A U S T R A L A S I A’ S L E A DI N G S E C UR I T Y R E S OUR C E F O R BU S I N E S S A N D G O V E R N ME N T
FEB 2019 ISSUE 115
THE ROLE OF PRIVATE SECURITY
IN COUNTER-TERRORISM
Prepared to
support you
at every level.
Effective cybersecurity is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And it’s about partnering with a solutions provider who’s prepared to support you at every level. Which is where we enter the picture. We are 100% focused on cybersecurity, and we do everything in our power to mitigate its risks. We have strict requirements for our own products and we work diligently with our partners—and you—to fight this threat.
Learn about our layers of protection at www.axis.com/cybersecurity
V SA E TH E E AT D
GAIN YOUR COMPETITIVE ADVANTAGE AT AUSTRALIA’S LEADING INDUSTRY EVENT For over three decades the Security Exhibition & Conference has been the most established and respected trade event for the security industry in Australia, bringing together the full spectrum of manufacturers, distributors, security professionals and end users. Position your business and amplify your brand among the industry’s most powerful influencers. Network with the most established names, discover the latest technology and create profitable opportunities.
To book a stand contact the team Melissa Clendinen Event Manager 03 9261 4662 mclendinen@divcom.net.au
Lead Industry Partner
Abigail Ford Account Manager 03 9261 4650 aford@divcom.net.au
FIND OUT MORE AT
SECURITYEXPO.COM.AU #SECURITY2019 The peak body for security professionals
ISSUE 115
CONTENTS
86
FEATURES
46
26 34
cover story
74
50
There are more than 120,000 licensed security guards in Australia. Security personnel are the eyes and ears on the ground; they are the day-to-day interface with the community and, when an incident does occur, they are the real first responders. Why then is the private security sector not mentioned in any of the top-level strategic counter-terrorist plans?
60
26 IDENTIFYING SOMEONE WHO MAY BECOME A THREAT
Insider threats to an organisation come from a number of sources and there is no absolute distinction that classifies someone as high risk. However, there are patterns of behaviour that can trigger a warning.
38 NEW VIDEO COMPRESSION
Internationally renowned CCTV author, lecturer, innovator and consultant Vlado Damjanovski explains HEIC and its potential future impact on IP CCTV.
56 PROVE CYBERSECURITY VALUE TO BUILD A
REGULARS 06 LETTER FROM THE EDITOR 08 LEADERSHIP
How do you apply an Enterprise Risk Management model to security?
CULTURE OF CYBERSECURITY
If you want senior executives to buy into cybersecurity, you need to prove the value cybersecurity brings to the core business. But how exactly should you do that?
68 PRISON: MILITANT JIHADIST RECRUITING GROUNDS OR REFUGE FOR REHABILITATION?
We look at issues of recruiting for violent extremism in prisons and examine vulnerabilities for prison radicalization and potential prevention and intervention strategies for the management of violent extremism in prisons.
10 CYBER SECURITY
Why does cyber security need to extend beyond the security department to be successful?
12 MARKET ANALYSIS 14 HUMAN RESOURCES
Greg Byrne examines the challenges around dismissing an employee for under performance.
16 RISK MANAGEMENT
How we can improve risk management through the use of pictures.
18 STRATEGY
Can you grow your business by helping improve your client’s sales processes?
20 LEGAL
How should you structure your business to better protect your assets?
22 THINKING ABOUT SECURITY
What are the realities of protecting people in crowded places?
30 ALARMS
Is 5G the future of intruder alarms?
34 OPERATIONS
Richard Kay examines procedures to help improve public safety around the use of firearms.
42 BUSINESS
How can you create the ultimate competitive advantage for your security business?
52 AVIATION SECURITY
Steve Lawson looks at the challenges around securing airside access.
60 CCTV
How To Minimise Roulette Wheel Motion Blur
64 PROFESSIONAL DEVELOPMENT
Why do people deliberately set fires?
74 LOSS PREVENTION 78 PRODUCT SPOTLIGHT 82 PRODUCT SHOWCASES 86 SHOP TALK
Company announcements from within the industry.
24 EVENTS CALENDAR
A look at upcoming industry events.
4 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
FROM THE EDITOR FROM THE EDITOR www.securitysolutionsmagazine.com
EDITORIAL www.securitysolutionsmagazine.com
EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon
Bob Ansett, Jacque Brittain, Jason Brown, Greg Byrne, Brian Contos, Vlado Damjanovski, Rebekah CONTRIBUTORS Doley, Alex Ganin, Richard Kay,Foster, Garry Kevin Barnes,Foster, Jason Brown, Greg Byrne, Kevin Stephen Lawrence, Steve Lawson, Richard Johnson, Kay, SteveJustin Lawson, Justin Lawrence, Scott Tim Rippon, Adrian Shajkovci, Anna Silwon, Anne O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Speckhard, Lisa Alex Warren, Don Williams Anne Speckard, Sidernko, Ardian Shajkovci, Ami Toben, Simeon Votier
ADVERTISING Keith Rozairo ADVERTISING
Keith Rozairo PHONE 1300 300 552 PHONEkeith@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL keith@interactivemediasolutions.com.au
W D
hen we first launched Security
changed significantly and dramatically in the last
Solutions back in February of 1999
20 years. Terrorism has become a very real concern
under its original title Security Oz oes Australia really take security Magazine, there were around 27,000 seriously? Yes, Government claims
for the Western world, Australia included. And while Australian’s do have a very relaxed attitude we may have seen a significant increase in to security because they believe, rightly orsecurity
licensed security another to, personnel and some in ofVictoria, the corporate 33,000 ‘thereabouts’ in New South Wales, a further sector demonstrate a passing
infrastructure andhappen planning across both the wrongly, that “itspending will never here”. This corporate and government sectors, it would seem is a sentiment we can only hope remains true.
12,000 or so in Queensland and unknown interest from time-to-time, but an what of the number across the rest of the country. I say unknown average man and woman on the street? Dobecause we
that oneas of the the old country’s powerful, effective and However, axiommost states, one should available resources is still being treated as something always expect the best but plan for the worst and
these were thesecurity basic and approximate honestly take seriously or donumbers we, as awe
akin toto a drunken uncle with a proclivity for politically prepare be surprised.
were working offlip after initialtoenquiries nation, just pay service the ideato various licensing and regulatory bodies when researching the of security? sizeAsofwe theenter market withwe a view to establishing 2018, should be thankfulthe that
incorrect statements at your 16th birthday. Of course, one should notdaughter’s have to rely upon we of head into a newincident year andto new election someAs form devastating occur in cycle, is finally timeto fortake whichever party that ends order toitforce people security seriously.
viability of such a magazine. Australia has never suffered a major terrorist
up running Australia for the future to There is a great deal that theforeseeable security industry
Jonathan Rudolph PHONE 1300 300 552 PHONEgraphics@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL graphics@interactivemediasolutions.com.au
incident the likes of 9/11, the BostonPolicy bombings, Last year, The Australian Strategic Institute
can do toget educate business community about finally seriousthe about our security and, if nothing
the bombings of July 7,issues 2005related in London or the and (ASPI), which examines to defence
the benefits ofsome taking seriously. In past else, address ofsecurity the fundamental issues that
MARKETING AND SUBSCRIPTIONS MARKETING AND PHONE 1300 300 552SUBSCRIPTIONS
terrorist October 12, 2002 in Bali. national attacks security,of released a Special Report Safety in
issues Security Solutions Editor-At-Large would go a long way toward bringing the Rod private
PHONEadmin@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL AUD admin@interactivemediasolutions.com.au $62.00 inside Aust. (6 Issues)
However, a result, the Australian Numbers as – Australia’s private securitycommunity guard force and
Cowan hasindustry writteninto about security canfold, act as security thehow national security such
$62.00 AUD Aust. (6 (6 Issues) $124.00 AUDinside outside Aust. Issues) $124.00 AUD outside Aust. (6 Issues)
has become somewhat complacent with regard counter-terrorism. The report was launched on 17
a differentiator for business and give companies as a national licensing scheme and standardised
ACCOUNTS ACCOUNTS PHONE 1300 300 552
to security. I often hear manythe of our readers who October by Senator Reynolds, Assistant Minister are managers withincover largestory, corporations for security Home Affairs. This issue’s written by
a competitive edge. across the country. training requirements
DESIGN AND PRODUCTION Jonathan Rudolph DESIGN AND PRODUCTION
PHONEaccounts@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL accounts@interactivemediasolutions.com.au
PUBLISHER PUBLISHER
ABN 919463 ABN56561,606 606Joseph 919463 Blackburn, Victoria 3130 Level Level 1,34 34 Joseph St, St, Blackburn, Victoria 3130 PHONE PHONE 1300 1300300 300 552 552 EMAIL enquiries@interactivemediasolutions.com.au EMAIL enquiries@interactivemediasolutions.com.au WEBSITE WEBSITE www.securitysolutionsmagazine.com www.securitysolutionsmagazine.com DISCLAIMER DISCLAIMER
The of this this Thepublisher publishertakes takes due due care care in in the the preparation preparation of magazine and magazineand andtakes takes all all reasonable reasonable precautions precautions and makes the accuracy accuracy of of makesall allreasonable reasonable effort effort to to ensure ensure the material but is is not not liable liable materialcontained contained in in this this publication, publication, but for The publisher publisher forany anymistake, mistake, misprint misprint or or omission. omission. The does not assume any responsibility or liability for any does not assume any responsibility for any loss inaccuracy lossor ordamage damage which which may may result from any inaccuracy or use of of oromission omissionin inthis this publication, publication, or from the use information makes no no informationcontained contained herein. herein. The publisher makes warranty, any of of the the warranty,express express or or implied implied with respect to any material materialcontained contained herein. herein. The reproduced Thecontents contentsof of this this magazine magazine may not be reproduced inANY ANYform formin in whole whole OR OR in in part without WRITTEN in WRITTEN permissionfrom from the the publisher. publisher. Reproduction includes permission includes copying,photocopying, photocopying, translation translation or reduced to copying, to any any electronicmedium medium or or machine-readable machine-readable form. electronic form.
WRITTENCORRESPONDENCE CORRESPONDENCE TO: WRITTEN Level1, 1,34 34 Joseph Joseph St, St, Blackburn, Blackburn, Victoria Level Victoria 3130 3130 1300300 300552 552 1300 enquiries@interactivemediasolutions.com.au enquiries@interactivemediasolutions.com.au
comment on the between attitudes Don Williams, onedifferences of the original authors of the report to security in Australia and to America, they and a long-time contributor Securitywhere Solutions,
If we havewe learned anything from been tragicat least 14 To date, know that there have events have plots occurred globally in recent majorthat terrorism foiled in Australia by our various years, it must be that worldagencies has changed – law enforcement andthe security over recent
often have travelof and According tohis many provides anto outline thework. report’s finding. In security understand thatmore openingmanagers, comments,Americans Williams writes, “There are
permanently – and cannot keep pretending years. However, as we former US Secretary of Defense that it hasRumsfeld not. 9/11 wasrightly not anand isolated incident Donald once so eloquently
terrorism is a clear andsecurity presentguards danger a than 120,000 licensed in and Australia. fact of daily life and thus, they treat security No one knows the exact number, as each jurisdiction
and if groups ISIS against have their way, such pointed out, like defence terrorism requires a attacks will become There government to get itmuch right more every frequent. time. A successful
and security workers with the due respect. In has a different way of defining security operators, contrast, they believe that Australian’s have a determining who should be licensed and how.” very blasé attitude towards security and it is this However loose that figure might be, 120,000 attitude that makes us much more vulnerable is still a significant increase in the number of to attack. licensed security personnel in Australia from the In my opinion, having recently travelled ‘guesstimated’ 80,000 of two decades earlier. through Egypt and Jordan, they are correct. However you choose to count them, licensed security
is a great deal more work to be done to ensure terrorist attack only requires the perpetrators to get it that we create the kind of effective security right once. Therefore, it is reasonable to conclude that culture within organisations and the broader if hostile groups intent on causing significant harm community that will enable Australian’s to be continue in their efforts, at some point in Australia’s safe and secure. And the work must begin with future we will inevitably join the rest of the Western security professionals. Let’s make 2018 the year world in experiencing a major terrorism incident. that Australia begins to take security seriously. n When that time comes, the question must and will
personnel have come to represent a significant
be asked, “Was everything that could be done to
portion of Australia’s national security apparatus.
prevent this incident actually done?” In reality,
A 2016 Productivity Commission report puts
until significant changes are made in the way that
police numbers, as of 2018, at more than 70,000. That
government and law enforcement across Australia
would mean that there are currently almost double
view the private security sector and the contribution
the number of licensed private security operatives
it can and does make to national security, then the
than there are sworn police in Australia. And yet,
answer must be no.
according to the ASPI report, the private security
The report outlines the issues, the actual and
sector is not mentioned in any of the top-level
potential capabilities and the problems that are
strategic counter-terrorist plans. The first and only
holding the sector back from being an active
mention is in the Mass Gathering Strategy issued
participant in the national counter-terrorist plans,
by the Australian New Zealand Counter Terrorist
and presents recommendations to enable the
Committee issued in 2017.
private security industry to become a recognised and
Both this issue’s cover story and the ASPI report
effective part of the counter-terrorist capability. n
PR O
SECURIT Y
PR
RALIA LTD UST FA RALIA LTD
Official Official Partners Partners O rigin a l Siz e Original Size
PR O
Y P R OV RYI TP R O V I D I D E E RCIUT
CU
SE SE
SECURITY
illuminating. However, my point is this: almost 20
N
USTRA F SAT R A L L I A A OU IA
STRALIA LTD AU OF STRALIA LTD AU
SECURITY
O C I AT I ASS ON O C I AT I ASS O
RS
SPAAL SPAAL
read both as they are extremely interesting and
OF
OF
PR O
RS
SSOCIAT RS A IO DE N SSOCIAT VI RS A IO DE N VI
years later, I find it frustrating to find that government
D LT D LT
SECURIT Y
why this is the case, and I would encourage you to
SSOCIATI ON O SSOCIATI RS A ON DE O VI
RS A DE VI
UST FA
O
go on to outline a wide variety of reasons as to
and law enforcement across the country still espouse blue colour changed to this colour green. blue colour changed to this colour green.
COPY/ARTWORK/TYPESETTING APPROVAL COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE Please proof read carefully of this material BEFORE signing your approval to print.ALL Please paycopy/artwork/typesetting special attention to spelling, punctuation, signing your approval numbers, to print. Please pay special to spelling, punctuation, dates, times, telephone addresses etc, asattention well as layout.It is your responsibility to dates, times, telephone numbers, addresses etc,Press as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman assumes no responsibility our attention anybeen corrections. Minuteman Press assumes responsibility for bring errorstoafter a proof has authorised to print and print re-runsno will be at your cost. for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................ Signed.................................................................. Date........................
// SECURITY SECURITY SOLUTIONS SOLUTIONS 46 //
the same prejudices towards, and dismissal of, the John Bigelow value of private security in Australia. The world has Editor
John Bigelow Editor
securitysolutionsmagazine.com securitysolutionsmagazine.com
MFB are certified manufacturers of Class C and Class B cabinets including custom sizes upon request.
Nothing except craftsmanship. This has been the uncompromising tradition for more than 45 years as MFB builds its sought-after data cabinets and server/equipment racks.
DESIGNERS & MANUFACTURERS OF 19� RACK SYSTEMS
MFB’s products are practically designed and skilfully handcrafted to suit any need in any environment. And, importantly, they are made from quality materials. MFB is backed with years of experience in meeting specifications for all types of industries, matched with additional in-house quality standards and customer reporting, MFB stand proud as a leader to military, air traffic control and navy industries. MFB - an Australian Design Award recipient - is justifiably proud of its products. There is no need to accept second best.
AUSTRALIAN MADE MAKES AUSTRALIA
www.mfb.com.au
VIC NSW -
P (03) 9801 1044 P (02) 9749 1922
E sales@mfb.com.au E sydney@mfb.com.au
LEADERSHIP
ENTERPRISE RISK MANAGEMENT I
n this article, I will
Defining Risk Criteria
expand on the Enterprise
The organisation should specify the
Risk Management Model
amount and type of security risk that
and look at the process
it may or may not take relative to
as applied to security. As
objectives. It should also define criteria
readers of the previous article will recall,
to evaluate the significance of the risk
ISO31000 is the Australian Standard for
and to support the decision-making
Risk Management and the basis for
processes. Risk criteria should reflect
security risk planning, but there are other
the organisation’s values, objectives
models that can contribute.
and resources and be consistent with
COSO is an Enterprise Risk
BY JASON BROWN
policies and statements about risk
Management – Integrated Framework
management. The criteria should be
expands on internal control, providing
defined, taking into consideration
a more robust and extensive focus on
the organisation’s legal, regulatory
the broader subject of enterprise risk
and all other obligations, along with
management. It is not intended to and
stakeholder views.
does not replace the internal control framework, but rather incorporates the
Risk Assessment and Analysis
internal control framework within it;
The purpose of risk identification is
companies may decide to look to this
to find, recognise and describe risks
enterprise risk management framework
associated with security that might help
both to satisfy their internal control
or prevent an organisation achieving its
needs and to move toward a fuller risk
objectives. Relevant, appropriate and
management process.
up-to-date information is important in
COBIT 4.1 is an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. COBIT enables clear policy development and good practice for IT control throughout organisations. COBIT emphasises regulatory compliance, helps organisations to increase the value attained from IT, enables alignment and simplifies implementation of the enterprises’ IT governance and control framework. The risk management process applied to security involves the systematic application of policies, procedures and practices to the activities of communicating and consulting, establishing the context and assessing,
identifying risks. Risk assessment should be conducted systematically, iteratively and collaboratively, drawing on the
Risk Treatment
outcomes should be a planned part
The purpose of risk treatment is to select
of the risk management process, with
and implement options for addressing
responsibilities clearly defined.
risk. Risk treatment involves an iterative process of: • • •
knowledge and views of stakeholders. It should use the best available information supplemented by further enquiry as necessary. The purpose of security risk analysis is to comprehend the nature of risk arising from security and its characteristics including, where appropriate, the level of risk. Risk analysis involves a detailed consideration of uncertainties, risk sources, consequences, likelihood, events, scenarios, controls and
The risk management process for security
treatment options
and its outcomes should be documented
planning and implementing risk
and reported through appropriate
treatment
mechanisms. Decisions concerning
assessing the effectiveness of that
the creation, retention and handling of
treatment; deciding whether residual
documented information should take
risks are acceptable •
Recording and Reporting
formulating and selecting risk
if not acceptable, taking further treatment.
Selection of Risk Treatment Options Selecting the most appropriate risk treatment option(s) involves balancing the potential benefits derived in relation to the achievement of the objectives against costs, effort or disadvantages of implementation. Risk treatment can also introduce new risks that need to be managed.
their effectiveness. Preparing and Implementing Risk
into account, but not be limited to, their use, information sensitivity, and internal and external context. Over the 2019 edition, each of these process steps will be looked at in detail to assist in building your risk management process for security. n Jason Brown is the National Security Director for Thales in Australia and New Zealand. He is responsible for security liaison with government, law enforcement and intelligence communities to develop cooperative arrangements to
Risk Evaluation
Treatment Plans
The purpose of risk evaluation is to
The purpose of risk treatment plans is
support decisions. Risk evaluation
to specify how the chosen treatment
involves comparing the results of the
options will be implemented so that
risk analysis with the established risk
arrangements are understood by those
criteria to determine the significance
involved and progress against the plan
of risk. Decisions should take account
can be monitored. The treatment plan
process is often presented as sequential,
of the wider context and the actual
should clearly identify the order in which
served on a number of senior boards
in practice it is iterative.
and perceived consequences for
risk treatments should be implemented.
and committees, including Chair of
treating, monitoring, reviewing, recording and reporting risk. The dynamic and variable nature of human behaviour and culture should also be considered throughout the risk management process. Although the risk management
The organisation should define
minimise risk to Thales and those in the community that it supports. He is also responsible for ensuring compliance with international and Commonwealth requirements for national security and relevant federal and state laws. He has
the Security Professionals Australasia;
internal and external stakeholders.
the purpose and scope of its risk
Decisions should be made in
Monitoring and Review
member of ASIS International Standards
management for business security.
accordance with legal, regulatory and
The purpose of monitoring and review
and Guidelines Commission; Chair of
The internal and external context
other requirements.
is to assure and improve the quality
Australian Standards Committee for
and effectiveness of process design,
Security and resilience. As of February
is the environment in which the
The outcome of risk evaluation
organisation seeks to define and
should be recorded, communicated and
implementation and outcomes. Ongoing
2017, Jason has been appointed Chair of
achieve its objectives arising from
then validated at appropriate levels of
monitoring and periodic review of
the International Standards Committee for
security activities.
the organisation.
the risk management process and its
Risk Management.
8 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
The Cobalt is an innovative low voltage motor driven door lock for swing doors. It has been designed to secure double acting doors and addresses the two biggest issues in door locking; the ability to align a misaligned door and the ability to release when requested, even with excessive load on the door. The Cobalt successfully overcomes these issues and offers the user an array of other features. To learn more about our complete range of smart and secure access solutions, contact dormakaba.
T: 1800 675 411 www.dormakaba.com.au
More than just a lock
CYBER SECURITY
CYBERSECURITY IS EVERYONE’S RESPONSIBILITY
BY TIM RIPPON
• Do not use the same passwords for multiple applications or online accounts. • Educate employees on what websites are okay to visit and what is to be avoided. • Use due diligence online when opening emails, clicking on links or downloading attachments. • Run continual email phishing campaigns with employees who are obliged to report suspect messages to the technology team. e work in an always
effective way to reduce the number
on, digital world
and ferocity of cyberattacks. Having
security-based information
cybersecurity awareness
where we are
a sound cyber awareness program
at hand, in a timely manner?
campaign so employees become
electronically
in place helps the integrity of
For example, are they aware
aware of what they can do and
connected every minute of every
sensitive corporate information to
of current threats and
day. Company reputation and
be better maintained.
vulnerabilities or have a
A conversation with your
W
fortune is based on all employees
• Technology: Do technology have
• Have an ‘it is personal’
what to avoid.
security information and event
cybersecurity staff or consultant
and suppliers maintaining effective
cybersecurity awareness program
management (SIEM) solution for
can enhance your cyber awareness
security practices. To develop
at every level of the organisation is
timely analytics?
footprint, where the first step is
cybersecure maturity, some simple
required to effectively mitigate risks
questions are required to be asked,
relating to cyberattacks.
Therefore, a holistic
for example: 1. Do employees adhere to policies
The Executive
• Legal: Are they actively
educating your executive to sponsor a
involved with security incidents
cyber awareness program in order to
when required?
protect your digital online assets. n
At the executive level, there should
Every Employee
be regular standing security items
It is personal!
and trainer of cybersecurity and
that are actively discussed in
Often, employee online security
business continuity. He holds a certified
meetings on a regular basis. Security
behaviours at home can determine
Master of Information Security (ISO
cybersecurity practices across
should be discussed frequently and
how they operate in the work
27001), certified Master of Business
our business functions?
their endorsement of cybersecurity
environment. Hence, considerable
Continuity (ISO 22301) and Lead
initiatives is paramount to a
effort in the workplace is required
Cyber Security Manager (ISO 27032)
your executives demonstrating
successful cybersecurity program, in
to educate and raise awareness on
from PECB. Tim is actively involved in
to employees?
turn reducing the number, as well as
cybersecurity, for example:
various industry groups, including the
severity, of cyber risks.
• Keep an eye out for suspicious
Australian Women in Security Network
and good governance? 2. Are your online habits at home the same as in the office? 3. Do we ‘bake in’ good
4. What cybersecurity culture are
As agreed by most security
Tim Rippon is an author, speaker
behaviours of co-workers
(AWSN) and the Business Continuity
professionals, humans are the
Across the Business
and have an anonymous
Institute, where he volunteered for
weakest link in the information
Various essential functions across
reporting mechanism.
five years, including two years being a
security chain; hence, cybersecurity
the business have their own roles to
really is everyone’s responsibility.
play, like:
discounted anti-virus/firewall
Tim is founder and director of elasticus,
• Human resources: Are adequate
software for home use.
advising Australian-based executives
Most organisations have
• Consider offering employees
board member of the BCI Australasia.
multiple insider threats that occur
background checks in place
• Do not share passwords and
each year; therefore, the human
when employing new staff?
enforce them to be changed
disaster recovery and business
element in cybersecurity must
Is cyber awareness training
every few months.
continuity prior to the occurrence of
never be underestimated, as good
included as part of the
cyber awareness is often the most
induction process?
10 // SECURITY SOLUTIONS
• Ensure personal passwords are not used in the workplace.
on how to best manage cybersecurity,
a major disaster or crisis. He can be contacted via mobile 0417 036 026.
securitysolutionsmagazine.com
Inbuilt ÂŽ Wi-Fi , Z-Wave & 433MHz radio Quick & easy install
Control lighting, temperature + appliances
Remote monitoring & control via UltraSync app TM
Wide range of accessories
Future Proof
24x7 monitored solution
Live streaming with audio
The latest in wireless home security & automation. As the NBN rolls out across Australia, many alarm systems that utilised traditional copper-based landlines will become obsolete. ZeroWireÂŽ offers a future proof solution, utilising IP or 3G communication methods, Wi-Fi, Z-Wave and 433MHz radio to deliver a state-of-the-art security and home automation system, that can be controlled via the UltraSyncTM app on smartphone or tablet. HSS0046-Dec18-V1
For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au
facebook.com/HillsLtd/ CONNECT
E N T E RTA I N
SECURE
MARKET ANALYSIS
WHO’S WHO IN AUSTRALASIAN ACCESS CONTROL BY ALEX GANIN
n this issue, we
13 most popular players in the
was second place, which went
in almost all countries around the
explore the access
market as defined by users. In order
to dormakaba. This was worthy
world and there is no reason to
control market in
to achieve this, we targeted our
of further investigation because,
expect this region would be any
Australia and New
findings on the brands that are
while dormakaba (formerly KABA)
different. The top 10 is rounded
Zealand. In order to build this chart,
being used, or at least mentioned,
regularly feature in the top 10 in
out with the usual names such as
we examined information from
by a minimum of 25 companies
most other countries, the company
Aiphone, Honeywell, HID and Assa
3,973 companies that work in the
across our respondents.
rarely makes it into the top three,
Abloy, none of whom are strangers
which makes its second-place
to the top 10 ranking in most areas of the global market. n
I
security market. Based on the
The most acknowledged
number of players in access control,
company in the Australia and New
ranking in the Australia and New
it would be almost impossible to
Zealand market was Australia’s
Zealand markets quite exceptional.
analyse the performance and
own Inner Range. Given the size
As for DSC, a third place is not going
popularity of every brand.
and strength of this company
to make market watchers looking
and so on, check the source at
Therefore, we have refined our
locally, this was interesting, but not
to place a bet anytime soon. DSC
Global market for surveillance and
research findings to include the top
unexpected. What was unexpected
regularly rates within the top five
security equipment.
12 // SECURITY SOLUTIONS
To view more brands, companies
securitysolutionsmagazine.com
Smart Vehicle Identification
Photos credits: Shutterstock - aressy.com 04/18 - 10917
New Spectre reader: Let the good go, kick the bad out. Without delay. Meet the challenge of fast-track security at your vehicle gates. Spectre’s UHF-based vehicle ID reader is the first of a new generation: discreet by design, flexible in its configuration, secure and encrypted in its communication. Our new long-range reader is built to perform for up to 4 driveways, even in highly challenging environments. It’s the most robust reader on the market, yet intuitively easy to use. Welcome to speed and security - in a single solution.
SCALABLE | SMOOTH | SECURE | AGILE | STEALTH | INSTINCTIVE
www.stid-security.com Security Meetings Trophées de la sécurité Expoprotection ISC West APS
HUMAN RESOURCES
DISMISSING AN EMPLOYEE FOR UNDERPERFORMANCE BY GREG BYRNE
O
f all the ways in which
Employers must also be aware
he is going to improve, and then both
you can dismiss an
that the ‘three strikes and you are out’
parties should sign an improvement
employee, dismissing
situation cannot be used as a base for
plan to set the employee back on
for underperformance
underperformance dismissals.
track. Often, this type of conversation
is more complicated than terminating
All employers, either in the
• accrued annual leave or long service leave entitlements • redundancy or severance pay entitlements, where applicable. Double check that you are satisfied: • the reason for the dismissal is valid • the employee has been notified of the reason and given an opportunity to respond • that the warnings provided have
will improve performance for
been recorded and signed by at
employment for inappropriate
Australian security industry or
some time; it can sometimes be a
least the employer and preferably
behaviour, fraud or theft.
not, should follow a process when
permanent fix.
the employee. If the employee
The Fair Work Commission
managing staff, including when
refuses to sign a warning, ensure
defines poor performance as, “when
managing their performance.
3. Step three
that refusal is noted on his
an employee is not doing their job
When dismissing employees for
If the conduct does not improve,
personnel file and performance
correctly, or is behaving unacceptably
underperformance, the Australian
then you need to take further action.
at work, and includes:
Human Resource Institute
Provide the employee with a formal
• not carrying out their work to the
recommends a four-step process
written warning. If this is not done,
requirements of the National
as follows:
the employee has grounds to say that
Employment Standard and that
they had no idea there was a problem,
this complying has been recorded
1. Step one
or that the issue was resolved.
on the personnel file and the
All employees should be on a
You should never assume that an
performance management plan that
employee knows there is a problem.
Organise a meeting, tell the employee
for example, telling inappropriate
clearly outlines their key performance
Staring daggers and the cold shoulder
of the reason for the meeting and offer
jokes
areas, targets, review dates and
is not acceptable employer behaviour.
the employee a support person. The
• disruptive or negative behaviour
agreed-upon milestones. This plan
The quicker you take action, the
meeting should be held in a neutral
at work, for example, continually
should be in writing and signed off
faster it will be resolved. You may
setting, such as a conference room,
speaking negatively about
by the employer and the employee.
have to provide the employee with
with at least a witness appointed
the company.
The plan should be placed in the
more than one written warning.
by you and preferably one from the
There is a difference between
employer’s file or personnel file and
Although this sounds tedious and
employee as well.
underperformance and serious
regularly reviewed at meetings. At the
unnecessary, if you end up in the Fair
misconduct.”
meeting, the employee’s performance
Work Commission it is far better to be
verbal and written in the form of
required standard or not doing their job at all • not following workplace policies, rules or procedures • unacceptable behaviour at work,
What you are asserting in a
plan • you have complied with all
management plan.
The termination should be both
against the criteria of the plan should
standing on the moral high ground
a termination letter that puts your
dismissal for underperformance
be discussed and consensus reached
than struggling to explain why the
decision in writing and explains
is that the performance of the
on how they have gone. This meeting
employee was not given an adequate
how and when final compensation
employee is poor, that you have
and outcome should be documented
chance to improve.
and benefits will be distributed.
informed them of such and they have
on the plan and filed back in the
failed to improve, and therefore there
personnel file.
Notes should be taken to document 4. Step four
the employee’s response and all of
If attempts at improving performance
these documents should be kept in
2. Step two
have failed, you can terminate
the personnel file. If all goes well,
If performance against the key
the employee. This is of course
hopefully, you will never need them.
of underperformance is very
performance areas and other
if the employee has not already
subjective (see above), which has
measurable areas of the plan is
realised that he cannot match the
might be stressful for you, it is also
in the past been open to abuse
below what is expected and agreed
requirements of the job or the whole
very stressful for the employee.
by employers who are trying to
to, inform the employee that you
situation is just getting too hard and
The Fair Work Ombudsman has
rid themselves of employees who
are going to organise a meeting. You
he resigns. This is, of course, the
repeatedly stated, “Failing to dismiss
have ticked them off, or not done
can inform him that he can have a
easy way out. If you do not manage
an employee appropriately and
a particular job in the manner or
support person present, although it is
to garner a resignation, then follow
sensitively can lead to unhealthy and
to the level that was expected.
not compulsory. Make it clear in the
this process:
unproductive outcomes that may
Or the employer imposed the
meeting that if his conduct does not
tag of underperformance to rid
improve, you may have to dismiss him.
all his entitlements, including:
themselves of an employee for
Ensure this is in writing. Post-meeting,
• outstanding wages
other reasons.
have the employee think about how
• any payments instead of notice
is no room for improvement and it is time for them to go. However, the definition
14 // SECURITY SOLUTIONS
Ensure the employee has received
One final note; although this
affect your entire staff.” n Greg Byrne is the CEO and founder of Multisec Consultancy.
securitysolutionsmagazine.com
CIRCLELOCK
TOURLOCK
SPEEDLANE LIFELINE
TURNLOCK
The full entrance security product suite Boon Edam Australia is uniquely positioned to offer a full entrance security product suite. Ranging from full height turnstiles and speed gates, through to high security revolving doors and portals, Boon Edam has your entry secured. Find out why the world’s biggest names, including Fortune 500 companies and government institutions, rely on Boon Edam for their entrance security.
ASK US ABOUT INNOVATIVE NEW LEASING PLANS AVAILABLE ON ALL ENTRANCE SECURITY PRODUCTS.
Boon Edam Australia 1300 689 905 www.boonedam.com.au
RISK MANAGEMENT
RISK MANAGEMENT WITH PICTURES
BY DR KEVIN J. FOSTER
other elements of physical security design could be included in such a standards-based graphical user interface. The building is located in a precinct; imagine zooming recently attended a
When it comes to protecting
is a great example of where such
out from the 3D building user
Standards Australia
society from terrorism and violence,
a new user interface is needed.
interface and clicking on the areas
forum that focused
any approach to improving
Imagine a 3D picture of a building
around the building to provide
on future strategies
coordination of expertise amongst
on a website that you can access
links to other standards, relevant
for standards development and
all building professionals and
on your smartphone, tablet or
legislation and references needed
dissemination. One of the
trades has to be a good thing.
computer. If you are an architect
to consider the risk and resilience
wanting to know about standards
planning for the area. This could
I
innovations that grabbed my
Most design and risk
attention was the use of images to
management standards are
relevant to blast protection
include traffic control, pedestrian
create links to standards that we all
typically in the form of a book.
options for windows, click on a
movements, planning issues and
need to use.
Traditionally, this has been in paper
window on the building and you
precinct-wide design principles
form, but most people now use PDF
are immediately presented with
based on crime prevention through
development by Standards Australia
versions of those books for ease
links to all the relevant standards.
environmental design.
is HB188, which aims to describe
of reference. Like many people, I
If you are an engineer needing to
the use of physical security for
keep a list of standards that I have
know about bollard standards for
with building and precinct
addressing the risk of terrorism and
regularly used, but I am not always
protection of the building against
design, construction and facility
violent extremism inside, outside
aware of updates to standards or
vehicles used as a weapon, then
management should be formulated
and in the surrounding precinct
the publication of new standards.
click on the picture of the bollard
using graphical interfaces. Imagine
of a commercial building. There
Also, some older standards might
outside the building and that will
the impact on multi-disciplinary
are already many standards that
be withdrawn. Up until now,
present links to all the current
design, construction and
could be used to help executives,
conducting searches of standards
relevant standards on this subject.
management coordination! n
designers and builders decide
databases has been one way to
which measures they should
try to keep on top of the changing
perimeter door in the 3D picture
consider. However, there are so
standards landscape. However, this
will provide links to standards and
managing director of Foster Risk
many standards, guidelines and
can be laborious and not always
references that detail what needs to
Management Pty Ltd, an Australian
reference documents that need to
effective. There is a need for a
be considered for the selection of a
company that provides independent
be utilised in the decision process
better user interface that guides us
security door. Clicking on a picture
research aimed at finding better
that it is sometimes difficult to
to the standards we need to read
of a CCTV camera will provide links
ways to manage risk for security and
know where to start, and very easy
and use.
to standards. Lighting, vehicle
public safety, and improving our
access, structural blast protection,
understanding of emerging threats
pedestrian access control and all
from ‘intelligent’ technologies.
A handbook currently under
to overlook important standards or industry benchmarks.
16 // SECURITY SOLUTIONS
The use of physical security in and around a commercial building
Perhaps all standards associated
Clicking on an outward opening Dr Kevin J. Foster is the
securitysolutionsmagazine.com
NEW!
STRATEGY
GROW FASTER BY HELPING YOUR CUSTOMERS SELL TO THEIR OWN BY STEPHEN JOHNSON
I
skilling your clients can be a great
Develop Assets
businesses in the
to make it very successful. The asset
way to apply leverage and help
If your clients are in similar sectors
security market, you
you bring is not money but the
them lift sales. And along the way,
but in different regions, then the
sell to other
knowledge of how they can better
it will lift your sales to them.
marketing collateral you build
f, like most
businesses rather than consumers, you might be forgiven for thinking
And it can take very little money
is probably similar. So you can
spend their own money. You can win in at least two ways
Benchmarking
transfer it between clients with
you have little control over the
and sometimes three:
If you sell to a lot of different
little customising. This means
consumption of what you sell;
1. You win more sales.
companies, in different territories,
you have marketing assets you
because the performance of your
2. You win more clients.
then you can consider taking what
can repeat.
clients’ businesses plays a key
3. And, if you help your
you know works in one place and
factor in the performance of your
resellers, then you win better
applying it to another. You can also
Develop Systems
own. For example, you can only sell
brand quality.
help clients measure themselves
Borrow from the franchising model
against similar but non-competing
and develop the processes that use
as many cameras to your client as your client can sell to his or
Here is how you can help your
companies, and help them improve
your assets, like campaigns and
her customers.
clients and profit from doing so:
what they do and how they do it.
sales models, and enshrine them
This is not an expensive exercise.
in ways that make it easier for your
Your marketing, selling and retention of old customers might all
Collateral And Execution
It simply makes better use of what
clients to consistently get it right.
be very healthy. But if your clients
If your own team can generate
you already have access to.
This makes the process you build
are not doing as well, all you can do
marketing and selling collateral
is stack them up with your product
for you, like brochures, ads and
and wait.
scripts, then they can also generate
Retention, Database And Social Media
it for your clients. Most companies
If your clients have adequate lead-
Develop Training And Community
to help your customers sell more.
do not adequately represent
generation and lead-conversion,
Train your clients in how to use
This applies whether they are
themselves in their online, printed
you might be able to help them
your marketing and sales aids and
reselling your product or they are
or scripted materials and they do
keep their customers longer or
help them network. Become a
just consuming what you sell them
not execute campaigns very well. If
obtain more post-sales from their
builder of a community of kindred
as they sell their own.
you can improve both sides of the
customers. Retaining clients can
companies in non-competing
marketing multiplier – the message
be hard and getting clients to refer
sectors or regions and you will
and selling skill-set above your
and the efforts that take that
others or increase their spend with
build your own place in the
clients, you can take these skills
message to market – then you can
you can also be difficult if you do
industry. n
and inexpensively apply them for
achieve a lot for your clients with
not know how. So applying your
your clients.
minimal effort. They still cover the
knowledge to your clients can
Stephen Johnson is a Director
hard spend. You simply make that
help them leverage their wins,
of Strategy and Action, a business
spend more effective.
and boost their consumption of
strategy and marketing consultancy
your own product or service along
serving Brisbane, Sydney and
the way.
Melbourne. Stephen has created
So a strategy you can adopt is
If your company has a marketing
If it sounds like a lot of effort, and like a rather indirect way to grow sales, think again; this is a highly
once, work many times more.
leveraged way to increase business.
Sales Conversion
Your conventional marketing efforts
Some companies do not fail in
are a ‘push’ strategy. But helping your
their lead-generation but in their
efforts truly profitable is to bottle
growth strategies for companies
clients can create a ‘pull’ strategy by
lead-conversion. They fail to close
what you do so that you can roll it
from most sectors in Australia.
increasing their demand for what you
sales as well as they could. Using
out to more clients, faster, for less
He can be contacted at info@
sell them.
your company’s sales skills and up-
effort. You do this in three ways:
strategyandaction.com.au
18 // SECURITY SOLUTIONS
The way to make all these
and executed breakthrough
securitysolutionsmagazine.com
YO UR AC CES S TO REVO LUTI O N
FlowMotionÂŽ
For more information | 1300 364 864 | info@magnetic-oz.com | www.flowmotion-access.com |
LEGAL
STRUCTURING YOUR BUSINESS TO PROTECT YOUR ASSETS BY JUSTIN LAWRENCE
any people own their
Pty Ltd – then even if the business
own businesses, but
is sued, Callum has shielded the
life, Callum should undertake an
and the contributions are for
this is a mistake. At
lease from the firing line as best
asset protection risk assessment.
consistent and reasonable amounts.
this point, you are
he can, and the business will still
As part of that assessment, Callum
Similar strategies exist if the
probably asking yourself what I am
have premises from which to trade.
should ask himself what the most
risk assessment reveals matrimonial
talking about. People should not
If Callum is the sole director and
important thing is that he is trying
breakdown or claims against
own businesses in their personal
shareholder of Callie Dude Pty
to protect and who represents the
estates as Callum’s most pressing
capacities. Businesses should be
Ltd, then the company will take
greatest threat to that asset.
asset protection issue.
owned not by the proprietors of
whatever steps Callum directs
them, but by other people or
anyway, so he does not lose
protection structures may protect
things now will greatly assist
entities who are separated from the
any control.
assets from creditors, but not from
Callum – and his business – in the
matrimonial breakdown. Some
long run. n
M
day-to-day operation of the
Similarly, the business name
At any time during its trading
For example, some asset
the early days of Callum’s business
Giving some thought to those
business. But how do business
of Callum’s Security Distribution
structures may protect assets from
owners structure themselves
should also be held by an entity
matrimonial breakdown, but may
appropriately? Here is a bit of an
other than Callum. Ideally, Callum
not protect from claims brought
with Henderson & Ball Solicitors,
action plan.
would have a separate company
against Callum’s estate after he
5 Wellington St, Kew, Victoria, and
that owns the business name
dies. Once Callum has undertaken
practises in the areas of Commercial
should be registered in the name
– that is, a company other than
his full assessment, he can structure
Litigation, Criminal, Family and
of a company or other entity. Take,
Callie Dude Pty Ltd. Then, even
and plan his asset protection risk
Property Law. Henderson & Ball
for example, Callum’s Security
if the company holding the lease
strategy. Let us look at one of those.
have Law Institute of Victoria
Distribution. Now, Callum is a
is wound up or liquidated, the
young go-getter full of ideas about
business name would be kept free
has assessed his own personal
of Business Law, Property Law and
how to turn his standalone, shop
from claims.
bankruptcy as his greatest threat. To
Commercial litigation. Mr. Lawrence
start with, Callum should not own any
and Henderson & Ball can be contacted on 03 9261 8000.
For starters, the business name
Let us assume that Callum
Justin Lawrence is a partner
accredited specialists in the areas
front operation into a multi-state,
When Callum’s Security
fully franchised operation. Callum
Distribution buys materials and
assets of significance. His house and
intends to lease modest, yet
supplies, it should do so under a
car should not be in his own name. As
comfortable, premises in a semi-
name other than Callum’s private
a proprietor of a business, Callum’s
taken to ensure its accuracy, the
industrial part of the city and to
name. Given that the business
assets are best held in the names
information contained in this
throw his doors open for business.
name is owned by a company, that
of others (even though Callum will
article is intended to be used as a
name could do. However, in an
be advised that holding his home
general guide only and should not
named on his lease? Not Callum,
ideal world, a new company would
in the name of a company will have
be interpreted or taken as being
that is for sure. Why? Because at
be set up for that purpose. That
tax consequences which would not
specific advice, legal or otherwise.
this stage, the business is Callum. If
company – let us call it Callum
otherwise apply if the house was in
The reader should seek professional
something happens to Callum – he
Security Pty Ltd – would apply
his own name). If he can manage it,
advice of a suitably qualified
is sued or he is in a car accident
for credit, issue purchase orders
Callum should pay as much money as
practitioner before relying upon
and is unable to keep working or
and pay invoices on behalf of the
he can afford up to the threshold into
any of the information contained
pay the rent – then anyone chasing
business. If, for any reason, the
his superannuation fund.
herein. This article and the opinions
the business for money will chase
business had insufficient funds
If, despite his best efforts,
Callum. If he loses that fight, he is
available to pay creditors, then
Callum is made bankrupt, he can
opinions of the author and do not
a good chance to lose the business
Callum Security Pty Ltd would be
prevent the money paid into his
necessarily represent the views
and the lease.
the entity sued for the money. At
superannuation fund being clawed
or opinions of Australian Media
the same time, the business name
back by his trustee in bankruptcy.
Group Pty Ltd or any advertiser
the name of a separate entity – let
and lease would be quarantined
While this strategy is limited, it can
or other contributor to Security
us call his company Callie Dude
from that law suit.
be effective if it is put in place from
Solutions Magazine.
Who should be the tenant
If, however, the lease is held in
20 // SECURITY SOLUTIONS
Whilst every effort has been
contained in it represent the
securitysolutionsmagazine.com
THINKING ABOUT SECURITY
POOH AND CROWDED PLACES BY DON WILLIAMS
W
innie-the-Pooh has
Why else would there be all
consequence table and therefore,
the reality of such attacks, then
such an ability to see
these reviews and guidance on
makes the resultant risk rating
we can show owners how they
and state the true
terrorism and crowded places
unacceptable. As a result, most
can continue to operate and
nature of things that
unless it was to guarantee a safe
assessments would recommend
manage the risks in a realistic and
environment? We know better.
the activity not occur. We saw
practical manner.
Benjamin Hoff has likened him to a Taoist Master. Perhaps the ability to
We can restrict the ways in
this when local councils looked at
It may not be palatable;
identify and explain that which is
which an attack can be launched,
cancelling ANZAC Day events last
owners and operators (and the
obvious but not always recognised
and we can limit the size and
year. Of course, if the business
public) may want to hear that they
is something we should develop.
speed of a vehicle that can enter
relies on crowds, then closing
are protected and no one will die
a crowded place. We can limit
down is not an option. How can
from an attack in a crowded place,
at the moment on protecting
the size of an explosive item
we provide effective and accurate
but the simple truth is that they
crowded places. Should we, as
brought into an area. We may be
risk assessment?
will. To pretend otherwise and to
security specialists, point out
able to search people to prevent
that we cannot. We can reduce
There is a lot of emphasis
Perhaps we need to point
work with risk assessments that
weapons being introduced. But,
out that if the incident being
avoid this fact is delusional and
the attack vectors and we can
the nature of the event, the built
assessed is an attack in a
not helpful.
put measures in place to limit the
environment, the ‘image’ of the
crowded place, then multiple
number of fatalities, particularly
site and the willingness of the
injuries/fatalities will occur.
inner Pooh and be willing to see
those that may die later. What
owners, operators and patrons all
The ideal consequences would
and state the obvious. n
we cannot do is stop someone
limit the likelihood controls. We
be no fatalities, but medium
from entering a public place and
can also look at how the site will
consequences – for this type of
committing an atrocity.
respond after an incident; what
incident – would be multiple
is a recognised thought leader in
Perhaps we should access the
Don Williams CPP RSecP ASecM
Somebody has to state the
consequence mitigation measures
casualties and high end/
security, emergency management
obvious; there appears to be a
are in place to limit the loss of life
unacceptable consequences
and related disciplines. His book
perception, or perhaps a desire,
and to prevent further deaths?
would be additional post-
Bomb Safety and Security: the
incident fatalities.
Manager’s Guide is available from
by the public and even elements
One of the biggest problems
within government that everyone
is how we assess risks. Normally,
If we are willing to adjust
can be protected everywhere.
a fatality is at the high end of the
the risk definitions to match
22 // SECURITY SOLUTIONS
Amazon. Don can be contacted via email donwilliams@grapevine.net.au
securitysolutionsmagazine.com
Intelligent security solutions from Dahua Technology Discover Dahua, a world leader in video surveillance, offering high value total security solutions to safeguard assets, communities and infrastructures.
now available at Hills! Unified Management Platform Video Surveillance
Unified UnifiedManagement Management Platform Platform Video VideoSurveillance Surveillance
Unified Management Platform Video Intercom Video Intercom
Video Surveillance - Advanced video collecting and analysing - Wide coverage w/o blind angle
Video Surveillance Video Surveillance
Unified Management Platform Unified Management Platform
- Advanced video collecting and analysing - Advanced video collecting and analysing - Wide coverage w/o blind angle - Wide coverage w/o blind angle
- High reliability with low running cost - High reliability with low running cost - Scalable and customisable - Scalable and customisable
HSS0031-July18-version 1
For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au
facebook.com/HillsLtd/ CONNECT
E N T E RTA I N
SECURE
- High reliability with low running cost - Scalable and customisable
Video Intercom Video Intercom - Support both IPIP and Analogue - Support both and Analogue - Attractive design - Attractive design
EVENTS
for industry professionals to protect their organisations and clients from both physical and cyber threats. CSE provides holistic solutions for today’s connected organisations. Working with SIA, ISC West also features world-class education to learn about every facet of the security industry. Visit www.iscwest.com for more information.
PNG Security Congress 4–6 March 2019
register.html to register your interest
use technology and data to better
Security Exhibition & Conference 2019
Port Moresby, Papua New Guinea
or email info@sectecpng.com for
understand and manage their
24–26 July
Now is the time to plan to attend a
more information.
building performance.
International Convention Centre,
Visit www.sectecpng.com/
world-class security and technology
and strategic advice on how to
For more information visit
conference and exhibition – SecTec
Total Facilities
PNG Congress.
20–21 March 2019
www.totalfacilities.com.au.
Darling Harbour, Sydney In 2019, the Security Exhibition & Conference is heading back
International Convention Centre,
ISC West
and professionals will converge
Darling Harbour Sydney
10–12 April 2019
on Port Moresby, PNG, in March
Total Facilities is a two-day live
Sands Expo Convention Center,
Conference is the industry’s annual
2019 for the first Oceania premier
experience and celebration of ideas,
Las Vegas
opportunity to reunite for three
security industry event, with a
connections and opportunities for
ISC West is THE largest security
days of quality networking and
security conference and exhibition,
the nation’s FM and building-related
industry trade show in the U.S. At ISC
unrivalled education alongside a
real-world challenges presented and
communities. With an exciting new
West, you will have the chance to
showcase of the most innovative
a glimpse into the future of global
Smart Zone featuring innovative
network with over 30,000 security
solutions to the Australian
security integration and trends.
start-ups, lively speaker discussions
professionals through New Products
market. For over three decades,
and the very latest FM solutions,
& Technologies encompassing
it has been the largest and most
electronic security and safety
as well as exclusive leadership and
everything from access control to
established commercial event for
solutions for aviation, banking,
networking events, Total Facilities
unmanned vehicles from over 1,000
the security industry in Australia,
infrastructure, industrial sites,
is the most valuable and rewarding
Exhibitors & Brands.
bringing together the entire
mines, commercial buildings,
destination for anyone in the FM &
residential towers, building and
CRE industry.
Security industry specialists
The Congress will feature
development; the best of the best in
Our 2019 event will feature a
In 2019, ISC West will
distributors, security professionals and end-users to connect
• new products and technologies,
and create unparalleled
• intelligent CCTV, access control
hub of technological innovation
encompassing everything
which presents new technologies
from access control to
and solutions to help you create
unmanned vehicles.
solutions
smarter, greener buildings. The new
supply chain of manufacturers,
attractions including:
Smart Zone designed as a thriving
• advanced video surveillance
The Security Exhibition &
offer attendees a host of
world class offering: and alarms systems
to Sydney.
• Unmanned Security Expo,
business opportunities. The entire team is looking forward to once again reuniting with more than 4,500 security
• intelligent traffic solutions
zone offers visitors a dedicated
introduced in 2017, is an event
professionals and over 150 leading
• asset management systems
environment to look for integrated
within ISC West focusing on
suppliers. The 2019 show is set
• drone capability
and cloud-based solutions to
unmanned aerial vehicles (UAVs),
to see some interesting new
• software cyber management
improve operations and deliver
unmanned ground robotics and
innovations as well as a host of
business value.
vehicles (UGVs), and the various
new attractions.
solutions • innovative video intercoms
According to industry research,
• large enterprise systems
IoT technologies will be more
• mechanical locking integration
pervasive in smart commercial
software and applications that support them. • Connected Security Expo (CSE)
Make sure you put the dates in your diary. We look forward to seeing you again in Sydney in
buildings than anywhere else over
moved to the ISC West show
2019 for the Security Exhibition &
• emerging technologies.
the next three years. This zone
floor in 2017! As the digital
ASIAL Conference!
Do not miss out! Schedule, budget,
is designed to deliver visitors
and physical worlds collide,
plan to be there and stay informed.
seeking industry-class solutions
it is increasingly important
with electronic security solutions
24 // SECURITY SOLUTIONS
Visit securityexpo.com.au for more information. n
securitysolutionsmagazine.com
THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.
NEW!
ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.
+61 (3) 9544 2477
email: oz_sales@takex.com
HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.
BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.
INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.
OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .
1300 319 499 csd.com.au www.takex.com
TAKEX AMERICA
VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta
FEAUSRE
IDENTIFYING SOMEONE WHO MAY BECOME A THREAT
INSIDER ATTACK PREVENTION
26 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
BY DR LISA WARREN
With the advent of the World
Ideological motives based on
Wide Web in 1993, the workplace
politics, culture or religion are an
changed forever. Traditional
increasing concern, arising when
methods of work have been
people are influenced by extreme,
replaced by sophisticated software
often highly right-wing views.
and communication technologies,
Radicalisation may occur
and companies are much more
where employees become
exposed to external scrutiny. The
sympathisers of extremism and
modern workplace heaps pressure
cause threats to staff safety, the
on employees, mental health
security of protected data and IP,
has become more complex and
and business continuity. Explains
companies are exposed to more
Dr Lisa Warren, “Radicalisation
risk vectors than ever before.
can take several forms, such
With this massive growth in
as condoning violence against
technology comes a rise in the
particular targets, or adopting
vulnerabilities around storage
more extreme and radical
of intellectual property (IP).
views. This becomes the basis
Cybersecurity threats to data
and justification for criminal
and IP can severely compromise
activity perpetrated against an
an organisation and do serious
organisation.”
damage to brand credibility.
Insider attacks include data theft, malicious software
Identifying an Insider Threat can be Critical for Risk Avoidance Insider threats to an organisation
securitysolutionsmagazine.com
downloads that halt or delay critical systems, violence, as well as blackmail and extortion. “It pays to be aware
come from a number of sources
of employees who hold
and there is no absolute
particularly strong and fixed
distinction that classifies someone
views that set them apart from
as high risk. However, there are
the organisational culture,
patterns of behaviour that can
particularly when their colleagues
trigger a warning.
report feeling apprehensive or
SECURITY SOLUTIONS // 27
FEAUSRE
fearful of them. When these
or hers. In one case, Dr Warren
destroy the reputations of
this should be raised with line
fixations are about the responses
provided threat management for
individuals and companies.
management, security or HR.
they are planning for the
an organisation targeted for many
injustices they perceive from
Fixation behaviour involves
As well as a potential violation
years by an ex-employee who
the situation where an employee
of code of conduct, such views
their employer this should also
believed he was unfairly dismissed
keeps bringing a conversation
can be a behaviour that signals
herald concern. These employees
six weeks into the probationary
back to a defined grievance, which
the person is on a pathway to
justify in their minds how the
period of his employment.
is a sign that he is stewing on a
violence,” explains Dr Warren.
company has done badly by them,
Poor psychological health
particular topic or problem.
This also relates to changes in
thereby justifying an attack on the
can be a root cause of this over-
organisation as a way of evening
interpretation, as individuals
is another sign that can lead
an employee changes his or her
up the ledger.”
become fixated on one aspect of
to internal threats. “We all say
personal identification quite
their life and work to the point
something about who we are
rapidly, such as shaving their head
for example, may incite an attack
where it consumes them. In cases
and who we identify ourselves
and getting tattoos, or dressing in
based on the person’s perception
where the individual is fixated
as by the way we dress, the jobs
a military style in the workplace.
that a company has polluted
on his workplace grievances, a
we choose and how we interact
the environment, or someone
dip in performance or something
with others. This extends to what
with very strong societal beliefs
not going according to plan may
we do with our time outside the
might have a grievance based on
result in grudges and attempts to
workforce and the views and
What Drives most Crimes against an Organisation?
a company using child labour in
strike out against the company.
attitudes that we describe to
Ultimately, the majority of
developing nations.
Social media, Dr Warren explains,
others. However, if you notice a
crimes against an organisation
can provide a place to vent, seek
colleague starting to talk about
are motivated by the common
involve something as simple
confirmation from others – many
a particular, often divisive topic,
factor of money. Embezzlement
as missing out on a promotion
of whom have no knowledge
such as radicalised religious
is a frequent form of attack and,
someone thought was clearly his
of the situation – and publicly
groups, politics or violence, then
in many cases, is motivated by
Environmental extremism,
Over-interpretation may
28 // SECURITY SOLUTIONS
Identification behaviour
behaviour – for example, where
securitysolutionsmagazine.com
“Cybersecurity threats to data and IP can severely compromise an organisation and do serious damage to brand credibility.”
risky situation, identify the
into human resources and
threat and nullify it with as
mental health strategies
little fuss as possible. A threat
in workplaces.
management approach is both
The two sectors leading the
restorative and educative and
way in Australia are police forces
more effectively sets clear
such as Queensland Police and
boundaries and expectations,
the Australian Federal Police
reducing persistence and violence
(AFP), who have developed
risks more effectively than a
Fixated Threat Assessment
punitive approach.
Centres, and universities who utilise threat management in
Becoming Proactive rather than Reactive towards Insider Threats from the IT space is important
Three Steps towards Recognising and Mitigating the Risk of Insider Attack
as well, as it allows a company
1. Provide organisations with the
Moving the discussion away
to evaluate threats at the source
opportunity to expand their
and become proactive.
definitions of insider threats
A collaborative response
an addiction to gambling. This can involve the theft of data, files or anything that can be
• Are there warning behaviours in this situation? • Where are the opportunities
their Safer Community teams.
to cover all circumstances
between policing, security and
where current or former staff
forensic mental health addresses
have taken a more radical
risk in many situations, from
position in their attitudes, and
counterterrorism to workplace
use this as a justification for
violence to family violence. “Aggressive employees can
any problem. 2. Broaden what constitutes
sold or passed on for monetary
for triaging risk, preventing
be supported to understand
a high-risk individual and
gain. Stealing to feed a gambling
escalation and managing
the harm they have done to
couple this with a strong
addiction is not limited to any
the threat to negate it
themselves and others by their
set of rules and corporate
particular demographic, but can
before it becomes a force in
behaviour, and have structures in
be both male and female, involve
the organisation?
place so that they do not choose
3. Take a boundaried, educative
problem behaviours in future.”
and stepwise rather than
older and younger workers, and not necessarily be tied to employees at the lower end of the pay scale.
What Steps can an Organisation take to Recognise the Danger Signs? Warning signs, or trigger
What Measures should an Organisation take to Mitigate the Risk of Insider Attack?
Large organisations in the
governance.
punitive approach, letting
US have for decades employed
decision makers know what
forensic mental health and
areas to be concerned about,
threat assessment experts to map
then allowing the organisation
A code of conduct is a very
out risk mediation solutions and
to form ideas based around
important tool for an enterprise
proactively protect employees
that knowledge and the
to include in its security and
and the organisation. This has
company’s own ideologies. n
risk plan. “A code of conduct
begun in Australia, but is less Dr Lisa Warren presented
allows an organisation to hold
well-developed. Dr Warren
behaviours for rogue employees
people accountable for problem
believes it is only a matter
at the 2018 ASIAL Security
is an area where psychologists
behaviour, rather than punishing
of time before Australian
Conference, held at the Security
examine violent threat assessment
them for it. Punishing problem
companies look routinely at
Exhibition & Conference. For more
and ask the questions:
behaviour has never worked.”
threat management as a means
great insights like this, secure your
• What are the factors that
It is critical to provide
of de-escalating insider threats
tickets to this year’s conference at
should cause concern?
the right tools to approach a
by building threat management
securityexpo.com.au
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 29
ALARMT
IS 5G THE FUTURE OF INTRUDER ALARM SYSTEMS? BY ANNA SLIWON
30 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
of 5G offering much higher
can be compromised in a number
speeds and connection stability,
of ways, which is why IP is often
the United States in 2017 had a
Advances in Communication Technologies
the technology could open the
used as a back-up communication
ripple effect on the market for
Advances in telecommunications
opportunities for more product
channel to the primary
intruder alarms, mostly affecting
technologies are making intruder
and system innovation.
GPRS channel.
the sales of control panels
alarm systems more versatile, by
and communicator modules.
increasing the speed and stability
The Role of 5G
Things (IoT) for both residential
With many traditional systems
of communications between the
Traditional intruder alarm
and commercial applications,
using 2G or public switched
sensors, control panels and alarm
systems have relied on PSTN and
devices equipped with 5G-capable
telephone networks (PSTN) as
receiving centres. However, the
General Packet Radio Services
chipsets can offer superior
alarm signal communication
rate of adoption of the latest
(GPRS) communication for
battery life and much lower
paths ahead of the shutdown,
communication technologies in
signal transmission. With the
power consumption in wired
the impending mobile network
the intruder alarm industry has
heightened demand for signal
systems. This functionality
re-farming required upgrades
been quite slow.
transmission capacity, due to
is crucial to reducing overall
increasing use of video cameras
system maintenance costs,
The shutdown of the 2G network in both Australia and
to intruder alarm signalling
While 4G connectivity has
In the world of Internet of
modules. The increased rates
been available since 2009, 4G
with security systems and the
increasing their longevity and
of equipment replacements in
communicators were not used
growing number of sensors
guaranteeing signal transmission
the immediate run up to the
frequently with intruder alarm
installed in an average system, an
stability that is far superior
shutdown date resulted in a much
systems until recently. Pockets
alternative communication path
to existing technologies.
smaller replacement market
of data sent from traditional
was required: Internet Protocol
In residential systems, the
in subsequent years. In fact,
intrusion systems are small,
(IP) communication performed
benefits of longer battery life
according to the latest IHS Markit
requiring little bandwidth for
that role. While this protocol
and improved transmission
research on the global intruder
transmission, but as more devices
has been implemented in a vast
capability could enable live video
alarms market, shipments of
– especially video cameras – are
number of systems around the
verification of intruder alarms
control panels sold to the United
added to intruder alarm systems,
world, IP connectivity depends
on a wider scale. In commercial
States market will experience a
the demands on alarm and
on the strength and stability of
systems, 5G connectivity could
compound annual decline of 4.9
signal transmission capacity
the internet network supplied to
support deployment of smart
percent from 2017 through 2022.
will also grow. With the promise
the home or the building. These
buildings that aim to improve
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 31
ALARMT
the environmental footprint
lead to postponement of country-
other building systems, or with
other systems, IP communication
of commercial buildings,
wide rollouts, which will make
high-security applications.
has already met the demand
while delivering the benefits
investment in 5G technologies
of automation.
for intrusion systems riskier
alternative to 3G and 4G
technologies. The ultimate test
for manufacturers that do not
communication paths, particularly
for 5G in intruder alarm systems
technologies in enabling real
prioritise 5G in their home
for feature-rich systems that
will be around the question
interconnected environments and
markets. International markets
integrate video devices. Higher
of whether 5G is necessary to
to leverage big data. While the
may instead offer an opportunity.
resolution cameras require better
accomplish the capabilities of
bandwidth, before they can send
modern and future intruder
5G could accompany cloud
cloud has enabled the processing
5G technology is only
5G provides a more capable
for alternatives to cellular
of large data sets from a variety
beginning to roll out in certain
sizeable images through the
alarm systems. However,
of building and home systems,
countries and its full potential
network. However, transfer of
embracing the opportunity
5G could greatly speed up the
has yet to be realised. Any IoT
large amounts of data through
for innovation, which 5G can
transmission between systems,
device or a security system
cellular networks is likely to
offer, could help make future
while improving connection
equipped with 5G-capable
result in higher data costs to
intrusion systems more efficient
stability. These benefits are
chipsets will likely see a
system owners.
and capable.
particularly important to high-
steep price increase before
security applications where the
the technology can become
through 5G networks will be
costs of unsent or delayed signals
mainstream, like 3G and 4G. For
enormous, which has strengthened
could be very high.
end-users to accept a significant
existing concerns about the
Intruder Alarms and Monitoring Services Database
price increase, the comparable
cybersecurity of big data and the
This 2018 study provides an
Too Early to Tell?
functionalities offered by
potential for misuse or breaches.
assessment of the intruder
5G is still at a very early
these systems would have to
adoption and deployment stage.
be significantly higher than
Current global coverage of the
The volume of data transferred
alarm and monitoring market, including significant trends over
those currently offered. In the
Opportunity versus Need
4G network is not universal,
residential sector, these offerings
5G could be the technology that
provides detailed estimates of
as certain countries only have
might only resonate with more
offers the best of all available
market revenue and shipments
partial coverage. This lack of 4G
savvy users of intruder alarms
communication technologies to
from 2016, with a base year of
coverage reduces the popularity
– primarily those who are
the security industry. However,
2017, and forecasts through
of this frequency for alarm
interested in advanced ultra-
the regulations covering
2022. It also estimates the market
communication, since the service
smart home security systems. In
intrusion systems in many
share of major suppliers in each
offered by 5G-ready equipment
commercial systems, 5G benefits
countries require dual-path
product category. n
may not work.
may be more readily realised in
communication for ultimate
smart buildings that integrate
confidence in a system’s ability
intruder alarm systems with
to send out alerts of intrusion. In
Significantly higher deployment costs on a national level may
32 // SECURITY SOLUTIONS
the next five years. The report
Anna Sliwon is an analyst with IHS Markit.
securitysolutionsmagazine.com
VIDEO DOESN’T HAVE TO BE EXPENSIVE TO BE EFFECTIVE
With years of experience across hundreds of clients, let us show you how we can help you generate more business than ever before. enquiries@interactivemediasolutions.com.au
OPERATIONS
FIREARMS AND PUBLIC SAFETY:
OPERATIONAL GUIDELINES AND PROCEDURES
BY RICHARD KAY
Certain operational roles in public safety mandate the requirement for a lethal force response, issued in the form of a firearm. Depending on the role, the firearms are usually limited to small arms only in the form of handguns and longarms. With the provision of firearms comes the necessity for appropriate training and regulations governing the issue and use of these operational tools. If operational personnel decide to undertake job roles that require a lethal force option, they have an obligation to be highly competent in the use of that tool, which includes appropriate knowledge and skills for the safe and professional use of that tool in an operational context (as opposed to simply a training context). In the first instance, the burden of
34 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
responsibility falls to the individual
parts and either by one or more
user to survive the operational
than one person.
environment, physically and legally. This information aims to
A prohibited person means a person who is serving a term of
• handgun: stored in a locked
training with firearms, keep
steel safe of a thickness that is
the firearm in good operating
not easily penetrable
condition and use correctly fitting
• longarm: stored in a
equipment. Use mechanical
imprisonment for an indictable
receptacle constructed of
safeties, but do not rely on
outline the basics of firearm
offence, assault or an offence
hard wood or steel that is not
them entirely.
guidelines, functions, safety
under the Drugs, Poisons and
easily penetrable
considerations and justifications
Controlled Substances Act, or who
for operational use. It is not
is subject to an intervention order.
designed as a definitive source
• ammunition: stored in a
General Safety Rules
locked container separate
A firearm should be considered
from the safe in which
loaded at all times. Never leave a
firearms are stored.
firearm unattended and always
or a replacement for proper
Authority
training as required by agencies
A person may be issued a firearms
If the receptacle weighs less than
store a firearm correctly in line
and regulators.
licence for the occupation of
150kg (empty), it must be fixed to
with regulations.
security guard or prison guard,
1. Regulations
the frame of the floor or wall of
for target shooting, for an official,
the premises in such a manner
alcohol or drugs. By law, a person
Definitions
commercial or prescribed purpose
that it is not easily removable
must not carry or use a firearm if
A firearm means any device,
or for a purpose authorised by an
and locked with a lock of sturdy
that person is under the influence
whether or not assembled or in
Act or regulations. The applicant
construction when any firearms
of intoxicating liquor or a drug.
parts and whether or not operable
must demonstrate the purpose
are stored in it. Where more
or complete or temporarily or
for which the licence is required.
than 15 firearms are stored on
finger discipline to prevent an
permanently inoperable or
Security or prison guards must
a premises, an effective alarm
unintentional discharge. Officers
incomplete, which is designed
hold a licence under the Private
system that complies with
should keep their finger off the
or adapted to discharge a shot
Security Act 2004 or be a prison
Australian standards must be
trigger until the firearm is on
or a bullet or other missile by
officer and produce evidence
fitted that, in the event of an
target and they intend to fire.
the expansion of gases produced
that they perform duties as a
intrusion, activates an audible
The fingers may clench when
in the device by the ignition of
security or prison officer. Target
alarm warning device and
they are startled, under extreme
strongly combustible materials or
shooters must be and continue
external visible alarm warning
stress, about to lose the firearm
by compressed air or other gases,
to be a member of an approved
light. The key to the firearms
in a struggle or if they are
whether stored in the device in
firearm target shooting club.
storage receptacle should be
destabilised. The proper position
pressurised containers or produced
Official or commercial purpose
carried by the licence holder or
for the trigger finger off trigger
in the device by mechanical means,
applicants must produce evidence
kept securely in a separate room
is on the frame of the firearm,
or which has the appearance of
that the licence is required for
from the receptacle when it is not
outside the trigger guard. The
such a device.
that purpose.
being accessed.
finger should be off trigger when
A handgun means a firearm
Do not mix firearms with
Always ensure trigger
drawing or holstering the firearm,
A firearms licence must not
that is reasonably capable of being
be issued if the applicant or any
2. Firearms Safety
moving with the firearm drawn,
carried or concealed about the
responsible person in relation
Safety is the most important
or conducting reloading or
person, or is reasonably capable of
to the application is a prohibited
aspect of firearms handling.
rectification procedures.
being raised and fired by one hand,
person, under 18 years old, not a
Accidents with firearms do not
Always ensure muzzle
or is not more than 65cm in length
fit and proper person and if not
just happen, they occur if two
discipline to maintain a safe
measured parallel to the barrel.
there is information as to criminal
factors are present at the same
direction, which is the direction
activities. Further, it must be seen
time – an unsafe condition and
that if the firearm was to
that the applicant can possess,
an unsafe act – and result from
discharge there would be no loss
carry or use a firearm without
carelessness and failure to use
of life, no injury to people and
having a bullet or other projectile
being a danger to public safety or
commonsense. A firearm is
minimal damage to property.
and a priming device fixed to or
peace, has satisfactorily completed
capable of inflicting serious
enclosed in a cartridge case which
a course of firearms safety and
trauma, and the handler is
firearm correctly, being open
is composed wholly or partly of
can comply with the storage
responsible for the consequences
(breech exposed) and empty (no
material other than paper.
requirements set out by or under
of using the firearm.
ammunition in firearm) with
A longarm means any firearm other than a handgun. Cartridge ammunition means
Safety precautions should be
Always pass and receive a
Possession includes actual
the Act. Finally, the issue of the
physical possession of the firearm,
licence must not be against the
carried out at all times – when
receiver) and muzzle facing down
or custody or control of the
public interest.
passing and receiving a firearm,
(safe direction).
firearm, or having and exercising
the butt forward (grip towards
before and after storage, before
Dry firing is the practice
access to the firearm, either solely
Storage
handling or cleaning a firearm,
of pressing the trigger on an
or in common with others.
The general storage requirements
and before and after practice.
unloaded firearm. The key
for firearms and ammunition are
Always wear appropriate
consideration for dry firing is
as follows:
protective equipment when
safety, to ensure the firearm is
Carry includes the carriage of a firearm either as a whole or in
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 35
OPERATIONS
not loaded. Circumstances when dry firing may be appropriate
• fire: firing mechanism moves forward, shot discharges
operation only, linear and
Double action is generally safer,
rotational forces, trigger/cylinder/
as the effects of stress on the
include pre-duty inspection
• unlock: breech opens/unseals
hammer connected, round
trigger finger in causing an
(function test), practice (trigger
• extract: case exits breech
in breech is not round to fire,
unintentional discharge are less;
control), range clearance (ease
• eject: case exits firearm.
manual extraction and ejection.
however, the larger trigger press
Pistols have a slide, slide lock,
in double action can result in a
Firearms do not accidentally
recoil spring, magazine, external
less accurate shot.
discharge, presuming the
safety and decock mechanism
3. Mechanical Operations
firearm is properly serviced and
(some models), combination of
the working parts moving
maintained. Accidental discharge
mechanical and gas operation,
forward from a cocked position
Understanding the firearm
relates to the mechanics of the
linear forces only, round in
to discharge the shot. A key
is important in being able
firearm itself, independent of
breech fires, automatic extraction
consideration for single action
to handle it safely and use it
the operator. For a firearm to
and ejection.
is safety, as there is less trigger
effectively. Officers should
discharge it must be properly
spend time familiarising
maintained and functioning,
Firearm Actions
the firearm, an important factor
themselves with the parts and
loaded with ammunition and
The two types of firearm actions
under survival stress; however,
functions of their duty firearm.
have the trigger pressed (cf.
are double and single. These terms
the smaller trigger press in
Maintaining operational
unintentional discharge which is
describe the stages the working
single action can result in a more
functionality starts with
operator related). The only time a
parts move through before
accurate shot as there is less
understanding the components
firearm should discharge is when
releasing the firing mechanism
movement of the firearm.
and functions.
the operator makes a conscious
for discharge.
Firearm Functions
choice to do so.
springs) and cleaning (function test, ease springs).
There are eight basic functions of
Revolvers and pistols differ
Single action involves
pressure required to discharge
Double action involves the
Firearm Procedures
working parts moving to the
The principles for manipulating
a firearm:
both in terms of parts and
rear to cock and set the firing
firearms are the same regardless
• load: cartridge enters firearm
functions. Revolvers have a
mechanism, and then moving
of technique. Use consistent
• feed: cartridge enters breech
rotating cylinder, cylinder release
forward to discharge the shot. It
methods that work under stress,
• lock: breech closes/seals
latch, extractor star, exposed
requires a heavier trigger press
and tactile indexing to locate
• cock: firing mechanism moves
firing pin (some models), no
with the firing mechanism starting
gear and handle the firearm
external safety device, mechanical
from a non-cocked position.
without taking eyes off the subject.
rearward
36 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Irrespective of the situation,
such as defective magazine or
to life, where real means the
justified, there may be innocent
ensure safety procedures.
cartridge, double feed and empty
threat actually exists and
bystanders beyond the intended
in the chamber.
impending means threat to life is
target, and the presence of these
happening now.
people may cause officers to hold
An emergency reload is done when an officer has fired all
Regardless of the procedure,
the rounds and therefore must
use cover if available or
reload to stay in the fight. It is
remain mobile, remain aware
sole intention is to stop the real
can penetrate several interior
a tactical necessity. A tactical
of the threat and surrounding
and impending threat to life.
plasterboard walls, and some
reload is done when an officer
environment, and maintain
There are no circumstances for
bullets can pass through exterior
has fired some rounds and wants
trigger and muzzle discipline.
firing warning shots, because
walls and retain enough energy
to top up the firearm back to fully
Carrying several reloading
officers are responsible for every
to injure someone on the
loaded. It is a tactical choice.
options not only provides more
projectile; warning shots may not
other side. Duty ammunition
shots, it also clears malfunctions
stop the threat to life and there is
with good stopping power but
are four that can malfunction
that bind the firearm action.
no regulatory discretion for this
low penetration capability
and cause the firearm to stop
Be aware that it may not be
option. If any doubt exists about
is preferable.
working correctly – failure to
ammunition-related, but a
being justified in using a firearm,
feed, fire, extract and eject.
mechanical malfunction.
officers should not draw the
justified in some situations when
Officers should know possible
If officers are unable to
firearm at all.
the real and impending threat to
causes of these malfunctions
rectify an issue, consider
and procedures for rectifying
tactical disengagement from
Target Engagement
shot and requires subsequent
them so they can keep their
the situation.
The process of target
shots to stop it. After firing each
engagement, when a subject
4. Operational Use
shot, officers must assess the
poses a threat to life and the
situation to determine if the real
is done if the firearm fails to
The use of a firearm depends
officer discharges his firearm
and impending threat to life is
discharge when the trigger is
on the assessment of the threat
to stop the threat, involves
continuing. It can be difficult
pressed initially. For revolvers,
posed by a subject and the
four stages:
to count the number of shots
pressing the trigger again allows
circumstances. Where there
• perceive: incoming data
fired under stress, and officers
the firearm to bypass that
exists a threat to life, officers may
from the five senses alerting
should ensure they do not shoot
cartridge and rotate to the next
be justified in using potential
officers to a potential threat
the firearm dry because of a
functional one. For pistols, use
lethal force. For officers to justify
tap/rack to clear problems such
discharging a firearm they
the threat as real and
in an armed confrontation with
as improperly seated magazine,
need to demonstrate that other
impending
multiple subjects, officers should
defective round, stove-piped
options were not appropriate
casing, slide not in battery. These
for adequate safety and control,
procedures can be performed
either for themselves, those in
quickly in most situations.
the vicinity, or both. Totality
and gaining sight picture on
justify their actions and possibly
Though best done behind cover,
of circumstances will be
the threat.
prove in court that the threat
they can be done swiftly enough
considered in the aftermath to
for officers to render a firearm
test if other alternatives were
The point of aim should be the
Even if lethal force is justified,
operable while staying in the
more appropriate.
centre of seen mass, because
officers may choose not to shoot
smaller targets may be missed
because of a danger to others.
Justifications
and officers are accountable for
The use of the firearm comes
is used when a primary
It is important for officers to
every shot, and a minor target
down to personal assessment of
rectification fails to fix the issue
differentiate between use and
may not stop the threat to life.
the situation and the risk level
and is effective in clearing
discharge of a firearm. Use is
most malfunctions that are not
exposing, indicating, touching,
beyond. If officers intend to
cleared by the primary method.
drawing and aiming the firearm
discharge their firearm, they
For revolvers, conduct a tactical
in response to officer assessment
must be sure that they have
reload, preferably behind
of a perceived threat. Discharge
properly identified their target
internationally certified tactical
cover, and check the firing
is pressing the trigger causing
and know what is behind it.
instructor-trainer, Director
pin if possible to eliminate the
the firearm to fire a bullet. The
Verbal challenges should be used
and Senior Trainer of Modern
possibility that it is damaged and
justifications for discharge are
to help identify a questionable
Combatives, a provider of
not striking the primer properly.
as a last resort, when innocent
subject, and in poor light
operational safety training for
For pistols, use drop/work/tap/
persons are not in danger, and
use illumination to clearly
the public safety sector. For
rack to clear malfunctions not
in reasonable self-defence to
identify a potential threat. In a
more information, visit www.
cleared by the primary method,
a real and impending threat
situation where shooting may be
moderncombatives.com.au
Of the eight functions, there
firearm operational. A primary rectification
threat zone. A secondary rectification
securitysolutionsmagazine.com
In discharging a firearm, the
their fire. Modern ammunition
Multiple shots may be
life continues after the preceding
• recognise: actually identifying
• decide: cognitively choosing an appropriate response • act: presenting the firearm
panic reaction. When engaged
engage the subject who poses the most immediate threat to life. Officers are required to
to life was real and impending.
Always know the target and
posed by the subject. Lethal force means lethal consequences. n Richard Kay is an
SECURITY SOLUTIONS // 37
FEATURE
38 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
The New Video Compression In Your Pocket
BY VLADO DAMJANOVSKI
Most people aren’t even aware of the fact that they have a new method of image compression sitting in their pocket that will likely become the future of IP CCTV. The questions that need to be answered are, what is it, how does it work and why is it so much better? The latest iOS on your Apple smartphone and iPad includes a new method of image compression inside the camera functionality. If you take pictures and then view them on the smart device itself, you probably won’t notice anything unusual. However, when you export these images to your computer, you may notice a new file format with an ‘HEIC’ extension as opposed to the traditional ‘JPEG’ of years gone by. The HEIC extension refers to a compression method known as High Efficiency Image File Format (HEIF). This is a component of the new High Efficiency Video Compression (HEVC) standard, popularly known in the CCTV industry as H.265. The HEIF (High Efficiency File Format) is a new image compression format developed by the MPEG imaging experts in 2015. It is now used by Apple as a default image compression in
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 39
FEATURE
their latest iOS operating system
smart devices to use the “Most
the advantages, and reasons,
processors now supersede their
(starting from v.11). Google is
Compatible” format (under the
for switching to it. Another
capacity on a daily basis.
planning to include the same
Settings > Camera > Formats)
advantage of HEIC is its ability to
method of compression in their
which will re-set the image
compress a sequence of images
a JPEG compressed image, the
latest Android OS.
format back to JPG. It is worth
(like a ‘burst shot’ function
typical ratio file size ration is 1:2
noting that professional photo
when taking ‘live pictures’
for the same image quality.
a form of image compression
editing software, like Adobe
with your iPhone). You can
that involves compressing both
Light-Room, have already come
also save auxiliary data, such
image from an iPhone, which
horizontal and vertical pixels
up with an HEIC plug-in.
as the depth map used in Face
(depending on the content)
Cam when unlocking your
would occupy around 2~3MB in
The HEIC format refers to
in still images, making it two
JPEG compression has existed
When comparing an HEIC with
This means, a standard 12MP
dimensional. The HEVC format
since 1992, and as such JPG
smartphone. Depth map is also
JPG, will only be around 1~2MB
refers to a video compression
decoders are embedded in all
useful in image processing with
using HEIC to compress the same
which deals with motion images
known software which needs to
dual camera smartphones,
visual quality.
(three-dimensions: horizontal x
decode JPG images, such as web
where digital blurring of the
vertical x time) and sound.
browsers, word processors, and
background is performed by the
smartphones for picture taking
The HEIC file format can be
Most people today use their
email programs. Since HEIC is a
software processing, simulating
on a daily basis on all occasions,
decoded by newer operating
very new form of compression,
a narrow depth of field effect for
privately and professionally, this
systems, beginning with Mac
when sending the HEIC image
more appealing portraits.
requires a large amount of data
OSX High Sierra (v.10.13), Mojave
file as an email attachment,
(v.10.14) and Windows 10 (v.1803
the latest iOS operating system
compression uses 16-bit colours,
that many iPhone users always
and later).
automatically converts it to JPG.
instead of 8-bit colours as used
need extra space on their devices.
Since the new compression
This function will eventually be
with JPG. This makes colour
However, with the update to the
formats are very new, some users
made redundant once the HEIC
images with gradual colour
latest operating system, they can
may find it challenging to open and
becomes more common.
transition, like blue sky, appear
take more pictures and videos, on
smoother and more natural;
the same device, consuming much
edit such photos or videos with
HEIF not only increases the
Furthermore, the HEIF
space. This is the main reason
their default (older) photo-editing
efficiency, but also the quality
blocky artefacts – typical to JPG –
less space, yet offering the same
programs on their computers.
of the compression algorithms.
become less obvious.
image quality.
In the Mac OSX, this can
As the name suggests, the ‘high
Admittedly, there is a price
For illustration purposes,
be done automatically by the
efficiency’ coding means that
to pay for such an increase in
I have prepared some screen-
native Preview app, while for
for the same picture quality you
efficiency in HEIC compression,
shots of the ViDi Labs test chart,
Windows a dedicated machine,
would get from JPG compression,
and that is more number
compressed in JPG and HEIC
software needs to be installed.
the HEIC would be a much
crunching, and more coding and
format. The images are made
Such programs are iMazing or
smaller file size.
decoding processing. With more
with a ‘standard’ 12MP 1/3 sensor
modern, super- fast processors,
of an iPhone7 using a ‘standard’
this is hardly noticeable as
4mm lens.
Apowersoft Photo Viewer. It is also possible to switch the
40 // SECURITY SOLUTIONS
Saving space with the HEIC file format is only one of
securitysolutionsmagazine.com
The ViDi Labs test chart in TIFF format (16-bit) = 43.4MB uncompressed!
The ViDi Labs test chart in JPEG format (8-bit) = 2.4MB
The small detail crop. Please note the reasonably sharp numbers 2 and 1 on the right hand side.
The small detail crop. Please note the blurred numbers 2 and 1 on the right hand side.
For comparison, I have also
many small details and after
TIFF format of the same test
careful inspection I could not
chart using a special iPhone
see any difference, between
software that allows for an
the JPG and HEIC files, despite
uncompressed image.
them being 2:1 in file size. There
The uncompressed 12MP
The ViDi Labs test chart in HEIC format (16-bit) = 1.2MB
The ViDi Labs test chart has
produced an uncompressed
is a tiny bit visible difference
image produced in 16-bit RGB
between the TIF file and the JPG
colour space TIFF format occupies
and HEIC, where the TIF looks
around 43.4MB of data.
slightly sharper, as it would be
The equivalent JPG produced
expected (being uncompressed).
of the same test chart image was
This is shown further in the
around 2.4MB. This is nearly
cropped pictures.
20x smaller than the TIFF! It is
Offering such data saving,
not surprising that users prefer
there is no doubt that HEIC will
JPG compression rather than
soon be used in the modern IP
uncompressed TIFF format, for
CCTV cameras. n
very little loss in quality. The equivalent HEIC format is
The small detail crop. Please note the numbers 2 and 1 on the right hand side, although blurrier than the TIFF image, appear slightly sharper than the JPEG format.
securitysolutionsmagazine.com
Vlado Damjanovski is an
literally half of this, 1.2MB, and
internationally renowned CCTV
it is almost impossible to notice
author, lecturer, innovator and
any loss of detail compared with
consultant. He can be reached via his
the JPG.
company website www.vidilabs.com
SECURITY SOLUTIONS // 41
BUSINESS
HOW TO CREATE THE ULTIMATE COMPETITIVE ADVANTAGE BY STEPHEN JOHNSON AND BOB ANSETT
42 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
It is tough times if your company is
To get a quick aerial view, the
must engage in either surveying
not winning and keeping enough
first stage is to align your promise
or interviewing your customers.
customers. There are two common
to your market. To achieve this,
If you engage a third party to run
blockages that get in the way: a
you are going to flesh out three
the research, you will probably
weak promise to your market or a
pieces of information: your
get more and better answers, but
weak delivery of your promise.
market’s needs, your competitors’
you can also consider anonymous
messages and your company’s
online data entry or reply forms.
what your market really wants,
strengths. From these, you will
What you want to draw out
then the first blockage is removed.
virtually ‘triangulate’ the most
is what your customers want,
But if you do not deliver on that
compelling promise, or unique
and whether or not they are
promise, they will not repeat and
selling proposition (USP), for your
currently getting that from you or
your reputation could slide. So, if
company to take to your market.
your competitors.
If you can lift your promise to
you go further and align your team
The second stage is to align
The second exercise is
to deliver it, the second blockage
your company to that USP. You
competitor research. In this
is removed.
will take your team through how
exercise, you want to learn how
you arrived at it. Then you will
your competitors are positioning
promise to market and then
show them how they directly
themselves. While there are
company to promise is the key to
contribute to the fulfilment of that
great analytical tools that the
getting a powerful competitive
promise and help them link their
right consultants can deploy,
advantage. We call this process
very performance to it.
there is a simple analysis you
This double alignment of
Company-Customer Alignment. Let us put this strategy into action.
The first task is to set up a
can try yourself. There are three
project team of key department
‘value disciplines’ a company can
heads to guide this program.
pursue as their focus: customer
Having them involved from day
intimacy, product leadership and
one gets their buy-in to what can
operational excellence.
be a pretty big change. This team
Customer intimacy is about
can bring in consultants to do any
knowing the customer better
of these exercises, but that team
than others. That company may
must be confident in the method
not have the best product and is
and outcomes, because they will
probably not the cheapest, but
need to own the result.
they are competing around the
The first information is market research. You want to learn five
idea of “We know you better”. Product leadership is about
key ingredients from a selection
supremacy of the product or
of customers, lost customers and
service. It will not be the cheapest
potential customers:
and the company may not be the
1. What do they like about you
most customer friendly, but it
and your competitors?
competes around the idea of “We
2. What do they not like?
are the experts and our product is
3. What risks and worries do
the best quality”.
they have when considering a
Operational excellence is
product or service like yours?
about value and consistency. It
4. How do they research
will not be the best or the most
and how do they make a
customer intimate. This company
buying decision?
is saying “We are reliable, great
5. What would they like that no one has offered yet?
value and efficient”. So, identify your main competitors and read through
Do not fall into the trap of
other collateral. In here will
the answers to these questions
be words, phrases and claims
based on past experience. Things
that point to their hidden
change. Markets change. Needs
value discipline.
change and fears, expectations and requirements change. You
securitysolutionsmagazine.com
their websites, brochures and
believing you already know
If your market research shows that customers want their
SECURITY SOLUTIONS // 43
BUSINESS
needs better understood but your
are failing to adequately claim,
USP. It will pay to have already
that every customer has a ‘My
competitor research shows your
and which you could deliver? The
prepared some guidance for
Needs’ form filled out for them.
competitor is talking about how
answer is the raw material behind
‘blank moments’ as some people
Administration might need orders
great their expertise is, you might
your new USP.
may not see it at first. You might
processed within 60 minutes of
You might learn that your
all find that the warehouse team
receiving them.
customers want their special
contribute to the ‘today’ promise
When you then manage and
gathering is to learn your
circumstances understood better
by ensuring widgets are in stock.
reward, the very fibres of the skin
strengths, weaknesses,
and they want a faster delivery,
Sales people may contribute
of your employees are directly
opportunities and threats. This
that your competitors are too busy
to the ‘right’ promise by better
tied to the delivery of a new
is a classic SWOT workshop. In
shouting about their expertise
understanding customer needs.
promise... and that promise came
particular, your objective is to list
and that your team has greater
Your administration staff might
directly from the mouths of your
what your key strengths are, those
customer relationship skills. Your
contribute to both of these by
customers. Your company and
factors that are unique to you and
marketing people can turn this
fulfilling client orders, invoices
your customer are aligned. n
not shared by your competitors.
into a bite-sized USP. They might
and communications accurately
already be uncovering a gap. The third information
A SWOT analysis can be
Stephen Johnson is a
come up with: “Get the right
and quickly. Eventually, every
facilitated by consultants, but
widget for you, today, instead of
individual can find a way in which
Director of Strategy and Action, a
you can also run your own
the best widget for somebody else,
they contribute to part or all of
business strategy and marketing
SWOT. Bring in a selection of
tomorrow”.
your company’s promise.
consultancy serving Brisbane,
participants from across your
Sydney and Melbourne. Stephen
So, you have got the first
Whether or not you had
company and work through the
part of your Company-Customer
position descriptions (PD) with
has created and executed
strengths, exhaustively. Do not
Alignment achieved and, because
key performance indicators, you
breakthrough growth strategies
apply judgement. Just brainstorm.
you have gone through the right
will need them for this second
for companies from most sectors in
Then, when you have a good list,
process, the second stage is made
stage of Company-Customer
Australia. He can be contacted at
apply judgement and remove the
much easier.
Alignment. Each person needs
info@strategyandaction.com.au
strengths that are vague, incorrect or wishful.
Your project team should be
a PD that includes how they Bob Ansett is the founder of
familiar with where you landed
impact the company’s promise
With these three core pieces of
and how you got there. Their job
and what their minimum
Bob Ansett Marketing, a consulting
information, create three columns
is now to pass that story on. They
specific achievements need to
firm in the field of customer
on a whiteboard with your project
need their teams to understand
be. For example, warehouse
service. Bob is also a familiar
team and summarise the three
the objective of the exercise, the
and procurement staff might
name in Australian business,
information exercises into bullet
process, what the discoveries were
need to ensure between three
synonymous with Budget Rent a
points. Then, look for the factors
and how it led to your USP. Then,
and five days’ worth of all
Car, which he established in 1965.
in common: What does your
teams need to workshop the ways
widgets are in stock at any one
Bob can be contacted at
market want that competitors
in which they directly impact that
time. Sales may need to ensure
bob@bobansett.com.au
44 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Pedestrian and Vehicular Access Control Automation
FAAC Simply Automatic Modular automation solutions
HUB Parking Technology Smart and flexible parking solutions
Magnetic Automation Pioneering access control solutions
Experts in Access | Discover the FAAC Group range of products at J14 | www.faacgroup.com
COVER STORY
THE ROLE OF PRIVATE SECURITY IN
COUNTER-TERRORISM BY DON WILLIAMS
There are more than 120,000
services. The government, the
licensed security guards in
private sector and the public rely
Australia. No one knows the exact
on security guards to protect them
number, as each jurisdiction
and their assets.
has a different way of defining
Why then is the private
security operators, determining
security sector not mentioned
who should be licensed and how.
in any of the top-level strategic
Also, some practitioners have
counter-terrorist plans? The first
licences in more than one state
and only mention is in the Mass
or territory and, of course, not all
Gathering Strategy issued by the
security personnel are, or need to
Australian New Zealand Counter
be, licensed.
Terrorist Committee issued
Security personnel are the eyes and ears on the ground; they are
46 // SECURITY SOLUTIONS
in 2017. The Australian Strategic
the day-to-day interface with the
Policy Institute (ASPI), which
community and, when an incident
examines issues related to
does occur, they are the real first
defence and national security,
responders: moving people away,
released a Special Report
observing, reporting, applying first
Safety in Numbers – Australia’s
aid and briefing the emergency
private security guard force and
securitysolutionsmagazine.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 47
COVER STORY
counter-terrorism. The report
The authors gathered
government representatives
they provide a deterrent through
was launched on 17 October by
information, guidance, opinions
believe the guarding sector
their presence, maintaining
Senator Reynolds, the Assistant
and advice from representatives
is well represented; industry
checkpoints, conducting bag
Minister for Home Affairs. The
of security services providers,
leaders disagreed.
screening and so on.
report outlines the issues, the
clients, government, law
actual and potential capabilities
enforcement, regulators,
The ASPI report found:
and generally have an intimate
and the problems that are
recognised leaders in the security
“The private security manpower
knowledge of the normal comings
holding the sector back from
sector and representative
sector plays a significant role in both
and goings at each site. They’re
being an active participant in the
organisations. Strong common
preventing and responding to critical
uniformed and easily recognisable.
national counter-terrorist plans
themes emerged, which are
incidents, including terrorist attacks.
They’re trained, albeit to
and presents recommendations
reflected in the report. All
Private security staff provide
varying levels, and can provide
to enable the private security
submissions were unattributed.
industry to become a recognised
There was a strong divergence
They’re already on the spot
the ‘eyes, ears and hands’ before
a cordon or direct people
any attack and an ability to be
away from dangers. They
and effective part of the counter-
of opinion on how involved the
first responders after any security-
understand command and control
terrorist capability. The report
private security industry was,
related incident.
and communications.
is downloadable from the ASPI
specifically the guarding sector, in
By observing non-routine
They’re used at large public
website (www.aspi.org.au).
counter-terrorist planning. Some
behaviour and unusual objects,
gatherings such as major sporting
48 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
events, community festivals,
National and jurisdictional
actions that relate to CT, the current
(including government) of guarding
celebrations and special events,
forums for addressing counter-
lack of appropriate and consistent
providers often seek the lowest
such as the Commonwealth Games.
terrorism (CT) include venue
training, the lack of consistent ‘fit
prices, often below award rates,
Private security also provides an
owners and operators, but the
and proper’ person requirements,
without consideration of the
important and significant presence
providers of guarding services
the poor pay, general low esteem
quality of service provided.
at public transport hubs such as
aren’t always at the table.
and inconsistencies between
airports, railway stations and
Given the many thousands
shipping ports as a line of defence
of men and women working
and deterrence.
around the clock every day in
There are, however, pockets of
jurisdictions limit its ability and full
excellence where private security
potential in this role.
is fully integrated, trusted and
Governments have failed to
delivering effective security
In manpower numbers, the
every type of private, business and
provide consistent definitions, ‘fit
outcomes, but multijurisdictional
private guarding industry is much
community facility, it’s critical to
and proper’ person tests, training
inconsistencies and poorly
more significant than the police or
recognise their efforts in helping to
requirements and monitoring of
delivered training remain
military. The security industry has
prevent attacks and responding to
training for the guarding sector,
key problems for the security
more than double the personnel
security incidents.
especially in the area of terrorism
guarding workforce.
of Australia’s combined police
While the guarding services
preparedness and response.
agencies and permanent Australian
workforce is expected and may
Based on wide stakeholder
Defence Force.
even be contracted to carry out
consultation, it’s clear that clients
securitysolutionsmagazine.com
A nationally consistent vetting, training and licensing system would greatly enhance the ability of
SECURITY SOLUTIONS // 49
COVER STORY
licensed security officers to identify, prevent and respond to critical incidents and hostile threats, such as terrorism.� As the ASPI report found, the key limitations on the security industry are jurisdictional legislative and regulatory inconsistencies, variations on who is a ‘fit and proper’ person to be a security officer, poor training standards and a lack of respect and appreciation due to the guarding sector being perceived as an entry-level, easily accessible job with limited or no career progression. The ASPI report makes seven recommendations: 1. The private security guarding sector should be engaged in relevant national and state forums that consider counterterrorism. 2. A federal Security Industry Authority should be established as a statutory authority. The authority would control, record, monitor and enforce the licensing of identified elements of the private security sector. 3. Consideration should be given to formalising additional powers for suitably trained security officers to enhance their ability to contribute to counter-terrorism capabilities. 4. Law enforcement agencies should be encouraged to liaise with the private security sector and have representatives from the sector address training courses to explain their functions and powers. 5. Training courses should include material on recognising suspicious behaviour associated with pre-incident terrorism activities and how and where to report suspicious activities. 6. The security guarding sector should consider a career
50 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
progression model for
on the guarding sector of the
responsible for the protection
security officers.
industry, to improve the probity,
of Australia’s national
associations not only
competence and skills of security
infrastructure, resources,
represent their members
should better monitor and
personnel and the mobility of
population, finances and
but also provide a basis
enforce training standards
security industry licences across
day-to-day and long-term
for practical research
within the licensed
jurisdictions’.
operations. Very little of the
and the accumulation of
country’s assets remain in
expertise and experience.
Council for Police and Emergency
government hands. These
Organisations such as
The ASPI report suggests that the
Management to undertake further
professionals are expected to
ASIS International and the
way ahead is to establish a federal
work on minimum regulatory
hold relevant qualifications,
International Association
Security Industry Authority
standards for the technical sector
certifications, experience,
of Venue Managers (IAVM)
(SIA). The functions of the SIA
of the industry by mid-2009, as
professional affiliations
have tens of thousands of
would include:
well as proposals for a possible
and recognition. For them,
members worldwide and
• the integration of the private
national system for security
terrorism is one of many threat
have sub committees looking
industry licensing by mid-2010.”
vectors that they address, not
at means of protecting
in isolation but as part of an
from and responding to
enterprise-wide responsibility.
terrorism. These associations
7. State and territory regulators
guarding sector.
security manpower sector into Australia’s counterterrorism strategy • ‘fit and proper’ person
“COAG asked the Ministerial
To date, nothing has happened and the ASPI report observes,
• Professional and industry
• Government relies on advice
should be seen as sources of
progress and the absence of
from the professional end of
information to government.
• training development and
COAG leadership, it would be
the private security sector
monitoring of delivery
unfortunate if change were to
and academia for guidance
standards
occur only in the wake of a crisis.”
in relation to countering
that the private security industry,
definition and assessment
• external confirmation of
“Given the current rate of
The ASPI report concludes
terrorism. In general, the
specifically the guarding sector, is a
the authors discovered that the
expertise does not reside
vital piece of the national security
Australian New Zealand Counter
within government. Few
puzzle that has not been identified
promulgation of additional
Terrorism Committee (ANZCTC)
government employees
or put into play. The main
counter-terrorism awareness
is also undertaking a review of
hold protective security
limitation is the disparity between
and training information.
the private security sector and
specific qualifications or
jurisdictions, which results in
its role in counter-terrorism. It is
internationally recognised
different vetting requirements,
The report notes that there are
understood the ANZCTC report
certifications; even fewer
training and licensing. Since the
existing federal vetting, licensing
is due to be delivered in the
are members of the relevant
report was released, it has been
and verification systems in place
second quarter of 2019. It will be
professional institutes with
read by government agencies
which could be used as models,
interesting to see what it finds and
access to the available research
at state and federal level and
for example: the Civil Aviation
recommends and whether the
and resources.
has generated discussion. It is
Safety Authority’s (CASA) licensing
report is classified and, if so, why.
testing and competencies • the development and
While researching the report,
of pilots and of the training assessment system; the licensing
The ASPI report concentrates
• Engineering developments,
hoped that governments will pay
in relation to protection from
attention to the report and that
terrorist incidents, are largely
the industry will be improved so it
of certain classes of maritime
on the guarding element,
developed by the private sector
can more effectively fill its role in
operators by the Australian
acknowledging that it is the
with support from academia.
protecting Australia.
Maritime Safety Authority (AMSA);
largest part of the private
Sometimes, the development
and the aviation and maritime
security sector and the one that
results from government
in this article are the views of the
security accreditation systems.
Caveat: the views expressed
is where the boots meet the
request or is (partially) funded
author and not those of ASPI or
ASPI was not the first to
ground. The report recognises
by government. Many of the
any other organisation. n
consider the issues facing the
that the private security sector
developments come from the
private security guard sector.
is a “continuum with the guards
private sector as they identify
The ASPI report noted, “Previous
on the minimum wage at one
the need and the capability
ASecM was a co-author of the
reports have recommended
end and highly qualified and
to meet it. The engineering
ASPI report Safety in Numbers.
a standardisation of security
experienced security consultants
element is an important part
He is a recognised thought
licensing. The issue was put
and chief security executives of
of the private security sector’s
leader in security, emergency
before the Council of Australian
major corporations at the other”.
ability to counter-terrorism.
management and related
Governments (COAG) in July 2008.
These other elements may be
COAG agreed to adopt a nationally
addressed in future reports but it
terrorism and security. They
and Security: the Manager’s
consistent approach to the
is worth noting:
publish works that support
Guide is available from Amazon.
regulation of the private security
• The professional end of
improved capabilities and
Don can be contacted via email at
developments at all levels.
donwilliams@grapevine.net.au
industry, ‘focusing initially
securitysolutionsmagazine.com
the security continuum is
• The academic sector analyses
Don Williams CPP RSecP
disciplines. His book Bomb Safety
SECURITY SOLUTIONS // 51
AVIATION
AIRSIDE ACCESS 52 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
BY STEVE LAWSON
Airside access seems such an
areas I suggested earlier as airside
access to the movement area of
innocuous subject and yet, in
are covered by this definition.
the airport, but has no access
recent years, my company has
control on that access, would be
undertaken more work for
ICAO definition could include
governments on this subject than
the airline and airport restricted
almost any other. You might
company areas. Even more wildly,
area of the airport that we are
wonder what is so difficult about
what about the airport hotel if it is
talking about. And as you would
controlling access to the airside
beyond the customs primary line!?
expect, it is that part of the airport
of an airport – surely it is simply
This confirms one of my
considered airside. Now we have established the
where there is direct access to
a matter of ensuring that only
guiding principles; that as vital
the aircraft or things that may go
authorised people have access to
as regulations and procedures
onto the aircraft, and there are no
the airside and that they do not
are, definitions are as vital, or
further controls on those things
take unauthorised or prohibited
more important.
that may go onto the aircraft.
items with them. Yet it is a subject
For this article, while not
At its simplest, there are two
that seems to unwind the more
perfect, my definition of airside
things that we must look at when
you look into it.
will expand on the ICAO definition
considering access to the airside.
Firstly, what is the airside? In some countries it starts at the
as follows: “The movement area of an
The first one is ensuring that the person who is on the airside
point where access is restricted to
airport. It includes adjacent
is authorised and has a need to be
passengers. Others define airside
terrain and buildings or
there. The second is to make sure
as the area beyond security
portions thereof, access to
that they do not take a prohibited
checks, and passport and customs
which is controlled and where
item or a weapon onto the airside.
control. Or it may be any area of
there is no further control
In this article, we will not be
an airport used or intended to
before accessing the movement
dealing with screening on to the
be used for landing, take-off, or
area of the airport.”
airside; it is a complex subject
surface manoeuvring of aircraft. The International Civil
securitysolutionsmagazine.com
It may be trite, but using the
With my definition, the passenger boarding gates are not
too large to combine with airport identification (ID).
Aviation Organisation (ICAO)
part of the airside, as the doors
defines airside as, “the movement
to the movement area usually
Airside ID
area of an airport, adjacent terrain
have locks. Interestingly, it would
We are very lucky in Australia
and buildings or portions thereof,
also remove the inside of many
to have a national airside ID
access to which is controlled”.
aerobridges in Australia as
system. In Australia, our ID cards
Seems straight forward? Like
they have access control on the
are called Aviation Security
many ICAO definitions, it
doors to the movement areas. In
Identity Cards (ASIC). An ASIC is
leaves too much for the state to
contrast, the inside of any cargo
a nationally consistent card that
determine. For example, all of the
terminal building that has direct
is subject to security clearances,
SECURITY SOLUTIONS // 53
AVIATION
both police and counterterrorism.
the airport identity card, or
Association) code for the airport
An ASIC may be valid for the
providing references from
on the face of the card. So a card
a country-wide ASIC may be to
whole of Australia or for a
friends and associates. I know of
that is only valid at Melbourne
have some form of ASIC that is
single airport.
one first world country that for
Tullamarine has MEL in large
regionally based. For example,
a short time after September 11
letters on its face while a card
in Queensland you could have a
nationally consistent card much
did not even allow police checks
that is valid only at Melbourne
QLD ASIC.
less one that is subject to national
on airport staff prior to their
Avalon has AVV.
security checks. For many
employment. Fortunately that has
countries, the airport identity
been corrected.
Many countries do not have a
card, while subject to a police
So how do ASIC work in
Here is my first question
A possible way around issuing
What is a greater issue about our system of ASIC is the
about our ASIC system: If I had
card gives you access to the
a staff member with duties at
whole airfield.
check, does not meet a national
Australia? Basically there are two
both Melbourne Tullamarine and
standard. So the airport identity
cards, a red ASIC and a grey ASIC.
Melbourne Avalon, under the
it is stressed that the ASIC does
cards for neighbouring airports
The red ASIC provides access to
current system I only have two
not automatically give you a
may differ radically.
the airside, a grey ASIC provides
choices. I can either issue them
right of access to all areas of an
access to other security controlled
with an ASIC for each airport or a
airport but, to be frank, if you are
there is a police check, it does
areas of the airport. You may
single AUS ASIC.
correctly displaying an ASIC, and
not include consideration by the
have seen grey ASIC being worn
authorities that the person may
by concession or club staff.
It also may be that while
I am not even sure that you
When you apply for an ASIC,
look like you belong, it is unlikely
can issue two ASIC, I do not think
that you will be questioned.
Those ASIC that are valid
there is a reason why you could
Even if you are, many people
In the past, the background
throughout Australia are called
not but it would raise eyebrows
tend to take confident answers at
checks in some first world
AUS cards since AUS is shown in
and be quite expensive since an
face value.
countries have been no more
large letters on the front of the
ASIC can cost over $200. But by
than checking the person’s
card, whereas airport specific
issuing an AUS ASIC, that person
logo of the employee’s company,
employment record for a number
cards have the three letter IATA
now has access to every airport in
so if a worker with a Qantas
of years prior to applying for
(International Air Transport
the country.
ASIC wandered into a Virgin
or may not be a terrorist threat.
54 // SECURITY SOLUTIONS
Many ASIC do include the
securitysolutionsmagazine.com
Steve Lawson has over
Australia area it may be cause for
is implemented. Recently, we
public transport apron of
the person to be challenged. But
undertook an access review for
an airport.
sometimes an ASIC has no more
an overseas government who
than the logo of the airport or the
uses such a system. During the
people consistent access to
Executive with Qantas Airways,
issuing authority.
review we found a number of
airside areas across the country,
Steve held a number of senior
people who worked in the airside
but if you need access to the
management roles covering all
restrict access to different zones of
fuel farm and had access to areas
Domestic RPT (Regular Public
aspects of aviation security from
the airport, so a person who works
like the passenger concourses
Transport) apron maybe there
policy development to airport
in cargo may have something on
and gate lounges. When we
could be a circle containing a
operations. He was sent to New
their card that restricts them to
asked why these people had
‘D’ on your ASIC. Similarly, for
York immediately following
that area of the airport. Similarly,
such wide ranging access we
access to cargo areas there is a
the 9/11 attacks to manage the
a person working in catering
were told that they needed to
circle with a ‘C’ and for access to
Qantas response and undertook
may be restricted to that area of
go through those areas to get
the international apron, an ‘I’.
a similar role following the 2002
the airport.
to their workplace! It was quite
Other places in the world
A common system uses small
I realise it is difficult to give
Yes, it would be difficult to
20 years of experience in aviation security. As a Security
Bali Bombings. On his return
frustrating given that a change
administer but it would give
to Australia, he was appointed
circles on the face of the ID,
in their point of entry to the
much tighter control to the
Security Manager Freight for the
usually of different colours and
airport would have negated the
more secure areas of the airport
Qantas Group. Since 2007 he has
containing letters to indicate in
unnecessary access.
without massive changes to our
been a Director of AvSec Consulting
current nationally consistent
in partnership with Bill Dent, a
the area to which the person is
Notwithstanding those types
allowed access. When using such
of implementation issues, I
airside access system. It would
fellow former Qantas Security Exec.
a system, it is instantly obvious to
would like to see a similar system
mean that to gain access to the
Today, Avsec Consulting provides
the observer if the person has a
in Australia. Consider this, most
more secure airside areas of
consultants from the US, NZ, Middle
right to be in that area or not.
general aviation pilots are issued
security-controlled airports you
East, Israel and Europe. Steve can
with an AUS ASIC. Conceivably
would need more than a private
be contacted on 0404 685 103 or
giving them access to the regular
pilot’s licence. n
slawson@avsecconsulting.com.
As with any system, its efficiency depends on how it
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 55
FEATURE
56 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
PROVE CYBERSECURITY VALUE TO BUILD A CULTURE OF CYBERSECURITY BY BRIAN CONTOS
If you want senior executives to
grabbing perspectives and stats
buy into cybersecurity, you need
regarding the value of a strong
to prove the value cybersecurity
cybersecurity culture, such as
brings to the core business.
reduced cyber incidents, stronger
Reading your organisation’s
customer trust and better brand
annual reports, corporate
reputation. This study made me
governance documents and
think about how a cybersecurity
shareholder statements will
culture is created and what a
give you a better sense for what
cybersecurity team needs within
drives your organisation and, in
its organisation to earn the
turn, what your executives are
support and resources required
thinking about.
for a cybersecurity culture.
You will likely find that
4,800 IT professionals from
documents, but not around
around the globe reported “a
specific attacks, zero-days and
lack of senior executive buy-in
advanced persistent threats
or understanding” as one of the
(APTs). Instead, you may see
primary factors inhibiting a strong
verbiage about material harm, risk
culture of cybersecurity. Gaining
statements around maintaining
that buy-in requires proving that
effective cybersecurity controls,
the cybersecurity investments
protecting confidentiality and
being made are addressing
privacy, and the need to safeguard
these overarching concerns in
sensitive data.
a measurable, quantitative and
New ISACA and CMMI Institute
securitysolutionsmagazine.com
In the study, 27 percent of
cybersecurity shows up in these
evidence-based way. By clearly
research on cybersecurity
illustrating what is working,
culture is full of attention-
what is not, and what needs to
SECURITY SOLUTIONS // 57
FEATURE
be done to fix it with evidence,
work closely with the finance
close those gaps. Now a business
I believe in what you are doing
you are showing leadership that
team. Every dollar being spent on
decision can be made, considering
because of the supplied evidence,
you not only understand the
cybersecurity is a dollar not being
all your evidence, along with
and I am willing to invest
business risks, but you know how
spent on the core business. So, one
all the other non-cybersecurity
dollars because your measures
to measure and communicate
of the jobs of audit, finance and
business requirement evidence
are empiric, understandable
those risks effectively, so business
the cybersecurity team is to make
from business units such as
and compelling, then I am far
decision makers can act upon
sure that the dollars being spent
sales, finance and operations, to
more likely to champion your
them. If you want their buy-in,
on cybersecurity are adequate and
determine the best use of funds.
cybersecurity cause throughout
give them the proof they need to
effective in providing value.
understand and act. In the study, 29 percent of
As mentioned earlier, these
Forty-three percent of the study respondents said “executive
the organisation. Executives want an
groups are looking for proof
champions who speak up for
appropriate level of protection.
respondents indicated “a lack of
that the cybersecurity tools in
security” are a primary factor
Too far beyond appropriate and
funding” as one of the primary
place are adding enough value
in empowering a culture of
that is waste, and executives that
factors inhibiting a strong culture
to mitigate an acceptable level
cybersecurity. This championing
waste are not executives for long.
of cybersecurity. At some point,
of cyber risk. To do this, clearly
enabler for cybersecurity should
By arming executives with proof
you may actually need money to
outline where the gaps are and
be a byproduct of providing the
to champion your cybersecurity
effect change. Third-party auditors
then you can make a business
needed proof in the first two
cause, you can gain an ally to
and the board’s audit committee
case for greater investment to
sections. As a business leader, if
work with the audit committees
58 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
and risk committees. Focus
of risk. When they are making
on articulating the value of
decisions around cybersecurity,
effectiveness, cybersecurity
cybersecurity and the necessity
such as where to invest, how
becomes strategic to the business
for changes you have proven are
much to invest and how to
and will in turn benefit the core
required to ensure protection
prioritise, business leaders
business in areas like reducing
for the organisation’s sensitive
want to be armed with evidence
cyber incidents, building
assets and data.
just like they do for other types
stronger customer trust and
of risk. They do not want to
safeguarding brand reputation. n
The two inhibitors and
securitysolutionsmagazine.com
By proving cybersecurity
enabler I explored have
base these decisions on a best
something in common: they
guess regarding cybersecurity
are directly impacted by
effectiveness. Business leaders
executive, board advisor,
decision makers outside of
need evidence-based metrics
entrepreneur and author with
the cybersecurity team. These
and quantifiable data. They
over two decades of experience in
decision makers might include
want quantitative proof before
the security industry. He is also
auditors, CFOs, CEOs, boards and
they engage their time and
currently the Chief Information
other business leaders. Business
organisational resources,
Security Officer and Vice
leaders evaluate risk for a living
regardless of how strong the
President Product Innovation
– cyber risk is just one flavour
qualitative argument might be.
at Verodin.
Brian Contos is a seasoned
SECURITY SOLUTIONS // 59
CCTV
How To Minimise
ROULETTE WHEEL MOTION BLUR
Once I was approached by a casino professional, asking me if I could help him find a camera with 60fps, which he wanted to use with the casino’s roulette tables. I asked him about the purpose for such a camera before I gave him my response.
BY VLADO DAMJANOVSKI
Certainly, I knew of a handful of Internet Protocol (IP) camera manufacturers that had 60fps cameras (some even more than 60fps) in their range, but I sensed that the question was based on a lack of understanding of how cameras work (more specifically, the electronic shutter) rather than a real quest for a camera of high frame rate. Additionally, high frame rate cameras are usually more expensive. When the customer explained that the images from his roulette wheel winning numbers appeared very blurry and customers were complaining about it, I knew what the problem was. Let me explain. Cameras are often used to look at roulette wheels and display the winning number as soon as the roulette ball lands on a number. Casino dealers do not wait for the roulette wheel to finish spinning, as this takes quite some time and players will not wait. The most practical thing for them is to wait until the ball, after jumping around, lands in the winning number area and, while the wheel is still spinning, they show a snapshot image of the winning number on a large screen. The light conditions are usually very low, typically no more than 10lux at the gaming tables, which forces the cameras to expose each frame at least 1/25s (or 1/30s) in order to produce ‘live’ video. It may well be that the exposure could be even longer if the cameras are left in integration mode. The results are blurry videos of the roulette wheels, with hardto-read winning numbers. No
60 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Longer shutter – hard to see numbers
Shorter shutter – sharper winning numbers
An Example In this example, the following variables are used: • IP camera with 1/1.9” sensor • HD resolution = 1920 x 1080 • lens = 9mm • distance from camera to the roulette wheel approximately 1.5m
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 61
CCTV
wonder roulette players are not
actual roulette ball, and 29 pixels
focal length, camera to object
happy and are asking for better
the same lens and F-stop), the
of blurriness on top of the roulette
distance, pixel count and the
and faster information from the
more light required for a good
wheel numbers (a total of 50
electronic exposure setting. All of
roulette tables.
picture. It is, however, important
pixels in the horizontal direction).
these parameters are considered
to consider that every IP camera
This effect makes the numbers
by the ViDi Labs calculator, which
this question did not necessarily
has built-in Automatic Gain
still appear blurry. The ViDi Labs
is why the results produced
need a high frame rate camera. All
Control (AGC), which even when
calculator gave a result of 22
in the experiments agree with
he needed was to set the camera
the light levels are lower will push
pixels of blurriness.
the theory.
to a higher electronic shutter
the video signal to be close to the
(exposure), so that the motion
nominal values of full video (1 App
electronic exposure to 1/250s, the
is unique in our industry and is a
blur from the roulette wheel
in the analogue days and around
resultant frozen image appears
product of continuous research.
was minimised to the level that
800mVpp in the digital world).
much sharper and the roulette
It can also be used in licence
numbers can be clearly read. The
plate recognition cameras, or in
find the longest exposure for the
ViDi Labs calculator indicated
places where people are running
acceptable motion blur.
that there will be 5.3 pixels of
or riding bicycles. It can be
blurriness when motion velocity
used almost anywhere where
The customer that asked me
clearly shows the ball and the winning numbers. So, what exposure does he need to set the camera to? This
The shorter the exposure (with
Using the calculator, we can
The blur will always be there,
By setting the camera’s
The motion blur calculation
can easily be calculated by the
even at the shorter exposure, since
is 3km/hr. This is sufficient to
there is motion and can always
ViDi Labs calculator application.
the roulette wheel is still spinning,
see the numbers on the roulette
give users a suggestion of the
Using the Sensor blur calculation,
but it will be much sharper than
wheel more clearly. So, although
longest exposure they need to set
which is produced by a moving
having the default ‘live’ exposure
a higher frame rate camera (60fps
their cameras to in order to see
object with a known speed, a
of 1/25s (or 1/30s).
or 120fps) was not installed,
sharper images.
casino operator can calculate the
Our tests and experiments
a sharper video of 25fps was
most acceptable electronic shutter
have shown that using high
produced just by setting the
speed in order for the camera to
frame rate cameras (for example,
electronic exposure to 1/250s.
see sharp winning numbers.
1/60s instead of 1/30s) will hardly
Problem solved!
ViDi Labs calculator is available for iOS and Android. n Vlado Damjanovski is an internationally renowned CCTV
A little bit of imagination and
reduce the motion blur. As it can
length measurement is required,
be seen on the above screenshot,
To Summarise
author, lecturer, innovator and
but the hard work is done by
there were around 21 pixels of
Motion blur depends on five
consultant. He can be reached via
the calculator.
blurriness produced on top of the
parameters: the sensor size, lens
his company website vidilabs.com
62 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Security CONGRESS PNG
start your global journey here
4-6 March
2019
World Class Technology & Security Innovation
congress Port Moresby
Electronic, Cyber & Physical Security Identifying Risk & Real World Technologies Join us where security industry specialists and professionals will converge on Port Moresby, PNG in March 2019 for the first Oceania Premier Security Industry Event with a Security Conference and Exhibition. Business leaders will translate technology trends, Principal Sponsor
integration and innovation which will enable your business to grow, be more agile and secure. Product capabilities reducing global threats, crime, insight and education into real threat cybersecurity today‌ Register at www.pngsecuritycongress.com/register or email: events@pngsecuritycongress.com
Welcome Reception Sponsor
Gold Corporate Sponsors
Silver Corporate Sponsors
Charity Partner
Media Partners
Aviation Partner
PROFESSIONAL DEVELOPMENT
ARSONISTS IN OUR MIDST DR. REBEKAH DOLEY
The total destruction wrought by
of arson. It is a topic I have been
urge to light fires. Pyromaniacs are
of arsonists seen in the legal
the bushfires in Australia each year
studying for almost twenty years,
variously thought to be irresistibly
system today.
is devastating and the aftershocks
so there is a lot to be told. But there
attracted to flames, to receive
are often felt for months and even
is also a lot that is unknown. It is
sexual gratification from seeing
If not mad, then bad?
years afterwards. Unfortunately,
hoped that by the time readers
fire, and to perform repeated
Statistically, a diagnosis of
all too often, many of the bushfires
have finished reading this piece
acts of more and more serious
pyromania is relatively rare for
experienced around Australia are
they will know a little more than
firesetting for the sole purpose of
arsonists. It is important to get this
found to be the result of arson.
they did before they started and
self-gratification. While this may
clear because there are significant
The concept beggars belief – who
will understand the imperative
offer some offenders a convenient
implications in encouraging a
would commit such a heinous
the community confronts to do
defence, the question of whether
view which provides an individual
crime? What on earth were they
something concrete about this
pyromania really exists was raised
with a ready-made excuse for
thinking at the time?
dangerous phenomenon that is
as early as the 1800s when Charles
their behaviour. If most serial
faced annually in this country.
Pilgrim is quoted as saying, “We
arsonists are pyromaniacs, then,
must therefore conclude that there
in the most simplistic terms, it is
When writing this piece, I thought about what I could tell readers that might help to make
Who are they?
is no such psychological entity as
accepted they are ‘mad’ rather
some sense of this apparently
Arsonists are obscure characters.
pyromania and that an incendiary
than ‘bad’. This has ramifications
senseless crime. Every hour of
Relatively little is known of their
act is either the crime of arson
for society’s moral obligation to
every day in Australia at least
habits and behaviours or about
or the symptom of a diseased or
provide treatment for arsonists
one arson fire is lit. It is fair to say
how these individuals differ, if at
ill-developed brain” (cited in Geller,
– something which has received
that arson has always been an
all, from other types of offenders.
1987).
very little attention worldwide,
elusive crime, difficult to detect, to
It is worth mentioning that the
control and costing the Australian
term used to describe individuals
for a diagnosis of pyromania
on the other hand, it is accepted
community in the region of $157
who set fires varies throughout
to be made requires that there
they are agents of free will
million per year (Insurance
the literature. Synonyms for
be a clear pattern of impulsive
and therefore are ‘bad’, then
Council of Australia, 1998). This
non-accidental firesetters include
firesetting behaviour that is
society’s obligations lie more in
figure does not include the loss of
arsonists, firebugs, vandals and
preceded by a feeling of tension
the rehabilitation arena – again,
life and personal injury suffered
pyromaniacs. Ultimately, however,
and followed by a sense of relief
an area sadly neglected in the
by those involved in escaping
the different terms all refer to the
or pleasure once the act has been
current environment. More on
the flames or fighting the fire.
same thing, an individual who
completed. In my experience,
this later, but in the meantime,
Deliberate firesetting, or ‘arson’
deliberately lights fires, and all
very few of the nearly 200
who is actually lighting fires in
as it is generally legally defined, is
have a pejorative connotation.
offenders I have interviewed
Australia’s bush?
on the increase in Australia. The
The specific diagnostic criteria
but particularly in Australia. If,
and well over 300 cases of solved
question is – how culpable are the
Who are they not?
arson that I have reviewed, have
people responsible?
A popular view is that many serial
noted that type of sensation.
The arsonist among communities
arsonists are in fact pyromaniacs,
Pyromania affects only a very
Arson is predominantly
responding to an irrepressible
small percentage of the population
committed by males, a trend
The next few pages will provide a crash course on the psychology
64 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
which is consistent with patterns
of offenders, differing perhaps
of participation in criminal activity
only in the degree of severity
generally (Farrington, 1996). Some
of disadvantage rather than
experts quote a ratio of 6:1 male to
in the nature of their profile.
female arsonists based on crime
Generally, arsonists have less
and criminal statistics and most
academic achievement, more
studies have found approximately
problems at school, less skilled
eighty per cent or more are males.
employment than other offenders,
My work on bushfire arsonists
and to have an earlier onset of
in particular has found very few
psychosocial problems and more
females involved. Interestingly,
psychiatric concerns.
while younger (16 to 25 years old)
These features are true too
arsonists appear most commonly
for the bushfire arsonists, with
in the literature, this may be
the exception of arsonists who
an artefact of a lack of criminal
are also volunteer firefighters.
experience and resources, leading
Fortunately, firefighters
to these individuals being over
committing arson is a relatively
represented in the criminal
rare occurrence. I have done a
justice system. Bushfire arsonists,
tremendous amount of work in
however, tend to be a little
this field and finds that these
older than arsonists generally –
individuals are often holding
averaging in their twenties. In
down stable employment
general, though, with a recorded
and relationships, or are
age range of 4 to 73 years, arson
self-employed and frequently
is undoubtedly a crime that is
have a high profile in the
accessible at any age.
community. They also tend to
The background of most
be older than typically seen –
arson offenders is consistently
often in their forties to fifties.
reported as deficient. They often
There is, however, another
have a dysfunctional family
group within this category
setting with one or both parents
who are significantly younger
being absent. They may have
and more impressionable,
been abused and/or neglected as
impulsive and reckless than their
a child. This is a similar pattern
older counterparts.
to offenders generally and, like most offenders, arsonists are also
Why do they do it?
reported as typically being socially
Arson is one of those crimes
and educationally disadvantaged,
which frequently disguises its
socially maladjusted and
potential lethality under a veneer
substance abusers. Where
of seeming innocuousness.
mental illness is evident, the
Deliberate firesetting, as an act,
most common diagnoses are
is not particularly technically
schizophrenia, mental retardation
difficult or especially brave. It
and personality disorder.
is not a complex crime to carry
Many arsonists have prior
out for the most part. Therefore,
criminal convictions. Experts
what an arsonist tells about why
tell that arsonists tend to have
they have committed the act is
a pattern of a low rate of arson
often of less interest than what
recidivism but a higher rate of
they do not tell; there are lots
reoffending in other crime types,
of reasons people have given
particularly property-based
for starting fires. One of the
crime. There is a lot of mystique
most widely used systems for
surrounding arson, not all of
classifying motives for arson is
which is deserved. Arsonists
the six main categories identified
are very similar to other types
by NCAVC (The National Centre
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 65
PROFESSIONAL DEVELOPMENT
for the Analysis of Violent Crime,
surveillance, patrols or coming
that behaviour and, perhaps even
adults available to incarcerated
1992). These are:
under police suspicion, which
more pertinently, what factors are
offenders. It is a scary thought
1. Profit (or fraud)
effectively curtails their behaviour
important in getting them to STOP
– particularly when research
2. Revenge
for a while. The arsonist may well
lighting fires.
has found there is a core group
3. Excitement
be motivated to regain power by
One of the questions
4. Vandalism
escalating their activities perhaps
commonly asked is, “Would
(pardon the pun) ‘burn out’. In
5. Crime concealment
in terms of magnitude of fire and/
tougher punishments work?”
fact, not only do they go on lighting
6. Extremism
or frequency of firesetting.
Some of my research has touched
fires, their fires gain in intensity
on this issue and found that
and frequency over time.
of serial arsonists who do not
arsonists typically report feeling
interactions over the years with
Why is more not known?
arsonists, I have come to the
It will come as no surprise to
they receive. Bushfire arsonists,
conclusion there is an underlying
readers that understanding
in particular, have indicated
Strategies for addressing the arson cycle
theme to all these motive
the psychology of arson is an
being underwhelmed by the
To make sense of the strategies I
categories. This focuses on what
extremely challenging task. The
length of sentence they were
recommend for addressing the
the firesetting act psychologically
low detection and apprehension
given on conviction. Arguably,
arson problem in Australia, it is
achieves for the individual.
rates relative to the rate of offence
Australia’s is a punitive culture
first necessary to understand a
mean that most of what is known
and as a community the notion of
little of the progression to serial
Power
about arsonists is based on those
punishment before rehabilitation
arson that an individual might
My belief is that power is the
who were incompetent enough to
is supported. When confronted
experience. The important risk
underlying drive. Arsonists are
be caught. There is also a range
with the haunting images faced
factors that researchers are
generally disaffected members
of issues about how arson data
over the latest incident, it is
aware of at the moment include
of society. Through bad luck, bad
are collected, which calls into
difficult not to condone that
a persistent and long-standing
circumstances or bad choices
question how representative
philosophy. But there is literature
fascination with fire and its
they have found themselves
of the total population some
questioning the deterrent effect
trappings. While a level of fire
disadvantaged across a range
of the groups used for arson
of jail sentences on subsequent
play is not unusual in children,
of life domains – educationally,
research really are. The best
offending behaviour.
once it goes beyond the curiosity
socially and economically. They
is done with what is available,
experience a sense of helplessness
ensuring research methods are as
when no targeted rehabilitation
associated with strong emotions
in the face of adversity; an
scientific and robust as possible
or treatment options are available
(such as the child lighting
inability to effectively make
to improve the usefulness of the
for offenders once they are in
fires mainly when distressed
changes in their world which
findings gathered.
prison, which is the case here in
or angry), it is time to seek
Australia. At the time of writing,
professional support.
But in the course of my
leads to anger and frustration.
unconcerned about the sanctions
This is especially problematic
phase and becomes secretive or
there is no coordinated approach
could be seen as a bid for
What is left to understand?
to treatment or rehabilitation
education and awareness
power: the individual uses fire
There are significant deficits in
targeting firesetting behaviour in
programs running in every state
to acquire power over his or
the literature that may mean
her environment.
society’s picture of arson in
Firesetting, in this scenario,
Having acquired power,
the community is limited in
the individual is motivated to
important ways. One concerns the
demonstrate their power and,
fact that factors differentiating
once demonstrated, there is a
arsonists from other offenders
need to maintain power. The
and from each other are still
arsonist may enjoy the kudos he
being identified. Another is that
receives from peers or the media
an explanation of arson that
attention. It is possible that a
addresses both the question of
copycat phenomenon exists where
why an individual is drawn to
an arsonist either is motivated
fire and why he or she might then
to start lighting fires or to refine
continue to light fires has yet to
his technique following media
be established. Nevertheless, it
reporting of fire.
is time now to move beyond a
Inevitably, there is a loss of
focus on WHY people light fires
power at some point through
and start working towards an
restrictions on their firesetting
understanding of those factors
freedoms arising from increased
which are involved in maintaining
66 // SECURITY SOLUTIONS
There is a variety of fire
securitysolutionsmagazine.com
and territory in Australia. These
the outcomes for juveniles
about what works to be able to
subsumed under categories
are directed predominantly
transferred to adult courts
avoid what does not. The factors
such as ‘property damage and
at primary school children,
against those kept in the juvenile
that are influential in holding a
environmental pollution’,
although some programs have an
system find reoffending was
person in this offending pattern
‘weapons and explosives
adolescent-based component. The
more rapid, frequent and serious
need to be determined; what is
offences’, or similar. Accordingly,
children most at risk come from
in the adult criminal system
likely to be important in getting
whereas countries such as the
families with parental neglect, lack
groups. The youths in the juvenile
them to desist from setting
USA can categorically say who is
of supervision, abuse and, perhaps
system generally improved their
fires needs to be focused on;
causing their fires, how they are
most significantly, poor parenting
behaviour over time. In fact, this is
and a smarter approach to the
doing it and what the effect is on
practices. Often the trigger is a
consistent with what is known of
issues is required. For instance,
the community, Australia is in no
major life change – separation,
criminal career patterns generally.
there is evidence that arsonists
such position. This may go some
divorce, remarriage, or death
Typically, there is an escalating
demonstrate specific crime-
way towards explaining why
for example. These children live
trend in offending from early
type clusters – that is, they do
Australia is yet to get to grips
in difficult circumstances and
adolescence reaching a peak at
not just specialize in firesetting,
with its arson problem, despite
lack the support and skills they
ages sixteen to eighteen years.
but engage in other criminal
significant increase in attention
need to manage themselves in a
After that, there is a gradual
behaviour too. As a result of
over the last ten years or so.
socially acceptable way through
decline until most offenders
their background or subsequent
Consider this a ‘call to
such traumatic events. They
desist from around early to mid
antisocial acts, these individuals
arms’ – arson research is
do not possess appropriate or
twenties. Those who desist in early
often appear before authorities
vital to Australia’s efforts to
effective communication skills and
adulthood are likely to report
well before their firesetting
successfully manage this problem
their personal experiences have
supportive relationships and full-
is discovered. Exploring the
in communities. For that to
reinforced their sense of isolation
time or satisfactory employment.
possibility of early intervention
work, funding, commonwealth
and neglect. Over time, through
That is, many of these individuals
programs for adults that pick up
and state/territory government
curiosity and experimentation,
grow out of crime, by choosing (or
individuals at risk of later arson
support, and the goodwill
they learn the power of fire in
falling into) a life which removes
offending BEFORE they become
and assistance of the relevant
gaining attention from authorities,
them from the influence of
responsible for the types of fires
agencies and facilities is needed.
parents and emergency services.
people likely to keep them in a life
seen recently is a promising line
I am passionate about this issue
It can also become simply one
of crime.
of enquiry. Remember – the first
and have been for a long time. It
conviction for arson is highly
would be terrific for others who
unlikely to be their first ever
felt the same way to drive this
arson offence.
solution further. n
of a range of antisocial acts they commit in groups in response to peer pressure or gang activity. There is a movement to
So what should be done? It is important to get serious about
The notion that there are no Please contact the author for
treat serious offenders as
tackling this issue. As tedious as it
evidence-based, coordinated
adults in the belief that more
may sound, the research needs to
approach to treatment or
severe punishment will deter.
come before the implementation
rehabilitation for arsonists in
International research comparing
of strategy. Not enough is known
Australia is concerning. These
Grad Dip App Psy MSc(Inv Psy)
types of programs have been
MPsy(Clin) PhD MCC AMFC
running internationally for
MAPs, is a clinical psychologist
some time. These need to be
with a history of researching and
established as a priority within
lecturing in the psychology of
correctional facilities and parole
serial firesetting in the UK, USA,
systems. Finally, the issue of
NZ and Australia. As a result of
arson is under-represented
her work in this area, she has
in all official statistics. In
been awarded the Queens Trust
Australia, there is no consistent
Award in 1995 and CFS/S.A.Great
or national approach to tracking
Training and Research Award in
arson offending patterns – it is
1995, 1998, 1999 and 2000. Now
virtually impossible to quickly
based in Australia, Dr. Doley is an
and accurately obtain a clear
Assistant Professor in Psychology
understanding of where arson
at Bond University, Gold Coast,
control is at in Australia using
Queensland and consults to
available crime and court
organizations on the issue of serial
statistics. Arson is rarely, if ever,
arson and firefighter selection.
identified as a crime type in its
Further information on this topic
own right, more often being
is available at www.firefocus.net.
securitysolutionsmagazine.com
references at rdoley@bond.edu.au. Dr. Rebekah Doley BA(Hons)
SECURITY SOLUTIONS // 67
FEATURE
PRISON Militant Jihadist Recruiting Grounds Or Refuge For Rehabilitation? BY ANNE SPECKHARD AND ARDIAN SHAJKOVCI
68 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
It is often argued that prisons
detainees and 800 juveniles held
prisoners later emerged to re-
presents an opportunity to enact
may accelerate the process of
there at that time by US forces in
form and create what became
terrorist violence essentially
radicalization by virtue of having
Iraq. Terrorist leaders in the US-
the so-called Islamic State, or
by proxy – by convincing their
vulnerable prisoners isolated
run prisons and detention centres
ISIS. While prison radicalization
‘brothers’ with shorter sentences
from mainstream society under
in Iraq were indoctrinating and
of that scale is unlikely to be
and who are about to be released
circumstances in which they may
recruiting among the assembled
happening elsewhere in the
to carry out terror acts on behalf
be potentially exposed to virulent
youth. Some terrorist leaders
world, it does set a lesson for
of the group. This also presents
ideologies and charismatic
had even been observed training
avoiding grouping dedicated
a challenge to security officials
recruiters (Brandon, 2009).
young protégés on how to
militant jihadist prisoners, and at
who may not expect an inmate
Numerous violent extremists and
assemble improvised explosive
least attempting to disengage and
convicted on non-terrorism
terrorists have been radicalized
devices (IEDs) by drawing maps
deradicalize them.
related charges to emerge as a
in prisons. This report discusses
and instructions in the sand.
issues of recruiting for violent
Al Qaeda terrorists grouped
extremism in prisons and
lethal violent actor. Consider the example of Harry Sarfo, a
together in Camp Bucca, later
From Petty Criminals to Lethal Terrorists
examines vulnerabilities for
set up shariah courts that ran in
Prison for those first entering the
who was radicalized in a prison
prison radicalization and potential
some of the cell blocks, sentencing
system is a time of heightened
in Germany after serving prison
prevention and intervention
and carrying out punishments
vulnerability. The new convicts
time for his role in an armed
strategies for the management of
to those who defied them. In
are separated from existing
robbery of a supermarket (Gaub
violent extremism in prisons.
Camp Bucca and Camp Cropper,
support systems and may find
& Lisiecka, 2017). He travelled to
Lt. Gen. Jay Garner and his staff
myriad alliances and potential
Syria and became a member of the
Prison as a ‘University of Jihad’
attempted to disrupt terrorist
threats inside the prison for
ISIS emni (intelligence arm) and
leaders and ideologues operating
which they may be unprepared,
was later accused of participating
“As long as we have prisons,
in the prisons by transferring
and therefore must find a way of
in ISIS executions. According to
we have training camps for our
and isolating them from the more
protecting themselves. In some
the International Center for the
youth,” Ahmad Sa’adat, general
vulnerable prisoners. However,
cases, prisoners find solace among
Study of Radicalisation (ICSR),
secretary of the Popular Front for
as the number of detainees
Muslim prisoners who organise
two-thirds of ISIS supporters they
the Liberation of Palestine (PFLP),
swelled and the terrorist leaders
themselves for prayer and study
had studied have served a prison
told the first author in 2004.
learned how to hide themselves
and who band together for self-
sentence, but only 27 percent
Sa’adat spent most of his life in
among the vulnerable, it became
protection. Those who convert
credited their radicalization as
prison (more than 17 years), but
impossible to do so. As a result, the
in prison in order to belong to
occurring in prison (Gaub &
did not in any way view that as
US leadership sought to institute
such groups are vulnerable to
Lisiecka, 2017). This is still a large
lost time. He took advantage of the
a deradicalization program
any radicalizers among them, as
number and constitutes a serious
situation and began indoctrinating
(Speckhard, 2012).
converts are typically naïve and
threat to security.
and recruiting among the
While a prison rehabilitation
ill-equipped to judge any claims
German of Ghanaian descent
In the past decades, Al Qaeda
vulnerable Palestinian prisoners
program was made for Iraq, it was
set forward about the correct way
ideologues hoped to incite a
with whom he found himself
never carried out as intended,
to practice Islam. Thus, the newly
‘leaderless jihad’, in which
surrounded. “We recruited and
and not ever applied fully to the
imprisoned and new converts may
spontaneous cells and homegrown
trained inside the prisons,” he
highly radicalized detainees.
easily fall under the influence of
terrorist plots would emerge. In
recounted. “They had gathered all
The changing politics at the time
a violent extremist who teaches
their vision, however, they failed
our students for us.” (Speckhard,
required Maj. Gen. Douglas Stone
them a virulent interpretation
to account for the difficulty that
2012) Indeed, in many parts of the
to carry out mass releases of less-
of Islamic beliefs, such as those
potential would-be homegrown
world, prisons are known to serve
radicalized prisoners to satisfy
espoused by Al Qaeda and ISIS.
terrorists would face in executing
as fertile grounds for terrorist
demands of the tribal leaders
Violent extremist recruiters
recruitment, with terrorist
in the Anbar area, who were
understand that being imprisoned
nowadays, the leaderless jihad
leaders sometimes celebrating
willing to join the ‘Awakening
for the first time is usually a
is being infused with knowledge
the fact that they can operate
Movement’ but demanded their
period characterised by feeling
shared within the prison walls, as
in an environment where their
sons be returned home in order
lonely and frightened. They
young and vulnerable new recruits
recruits are already assembled
to do so (Speckhard, 2012). The
also understand that while they
coming from the criminal world
around them.
long-term effects of not attempting
may be serving under a longer
continue to fall under the influence
to disengage and deradicalize
sentence, their ability to recruit
of those in prison, who can equip
author was contracted by the U.S.
an entire group of dedicated
young, first-time offenders into
them with terrorist tradecraft and
Department of Defense to advise
jihadists operating there, however,
their ideology and groups and
link them with the network of
on the feasibility of building an
turned out to be a mistake that
then feed them back, within a
individuals who can assist them in
effective prison deradicalization
continues to haunt the world
relatively short time period, to
their endeavours following their
program for the 20,000-plus
to this day, as these very same
a network outside the prison
release from prison.
In November 2006, the first
securitysolutionsmagazine.com
terrorist attacks. Arguably,
SECURITY SOLUTIONS // 69
FEATURE From Career Criminals to Violent Extremists Career criminals are also prone
extremism within the British
recruiter, who played upon these
prison system.
perceived or real grievances.
In one such account, a prisoner
Abu Ghazwhan recounted,
to prison recruitment. Some of
formerly held in London’s
“There was a guy [in prison]
the most infamous cases include
Belmarsh prison, the UK’s main
named Ziad. I joined [ISIS]
Abu Musab al-Zarqawi, who
prison for convicted and suspected
through him. When I got released,
together with his spiritual mentor
terrorists, wrote, “Some brothers
he asked for my phone number.
in prison, Abu Muhammed
approached me and said that
I gave him my number [and]
al-Maqdisi, served four years in
they had been expecting me. At
he gave my number to the
prison and was released by royal
first, I was a bit apprehensive as
organisation outside, and they
pardon implemented by King
to whether I should trust them
called me to join them.” There
Abdullah II in 1999. Zarqawi later
or not. But afterwards I felt
was no evidence to suggest that
emerged as the leader of Al Qaeda
comfortable. One of the brothers,
Abu Ghazwhan had been involved
in Iraq (Kesling & Ma’ayeh, 2014).
Masha ‘Allah, he packed some
in terrorism prior to his 2013
Other prominent career criminals
fruit and a chocolate in a bag and
arrest. Upon his release, he met
who turned to terrorism, in part
handed it to me before I went back
with the ‘brothers’ and agreed to
due to prison radicalization and as
to my cell.” (Brandon, 2009)
set IEDs outside the doors of the
a result of contact with extremist
Another Belmarsh prisoner,
Shia security officials, who he felt
prisoners, include the cases of
Omar Khyam, convicted of
had been involved in unfairly
Richard Reid in the UK and Jose
planning terrorist attacks in the
imprisoning him. As explained,
Padilla in the US, which are often
UK, described how Rachid Ramda,
“[I was] avenging myself. They
presented as quintessential cases
a French Muslim who was later
arrested me, even though I was
of the dangers associated with
convicted in France of organising
innocent.”
prison radicalization and their
the 1995 Paris metro bombings,
capacity to facilitate and breed
approached and befriended
communication skills, possess
violent extremism (Silke, 2014).
him, “The first thing that struck
high emotional intelligence, and
Consider also the example of
me most about Rachid was the
discount any criminal background
Benjamin Herman, a 36-year-old
way he greeted me and the new
of their followers, and may
Belgian. After being released
Muslim arrivals, three hugs and
indeed value it. This presents an
from prison in 2018 on a two-
a smile. He made me feel as if I
attractive mix to lost or confused
day pass, he first killed a drug
had known him for years, such a
young criminals who suddenly
dealer he had met in prison and
warm personality and character,
find their criminal background is
then attacked and shot dead two
making everyone feel wanted and
nothing to be ashamed of in the
policewomen in Liege, Belgium.
important, as if you’re his best
face of their recruiters and who
(a kunya) was studying Islamic
His case demonstrates the danger
friend.” (Brandon, 2009)
may be told that they were right to
law at a university. Abu Islam
steal from the kafirs (unbelievers),
told ICSVE researchers who
emanating from a career criminal
International Center for the
Recruiters generally have good
who had converted in prison and
Study of Violent Extremism
and should continue to do so, but
interviewed him in 2017 that he
fell under the influence of jihadist
(ICSVE) researchers have also
now in the name of Allah. Such
immediately became enamoured
ideology in prison (Stewart, 2018).
found that a prison setting enables
an attitude perpetuates continued
of the group and believed it
recruiters to exploit prisoner’s
would set up a legitimate Islamic
Prison Recruitment Tactics
criminality while overcoming
perceived or real grievances.
any sense of shame they may
State in Iraq. As a result, he
Iraqi Abu Ghazwhan told ICSVE
have been experiencing for
joined them. Abu Islam’s job
The ways in which violent
researchers how he was arrested
being caught and punished for
inside ISIS was teaching shariah
extremists recruit in prison varies
in 2013 with a group of youth
their crimes.
and indoctrinating youth and
by context and the amount of
in relation to a tribal killing.
exposure a recruiter is given to
He bitterly noted that the Shia
vulnerable and naïve recruits.
new recruits. Over time, he became an ISIS emir (military
youth arrested with him were
Charismatic Leaders in Prison
Researcher James Brandon (2009)
immediately released, but he
As explained above, prison
& Shajkovci, 2018). Peshmerga
studied official government
felt that he was singled out as a
recruitment often occurs
soldiers credited him with being
documents as well as accounts,
Sunni, and as a result spent time
through charismatic leaders
responsible for more than 500
letters and testimonies smuggled
in prison. He explained how his
who easily bring frightened and
deaths in which he had sent
out of British prisons by suspected
parents had to find money to hire
angry youth into their violent
young men to their deaths in
and convicted extremists to
a lawyer to get him out. During
jihadist orbit. When ISIS entered
suicide operations. When ICSVE
learn about the manifestations
his short time in prison, he fell
Iraq seizing its first swaths of
researchers interviewed Abu
of radicalization to violent
under the influence of a terrorist
territories in 2014, Abu Islam
Islam in prison, it was clear that
70 // SECURITY SOLUTIONS
commander, a chief) (Speckhard
securitysolutionsmagazine.com
Sunni civilians all played a role. Likewise, many of the ISIS leaders were already radicalized and linked to one another before entering Camp Bucca. However, anytime one gathers jihadists in prison blocks without effective measures to rehabilitate them, as was done in Camp Bucca, gives them opportunity to share their ideological views and tradecraft, as well as idle time to further their networks and plot for the future once released. In Kosovo, ICSVE researchers interviewed Abu Albani (a kunya) about his experiences in ISIS, as well as reasons for joining and defecting from the group. Upon return, he was tried and convicted on terrorism charges. When interviewed in prison, Abu Albani stated that he had become disillusioned with ISIS and angered over how they treated sick and widowed women. He was also angry about how Albanian ISIS leaders mistreated a young orphaned boy who he brought back to Kosovo from ISIS and complained that he feared ISIS cadres in prison might kill him for having defected. However, after he had a charismatic presence
Iraq, recalled how Zarqawi was
and spoke with pride and
also a charismatic and caring
the rise of ISIS on concentrating
interviewed a second time by the
confidence about the Islamic
person. “There was a young man
the arrested Al Qaeda terrorists
same ICSVE researchers, he told
State and its operations. The
in a wheelchair in our prison
during the American occupation
about joining a group inside the
Peshmerga soldiers who were
and Zarqawi always took care
of Iraq in cell blocks in Camp
prison with access to militant
holding him said that in prison
of him, and would wheel him
Bucca. In truth, there were far
jihadist materials in Albanian.
they could not leave Abu Islam
around,” he recalled. Care and
more factors involved in the rise
alone for any measure of time
charisma can be a potent force to
of ISIS than simply concentrating
with a great sense of camaraderie,
with young prisoners, as he was
attract vulnerable and frightened
jihadists in Camp Bucca. The
according to Abu Albani. “I
capable of quickly radicalizing
prisoners to listen to the message
demobilised military, police
deepened my understanding
youth in prison, meaning
being put forward.
and intelligence composed
of jihad in prison. Me and the
heavily of Sunnis losing prestige,
brothers studied Maqdisi’s
Jihadists Experiences in Prison
employment and retirements, the
Millat Ibrahim in Albanian,”
sudden bi-directional sectarian
he told ICSVE researchers. As
It is not only the young and
ethnic cleansing happening in
a result, Abu Albani returned
PFLP leader referenced above,
naïve who are radicalized in
Baghdad and beyond, the lack of
out of his three-and-half-year
was a similar character, exuding
prison. Those already on the
basic services and the crippling
prison sentence as, if not more,
warmth and authority. A political
terrorist path, as well as dedicated
of government capacities
threatening than he went in –
prisoner who spent over a year in
terrorists, may also deepen their
and infrastructure destroyed
despite a prison rehabilitation
the same cell block as Jordanian
commitment to militant jihad – as
during the war, the rise of Shia
program being active during some
Abu Musab al-Zarqawi, who
well as widen their networks –
power and continuing security
of his time in prison. During the
later became the leader of ISIS in
while in prison.
violations by Shia militias against
second interview, he told ICSVE
powerfully engaging the youth and convincing them of the terrorist ideology. Ahmad Sa’adat, the Palestinian
securitysolutionsmagazine.com
Some, for instance, blamed
his release, when Abu Albani was
These jihadists studied together
SECURITY SOLUTIONS // 71
FEATURE
researchers, “We should all follow the words of Abu Mohammad al-Adnani [ISIS’ now-deceased leader of the intelligence emni and propaganda arm of ISIS], that ‘you need to attack in every place and at every time’.” Learning the researchers were soon traveling into Syria, he added, “I hope you meet Jihadi John in Syria and he [beheads you both].” (Speckhard & Shajkovci, 2018)
Prison Disengagement and Deradicalization Programs Various prison deradicalization programs have been constructed since the rise of Al Qaeda and similarly minded groups and nearly every country runs some variation of a program. Most of these programs rely on either a combination of, or just a prong of, Islamic challenge and psychological treatment. On the Islamic challenge side, the programs generally involve an imam or Islamic scholar creating rapport with the prisoner
who can address the manipulation
the Kosovo prison authorities,
views against homosexuality or
and trying to engage the prisoner
of Islamic scriptures that underpin
but refused to participate. “They
feminism that directly contradict
in a discussion of the Islamic texts
the person’s jihadist beliefs. That
brought an imam from BIK [the
government policies and laws.
upon which the person bases his or
said, in determining key risk-
Kosovo Islamic Community] and
her militant jihadist views. This is
assessment factors, specifically as
they tried to force me to talk to him.
defectors, returnees and ISIS
done in an attempt to demonstrate
it relates to religion and ideology,
I never accepted. …We don’t need
cadre prisoners that challenge
to the prisoner the virulent Islamic
one must not consider them
to learn anything from them.”
the terrorist group from an
claims made by jihadist ideologues
as the only, or even the most
that do not hold up to real Islamic
important, factors facilitating
terrorist trajectory have often
language used by their peers
scholarship and scrutiny. On the
violent extremism. As the research
narrowed their focus and only
might be the safer alternative, as
psychological side, programs
indicates, recruits to terrorism
trust information that comes to
once video recorded, the message
generally look for the motivations
and violent extremism often
them from like-minded individuals
does not change (Speckhard &
and vulnerabilities in the prisoners
have simplistic understandings
who share their same experiences,
Shajkovci, 2018). It is also known
and try to redirect them to more
of the ideology and religion
vulnerabilities and motivations.
that violent offenders and addicts
useful ways of meeting the needs
compared to their movement’s
This is an argument for using
are often resistant to individual
and challenges in their lives.
leadership. In fact, more profound
former violent extremists and/or
treatment and may do better with
The likely best and ideal
understandings and commitments
Salafi scholars as those who try to
challenges from other insiders,
approach to trying to effect
to religion and ideology may only
engage violent extremists in prison.
in group therapy settings for
cognitive, behavioural and
occur after time spent in prison,
The risk with using formers,
example, where they may begin
emotional changes among
which allows prisoners to engage
however, is that they are often
to see themselves as the words of
the militant jihadis is to use a
with one another in detailed
not psychologically healthy and
their peers begin to break through
psychologist to get at the inner
discussions about religion and
may make outrageous statements,
their defences.
needs and hurts that led the person
ideology (Silke, 2014).
and sometimes even re-propagate
to embrace violent extremism and
In the case of Abu Albani
Indeed, those already on the
In this regard, videos of
insider point of view in the simple
Abu Islam, the charismatic
their previously held beliefs and
ISIS emir mentioned earlier, was
what continues to fuel embracing
discussed above, he explained that
views. Governments also often
challenged by ICSVE researchers
that mindset, alongside a well-
he had been invited into a prison
find it problematic to employ Salafi
in prison after speaking with
versed and credible Islamic scholar
deradicalization program run by
scholars who may preach religious
bravado about ISIS’ activities
72 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
nature of terrorism has changed
corruption they had witnessed and
extremism professionals on the use
drastically with terrorist groups
taken part of inside the group, as
of counter-narrative messaging
like Al Qaeda, ISIS and other
well as the price they were now
materials produced by ICSVE, both
similar groups now co-opting basic
paying for having served it. For
locally and internationally, as well
religious beliefs. These groups
instance, Abu Omar, an Iraqi who
as studying the use of children
differ drastically from ethno-
was arrested after serving in ISIS,
as violent actors by groups such
nationalist and separatist terrorist
in 2017 shared the following with
as ISIS and consulting on how to
groups of the past by virtue of
the ICSVE researchers: “Prison
rehabilitate them. She regularly
invoking religious imperatives,
changed me. Ever since I got in
speaks and publishes on the topics
namely that the followers have a
prison, things have changed in
of the psychology of radicalization
religious duty to carry out militant
me.” He went on to completely
and terrorism and is the author of
jihad, that suicide missions are
denounce ISIS. n
several books, including Talking to
acts of Islamic martyrdom, that punishment awaits those who
Terrorists, Bride of ISIS, Undercover For a full list of references, email
Jihadi and ISIS Defectors: Inside
refuse to participate and that
admin@interactivemediasolutions.
Stories of the Terrorist Caliphate.
terrorist acts are carried out on
com.au
Follow Anne @AnneSpeckhard
behalf of the Muslim ummah (community). As Scott Atran has pointed out
This article was first published in Homeland Security Today. Anne Speckhard Ph.D. is
Ardian Shajkovci Ph.D. is the Director of Research and a Senior Research Fellow at the
from his years of field research
Director of the International Center
International Center for the Study
with militant jihadis, these
for the Study of Violent Extremism
of Violent Extremism (ICSVE). He
religious views about terrorism
(ICSVE) and serves as an adjunct
has been collecting interviews
begin to fuse the individual’s
associate professor of psychiatry
with ISIS defectors and studying
identity with that of the group
at Georgetown University School
their trajectories into and out of
and certain beliefs that are taken
of Medicine. She has interviewed
terrorism as well as training key
on begin to represent difficult-to-
over 600 terrorists, their family
stakeholders in law enforcement,
change sacred values (Ginges &
members and supporters in various
intelligence, educators and other
Atran, 2013). In these cases, it may
parts of the world, designed
countering violent extremism
using two videos from the ICSVE
be both necessary and worthwhile
the psychological and Islamic
professionals on the use of counter-
Breaking the ISIS Brand Counter
to engage with the prisoners’
challenge aspects of the Detainee
narrative messaging materials
Narrative Project. Surprisingly, he
worldviews and beliefs in support
Rehabilitation Program in Iraq to
produced by ICSVE both locally
was very emotionally engaged by
of violent extremism, which will
be applied to 20,000+ detainees and
and internationally. He has also
the videos, watched them carefully
require prison experts who are
800 juveniles and has consulted to
been studying the use of children as
and, after viewing them, hung
systematically trained to know the
NATO, OSCE, foreign governments
violent actors by groups such as ISIS
his head in shame and admitted,
basis of extremist ideologies and
and to the U.S. Senate and House,
and how to rehabilitate them. He
“We were wrong. We gave a bad
trained to counter it.
Departments of State, Defense,
has conducted fieldwork in Western
Justice, Homeland Security, Health
Europe, the Balkans, Central
without any disengagement/
and Human Services, CIA, FBI, CNN,
Asia and the Middle East, mostly
deradicalization program in
BBC, NPR, Fox News, MSNBC, CTV
recently in Jordan and Iraq. Ardian
has pointed out that in the past,
place can completely on its own
and in Time, The New York Times,
has presented at professional
European ethno-nationalist and
have a positive effect in terms of
The Washington Post, London
conferences and published on
separatist terrorist prisoners were
disengagement from the group
Times and many other publications.
the topic of radicalization and
not challenged in any way about
by virtue of the prisoners being
In the past two years, she and
terrorism. He holds a doctorate in
changing their ideological views,
separated from their terrorist
ICSVE staff have been collecting
Public Policy and Administration
but simply began to disengage
cadres. Over a quarter of Iraqi
interviews with ISIS defectors,
from Walden University, with a
from their peers and terrorist
prisoners under life sentences,
returnees and prisoners, studying
focus on Homeland Security Policy.
activities by spending time in
or awaiting what may become
their trajectories into and out of
He obtained his M.A. degree in
prison. Moreover, low recidivism
life sentences, whom ICSVE
terrorism, their experiences inside
Public Policy and Administration
rates among terrorist convicts even
researchers have interviewed
ISIS, as well as developing the
from Northwestern University
in the absence of deradicalization
explained that their time in prison
Breaking the ISIS Brand Counter
and a B.A. degree in International
programs, both among jihadi
served to remove them from the
Narrative Project materials from
Relations and Diplomacy from
and ethno-nationalists, are often
ISIS’ takfiri ideology that rejects
these interviews. She has also been
Dominican University. He is an
cited as successes (Silke, 2014).
all other interpretations of Islam
training key stakeholders in law
adjunct professor at Nichols
While this is an important point
and to provide ample opportunity
enforcement, intelligence, educators
College, teaching cybersecurity and
to consider, it may also be that the
to reflect about the injustices and
and other countering violent
counterterrorism courses.
face to Islam.” (Speckhard & Shajkovci, 2018) Researcher Andrew Silke (2014)
securitysolutionsmagazine.com
That said, simple imprisonment
SECURITY SOLUTIONS // 73
LOSS PREVENTION
ANALYTICS HAS NEVER BEEN A FOUR-LETTER WORD IN LOSS PREVENTION BY JACQUE BRITTAIN
Analytics is a word that elicits
everyday, real-world situations.
ways the science has taken on new
many different reactions based on
Nearly all of us realise the value,
and different meanings, we can
who we are and what we do. Some
but still some of us shy away
never afford to lose sight of just
of us visualise a sea of numbers,
from the term like it is a four-
how important it is to everything
records and formulas that can
letter word.
that we do.
drown us in an overwhelming
The truth is, analytics has
As we have matured as
wave of statistics. Some picture
always been a critical aspect of
professionals, most of us grew
‘techies’ with white shirts and
loss prevention and retail as a
from humble beginnings of
pocket protectors, pushing
whole. We could never survive as
dealing with shoplifters, to the
theories and designing algorithms
businesses – or as professionals
challenges of dealing with internal
that most of us need and few of us
– without the use of analytics. Yet
theft and the development of
understand. Others simply think
while the use of data analytics has
interview skills, to the more global
it is complicated and difficult
made huge strides with the help of
retail perceptions of controlling
to comprehend and apply in
today’s technology, and in many
retail shrink and the overall profit
74 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 75
LOSS PREVENTION
enhancement of our businesses.
progression of the profession. This
plans, price and promotion
conducted. And it is so much
Each step of the way, analytics has
has given us perspective as well
modelling, responding to new
more than that.
been part of our thought processes
as credibility, providing value
business trends, sales force
Analytics often involves
and our career development as
beyond the numbers.
optimisation, and even the
studying past historical data to
temperatures maintained in
research potential trends, analyse
our stores are all a product of
the effects of certain decisions
data analytics.
and evaluate the performance of
much as it has been part of our might not have called it that, but
Applying the Information
it has always been at the heart of
Especially valuable in areas
who we are and what we do.
everyday job responsibilities. We
Analytics is the process of
a given tool or scenario – the goal
rich with recorded information,
uncovering meaningful patterns
being to improve the business by
such as retail, organisations may
found in available information
gaining knowledge, which can
data analytics has been a
apply analytics to business data
to help us make better, more
be used to make improvements
cornerstone of our evolution
to describe, predict and improve
meaningful decisions. It
or changes. In loss prevention,
from a security presence to a
performance. It is used in every
involves the careful research
this is specifically the steps
professional partner in asset and
aspect of the business, from
or examination of available
we take when we perform an
profit protection. The ability to
purchasing and replenishment
information, discovering facts,
audit. Shrink numbers are a
use the information available to
to identifying customer trends,
interpreting the details, and
product of data analytics, as
us to learn the business, identify
shopping patterns and customer-
helping us draw conclusions
are exception-based reporting
issues and areas of opportunity,
service needs. Sales performance,
about the subject at hand. In loss
and fraud analytics. We use
apply that data in meaningful and
supply chain analytics, store
prevention, that process is at
analytics to monitor everything
productive ways, and drive results
assortment and stock keeping
the core of every consequential
from our alarm systems to our
remains essential to the ongoing
(SKU) optimisation, marketing
investigation that we have ever
safety programs.
As the industry has matured,
76 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
the truth is, analytics has always been a critical aspect of loss prevention and retail as a whole. we could never survive as businesses – or as professionals – without the use of analytics.
make adjustments to better fit the new standard of performance. Technology changed our approach and made our jobs much more efficient. It made us better, allowing us to focus on other things and be more productive. It has actually helped us gain additional credibility as we gain responsibilities and
decision making and other
Big data analytics can help
take on a more prominent role
useful purposes.
organisations to better
in managing the profitability of
understand the information
the business.
• Predictive Analytics: a form of analytics using a number of
contained within the data
advanced statistical techniques
and will also help identify the
Moving Forward
to conduct queries used to
data that is most important
In the world of retail loss
identify trends, patterns,
to the business and future
prevention, we will continue
relationships, behaviors, risks
business decisions.
to apply analytics in order to
All of this may sound extremely
describe, predict and improve
complex and even a little
the performance of the company,
application of artificial
intimidating, but all of these
but the world is not going to slow
intelligence (AI) that provides
methods are being used in the
down for any of us. Not only will
software applications with the
retail industry. The truth is,
we not see that new standard of
ability to automatically ‘learn’
technology continues to impact all
performance ever go away, but
and improve from experience
the tools of the trade and analytics
also it is only going to speed up as
without being explicitly
is just another piece of the puzzle.
we move forward. Yet we should
programmed. Focusing on the
We have subject-matter experts
not pretend that this has not been
development of algorithms
in computer science, statistics
the case all along. The stakes
and computer programs
and mathematics that help us
might be higher and our roles are
that can access data and use
build programs and use these
going to continue to change, but
it for statistical analysis, it
tools to help improve operational
that is only because they need to.
allows computer systems to
efficiency in just about every
adapt to new data without
aspect of what we do. This is
day you look down and find you
human involvement.
a good thing, but we still have
are wearing a pocket protector. At
to do our part and continue to
least we will make wearing that
that involves analysing
learn and grow with the needs of
pocket protector look good – if
Okay, so today, it is a much
text documents aided by
the business.
that is possible (probably not). n
different world, with a more
software that can identify
robust agenda. Retail is not what
concepts, patterns, topics,
can still remember the days of
it used to be. Loss prevention
keywords and other attributes
searching through mountains of
editorial director, digital for LP
is not what it used to be. Some
in the data. This requires
refund documents and miles of
Magazine. He has worked in the
people will correctly argue that
sophisticated analytical tools
register tapes trying to uncover
loss prevention industry for over
this description of data analytics
that process text in order to
patterns and solve theft problems
30 years and was instrumental in
is not exactly what they had in
glean specific keywords or
in our stores. Then, somewhere
the development of the industry’s
mind. Rather, they turn to current
key data points from what are
along the way, we were given the
only internationally sanctioned LP
methods and computer science
considered relatively raw or
gift of exception reporting, taking
credentials – the LPQualified (LPQ)
– more advanced types of data
unstructured formats.
what once took hours and even
and LPCertified (LPC) courses
• Big Data Analytics: the process
days to review and turning it into
in collaboration with the Loss
of collecting, organising and
a review of documents that took a
Prevention Foundation. Jacque
through large amounts of
analysing large sets of data
few seconds to generate.
can be contacted via email jacb@
computerised data sets to
from a wide variety of sources
identify meaningful and
(big data) to discover patterns
our jobs, but it did mean we had
useful trends, patterns,
and other useful information
to modify the way we looked
on losspreventionmedia.com,
relationships and other
that might provide valuable
at how we managed the loss
the website of the US-based Loss
information to enhance
insights into the business.
prevention process. We had to
Prevention Magazine.
and opportunities. • Machine Learning: an
Today, It is a Different World
analytics that include: • Data Mining: sorting
securitysolutionsmagazine.com
• Text Mining: a process
Just do not be surprised if one
For example, some among us
This by no means took away
Jacque (Jac) Brittain, LPC is
Ipportal.com This article first appeared
SECURITY SOLUTIONS // 77
SPOTLIGHT
BOON EDAM ENHANCES EXISTING DOOR SECURITY WITH NEW CIRCLELOCK COMBI INTERLOCKING SECURITY PORTAL
G
lobal entrance
“Many areas such as data
secure or non-secure side of an
“The Circlelock Combi
security leader Boon
centres have a certified fire-rated
Edam is introducing
door installed, integrated with an
to Australasia a new
access control system. This door
follows: on authorisation, the
need for the highest level of
half portal that attaches to an
can easily be interlocked with
portal’s interlocking door slides
unauthorised entry prevention at an
existing door to enhance its
the Circlelock Combi, creating a
open allowing a user to enter the
unmanned area,” says Mr Russell.
security and protect public and
fire-rated, high security entrance,”
portal. An integrated security
private facilities from unauthorised
he said.
system confirms whether the user
entry, tailgating and piggybacking.
“Other applications that can
existing swing door. The working principal is as
interlocking security portal was developed to answer the market’s
is alone and if so, the swinging
Integration Opportunities
benefit from upgrading their
door is unlocked, enabling passage
Boon Edam’s global research
combines the high security
entrance security in this way
into the secure area. A secondary
and development team has
features of Boon Edam’s globally
include government, military
biometric system such as facial
extensively researched ways
proven Circlelock portal –
and defence organisations,
recognition can be used to confirm
to ensure easy and effective
including StereoVision anti-
corporate headquarters of major
identity inside the portal.
integration with third parties
piggybacking technology that
multinationals and cash centres.”
The new Circlelock Combi
combines optical and infrared technologies – with a building’s existing door.
The smart choice for high security entrances
technologies such as biometrics
Highest Protection
and Access Control System (ACS).
The Circlelock Combi security
This is over-and-above any
access solution offers facility
already built-in systems, such as
“Circlelock is the most
Renovation and construction costs
managers and security consultants
advanced sensors and accurate
effective portal to pick up and
can escalate quickly when locking
peace-of-mind when they are
identification systems that only
stop piggybacking and tailgating
down a highly sensitive area. The
seeking to keep people and
allow one person in the portal
using our StereoVision detection
Circlelock Combi can minimise
valuables safe and secure, without
per authorisation.
system,” says Boon Edam National
these nebulous costs by easily
incurring the additional costs of
Sales Manager, Mr Alastair Russell.
and quickly attaching to either the
reconstructing entire entrances.
78 // SECURITY SOLUTIONS
"This new innovation means that we can now offer our
securitysolutionsmagazine.com
customers a safe, yet convenient-
headquarters, healthcare facilities
to-install-solution for highly critical
and hotels as well as the giant
areas in their building. The small
5-metre high revolving doors on
footprint and space-saving features
the new Rialto revitalisation project
of the Circlelock Combi make it a
in Melbourne.
welcome addition to our globally
All Boon Edam products are
leading high security family,” said
backed by extensive service
Mr Russell.
networks throughout Australia and New Zealand, designed to optimise
Proven experience
the reliability and efficiency of
The Circlelock Combi joins
revolving doors, security portals
the comprehensive entrance
and security entrance systems. n
security suite of the global Boon Edam group, which operates in 27 countries.
Learn about the Circlelock Combi Interlocking Half Portal.
Circlelock – the globally proven product on which the Combi is
For Further Information,
based – is also one of a suite of
Please Contact:
security entrance and revolving
Alastair Russell
doors systems already in service
National Sales Manager
in Australasia.
T: +61 1300 689 905
Other Boon Edam systems in
securitysolutionsmagazine.com
M: +61 (0)450 924 882
service here span office buildings,
E: alastair.russell@boonedam.com.au
government buildings, corporate
W: www.boonedam.com.au
SECURITY SOLUTIONS // 79
SPOTLIGHT
THE AXESSOR CIT ADVANCE SAFE LOCK ACCESS MANAGEMENT SYSTEM roviding excellence in
Development Managers (BDM),
list and instructions on hand
is the locks from the mid 90’s were
security is about
installers and customers. The
over to the customer and how
basic electronic locks with a very
more than simply
support staff must be factory
to train the customer. For the
limited feature set. The Axessor
providing a product.
trained and be able to further train
customer the instructions need
CIT has a feature set that allows
True excellence is involves
other support staff, BDM’s installers
to be cut down to only reflect
for several different modes to suit
providing an entire system from
and customers. The support staff
the specific programming of
the different users, Bank mode for
hardware to support, service and a
will train the installers who would
the lock and may consist of a
conventional staff, CIT (OTC and
commitment to ensuring the needs
then, as part of the installation
manager level and staff member
ICS) for rolling codes for special
of a client are meet in every way.
process, train the customer. The
level. They must be simple and
use or for a CIT company and the
support staff must also work closely
in plain English, so they are
locks can also be networked to
lock access management system
with the BDM’s to both train and
easily understood.
centralise administration of your
is an advanced security solution
provide higher level technical
• Installation Adaptors: The
entire Axessor system. This means
suitable for securing all manner
support and advice during the
Axessor CIT in Australia is
support for Axessor CIT locks must
of valuables. Applications to date
sales process.
predominantly fitted to existing
include not only traditional safe
safes. These safe in some cases
lock support people, but network
P
The Axessor CIT advance safe
in Australia and New Zealand include banks, retailers, hotels,
Specification
are many years old and may
engineers and software developers
pharmaceuticals, fast food and
The BDM typically works with
require some adaption. We
as well as industrial designers
jewellers. The system can be
the customer to document the
found it is easier to design and
to design the adaptor plates.
deployed in a multitude ways
best programming set up of the
produce plates and adaptors
SmartLock Digital has invested in
including as a standalone operation
Axessor CIT to suit the customers
prior to installation to ensure
resources to meet the demands of
or a networked or mixed mode
exact requirements. Once the
the on-site time and business
maximum-security environments by
system that allows the lock to
specification is agreed upon, a
disruption is minimal during
having all this expertise in house.
operate as a standalone lock for
complete working sample Axessor
installation. These installation
normal staff and One Time Code
CIT must be presented, explained
plates also include some WHS
Summary
for others.
and demonstrated to the customer.
items such as to change the
The above describes in short, the
This allows the customer time to
angle of the key pad to make
process and has highlighted some
commenced rollouts of several
test the functions of the lock to
reading the display easier and
of the key points that SmartLock
major Axessor CIT projects. These
ensure they meet the organisations
to reduce the need for staff to
Digital has found in the last 24
projects have demonstrated that
requirements. It must be noted here
bend to open locks mounted
months when rolling out Axessor
unlike the rollout of conventional
one of the strengths of the Axessor
low on safe doors.
CIT projects. By no means does
electronic and mechanical safe
CIT is that it can be programmed
locks, which have a very basic
and then reprogrammed until it is
encyclopedia on this but the
highlight one extremely important
feature set, rollouts of Axessor
correct now or in the future to meet
Axessor CIT software includes
point that has not been addressed.
CIT require a considered approach
the changing security needs of
a software development kit
To successfully rollout and then
involving careful planning
an organisation.
(SDK). It is essential to have in
support Axessor CIT requires many
house staff who can document
different disciplines ranging from
Customisation
and write the integrations that
mechanical lock expertise, to
tasks to be addressed during
Customisation covers
different customers require.
software network and integration
a successful Axessor CIT
documentation, installation
rollout. These are Training,
adaptors and integration.
Ongoing Support
process works seamlessly on-going
Specification, Customisation, and
• Documentation: The Axessor
SmartLock Digital have been selling
customer service and support
CIT manual is very extensive.
and supporting safe locks for over
backed up by experts in their field
Specific instructions must be
30 years in Australia and New
under one roof. n
Training
created for each access level.
Zealand. We often get calls for locks
There are four separate groups to
For the installer a complete
installed in the mid 90’s and we still
be trained. Support staff, Business
installer guide including a check
support these locks. The difference
Smartlock Digital have recently
and execution. There are four main
Ongoing Support.
80 // SECURITY SOLUTIONS
• Integration: I could write an
this cover every detail but it does
expertise. To ensure this entire
For more information visit smartlock.com.au
securitysolutionsmagazine.com
SWIPE, SLIDE OR HANDS-FREE
Digital Identification Made Easy
Your activities are not limited to
Is user-friendliness the key for the
control reader designer, in
security applications. How do you
success of your solutions?
2013, to be awarded Top-Level
use your technology for other
Vincent Dupart: Absolutely. Our
Security Certification by the
ith its innovative
industry sectors?
innovation strategy focuses
French Network and Information
solutions, France’s
Vincent Dupart: We were already
on user buy-in to corporate
Security Agency (ANSSI), and to
leading provider of
pioneers in UHF technologies when
security policies. That’s why
offer solutions that comply with
instinctive contactless
we launched our first reader in 2004
we develop products that make
European GDPR rules. All this
technologies is disrupting the
and we are always looking ahead to
access control smoother and
is a guarantee of unparalleled
market and seeing double-digit
future market trends. Over the last
much easier. Directors of Security
expertise. And we are also a
growth. We ask CEO Vincent Dupart
three years, we have significantly
and end users all consider our
registered center for training in
about the keys to this success,
increased our level of investment
technologies to be the most
contactless technologies.
growth plans for the future and what
and we design asset tracking
user-friendly on the market. STid
visitors at Intersec in Dubai can
solutions for other industry sectors
Mobile ID is a great example of
What trends do you see in
expect to see at the STid stand.
now. We offer security and the
this. The mobile solution moves
the market?
ability to monitor industrial flows
your traditional access card onto
Vincent Dupart: We are seeing
It looks like you are trailblazers in
and processes, by turning assets into
your smartphone. With a range of
biometric solutions coming in,
the field of instinctive security. Can
smart connected objects, providing
different identification methods,
but also combined on- and offline
you give us a short summary how
our industrial partners with an
this solution makes access
offerings, just like what STid
things developed in the last years?
essential decision-making tool.
control so much more seamless
Mobile ID already does.
Vincent Dupart: We were the first to
Our technologies are so advanced
and instinctive for users. All you
rethink the way organizations can
that we are listed as a key supplier
have to do is touch your hand
What can visitors expect when
protect their people, assets and data
in the most stringent sectors
on the Architect reader and the
they visit your stand at Intersec
using intuitive RFID access control
like the aeronautical or power
doors will open, whether you
2019 in Dubai?
readers. We provide security at
generation industries.
are talking on your cellphone,
Vincent Dupart: Our experts will
or it’s just in your pocket.
show our STid Mobile ID Online
W
some of the most prestigious sites in France and Europe, such as Airbus,
How do you explain your 25%
There is a dynamic system for
Portal and virtual access control
the French National Centre for
annual growth, when the market is
managing access rights, so that
card management solution
Space Studies, government offices
only growing 5%?
authorization can be issued or
plus Architect Bluetooth/NFC
and other bodies critical to national
Vincent Dupart: It’s about our
revoked remotely, which Security
scalable readers. Our customers
security. We have now one million
innovative and user-friendly
Managers love.
will experience our reader
readers in service and 100 million
solutions and the associated services
users around the world and are the
which make it easy to integrate our
How important are certifications
new “Skin effect” technology, to
leading French solutions provider.
products into our clients’ third-
in a business where the quality
tailor the reader to your brand
We are now targeting the North
party solutions. Rather than using
of a system is hard to prove?
image. SPECTRE, our latest long-
American market, with the aim of
proprietary technologies that lock
Vincent Dupart: Certifications
range identification reader will
gaining 10% market share within
the end customer in, we take an open
send a strong signal to the
also be on display to show fast-
the next three years.
approach to technology.
market. We were the first access
tracking for your vehicle gates. n
securitysolutionsmagazine.com
customization service with the
SECURITY SOLUTIONS // 81
PRODUCT SHOWCASES
NEW OUTDOOR SPEEDGATE PROVIDES SECURITY - RAIN OR SHINE An access control gate designed
entrances or service entrances
users confidence when using the
a superior MDD motor that is
to withstand harsh outdoor
elsewhere on a premises, both of
lane, ensuring quick throughput.
both quieter and faster than the
conditions has been brought to
which are traditionally protected
Australia by leading security
by guard houses staffed by
available with a longer access
solutions provider Centaman
security personnel, or full-
lane and built-in detection of
Entrance Control.
height turnstiles which are slow
bicycles. The variation is ideal
of 180 mm, an inviting aesthetic
and cumbersome.
for workplaces seeking an access
and a customisable finish,
solution that supports their bike-
Centaman Entrance Control’s
friendly workplace policy.
new outdoor speedgate provides
Dubbed the EasyGate SPTOutdoor, the new gate is the
The EasyGate SPT-Outdoor
A bike-friendly solution is also
motors used by other speedgates on the market. Created with a pedestal width
company’s first outdoor speedgate,
is available with mid (1,200
created to meet the needs of
mm) or full (1,800 mm) height
warehouses, distribution centres,
bi-directional glass barriers that
be tough, so the new speedgate
security, durability and fast
manufacturing plants and other
open after a user presents a valid
is made using high quality
throughput. n
outdoor facilities that require
card, quickly closing behind
components that can withstand
speedgates to control external
the authorised person to deter
rain, snow, sand, and a wide
entry points. These points could
tailgating. The familiar ‘door-like’
variety of different humidity and
www.entrancecontrol.com.au or
include front gate pedestrian
movement of the barrier gives
temperature levels. It also boasts
phone: +61 (02) 9906 7522.
82 // SECURITY SOLUTIONS
Outdoor environments can
a winning combination of high
For more information visit:
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmedia.com/newsletter
DORMAKABA MS2600 MORTICE LOCKS The new dormakaba MS2600 Mortice Lock are heavy duty stainless steel mortice locks, designed, engineered and built for optimal performance across a full range of applications including education, healthcare, office, retail, municipal buildings and residential projects. The mortice case, cover and faceplate are constructed of 304 grade stainless steel
securitysolutionsmagazine.com
providing greater security than die cast mortice locks and better corrosion resistance. Moreover, the lock spindle hubs, latch bolt, deadbolt and dead latch are constructed of high grade sintered stainless steel while the springs are of high grade spring steel. dormakaba MS2600 locks conform to level SL8 (Physical Security) and D8 (Durability)
in accordance with ANZ lock standard AS/NZS 4145.2·2008. These new Mortice Locks us a universal “T” shape strike plate as standard and feature an Anti-Lockout (Kick Off) function which can be easily activated or de-activated. Primary lock is supplied de-activated. The MS2602 also offers a latch hold back function via a 130 cylinder with a hold back cam (CAM
KH) ordered separately, with or without cylinder. Rebate kits are available as an accessory to convert the MS2600 mortice locks into a rebated unit or, alternatively, fabricator kits are available as an accessory to accommodate installation on metal/ aluminium doors and frames. n For more information visit www.dormakaba.com
SECURITY SOLUTIONS // 83
PRODUCT SHOWCASES
dFENCE ePOD What would you do in an
a Fire Blanket, an LED Torch,
emergency? Are you prepared?
a fully stocked First Aid Kit,
You should be, after all, is that
and a Mesh Bag for you to
what security is all about, being
personally customise.
prepared for the unknown?
The ePODs contemporary and
Thankfully, being prepared for
sophisticated design not only looks
emergency situations is now a
fantastic, but is easy to use and
little easier thanks to the launch of
completely functional.
the dFENCE ePOD. dFENCE ePOD is a global first
The ePOD also comes with a free App specifically designed
from an Australian company.
to help with the set-up and on-
The ePOD is a contemporary
boarding of your new ePOD. The
and stylish Emergency POD
App comes with the Emergency
designed to cater to a wide range
Contact Function to enable
of needs and situations including
group text messaging with
residential homes or apartments,
predetermined messages, and also
businesses and even vehicles.
features contemporary state of
The ePOD can be simply mounted
the art 3-Dimensional Augmented
on the rear of a door using the
Reality Instructions on how to set
backing mount plate or in a
up and use essential items within
cupboard or under the kitchen
the ePOD.
sink. The ePOD provides a single, easily accessible location for all
The ePOD ensures you’re prepared to Save Lives! n
your emergency needs to protect you, your family and staff. The ePOD contains a detachable Fire Extinguisher,
84 // SECURITY SOLUTIONS
You can order the ePOD at www.dfence.co or contact sales@dfence.co
securitysolutionsmagazine.com
F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry
instagram.com/securitysolutionsmag
Keyhound Keyhound from Lockit Systems
solution that is scalable from single
brings a fresh approach to the
site to a global network capable
age-old problem of physical key
of sending fresh, live information
registration and management.
direct to your mobile device. Well
Invented over 4000 years ago by the Egyptians, the humble key
imagine no more. Keyhound is an innovation
is still one of the most used front
that works ‘OUT OF THE BOX.
line security devices ever created.
Developed by Richard Gould,
But when you put hundreds of keys
director of Lockit Systems, this
together, it can lead to total failure
patent applied, removable, battery
of your front line security. Manual
powered keyhound panel records
‘key registration’ is only as good as
any removals and returns of keys.
the discipline applied. One need only
Furthermore, through the use of
look at their key control and ask the
the ‘key handover’ mobile app, the
question “do I know who has the keys
system can log simply and easily
right NOW” to know how effective a
log and track keys passing from
key management system is.
one person to another. Keyhound -
Imagine a system that provides
keeps on tracking... n
staff accountability as well as key monitoring and control over vehicle or property access, all from single
securitysolutionsmagazine.com
For more information visit www. keyhound.com.au
SECURITY SOLUTIONS // 85
STOPTALK
Changes To Security Licence Exemption For ID Scanning Guideline In Queensland
The Security licence exemption
The Exemption
for ID scanning guideline was
A person scanning an ID will
Importantly, nothing in the
screening process adopted by
approved by the Office of Fair
not need to be licensed as a
guideline reduces the general
venue management to ensure the
Trading in July 2017 to provide
crowd controller only if all of the
obligations of a licensee under
patron conforms to the venue’s
liquor licensees with greater
following conditions are met:
the relevant legislation and,
general admission criteria. For
flexibility when managing
• ID scanning is adopted either
accordingly, apart from the
example, while a patron’s ID
all involvement.
checks on a patron in the entry
the ID scanning requirements
mandatorily or by election at
scanning of IDs, all other
may scan without any issues, he
brought in under amendments
the venue.
screening of the entry of
may be excluded because he is
persons deemed appropriate by
unduly intoxicated, disruptive,
to the Liquor Act 1992. The
• The person is scanning a
exemption allowed persons who
patron’s ID, as required by the
the licensee must properly be
or inappropriately attired
were not licensed as a crowd
Liquor Act 1992.
conducted by a crowd controller.
or presented.
controller under the Security
• The person scanning IDs is
Providers Act 1992 to operate
indirectly supervised while
A Practical Example
otherwise unsuitable to enter
the ID scanners, provided they
performing such duties at
When a patron wants to enter
the premises, the licensed crowd
were supervised directly by a
all times by a licensed crowd
a venue, a host or hostess can
controller will refuse entry in a
crowd controller.
controller, who is employed
perform the actual scanning
firm, polite, non-confrontational
on the licensed premises.
of the patron’s ID into the ID
and professional way and
scanner. A licensed crowd
generally manage any direct
The guideline has been reviewed after 12 months
• If the ID scan identifies a
If the patron is banned or
of operation. As a result, it
banned patron, only a crowd
controller on duty at a licensed
interaction with patrons that the
has been amended to allow
controller may remove that
premises will directly or
ID scanning staff are not trained
an ID scanner operator to be
person from on or around
indirectly supervise the host or
or authorised to perform. n
unlicensed on the condition they
the premises.
hostess operating the ID scanner.
are supervised indirectly by a
• In any physical interaction
As part of the indirect
More information on the
licensed crowd controller on
between a licensed crowd
supervision, the crowd controller
security licence exemption for ID
duty on the licensed premises.
controller and a patron, a
may separately and when
scanning and legal requirements
(Readers can access the
person merely scanning
deemed necessary from time
for the security industry is
guideline here.)
a patron’s ID must avoid
to time, undertake any further
available on our website.
86 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
L I K E U S O N FA C E B O O K For the latest news, products and events in the security industry
facebook.com/ssmaust
Dahua Technology Protects Women Against Domestic Violence
In honor of International Day for the Elimination of Violence against Women, Dahua Technology recently donated its advanced video surveillance solutions to the Faces of Hope Victims Center to help the centre create a safe space for victims and employees alike, protecting domestic violence sufferers. Globally, almost one third (30%) of women who have been in a relationship report that they have experienced some form of violence by their intimate partners. Globally, more activists and groups are organizing to combat domestic violence. Boise, Idaho based victim center Faces of Hope is leading the way in reducing victimization
securitysolutionsmagazine.com
of domestic abuse by offering a safety net of crisis-intervention services. Given the danger posed by abusers, it was necessary for the Center to upgrade its video surveillance system to ensure the security of both staff and victims. “Meeting with Dahua, it was clear that they were eager to help us in any way they could,” said Darren Braden, Regional Sales Director at Dahua’s All-star Dealer - Integrated Security Resources (ISR). “Upgrading the older cameras was a must for the victim center, so Dahua donating its video surveillance equipment is a step towards making this upgrade a reality.” Dahua Technology upgraded Faces of Hope’s security system
with HD over Coax to minimize system disruption and bolster user interface as well as technologies such as 4MP IR 3.6mm Mini Dome and Mini Bullet Dahua cameras to enable superior clarity. Furthermore, Dahua bolstered the center’s night surveillance with WDR enabled products to provide high-quality images and crystalclear imagery around the clock. Most valuably, Dahua Technology ensured the safety of Faces of Hope Victim Center with aroundthe-clock surveillance and monitoring support, imbuing its technology with the company’s care and dedication. With end-to-end technical support to ISR, the installation
went smoothly. Faces of Hope Victim Center staff have described the upgraded system as “much easier to use, has perfect picture quality, and makes us feel safer. Dahua’s generosity is greatly appreciated, and the quality of their products is unmatched.” Moving forward, Dahua Technology will continue leveraging its leading technologies to not only ensuring the safety of women and domestic violence victims but contributing more to the local communities and social purposes. Dahua Technology will continue to focus on “Innovation, Quality and Service” to realize its mission of “Enabling a safer society and smarter living”. n
SECURITY SOLUTIONS // 87
STOPTALK
STID SECURES THE POLICE OF THE UNIVERSITY OF TEXAS AT ARLINGTON
The UTA police at has selected Architect® Blue multi- technology readers— combining three identification technologies: 125 kHz, 13.56 MHz, and Bluetooth—and the STid Mobile ID solution in order to control access to its premises and facilitate technological migration to advanced security levels. This mobile solution reinvents access control by making identification much more instinctive and userfriendly. It brings the access card to your smartphone using innovative identification modes, in addition to the badge. “We analyzed the solutions available on the market. Ergonomics, a high level of security, and configuration tools that make it easy to implement the solution are the criteria that made STid stand out very quickly. More than 130 users, police officers, and security professionals use STid Mobile ID daily. It is essential for protecting the access to our infrastructures”, says a UTA police chief sergeant.
88 // SECURITY SOLUTIONS
For his part, Vincent Dupart, CEO of STid, states: “This new rollout is the result of an increasing adoption of our high-security and instinctive access readers in North America. It is part of our development strategy, initiated in 2013, whereby STid became the first manufacturer to obtain the French First Level Security Certification (CSPN) issued by ANSSI. In 2016 STid expanded its geographical horizons by opening offices in London and Mexico. This year STid is focusing on its expansion in the North-American market and has opened STid NA Inc. in Irving, Texas, providing the most awarded access control readers in the world.“ The French David continues to challenge the Goliaths, as he is devising an investment plan for 2019- 2023 that will make him the European leader in access control. n For more information, please visit www.stid-security.com
securitysolutionsmagazine.com
Sign up to our eNewsletter and receive up-to-date valuable information regarding all things Security.
www.securitysolutionsmagazine.biz/newsletter