

our business functions?

their endorsement of cybersecurity

environment. Hence, considerable

Continuity (ISO 22301) and Lead

initiatives is paramount to a

effort in the workplace is required

Cyber Security Manager (ISO 27032)

your executives demonstrating

successful cybersecurity program, in

to educate and raise awareness on

from PECB. Tim is actively involved in

to employees?

turn reducing the number, as well as

cybersecurity, for example:

various industry groups, including the

severity, of cyber risks.

• Keep an eye out for suspicious

Australian Women in Security Network

and good governance? 2. Are your online habits at home the same as in the office? 3. Do we ‘bake in’ good

4. What cybersecurity culture are

As agreed by most security

Tim Rippon is an author, speaker

behaviours of co-workers

(AWSN) and the Business Continuity

professionals, humans are the

Across the Business

and have an anonymous

Institute, where he volunteered for

weakest link in the information

Various essential functions across

reporting mechanism.

five years, including two years being a

security chain; hence, cybersecurity

the business have their own roles to

really is everyone’s responsibility.

play, like:

discounted anti-virus/firewall

Tim is founder and director of elasticus,

• Human resources: Are adequate

software for home use.

advising Australian-based executives

Most organisations have

• Consider offering employees

board member of the BCI Australasia.

multiple insider threats that occur

background checks in place

• Do not share passwords and

each year; therefore, the human

when employing new staff?

enforce them to be changed

disaster recovery and business

element in cybersecurity must

Is cyber awareness training

every few months.

continuity prior to the occurrence of

never be underestimated, as good

included as part of the

cyber awareness is often the most

induction process?

10 // SECURITY SOLUTIONS

• Ensure personal passwords are not used in the workplace.

on how to best manage cybersecurity,

a major disaster or crisis. He can be contacted via mobile 0417 036 026.

securitysolutionsmagazine.com


Inbuilt ÂŽ Wi-Fi , Z-Wave & 433MHz radio Quick & easy install

Control lighting, temperature + appliances

Remote monitoring & control via UltraSync app TM

Wide range of accessories

Future Proof

24x7 monitored solution

Live streaming with audio

The latest in wireless home security & automation. As the NBN rolls out across Australia, many alarm systems that utilised traditional copper-based landlines will become obsolete. ZeroWireÂŽ offers a future proof solution, utilising IP or 3G communication methods, Wi-Fi, Z-Wave and 433MHz radio to deliver a state-of-the-art security and home automation system, that can be controlled via the UltraSyncTM app on smartphone or tablet. HSS0046-Dec18-V1

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au

facebook.com/HillsLtd/ CONNECT

E N T E RTA I N

SECURE


MARKET ANALYSIS

WHO’S WHO IN AUSTRALASIAN ACCESS CONTROL BY ALEX GANIN

n this issue, we

13 most popular players in the

was second place, which went

in almost all countries around the

explore the access

market as defined by users. In order

to dormakaba. This was worthy

world and there is no reason to

control market in

to achieve this, we targeted our

of further investigation because,

expect this region would be any

Australia and New

findings on the brands that are

while dormakaba (formerly KABA)

different. The top 10 is rounded

Zealand. In order to build this chart,

being used, or at least mentioned,

regularly feature in the top 10 in

out with the usual names such as

we examined information from

by a minimum of 25 companies

most other countries, the company

Aiphone, Honeywell, HID and Assa

3,973 companies that work in the

across our respondents.

rarely makes it into the top three,

Abloy, none of whom are strangers

which makes its second-place

to the top 10 ranking in most areas of the global market. n

I

security market. Based on the

The most acknowledged

number of players in access control,

company in the Australia and New

ranking in the Australia and New

it would be almost impossible to

Zealand market was Australia’s

Zealand markets quite exceptional.

analyse the performance and

own Inner Range. Given the size

As for DSC, a third place is not going

popularity of every brand.

and strength of this company

to make market watchers looking

and so on, check the source at

Therefore, we have refined our

locally, this was interesting, but not

to place a bet anytime soon. DSC

Global market for surveillance and

research findings to include the top

unexpected. What was unexpected

regularly rates within the top five

security equipment.

12 // SECURITY SOLUTIONS

To view more brands, companies

securitysolutionsmagazine.com


Smart Vehicle Identification

Photos credits: Shutterstock - aressy.com 04/18 - 10917

New Spectre reader: Let the good go, kick the bad out. Without delay. Meet the challenge of fast-track security at your vehicle gates. Spectre’s UHF-based vehicle ID reader is the first of a new generation: discreet by design, flexible in its configuration, secure and encrypted in its communication. Our new long-range reader is built to perform for up to 4 driveways, even in highly challenging environments. It’s the most robust reader on the market, yet intuitively easy to use. Welcome to speed and security - in a single solution.

SCALABLE | SMOOTH | SECURE | AGILE | STEALTH | INSTINCTIVE

www.stid-security.com Security Meetings Trophées de la sécurité Expoprotection ISC West APS


HUMAN RESOURCES

DISMISSING AN EMPLOYEE FOR UNDERPERFORMANCE BY GREG BYRNE

O

f all the ways in which

Employers must also be aware

he is going to improve, and then both

you can dismiss an

that the ‘three strikes and you are out’

parties should sign an improvement

employee, dismissing

situation cannot be used as a base for

plan to set the employee back on

for underperformance

underperformance dismissals.

track. Often, this type of conversation

is more complicated than terminating

All employers, either in the

• accrued annual leave or long service leave entitlements • redundancy or severance pay entitlements, where applicable. Double check that you are satisfied: • the reason for the dismissal is valid • the employee has been notified of the reason and given an opportunity to respond • that the warnings provided have

will improve performance for

been recorded and signed by at

employment for inappropriate

Australian security industry or

some time; it can sometimes be a

least the employer and preferably

behaviour, fraud or theft.

not, should follow a process when

permanent fix.

the employee. If the employee

The Fair Work Commission

managing staff, including when

refuses to sign a warning, ensure

defines poor performance as, “when

managing their performance.

3. Step three

that refusal is noted on his

an employee is not doing their job

When dismissing employees for

If the conduct does not improve,

personnel file and performance

correctly, or is behaving unacceptably

underperformance, the Australian

then you need to take further action.

at work, and includes:

Human Resource Institute

Provide the employee with a formal

• not carrying out their work to the

recommends a four-step process

written warning. If this is not done,

requirements of the National

as follows:

the employee has grounds to say that

Employment Standard and that

they had no idea there was a problem,

this complying has been recorded

1. Step one

or that the issue was resolved.

on the personnel file and the

All employees should be on a

You should never assume that an

performance management plan that

employee knows there is a problem.

Organise a meeting, tell the employee

for example, telling inappropriate

clearly outlines their key performance

Staring daggers and the cold shoulder

of the reason for the meeting and offer

jokes

areas, targets, review dates and

is not acceptable employer behaviour.

the employee a support person. The

• disruptive or negative behaviour

agreed-upon milestones. This plan

The quicker you take action, the

meeting should be held in a neutral

at work, for example, continually

should be in writing and signed off

faster it will be resolved. You may

setting, such as a conference room,

speaking negatively about

by the employer and the employee.

have to provide the employee with

with at least a witness appointed

the company.

The plan should be placed in the

more than one written warning.

by you and preferably one from the

There is a difference between

employer’s file or personnel file and

Although this sounds tedious and

employee as well.

underperformance and serious

regularly reviewed at meetings. At the

unnecessary, if you end up in the Fair

misconduct.”

meeting, the employee’s performance

Work Commission it is far better to be

verbal and written in the form of

required standard or not doing their job at all • not following workplace policies, rules or procedures • unacceptable behaviour at work,

What you are asserting in a

plan • you have complied with all

management plan.

The termination should be both

against the criteria of the plan should

standing on the moral high ground

a termination letter that puts your

dismissal for underperformance

be discussed and consensus reached

than struggling to explain why the

decision in writing and explains

is that the performance of the

on how they have gone. This meeting

employee was not given an adequate

how and when final compensation

employee is poor, that you have

and outcome should be documented

chance to improve.

and benefits will be distributed.

informed them of such and they have

on the plan and filed back in the

failed to improve, and therefore there

personnel file.

Notes should be taken to document 4. Step four

the employee’s response and all of

If attempts at improving performance

these documents should be kept in

2. Step two

have failed, you can terminate

the personnel file. If all goes well,

If performance against the key

the employee. This is of course

hopefully, you will never need them.

of underperformance is very

performance areas and other

if the employee has not already

subjective (see above), which has

measurable areas of the plan is

realised that he cannot match the

might be stressful for you, it is also

in the past been open to abuse

below what is expected and agreed

requirements of the job or the whole

very stressful for the employee.

by employers who are trying to

to, inform the employee that you

situation is just getting too hard and

The Fair Work Ombudsman has

rid themselves of employees who

are going to organise a meeting. You

he resigns. This is, of course, the

repeatedly stated, “Failing to dismiss

have ticked them off, or not done

can inform him that he can have a

easy way out. If you do not manage

an employee appropriately and

a particular job in the manner or

support person present, although it is

to garner a resignation, then follow

sensitively can lead to unhealthy and

to the level that was expected.

not compulsory. Make it clear in the

this process:

unproductive outcomes that may

Or the employer imposed the

meeting that if his conduct does not

tag of underperformance to rid

improve, you may have to dismiss him.

all his entitlements, including:

themselves of an employee for

Ensure this is in writing. Post-meeting,

• outstanding wages

other reasons.

have the employee think about how

• any payments instead of notice

is no room for improvement and it is time for them to go. However, the definition

14 // SECURITY SOLUTIONS

Ensure the employee has received

One final note; although this

affect your entire staff.” n Greg Byrne is the CEO and founder of Multisec Consultancy.

securitysolutionsmagazine.com


CIRCLELOCK

TOURLOCK

SPEEDLANE LIFELINE

TURNLOCK

The full entrance security product suite Boon Edam Australia is uniquely positioned to offer a full entrance security product suite. Ranging from full height turnstiles and speed gates, through to high security revolving doors and portals, Boon Edam has your entry secured. Find out why the world’s biggest names, including Fortune 500 companies and government institutions, rely on Boon Edam for their entrance security.

ASK US ABOUT INNOVATIVE NEW LEASING PLANS AVAILABLE ON ALL ENTRANCE SECURITY PRODUCTS.

Boon Edam Australia 1300 689 905 www.boonedam.com.au


RISK MANAGEMENT

RISK MANAGEMENT WITH PICTURES

BY DR KEVIN J. FOSTER

other elements of physical security design could be included in such a standards-based graphical user interface. The building is located in a precinct; imagine zooming recently attended a

When it comes to protecting

is a great example of where such

out from the 3D building user

Standards Australia

society from terrorism and violence,

a new user interface is needed.

interface and clicking on the areas

forum that focused

any approach to improving

Imagine a 3D picture of a building

around the building to provide

on future strategies

coordination of expertise amongst

on a website that you can access

links to other standards, relevant

for standards development and

all building professionals and

on your smartphone, tablet or

legislation and references needed

dissemination. One of the

trades has to be a good thing.

computer. If you are an architect

to consider the risk and resilience

wanting to know about standards

planning for the area. This could

I

innovations that grabbed my

Most design and risk

attention was the use of images to

management standards are

relevant to blast protection

include traffic control, pedestrian

create links to standards that we all

typically in the form of a book.

options for windows, click on a

movements, planning issues and

need to use.

Traditionally, this has been in paper

window on the building and you

precinct-wide design principles

form, but most people now use PDF

are immediately presented with

based on crime prevention through

development by Standards Australia

versions of those books for ease

links to all the relevant standards.

environmental design.

is HB188, which aims to describe

of reference. Like many people, I

If you are an engineer needing to

the use of physical security for

keep a list of standards that I have

know about bollard standards for

with building and precinct

addressing the risk of terrorism and

regularly used, but I am not always

protection of the building against

design, construction and facility

violent extremism inside, outside

aware of updates to standards or

vehicles used as a weapon, then

management should be formulated

and in the surrounding precinct

the publication of new standards.

click on the picture of the bollard

using graphical interfaces. Imagine

of a commercial building. There

Also, some older standards might

outside the building and that will

the impact on multi-disciplinary

are already many standards that

be withdrawn. Up until now,

present links to all the current

design, construction and

could be used to help executives,

conducting searches of standards

relevant standards on this subject.

management coordination! n

designers and builders decide

databases has been one way to

which measures they should

try to keep on top of the changing

perimeter door in the 3D picture

consider. However, there are so

standards landscape. However, this

will provide links to standards and

managing director of Foster Risk

many standards, guidelines and

can be laborious and not always

references that detail what needs to

Management Pty Ltd, an Australian

reference documents that need to

effective. There is a need for a

be considered for the selection of a

company that provides independent

be utilised in the decision process

better user interface that guides us

security door. Clicking on a picture

research aimed at finding better

that it is sometimes difficult to

to the standards we need to read

of a CCTV camera will provide links

ways to manage risk for security and

know where to start, and very easy

and use.

to standards. Lighting, vehicle

public safety, and improving our

access, structural blast protection,

understanding of emerging threats

pedestrian access control and all

from ‘intelligent’ technologies.

A handbook currently under

to overlook important standards or industry benchmarks.

16 // SECURITY SOLUTIONS

The use of physical security in and around a commercial building

Perhaps all standards associated

Clicking on an outward opening Dr Kevin J. Foster is the

securitysolutionsmagazine.com


NEW!


STRATEGY

GROW FASTER BY HELPING YOUR CUSTOMERS SELL TO THEIR OWN BY STEPHEN JOHNSON

I

skilling your clients can be a great

Develop Assets

businesses in the

to make it very successful. The asset

way to apply leverage and help

If your clients are in similar sectors

security market, you

you bring is not money but the

them lift sales. And along the way,

but in different regions, then the

sell to other

knowledge of how they can better

it will lift your sales to them.

marketing collateral you build

f, like most

businesses rather than consumers, you might be forgiven for thinking

And it can take very little money

is probably similar. So you can

spend their own money. You can win in at least two ways

Benchmarking

transfer it between clients with

you have little control over the

and sometimes three:

If you sell to a lot of different

little customising. This means

consumption of what you sell;

1. You win more sales.

companies, in different territories,

you have marketing assets you

because the performance of your

2. You win more clients.

then you can consider taking what

can repeat.

clients’ businesses plays a key

3. And, if you help your

you know works in one place and

factor in the performance of your

resellers, then you win better

applying it to another. You can also

Develop Systems

own. For example, you can only sell

brand quality.

help clients measure themselves

Borrow from the franchising model

against similar but non-competing

and develop the processes that use

as many cameras to your client as your client can sell to his or

Here is how you can help your

companies, and help them improve

your assets, like campaigns and

her customers.

clients and profit from doing so:

what they do and how they do it.

sales models, and enshrine them

This is not an expensive exercise.

in ways that make it easier for your

Your marketing, selling and retention of old customers might all

Collateral And Execution

It simply makes better use of what

clients to consistently get it right.

be very healthy. But if your clients

If your own team can generate

you already have access to.

This makes the process you build

are not doing as well, all you can do

marketing and selling collateral

is stack them up with your product

for you, like brochures, ads and

and wait.

scripts, then they can also generate

Retention, Database And Social Media

it for your clients. Most companies

If your clients have adequate lead-

Develop Training And Community

to help your customers sell more.

do not adequately represent

generation and lead-conversion,

Train your clients in how to use

This applies whether they are

themselves in their online, printed

you might be able to help them

your marketing and sales aids and

reselling your product or they are

or scripted materials and they do

keep their customers longer or

help them network. Become a

just consuming what you sell them

not execute campaigns very well. If

obtain more post-sales from their

builder of a community of kindred

as they sell their own.

you can improve both sides of the

customers. Retaining clients can

companies in non-competing

marketing multiplier – the message

be hard and getting clients to refer

sectors or regions and you will

and selling skill-set above your

and the efforts that take that

others or increase their spend with

build your own place in the

clients, you can take these skills

message to market – then you can

you can also be difficult if you do

industry. n

and inexpensively apply them for

achieve a lot for your clients with

not know how. So applying your

your clients.

minimal effort. They still cover the

knowledge to your clients can

Stephen Johnson is a Director

hard spend. You simply make that

help them leverage their wins,

of Strategy and Action, a business

spend more effective.

and boost their consumption of

strategy and marketing consultancy

your own product or service along

serving Brisbane, Sydney and

the way.

Melbourne. Stephen has created

So a strategy you can adopt is

If your company has a marketing

If it sounds like a lot of effort, and like a rather indirect way to grow sales, think again; this is a highly

once, work many times more.

leveraged way to increase business.

Sales Conversion

Your conventional marketing efforts

Some companies do not fail in

are a ‘push’ strategy. But helping your

their lead-generation but in their

efforts truly profitable is to bottle

growth strategies for companies

clients can create a ‘pull’ strategy by

lead-conversion. They fail to close

what you do so that you can roll it

from most sectors in Australia.

increasing their demand for what you

sales as well as they could. Using

out to more clients, faster, for less

He can be contacted at info@

sell them.

your company’s sales skills and up-

effort. You do this in three ways:

strategyandaction.com.au

18 // SECURITY SOLUTIONS

The way to make all these

and executed breakthrough

securitysolutionsmagazine.com


YO UR AC CES S TO REVO LUTI O N

FlowMotionÂŽ

For more information | 1300 364 864 | info@magnetic-oz.com | www.flowmotion-access.com |


LEGAL

STRUCTURING YOUR BUSINESS TO PROTECT YOUR ASSETS BY JUSTIN LAWRENCE

any people own their

Pty Ltd – then even if the business

own businesses, but

is sued, Callum has shielded the

life, Callum should undertake an

and the contributions are for

this is a mistake. At

lease from the firing line as best

asset protection risk assessment.

consistent and reasonable amounts.

this point, you are

he can, and the business will still

As part of that assessment, Callum

Similar strategies exist if the

probably asking yourself what I am

have premises from which to trade.

should ask himself what the most

risk assessment reveals matrimonial

talking about. People should not

If Callum is the sole director and

important thing is that he is trying

breakdown or claims against

own businesses in their personal

shareholder of Callie Dude Pty

to protect and who represents the

estates as Callum’s most pressing

capacities. Businesses should be

Ltd, then the company will take

greatest threat to that asset.

asset protection issue.

owned not by the proprietors of

whatever steps Callum directs

them, but by other people or

anyway, so he does not lose

protection structures may protect

things now will greatly assist

entities who are separated from the

any control.

assets from creditors, but not from

Callum – and his business – in the

matrimonial breakdown. Some

long run. n

M

day-to-day operation of the

Similarly, the business name

At any time during its trading

For example, some asset

the early days of Callum’s business

Giving some thought to those

business. But how do business

of Callum’s Security Distribution

structures may protect assets from

owners structure themselves

should also be held by an entity

matrimonial breakdown, but may

appropriately? Here is a bit of an

other than Callum. Ideally, Callum

not protect from claims brought

with Henderson & Ball Solicitors,

action plan.

would have a separate company

against Callum’s estate after he

5 Wellington St, Kew, Victoria, and

that owns the business name

dies. Once Callum has undertaken

practises in the areas of Commercial

should be registered in the name

– that is, a company other than

his full assessment, he can structure

Litigation, Criminal, Family and

of a company or other entity. Take,

Callie Dude Pty Ltd. Then, even

and plan his asset protection risk

Property Law. Henderson & Ball

for example, Callum’s Security

if the company holding the lease

strategy. Let us look at one of those.

have Law Institute of Victoria

Distribution. Now, Callum is a

is wound up or liquidated, the

young go-getter full of ideas about

business name would be kept free

has assessed his own personal

of Business Law, Property Law and

how to turn his standalone, shop

from claims.

bankruptcy as his greatest threat. To

Commercial litigation. Mr. Lawrence

start with, Callum should not own any

and Henderson & Ball can be contacted on 03 9261 8000.

For starters, the business name

Let us assume that Callum

Justin Lawrence is a partner

accredited specialists in the areas

front operation into a multi-state,

When Callum’s Security

fully franchised operation. Callum

Distribution buys materials and

assets of significance. His house and

intends to lease modest, yet

supplies, it should do so under a

car should not be in his own name. As

comfortable, premises in a semi-

name other than Callum’s private

a proprietor of a business, Callum’s

taken to ensure its accuracy, the

industrial part of the city and to

name. Given that the business

assets are best held in the names

information contained in this

throw his doors open for business.

name is owned by a company, that

of others (even though Callum will

article is intended to be used as a

name could do. However, in an

be advised that holding his home

general guide only and should not

named on his lease? Not Callum,

ideal world, a new company would

in the name of a company will have

be interpreted or taken as being

that is for sure. Why? Because at

be set up for that purpose. That

tax consequences which would not

specific advice, legal or otherwise.

this stage, the business is Callum. If

company – let us call it Callum

otherwise apply if the house was in

The reader should seek professional

something happens to Callum – he

Security Pty Ltd – would apply

his own name). If he can manage it,

advice of a suitably qualified

is sued or he is in a car accident

for credit, issue purchase orders

Callum should pay as much money as

practitioner before relying upon

and is unable to keep working or

and pay invoices on behalf of the

he can afford up to the threshold into

any of the information contained

pay the rent – then anyone chasing

business. If, for any reason, the

his superannuation fund.

herein. This article and the opinions

the business for money will chase

business had insufficient funds

If, despite his best efforts,

Callum. If he loses that fight, he is

available to pay creditors, then

Callum is made bankrupt, he can

opinions of the author and do not

a good chance to lose the business

Callum Security Pty Ltd would be

prevent the money paid into his

necessarily represent the views

and the lease.

the entity sued for the money. At

superannuation fund being clawed

or opinions of Australian Media

the same time, the business name

back by his trustee in bankruptcy.

Group Pty Ltd or any advertiser

the name of a separate entity – let

and lease would be quarantined

While this strategy is limited, it can

or other contributor to Security

us call his company Callie Dude

from that law suit.

be effective if it is put in place from

Solutions Magazine.

Who should be the tenant

If, however, the lease is held in

20 // SECURITY SOLUTIONS

Whilst every effort has been

contained in it represent the

securitysolutionsmagazine.com



THINKING ABOUT SECURITY

POOH AND CROWDED PLACES BY DON WILLIAMS

W

innie-the-Pooh has

Why else would there be all

consequence table and therefore,

the reality of such attacks, then

such an ability to see

these reviews and guidance on

makes the resultant risk rating

we can show owners how they

and state the true

terrorism and crowded places

unacceptable. As a result, most

can continue to operate and

nature of things that

unless it was to guarantee a safe

assessments would recommend

manage the risks in a realistic and

environment? We know better.

the activity not occur. We saw

practical manner.

Benjamin Hoff has likened him to a Taoist Master. Perhaps the ability to

We can restrict the ways in

this when local councils looked at

It may not be palatable;

identify and explain that which is

which an attack can be launched,

cancelling ANZAC Day events last

owners and operators (and the

obvious but not always recognised

and we can limit the size and

year. Of course, if the business

public) may want to hear that they

is something we should develop.

speed of a vehicle that can enter

relies on crowds, then closing

are protected and no one will die

a crowded place. We can limit

down is not an option. How can

from an attack in a crowded place,

at the moment on protecting

the size of an explosive item

we provide effective and accurate

but the simple truth is that they

crowded places. Should we, as

brought into an area. We may be

risk assessment?

will. To pretend otherwise and to

security specialists, point out

able to search people to prevent

that we cannot. We can reduce

There is a lot of emphasis

Perhaps we need to point

work with risk assessments that

weapons being introduced. But,

out that if the incident being

avoid this fact is delusional and

the attack vectors and we can

the nature of the event, the built

assessed is an attack in a

not helpful.

put measures in place to limit the

environment, the ‘image’ of the

crowded place, then multiple

number of fatalities, particularly

site and the willingness of the

injuries/fatalities will occur.

inner Pooh and be willing to see

those that may die later. What

owners, operators and patrons all

The ideal consequences would

and state the obvious. n

we cannot do is stop someone

limit the likelihood controls. We

be no fatalities, but medium

from entering a public place and

can also look at how the site will

consequences – for this type of

committing an atrocity.

respond after an incident; what

incident – would be multiple

is a recognised thought leader in

Perhaps we should access the

Don Williams CPP RSecP ASecM

Somebody has to state the

consequence mitigation measures

casualties and high end/

security, emergency management

obvious; there appears to be a

are in place to limit the loss of life

unacceptable consequences

and related disciplines. His book

perception, or perhaps a desire,

and to prevent further deaths?

would be additional post-

Bomb Safety and Security: the

incident fatalities.

Manager’s Guide is available from

by the public and even elements

One of the biggest problems

within government that everyone

is how we assess risks. Normally,

If we are willing to adjust

can be protected everywhere.

a fatality is at the high end of the

the risk definitions to match

22 // SECURITY SOLUTIONS

Amazon. Don can be contacted via email donwilliams@grapevine.net.au

securitysolutionsmagazine.com


Intelligent security solutions from Dahua Technology Discover Dahua, a world leader in video surveillance, offering high value total security solutions to safeguard assets, communities and infrastructures.

now available at Hills! Unified Management Platform Video Surveillance

Unified UnifiedManagement Management Platform Platform Video VideoSurveillance Surveillance

Unified Management Platform Video Intercom Video Intercom

Video Surveillance - Advanced video collecting and analysing - Wide coverage w/o blind angle

Video Surveillance Video Surveillance

Unified Management Platform Unified Management Platform

- Advanced video collecting and analysing - Advanced video collecting and analysing - Wide coverage w/o blind angle - Wide coverage w/o blind angle

- High reliability with low running cost - High reliability with low running cost - Scalable and customisable - Scalable and customisable

HSS0031-July18-version 1

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au

facebook.com/HillsLtd/ CONNECT

E N T E RTA I N

SECURE

- High reliability with low running cost - Scalable and customisable

Video Intercom Video Intercom - Support both IPIP and Analogue - Support both and Analogue - Attractive design - Attractive design


EVENTS

for industry professionals to protect their organisations and clients from both physical and cyber threats. CSE provides holistic solutions for today’s connected organisations. Working with SIA, ISC West also features world-class education to learn about every facet of the security industry. Visit www.iscwest.com for more information.

PNG Security Congress 4–6 March 2019

register.html to register your interest

use technology and data to better

Security Exhibition & Conference 2019

Port Moresby, Papua New Guinea

or email info@sectecpng.com for

understand and manage their

24–26 July

Now is the time to plan to attend a

more information.

building performance.

International Convention Centre,

Visit www.sectecpng.com/

world-class security and technology

and strategic advice on how to

For more information visit

conference and exhibition – SecTec

Total Facilities

PNG Congress.

20–21 March 2019

www.totalfacilities.com.au.

Darling Harbour, Sydney In 2019, the Security Exhibition & Conference is heading back

International Convention Centre,

ISC West

and professionals will converge

Darling Harbour Sydney

10–12 April 2019

on Port Moresby, PNG, in March

Total Facilities is a two-day live

Sands Expo Convention Center,

Conference is the industry’s annual

2019 for the first Oceania premier

experience and celebration of ideas,

Las Vegas

opportunity to reunite for three

security industry event, with a

connections and opportunities for

ISC West is THE largest security

days of quality networking and

security conference and exhibition,

the nation’s FM and building-related

industry trade show in the U.S. At ISC

unrivalled education alongside a

real-world challenges presented and

communities. With an exciting new

West, you will have the chance to

showcase of the most innovative

a glimpse into the future of global

Smart Zone featuring innovative

network with over 30,000 security

solutions to the Australian

security integration and trends.

start-ups, lively speaker discussions

professionals through New Products

market. For over three decades,

and the very latest FM solutions,

& Technologies encompassing

it has been the largest and most

electronic security and safety

as well as exclusive leadership and

everything from access control to

established commercial event for

solutions for aviation, banking,

networking events, Total Facilities

unmanned vehicles from over 1,000

the security industry in Australia,

infrastructure, industrial sites,

is the most valuable and rewarding

Exhibitors & Brands.

bringing together the entire

mines, commercial buildings,

destination for anyone in the FM &

residential towers, building and

CRE industry.

Security industry specialists

The Congress will feature

development; the best of the best in

Our 2019 event will feature a

In 2019, ISC West will

distributors, security professionals and end-users to connect

• new products and technologies,

and create unparalleled

• intelligent CCTV, access control

hub of technological innovation

encompassing everything

which presents new technologies

from access control to

and solutions to help you create

unmanned vehicles.

solutions

smarter, greener buildings. The new

supply chain of manufacturers,

attractions including:

Smart Zone designed as a thriving

• advanced video surveillance

The Security Exhibition &

offer attendees a host of

world class offering: and alarms systems

to Sydney.

• Unmanned Security Expo,

business opportunities. The entire team is looking forward to once again reuniting with more than 4,500 security

• intelligent traffic solutions

zone offers visitors a dedicated

introduced in 2017, is an event

professionals and over 150 leading

• asset management systems

environment to look for integrated

within ISC West focusing on

suppliers. The 2019 show is set

• drone capability

and cloud-based solutions to

unmanned aerial vehicles (UAVs),

to see some interesting new

• software cyber management

improve operations and deliver

unmanned ground robotics and

innovations as well as a host of

business value.

vehicles (UGVs), and the various

new attractions.

solutions • innovative video intercoms

According to industry research,

• large enterprise systems

IoT technologies will be more

• mechanical locking integration

pervasive in smart commercial

software and applications that support them. • Connected Security Expo (CSE)

Make sure you put the dates in your diary. We look forward to seeing you again in Sydney in

buildings than anywhere else over

moved to the ISC West show

2019 for the Security Exhibition &

• emerging technologies.

the next three years. This zone

floor in 2017! As the digital

ASIAL Conference!

Do not miss out! Schedule, budget,

is designed to deliver visitors

and physical worlds collide,

plan to be there and stay informed.

seeking industry-class solutions

it is increasingly important

with electronic security solutions

24 // SECURITY SOLUTIONS

Visit securityexpo.com.au for more information. n

securitysolutionsmagazine.com


THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.

NEW!

ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.

+61 (3) 9544 2477

email: oz_sales@takex.com

HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.

BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.

INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.

OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .

1300 319 499 csd.com.au www.takex.com

TAKEX AMERICA

VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta


FEAUSRE

IDENTIFYING SOMEONE WHO MAY BECOME A THREAT

INSIDER ATTACK PREVENTION

26 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


BY DR LISA WARREN

With the advent of the World

Ideological motives based on

Wide Web in 1993, the workplace

politics, culture or religion are an

changed forever. Traditional

increasing concern, arising when

methods of work have been

people are influenced by extreme,

replaced by sophisticated software

often highly right-wing views.

and communication technologies,

Radicalisation may occur

and companies are much more

where employees become

exposed to external scrutiny. The

sympathisers of extremism and

modern workplace heaps pressure

cause threats to staff safety, the

on employees, mental health

security of protected data and IP,

has become more complex and

and business continuity. Explains

companies are exposed to more

Dr Lisa Warren, “Radicalisation

risk vectors than ever before.

can take several forms, such

With this massive growth in

as condoning violence against

technology comes a rise in the

particular targets, or adopting

vulnerabilities around storage

more extreme and radical

of intellectual property (IP).

views. This becomes the basis

Cybersecurity threats to data

and justification for criminal

and IP can severely compromise

activity perpetrated against an

an organisation and do serious

organisation.”

damage to brand credibility.

Insider attacks include data theft, malicious software

Identifying an Insider Threat can be Critical for Risk Avoidance Insider threats to an organisation

securitysolutionsmagazine.com

downloads that halt or delay critical systems, violence, as well as blackmail and extortion. “It pays to be aware

come from a number of sources

of employees who hold

and there is no absolute

particularly strong and fixed

distinction that classifies someone

views that set them apart from

as high risk. However, there are

the organisational culture,

patterns of behaviour that can

particularly when their colleagues

trigger a warning.

report feeling apprehensive or

SECURITY SOLUTIONS // 27


FEAUSRE

fearful of them. When these

or hers. In one case, Dr Warren

destroy the reputations of

this should be raised with line

fixations are about the responses

provided threat management for

individuals and companies.

management, security or HR.

they are planning for the

an organisation targeted for many

injustices they perceive from

Fixation behaviour involves

As well as a potential violation

years by an ex-employee who

the situation where an employee

of code of conduct, such views

their employer this should also

believed he was unfairly dismissed

keeps bringing a conversation

can be a behaviour that signals

herald concern. These employees

six weeks into the probationary

back to a defined grievance, which

the person is on a pathway to

justify in their minds how the

period of his employment.

is a sign that he is stewing on a

violence,” explains Dr Warren.

company has done badly by them,

Poor psychological health

particular topic or problem.

This also relates to changes in

thereby justifying an attack on the

can be a root cause of this over-

organisation as a way of evening

interpretation, as individuals

is another sign that can lead

an employee changes his or her

up the ledger.”

become fixated on one aspect of

to internal threats. “We all say

personal identification quite

their life and work to the point

something about who we are

rapidly, such as shaving their head

for example, may incite an attack

where it consumes them. In cases

and who we identify ourselves

and getting tattoos, or dressing in

based on the person’s perception

where the individual is fixated

as by the way we dress, the jobs

a military style in the workplace.

that a company has polluted

on his workplace grievances, a

we choose and how we interact

the environment, or someone

dip in performance or something

with others. This extends to what

with very strong societal beliefs

not going according to plan may

we do with our time outside the

might have a grievance based on

result in grudges and attempts to

workforce and the views and

What Drives most Crimes against an Organisation?

a company using child labour in

strike out against the company.

attitudes that we describe to

Ultimately, the majority of

developing nations.

Social media, Dr Warren explains,

others. However, if you notice a

crimes against an organisation

can provide a place to vent, seek

colleague starting to talk about

are motivated by the common

involve something as simple

confirmation from others – many

a particular, often divisive topic,

factor of money. Embezzlement

as missing out on a promotion

of whom have no knowledge

such as radicalised religious

is a frequent form of attack and,

someone thought was clearly his

of the situation – and publicly

groups, politics or violence, then

in many cases, is motivated by

Environmental extremism,

Over-interpretation may

28 // SECURITY SOLUTIONS

Identification behaviour

behaviour – for example, where

securitysolutionsmagazine.com


“Cybersecurity threats to data and IP can severely compromise an organisation and do serious damage to brand credibility.”

risky situation, identify the

into human resources and

threat and nullify it with as

mental health strategies

little fuss as possible. A threat

in workplaces.

management approach is both

The two sectors leading the

restorative and educative and

way in Australia are police forces

more effectively sets clear

such as Queensland Police and

boundaries and expectations,

the Australian Federal Police

reducing persistence and violence

(AFP), who have developed

risks more effectively than a

Fixated Threat Assessment

punitive approach.

Centres, and universities who utilise threat management in

Becoming Proactive rather than Reactive towards Insider Threats from the IT space is important

Three Steps towards Recognising and Mitigating the Risk of Insider Attack

as well, as it allows a company

1. Provide organisations with the

Moving the discussion away

to evaluate threats at the source

opportunity to expand their

and become proactive.

definitions of insider threats

A collaborative response

an addiction to gambling. This can involve the theft of data, files or anything that can be

• Are there warning behaviours in this situation? • Where are the opportunities

their Safer Community teams.

to cover all circumstances

between policing, security and

where current or former staff

forensic mental health addresses

have taken a more radical

risk in many situations, from

position in their attitudes, and

counterterrorism to workplace

use this as a justification for

violence to family violence. “Aggressive employees can

any problem. 2. Broaden what constitutes

sold or passed on for monetary

for triaging risk, preventing

be supported to understand

a high-risk individual and

gain. Stealing to feed a gambling

escalation and managing

the harm they have done to

couple this with a strong

addiction is not limited to any

the threat to negate it

themselves and others by their

set of rules and corporate

particular demographic, but can

before it becomes a force in

behaviour, and have structures in

be both male and female, involve

the organisation?

place so that they do not choose

3. Take a boundaried, educative

problem behaviours in future.”

and stepwise rather than

older and younger workers, and not necessarily be tied to employees at the lower end of the pay scale.

What Steps can an Organisation take to Recognise the Danger Signs? Warning signs, or trigger

What Measures should an Organisation take to Mitigate the Risk of Insider Attack?

Large organisations in the

governance.

punitive approach, letting

US have for decades employed

decision makers know what

forensic mental health and

areas to be concerned about,

threat assessment experts to map

then allowing the organisation

A code of conduct is a very

out risk mediation solutions and

to form ideas based around

important tool for an enterprise

proactively protect employees

that knowledge and the

to include in its security and

and the organisation. This has

company’s own ideologies. n

risk plan. “A code of conduct

begun in Australia, but is less Dr Lisa Warren presented

allows an organisation to hold

well-developed. Dr Warren

behaviours for rogue employees

people accountable for problem

believes it is only a matter

at the 2018 ASIAL Security

is an area where psychologists

behaviour, rather than punishing

of time before Australian

Conference, held at the Security

examine violent threat assessment

them for it. Punishing problem

companies look routinely at

Exhibition & Conference. For more

and ask the questions:

behaviour has never worked.”

threat management as a means

great insights like this, secure your

• What are the factors that

It is critical to provide

of de-escalating insider threats

tickets to this year’s conference at

should cause concern?

the right tools to approach a

by building threat management

securityexpo.com.au

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 29


ALARMT

IS 5G THE FUTURE OF INTRUDER ALARM SYSTEMS? BY ANNA SLIWON

30 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


of 5G offering much higher

can be compromised in a number

speeds and connection stability,

of ways, which is why IP is often

the United States in 2017 had a

Advances in Communication Technologies

the technology could open the

used as a back-up communication

ripple effect on the market for

Advances in telecommunications

opportunities for more product

channel to the primary

intruder alarms, mostly affecting

technologies are making intruder

and system innovation.

GPRS channel.

the sales of control panels

alarm systems more versatile, by

and communicator modules.

increasing the speed and stability

The Role of 5G

Things (IoT) for both residential

With many traditional systems

of communications between the

Traditional intruder alarm

and commercial applications,

using 2G or public switched

sensors, control panels and alarm

systems have relied on PSTN and

devices equipped with 5G-capable

telephone networks (PSTN) as

receiving centres. However, the

General Packet Radio Services

chipsets can offer superior

alarm signal communication

rate of adoption of the latest

(GPRS) communication for

battery life and much lower

paths ahead of the shutdown,

communication technologies in

signal transmission. With the

power consumption in wired

the impending mobile network

the intruder alarm industry has

heightened demand for signal

systems. This functionality

re-farming required upgrades

been quite slow.

transmission capacity, due to

is crucial to reducing overall

increasing use of video cameras

system maintenance costs,

The shutdown of the 2G network in both Australia and

to intruder alarm signalling

While 4G connectivity has

In the world of Internet of

modules. The increased rates

been available since 2009, 4G

with security systems and the

increasing their longevity and

of equipment replacements in

communicators were not used

growing number of sensors

guaranteeing signal transmission

the immediate run up to the

frequently with intruder alarm

installed in an average system, an

stability that is far superior

shutdown date resulted in a much

systems until recently. Pockets

alternative communication path

to existing technologies.

smaller replacement market

of data sent from traditional

was required: Internet Protocol

In residential systems, the

in subsequent years. In fact,

intrusion systems are small,

(IP) communication performed

benefits of longer battery life

according to the latest IHS Markit

requiring little bandwidth for

that role. While this protocol

and improved transmission

research on the global intruder

transmission, but as more devices

has been implemented in a vast

capability could enable live video

alarms market, shipments of

– especially video cameras – are

number of systems around the

verification of intruder alarms

control panels sold to the United

added to intruder alarm systems,

world, IP connectivity depends

on a wider scale. In commercial

States market will experience a

the demands on alarm and

on the strength and stability of

systems, 5G connectivity could

compound annual decline of 4.9

signal transmission capacity

the internet network supplied to

support deployment of smart

percent from 2017 through 2022.

will also grow. With the promise

the home or the building. These

buildings that aim to improve

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 31


ALARMT

the environmental footprint

lead to postponement of country-

other building systems, or with

other systems, IP communication

of commercial buildings,

wide rollouts, which will make

high-security applications.

has already met the demand

while delivering the benefits

investment in 5G technologies

of automation.

for intrusion systems riskier

alternative to 3G and 4G

technologies. The ultimate test

for manufacturers that do not

communication paths, particularly

for 5G in intruder alarm systems

technologies in enabling real

prioritise 5G in their home

for feature-rich systems that

will be around the question

interconnected environments and

markets. International markets

integrate video devices. Higher

of whether 5G is necessary to

to leverage big data. While the

may instead offer an opportunity.

resolution cameras require better

accomplish the capabilities of

bandwidth, before they can send

modern and future intruder

5G could accompany cloud

cloud has enabled the processing

5G technology is only

5G provides a more capable

for alternatives to cellular

of large data sets from a variety

beginning to roll out in certain

sizeable images through the

alarm systems. However,

of building and home systems,

countries and its full potential

network. However, transfer of

embracing the opportunity

5G could greatly speed up the

has yet to be realised. Any IoT

large amounts of data through

for innovation, which 5G can

transmission between systems,

device or a security system

cellular networks is likely to

offer, could help make future

while improving connection

equipped with 5G-capable

result in higher data costs to

intrusion systems more efficient

stability. These benefits are

chipsets will likely see a

system owners.

and capable.

particularly important to high-

steep price increase before

security applications where the

the technology can become

through 5G networks will be

costs of unsent or delayed signals

mainstream, like 3G and 4G. For

enormous, which has strengthened

could be very high.

end-users to accept a significant

existing concerns about the

Intruder Alarms and Monitoring Services Database

price increase, the comparable

cybersecurity of big data and the

This 2018 study provides an

Too Early to Tell?

functionalities offered by

potential for misuse or breaches.

assessment of the intruder

5G is still at a very early

these systems would have to

adoption and deployment stage.

be significantly higher than

Current global coverage of the

The volume of data transferred

alarm and monitoring market, including significant trends over

those currently offered. In the

Opportunity versus Need

4G network is not universal,

residential sector, these offerings

5G could be the technology that

provides detailed estimates of

as certain countries only have

might only resonate with more

offers the best of all available

market revenue and shipments

partial coverage. This lack of 4G

savvy users of intruder alarms

communication technologies to

from 2016, with a base year of

coverage reduces the popularity

– primarily those who are

the security industry. However,

2017, and forecasts through

of this frequency for alarm

interested in advanced ultra-

the regulations covering

2022. It also estimates the market

communication, since the service

smart home security systems. In

intrusion systems in many

share of major suppliers in each

offered by 5G-ready equipment

commercial systems, 5G benefits

countries require dual-path

product category. n

may not work.

may be more readily realised in

communication for ultimate

smart buildings that integrate

confidence in a system’s ability

intruder alarm systems with

to send out alerts of intrusion. In

Significantly higher deployment costs on a national level may

32 // SECURITY SOLUTIONS

the next five years. The report

Anna Sliwon is an analyst with IHS Markit.

securitysolutionsmagazine.com


VIDEO DOESN’T HAVE TO BE EXPENSIVE TO BE EFFECTIVE

With years of experience across hundreds of clients, let us show you how we can help you generate more business than ever before. enquiries@interactivemediasolutions.com.au


OPERATIONS

FIREARMS AND PUBLIC SAFETY:

OPERATIONAL GUIDELINES AND PROCEDURES

BY RICHARD KAY

Certain operational roles in public safety mandate the requirement for a lethal force response, issued in the form of a firearm. Depending on the role, the firearms are usually limited to small arms only in the form of handguns and longarms. With the provision of firearms comes the necessity for appropriate training and regulations governing the issue and use of these operational tools. If operational personnel decide to undertake job roles that require a lethal force option, they have an obligation to be highly competent in the use of that tool, which includes appropriate knowledge and skills for the safe and professional use of that tool in an operational context (as opposed to simply a training context). In the first instance, the burden of

34 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


responsibility falls to the individual

parts and either by one or more

user to survive the operational

than one person.

environment, physically and legally. This information aims to

A prohibited person means a person who is serving a term of

• handgun: stored in a locked

training with firearms, keep

steel safe of a thickness that is

the firearm in good operating

not easily penetrable

condition and use correctly fitting

• longarm: stored in a

equipment. Use mechanical

imprisonment for an indictable

receptacle constructed of

safeties, but do not rely on

outline the basics of firearm

offence, assault or an offence

hard wood or steel that is not

them entirely.

guidelines, functions, safety

under the Drugs, Poisons and

easily penetrable

considerations and justifications

Controlled Substances Act, or who

for operational use. It is not

is subject to an intervention order.

designed as a definitive source

• ammunition: stored in a

General Safety Rules

locked container separate

A firearm should be considered

from the safe in which

loaded at all times. Never leave a

firearms are stored.

firearm unattended and always

or a replacement for proper

Authority

training as required by agencies

A person may be issued a firearms

If the receptacle weighs less than

store a firearm correctly in line

and regulators.

licence for the occupation of

150kg (empty), it must be fixed to

with regulations.

security guard or prison guard,

1. Regulations

the frame of the floor or wall of

for target shooting, for an official,

the premises in such a manner

alcohol or drugs. By law, a person

Definitions

commercial or prescribed purpose

that it is not easily removable

must not carry or use a firearm if

A firearm means any device,

or for a purpose authorised by an

and locked with a lock of sturdy

that person is under the influence

whether or not assembled or in

Act or regulations. The applicant

construction when any firearms

of intoxicating liquor or a drug.

parts and whether or not operable

must demonstrate the purpose

are stored in it. Where more

or complete or temporarily or

for which the licence is required.

than 15 firearms are stored on

finger discipline to prevent an

permanently inoperable or

Security or prison guards must

a premises, an effective alarm

unintentional discharge. Officers

incomplete, which is designed

hold a licence under the Private

system that complies with

should keep their finger off the

or adapted to discharge a shot

Security Act 2004 or be a prison

Australian standards must be

trigger until the firearm is on

or a bullet or other missile by

officer and produce evidence

fitted that, in the event of an

target and they intend to fire.

the expansion of gases produced

that they perform duties as a

intrusion, activates an audible

The fingers may clench when

in the device by the ignition of

security or prison officer. Target

alarm warning device and

they are startled, under extreme

strongly combustible materials or

shooters must be and continue

external visible alarm warning

stress, about to lose the firearm

by compressed air or other gases,

to be a member of an approved

light. The key to the firearms

in a struggle or if they are

whether stored in the device in

firearm target shooting club.

storage receptacle should be

destabilised. The proper position

pressurised containers or produced

Official or commercial purpose

carried by the licence holder or

for the trigger finger off trigger

in the device by mechanical means,

applicants must produce evidence

kept securely in a separate room

is on the frame of the firearm,

or which has the appearance of

that the licence is required for

from the receptacle when it is not

outside the trigger guard. The

such a device.

that purpose.

being accessed.

finger should be off trigger when

A handgun means a firearm

Do not mix firearms with

Always ensure trigger

drawing or holstering the firearm,

A firearms licence must not

that is reasonably capable of being

be issued if the applicant or any

2. Firearms Safety

moving with the firearm drawn,

carried or concealed about the

responsible person in relation

Safety is the most important

or conducting reloading or

person, or is reasonably capable of

to the application is a prohibited

aspect of firearms handling.

rectification procedures.

being raised and fired by one hand,

person, under 18 years old, not a

Accidents with firearms do not

Always ensure muzzle

or is not more than 65cm in length

fit and proper person and if not

just happen, they occur if two

discipline to maintain a safe

measured parallel to the barrel.

there is information as to criminal

factors are present at the same

direction, which is the direction

activities. Further, it must be seen

time – an unsafe condition and

that if the firearm was to

that the applicant can possess,

an unsafe act – and result from

discharge there would be no loss

carry or use a firearm without

carelessness and failure to use

of life, no injury to people and

having a bullet or other projectile

being a danger to public safety or

commonsense. A firearm is

minimal damage to property.

and a priming device fixed to or

peace, has satisfactorily completed

capable of inflicting serious

enclosed in a cartridge case which

a course of firearms safety and

trauma, and the handler is

firearm correctly, being open

is composed wholly or partly of

can comply with the storage

responsible for the consequences

(breech exposed) and empty (no

material other than paper.

requirements set out by or under

of using the firearm.

ammunition in firearm) with

A longarm means any firearm other than a handgun. Cartridge ammunition means

Safety precautions should be

Always pass and receive a

Possession includes actual

the Act. Finally, the issue of the

physical possession of the firearm,

licence must not be against the

carried out at all times – when

receiver) and muzzle facing down

or custody or control of the

public interest.

passing and receiving a firearm,

(safe direction).

firearm, or having and exercising

the butt forward (grip towards

before and after storage, before

Dry firing is the practice

access to the firearm, either solely

Storage

handling or cleaning a firearm,

of pressing the trigger on an

or in common with others.

The general storage requirements

and before and after practice.

unloaded firearm. The key

for firearms and ammunition are

Always wear appropriate

consideration for dry firing is

as follows:

protective equipment when

safety, to ensure the firearm is

Carry includes the carriage of a firearm either as a whole or in

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 35


OPERATIONS

not loaded. Circumstances when dry firing may be appropriate

• fire: firing mechanism moves forward, shot discharges

operation only, linear and

Double action is generally safer,

rotational forces, trigger/cylinder/

as the effects of stress on the

include pre-duty inspection

• unlock: breech opens/unseals

hammer connected, round

trigger finger in causing an

(function test), practice (trigger

• extract: case exits breech

in breech is not round to fire,

unintentional discharge are less;

control), range clearance (ease

• eject: case exits firearm.

manual extraction and ejection.

however, the larger trigger press

Pistols have a slide, slide lock,

in double action can result in a

Firearms do not accidentally

recoil spring, magazine, external

less accurate shot.

discharge, presuming the

safety and decock mechanism

3. Mechanical Operations

firearm is properly serviced and

(some models), combination of

the working parts moving

maintained. Accidental discharge

mechanical and gas operation,

forward from a cocked position

Understanding the firearm

relates to the mechanics of the

linear forces only, round in

to discharge the shot. A key

is important in being able

firearm itself, independent of

breech fires, automatic extraction

consideration for single action

to handle it safely and use it

the operator. For a firearm to

and ejection.

is safety, as there is less trigger

effectively. Officers should

discharge it must be properly

spend time familiarising

maintained and functioning,

Firearm Actions

the firearm, an important factor

themselves with the parts and

loaded with ammunition and

The two types of firearm actions

under survival stress; however,

functions of their duty firearm.

have the trigger pressed (cf.

are double and single. These terms

the smaller trigger press in

Maintaining operational

unintentional discharge which is

describe the stages the working

single action can result in a more

functionality starts with

operator related). The only time a

parts move through before

accurate shot as there is less

understanding the components

firearm should discharge is when

releasing the firing mechanism

movement of the firearm.

and functions.

the operator makes a conscious

for discharge.

Firearm Functions

choice to do so.

springs) and cleaning (function test, ease springs).

There are eight basic functions of

Revolvers and pistols differ

Single action involves

pressure required to discharge

Double action involves the

Firearm Procedures

working parts moving to the

The principles for manipulating

a firearm:

both in terms of parts and

rear to cock and set the firing

firearms are the same regardless

• load: cartridge enters firearm

functions. Revolvers have a

mechanism, and then moving

of technique. Use consistent

• feed: cartridge enters breech

rotating cylinder, cylinder release

forward to discharge the shot. It

methods that work under stress,

• lock: breech closes/seals

latch, extractor star, exposed

requires a heavier trigger press

and tactile indexing to locate

• cock: firing mechanism moves

firing pin (some models), no

with the firing mechanism starting

gear and handle the firearm

external safety device, mechanical

from a non-cocked position.

without taking eyes off the subject.

rearward

36 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Irrespective of the situation,

such as defective magazine or

to life, where real means the

justified, there may be innocent

ensure safety procedures.

cartridge, double feed and empty

threat actually exists and

bystanders beyond the intended

in the chamber.

impending means threat to life is

target, and the presence of these

happening now.

people may cause officers to hold

An emergency reload is done when an officer has fired all

Regardless of the procedure,

the rounds and therefore must

use cover if available or

reload to stay in the fight. It is

remain mobile, remain aware

sole intention is to stop the real

can penetrate several interior

a tactical necessity. A tactical

of the threat and surrounding

and impending threat to life.

plasterboard walls, and some

reload is done when an officer

environment, and maintain

There are no circumstances for

bullets can pass through exterior

has fired some rounds and wants

trigger and muzzle discipline.

firing warning shots, because

walls and retain enough energy

to top up the firearm back to fully

Carrying several reloading

officers are responsible for every

to injure someone on the

loaded. It is a tactical choice.

options not only provides more

projectile; warning shots may not

other side. Duty ammunition

shots, it also clears malfunctions

stop the threat to life and there is

with good stopping power but

are four that can malfunction

that bind the firearm action.

no regulatory discretion for this

low penetration capability

and cause the firearm to stop

Be aware that it may not be

option. If any doubt exists about

is preferable.

working correctly – failure to

ammunition-related, but a

being justified in using a firearm,

feed, fire, extract and eject.

mechanical malfunction.

officers should not draw the

justified in some situations when

Officers should know possible

If officers are unable to

firearm at all.

the real and impending threat to

causes of these malfunctions

rectify an issue, consider

and procedures for rectifying

tactical disengagement from

Target Engagement

shot and requires subsequent

them so they can keep their

the situation.

The process of target

shots to stop it. After firing each

engagement, when a subject

4. Operational Use

shot, officers must assess the

poses a threat to life and the

situation to determine if the real

is done if the firearm fails to

The use of a firearm depends

officer discharges his firearm

and impending threat to life is

discharge when the trigger is

on the assessment of the threat

to stop the threat, involves

continuing. It can be difficult

pressed initially. For revolvers,

posed by a subject and the

four stages:

to count the number of shots

pressing the trigger again allows

circumstances. Where there

• perceive: incoming data

fired under stress, and officers

the firearm to bypass that

exists a threat to life, officers may

from the five senses alerting

should ensure they do not shoot

cartridge and rotate to the next

be justified in using potential

officers to a potential threat

the firearm dry because of a

functional one. For pistols, use

lethal force. For officers to justify

tap/rack to clear problems such

discharging a firearm they

the threat as real and

in an armed confrontation with

as improperly seated magazine,

need to demonstrate that other

impending

multiple subjects, officers should

defective round, stove-piped

options were not appropriate

casing, slide not in battery. These

for adequate safety and control,

procedures can be performed

either for themselves, those in

quickly in most situations.

the vicinity, or both. Totality

and gaining sight picture on

justify their actions and possibly

Though best done behind cover,

of circumstances will be

the threat.

prove in court that the threat

they can be done swiftly enough

considered in the aftermath to

for officers to render a firearm

test if other alternatives were

The point of aim should be the

Even if lethal force is justified,

operable while staying in the

more appropriate.

centre of seen mass, because

officers may choose not to shoot

smaller targets may be missed

because of a danger to others.

Justifications

and officers are accountable for

The use of the firearm comes

is used when a primary

It is important for officers to

every shot, and a minor target

down to personal assessment of

rectification fails to fix the issue

differentiate between use and

may not stop the threat to life.

the situation and the risk level

and is effective in clearing

discharge of a firearm. Use is

most malfunctions that are not

exposing, indicating, touching,

beyond. If officers intend to

cleared by the primary method.

drawing and aiming the firearm

discharge their firearm, they

For revolvers, conduct a tactical

in response to officer assessment

must be sure that they have

reload, preferably behind

of a perceived threat. Discharge

properly identified their target

internationally certified tactical

cover, and check the firing

is pressing the trigger causing

and know what is behind it.

instructor-trainer, Director

pin if possible to eliminate the

the firearm to fire a bullet. The

Verbal challenges should be used

and Senior Trainer of Modern

possibility that it is damaged and

justifications for discharge are

to help identify a questionable

Combatives, a provider of

not striking the primer properly.

as a last resort, when innocent

subject, and in poor light

operational safety training for

For pistols, use drop/work/tap/

persons are not in danger, and

use illumination to clearly

the public safety sector. For

rack to clear malfunctions not

in reasonable self-defence to

identify a potential threat. In a

more information, visit www.

cleared by the primary method,

a real and impending threat

situation where shooting may be

moderncombatives.com.au

Of the eight functions, there

firearm operational. A primary rectification

threat zone. A secondary rectification

securitysolutionsmagazine.com

In discharging a firearm, the

their fire. Modern ammunition

Multiple shots may be

life continues after the preceding

• recognise: actually identifying

• decide: cognitively choosing an appropriate response • act: presenting the firearm

panic reaction. When engaged

engage the subject who poses the most immediate threat to life. Officers are required to

to life was real and impending.

Always know the target and

posed by the subject. Lethal force means lethal consequences. n Richard Kay is an

SECURITY SOLUTIONS // 37


FEATURE

38 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


The New Video Compression In Your Pocket

BY VLADO DAMJANOVSKI

Most people aren’t even aware of the fact that they have a new method of image compression sitting in their pocket that will likely become the future of IP CCTV. The questions that need to be answered are, what is it, how does it work and why is it so much better? The latest iOS on your Apple smartphone and iPad includes a new method of image compression inside the camera functionality. If you take pictures and then view them on the smart device itself, you probably won’t notice anything unusual. However, when you export these images to your computer, you may notice a new file format with an ‘HEIC’ extension as opposed to the traditional ‘JPEG’ of years gone by. The HEIC extension refers to a compression method known as High Efficiency Image File Format (HEIF). This is a component of the new High Efficiency Video Compression (HEVC) standard, popularly known in the CCTV industry as H.265. The HEIF (High Efficiency File Format) is a new image compression format developed by the MPEG imaging experts in 2015. It is now used by Apple as a default image compression in

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 39


FEATURE

their latest iOS operating system

smart devices to use the “Most

the advantages, and reasons,

processors now supersede their

(starting from v.11). Google is

Compatible” format (under the

for switching to it. Another

capacity on a daily basis.

planning to include the same

Settings > Camera > Formats)

advantage of HEIC is its ability to

method of compression in their

which will re-set the image

compress a sequence of images

a JPEG compressed image, the

latest Android OS.

format back to JPG. It is worth

(like a ‘burst shot’ function

typical ratio file size ration is 1:2

noting that professional photo

when taking ‘live pictures’

for the same image quality.

a form of image compression

editing software, like Adobe

with your iPhone). You can

that involves compressing both

Light-Room, have already come

also save auxiliary data, such

image from an iPhone, which

horizontal and vertical pixels

up with an HEIC plug-in.

as the depth map used in Face

(depending on the content)

Cam when unlocking your

would occupy around 2~3MB in

The HEIC format refers to

in still images, making it two

JPEG compression has existed

When comparing an HEIC with

This means, a standard 12MP

dimensional. The HEVC format

since 1992, and as such JPG

smartphone. Depth map is also

JPG, will only be around 1~2MB

refers to a video compression

decoders are embedded in all

useful in image processing with

using HEIC to compress the same

which deals with motion images

known software which needs to

dual camera smartphones,

visual quality.

(three-dimensions: horizontal x

decode JPG images, such as web

where digital blurring of the

vertical x time) and sound.

browsers, word processors, and

background is performed by the

smartphones for picture taking

The HEIC file format can be

Most people today use their

email programs. Since HEIC is a

software processing, simulating

on a daily basis on all occasions,

decoded by newer operating

very new form of compression,

a narrow depth of field effect for

privately and professionally, this

systems, beginning with Mac

when sending the HEIC image

more appealing portraits.

requires a large amount of data

OSX High Sierra (v.10.13), Mojave

file as an email attachment,

(v.10.14) and Windows 10 (v.1803

the latest iOS operating system

compression uses 16-bit colours,

that many iPhone users always

and later).

automatically converts it to JPG.

instead of 8-bit colours as used

need extra space on their devices.

Since the new compression

This function will eventually be

with JPG. This makes colour

However, with the update to the

formats are very new, some users

made redundant once the HEIC

images with gradual colour

latest operating system, they can

may find it challenging to open and

becomes more common.

transition, like blue sky, appear

take more pictures and videos, on

smoother and more natural;

the same device, consuming much

edit such photos or videos with

HEIF not only increases the

Furthermore, the HEIF

space. This is the main reason

their default (older) photo-editing

efficiency, but also the quality

blocky artefacts – typical to JPG –

less space, yet offering the same

programs on their computers.

of the compression algorithms.

become less obvious.

image quality.

In the Mac OSX, this can

As the name suggests, the ‘high

Admittedly, there is a price

For illustration purposes,

be done automatically by the

efficiency’ coding means that

to pay for such an increase in

I have prepared some screen-

native Preview app, while for

for the same picture quality you

efficiency in HEIC compression,

shots of the ViDi Labs test chart,

Windows a dedicated machine,

would get from JPG compression,

and that is more number

compressed in JPG and HEIC

software needs to be installed.

the HEIC would be a much

crunching, and more coding and

format. The images are made

Such programs are iMazing or

smaller file size.

decoding processing. With more

with a ‘standard’ 12MP 1/3 sensor

modern, super- fast processors,

of an iPhone7 using a ‘standard’

this is hardly noticeable as

4mm lens.

Apowersoft Photo Viewer. It is also possible to switch the

40 // SECURITY SOLUTIONS

Saving space with the HEIC file format is only one of

securitysolutionsmagazine.com


The ViDi Labs test chart in TIFF format (16-bit) = 43.4MB uncompressed!

The ViDi Labs test chart in JPEG format (8-bit) = 2.4MB

The small detail crop. Please note the reasonably sharp numbers 2 and 1 on the right hand side.

The small detail crop. Please note the blurred numbers 2 and 1 on the right hand side.

For comparison, I have also

many small details and after

TIFF format of the same test

careful inspection I could not

chart using a special iPhone

see any difference, between

software that allows for an

the JPG and HEIC files, despite

uncompressed image.

them being 2:1 in file size. There

The uncompressed 12MP

The ViDi Labs test chart in HEIC format (16-bit) = 1.2MB

The ViDi Labs test chart has

produced an uncompressed

is a tiny bit visible difference

image produced in 16-bit RGB

between the TIF file and the JPG

colour space TIFF format occupies

and HEIC, where the TIF looks

around 43.4MB of data.

slightly sharper, as it would be

The equivalent JPG produced

expected (being uncompressed).

of the same test chart image was

This is shown further in the

around 2.4MB. This is nearly

cropped pictures.

20x smaller than the TIFF! It is

Offering such data saving,

not surprising that users prefer

there is no doubt that HEIC will

JPG compression rather than

soon be used in the modern IP

uncompressed TIFF format, for

CCTV cameras. n

very little loss in quality. The equivalent HEIC format is

The small detail crop. Please note the numbers 2 and 1 on the right hand side, although blurrier than the TIFF image, appear slightly sharper than the JPEG format.

securitysolutionsmagazine.com

Vlado Damjanovski is an

literally half of this, 1.2MB, and

internationally renowned CCTV

it is almost impossible to notice

author, lecturer, innovator and

any loss of detail compared with

consultant. He can be reached via his

the JPG.

company website www.vidilabs.com

SECURITY SOLUTIONS // 41


BUSINESS

HOW TO CREATE THE ULTIMATE COMPETITIVE ADVANTAGE BY STEPHEN JOHNSON AND BOB ANSETT

42 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


It is tough times if your company is

To get a quick aerial view, the

must engage in either surveying

not winning and keeping enough

first stage is to align your promise

or interviewing your customers.

customers. There are two common

to your market. To achieve this,

If you engage a third party to run

blockages that get in the way: a

you are going to flesh out three

the research, you will probably

weak promise to your market or a

pieces of information: your

get more and better answers, but

weak delivery of your promise.

market’s needs, your competitors’

you can also consider anonymous

messages and your company’s

online data entry or reply forms.

what your market really wants,

strengths. From these, you will

What you want to draw out

then the first blockage is removed.

virtually ‘triangulate’ the most

is what your customers want,

But if you do not deliver on that

compelling promise, or unique

and whether or not they are

promise, they will not repeat and

selling proposition (USP), for your

currently getting that from you or

your reputation could slide. So, if

company to take to your market.

your competitors.

If you can lift your promise to

you go further and align your team

The second stage is to align

The second exercise is

to deliver it, the second blockage

your company to that USP. You

competitor research. In this

is removed.

will take your team through how

exercise, you want to learn how

you arrived at it. Then you will

your competitors are positioning

promise to market and then

show them how they directly

themselves. While there are

company to promise is the key to

contribute to the fulfilment of that

great analytical tools that the

getting a powerful competitive

promise and help them link their

right consultants can deploy,

advantage. We call this process

very performance to it.

there is a simple analysis you

This double alignment of

Company-Customer Alignment. Let us put this strategy into action.

The first task is to set up a

can try yourself. There are three

project team of key department

‘value disciplines’ a company can

heads to guide this program.

pursue as their focus: customer

Having them involved from day

intimacy, product leadership and

one gets their buy-in to what can

operational excellence.

be a pretty big change. This team

Customer intimacy is about

can bring in consultants to do any

knowing the customer better

of these exercises, but that team

than others. That company may

must be confident in the method

not have the best product and is

and outcomes, because they will

probably not the cheapest, but

need to own the result.

they are competing around the

The first information is market research. You want to learn five

idea of “We know you better”. Product leadership is about

key ingredients from a selection

supremacy of the product or

of customers, lost customers and

service. It will not be the cheapest

potential customers:

and the company may not be the

1. What do they like about you

most customer friendly, but it

and your competitors?

competes around the idea of “We

2. What do they not like?

are the experts and our product is

3. What risks and worries do

the best quality”.

they have when considering a

Operational excellence is

product or service like yours?

about value and consistency. It

4. How do they research

will not be the best or the most

and how do they make a

customer intimate. This company

buying decision?

is saying “We are reliable, great

5. What would they like that no one has offered yet?

value and efficient”. So, identify your main competitors and read through

Do not fall into the trap of

other collateral. In here will

the answers to these questions

be words, phrases and claims

based on past experience. Things

that point to their hidden

change. Markets change. Needs

value discipline.

change and fears, expectations and requirements change. You

securitysolutionsmagazine.com

their websites, brochures and

believing you already know

If your market research shows that customers want their

SECURITY SOLUTIONS // 43


BUSINESS

needs better understood but your

are failing to adequately claim,

USP. It will pay to have already

that every customer has a ‘My

competitor research shows your

and which you could deliver? The

prepared some guidance for

Needs’ form filled out for them.

competitor is talking about how

answer is the raw material behind

‘blank moments’ as some people

Administration might need orders

great their expertise is, you might

your new USP.

may not see it at first. You might

processed within 60 minutes of

You might learn that your

all find that the warehouse team

receiving them.

customers want their special

contribute to the ‘today’ promise

When you then manage and

gathering is to learn your

circumstances understood better

by ensuring widgets are in stock.

reward, the very fibres of the skin

strengths, weaknesses,

and they want a faster delivery,

Sales people may contribute

of your employees are directly

opportunities and threats. This

that your competitors are too busy

to the ‘right’ promise by better

tied to the delivery of a new

is a classic SWOT workshop. In

shouting about their expertise

understanding customer needs.

promise... and that promise came

particular, your objective is to list

and that your team has greater

Your administration staff might

directly from the mouths of your

what your key strengths are, those

customer relationship skills. Your

contribute to both of these by

customers. Your company and

factors that are unique to you and

marketing people can turn this

fulfilling client orders, invoices

your customer are aligned. n

not shared by your competitors.

into a bite-sized USP. They might

and communications accurately

already be uncovering a gap. The third information

A SWOT analysis can be

Stephen Johnson is a

come up with: “Get the right

and quickly. Eventually, every

facilitated by consultants, but

widget for you, today, instead of

individual can find a way in which

Director of Strategy and Action, a

you can also run your own

the best widget for somebody else,

they contribute to part or all of

business strategy and marketing

SWOT. Bring in a selection of

tomorrow”.

your company’s promise.

consultancy serving Brisbane,

participants from across your

Sydney and Melbourne. Stephen

So, you have got the first

Whether or not you had

company and work through the

part of your Company-Customer

position descriptions (PD) with

has created and executed

strengths, exhaustively. Do not

Alignment achieved and, because

key performance indicators, you

breakthrough growth strategies

apply judgement. Just brainstorm.

you have gone through the right

will need them for this second

for companies from most sectors in

Then, when you have a good list,

process, the second stage is made

stage of Company-Customer

Australia. He can be contacted at

apply judgement and remove the

much easier.

Alignment. Each person needs

info@strategyandaction.com.au

strengths that are vague, incorrect or wishful.

Your project team should be

a PD that includes how they Bob Ansett is the founder of

familiar with where you landed

impact the company’s promise

With these three core pieces of

and how you got there. Their job

and what their minimum

Bob Ansett Marketing, a consulting

information, create three columns

is now to pass that story on. They

specific achievements need to

firm in the field of customer

on a whiteboard with your project

need their teams to understand

be. For example, warehouse

service. Bob is also a familiar

team and summarise the three

the objective of the exercise, the

and procurement staff might

name in Australian business,

information exercises into bullet

process, what the discoveries were

need to ensure between three

synonymous with Budget Rent a

points. Then, look for the factors

and how it led to your USP. Then,

and five days’ worth of all

Car, which he established in 1965.

in common: What does your

teams need to workshop the ways

widgets are in stock at any one

Bob can be contacted at

market want that competitors

in which they directly impact that

time. Sales may need to ensure

bob@bobansett.com.au

44 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Pedestrian and Vehicular Access Control Automation

FAAC Simply Automatic Modular automation solutions

HUB Parking Technology Smart and flexible parking solutions

Magnetic Automation Pioneering access control solutions

Experts in Access | Discover the FAAC Group range of products at J14 | www.faacgroup.com


COVER STORY

THE ROLE OF PRIVATE SECURITY IN

COUNTER-TERRORISM BY DON WILLIAMS

There are more than 120,000

services. The government, the

licensed security guards in

private sector and the public rely

Australia. No one knows the exact

on security guards to protect them

number, as each jurisdiction

and their assets.

has a different way of defining

Why then is the private

security operators, determining

security sector not mentioned

who should be licensed and how.

in any of the top-level strategic

Also, some practitioners have

counter-terrorist plans? The first

licences in more than one state

and only mention is in the Mass

or territory and, of course, not all

Gathering Strategy issued by the

security personnel are, or need to

Australian New Zealand Counter

be, licensed.

Terrorist Committee issued

Security personnel are the eyes and ears on the ground; they are

46 // SECURITY SOLUTIONS

in 2017. The Australian Strategic

the day-to-day interface with the

Policy Institute (ASPI), which

community and, when an incident

examines issues related to

does occur, they are the real first

defence and national security,

responders: moving people away,

released a Special Report

observing, reporting, applying first

Safety in Numbers – Australia’s

aid and briefing the emergency

private security guard force and

securitysolutionsmagazine.com


securitysolutionsmagazine.com

SECURITY SOLUTIONS // 47


COVER STORY

counter-terrorism. The report

The authors gathered

government representatives

they provide a deterrent through

was launched on 17 October by

information, guidance, opinions

believe the guarding sector

their presence, maintaining

Senator Reynolds, the Assistant

and advice from representatives

is well represented; industry

checkpoints, conducting bag

Minister for Home Affairs. The

of security services providers,

leaders disagreed.

screening and so on.

report outlines the issues, the

clients, government, law

actual and potential capabilities

enforcement, regulators,

The ASPI report found:

and generally have an intimate

and the problems that are

recognised leaders in the security

“The private security manpower

knowledge of the normal comings

holding the sector back from

sector and representative

sector plays a significant role in both

and goings at each site. They’re

being an active participant in the

organisations. Strong common

preventing and responding to critical

uniformed and easily recognisable.

national counter-terrorist plans

themes emerged, which are

incidents, including terrorist attacks.

They’re trained, albeit to

and presents recommendations

reflected in the report. All

Private security staff provide

varying levels, and can provide

to enable the private security

submissions were unattributed.

industry to become a recognised

There was a strong divergence

They’re already on the spot

the ‘eyes, ears and hands’ before

a cordon or direct people

any attack and an ability to be

away from dangers. They

and effective part of the counter-

of opinion on how involved the

first responders after any security-

understand command and control

terrorist capability. The report

private security industry was,

related incident.

and communications.

is downloadable from the ASPI

specifically the guarding sector, in

By observing non-routine

They’re used at large public

website (www.aspi.org.au).

counter-terrorist planning. Some

behaviour and unusual objects,

gatherings such as major sporting

48 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


events, community festivals,

National and jurisdictional

actions that relate to CT, the current

(including government) of guarding

celebrations and special events,

forums for addressing counter-

lack of appropriate and consistent

providers often seek the lowest

such as the Commonwealth Games.

terrorism (CT) include venue

training, the lack of consistent ‘fit

prices, often below award rates,

Private security also provides an

owners and operators, but the

and proper’ person requirements,

without consideration of the

important and significant presence

providers of guarding services

the poor pay, general low esteem

quality of service provided.

at public transport hubs such as

aren’t always at the table.

and inconsistencies between

airports, railway stations and

Given the many thousands

shipping ports as a line of defence

of men and women working

and deterrence.

around the clock every day in

There are, however, pockets of

jurisdictions limit its ability and full

excellence where private security

potential in this role.

is fully integrated, trusted and

Governments have failed to

delivering effective security

In manpower numbers, the

every type of private, business and

provide consistent definitions, ‘fit

outcomes, but multijurisdictional

private guarding industry is much

community facility, it’s critical to

and proper’ person tests, training

inconsistencies and poorly

more significant than the police or

recognise their efforts in helping to

requirements and monitoring of

delivered training remain

military. The security industry has

prevent attacks and responding to

training for the guarding sector,

key problems for the security

more than double the personnel

security incidents.

especially in the area of terrorism

guarding workforce.

of Australia’s combined police

While the guarding services

preparedness and response.

agencies and permanent Australian

workforce is expected and may

Based on wide stakeholder

Defence Force.

even be contracted to carry out

consultation, it’s clear that clients

securitysolutionsmagazine.com

A nationally consistent vetting, training and licensing system would greatly enhance the ability of

SECURITY SOLUTIONS // 49


COVER STORY

licensed security officers to identify, prevent and respond to critical incidents and hostile threats, such as terrorism.� As the ASPI report found, the key limitations on the security industry are jurisdictional legislative and regulatory inconsistencies, variations on who is a ‘fit and proper’ person to be a security officer, poor training standards and a lack of respect and appreciation due to the guarding sector being perceived as an entry-level, easily accessible job with limited or no career progression. The ASPI report makes seven recommendations: 1. The private security guarding sector should be engaged in relevant national and state forums that consider counterterrorism. 2. A federal Security Industry Authority should be established as a statutory authority. The authority would control, record, monitor and enforce the licensing of identified elements of the private security sector. 3. Consideration should be given to formalising additional powers for suitably trained security officers to enhance their ability to contribute to counter-terrorism capabilities. 4. Law enforcement agencies should be encouraged to liaise with the private security sector and have representatives from the sector address training courses to explain their functions and powers. 5. Training courses should include material on recognising suspicious behaviour associated with pre-incident terrorism activities and how and where to report suspicious activities. 6. The security guarding sector should consider a career

50 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


progression model for

on the guarding sector of the

responsible for the protection

security officers.

industry, to improve the probity,

of Australia’s national

associations not only

competence and skills of security

infrastructure, resources,

represent their members

should better monitor and

personnel and the mobility of

population, finances and

but also provide a basis

enforce training standards

security industry licences across

day-to-day and long-term

for practical research

within the licensed

jurisdictions’.

operations. Very little of the

and the accumulation of

country’s assets remain in

expertise and experience.

Council for Police and Emergency

government hands. These

Organisations such as

The ASPI report suggests that the

Management to undertake further

professionals are expected to

ASIS International and the

way ahead is to establish a federal

work on minimum regulatory

hold relevant qualifications,

International Association

Security Industry Authority

standards for the technical sector

certifications, experience,

of Venue Managers (IAVM)

(SIA). The functions of the SIA

of the industry by mid-2009, as

professional affiliations

have tens of thousands of

would include:

well as proposals for a possible

and recognition. For them,

members worldwide and

• the integration of the private

national system for security

terrorism is one of many threat

have sub committees looking

industry licensing by mid-2010.”

vectors that they address, not

at means of protecting

in isolation but as part of an

from and responding to

enterprise-wide responsibility.

terrorism. These associations

7. State and territory regulators

guarding sector.

security manpower sector into Australia’s counterterrorism strategy • ‘fit and proper’ person

“COAG asked the Ministerial

To date, nothing has happened and the ASPI report observes,

• Professional and industry

• Government relies on advice

should be seen as sources of

progress and the absence of

from the professional end of

information to government.

• training development and

COAG leadership, it would be

the private security sector

monitoring of delivery

unfortunate if change were to

and academia for guidance

standards

occur only in the wake of a crisis.”

in relation to countering

that the private security industry,

definition and assessment

• external confirmation of

“Given the current rate of

The ASPI report concludes

terrorism. In general, the

specifically the guarding sector, is a

the authors discovered that the

expertise does not reside

vital piece of the national security

Australian New Zealand Counter

within government. Few

puzzle that has not been identified

promulgation of additional

Terrorism Committee (ANZCTC)

government employees

or put into play. The main

counter-terrorism awareness

is also undertaking a review of

hold protective security

limitation is the disparity between

and training information.

the private security sector and

specific qualifications or

jurisdictions, which results in

its role in counter-terrorism. It is

internationally recognised

different vetting requirements,

The report notes that there are

understood the ANZCTC report

certifications; even fewer

training and licensing. Since the

existing federal vetting, licensing

is due to be delivered in the

are members of the relevant

report was released, it has been

and verification systems in place

second quarter of 2019. It will be

professional institutes with

read by government agencies

which could be used as models,

interesting to see what it finds and

access to the available research

at state and federal level and

for example: the Civil Aviation

recommends and whether the

and resources.

has generated discussion. It is

Safety Authority’s (CASA) licensing

report is classified and, if so, why.

testing and competencies • the development and

While researching the report,

of pilots and of the training assessment system; the licensing

The ASPI report concentrates

• Engineering developments,

hoped that governments will pay

in relation to protection from

attention to the report and that

terrorist incidents, are largely

the industry will be improved so it

of certain classes of maritime

on the guarding element,

developed by the private sector

can more effectively fill its role in

operators by the Australian

acknowledging that it is the

with support from academia.

protecting Australia.

Maritime Safety Authority (AMSA);

largest part of the private

Sometimes, the development

and the aviation and maritime

security sector and the one that

results from government

in this article are the views of the

security accreditation systems.

Caveat: the views expressed

is where the boots meet the

request or is (partially) funded

author and not those of ASPI or

ASPI was not the first to

ground. The report recognises

by government. Many of the

any other organisation. n

consider the issues facing the

that the private security sector

developments come from the

private security guard sector.

is a “continuum with the guards

private sector as they identify

The ASPI report noted, “Previous

on the minimum wage at one

the need and the capability

ASecM was a co-author of the

reports have recommended

end and highly qualified and

to meet it. The engineering

ASPI report Safety in Numbers.

a standardisation of security

experienced security consultants

element is an important part

He is a recognised thought

licensing. The issue was put

and chief security executives of

of the private security sector’s

leader in security, emergency

before the Council of Australian

major corporations at the other”.

ability to counter-terrorism.

management and related

Governments (COAG) in July 2008.

These other elements may be

COAG agreed to adopt a nationally

addressed in future reports but it

terrorism and security. They

and Security: the Manager’s

consistent approach to the

is worth noting:

publish works that support

Guide is available from Amazon.

regulation of the private security

• The professional end of

improved capabilities and

Don can be contacted via email at

developments at all levels.

donwilliams@grapevine.net.au

industry, ‘focusing initially

securitysolutionsmagazine.com

the security continuum is

• The academic sector analyses

Don Williams CPP RSecP

disciplines. His book Bomb Safety

SECURITY SOLUTIONS // 51


AVIATION

AIRSIDE ACCESS 52 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


BY STEVE LAWSON

Airside access seems such an

areas I suggested earlier as airside

access to the movement area of

innocuous subject and yet, in

are covered by this definition.

the airport, but has no access

recent years, my company has

control on that access, would be

undertaken more work for

ICAO definition could include

governments on this subject than

the airline and airport restricted

almost any other. You might

company areas. Even more wildly,

area of the airport that we are

wonder what is so difficult about

what about the airport hotel if it is

talking about. And as you would

controlling access to the airside

beyond the customs primary line!?

expect, it is that part of the airport

of an airport – surely it is simply

This confirms one of my

considered airside. Now we have established the

where there is direct access to

a matter of ensuring that only

guiding principles; that as vital

the aircraft or things that may go

authorised people have access to

as regulations and procedures

onto the aircraft, and there are no

the airside and that they do not

are, definitions are as vital, or

further controls on those things

take unauthorised or prohibited

more important.

that may go onto the aircraft.

items with them. Yet it is a subject

For this article, while not

At its simplest, there are two

that seems to unwind the more

perfect, my definition of airside

things that we must look at when

you look into it.

will expand on the ICAO definition

considering access to the airside.

Firstly, what is the airside? In some countries it starts at the

as follows: “The movement area of an

The first one is ensuring that the person who is on the airside

point where access is restricted to

airport. It includes adjacent

is authorised and has a need to be

passengers. Others define airside

terrain and buildings or

there. The second is to make sure

as the area beyond security

portions thereof, access to

that they do not take a prohibited

checks, and passport and customs

which is controlled and where

item or a weapon onto the airside.

control. Or it may be any area of

there is no further control

In this article, we will not be

an airport used or intended to

before accessing the movement

dealing with screening on to the

be used for landing, take-off, or

area of the airport.”

airside; it is a complex subject

surface manoeuvring of aircraft. The International Civil

securitysolutionsmagazine.com

It may be trite, but using the

With my definition, the passenger boarding gates are not

too large to combine with airport identification (ID).

Aviation Organisation (ICAO)

part of the airside, as the doors

defines airside as, “the movement

to the movement area usually

Airside ID

area of an airport, adjacent terrain

have locks. Interestingly, it would

We are very lucky in Australia

and buildings or portions thereof,

also remove the inside of many

to have a national airside ID

access to which is controlled”.

aerobridges in Australia as

system. In Australia, our ID cards

Seems straight forward? Like

they have access control on the

are called Aviation Security

many ICAO definitions, it

doors to the movement areas. In

Identity Cards (ASIC). An ASIC is

leaves too much for the state to

contrast, the inside of any cargo

a nationally consistent card that

determine. For example, all of the

terminal building that has direct

is subject to security clearances,

SECURITY SOLUTIONS // 53


AVIATION

both police and counterterrorism.

the airport identity card, or

Association) code for the airport

An ASIC may be valid for the

providing references from

on the face of the card. So a card

a country-wide ASIC may be to

whole of Australia or for a

friends and associates. I know of

that is only valid at Melbourne

have some form of ASIC that is

single airport.

one first world country that for

Tullamarine has MEL in large

regionally based. For example,

a short time after September 11

letters on its face while a card

in Queensland you could have a

nationally consistent card much

did not even allow police checks

that is valid only at Melbourne

QLD ASIC.

less one that is subject to national

on airport staff prior to their

Avalon has AVV.

security checks. For many

employment. Fortunately that has

countries, the airport identity

been corrected.

Many countries do not have a

card, while subject to a police

So how do ASIC work in

Here is my first question

A possible way around issuing

What is a greater issue about our system of ASIC is the

about our ASIC system: If I had

card gives you access to the

a staff member with duties at

whole airfield.

check, does not meet a national

Australia? Basically there are two

both Melbourne Tullamarine and

standard. So the airport identity

cards, a red ASIC and a grey ASIC.

Melbourne Avalon, under the

it is stressed that the ASIC does

cards for neighbouring airports

The red ASIC provides access to

current system I only have two

not automatically give you a

may differ radically.

the airside, a grey ASIC provides

choices. I can either issue them

right of access to all areas of an

access to other security controlled

with an ASIC for each airport or a

airport but, to be frank, if you are

there is a police check, it does

areas of the airport. You may

single AUS ASIC.

correctly displaying an ASIC, and

not include consideration by the

have seen grey ASIC being worn

authorities that the person may

by concession or club staff.

It also may be that while

I am not even sure that you

When you apply for an ASIC,

look like you belong, it is unlikely

can issue two ASIC, I do not think

that you will be questioned.

Those ASIC that are valid

there is a reason why you could

Even if you are, many people

In the past, the background

throughout Australia are called

not but it would raise eyebrows

tend to take confident answers at

checks in some first world

AUS cards since AUS is shown in

and be quite expensive since an

face value.

countries have been no more

large letters on the front of the

ASIC can cost over $200. But by

than checking the person’s

card, whereas airport specific

issuing an AUS ASIC, that person

logo of the employee’s company,

employment record for a number

cards have the three letter IATA

now has access to every airport in

so if a worker with a Qantas

of years prior to applying for

(International Air Transport

the country.

ASIC wandered into a Virgin

or may not be a terrorist threat.

54 // SECURITY SOLUTIONS

Many ASIC do include the

securitysolutionsmagazine.com


Steve Lawson has over

Australia area it may be cause for

is implemented. Recently, we

public transport apron of

the person to be challenged. But

undertook an access review for

an airport.

sometimes an ASIC has no more

an overseas government who

than the logo of the airport or the

uses such a system. During the

people consistent access to

Executive with Qantas Airways,

issuing authority.

review we found a number of

airside areas across the country,

Steve held a number of senior

people who worked in the airside

but if you need access to the

management roles covering all

restrict access to different zones of

fuel farm and had access to areas

Domestic RPT (Regular Public

aspects of aviation security from

the airport, so a person who works

like the passenger concourses

Transport) apron maybe there

policy development to airport

in cargo may have something on

and gate lounges. When we

could be a circle containing a

operations. He was sent to New

their card that restricts them to

asked why these people had

‘D’ on your ASIC. Similarly, for

York immediately following

that area of the airport. Similarly,

such wide ranging access we

access to cargo areas there is a

the 9/11 attacks to manage the

a person working in catering

were told that they needed to

circle with a ‘C’ and for access to

Qantas response and undertook

may be restricted to that area of

go through those areas to get

the international apron, an ‘I’.

a similar role following the 2002

the airport.

to their workplace! It was quite

Other places in the world

A common system uses small

I realise it is difficult to give

Yes, it would be difficult to

20 years of experience in aviation security. As a Security

Bali Bombings. On his return

frustrating given that a change

administer but it would give

to Australia, he was appointed

circles on the face of the ID,

in their point of entry to the

much tighter control to the

Security Manager Freight for the

usually of different colours and

airport would have negated the

more secure areas of the airport

Qantas Group. Since 2007 he has

containing letters to indicate in

unnecessary access.

without massive changes to our

been a Director of AvSec Consulting

current nationally consistent

in partnership with Bill Dent, a

the area to which the person is

Notwithstanding those types

allowed access. When using such

of implementation issues, I

airside access system. It would

fellow former Qantas Security Exec.

a system, it is instantly obvious to

would like to see a similar system

mean that to gain access to the

Today, Avsec Consulting provides

the observer if the person has a

in Australia. Consider this, most

more secure airside areas of

consultants from the US, NZ, Middle

right to be in that area or not.

general aviation pilots are issued

security-controlled airports you

East, Israel and Europe. Steve can

with an AUS ASIC. Conceivably

would need more than a private

be contacted on 0404 685 103 or

giving them access to the regular

pilot’s licence. n

slawson@avsecconsulting.com.

As with any system, its efficiency depends on how it

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 55


FEATURE

56 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


PROVE CYBERSECURITY VALUE TO BUILD A CULTURE OF CYBERSECURITY BY BRIAN CONTOS

If you want senior executives to

grabbing perspectives and stats

buy into cybersecurity, you need

regarding the value of a strong

to prove the value cybersecurity

cybersecurity culture, such as

brings to the core business.

reduced cyber incidents, stronger

Reading your organisation’s

customer trust and better brand

annual reports, corporate

reputation. This study made me

governance documents and

think about how a cybersecurity

shareholder statements will

culture is created and what a

give you a better sense for what

cybersecurity team needs within

drives your organisation and, in

its organisation to earn the

turn, what your executives are

support and resources required

thinking about.

for a cybersecurity culture.

You will likely find that

4,800 IT professionals from

documents, but not around

around the globe reported “a

specific attacks, zero-days and

lack of senior executive buy-in

advanced persistent threats

or understanding” as one of the

(APTs). Instead, you may see

primary factors inhibiting a strong

verbiage about material harm, risk

culture of cybersecurity. Gaining

statements around maintaining

that buy-in requires proving that

effective cybersecurity controls,

the cybersecurity investments

protecting confidentiality and

being made are addressing

privacy, and the need to safeguard

these overarching concerns in

sensitive data.

a measurable, quantitative and

New ISACA and CMMI Institute

securitysolutionsmagazine.com

In the study, 27 percent of

cybersecurity shows up in these

evidence-based way. By clearly

research on cybersecurity

illustrating what is working,

culture is full of attention-

what is not, and what needs to

SECURITY SOLUTIONS // 57


FEATURE

be done to fix it with evidence,

work closely with the finance

close those gaps. Now a business

I believe in what you are doing

you are showing leadership that

team. Every dollar being spent on

decision can be made, considering

because of the supplied evidence,

you not only understand the

cybersecurity is a dollar not being

all your evidence, along with

and I am willing to invest

business risks, but you know how

spent on the core business. So, one

all the other non-cybersecurity

dollars because your measures

to measure and communicate

of the jobs of audit, finance and

business requirement evidence

are empiric, understandable

those risks effectively, so business

the cybersecurity team is to make

from business units such as

and compelling, then I am far

decision makers can act upon

sure that the dollars being spent

sales, finance and operations, to

more likely to champion your

them. If you want their buy-in,

on cybersecurity are adequate and

determine the best use of funds.

cybersecurity cause throughout

give them the proof they need to

effective in providing value.

understand and act. In the study, 29 percent of

As mentioned earlier, these

Forty-three percent of the study respondents said “executive

the organisation. Executives want an

groups are looking for proof

champions who speak up for

appropriate level of protection.

respondents indicated “a lack of

that the cybersecurity tools in

security” are a primary factor

Too far beyond appropriate and

funding” as one of the primary

place are adding enough value

in empowering a culture of

that is waste, and executives that

factors inhibiting a strong culture

to mitigate an acceptable level

cybersecurity. This championing

waste are not executives for long.

of cybersecurity. At some point,

of cyber risk. To do this, clearly

enabler for cybersecurity should

By arming executives with proof

you may actually need money to

outline where the gaps are and

be a byproduct of providing the

to champion your cybersecurity

effect change. Third-party auditors

then you can make a business

needed proof in the first two

cause, you can gain an ally to

and the board’s audit committee

case for greater investment to

sections. As a business leader, if

work with the audit committees

58 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


and risk committees. Focus

of risk. When they are making

on articulating the value of

decisions around cybersecurity,

effectiveness, cybersecurity

cybersecurity and the necessity

such as where to invest, how

becomes strategic to the business

for changes you have proven are

much to invest and how to

and will in turn benefit the core

required to ensure protection

prioritise, business leaders

business in areas like reducing

for the organisation’s sensitive

want to be armed with evidence

cyber incidents, building

assets and data.

just like they do for other types

stronger customer trust and

of risk. They do not want to

safeguarding brand reputation. n

The two inhibitors and

securitysolutionsmagazine.com

By proving cybersecurity

enabler I explored have

base these decisions on a best

something in common: they

guess regarding cybersecurity

are directly impacted by

effectiveness. Business leaders

executive, board advisor,

decision makers outside of

need evidence-based metrics

entrepreneur and author with

the cybersecurity team. These

and quantifiable data. They

over two decades of experience in

decision makers might include

want quantitative proof before

the security industry. He is also

auditors, CFOs, CEOs, boards and

they engage their time and

currently the Chief Information

other business leaders. Business

organisational resources,

Security Officer and Vice

leaders evaluate risk for a living

regardless of how strong the

President Product Innovation

– cyber risk is just one flavour

qualitative argument might be.

at Verodin.

Brian Contos is a seasoned

SECURITY SOLUTIONS // 59


CCTV

How To Minimise

ROULETTE WHEEL MOTION BLUR

Once I was approached by a casino professional, asking me if I could help him find a camera with 60fps, which he wanted to use with the casino’s roulette tables. I asked him about the purpose for such a camera before I gave him my response.

BY VLADO DAMJANOVSKI

Certainly, I knew of a handful of Internet Protocol (IP) camera manufacturers that had 60fps cameras (some even more than 60fps) in their range, but I sensed that the question was based on a lack of understanding of how cameras work (more specifically, the electronic shutter) rather than a real quest for a camera of high frame rate. Additionally, high frame rate cameras are usually more expensive. When the customer explained that the images from his roulette wheel winning numbers appeared very blurry and customers were complaining about it, I knew what the problem was. Let me explain. Cameras are often used to look at roulette wheels and display the winning number as soon as the roulette ball lands on a number. Casino dealers do not wait for the roulette wheel to finish spinning, as this takes quite some time and players will not wait. The most practical thing for them is to wait until the ball, after jumping around, lands in the winning number area and, while the wheel is still spinning, they show a snapshot image of the winning number on a large screen. The light conditions are usually very low, typically no more than 10lux at the gaming tables, which forces the cameras to expose each frame at least 1/25s (or 1/30s) in order to produce ‘live’ video. It may well be that the exposure could be even longer if the cameras are left in integration mode. The results are blurry videos of the roulette wheels, with hardto-read winning numbers. No

60 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Longer shutter – hard to see numbers

Shorter shutter – sharper winning numbers

An Example In this example, the following variables are used: • IP camera with 1/1.9” sensor • HD resolution = 1920 x 1080 • lens = 9mm • distance from camera to the roulette wheel approximately 1.5m

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 61


CCTV

wonder roulette players are not

actual roulette ball, and 29 pixels

focal length, camera to object

happy and are asking for better

the same lens and F-stop), the

of blurriness on top of the roulette

distance, pixel count and the

and faster information from the

more light required for a good

wheel numbers (a total of 50

electronic exposure setting. All of

roulette tables.

picture. It is, however, important

pixels in the horizontal direction).

these parameters are considered

to consider that every IP camera

This effect makes the numbers

by the ViDi Labs calculator, which

this question did not necessarily

has built-in Automatic Gain

still appear blurry. The ViDi Labs

is why the results produced

need a high frame rate camera. All

Control (AGC), which even when

calculator gave a result of 22

in the experiments agree with

he needed was to set the camera

the light levels are lower will push

pixels of blurriness.

the theory.

to a higher electronic shutter

the video signal to be close to the

(exposure), so that the motion

nominal values of full video (1 App

electronic exposure to 1/250s, the

is unique in our industry and is a

blur from the roulette wheel

in the analogue days and around

resultant frozen image appears

product of continuous research.

was minimised to the level that

800mVpp in the digital world).

much sharper and the roulette

It can also be used in licence

numbers can be clearly read. The

plate recognition cameras, or in

find the longest exposure for the

ViDi Labs calculator indicated

places where people are running

acceptable motion blur.

that there will be 5.3 pixels of

or riding bicycles. It can be

blurriness when motion velocity

used almost anywhere where

The customer that asked me

clearly shows the ball and the winning numbers. So, what exposure does he need to set the camera to? This

The shorter the exposure (with

Using the calculator, we can

The blur will always be there,

By setting the camera’s

The motion blur calculation

can easily be calculated by the

even at the shorter exposure, since

is 3km/hr. This is sufficient to

there is motion and can always

ViDi Labs calculator application.

the roulette wheel is still spinning,

see the numbers on the roulette

give users a suggestion of the

Using the Sensor blur calculation,

but it will be much sharper than

wheel more clearly. So, although

longest exposure they need to set

which is produced by a moving

having the default ‘live’ exposure

a higher frame rate camera (60fps

their cameras to in order to see

object with a known speed, a

of 1/25s (or 1/30s).

or 120fps) was not installed,

sharper images.

casino operator can calculate the

Our tests and experiments

a sharper video of 25fps was

most acceptable electronic shutter

have shown that using high

produced just by setting the

speed in order for the camera to

frame rate cameras (for example,

electronic exposure to 1/250s.

see sharp winning numbers.

1/60s instead of 1/30s) will hardly

Problem solved!

ViDi Labs calculator is available for iOS and Android. n Vlado Damjanovski is an internationally renowned CCTV

A little bit of imagination and

reduce the motion blur. As it can

length measurement is required,

be seen on the above screenshot,

To Summarise

author, lecturer, innovator and

but the hard work is done by

there were around 21 pixels of

Motion blur depends on five

consultant. He can be reached via

the calculator.

blurriness produced on top of the

parameters: the sensor size, lens

his company website vidilabs.com

62 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Security CONGRESS PNG

start your global journey here

4-6 March

2019

World Class Technology & Security Innovation

congress Port Moresby

Electronic, Cyber & Physical Security Identifying Risk & Real World Technologies Join us where security industry specialists and professionals will converge on Port Moresby, PNG in March 2019 for the first Oceania Premier Security Industry Event with a Security Conference and Exhibition. Business leaders will translate technology trends, Principal Sponsor

integration and innovation which will enable your business to grow, be more agile and secure. Product capabilities reducing global threats, crime, insight and education into real threat cybersecurity today‌ Register at www.pngsecuritycongress.com/register or email: events@pngsecuritycongress.com

Welcome Reception Sponsor

Gold Corporate Sponsors

Silver Corporate Sponsors

Charity Partner

Media Partners

Aviation Partner


PROFESSIONAL DEVELOPMENT

ARSONISTS IN OUR MIDST DR. REBEKAH DOLEY

The total destruction wrought by

of arson. It is a topic I have been

urge to light fires. Pyromaniacs are

of arsonists seen in the legal

the bushfires in Australia each year

studying for almost twenty years,

variously thought to be irresistibly

system today.

is devastating and the aftershocks

so there is a lot to be told. But there

attracted to flames, to receive

are often felt for months and even

is also a lot that is unknown. It is

sexual gratification from seeing

If not mad, then bad?

years afterwards. Unfortunately,

hoped that by the time readers

fire, and to perform repeated

Statistically, a diagnosis of

all too often, many of the bushfires

have finished reading this piece

acts of more and more serious

pyromania is relatively rare for

experienced around Australia are

they will know a little more than

firesetting for the sole purpose of

arsonists. It is important to get this

found to be the result of arson.

they did before they started and

self-gratification. While this may

clear because there are significant

The concept beggars belief – who

will understand the imperative

offer some offenders a convenient

implications in encouraging a

would commit such a heinous

the community confronts to do

defence, the question of whether

view which provides an individual

crime? What on earth were they

something concrete about this

pyromania really exists was raised

with a ready-made excuse for

thinking at the time?

dangerous phenomenon that is

as early as the 1800s when Charles

their behaviour. If most serial

faced annually in this country.

Pilgrim is quoted as saying, “We

arsonists are pyromaniacs, then,

must therefore conclude that there

in the most simplistic terms, it is

When writing this piece, I thought about what I could tell readers that might help to make

Who are they?

is no such psychological entity as

accepted they are ‘mad’ rather

some sense of this apparently

Arsonists are obscure characters.

pyromania and that an incendiary

than ‘bad’. This has ramifications

senseless crime. Every hour of

Relatively little is known of their

act is either the crime of arson

for society’s moral obligation to

every day in Australia at least

habits and behaviours or about

or the symptom of a diseased or

provide treatment for arsonists

one arson fire is lit. It is fair to say

how these individuals differ, if at

ill-developed brain” (cited in Geller,

– something which has received

that arson has always been an

all, from other types of offenders.

1987).

very little attention worldwide,

elusive crime, difficult to detect, to

It is worth mentioning that the

control and costing the Australian

term used to describe individuals

for a diagnosis of pyromania

on the other hand, it is accepted

community in the region of $157

who set fires varies throughout

to be made requires that there

they are agents of free will

million per year (Insurance

the literature. Synonyms for

be a clear pattern of impulsive

and therefore are ‘bad’, then

Council of Australia, 1998). This

non-accidental firesetters include

firesetting behaviour that is

society’s obligations lie more in

figure does not include the loss of

arsonists, firebugs, vandals and

preceded by a feeling of tension

the rehabilitation arena – again,

life and personal injury suffered

pyromaniacs. Ultimately, however,

and followed by a sense of relief

an area sadly neglected in the

by those involved in escaping

the different terms all refer to the

or pleasure once the act has been

current environment. More on

the flames or fighting the fire.

same thing, an individual who

completed. In my experience,

this later, but in the meantime,

Deliberate firesetting, or ‘arson’

deliberately lights fires, and all

very few of the nearly 200

who is actually lighting fires in

as it is generally legally defined, is

have a pejorative connotation.

offenders I have interviewed

Australia’s bush?

on the increase in Australia. The

The specific diagnostic criteria

but particularly in Australia. If,

and well over 300 cases of solved

question is – how culpable are the

Who are they not?

arson that I have reviewed, have

people responsible?

A popular view is that many serial

noted that type of sensation.

The arsonist among communities

arsonists are in fact pyromaniacs,

Pyromania affects only a very

Arson is predominantly

responding to an irrepressible

small percentage of the population

committed by males, a trend

The next few pages will provide a crash course on the psychology

64 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


which is consistent with patterns

of offenders, differing perhaps

of participation in criminal activity

only in the degree of severity

generally (Farrington, 1996). Some

of disadvantage rather than

experts quote a ratio of 6:1 male to

in the nature of their profile.

female arsonists based on crime

Generally, arsonists have less

and criminal statistics and most

academic achievement, more

studies have found approximately

problems at school, less skilled

eighty per cent or more are males.

employment than other offenders,

My work on bushfire arsonists

and to have an earlier onset of

in particular has found very few

psychosocial problems and more

females involved. Interestingly,

psychiatric concerns.

while younger (16 to 25 years old)

These features are true too

arsonists appear most commonly

for the bushfire arsonists, with

in the literature, this may be

the exception of arsonists who

an artefact of a lack of criminal

are also volunteer firefighters.

experience and resources, leading

Fortunately, firefighters

to these individuals being over

committing arson is a relatively

represented in the criminal

rare occurrence. I have done a

justice system. Bushfire arsonists,

tremendous amount of work in

however, tend to be a little

this field and finds that these

older than arsonists generally –

individuals are often holding

averaging in their twenties. In

down stable employment

general, though, with a recorded

and relationships, or are

age range of 4 to 73 years, arson

self-employed and frequently

is undoubtedly a crime that is

have a high profile in the

accessible at any age.

community. They also tend to

The background of most

be older than typically seen –

arson offenders is consistently

often in their forties to fifties.

reported as deficient. They often

There is, however, another

have a dysfunctional family

group within this category

setting with one or both parents

who are significantly younger

being absent. They may have

and more impressionable,

been abused and/or neglected as

impulsive and reckless than their

a child. This is a similar pattern

older counterparts.

to offenders generally and, like most offenders, arsonists are also

Why do they do it?

reported as typically being socially

Arson is one of those crimes

and educationally disadvantaged,

which frequently disguises its

socially maladjusted and

potential lethality under a veneer

substance abusers. Where

of seeming innocuousness.

mental illness is evident, the

Deliberate firesetting, as an act,

most common diagnoses are

is not particularly technically

schizophrenia, mental retardation

difficult or especially brave. It

and personality disorder.

is not a complex crime to carry

Many arsonists have prior

out for the most part. Therefore,

criminal convictions. Experts

what an arsonist tells about why

tell that arsonists tend to have

they have committed the act is

a pattern of a low rate of arson

often of less interest than what

recidivism but a higher rate of

they do not tell; there are lots

reoffending in other crime types,

of reasons people have given

particularly property-based

for starting fires. One of the

crime. There is a lot of mystique

most widely used systems for

surrounding arson, not all of

classifying motives for arson is

which is deserved. Arsonists

the six main categories identified

are very similar to other types

by NCAVC (The National Centre

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 65


PROFESSIONAL DEVELOPMENT

for the Analysis of Violent Crime,

surveillance, patrols or coming

that behaviour and, perhaps even

adults available to incarcerated

1992). These are:

under police suspicion, which

more pertinently, what factors are

offenders. It is a scary thought

1. Profit (or fraud)

effectively curtails their behaviour

important in getting them to STOP

– particularly when research

2. Revenge

for a while. The arsonist may well

lighting fires.

has found there is a core group

3. Excitement

be motivated to regain power by

One of the questions

4. Vandalism

escalating their activities perhaps

commonly asked is, “Would

(pardon the pun) ‘burn out’. In

5. Crime concealment

in terms of magnitude of fire and/

tougher punishments work?”

fact, not only do they go on lighting

6. Extremism

or frequency of firesetting.

Some of my research has touched

fires, their fires gain in intensity

on this issue and found that

and frequency over time.

of serial arsonists who do not

arsonists typically report feeling

interactions over the years with

Why is more not known?

arsonists, I have come to the

It will come as no surprise to

they receive. Bushfire arsonists,

conclusion there is an underlying

readers that understanding

in particular, have indicated

Strategies for addressing the arson cycle

theme to all these motive

the psychology of arson is an

being underwhelmed by the

To make sense of the strategies I

categories. This focuses on what

extremely challenging task. The

length of sentence they were

recommend for addressing the

the firesetting act psychologically

low detection and apprehension

given on conviction. Arguably,

arson problem in Australia, it is

achieves for the individual.

rates relative to the rate of offence

Australia’s is a punitive culture

first necessary to understand a

mean that most of what is known

and as a community the notion of

little of the progression to serial

Power

about arsonists is based on those

punishment before rehabilitation

arson that an individual might

My belief is that power is the

who were incompetent enough to

is supported. When confronted

experience. The important risk

underlying drive. Arsonists are

be caught. There is also a range

with the haunting images faced

factors that researchers are

generally disaffected members

of issues about how arson data

over the latest incident, it is

aware of at the moment include

of society. Through bad luck, bad

are collected, which calls into

difficult not to condone that

a persistent and long-standing

circumstances or bad choices

question how representative

philosophy. But there is literature

fascination with fire and its

they have found themselves

of the total population some

questioning the deterrent effect

trappings. While a level of fire

disadvantaged across a range

of the groups used for arson

of jail sentences on subsequent

play is not unusual in children,

of life domains – educationally,

research really are. The best

offending behaviour.

once it goes beyond the curiosity

socially and economically. They

is done with what is available,

experience a sense of helplessness

ensuring research methods are as

when no targeted rehabilitation

associated with strong emotions

in the face of adversity; an

scientific and robust as possible

or treatment options are available

(such as the child lighting

inability to effectively make

to improve the usefulness of the

for offenders once they are in

fires mainly when distressed

changes in their world which

findings gathered.

prison, which is the case here in

or angry), it is time to seek

Australia. At the time of writing,

professional support.

But in the course of my

leads to anger and frustration.

unconcerned about the sanctions

This is especially problematic

phase and becomes secretive or

there is no coordinated approach

could be seen as a bid for

What is left to understand?

to treatment or rehabilitation

education and awareness

power: the individual uses fire

There are significant deficits in

targeting firesetting behaviour in

programs running in every state

to acquire power over his or

the literature that may mean

her environment.

society’s picture of arson in

Firesetting, in this scenario,

Having acquired power,

the community is limited in

the individual is motivated to

important ways. One concerns the

demonstrate their power and,

fact that factors differentiating

once demonstrated, there is a

arsonists from other offenders

need to maintain power. The

and from each other are still

arsonist may enjoy the kudos he

being identified. Another is that

receives from peers or the media

an explanation of arson that

attention. It is possible that a

addresses both the question of

copycat phenomenon exists where

why an individual is drawn to

an arsonist either is motivated

fire and why he or she might then

to start lighting fires or to refine

continue to light fires has yet to

his technique following media

be established. Nevertheless, it

reporting of fire.

is time now to move beyond a

Inevitably, there is a loss of

focus on WHY people light fires

power at some point through

and start working towards an

restrictions on their firesetting

understanding of those factors

freedoms arising from increased

which are involved in maintaining

66 // SECURITY SOLUTIONS

There is a variety of fire

securitysolutionsmagazine.com


and territory in Australia. These

the outcomes for juveniles

about what works to be able to

subsumed under categories

are directed predominantly

transferred to adult courts

avoid what does not. The factors

such as ‘property damage and

at primary school children,

against those kept in the juvenile

that are influential in holding a

environmental pollution’,

although some programs have an

system find reoffending was

person in this offending pattern

‘weapons and explosives

adolescent-based component. The

more rapid, frequent and serious

need to be determined; what is

offences’, or similar. Accordingly,

children most at risk come from

in the adult criminal system

likely to be important in getting

whereas countries such as the

families with parental neglect, lack

groups. The youths in the juvenile

them to desist from setting

USA can categorically say who is

of supervision, abuse and, perhaps

system generally improved their

fires needs to be focused on;

causing their fires, how they are

most significantly, poor parenting

behaviour over time. In fact, this is

and a smarter approach to the

doing it and what the effect is on

practices. Often the trigger is a

consistent with what is known of

issues is required. For instance,

the community, Australia is in no

major life change – separation,

criminal career patterns generally.

there is evidence that arsonists

such position. This may go some

divorce, remarriage, or death

Typically, there is an escalating

demonstrate specific crime-

way towards explaining why

for example. These children live

trend in offending from early

type clusters – that is, they do

Australia is yet to get to grips

in difficult circumstances and

adolescence reaching a peak at

not just specialize in firesetting,

with its arson problem, despite

lack the support and skills they

ages sixteen to eighteen years.

but engage in other criminal

significant increase in attention

need to manage themselves in a

After that, there is a gradual

behaviour too. As a result of

over the last ten years or so.

socially acceptable way through

decline until most offenders

their background or subsequent

Consider this a ‘call to

such traumatic events. They

desist from around early to mid

antisocial acts, these individuals

arms’ – arson research is

do not possess appropriate or

twenties. Those who desist in early

often appear before authorities

vital to Australia’s efforts to

effective communication skills and

adulthood are likely to report

well before their firesetting

successfully manage this problem

their personal experiences have

supportive relationships and full-

is discovered. Exploring the

in communities. For that to

reinforced their sense of isolation

time or satisfactory employment.

possibility of early intervention

work, funding, commonwealth

and neglect. Over time, through

That is, many of these individuals

programs for adults that pick up

and state/territory government

curiosity and experimentation,

grow out of crime, by choosing (or

individuals at risk of later arson

support, and the goodwill

they learn the power of fire in

falling into) a life which removes

offending BEFORE they become

and assistance of the relevant

gaining attention from authorities,

them from the influence of

responsible for the types of fires

agencies and facilities is needed.

parents and emergency services.

people likely to keep them in a life

seen recently is a promising line

I am passionate about this issue

It can also become simply one

of crime.

of enquiry. Remember – the first

and have been for a long time. It

conviction for arson is highly

would be terrific for others who

unlikely to be their first ever

felt the same way to drive this

arson offence.

solution further. n

of a range of antisocial acts they commit in groups in response to peer pressure or gang activity. There is a movement to

So what should be done? It is important to get serious about

The notion that there are no Please contact the author for

treat serious offenders as

tackling this issue. As tedious as it

evidence-based, coordinated

adults in the belief that more

may sound, the research needs to

approach to treatment or

severe punishment will deter.

come before the implementation

rehabilitation for arsonists in

International research comparing

of strategy. Not enough is known

Australia is concerning. These

Grad Dip App Psy MSc(Inv Psy)

types of programs have been

MPsy(Clin) PhD MCC AMFC

running internationally for

MAPs, is a clinical psychologist

some time. These need to be

with a history of researching and

established as a priority within

lecturing in the psychology of

correctional facilities and parole

serial firesetting in the UK, USA,

systems. Finally, the issue of

NZ and Australia. As a result of

arson is under-represented

her work in this area, she has

in all official statistics. In

been awarded the Queens Trust

Australia, there is no consistent

Award in 1995 and CFS/S.A.Great

or national approach to tracking

Training and Research Award in

arson offending patterns – it is

1995, 1998, 1999 and 2000. Now

virtually impossible to quickly

based in Australia, Dr. Doley is an

and accurately obtain a clear

Assistant Professor in Psychology

understanding of where arson

at Bond University, Gold Coast,

control is at in Australia using

Queensland and consults to

available crime and court

organizations on the issue of serial

statistics. Arson is rarely, if ever,

arson and firefighter selection.

identified as a crime type in its

Further information on this topic

own right, more often being

is available at www.firefocus.net.

securitysolutionsmagazine.com

references at rdoley@bond.edu.au. Dr. Rebekah Doley BA(Hons)

SECURITY SOLUTIONS // 67


FEATURE

PRISON Militant Jihadist Recruiting Grounds Or Refuge For Rehabilitation? BY ANNE SPECKHARD AND ARDIAN SHAJKOVCI

68 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


It is often argued that prisons

detainees and 800 juveniles held

prisoners later emerged to re-

presents an opportunity to enact

may accelerate the process of

there at that time by US forces in

form and create what became

terrorist violence essentially

radicalization by virtue of having

Iraq. Terrorist leaders in the US-

the so-called Islamic State, or

by proxy – by convincing their

vulnerable prisoners isolated

run prisons and detention centres

ISIS. While prison radicalization

‘brothers’ with shorter sentences

from mainstream society under

in Iraq were indoctrinating and

of that scale is unlikely to be

and who are about to be released

circumstances in which they may

recruiting among the assembled

happening elsewhere in the

to carry out terror acts on behalf

be potentially exposed to virulent

youth. Some terrorist leaders

world, it does set a lesson for

of the group. This also presents

ideologies and charismatic

had even been observed training

avoiding grouping dedicated

a challenge to security officials

recruiters (Brandon, 2009).

young protégés on how to

militant jihadist prisoners, and at

who may not expect an inmate

Numerous violent extremists and

assemble improvised explosive

least attempting to disengage and

convicted on non-terrorism

terrorists have been radicalized

devices (IEDs) by drawing maps

deradicalize them.

related charges to emerge as a

in prisons. This report discusses

and instructions in the sand.

issues of recruiting for violent

Al Qaeda terrorists grouped

extremism in prisons and

lethal violent actor. Consider the example of Harry Sarfo, a

together in Camp Bucca, later

From Petty Criminals to Lethal Terrorists

examines vulnerabilities for

set up shariah courts that ran in

Prison for those first entering the

who was radicalized in a prison

prison radicalization and potential

some of the cell blocks, sentencing

system is a time of heightened

in Germany after serving prison

prevention and intervention

and carrying out punishments

vulnerability. The new convicts

time for his role in an armed

strategies for the management of

to those who defied them. In

are separated from existing

robbery of a supermarket (Gaub

violent extremism in prisons.

Camp Bucca and Camp Cropper,

support systems and may find

& Lisiecka, 2017). He travelled to

Lt. Gen. Jay Garner and his staff

myriad alliances and potential

Syria and became a member of the

Prison as a ‘University of Jihad’

attempted to disrupt terrorist

threats inside the prison for

ISIS emni (intelligence arm) and

leaders and ideologues operating

which they may be unprepared,

was later accused of participating

“As long as we have prisons,

in the prisons by transferring

and therefore must find a way of

in ISIS executions. According to

we have training camps for our

and isolating them from the more

protecting themselves. In some

the International Center for the

youth,” Ahmad Sa’adat, general

vulnerable prisoners. However,

cases, prisoners find solace among

Study of Radicalisation (ICSR),

secretary of the Popular Front for

as the number of detainees

Muslim prisoners who organise

two-thirds of ISIS supporters they

the Liberation of Palestine (PFLP),

swelled and the terrorist leaders

themselves for prayer and study

had studied have served a prison

told the first author in 2004.

learned how to hide themselves

and who band together for self-

sentence, but only 27 percent

Sa’adat spent most of his life in

among the vulnerable, it became

protection. Those who convert

credited their radicalization as

prison (more than 17 years), but

impossible to do so. As a result, the

in prison in order to belong to

occurring in prison (Gaub &

did not in any way view that as

US leadership sought to institute

such groups are vulnerable to

Lisiecka, 2017). This is still a large

lost time. He took advantage of the

a deradicalization program

any radicalizers among them, as

number and constitutes a serious

situation and began indoctrinating

(Speckhard, 2012).

converts are typically naïve and

threat to security.

and recruiting among the

While a prison rehabilitation

ill-equipped to judge any claims

German of Ghanaian descent

In the past decades, Al Qaeda

vulnerable Palestinian prisoners

program was made for Iraq, it was

set forward about the correct way

ideologues hoped to incite a

with whom he found himself

never carried out as intended,

to practice Islam. Thus, the newly

‘leaderless jihad’, in which

surrounded. “We recruited and

and not ever applied fully to the

imprisoned and new converts may

spontaneous cells and homegrown

trained inside the prisons,” he

highly radicalized detainees.

easily fall under the influence of

terrorist plots would emerge. In

recounted. “They had gathered all

The changing politics at the time

a violent extremist who teaches

their vision, however, they failed

our students for us.” (Speckhard,

required Maj. Gen. Douglas Stone

them a virulent interpretation

to account for the difficulty that

2012) Indeed, in many parts of the

to carry out mass releases of less-

of Islamic beliefs, such as those

potential would-be homegrown

world, prisons are known to serve

radicalized prisoners to satisfy

espoused by Al Qaeda and ISIS.

terrorists would face in executing

as fertile grounds for terrorist

demands of the tribal leaders

Violent extremist recruiters

recruitment, with terrorist

in the Anbar area, who were

understand that being imprisoned

nowadays, the leaderless jihad

leaders sometimes celebrating

willing to join the ‘Awakening

for the first time is usually a

is being infused with knowledge

the fact that they can operate

Movement’ but demanded their

period characterised by feeling

shared within the prison walls, as

in an environment where their

sons be returned home in order

lonely and frightened. They

young and vulnerable new recruits

recruits are already assembled

to do so (Speckhard, 2012). The

also understand that while they

coming from the criminal world

around them.

long-term effects of not attempting

may be serving under a longer

continue to fall under the influence

to disengage and deradicalize

sentence, their ability to recruit

of those in prison, who can equip

author was contracted by the U.S.

an entire group of dedicated

young, first-time offenders into

them with terrorist tradecraft and

Department of Defense to advise

jihadists operating there, however,

their ideology and groups and

link them with the network of

on the feasibility of building an

turned out to be a mistake that

then feed them back, within a

individuals who can assist them in

effective prison deradicalization

continues to haunt the world

relatively short time period, to

their endeavours following their

program for the 20,000-plus

to this day, as these very same

a network outside the prison

release from prison.

In November 2006, the first

securitysolutionsmagazine.com

terrorist attacks. Arguably,

SECURITY SOLUTIONS // 69


FEATURE From Career Criminals to Violent Extremists Career criminals are also prone

extremism within the British

recruiter, who played upon these

prison system.

perceived or real grievances.

In one such account, a prisoner

Abu Ghazwhan recounted,

to prison recruitment. Some of

formerly held in London’s

“There was a guy [in prison]

the most infamous cases include

Belmarsh prison, the UK’s main

named Ziad. I joined [ISIS]

Abu Musab al-Zarqawi, who

prison for convicted and suspected

through him. When I got released,

together with his spiritual mentor

terrorists, wrote, “Some brothers

he asked for my phone number.

in prison, Abu Muhammed

approached me and said that

I gave him my number [and]

al-Maqdisi, served four years in

they had been expecting me. At

he gave my number to the

prison and was released by royal

first, I was a bit apprehensive as

organisation outside, and they

pardon implemented by King

to whether I should trust them

called me to join them.” There

Abdullah II in 1999. Zarqawi later

or not. But afterwards I felt

was no evidence to suggest that

emerged as the leader of Al Qaeda

comfortable. One of the brothers,

Abu Ghazwhan had been involved

in Iraq (Kesling & Ma’ayeh, 2014).

Masha ‘Allah, he packed some

in terrorism prior to his 2013

Other prominent career criminals

fruit and a chocolate in a bag and

arrest. Upon his release, he met

who turned to terrorism, in part

handed it to me before I went back

with the ‘brothers’ and agreed to

due to prison radicalization and as

to my cell.” (Brandon, 2009)

set IEDs outside the doors of the

a result of contact with extremist

Another Belmarsh prisoner,

Shia security officials, who he felt

prisoners, include the cases of

Omar Khyam, convicted of

had been involved in unfairly

Richard Reid in the UK and Jose

planning terrorist attacks in the

imprisoning him. As explained,

Padilla in the US, which are often

UK, described how Rachid Ramda,

“[I was] avenging myself. They

presented as quintessential cases

a French Muslim who was later

arrested me, even though I was

of the dangers associated with

convicted in France of organising

innocent.”

prison radicalization and their

the 1995 Paris metro bombings,

capacity to facilitate and breed

approached and befriended

communication skills, possess

violent extremism (Silke, 2014).

him, “The first thing that struck

high emotional intelligence, and

Consider also the example of

me most about Rachid was the

discount any criminal background

Benjamin Herman, a 36-year-old

way he greeted me and the new

of their followers, and may

Belgian. After being released

Muslim arrivals, three hugs and

indeed value it. This presents an

from prison in 2018 on a two-

a smile. He made me feel as if I

attractive mix to lost or confused

day pass, he first killed a drug

had known him for years, such a

young criminals who suddenly

dealer he had met in prison and

warm personality and character,

find their criminal background is

then attacked and shot dead two

making everyone feel wanted and

nothing to be ashamed of in the

policewomen in Liege, Belgium.

important, as if you’re his best

face of their recruiters and who

(a kunya) was studying Islamic

His case demonstrates the danger

friend.” (Brandon, 2009)

may be told that they were right to

law at a university. Abu Islam

steal from the kafirs (unbelievers),

told ICSVE researchers who

emanating from a career criminal

International Center for the

Recruiters generally have good

who had converted in prison and

Study of Violent Extremism

and should continue to do so, but

interviewed him in 2017 that he

fell under the influence of jihadist

(ICSVE) researchers have also

now in the name of Allah. Such

immediately became enamoured

ideology in prison (Stewart, 2018).

found that a prison setting enables

an attitude perpetuates continued

of the group and believed it

recruiters to exploit prisoner’s

would set up a legitimate Islamic

Prison Recruitment Tactics

criminality while overcoming

perceived or real grievances.

any sense of shame they may

State in Iraq. As a result, he

Iraqi Abu Ghazwhan told ICSVE

have been experiencing for

joined them. Abu Islam’s job

The ways in which violent

researchers how he was arrested

being caught and punished for

inside ISIS was teaching shariah

extremists recruit in prison varies

in 2013 with a group of youth

their crimes.

and indoctrinating youth and

by context and the amount of

in relation to a tribal killing.

exposure a recruiter is given to

He bitterly noted that the Shia

vulnerable and naïve recruits.

new recruits. Over time, he became an ISIS emir (military

youth arrested with him were

Charismatic Leaders in Prison

Researcher James Brandon (2009)

immediately released, but he

As explained above, prison

& Shajkovci, 2018). Peshmerga

studied official government

felt that he was singled out as a

recruitment often occurs

soldiers credited him with being

documents as well as accounts,

Sunni, and as a result spent time

through charismatic leaders

responsible for more than 500

letters and testimonies smuggled

in prison. He explained how his

who easily bring frightened and

deaths in which he had sent

out of British prisons by suspected

parents had to find money to hire

angry youth into their violent

young men to their deaths in

and convicted extremists to

a lawyer to get him out. During

jihadist orbit. When ISIS entered

suicide operations. When ICSVE

learn about the manifestations

his short time in prison, he fell

Iraq seizing its first swaths of

researchers interviewed Abu

of radicalization to violent

under the influence of a terrorist

territories in 2014, Abu Islam

Islam in prison, it was clear that

70 // SECURITY SOLUTIONS

commander, a chief) (Speckhard

securitysolutionsmagazine.com


Sunni civilians all played a role. Likewise, many of the ISIS leaders were already radicalized and linked to one another before entering Camp Bucca. However, anytime one gathers jihadists in prison blocks without effective measures to rehabilitate them, as was done in Camp Bucca, gives them opportunity to share their ideological views and tradecraft, as well as idle time to further their networks and plot for the future once released. In Kosovo, ICSVE researchers interviewed Abu Albani (a kunya) about his experiences in ISIS, as well as reasons for joining and defecting from the group. Upon return, he was tried and convicted on terrorism charges. When interviewed in prison, Abu Albani stated that he had become disillusioned with ISIS and angered over how they treated sick and widowed women. He was also angry about how Albanian ISIS leaders mistreated a young orphaned boy who he brought back to Kosovo from ISIS and complained that he feared ISIS cadres in prison might kill him for having defected. However, after he had a charismatic presence

Iraq, recalled how Zarqawi was

and spoke with pride and

also a charismatic and caring

the rise of ISIS on concentrating

interviewed a second time by the

confidence about the Islamic

person. “There was a young man

the arrested Al Qaeda terrorists

same ICSVE researchers, he told

State and its operations. The

in a wheelchair in our prison

during the American occupation

about joining a group inside the

Peshmerga soldiers who were

and Zarqawi always took care

of Iraq in cell blocks in Camp

prison with access to militant

holding him said that in prison

of him, and would wheel him

Bucca. In truth, there were far

jihadist materials in Albanian.

they could not leave Abu Islam

around,” he recalled. Care and

more factors involved in the rise

alone for any measure of time

charisma can be a potent force to

of ISIS than simply concentrating

with a great sense of camaraderie,

with young prisoners, as he was

attract vulnerable and frightened

jihadists in Camp Bucca. The

according to Abu Albani. “I

capable of quickly radicalizing

prisoners to listen to the message

demobilised military, police

deepened my understanding

youth in prison, meaning

being put forward.

and intelligence composed

of jihad in prison. Me and the

heavily of Sunnis losing prestige,

brothers studied Maqdisi’s

Jihadists Experiences in Prison

employment and retirements, the

Millat Ibrahim in Albanian,”

sudden bi-directional sectarian

he told ICSVE researchers. As

It is not only the young and

ethnic cleansing happening in

a result, Abu Albani returned

PFLP leader referenced above,

naïve who are radicalized in

Baghdad and beyond, the lack of

out of his three-and-half-year

was a similar character, exuding

prison. Those already on the

basic services and the crippling

prison sentence as, if not more,

warmth and authority. A political

terrorist path, as well as dedicated

of government capacities

threatening than he went in –

prisoner who spent over a year in

terrorists, may also deepen their

and infrastructure destroyed

despite a prison rehabilitation

the same cell block as Jordanian

commitment to militant jihad – as

during the war, the rise of Shia

program being active during some

Abu Musab al-Zarqawi, who

well as widen their networks –

power and continuing security

of his time in prison. During the

later became the leader of ISIS in

while in prison.

violations by Shia militias against

second interview, he told ICSVE

powerfully engaging the youth and convincing them of the terrorist ideology. Ahmad Sa’adat, the Palestinian

securitysolutionsmagazine.com

Some, for instance, blamed

his release, when Abu Albani was

These jihadists studied together

SECURITY SOLUTIONS // 71


FEATURE

researchers, “We should all follow the words of Abu Mohammad al-Adnani [ISIS’ now-deceased leader of the intelligence emni and propaganda arm of ISIS], that ‘you need to attack in every place and at every time’.” Learning the researchers were soon traveling into Syria, he added, “I hope you meet Jihadi John in Syria and he [beheads you both].” (Speckhard & Shajkovci, 2018)

Prison Disengagement and Deradicalization Programs Various prison deradicalization programs have been constructed since the rise of Al Qaeda and similarly minded groups and nearly every country runs some variation of a program. Most of these programs rely on either a combination of, or just a prong of, Islamic challenge and psychological treatment. On the Islamic challenge side, the programs generally involve an imam or Islamic scholar creating rapport with the prisoner

who can address the manipulation

the Kosovo prison authorities,

views against homosexuality or

and trying to engage the prisoner

of Islamic scriptures that underpin

but refused to participate. “They

feminism that directly contradict

in a discussion of the Islamic texts

the person’s jihadist beliefs. That

brought an imam from BIK [the

government policies and laws.

upon which the person bases his or

said, in determining key risk-

Kosovo Islamic Community] and

her militant jihadist views. This is

assessment factors, specifically as

they tried to force me to talk to him.

defectors, returnees and ISIS

done in an attempt to demonstrate

it relates to religion and ideology,

I never accepted. …We don’t need

cadre prisoners that challenge

to the prisoner the virulent Islamic

one must not consider them

to learn anything from them.”

the terrorist group from an

claims made by jihadist ideologues

as the only, or even the most

that do not hold up to real Islamic

important, factors facilitating

terrorist trajectory have often

language used by their peers

scholarship and scrutiny. On the

violent extremism. As the research

narrowed their focus and only

might be the safer alternative, as

psychological side, programs

indicates, recruits to terrorism

trust information that comes to

once video recorded, the message

generally look for the motivations

and violent extremism often

them from like-minded individuals

does not change (Speckhard &

and vulnerabilities in the prisoners

have simplistic understandings

who share their same experiences,

Shajkovci, 2018). It is also known

and try to redirect them to more

of the ideology and religion

vulnerabilities and motivations.

that violent offenders and addicts

useful ways of meeting the needs

compared to their movement’s

This is an argument for using

are often resistant to individual

and challenges in their lives.

leadership. In fact, more profound

former violent extremists and/or

treatment and may do better with

The likely best and ideal

understandings and commitments

Salafi scholars as those who try to

challenges from other insiders,

approach to trying to effect

to religion and ideology may only

engage violent extremists in prison.

in group therapy settings for

cognitive, behavioural and

occur after time spent in prison,

The risk with using formers,

example, where they may begin

emotional changes among

which allows prisoners to engage

however, is that they are often

to see themselves as the words of

the militant jihadis is to use a

with one another in detailed

not psychologically healthy and

their peers begin to break through

psychologist to get at the inner

discussions about religion and

may make outrageous statements,

their defences.

needs and hurts that led the person

ideology (Silke, 2014).

and sometimes even re-propagate

to embrace violent extremism and

In the case of Abu Albani

Indeed, those already on the

In this regard, videos of

insider point of view in the simple

Abu Islam, the charismatic

their previously held beliefs and

ISIS emir mentioned earlier, was

what continues to fuel embracing

discussed above, he explained that

views. Governments also often

challenged by ICSVE researchers

that mindset, alongside a well-

he had been invited into a prison

find it problematic to employ Salafi

in prison after speaking with

versed and credible Islamic scholar

deradicalization program run by

scholars who may preach religious

bravado about ISIS’ activities

72 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


nature of terrorism has changed

corruption they had witnessed and

extremism professionals on the use

drastically with terrorist groups

taken part of inside the group, as

of counter-narrative messaging

like Al Qaeda, ISIS and other

well as the price they were now

materials produced by ICSVE, both

similar groups now co-opting basic

paying for having served it. For

locally and internationally, as well

religious beliefs. These groups

instance, Abu Omar, an Iraqi who

as studying the use of children

differ drastically from ethno-

was arrested after serving in ISIS,

as violent actors by groups such

nationalist and separatist terrorist

in 2017 shared the following with

as ISIS and consulting on how to

groups of the past by virtue of

the ICSVE researchers: “Prison

rehabilitate them. She regularly

invoking religious imperatives,

changed me. Ever since I got in

speaks and publishes on the topics

namely that the followers have a

prison, things have changed in

of the psychology of radicalization

religious duty to carry out militant

me.” He went on to completely

and terrorism and is the author of

jihad, that suicide missions are

denounce ISIS. n

several books, including Talking to

acts of Islamic martyrdom, that punishment awaits those who

Terrorists, Bride of ISIS, Undercover For a full list of references, email

Jihadi and ISIS Defectors: Inside

refuse to participate and that

admin@interactivemediasolutions.

Stories of the Terrorist Caliphate.

terrorist acts are carried out on

com.au

Follow Anne @AnneSpeckhard

behalf of the Muslim ummah (community). As Scott Atran has pointed out

This article was first published in Homeland Security Today. Anne Speckhard Ph.D. is

Ardian Shajkovci Ph.D. is the Director of Research and a Senior Research Fellow at the

from his years of field research

Director of the International Center

International Center for the Study

with militant jihadis, these

for the Study of Violent Extremism

of Violent Extremism (ICSVE). He

religious views about terrorism

(ICSVE) and serves as an adjunct

has been collecting interviews

begin to fuse the individual’s

associate professor of psychiatry

with ISIS defectors and studying

identity with that of the group

at Georgetown University School

their trajectories into and out of

and certain beliefs that are taken

of Medicine. She has interviewed

terrorism as well as training key

on begin to represent difficult-to-

over 600 terrorists, their family

stakeholders in law enforcement,

change sacred values (Ginges &

members and supporters in various

intelligence, educators and other

Atran, 2013). In these cases, it may

parts of the world, designed

countering violent extremism

using two videos from the ICSVE

be both necessary and worthwhile

the psychological and Islamic

professionals on the use of counter-

Breaking the ISIS Brand Counter

to engage with the prisoners’

challenge aspects of the Detainee

narrative messaging materials

Narrative Project. Surprisingly, he

worldviews and beliefs in support

Rehabilitation Program in Iraq to

produced by ICSVE both locally

was very emotionally engaged by

of violent extremism, which will

be applied to 20,000+ detainees and

and internationally. He has also

the videos, watched them carefully

require prison experts who are

800 juveniles and has consulted to

been studying the use of children as

and, after viewing them, hung

systematically trained to know the

NATO, OSCE, foreign governments

violent actors by groups such as ISIS

his head in shame and admitted,

basis of extremist ideologies and

and to the U.S. Senate and House,

and how to rehabilitate them. He

“We were wrong. We gave a bad

trained to counter it.

Departments of State, Defense,

has conducted fieldwork in Western

Justice, Homeland Security, Health

Europe, the Balkans, Central

without any disengagement/

and Human Services, CIA, FBI, CNN,

Asia and the Middle East, mostly

deradicalization program in

BBC, NPR, Fox News, MSNBC, CTV

recently in Jordan and Iraq. Ardian

has pointed out that in the past,

place can completely on its own

and in Time, The New York Times,

has presented at professional

European ethno-nationalist and

have a positive effect in terms of

The Washington Post, London

conferences and published on

separatist terrorist prisoners were

disengagement from the group

Times and many other publications.

the topic of radicalization and

not challenged in any way about

by virtue of the prisoners being

In the past two years, she and

terrorism. He holds a doctorate in

changing their ideological views,

separated from their terrorist

ICSVE staff have been collecting

Public Policy and Administration

but simply began to disengage

cadres. Over a quarter of Iraqi

interviews with ISIS defectors,

from Walden University, with a

from their peers and terrorist

prisoners under life sentences,

returnees and prisoners, studying

focus on Homeland Security Policy.

activities by spending time in

or awaiting what may become

their trajectories into and out of

He obtained his M.A. degree in

prison. Moreover, low recidivism

life sentences, whom ICSVE

terrorism, their experiences inside

Public Policy and Administration

rates among terrorist convicts even

researchers have interviewed

ISIS, as well as developing the

from Northwestern University

in the absence of deradicalization

explained that their time in prison

Breaking the ISIS Brand Counter

and a B.A. degree in International

programs, both among jihadi

served to remove them from the

Narrative Project materials from

Relations and Diplomacy from

and ethno-nationalists, are often

ISIS’ takfiri ideology that rejects

these interviews. She has also been

Dominican University. He is an

cited as successes (Silke, 2014).

all other interpretations of Islam

training key stakeholders in law

adjunct professor at Nichols

While this is an important point

and to provide ample opportunity

enforcement, intelligence, educators

College, teaching cybersecurity and

to consider, it may also be that the

to reflect about the injustices and

and other countering violent

counterterrorism courses.

face to Islam.” (Speckhard & Shajkovci, 2018) Researcher Andrew Silke (2014)

securitysolutionsmagazine.com

That said, simple imprisonment

SECURITY SOLUTIONS // 73


LOSS PREVENTION

ANALYTICS HAS NEVER BEEN A FOUR-LETTER WORD IN LOSS PREVENTION BY JACQUE BRITTAIN

Analytics is a word that elicits

everyday, real-world situations.

ways the science has taken on new

many different reactions based on

Nearly all of us realise the value,

and different meanings, we can

who we are and what we do. Some

but still some of us shy away

never afford to lose sight of just

of us visualise a sea of numbers,

from the term like it is a four-

how important it is to everything

records and formulas that can

letter word.

that we do.

drown us in an overwhelming

The truth is, analytics has

As we have matured as

wave of statistics. Some picture

always been a critical aspect of

professionals, most of us grew

‘techies’ with white shirts and

loss prevention and retail as a

from humble beginnings of

pocket protectors, pushing

whole. We could never survive as

dealing with shoplifters, to the

theories and designing algorithms

businesses – or as professionals

challenges of dealing with internal

that most of us need and few of us

– without the use of analytics. Yet

theft and the development of

understand. Others simply think

while the use of data analytics has

interview skills, to the more global

it is complicated and difficult

made huge strides with the help of

retail perceptions of controlling

to comprehend and apply in

today’s technology, and in many

retail shrink and the overall profit

74 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


securitysolutionsmagazine.com

SECURITY SOLUTIONS // 75


LOSS PREVENTION

enhancement of our businesses.

progression of the profession. This

plans, price and promotion

conducted. And it is so much

Each step of the way, analytics has

has given us perspective as well

modelling, responding to new

more than that.

been part of our thought processes

as credibility, providing value

business trends, sales force

Analytics often involves

and our career development as

beyond the numbers.

optimisation, and even the

studying past historical data to

temperatures maintained in

research potential trends, analyse

our stores are all a product of

the effects of certain decisions

data analytics.

and evaluate the performance of

much as it has been part of our might not have called it that, but

Applying the Information

it has always been at the heart of

Especially valuable in areas

who we are and what we do.

everyday job responsibilities. We

Analytics is the process of

a given tool or scenario – the goal

rich with recorded information,

uncovering meaningful patterns

being to improve the business by

such as retail, organisations may

found in available information

gaining knowledge, which can

data analytics has been a

apply analytics to business data

to help us make better, more

be used to make improvements

cornerstone of our evolution

to describe, predict and improve

meaningful decisions. It

or changes. In loss prevention,

from a security presence to a

performance. It is used in every

involves the careful research

this is specifically the steps

professional partner in asset and

aspect of the business, from

or examination of available

we take when we perform an

profit protection. The ability to

purchasing and replenishment

information, discovering facts,

audit. Shrink numbers are a

use the information available to

to identifying customer trends,

interpreting the details, and

product of data analytics, as

us to learn the business, identify

shopping patterns and customer-

helping us draw conclusions

are exception-based reporting

issues and areas of opportunity,

service needs. Sales performance,

about the subject at hand. In loss

and fraud analytics. We use

apply that data in meaningful and

supply chain analytics, store

prevention, that process is at

analytics to monitor everything

productive ways, and drive results

assortment and stock keeping

the core of every consequential

from our alarm systems to our

remains essential to the ongoing

(SKU) optimisation, marketing

investigation that we have ever

safety programs.

As the industry has matured,

76 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


the truth is, analytics has always been a critical aspect of loss prevention and retail as a whole. we could never survive as businesses – or as professionals – without the use of analytics.

make adjustments to better fit the new standard of performance. Technology changed our approach and made our jobs much more efficient. It made us better, allowing us to focus on other things and be more productive. It has actually helped us gain additional credibility as we gain responsibilities and

decision making and other

Big data analytics can help

take on a more prominent role

useful purposes.

organisations to better

in managing the profitability of

understand the information

the business.

• Predictive Analytics: a form of analytics using a number of

contained within the data

advanced statistical techniques

and will also help identify the

Moving Forward

to conduct queries used to

data that is most important

In the world of retail loss

identify trends, patterns,

to the business and future

prevention, we will continue

relationships, behaviors, risks

business decisions.

to apply analytics in order to

All of this may sound extremely

describe, predict and improve

complex and even a little

the performance of the company,

application of artificial

intimidating, but all of these

but the world is not going to slow

intelligence (AI) that provides

methods are being used in the

down for any of us. Not only will

software applications with the

retail industry. The truth is,

we not see that new standard of

ability to automatically ‘learn’

technology continues to impact all

performance ever go away, but

and improve from experience

the tools of the trade and analytics

also it is only going to speed up as

without being explicitly

is just another piece of the puzzle.

we move forward. Yet we should

programmed. Focusing on the

We have subject-matter experts

not pretend that this has not been

development of algorithms

in computer science, statistics

the case all along. The stakes

and computer programs

and mathematics that help us

might be higher and our roles are

that can access data and use

build programs and use these

going to continue to change, but

it for statistical analysis, it

tools to help improve operational

that is only because they need to.

allows computer systems to

efficiency in just about every

adapt to new data without

aspect of what we do. This is

day you look down and find you

human involvement.

a good thing, but we still have

are wearing a pocket protector. At

to do our part and continue to

least we will make wearing that

that involves analysing

learn and grow with the needs of

pocket protector look good – if

Okay, so today, it is a much

text documents aided by

the business.

that is possible (probably not). n

different world, with a more

software that can identify

robust agenda. Retail is not what

concepts, patterns, topics,

can still remember the days of

it used to be. Loss prevention

keywords and other attributes

searching through mountains of

editorial director, digital for LP

is not what it used to be. Some

in the data. This requires

refund documents and miles of

Magazine. He has worked in the

people will correctly argue that

sophisticated analytical tools

register tapes trying to uncover

loss prevention industry for over

this description of data analytics

that process text in order to

patterns and solve theft problems

30 years and was instrumental in

is not exactly what they had in

glean specific keywords or

in our stores. Then, somewhere

the development of the industry’s

mind. Rather, they turn to current

key data points from what are

along the way, we were given the

only internationally sanctioned LP

methods and computer science

considered relatively raw or

gift of exception reporting, taking

credentials – the LPQualified (LPQ)

– more advanced types of data

unstructured formats.

what once took hours and even

and LPCertified (LPC) courses

• Big Data Analytics: the process

days to review and turning it into

in collaboration with the Loss

of collecting, organising and

a review of documents that took a

Prevention Foundation. Jacque

through large amounts of

analysing large sets of data

few seconds to generate.

can be contacted via email jacb@

computerised data sets to

from a wide variety of sources

identify meaningful and

(big data) to discover patterns

our jobs, but it did mean we had

useful trends, patterns,

and other useful information

to modify the way we looked

on losspreventionmedia.com,

relationships and other

that might provide valuable

at how we managed the loss

the website of the US-based Loss

information to enhance

insights into the business.

prevention process. We had to

Prevention Magazine.

and opportunities. • Machine Learning: an

Today, It is a Different World

analytics that include: • Data Mining: sorting

securitysolutionsmagazine.com

• Text Mining: a process

Just do not be surprised if one

For example, some among us

This by no means took away

Jacque (Jac) Brittain, LPC is

Ipportal.com This article first appeared

SECURITY SOLUTIONS // 77


SPOTLIGHT

BOON EDAM ENHANCES EXISTING DOOR SECURITY WITH NEW CIRCLELOCK COMBI INTERLOCKING SECURITY PORTAL

G

lobal entrance

“Many areas such as data

secure or non-secure side of an

“The Circlelock Combi

security leader Boon

centres have a certified fire-rated

Edam is introducing

door installed, integrated with an

to Australasia a new

access control system. This door

follows: on authorisation, the

need for the highest level of

half portal that attaches to an

can easily be interlocked with

portal’s interlocking door slides

unauthorised entry prevention at an

existing door to enhance its

the Circlelock Combi, creating a

open allowing a user to enter the

unmanned area,” says Mr Russell.

security and protect public and

fire-rated, high security entrance,”

portal. An integrated security

private facilities from unauthorised

he said.

system confirms whether the user

entry, tailgating and piggybacking.

“Other applications that can

existing swing door. The working principal is as

interlocking security portal was developed to answer the market’s

is alone and if so, the swinging

Integration Opportunities

benefit from upgrading their

door is unlocked, enabling passage

Boon Edam’s global research

combines the high security

entrance security in this way

into the secure area. A secondary

and development team has

features of Boon Edam’s globally

include government, military

biometric system such as facial

extensively researched ways

proven Circlelock portal –

and defence organisations,

recognition can be used to confirm

to ensure easy and effective

including StereoVision anti-

corporate headquarters of major

identity inside the portal.

integration with third parties

piggybacking technology that

multinationals and cash centres.”

The new Circlelock Combi

combines optical and infrared technologies – with a building’s existing door.

The smart choice for high security entrances

technologies such as biometrics

Highest Protection

and Access Control System (ACS).

The Circlelock Combi security

This is over-and-above any

access solution offers facility

already built-in systems, such as

“Circlelock is the most

Renovation and construction costs

managers and security consultants

advanced sensors and accurate

effective portal to pick up and

can escalate quickly when locking

peace-of-mind when they are

identification systems that only

stop piggybacking and tailgating

down a highly sensitive area. The

seeking to keep people and

allow one person in the portal

using our StereoVision detection

Circlelock Combi can minimise

valuables safe and secure, without

per authorisation.

system,” says Boon Edam National

these nebulous costs by easily

incurring the additional costs of

Sales Manager, Mr Alastair Russell.

and quickly attaching to either the

reconstructing entire entrances.

78 // SECURITY SOLUTIONS

"This new innovation means that we can now offer our

securitysolutionsmagazine.com


customers a safe, yet convenient-

headquarters, healthcare facilities

to-install-solution for highly critical

and hotels as well as the giant

areas in their building. The small

5-metre high revolving doors on

footprint and space-saving features

the new Rialto revitalisation project

of the Circlelock Combi make it a

in Melbourne.

welcome addition to our globally

All Boon Edam products are

leading high security family,” said

backed by extensive service

Mr Russell.

networks throughout Australia and New Zealand, designed to optimise

Proven experience

the reliability and efficiency of

The Circlelock Combi joins

revolving doors, security portals

the comprehensive entrance

and security entrance systems. n

security suite of the global Boon Edam group, which operates in 27 countries.

Learn about the Circlelock Combi Interlocking Half Portal.

Circlelock – the globally proven product on which the Combi is

For Further Information,

based – is also one of a suite of

Please Contact:

security entrance and revolving

Alastair Russell

doors systems already in service

National Sales Manager

in Australasia.

T: +61 1300 689 905

Other Boon Edam systems in

securitysolutionsmagazine.com

M: +61 (0)450 924 882

service here span office buildings,

E: alastair.russell@boonedam.com.au

government buildings, corporate

W: www.boonedam.com.au

SECURITY SOLUTIONS // 79


SPOTLIGHT

THE AXESSOR CIT ADVANCE SAFE LOCK ACCESS MANAGEMENT SYSTEM roviding excellence in

Development Managers (BDM),

list and instructions on hand

is the locks from the mid 90’s were

security is about

installers and customers. The

over to the customer and how

basic electronic locks with a very

more than simply

support staff must be factory

to train the customer. For the

limited feature set. The Axessor

providing a product.

trained and be able to further train

customer the instructions need

CIT has a feature set that allows

True excellence is involves

other support staff, BDM’s installers

to be cut down to only reflect

for several different modes to suit

providing an entire system from

and customers. The support staff

the specific programming of

the different users, Bank mode for

hardware to support, service and a

will train the installers who would

the lock and may consist of a

conventional staff, CIT (OTC and

commitment to ensuring the needs

then, as part of the installation

manager level and staff member

ICS) for rolling codes for special

of a client are meet in every way.

process, train the customer. The

level. They must be simple and

use or for a CIT company and the

support staff must also work closely

in plain English, so they are

locks can also be networked to

lock access management system

with the BDM’s to both train and

easily understood.

centralise administration of your

is an advanced security solution

provide higher level technical

• Installation Adaptors: The

entire Axessor system. This means

suitable for securing all manner

support and advice during the

Axessor CIT in Australia is

support for Axessor CIT locks must

of valuables. Applications to date

sales process.

predominantly fitted to existing

include not only traditional safe

safes. These safe in some cases

lock support people, but network

P

The Axessor CIT advance safe

in Australia and New Zealand include banks, retailers, hotels,

Specification

are many years old and may

engineers and software developers

pharmaceuticals, fast food and

The BDM typically works with

require some adaption. We

as well as industrial designers

jewellers. The system can be

the customer to document the

found it is easier to design and

to design the adaptor plates.

deployed in a multitude ways

best programming set up of the

produce plates and adaptors

SmartLock Digital has invested in

including as a standalone operation

Axessor CIT to suit the customers

prior to installation to ensure

resources to meet the demands of

or a networked or mixed mode

exact requirements. Once the

the on-site time and business

maximum-security environments by

system that allows the lock to

specification is agreed upon, a

disruption is minimal during

having all this expertise in house.

operate as a standalone lock for

complete working sample Axessor

installation. These installation

normal staff and One Time Code

CIT must be presented, explained

plates also include some WHS

Summary

for others.

and demonstrated to the customer.

items such as to change the

The above describes in short, the

This allows the customer time to

angle of the key pad to make

process and has highlighted some

commenced rollouts of several

test the functions of the lock to

reading the display easier and

of the key points that SmartLock

major Axessor CIT projects. These

ensure they meet the organisations

to reduce the need for staff to

Digital has found in the last 24

projects have demonstrated that

requirements. It must be noted here

bend to open locks mounted

months when rolling out Axessor

unlike the rollout of conventional

one of the strengths of the Axessor

low on safe doors.

CIT projects. By no means does

electronic and mechanical safe

CIT is that it can be programmed

locks, which have a very basic

and then reprogrammed until it is

encyclopedia on this but the

highlight one extremely important

feature set, rollouts of Axessor

correct now or in the future to meet

Axessor CIT software includes

point that has not been addressed.

CIT require a considered approach

the changing security needs of

a software development kit

To successfully rollout and then

involving careful planning

an organisation.

(SDK). It is essential to have in

support Axessor CIT requires many

house staff who can document

different disciplines ranging from

Customisation

and write the integrations that

mechanical lock expertise, to

tasks to be addressed during

Customisation covers

different customers require.

software network and integration

a successful Axessor CIT

documentation, installation

rollout. These are Training,

adaptors and integration.

Ongoing Support

process works seamlessly on-going

Specification, Customisation, and

• Documentation: The Axessor

SmartLock Digital have been selling

customer service and support

CIT manual is very extensive.

and supporting safe locks for over

backed up by experts in their field

Specific instructions must be

30 years in Australia and New

under one roof. n

Training

created for each access level.

Zealand. We often get calls for locks

There are four separate groups to

For the installer a complete

installed in the mid 90’s and we still

be trained. Support staff, Business

installer guide including a check

support these locks. The difference

Smartlock Digital have recently

and execution. There are four main

Ongoing Support.

80 // SECURITY SOLUTIONS

• Integration: I could write an

this cover every detail but it does

expertise. To ensure this entire

For more information visit smartlock.com.au

securitysolutionsmagazine.com


SWIPE, SLIDE OR HANDS-FREE

Digital Identification Made Easy

Your activities are not limited to

Is user-friendliness the key for the

control reader designer, in

security applications. How do you

success of your solutions?

2013, to be awarded Top-Level

use your technology for other

Vincent Dupart: Absolutely. Our

Security Certification by the

ith its innovative

industry sectors?

innovation strategy focuses

French Network and Information

solutions, France’s

Vincent Dupart: We were already

on user buy-in to corporate

Security Agency (ANSSI), and to

leading provider of

pioneers in UHF technologies when

security policies. That’s why

offer solutions that comply with

instinctive contactless

we launched our first reader in 2004

we develop products that make

European GDPR rules. All this

technologies is disrupting the

and we are always looking ahead to

access control smoother and

is a guarantee of unparalleled

market and seeing double-digit

future market trends. Over the last

much easier. Directors of Security

expertise. And we are also a

growth. We ask CEO Vincent Dupart

three years, we have significantly

and end users all consider our

registered center for training in

about the keys to this success,

increased our level of investment

technologies to be the most

contactless technologies.

growth plans for the future and what

and we design asset tracking

user-friendly on the market. STid

visitors at Intersec in Dubai can

solutions for other industry sectors

Mobile ID is a great example of

What trends do you see in

expect to see at the STid stand.

now. We offer security and the

this. The mobile solution moves

the market?

ability to monitor industrial flows

your traditional access card onto

Vincent Dupart: We are seeing

It looks like you are trailblazers in

and processes, by turning assets into

your smartphone. With a range of

biometric solutions coming in,

the field of instinctive security. Can

smart connected objects, providing

different identification methods,

but also combined on- and offline

you give us a short summary how

our industrial partners with an

this solution makes access

offerings, just like what STid

things developed in the last years?

essential decision-making tool.

control so much more seamless

Mobile ID already does.

Vincent Dupart: We were the first to

Our technologies are so advanced

and instinctive for users. All you

rethink the way organizations can

that we are listed as a key supplier

have to do is touch your hand

What can visitors expect when

protect their people, assets and data

in the most stringent sectors

on the Architect reader and the

they visit your stand at Intersec

using intuitive RFID access control

like the aeronautical or power

doors will open, whether you

2019 in Dubai?

readers. We provide security at

generation industries.

are talking on your cellphone,

Vincent Dupart: Our experts will

or it’s just in your pocket.

show our STid Mobile ID Online

W

some of the most prestigious sites in France and Europe, such as Airbus,

How do you explain your 25%

There is a dynamic system for

Portal and virtual access control

the French National Centre for

annual growth, when the market is

managing access rights, so that

card management solution

Space Studies, government offices

only growing 5%?

authorization can be issued or

plus Architect Bluetooth/NFC

and other bodies critical to national

Vincent Dupart: It’s about our

revoked remotely, which Security

scalable readers. Our customers

security. We have now one million

innovative and user-friendly

Managers love.

will experience our reader

readers in service and 100 million

solutions and the associated services

users around the world and are the

which make it easy to integrate our

How important are certifications

new “Skin effect” technology, to

leading French solutions provider.

products into our clients’ third-

in a business where the quality

tailor the reader to your brand

We are now targeting the North

party solutions. Rather than using

of a system is hard to prove?

image. SPECTRE, our latest long-

American market, with the aim of

proprietary technologies that lock

Vincent Dupart: Certifications

range identification reader will

gaining 10% market share within

the end customer in, we take an open

send a strong signal to the

also be on display to show fast-

the next three years.

approach to technology.

market. We were the first access

tracking for your vehicle gates. n

securitysolutionsmagazine.com

customization service with the

SECURITY SOLUTIONS // 81


PRODUCT SHOWCASES

NEW OUTDOOR SPEEDGATE PROVIDES SECURITY - RAIN OR SHINE An access control gate designed

entrances or service entrances

users confidence when using the

a superior MDD motor that is

to withstand harsh outdoor

elsewhere on a premises, both of

lane, ensuring quick throughput.

both quieter and faster than the

conditions has been brought to

which are traditionally protected

Australia by leading security

by guard houses staffed by

available with a longer access

solutions provider Centaman

security personnel, or full-

lane and built-in detection of

Entrance Control.

height turnstiles which are slow

bicycles. The variation is ideal

of 180 mm, an inviting aesthetic

and cumbersome.

for workplaces seeking an access

and a customisable finish,

solution that supports their bike-

Centaman Entrance Control’s

friendly workplace policy.

new outdoor speedgate provides

Dubbed the EasyGate SPTOutdoor, the new gate is the

The EasyGate SPT-Outdoor

A bike-friendly solution is also

motors used by other speedgates on the market. Created with a pedestal width

company’s first outdoor speedgate,

is available with mid (1,200

created to meet the needs of

mm) or full (1,800 mm) height

warehouses, distribution centres,

bi-directional glass barriers that

be tough, so the new speedgate

security, durability and fast

manufacturing plants and other

open after a user presents a valid

is made using high quality

throughput. n

outdoor facilities that require

card, quickly closing behind

components that can withstand

speedgates to control external

the authorised person to deter

rain, snow, sand, and a wide

entry points. These points could

tailgating. The familiar ‘door-like’

variety of different humidity and

www.entrancecontrol.com.au or

include front gate pedestrian

movement of the barrier gives

temperature levels. It also boasts

phone: +61 (02) 9906 7522.

82 // SECURITY SOLUTIONS

Outdoor environments can

a winning combination of high

For more information visit:

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmedia.com/newsletter

DORMAKABA MS2600 MORTICE LOCKS The new dormakaba MS2600 Mortice Lock are heavy duty stainless steel mortice locks, designed, engineered and built for optimal performance across a full range of applications including education, healthcare, office, retail, municipal buildings and residential projects. The mortice case, cover and faceplate are constructed of 304 grade stainless steel

securitysolutionsmagazine.com

providing greater security than die cast mortice locks and better corrosion resistance. Moreover, the lock spindle hubs, latch bolt, deadbolt and dead latch are constructed of high grade sintered stainless steel while the springs are of high grade spring steel. dormakaba MS2600 locks conform to level SL8 (Physical Security) and D8 (Durability)

in accordance with ANZ lock standard AS/NZS 4145.2·2008. These new Mortice Locks us a universal “T” shape strike plate as standard and feature an Anti-Lockout (Kick Off) function which can be easily activated or de-activated. Primary lock is supplied de-activated. The MS2602 also offers a latch hold back function via a 130 cylinder with a hold back cam (CAM

KH) ordered separately, with or without cylinder. Rebate kits are available as an accessory to convert the MS2600 mortice locks into a rebated unit or, alternatively, fabricator kits are available as an accessory to accommodate installation on metal/ aluminium doors and frames. n For more information visit www.dormakaba.com

SECURITY SOLUTIONS // 83


PRODUCT SHOWCASES

dFENCE ePOD What would you do in an

a Fire Blanket, an LED Torch,

emergency? Are you prepared?

a fully stocked First Aid Kit,

You should be, after all, is that

and a Mesh Bag for you to

what security is all about, being

personally customise.

prepared for the unknown?

The ePODs contemporary and

Thankfully, being prepared for

sophisticated design not only looks

emergency situations is now a

fantastic, but is easy to use and

little easier thanks to the launch of

completely functional.

the dFENCE ePOD. dFENCE ePOD is a global first

The ePOD also comes with a free App specifically designed

from an Australian company.

to help with the set-up and on-

The ePOD is a contemporary

boarding of your new ePOD. The

and stylish Emergency POD

App comes with the Emergency

designed to cater to a wide range

Contact Function to enable

of needs and situations including

group text messaging with

residential homes or apartments,

predetermined messages, and also

businesses and even vehicles.

features contemporary state of

The ePOD can be simply mounted

the art 3-Dimensional Augmented

on the rear of a door using the

Reality Instructions on how to set

backing mount plate or in a

up and use essential items within

cupboard or under the kitchen

the ePOD.

sink. The ePOD provides a single, easily accessible location for all

The ePOD ensures you’re prepared to Save Lives! n

your emergency needs to protect you, your family and staff. The ePOD contains a detachable Fire Extinguisher,

84 // SECURITY SOLUTIONS

You can order the ePOD at www.dfence.co or contact sales@dfence.co

securitysolutionsmagazine.com


F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry

instagram.com/securitysolutionsmag

Keyhound Keyhound from Lockit Systems

solution that is scalable from single

brings a fresh approach to the

site to a global network capable

age-old problem of physical key

of sending fresh, live information

registration and management.

direct to your mobile device. Well

Invented over 4000 years ago by the Egyptians, the humble key

imagine no more. Keyhound is an innovation

is still one of the most used front

that works ‘OUT OF THE BOX.

line security devices ever created.

Developed by Richard Gould,

But when you put hundreds of keys

director of Lockit Systems, this

together, it can lead to total failure

patent applied, removable, battery

of your front line security. Manual

powered keyhound panel records

‘key registration’ is only as good as

any removals and returns of keys.

the discipline applied. One need only

Furthermore, through the use of

look at their key control and ask the

the ‘key handover’ mobile app, the

question “do I know who has the keys

system can log simply and easily

right NOW” to know how effective a

log and track keys passing from

key management system is.

one person to another. Keyhound -

Imagine a system that provides

keeps on tracking... n

staff accountability as well as key monitoring and control over vehicle or property access, all from single

securitysolutionsmagazine.com

For more information visit www. keyhound.com.au

SECURITY SOLUTIONS // 85


STOPTALK

Changes To Security Licence Exemption For ID Scanning Guideline In Queensland

The Security licence exemption

The Exemption

for ID scanning guideline was

A person scanning an ID will

Importantly, nothing in the

screening process adopted by

approved by the Office of Fair

not need to be licensed as a

guideline reduces the general

venue management to ensure the

Trading in July 2017 to provide

crowd controller only if all of the

obligations of a licensee under

patron conforms to the venue’s

liquor licensees with greater

following conditions are met:

the relevant legislation and,

general admission criteria. For

flexibility when managing

• ID scanning is adopted either

accordingly, apart from the

example, while a patron’s ID

all involvement.

checks on a patron in the entry

the ID scanning requirements

mandatorily or by election at

scanning of IDs, all other

may scan without any issues, he

brought in under amendments

the venue.

screening of the entry of

may be excluded because he is

persons deemed appropriate by

unduly intoxicated, disruptive,

to the Liquor Act 1992. The

• The person is scanning a

exemption allowed persons who

patron’s ID, as required by the

the licensee must properly be

or inappropriately attired

were not licensed as a crowd

Liquor Act 1992.

conducted by a crowd controller.

or presented.

controller under the Security

• The person scanning IDs is

Providers Act 1992 to operate

indirectly supervised while

A Practical Example

otherwise unsuitable to enter

the ID scanners, provided they

performing such duties at

When a patron wants to enter

the premises, the licensed crowd

were supervised directly by a

all times by a licensed crowd

a venue, a host or hostess can

controller will refuse entry in a

crowd controller.

controller, who is employed

perform the actual scanning

firm, polite, non-confrontational

on the licensed premises.

of the patron’s ID into the ID

and professional way and

scanner. A licensed crowd

generally manage any direct

The guideline has been reviewed after 12 months

• If the ID scan identifies a

If the patron is banned or

of operation. As a result, it

banned patron, only a crowd

controller on duty at a licensed

interaction with patrons that the

has been amended to allow

controller may remove that

premises will directly or

ID scanning staff are not trained

an ID scanner operator to be

person from on or around

indirectly supervise the host or

or authorised to perform. n

unlicensed on the condition they

the premises.

hostess operating the ID scanner.

are supervised indirectly by a

• In any physical interaction

As part of the indirect

More information on the

licensed crowd controller on

between a licensed crowd

supervision, the crowd controller

security licence exemption for ID

duty on the licensed premises.

controller and a patron, a

may separately and when

scanning and legal requirements

(Readers can access the

person merely scanning

deemed necessary from time

for the security industry is

guideline here.)

a patron’s ID must avoid

to time, undertake any further

available on our website.

86 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


L I K E U S O N FA C E B O O K For the latest news, products and events in the security industry

facebook.com/ssmaust

Dahua Technology Protects Women Against Domestic Violence

In honor of International Day for the Elimination of Violence against Women, Dahua Technology recently donated its advanced video surveillance solutions to the Faces of Hope Victims Center to help the centre create a safe space for victims and employees alike, protecting domestic violence sufferers. Globally, almost one third (30%) of women who have been in a relationship report that they have experienced some form of violence by their intimate partners. Globally, more activists and groups are organizing to combat domestic violence. Boise, Idaho based victim center Faces of Hope is leading the way in reducing victimization

securitysolutionsmagazine.com

of domestic abuse by offering a safety net of crisis-intervention services. Given the danger posed by abusers, it was necessary for the Center to upgrade its video surveillance system to ensure the security of both staff and victims. “Meeting with Dahua, it was clear that they were eager to help us in any way they could,” said Darren Braden, Regional Sales Director at Dahua’s All-star Dealer - Integrated Security Resources (ISR). “Upgrading the older cameras was a must for the victim center, so Dahua donating its video surveillance equipment is a step towards making this upgrade a reality.” Dahua Technology upgraded Faces of Hope’s security system

with HD over Coax to minimize system disruption and bolster user interface as well as technologies such as 4MP IR 3.6mm Mini Dome and Mini Bullet Dahua cameras to enable superior clarity. Furthermore, Dahua bolstered the center’s night surveillance with WDR enabled products to provide high-quality images and crystalclear imagery around the clock. Most valuably, Dahua Technology ensured the safety of Faces of Hope Victim Center with aroundthe-clock surveillance and monitoring support, imbuing its technology with the company’s care and dedication. With end-to-end technical support to ISR, the installation

went smoothly. Faces of Hope Victim Center staff have described the upgraded system as “much easier to use, has perfect picture quality, and makes us feel safer. Dahua’s generosity is greatly appreciated, and the quality of their products is unmatched.” Moving forward, Dahua Technology will continue leveraging its leading technologies to not only ensuring the safety of women and domestic violence victims but contributing more to the local communities and social purposes. Dahua Technology will continue to focus on “Innovation, Quality and Service” to realize its mission of “Enabling a safer society and smarter living”. n

SECURITY SOLUTIONS // 87


STOPTALK

STID SECURES THE POLICE OF THE UNIVERSITY OF TEXAS AT ARLINGTON

The UTA police at has selected Architect® Blue multi- technology readers— combining three identification technologies: 125 kHz, 13.56 MHz, and Bluetooth—and the STid Mobile ID solution in order to control access to its premises and facilitate technological migration to advanced security levels. This mobile solution reinvents access control by making identification much more instinctive and userfriendly. It brings the access card to your smartphone using innovative identification modes, in addition to the badge. “We analyzed the solutions available on the market. Ergonomics, a high level of security, and configuration tools that make it easy to implement the solution are the criteria that made STid stand out very quickly. More than 130 users, police officers, and security professionals use STid Mobile ID daily. It is essential for protecting the access to our infrastructures”, says a UTA police chief sergeant.

88 // SECURITY SOLUTIONS

For his part, Vincent Dupart, CEO of STid, states: “This new rollout is the result of an increasing adoption of our high-security and instinctive access readers in North America. It is part of our development strategy, initiated in 2013, whereby STid became the first manufacturer to obtain the French First Level Security Certification (CSPN) issued by ANSSI. In 2016 STid expanded its geographical horizons by opening offices in London and Mexico. This year STid is focusing on its expansion in the North-American market and has opened STid NA Inc. in Irving, Texas, providing the most awarded access control readers in the world.“ The French David continues to challenge the Goliaths, as he is devising an investment plan for 2019- 2023 that will make him the European leader in access control. n For more information, please visit www.stid-security.com

securitysolutionsmagazine.com


Sign up to our eNewsletter and receive up-to-date valuable information regarding all things Security.

www.securitysolutionsmagazine.biz/newsletter


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.