Security Solutions Issue 116

Page 1

A U S T R A L A S I A’ S L E A DI N G S E C UR I T Y R E S OUR C E F O R BU S I N E S S A N D G O V E R N ME N T

APRIL 2019 ISSUE 116

WHAT DRIVES MASS SHOOTING?


Prepared to

support you

at every level.

Effective cybersecurity is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And it’s about partnering with a solutions provider who’s prepared to support you at every level. Which is where we enter the picture. We are 100% focused on cybersecurity, and we do everything in our power to mitigate its risks. We have strict requirements for our own products and we work diligently with our partners—and you—to fight this threat.

Learn about our layers of protection at www.axis.com/cybersecurity


V SA E TH E E AT D

GAIN YOUR COMPETITIVE ADVANTAGE AT AUSTRALIA’S LEADING INDUSTRY EVENT For over three decades the Security Exhibition & Conference has been the most established and respected trade event for the security industry in Australia, bringing together the full spectrum of manufacturers, distributors, security professionals and end users. Position your business and amplify your brand among the industry’s most powerful influencers. Network with the most established names, discover the latest technology and create profitable opportunities.

To book a stand contact the team Melissa Clendinen Event Manager 03 9261 4662 mclendinen@divcom.net.au

Lead Industry Partner

Abigail Ford Account Manager 03 9261 4650 aford@divcom.net.au

FIND OUT MORE AT

SECURITYEXPO.COM.AU    #SECURITY2019 The peak body for security professionals


ISSUE 116

CONTENTS

86

FEATURES

44

26 32

74

50

cover story

In the wake of tragic incidents like the mass shooting in New Zealand last month, the first question many people ask is “why”? We struggle to comprehend what drives people to commit such terrible acts and, as security professionals, perhaps more so than the average member of the public, we find ourselves confronted with the realities of the situation. In this issue’s cover story, we sat down with Simon Brown-Greaves, former Manager of the Psychology Unit within Victoria Police, to better understand how and why these things occur.

60

26 BLAST DESIGN PRINCIPLES

There is a lot of interest of late in designing the built environment to protect against bombs. Considerable work has been undertaken and published by government organisations and professional associations alike. Don Williams, Author of Bomb Safety and Security: the Manager’s Guide takes you through a number of physical and procedural principles that can be used as design criteria for new sites.

36 DEFENDING AGAINST ELECTORAL INTERFERENCE

In January 2017, the US intelligence community released a public report detailing a Russian influence campaign, ordered by Russian President Vladimir Putin, “aimed at the US presidential election”. This highlights a significant problem and raises questions around how nations can prevent and defend against this type of activity in future elections.

58 HOW TO CURE PRISONS CONTRABAND MOBILE PHONE EPIDEMIC

Contraband mobile phones have long been a security and public safety concern for correctional agencies across the globe, and successfully detecting them before they do damage is one of the biggest challenges facing prison staff these days. How can we deal with this vexing challenge?

66 ARMS RACE BETWEEN MALWARE

RESEARCHERS AND MALWARE PRODUCERS HEATS UP

As malware becomes more complex and its producers become more sophisticated, traditional, manual approaches to classification and detection are no longer sufficient to protect organisations.

78 NO COOKING THE BOOKS – AUSTRALIAN TAXATION OFFICE CRACK DOWN ON WORKRELATED EXPENSE CLAIMS

REGULARS 06 LETTER FROM THE EDITOR 08 LEADERSHIP

Jason Brown examines the application of the ISO 31000 Risk Management Standard to security element by element.

10 CYBERSECURITY

Beware the zombie apocalypse!

12 MARKET ANALYSIS

Who are the leaders in the Video Management Space in Australia?

14 HUMAN RESOURCES

Are your casual workers really casual?

32 OPERATIONS

How do you find and retain your ideal cyber security professional?

40 BUSINESS

What do you need to do now, to prepare your business for sale in the future?

50 AVIATION SECURITY

Steve Lawson looks great ideas in aviation security that have not worked out quite as planned.

54 ACCESS CONTROL

We look at the top 7 trends for facial recognition in 2019

16 RISK MANAGEMENT

62 CCTV

18 COMMUNICATIONS

70 CYBER SECURTY

Kevin Foster explores threat vulnerability and risk assessments for buildings.

Crisis! What Crisis? Why Recognition is Critical.

20 THINKING ABOUT SECURITY

Don Williams looks at the realities of protecting people in crowded places.

22 EVENTS CALENDAR

A look at upcoming industry events.

How can we more effectively protect places of worship following the tragic events in Christchurch?

How do you find and retain your ideal cyber security professional?

74 PROFESSIONAL DEVELOPMENT

We look at the top 7 trends for facial recognition in 2019

82 LOSS PREVENTION

Learning how much we do not know is the first step to appreciating supply-chain risk management.

86 PRODUCT SHOWCASES

To help you claim the right amount at tax time, the Australian Taxation Office (ATO) has developed a tailored poster and occupation guide for guards and security employees. 4 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Series 400 is a fully welded 19” rack mount wall cabinet with heavy duty load carrying capabilities.

When you choose Australian made, you’re choosing more than quality and reliability, you’re choosing peace of mind.

DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS

MFB’s range of innovative racking solutions is proudly made onshore, to ensure quality and consistency above all others. Backed by constant development, unsurpassed customer support and expedited delivery. MFB proves a solid project partner whatever your requirements. Australian made, makes Australia. With a solid history of over 45 years of supplying innovative, off-the-shelf and custom built racking systems, you can rely on MFB to ensure when you buy Australian, you’re investing and supporting Australian industry.

AUSTRALIAN MADE MAKES AUSTRALIA

www.mfb.com.au

VIC NSW -

P (03) 9801 1044 P (02) 9749 1922

E sales@mfb.com.au E sydney@mfb.com.au


FROM THE EDITOR FROM THE EDITOR www.securitysolutionsmagazine.com

EDITORIAL www.securitysolutionsmagazine.com

EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon

Elizabeth Bodine-Baron, Jason Brown, Greg Byrne, Jamie Eddy, Nick Fitzgerald, Kevin Foster, Alex CONTRIBUTORS Ganin, Simon Brown-Greaves, Tony Jacques, Garry Barnes, Jason Brown, Greg Byrne, Kevin Mike Foster, Hayes, Nick RichardJustin Kay, Lawrence, Stephen Johnson, Richard Kay,Jordan, Steve Lawson, Scott Steve Lawson, Michael McGrath, Tim Rippon, O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Maurizio P. Scrofani, Ami Toben, DonShajkovci, Williams Ami Anne Speckard, Alex Sidernko, Ardian Toben, Simeon Votier

ADVERTISING Keith Rozairo ADVERTISING

Keith Rozairo PHONE 1300 300 552 PHONEkeith@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL keith@interactivemediasolutions.com.au

E D

arlier this month, I had the privilege of

With regard to Artificial Intelligence, Yann LeCun,

attending ISC West. Held in Las Vegas

director of AI research at Facebook, recently stated that

each April, ISCreally West take is recognised oes Australia securityas one of the largest security exhibitions seriously? Yes, Government claims in

"machines need to understand how the world works, Australian’s do have a very relaxed attitude a large amountthey of background knowledge, tolearn security because believe, rightly or perceive

the world and isto,undoubtedly largest security show and some the of the corporate in the US. This sector event serves as a showcase for many demonstrate a passing

the statethat of the at any happen given moment, wrongly, “itworld will never here”. and Thisbe able reason and we plan." is to a sentiment can only hope remains true.

companies who use the exhibition to launch new interest from time-to-time, but what of the product for theand year. average man woman on the street? Do we

Givenasthis of AI from someone who is However, theview old axiom states, one should arguably one of thebest mostbut informed and qualified people always expect the plan for the worst and

Without doubt, the largest trendoratdo thiswe, year’s honestly take security seriously as a

on the planet to speak on the subject, my guess is prepare to be surprised.

event was Across the hundreds nation, justartificial pay lipintelligence. service to the idea

there are few one companies funding, Of course, shouldwho not actually have tohave rely the upon

of security? new products on display, it quickly became clear of

resources anddevastating teams of experts required to master some form of incident to occur in

thatAs AIwe hadenter become the new arms race the security 2018, we should be in thankful that

as opposed market to AI.take So welcome the era of AI order to forcetopeople securitytoseriously.

market. Everything sophisticated recognition Australia has neverfrom suffered a majorfacial terrorist

Washing, wheredeal Artificial has become the There is a great that Intelligence the security industry

Jonathan Rudolph PHONE 1300 300 552 PHONEgraphics@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL graphics@interactivemediasolutions.com.au

incident likestoof 9/11,home the Boston systems the through simple securitybombings, products all

can do to educate business ‘must have’ sales the feature for anycommunity new securityabout product

the bombings of July 7, 2005 in London boasted an AI component designed to make or thethe product

the or benefits solution. of taking security seriously. In past

MARKETING AND SUBSCRIPTIONS MARKETING AND PHONE 1300 300 552SUBSCRIPTIONS

terrorist of October 12, 2002 inmore Bali.user or systemattacks more accurate, more effective,

issuesASecurity Solutions Editor-At-Large Rod few years ago, we witnessed the rush to be seen

PHONEadmin@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL AUD admin@interactivemediasolutions.com.au $62.00 inside Aust. (6 Issues)

However, a result, the Australian community friendly oras more secure.

Cowan hasenvironmentally written about friendly. how security can act asa as being “We are making

$62.00 AUD Aust. (6 (6 Issues) $124.00 AUDinside outside Aust. Issues) $124.00 AUD outside Aust. (6 Issues)

has become complacent with regard However,somewhat looking at the depth and breadth of

a differentiator business andwho givedesigned companies greener future” for cried companies security

ACCOUNTS ACCOUNTS PHONE 1300 300 552

to security. often hear many of our readers who products on Idisplay, I found myself asking at what point are security managers within large corporations does AI become BS? Seriously! Does my new front

a competitive edge.also help you monitor and manage a systems that could

DESIGN AND PRODUCTION Jonathan Rudolph DESIGN AND PRODUCTION

PHONEaccounts@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL accounts@interactivemediasolutions.com.au

PUBLISHER PUBLISHER

ABN 919463 ABN56561,606 606Joseph 919463 Blackburn, Victoria 3130 Level Level 1,34 34 Joseph St, St, Blackburn, Victoria 3130 PHONE PHONE 1300 1300300 300 552 552 EMAIL enquiries@interactivemediasolutions.com.au EMAIL enquiries@interactivemediasolutions.com.au WEBSITE WEBSITE www.securitysolutionsmagazine.com www.securitysolutionsmagazine.com DISCLAIMER DISCLAIMER

The of this this Thepublisher publishertakes takes due due care care in in the the preparation preparation of magazine and magazineand andtakes takes all all reasonable reasonable precautions precautions and makes the accuracy accuracy of of makesall allreasonable reasonable effort effort to to ensure ensure the material but is is not not liable liable materialcontained contained in in this this publication, publication, but for The publisher publisher forany anymistake, mistake, misprint misprint or or omission. omission. The does not assume any responsibility or liability for any does not assume any responsibility for any loss inaccuracy lossor ordamage damage which which may may result from any inaccuracy or use of of oromission omissionin inthis this publication, publication, or from the use information makes no no informationcontained contained herein. herein. The publisher makes warranty, any of of the the warranty,express express or or implied implied with respect to any material materialcontained contained herein. herein. The reproduced Thecontents contentsof of this this magazine magazine may not be reproduced inANY ANYform formin in whole whole OR OR in in part without WRITTEN in WRITTEN permissionfrom from the the publisher. publisher. Reproduction includes permission includes copying,photocopying, photocopying, translation translation or reduced to copying, to any any electronicmedium medium or or machine-readable machine-readable form. electronic form.

comment on the differences between attitudes doorbell really need AI? And what will AI bring to the to security in Australia and America, where equation with regard to my doorbell? How will itthey actually

If we have learned anything What fromthey tragic business’s power consumption. often failed events that have occurred globally in recentin the to mention was that most of the components years, it must that thenon-recyclable world has changed – system were be made from heavy metals

often to travel and work.using According many make have the product better beyond a buzzto word to security managers, Americans understand that sell more doorbells to people who have no idea what

permanently – and we cannot that would end up being land fillkeep with pretending a half-life of that it has not. 9/11 was not an isolated incident roughly a billion years.

terrorism is a clear and present danger and a they are buying or why? fact While of daily life and thus, treatas security I am only using thethey doorbell an example, it

and ifYes, groups ISIS have however, their way, I amlike exaggerating, yousuch get the point.

and security workers with the due respect. In serves to illustrate a point. When does something move contrast, they believe that Australian’s have a from being a useful feature to a term on a sales brochure very blasé attitude towards security and it is this designed to make dumb products sound smart? Judging attitude that makes us much more vulnerable by the number of AI driven products at this year’s ISC to attack. West show, the collective increase in intelligence across In my opinion, having recently travelled the security systems market has, in the last twelve through Egypt and Jordan, they are correct. months, transformed from a class of students with

attacks willtobecome much more There It is easy market something, butfrequent. far more difficult is a great deal more work to be done to ensure to master it in a meaningful way that actually makes a that we create the kind of effective security difference. So when evaluating the artificially intelligent culture within organisations and the broader security offerings, now emerging faster than one can community that will enable Australian’s to be count, perhaps we are best served to rely on our own, safe and secure. And the work must begin with mere mortal intelligence, to assess whether or not what security professionals. Let’s make 2018 the year we are being offered a solution that is really that different that Australia begins to take security seriously. n to last year? Or is it perhaps just that same thing with a

a solid C or B grade average to a collection of Mensa

few software updates and features now being called an

candidates wielding PhD’s.

AI engine? n

WRITTENCORRESPONDENCE CORRESPONDENCE TO: WRITTEN

Level1, 1,34 34 Joseph Joseph St, St, Blackburn, Blackburn, Victoria Level Victoria 3130 3130  1300300 300552 552 1300  enquiries@interactivemediasolutions.com.au  enquiries@interactivemediasolutions.com.au 

John Bigelow

PR O

SECURIT Y

PR

RALIA LTD UST FA RALIA LTD

Official Official Partners Partners O rigin a l Siz e Original Size

PR O

Y P R OV RYI TP R O V I D I D E E RCIUT

CU

SE SE

SECURITY

N

USTRA F SAT R A L L I A A OU IA

STRALIA LTD AU OF STRALIA LTD AU

SECURITY

O C I AT I ASS ON O C I AT I ASS O

RS

SPAAL SPAAL

OF

OF

PR O

RS

SSOCIAT RS A IO DE N SSOCIAT VI RS A IO DE N VI

D LT D LT

SECURIT Y

SSOCIATI ON O SSOCIATI RS A ON DE O VI

RS A DE VI

UST FA

O

Editor

blue colour changed to this colour green. blue colour changed to this colour green.

COPY/ARTWORK/TYPESETTING APPROVAL COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE Please proof read carefully of this material BEFORE signing your approval to print.ALL Please paycopy/artwork/typesetting special attention to spelling, punctuation, signing your approval numbers, to print. Please pay special to spelling, punctuation, dates, times, telephone addresses etc, asattention well as layout.It is your responsibility to dates, times, telephone numbers, addresses etc,Press as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman assumes no responsibility our attention anybeen corrections. Minuteman Press assumes responsibility for bring errorstoafter a proof has authorised to print and print re-runsno will be at your cost. for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................ Signed.................................................................. Date........................

// SECURITY SECURITY SOLUTIONS SOLUTIONS 46 //

John Bigelow Editor

securitysolutionsmagazine.com securitysolutionsmagazine.com


It’s as easy as 1two3 Three phases for construction keying

1 2 3 Construction keying is commonly used on site during the construction phase of building. A convenient way of providing continued security during the 3 phases of construction is to use pExtra construction keying. In simple terms, all cylinders are operated by the one key (Phase 1) during the construction phase. At “handover” the next stage key is turned in the cylinder blocking the Phase

1 key from working again. Once the apartment is sold, the owner would insert the key into the cylinder blocking Phase 1 and Phase 2 keys from working again. To learn more about our complete range of smart and secure access solutions, contact dormakaba. 1800 675 411 www.dormakaba.com.au

Phase 1 Construction Stage

Phase 2 Hand over to the developer/ real estate Phase 3 Hand over to the end user


LEADERSHIP

ISO 31000 RISK MANAGEMENT PROCESS ELEMENT n the previous article on using the ISO 31000 Risk Management Standard process element, the outline covered the general structure as applicable to general risk. In this article, the specific application to security is examined element by element. The risk management process should be an integral part of management and decision making and integrated into the structure, operations and processes of the organisation. It can be applied at strategic, operational, program or project levels. There can be many applications of the risk management process within an organisation and they can be customised to achieve objectives and to suit the external and internal context in which they are applied. The dynamic and variable nature of human behaviour and culture should be considered throughout the risk management process. Although the risk management process is often presented as sequential, in practice it is iterative.

I

Communication and Consultation The purpose of communication and consultation is to assist relevant stakeholders in understanding risk, the basis on which decisions are made and the reasons why particular actions are required. In the case of organisational security, communication seeks to promote awareness and understanding of risk arising from malicious actors, whereas consultation involves obtaining feedback and information to support decision making amongst all those who are responsible for developing and maintaining security controls or may be affected by them. Close coordination between the two should facilitate factual, timely, relevant, accurate and understandable exchange of information, taking into account the confidentiality and integrity of information as well as the privacy rights of individuals. Communication and consultation with appropriate external and internal stakeholders should take place within and throughout all steps of the risk management process, particularly when applied to security. Communication and consultation aims to: • bring different areas of expertise together for each step of the security risk management process. These include but are not limited to internal and external physical, cyber and

8 // SECURITY SOLUTIONS

personnel security advisers, law enforcement agencies, appropriate academics and security professional institutions. ensure that different views are appropriately considered when defining risk criteria and when evaluating risks. Views on security should be sought from human resources, facilities and business units. In addition, external nonsecurity stakeholders may need to be engaged should security controls impact on their operations. This could include organisations in the same precinct, emergency service responders (other than police), community groups and municipal authorities. provide sufficient information to facilitate security risk oversight and decision making. Information concerning current and potential vulnerabilities and the intention and capability of malicious actors should be available to all relevant decision makers, including some outside the traditional security channels, such as health and safety, auditors and finance, all of whom will consider themselves stakeholders. review security risks and improve processes and controls. The threats and the vulnerabilities are constantly changing and practitioners need to be closely following changes in their relevant environment to inform stakeholders and change controls where necessary. The risk management commitment should be communicated within an organisation and to stakeholders, to ensure that all stakeholders understand their shared responsibility for maintaining security and supporting security activities. build a sense of inclusiveness and ownership among those affected by security risks to maintain their commitment to and understanding of good security practice.

Scope, Context and Criteria General The purpose of establishing the security scope, the context and criteria is to customise the security risk management process, enabling effective risk assessment and appropriate risk treatment. Scope, context and criteria involve defining the scope of the process and understanding the external and internal context.

BY JASON BROWN

Defining the scope The organisation should define the scope of its risk management activities. In the case of security, it can be limited to protection from malicious actors. It is noteworthy that crisis management is often allocated to the security function. The scope could look something like: In our organisation, security risk management covers: • Preparation for events or incidents affecting organisational security, including arrangements for planning, capability development, resourcing, establishing contingency measures, etc. • Design, development and implementation of measures for the protection and preservation of its people, both internal stakeholders, and where appropriate its external stakeholders; protects strategic and operational relationships with other individuals and organisations; and assists people in responding to and recovering from the adverse effects of unplanned events. • Design, development and implementation of measures for the protection and preservation of property and assets under its control, including establishing measures to assist in the continuity and recovery of such property and assets. • Design, development and implementation of physical and logical measures for the protection and preservation of information under its control, including establishing measures to assist in providing continued access to such information and ensuring its ongoing integrity and validity. As the security risk management process may be applied at different

levels (for example, strategic, operational, program, project or other activities), it is important to be clear about the scope under consideration, the relevant objectives to be considered and their alignment with organisational objectives. When planning the approach, considerations include: • objectives and decisions that need to be made • outcomes expected from the steps to be taken in the process • time, location, specific inclusions and exclusions • appropriate risk assessment tools and techniques • resources required, responsibilities and records to be kept • relationships with other projects, processes and activities In the next edition, the article will cover security in the external and internal context and defining risk criteria. n Jason Brown is the National Security Director for Thales in Australia and New Zealand. He is responsible for security liaison with government, law enforcement and intelligence communities to develop cooperative arrangements to minimise risk to Thales and those in the community that it supports. He is also responsible for ensuring compliance with international and Commonwealth requirements for national security and relevant federal and state laws. He has served on a number of senior boards and committees, including Chair of the Security Professionals Australasia; member of ASIS International Standards and Guidelines Commission and Chair of Australian Standards Committee for Security and Resilience. As of February 2017, Jason has been appointed Chair of the International Standards Committee for Risk Management. Jason can be contacted at jason.brown@thalesgroup.com.au

securitysolutionsmagazine.com


The next generation in smart panels is here •

Compatible with existing Reliance equipment

Data stored on panel

Encrypted connections

NBN ready

Z-wave® compatible

Built in IP communication

4G / WiFi Module

True monitored path via UltaSync™

Native IP/camera support

Residential

Multi-Storey

Education

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au

facebook.com/HillsLtd/ CONNECT

E N T E RTA I N

SECURE

Retail

Government

Aged Care

Warehousing


CYBER SECURITY

THE ZOMBIE APOCALYPSE IS ALREADY HERE! BY TIM RIPPON

Whilst dopamine creates a short-term

past. Additionally, when my

euphoria, this is not a replacement

children now play with their

for true happiness and, over time,

LEGO and Barbie dolls for

with excessive exposure this will

extended periods of time, they

re-wire your brain. So, essentially,

are chatting to themselves in a

the more you are exposed, the more

make-believe world, dreaming

you crave dopamine and become

and exploring amazing new

further addicted.

ideas and concepts – often with

So, how do we rewire our brain so this does not substantially

me joining in. d) And one final one for the end

impact who we are? Perhaps think

of the day – set your own

about and take on some of these

personal policy not to use a

suggestions, to help improve

mobile device for at least an

your lifestyle:

hour before you go to bed. Very

a) As a starter, consider

simply, turn off your device or

downloading an app that

turn the phone to flight mode

advises the amount of time you

at a set time each night. Give

are doing particular activities on

yourself time to wind down and

your mobile device; even better,

relax in the evening and you will

find one whereby you can set

get a much better night’s sleep.

limits. This will help you realise

These are only four of hundreds of

es, you have read that

stepping onto the train. Being early

how many hours per day you

ways to get your fulfilling life back.

right, the Zombie

in the morning, everyone was either

are online – it was a huge shock

Go on, give it a go. What do you

apocalypse is already

fast asleep, or they had their head

for me.

have to lose? n

here! Those of you

squarely placed in front of their

b) Have regular phone-free days.

living in regional or outback

mobile phone, headphones on

Yes, you will have to learn

Australia may be completely

listening to music, or glued to the

how to read a map again and

and trainer of cybersecurity and

unaware of this phenomenon taking

small screen on their device. Some

arrange where to meet people

business continuity. He holds a

place in our big cities, occurring on

were even using a tablet to catch up

in advance. You may even have

certified Master of Information

a daily basis, every minute, of

on TV or online videos on YouTube –

to get out of your comfort zone

Security (ISO 27001), certified Master

every day.

the consummate passive consumers,

and reach out to a stranger for

of Business Continuity (ISO 22301)

taking time out of their life that they

the time or directions.

and Lead Cyber Security Manager

Y

I am an avid cyclist who enjoys riding to work every day, taking in the sights and sounds of the 50-minute

will never get back again. This got me thinking about what

c) For those with young children,

Tim Rippon is an author, speaker

(ISO 27032) from PECB. Tim is

ask the question, “Do they really

actively involved in various industry

journey. I interact with car and

this must be doing to our brains,

need devices?”. I have recently

groups, including the Australian

truck drivers, who are typically very

and as a collective community. Our

implemented a ‘no device’

Women in Security Network (AWSN)

courteous and aware of those of

mental capacity surely must be

approach for my children,

and the Business Continuity Institute,

us pedalling along on two wheels.

reducing at a very rapid rate, with

so they do not use handheld

where he volunteered for five years,

I also warn other pedestrians that

the reliance so much on technology

devices with me in any way, or

including two years being a board

I am approaching and wish them

and the time spent online, away from

at any time. This change has

member of the BCI Australasia. Tim

a good day, sometimes striking up

deep and rich human interaction.

enabled us as a family unit to

is founder and director of elasticus,

some really amazing conversation

I learnt that, essentially, when

have a much more fulfilling

advising Australian-based executives

points so that we connect on a more

people are using devices, they are

relationship, as we now talk to

on how to best manage cybersecurity,

personal level.

building an addictive pleasure each

each other a lot more, play more

disaster recovery and business

time they get a notification, email,

board/card games and have

continuity prior to the occurrence of

work and was amazed at the sight

message or ‘like’ and the brain

some amazing conversations

a major disaster or crisis. He can be

that I was presented with when

releases dopamine into their system.

that never took place in the

contacted via mobile 0417 036 026.

Recently, I caught a train to

10 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Smart Vehicle Identification

Photos credits: Shutterstock - aressy.com 04/18 - 10917

New Spectre reader: Let the good go, kick the bad out. Without delay. Meet the challenge of fast-track security at your vehicle gates. Spectre’s UHF-based vehicle ID reader is the first of a new generation: discreet by design, flexible in its configuration, secure and encrypted in its communication. Our new long-range reader is built to perform for up to 4 driveways, even in highly challenging environments. It’s the most robust reader on the market, yet intuitively easy to use. Welcome to speed and security - in a single solution.

SCALABLE | SMOOTH | SECURE | AGILE | STEALTH | INSTINCTIVE

www.stid-security.com Security Meetings Trophées de la sécurité Expoprotection ISC West APS


MARKET ANALYSIS

ere, we look at Video

discovered interesting facts about

Management

the Australian market: after we put

Software (VMS)

in focus VMS brands only, there are

brands, which means

just 79 companies, which is just

that we excluded all the companies

about three percent of the total

that manufacture CCTV hardware

number of CCTV companies. This is

and left only pure software

far less than the worldwide average.

H

developers. We found nine major

The first place belongs to

VMS brands on the market in

Genetec, second to Milestone

Australia and New Zealand.

and March Networks is the third.

In order to build this chart, we

AxxonSoft, which started its

started with information about

international expansion just a few

3,973 companies that work in the

years ago, has also made it onto our

physical security market. Then we

list. The picture in Australia differs

filtered out companies that are

markedly from other countries. For

not related to CCTV and ended

example, in the US, Genetec is in

up with 2,342 companies. We

third place, with OnSSI in first. n C

M

Y

CM

MY

CY

CMY

K

12 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


NEW!


HUMAN RESOURCES

WORKPAC PTY LTD V SKENE [2018] FCAFC 131

BY GREG BYRNE

he case of WorkPac

employment was terminated and

casual employee under the relevant

Pty Ltd v Skene

he made a claim for his untaken

enterprise agreement.

[2018] FCAFC 131

annual leave. The basis of the

heard in the Full

claim was that he was not a casual

though employment commenced

Court of the Federal Court has

employee but rather an employee

as casual, it may become full-

confirmed the definition of ‘casual

working on a continuous and

time or part-time because its

worker’. This confirmation will have

permanent basis and therefore a

characteristics have come to reflect

dramatic ramifications for all

permanent employee.

those of an ongoing part-time or

T

industries that regularly employ

The court also found that even

full-time employment.

casual workers, including the

Discussion by Full Court

Australian security industry. The

There is no definition of casual

decision confirms that casual

employment in the Fair Work Act

The Impact of the Decision

workers are those who work

2009 (Cth), nor in any modern

The decision creates a problem for

irregular hours and have no

awards or enterprise agreements.

all employers in Australia because,

guarantee of ongoing employment.

The only definition of casual

even though an employment

On the other hand, WorkPac

employee lays in the common law,

contract states that the employee

confirmed that those workers who

which states that for a worker to be

is paid a casual loading, submits

have been employed on a regular

casual, there must be

timesheets and can have his/her

basis and with a degree of

• a system of irregular work

employment terminated on an

permanency are in fact full-time/ part-time workers and are entitled

patterns • uncertainty as to the period

to amass entitlements as per the

over which employment is

National Employment Standard

offered

hour’s notice, these are now not determiners to casual employment. Further, if employers employ someone under conditions

(NES) and the Fair Work Act 2009

• discontinuity

whereby the employee falls into

(Cth).

• intermittency of work and

the definition of full-time/part-

unpredictability

time, they could be exposed to the

Facts of the Case

By its very nature then, casual

liability of paying annual leave.

The brief facts of the matter of

employment involves flexibility

For example, WordPac was ordered

WorkPac Pty Ltd v Skene are:

in the employment relationship

to pay Paul Skene substantial

for both the employee and

entitlements, which totalled in

the employer.

excess of $21,000.

Paul Alexander Skene was employed by the labour hire company WorkPac Pty Ltd, which

This issue for the court to

supplied labour to various

consider in the Skene case was

Australian mining companies.

that he had a level of certainty,

Impact on the Australian Security Industry

long-term casuals, to examine

In early April 2010, Paul Skene

regularity and predictability

There are many employees of the

their status having regard to this

gained employment with WorkPac

about his hours and whether or

security industry who regularly

recent development. You should

Pty Ltd as a fly-in fly-out dump

not this made his employment

work Friday and Saturday nights,

examine the key features of their

truck operator at a coal mine in

permanent. During the hearing,

instruct in Registered Training

employment, including how regular

central Queensland. As part of his

the court found that even though

Organisations regularly one or

their work patterns are, how

employment, he signed a Notice of

Paul Skene had been engaged in

two days a week and have been

predictable and intermittent. If you

Offer of Casual Employment, which

what the employer considered to

doing so for a number of years.

believe your employees could be

stated his employment was casual

be a casual contract, he was, in fact,

These employees could actually be

considered part-time or full-time, I

and that he would be paid an hourly

working a regular roster of seven

accruing annual leave, sick leave,

advise you to speak to your solicitor

rate of $50. His work pattern was

days on and seven days off with a

parental leave, compassionate

and accountant and examine a way

seven 12.5-hour shifts followed

12-month roster in advance. Due to

leave, redundancy pay and public

through this. n

by seven days off. The roster was

this, it was determined that he was

holiday entitlements that they

made up 12 months in advance.

not a casual worker under the Act

are not aware of or have not

Two years later in April 2012, his

and nor could he be considered a

budgeted for.

14 // SECURITY SOLUTIONS

I urge all employers, if you have

Greg Byrne is the CEO and founder of MultiSec Consultancy.

securitysolutionsmagazine.com


The Cobalt is an innovative low voltage motor driven door lock for swing doors. It has been designed to secure double acting doors and addresses the two biggest issues in door locking; the ability to align a misaligned door and the ability to release when requested, even with excessive load on the door. The Cobalt successfully overcomes these issues and offers the user an array of other features. To learn more about our complete range of smart and secure access solutions, contact dormakaba.

T: 1800 675 411 www.dormakaba.com.au

More than just a lock


RISK MANAGEMENT

THREAT, VULNERABILITY AND RISK ASSESSMENTS FOR BUILDINGS

BY DR KEVIN J. FOSTER

A handbook currently being drafted specifically to address terrorism events that cause damage or harm to buildings is known as Standards Australia [Handbook] HB188. While many Australian Standards are drafted by committees whose members are representatives of professional institutions or of federal or state authorities, HB188 is being drafted by interested subjectmatter experts from a wide range of fields, including physical security, cybersecurity, threat assessment, vulnerability assessment, risk

S

tandards Australia

capability. The section describes how

attractive portable assets from

assessment, architecture, project

and the International

this concept can be used to assess

a university campus or a retail

management, building engineering

Standards

the threat and its likelihood.

environment. The kidnapping of a

and risk perception, but to name

child from a hospital is a different

a few.

Organisation have

It is important when conducting

published a wide range of risk

a threat assessment to consider the

threat probability from a carjacking

management and resilience

geographic contexts. For example,

threat in a busy inner city area.

on the terrorism threat and use of

standards. There are some very

the probable likelihood of a terrorist

Figure 4.5 in HB167 shows an event

extreme violence where the impact

useful handbooks and guides from

attack somewhere in Australia

tree which highlights examples of

is damage or harm to buildings.

these organisations that explain

does not necessarily equate to the

different threat types, the criminal

HB188 is likely to be particularly

how to implement the various risk

likelihood of a terrorist attack at a

acts that might follow, consequential

useful for the building owners and

management and analysis

public swimming pool in suburban

events, and impacts on people

facility managers of commercial

standards in particular contexts.

Perth. In some cases, the threat at

and organisations.

buildings, public buildings and

Some of these are very important

a specific site can be higher than

for security professionals.

a national threat alert level and

a vulnerability assessment to

an eye out for this handbook from

in other cases it can be lower; it

determine the likelihood that a

Standards Australia. I anticipate it will

Security Risk Management is an

all depends on the local security

defined threat source might be

be released in 2019.

essential guide. While it is in need

operational environment.

able to take advantage of a security

For example, SA HB167:2006

of an update to take account of the

At present, one of the difficulties

HB167 recommends conducting

The handbook will focus primarily

perhaps apartment buildings. Keep

Clearly, it would be beneficial if

vulnerability at a specific site, or in a

new Standards Australia handbooks

precinct, or perhaps across a region.

were available for a broader range of

content in ISO 31000:2018 and the

we have with conducting threat

current threat environment, HB167

assessments is that the individuals

is still an important tool for security

who pose a threat might not be

businesses, assets, information,

and were to include the impact of

decision making, especially:

known to the police and intelligence

facilities and buildings will be

terrorism and crime on people and

• Chapter 4 Identify Risk

community and therefore the

vulnerable in different ways and will

communities. n

• Chapter 5 Analyse Risk

location of a ‘lone wolf’ attack might

require customised approaches to

be difficult to anticipate.

threat and vulnerability assessments.

Section 4.4 addresses the threat

Different threat types can

Nations, communities, individuals,

threats, vulnerabilities and targets,

Dr Kevin J. Foster is the Chairman

Therefore, there is a need for

of the Risk Engineering Society in

assessment process, and reiterates

pose different threat likelihoods.

standards, policies, handbooks and

Western Australia and is Engineers

the long-established view that

Someone conducting a cyberattack

sometimes legislation to increase

Australia’s representative on

the threat posed by a nation,

with the intent of disabling critical

the effectiveness and efficiency

Standards Australia Committee MB-

organisation or individual’s

infrastructure poses a very different

of threat, vulnerability and risk

025 (Societal Security and Resilience).

behaviour can be assessed by

threat type and probability from

assessments where security threats

Kevin is also one of the many

considering their intent and

someone who intends to steal

are the source of risk.

contributors to the drafting of HB188.

16 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Inbuilt ÂŽ Wi-Fi , Z-Wave & 433MHz radio Quick & easy install

Control lighting, temperature + appliances

Remote monitoring & control via UltraSync app TM

Wide range of accessories

Future Proof

24x7 monitored solution

Live streaming with audio

The latest in wireless home security & automation. As the NBN rolls out across Australia, many alarm systems that utilised traditional copper-based landlines will become obsolete. ZeroWireÂŽ offers a future proof solution, utilising IP or 3G communication methods, Wi-Fi, Z-Wave and 433MHz radio to deliver a state-of-the-art security and home automation system, that can be controlled via the UltraSyncTM app on smartphone or tablet. HSS0046-Dec18-V1

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au

facebook.com/HillsLtd/ CONNECT

E N T E RTA I N

SECURE


COMMUNICATION

CRISIS? WHAT CRISIS? WHY RECOGNITION IS CRITICAL BY TONY JAQUES

onsider the notorious

to reputation. But as British crisis

Jacques Nasser admitted before

top executives do not or will not

case of former FIFA

expert Jonathan Hemus has written,

a Congressional committee that,

hear bad news. What is needed

President Sepp

“You can only begin to rebuild

despite replacing tyres overseas,

is open, blame-free, upward

Blatter. When

your reputation if you recognise

Ford held off taking action in the

communication. In the wake of the

football’s governing body was

you have a problem. Denial is the

United States “because review of

famous Pentium chip recall crisis,

accused of corruption way back in

enemy of crisis management.”

its various databases assured the

Intel boss Andy Grove observed,

company there was not a problem

“Most CEOs are in the centre of a

C

2011, he famously responded,

Unfortunately, it is not as simple

“Crisis? What is a crisis? We are not

as it seems. A crisis is pretty easy

here”. The databases might have

fortified palace.” He said he had

in a crisis, we are only in some

to recognise when it is triggered

suggested ‘not a problem here’, but

been one of the last to understand

difficulties and these difficulties

by an emergency or major incident,

the eventual result was one of the

the implications of the crisis.

will be solved inside our family.”

such as a fatal mine accident,

largest tyre recalls in history.

Four years later, facing renewed

infrastructure failure, transport

allegations, Blatter was finally

disaster, warehouse fire or a

of a French airline following a plane

the most important early books

forced to resign.

product recall. However, it is much

crash which killed 87 people. Crisis

on crisis management when

harder to identify when an ongoing

authority Christophe Roux-Dufort

Steven Fink wrote, “You should

define reality, including whether

or slowly developing problem

says that, based on the fact that

accept almost as a universal

the organisation is facing a crisis.

has the potential to become a

the morning after the accident the

truth that when a crisis strikes it

This is a genuine skill, and it

crisis, or maybe already is a crisis.

level of seats reserved on their

will be accompanied by a host

requires judgement, leadership

Sometimes this is called a creeping

flights had not changed, the airline

of diversionary problems. As a

and honesty. Yet some senior

crisis, such as repeated computer

executive asserted that it was not a

manager, your task is to identify the

executives will try to emulate FIFA

security breaches, persistent

crisis at all.

real crisis.” n

and deny that a crisis is threatening

management misbehaviour

or has already happened.

over time, or a growing tide of

when senior managers attempt to

customer complaints.

deny there is a major problem. The

Issue Outcomes Pty Ltd. This article

A critical role for leaders is to

It is understandable that

Or consider the vice president

Yet it should not be like that. The reality was captured in one of

Two separate forces are at play Tony Jaques is Director of

first is a bias towards optimism

originally appeared on www.

declare a crisis, to claim that

Ford–Firestone crisis, when more

– the assumption is that nothing

issueoutcomes.com.au Tony can

everything is under control. Maybe

than 200 deaths were attributed

can go wrong and success is sure

be reached at Email: tjaques@

it is ‘justified’ by a desire to protect

to tyre failures, over half of them

to continue. The second force at

issueoutcomes.com.au Website:

the share price or to avoid damage

involving Ford SUVs. Ford CEO

play is wilful blindness – when

issueoutcomes.com.au

executives may be reluctant to

18 // SECURITY SOLUTIONS

Take, for example, the infamous

securitysolutionsmagazine.com



THINKING ABOUT SECURITY

IF MANAGEMENT OF THE SECURITY OF A BUSINESS IS A RECOGNISED NEED, WHY DO WE STILL NOT HAVE ADEQUATE AND APPROPRIATE MANAGEMENT LEVEL QUALIFICATIONS? BY DON WILLIAMS

aving just reviewed

best person for the position. Given

There are remnants of guard

This is not a new revelation.

the Certificate IV and

there is no expectation that the

training in the Certificate IV and

We have known for a long time

Diploma of Security

applicant will have a relevant tertiary

Diploma material. For example,

that most security consultants

and Risk

qualification, the job description

the Diploma competency on

and managers do not have

Management, a number of

is likely to reflect parallel low

workplace health and safety in

qualifications that will compare

considerations come to light. A

expectations for capability.

the security industry requires

favourably to other disciplines.

knowledge of restraints and

At the time of writing, the

H

primary one is that the Diploma

There are some security

remains, to my understanding, the

managers and consultants who

controls. The security manager

security training package is due

highest formal qualification in

have developed great knowledge,

should be more concerned about

for review. There needs to be

protective security other than the

skills and capabilities; these are the

what there are guards for, why they

acceptance that most students

degrees offered by Edith Cowen

professionals amongst us. Other

have restraints and to which risks

at the Certificate IV and Diploma

University. Despite much

employers still rely on the applicant

are the guards the appropriate

level are lateral entries and there

discussion, we still do not have

having worn a uniform.

risk management treatment? If

is a necessary disconnect between

there are guards on site with cuffs

training guards and educating

tertiary institutions offering

Another problem with the

degrees in the protective security

current training package is the

and sprays, the security manager

security managers and security

management discipline. We know

disconnect between Certificates

needs to be confident that they are

risk advisors.

there is plenty of literature on the

I, II and III and the Certificate IV

appropriately trained and licensed.

topic. We know there is a need for

and Diploma. Unlike most trade

Those who want to develop

well-educated and knowledgeable

progressions where a student

their knowledge and skills at

tertiary institutions that there is a

managers to provide advice to the

begins with base knowledge

the managerial level can obtain

need for, and a market for, degrees

executive, but we have yet to

at level 1 and progresses up to

professional certifications such as

relating to the management of

convince providers.

diploma, the security package takes

Certified Protection Professional

security. n

security guards through levels 1

(CPP), Physical Security Professional

educational requirement for a

to 3 and, while some may progress

(PSP) and the IT security

security consultant is the Certificate

from there, most undertaking

equivalents. They can develop their

is a recognised thought leader in

IV. No other field of management

the Certificate IV or Diploma are

own libraries and contribute to

security, emergency management

advice would rely on such a low

lateral entries. It is not, nor should

the literature through professional

and related disciplines. His book,

level of education and accreditation.

it be, a pre-requisite to have been

publications and journals but,

Bomb Safety and Security: the

In-house consultants do not require

a guard before learning about

without looking overseas, it is

Manager’s Guide, is available from

any formal qualification; here, the

security management and security

difficult to obtain additional

Amazon. Don can be contacted at

onus is on the employer to select the

risk management.

formal qualifications.

donwilliams@grapevine.net.au

In most jurisdictions, the

20 // SECURITY SOLUTIONS

We need to continue to consider how we can convince Australian

Don Williams CPP RSecP ASecM

securitysolutionsmagazine.com


CIRCLELOCK

TOURLOCK

SPEEDLANE LIFELINE

TURNLOCK

The full entrance security product suite Boon Edam Australia is uniquely positioned to offer a full entrance security product suite. Ranging from full height turnstiles and speed gates, through to high security revolving doors and portals, Boon Edam has your entry secured. Find out why the world’s biggest names, including Fortune 500 companies and government institutions, rely on Boon Edam for their entrance security.

ASK US ABOUT INNOVATIVE NEW LEASING PLANS AVAILABLE ON ALL ENTRANCE SECURITY PRODUCTS.

Boon Edam Australia 1300 689 905 www.boonedam.com.au


EVENTS

reissue to address ‘whole of work life assessment’. The Australian Standards Technical Committee for Security and Resilience will be leading this work and members will be in attendance. An outcome of the workshop will be a model plan transferable to your work place. Visit safeguardingaustraliasummit.org.au to register or for more information. n

Safeguarding Australia 2019

will be visiting from France to

and contributing to a good practice

IFSEC International

address the threat and response in

model for addressing the issues

18-20 June 2019

8–9 May 2019

espionage in international defence

outlined in the workshop. The

ExCel, London, UK

QT Hotel, Canberra

and security industry. Pierre has

workshops will require some

Beyond an internationally

Confronting and Countering the

extensive global experience in

background and pre-reading for

esteemed product showcase, IFSEC

Threats from Espionage, Foreign

both private and government

participants to get the best from

International is Europe’s centralised

Interference and Subversion

sectors and leads internationally

the immersive program:

gateway to the critical security

on protective security and

• Cybersecurity – defeating

conversation. Amidst mutating

Now in its 16th year, Safeguarding Australia – the nation’s longest running and

crisis management. Academic and policy input

the foreign and domestic

threats, the integrated path to

adversaries

achieving global safety starts

most influential national security

to the key topic is coming

This in-depth workshop will

with IFSEC.

summit – brings government and

from Professor Rory Medcalf,

examine the nature of the

• Access inspiring high-level

industry together to counter the

Head of the National Security

threats, targets and operations

panel debates from government

threats facing all Australians.

College, supported by Associate

of foreign adversaries. It will be

and industry influencers,

Safeguarding Australia will unite

Professor Matthew Sussex, who

limited to citizens of Australian

and join the collaborative

international and Australian

will be addressing the subject

allied countries which have

conversation between installer,

experts to explore the issues

of Democratic Resilience and

security agreements with

in this space, considering the

Foreign Influence: lessons for and

Australia. The workshop will

past, present and future of

from Australia.

develop models for detecting,

solutions you need whilst

preventing and responding

raising your anxieties with the

welcomes the agreement from

to cyberattacks and look

experts behind every innovation

Australia Summit 2019,

the FBI and US State Department

in detail at the NIST Cyber

Confronting and Countering the

who will be contributing in the

Security Framework, ISM

Threats from Espionage, Foreign

area respectively on the cyber

Essential 8 and UK Cyber

security solutions against

Interference and Subversion, has

aspects of Counter Intelligence

Essentials. It will be facilitated

rigorous, real-life testing zones,

attracted a range of international

(CI) in the region and measures the

by leading government,

including attack scenarios

and local key senior security

US Government uses to protect

academic and private sector

professionals who will be

our staff and information from

cybersecurity specialists.

presenting at the Summit.

CI concerns.

security response. The theme for Safeguarding

The Program Committee is

The Summit Committee also

Safeguarding Australia

• Insider Threat – people and the

integrator, end-user and vendor. • Discover the high-quality

you hope to procure. • Draw impartial verdicts for

and surveillance. • Research the inspiring ways you can adapt to the changing

culture of security

tides of tomorrow’s security

pleased to announce participation

2019 will feature one and a

This in-depth workshop will

challenges and equip yourself

from one of our key international

half days of plenary sessions,

consider the best models for

with the tools you need to move

speakers, Elizabeth Bodine-

followed by two highly focused

an insider threat program and

Baron, an engineer specialising in

immersive workshops offered

work through what may be

• Network with the global security

complex networks and systems at

as an elective on the afternoon

the best approach for your

industry whilst sophisticated

RAND Corporation in the US and

of Day 2, following conclusion

agency and business. It will

partnerships and inspiring

co-author of Countering Russian

of the main conference at lunch.

also examine the current

collaborations kickstart under

Social Media Influence.

This is a programmed activity

Australian Standard 4811

where all participants are actively

Employment Screening,

Visit www.ifsec.events/international/

engaged in analysing the issues

which is to be reviewed for

for more information. n

Pierre Pasinetti, the Vice President of Security for Thales,

22 // SECURITY SOLUTIONS

forward with certainty.

the same roof.

securitysolutionsmagazine.com


THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.

NEW!

ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.

+61 (3) 9544 2477

email: oz_sales@takex.com

HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.

BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.

INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.

OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .

1300 319 499 csd.com.au www.takex.com

TAKEX AMERICA

VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta


EVENTS

Security Exhibition & Conference 2019

to see some interesting new

mines, commercial buildings,

smartest ways our built environment

innovations as well as a host of

residential towers, building and

can help us realise our full potential in

24–26 July

new attractions.

development; the best of the best in

Australia's leading showcase of high-

a world- class offering:

performing facilities, and intelligent

• intelligent CCTV, access control

living and work spaces.

International Convention Centre,

Make sure you put the dates

Darling Harbour, Sydney

in your diary. We look forward

In 2019, the Security Exhibition

to seeing you again in Sydney in

& Conference is heading back

2019 for the Security Exhibition &

to Sydney.

ASIAL Conference!

The Security Exhibition & Conference is the industry’s annual

Visit securityexpo.com.au for more information. n

opportunity to reunite for three

and alarms systems • advanced video surveillance solutions

Our 2020 event will feature a Smart Zone designed as a thriving hub of technological innovation

• intelligent traffic solutions

which presents new technologies

• asset management systems

and solutions to help you create

• drone capability

smarter, greener buildings. The new

• software cyber management

zone offers visitors a dedicated

days of quality networking and

PNG Security Congress

unrivalled education alongside a

2–4 March 2020

showcase of the most innovative

Port Moresby, Papua New Guinea

• innovative video intercoms

and cloud-based solutions to

solutions to the Australian

Now is the time to plan to attend a

• large enterprise systems

improve operations and deliver

market. For over three decades,

world-class security and technology

• mechanical locking integration

business value.

it has been the largest and most

conference and exhibition –PNG

established commercial event for

Security Congress.

the security industry in Australia,

Security industry specialists and

solutions

with electronic security solutions

environment to look for integrated

According to industry research,

• emerging technologies

IoT technologies will be more

Visit pngsecuritycongress.com/

pervasive in smart commercial

bringing together the entire

professionals will converge on Port

register to register or for more

buildings than anywhere else

supply chain of manufacturers,

Moresby, PNG, in March 2020 for this

information. n

over the next three years. This

distributors, security professionals

premier security industry event, with

and end-users to connect

a security conference and exhibition,

Total Facilities

visitors industry-class solutions

and create unparalleled

real-world challenges presented and

22–23 March 2010

and strategic advice on how to

business opportunities.

a glimpse into the future of global

Melbourne Convention & Exhibition

use technology and data to better

security integration and trends.

Centre, Melbourne

understand and manage their

Total Facilities is Australia's most

building performance.

The entire team is looking forward to once again reuniting

The Congress will feature

zone is designed to deliver to

with more than 4,500 security

electronic security and safety

important facility management

professionals and over 150 leading

solutions for aviation, banking,

event. Explore an Environments of

au for more information for more

suppliers. The 2019 show is set

infrastructure, industrial sites,

Excellence and discover the latest and

information. n

24 // SECURITY SOLUTIONS

Visit www.totalfacilities.com.

securitysolutionsmagazine.com


YO UR AC CES S TO REVO LUTI O N

FlowMotionÂŽ

For more information | 1300 364 864 | info@magnetic-oz.com | www.flowmotion-access.com |


FEAUSRE

BLAST DESIGN PRINCIPLES

26 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


BY DON WILLIAMS

There is a lot of interest of late in

of explosive from 100s of

designing the built environment to

kilograms to 10s.

protect against bombs. Considerable

o Use landscaping and so on to

o Provide clear site lines for staff and CCTV. o Ensure street furniture,

access ways to channel blast can be considered. o The nature, strength, fixing

work has been undertaken and

limit how close vehicles or

plantings and other items are

and location of signage, street

published over many years by

large items can be placed near

designed to make observation

furniture, landscaping and

organisations such as the US Federal

the asset.

and searches quick

so on should be considered

and effective.

in relation to potential bomb

Emergency Management Agency (FEMA), Department of Defence (DoD), UK Centre for the Protection

o Provide public parking away from key areas. o Restrict parking that is close to

o Train staff on identification and reporting of items

locations as they can result in ‘secondary fragmentation’.

of National Infrastructure (CPNI)

critical controls and functions

as well as professional associations

of the site or allocate close

such as the International

parking spaces to employees

Protecting critical features

adjacent to a location where a

Association of Protective Structures,

and others where there is some

of the site from blast effects

bomb may be placed.

the Institute of Explosives Engineers

degree of confidence.

(including fragmentation):

and ASIS International. There are a number of physical

o Ensure critical controls and

considered to be out of place.

o Ensure that hazardous material is not stored at or

o Where distance between

Allowing emergency access after

functions for the site are

critical functions and areas

an incident:

and procedural principles that can

not located next to places

where a bomb may be placed

o Ensure the design allows

be used as design criteria for new

where a bomb can be placed,

cannot be provided, the

emergency service personnel

sites; some may also be applied

for example, adjacent to

intervening walls and ceilings,

and equipment to access

to existing sites. The term ‘asset’

public areas.

for example, can be hardened

the site after an incident

to limit blast damage.

when normal routes may not

is used to indicate the thing(s) deemed worthy of protection: staff,

Limiting where a bomb can

the building, the controls/utilities/

be located:

amenities of the site, items on

o Sound design with matching

display, VIPs and so on. It is essential that assessment of blast effects be in relation to realistic bomb weights. For

processes can significantly

o Design can assist with channelling blast away from specific areas. o Poor design can result in

limit where a bomb can

blast being increased due to

be placed.

reflection or containment.

o Access controls can limit what

• Reducing injuries from

be available. o Ensure that on-site emergency materials are located in places where they are unlikely to be affected by an incident, possibly in multiple locations. o Ensure appropriate and

example, consider that a 5kg weight

is brought into controlled

can be held in an outstretched arm,

areas, particularly back-of-

10kg held by the side of the body

house areas where critical

are to the eyes from projected

It should be acknowledged

and 20kg is a heavy load probably

controls and functions

glass particles. Where there

that where there is free and

on wheels. Some of the larger bomb

are located.

are large glass areas in public

unrestricted access by the public,

places, consideration should

it is not possible to prevent

sizes often proposed are neither

o Use of cloak and storage

building materials: o Many blast-related injuries

realistic evacuation routes and assembly areas are provided.

realistic (consider probable rather

rooms can both limit where

be given to the type of glazing

items of between 5 and 10kg to

than possible) nor can they be

items can be placed and act as

laminate and/or the use of

be carried or 20kg if on wheels.

defended against.

deterrents. The proximity of

protective films.

Therefore, without a 100 percent

To protect against bombs, the following principles must

critical functions to such rooms must be considered.

o Where large glass or decorative

effective search of all items at both

panels are used, the potential

front and back-of-house, there can

o Depending on the nature of the

method of failure should be

be no certainty that a bomb or

built environment:

site and event, controls may be

assessed, for example, will it

other weapon can be detected and

Maintaining distance:

put in place to limit what the

pivot from the top or bottom

prevented. n

o Limiting the proximity of a

public can bring in.

(depending on how large a

be considered in designing the

bomb to the asset can reduce

bomb can be placed where)

the effect of an explosion

Making it easy to identify items

and hence the number

which are out of place:

of casualties.

o Ensuring public and back-of-

Don Williams CPP RSecP

and what will be the resultant

ASecM is a recognised thought

effect on the crowd?

leader in security, emergency

o Design to prevent ‘progressive

management and related disciplines.

house areas are easy to view

collapse’ should a structural

His book, Bomb Safety and Security:

can restrict the size of a

and search makes detection of

element be damaged is now a

the Manager’s Guide, is available

bomb that can get close to

potentially hazardous items,

common design requirement.

from Amazon. Don can be contacted

the site, reducing the amount

such as bombs, easier.

o Vehicular access controls

securitysolutionsmagazine.com

o The potential for corridors and

at donwilliams@grapevine.net.au

SECURITY SOLUTIONS // 27


FEAUSRE

RECREATIONAL OUTRAGE BY DON WILLIAMS

28 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


One of the interesting things

the most inconsequential and

offended. Talking truth to power

might it occur in the corporate

about delivering courses for a

innocuous things. Furthermore, if

has always been dangerous, but it

world, particularly to those who

reputable provider is reading the

they cannot find personal offence

now appears that talking truth to

must state the unpalatable?

student critiques. Having revised

in a matter, they will happily take

anyone can result in being ‘outed’

and delivered the Diploma of

up the torch and become offended

as insensitive and offensive.

Security and Risk Management,

on some else’s behalf – even when

the student feedback was

the supposedly aggrieved victim is

situation in which an employee

upon a time, if someone felt truly

particularly important.

not actually offended.

complains to management that

offended to his very core based on

his partner was informed that the

the belief that his righteous view

Students can choose to

The other point of interest is

To provide context, imagine a

What is unclear is when we went from righteous indignation to ‘recreational outrage’. Once

provide their names or remain

the need to do so anonymously

office where he works could be

of the world had been attacked,

anonymous; in either case, the

(I checked – not for the name

subjected to workplace violence.

he could be indignant. It was

presenter has no visibility of who

but just to see if one had been

Or that he has been told the

expected that this person would

said what. A student commented

provided). At no time during the

reason things are locked away in

respond visibly and formally,

that one of the guest lecturers

10 days of presenting did anyone

the workplace is because there is

even forcibly, with the courage

made offensive comments, which

suggest that the tone, content or

the potential that someone in the

of his convictions. It was not an

I found surprising as, having sat

delivery were inappropriate or

building might take something,

enjoyable exercise and required

through the presentations myself,

of concern. If they had, the issue

thereby implying that there are

personal commitment.

I failed to note any offensive

could have been addressed and

dishonest people in the building,

comments. That said, I am old

the content of concern reviewed

which the employee finds to be

achieved an almost universal

and opinionated, so perhaps I

and, if necessary, adjusted. Just

an offensive concept. Or, the

state of recreational outrage

missed it. Thinking back on the

because a complaint could have

reason someone needs a specific

where anyone can find or actively

course, I can only assume that the

been raised does not mean

clearance before accessing

seek offence, whether against

complaint was made in reference

the material must be changed.

particular information is because

themselves or on behalf of others.

to one particular presenter who,

Sometimes the material is correct;

it is necessary to ensure he or she

Researching recreational outrage

in my opinion, was not so much

it is perception that must be

is a fit and proper person – or,

suggests the common features are:

offensive as honest. Perhaps blunt

addressed. As someone said,

perish the thought, he/she fails the

enjoying the experience of venting

truth has become offensive to

“Because you are offended does

assessment and is found not to be

on a topic; enjoying a position of

some people?

not mean you are right.”

appropriate. How offensive might

moral superiority; not necessarily

that be?

being directly involved or affected

The same student also

Offence is in the ear of the

Now, it appears, we have

suggested that some of the

beholder. What one person

comments made during the

hears as true may be unpalatable

telling the truth as we see it; do

on behalf of others; anonymity

course may have caused offence

to another. Because it differs

we stop advising on the reality of

or diffusion amongst a crowd –

to the military members present.

from the hearer’s view does not

threat vectors; do we stop pointing

for fear of being labelled a troll.

I also find this perplexing as,

mean it should automatically be

out vulnerabilities and exposures

Exceptions are those who have

while I had avoided telling my

considered offensive. Unless of

because someone may be

made a vocation of calling out

rude jokes about the Air Force, I

course the hearer is offended by

offended, or may think someone

behaviour, comments or opinions

did state that wearing a uniform

the fact that others have differing

else might be offended? Obviously,

that they see as being actually or

is not a security qualification

opinions, experiences and

we cannot stop doing our jobs – or

potentially offensive.

and noted that the military are

world views.

so we think. An internet search

trained to write in a concise

By now, readers are possibly

Do security professionals stop

by the issue but willing to speak

“Outrage is currently

of “academics afraid to speak”

America’s deepest core

rather than literary manner. For

wondering what, if any, relevance

will bring up reports from the

value – and it shouldn’t be,”

whatever reason, this may have

all of this has to security

UK, US, Canada and Australia on

stated Dylan Gallimore on the

caused offence?

management. The answer is

academics limiting their opinions

Arcmedia website. Gallimore

quite simple. It often falls upon

and teaching so as not to be

claims, “Psychologists have

with some interest upon the

the security manager to take

shamed, harassed and humiliated

increasingly warned of the

notion that there appears to be

responsibility for pointing out

on social media and in student

dangerous pleasures of outrage…

a growing section of society who

things that may be unpopular

forums for being offensive in one

Additionally, outrage is a social

is not only easily offended, but

and making statements which

form or another. If it can happen

emotion; it compels individuals to

almost eager to find offence at

could cause the susceptible to be

in the academic world, how easily

express their outrage publicly in

All of this leads me to reflect

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 29


FEAUSRE

search of validation and solidarity.

then we can seek to understand

Which means that while

the cause of the offence and try to

outrage remains a response to

placate them. Or, accept that there

perceived injustice, it can also be

are those who want the ‘buzz’ that

a self-serving emotional defence

comes from venting their moral

mechanism deployed to alleviate

superiority at the cost of others.

guilt, buffer threats to one’s moral

Perhaps we should be offended by

identity and portray oneself as a

their offensive behaviour?

very good person in the eyes of one’s peers.” Another online search for

Perhaps more people need to remember the adage, “A gentleman (or gentle person) is

addiction to outrage brings up

someone who is never deliberately

many refences; there are even

rude.” The right to tell someone

books on the subject of breaking

what you think should never

the addiction to outrage. It

be removed, but courtesy and

appears frequent bursts of outrage

politeness should always be

become addictive and, like most

employed, even when pointing

addictions, leads to a release of

out errors.

endorphins that make the person

Other than the issues above,

feel good. The more they vent the

the student critiques are good.

better they feel. Security offers just

It appears most stayed awake

another target-rich environment.

most of the time and if any did

Certainly, written and verbal reports of security issues must be

fall asleep, I would not have been offended. n

objective, professional, impersonal and polite. They must also be

Don Williams CPP RSecP

factual and honest. If people take

ASecM is a recognised thought

offence, we can ask them to argue

leader in security, emergency

the facts, not the emotion. Here

management and related

is the rub – offence is emotive. If

disciplines. His book, Bomb Safety

the concern was over the data or

and Security: the Manager’s Guide,

analysis, it can be discussed. If

is available from Amazon. Don

someone claims to be offended or

can be contacted at donwilliams@

believes others might be offended,

internode.on.net

30 // SECURITY SOLUTIONS

“All of this leads me to reflect with some interest upon the notion that there appears to be a growing section of society who is not only easily offended, but almost eager to find offence at the most inconsequential and innocuous things.”

securitysolutionsmagazine.com



OPERATIONS

SCENARIO TRAINING

REALITY TRAINING FOR OPERATIONAL COMPETENCY BY RICHARD KAY

32 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Much of the training for the development of operational

between tactical response options. A key issue with scenario

the absence of proper training,

name, which can cause confusion

agencies can spend time and

for participants.

skills is done in clinical training

training is that it looks easy.

money defending lawsuits, paying

environments to assure safety

The current training paradigm

workplace compensation claims,

Primary Categories

and reduce agency liability from

often uses brief training sessions

or absorbing lost man-hours from

Conventional ammunition

training injuries. This philosophy

with high participant/instructor

injuries. Properly structured

(CA) is commonly referred to as

is facility driven (what can be

ratios. Agencies buy gear, grab

training reduces these costs

live ammunition and designed

done safely), fractured (classroom

a couple of role players, throw

by avoiding the situations that

for conventional purposes –

thinking, gym fighting, range

some participants into a few

cause them. Agencies adopting

destroying things in a relatively

shooting) and in static/linear

loosely structured situations and

comprehensive scenario training

reliable fashion.

training environments (shooting

see what they do. Agencies often

experience a decline in officer

in a single direction).

fail to acknowledge they might

injuries as well as a reduction

(LTA) is specially designed to work

Lethal training ammunition

Training is structured so

benefit from learning about

in complaints and lawsuits

in unmodified weapons and has

participants are told what to do

the complexities of scenario

from citizens. If the program

muzzle energies similar to or

rather than taught how to think,

training. Common reasons for this

trains officers to respond more

greater than CA. Many products

and stems from getting personnel

resistance include the following.

effectively and avoids unnecessary

in this category were designed to

through training for qualification

Liability considerations:

costs from workplace errors, the

make a more affordable product

to a mandated standard. This

if someone is hurt during

value per dollar spent for scenario

for training purposes by reducing

does little to advance individual

training, the question is whether

training against existing training

logistical requirements or to

skills that training is designed

instructors were reasonably

programs pays for itself.

permit live-fire training in settings

to perfect. Operational safety

trained in the use of equipment

becomes a secondary concern to

Safety considerations:

that might be incompatible with

and methodology, but there is

hurting people during scenario

CA. These designs are capable of

training safety, but they function

no necessity to get that training

training to the extent that it

wounding like CA, and include

at direct odds with each other

directly from the manufacturer,

causes program termination

frangible ammunition.

given that training behaviours

as long as it comes from an

indicates training was being

are counterproductive to safety

organisation providing adequate

done incorrectly. If instructors

ammunition (ERIA) is designed

in operations. Procedures that

training in safe product use.

are educated to set training

as a compliance option for suspect

up properly and allocate the

control, and is often placed on the

reduce training hazards condition

Instructor expectations:

Extended range impact

behaviours that might prove

instructors often attend a course

necessary resources, most

force model at the level of impact

dangerous in the real world. In the

because they are sent by their

injuries vanish, along with the

weapons since it is essentially a

absence of a conditioned effective

agency for liability reasons, with

liability statistics.

launched impact weapon, primarily

response, participants often

no expectations of gaining useful

respond with actions that they

information. Proper instructor

know violate operational safety

configured as a pyrotechnic cartridge for shotguns and grenade

certification is not product

Projectile-Based Training

principles; behaviours that can

specific, but covers training

Live target engagement with

There are various training and

only be discovered experientially.

concepts to make better use of

training projectiles in scenario

operational ERIA products where

whichever technologies are used,

training can be hazardous. The

the projectiles are powered by

effective, it should be performance

including training ammunition

unintentional introduction of live

high-pressure air. ERIA requires

objective driven, 3-dimensional

and training device usage,

weapons and ammunition has

caution since different air pressures

and involve experiential learning.

safety rules and standards, and

led to accidents, and participants

and projectile configurations can be

In scenarios, the participant

protective equipment issues,

have received both physical

loaded into various cartridge bases,

must have access to all available

as well as theory components

and psychological trauma

and using the wrong air pressure/

options. Although it seems like an

that spend time on key scenario

in training exercises from

projectile combination in live target

oversimplification, in the response

training issues. They need to

projectile strikes with/without

engagement training is hazardous.

model, if a participant chooses to

learn how to run safe training

protective gear. However, there

engage the subject, there are only

and develop effective scenarios

are positives of using training

ammunition (USTA) is the most

three responses – verbalisation,

designed to directly connect

ammunition properly.

hazardous category as many of

intermediate force and lethal

agency response options with

force. A common mistake is to

officer actions, while reducing

categories and three sub-

look like inert rounds or blanks,

equip participants with only

injuries and liability exposure.

categories of training

and it is difficult to identify all

the response option required to

Instructors learn the how, what

ammunition. Some cartridges

the various cartridges and their

solve the scenario, but this does

and why of scenario training,

bridge several sub-categories,

design purposes. It is important

not provide the instructor an

making effective use of resources

so safe use is dependent on

to simplify the ability to recognise

opportunity to test a participant’s

and technologies to make teaching

educated users. In training, it

the few types present in the

judgement or to observe his ability

points and complete objectives.

is safer to refer to a cartridge

training arsenal and ensure they

by the category than by brand

are properly labelled, accessible

For scenario training to be

to shift mentally and mechanically

securitysolutionsmagazine.com

Budget considerations: in

There are eight primary

launchers (bean bags and so on).

Unhardened structure target

these potentially lethal cartridges

SECURITY SOLUTIONS // 33


OPERATIONS

only to those who know the

potential to be hazardous since

and this increases the hazard

drills, or render weapons safe

specific design purposes and

participants point firearms

potential. Blanks have blown

for training. Mixing CA and ITA

carefully controlled during use.

with the intention of firing

barrel plugs out of guns that have

allows instructors to observe

Some USTA cartridges require

projectiles at others for training

been incorrectly converted, or

participants for basic firearm

weapon modification to ensure

purposes, and participants have

where the blanks were too hot for

handling skill deficiencies, most

proper cycling and failure to use

been injured or killed during

the firing device. Blanks are useful

particularly recoil anticipation

a conversion kit when necessary

exercises where incorrect

for training, but strict precautions

and flinching. Some ITA are

could result in weapon damage

ammunition was mistakenly used

must be present. It is important

useful in rendering a firearm

and possible injury.

in training exercises. If a device

to know if the blank has wadding

temporarily incapable of

or ammunition is not specifically

that expels during firing, whether

chambering CA by blocking the

ammunition (NLTA) includes

designed for use in scenario

the sound pressure level requires

chamber. Choose the correct type

any projectile system designed

training involving live target

hearing protection, the type of

of ITA for this purpose, since

for live target engagement under

engagement, it is dangerous to use

blank-firing weapon used and the

many still have a rim that makes

controlled conditions. With

it in such an environment.

safe distance to engage a person

extracting the cartridge as simple

with blanks.

as manually working the action of

Non-lethal training

proper training protocol and

Blank training ammunition

protective equipment, this type of

(BTA) has a casing, primer and

training affords highly realistic

powder charge that is usually

(ITA) denotes ammunition

effects through the interaction

greater than what is used in

incapable of discharging, for

ammunition (UGA) includes

of participants and role players.

conventional ammunition,

participants to perform dry

ammunition of unknown design

Live target engagement has the

as users prefer a loud report,

practice, perform malfunction

intent. Experienced shooters often

34 // SECURITY SOLUTIONS

Inert training ammunition

the weapon. Unknown generic

securitysolutionsmagazine.com


have assorted ammunition, which

designed to limit projectile

involves high costs for air

ranges are now choosing to

has a tendency of passing between

travel distance, whilst others

equipment, bullet traps and

use non-toxic FA due to the

people inside an organisation.

limit penetration characteristics

other environmental equipment.

elimination of heavy metal

Obscure ammunition should be

to reduce structural damage.

NTA results in a substantial

contamination. Other benefits of

kept separate and secure, since

RRA have design features that

drop in range maintenance, and

FA include engaging steel targets

its design purpose is not usually

permit realistic training against

additional costs associated with

at close range to realistically

discernible simply by looking at a

conventional targets while

NTA are easily offset by reduced

replicate the conditions of

cartridge and it might mistakenly

reducing hazards of CA, but

construction and maintenance

gunfights, shoot houses can be

be used for something for which it

must be used under controlled

costs and improved health

built less expensively due to the

was never intended.

conditions and under the

for users.

reduced penetration effects, and

Before using any type of ammunition in training, be certain to read all warnings and

supervision of someone trained in the specific cartridge. Non-toxic ammunition

Frangible ammunition

conventional indoor ranges can

(FA) relates to the break-up

be built at a fraction of the cost

characteristics of a projectile

due to elimination of expensive

instructions on the ammunition

(NTA) is made of non-toxic

on impact. This term has led

air filtration systems and annual

packaging and be certain that

substances. Also known

to some confusion since the

clean-up costs. FA does not retain

the ammunition contained in

as ‘green’ ammunition,

ammunition industry has used

rifling marks, which makes it

the box is actually that which

the designation refers to

frangible to denote different

difficult to match a projectile to

is described on the box. Have

environmental considerations,

projectile types with varying

a weapon. Misperceptions about

a thorough understanding of

not lethality characteristics.

degrees of fragmentation, but not

FA include that FA will easily

what the ammunition being

Popular materials include blends

all frangible projectiles pulverise

penetrate a ballistic vest (false),

used was designed for, and do

of copper, nylon, tungsten

into fine powder. FA reduces

FA will explode inside the body

not use it for something else. Do

and zinc, with manufacturers

the danger if an intended target

(false) and FA does not show up

not use it for scenario training

moving toward lead-free or

is missed or over-penetration

on X-Ray (false).

without absolutely knowing that

non-toxic primers. Some bullet

occurs. Most conventional

it is specifically designed for

designs are non-toxic but

frangible projectiles break up

continue by looking at other

that purpose.

not frangible, behaving like

after striking a hard surface,

technologies available to help

conventional bullets to not

some with as little as 5o of

Sub-Categories

create reality based training

break up on impact, so caution

deflection, significantly reducing

to improve operational based

The sub-categories of ammunition

must be observed concerning

the hazard to bystanders. Other

competency for security. n

describe design parameters

splash-back and ricochet just as

potential uses include structures

and downrange effect. Each

with CA. If this is not a concern,

containing sensitive equipment,

ammunition type only belongs to

these non-toxic conventional

ships, military installations,

internationally certified tactical

one primary category, but may

bullets can often solve the

airplanes or crowded

instructor-trainer, Director

fall into several sub-categories.

problems of environmental

environments. Many agencies

and Senior Trainer of Modern

contamination without the

choose FA to reduce splash-back/

Combatives, a provider of

(RRA) is a broad sub-category

higher costs associated with

ricochet, over-penetration and

operational safety training for

and often easily confused.

frangible ammunition. Building

lead contamination. Due to

the public safety sector. For

Many USTA cartridges fall into

a range facility for CA or

the lead-free makeup of most

more information, visit www.

this category. Some RRA are

renovating an existing facility

frangible projectiles, many

moderncombatives.com.au

Reduced range ammunition

In the next issue, we will

Richard Kay is an

Before using any type of ammunition in training, be certain to read all warnings and instructions on the ammunition packaging and be certain that the ammunition contained in the box is actually that which is described on the box.

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 35


FEATURE

DEFENDING AGAINST ELECTORAL INTERFERENCE

36 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


BY ELIZABETH BODINE-BARON

In January 2017, the US intelligence community released a public report detailing a Russian influence campaign, ordered by Russian President Vladimir Putin, “aimed at the US presidential election”. In May of that year, Robert Mueller began a nearly two-year investigation into the Russian influence campaign that finally concluded a few days ago. While the full report has not yet been made public, U.S. Attorney General William Barr recently released a letter summarising the primary conclusions reached by the Special Counsel’s investigation. Leaving aside the matters of collusion and obstruction, the investigation reaffirmed the intelligence community’s findings about Russian efforts to influence the 2016 election. Namely, the investigation concluded that 1) “a Russian organization, the Internet Research Agency (IRA), conduct[ed] disinformation and social media operations in the United States designed to sow social discord, eventually with the aim of interfering with the election…” and 2) “Russian government actors successfully hacked into computers and obtained emails from persons affiliated with the Clinton

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 37


FEATURE

campaign and Democratic Party

largely on protecting state and

interference,” this attack shows

of Russian influence on social

organizations, and publicly

local voting infrastructure

how little has been done in

media in the US. RAND developed

disseminated those materials

from cyberattack. But even an

democratic countries to combat

a broad framework illustrating

through various intermediaries,

unsuccessful cyberattack on

the threat of election interference

the chain of Russia influence

including WikiLeaks…” with

voting or tally technology could

and influence operations – by

operations, from Russian

the goal of using that leaked

still achieve strategic success, if

sophisticated state powers or

leadership, to Russian organs and

information to influence

it causes citizens to lose faith in

other actors.

proxies, through amplification

the election.

the electoral system and the value

Legislative efforts, such as

channels and finally to consumers.

of their votes. More importantly,

the Honest Ads Act proposed by

This framework is not necessarily

campaign leveraged an approach

such attacks require immense

members of the U.S. Congress and

specific to Russia – it could be

known as ‘active measures’ that

resources in time and effort, while

similar proposals put forward in

adapted to characterise the threat

was developed by the Soviet

influence operations are relatively

Israel and other countries, focus

posed by other actors, such as Iran

Government and refined under

cheap. Throw the hacking of a

on one part of the disinformation

or China.

Putin to control and shape the

political party and the airing of

problem, requiring the funding

information environment within

some dirty laundry into the mix

source of political ads on social

Russian state – namely, Russian

Russia. Two key tools enabled

and it is suddenly simple to cast

media to be disclosed in the same

leadership and the Kremlin.

this campaign, as described

doubt on the entire democratic

public manner as they are for

As the Intelligence Community

by the Mueller investigation:

process. Securing election

radio and television. Whether or

Assessment notes, Putin “ordered”

disinformation and cyberattacks.

infrastructure from cyberattack is

not proposals along these lines

the influence campaign in the US.

Notably, these cyberattacks did

important, but the larger problem

are a good start will be debated,

There are questions about how

not include overt attacks on

is combatting influence operations

but even if accepted they will

much Russian actors undertaking

election infrastructure (such

and disinformation in general.

likely not be enough. A single

social media activities are

piece of legislation addressing the

controlled by or coordinated

The 2016 Russian influence

as pollbooks, voting machines

The US is not alone in facing

The first step in the chain is the

and tally technology). Instead,

this threat. Australia is now in

disclosure of political ads’ funding

from the top of the Russian

Russian hackers targeted political

a similar situation. In February,

sources or attempting to secure

Government, but it seems clear

parties, searching for damaging

Prime Minister Scott Morrison

election infrastructure from

that the influence campaign would

information about candidates and

revealed that the Australian

cyberattack may be nowhere near

not have happened without a

others in the political arena.

Parliament’s computer network

enough to thwart a nation-state

high-level decision within Russia’s

was subjected to a cyberattack

determined to sow disinformation

Government. Thus, shaping

U.S. Department of Homeland

by a “sophisticated state actor”,

and influence citizens.

Moscow’s decision making offers

Security and other organisations

compromising both the ruling

stepped up their efforts to secure

Liberal-National coalition

non-partisan RAND Corporation,

the election system in time for

parties and the opposition Labor

researchers analysed different

The diverse organisations

the 2018 midterm elections.

party. Though he said, “There

approaches and policy options

that actually implement Russia’s

However, their efforts focused

was no evidence of electoral

to respond to the specific threat

influence campaign compose the

In response to this threat, the

38 // SECURITY SOLUTIONS

In a recent report by the

a key approach to addressing Russian disinformation efforts.

securitysolutionsmagazine.com


NO SINGLE APPROACH IS LIKELY TO BE COMPLETELY EFFECTIVE. RATHER, A COMPREHENSIVE AND COMPLEMENTARY SUITE OF STRATEGIES COULD ADDRESS ALL THE LINKS IN THE DISINFORMATION CHAIN. second, and most complicated,

of whom may be based in the

disinformation, but, in the end,

link in the disinformation chain.

targeted country.

it is up to the user to believe or

These entities operate with

The third link in the chain

not believe a particular piece

intended to shape Moscow’s decision making. • Continuously assess the cost and impact of

varying levels of independence

comprises the various channels

from the Russian Government and

(actors and platforms) through

include actors who are part of the

which Russian disinformation is

to be completely effective.

Russian state, such as the Main

intentionally or unintentionally

Rather, a comprehensive and

Intelligence Unit (GRU) or Sputnik

amplified. Social media platforms,

complementary suite of strategies

For these approaches and

online media to entities such as

such as Facebook and Twitter,

could address all the links in the

associated policies to have the

the RT news network, which are

play a key amplification role

disinformation chain. Weighing

best chance of producing the

not formally part of the Russian

through their policies, algorithms

the advantages and disadvantages

desired effect, the many entities

state but are transparently

and advertising – a role that

of solutions that have been

that would need to consider

supported by it. Also included

can be manipulated, subverted,

proposed by government

implementing and supporting

are entities that knowingly act on

or taken advantage of by

organisations, academia and

them include government and

behalf of the Russian Government,

Russian actors trying to spread

think tanks, several potential

non-governmental organisations,

but whose connections to the

disinformation. The accounts

approaches emerge that cut across

large and small social media

state are concealed, such as the

that are active on these channels

multiple links:

companies, media outlets and

Internet Research Agency. A

are also particularly important;

• Establish clear and enforceable

academia. Without cooperation

potential fourth group to add to

many play a role in amplifying

norms for acceptable

and coordination, efforts will

this link in the chain are entities

disinformation, whether they

behaviour for states and media

likely remain piecemeal and

that act to further the purposes of

are real or fake, bots, trolls or

entities’ behaviour on social

inadequate, and the US will

the Russian Government but who

regular users.

media platforms.

likely remain vulnerable to

are not directly connected to the

The final link in the chain

of content. No single approach is likely

• Coordinate government

proposed solutions, relative to the effectiveness of Russia’s activities.

influence campaigns by Russia

Russian state. This group includes

is the set of targets for a given

activities, particularly

and other adversaries. Though

witting and unwitting participants

influence campaign. In the 2016

those between judicial and

their adversaries may differ, the

who are motivated to spread

presidential election, the Russian

legislative organisations.

threat posed to Australia and

messages convenient to Russia’s

campaign targeted US citizens.

• Institute a formal organisation

goals for their own reasons –

Other campaigns could target

for information sharing that

same, and similar cooperative

including those simply holding

government leaders, decision

includes key players from the

approaches may be needed. n

views the Russian Government

makers and citizens of other

U.S. Government and private

seeks to promote – and therefore

countries. This link also overlaps

social media companies.

provide an additional channel

with the amplification channels,

• Increase the transparency of

to achieve Russian goals, such as

as consumers contribute to the

social media platform policies

associate director of the Force

creating or expanding divisions

spread of disinformation by

and algorithms for detecting

Modernization and Employment

in American society. Patriotic

posting, retweeting or otherwise

and removing disinformation

Program in Project AIR FORCE,

Russian hackers and networks

promoting such content. The

and malicious behaviour.

and co-directs the RAND Center

run by criminal oligarchs are

consumer role is particularly

also included in this group.

important, as any effort to lessen

academia to develop better

System Science at the non-profit,

Different approaches to address

the impact of disinformation

tools for identifying and

non-partisan RAND Corporation.

the influence of the diverse groups

at this point in the chain must

attributing disinformation on

She is the lead author on the

are required, given the legal status

address human nature – changing

social media.

recently published RAND report

and position of these actors, some

algorithms or platforms may

of whom are in Russia and others

reduce the visibility of some

securitysolutionsmagazine.com

• Encourage and fund

• Prioritise defensive activities over punishments

other democratic countries is the

Elizabeth Bodine-Baron is an information scientist,

for Applied Network Analysis and

Countering Russian Social Media Influence.

SECURITY SOLUTIONS // 39


BUSINESS

SUCCESSION PLANNING

A PRACTICAL APPROACH BY MICHAEL MCGRATH

40 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


“Life is what happens to you while

forecast in 40 years and don’t

1. Develop a strategy and plan

team in place can be a great

you’re busy making other plans,”

intend to start now.”

for your business.

way of providing comfort to an

A business with a clear purpose

acquirer that the business is not

said John Lennon in the lyrics of

The reality is that time marches

Beautiful Boy released in 1980.

on with relentless persistence.

and direction is fundamental to

a one-man (or one-woman) show.

Not his own line, it is apparently

Developing some plans which

becoming valuable. This work

Introducing clear expectations

attributed to an American writer

flexibly take into account the

is not easy and getting some

and good accountability within

and journalist called Allen

reality that you will need to retire,

outside input can be useful in

the leadership team is essential

Saunders. In any event, the

or at least move to a different

developing the right strategy and

to operating sustainably. Having

sentiment rings true for many

sort of role as you move into the

plan. Once completed, this work

a carefully selected and balanced

of us as we survey the scene and

twilight years, makes a lot of sense,

can normally be reduced to a

team with the requisite skills

wonder how we got to our current

and the earlier the better. Thinking

one-page summary to help with

adds significant value to an

point in life.

of succession only in terms of

communication and execution.

enterprise. Individuals with

retirement is a big mistake. Our

The clarity that comes from

previous experience within a

accordance with our planning. So,

businesses and our lives move

such an exercise can be very

large corporate environment

is planning a waste of time? If you

in cycles and thinking about

powerful. Strategic acquirers and

are not always appropriate in a

heard many of the discussions

succession as a much broader

professional business buyers love

fast-moving small- to medium-

we have with business owners

principle and being flexible and

it when a business has a clear

sized enterprise. Ensuring

when we discuss the subject of

creative can be very helpful.

vision, strategy and plan. Even if

candidates have a significant

you do not intend to sell, this work

body of experience in a similarly

is still vital.

sized organisation helps to

Things rarely work out in

a forecast or business plan, you

Being succession ready is to be

might think so. We often hear,

ready for transition or sale. You

“You can’t possibly forecast our

will exit your business one day.

business” or “I’ve never done a

This is just an irrefutable fact.

an acquirer is simply buying

the wrong person. At the very

Starting to consider succession

the future. Make sure you

least, the organisational design

early is never a mistake. You

understand yours.

must make sense, with clear roles

When all is said and done,

have three broad options when

and responsibilities.

considering succession:

2. Know your numbers.

1. Sell the business to a trade

It is a fundamental requirement

and wish to retain ownership and

player or third party.

to know and understand your

evolve to having the business run

2. Place the business under

numbers: past, current and by

by management, then identifying

management and remain the

way of a forecast at least the

that individual early from within

owner or part owner (and

next 12 months and, ideally, the

or allowing sufficient time to hire

possibly transition out of

next three years. Management

the right person as managing

ownership to management or

accounts should be completed

director or general manager is

other over time, often called a

monthly and, wherever possible,

essential. Whilst this will require

management buy-out (MBO) or

should be accurate and produced

you eventually giving up day-to-

management buy-in (MBI) or a

in a timely manner. These should

day control, you can retain a very

combination of the two).

include adjustments for pre-

effective level of control through

payments and accruals – the

having board meetings and

you no longer wish to operate

profit for the period under review

perhaps engaging non-executive

the business.

should reflect what has actually

input. Effectively, you can plan

So, what should you do as you

happened. The balance sheet

to become the non-executive

contemplate succession for

should balance and be up to date

chairperson and eventually limit

your business? Preparing a

(monthly).

your input to the monthly board

3. Close the business down once

If you are the owner–operator

flexible plan makes sense, and

Do you have a simple finance

the requirements in the earlier

snapshot available to you by the

advice, guidance and support.

stages do not vary whether you

15th of the month outlining your

(More on this in point 5 below.)

are planning to sell to a third

previous month’s performance,

party or are planning to put the

with key insights? This is much

4. Analyse and mitigate

business under management and

easier to accomplish than

your risks.

retain some sort of ownership.

many believe.

You want to present your business

Many of the following suggestions

securitysolutionsmagazine.com

mitigate the risk of introducing

meeting where you provide

as a stable enterprise to potential

apply in all circumstances – after

3. Develop a good

acquirers. Being across and

all, running the business as

leadership team.

mitigating risks such as revenue

professionally as possible at each

Having a competent and

concentration, obsolete stock,

stage just makes sense.

appropriately sized management

litigation, doubtful debt and so on

SECURITY SOLUTIONS // 41


BUSINESS

payment has been made. Until that point, it is all ‘ifs, buts and

Preparing a flexible plan makes sense, and the requirements in the earlier stages do not vary whether you are planning to sell to a third party or are planning to put the business under management and retain some sort of ownership.

maybes’, so work on a need-toknow basis 9. Separate personal assets from the business. Good financial management is essential and presenting accounts that are timely, accurate and easy to follow speaks volumes. Even if non-business assets are not in a separate legal entity, at least split them out for the purpose of presenting your management accounts. Confusing accounts that do not make sense, with

is essential to the defence of your

be a very cost-effective way of

7. Be proactive.

non-core items buried, make

earnings. Buyers will not expect a

adding significant management

If you have decided to sell, then

buyers nervous.

completely trouble-free business

horsepower. Additionally, the

be proactive. Most businesses

(with the exception of private

independence can add a degree

will not be so fortunate as to get

10. Seek independent, expert

equity firms, who frequently

of objectivity not always possible

a knock on the door, but even if

advisors for support.

seem to want just that), but they

within the management team itself.

you do, you want to know that

Complement your deep

will expect management to be

Operating a board is a statement

you are getting the best deal. The

understanding of the business

fully across the risks and, where

of intent and signals strategic and

only way to be certain of this

with independent, objective

necessary, have them reflected in

professional commitment.

is to proactively explore your

experts skilled in negotiation

options in the marketplace. This

and deal doing. You want to have

and have a sensible and cogent

leadership, accountability and

needs to be done intelligently

the time to focus on running

plan for each issue going forward.

governance to help achieve

and discreetly. Conducting an

the business as professionally

There is no such thing as the

the objectives of the business.

exploratory exercise while

as possible during the critical

perfect business, but ignorance of

It can also help to facilitate an

maintaining anonymity puts you

time when buyers are being

issues is not a defence.

owner stepping back from daily

in the powerful position of having

objectively identified as qualified

management to fully or partially

real and current intelligence from

buyers and start to evaluate the

exit the business without selling.

the market, which then allows you

business. A good advisor will

to objectively assess the appetite

add a lot of value and their fees

the numbers by way of provisions

This should also be essential even if you are not planning to sell; it just makes sense to mitigate

The board provides strategic

Finally, is your corporate

your own risks as an owner at

structure efficient and will it

of current acquirers for a business

should be returned several times

all times.

optimise your position in the event

such as yours. The exercise will

over. Check the track record

of a significant liquidity event like

also alert you to the likely real-

of advisors and make sure you

5. Optimise your

a sale? Too many businesses are

world valuation, which can inform

feel they understand you, your

corporate structure.

poorly structured in this regard.

future strategy.

business and the market.

Your business is more valuable to

Ask your tax accountants how

an acquirer if it is already running

you stand.

8. Be discrete about

something for the first time? n

successfully and profitably

When was the last time you did your intentions. Michael McGrath is the

without heavy involvement

6. Formalise agreements with

You are not for sale; you are

from you.

staff, suppliers and customers.

simply exploring your options.

CEO of Oasis M&A, a corporate

Where possible, make sure that

Protect your identity and

advisory business based in Sydney,

a board in place. All of the most

agreements are current and valid.

maintain anonymity while

Australia. Oasis has managed over

successful listed companies in

It is not necessarily a deal breaker

seeking acquirers to avoid

500 transactions over the last 35

the world have board meetings,

if agreements are not current and

destabilising and thus potentially

years, both in Australia and in the

as do many successful private

sometimes perhaps only verbal,

devaluing your business. We

UK. Oasis also assists companies

companies. Why not you?

but being across the status of all

recommend against producing

in the creation of value in their

Creating a board and adding a

agreements and their importance

an Information Memorandum

business before an exit. To talk

non-executive member who does

to the business is just good

as part of the marketing process.

to Michael and his team at Oasis,

not work day to day, irrespective

management and ‘money tends to

Nothing is finalised until a

contact him at michael@oasisma.

of the size of your business, can

follow management’.

contract has been signed and

com.au or on 02 8599 3442

We like all businesses to have

42 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Pedestrian and Vehicular Access Control Automation

FAAC Simply Automatic Modular automation solutions

HUB Parking Technology Smart and flexible parking solutions

Magnetic Automation Pioneering access control solutions

Experts in Access | Discover the FAAC Group range of products at J14 | www.faacgroup.com


COVER STORY

WHAT DRIVES MASS SHOOTING?

44 // SECURITY SOLUTIONS securitysolutionsmagazine.com


?

In the wake of tragic incidents like

Some of those factors are about

I think we can safely look

or die. And for those who seek

the mass shooting in New Zealand

the perpetrator, him or herself,

back at Julian Knight, post Hoddle

suicide by police. Which is the

last month, the first question

and the context in which they

Street, for readers who remember

thing sadly.

many people ask is “why”? We

have committed the offence. And

that far back. You have much of

struggle to comprehend what

the second part of the discussion

the debate about Julian Knight's

incident in New Zealand allegedly

drives people to commit such

would, and should rightly be

behaviour centred on whether

involving Brendan Terrant.

terrible acts and, as security

about, what are the things in

he was insane or whether, in

When one looks at the amount of

professionals, perhaps more

our world or the changes in our

fact, he was simply bad. History

planning that went into it, from

so than the average member of

society that give rise to people who

now suggests that the long-term

the live streaming, to the collection

the public, we find ourselves

may, will, fit into either some of

assessments of Julian Knight

of weapons, to the actual layout of

confronted with the realities of

the historically relevant categories

suggested the latter.

where, when and how – that level

the situation. What if that had

and or potentially fit into newer

been my workplace? What if

SSM: Coming back to the

That it was never proven

of planning and execution doesn’t

types of offending patterns, which

and he was unsuccessful in any

necessarily fit with our traditional

that had been the company I

are products of modern life. So, I

attempt to use a mental health –

preconceptions of someone who

work for? What if that had been

think in short, some of the things

based defence. So, there we have

is severely mentally unhinged.

one of our staff responsible for

that we’re going to chat about may

someone who, as a result of their

Therefore, would it not be

such an incident? Could I predict

not have necessarily been around

development, the complexities of

reasonable to conclude that there

it? Would I see it coming? How

forever, because some of these

their life, chose to take their anger

is a scale or spectrum of mental

could I prevent it? These are

patterns are changing.

out on society to make a sadistic,

illness with one end being mildly

violent point. And that’s the long

disturbed, as in ‘I occasionally

and the short of it.

think ants are out to get me’

all valid questions. To try and

So, perhaps an interesting

better understand what drives

place to start is to in fact think

this type of behaviour, with a

about when we historically look

view to possibly addressing these

at events of this nature, there are

look at someone like a Frank

questions and others, we sat down

really often only a small number

Vitkovic, who was the perpetrator

with Simon Brown-Greaves.

of possible explanations. The first

in the Queen Street shootings

And I think this takes us to a

If, on the other hand, we

through to believing that you’re a teapot orbiting Mars? Simon: Absolutely right.

one clearly is in the realms of some

in Melbourne in, I think

very difficult social issue about

Psychology Unit within Victoria

form of serious mental health

1987, around the same time

the changing phase of what

Police, Simon has extensive

condition. And I want to, obviously,

interestingly, as the Julian Knight

constitutes a serious mental health

experience dealing with mass

put around my comments that

matter, then Vitkovic had a history

issue. And you’re absolutely right

shooting perpetrators and victims

there is by no means a view

of serious mental health issues.

that you can suffer, for example,

and has a unique view on what

that suffering a mental health

He was, at the time, in the care

a paranoid or serious paranoid

drives these types of incidents.

condition is necessarily correlated

of mental health professionals.

disorder, but be intellectually

He was kind enough to take some

with violence.

And the coronial inquiry and the

quite functional. And the only

reports published after his death,

manifestation for most people

As a former Manager of the

time to try and help us better

However, the flip side of that is

understand how and why these

that a substantial number of those

and I’m talking here about the

who sadly have that particular

things occur.

events are committed by people

proper assessment of his mental

disorder might be that they’re

who are in the throes of a very

health, indicated it was highly

paranoid and irrationally so.

your time. Perhaps we could

serious mental health condition.

unlikely that he suffered from a

That does not necessarily mean

begin with the most obvious

Typically, that will be some sort

psychotic illness.

that they will go out and commit

question – what drives this kind

of psychotic breakdown where

of behaviour? It cannot just be

they’ve lost touch with reality and

at that event in Queen Street, I

purely hate, because there are a

the behaviour that is exhibited in

can say from firsthand experience

lot of angry people in the world

the major event is quite insane,

that many of the patterns of his

interesting possibility that

who do not take up arms.

and quite disturbed, and the

behaviour and the way in which

there are categories of severely

flavour of it and the way in which

he went about that event were

dysfunctional people who may not

type of behaviour, and let’s speak

the act is carried out is consistent

chaotic, disorganised, completely

be, as you say, orbiting Mars and

more generally about people who

with someone who is completely

irrational, and ended of course as

completely psychotic, but may still

commit very serious, major and

out of touch with reality.

we now know, with him jumping

be capable of rational planned

out of the building.

and considered act. This presents

SSM: Simon, thank you for

Simon: The driver of this

cataclysmic, destructive acts on

Now, if you look back over

As someone who was present

And I’ll come back to that issue

an act like Terrant is alleged to have committed. So, we have this very

society is, as you would expect, an

history, in many of these cases,

incredibly complex phenomena.

even in Australia, the question as

later about the difference between

problem. Now historically, we

So, there are probably four or

to whether or not the perpetrator

offenders who are,

sometimes refer to those people

five areas that it would be smart

was in fact mentally ill or not

A. Happy to die

as, personality disordered, and of

to talk about as we think about

arises in almost every single case

B. Seeking to die

course that presents no possibility

that complexity.

when it comes to trial.

C. Don’t care whether they live

of a defence under mental health

us as a society with a significant

securitysolutionsmagazine.comSECURITY SOLUTIONS // 45


COVER STORY

legislation, pretty much anywhere

where Terrant fits into this

experts, to say, well clearly it’s a

about someone who has been

in the world.

spectrum as time progresses, but

mad act, but I don’t think you have

‘radicalized’ and who belongs to

to your point, is he capable of

to be mad to commit mad acts.

a social group or is connected to

a psychopath or antisocial

carrying out a planned, long-term

So, another category that might

a network of people who share

personality disorder and that’s

act and still being technically

put this in context is the growing

their extreme views. One of the

your affliction, there’s no defence,

insane? Yes, that is possible.

prevalence of people who commit

complexities in these cases is that,

these acts, who on some level

in our modern, always connected

In other words, if you’re

you haven’t lost control of your

SSM: Based on that premise,

capacity to form an intent. And I

it is reasonable to expect some

believe that they are at war. So,

world, it’s so much easier, to find

think we’re increasingly seeing

people might be tempted to

the justification in their mind is

and make contact with groups

people who are on that borderline

believe that anyone who engages

neither a mental health condition

of people who have perverse or

between having some completely

in a terrorist act that involves

nor insanity, but still leads them to

almost delusional views of the

perverse and irrational political

the taking of multiple innocent

commit acts that, with our frame

world which in turn provides the

ideology that in some way has

lives, is on some level mentally

of reference, would be described

person searching with a sense of

become justified in their own

unbalanced. Is this the case?

as mad.

belonging, a sense of participation

mind, versus someone who is

Simon: I think this is a really

Now, my inkling is we may

and a sense of brotherhood. Sadly,

actually suffering from a paranoid

complex issue and I think many

well be dealing with a case

while the views of these extreme

disorder. Now we will find out

people would like me, and other

of that nature when talking

groups are vile to you or I, within

46 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


written about the alleged in the

wider group that we’re seeing

point where it becomes, for a

Christchurch shootings, it’s been

emerge across the world in the

small number of these people, a

reported that he travelled from

last decade on all sides of the

prevailing and overarching way of

country to country undertaking

religious and racial divide. If that

seeing the world.

training and meeting with all

is the case, what’s the pattern? Can

sorts of different people, which

we predict certain acts based on a

people then become at risk if they

might be consistent with someone

person’s behaviour?

are a little bit psychologically

Now a small number of those

Simon: This is probably the

dysfunctional. For example,

$64 million question. In short, the

if I don’t have the same sort

answer is no, not in all cases. It

of constraints that most right

description and I think that paints

would be nice if it were that easy

thinking people have, such as

a picture of an increasing number

but this is a highly complex issue.

exhibiting a lack of empathy

of those types of offenders. People

Sometimes we can spot problems

concern for others, a lack of family

are fond of calling them lone

and sometimes we cannot.

connections, I don’t find violence

looking for a place or people with whom he felt he could belong. Simon: I think it’s a great

wolfs. I’m not sure that these

In the New Zealand case, let’s

as abhorrent as others might,

are lone wolves. I think there

say for argument’s sake, that

or I lack a pro social religious

are people that are increasingly

the alleged gun man became

framework, which can actually be

able to find a social group and a

disaffected or damaged through

quite protective, then I might be

network, and it’s not too much of a

whatever pathway that we may

one of the people more susceptible

stretch to believe that the massive

subsequently discover. Whether

to this radicalization process.

changes in access to subterranean

it’s family background, whether

social media environments creates

it’s school, whether it’s some part

organisations and people who

a hotbed for people to find a group

of his life that brought him into

prey upon and seek out those

of people that previously without

contact with people who shared a

vulnerable people.

that social media, we would never

sense of isolation and oppression.

have found.

In those circumstances, there is

is it reasonable to assume that

Unfortunately, there are

SSM: Given that is the case,

little doubt in my mind that early

we might see in our daily lives, a

50 years ago, wandering around,

markers are the sorts of activities,

colleague that we’ve worked with

would have been lucky to find

behaviours and connections that

or for us, who to us, for all intents

one, let alone two other people

people seek as they begin to want

and purposes, has seemed entirely

like-minded as they travelled

to find like-minded people.

normal for the duration of the

Let’s say someone like Terrant,

around the countryside because

That, we can see that quite

time we have worked with that

all they had was a phone and the

early. The real question here is

person, let’s say five years, only

standard media. Nowadays, you

how serious we are about tackling

to then find out later on a couple

can log onto a host of well-known

some of those early markers or

of years down the track that they

websites and within 30 seconds,

making it difficult for people

are the person who’s committed

you’re communicating with a

to in fact access those types of

one of these acts, and there has

bunch of people who think like

media and social media networks.

been something in the intervening

the group there is an environment

you. And that is a massive change

The markers are often about

period that has set them on

for the people involved where

in the way in which people are

isolation, what a person seeks out

this path?

the acts of public violence and

indoctrinated, the way people feel

to affirm his or her view of the

or destruction are completely

a sense of belonging.

world during which a process of

because ... and if I can respond

justifiable. They’re viewed as an

Simon: That’s a great question

decentralisation occurs. So, as

as simply and split it into two

that some people are going to

they move down that pathway,

things, if that person was the one

be more susceptible to a process

they become exposed to choices

we were chatting about who’s

the act of a terrorist, that as yet

of radicalization than others,

around activities that go along

been desensitised and is not mad,

globally we don’t refer to as an

leading to this state in which he

with ultra-violence, they are

may well be intellectually fine.

insanity per se, or carried out by

or she is prepared to go to ‘war’

taught justifications for this kind

Then you know what? They’re

people who are insane. They are

for his or her beliefs, then is it not

of behaviour and exposed to the

not going to let you know because

often carried out by people who

reasonable to believe that these

neo-fascist type of a far right

they have insight. They know that

are politically and ideologically

must be certain psychological

explanations for the kinds of

where they’re heading is not for

disposed to the view that they are

markers that would signal

social order being preached. And

general consumption. So their

committing a justifiable act of war.

potential future behaviour? If

because they’re vulnerable, they

ability to actually hide it from

that is the case, then Terrant is

become increasingly seduced

friends, family, work colleagues is

merely representative of a much

by that way of thinking to the

a marker after the fact.

act of social and political justice. That takes us of course, into

SSM: That’s interesting. If you look at what has been

securitysolutionsmagazine.com

SSM: Okay, but in accepting

SECURITY SOLUTIONS // 47


COVER STORY

So yes, you could be working right alongside someone and have no idea. If the cause, however, is a serious mental illness, the opposite is the case. There will be a history and a litany of people saying, “Oh, Simon’s not quite ... something seems not right.” Or there’ll be history of seeking treatment for, or warning signs in relation to other episodes. So it’s very real. We go back to Vitkovic. That had been building over an extended period of time. Now I want to be really careful about that. It’s not to suggest that any mental health professional or family member could have predicted what Vitkovic was going to do. They couldn’t have. However, in hindsight we look back and go, “Oh, okay.” There were a series of markers over an extended period of time that only when you look back, you’d go, “That was a mental health issue and one that was out of control.” Martin Bryant provides another example. And again, apropos of our earlier conversation, Bryant was subject to a string of mental health evaluations. The conclusion in the end of this was that he was not in fact psychotic, but rather, that he suffered a long-term damaged personality, and that was in the context of a limited intellect. So, his capacity to think clearly, to have a compassionate response, utilise the brain power to find his way out of his life circumstances, were all impaired. Regardless, the system found him guilty and he was imprisoned accordingly. So, he’s another interesting different sort of case of a dysfunctional personality who, according to the courts, he knew what he was doing. SSM: You alluded earlier to a part of the radicalization process that these people go through involving a desensitisation to

48 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


violence. I’m assuming when you

exposure to an environment

do have to create environments

say desensitisation to violence,

that is uncontrollable. And so

and cultures and organisations

that you mean something more

beyond what we anticipated

that help people be able to stand

extreme than playing violent

that we are not able to manage

up and to manage the occasional

video games or watching

what people are exposed to and

fringe or extreme behaviour.

violent movies?

I fundamentally don’t believe we

I strongly say to people, if you

do manage that. And I think it’s

tackle it in a way that pushes

clear. One of the complexities here

extremely difficult. I think the

it underground, they will not

is that I don’t think as a society

horse has bolted, so it’s having

achieve their purpose. To me, it’s

we’re very good, in the moment, at

an effect.

all about creating an environment

Simon: That isn’t entirely

working on what’s going to harm us later on.

SSM: So, when you get things

where the quality of the debate

like the alleged, in this case live

means that eventually the

streaming, walking through

rational prevails, and we’re able

understand is that 20 years ago,

the mosque, gunning people

to influence people perhaps and

when we had a discussion about

down, what happens when other

help them find connection without

whether media exposure to

vulnerable people are watching

having to go underground. n

violence would have a negative

this kind of stuff?

What I am beginning to

effect, even back then a lot of

Simon: Well, I think you

those debates were very split and

know the answer as do I. What

violence depicted in movies and

is interesting here, is that lots

games back then was quite benign

of people faced with choice of

compared to what we are exposed

watching that video would be

to now. I think the increasing

horrified, which is what we would

evidence of really good, quality

hope would be a human response.

psychological research that has

However, there will be a small

appeared over the intervening

number of people who might

years is leaning towards the belief

think “Whatever, just another

that it is doing a lot more damage

thing.” But they are not the people

than we first thought. That what

who then will go on to commit

we have done is indeed create

a similar act. However, there

for some vulnerable people. It

will also be a smaller number of

is not the case with everybody,

vulnerable people somewhere

but for some people, there is a

sitting there watching that video

risk associated with ongoing and

thinking, “Wow, that was pretty

repeated exposure to violent and

cool. What a good way to get a

graphic images. People become

bit of fame.” Unfortunately, that

desensitised. And if you become

footage will be an educational

desensitised, then you have no

video for a small number

empathy for the circumstance in

of people.

which you find yourself. For example, when I worked

SSM: So, in closing, for people in a senior security roles

for Victoria Police, we had cases of

responsible for the safety of

young offenders who, upon getting

people around them and, to some

into a knife fight, fully expected

degree, as people who will be

the person they had just stabbed

looked to by the public as experts

was going to get up and be okay.

in these matters, how might

In their reality, people don’t die

they best deal with these sorts of

from stab wounds. Not on TV, not

incidents when they are raised as

in games.

part of a discussion or debate?

SSM: Seriously? Simon: Absolutely! And there

Simon: I think that the act of a leader is to engage in the debate,

is no way we could have predicted

not to shut it down necessarily

that. So, I think that we’ve got

because we know what happens

these increasingly complex

if we shut down some of those

media. And by media I mean,

views. I think that, as a leader, we

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 49


AVIATION

WHEN GOOD IDEAS GO BAD

50 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


BY STEVE LAWSON I was working overseas recently

fast as the ‘traditional’ screening

tried holding a tray in place so

and had an interesting experience

lines. However, the job I was

that I could slide mine in front of it

that I thought worth exploring.

doing included observing the

but as the belt is powered the tray

It involved two things that I

screening point and, as I had not

does not want to stop and, together

thought would be advances in

yet used the TRS in this country, it

with the weight of trays behind it,

the screening process; the first is

seemed opportune.

the attempt proved impractical.

the use of Tray Return Systems

I joined the line and stood for

However, the main issue is that

(TRS) and the second is the remote

what seemed like an inordinate

the belt was not moving and

viewing of networked passenger

amount of time before I could

we stayed like that for ages. In

baggage X-Ray images. Why is a

get to one of the input stations.

retrospect, I should have picked

discussion about the introduction

At a TRS, a tray is taken from a

up my gear and moved to the

of these warranted at the

lower level and placed onto a shelf

traditional line, but I wanted to see

moment? Because both of these

where you fill the tray with your

what was causing the problem.

will soon be coming to an airport

property. As in most airports,

near you!

electronics go into one tray and

30 minutes to get to the end of the

Before I go any further, this

Jumping forward, it took over

your bag into another, together

X-Ray belt and I was now very late

is not intended as a criticism of a

with any coat or jumper that you

for my flight and I still had to wait

particular supplier or technology;

may be wearing (a requirement

for my property.

rather, it is an article about

in the country). Once the tray is

the issues associated with the

filled, you slide it onto a powered

the screening point? Basically, 90

introduction of new technology

roller belt that takes it into the

percent of the bags were being

or processes. Like most new

X-Ray machine for inspection.

rejected for a secondary search.

processes, they require training

I was at the third station from

So, what was the problem at

The X-Ray machines not only had

and responsive supervision and,

the X-Ray, which was on my left,

a TRS, but they were networked

when these are lacking, there are

and there were two other stations

and the X-Ray operator was in a

unintentional consequences. For

to my right. The powered belt

room away from the screening

those who have not encountered

was full so I could not slide my

point. I had been discussing that

a TRS, here is an image from

tray into a vacant space on the

concept with the airport’s security

one supplier.

powered belt; remember, like

manager less than an hour before

everyone else I have two trays.

and he was very proud of the

me: I was at a very large overseas

When the powered belt did

process. It is a good idea as it

airport for a domestic flight and

intermittently move, I found that

saves space at the screening point,

I joined what looked to be the

there was never a vacant space

can reduce staffing by having

shortest line at the screening

as the people on my right, as you

people responsible for multiple

point, not realising that it was

would expect, continually filled

machines and you reduce the

short because it was not moving as

the belt with their trays. I even

chance of an operator colluding

To describe what happened to

Source: https://www.airport-suppliers.com/supplier-press-release/airport-commercial-master-planning-airside-landside-fb-and-retail-design/

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 51


AVIATION

with another to let an accomplice’s

3. As a cost-saving idea, the

This system has a reject line,

speeding up the line. It would not

bag containing a prohibited article

images were sent to the

so when a bag is rejected it is

help those whose bags needed

through the screening point. I

checked baggage screening

automatically diverted to an

inspection, but it would help the

should have paid more attention

room and mixed with checked

inspection line and when that

10 percent of us who would not

to some of the details of the

baggage screening (CBS)

line becomes full the diverter

need an inspection, and yes, I

networking, but it was out of my

images. That would be a really

cannot push any more bags into

was confident I was in that group.

project’s scope, so the following

dumb idea; while the skill

the inspection line so it stops the

My solution would be to take the

assumptions about why there

sets are similar, the list of

whole belt, which means that

rejected bags off the reject belt

was such a high rejection rate are

prohibited items are different,

the people trying to put their

and place them on the floor until

just assumptions:

so you will almost certainly

trays onto the belt at the input

they can be searched properly.

1. Everyone using this line on this

get mistakes.

end are unable to because the

This would free the main belt

powered belt has stopped and

and I could get to my property.

day had a prohibited article in

4. There were a number of

their bag. What argues against

operators and this rejection

those people in the middle, as I

Then the supervisor needs to find

that is the lack of confiscations

rate was a statistical anomaly.

was, are not able to put their trays

out the reason for the high reject

during bag searches.

I am going to be generous and

onto the powered belt because it

rate and take action to speed

suggest this was the reason,

is continually being filled by other

up the bag inspection process.

for this machine in the remote

although I suspect point 2 is

passengers. Note to everyone, the

Not being backwards with

viewing room and that

really correct since networking

best station on a TRS is the one

giving my opinion, I did suggest

operator was incompetent!

was new and there were few

furthest away from the X-Ray.

removing bags from the belt to

Harsh? Not really. You do not

networked machines.

While I am waiting for my

get a rejection rate that high

“But,” I hear you say, “what is

property, I am a little angry and

there like a shag on a rock. In

(remembering point 1 above)

the problem with such a high

anxious that I was about to miss

retrospect, giving my opinion may

unless the operator is useless

rejection rate?” Simple, and one of

my flight. I am angry because

not have helped me, especially

and needs retraining.

those unintended consequences.

there was a simple solution to

when I said that he should take

2. There was a single operator

52 // SECURITY SOLUTIONS

the supervisor, who was standing

securitysolutionsmagazine.com


my property and put it through

should have been trained to

Leadership is a skill and people

aviation security. As a Security

the adjacent traditional machine.

use the repeater station. I can

need to be trained to supervise.

Executive with Qantas Airways,

My next frustration was that

hear someone saying, “maybe

An unintended consequence

Steve held a number of senior

each of these machines has a

they were not trained as an

– for the first time in about

management roles covering all

repeater station at the end of

X-Ray operator” but I happen

three decades in the aviation

aspects of aviation security from

the TRS and the person doing

to know that everyone on these

industry – after having arrived

policy development to airport

the bag search could view the

screening points are trained

early enough for my flight, I

operations. He was sent to New

X-Ray image and had controls to

X-Ray operators, so there was

had to grab my things from the

York immediately following

fully manipulate the image. Was

no excuse for not using the

tray and, without repacking

the 9/11 attacks to manage the

it used? Not once did I see the

equipment, even if just to see

or putting on my jacket, run

Qantas response and undertook

bag search person even glance

where the suspect item was so

through the concourse to get to

a similar role following the 2002

towards the screen; rather, each

the search could be quicker.

the gate, arriving just as they

Bali Bombings. On his return

were about to close the doors.

to Australia, he was appointed

supervisor is also in question. I

My only solace was that I must

Security Manager Freight for

what were the security issues I

did not see this person help the

have provided amusement to

the Qantas Group. Since 2007

learned from this disaster?

bag searcher, assign more staff

some other passengers who

he has been a Director of AvSec

1. The training of the X-Ray

(of which there were many),

watched this short, fat, bald

Consulting in partnership with

operator was inadequate.

take bags off the belt, cause

old guy running through the

Bill Dent, a fellow former Qantas

I was generous earlier – I

people to be directed to other

terminal with his arms full of

Security Exec. Today, Avsec

believe that there was just one

lines, give directions to staff to

electronics, an empty bag and

Consulting provides consultants

operator for this machine and

use the equipment provided or

his coat. n

from the US, NZ, Middle East,

whoever it was should have

even pick up a phone to find out

been removed and retrained.

what the issue was – and I had

bag was scrupulously searched. Now that I have had my vent,

2. The bag search operator

securitysolutionsmagazine.com

3. In this case, the training of the

plenty of time to observe him.

Israel and Europe. Steve can be Steve Lawson has over 20 years of experience in

contacted on 0404 685 103 or slawson@avsecconsulting.com.

SECURITY SOLUTIONS // 53


ACCESS CONTROL

THE TOP TRENDS FOR FACIAL RECOGNITION IN 2019 Facial biometrics – fascinating and intriguing

4. Mapping of new users

Few biometric technologies are sparking the

6. Face recognition latest hacks

imagination quite like facial recognition.

7. Towards hybridized solutions.

Equally, its arrival has prompted profound

5. Face recognition and the legal system

Let’s jump right in.

concerns and reactions. But more about that later. With artificial intelligence and the blockchain,

Biometrics are showing up in airports and border crossing points across the world,

face recognition certainly represents a significant

promising to enhance security, as well as improve

digital challenge for all companies and

and expedite air travel.

organizations - and especially governments. In this article, we cover the 7 face recognition

A Sci-fi Technology... Without The Fiction

facts and trends that are set to shape the

Since its invention in the 1970s, face recognition

landscape in 2019.

has made giant strides forward.

1. Top technologies

Today it is considered to be the most natural

2. Deep learning impact

of all biometric measurements. And for good

3. Market dynamics and dominant use-cases

reason – we recognize ourselves not by looking

54 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


example, but by looking at our

Why Facial Recognition Then?

faces. Before we go any further,

Facial biometrics continues

let’s quickly define “identification”

to be the preferred biometric

and “authentication”.

benchmark. That’s because it’s

cameras offer an interesting

easy to deploy and implement.

combination for facial

How does face

There is no physical interaction

recognition applied to large

recognition work?

required by the end user.

areas during mass events for

Biometrics are used to identify and

Moreover, face detection and face

example. According to the

authenticate a person using a set

match processes for verification/

Keesing Journal of documents

of recognizable and verifiable data

identification have become

and Identity of June 2018

unique and specific to that person.

very fast.

(issue 56), some hovering

at our fingerprints or irises, for

Identification answers the question:

UEFA Champions League Final in 2017. • Drones combined with aerial

drone systems can carry a

“Who are you?” Authentication

Facial Recognition Markets

10-kilo camera lens which

answers the question: “Are you

A study in June 2016 estimated

can identify a suspect from

really who you say you are?”.

that by 2022, the global face

a distance of 800 meters at

Here are some examples :

recognition market would

a height of 100 meters. As

In the case of facial biometrics,

generate $9.6 billion of revenue,

the drone can be connected

a 2D or 3D sensor “captures”

supported by a compound annual

to the ground via a power

a face. It then transforms it

growth rate (CAGR) of 21.3%

cable, it has unlimited power

into digital data by applying an

over the period 2016-2022. This

supply. In addition, the

algorithm, before comparing the

increases to 22.9% growth if we

communication to ground

image captured to those held in

take government administrations

control can’t be intercepted.

a database. This is a faithful and

alone, the biggest drivers of

“augmented” replica of the process

this growth. The main facial

2. Health

at work in the human brain.

recognition applications can be

Significant advances have been

grouped into three key categories.

made in this area. Thanks to deep

These automated systems can be used to identify or check the

learning and face analysis, it is

identity of individuals in just a

Top 3 Application Categories

already possible to:

few seconds based on their facial

1. Security - Law Enforcement

• track a patient’s use of

features: spacing of the eyes, bridge

This market is led by increased

of the nose, contour of the lips, ears,

activity to combat crime and

chin, etc.

terrorism, as well as economic

They can even do this

competition. The benefits of

in the middle of a crowd

facial recognition for policing are

and within dynamic and

evident: detection and prevention

unstable environments.

of crime.

medication more accurately • detect genetic diseases such as DiGeorge syndrome with a success rate of 96.6% • support pain management procedures.

Owners of the iPhone X

• Facial recognition is used when

have already been introduced

issuing identity documents,

This area is certainly the one

to facial recognition technology.

and most often combined with

where use of facial recognition

However, the Face ID biometric

other biometric technologies

was least expected. And yet

solution developed by Apple was

such as fingerprints.

quite possibly it promises the

heavily criticized in China in

• Face match is used at border

3. Marketing and Retail

most. Know Your Customer

late 2017 because of its inability

checks to compare the portrait

(KYC) is sure to be a hot topic

to differentiate between certain

on a digitized biometric

in 2019. This important trend

Chinese faces. Of course, other

passport with the holder’s face.

is being combined with the

signatures via the human body

securitysolutionsmagazine.com

Police implemented it at the

• Face biometrics can also be

latest marketing advances in

also exist: fingerprints, iris scans,

employed in police checks

voice recognition, digitization of

although its use is rigorously

veins in the palm of the hand and

controlled in Europe. In

outlets, it is now possible to

behavioral measurements. These

2016, the “man in the hat”

analyze the behavior of shoppers

are mainly used to secure online

responsible for the Brussels

and improve the customer

payments in an environment

terror attacks was identified

purchase process. How exactly?

where cybercrime has proliferated

thanks to FBI facial recognition

Like the system recently

in recent years.

software. The South Wales

designed by Facebook, sales staff

customer experience. By placing cameras in retail

SECURITY SOLUTIONS // 55


ACCESS CONTROL

are provided with customer

to use these devices in the

information taken from their

outskirts of Beijing.

In Brazil, the Superior

privacy carry severe penalties.

Electoral Court (Tribunal

Applicable from 25 May

Superior Eleitoral) is involved

2018, the GDPR supports the

social media profiles to produce

China is also setting up and

expertly customized responses.

perfecting a video surveillance

in a nationwide biometric data

principle of a harmonized

The American department store

network countrywide. 176 million

collection project. The aim is

European framework, in

Saks Fifth Avenue is already using

surveillance cameras were in use

to create a biometric database

particular protecting the right

such a system. Amazon GO stores

at the end of 2017 and 626 million

and unique ID card by 2020,

to be forgotten and the giving

are also reportedly using this type

are expected by 2020.

recording the information of 140

of consent through clear

of system.

Facial recognition will be a major topic for the 2020 Olympic

million citizens. Russia’s Central Bank has

affirmative action. • In America, the State of

How Long Before We See The

Games in Tokyo (Japan). This

been deploying a country-wide

Washington is the third US

Selfie Payment?

technology will be used to identify

biometric program since 2017

state to formally protect

Since 2017, KFC, the American

authorized persons and grant

designed to collect faces, voices,

biometric data through a new

king of fried chicken, and Chinese

them access to controlled areas

iris scans and fingerprints.

law introduced in June 2017.

retail and tech giant Alibaba, have

automatically enhancing their

been testing a face recognition

experience and safety.

payment solution in Hangzhou,

In Sydney, face recognition is

In July 2018, Bradford L. Smith, When Facial Recognition

Microsoft’s president, compared

Strengthens The Legal System

the technology to products

China. So, Minority Report could

undergoing trials at airports to

The ethical and societal challenge

like medicines that are highly

soon become the present, not

help move people through security

posed by data protection is

regulated, and he urged Congress

the future!

much faster and in a safer way.

radically affected by the use of

to study it and oversee its use.

facial recognition technologies. Do

“We live in a nation of laws, and

Mapping of New Users

In India, the Aadhaar project

While the United States currently

is the largest biometric database

these technological feats, worthy

the government needs to play

offers the largest market for face

in the world. It already provides

of science-fiction novels, genuinely

an important role in regulating

recognition opportunities, the

a unique digital identity number

threaten our freedom? And with it

facial recognition technology,”

Asia-Pacific region is seeing the

to 1.2 billion residents. UIDAI, the

our anonymity?

fastest growth in the sector. China

authority in charge, announced

• In Europe, the General Data

and India lead the field.

the launch of facial authentication

Protection Regulation (GDPR)

Puttaswamy judgment delivered

as part of their system in 2018.

provides a rigorous framework

on 27 August 2017, the Supreme

hot tech topic in China from

Face authentication is available

for these practices. Any

Court has enshrined the right

banks and airports to police.

as an add-on service in fusion

investigations into a citizen’s

to privacy in the country’s

Now authorities are expanding

mode along with one more

private life or business travel

constitution. This decision has

the ‘facial recognition sunglasses

authentication factor like

habits are out of the question

rebalanced the relationship

program’ as police are beginning

fingerprint, Iris or OTP.

and any such invasions of

between citizen and state,

Facial recognition is the new

56 // SECURITY SOLUTIONS

Mr. Smith wrote. • In India, thanks to the

securitysolutionsmagazine.com


and poses a new challenge to

the eyes permanently watching

allowed them to bypass the facial

and not from a photograph

expansion of the Aadhaar project

our movements and confuse

authentication of Windows 10

(2D), a video screen (2D) or a

in 2018. The Indian government,

face detection devices. He

Hello by printing a facial image

mask (3D), (liveness check or

however, approved the use of

has developed an algorithm

in infrared.

the country’s biometric EID

which creates special makeup

program by private entities on 28

to fool the software. However,

article dated 31 May 2018 that

(morphed portraits) of two or

February 2019.

he has chosen not to bring his

researchers from the University

more individuals have not been

Rebound effect: the legal system

product to market after realizing

of Toronto have developed

joined into a reference document

and its professions get even

how easily it could be used

an algorithm to disrupt facial

such as a passport.

stronger. As both ambassadors

by criminals.

recognition software (aka

and guardians of data protection

• In Germany, Berlin artist Adam

• Forbes announced in an

liveness detection) 2. Make sure that facial images

privacy filter). In short, a

Further Together – Towards

regulation, the post of data

Harvey has come up with a

user could apply a filter that

Hybridized Solutions

protection officer has become

similar device known as CV

modifies specific pixels in an

It is clear that the identification

necessary for businesses and a

Dazzle, and is now working on

image before putting it on

and authentication solutions of

much sought-after role.

clothing featuring patterns to

the web. These changes are

the future will borrow from all

prevent detection.

imperceptible to the human eye,

aspects of biometrics. This will

but are very confusing for facial

lead to “biometrix” or a biometric

recognition algorithms.

mix capable of guaranteeing total

The Rebels – Facial Recognition

• In late 2017, a Vietnamese

Hackers

company successfully used a

Despite this technical and legal

mask to hack the Face ID face

arsenal designed to protect data,

recognition function of Apple’s

The industry is working on

citizens and their anonymity,

iPhone X. However, the hack is

anti-spoofing mechanisms and

critical voices have still been raised.

too complicated to implement for

two topics have been specifically

Some parties are concerned and

large-scale exploitation.

identified by standardization

curtesy of Gemalto – a Thales

groups :

Company. For more information

1. Make sure the captured image

visit https://www.gemalto.com/govt/

alarmed by these developments. • In Russia, Grigory Bakunov has invented a solution to escape

• Around the same time, researchers from a German company revealed a hack that

security for all stakeholders in the

has been done from a person

ecosystem. n This article was reprinted

biometrics/facial-recognition

Recognize AND Analyze Is she an employee?

When, where did she enter? How often was she here this month?

Is she a banned person?

Premier face recognition technology for real-time video surveillance, recorded video investigation, crowd detection, and anonymous people analytics

www.cognitec.com | info@cognitec.com

Does she appear in videos recorded last week?

How old is she?


FEATURE

HOW TO CURE PRISONS’

contraband mobile phone epidemic

Why Manipulating Cellular Signals Is Not Effective BY NICK JORDAN AND MIKE HYNES

58 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


It is not an exaggeration to say

globe, and successfully detecting

coordinate murders. Here are

2018 on a turf war between

a mobile phone is a lifeline to

them before they do damage

just a few examples of the havoc

gangs over territory, money

the world. Ever since it became

is one of the biggest challenges

a mobile phone can wreak from

and contraband items such as

affordable to carry a portable

facing prison staff these days.

inside prison walls:

phone line and mini-computer

• In the United Kingdom,

drugs and mobile phones. • Contraband mobile phones

A Major Problem for Prisons

inmates have run a cocaine

have been linked to

have gone from nice to necessary

ring, arranged the murder of a

coordinated attacks on prison

to cannot live without them. From

To the average correctional

teenager as part of a feud and

officials and other illegal

senior citizens down to the tiniest

officer, a contraband weapon,

organised the killing of a gang

operations. A South Carolina

tyke, people love their phones –

or drugs, may be more

leader.

Department of Corrections

most people, anyway.

dangerous inside the prison

wherever we go, mobile phones

• In 2018, federal prosecutors

officer was shot six times

in the immediate term, but a

said two inmates used

phones? Anyone who works in

mobile phone is more nefarious

smuggled mobile phones to

a correctional facility – because

– because the damage it can

run a violent, drug-dealing

in a prison, a mobile phone is

cause reaches far beyond the

street gang from inside

in the North and South

not a fun, useful gadget: it is a

prison walls.

California’s super maximum

Carolina Departments of

security Pelican Bay State

Corrections were charged in

Prison.

a ‘sextortion’ ring, in which

So, who does not love mobile

safety issue. Contraband mobile phones

Inmates can use a mobile phone to continue drug-dealing

after a hit was put out on a contraband phone. • Fifteen prisoners housed

have long been a security

or organised crime operations,

and public safety concern for

threaten public officials and

blamed a prison riot that

phones to target US military

correctional agencies across the

intimidate witnesses, and even

killed seven inmates in April

service members.

securitysolutionsmagazine.com

• South Carolina officials

they used contraband mobile

SECURITY SOLUTIONS // 59


FEATURE

“The most important success factor for any correctional facility is its staff and the training they have undergone; all the innovative tactics and cutting-edge technologies in the world do not matter if the staff is not well versed in them.”

And it is not just a handful of

device. Inmates can record audio

reception is blocked entirely,

phones causing these issues; the

managed access, in which only

and video messages and arrange

jamming blocks all phones and

numbers paint a grim picture

communications from approved

for the phone’s movement into

SIM cards within the jammer’s

of the extent of the problem. In

devices are passed to cellular

and out of prison through staff,

reach, including those of prison

South Carolina in 2017, prison

carriers, or international mobile

visitors and other means, using

staff. Grabbing, as well as

officers found and took one

subscriber identity-catching

the phone itself or its SD/SIM card

managed access, allow staff

phone for every three inmates,

(grabbing), in which phones are

to carry data and continue to

phones to be put on unaffected

and many other agencies have

attracted to a fake network and

conduct criminal activities. The

white lists, but these methods

similarly high phone-to-inmate

can be monitored or blocked.

phone/data storage cards can also

are costly.

ratios – for example, in Oklahoma,

Others look to what is called

But there are several reasons

it is one phone for every six

that these options will not stem

prisoners. At least 15,000 mobile

the tide of illegal mobile phones

phones or SIM cards were

in prisons.

be used internally only, to pass information between inmates. Staff can disable or unplug

Jamming, grabbing and managed access offer mixed results. Here is the biggest reason

jammers, rendering them useless.

of all: these methods simply are

It is not a scenario prison officials

not the all-encompassing solution

like to envision, but corrupt

officials once hoped they were.

one for every six inmates. It is a

Manipulating Signals is not Effective

widespread epidemic.

While attacking contraband

staff can be bribed by prisoners

managed access technologies at

confiscated in English and Welsh prisons in 2017, equivalent to

correctional officers and other

In 2012, California deployed

phones through their signals

to unplug or disable jammers

18 of its 35 prisons, but halted

on the mobile phone contraband

seems like a good way to ensure

temporarily to allow the inmates

expansion of the program in 2015

problem, some correctional

even phones that make it into

to make calls or send data. When

because other technologies were

institutions have explored

prisons cannot be used, there are

it is only a sporadic occurrence,

outpacing the managed access

jamming or blocking mobile

some major flaws to that solution.

it makes it very difficult to detect

system, and is now moving to

reception by using a device to

A mobile phone can be used

without catching the correctional

other types of solutions.

transmit a signal on the same

as a data storage device as well as

frequency, and at a high enough

for transmission. Even without

Methods that target signals

work because cellular service

power that the two signals collide

signal and data access, a phone

can create issues with internal

providers switched to what is

and cancel each other out.

remains a useful data storage

communications. Because mobile

commonly known as 4G or Long

In an effort to clamp down

60 // SECURITY SOLUTIONS

officer or inmate red-handed.

Managed access did not

securitysolutionsmagazine.com


Additionally, where there is

Tactics include highly

The most important success

a will, there is a way – even with

qualified and trained staff,

factor for any correctional

the most updated technology.

roving correctional officers,

facility is its staff and the training

A trial in two Scottish prisons

walk-through metal detectors

they have undergone; all the

deployed a grabber system,

and X-Ray equipment at main

innovative tactics and cutting-

which cost more than 1.2 million

points of entry, portable detection

edge technologies in the world do

pounds to deploy. A report

equipment, random screens, high

not matter if the staff is not well

on the trial shows resilience

fencing/netting, drone detectors,

versed in them.

issues and the system’s lack

shakedowns and more.

of intelligence – and all that

Technologies should be

The human factor is vital in every aspect of security, and

cost was for naught in the end.

deployed at all entry points (front,

making staff experts on tactics

Prisoners developed what

back and side), as well as facility-

and technologies through hands-

officials described as “innovative

wide. An example of something

on training (including refresher

countermeasures” to circumvent

that can be used throughout a

courses for veteran correctional

the phone block.

facility is a portable ferromagnetic

officers) will help staff understand

detection system (FMDS), which

how each method contributes to

than anyone that inmates

uses passive sensors that detect

the layered security approach –

will go to any lengths to

a magnetic signature, down to a

and how it enhances their own

obtain contraband – invent a

millionth of the earth’s magnetic

safety as well.

new method of detecting or

field. It takes less than a minute

preventing, and inmates will

to set up and passively detects

find a way around it. Contraband

ferrous metals as people and

Many Tools, Not Just One

has many portals of entry to

objects move by, allowing more

Inmates will never stop trying to

a facility: unmanned aerial

detection in less time, and fewer

smuggle in mobile phones and

vehicles, or drones, can fly over

unnecessary close encounters

other contraband, which means

fencing; objects are thrown over

between staff and inmates.

prisons across the globe have

Prison officials know better

their work cut out for them – and

walls; food shipments and mail

Staff can use FMDS alongside

deliveries hide illicit materials;

X-Ray equipment at entry points

no single solution will help keep

Term Evolution (LTE) technology,

and work-release inmates and

to screen people, then pick up

phones out. A multi-layered,

which uses new frequency bands.

staff bring contraband in a side

the unit and use it throughout

holistic approach to security that

Carriers also are transmitting voice

door – or even within their own

the facility to conduct full-body

encompasses the entire facility

calls over what amounts to a Wi-Fi

body. Even the provider of the

searches of inmates and screen

using both technology and

network. The prisons’ managed

managed access systems for

mail, laundry, mattresses and

traditional methods, bolstered

access system does not capture Wi-

the California Department of

other inmate property. The units

by high-quality training, is the

Fi, Skype or satellite transmissions,

Corrections told the Associated

run on batteries – there is no need

ideal way to keep contraband –

unless inmates use Skype and

Press regarding contraband

for an electricity source, as with

including mobile phones – from

other social media applications

phones, “There is no magic bullet.

a walk-through detector, giving

creating disruption in a prison.

through a cellular connection.

You can’t try to address the

correctional officers the ability

A non-partisan study from the

demand because the demand is

to bring a security solution all

toolbox is more effective than

California Council on Science and

always going to be there.”

around a prison without worrying

having a single tool, and a

about a power source.

multi-layered security solution

Technology detailed a lengthy list

The reality is that contraband

Having many tools in the

of additional potential problems

mobile phones in prisons is a

This technology has been

puts many tools in the hands

with managed access before the

complex issue that no single

deployed in 46 countries across

of correctional professionals,

system was even deployed.

technology or method can

the globe, including in all New

helping them maintain order,

address. Instead, successfully

Zealand and United Kingdom

security and safety both inside

technology is always changing,

fighting contraband phones

prisons, all 54 state prisons in

and outside a prison. n

which means jamming, grabbing

requires multiple technologies,

New York, all 24 state prisons in

and managed access systems are

tactics and training.

Maryland and in California and

The issue remains that

Nick Jordan is international

Indonesia. FMDS goes beyond

sales director for Metrasens.

detecting phones and can find

He can be reached at njordan@

any ferrous metal contraband,

metrasens.com

upgrades to keep current – and

The Solution: The Multi-layered Approach to Security

not only are these methods

To fight contraband, correctional

detect ferrous metal objects inside

accounts – US Corrections, for

expensive to deploy, but they are

facilities must use a layered

a human body – unlike hand

Metrasens. He can be reached at

even more costly to upgrade.

security solution.

wands or walk-through detectors.

mhynes@metrasens.com

only as good as the technology they were designed for. These systems would require constant

securitysolutionsmagazine.com

including weapons, and can even

Mike Hynes is director of key

SECURITY SOLUTIONS // 61


CCTV

HOW TO PROTECT HOUSES OF WORSHIP BY AMI TOBEN

This article will detail a number of ways in which houses of worship can better protect themselves from deadly attacks. It applies to any house of worship and any religion, from mosques, churches and synagogues to temples, shrines and any other type of religious gathering place. I do not just want to give readers some general, theoretical advice here. What follows are proven, practical methods to protect houses of worship. These are time-tested, experiencetested ideas, strategies and tactics that I have been involved in for 15 years.

Knee-jerk Reactions Knee-jerk reactions, in and of themselves, are not necessarily the worst things in the world, especially if they cause organisations to tighten their security measures. The main problem with them is that they are almost always temporary measures that target feelings without properly addressing physical protection. The security enhancements they prompt therefore tend to go away after a while, leaving the organisation just as vulnerable as it was before the incident occurred – which is exactly opposite of what you need. A terrible incident can provide good motivation for tightening security, but rather than letting yourself get carried away with emotional responses, anxiety can be put into much better use if it motivates you to build or enhance a permanent security program, one that takes into account your organisation’s operations, character and budget. That way, it will still be in place when you actually need it most – before the next attack.

62 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


How to Balance Security with a Warm, Welcoming Environment

eyes countless people go from

your security costs, it is whether

risk. Threat is the potential harm

opposing security to becoming

you can afford not to protect

to your asset, risk is the likelihood

huge fans of it.

your organisation.

of that threat/harm being

Finding The Best Security Solutions

things in this way, you will be

losing your warm and welcoming

Budgets – can you Afford Security?

identity? This is not an

Okay, there is no way around

One of the most common – and

security solutions.

unimportant question, nor is it

this – good security will cost you

most expensive – mistakes many

a rhetorical one. It is a question

some money. There are some

organisations make is to leap to

that mitigate risks (lowering the

with a very clear and important

government programs that can

security solutions before they

probability of harmful incidents)

answer. Based on years of

help cover some of your initial

properly identify what they

are your preventive measures.

experience, I can tell you that the

costs (or in some cases, all of

need. Security might not be

Security solutions that mitigate

answer is a resounding yes!

them). With that said, however,

rocket science, but if you leap

threats (decreasing the severity

in order to sustain and maintain

straight into installation and

of harmful incidents once they

cheap, and in some cases

a proper security program, you

implementation, you are very

have started) are your reactive/

there is a bit of an adjustment

are going to have to spend some

likely to miss certain things

emergency measures. You will

period. But I cannot think

of your own money as well.

and waste quite a bit of money

want to have both.

Can you bolster security without

It is not always easy, or

of a single organisation that

realised. Once you have defined

Yes, I know it is difficult and

on others. I have seen many

much better positioned to look for In general, security solutions

The key to finding good

has gone through this where

everyone’s budgets are always

organisations with gaping

security solutions is to ask:

members, guests and employees

tight. Money, much like time,

security holes after they have

1. What am I trying to protect?

now complain about their

is not something that most

wasted tens, or even hundreds,

2. What am I trying to protect

environment not being warm

people and organisations have

of thousands of dollars on

and welcoming enough. For

available. So, if you are going to

badly planned and executed

3. How do I want to protect it?

example, I can very clearly

ask the question, “Do we have

security solutions.

A solution, by definition, is a

remember a time when people

the money for security right

worried that installing security

it from?

Yes, you have security

means of solving a problem.

now?” the answer will always

concerns and you want to

If a security provider cannot

cameras would harm their warm

be, “No”. This is why you have to

address them as soon as

frame the solutions they offer

and welcoming environment.

change the way you think about

possible, but start with a security

in a way that answers a security

Now, no one even bats an eye

it. A security budget will never

assessment. This does not have

question, consider going with a

when they see cameras (if they

just be sitting around, available

to be a long process. While I

different provider.

even notice them at all).

for use. A security budget has to

would recommend engaging a

be allocated.

professional security consultant, you can also do much of the work

The Main Components of a Security Program

of time and effort, fundraising

yourself. There are even some

There is a huge range to these

and cajoling, but it can be done.

good – and free – resources for

categories and you might not

perform access control. I have

I have seen many organisations,

this, like what US organisations

necessarily want, or need, to

heard many a complaint from

big and small, that supposedly

can get from the Federal

implement every single one of

people concerned that nameless

could not afford security that

Emergency Management Agency

them, but here are the basics.

security guards will turn their

eventually pulled it off. Every

(FEMA).

house of worship into some

organisation has to figure

kind of prison. However, as

out its own way to allocate a

and prioritise what you want

This covers your burglar alarm

soon as they give it a try (and

security budget, and how large

to protect. In every case, your

systems, security camera systems,

as long as they hire the right

or small this budget will be.

most important asset is your

access control system and

security provider), they end up

But remember, if you do not

people. Next on the list are things

intercom. Larger properties often

seeing that it is just Brian or

establish a security budget,

like property, reputation and

have some type of enterprise

Ajay or Malek or Karen, or Ami,

it means you are not taking

environment/atmosphere.

solution that integrates various

who smilingly welcomes them

security seriously enough.

Many organisations are also concerned about losing their

Yes, it sometimes takes a bit

welcoming, open-door policy if they hire security officers to

Your first step is to identify

You then want to identify

Electronic Security Systems

safety and security systems. Keep

and define your concerns – what

in mind that electronic security

your insurance costs,

are you worried might happen

systems do not make a secure

maintenance costs and payroll

to each asset. We always try to

property. It is not just about the

countless times over the years

costs. The question is not

calculate the combined value of

hardware, it is about how you

and have seen with my own

whether you can also afford

two important factors: threat and

use it.

at the entrance while keeping everyone safe. I have done this myself

securitysolutionsmagazine.com

You can somehow afford

SECURITY SOLUTIONS // 63


CCTV

Protective/Guard Services

personally have no problem with

My company only provides

The general categories here (in

armed security as long as people

concealed armed security, which

frequency of use) are:

understand what it is and what

means it only functions as a

• day-to-day facility/campus

it is not. So, let me correct two of

reactive tool. And though there

security guards: dedicated to

the most common misconceptions

are some who fear that this might

property management, access

about it.

cause the officer in question

control, people management and incident response.

Among those who support

to over-depend on his strong

the idea of armed security, there

reactive capabilities and not do a

are people who claim that if

good job at proactive prevention,

level services for special

security is not armed, then it is

I have yet to see such a thing

events, holidays, weddings,

not real security and it is just a

in my 15 years of work in the

parties and more.

false facade –’security theatre’.

security industry.

• special event security: higher

As with most other goods and

This is incorrect because it

services, you get what you

completely misses the idea of

weapon can do just as good a job

pay for. I would obviously

preventive security and what can

as an unarmed one in preventive

recommend you spend more

be achieved through deterrence

security, access control, customer

rather than less on protective

by appearance, detection of

services and all the rest of it. It is

services, but if budgets do not

suspicious activity, exposing of

just that he/she also has an extra

allow for this, it is important to

suspicious people and solid access

tool when it comes to emergency

set your expectations correctly.

control. And no, once again, I

reactive measures. This is why

If you only have the budget for

am not just talking theory here. I

I am generally in favour of it,

a Hyundai, do not expect it to

have my own experience and that

though I will never discount

perform like an Aston Martin.

of many others, not to mention

or dismiss the overwhelming

countless case studies and

majority of security that

up most often here is whether

incident reports to support this.

is unarmed.

security officers should be

It is true that unarmed security

employed on a full-time basis

cannot guarantee your safety,

question that comes up is

or just during services, special

but guess what, neither can

whether community members

events, holidays and so on.

armed security.

or congregant volunteers can

The question that comes

There is no clear-cut answer

On the side that usually

An officer with a concealed

Lastly, another common

also provide certain guard

here because it depends on

opposes armed security is the

duties. The answer to this is

various factors, such as how

claim that it will only make the

an obvious yes, but it comes

and offer to share resources

many people are in your facility

environment less safe. Here too,

with a few caveats. Community

and information. They will

during a routine day, whether

I can speak from many years of

volunteers can indeed be good,

almost always agree to help and

your facility/campus contains

security company experience,

motivated and sometimes even

reciprocate. Even among rival or

a school or day care centre,

employing many armed officers

experienced and well-trained

competing organisations, when it

whether it is a large and/or well-

at houses of worship, community

protectors. But since this depends

comes to security, it is common to

known organisation, whether

centres and schools. I know of

on volunteering rather than

find solidarity and cooperation.

the environment around it is

no cases where security was

on professionally accountable,

safe or whether the organisation

compromised due to the officer

licensed, paid security providers,

Emergency Planning

is specifically threatened in

being armed. Armed security is

it can be difficult to put together a

In the US, any organisation with

any way. I think your starting

no more – and no less – than a

solid, consistent, ongoing security

10 employees or more is required

point should be to have security

very strong reactive capability.

program around it.

by the Occupational Safety and

officers at your special events

And if the weapon is carried in an

and large prayer gatherings

exposed manner, it can serve as a

Networking – Intelligence and

a written emergency action

and, depending on the above-

preventive measure as well.

Information Sharing

plan. Most people already know

Networking with other

the basics here (in case of fire,

mentioned factors, you should

Though armed security tends

Health Administration to have

also seriously consider having

to polarise people between

organisations (of any

in case of earthquake and so

security officers there on a full-

advocates and opposers, in

denomination) is extremely

on), but religious organisations

time basis.

all the years we have been

important. When it comes to

should have more comprehensive

Another common question

providing it, we have never had

security, no one needs to go it

procedures that also include

people ask is whether they should

any issues, accidents or negative

alone, re-invent any wheels or

active intruder response,

have armed or unarmed security

repercussions as a result of it,

struggle in the dark to get crucial

suspicious package response

officers. Again, there is no clear-

even at organisations that were

information. Reach out to other

and more. This does not mean

cut answer to this question. I

initially uneasy with the idea.

organisations, ask for advice

that the written plan should be

64 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


local law enforcement agency,

interests? In reality, people very

ask to speak with the ranking

often find security measures to be

officer or the officer in charge of

uncomfortable and inconvenient.

private sector liaisons and share

We naturally go along the path

your thoughts and concerns with

of least resistance and, if given

them. You might be surprised

the opportunity, take short cuts.

to discover that in most cases,

Strong policies and procedures

not only are they going to be

are the glue that will hold your

amenable but they will be openly

whole security program together.

appreciative of you reaching out

is to establish who in your

take community policing

organisation is in charge of

quite seriously.

security. If you hire outside

Get to know your local law

should be the main point of

the sergeants and the patrol

contact for them. Depending on

officers. Offer your facility during

the size of your organisation,

off-hours (usually overnight) for

you might also want to establish

them to train in. Make it known

a security board or committee

to the patrol officers that they

that will be in charge of making

can drop by any time they need a

decisions and using and

bathroom break or a cup of coffee

balancing the security budget.

very appreciated). Not only will the regular

Staff Training

cover more than just fire and

By this I mean security training

earthquake. In fact, you should keep it as concise as you can.

security providers, this person

enforcement agency, get to know

(trust me, this one is going to be

book length, only that it should

An important part of this

to them. Most police departments

Working security at many houses of worship over the years, I am used to people expressing

presence of law enforcement

gratitude for my being there,

officers provide a good preventive

along with a regret that my job

security measure, but when you

is necessary in the first place.

have a security incident, you

Though my uneasy reply to this

will find them very responsive

show of gratitude has always been,

and familiar with your facility

“Thank you. I agree.�, I now wish

or campus.

to convey the same sentiment

And yes, some employees,

about this article. I regret the fact

for non-security personnel.

guests or congregants might raise

that it is even necessary and yet,

The basics you will want to

an eyebrow once they see more

considering the world we live in, I

cover are emergency response

law enforcement presence, but

hope you found it useful. n

hire a professional emergency

(mentioned above) and

I can tell you from experience

planner for this project, but if

general security awareness.

that they will get used to it pretty

you do not have the budget for

It is also useful to cover

quickly and will then start to

director, consultant, trainer,

this, there are local, state and

things like verbal compliance

really appreciate it.

operator and business developer,

federal government resources,

and verbal management of

and even some great non-profit

aggressive behaviour.

For best results, you should

organisations like the Red Cross,

As for drilling, make sure to

An experienced security

Ami Toben has over 14 years Policies and Procedures

of military and private sector

No, I did not save the most boring

security experience, and a

that can help you with this – free

follow the correct order of 1)

subject for last; I saved perhaps the

successful record of providing

of charge.

security plan, 2) security training

most important one. Policies and

full-spectrum, high-end services to

and 3) security drilling. Do not

procedures are what will direct

Fortune 500 corporations, foreign

wheel when it comes to a written

just drill something you have

your staff to implement everything

governments, foundations, non-

emergency plan. The resources

not trained on first, and do not

covered above. You can have the

profit organisations and wealthy

mentioned above have very

train on something that is not

best security measures in place,

individuals. Ami is currently

good and free templates on the

part of an established, written

but if your staff do not use them

director of consulting, training

internet. Adapt a template to

security plan.

(or do not use them correctly), they

and special operations at HighCom

will not be worth much.

Security Services, a US-based

Do not try to re-invent the

your own specific situation, let

high-end security firm specialising

someone look it over to make

Law Enforcement Relationships

sure you got it right and you will

This one is also important and

much sense. Why would people

in protective services, security

probably be good to go.

also free. Get in touch with your

work against their own security

systems, consulting and training.

In theory, this might not make


ACCESS CONTROL

ARMS RACE BETWEEN MALWARE RESEARCHERS AND MALWARE PRODUCERS HEATS UP BY NICK FITZGERALD

As malware becomes more

ends increasingly replaced that

the aim of these regulations is

manually, using human resources,

complex and its producers

earlier ‘hacker ethic’. Nowadays,

to protect individuals who may

is impossible.

become more sophisticated,

cybercriminals may distribute

have their sensitive information

traditional, manual approaches

ransomware, or conduct corporate

compromised or stolen. By

created in massive quantities,

to classification and detection

espionage, or even sabotage, for a

complying with the regulations,

companies receive a massive

are no longer sufficient to protect

fee. Other groups are more clearly

companies can prioritise

number of alerts from their

organisations. Cybercriminals are

state-sponsored organisations,

their customers’ privacy and

security systems, monitoring tools

increasingly organised, working

such as those accused of meddling

information, as well as their

and user activity. Network traffic

in corporate-like structures with

in the US presidential elections.

own interests.

continues to increase, and the

full-time teams dedicated to

Regardless of attackers’

Protecting information is no

Along with new data being

resulting amount of cybersecurity-

producing malware to spy on, steal

motivations, companies are

longer as simple as implementing

related data alone is literally

money or intellectual property

under more pressure than ever

anti-malware technology or

impossible to analyse by humans

from, ransom, or otherwise

to protect themselves from

monitoring tools. Companies

operating in isolation.

incapacitate organisations.

cybercriminals. This is because

cannot address the problem using

companies not only need to worry

human teams exclusively, simply

machine learning (ML) has led to

narrow depiction of criminal

about the financial ramifications

because of the sheer scale and size

the development of cybersecurity

hackers could not be further

of a successful attack (although

of the issue.

solutions that can help protect

from the truth. By and large,

they must), and not only need to

organisations are not taken

protect themselves against the

challenge in cybersecurity

requiring massive amounts of

down by lone hackers in hoodies,

reputational damage following

right now is the amount of data

human time and resources.

tapping away at keyboards in

an information breach (although

involved. For example, in 2017,

Instead, many processes can be

their parents’ basements. They are

they should), but they also need

every minute saw 400 hours of

automated, protecting networks

more likely to be attacked by state-

to comply with increasingly

video uploaded to YouTube, more

without human intervention,

sponsored, or at least well-funded,

tight government regulations

than 186 million emails sent, half

except when certain alerts are

commercially oriented groups

around privacy.

a million comments made on

triggered. Equally unfortunately,

Europe’s General Data

Facebook, 455,000 new Tweets,

many vendors and pundits gladly

Protection Regulation (GDPR),

and more than 3.5 million new

misrepresent their ML-based

a broad variety of motivations.

in combination with Australia’s

Google searches. There are 2.5

products under the misleading

Some are simply motivated

privacy laws, recently enhanced

quintillion bytes of data created

label of artificial intelligence (AI).

by mischief and a love of the

to include mandatory reporting

every day and 90 percent of the

challenge. Seeing how much

of notifiable data breaches, has

data that currently exists was

however, ML enables important

damage they can get away with

set the scene for a compliance-

created in the past two years

advancements in cybersecurity;

is where the thrills lie for these

driven approach to cybersecurity.

(Domo, 2017). With the Internet

ones that businesses should

hackers. Thrill seeking was the

Businesses must familiarise

of Things (IoT) likely to contribute

absolutely leverage. In fact,

most common motivation behind

themselves with legislation and

to a further explosion of data,

research suggests that ML in

malware attacks until the early

act to comply. This can be complex

it is fair to say that monitoring

cybersecurity will boost big

2000s, when money and political

and resource intensive. However,

and classifying all that data

data, intelligence and analytics

TV and Hollywood’s typically

of hackers. Cybercriminals work with

66 // SECURITY SOLUTIONS

Boiled down, the greatest

Fortunately, the evolution of

businesses from malware without

Ignoring this AI hype,

securitysolutionsmagazine.com


securitysolutionsmagazine.com

SECURITY SOLUTIONS // 67


ACCESS CONTROL

spending to US$96 billion by 2021

decisions based on specific input

to reduce the number of

not just disguise them. For

(ABI Research, 2017). However,

that has been used to train the

false positives.

example, attackers that can

it is worth noting that ML alone

algorithms. It cannot extrapolate

will not solve the cybersecurity

or ‘think’ for itself.

This works well where there

understand how the ML algorithm

are plenty of samples available

is set up or where it draws

to use as teaching resources.

training data sets from can poison

problem. This is partly because

Indeed, many organisations

cybercriminals also have access

have already implemented ML

Malware, spam and some other

the data. They can use counter-

to these technologies. Just as

in their cybersecurity strategies,

types of attack have plenty of

intelligence techniques whereby

businesses can automate their

perhaps without necessarily

training data, making them ideal

they introduce data that makes

response to cyberattacks, so can

recognising that they have done

for an ML approach. However,

malicious traffic look legitimate

cybercriminals automate their

so. In reality, what many refer

where there is not much training

and vice versa.

attacks, potentially leading to an

to as AI is actually ‘only’ ML.

data available, ML approaches

escalating war.

True AI is yet to materialise,

become unworkable. For example,

generate phishing messages.

Unfortunately, research

Or, they could use ML to

in cybersecurity or elsewhere.

when it comes to detecting attacks

Based on historical information

shows that 75 percent of IT

And, while ML may seem novel,

from network traffic, there is not

about successful attacks, ML

decision makers believe AI and

it has been in use for a long

yet a useful training data set that

algorithms could be used

ML are the silver bullet to solving

time, especially in the malware

can be relied on. Without a good

to develop and launch new

cybersecurity challenges (ESET

detection field.

training data set, the machine

attacks that use the best of the

cannot learn.

techniques that have previously

White Paper, 2018), despite

Endpoint security products

only 53 percent claiming to

primarily use ML in detection

fully understand the difference

decision making. Product

aware of is the tension between

generating effective scam emails

between the two (ESET White

developers feed massive numbers

malware producers and malware

would let malicious actors

Paper, 2018). This creates a

of correctly labelled clean and

researchers. ML algorithms

conduct phishing attacks on a

false sense of security that

malicious samples into ML

have a narrow focus and cannot

grand scale. And, since phishing

could contribute to businesses

algorithms, which ‘learn’ the

think for themselves; essentially,

is a numbers game, the more

falling victim to cybercrimes

differences between the ‘good’

they play within a defined set

attacks that are launched, the

they thought they were

and ‘bad’. This ‘knowledge’ is

of rules. For example, they are

more likely it is that at least some

protected against.

represented in an ML model,

taught to identify certain threats.

This misconception has been

Another key limitation to be

which is included in the endpoint

By contrast, malware producers

blamed on the amount of hype

security product so files on the

are continually learning and

in the industry around these

protected system can be classified

breaking the rules, coming up

technological advances. While

quickly, according to the model.

with new ways around established

there are exciting new tools with

ML helps security developers

protections. So, while the ML tool

plenty of potential, ML should

improve malware detection

learns to identify threats similar to

be treated as just one part of

engines, increase detection

those it has seen in the past, it will

an organisation’s overarching

speeds, reduce the latency of

not recognise new threats entirely

cybersecurity strategy. This is

adding detection for entirely new

unlike those seen before. Thus,

because cybersecurity is an

malware families, and enhance

malware researchers may be a

incredibly complex challenge and

abilities to spot suspicious

step behind cybercriminals, even

the ‘threatscape’ is constantly

irregularities. These developments

when using ML to reduce the total

shifting. No, one single tool or

lead to higher levels of protection

amount of human effort required

technology can fully protect an

for organisations against advanced

to protect systems.

organisation from the gamut of

persistent threats (APTs), and new

malware. It is therefore unwise

and emerging threats.

to gamble an organisation’s

Although ML is incredibly

Cybercriminals might use ML to become harder to detect and more successful in their

entire cybersecurity strategy on

useful in such contexts, it does

attacks. In 2003, the Swizzor

one approach.

have limitations. For example,

Trojan horse used automation

the initial classification of clean

to polymorphically repack its

that an organisation’s IT decision

and malicious samples requires

malware once every minute.

makers are clear on the meaning

extensive, initial classification

Consequently, each new victim

of the terms AI and ML. AI is

effort by humans. In other words,

was attacked by a slightly different

a broad umbrella term; ML

humans have to ‘teach’ the ML

variant of the malware. This

is a subset of AI. True, AI can

tool how to classify samples.

complicated detection, helping the

extrapolate new conclusions

Humans are also required during

malware spread more efficiently.

without new training data. ML,

the process to monitor the ML

while powerful, can only make

modelling process, particularly

A good first step is to ensure

68 // SECURITY SOLUTIONS

been successful. Automatically

Furthermore, cybercriminals might use ML to enable attacks,

securitysolutionsmagazine.com


of them will yield results for

continuing evolution of ML is

important, IT decision makers

malicious traffic even if the ML

the attackers. That is bad news

unlikely to make human security

need to know enough about the

algorithm has been compromised.

for businesses whose security

professionals redundant. The

incident to respond intelligently.

It is important to remember that

providers already process more

strongest protection comes at the

Therefore, ML can be highly

machines are not infallible and

than 300,000 new pieces of

intersection between humans and

valuable in providing the context

humans will still be required to

malware per day.

machines. In other words, trained

and information needed for

monitor them to ensure they are

security professionals, working

human responders to deal

getting it right.

enhanced type of ML, behave

with state-of-the-art tools,

effectively with an incident.

more like true AI, independently

including ML, will always be

adjusting and evolving as they

more powerful than a human or a

realise that ML is not a silver

to involve a human at key

learn. This means that massive

computer working in isolation.

bullet and that it does have

points. This includes when

limitations for cybersecurity.

the ML algorithm encounters

Deep learning algorithms, an

amounts of data are no longer

Humans are essential because

However, it is important to

ML systems should therefore be set up with triggers in place

a challenge but an opportunity.

they can think creatively and

When IT decision makers

something it has never seen

Deep learning thrives on huge

perceive context differently from

realise this, they can set realistic

before. Rather than attempt to

amounts of data; the more the

a machine that has been taught

expectations around what ML

classify it based on incomplete

better. In fact, Google is already

to execute prescribed tasks

can do for their businesses.

data, the system should request

using deep learning to block

and only make algorithmically

This includes accepting that

human intervention. This helps

violent images and abusive

derived comparisons. Computers

humans will need to be part

reduce blind spots and makes

comments, detect phishing and

running ML are essential to take

of the cybersecurity process.

ML effective based on realistic

identify malware in the Play

on the burden of sorting through

Putting humans in the loop at

expectations.

Store. It is also being used to

data and identifying anomalies,

the right time can help combat

detect fraudulent payments,

providing the information

future attacks created using ML

admin@interactivemediasolutions.

protect Google’s cloud and detect

humans need to make ever more

techniques. For example, if an

com.au n

compromised computers.

complex cybersecurity decisions.

attack is launched after feeding

Despite the potential, it is important to note that the

securitysolutionsmagazine.com

Responding quickly to incidents is essential but, equally

an ML system poisoned data, a human can still detect the

For a full list of references, email

Nick FitzGerald is a senior research fellow with ESET

SECURITY SOLUTIONS // 69


CYBERSECURITY

HOW TO FIND AND RETAIN AN IDEAL CYBERSECURITY PROFESSIONAL BY RAVIKUMAR RAMACHANDRAN

ISACA’s State of Cybersecurity

the achievement of business goals

2019 report detailing current

and the effective fulfilment of

cybersecurity profession should

trends in workforce development

cybersecurity tasks. In addition,

have general industry experience

is quite interesting and throws

the CSX Cybersecurity Practitioner

of at least three to five years,

open the forum for a wider

certification (CSX-P) deals with

or they likely will be unable

debate and deliberation. Here,

technical skills. Though this

to sufficiently understand the

we will take up the key findings

may equip professionals with

rationale of business operations

of this research report and

the required body of knowledge

and the related connections

explore them further for a

needed to take up cybersecurity

with cybersecurity. Rightfully,

deeper understanding.

tasks, an additional and very

the ISACA research rejects the

important requirement lies with

idea that university graduates

Technically proficient

the complete understanding

are adequately prepared for

cybersecurity professionals

of the business process and

cybersecurity challenges, as

continue to be in short

the business outcomes of a

that training often is conducted

supply and difficult to find. In

particular industry in which a

in abstraction without

addition, knowledge of business

cybersecurity professional wants

business intelligence.

operations and its connection to

to enter. Also important to factor

cybersecurity is preferred.

in are the compliance and legal

out by the research is the ability

This is a very significant

requirements for running that

to understand the business,

revelation, highlighting

business globally or in a particular

followed by technical skills and

the importance of industry

geographical area.

communication skills. Though

certifications. For its part, ISACA

Those entering the

The biggest skill gap pointed

A person having a business

understanding business is very

has put forward the Certified

management and/or a professional

important, technical skills and

Information Security Manager

accountancy qualification entering

communication skills also play key

(CISM) certification, which

the cybersecurity profession

roles. Sometimes deficiencies in

deals with information security

comes with an advantage, as that

the first two can be offset by good

management, and the Certified

background equips the person

communication skills, while a lack

in the Governance of Enterprise

with the needed business acumen

in communication skills may render

IT (CGEIT), which explains the

and aptitude to grasp the nitty-

the proficiency in business and

methodology of the link between

gritty faster.

technical knowledge totally useless.

70 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


securitysolutionsmagazine.com

SECURITY SOLUTIONS // 71


CYBERSECURITY

The majority of organisations

learning on the fly. The job may

cybersecurity field is another

actualisation of business outcomes.

report unfilled cybersecurity

take away weekends due to hacker

factor referenced in the research

This should be well articulated

positions and the main cause

activity or preparing for the

that could be part of the solution.

and driven by the CISO so that

cited is the lack of qualified

challenges of the week ahead. At

professionals applying for open

times, it can seem like a thankless

positions. Though this could be

job; a cybersecurity professional

true in some cases, it is a known

the budget allocated is neither too low nor too big, but meets the

is seldom praised for no incidents,

Cybersecurity budget increases are expected to slow slightly.

reality that many organisations

but faces accountability for

The research indicates that

risk acceptance.

do not fill cybersecurity positions

every incident or lurking threat.

cybersecurity budgets seem to

unless a major cyber incident

Additionally, career advancements

follow a cyclical pattern, where

Conclusion

strikes them or they are mandated

are not as lucrative as in many

every alternate year cybersecurity

There is no doubt that skilled

to do so by a regulatory authority.

other fields, although on rare

budgets increase. The

cybersecurity professionals are

The Reserve Bank of India

occasions, the CISO can advance

cybersecurity budget is dependent

in high demand. Those who

and the Central Bank of India

all the way up to the CEO perch.

upon the importance placed by

wish to enter the cybersecurity

executive management on cyber

profession, in addition to equipping

mandated that all banks should

Considering the above,

actual needs of the organisation in alignment with its risk appetite and

have a full-time chief information

cybersecurity professionals

protection and its perception of

themselves with industry

security officer (CISO) who should

leaving for better financial

the associated alignment with

certifications, would do well to

be qualified with a certified

incentives or for promotional

information systems auditor

and development opportunities

(CISA) or certified information

elsewhere, as shown in ISACA’s

systems security professional

research, makes sense. Thirty-

(CISSP) certification, and

three percent reported leaving

who should be reporting to a

for a better work culture/

designation of executive director

environment – caused mainly

or higher.

due to a lack of management buy-in for compliance and

Retaining cybersecurity

cybersecurity initiatives, which is

professionals is exceptionally

prevalent in most organisations.

difficult, and the current

Thankfully, this is increasingly

enticement of employer-paid

being addressed by regulatory and

training and certification are

government policies worldwide.

not ensuring retention.

Although artificial intelligence

Once again, this is a truthful

and networked algorithm usage

though painful insight brought

for security are becoming

out by research results. The

commonplace, they will not be

cybersecurity profession can

able to replace human beings

be expensive to pursue and

completely. Increased use of

requires continuous training

training as a retention measure

and studying, on top of yearly

referenced in the research leads

subscription fees. Though

to win-win situations, as both the

the training and certification

individuals and the enterprise

expenses often are paid by the

benefit from more highly

employer (and sometimes even

trained professionals.

the subscription fees), the salary

As a consequence of the

needs to be good enough to

lack of trained cybersecurity

entice professionals to stay in an

professionals, almost 70 percent

organisation. In cybersecurity

of State of Cybersecurity

roles, every day is a different day

respondents believe that their

that brings with it new challenges

enterprise’s cybersecurity team

and struggles to acclimate. New

is understaffed. This is a very

questions, problems and puzzles

important indicator that we need

requiring robust solutions will

lots of trained cybersecurity

inevitably crop up, which forces

professionals who are industry

a professional to be constantly

ready to alleviate this situation.

updating himself or herself and

The need for more women in the

72 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


become well versed in business

Special Publication 800-181 on

processes and business strategies

National Initiative for Cybersecurity

in the native industry in which

Education (NICE) Cyber Security

they serve or have experience.

Workforce Framework is a good

It should be remembered that

reference document that describes

the combination of both leads

the interdisciplinary nature of

to the making of a complete

the cybersecurity work. The NICE

cybersecurity professional desired

framework, along with ISACA

by the industry.

guidance, can help individuals

Employers should offer

to acquire the knowledge, skills

competitive pay and career

and abilities (KSA) needed to

growth opportunities in addition

complete tasks than can strengthen

to healthy work environments

the cybersecurity posture of an

to attract and retain the best

organisation and to strengthen

cybersecurity professionals.

cybersecurity workforce

The National Institute of Standards and Technology (NIST)

securitysolutionsmagazine.com

development, planning, training

“Those entering the cybersecurity profession should have general industry experience of at least three to five years, or they likely will be unable to sufficiently understand the rationale of business operations and the related connections with cybersecurity.�

and education. n

SECURITY SOLUTIONS // 73


PROFESSIONAL DEVELOPMENT

THE RUDDOCK FELLOWSHIP An Awardee’s Perspective BY JAMIE EDDEY

In my last semester of a six-

I received an email from ECU

a discount, living in an apartment

year (part-time) degree through

that stated I was eligible to apply

in Dubai for three months would

Edith Cowan University (ECU), I

for the Emirates Scholarship,

cost more than the award from the

applied for and was awarded a

although I was not even sure if I

university. We also knew it would

scholarship to work for Emirates

should act on it.

be hard on our family; however,

Group Security in Dubai, United

In June 2017, I applied for the

we believed it would improve

Arab Emirates. Even with

scholarship through ECU for the

my career pathways, while also

the award that came with the

once-in-a-lifetime opportunity to

setting me up to graduate six

scholarship, this opportunity

work for Emirates Group Security

months ahead of schedule.

would come at a cost – a mentor

in Dubai. By late September, I

of mine recommended I apply for

thought I had missed out and

while working for Emirates

the Ruddock Fellowship.

was knuckling down for my final

Group Security, Rod Cowan,

push to complete my degree.

recommended I apply for the

Parliamentary Security Service

To my excitement and shock, I

Ruddock Fellowship. The Ruddock

for 10 years when I applied for the

was notified of my successful

Fellowship was established by

Emirates Scholarship. That was 10

application, six business days

the Australian Security Medals

years as a shift worker, 10 years of

prior to the departure date. We

Foundation (ASMF) in partnership

missing out on weekend activities,

had just bought a house and were

with ECU. Its purpose is to provide

10 years of nightshift hangovers,

due to celebrate my daughter’s

financial assistance for people in

the last four of which were made

fourth birthday two days before

the security field who undertake

harder after the birth of my first

my departure. Thanks to an

the Emirates Scholarship to help

child. I had begun studies to give

incredibly supportive and well-

ease the financial impact of being

myself an edge when applying for

organised wife, I was on his way to

an unpaid intern while living in

jobs so that I could move away

Dubai in early October.

Dubai. To apply for the Fellowship,

I had been working in the

from shift work. In my last year

We knew this scholarship as an

One of my mentors

I was required to submit an

of core units towards achieving

unpaid intern would represent a

application outlining why I

a Bachelor of Science – Security,

financial burden for us – even at

considered myself a candidate,

74 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


securitysolutionsmagazine.com

SECURITY SOLUTIONS // 75


PROFESSIONAL DEVELOPMENT

why I had been awarded the

presenting my idea, I was

given when I won the Emirates

Emirates Scholarship, what my

assigned the project, which

Scholarship, for the ASMF who

background was and what being

aimed to increase the efficiency

recognised the need for an award

awarded the Fellowship would

and security of a large Emirates

such as the Ruddock Fellowship,

mean to me. My application

facility’s supply chain; a facility

and for being recognised as

spoke of the ten years in the

that housed over 10,000 staff in

the 2017 Ruddock Fellow. I was

Parliamentary Security Service

a 24-hour period. In addition to

awarded the Fellowship in the

and the experience this job had

the project, I was entrusted to

presence of The Hon. Philip

given me, my commitment to

produce intelligence products.

Ruddock and senior members of

studies, the pressures that the

I received excellent mentoring

the Australian security industry

internship was taking on myself

during my internship from

at the ASMF’s Gala Charity

and my family, what I hoped

my Emirates Group Security

Dinner in Sydney.

the scholarship would help

supervisor and ECU’s Centre of

me achieve and the difference

Aviation Security Studies staff.

thinking of undertaking the

being awarded the Fellowship

One of my mentors requested

Emirates Scholarship but are

would make to the financial

I put together a module on

concerned about the financial

stress of being an unpaid intern.

security risk for a training

impact it will have on them

I also spoke of my decision to

package the mentor would be

and, potentially, their families,

undertake university studies and

delivering to owner/operators of

I would strongly advise them to

how I hoped this would open

security companies throughout

reach out to Winston Bucknall at

up a career pathway that would

the United Arab Emirates. Once

the ASMF through the ‘Contact

enable me to add greater value to

the module was created, the

Us’ page on their website (http://

the community while improving

mentor then suggested I should

inspiringsecurity.com/contact/). I

my work–life balance. I spoke

attend the conference in Abu

found the support very valuable

honestly about the difficulties

Dhabi and present it myself.

and know you will too. If you do

involved in leaving my wife and

I would have to present with

decide to apply for the Ruddock

daughter for three months to live

the assistance of an interpreter

Fellowship, I would advise you to

in a country I had never visited

as there were some attendees

remember to be open and honest

before. I also spoke about my

who did not speak English. My

about what the opportunity

decision to continue studying

mentor stated his belief in me

means to you for your future,

two core units while undertaking

to deliver the module, and his

and how you plan to proudly

the internship, effectively

faith that I would represent

represent ECU as an ambassador,

attaining (and paying for) six

him, Emirates Group Security

Emirates Group Security as an

units of academic recognition in

and ECU excellently. This kind

intern, and the ASMF as the

one semester.

of mentoring and trust allowed

Ruddock Fellow if successful in

me to step outside of my comfort

your application.

My open and honest application was well received

zone and grow professionally

by the ASMF and, while still

and personally.

being stunned at being offered

Since returning from my

If there are any ECU students

More information about the Emirates Scholarship through ECU can be found on the ECU

the opportunity to live in Dubai

internship in Dubai, I have

Emirates Scholarship webpage

and work for a world-leading

graduated as part of the ECU

(http://www.ecu.edu.au/

aviation security organisation,

class of 2017. I also achieved

scholarships/details/emirates-

fortune smiled on me once more

my dream of finishing a

scholarship). n

as I was announced the 2017

career in shift work after

Ruddock Fellow.

successfully applying for the

Jamie Eddey graduated

role of an Intelligence Officer

from Edith Cowan University

to be awarded the Emirates

in the Therapeutic Goods

in 2017 with a BSc – Security.

Scholarship by ECU and speak

Administration. My director

Jamie has 11 years of experience

very highly of Emirates Group

informed me that the experience

in the security industry, having

Security. I walked through the

gained from working for

worked in Security Operations

door as an unknown intern and

Emirates Group Security in

in Parliament House for nine of

was afforded the responsibility

Dubai played a significant part

those years. Jamie was named the

of identifying an operational

in my successful application

2017 Ruddock Fellow following

area that could benefit from

for the role. I am incredibly

his scholarship to work for

an innovative approach. After

grateful for the opportunity I was

Emirates Group Security in Dubai.

I know how fortunate I was

76 // SECURITY SOLUTIONS

The Ruddock Fellowship was established by the Australian Security Medals Foundation (ASMF) in partnership with ECU. Its purpose is to provide financial assistance for people in the security field who undertake the Emirates Scholarship.

securitysolutionsmagazine.com



FEATURE

78 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


NO COOKING THE BOOKS Australian Taxation Office Crack Down On WorkRelated Expense Claims To help you claim the right

deliberately and fraudulently

amount at tax time, the Australian

try to manipulate the system by

Taxation Office (ATO) has

claiming deductions they are not

developed a tailored poster and

entitled to.

occupation guide for guards and security employees. The easiest way to determine

government payments, health

whether an expense is deductible

insurance and bank interest.

is to follow the three golden rules:

If you wait until mid-August to

1. You must have spent the

complete your return, most of

money yourself and not

the work will be done as the

been reimbursed.

majority of pre-fill information

2. The expense must be directly related to earning your income. 3. You must have a record to prove it.

securitysolutionsmagazine.com

The ATO pre-fills lots of information, including wages,

will be available. Most people complete their myTax return in less than 30 minutes. You might get advice from

The ATO’s ability to identify

tax agents, colleagues, family

incorrect claims has improved

and friends, and even helpful

due to enhancements in

shop assistants, but you need to

technology and data analytics.

be mindful that not all advice

When people ‘rip off’ the ATO,

is correct. Whether you use a

they are actually ripping off

tax agent or lodge your return

their fellow Australians. That

yourself, you are responsible for

is why the ATO is committed to

the claims you make. Take the

protecting Australians and the

time to check your deductions are

tax system, paying close attention

correct and read further for some

to deductions, particularly

helpful examples, common myths

those made by people who

and errors.

SECURITY SOLUTIONS // 79


FEATURE

Incorrect Claims the ATO has seen Recently in the Security Industry

he has a company car and did

paid for or reimbursed,” said an

and therefore claimed his gym

not actually need his personal

ATO spokesperson.

expense and joggers as a work-

Since the taxpayer did not incur

car expenses, visit ato.gov.au/

are generally considered private

Using personal car for work…

any expenses and knowingly

car19

in nature and cannot be claimed.

or not?

misrepresented his circumstance,

A 42-year-old man in the security

the ATO knocked back his claim

Claiming confusion

claim, visit ato.gov.au/clothing19

industry was fined $10,400 for

and applied a penalty.

A security guard recently claimed

recklessly claiming work-related

car for work purposes at all.

The ATO said more than

To work out if you can claim

related expense – fitness expenses

To work out what you can

$500 for steel cap boots, $440 for

Common myths busted

expenses of more than $75,000

3.75 million people made a car

personal training joggers and

Myth: Everyone can automatically

across two financial years. These

expense claim in 2016–17, totalling

$150 for sunglasses. All claims

claim $150 for clothing and

claims were mainly for travel,

around $8.8 billion. “That’s a

were disallowed by the ATO as

laundry, 5,000 kilometres for

car expenses and clothing. The

lot of money and Australians

the taxpayer could not provide

car-related expenses, or $300 for

taxpayer said he used the log-book

expect us to ensure people

evidence explaining why steel

work-related expenses, even if

method to work out his deductions

are not over-claiming. We are

cap boots and protective eyewear

they did not spend the money.

to drive his Mercedes Benz for

particularly concerned about

were needed to carry out his job.

work purposes, but did not keep

taxpayers claiming for things they

He also did not have receipts

exemptions provide relief from

any evidence or receipts. When

are not entitled to, like private

to substantiate the claims. The

the need to keep receipts in

the ATO spoke to his employer,

trips, trips they didn’t make, and

taxpayer also said he needed to

certain circumstances. However,

the employer told the ATO that

car expenses that their employer

maintain a high level of fitness

they are not an automatic

80 // SECURITY SOLUTIONS

Fact: The record-keeping

securitysolutionsmagazine.com


“The ATO’s ability to identify incorrect claims has improved due to enhancements in technology and data analytics.”

Myth: I can claim all my travel expenses if I add a conference or a few days’ work to my holiday. Fact: If you decide to add

A Bit Behind on Lodging your Tax Return? Last year, around 200,000

a conference or some work

taxpayers failed to lodge a tax

to your holiday, or a holiday

return even though they were

to your work trip, you must

likely to have received a refund.

apportion the travel expenses

You may not lodge because

between the private and work-

you are on a low income, have

related components.

not worked recently or might be

Myth: I can claim my work

worried about lodging because

clothes because my boss told me

you have not lodged for several

to the wear a certain colour.

years. Unfortunately, the ATO

entitlement or a ‘standard

primary purpose of the product

deduction’ for everyone. While

is sunscreen (that is, it has a

you do not need receipts for

high SPF rating), the cosmetic

is a uniform that is unique and

until you lodge a tax return

claims under $300 for work-

component is incidental and

distinct to your employer, or

and for those taxpayers entitled

related expenses, $150 for laundry

you are required to the wear it

protective or occupation-specific

to a refund, most returns are

and 5,000 kilometres for car-

because you work outdoors in

clothing that you were required

processed in less than two weeks.

related expenses, you still must

the sun.

to the wear to earn your income,

have spent the money, it must be

Myth: I can claim my gym

Fact: Unless your clothing

cannot return your money

A very small number of people

you will not be able to claim it.

have not lodged for several years,

related to earning your income

membership because I need to be

Plain clothes, like black pants, are

and many of them report feeling

and you must be able to explain

fit for work.

not deductible even if your boss

out of control, stressed and

told you to wear them.

even embarrassed. Regardless

how you calculated your claim. Myth: I can claim makeup

Fact: While you might like to keep fit, there are only a very

Myth: I have a capped phone

of the reason, the ATO advice is

that contains sunscreen if I

small number of people who

plan, so I can claim both business

simple – even if you have several

work outside.

can claim gym memberships,

and private phone calls.

outstanding lodgments, get in

Fact: We all like to look good,

such as special operations in the

Fact: Unless you only use your

contact with the ATO and they will

but cosmetics are usually a

Australian Defence Force. To be

phone for work, you will have

help you sort it out. The key thing

private expense and the addition

eligible, your job would have

to apportion the cost between

to remember is that ATO is here

of sun protection does not make

to depend on you maintaining

business and private usage and

to help. They want all taxpayers

it tax deductible. However,

a very high level of fitness, for

only claim the work-related

to get it right. See ato.gov.au for

it may be deductible if the

which you are regularly tested.

portion of your expenses.

more information. n

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 81


LOSS PREVENTION

INTO THE RABBIT HOLE OF SUPPLY CHAIN RISK BY MAURIZIO P. SCROFANI

Learning How Much We Do Not Know Is the First Step to Appreciating Supply-Chain Risk Management

today’s supply chain to have a goal

chain starts. (With a product’s

of becoming an ‘expert’; instead,

manufacture? When plans are

dedicate oneself to being a lifetime

drawn? At ideation?) What is

student of the infinite complexities

certain is that risks are inherent at

of the supply chain.

every step along a product’s path

The supply chain web is spun so

management (SCRM) is fairly

back again as purchase does not

intricately that it is impossible to

straightforward. It is how we

always mark an end to a product’s

know it fully. Perhaps the most we

help to identify risk and manage

path through the supply chain.

can aim for is to gain knowledge

supply chain security adequately.

about one link, then another and

But learning about supply chain

product may hit the road again,

gradually appreciate more fully

risks is a bit of a rabbit hole. Even

from store back to vendor, and

how pieces fit together. Maybe it

something seemingly basic can be

undergo additional steps. In the

is not realistic when it comes to

muddy, such as where a supply

case of, say, an oil-filled radiator,

74 // SECURITY SOLUTIONS

The aim of supply chain risk

to a store’s shelf and, perhaps,

In the case of a return, the

securitysolutionsmagazine.com


securitysolutionsmagazine.com

SECURITY SOLUTIONS // 75


LOSS PREVENTION

a vendor may face a series of

to safeguard the supply chain

factors, including the threat

environmental regulatory steps

a risk in the supply chain. It is,

from emerging threats and

of terrorism, global crisis

before parts and pieces are sent

however, a single risk within

vulnerabilities. Disruption can

and recession, and political

back to the manufacturer or a

a small section of the supply

hit the supply chain at any

scrap company.

chain (logistics). A furniture

point, from manipulation in

The number of players, the

Cargo theft is an example of

upheaval • business risks caused by

manufacturer/seller of wooden

raw material usage, malware

factors such as a supplier’s

differences in technologies, the

dressers, for example, will have

and intrusions in digital supply

financial or management

amount of information and the

to manage myriad supply chain

chain processes, cargo theft

stability, or purchase and sale

sheer volume of interactions

risks long before it has even

and crime in warehouses and

between these and other layers of

made a product to ship. For every

distribution centres.

today’s global supply chain make

metal screw or plastic knob that

it extremely difficult to identify

will come from a supplier, the

level, external supply chain

physical facility and regulatory

risks, let alone mitigate them.

company will need to assess

risks include:

compliance

reliability, and for every shipment

• demand risks caused

Supply chain management encompasses the coordination

of wood, its health and quality.

of the many activities related

involves planning and processing

Geographic Impact of Supply Chain Risk Management

orders; handling, transporting and

to sourcing, procurement, conversion and logistics. It

At the very broadest

of supplier companies • physical plant risks caused by the condition of a supplier’s

by unpredictable or

In each area, questions fuel a

misunderstood customer

risk-management process. Our

demand

furniture company, for example,

• supply risks caused by any

needs clarity on key issues related

interruptions to the flow of

to its suppliers if it is to embed

Today’s vulnerabilities are

product, whether raw material

resilience into its business.

storing the products purchased,

multiplied due to greater

or parts, within a company’s

Intellectual property is one

processed and/or distributed; and

geographic distances and the

supply chain

area among many that it needs

managing the inventory of goods

complex processes of the supply

in a coordinated manner. There

chain. Globalisation presents

outside the supply chain,

is risk through it all, as broad and

unique challenges when

such as economic, social,

of intellectual property theft?

diverse as the supply chain itself.

applying SCRM methodologies

governmental and climate

Been accused of it?

76 // SECURITY SOLUTIONS

• environmental risks from

to examine: • Do our suppliers have a history

securitysolutionsmagazine.com


• Have they been victims? Did

example. And what about risk

risks; to identify the right people

efficiencies to react quickly

an employee improperly

from product defects? Or high

to implement it and assign

to market signals and store/

share sensitive information

labour costs? Or poor planning?

responsibilities; and to create

or provide access to a facility?

What if key personnel leave?

escalation mechanisms for each

Was there a computer

How might that impact business

risk and contingency plan.

network intrusion?

processes or how purchasers

• How do they protect their internal computer networks?

A clear risk picture and

customer needs • managing supply sources strategically to reduce the total cost of owning goods, as

communicate to suppliers

planning are the base layer.

well as teaming with business

and customers?

Organisations must also monitor

partners to reduce costs across

and track the progress of their

the supply chain to lower

The consequences of failure The furniture dealer also needs

are hardly hypothetical. A new

risk-mitigation initiatives

to know about its suppliers’

commercial airliner was delayed

to ensure that they work in

processes and procedures to

three years because of a failure to

real-life business situations.

strategy and IT system capable

verify the quality of its products or

assess supply chain risks properly.

Risk-management tools and

of integrating all the above

third-party products and services:

A candy maker’s stock sank eight

insightful dashboards can help

information – one that makes

How is the quality of product

percent when it could not deliver

steer an organisation through

all this critical decision

verified? What mechanisms

for Halloween. And in 2015, a

interactions with suppliers and

are in place to ensure products

cascade of technology missteps in

other operational stakeholders

A well-managed supply chain

meet requirements? Is an

a major big-box retailer’s supply

and prompt timely, informed

– one that mitigates risks –

inspection process in place to

chain, which caused the prospect

decisions. Broadly, SCRM is

is essential to a successful

review materials and/or services?

of patchy or empty store shelves,

critical to manage interaction

operation. In today’s global

Distribution is another category:

forced it to withdraw entirely

between suppliers, information,

manufacturing environment,

How do suppliers transport

from a country’s marketplace.

technologies, products and

where merchandise often moves

logistics service providers.

across oceans or continents

products? Are they warehoused

prices and enhance margins • developing a technology

making possible

company stand to gain? By

shelves, the risk of loss or delays

properties? And what about

Conducting a Company-Wide Risk Assessment

improving its management of

due to cargo theft, weather, work

finances? Are the suppliers stable?

A robust SCRM process starts

supply chain risk, it can maintain

stoppage and even paperwork

by identifying this world of risk

control over inventories and

errors requires innovative and

the necessary risk-management

– conducting a comprehensive,

distribution, thereby matching

comprehensive SCRM solutions

questions to help neutralise a

organisation-wide risk

and managing supply with

to manage successfully. When we

small sampling of external risks,

assessment to determine what

demand to reduce costs, improve

consider that every single piece of

from a few slivers of the supply

can go wrong. Relevant metrics,

sales and enhance company

merchandise must in some way

chain. And while partnerships

multiple sources of input and

profitability. That, too, sounds

pass through the supply chain

with top suppliers are typically

augmented data analysis are

simpler than it is. It requires:

network, it is easy to see the

strong, these questions should

necessary to get an accurate

• understanding the business,

need to implement appropriate

also be asked and answered

picture of the current situation.

the customer and customer

controls and protect our interests

for second-tier and third-

Risks then need to be scored

needs, and adapting the supply

against an increasingly complex

tier suppliers.

and prioritised, based on their

chain to find the balance that

world of risk. n

Of course, our fictional

likelihood of occurrence and

maximises profitability

furniture firm faces an equal

potential impact on business.

during transportation and, if so, where? Who has access to those

Again, these are just some of

number of internal risks,

Once risks have been

So, what does our furniture

• customising the logistics

before appearing on store

Maurizio Scrofani is a loss

network to meet the service

prevention manager, contributing

including manufacturing risks,

identified and prioritised,

requirements of various

writer and supply chain asset

business and process risks, and

organisations need to create a

markets, which may influence

protection professional with over

planning and control risks. It faces

comprehensive risk-mitigation

the size, number, location,

25 years of experience in retail and

risk from shrinkage resulting from

plan based on short-term,

ownership, structure and

manufacturing, including leadership

holding too much inventory, for

medium-term and long-term

mission of warehouse facilities

roles with Macy’s, Bloomingdale’s,

• recognising market signals and

"THE AIM OF SUPPLY CHAIN RISK MANAGEMENT (SCRM) IS FAIRLY STRAIGHTFORWARD. IT IS HOW WE HELP TO IDENTIFY RISK AND MANAGE SUPPLY CHAIN SECURITY ADEQUATELY." securitysolutionsmagazine.com

Delonghi and Toys“R”Us. He was

aligning strategies accordingly

cofounder and president of CargoNet,

to ensure consistent supply

a supply chain theft prevention and

forecasts and optimal resource

recovery network solution of Verisk

allocation

Analytics. Currently, Maurizio is a

• strategically locating/

consultant to retail, transportation

warehousing products

and manufacturing companies.

close to the customer base

He can be contacted at maurizio@

and speeding conversion

mpsconsultants.com

SECURITY SOLUTIONS // 77


PRODUCT SHOWCASES

LOCKWOOD SELECTORÂŽ SERIES 3782EL SHORT BACKSET MORTICE LOCK ASSA ABLOY Opening Solutions

input range of 9 to 28vdc, simple

Australia is excited to announce

field selection of power to lock

mechanism also allows for a new

the launch of the new Selector

or power to open. The Selector

configuration for reader in and

3782EL Short Backset Electric

3782EL is supplied in standard

reader out applications. When

Mortice Lock. Designed and

configuration with a full range

the lock is in normal operation,

manufactured in Australia,

of monitoring options including

card reader allows access to both

the Selector 3782EL is a

request to exit, deadlatch

sides of lock when in locked mode.

high performance fully field

status, door position, key

When a card is presented to either

configurable electric mortice

override monitoring and locked

side of the lock, it will unlock both

lock for narrow stile hinged

status monitoring.

sides allowing passage. However,

doors. Featuring a unique

A significant benefit of the

in the event of a power fail, the

motor driven operation, high

Selector 3782EL relates to the

outside handle will stay locked

security monitoring capabilities

door status illumination. Electric

whilst the inside is free to escape.

and on board door status LEDs,

mortice locks traditionally

provides a significant benefit over

provide a door status

Electric Mortice Lock has been

previous models. The Selector

illumination for locked and

designed specifically for narrow

3782EL is a hardwired access

unlocked via supporting plate

stile aluminium frame glass

control product intended for use

furniture which incorporates a

doors and complies with the

in high security environments.

red/green LED. This arrangement

building regulations of Australia.

The Lockwood Selector 3782EL

requires the installer to connect

For single-action escape the

is the ideal product when used

an LED loom from the furniture

Selector 3782EL meets the varying

in conjunction with intercoms,

back into the mortice lock. With

requirements of commercial

keypads and key switches due to

the Selector 3782EL, the LEDs

applications, including large

the intuitive operation of a locked

have been integrated into the

institutional applications such

or unlocked handle.

locks design with supporting

as tertiary education campuses,

furniture that features a lens

high security and high use access

mechanical locking platform and

window, making installation

control environments such

replacing the Synergy 3582EL,

reliable, guick and easy whilst

as government buildings and

the Selector 3782EL takes many

providing a modern door status

hospitals as well as common

of the benefits of these products

illumination design.

use doors in multi-residential

Building on the Selector 3782

and delivers secure, durable and

The Selector 3782EL uses a

intuitive use to electric mortice

motor driven mechanism, as

locks with increased adaptability

opposed to the more traditional

for the supply chain.

solenoid based designs. This

The advantages of the Selector

82 // SECURITY SOLUTIONS

The unique locking

The Lockwood Selector 3782EL

applications where there is a need for durable and intuitive function. For more information on the

means in power to lock

Lockwood Selector Series 3782EL

3782EL include a true multi

applications you have the

Short Backset Electric Mortice

voltage design with a functional

potential to use less power.

Lock visit lockweb.com.au/selector.

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmedia.com/newsletter

INDUSTRIAL, LOGISTICS AND DATA CENTRES FACE SECURITY RISKS WITH MOVES TO 24/7 TRADE CYCLES access by visitors tagging along

capable of discerning between a

behind authorized personnel.

person and a briefcase or bag.

“People rightly focus on online threats to data facilities, but there

Case study example

is also another more forgotten

Boon Edam installed Turnlock

dimension to cyber security:

100 full height turnstiles at a

and that is protection of physical

multipurpose Pacific Rim shipping

facilities from unwanted visitors,

terminal (which cannot be named

including industrial intelligence

for security reasons) as part of

thieves and even sometimes

a large-scale physical security

disgruntled former employees,”

plan to protect one of the largest

says Mr Fisher.

marine terminals in the region

The latest version of Boon

from criminal activity.

Edam’s Tourlock 180+90 revolving

A.P. Moller Maersk was

door system is designed for access

awarded management of this

hotspots such as the entrances

particular terminal for a period

to company HQs and data and

of 30 years. At that time, all entry

Security of access to industrial,

including goods handling, data

financial centres that might be

control and registration activities

logistics and data facilities is a

centres, dispatch, financial and

subject to physical penetration

were performed manually by

growing issue in Australasia as

proprietary information across

from people seeking to penetrate

security staff, which detracted

we move to 24/7 trading cycles

facilities that may be working

or damage data facilities vital to

from the effectiveness of

and criminals target activity

multiple shifts,” says Mr Fisher,

trading companies

procedures and controls.

hotspots for theft, commercial

whose company globally provides

data penetration and trafficking of

entrance security for scores of

system is a 24/7 solution offering

improvement program, the

illegal goods and substances.

Fortune 500 companies, as well as

high volume capabilities (20

terminal invested in new access

banks, data centres, legislatures,

people each way per door a

control equipment designed to

Boon Edam says the full gamut of

government agencies, resource

minute) proven by some of the

modernise visitor and employee

Australasian industrial production,

development sites, airports,

world’s largest companies and

application processing and

warehousing, data, distribution and

hospitals and educational and

government agencies. It is a

auditing standards for objectivity

export facilities – including port,

scientific facilities subject to

superbly flexible, non-intrusive

and efficiency.

road, rail and air facilities – need

unwanted attention.

way to control physical access and

Global entry solutions leader

to be increasingly aware of site

In response to the need to

“This latest Tourlock 180+90

As part of a continuous

The terminal selected Boon

prevent problems arising from

Edam’s Turnlock full height

security as industry in Australasia

provide high security even at

unauthorised access to sensitive

turnstiles to achieve these

follows global trends toward 24/7

times when security staff are

facilities and areas. It is also an

objectives, for their robust

responsiveness to world markets.

scarce, Boon Edam Australia’s

outstandingly cost-effective and

barrier construction and ability

latest Turnlock, Lifeline, Tourlock

reliable way to overcome the

to efficiently control the flow of

management practices mean we

and Circlelock ranges of security

problems inherent in expensive

visitors and staff to the facility,

should ensure now that industry

entrance products are designed

manned security systems,”

who are recorded also via security

facilities are prepared for new

for areas ranging from outdoor

he said.

cameras during entry.

security issues arising from

company perimeters, through to

the expanding flow of visits to

building entrances and sensitive

BoonConnect software to

turnstiles, the terminal installed

company facilities at different

interior areas.

configure the system to individual

biometric access control systems,

users’ needs, the system can be

electronic barriers for vehicle

“Good business risk

In addition to the latest

In addition to the full height

times of the day and night,” says

Its latest products also cover

Boon Edam Australia Managing

top security facilities, such as data

specified to include StereoVision

access, a module to manage

Director Michael Fisher.

and financial centres, where the

“time of flight” camera systems

visitors, software to register and

highest level of entrance tailgating

which create extremely accurate

control personnel access with

expand, more people need access

protection is achieved using the

3D images of the person in the

capabilities such as automatic

at different times to sensitive

latest in camera detection systems

door to determine whether they

locks and anti-passback

areas of company operations,

to help prevent unwanted physical

are alone. StereoVision is even

capabilities (a user can only exit

“As 24/7 business practices

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 83


PRODUCT SHOWCASES

if his/her access has been logged

facilities include:

while still delivering strength

Directional Traffic Control

in the system), among others. The

Turnlock 100 Robust Perimeter

and purpose.

The Tourlock 180+ 90 is an

system operates 24/7/365 in order

Security Solution

to service the high level of traffic.

The Turnlock 100 is a stainless

Tourlock High Security

of the Tourlock system. It is the

steel, full-height turnstile that is

Revolving Door

most advanced high security

– which have been proven globally

extremely suitable for outside use.

Some buildings and entries can

revolving door in the Boon

with distribution extending over

Its rugged construction ensures

only be accessible to authorised

Edam product range and allows

27 countries – are engineered

trouble-free and dependable

users; any possible unauthorised

for users to enter and leave the

to provide a cost-efficient way

operation. The choice between

access is strictly prohibited. In

building at the same time. The

to regulate access to a facility

three or four door wings allows

these instances, the Tourlock

level of security offered by the

without having to employ an army

users to adapt to the specific

high security revolving door

Tourlock 180+90 can be adapted

of security people or to construct

requirements concerning capacity,

can offer an attractive and

to individual requirements, using

facilities that look like a fortress,”

user comfort and security for

effective solution. Rotation of the

the latest advanced StereoVision

says Mr Fisher.

individual buildings.

Tourlock can only begin after

2 technology, which merges two

an authorisation signal from an

types of sensing technologies,

“The product families involved

“This is particularly true

The advantage of full height

automated four wing version

of businesses such as logistics

turnstiles is that they offer a

access control system, such as a

optical and near infrared light,

facilities that are part of globally

high level of security with high

card reader or biometrics reader

to monitor the compartment of a

fast-moving industries that have

reliability. Although most often

which may use retinal, fingerprint

security revolving door or portal.

to be able to provide immediate

these characteristics are required

or facial recognition technology.

access to people who are entitled to

for outside perimeter security,

have it – but to exclude unwanted

there are also applications within

Revolving door provides a

the difference between two

visitors posing threats to physical

a building in which a full height

weather seal when used on the

people and one person holding

and cyber security,” he says.

turnstile would be well suited.

outer façade of buildings, creating

a box or luggage to minimise

an ‘always open, always closed’

false rejections.

Boon Edam security solutions

The Tourlock High Security

This new and highly advanced system can accurately tell

are designed to blend security

Full-Height Turnlock 200 for

effect for environmental control

with corporate aesthetics to

Indoor Use

and more efficient HVAC use.

is not affected by sunlight or

provide individually engineered,

Where the rugged design of most

It has all the advantages of a

reflections, which eliminates any

world-class entry solutions of a

full-height turnstiles is an obstacle

traditional revolving door, with

environmental impairment of

quality already in service with

to indoor use, the Turnlock

the added advantages of a high

the system at locations near the

dozens of Fortune 500 companies

200 combines the simple and

security door system.

exterior of buildings.

including some of the world’s

reliable operation of a full-height

largest firms. Boon Edam already

turnstile with an attractive and

with a variety of different

levels of physical protection

has more than 100 installations

transparent design.

security systems that accurately

against intruder or armed threats

detect and prevent any form of

with high degrees of bullet resistance available. n

in Australasia of its architectural

The Turnlock 200 consists

Tourlock can be integrated

revolving doors and security

of an anodised aluminium

piggybacking or tailgating by

entrance systems.

frame with three or four door

which unauthorised people seek

wings constructed from narrow

to gain entry at the same time as

Boom Edam product families

polycarbonate panels. These

other people.

suitable for Australasian

are designed to harmonise with

industrial and logistics

aesthetic company interiors

84 // SECURITY SOLUTIONS

The near-infrared light sensor

Users can also choose different

For Further Information, Please Contact: E: alastair.russell@ boonedam.com.au

Tourlock 180 Simultaneous Bi-

W: www.boonedam.com.au

securitysolutionsmagazine.com


F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry

instagram.com/securitysolutionsmag

PARTNERSHIP WITH LOCAL ENGINEERING SPECIALISTS PME HELPS BOON EDAM BRING WORLD CLASS SECURITY TECHNOLOGIES TO PNG Since it hosted the APEC forum

entrance of a building or facility,

PNG LNG Camps and Sir John

many of which are local offices

in 2018, Papua New Guinea has

and ensure only authorised

Guise Stadium.

of global organisations,” said

further enhanced its already

personnel are allowed to enter. It

strong emphasis on improving the

can replace the need for manned

knowledge of the PNG market

Mr Troy Ware, Director,

country’s safety and security.

security personnel, who can

and has built a reputation for

PME says that there is great

be better deployed elsewhere,”

quality and excellence over

potential for the high quality

he said.

many decades. They are an ideal

entrance security products Boon

Boon Edam Australia is responding to PNG’s increased

“PME has an outstanding

Mr Fisher.

security focus, through

“Local companies can have

technical partner for Boon Edam

Edam is bringing to the market,

a partnership with local

better and more balanced security

in PNG and a natural complement

particularly in urban areas.

engineering company, Port

and save money at the same time.

to our global experience,” said

Moresby Electrical (PME).

In many cases, installing entrance

Mr Fisher.

Boon Edam Australia is part of the globally leading Boon Edam organisation, which specialises in

security technologies can be cashflow positive.” Boon Edam’s comprehensive

“For the first time in history, more people are living in urban areas than in rural ones in

Responding to local trends

PNG, with Port Moresby being the largest contributor to this

entrance security technologies for

suite of entrance security

At the PNG Security Congress

statistic. To meet duty of care

Fortune 500 companies, household

technologies includes Lifeline

(March 4-6 in Port Moresby),

requirements, companies in

names, Government and public

speed gates, Tourlock security

guest speakers from Paladin

these areas need to employ

and private institutions.

revolving doors and Circlelock

Holdings Pte Ltd and Black

adequate security measures that

high security portals.

Swan mentioned that PNG-based

protect staff and visitors to their

companies spend on average

building. This is an area where

Integrated approach to security

speedgates and bottom, left to

4-8% of operating revenue on

highly effective entrance security

“After attending the PNG Security

right, Tourlock security revolving

security, which is the highest in

technologies, such as those

Congress, it’s clear that the

doors and Circlelock high

the world, and four times the

supplied by Boon Edam, can not

industry wants to move away from

security portals.

regional average.

only achieve safety and security

Top, Boon Edam’s Lifeline

a ‘guns, guard and gates’ approach

“A general theme of the

outcomes, but also provide

conference was that security

cost savings compared with

integrated and intelligent approach

Local knowledge, global experience

was a necessary expense when

the old ‘guns, guards and gates’

to security can achieve better

PME has been operating

operating in PNG to ensure the

approach,” he said. n

results, whilst also reducing costs,”

throughout the country for

safety of staff and equipment.

said Mr Michael Fisher, Managing

more than 50 years, providing

Enhancing the cost-efficiency

Director, Boon Edam Australia.

vital electrical and engineering

and using security in the most

Contact: E: alastair.russell@

work for landmark projects

efficient way possible is top

boonedam.com.au

such as the Grand Papua Hotel,

of mind for PNG companies,

W: www.boonedam.com.au

where more is better. Instead, an

“Installing entrance security technologies can protect the front

securitysolutionsmagazine.com

For Further Information, Please

SECURITY SOLUTIONS // 85


PRODUCT SHOWCASES THE READY. SET. GO FACE RECOGNITION SOLUTION Cognitec’s FaceVACS-VideoScan product, currently in use in various major casinos across the globe, performs real-time matches against facial image databases, and analyzes faces to compute anonymous data about people count, age range, gender, and people movement in time and space. In short, Cognitec’s facial recognition system combines the multi-faceted aims of security and business insight in one comprehensive solution. But the software alone won’t produce optimal results. Venues are looking for a cohesive, integrated system that combines hardware, software, and services, and that integrates seamlessly into their existing systems and operations. Types of cameras, their positioning and tuning; high performance server choice;

setting up an optimal network infrastructure; configuration of the solution; funding and deploying the system—all these components play an important part. Making them work together, and supporting their continuous operation and maintenance, needs a specialist face recognition company with a proven track record in the gaming and entertainment industry. Security may be the top concern for a casino or club when selecting a face recognition system, but a safe environment for all customers and employees, a profitable business, and support from the community will provide true rewards for investing in this leading-edge technology. More information and contact: www.cognitec.com info@cognitec.com Phone: +61-2-9006-1510

DAHUA TECHNOLOGY LAUNCHES AI NVR SERIES WITH PERIMETER PROTECTION HANGZHOU, China / March 25, 2019 Dahua Technology, a world-leading video-centric smart IoT solution and service provider, has launched its AI NVR4000-I Series, including DHINVR4208-8P-I, DHI-NVR4216-16P-I, DHI-NVR4216-I, DHI-NVR4416-16P-I, DHI-NVR4432-I and DHI-NVR4832-I. Distinguished from mainstream NVR products with single AI function in the market, the Dahua AI NVR Series integrates perimeter protection and face recognition, providing customers cost-effective AI transformation and upgrading with high-precision safety guarantee while saving labor cost. Superior Perimeter Protection for Improved Alarm Accuracy With the outstanding perimeter protection function, the Dahua NVR4000-I Series can significantly reduce false alarm and bring higher accuracy performance to end-users. The ability of the new NVRs to filter out false alarms caused by animals,

86 // SECURITY SOLUTIONS

rustling leaves, bright lights, etc. enables secondary recognition of the targets, thus improving alarm accuracy. Besides, the NVR4000-I series is capable of analyzing targets based on deep learning algorithm to differentiate people and vehicles, therefore making retrieval more efficient. Advanced Face Recognition with Multiple Applications The AI-powered face recognition technology behind these products enjoys a high reputation in the industry, winning several first prizes in international competitions. Being acknowledged on performance for both efficiency and accuracy, Dahua Face Recognition offers realtime facial analysis by identifying, capturing and recording faces with powerful metadata. Combined with configurable multiple face database, common and stranger mode could alarm for suspects on blacklist, allowing passing for authorized

people on whitelist, also alert for approaching of strangers. Reliable AI Search for Enhanced Efficiency Powerful metadata is wellconstituted with feature attribute information extracted from target faces, such as gender, age, glasses, masks, beard and expressions, making it possible for users to select the appropriate channel, feature and similarity to search for eligible targets. Otherwise, users can also upload the face pictures of targets to NVR and compare them with the face database in NVR, so as to retrieve the relevant video captured by camera and find out the targets. Quick and handy search for a person of interest can be achieved through multi-channels and which significantly enhances accuracy and efficiency. In addition to the above features, the NVR4000-I Series combined with Dahua cameras will bloom more

powerful functions. For instance, working with Dahua ITC camera enables ANPR (Automatic Number Plate Recognition) for convenient entrance/exit management. Besides, people counting and heat-map are also available when matching Dahua IP camera. Furthermore, the NVR4000-I Series also supports ePoE & EoC to meet various needs of customers. Incorporating superior perimeter protection, advanced face recognition and reliable AI search, the Dahua NVR4000-I Series delivers excellent performance and high recording quality for IP video surveillance applications such as companies, retail stores, borders, villas, museums, dangerous areas and other small- and medium-sized scenes. With a mission of “Enabling a Safer Society and Smarter Living”, Dahua will continue to focus on “Innovation, Quality, and Service”, to serve partners and customers around the world.

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmedia.com/newsletter

EAGLE’s IWA 14-1 Crash Rated LOCKDOWN Swing Gate Elegant Simplicity The need for extreme risk perimeter defences is increasingly emphasised by hostile vehicle attacks in crowded public spaces, or toward high-profile targets. Where roadways require regular, intermittent or emergency access, complex systems are best avoided if at all possible. Many of the latest advances in systems proven to arrest massive vehicles at high speeds, have focused on increasing simplicity of design; less complex automation systems with fewer moving parts, fail safe systems, low MTBF (Mean Time Between Failure). In essence,

the good old KISS principle (Keep It Simple, Stupid). Eagle’s Lockdown Swing Gate provides massive strength and IWA test certified HVM capability – combining elegant looks with the simplicity of a farm gate. When comparing the cost of automated high performance HVB systems, let alone the risk of a complex system not performing to expectation in a critical situation; an HVB system that secures an opening width up to eight metres, manually operable by one person in seconds at less than half the cost of automated

systems, Eagle’s Lockdown is well worth considering. Fully removable posts mean it can be permanently or temporarily deployed. If required, just the closing post or indeed the hanging post could be removed. Installed on a foundation depth of only 420mm, the Lockdown’s tested credentials are impressive; IWA 14-1:2013 Gate V/7200[N2A]/64/90:0.9 IWA 14-1:2013 Gate V/1500[M1]/80/90:1.5 Key Features and Benefits • Tested on a 7.5T truck (N2A) at 64kph (40mph)

Tested on a 1.5T car (M1) at 80kph (50mph)

Very low penetration

Shallow foundation

Tested at 8m clear opening

Robust and rigid

Can swing in both directions

Various elegant designs available

Can be opened / closed by one person in seconds

For further information on the Eagle Lockdown Swing Gate system visit; www.ezisecuritysystems.com or call 1 300 558 304

Hills launches Reliance XRPro Hills has released the next generation in the Reliance series – the Reliance XRpro. Offering onboard IP communication and an optional 4G/ WiFi router module, the XRpro is NBN ready and offers a true monitored path via UltraSync™. It is also Z-Wave® compatible, allowing home automation via Z-Wave® compatible devices including lights, locks and thermostats. XRpro also supports camera integration and is backwards compatible with existing Reliance equipment. Using the UltraSync+™ app, users can remotely arm and disarm their security system, view live-streaming surveillance videos via IP and lock and unlock Z-Wave® powered door locks. For more details visit hills.com.au or contact your local Hills branch

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 87


PRODUCT SHOWCASES

ADELAIDE OVAL SECURITY UPGRADE

In today’s world it has become unfortunately necessary to design and implement physical security protection against possible terrorist or vehicle attacks wherever large number of people congregate or gather. High on this priority are stadiums and other sporting facilities which are likely to draw large crowds. While this is a worldwide problem the South Australian Government has taken a lead in Australia by initiating and protecting Adelaide’s premier and famous sporting facility The Adelaide Oval. The major threat is from Vehicles as a Weapon (VAAW) so the first step is to prevent vehicles being able to gain entry. This can be achieved by the installation of physical barriers and landscaping.

LEDA partnered with SADB in Adelaide to complete this $5m plus Hostile Vehicle Mitigation (HVM) upgrade for Adelaide Oval. Working together the complex project required installation of a wide range of PAS68 Bollards (static and retractable) and gates. This photo was taken on day of the first event following completion of the security upgrade when all the bollards went operational. The perimeter of the oval is now protected with a combination of PAS certified fixed (static) and retractable bollards. For more information please do not hesitate to contact your nearest Leda sales branch or call 1300 780 450. Visit www.ledasecurity.com.au.

MOBOTIX AND HEKATRON BRANDSCHUTZ: INNOVATIVE THERMAL CAMERAS COMMUNICATE WITH EXTINGUISHING SYSTEMS TO PREVENT FIRES IN PRODUCTION Langmeil, March 14, 2019 – Things get hot when pots and pans are polished in the production process at Kuhn Rikon, the number one Swiss brand for crockery and kitchen aids. Dust explosions can easily occur if the temperature rises above a certain threshold, which in the worstcase scenario can lead to significant fire damage and production outages. Initiated by ITES GmbH, MOBOTIX and Hekatron Brandschutz teamed up in a joint project to deliver 360° protection against this risk for Kuhn Rikon. MOBOTIX thermal imaging cameras are connected to the fire alarm & extinguisher control center Integral IP at Hekatron Brandschutz. The cameras monitor the production

88 // SECURITY SOLUTIONS

process for critical temperatures and intervene autonomously in the production process. Not only does the system trigger an alarm in the case of possible overheating, it automatically stops the production machine and starts the extinguishing process where necessary. In June 2015, overheated polishing plates caused a dust explosion at the Kuhn Rikon main facility in Rikon in the Töss Valley of Switzerland, precipitating a devastating fire that destroyed the production system and parts of the factory building. Together with the associated production outage, the total damages amounted to CHF 5.2 million (AUD 7.33 million). The production outage alone cost

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

the company CHF 1.4 million (AUD 1.97 million). “Luckily no-one was hurt, but the incident made us drastically aware that we urgently require reliable protection of our production processes that exceed the scope of normal fire protection,” explains Paul Brunschwiler, production technician at Kuhn Rikon AG. MOBOTIX M16 thermal cameras: Tailored programming and ideal prevention Project manager Mathias Stauffacher provided the convincing proposal of connecting the thermal cameras M16 Thermal by MOBOTIX with a fire alarm & extinguishing control center at the firm Hekatron Brandschutz: The M16 thermal cameras by MOBOTIX offer outstanding image resolution and enable precise monitoring of all danger zones within the Kuhn Rikon production workflow. In addition, the software package for the IP cameras allows tailored programming to suit the needs of the Swiss company. “We programmed all three escalation levels exactly: A warning for critical temperatures, production stop when the threshold is exceeded, followed by immediate initiation of the extinguishing process after the production shutdown to prevent any spread of the fire,” adds Stauffacher.

securitysolutionsmagazine.com

Kuhn Rikon: Significantly fewer production errors, production process boosted by 5% “The compatibility with MOBOTIX and Hekatron Brandschutz, as well as the user-friendly and low-maintenance system, convinced us 100 percent. Continuous, precise temperature measurement also allowed us to optimize our production process to ensure that we always operate at the ideal temperature and largely prevent any production errors. Overall, we managed to optimize our production process by around 5 percent and in doing so make the general working atmosphere more pleasant for our employees,” reports Paul Brunschwiler. “ITES GmbH is an expert for innovative fire protection and safety technology: “Our competency and experience enable us to develop and implement tailored, state-of-theart solutions for our customers. Our holistic approach offers our customers crucial added functionality,” says Alexander Iglhaut, ITES Director of Safety Technology. “MOBOTIX and Hekatron Brandschutz have very similar DNA. Both our companies develop their technology and also manufacture their products in Germany. The clear focus on premium quality hardware, software and services is confirmed in the successful

securitysolutionsmedia.com/newsletter

results of projects like this one,” emphasizes Christian Heller, Sales Director DACH at MOBOTIX AG. “The Kuhn Rikon project highlights the importance of a smart hard and software solution for fire protection and production optimization. Our intelligent safety systems make major contributions in other sectors as well, among them waste management or the petroleum and gas industries,” says Heller. “The incident at Kuhn Rikon plainly shows that fire protection for technical systems is extremely important as a ‘life-insurance policy’ for the company. Here, protecting the employees and the company’s output go hand in hand,” stresses Daniel Triebswetter, specialist for extinguishing system control at Hekatron Brandschutz. “The solution for Kuhn Rikon catches the eye with its simple connection of the MOBOTIX thermal image camera to the fire alarm & extinguishing control center Integral IP, as well as the smart fire management system – from production stoppage to triggering the extinguishing system.” About MOBOTIX MOBOTIX is a leading premiumquality manufacturer of intelligent IP video systems, setting standards in innovative camera technologies and

decentralized security solutions with the highest cybersecurity. MOBOTIX was founded in 1999 and is headquartered in Langmeil, Germany. Made in Germany, the company has offices in New York, Dubai, Sydney, Paris and Madrid. Customers worldwide rely on the longevity and reliability of MOBOTIX hardware and software. The flexibility of the solutions, the integrated intelligence and the highest level of data security are appreciated in many industries. MOBOTIX products and solutions help customers in industrial manufacturing, retail, logistics and healthcare, among others. With strong and international technology partnerships, the company is working on redefining the future. About Hekatron Brandschutz Ensuring the best possible protection of people and assets in emergency situations is and remains the driving force behind Hekatron Brandschutz in the area of fire safety for technical systems in Germany. Headquartered in Sulzburg in south Baden, the company has played a key role in shaping the development of fire protection equipment with its innovative products and services for over 55 years, while also accepting social responsibility and showing environmental commitment.

SECURITY SOLUTIONS // 89


PRODUCT SHOWCASES

SOUTHWEST MICROWAVE INTRODUCES IP-BASED DIGITAL MICROWAVE DETECTION SENSOR

Arizona, USA - Southwest Microwave has expanded its suite of intelligent microwave sensor technologies with the introduction of the INTREPID™ Model 336-POE Long Range Digital Microwave Link. This all-weather, IP-based POE detection sensor makes reliable perimeter security more accessible than ever¬ – coupling field-proven RF detection performance with secure network connectivity for increased system design flexibility and simplified sensor configuration and monitoring. With a range of 457 m, Model 336-POE is ideal for the protection of fence lines, open areas, gates, entryways, walls or rooftop applications. The sensor employs advanced digital signal processing (DSP) to optimize discrimination between intrusion attempts and environmental disturbances, mitigating risk of site compromise while preventing nuisance alarms. Proprietary algorithms recognize the unique profiles of intruders walking, running or jumping through the detection field, and offers enhanced crawl and vehicle detection. Designed for maximum protection against sabotage, Model 336-POE features heavy-duty components and packaging, plus integrated radome tamper switches to impede physical abuse. Sensor electronics are shielded against extreme sources of electromagnetic and RF interference, and protected against lightning induced surges. Employing a single Ethernet cable for data and power transmission, each Model 336-POE sensor operates as a unique network element, seamlessly integrating with other IP/POEdeployed perimeter security devices, cameras and access control systems. The sensor features an on-board Ethernet server that supports multiple ports and sessions.

90 // SECURITY SOLUTIONS

Graphical configuration of each device and monitoring of sensor status and control parameters are handled locally or remotely via an embedded browserbased Installation Setup Tool (IST), simplifying administration and diagnostics. Southwest Microwave Introduces IP-Based Digital Microwave Detection Sensor – p.2 Along with instantly triggering an alarm when a legitimate target is detected, the sensor alerts on enclosure tampering and on changes to microwave path alignment. A configuration security feature provides notification when changes to device settings are attempted, ensuring that only approved modifications are implemented. “This sensor has integrated security with convenience”, said Maira Zanrosso, Southwest Microwave’s Director of Sales and Marketing. “It successfully pairs Southwest Microwave’s superior microwave intrusion detection capabilities with the ability to query and manage a sensor, at any time, from any location, by any authenticated PC or handheld device connected to the network.”

Alarm monitoring for the Model 336-POE is handled via Southwest Microwave’s server-based POE control module (CM-POE) or through an available no-cost SDK that simplifies high-level interface to third-party physical security information management (PSIM) or video management systems (VMS). While DC power transmission over Ethernet is an important feature of this sensor, the primary benefit of the Model 336-POE is its IP connectivity for communications. “This sensor’s inherent network connectivity is a key differentiator,” said Zanrosso. “By offering our customers Ethernet-based configuration, maintenance and alarm monitoring, we’ve taken our industry-leading digital microwave technology to the next level.” Learn more about Southwest Microwave’s INTREPID Model 336-POE Long Range Digital Microwave Link at Perimeter Systems Australia Pty Ltd , visit www.perimetersystems.com.au or call +61 2 9150 0651.

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmedia.com/newsletter

SAAB RELEASES ONEVIEW 4

Inmate movement module– the Client Move Administration tab, showing list of enrolled assets and the selected asset details.

Client Move Operations tab -- details of last person to swipe their assigned card (left), a list of all currently swiped into the station (middle), and Actions menu for selected person (right) and their current trip status

Saab Australia has added three major features and boosted overall performance of its OneViewTM physical security management system. In release 4, Saab has included a new remote operation capability, a module for tracking inmates and visual dashboard metrics for measuring performance.

locations is monitored. If an inmate is delayed or detected in an unexpected location, an alarm is raised. Individuals or groups can be managed by the system. Assets can also be checked in and out through the system. Alarms, journals, reports (muster, metric and anomaly), and associated management tools are all integrated to warn security operators of breaches or potential issues that need investigation.

Key features and updates of OneView 4: • System of Systems access for remote site management • Inmate Movement module to track people and assets • Visualisation of dashboard data • Improved tools and overall performance • Updated drivers to extend subsystem performance • Interface refresh—updated ‘look and feel’ • Hotfixes from 3.5 have been incorporated System of systems for remote control Operators who have multiple sites with localised control rooms or run a networked operations centre can now operate OneView systems remotely. In OneView 3.4, the connect feature gave operators remote viewing capability. This has been extended to a full remote management capability where authorised operators can now not only view triggered events, but take

Data visualisation from the dashboard

securitysolutionsmagazine.com

action. This is a great feature that offers back up support to facilities with fewer resources and provides options for resource sharing, or a second pair of eyes for checks and balances. This new feature compliments OneView’s philosophy of being simple to operate—remote site monitoring is passive so operators aren’t inundated with multiple windows from satellite sites. Alarms triggered at satellite sites display in one single alarm summary control at the connecting master site. Connections view much faster and remote sites remain connected whilst the base site is monitoring it. Each facility provides access to what can or can’t be monitored and controlled remotely. They can also terminate the external control at any time. Inmate and asset tracking The inmate movement feature reduces the workload for corrections officers by eliminating the need to escort all inmates through facilities. With this function, inmates simply report to assigned stations to be identified and state where they need to go. Their intent is time-stamped in the system and they can move freely without personal security escorts. All routes and points are preprogrammed with time measured information, and inmate’s time travelling to or spent at various

Visualisation of dashboard data for performance and scheduling measurement Another feature appearing in OneView 4 is a powerful way to visualise system metrics in multiple forms. Quickly and easily interpret data from a range of visual pictograms like graphs, charts, histograms—select your preferred way to read information. Alarm summaries, user efficiency and system health status are just a few measureable metrics which can be read at a glance with this feature. Envisage journal data in near realtime to keep watch on the facility’s daily operations. Quickly analyse predictive trends or monitor situations with the new easy-tointerpret forms. Prevent hitting the threshold of nominated alarm types with financial penalties. Analyse device usage to plan and schedule predictive maintenance. For example, those with higher usage will need frequent attention while others can be flagged for routine maintenance testing. The flexibility of this feature is scalable and adaptable to each facility’s and users’ needs. Improved tools and overall performance Overall performance has been boosted to reduce memory consumption and speed up service start-up times. Data imports and configuration is much more streamlined. Operator workstations

process data faster when the configuration tool is updating to reduce the need to restart. Creating rules is also a simpler, faster process. The configuration tool deploys faster, has popup panels to support shared layouts, a document generator with loaded templates and the ability to see previews for each configured map before deploying. New subsystem integration and updated drivers The Open NMS network monitoring management system; Gallagher events and card reader systems (CardaxAE, CardaxCardReader); Bosch duress system; and Indigo CCTV system drivers have been updated to support data tags and higher availability or functioning capacity. The CellGuard (Austco) driver has been updated to now support master-to-master calls, and set masters in the unattended mode supporting OneView’s point control. Stentophon now adds functionality for calls, PA, master-to-master, push to talk, monitor, alarms, and journal events. The PcProx card reader can now publish card swipe details. Interface refresh The OneView client’s default theme has been updated to present a more modern ‘look and feel’. The OneView tools have also been refreshed, providing a more consistent experience across the whole system. A complete list of new features and supported sub-systems is this release is available from Saab Australia. More information Mandy Barlow Marketing Communications Manager Saab Australia 08 8343 3607 mandy.barlow@au.saabgroup.com

SECURITY SOLUTIONS // 91


PRODUCT SHOWCASES

THE POWER TO SECURE AND STREAMLINE YOUR VEHICLE GATES New Generation of UHF Readers Allow a Secure, Fast and Automatic Vehicle Identification

Vincent Dupart

Queues, congestion and miscommunication can cause delay and have a negative impact on business and the wellbeing of employees. STid - trailblazer and market leader in the design of secure & instinctive solutions - introduces SPECTRE, the first born of a new generation of long-range ultrahigh-frequency readers enabling fast vehicle identification process at the gate with the highest security levels. The most important reasons to embrace AVI solutions are the convenience, traffic fluidity and the security they bring. Vehicle access control based on traditional proximity, remote control or barcode, often results in people leaning uncomfortably out of their windows towards the reader to show their access credentials. Combining high security levels based on the latest industry standards, modularity making it adaptable to any field scenario and uncommon design, SPECTRE is the solution for all AVI applications. “This secure and smart solution has been designed in close collaboration with our customers to ensure SPECTRE reader meets the myriad of security requirements of a fast, automatic vehicle identification.” commented Vincent Dupart, STid CEO. “We are committed to make

92 // SECURITY SOLUTIONS

cutting-edge security solutions much easier for corporations and their employees, so instinctive and convenient that user adoption is guaranteed.” Instinctive Vehicle identification Based on the EPC1 Gen 2 standard and UHF passive technologies, SPECTRE rewrites traditional rules of security, making it more instinctive. The long-range reader offers unmatched reading distances up to 43 ft / 13 m and reliability for smooth vehicle access. According to STid, its outstanding performances makes SPECTRE the fastest reader on the AVI market. Smart and Upgradable Fully scalable and modular, SPECTRE enables to cover all security issues and all configurations, even in highly challenging environments. This evolutive reader is built to manage up to 4 driveways handling access of a mixed fleet of vehicles (light, heavy and motorcycles), the identification on wide lanes or even distinct access control for 4 lanes of vehicles. The solution can be tailored to customer’s needs, offering the best solution for any situation and ensuring that all features and security levels can be upgraded at any

time. Supporting a large variety of standard communication interfaces (Wiegand, Clock & Data, RS232 and RS485) and the OSDP™ industry standard, it enables seamless integration into any existing or new access control systems. For more fluidity, the reader can be controlled by ground loop or presence detector. The Highest Levels of Security The reader provides proven and unprecedented security, allowing users to sign UHF credentials, using encryption methods recognized by independent certification bodies in information security. This high security function enables faster authentication and prevents UHF credential cloning without compromising performance. Standing the Test of Time The enhanced vandal-proof structure withstands knocks and malicious acts. This weatherresistant reader is IP66-rated and designed for outdoor uses in harsh environments: vibration, dust, heavy rain, sea air… “. It’s the most robust reader on the market, yet intuitively easy to use and set up. We have developed user-friendly and free tools to configure the readers in few seconds via USB cable or UHF card“, adds Maé Tholoniat, Security Product Manager.

Its stealth design with strong lines ensures it integrates easily into the corporate environment for swift adoption. The wide range of customization options enables our clients to truly get the most out of this powerful communication tool. SPECTRE offers many smart features which make it the perfect solution for gates that require a combination of high security and convenience. “SPECTRE is the perfect blend of security, performance, reliability, flexibility and a unique design all in a simple solution. Reaching excellence to deliver best-in-class products is always a goal for STid. The continuous improvement and innovation are strong and shared values in our company. We have pushed our 22-years of know-how and expertise in SPECTRE”, concludes Vincent Dupart. Winner of a New Innovation Award at Expoprotection A jury of 9 end-user experts awarded SPECTRE from more than 30 participants in the “Risques Malveillance et Incendie” category for its ability to make UHF long distance identification both instinctive and extremely secure. www.stid-security.com

securitysolutionsmagazine.com


Sign up to our eNewsletter and receive up-to-date valuable information regarding all things Security.

www.securitysolutionsmagazine.biz/newsletter


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.