A U S T R A L A S I A’ S L E A DI N G S E C UR I T Y R E S OUR C E F O R BU S I N E S S A N D G O V E R N ME N T
APRIL 2019 ISSUE 116
WHAT DRIVES MASS SHOOTING?
Prepared to
support you
at every level.
Effective cybersecurity is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And it’s about partnering with a solutions provider who’s prepared to support you at every level. Which is where we enter the picture. We are 100% focused on cybersecurity, and we do everything in our power to mitigate its risks. We have strict requirements for our own products and we work diligently with our partners—and you—to fight this threat.
Learn about our layers of protection at www.axis.com/cybersecurity
V SA E TH E E AT D
GAIN YOUR COMPETITIVE ADVANTAGE AT AUSTRALIA’S LEADING INDUSTRY EVENT For over three decades the Security Exhibition & Conference has been the most established and respected trade event for the security industry in Australia, bringing together the full spectrum of manufacturers, distributors, security professionals and end users. Position your business and amplify your brand among the industry’s most powerful influencers. Network with the most established names, discover the latest technology and create profitable opportunities.
To book a stand contact the team Melissa Clendinen Event Manager 03 9261 4662 mclendinen@divcom.net.au
Lead Industry Partner
Abigail Ford Account Manager 03 9261 4650 aford@divcom.net.au
FIND OUT MORE AT
SECURITYEXPO.COM.AU #SECURITY2019 The peak body for security professionals
ISSUE 116
CONTENTS
86
FEATURES
44
26 32
74
50
cover story
In the wake of tragic incidents like the mass shooting in New Zealand last month, the first question many people ask is “why”? We struggle to comprehend what drives people to commit such terrible acts and, as security professionals, perhaps more so than the average member of the public, we find ourselves confronted with the realities of the situation. In this issue’s cover story, we sat down with Simon Brown-Greaves, former Manager of the Psychology Unit within Victoria Police, to better understand how and why these things occur.
60
26 BLAST DESIGN PRINCIPLES
There is a lot of interest of late in designing the built environment to protect against bombs. Considerable work has been undertaken and published by government organisations and professional associations alike. Don Williams, Author of Bomb Safety and Security: the Manager’s Guide takes you through a number of physical and procedural principles that can be used as design criteria for new sites.
36 DEFENDING AGAINST ELECTORAL INTERFERENCE
In January 2017, the US intelligence community released a public report detailing a Russian influence campaign, ordered by Russian President Vladimir Putin, “aimed at the US presidential election”. This highlights a significant problem and raises questions around how nations can prevent and defend against this type of activity in future elections.
58 HOW TO CURE PRISONS CONTRABAND MOBILE PHONE EPIDEMIC
Contraband mobile phones have long been a security and public safety concern for correctional agencies across the globe, and successfully detecting them before they do damage is one of the biggest challenges facing prison staff these days. How can we deal with this vexing challenge?
66 ARMS RACE BETWEEN MALWARE
RESEARCHERS AND MALWARE PRODUCERS HEATS UP
As malware becomes more complex and its producers become more sophisticated, traditional, manual approaches to classification and detection are no longer sufficient to protect organisations.
78 NO COOKING THE BOOKS – AUSTRALIAN TAXATION OFFICE CRACK DOWN ON WORKRELATED EXPENSE CLAIMS
REGULARS 06 LETTER FROM THE EDITOR 08 LEADERSHIP
Jason Brown examines the application of the ISO 31000 Risk Management Standard to security element by element.
10 CYBERSECURITY
Beware the zombie apocalypse!
12 MARKET ANALYSIS
Who are the leaders in the Video Management Space in Australia?
14 HUMAN RESOURCES
Are your casual workers really casual?
32 OPERATIONS
How do you find and retain your ideal cyber security professional?
40 BUSINESS
What do you need to do now, to prepare your business for sale in the future?
50 AVIATION SECURITY
Steve Lawson looks great ideas in aviation security that have not worked out quite as planned.
54 ACCESS CONTROL
We look at the top 7 trends for facial recognition in 2019
16 RISK MANAGEMENT
62 CCTV
18 COMMUNICATIONS
70 CYBER SECURTY
Kevin Foster explores threat vulnerability and risk assessments for buildings.
Crisis! What Crisis? Why Recognition is Critical.
20 THINKING ABOUT SECURITY
Don Williams looks at the realities of protecting people in crowded places.
22 EVENTS CALENDAR
A look at upcoming industry events.
How can we more effectively protect places of worship following the tragic events in Christchurch?
How do you find and retain your ideal cyber security professional?
74 PROFESSIONAL DEVELOPMENT
We look at the top 7 trends for facial recognition in 2019
82 LOSS PREVENTION
Learning how much we do not know is the first step to appreciating supply-chain risk management.
86 PRODUCT SHOWCASES
To help you claim the right amount at tax time, the Australian Taxation Office (ATO) has developed a tailored poster and occupation guide for guards and security employees. 4 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Series 400 is a fully welded 19” rack mount wall cabinet with heavy duty load carrying capabilities.
When you choose Australian made, you’re choosing more than quality and reliability, you’re choosing peace of mind.
DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS
MFB’s range of innovative racking solutions is proudly made onshore, to ensure quality and consistency above all others. Backed by constant development, unsurpassed customer support and expedited delivery. MFB proves a solid project partner whatever your requirements. Australian made, makes Australia. With a solid history of over 45 years of supplying innovative, off-the-shelf and custom built racking systems, you can rely on MFB to ensure when you buy Australian, you’re investing and supporting Australian industry.
AUSTRALIAN MADE MAKES AUSTRALIA
www.mfb.com.au
VIC NSW -
P (03) 9801 1044 P (02) 9749 1922
E sales@mfb.com.au E sydney@mfb.com.au
FROM THE EDITOR FROM THE EDITOR www.securitysolutionsmagazine.com
EDITORIAL www.securitysolutionsmagazine.com
EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon
Elizabeth Bodine-Baron, Jason Brown, Greg Byrne, Jamie Eddy, Nick Fitzgerald, Kevin Foster, Alex CONTRIBUTORS Ganin, Simon Brown-Greaves, Tony Jacques, Garry Barnes, Jason Brown, Greg Byrne, Kevin Mike Foster, Hayes, Nick RichardJustin Kay, Lawrence, Stephen Johnson, Richard Kay,Jordan, Steve Lawson, Scott Steve Lawson, Michael McGrath, Tim Rippon, O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Maurizio P. Scrofani, Ami Toben, DonShajkovci, Williams Ami Anne Speckard, Alex Sidernko, Ardian Toben, Simeon Votier
ADVERTISING Keith Rozairo ADVERTISING
Keith Rozairo PHONE 1300 300 552 PHONEkeith@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL keith@interactivemediasolutions.com.au
E D
arlier this month, I had the privilege of
With regard to Artificial Intelligence, Yann LeCun,
attending ISC West. Held in Las Vegas
director of AI research at Facebook, recently stated that
each April, ISCreally West take is recognised oes Australia securityas one of the largest security exhibitions seriously? Yes, Government claims in
"machines need to understand how the world works, Australian’s do have a very relaxed attitude a large amountthey of background knowledge, tolearn security because believe, rightly or perceive
the world and isto,undoubtedly largest security show and some the of the corporate in the US. This sector event serves as a showcase for many demonstrate a passing
the statethat of the at any happen given moment, wrongly, “itworld will never here”. and Thisbe able reason and we plan." is to a sentiment can only hope remains true.
companies who use the exhibition to launch new interest from time-to-time, but what of the product for theand year. average man woman on the street? Do we
Givenasthis of AI from someone who is However, theview old axiom states, one should arguably one of thebest mostbut informed and qualified people always expect the plan for the worst and
Without doubt, the largest trendoratdo thiswe, year’s honestly take security seriously as a
on the planet to speak on the subject, my guess is prepare to be surprised.
event was Across the hundreds nation, justartificial pay lipintelligence. service to the idea
there are few one companies funding, Of course, shouldwho not actually have tohave rely the upon
of security? new products on display, it quickly became clear of
resources anddevastating teams of experts required to master some form of incident to occur in
thatAs AIwe hadenter become the new arms race the security 2018, we should be in thankful that
as opposed market to AI.take So welcome the era of AI order to forcetopeople securitytoseriously.
market. Everything sophisticated recognition Australia has neverfrom suffered a majorfacial terrorist
Washing, wheredeal Artificial has become the There is a great that Intelligence the security industry
Jonathan Rudolph PHONE 1300 300 552 PHONEgraphics@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL graphics@interactivemediasolutions.com.au
incident likestoof 9/11,home the Boston systems the through simple securitybombings, products all
can do to educate business ‘must have’ sales the feature for anycommunity new securityabout product
the bombings of July 7, 2005 in London boasted an AI component designed to make or thethe product
the or benefits solution. of taking security seriously. In past
MARKETING AND SUBSCRIPTIONS MARKETING AND PHONE 1300 300 552SUBSCRIPTIONS
terrorist of October 12, 2002 inmore Bali.user or systemattacks more accurate, more effective,
issuesASecurity Solutions Editor-At-Large Rod few years ago, we witnessed the rush to be seen
PHONEadmin@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL AUD admin@interactivemediasolutions.com.au $62.00 inside Aust. (6 Issues)
However, a result, the Australian community friendly oras more secure.
Cowan hasenvironmentally written about friendly. how security can act asa as being “We are making
$62.00 AUD Aust. (6 (6 Issues) $124.00 AUDinside outside Aust. Issues) $124.00 AUD outside Aust. (6 Issues)
has become complacent with regard However,somewhat looking at the depth and breadth of
a differentiator business andwho givedesigned companies greener future” for cried companies security
ACCOUNTS ACCOUNTS PHONE 1300 300 552
to security. often hear many of our readers who products on Idisplay, I found myself asking at what point are security managers within large corporations does AI become BS? Seriously! Does my new front
a competitive edge.also help you monitor and manage a systems that could
DESIGN AND PRODUCTION Jonathan Rudolph DESIGN AND PRODUCTION
PHONEaccounts@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL accounts@interactivemediasolutions.com.au
PUBLISHER PUBLISHER
ABN 919463 ABN56561,606 606Joseph 919463 Blackburn, Victoria 3130 Level Level 1,34 34 Joseph St, St, Blackburn, Victoria 3130 PHONE PHONE 1300 1300300 300 552 552 EMAIL enquiries@interactivemediasolutions.com.au EMAIL enquiries@interactivemediasolutions.com.au WEBSITE WEBSITE www.securitysolutionsmagazine.com www.securitysolutionsmagazine.com DISCLAIMER DISCLAIMER
The of this this Thepublisher publishertakes takes due due care care in in the the preparation preparation of magazine and magazineand andtakes takes all all reasonable reasonable precautions precautions and makes the accuracy accuracy of of makesall allreasonable reasonable effort effort to to ensure ensure the material but is is not not liable liable materialcontained contained in in this this publication, publication, but for The publisher publisher forany anymistake, mistake, misprint misprint or or omission. omission. The does not assume any responsibility or liability for any does not assume any responsibility for any loss inaccuracy lossor ordamage damage which which may may result from any inaccuracy or use of of oromission omissionin inthis this publication, publication, or from the use information makes no no informationcontained contained herein. herein. The publisher makes warranty, any of of the the warranty,express express or or implied implied with respect to any material materialcontained contained herein. herein. The reproduced Thecontents contentsof of this this magazine magazine may not be reproduced inANY ANYform formin in whole whole OR OR in in part without WRITTEN in WRITTEN permissionfrom from the the publisher. publisher. Reproduction includes permission includes copying,photocopying, photocopying, translation translation or reduced to copying, to any any electronicmedium medium or or machine-readable machine-readable form. electronic form.
comment on the differences between attitudes doorbell really need AI? And what will AI bring to the to security in Australia and America, where equation with regard to my doorbell? How will itthey actually
If we have learned anything What fromthey tragic business’s power consumption. often failed events that have occurred globally in recentin the to mention was that most of the components years, it must that thenon-recyclable world has changed – system were be made from heavy metals
often to travel and work.using According many make have the product better beyond a buzzto word to security managers, Americans understand that sell more doorbells to people who have no idea what
permanently – and we cannot that would end up being land fillkeep with pretending a half-life of that it has not. 9/11 was not an isolated incident roughly a billion years.
terrorism is a clear and present danger and a they are buying or why? fact While of daily life and thus, treatas security I am only using thethey doorbell an example, it
and ifYes, groups ISIS have however, their way, I amlike exaggerating, yousuch get the point.
and security workers with the due respect. In serves to illustrate a point. When does something move contrast, they believe that Australian’s have a from being a useful feature to a term on a sales brochure very blasé attitude towards security and it is this designed to make dumb products sound smart? Judging attitude that makes us much more vulnerable by the number of AI driven products at this year’s ISC to attack. West show, the collective increase in intelligence across In my opinion, having recently travelled the security systems market has, in the last twelve through Egypt and Jordan, they are correct. months, transformed from a class of students with
attacks willtobecome much more There It is easy market something, butfrequent. far more difficult is a great deal more work to be done to ensure to master it in a meaningful way that actually makes a that we create the kind of effective security difference. So when evaluating the artificially intelligent culture within organisations and the broader security offerings, now emerging faster than one can community that will enable Australian’s to be count, perhaps we are best served to rely on our own, safe and secure. And the work must begin with mere mortal intelligence, to assess whether or not what security professionals. Let’s make 2018 the year we are being offered a solution that is really that different that Australia begins to take security seriously. n to last year? Or is it perhaps just that same thing with a
a solid C or B grade average to a collection of Mensa
few software updates and features now being called an
candidates wielding PhD’s.
AI engine? n
WRITTENCORRESPONDENCE CORRESPONDENCE TO: WRITTEN
Level1, 1,34 34 Joseph Joseph St, St, Blackburn, Blackburn, Victoria Level Victoria 3130 3130 1300300 300552 552 1300 enquiries@interactivemediasolutions.com.au enquiries@interactivemediasolutions.com.au
John Bigelow
PR O
SECURIT Y
PR
RALIA LTD UST FA RALIA LTD
Official Official Partners Partners O rigin a l Siz e Original Size
PR O
Y P R OV RYI TP R O V I D I D E E RCIUT
CU
SE SE
SECURITY
N
USTRA F SAT R A L L I A A OU IA
STRALIA LTD AU OF STRALIA LTD AU
SECURITY
O C I AT I ASS ON O C I AT I ASS O
RS
SPAAL SPAAL
OF
OF
PR O
RS
SSOCIAT RS A IO DE N SSOCIAT VI RS A IO DE N VI
D LT D LT
SECURIT Y
SSOCIATI ON O SSOCIATI RS A ON DE O VI
RS A DE VI
UST FA
O
Editor
blue colour changed to this colour green. blue colour changed to this colour green.
COPY/ARTWORK/TYPESETTING APPROVAL COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE Please proof read carefully of this material BEFORE signing your approval to print.ALL Please paycopy/artwork/typesetting special attention to spelling, punctuation, signing your approval numbers, to print. Please pay special to spelling, punctuation, dates, times, telephone addresses etc, asattention well as layout.It is your responsibility to dates, times, telephone numbers, addresses etc,Press as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman assumes no responsibility our attention anybeen corrections. Minuteman Press assumes responsibility for bring errorstoafter a proof has authorised to print and print re-runsno will be at your cost. for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................ Signed.................................................................. Date........................
// SECURITY SECURITY SOLUTIONS SOLUTIONS 46 //
John Bigelow Editor
securitysolutionsmagazine.com securitysolutionsmagazine.com
It’s as easy as 1two3 Three phases for construction keying
1 2 3 Construction keying is commonly used on site during the construction phase of building. A convenient way of providing continued security during the 3 phases of construction is to use pExtra construction keying. In simple terms, all cylinders are operated by the one key (Phase 1) during the construction phase. At “handover” the next stage key is turned in the cylinder blocking the Phase
1 key from working again. Once the apartment is sold, the owner would insert the key into the cylinder blocking Phase 1 and Phase 2 keys from working again. To learn more about our complete range of smart and secure access solutions, contact dormakaba. 1800 675 411 www.dormakaba.com.au
Phase 1 Construction Stage
Phase 2 Hand over to the developer/ real estate Phase 3 Hand over to the end user
LEADERSHIP
ISO 31000 RISK MANAGEMENT PROCESS ELEMENT n the previous article on using the ISO 31000 Risk Management Standard process element, the outline covered the general structure as applicable to general risk. In this article, the specific application to security is examined element by element. The risk management process should be an integral part of management and decision making and integrated into the structure, operations and processes of the organisation. It can be applied at strategic, operational, program or project levels. There can be many applications of the risk management process within an organisation and they can be customised to achieve objectives and to suit the external and internal context in which they are applied. The dynamic and variable nature of human behaviour and culture should be considered throughout the risk management process. Although the risk management process is often presented as sequential, in practice it is iterative.
I
Communication and Consultation The purpose of communication and consultation is to assist relevant stakeholders in understanding risk, the basis on which decisions are made and the reasons why particular actions are required. In the case of organisational security, communication seeks to promote awareness and understanding of risk arising from malicious actors, whereas consultation involves obtaining feedback and information to support decision making amongst all those who are responsible for developing and maintaining security controls or may be affected by them. Close coordination between the two should facilitate factual, timely, relevant, accurate and understandable exchange of information, taking into account the confidentiality and integrity of information as well as the privacy rights of individuals. Communication and consultation with appropriate external and internal stakeholders should take place within and throughout all steps of the risk management process, particularly when applied to security. Communication and consultation aims to: • bring different areas of expertise together for each step of the security risk management process. These include but are not limited to internal and external physical, cyber and
8 // SECURITY SOLUTIONS
•
•
•
•
personnel security advisers, law enforcement agencies, appropriate academics and security professional institutions. ensure that different views are appropriately considered when defining risk criteria and when evaluating risks. Views on security should be sought from human resources, facilities and business units. In addition, external nonsecurity stakeholders may need to be engaged should security controls impact on their operations. This could include organisations in the same precinct, emergency service responders (other than police), community groups and municipal authorities. provide sufficient information to facilitate security risk oversight and decision making. Information concerning current and potential vulnerabilities and the intention and capability of malicious actors should be available to all relevant decision makers, including some outside the traditional security channels, such as health and safety, auditors and finance, all of whom will consider themselves stakeholders. review security risks and improve processes and controls. The threats and the vulnerabilities are constantly changing and practitioners need to be closely following changes in their relevant environment to inform stakeholders and change controls where necessary. The risk management commitment should be communicated within an organisation and to stakeholders, to ensure that all stakeholders understand their shared responsibility for maintaining security and supporting security activities. build a sense of inclusiveness and ownership among those affected by security risks to maintain their commitment to and understanding of good security practice.
Scope, Context and Criteria General The purpose of establishing the security scope, the context and criteria is to customise the security risk management process, enabling effective risk assessment and appropriate risk treatment. Scope, context and criteria involve defining the scope of the process and understanding the external and internal context.
BY JASON BROWN
Defining the scope The organisation should define the scope of its risk management activities. In the case of security, it can be limited to protection from malicious actors. It is noteworthy that crisis management is often allocated to the security function. The scope could look something like: In our organisation, security risk management covers: • Preparation for events or incidents affecting organisational security, including arrangements for planning, capability development, resourcing, establishing contingency measures, etc. • Design, development and implementation of measures for the protection and preservation of its people, both internal stakeholders, and where appropriate its external stakeholders; protects strategic and operational relationships with other individuals and organisations; and assists people in responding to and recovering from the adverse effects of unplanned events. • Design, development and implementation of measures for the protection and preservation of property and assets under its control, including establishing measures to assist in the continuity and recovery of such property and assets. • Design, development and implementation of physical and logical measures for the protection and preservation of information under its control, including establishing measures to assist in providing continued access to such information and ensuring its ongoing integrity and validity. As the security risk management process may be applied at different
levels (for example, strategic, operational, program, project or other activities), it is important to be clear about the scope under consideration, the relevant objectives to be considered and their alignment with organisational objectives. When planning the approach, considerations include: • objectives and decisions that need to be made • outcomes expected from the steps to be taken in the process • time, location, specific inclusions and exclusions • appropriate risk assessment tools and techniques • resources required, responsibilities and records to be kept • relationships with other projects, processes and activities In the next edition, the article will cover security in the external and internal context and defining risk criteria. n Jason Brown is the National Security Director for Thales in Australia and New Zealand. He is responsible for security liaison with government, law enforcement and intelligence communities to develop cooperative arrangements to minimise risk to Thales and those in the community that it supports. He is also responsible for ensuring compliance with international and Commonwealth requirements for national security and relevant federal and state laws. He has served on a number of senior boards and committees, including Chair of the Security Professionals Australasia; member of ASIS International Standards and Guidelines Commission and Chair of Australian Standards Committee for Security and Resilience. As of February 2017, Jason has been appointed Chair of the International Standards Committee for Risk Management. Jason can be contacted at jason.brown@thalesgroup.com.au
securitysolutionsmagazine.com
The next generation in smart panels is here •
Compatible with existing Reliance equipment
•
Data stored on panel
•
Encrypted connections
•
NBN ready
•
Z-wave® compatible
•
Built in IP communication
•
4G / WiFi Module
•
True monitored path via UltaSync™
•
Native IP/camera support
Residential
Multi-Storey
Education
For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au
facebook.com/HillsLtd/ CONNECT
E N T E RTA I N
SECURE
Retail
Government
Aged Care
Warehousing
CYBER SECURITY
THE ZOMBIE APOCALYPSE IS ALREADY HERE! BY TIM RIPPON
Whilst dopamine creates a short-term
past. Additionally, when my
euphoria, this is not a replacement
children now play with their
for true happiness and, over time,
LEGO and Barbie dolls for
with excessive exposure this will
extended periods of time, they
re-wire your brain. So, essentially,
are chatting to themselves in a
the more you are exposed, the more
make-believe world, dreaming
you crave dopamine and become
and exploring amazing new
further addicted.
ideas and concepts – often with
So, how do we rewire our brain so this does not substantially
me joining in. d) And one final one for the end
impact who we are? Perhaps think
of the day – set your own
about and take on some of these
personal policy not to use a
suggestions, to help improve
mobile device for at least an
your lifestyle:
hour before you go to bed. Very
a) As a starter, consider
simply, turn off your device or
downloading an app that
turn the phone to flight mode
advises the amount of time you
at a set time each night. Give
are doing particular activities on
yourself time to wind down and
your mobile device; even better,
relax in the evening and you will
find one whereby you can set
get a much better night’s sleep.
limits. This will help you realise
These are only four of hundreds of
es, you have read that
stepping onto the train. Being early
how many hours per day you
ways to get your fulfilling life back.
right, the Zombie
in the morning, everyone was either
are online – it was a huge shock
Go on, give it a go. What do you
apocalypse is already
fast asleep, or they had their head
for me.
have to lose? n
here! Those of you
squarely placed in front of their
b) Have regular phone-free days.
living in regional or outback
mobile phone, headphones on
Yes, you will have to learn
Australia may be completely
listening to music, or glued to the
how to read a map again and
and trainer of cybersecurity and
unaware of this phenomenon taking
small screen on their device. Some
arrange where to meet people
business continuity. He holds a
place in our big cities, occurring on
were even using a tablet to catch up
in advance. You may even have
certified Master of Information
a daily basis, every minute, of
on TV or online videos on YouTube –
to get out of your comfort zone
Security (ISO 27001), certified Master
every day.
the consummate passive consumers,
and reach out to a stranger for
of Business Continuity (ISO 22301)
taking time out of their life that they
the time or directions.
and Lead Cyber Security Manager
Y
I am an avid cyclist who enjoys riding to work every day, taking in the sights and sounds of the 50-minute
will never get back again. This got me thinking about what
c) For those with young children,
Tim Rippon is an author, speaker
(ISO 27032) from PECB. Tim is
ask the question, “Do they really
actively involved in various industry
journey. I interact with car and
this must be doing to our brains,
need devices?”. I have recently
groups, including the Australian
truck drivers, who are typically very
and as a collective community. Our
implemented a ‘no device’
Women in Security Network (AWSN)
courteous and aware of those of
mental capacity surely must be
approach for my children,
and the Business Continuity Institute,
us pedalling along on two wheels.
reducing at a very rapid rate, with
so they do not use handheld
where he volunteered for five years,
I also warn other pedestrians that
the reliance so much on technology
devices with me in any way, or
including two years being a board
I am approaching and wish them
and the time spent online, away from
at any time. This change has
member of the BCI Australasia. Tim
a good day, sometimes striking up
deep and rich human interaction.
enabled us as a family unit to
is founder and director of elasticus,
some really amazing conversation
I learnt that, essentially, when
have a much more fulfilling
advising Australian-based executives
points so that we connect on a more
people are using devices, they are
relationship, as we now talk to
on how to best manage cybersecurity,
personal level.
building an addictive pleasure each
each other a lot more, play more
disaster recovery and business
time they get a notification, email,
board/card games and have
continuity prior to the occurrence of
work and was amazed at the sight
message or ‘like’ and the brain
some amazing conversations
a major disaster or crisis. He can be
that I was presented with when
releases dopamine into their system.
that never took place in the
contacted via mobile 0417 036 026.
Recently, I caught a train to
10 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Smart Vehicle Identification
Photos credits: Shutterstock - aressy.com 04/18 - 10917
New Spectre reader: Let the good go, kick the bad out. Without delay. Meet the challenge of fast-track security at your vehicle gates. Spectre’s UHF-based vehicle ID reader is the first of a new generation: discreet by design, flexible in its configuration, secure and encrypted in its communication. Our new long-range reader is built to perform for up to 4 driveways, even in highly challenging environments. It’s the most robust reader on the market, yet intuitively easy to use. Welcome to speed and security - in a single solution.
SCALABLE | SMOOTH | SECURE | AGILE | STEALTH | INSTINCTIVE
www.stid-security.com Security Meetings Trophées de la sécurité Expoprotection ISC West APS
MARKET ANALYSIS
ere, we look at Video
discovered interesting facts about
Management
the Australian market: after we put
Software (VMS)
in focus VMS brands only, there are
brands, which means
just 79 companies, which is just
that we excluded all the companies
about three percent of the total
that manufacture CCTV hardware
number of CCTV companies. This is
and left only pure software
far less than the worldwide average.
H
developers. We found nine major
The first place belongs to
VMS brands on the market in
Genetec, second to Milestone
Australia and New Zealand.
and March Networks is the third.
In order to build this chart, we
AxxonSoft, which started its
started with information about
international expansion just a few
3,973 companies that work in the
years ago, has also made it onto our
physical security market. Then we
list. The picture in Australia differs
filtered out companies that are
markedly from other countries. For
not related to CCTV and ended
example, in the US, Genetec is in
up with 2,342 companies. We
third place, with OnSSI in first. n C
M
Y
CM
MY
CY
CMY
K
12 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
NEW!
HUMAN RESOURCES
WORKPAC PTY LTD V SKENE [2018] FCAFC 131
BY GREG BYRNE
he case of WorkPac
employment was terminated and
casual employee under the relevant
Pty Ltd v Skene
he made a claim for his untaken
enterprise agreement.
[2018] FCAFC 131
annual leave. The basis of the
heard in the Full
claim was that he was not a casual
though employment commenced
Court of the Federal Court has
employee but rather an employee
as casual, it may become full-
confirmed the definition of ‘casual
working on a continuous and
time or part-time because its
worker’. This confirmation will have
permanent basis and therefore a
characteristics have come to reflect
dramatic ramifications for all
permanent employee.
those of an ongoing part-time or
T
industries that regularly employ
The court also found that even
full-time employment.
casual workers, including the
Discussion by Full Court
Australian security industry. The
There is no definition of casual
decision confirms that casual
employment in the Fair Work Act
The Impact of the Decision
workers are those who work
2009 (Cth), nor in any modern
The decision creates a problem for
irregular hours and have no
awards or enterprise agreements.
all employers in Australia because,
guarantee of ongoing employment.
The only definition of casual
even though an employment
On the other hand, WorkPac
employee lays in the common law,
contract states that the employee
confirmed that those workers who
which states that for a worker to be
is paid a casual loading, submits
have been employed on a regular
casual, there must be
timesheets and can have his/her
basis and with a degree of
• a system of irregular work
employment terminated on an
permanency are in fact full-time/ part-time workers and are entitled
patterns • uncertainty as to the period
to amass entitlements as per the
over which employment is
National Employment Standard
offered
hour’s notice, these are now not determiners to casual employment. Further, if employers employ someone under conditions
(NES) and the Fair Work Act 2009
• discontinuity
whereby the employee falls into
(Cth).
• intermittency of work and
the definition of full-time/part-
unpredictability
time, they could be exposed to the
Facts of the Case
By its very nature then, casual
liability of paying annual leave.
The brief facts of the matter of
employment involves flexibility
For example, WordPac was ordered
WorkPac Pty Ltd v Skene are:
in the employment relationship
to pay Paul Skene substantial
for both the employee and
entitlements, which totalled in
the employer.
excess of $21,000.
Paul Alexander Skene was employed by the labour hire company WorkPac Pty Ltd, which
This issue for the court to
supplied labour to various
consider in the Skene case was
Australian mining companies.
that he had a level of certainty,
Impact on the Australian Security Industry
long-term casuals, to examine
In early April 2010, Paul Skene
regularity and predictability
There are many employees of the
their status having regard to this
gained employment with WorkPac
about his hours and whether or
security industry who regularly
recent development. You should
Pty Ltd as a fly-in fly-out dump
not this made his employment
work Friday and Saturday nights,
examine the key features of their
truck operator at a coal mine in
permanent. During the hearing,
instruct in Registered Training
employment, including how regular
central Queensland. As part of his
the court found that even though
Organisations regularly one or
their work patterns are, how
employment, he signed a Notice of
Paul Skene had been engaged in
two days a week and have been
predictable and intermittent. If you
Offer of Casual Employment, which
what the employer considered to
doing so for a number of years.
believe your employees could be
stated his employment was casual
be a casual contract, he was, in fact,
These employees could actually be
considered part-time or full-time, I
and that he would be paid an hourly
working a regular roster of seven
accruing annual leave, sick leave,
advise you to speak to your solicitor
rate of $50. His work pattern was
days on and seven days off with a
parental leave, compassionate
and accountant and examine a way
seven 12.5-hour shifts followed
12-month roster in advance. Due to
leave, redundancy pay and public
through this. n
by seven days off. The roster was
this, it was determined that he was
holiday entitlements that they
made up 12 months in advance.
not a casual worker under the Act
are not aware of or have not
Two years later in April 2012, his
and nor could he be considered a
budgeted for.
14 // SECURITY SOLUTIONS
I urge all employers, if you have
Greg Byrne is the CEO and founder of MultiSec Consultancy.
securitysolutionsmagazine.com
The Cobalt is an innovative low voltage motor driven door lock for swing doors. It has been designed to secure double acting doors and addresses the two biggest issues in door locking; the ability to align a misaligned door and the ability to release when requested, even with excessive load on the door. The Cobalt successfully overcomes these issues and offers the user an array of other features. To learn more about our complete range of smart and secure access solutions, contact dormakaba.
T: 1800 675 411 www.dormakaba.com.au
More than just a lock
RISK MANAGEMENT
THREAT, VULNERABILITY AND RISK ASSESSMENTS FOR BUILDINGS
BY DR KEVIN J. FOSTER
A handbook currently being drafted specifically to address terrorism events that cause damage or harm to buildings is known as Standards Australia [Handbook] HB188. While many Australian Standards are drafted by committees whose members are representatives of professional institutions or of federal or state authorities, HB188 is being drafted by interested subjectmatter experts from a wide range of fields, including physical security, cybersecurity, threat assessment, vulnerability assessment, risk
S
tandards Australia
capability. The section describes how
attractive portable assets from
assessment, architecture, project
and the International
this concept can be used to assess
a university campus or a retail
management, building engineering
Standards
the threat and its likelihood.
environment. The kidnapping of a
and risk perception, but to name
child from a hospital is a different
a few.
Organisation have
It is important when conducting
published a wide range of risk
a threat assessment to consider the
threat probability from a carjacking
management and resilience
geographic contexts. For example,
threat in a busy inner city area.
on the terrorism threat and use of
standards. There are some very
the probable likelihood of a terrorist
Figure 4.5 in HB167 shows an event
extreme violence where the impact
useful handbooks and guides from
attack somewhere in Australia
tree which highlights examples of
is damage or harm to buildings.
these organisations that explain
does not necessarily equate to the
different threat types, the criminal
HB188 is likely to be particularly
how to implement the various risk
likelihood of a terrorist attack at a
acts that might follow, consequential
useful for the building owners and
management and analysis
public swimming pool in suburban
events, and impacts on people
facility managers of commercial
standards in particular contexts.
Perth. In some cases, the threat at
and organisations.
buildings, public buildings and
Some of these are very important
a specific site can be higher than
for security professionals.
a national threat alert level and
a vulnerability assessment to
an eye out for this handbook from
in other cases it can be lower; it
determine the likelihood that a
Standards Australia. I anticipate it will
Security Risk Management is an
all depends on the local security
defined threat source might be
be released in 2019.
essential guide. While it is in need
operational environment.
able to take advantage of a security
For example, SA HB167:2006
of an update to take account of the
At present, one of the difficulties
HB167 recommends conducting
The handbook will focus primarily
perhaps apartment buildings. Keep
Clearly, it would be beneficial if
vulnerability at a specific site, or in a
new Standards Australia handbooks
precinct, or perhaps across a region.
were available for a broader range of
content in ISO 31000:2018 and the
we have with conducting threat
current threat environment, HB167
assessments is that the individuals
is still an important tool for security
who pose a threat might not be
businesses, assets, information,
and were to include the impact of
decision making, especially:
known to the police and intelligence
facilities and buildings will be
terrorism and crime on people and
• Chapter 4 Identify Risk
community and therefore the
vulnerable in different ways and will
communities. n
• Chapter 5 Analyse Risk
location of a ‘lone wolf’ attack might
require customised approaches to
be difficult to anticipate.
threat and vulnerability assessments.
Section 4.4 addresses the threat
Different threat types can
Nations, communities, individuals,
threats, vulnerabilities and targets,
Dr Kevin J. Foster is the Chairman
Therefore, there is a need for
of the Risk Engineering Society in
assessment process, and reiterates
pose different threat likelihoods.
standards, policies, handbooks and
Western Australia and is Engineers
the long-established view that
Someone conducting a cyberattack
sometimes legislation to increase
Australia’s representative on
the threat posed by a nation,
with the intent of disabling critical
the effectiveness and efficiency
Standards Australia Committee MB-
organisation or individual’s
infrastructure poses a very different
of threat, vulnerability and risk
025 (Societal Security and Resilience).
behaviour can be assessed by
threat type and probability from
assessments where security threats
Kevin is also one of the many
considering their intent and
someone who intends to steal
are the source of risk.
contributors to the drafting of HB188.
16 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Inbuilt ÂŽ Wi-Fi , Z-Wave & 433MHz radio Quick & easy install
Control lighting, temperature + appliances
Remote monitoring & control via UltraSync app TM
Wide range of accessories
Future Proof
24x7 monitored solution
Live streaming with audio
The latest in wireless home security & automation. As the NBN rolls out across Australia, many alarm systems that utilised traditional copper-based landlines will become obsolete. ZeroWireÂŽ offers a future proof solution, utilising IP or 3G communication methods, Wi-Fi, Z-Wave and 433MHz radio to deliver a state-of-the-art security and home automation system, that can be controlled via the UltraSyncTM app on smartphone or tablet. HSS0046-Dec18-V1
For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au
facebook.com/HillsLtd/ CONNECT
E N T E RTA I N
SECURE
COMMUNICATION
CRISIS? WHAT CRISIS? WHY RECOGNITION IS CRITICAL BY TONY JAQUES
onsider the notorious
to reputation. But as British crisis
Jacques Nasser admitted before
top executives do not or will not
case of former FIFA
expert Jonathan Hemus has written,
a Congressional committee that,
hear bad news. What is needed
President Sepp
“You can only begin to rebuild
despite replacing tyres overseas,
is open, blame-free, upward
Blatter. When
your reputation if you recognise
Ford held off taking action in the
communication. In the wake of the
football’s governing body was
you have a problem. Denial is the
United States “because review of
famous Pentium chip recall crisis,
accused of corruption way back in
enemy of crisis management.”
its various databases assured the
Intel boss Andy Grove observed,
company there was not a problem
“Most CEOs are in the centre of a
C
2011, he famously responded,
Unfortunately, it is not as simple
“Crisis? What is a crisis? We are not
as it seems. A crisis is pretty easy
here”. The databases might have
fortified palace.” He said he had
in a crisis, we are only in some
to recognise when it is triggered
suggested ‘not a problem here’, but
been one of the last to understand
difficulties and these difficulties
by an emergency or major incident,
the eventual result was one of the
the implications of the crisis.
will be solved inside our family.”
such as a fatal mine accident,
largest tyre recalls in history.
Four years later, facing renewed
infrastructure failure, transport
allegations, Blatter was finally
disaster, warehouse fire or a
of a French airline following a plane
the most important early books
forced to resign.
product recall. However, it is much
crash which killed 87 people. Crisis
on crisis management when
harder to identify when an ongoing
authority Christophe Roux-Dufort
Steven Fink wrote, “You should
define reality, including whether
or slowly developing problem
says that, based on the fact that
accept almost as a universal
the organisation is facing a crisis.
has the potential to become a
the morning after the accident the
truth that when a crisis strikes it
This is a genuine skill, and it
crisis, or maybe already is a crisis.
level of seats reserved on their
will be accompanied by a host
requires judgement, leadership
Sometimes this is called a creeping
flights had not changed, the airline
of diversionary problems. As a
and honesty. Yet some senior
crisis, such as repeated computer
executive asserted that it was not a
manager, your task is to identify the
executives will try to emulate FIFA
security breaches, persistent
crisis at all.
real crisis.” n
and deny that a crisis is threatening
management misbehaviour
or has already happened.
over time, or a growing tide of
when senior managers attempt to
customer complaints.
deny there is a major problem. The
Issue Outcomes Pty Ltd. This article
A critical role for leaders is to
It is understandable that
Or consider the vice president
Yet it should not be like that. The reality was captured in one of
Two separate forces are at play Tony Jaques is Director of
first is a bias towards optimism
originally appeared on www.
declare a crisis, to claim that
Ford–Firestone crisis, when more
– the assumption is that nothing
issueoutcomes.com.au Tony can
everything is under control. Maybe
than 200 deaths were attributed
can go wrong and success is sure
be reached at Email: tjaques@
it is ‘justified’ by a desire to protect
to tyre failures, over half of them
to continue. The second force at
issueoutcomes.com.au Website:
the share price or to avoid damage
involving Ford SUVs. Ford CEO
play is wilful blindness – when
issueoutcomes.com.au
executives may be reluctant to
18 // SECURITY SOLUTIONS
Take, for example, the infamous
securitysolutionsmagazine.com
THINKING ABOUT SECURITY
IF MANAGEMENT OF THE SECURITY OF A BUSINESS IS A RECOGNISED NEED, WHY DO WE STILL NOT HAVE ADEQUATE AND APPROPRIATE MANAGEMENT LEVEL QUALIFICATIONS? BY DON WILLIAMS
aving just reviewed
best person for the position. Given
There are remnants of guard
This is not a new revelation.
the Certificate IV and
there is no expectation that the
training in the Certificate IV and
We have known for a long time
Diploma of Security
applicant will have a relevant tertiary
Diploma material. For example,
that most security consultants
and Risk
qualification, the job description
the Diploma competency on
and managers do not have
Management, a number of
is likely to reflect parallel low
workplace health and safety in
qualifications that will compare
considerations come to light. A
expectations for capability.
the security industry requires
favourably to other disciplines.
knowledge of restraints and
At the time of writing, the
H
primary one is that the Diploma
There are some security
remains, to my understanding, the
managers and consultants who
controls. The security manager
security training package is due
highest formal qualification in
have developed great knowledge,
should be more concerned about
for review. There needs to be
protective security other than the
skills and capabilities; these are the
what there are guards for, why they
acceptance that most students
degrees offered by Edith Cowen
professionals amongst us. Other
have restraints and to which risks
at the Certificate IV and Diploma
University. Despite much
employers still rely on the applicant
are the guards the appropriate
level are lateral entries and there
discussion, we still do not have
having worn a uniform.
risk management treatment? If
is a necessary disconnect between
there are guards on site with cuffs
training guards and educating
tertiary institutions offering
Another problem with the
degrees in the protective security
current training package is the
and sprays, the security manager
security managers and security
management discipline. We know
disconnect between Certificates
needs to be confident that they are
risk advisors.
there is plenty of literature on the
I, II and III and the Certificate IV
appropriately trained and licensed.
topic. We know there is a need for
and Diploma. Unlike most trade
Those who want to develop
well-educated and knowledgeable
progressions where a student
their knowledge and skills at
tertiary institutions that there is a
managers to provide advice to the
begins with base knowledge
the managerial level can obtain
need for, and a market for, degrees
executive, but we have yet to
at level 1 and progresses up to
professional certifications such as
relating to the management of
convince providers.
diploma, the security package takes
Certified Protection Professional
security. n
security guards through levels 1
(CPP), Physical Security Professional
educational requirement for a
to 3 and, while some may progress
(PSP) and the IT security
security consultant is the Certificate
from there, most undertaking
equivalents. They can develop their
is a recognised thought leader in
IV. No other field of management
the Certificate IV or Diploma are
own libraries and contribute to
security, emergency management
advice would rely on such a low
lateral entries. It is not, nor should
the literature through professional
and related disciplines. His book,
level of education and accreditation.
it be, a pre-requisite to have been
publications and journals but,
Bomb Safety and Security: the
In-house consultants do not require
a guard before learning about
without looking overseas, it is
Manager’s Guide, is available from
any formal qualification; here, the
security management and security
difficult to obtain additional
Amazon. Don can be contacted at
onus is on the employer to select the
risk management.
formal qualifications.
donwilliams@grapevine.net.au
In most jurisdictions, the
20 // SECURITY SOLUTIONS
We need to continue to consider how we can convince Australian
Don Williams CPP RSecP ASecM
securitysolutionsmagazine.com
CIRCLELOCK
TOURLOCK
SPEEDLANE LIFELINE
TURNLOCK
The full entrance security product suite Boon Edam Australia is uniquely positioned to offer a full entrance security product suite. Ranging from full height turnstiles and speed gates, through to high security revolving doors and portals, Boon Edam has your entry secured. Find out why the world’s biggest names, including Fortune 500 companies and government institutions, rely on Boon Edam for their entrance security.
ASK US ABOUT INNOVATIVE NEW LEASING PLANS AVAILABLE ON ALL ENTRANCE SECURITY PRODUCTS.
Boon Edam Australia 1300 689 905 www.boonedam.com.au
EVENTS
reissue to address ‘whole of work life assessment’. The Australian Standards Technical Committee for Security and Resilience will be leading this work and members will be in attendance. An outcome of the workshop will be a model plan transferable to your work place. Visit safeguardingaustraliasummit.org.au to register or for more information. n
Safeguarding Australia 2019
will be visiting from France to
and contributing to a good practice
IFSEC International
address the threat and response in
model for addressing the issues
18-20 June 2019
8–9 May 2019
espionage in international defence
outlined in the workshop. The
ExCel, London, UK
QT Hotel, Canberra
and security industry. Pierre has
workshops will require some
Beyond an internationally
Confronting and Countering the
extensive global experience in
background and pre-reading for
esteemed product showcase, IFSEC
Threats from Espionage, Foreign
both private and government
participants to get the best from
International is Europe’s centralised
Interference and Subversion
sectors and leads internationally
the immersive program:
gateway to the critical security
on protective security and
• Cybersecurity – defeating
conversation. Amidst mutating
Now in its 16th year, Safeguarding Australia – the nation’s longest running and
crisis management. Academic and policy input
the foreign and domestic
threats, the integrated path to
adversaries
achieving global safety starts
most influential national security
to the key topic is coming
This in-depth workshop will
with IFSEC.
summit – brings government and
from Professor Rory Medcalf,
examine the nature of the
• Access inspiring high-level
industry together to counter the
Head of the National Security
threats, targets and operations
panel debates from government
threats facing all Australians.
College, supported by Associate
of foreign adversaries. It will be
and industry influencers,
Safeguarding Australia will unite
Professor Matthew Sussex, who
limited to citizens of Australian
and join the collaborative
international and Australian
will be addressing the subject
allied countries which have
conversation between installer,
experts to explore the issues
of Democratic Resilience and
security agreements with
in this space, considering the
Foreign Influence: lessons for and
Australia. The workshop will
past, present and future of
from Australia.
develop models for detecting,
solutions you need whilst
preventing and responding
raising your anxieties with the
welcomes the agreement from
to cyberattacks and look
experts behind every innovation
Australia Summit 2019,
the FBI and US State Department
in detail at the NIST Cyber
Confronting and Countering the
who will be contributing in the
Security Framework, ISM
Threats from Espionage, Foreign
area respectively on the cyber
Essential 8 and UK Cyber
security solutions against
Interference and Subversion, has
aspects of Counter Intelligence
Essentials. It will be facilitated
rigorous, real-life testing zones,
attracted a range of international
(CI) in the region and measures the
by leading government,
including attack scenarios
and local key senior security
US Government uses to protect
academic and private sector
professionals who will be
our staff and information from
cybersecurity specialists.
presenting at the Summit.
CI concerns.
security response. The theme for Safeguarding
The Program Committee is
The Summit Committee also
Safeguarding Australia
• Insider Threat – people and the
integrator, end-user and vendor. • Discover the high-quality
you hope to procure. • Draw impartial verdicts for
and surveillance. • Research the inspiring ways you can adapt to the changing
culture of security
tides of tomorrow’s security
pleased to announce participation
2019 will feature one and a
This in-depth workshop will
challenges and equip yourself
from one of our key international
half days of plenary sessions,
consider the best models for
with the tools you need to move
speakers, Elizabeth Bodine-
followed by two highly focused
an insider threat program and
Baron, an engineer specialising in
immersive workshops offered
work through what may be
• Network with the global security
complex networks and systems at
as an elective on the afternoon
the best approach for your
industry whilst sophisticated
RAND Corporation in the US and
of Day 2, following conclusion
agency and business. It will
partnerships and inspiring
co-author of Countering Russian
of the main conference at lunch.
also examine the current
collaborations kickstart under
Social Media Influence.
This is a programmed activity
Australian Standard 4811
where all participants are actively
Employment Screening,
Visit www.ifsec.events/international/
engaged in analysing the issues
which is to be reviewed for
for more information. n
Pierre Pasinetti, the Vice President of Security for Thales,
22 // SECURITY SOLUTIONS
forward with certainty.
the same roof.
securitysolutionsmagazine.com
THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.
NEW!
ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.
+61 (3) 9544 2477
email: oz_sales@takex.com
HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.
BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.
INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.
OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .
1300 319 499 csd.com.au www.takex.com
TAKEX AMERICA
VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta
EVENTS
Security Exhibition & Conference 2019
to see some interesting new
mines, commercial buildings,
smartest ways our built environment
innovations as well as a host of
residential towers, building and
can help us realise our full potential in
24–26 July
new attractions.
development; the best of the best in
Australia's leading showcase of high-
a world- class offering:
performing facilities, and intelligent
• intelligent CCTV, access control
living and work spaces.
International Convention Centre,
Make sure you put the dates
Darling Harbour, Sydney
in your diary. We look forward
In 2019, the Security Exhibition
to seeing you again in Sydney in
& Conference is heading back
2019 for the Security Exhibition &
to Sydney.
ASIAL Conference!
The Security Exhibition & Conference is the industry’s annual
Visit securityexpo.com.au for more information. n
opportunity to reunite for three
and alarms systems • advanced video surveillance solutions
Our 2020 event will feature a Smart Zone designed as a thriving hub of technological innovation
• intelligent traffic solutions
which presents new technologies
• asset management systems
and solutions to help you create
• drone capability
smarter, greener buildings. The new
• software cyber management
zone offers visitors a dedicated
days of quality networking and
PNG Security Congress
unrivalled education alongside a
2–4 March 2020
showcase of the most innovative
Port Moresby, Papua New Guinea
• innovative video intercoms
and cloud-based solutions to
solutions to the Australian
Now is the time to plan to attend a
• large enterprise systems
improve operations and deliver
market. For over three decades,
world-class security and technology
• mechanical locking integration
business value.
it has been the largest and most
conference and exhibition –PNG
established commercial event for
Security Congress.
the security industry in Australia,
Security industry specialists and
solutions
with electronic security solutions
environment to look for integrated
According to industry research,
• emerging technologies
IoT technologies will be more
Visit pngsecuritycongress.com/
pervasive in smart commercial
bringing together the entire
professionals will converge on Port
register to register or for more
buildings than anywhere else
supply chain of manufacturers,
Moresby, PNG, in March 2020 for this
information. n
over the next three years. This
distributors, security professionals
premier security industry event, with
and end-users to connect
a security conference and exhibition,
Total Facilities
visitors industry-class solutions
and create unparalleled
real-world challenges presented and
22–23 March 2010
and strategic advice on how to
business opportunities.
a glimpse into the future of global
Melbourne Convention & Exhibition
use technology and data to better
security integration and trends.
Centre, Melbourne
understand and manage their
Total Facilities is Australia's most
building performance.
The entire team is looking forward to once again reuniting
The Congress will feature
zone is designed to deliver to
with more than 4,500 security
electronic security and safety
important facility management
professionals and over 150 leading
solutions for aviation, banking,
event. Explore an Environments of
au for more information for more
suppliers. The 2019 show is set
infrastructure, industrial sites,
Excellence and discover the latest and
information. n
24 // SECURITY SOLUTIONS
Visit www.totalfacilities.com.
securitysolutionsmagazine.com
YO UR AC CES S TO REVO LUTI O N
FlowMotionÂŽ
For more information | 1300 364 864 | info@magnetic-oz.com | www.flowmotion-access.com |
FEAUSRE
BLAST DESIGN PRINCIPLES
26 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
BY DON WILLIAMS
There is a lot of interest of late in
of explosive from 100s of
designing the built environment to
kilograms to 10s.
protect against bombs. Considerable
o Use landscaping and so on to
o Provide clear site lines for staff and CCTV. o Ensure street furniture,
access ways to channel blast can be considered. o The nature, strength, fixing
work has been undertaken and
limit how close vehicles or
plantings and other items are
and location of signage, street
published over many years by
large items can be placed near
designed to make observation
furniture, landscaping and
organisations such as the US Federal
the asset.
and searches quick
so on should be considered
and effective.
in relation to potential bomb
Emergency Management Agency (FEMA), Department of Defence (DoD), UK Centre for the Protection
o Provide public parking away from key areas. o Restrict parking that is close to
o Train staff on identification and reporting of items
locations as they can result in ‘secondary fragmentation’.
of National Infrastructure (CPNI)
critical controls and functions
as well as professional associations
of the site or allocate close
such as the International
parking spaces to employees
Protecting critical features
adjacent to a location where a
Association of Protective Structures,
and others where there is some
of the site from blast effects
bomb may be placed.
the Institute of Explosives Engineers
degree of confidence.
(including fragmentation):
and ASIS International. There are a number of physical
o Ensure critical controls and
considered to be out of place.
o Ensure that hazardous material is not stored at or
o Where distance between
Allowing emergency access after
functions for the site are
critical functions and areas
an incident:
and procedural principles that can
not located next to places
where a bomb may be placed
o Ensure the design allows
be used as design criteria for new
where a bomb can be placed,
cannot be provided, the
emergency service personnel
sites; some may also be applied
for example, adjacent to
intervening walls and ceilings,
and equipment to access
to existing sites. The term ‘asset’
public areas.
for example, can be hardened
the site after an incident
to limit blast damage.
when normal routes may not
is used to indicate the thing(s) deemed worthy of protection: staff,
Limiting where a bomb can
the building, the controls/utilities/
be located:
amenities of the site, items on
o Sound design with matching
display, VIPs and so on. It is essential that assessment of blast effects be in relation to realistic bomb weights. For
processes can significantly
o Design can assist with channelling blast away from specific areas. o Poor design can result in
limit where a bomb can
blast being increased due to
be placed.
reflection or containment.
o Access controls can limit what
• Reducing injuries from
be available. o Ensure that on-site emergency materials are located in places where they are unlikely to be affected by an incident, possibly in multiple locations. o Ensure appropriate and
example, consider that a 5kg weight
is brought into controlled
can be held in an outstretched arm,
areas, particularly back-of-
10kg held by the side of the body
house areas where critical
are to the eyes from projected
It should be acknowledged
and 20kg is a heavy load probably
controls and functions
glass particles. Where there
that where there is free and
on wheels. Some of the larger bomb
are located.
are large glass areas in public
unrestricted access by the public,
places, consideration should
it is not possible to prevent
sizes often proposed are neither
o Use of cloak and storage
building materials: o Many blast-related injuries
realistic evacuation routes and assembly areas are provided.
realistic (consider probable rather
rooms can both limit where
be given to the type of glazing
items of between 5 and 10kg to
than possible) nor can they be
items can be placed and act as
laminate and/or the use of
be carried or 20kg if on wheels.
defended against.
deterrents. The proximity of
protective films.
Therefore, without a 100 percent
To protect against bombs, the following principles must
critical functions to such rooms must be considered.
o Where large glass or decorative
effective search of all items at both
panels are used, the potential
front and back-of-house, there can
o Depending on the nature of the
method of failure should be
be no certainty that a bomb or
built environment:
site and event, controls may be
assessed, for example, will it
other weapon can be detected and
Maintaining distance:
put in place to limit what the
pivot from the top or bottom
prevented. n
o Limiting the proximity of a
public can bring in.
(depending on how large a
be considered in designing the
bomb to the asset can reduce
bomb can be placed where)
the effect of an explosion
Making it easy to identify items
and hence the number
which are out of place:
of casualties.
o Ensuring public and back-of-
Don Williams CPP RSecP
and what will be the resultant
ASecM is a recognised thought
effect on the crowd?
leader in security, emergency
o Design to prevent ‘progressive
management and related disciplines.
house areas are easy to view
collapse’ should a structural
His book, Bomb Safety and Security:
can restrict the size of a
and search makes detection of
element be damaged is now a
the Manager’s Guide, is available
bomb that can get close to
potentially hazardous items,
common design requirement.
from Amazon. Don can be contacted
the site, reducing the amount
such as bombs, easier.
o Vehicular access controls
securitysolutionsmagazine.com
o The potential for corridors and
at donwilliams@grapevine.net.au
SECURITY SOLUTIONS // 27
FEAUSRE
RECREATIONAL OUTRAGE BY DON WILLIAMS
28 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
One of the interesting things
the most inconsequential and
offended. Talking truth to power
might it occur in the corporate
about delivering courses for a
innocuous things. Furthermore, if
has always been dangerous, but it
world, particularly to those who
reputable provider is reading the
they cannot find personal offence
now appears that talking truth to
must state the unpalatable?
student critiques. Having revised
in a matter, they will happily take
anyone can result in being ‘outed’
and delivered the Diploma of
up the torch and become offended
as insensitive and offensive.
Security and Risk Management,
on some else’s behalf – even when
the student feedback was
the supposedly aggrieved victim is
situation in which an employee
upon a time, if someone felt truly
particularly important.
not actually offended.
complains to management that
offended to his very core based on
his partner was informed that the
the belief that his righteous view
Students can choose to
The other point of interest is
To provide context, imagine a
What is unclear is when we went from righteous indignation to ‘recreational outrage’. Once
provide their names or remain
the need to do so anonymously
office where he works could be
of the world had been attacked,
anonymous; in either case, the
(I checked – not for the name
subjected to workplace violence.
he could be indignant. It was
presenter has no visibility of who
but just to see if one had been
Or that he has been told the
expected that this person would
said what. A student commented
provided). At no time during the
reason things are locked away in
respond visibly and formally,
that one of the guest lecturers
10 days of presenting did anyone
the workplace is because there is
even forcibly, with the courage
made offensive comments, which
suggest that the tone, content or
the potential that someone in the
of his convictions. It was not an
I found surprising as, having sat
delivery were inappropriate or
building might take something,
enjoyable exercise and required
through the presentations myself,
of concern. If they had, the issue
thereby implying that there are
personal commitment.
I failed to note any offensive
could have been addressed and
dishonest people in the building,
comments. That said, I am old
the content of concern reviewed
which the employee finds to be
achieved an almost universal
and opinionated, so perhaps I
and, if necessary, adjusted. Just
an offensive concept. Or, the
state of recreational outrage
missed it. Thinking back on the
because a complaint could have
reason someone needs a specific
where anyone can find or actively
course, I can only assume that the
been raised does not mean
clearance before accessing
seek offence, whether against
complaint was made in reference
the material must be changed.
particular information is because
themselves or on behalf of others.
to one particular presenter who,
Sometimes the material is correct;
it is necessary to ensure he or she
Researching recreational outrage
in my opinion, was not so much
it is perception that must be
is a fit and proper person – or,
suggests the common features are:
offensive as honest. Perhaps blunt
addressed. As someone said,
perish the thought, he/she fails the
enjoying the experience of venting
truth has become offensive to
“Because you are offended does
assessment and is found not to be
on a topic; enjoying a position of
some people?
not mean you are right.”
appropriate. How offensive might
moral superiority; not necessarily
that be?
being directly involved or affected
The same student also
Offence is in the ear of the
Now, it appears, we have
suggested that some of the
beholder. What one person
comments made during the
hears as true may be unpalatable
telling the truth as we see it; do
on behalf of others; anonymity
course may have caused offence
to another. Because it differs
we stop advising on the reality of
or diffusion amongst a crowd –
to the military members present.
from the hearer’s view does not
threat vectors; do we stop pointing
for fear of being labelled a troll.
I also find this perplexing as,
mean it should automatically be
out vulnerabilities and exposures
Exceptions are those who have
while I had avoided telling my
considered offensive. Unless of
because someone may be
made a vocation of calling out
rude jokes about the Air Force, I
course the hearer is offended by
offended, or may think someone
behaviour, comments or opinions
did state that wearing a uniform
the fact that others have differing
else might be offended? Obviously,
that they see as being actually or
is not a security qualification
opinions, experiences and
we cannot stop doing our jobs – or
potentially offensive.
and noted that the military are
world views.
so we think. An internet search
trained to write in a concise
By now, readers are possibly
Do security professionals stop
by the issue but willing to speak
“Outrage is currently
of “academics afraid to speak”
America’s deepest core
rather than literary manner. For
wondering what, if any, relevance
will bring up reports from the
value – and it shouldn’t be,”
whatever reason, this may have
all of this has to security
UK, US, Canada and Australia on
stated Dylan Gallimore on the
caused offence?
management. The answer is
academics limiting their opinions
Arcmedia website. Gallimore
quite simple. It often falls upon
and teaching so as not to be
claims, “Psychologists have
with some interest upon the
the security manager to take
shamed, harassed and humiliated
increasingly warned of the
notion that there appears to be
responsibility for pointing out
on social media and in student
dangerous pleasures of outrage…
a growing section of society who
things that may be unpopular
forums for being offensive in one
Additionally, outrage is a social
is not only easily offended, but
and making statements which
form or another. If it can happen
emotion; it compels individuals to
almost eager to find offence at
could cause the susceptible to be
in the academic world, how easily
express their outrage publicly in
All of this leads me to reflect
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 29
FEAUSRE
search of validation and solidarity.
then we can seek to understand
Which means that while
the cause of the offence and try to
outrage remains a response to
placate them. Or, accept that there
perceived injustice, it can also be
are those who want the ‘buzz’ that
a self-serving emotional defence
comes from venting their moral
mechanism deployed to alleviate
superiority at the cost of others.
guilt, buffer threats to one’s moral
Perhaps we should be offended by
identity and portray oneself as a
their offensive behaviour?
very good person in the eyes of one’s peers.” Another online search for
Perhaps more people need to remember the adage, “A gentleman (or gentle person) is
addiction to outrage brings up
someone who is never deliberately
many refences; there are even
rude.” The right to tell someone
books on the subject of breaking
what you think should never
the addiction to outrage. It
be removed, but courtesy and
appears frequent bursts of outrage
politeness should always be
become addictive and, like most
employed, even when pointing
addictions, leads to a release of
out errors.
endorphins that make the person
Other than the issues above,
feel good. The more they vent the
the student critiques are good.
better they feel. Security offers just
It appears most stayed awake
another target-rich environment.
most of the time and if any did
Certainly, written and verbal reports of security issues must be
fall asleep, I would not have been offended. n
objective, professional, impersonal and polite. They must also be
Don Williams CPP RSecP
factual and honest. If people take
ASecM is a recognised thought
offence, we can ask them to argue
leader in security, emergency
the facts, not the emotion. Here
management and related
is the rub – offence is emotive. If
disciplines. His book, Bomb Safety
the concern was over the data or
and Security: the Manager’s Guide,
analysis, it can be discussed. If
is available from Amazon. Don
someone claims to be offended or
can be contacted at donwilliams@
believes others might be offended,
internode.on.net
30 // SECURITY SOLUTIONS
“All of this leads me to reflect with some interest upon the notion that there appears to be a growing section of society who is not only easily offended, but almost eager to find offence at the most inconsequential and innocuous things.”
securitysolutionsmagazine.com
OPERATIONS
SCENARIO TRAINING
REALITY TRAINING FOR OPERATIONAL COMPETENCY BY RICHARD KAY
32 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Much of the training for the development of operational
between tactical response options. A key issue with scenario
the absence of proper training,
name, which can cause confusion
agencies can spend time and
for participants.
skills is done in clinical training
training is that it looks easy.
money defending lawsuits, paying
environments to assure safety
The current training paradigm
workplace compensation claims,
Primary Categories
and reduce agency liability from
often uses brief training sessions
or absorbing lost man-hours from
Conventional ammunition
training injuries. This philosophy
with high participant/instructor
injuries. Properly structured
(CA) is commonly referred to as
is facility driven (what can be
ratios. Agencies buy gear, grab
training reduces these costs
live ammunition and designed
done safely), fractured (classroom
a couple of role players, throw
by avoiding the situations that
for conventional purposes –
thinking, gym fighting, range
some participants into a few
cause them. Agencies adopting
destroying things in a relatively
shooting) and in static/linear
loosely structured situations and
comprehensive scenario training
reliable fashion.
training environments (shooting
see what they do. Agencies often
experience a decline in officer
in a single direction).
fail to acknowledge they might
injuries as well as a reduction
(LTA) is specially designed to work
Lethal training ammunition
Training is structured so
benefit from learning about
in complaints and lawsuits
in unmodified weapons and has
participants are told what to do
the complexities of scenario
from citizens. If the program
muzzle energies similar to or
rather than taught how to think,
training. Common reasons for this
trains officers to respond more
greater than CA. Many products
and stems from getting personnel
resistance include the following.
effectively and avoids unnecessary
in this category were designed to
through training for qualification
Liability considerations:
costs from workplace errors, the
make a more affordable product
to a mandated standard. This
if someone is hurt during
value per dollar spent for scenario
for training purposes by reducing
does little to advance individual
training, the question is whether
training against existing training
logistical requirements or to
skills that training is designed
instructors were reasonably
programs pays for itself.
permit live-fire training in settings
to perfect. Operational safety
trained in the use of equipment
becomes a secondary concern to
Safety considerations:
that might be incompatible with
and methodology, but there is
hurting people during scenario
CA. These designs are capable of
training safety, but they function
no necessity to get that training
training to the extent that it
wounding like CA, and include
at direct odds with each other
directly from the manufacturer,
causes program termination
frangible ammunition.
given that training behaviours
as long as it comes from an
indicates training was being
are counterproductive to safety
organisation providing adequate
done incorrectly. If instructors
ammunition (ERIA) is designed
in operations. Procedures that
training in safe product use.
are educated to set training
as a compliance option for suspect
up properly and allocate the
control, and is often placed on the
reduce training hazards condition
Instructor expectations:
Extended range impact
behaviours that might prove
instructors often attend a course
necessary resources, most
force model at the level of impact
dangerous in the real world. In the
because they are sent by their
injuries vanish, along with the
weapons since it is essentially a
absence of a conditioned effective
agency for liability reasons, with
liability statistics.
launched impact weapon, primarily
response, participants often
no expectations of gaining useful
respond with actions that they
information. Proper instructor
know violate operational safety
configured as a pyrotechnic cartridge for shotguns and grenade
certification is not product
Projectile-Based Training
principles; behaviours that can
specific, but covers training
Live target engagement with
There are various training and
only be discovered experientially.
concepts to make better use of
training projectiles in scenario
operational ERIA products where
whichever technologies are used,
training can be hazardous. The
the projectiles are powered by
effective, it should be performance
including training ammunition
unintentional introduction of live
high-pressure air. ERIA requires
objective driven, 3-dimensional
and training device usage,
weapons and ammunition has
caution since different air pressures
and involve experiential learning.
safety rules and standards, and
led to accidents, and participants
and projectile configurations can be
In scenarios, the participant
protective equipment issues,
have received both physical
loaded into various cartridge bases,
must have access to all available
as well as theory components
and psychological trauma
and using the wrong air pressure/
options. Although it seems like an
that spend time on key scenario
in training exercises from
projectile combination in live target
oversimplification, in the response
training issues. They need to
projectile strikes with/without
engagement training is hazardous.
model, if a participant chooses to
learn how to run safe training
protective gear. However, there
engage the subject, there are only
and develop effective scenarios
are positives of using training
ammunition (USTA) is the most
three responses – verbalisation,
designed to directly connect
ammunition properly.
hazardous category as many of
intermediate force and lethal
agency response options with
force. A common mistake is to
officer actions, while reducing
categories and three sub-
look like inert rounds or blanks,
equip participants with only
injuries and liability exposure.
categories of training
and it is difficult to identify all
the response option required to
Instructors learn the how, what
ammunition. Some cartridges
the various cartridges and their
solve the scenario, but this does
and why of scenario training,
bridge several sub-categories,
design purposes. It is important
not provide the instructor an
making effective use of resources
so safe use is dependent on
to simplify the ability to recognise
opportunity to test a participant’s
and technologies to make teaching
educated users. In training, it
the few types present in the
judgement or to observe his ability
points and complete objectives.
is safer to refer to a cartridge
training arsenal and ensure they
by the category than by brand
are properly labelled, accessible
For scenario training to be
to shift mentally and mechanically
securitysolutionsmagazine.com
Budget considerations: in
There are eight primary
launchers (bean bags and so on).
Unhardened structure target
these potentially lethal cartridges
SECURITY SOLUTIONS // 33
OPERATIONS
only to those who know the
potential to be hazardous since
and this increases the hazard
drills, or render weapons safe
specific design purposes and
participants point firearms
potential. Blanks have blown
for training. Mixing CA and ITA
carefully controlled during use.
with the intention of firing
barrel plugs out of guns that have
allows instructors to observe
Some USTA cartridges require
projectiles at others for training
been incorrectly converted, or
participants for basic firearm
weapon modification to ensure
purposes, and participants have
where the blanks were too hot for
handling skill deficiencies, most
proper cycling and failure to use
been injured or killed during
the firing device. Blanks are useful
particularly recoil anticipation
a conversion kit when necessary
exercises where incorrect
for training, but strict precautions
and flinching. Some ITA are
could result in weapon damage
ammunition was mistakenly used
must be present. It is important
useful in rendering a firearm
and possible injury.
in training exercises. If a device
to know if the blank has wadding
temporarily incapable of
or ammunition is not specifically
that expels during firing, whether
chambering CA by blocking the
ammunition (NLTA) includes
designed for use in scenario
the sound pressure level requires
chamber. Choose the correct type
any projectile system designed
training involving live target
hearing protection, the type of
of ITA for this purpose, since
for live target engagement under
engagement, it is dangerous to use
blank-firing weapon used and the
many still have a rim that makes
controlled conditions. With
it in such an environment.
safe distance to engage a person
extracting the cartridge as simple
with blanks.
as manually working the action of
Non-lethal training
proper training protocol and
Blank training ammunition
protective equipment, this type of
(BTA) has a casing, primer and
training affords highly realistic
powder charge that is usually
(ITA) denotes ammunition
effects through the interaction
greater than what is used in
incapable of discharging, for
ammunition (UGA) includes
of participants and role players.
conventional ammunition,
participants to perform dry
ammunition of unknown design
Live target engagement has the
as users prefer a loud report,
practice, perform malfunction
intent. Experienced shooters often
34 // SECURITY SOLUTIONS
Inert training ammunition
the weapon. Unknown generic
securitysolutionsmagazine.com
have assorted ammunition, which
designed to limit projectile
involves high costs for air
ranges are now choosing to
has a tendency of passing between
travel distance, whilst others
equipment, bullet traps and
use non-toxic FA due to the
people inside an organisation.
limit penetration characteristics
other environmental equipment.
elimination of heavy metal
Obscure ammunition should be
to reduce structural damage.
NTA results in a substantial
contamination. Other benefits of
kept separate and secure, since
RRA have design features that
drop in range maintenance, and
FA include engaging steel targets
its design purpose is not usually
permit realistic training against
additional costs associated with
at close range to realistically
discernible simply by looking at a
conventional targets while
NTA are easily offset by reduced
replicate the conditions of
cartridge and it might mistakenly
reducing hazards of CA, but
construction and maintenance
gunfights, shoot houses can be
be used for something for which it
must be used under controlled
costs and improved health
built less expensively due to the
was never intended.
conditions and under the
for users.
reduced penetration effects, and
Before using any type of ammunition in training, be certain to read all warnings and
supervision of someone trained in the specific cartridge. Non-toxic ammunition
Frangible ammunition
conventional indoor ranges can
(FA) relates to the break-up
be built at a fraction of the cost
characteristics of a projectile
due to elimination of expensive
instructions on the ammunition
(NTA) is made of non-toxic
on impact. This term has led
air filtration systems and annual
packaging and be certain that
substances. Also known
to some confusion since the
clean-up costs. FA does not retain
the ammunition contained in
as ‘green’ ammunition,
ammunition industry has used
rifling marks, which makes it
the box is actually that which
the designation refers to
frangible to denote different
difficult to match a projectile to
is described on the box. Have
environmental considerations,
projectile types with varying
a weapon. Misperceptions about
a thorough understanding of
not lethality characteristics.
degrees of fragmentation, but not
FA include that FA will easily
what the ammunition being
Popular materials include blends
all frangible projectiles pulverise
penetrate a ballistic vest (false),
used was designed for, and do
of copper, nylon, tungsten
into fine powder. FA reduces
FA will explode inside the body
not use it for something else. Do
and zinc, with manufacturers
the danger if an intended target
(false) and FA does not show up
not use it for scenario training
moving toward lead-free or
is missed or over-penetration
on X-Ray (false).
without absolutely knowing that
non-toxic primers. Some bullet
occurs. Most conventional
it is specifically designed for
designs are non-toxic but
frangible projectiles break up
continue by looking at other
that purpose.
not frangible, behaving like
after striking a hard surface,
technologies available to help
conventional bullets to not
some with as little as 5o of
Sub-Categories
create reality based training
break up on impact, so caution
deflection, significantly reducing
to improve operational based
The sub-categories of ammunition
must be observed concerning
the hazard to bystanders. Other
competency for security. n
describe design parameters
splash-back and ricochet just as
potential uses include structures
and downrange effect. Each
with CA. If this is not a concern,
containing sensitive equipment,
ammunition type only belongs to
these non-toxic conventional
ships, military installations,
internationally certified tactical
one primary category, but may
bullets can often solve the
airplanes or crowded
instructor-trainer, Director
fall into several sub-categories.
problems of environmental
environments. Many agencies
and Senior Trainer of Modern
contamination without the
choose FA to reduce splash-back/
Combatives, a provider of
(RRA) is a broad sub-category
higher costs associated with
ricochet, over-penetration and
operational safety training for
and often easily confused.
frangible ammunition. Building
lead contamination. Due to
the public safety sector. For
Many USTA cartridges fall into
a range facility for CA or
the lead-free makeup of most
more information, visit www.
this category. Some RRA are
renovating an existing facility
frangible projectiles, many
moderncombatives.com.au
Reduced range ammunition
In the next issue, we will
Richard Kay is an
Before using any type of ammunition in training, be certain to read all warnings and instructions on the ammunition packaging and be certain that the ammunition contained in the box is actually that which is described on the box.
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 35
FEATURE
DEFENDING AGAINST ELECTORAL INTERFERENCE
36 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
BY ELIZABETH BODINE-BARON
In January 2017, the US intelligence community released a public report detailing a Russian influence campaign, ordered by Russian President Vladimir Putin, “aimed at the US presidential election”. In May of that year, Robert Mueller began a nearly two-year investigation into the Russian influence campaign that finally concluded a few days ago. While the full report has not yet been made public, U.S. Attorney General William Barr recently released a letter summarising the primary conclusions reached by the Special Counsel’s investigation. Leaving aside the matters of collusion and obstruction, the investigation reaffirmed the intelligence community’s findings about Russian efforts to influence the 2016 election. Namely, the investigation concluded that 1) “a Russian organization, the Internet Research Agency (IRA), conduct[ed] disinformation and social media operations in the United States designed to sow social discord, eventually with the aim of interfering with the election…” and 2) “Russian government actors successfully hacked into computers and obtained emails from persons affiliated with the Clinton
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 37
FEATURE
campaign and Democratic Party
largely on protecting state and
interference,” this attack shows
of Russian influence on social
organizations, and publicly
local voting infrastructure
how little has been done in
media in the US. RAND developed
disseminated those materials
from cyberattack. But even an
democratic countries to combat
a broad framework illustrating
through various intermediaries,
unsuccessful cyberattack on
the threat of election interference
the chain of Russia influence
including WikiLeaks…” with
voting or tally technology could
and influence operations – by
operations, from Russian
the goal of using that leaked
still achieve strategic success, if
sophisticated state powers or
leadership, to Russian organs and
information to influence
it causes citizens to lose faith in
other actors.
proxies, through amplification
the election.
the electoral system and the value
Legislative efforts, such as
channels and finally to consumers.
of their votes. More importantly,
the Honest Ads Act proposed by
This framework is not necessarily
campaign leveraged an approach
such attacks require immense
members of the U.S. Congress and
specific to Russia – it could be
known as ‘active measures’ that
resources in time and effort, while
similar proposals put forward in
adapted to characterise the threat
was developed by the Soviet
influence operations are relatively
Israel and other countries, focus
posed by other actors, such as Iran
Government and refined under
cheap. Throw the hacking of a
on one part of the disinformation
or China.
Putin to control and shape the
political party and the airing of
problem, requiring the funding
information environment within
some dirty laundry into the mix
source of political ads on social
Russian state – namely, Russian
Russia. Two key tools enabled
and it is suddenly simple to cast
media to be disclosed in the same
leadership and the Kremlin.
this campaign, as described
doubt on the entire democratic
public manner as they are for
As the Intelligence Community
by the Mueller investigation:
process. Securing election
radio and television. Whether or
Assessment notes, Putin “ordered”
disinformation and cyberattacks.
infrastructure from cyberattack is
not proposals along these lines
the influence campaign in the US.
Notably, these cyberattacks did
important, but the larger problem
are a good start will be debated,
There are questions about how
not include overt attacks on
is combatting influence operations
but even if accepted they will
much Russian actors undertaking
election infrastructure (such
and disinformation in general.
likely not be enough. A single
social media activities are
piece of legislation addressing the
controlled by or coordinated
The 2016 Russian influence
as pollbooks, voting machines
The US is not alone in facing
The first step in the chain is the
and tally technology). Instead,
this threat. Australia is now in
disclosure of political ads’ funding
from the top of the Russian
Russian hackers targeted political
a similar situation. In February,
sources or attempting to secure
Government, but it seems clear
parties, searching for damaging
Prime Minister Scott Morrison
election infrastructure from
that the influence campaign would
information about candidates and
revealed that the Australian
cyberattack may be nowhere near
not have happened without a
others in the political arena.
Parliament’s computer network
enough to thwart a nation-state
high-level decision within Russia’s
was subjected to a cyberattack
determined to sow disinformation
Government. Thus, shaping
U.S. Department of Homeland
by a “sophisticated state actor”,
and influence citizens.
Moscow’s decision making offers
Security and other organisations
compromising both the ruling
stepped up their efforts to secure
Liberal-National coalition
non-partisan RAND Corporation,
the election system in time for
parties and the opposition Labor
researchers analysed different
The diverse organisations
the 2018 midterm elections.
party. Though he said, “There
approaches and policy options
that actually implement Russia’s
However, their efforts focused
was no evidence of electoral
to respond to the specific threat
influence campaign compose the
In response to this threat, the
38 // SECURITY SOLUTIONS
In a recent report by the
a key approach to addressing Russian disinformation efforts.
securitysolutionsmagazine.com
NO SINGLE APPROACH IS LIKELY TO BE COMPLETELY EFFECTIVE. RATHER, A COMPREHENSIVE AND COMPLEMENTARY SUITE OF STRATEGIES COULD ADDRESS ALL THE LINKS IN THE DISINFORMATION CHAIN. second, and most complicated,
of whom may be based in the
disinformation, but, in the end,
link in the disinformation chain.
targeted country.
it is up to the user to believe or
These entities operate with
The third link in the chain
not believe a particular piece
intended to shape Moscow’s decision making. • Continuously assess the cost and impact of
varying levels of independence
comprises the various channels
from the Russian Government and
(actors and platforms) through
include actors who are part of the
which Russian disinformation is
to be completely effective.
Russian state, such as the Main
intentionally or unintentionally
Rather, a comprehensive and
Intelligence Unit (GRU) or Sputnik
amplified. Social media platforms,
complementary suite of strategies
For these approaches and
online media to entities such as
such as Facebook and Twitter,
could address all the links in the
associated policies to have the
the RT news network, which are
play a key amplification role
disinformation chain. Weighing
best chance of producing the
not formally part of the Russian
through their policies, algorithms
the advantages and disadvantages
desired effect, the many entities
state but are transparently
and advertising – a role that
of solutions that have been
that would need to consider
supported by it. Also included
can be manipulated, subverted,
proposed by government
implementing and supporting
are entities that knowingly act on
or taken advantage of by
organisations, academia and
them include government and
behalf of the Russian Government,
Russian actors trying to spread
think tanks, several potential
non-governmental organisations,
but whose connections to the
disinformation. The accounts
approaches emerge that cut across
large and small social media
state are concealed, such as the
that are active on these channels
multiple links:
companies, media outlets and
Internet Research Agency. A
are also particularly important;
• Establish clear and enforceable
academia. Without cooperation
potential fourth group to add to
many play a role in amplifying
norms for acceptable
and coordination, efforts will
this link in the chain are entities
disinformation, whether they
behaviour for states and media
likely remain piecemeal and
that act to further the purposes of
are real or fake, bots, trolls or
entities’ behaviour on social
inadequate, and the US will
the Russian Government but who
regular users.
media platforms.
likely remain vulnerable to
are not directly connected to the
The final link in the chain
of content. No single approach is likely
• Coordinate government
proposed solutions, relative to the effectiveness of Russia’s activities.
influence campaigns by Russia
Russian state. This group includes
is the set of targets for a given
activities, particularly
and other adversaries. Though
witting and unwitting participants
influence campaign. In the 2016
those between judicial and
their adversaries may differ, the
who are motivated to spread
presidential election, the Russian
legislative organisations.
threat posed to Australia and
messages convenient to Russia’s
campaign targeted US citizens.
• Institute a formal organisation
goals for their own reasons –
Other campaigns could target
for information sharing that
same, and similar cooperative
including those simply holding
government leaders, decision
includes key players from the
approaches may be needed. n
views the Russian Government
makers and citizens of other
U.S. Government and private
seeks to promote – and therefore
countries. This link also overlaps
social media companies.
provide an additional channel
with the amplification channels,
• Increase the transparency of
to achieve Russian goals, such as
as consumers contribute to the
social media platform policies
associate director of the Force
creating or expanding divisions
spread of disinformation by
and algorithms for detecting
Modernization and Employment
in American society. Patriotic
posting, retweeting or otherwise
and removing disinformation
Program in Project AIR FORCE,
Russian hackers and networks
promoting such content. The
and malicious behaviour.
and co-directs the RAND Center
run by criminal oligarchs are
consumer role is particularly
also included in this group.
important, as any effort to lessen
academia to develop better
System Science at the non-profit,
Different approaches to address
the impact of disinformation
tools for identifying and
non-partisan RAND Corporation.
the influence of the diverse groups
at this point in the chain must
attributing disinformation on
She is the lead author on the
are required, given the legal status
address human nature – changing
social media.
recently published RAND report
and position of these actors, some
algorithms or platforms may
of whom are in Russia and others
reduce the visibility of some
securitysolutionsmagazine.com
• Encourage and fund
• Prioritise defensive activities over punishments
other democratic countries is the
Elizabeth Bodine-Baron is an information scientist,
for Applied Network Analysis and
Countering Russian Social Media Influence.
SECURITY SOLUTIONS // 39
BUSINESS
SUCCESSION PLANNING
A PRACTICAL APPROACH BY MICHAEL MCGRATH
40 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
“Life is what happens to you while
forecast in 40 years and don’t
1. Develop a strategy and plan
team in place can be a great
you’re busy making other plans,”
intend to start now.”
for your business.
way of providing comfort to an
A business with a clear purpose
acquirer that the business is not
said John Lennon in the lyrics of
The reality is that time marches
Beautiful Boy released in 1980.
on with relentless persistence.
and direction is fundamental to
a one-man (or one-woman) show.
Not his own line, it is apparently
Developing some plans which
becoming valuable. This work
Introducing clear expectations
attributed to an American writer
flexibly take into account the
is not easy and getting some
and good accountability within
and journalist called Allen
reality that you will need to retire,
outside input can be useful in
the leadership team is essential
Saunders. In any event, the
or at least move to a different
developing the right strategy and
to operating sustainably. Having
sentiment rings true for many
sort of role as you move into the
plan. Once completed, this work
a carefully selected and balanced
of us as we survey the scene and
twilight years, makes a lot of sense,
can normally be reduced to a
team with the requisite skills
wonder how we got to our current
and the earlier the better. Thinking
one-page summary to help with
adds significant value to an
point in life.
of succession only in terms of
communication and execution.
enterprise. Individuals with
retirement is a big mistake. Our
The clarity that comes from
previous experience within a
accordance with our planning. So,
businesses and our lives move
such an exercise can be very
large corporate environment
is planning a waste of time? If you
in cycles and thinking about
powerful. Strategic acquirers and
are not always appropriate in a
heard many of the discussions
succession as a much broader
professional business buyers love
fast-moving small- to medium-
we have with business owners
principle and being flexible and
it when a business has a clear
sized enterprise. Ensuring
when we discuss the subject of
creative can be very helpful.
vision, strategy and plan. Even if
candidates have a significant
you do not intend to sell, this work
body of experience in a similarly
is still vital.
sized organisation helps to
Things rarely work out in
a forecast or business plan, you
Being succession ready is to be
might think so. We often hear,
ready for transition or sale. You
“You can’t possibly forecast our
will exit your business one day.
business” or “I’ve never done a
This is just an irrefutable fact.
an acquirer is simply buying
the wrong person. At the very
Starting to consider succession
the future. Make sure you
least, the organisational design
early is never a mistake. You
understand yours.
must make sense, with clear roles
When all is said and done,
have three broad options when
and responsibilities.
considering succession:
2. Know your numbers.
1. Sell the business to a trade
It is a fundamental requirement
and wish to retain ownership and
player or third party.
to know and understand your
evolve to having the business run
2. Place the business under
numbers: past, current and by
by management, then identifying
management and remain the
way of a forecast at least the
that individual early from within
owner or part owner (and
next 12 months and, ideally, the
or allowing sufficient time to hire
possibly transition out of
next three years. Management
the right person as managing
ownership to management or
accounts should be completed
director or general manager is
other over time, often called a
monthly and, wherever possible,
essential. Whilst this will require
management buy-out (MBO) or
should be accurate and produced
you eventually giving up day-to-
management buy-in (MBI) or a
in a timely manner. These should
day control, you can retain a very
combination of the two).
include adjustments for pre-
effective level of control through
payments and accruals – the
having board meetings and
you no longer wish to operate
profit for the period under review
perhaps engaging non-executive
the business.
should reflect what has actually
input. Effectively, you can plan
So, what should you do as you
happened. The balance sheet
to become the non-executive
contemplate succession for
should balance and be up to date
chairperson and eventually limit
your business? Preparing a
(monthly).
your input to the monthly board
3. Close the business down once
If you are the owner–operator
flexible plan makes sense, and
Do you have a simple finance
the requirements in the earlier
snapshot available to you by the
advice, guidance and support.
stages do not vary whether you
15th of the month outlining your
(More on this in point 5 below.)
are planning to sell to a third
previous month’s performance,
party or are planning to put the
with key insights? This is much
4. Analyse and mitigate
business under management and
easier to accomplish than
your risks.
retain some sort of ownership.
many believe.
You want to present your business
Many of the following suggestions
securitysolutionsmagazine.com
mitigate the risk of introducing
meeting where you provide
as a stable enterprise to potential
apply in all circumstances – after
3. Develop a good
acquirers. Being across and
all, running the business as
leadership team.
mitigating risks such as revenue
professionally as possible at each
Having a competent and
concentration, obsolete stock,
stage just makes sense.
appropriately sized management
litigation, doubtful debt and so on
SECURITY SOLUTIONS // 41
BUSINESS
payment has been made. Until that point, it is all ‘ifs, buts and
Preparing a flexible plan makes sense, and the requirements in the earlier stages do not vary whether you are planning to sell to a third party or are planning to put the business under management and retain some sort of ownership.
maybes’, so work on a need-toknow basis 9. Separate personal assets from the business. Good financial management is essential and presenting accounts that are timely, accurate and easy to follow speaks volumes. Even if non-business assets are not in a separate legal entity, at least split them out for the purpose of presenting your management accounts. Confusing accounts that do not make sense, with
is essential to the defence of your
be a very cost-effective way of
7. Be proactive.
non-core items buried, make
earnings. Buyers will not expect a
adding significant management
If you have decided to sell, then
buyers nervous.
completely trouble-free business
horsepower. Additionally, the
be proactive. Most businesses
(with the exception of private
independence can add a degree
will not be so fortunate as to get
10. Seek independent, expert
equity firms, who frequently
of objectivity not always possible
a knock on the door, but even if
advisors for support.
seem to want just that), but they
within the management team itself.
you do, you want to know that
Complement your deep
will expect management to be
Operating a board is a statement
you are getting the best deal. The
understanding of the business
fully across the risks and, where
of intent and signals strategic and
only way to be certain of this
with independent, objective
necessary, have them reflected in
professional commitment.
is to proactively explore your
experts skilled in negotiation
options in the marketplace. This
and deal doing. You want to have
and have a sensible and cogent
leadership, accountability and
needs to be done intelligently
the time to focus on running
plan for each issue going forward.
governance to help achieve
and discreetly. Conducting an
the business as professionally
There is no such thing as the
the objectives of the business.
exploratory exercise while
as possible during the critical
perfect business, but ignorance of
It can also help to facilitate an
maintaining anonymity puts you
time when buyers are being
issues is not a defence.
owner stepping back from daily
in the powerful position of having
objectively identified as qualified
management to fully or partially
real and current intelligence from
buyers and start to evaluate the
exit the business without selling.
the market, which then allows you
business. A good advisor will
to objectively assess the appetite
add a lot of value and their fees
the numbers by way of provisions
This should also be essential even if you are not planning to sell; it just makes sense to mitigate
The board provides strategic
Finally, is your corporate
your own risks as an owner at
structure efficient and will it
of current acquirers for a business
should be returned several times
all times.
optimise your position in the event
such as yours. The exercise will
over. Check the track record
of a significant liquidity event like
also alert you to the likely real-
of advisors and make sure you
5. Optimise your
a sale? Too many businesses are
world valuation, which can inform
feel they understand you, your
corporate structure.
poorly structured in this regard.
future strategy.
business and the market.
Your business is more valuable to
Ask your tax accountants how
an acquirer if it is already running
you stand.
8. Be discrete about
something for the first time? n
successfully and profitably
When was the last time you did your intentions. Michael McGrath is the
without heavy involvement
6. Formalise agreements with
You are not for sale; you are
from you.
staff, suppliers and customers.
simply exploring your options.
CEO of Oasis M&A, a corporate
Where possible, make sure that
Protect your identity and
advisory business based in Sydney,
a board in place. All of the most
agreements are current and valid.
maintain anonymity while
Australia. Oasis has managed over
successful listed companies in
It is not necessarily a deal breaker
seeking acquirers to avoid
500 transactions over the last 35
the world have board meetings,
if agreements are not current and
destabilising and thus potentially
years, both in Australia and in the
as do many successful private
sometimes perhaps only verbal,
devaluing your business. We
UK. Oasis also assists companies
companies. Why not you?
but being across the status of all
recommend against producing
in the creation of value in their
Creating a board and adding a
agreements and their importance
an Information Memorandum
business before an exit. To talk
non-executive member who does
to the business is just good
as part of the marketing process.
to Michael and his team at Oasis,
not work day to day, irrespective
management and ‘money tends to
Nothing is finalised until a
contact him at michael@oasisma.
of the size of your business, can
follow management’.
contract has been signed and
com.au or on 02 8599 3442
We like all businesses to have
42 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Pedestrian and Vehicular Access Control Automation
FAAC Simply Automatic Modular automation solutions
HUB Parking Technology Smart and flexible parking solutions
Magnetic Automation Pioneering access control solutions
Experts in Access | Discover the FAAC Group range of products at J14 | www.faacgroup.com
COVER STORY
WHAT DRIVES MASS SHOOTING?
44 // SECURITY SOLUTIONS securitysolutionsmagazine.com
?
In the wake of tragic incidents like
Some of those factors are about
I think we can safely look
or die. And for those who seek
the mass shooting in New Zealand
the perpetrator, him or herself,
back at Julian Knight, post Hoddle
suicide by police. Which is the
last month, the first question
and the context in which they
Street, for readers who remember
thing sadly.
many people ask is “why”? We
have committed the offence. And
that far back. You have much of
struggle to comprehend what
the second part of the discussion
the debate about Julian Knight's
incident in New Zealand allegedly
drives people to commit such
would, and should rightly be
behaviour centred on whether
involving Brendan Terrant.
terrible acts and, as security
about, what are the things in
he was insane or whether, in
When one looks at the amount of
professionals, perhaps more
our world or the changes in our
fact, he was simply bad. History
planning that went into it, from
so than the average member of
society that give rise to people who
now suggests that the long-term
the live streaming, to the collection
the public, we find ourselves
may, will, fit into either some of
assessments of Julian Knight
of weapons, to the actual layout of
confronted with the realities of
the historically relevant categories
suggested the latter.
where, when and how – that level
the situation. What if that had
and or potentially fit into newer
been my workplace? What if
SSM: Coming back to the
That it was never proven
of planning and execution doesn’t
types of offending patterns, which
and he was unsuccessful in any
necessarily fit with our traditional
that had been the company I
are products of modern life. So, I
attempt to use a mental health –
preconceptions of someone who
work for? What if that had been
think in short, some of the things
based defence. So, there we have
is severely mentally unhinged.
one of our staff responsible for
that we’re going to chat about may
someone who, as a result of their
Therefore, would it not be
such an incident? Could I predict
not have necessarily been around
development, the complexities of
reasonable to conclude that there
it? Would I see it coming? How
forever, because some of these
their life, chose to take their anger
is a scale or spectrum of mental
could I prevent it? These are
patterns are changing.
out on society to make a sadistic,
illness with one end being mildly
violent point. And that’s the long
disturbed, as in ‘I occasionally
and the short of it.
think ants are out to get me’
all valid questions. To try and
So, perhaps an interesting
better understand what drives
place to start is to in fact think
this type of behaviour, with a
about when we historically look
view to possibly addressing these
at events of this nature, there are
look at someone like a Frank
questions and others, we sat down
really often only a small number
Vitkovic, who was the perpetrator
with Simon Brown-Greaves.
of possible explanations. The first
in the Queen Street shootings
And I think this takes us to a
If, on the other hand, we
through to believing that you’re a teapot orbiting Mars? Simon: Absolutely right.
one clearly is in the realms of some
in Melbourne in, I think
very difficult social issue about
Psychology Unit within Victoria
form of serious mental health
1987, around the same time
the changing phase of what
Police, Simon has extensive
condition. And I want to, obviously,
interestingly, as the Julian Knight
constitutes a serious mental health
experience dealing with mass
put around my comments that
matter, then Vitkovic had a history
issue. And you’re absolutely right
shooting perpetrators and victims
there is by no means a view
of serious mental health issues.
that you can suffer, for example,
and has a unique view on what
that suffering a mental health
He was, at the time, in the care
a paranoid or serious paranoid
drives these types of incidents.
condition is necessarily correlated
of mental health professionals.
disorder, but be intellectually
He was kind enough to take some
with violence.
And the coronial inquiry and the
quite functional. And the only
reports published after his death,
manifestation for most people
As a former Manager of the
time to try and help us better
However, the flip side of that is
understand how and why these
that a substantial number of those
and I’m talking here about the
who sadly have that particular
things occur.
events are committed by people
proper assessment of his mental
disorder might be that they’re
who are in the throes of a very
health, indicated it was highly
paranoid and irrationally so.
your time. Perhaps we could
serious mental health condition.
unlikely that he suffered from a
That does not necessarily mean
begin with the most obvious
Typically, that will be some sort
psychotic illness.
that they will go out and commit
question – what drives this kind
of psychotic breakdown where
of behaviour? It cannot just be
they’ve lost touch with reality and
at that event in Queen Street, I
purely hate, because there are a
the behaviour that is exhibited in
can say from firsthand experience
lot of angry people in the world
the major event is quite insane,
that many of the patterns of his
interesting possibility that
who do not take up arms.
and quite disturbed, and the
behaviour and the way in which
there are categories of severely
flavour of it and the way in which
he went about that event were
dysfunctional people who may not
type of behaviour, and let’s speak
the act is carried out is consistent
chaotic, disorganised, completely
be, as you say, orbiting Mars and
more generally about people who
with someone who is completely
irrational, and ended of course as
completely psychotic, but may still
commit very serious, major and
out of touch with reality.
we now know, with him jumping
be capable of rational planned
out of the building.
and considered act. This presents
SSM: Simon, thank you for
Simon: The driver of this
cataclysmic, destructive acts on
Now, if you look back over
As someone who was present
And I’ll come back to that issue
an act like Terrant is alleged to have committed. So, we have this very
society is, as you would expect, an
history, in many of these cases,
incredibly complex phenomena.
even in Australia, the question as
later about the difference between
problem. Now historically, we
So, there are probably four or
to whether or not the perpetrator
offenders who are,
sometimes refer to those people
five areas that it would be smart
was in fact mentally ill or not
A. Happy to die
as, personality disordered, and of
to talk about as we think about
arises in almost every single case
B. Seeking to die
course that presents no possibility
that complexity.
when it comes to trial.
C. Don’t care whether they live
of a defence under mental health
us as a society with a significant
securitysolutionsmagazine.comSECURITY SOLUTIONS // 45
COVER STORY
legislation, pretty much anywhere
where Terrant fits into this
experts, to say, well clearly it’s a
about someone who has been
in the world.
spectrum as time progresses, but
mad act, but I don’t think you have
‘radicalized’ and who belongs to
to your point, is he capable of
to be mad to commit mad acts.
a social group or is connected to
a psychopath or antisocial
carrying out a planned, long-term
So, another category that might
a network of people who share
personality disorder and that’s
act and still being technically
put this in context is the growing
their extreme views. One of the
your affliction, there’s no defence,
insane? Yes, that is possible.
prevalence of people who commit
complexities in these cases is that,
these acts, who on some level
in our modern, always connected
In other words, if you’re
you haven’t lost control of your
SSM: Based on that premise,
capacity to form an intent. And I
it is reasonable to expect some
believe that they are at war. So,
world, it’s so much easier, to find
think we’re increasingly seeing
people might be tempted to
the justification in their mind is
and make contact with groups
people who are on that borderline
believe that anyone who engages
neither a mental health condition
of people who have perverse or
between having some completely
in a terrorist act that involves
nor insanity, but still leads them to
almost delusional views of the
perverse and irrational political
the taking of multiple innocent
commit acts that, with our frame
world which in turn provides the
ideology that in some way has
lives, is on some level mentally
of reference, would be described
person searching with a sense of
become justified in their own
unbalanced. Is this the case?
as mad.
belonging, a sense of participation
mind, versus someone who is
Simon: I think this is a really
Now, my inkling is we may
and a sense of brotherhood. Sadly,
actually suffering from a paranoid
complex issue and I think many
well be dealing with a case
while the views of these extreme
disorder. Now we will find out
people would like me, and other
of that nature when talking
groups are vile to you or I, within
46 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
written about the alleged in the
wider group that we’re seeing
point where it becomes, for a
Christchurch shootings, it’s been
emerge across the world in the
small number of these people, a
reported that he travelled from
last decade on all sides of the
prevailing and overarching way of
country to country undertaking
religious and racial divide. If that
seeing the world.
training and meeting with all
is the case, what’s the pattern? Can
sorts of different people, which
we predict certain acts based on a
people then become at risk if they
might be consistent with someone
person’s behaviour?
are a little bit psychologically
Now a small number of those
Simon: This is probably the
dysfunctional. For example,
$64 million question. In short, the
if I don’t have the same sort
answer is no, not in all cases. It
of constraints that most right
description and I think that paints
would be nice if it were that easy
thinking people have, such as
a picture of an increasing number
but this is a highly complex issue.
exhibiting a lack of empathy
of those types of offenders. People
Sometimes we can spot problems
concern for others, a lack of family
are fond of calling them lone
and sometimes we cannot.
connections, I don’t find violence
looking for a place or people with whom he felt he could belong. Simon: I think it’s a great
wolfs. I’m not sure that these
In the New Zealand case, let’s
as abhorrent as others might,
are lone wolves. I think there
say for argument’s sake, that
or I lack a pro social religious
are people that are increasingly
the alleged gun man became
framework, which can actually be
able to find a social group and a
disaffected or damaged through
quite protective, then I might be
network, and it’s not too much of a
whatever pathway that we may
one of the people more susceptible
stretch to believe that the massive
subsequently discover. Whether
to this radicalization process.
changes in access to subterranean
it’s family background, whether
social media environments creates
it’s school, whether it’s some part
organisations and people who
a hotbed for people to find a group
of his life that brought him into
prey upon and seek out those
of people that previously without
contact with people who shared a
vulnerable people.
that social media, we would never
sense of isolation and oppression.
have found.
In those circumstances, there is
is it reasonable to assume that
Unfortunately, there are
SSM: Given that is the case,
little doubt in my mind that early
we might see in our daily lives, a
50 years ago, wandering around,
markers are the sorts of activities,
colleague that we’ve worked with
would have been lucky to find
behaviours and connections that
or for us, who to us, for all intents
one, let alone two other people
people seek as they begin to want
and purposes, has seemed entirely
like-minded as they travelled
to find like-minded people.
normal for the duration of the
Let’s say someone like Terrant,
around the countryside because
That, we can see that quite
time we have worked with that
all they had was a phone and the
early. The real question here is
person, let’s say five years, only
standard media. Nowadays, you
how serious we are about tackling
to then find out later on a couple
can log onto a host of well-known
some of those early markers or
of years down the track that they
websites and within 30 seconds,
making it difficult for people
are the person who’s committed
you’re communicating with a
to in fact access those types of
one of these acts, and there has
bunch of people who think like
media and social media networks.
been something in the intervening
the group there is an environment
you. And that is a massive change
The markers are often about
period that has set them on
for the people involved where
in the way in which people are
isolation, what a person seeks out
this path?
the acts of public violence and
indoctrinated, the way people feel
to affirm his or her view of the
or destruction are completely
a sense of belonging.
world during which a process of
because ... and if I can respond
justifiable. They’re viewed as an
Simon: That’s a great question
decentralisation occurs. So, as
as simply and split it into two
that some people are going to
they move down that pathway,
things, if that person was the one
be more susceptible to a process
they become exposed to choices
we were chatting about who’s
the act of a terrorist, that as yet
of radicalization than others,
around activities that go along
been desensitised and is not mad,
globally we don’t refer to as an
leading to this state in which he
with ultra-violence, they are
may well be intellectually fine.
insanity per se, or carried out by
or she is prepared to go to ‘war’
taught justifications for this kind
Then you know what? They’re
people who are insane. They are
for his or her beliefs, then is it not
of behaviour and exposed to the
not going to let you know because
often carried out by people who
reasonable to believe that these
neo-fascist type of a far right
they have insight. They know that
are politically and ideologically
must be certain psychological
explanations for the kinds of
where they’re heading is not for
disposed to the view that they are
markers that would signal
social order being preached. And
general consumption. So their
committing a justifiable act of war.
potential future behaviour? If
because they’re vulnerable, they
ability to actually hide it from
that is the case, then Terrant is
become increasingly seduced
friends, family, work colleagues is
merely representative of a much
by that way of thinking to the
a marker after the fact.
act of social and political justice. That takes us of course, into
SSM: That’s interesting. If you look at what has been
securitysolutionsmagazine.com
SSM: Okay, but in accepting
SECURITY SOLUTIONS // 47
COVER STORY
So yes, you could be working right alongside someone and have no idea. If the cause, however, is a serious mental illness, the opposite is the case. There will be a history and a litany of people saying, “Oh, Simon’s not quite ... something seems not right.” Or there’ll be history of seeking treatment for, or warning signs in relation to other episodes. So it’s very real. We go back to Vitkovic. That had been building over an extended period of time. Now I want to be really careful about that. It’s not to suggest that any mental health professional or family member could have predicted what Vitkovic was going to do. They couldn’t have. However, in hindsight we look back and go, “Oh, okay.” There were a series of markers over an extended period of time that only when you look back, you’d go, “That was a mental health issue and one that was out of control.” Martin Bryant provides another example. And again, apropos of our earlier conversation, Bryant was subject to a string of mental health evaluations. The conclusion in the end of this was that he was not in fact psychotic, but rather, that he suffered a long-term damaged personality, and that was in the context of a limited intellect. So, his capacity to think clearly, to have a compassionate response, utilise the brain power to find his way out of his life circumstances, were all impaired. Regardless, the system found him guilty and he was imprisoned accordingly. So, he’s another interesting different sort of case of a dysfunctional personality who, according to the courts, he knew what he was doing. SSM: You alluded earlier to a part of the radicalization process that these people go through involving a desensitisation to
48 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
violence. I’m assuming when you
exposure to an environment
do have to create environments
say desensitisation to violence,
that is uncontrollable. And so
and cultures and organisations
that you mean something more
beyond what we anticipated
that help people be able to stand
extreme than playing violent
that we are not able to manage
up and to manage the occasional
video games or watching
what people are exposed to and
fringe or extreme behaviour.
violent movies?
I fundamentally don’t believe we
I strongly say to people, if you
do manage that. And I think it’s
tackle it in a way that pushes
clear. One of the complexities here
extremely difficult. I think the
it underground, they will not
is that I don’t think as a society
horse has bolted, so it’s having
achieve their purpose. To me, it’s
we’re very good, in the moment, at
an effect.
all about creating an environment
Simon: That isn’t entirely
working on what’s going to harm us later on.
SSM: So, when you get things
where the quality of the debate
like the alleged, in this case live
means that eventually the
streaming, walking through
rational prevails, and we’re able
understand is that 20 years ago,
the mosque, gunning people
to influence people perhaps and
when we had a discussion about
down, what happens when other
help them find connection without
whether media exposure to
vulnerable people are watching
having to go underground. n
violence would have a negative
this kind of stuff?
What I am beginning to
effect, even back then a lot of
Simon: Well, I think you
those debates were very split and
know the answer as do I. What
violence depicted in movies and
is interesting here, is that lots
games back then was quite benign
of people faced with choice of
compared to what we are exposed
watching that video would be
to now. I think the increasing
horrified, which is what we would
evidence of really good, quality
hope would be a human response.
psychological research that has
However, there will be a small
appeared over the intervening
number of people who might
years is leaning towards the belief
think “Whatever, just another
that it is doing a lot more damage
thing.” But they are not the people
than we first thought. That what
who then will go on to commit
we have done is indeed create
a similar act. However, there
for some vulnerable people. It
will also be a smaller number of
is not the case with everybody,
vulnerable people somewhere
but for some people, there is a
sitting there watching that video
risk associated with ongoing and
thinking, “Wow, that was pretty
repeated exposure to violent and
cool. What a good way to get a
graphic images. People become
bit of fame.” Unfortunately, that
desensitised. And if you become
footage will be an educational
desensitised, then you have no
video for a small number
empathy for the circumstance in
of people.
which you find yourself. For example, when I worked
SSM: So, in closing, for people in a senior security roles
for Victoria Police, we had cases of
responsible for the safety of
young offenders who, upon getting
people around them and, to some
into a knife fight, fully expected
degree, as people who will be
the person they had just stabbed
looked to by the public as experts
was going to get up and be okay.
in these matters, how might
In their reality, people don’t die
they best deal with these sorts of
from stab wounds. Not on TV, not
incidents when they are raised as
in games.
part of a discussion or debate?
SSM: Seriously? Simon: Absolutely! And there
Simon: I think that the act of a leader is to engage in the debate,
is no way we could have predicted
not to shut it down necessarily
that. So, I think that we’ve got
because we know what happens
these increasingly complex
if we shut down some of those
media. And by media I mean,
views. I think that, as a leader, we
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 49
AVIATION
WHEN GOOD IDEAS GO BAD
50 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
BY STEVE LAWSON I was working overseas recently
fast as the ‘traditional’ screening
tried holding a tray in place so
and had an interesting experience
lines. However, the job I was
that I could slide mine in front of it
that I thought worth exploring.
doing included observing the
but as the belt is powered the tray
It involved two things that I
screening point and, as I had not
does not want to stop and, together
thought would be advances in
yet used the TRS in this country, it
with the weight of trays behind it,
the screening process; the first is
seemed opportune.
the attempt proved impractical.
the use of Tray Return Systems
I joined the line and stood for
However, the main issue is that
(TRS) and the second is the remote
what seemed like an inordinate
the belt was not moving and
viewing of networked passenger
amount of time before I could
we stayed like that for ages. In
baggage X-Ray images. Why is a
get to one of the input stations.
retrospect, I should have picked
discussion about the introduction
At a TRS, a tray is taken from a
up my gear and moved to the
of these warranted at the
lower level and placed onto a shelf
traditional line, but I wanted to see
moment? Because both of these
where you fill the tray with your
what was causing the problem.
will soon be coming to an airport
property. As in most airports,
near you!
electronics go into one tray and
30 minutes to get to the end of the
Before I go any further, this
Jumping forward, it took over
your bag into another, together
X-Ray belt and I was now very late
is not intended as a criticism of a
with any coat or jumper that you
for my flight and I still had to wait
particular supplier or technology;
may be wearing (a requirement
for my property.
rather, it is an article about
in the country). Once the tray is
the issues associated with the
filled, you slide it onto a powered
the screening point? Basically, 90
introduction of new technology
roller belt that takes it into the
percent of the bags were being
or processes. Like most new
X-Ray machine for inspection.
rejected for a secondary search.
processes, they require training
I was at the third station from
So, what was the problem at
The X-Ray machines not only had
and responsive supervision and,
the X-Ray, which was on my left,
a TRS, but they were networked
when these are lacking, there are
and there were two other stations
and the X-Ray operator was in a
unintentional consequences. For
to my right. The powered belt
room away from the screening
those who have not encountered
was full so I could not slide my
point. I had been discussing that
a TRS, here is an image from
tray into a vacant space on the
concept with the airport’s security
one supplier.
powered belt; remember, like
manager less than an hour before
everyone else I have two trays.
and he was very proud of the
me: I was at a very large overseas
When the powered belt did
process. It is a good idea as it
airport for a domestic flight and
intermittently move, I found that
saves space at the screening point,
I joined what looked to be the
there was never a vacant space
can reduce staffing by having
shortest line at the screening
as the people on my right, as you
people responsible for multiple
point, not realising that it was
would expect, continually filled
machines and you reduce the
short because it was not moving as
the belt with their trays. I even
chance of an operator colluding
To describe what happened to
Source: https://www.airport-suppliers.com/supplier-press-release/airport-commercial-master-planning-airside-landside-fb-and-retail-design/
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 51
AVIATION
with another to let an accomplice’s
3. As a cost-saving idea, the
This system has a reject line,
speeding up the line. It would not
bag containing a prohibited article
images were sent to the
so when a bag is rejected it is
help those whose bags needed
through the screening point. I
checked baggage screening
automatically diverted to an
inspection, but it would help the
should have paid more attention
room and mixed with checked
inspection line and when that
10 percent of us who would not
to some of the details of the
baggage screening (CBS)
line becomes full the diverter
need an inspection, and yes, I
networking, but it was out of my
images. That would be a really
cannot push any more bags into
was confident I was in that group.
project’s scope, so the following
dumb idea; while the skill
the inspection line so it stops the
My solution would be to take the
assumptions about why there
sets are similar, the list of
whole belt, which means that
rejected bags off the reject belt
was such a high rejection rate are
prohibited items are different,
the people trying to put their
and place them on the floor until
just assumptions:
so you will almost certainly
trays onto the belt at the input
they can be searched properly.
1. Everyone using this line on this
get mistakes.
end are unable to because the
This would free the main belt
powered belt has stopped and
and I could get to my property.
day had a prohibited article in
4. There were a number of
their bag. What argues against
operators and this rejection
those people in the middle, as I
Then the supervisor needs to find
that is the lack of confiscations
rate was a statistical anomaly.
was, are not able to put their trays
out the reason for the high reject
during bag searches.
I am going to be generous and
onto the powered belt because it
rate and take action to speed
suggest this was the reason,
is continually being filled by other
up the bag inspection process.
for this machine in the remote
although I suspect point 2 is
passengers. Note to everyone, the
Not being backwards with
viewing room and that
really correct since networking
best station on a TRS is the one
giving my opinion, I did suggest
operator was incompetent!
was new and there were few
furthest away from the X-Ray.
removing bags from the belt to
Harsh? Not really. You do not
networked machines.
While I am waiting for my
get a rejection rate that high
“But,” I hear you say, “what is
property, I am a little angry and
there like a shag on a rock. In
(remembering point 1 above)
the problem with such a high
anxious that I was about to miss
retrospect, giving my opinion may
unless the operator is useless
rejection rate?” Simple, and one of
my flight. I am angry because
not have helped me, especially
and needs retraining.
those unintended consequences.
there was a simple solution to
when I said that he should take
2. There was a single operator
52 // SECURITY SOLUTIONS
the supervisor, who was standing
securitysolutionsmagazine.com
my property and put it through
should have been trained to
Leadership is a skill and people
aviation security. As a Security
the adjacent traditional machine.
use the repeater station. I can
need to be trained to supervise.
Executive with Qantas Airways,
My next frustration was that
hear someone saying, “maybe
An unintended consequence
Steve held a number of senior
each of these machines has a
they were not trained as an
– for the first time in about
management roles covering all
repeater station at the end of
X-Ray operator” but I happen
three decades in the aviation
aspects of aviation security from
the TRS and the person doing
to know that everyone on these
industry – after having arrived
policy development to airport
the bag search could view the
screening points are trained
early enough for my flight, I
operations. He was sent to New
X-Ray image and had controls to
X-Ray operators, so there was
had to grab my things from the
York immediately following
fully manipulate the image. Was
no excuse for not using the
tray and, without repacking
the 9/11 attacks to manage the
it used? Not once did I see the
equipment, even if just to see
or putting on my jacket, run
Qantas response and undertook
bag search person even glance
where the suspect item was so
through the concourse to get to
a similar role following the 2002
towards the screen; rather, each
the search could be quicker.
the gate, arriving just as they
Bali Bombings. On his return
were about to close the doors.
to Australia, he was appointed
supervisor is also in question. I
My only solace was that I must
Security Manager Freight for
what were the security issues I
did not see this person help the
have provided amusement to
the Qantas Group. Since 2007
learned from this disaster?
bag searcher, assign more staff
some other passengers who
he has been a Director of AvSec
1. The training of the X-Ray
(of which there were many),
watched this short, fat, bald
Consulting in partnership with
operator was inadequate.
take bags off the belt, cause
old guy running through the
Bill Dent, a fellow former Qantas
I was generous earlier – I
people to be directed to other
terminal with his arms full of
Security Exec. Today, Avsec
believe that there was just one
lines, give directions to staff to
electronics, an empty bag and
Consulting provides consultants
operator for this machine and
use the equipment provided or
his coat. n
from the US, NZ, Middle East,
whoever it was should have
even pick up a phone to find out
been removed and retrained.
what the issue was – and I had
bag was scrupulously searched. Now that I have had my vent,
2. The bag search operator
securitysolutionsmagazine.com
3. In this case, the training of the
plenty of time to observe him.
Israel and Europe. Steve can be Steve Lawson has over 20 years of experience in
contacted on 0404 685 103 or slawson@avsecconsulting.com.
SECURITY SOLUTIONS // 53
ACCESS CONTROL
THE TOP TRENDS FOR FACIAL RECOGNITION IN 2019 Facial biometrics – fascinating and intriguing
4. Mapping of new users
Few biometric technologies are sparking the
6. Face recognition latest hacks
imagination quite like facial recognition.
7. Towards hybridized solutions.
Equally, its arrival has prompted profound
5. Face recognition and the legal system
Let’s jump right in.
concerns and reactions. But more about that later. With artificial intelligence and the blockchain,
Biometrics are showing up in airports and border crossing points across the world,
face recognition certainly represents a significant
promising to enhance security, as well as improve
digital challenge for all companies and
and expedite air travel.
organizations - and especially governments. In this article, we cover the 7 face recognition
A Sci-fi Technology... Without The Fiction
facts and trends that are set to shape the
Since its invention in the 1970s, face recognition
landscape in 2019.
has made giant strides forward.
1. Top technologies
Today it is considered to be the most natural
2. Deep learning impact
of all biometric measurements. And for good
3. Market dynamics and dominant use-cases
reason – we recognize ourselves not by looking
54 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
example, but by looking at our
Why Facial Recognition Then?
faces. Before we go any further,
Facial biometrics continues
let’s quickly define “identification”
to be the preferred biometric
and “authentication”.
benchmark. That’s because it’s
cameras offer an interesting
easy to deploy and implement.
combination for facial
How does face
There is no physical interaction
recognition applied to large
recognition work?
required by the end user.
areas during mass events for
Biometrics are used to identify and
Moreover, face detection and face
example. According to the
authenticate a person using a set
match processes for verification/
Keesing Journal of documents
of recognizable and verifiable data
identification have become
and Identity of June 2018
unique and specific to that person.
very fast.
(issue 56), some hovering
at our fingerprints or irises, for
Identification answers the question:
UEFA Champions League Final in 2017. • Drones combined with aerial
drone systems can carry a
“Who are you?” Authentication
Facial Recognition Markets
10-kilo camera lens which
answers the question: “Are you
A study in June 2016 estimated
can identify a suspect from
really who you say you are?”.
that by 2022, the global face
a distance of 800 meters at
Here are some examples :
recognition market would
a height of 100 meters. As
In the case of facial biometrics,
generate $9.6 billion of revenue,
the drone can be connected
a 2D or 3D sensor “captures”
supported by a compound annual
to the ground via a power
a face. It then transforms it
growth rate (CAGR) of 21.3%
cable, it has unlimited power
into digital data by applying an
over the period 2016-2022. This
supply. In addition, the
algorithm, before comparing the
increases to 22.9% growth if we
communication to ground
image captured to those held in
take government administrations
control can’t be intercepted.
a database. This is a faithful and
alone, the biggest drivers of
“augmented” replica of the process
this growth. The main facial
2. Health
at work in the human brain.
recognition applications can be
Significant advances have been
grouped into three key categories.
made in this area. Thanks to deep
These automated systems can be used to identify or check the
learning and face analysis, it is
identity of individuals in just a
Top 3 Application Categories
already possible to:
few seconds based on their facial
1. Security - Law Enforcement
• track a patient’s use of
features: spacing of the eyes, bridge
This market is led by increased
of the nose, contour of the lips, ears,
activity to combat crime and
chin, etc.
terrorism, as well as economic
They can even do this
competition. The benefits of
in the middle of a crowd
facial recognition for policing are
and within dynamic and
evident: detection and prevention
unstable environments.
of crime.
medication more accurately • detect genetic diseases such as DiGeorge syndrome with a success rate of 96.6% • support pain management procedures.
Owners of the iPhone X
• Facial recognition is used when
have already been introduced
issuing identity documents,
This area is certainly the one
to facial recognition technology.
and most often combined with
where use of facial recognition
However, the Face ID biometric
other biometric technologies
was least expected. And yet
solution developed by Apple was
such as fingerprints.
quite possibly it promises the
heavily criticized in China in
• Face match is used at border
3. Marketing and Retail
most. Know Your Customer
late 2017 because of its inability
checks to compare the portrait
(KYC) is sure to be a hot topic
to differentiate between certain
on a digitized biometric
in 2019. This important trend
Chinese faces. Of course, other
passport with the holder’s face.
is being combined with the
signatures via the human body
securitysolutionsmagazine.com
Police implemented it at the
• Face biometrics can also be
latest marketing advances in
also exist: fingerprints, iris scans,
employed in police checks
voice recognition, digitization of
although its use is rigorously
veins in the palm of the hand and
controlled in Europe. In
outlets, it is now possible to
behavioral measurements. These
2016, the “man in the hat”
analyze the behavior of shoppers
are mainly used to secure online
responsible for the Brussels
and improve the customer
payments in an environment
terror attacks was identified
purchase process. How exactly?
where cybercrime has proliferated
thanks to FBI facial recognition
Like the system recently
in recent years.
software. The South Wales
designed by Facebook, sales staff
customer experience. By placing cameras in retail
SECURITY SOLUTIONS // 55
ACCESS CONTROL
are provided with customer
to use these devices in the
information taken from their
outskirts of Beijing.
In Brazil, the Superior
privacy carry severe penalties.
Electoral Court (Tribunal
Applicable from 25 May
Superior Eleitoral) is involved
2018, the GDPR supports the
social media profiles to produce
China is also setting up and
expertly customized responses.
perfecting a video surveillance
in a nationwide biometric data
principle of a harmonized
The American department store
network countrywide. 176 million
collection project. The aim is
European framework, in
Saks Fifth Avenue is already using
surveillance cameras were in use
to create a biometric database
particular protecting the right
such a system. Amazon GO stores
at the end of 2017 and 626 million
and unique ID card by 2020,
to be forgotten and the giving
are also reportedly using this type
are expected by 2020.
recording the information of 140
of consent through clear
of system.
Facial recognition will be a major topic for the 2020 Olympic
million citizens. Russia’s Central Bank has
affirmative action. • In America, the State of
How Long Before We See The
Games in Tokyo (Japan). This
been deploying a country-wide
Washington is the third US
Selfie Payment?
technology will be used to identify
biometric program since 2017
state to formally protect
Since 2017, KFC, the American
authorized persons and grant
designed to collect faces, voices,
biometric data through a new
king of fried chicken, and Chinese
them access to controlled areas
iris scans and fingerprints.
law introduced in June 2017.
retail and tech giant Alibaba, have
automatically enhancing their
been testing a face recognition
experience and safety.
payment solution in Hangzhou,
In Sydney, face recognition is
In July 2018, Bradford L. Smith, When Facial Recognition
Microsoft’s president, compared
Strengthens The Legal System
the technology to products
China. So, Minority Report could
undergoing trials at airports to
The ethical and societal challenge
like medicines that are highly
soon become the present, not
help move people through security
posed by data protection is
regulated, and he urged Congress
the future!
much faster and in a safer way.
radically affected by the use of
to study it and oversee its use.
facial recognition technologies. Do
“We live in a nation of laws, and
Mapping of New Users
In India, the Aadhaar project
While the United States currently
is the largest biometric database
these technological feats, worthy
the government needs to play
offers the largest market for face
in the world. It already provides
of science-fiction novels, genuinely
an important role in regulating
recognition opportunities, the
a unique digital identity number
threaten our freedom? And with it
facial recognition technology,”
Asia-Pacific region is seeing the
to 1.2 billion residents. UIDAI, the
our anonymity?
fastest growth in the sector. China
authority in charge, announced
• In Europe, the General Data
and India lead the field.
the launch of facial authentication
Protection Regulation (GDPR)
Puttaswamy judgment delivered
as part of their system in 2018.
provides a rigorous framework
on 27 August 2017, the Supreme
hot tech topic in China from
Face authentication is available
for these practices. Any
Court has enshrined the right
banks and airports to police.
as an add-on service in fusion
investigations into a citizen’s
to privacy in the country’s
Now authorities are expanding
mode along with one more
private life or business travel
constitution. This decision has
the ‘facial recognition sunglasses
authentication factor like
habits are out of the question
rebalanced the relationship
program’ as police are beginning
fingerprint, Iris or OTP.
and any such invasions of
between citizen and state,
Facial recognition is the new
56 // SECURITY SOLUTIONS
Mr. Smith wrote. • In India, thanks to the
securitysolutionsmagazine.com
and poses a new challenge to
the eyes permanently watching
allowed them to bypass the facial
and not from a photograph
expansion of the Aadhaar project
our movements and confuse
authentication of Windows 10
(2D), a video screen (2D) or a
in 2018. The Indian government,
face detection devices. He
Hello by printing a facial image
mask (3D), (liveness check or
however, approved the use of
has developed an algorithm
in infrared.
the country’s biometric EID
which creates special makeup
program by private entities on 28
to fool the software. However,
article dated 31 May 2018 that
(morphed portraits) of two or
February 2019.
he has chosen not to bring his
researchers from the University
more individuals have not been
Rebound effect: the legal system
product to market after realizing
of Toronto have developed
joined into a reference document
and its professions get even
how easily it could be used
an algorithm to disrupt facial
such as a passport.
stronger. As both ambassadors
by criminals.
recognition software (aka
and guardians of data protection
• In Germany, Berlin artist Adam
• Forbes announced in an
liveness detection) 2. Make sure that facial images
privacy filter). In short, a
Further Together – Towards
regulation, the post of data
Harvey has come up with a
user could apply a filter that
Hybridized Solutions
protection officer has become
similar device known as CV
modifies specific pixels in an
It is clear that the identification
necessary for businesses and a
Dazzle, and is now working on
image before putting it on
and authentication solutions of
much sought-after role.
clothing featuring patterns to
the web. These changes are
the future will borrow from all
prevent detection.
imperceptible to the human eye,
aspects of biometrics. This will
but are very confusing for facial
lead to “biometrix” or a biometric
recognition algorithms.
mix capable of guaranteeing total
The Rebels – Facial Recognition
• In late 2017, a Vietnamese
Hackers
company successfully used a
Despite this technical and legal
mask to hack the Face ID face
arsenal designed to protect data,
recognition function of Apple’s
The industry is working on
citizens and their anonymity,
iPhone X. However, the hack is
anti-spoofing mechanisms and
critical voices have still been raised.
too complicated to implement for
two topics have been specifically
Some parties are concerned and
large-scale exploitation.
identified by standardization
curtesy of Gemalto – a Thales
groups :
Company. For more information
1. Make sure the captured image
visit https://www.gemalto.com/govt/
alarmed by these developments. • In Russia, Grigory Bakunov has invented a solution to escape
• Around the same time, researchers from a German company revealed a hack that
security for all stakeholders in the
has been done from a person
ecosystem. n This article was reprinted
biometrics/facial-recognition
Recognize AND Analyze Is she an employee?
When, where did she enter? How often was she here this month?
Is she a banned person?
Premier face recognition technology for real-time video surveillance, recorded video investigation, crowd detection, and anonymous people analytics
www.cognitec.com | info@cognitec.com
Does she appear in videos recorded last week?
How old is she?
FEATURE
HOW TO CURE PRISONS’
contraband mobile phone epidemic
Why Manipulating Cellular Signals Is Not Effective BY NICK JORDAN AND MIKE HYNES
58 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
It is not an exaggeration to say
globe, and successfully detecting
coordinate murders. Here are
2018 on a turf war between
a mobile phone is a lifeline to
them before they do damage
just a few examples of the havoc
gangs over territory, money
the world. Ever since it became
is one of the biggest challenges
a mobile phone can wreak from
and contraband items such as
affordable to carry a portable
facing prison staff these days.
inside prison walls:
phone line and mini-computer
• In the United Kingdom,
drugs and mobile phones. • Contraband mobile phones
A Major Problem for Prisons
inmates have run a cocaine
have been linked to
have gone from nice to necessary
ring, arranged the murder of a
coordinated attacks on prison
to cannot live without them. From
To the average correctional
teenager as part of a feud and
officials and other illegal
senior citizens down to the tiniest
officer, a contraband weapon,
organised the killing of a gang
operations. A South Carolina
tyke, people love their phones –
or drugs, may be more
leader.
Department of Corrections
most people, anyway.
dangerous inside the prison
wherever we go, mobile phones
• In 2018, federal prosecutors
officer was shot six times
in the immediate term, but a
said two inmates used
phones? Anyone who works in
mobile phone is more nefarious
smuggled mobile phones to
a correctional facility – because
– because the damage it can
run a violent, drug-dealing
in a prison, a mobile phone is
cause reaches far beyond the
street gang from inside
in the North and South
not a fun, useful gadget: it is a
prison walls.
California’s super maximum
Carolina Departments of
security Pelican Bay State
Corrections were charged in
Prison.
a ‘sextortion’ ring, in which
So, who does not love mobile
safety issue. Contraband mobile phones
Inmates can use a mobile phone to continue drug-dealing
after a hit was put out on a contraband phone. • Fifteen prisoners housed
have long been a security
or organised crime operations,
and public safety concern for
threaten public officials and
blamed a prison riot that
phones to target US military
correctional agencies across the
intimidate witnesses, and even
killed seven inmates in April
service members.
securitysolutionsmagazine.com
• South Carolina officials
they used contraband mobile
SECURITY SOLUTIONS // 59
FEATURE
“The most important success factor for any correctional facility is its staff and the training they have undergone; all the innovative tactics and cutting-edge technologies in the world do not matter if the staff is not well versed in them.”
And it is not just a handful of
device. Inmates can record audio
reception is blocked entirely,
phones causing these issues; the
managed access, in which only
and video messages and arrange
jamming blocks all phones and
numbers paint a grim picture
communications from approved
for the phone’s movement into
SIM cards within the jammer’s
of the extent of the problem. In
devices are passed to cellular
and out of prison through staff,
reach, including those of prison
South Carolina in 2017, prison
carriers, or international mobile
visitors and other means, using
staff. Grabbing, as well as
officers found and took one
subscriber identity-catching
the phone itself or its SD/SIM card
managed access, allow staff
phone for every three inmates,
(grabbing), in which phones are
to carry data and continue to
phones to be put on unaffected
and many other agencies have
attracted to a fake network and
conduct criminal activities. The
white lists, but these methods
similarly high phone-to-inmate
can be monitored or blocked.
phone/data storage cards can also
are costly.
ratios – for example, in Oklahoma,
Others look to what is called
But there are several reasons
it is one phone for every six
that these options will not stem
prisoners. At least 15,000 mobile
the tide of illegal mobile phones
phones or SIM cards were
in prisons.
be used internally only, to pass information between inmates. Staff can disable or unplug
Jamming, grabbing and managed access offer mixed results. Here is the biggest reason
jammers, rendering them useless.
of all: these methods simply are
It is not a scenario prison officials
not the all-encompassing solution
like to envision, but corrupt
officials once hoped they were.
one for every six inmates. It is a
Manipulating Signals is not Effective
widespread epidemic.
While attacking contraband
staff can be bribed by prisoners
managed access technologies at
confiscated in English and Welsh prisons in 2017, equivalent to
correctional officers and other
In 2012, California deployed
phones through their signals
to unplug or disable jammers
18 of its 35 prisons, but halted
on the mobile phone contraband
seems like a good way to ensure
temporarily to allow the inmates
expansion of the program in 2015
problem, some correctional
even phones that make it into
to make calls or send data. When
because other technologies were
institutions have explored
prisons cannot be used, there are
it is only a sporadic occurrence,
outpacing the managed access
jamming or blocking mobile
some major flaws to that solution.
it makes it very difficult to detect
system, and is now moving to
reception by using a device to
A mobile phone can be used
without catching the correctional
other types of solutions.
transmit a signal on the same
as a data storage device as well as
frequency, and at a high enough
for transmission. Even without
Methods that target signals
work because cellular service
power that the two signals collide
signal and data access, a phone
can create issues with internal
providers switched to what is
and cancel each other out.
remains a useful data storage
communications. Because mobile
commonly known as 4G or Long
In an effort to clamp down
60 // SECURITY SOLUTIONS
officer or inmate red-handed.
Managed access did not
securitysolutionsmagazine.com
Additionally, where there is
Tactics include highly
The most important success
a will, there is a way – even with
qualified and trained staff,
factor for any correctional
the most updated technology.
roving correctional officers,
facility is its staff and the training
A trial in two Scottish prisons
walk-through metal detectors
they have undergone; all the
deployed a grabber system,
and X-Ray equipment at main
innovative tactics and cutting-
which cost more than 1.2 million
points of entry, portable detection
edge technologies in the world do
pounds to deploy. A report
equipment, random screens, high
not matter if the staff is not well
on the trial shows resilience
fencing/netting, drone detectors,
versed in them.
issues and the system’s lack
shakedowns and more.
of intelligence – and all that
Technologies should be
The human factor is vital in every aspect of security, and
cost was for naught in the end.
deployed at all entry points (front,
making staff experts on tactics
Prisoners developed what
back and side), as well as facility-
and technologies through hands-
officials described as “innovative
wide. An example of something
on training (including refresher
countermeasures” to circumvent
that can be used throughout a
courses for veteran correctional
the phone block.
facility is a portable ferromagnetic
officers) will help staff understand
detection system (FMDS), which
how each method contributes to
than anyone that inmates
uses passive sensors that detect
the layered security approach –
will go to any lengths to
a magnetic signature, down to a
and how it enhances their own
obtain contraband – invent a
millionth of the earth’s magnetic
safety as well.
new method of detecting or
field. It takes less than a minute
preventing, and inmates will
to set up and passively detects
find a way around it. Contraband
ferrous metals as people and
Many Tools, Not Just One
has many portals of entry to
objects move by, allowing more
Inmates will never stop trying to
a facility: unmanned aerial
detection in less time, and fewer
smuggle in mobile phones and
vehicles, or drones, can fly over
unnecessary close encounters
other contraband, which means
fencing; objects are thrown over
between staff and inmates.
prisons across the globe have
Prison officials know better
their work cut out for them – and
walls; food shipments and mail
Staff can use FMDS alongside
deliveries hide illicit materials;
X-Ray equipment at entry points
no single solution will help keep
Term Evolution (LTE) technology,
and work-release inmates and
to screen people, then pick up
phones out. A multi-layered,
which uses new frequency bands.
staff bring contraband in a side
the unit and use it throughout
holistic approach to security that
Carriers also are transmitting voice
door – or even within their own
the facility to conduct full-body
encompasses the entire facility
calls over what amounts to a Wi-Fi
body. Even the provider of the
searches of inmates and screen
using both technology and
network. The prisons’ managed
managed access systems for
mail, laundry, mattresses and
traditional methods, bolstered
access system does not capture Wi-
the California Department of
other inmate property. The units
by high-quality training, is the
Fi, Skype or satellite transmissions,
Corrections told the Associated
run on batteries – there is no need
ideal way to keep contraband –
unless inmates use Skype and
Press regarding contraband
for an electricity source, as with
including mobile phones – from
other social media applications
phones, “There is no magic bullet.
a walk-through detector, giving
creating disruption in a prison.
through a cellular connection.
You can’t try to address the
correctional officers the ability
A non-partisan study from the
demand because the demand is
to bring a security solution all
toolbox is more effective than
California Council on Science and
always going to be there.”
around a prison without worrying
having a single tool, and a
about a power source.
multi-layered security solution
Technology detailed a lengthy list
The reality is that contraband
Having many tools in the
of additional potential problems
mobile phones in prisons is a
This technology has been
puts many tools in the hands
with managed access before the
complex issue that no single
deployed in 46 countries across
of correctional professionals,
system was even deployed.
technology or method can
the globe, including in all New
helping them maintain order,
address. Instead, successfully
Zealand and United Kingdom
security and safety both inside
technology is always changing,
fighting contraband phones
prisons, all 54 state prisons in
and outside a prison. n
which means jamming, grabbing
requires multiple technologies,
New York, all 24 state prisons in
and managed access systems are
tactics and training.
Maryland and in California and
The issue remains that
Nick Jordan is international
Indonesia. FMDS goes beyond
sales director for Metrasens.
detecting phones and can find
He can be reached at njordan@
any ferrous metal contraband,
metrasens.com
upgrades to keep current – and
The Solution: The Multi-layered Approach to Security
not only are these methods
To fight contraband, correctional
detect ferrous metal objects inside
accounts – US Corrections, for
expensive to deploy, but they are
facilities must use a layered
a human body – unlike hand
Metrasens. He can be reached at
even more costly to upgrade.
security solution.
wands or walk-through detectors.
mhynes@metrasens.com
only as good as the technology they were designed for. These systems would require constant
securitysolutionsmagazine.com
including weapons, and can even
Mike Hynes is director of key
SECURITY SOLUTIONS // 61
CCTV
HOW TO PROTECT HOUSES OF WORSHIP BY AMI TOBEN
This article will detail a number of ways in which houses of worship can better protect themselves from deadly attacks. It applies to any house of worship and any religion, from mosques, churches and synagogues to temples, shrines and any other type of religious gathering place. I do not just want to give readers some general, theoretical advice here. What follows are proven, practical methods to protect houses of worship. These are time-tested, experiencetested ideas, strategies and tactics that I have been involved in for 15 years.
Knee-jerk Reactions Knee-jerk reactions, in and of themselves, are not necessarily the worst things in the world, especially if they cause organisations to tighten their security measures. The main problem with them is that they are almost always temporary measures that target feelings without properly addressing physical protection. The security enhancements they prompt therefore tend to go away after a while, leaving the organisation just as vulnerable as it was before the incident occurred – which is exactly opposite of what you need. A terrible incident can provide good motivation for tightening security, but rather than letting yourself get carried away with emotional responses, anxiety can be put into much better use if it motivates you to build or enhance a permanent security program, one that takes into account your organisation’s operations, character and budget. That way, it will still be in place when you actually need it most – before the next attack.
62 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
How to Balance Security with a Warm, Welcoming Environment
eyes countless people go from
your security costs, it is whether
risk. Threat is the potential harm
opposing security to becoming
you can afford not to protect
to your asset, risk is the likelihood
huge fans of it.
your organisation.
of that threat/harm being
Finding The Best Security Solutions
things in this way, you will be
losing your warm and welcoming
Budgets – can you Afford Security?
identity? This is not an
Okay, there is no way around
One of the most common – and
security solutions.
unimportant question, nor is it
this – good security will cost you
most expensive – mistakes many
a rhetorical one. It is a question
some money. There are some
organisations make is to leap to
that mitigate risks (lowering the
with a very clear and important
government programs that can
security solutions before they
probability of harmful incidents)
answer. Based on years of
help cover some of your initial
properly identify what they
are your preventive measures.
experience, I can tell you that the
costs (or in some cases, all of
need. Security might not be
Security solutions that mitigate
answer is a resounding yes!
them). With that said, however,
rocket science, but if you leap
threats (decreasing the severity
in order to sustain and maintain
straight into installation and
of harmful incidents once they
cheap, and in some cases
a proper security program, you
implementation, you are very
have started) are your reactive/
there is a bit of an adjustment
are going to have to spend some
likely to miss certain things
emergency measures. You will
period. But I cannot think
of your own money as well.
and waste quite a bit of money
want to have both.
Can you bolster security without
It is not always easy, or
of a single organisation that
realised. Once you have defined
Yes, I know it is difficult and
on others. I have seen many
much better positioned to look for In general, security solutions
The key to finding good
has gone through this where
everyone’s budgets are always
organisations with gaping
security solutions is to ask:
members, guests and employees
tight. Money, much like time,
security holes after they have
1. What am I trying to protect?
now complain about their
is not something that most
wasted tens, or even hundreds,
2. What am I trying to protect
environment not being warm
people and organisations have
of thousands of dollars on
and welcoming enough. For
available. So, if you are going to
badly planned and executed
3. How do I want to protect it?
example, I can very clearly
ask the question, “Do we have
security solutions.
A solution, by definition, is a
remember a time when people
the money for security right
worried that installing security
it from?
Yes, you have security
means of solving a problem.
now?” the answer will always
concerns and you want to
If a security provider cannot
cameras would harm their warm
be, “No”. This is why you have to
address them as soon as
frame the solutions they offer
and welcoming environment.
change the way you think about
possible, but start with a security
in a way that answers a security
Now, no one even bats an eye
it. A security budget will never
assessment. This does not have
question, consider going with a
when they see cameras (if they
just be sitting around, available
to be a long process. While I
different provider.
even notice them at all).
for use. A security budget has to
would recommend engaging a
be allocated.
professional security consultant, you can also do much of the work
The Main Components of a Security Program
of time and effort, fundraising
yourself. There are even some
There is a huge range to these
and cajoling, but it can be done.
good – and free – resources for
categories and you might not
perform access control. I have
I have seen many organisations,
this, like what US organisations
necessarily want, or need, to
heard many a complaint from
big and small, that supposedly
can get from the Federal
implement every single one of
people concerned that nameless
could not afford security that
Emergency Management Agency
them, but here are the basics.
security guards will turn their
eventually pulled it off. Every
(FEMA).
house of worship into some
organisation has to figure
kind of prison. However, as
out its own way to allocate a
and prioritise what you want
This covers your burglar alarm
soon as they give it a try (and
security budget, and how large
to protect. In every case, your
systems, security camera systems,
as long as they hire the right
or small this budget will be.
most important asset is your
access control system and
security provider), they end up
But remember, if you do not
people. Next on the list are things
intercom. Larger properties often
seeing that it is just Brian or
establish a security budget,
like property, reputation and
have some type of enterprise
Ajay or Malek or Karen, or Ami,
it means you are not taking
environment/atmosphere.
solution that integrates various
who smilingly welcomes them
security seriously enough.
Many organisations are also concerned about losing their
Yes, it sometimes takes a bit
welcoming, open-door policy if they hire security officers to
Your first step is to identify
You then want to identify
Electronic Security Systems
safety and security systems. Keep
and define your concerns – what
in mind that electronic security
your insurance costs,
are you worried might happen
systems do not make a secure
maintenance costs and payroll
to each asset. We always try to
property. It is not just about the
countless times over the years
costs. The question is not
calculate the combined value of
hardware, it is about how you
and have seen with my own
whether you can also afford
two important factors: threat and
use it.
at the entrance while keeping everyone safe. I have done this myself
securitysolutionsmagazine.com
You can somehow afford
SECURITY SOLUTIONS // 63
CCTV
Protective/Guard Services
personally have no problem with
My company only provides
The general categories here (in
armed security as long as people
concealed armed security, which
frequency of use) are:
understand what it is and what
means it only functions as a
• day-to-day facility/campus
it is not. So, let me correct two of
reactive tool. And though there
security guards: dedicated to
the most common misconceptions
are some who fear that this might
property management, access
about it.
cause the officer in question
control, people management and incident response.
Among those who support
to over-depend on his strong
the idea of armed security, there
reactive capabilities and not do a
are people who claim that if
good job at proactive prevention,
level services for special
security is not armed, then it is
I have yet to see such a thing
events, holidays, weddings,
not real security and it is just a
in my 15 years of work in the
parties and more.
false facade –’security theatre’.
security industry.
• special event security: higher
As with most other goods and
This is incorrect because it
services, you get what you
completely misses the idea of
weapon can do just as good a job
pay for. I would obviously
preventive security and what can
as an unarmed one in preventive
recommend you spend more
be achieved through deterrence
security, access control, customer
rather than less on protective
by appearance, detection of
services and all the rest of it. It is
services, but if budgets do not
suspicious activity, exposing of
just that he/she also has an extra
allow for this, it is important to
suspicious people and solid access
tool when it comes to emergency
set your expectations correctly.
control. And no, once again, I
reactive measures. This is why
If you only have the budget for
am not just talking theory here. I
I am generally in favour of it,
a Hyundai, do not expect it to
have my own experience and that
though I will never discount
perform like an Aston Martin.
of many others, not to mention
or dismiss the overwhelming
countless case studies and
majority of security that
up most often here is whether
incident reports to support this.
is unarmed.
security officers should be
It is true that unarmed security
employed on a full-time basis
cannot guarantee your safety,
question that comes up is
or just during services, special
but guess what, neither can
whether community members
events, holidays and so on.
armed security.
or congregant volunteers can
The question that comes
There is no clear-cut answer
On the side that usually
An officer with a concealed
Lastly, another common
also provide certain guard
here because it depends on
opposes armed security is the
duties. The answer to this is
various factors, such as how
claim that it will only make the
an obvious yes, but it comes
and offer to share resources
many people are in your facility
environment less safe. Here too,
with a few caveats. Community
and information. They will
during a routine day, whether
I can speak from many years of
volunteers can indeed be good,
almost always agree to help and
your facility/campus contains
security company experience,
motivated and sometimes even
reciprocate. Even among rival or
a school or day care centre,
employing many armed officers
experienced and well-trained
competing organisations, when it
whether it is a large and/or well-
at houses of worship, community
protectors. But since this depends
comes to security, it is common to
known organisation, whether
centres and schools. I know of
on volunteering rather than
find solidarity and cooperation.
the environment around it is
no cases where security was
on professionally accountable,
safe or whether the organisation
compromised due to the officer
licensed, paid security providers,
Emergency Planning
is specifically threatened in
being armed. Armed security is
it can be difficult to put together a
In the US, any organisation with
any way. I think your starting
no more – and no less – than a
solid, consistent, ongoing security
10 employees or more is required
point should be to have security
very strong reactive capability.
program around it.
by the Occupational Safety and
officers at your special events
And if the weapon is carried in an
and large prayer gatherings
exposed manner, it can serve as a
Networking – Intelligence and
a written emergency action
and, depending on the above-
preventive measure as well.
Information Sharing
plan. Most people already know
Networking with other
the basics here (in case of fire,
mentioned factors, you should
Though armed security tends
Health Administration to have
also seriously consider having
to polarise people between
organisations (of any
in case of earthquake and so
security officers there on a full-
advocates and opposers, in
denomination) is extremely
on), but religious organisations
time basis.
all the years we have been
important. When it comes to
should have more comprehensive
Another common question
providing it, we have never had
security, no one needs to go it
procedures that also include
people ask is whether they should
any issues, accidents or negative
alone, re-invent any wheels or
active intruder response,
have armed or unarmed security
repercussions as a result of it,
struggle in the dark to get crucial
suspicious package response
officers. Again, there is no clear-
even at organisations that were
information. Reach out to other
and more. This does not mean
cut answer to this question. I
initially uneasy with the idea.
organisations, ask for advice
that the written plan should be
64 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
local law enforcement agency,
interests? In reality, people very
ask to speak with the ranking
often find security measures to be
officer or the officer in charge of
uncomfortable and inconvenient.
private sector liaisons and share
We naturally go along the path
your thoughts and concerns with
of least resistance and, if given
them. You might be surprised
the opportunity, take short cuts.
to discover that in most cases,
Strong policies and procedures
not only are they going to be
are the glue that will hold your
amenable but they will be openly
whole security program together.
appreciative of you reaching out
is to establish who in your
take community policing
organisation is in charge of
quite seriously.
security. If you hire outside
Get to know your local law
should be the main point of
the sergeants and the patrol
contact for them. Depending on
officers. Offer your facility during
the size of your organisation,
off-hours (usually overnight) for
you might also want to establish
them to train in. Make it known
a security board or committee
to the patrol officers that they
that will be in charge of making
can drop by any time they need a
decisions and using and
bathroom break or a cup of coffee
balancing the security budget.
very appreciated). Not only will the regular
Staff Training
cover more than just fire and
By this I mean security training
earthquake. In fact, you should keep it as concise as you can.
security providers, this person
enforcement agency, get to know
(trust me, this one is going to be
book length, only that it should
An important part of this
to them. Most police departments
Working security at many houses of worship over the years, I am used to people expressing
presence of law enforcement
gratitude for my being there,
officers provide a good preventive
along with a regret that my job
security measure, but when you
is necessary in the first place.
have a security incident, you
Though my uneasy reply to this
will find them very responsive
show of gratitude has always been,
and familiar with your facility
“Thank you. I agree.�, I now wish
or campus.
to convey the same sentiment
And yes, some employees,
about this article. I regret the fact
for non-security personnel.
guests or congregants might raise
that it is even necessary and yet,
The basics you will want to
an eyebrow once they see more
considering the world we live in, I
cover are emergency response
law enforcement presence, but
hope you found it useful. n
hire a professional emergency
(mentioned above) and
I can tell you from experience
planner for this project, but if
general security awareness.
that they will get used to it pretty
you do not have the budget for
It is also useful to cover
quickly and will then start to
director, consultant, trainer,
this, there are local, state and
things like verbal compliance
really appreciate it.
operator and business developer,
federal government resources,
and verbal management of
and even some great non-profit
aggressive behaviour.
For best results, you should
organisations like the Red Cross,
As for drilling, make sure to
An experienced security
Ami Toben has over 14 years Policies and Procedures
of military and private sector
No, I did not save the most boring
security experience, and a
that can help you with this – free
follow the correct order of 1)
subject for last; I saved perhaps the
successful record of providing
of charge.
security plan, 2) security training
most important one. Policies and
full-spectrum, high-end services to
and 3) security drilling. Do not
procedures are what will direct
Fortune 500 corporations, foreign
wheel when it comes to a written
just drill something you have
your staff to implement everything
governments, foundations, non-
emergency plan. The resources
not trained on first, and do not
covered above. You can have the
profit organisations and wealthy
mentioned above have very
train on something that is not
best security measures in place,
individuals. Ami is currently
good and free templates on the
part of an established, written
but if your staff do not use them
director of consulting, training
internet. Adapt a template to
security plan.
(or do not use them correctly), they
and special operations at HighCom
will not be worth much.
Security Services, a US-based
Do not try to re-invent the
your own specific situation, let
high-end security firm specialising
someone look it over to make
Law Enforcement Relationships
sure you got it right and you will
This one is also important and
much sense. Why would people
in protective services, security
probably be good to go.
also free. Get in touch with your
work against their own security
systems, consulting and training.
In theory, this might not make
ACCESS CONTROL
ARMS RACE BETWEEN MALWARE RESEARCHERS AND MALWARE PRODUCERS HEATS UP BY NICK FITZGERALD
As malware becomes more
ends increasingly replaced that
the aim of these regulations is
manually, using human resources,
complex and its producers
earlier ‘hacker ethic’. Nowadays,
to protect individuals who may
is impossible.
become more sophisticated,
cybercriminals may distribute
have their sensitive information
traditional, manual approaches
ransomware, or conduct corporate
compromised or stolen. By
created in massive quantities,
to classification and detection
espionage, or even sabotage, for a
complying with the regulations,
companies receive a massive
are no longer sufficient to protect
fee. Other groups are more clearly
companies can prioritise
number of alerts from their
organisations. Cybercriminals are
state-sponsored organisations,
their customers’ privacy and
security systems, monitoring tools
increasingly organised, working
such as those accused of meddling
information, as well as their
and user activity. Network traffic
in corporate-like structures with
in the US presidential elections.
own interests.
continues to increase, and the
full-time teams dedicated to
Regardless of attackers’
Protecting information is no
Along with new data being
resulting amount of cybersecurity-
producing malware to spy on, steal
motivations, companies are
longer as simple as implementing
related data alone is literally
money or intellectual property
under more pressure than ever
anti-malware technology or
impossible to analyse by humans
from, ransom, or otherwise
to protect themselves from
monitoring tools. Companies
operating in isolation.
incapacitate organisations.
cybercriminals. This is because
cannot address the problem using
companies not only need to worry
human teams exclusively, simply
machine learning (ML) has led to
narrow depiction of criminal
about the financial ramifications
because of the sheer scale and size
the development of cybersecurity
hackers could not be further
of a successful attack (although
of the issue.
solutions that can help protect
from the truth. By and large,
they must), and not only need to
organisations are not taken
protect themselves against the
challenge in cybersecurity
requiring massive amounts of
down by lone hackers in hoodies,
reputational damage following
right now is the amount of data
human time and resources.
tapping away at keyboards in
an information breach (although
involved. For example, in 2017,
Instead, many processes can be
their parents’ basements. They are
they should), but they also need
every minute saw 400 hours of
automated, protecting networks
more likely to be attacked by state-
to comply with increasingly
video uploaded to YouTube, more
without human intervention,
sponsored, or at least well-funded,
tight government regulations
than 186 million emails sent, half
except when certain alerts are
commercially oriented groups
around privacy.
a million comments made on
triggered. Equally unfortunately,
Europe’s General Data
Facebook, 455,000 new Tweets,
many vendors and pundits gladly
Protection Regulation (GDPR),
and more than 3.5 million new
misrepresent their ML-based
a broad variety of motivations.
in combination with Australia’s
Google searches. There are 2.5
products under the misleading
Some are simply motivated
privacy laws, recently enhanced
quintillion bytes of data created
label of artificial intelligence (AI).
by mischief and a love of the
to include mandatory reporting
every day and 90 percent of the
challenge. Seeing how much
of notifiable data breaches, has
data that currently exists was
however, ML enables important
damage they can get away with
set the scene for a compliance-
created in the past two years
advancements in cybersecurity;
is where the thrills lie for these
driven approach to cybersecurity.
(Domo, 2017). With the Internet
ones that businesses should
hackers. Thrill seeking was the
Businesses must familiarise
of Things (IoT) likely to contribute
absolutely leverage. In fact,
most common motivation behind
themselves with legislation and
to a further explosion of data,
research suggests that ML in
malware attacks until the early
act to comply. This can be complex
it is fair to say that monitoring
cybersecurity will boost big
2000s, when money and political
and resource intensive. However,
and classifying all that data
data, intelligence and analytics
TV and Hollywood’s typically
of hackers. Cybercriminals work with
66 // SECURITY SOLUTIONS
Boiled down, the greatest
Fortunately, the evolution of
businesses from malware without
Ignoring this AI hype,
securitysolutionsmagazine.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 67
ACCESS CONTROL
spending to US$96 billion by 2021
decisions based on specific input
to reduce the number of
not just disguise them. For
(ABI Research, 2017). However,
that has been used to train the
false positives.
example, attackers that can
it is worth noting that ML alone
algorithms. It cannot extrapolate
will not solve the cybersecurity
or ‘think’ for itself.
This works well where there
understand how the ML algorithm
are plenty of samples available
is set up or where it draws
to use as teaching resources.
training data sets from can poison
problem. This is partly because
Indeed, many organisations
cybercriminals also have access
have already implemented ML
Malware, spam and some other
the data. They can use counter-
to these technologies. Just as
in their cybersecurity strategies,
types of attack have plenty of
intelligence techniques whereby
businesses can automate their
perhaps without necessarily
training data, making them ideal
they introduce data that makes
response to cyberattacks, so can
recognising that they have done
for an ML approach. However,
malicious traffic look legitimate
cybercriminals automate their
so. In reality, what many refer
where there is not much training
and vice versa.
attacks, potentially leading to an
to as AI is actually ‘only’ ML.
data available, ML approaches
escalating war.
True AI is yet to materialise,
become unworkable. For example,
generate phishing messages.
Unfortunately, research
Or, they could use ML to
in cybersecurity or elsewhere.
when it comes to detecting attacks
Based on historical information
shows that 75 percent of IT
And, while ML may seem novel,
from network traffic, there is not
about successful attacks, ML
decision makers believe AI and
it has been in use for a long
yet a useful training data set that
algorithms could be used
ML are the silver bullet to solving
time, especially in the malware
can be relied on. Without a good
to develop and launch new
cybersecurity challenges (ESET
detection field.
training data set, the machine
attacks that use the best of the
cannot learn.
techniques that have previously
White Paper, 2018), despite
Endpoint security products
only 53 percent claiming to
primarily use ML in detection
fully understand the difference
decision making. Product
aware of is the tension between
generating effective scam emails
between the two (ESET White
developers feed massive numbers
malware producers and malware
would let malicious actors
Paper, 2018). This creates a
of correctly labelled clean and
researchers. ML algorithms
conduct phishing attacks on a
false sense of security that
malicious samples into ML
have a narrow focus and cannot
grand scale. And, since phishing
could contribute to businesses
algorithms, which ‘learn’ the
think for themselves; essentially,
is a numbers game, the more
falling victim to cybercrimes
differences between the ‘good’
they play within a defined set
attacks that are launched, the
they thought they were
and ‘bad’. This ‘knowledge’ is
of rules. For example, they are
more likely it is that at least some
protected against.
represented in an ML model,
taught to identify certain threats.
This misconception has been
Another key limitation to be
which is included in the endpoint
By contrast, malware producers
blamed on the amount of hype
security product so files on the
are continually learning and
in the industry around these
protected system can be classified
breaking the rules, coming up
technological advances. While
quickly, according to the model.
with new ways around established
there are exciting new tools with
ML helps security developers
protections. So, while the ML tool
plenty of potential, ML should
improve malware detection
learns to identify threats similar to
be treated as just one part of
engines, increase detection
those it has seen in the past, it will
an organisation’s overarching
speeds, reduce the latency of
not recognise new threats entirely
cybersecurity strategy. This is
adding detection for entirely new
unlike those seen before. Thus,
because cybersecurity is an
malware families, and enhance
malware researchers may be a
incredibly complex challenge and
abilities to spot suspicious
step behind cybercriminals, even
the ‘threatscape’ is constantly
irregularities. These developments
when using ML to reduce the total
shifting. No, one single tool or
lead to higher levels of protection
amount of human effort required
technology can fully protect an
for organisations against advanced
to protect systems.
organisation from the gamut of
persistent threats (APTs), and new
malware. It is therefore unwise
and emerging threats.
to gamble an organisation’s
Although ML is incredibly
Cybercriminals might use ML to become harder to detect and more successful in their
entire cybersecurity strategy on
useful in such contexts, it does
attacks. In 2003, the Swizzor
one approach.
have limitations. For example,
Trojan horse used automation
the initial classification of clean
to polymorphically repack its
that an organisation’s IT decision
and malicious samples requires
malware once every minute.
makers are clear on the meaning
extensive, initial classification
Consequently, each new victim
of the terms AI and ML. AI is
effort by humans. In other words,
was attacked by a slightly different
a broad umbrella term; ML
humans have to ‘teach’ the ML
variant of the malware. This
is a subset of AI. True, AI can
tool how to classify samples.
complicated detection, helping the
extrapolate new conclusions
Humans are also required during
malware spread more efficiently.
without new training data. ML,
the process to monitor the ML
while powerful, can only make
modelling process, particularly
A good first step is to ensure
68 // SECURITY SOLUTIONS
been successful. Automatically
Furthermore, cybercriminals might use ML to enable attacks,
securitysolutionsmagazine.com
of them will yield results for
continuing evolution of ML is
important, IT decision makers
malicious traffic even if the ML
the attackers. That is bad news
unlikely to make human security
need to know enough about the
algorithm has been compromised.
for businesses whose security
professionals redundant. The
incident to respond intelligently.
It is important to remember that
providers already process more
strongest protection comes at the
Therefore, ML can be highly
machines are not infallible and
than 300,000 new pieces of
intersection between humans and
valuable in providing the context
humans will still be required to
malware per day.
machines. In other words, trained
and information needed for
monitor them to ensure they are
security professionals, working
human responders to deal
getting it right.
enhanced type of ML, behave
with state-of-the-art tools,
effectively with an incident.
more like true AI, independently
including ML, will always be
adjusting and evolving as they
more powerful than a human or a
realise that ML is not a silver
to involve a human at key
learn. This means that massive
computer working in isolation.
bullet and that it does have
points. This includes when
limitations for cybersecurity.
the ML algorithm encounters
Deep learning algorithms, an
amounts of data are no longer
Humans are essential because
However, it is important to
ML systems should therefore be set up with triggers in place
a challenge but an opportunity.
they can think creatively and
When IT decision makers
something it has never seen
Deep learning thrives on huge
perceive context differently from
realise this, they can set realistic
before. Rather than attempt to
amounts of data; the more the
a machine that has been taught
expectations around what ML
classify it based on incomplete
better. In fact, Google is already
to execute prescribed tasks
can do for their businesses.
data, the system should request
using deep learning to block
and only make algorithmically
This includes accepting that
human intervention. This helps
violent images and abusive
derived comparisons. Computers
humans will need to be part
reduce blind spots and makes
comments, detect phishing and
running ML are essential to take
of the cybersecurity process.
ML effective based on realistic
identify malware in the Play
on the burden of sorting through
Putting humans in the loop at
expectations.
Store. It is also being used to
data and identifying anomalies,
the right time can help combat
detect fraudulent payments,
providing the information
future attacks created using ML
admin@interactivemediasolutions.
protect Google’s cloud and detect
humans need to make ever more
techniques. For example, if an
com.au n
compromised computers.
complex cybersecurity decisions.
attack is launched after feeding
Despite the potential, it is important to note that the
securitysolutionsmagazine.com
Responding quickly to incidents is essential but, equally
an ML system poisoned data, a human can still detect the
For a full list of references, email
Nick FitzGerald is a senior research fellow with ESET
SECURITY SOLUTIONS // 69
CYBERSECURITY
HOW TO FIND AND RETAIN AN IDEAL CYBERSECURITY PROFESSIONAL BY RAVIKUMAR RAMACHANDRAN
ISACA’s State of Cybersecurity
the achievement of business goals
2019 report detailing current
and the effective fulfilment of
cybersecurity profession should
trends in workforce development
cybersecurity tasks. In addition,
have general industry experience
is quite interesting and throws
the CSX Cybersecurity Practitioner
of at least three to five years,
open the forum for a wider
certification (CSX-P) deals with
or they likely will be unable
debate and deliberation. Here,
technical skills. Though this
to sufficiently understand the
we will take up the key findings
may equip professionals with
rationale of business operations
of this research report and
the required body of knowledge
and the related connections
explore them further for a
needed to take up cybersecurity
with cybersecurity. Rightfully,
deeper understanding.
tasks, an additional and very
the ISACA research rejects the
important requirement lies with
idea that university graduates
Technically proficient
the complete understanding
are adequately prepared for
cybersecurity professionals
of the business process and
cybersecurity challenges, as
continue to be in short
the business outcomes of a
that training often is conducted
supply and difficult to find. In
particular industry in which a
in abstraction without
addition, knowledge of business
cybersecurity professional wants
business intelligence.
operations and its connection to
to enter. Also important to factor
cybersecurity is preferred.
in are the compliance and legal
out by the research is the ability
This is a very significant
requirements for running that
to understand the business,
revelation, highlighting
business globally or in a particular
followed by technical skills and
the importance of industry
geographical area.
communication skills. Though
certifications. For its part, ISACA
Those entering the
The biggest skill gap pointed
A person having a business
understanding business is very
has put forward the Certified
management and/or a professional
important, technical skills and
Information Security Manager
accountancy qualification entering
communication skills also play key
(CISM) certification, which
the cybersecurity profession
roles. Sometimes deficiencies in
deals with information security
comes with an advantage, as that
the first two can be offset by good
management, and the Certified
background equips the person
communication skills, while a lack
in the Governance of Enterprise
with the needed business acumen
in communication skills may render
IT (CGEIT), which explains the
and aptitude to grasp the nitty-
the proficiency in business and
methodology of the link between
gritty faster.
technical knowledge totally useless.
70 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 71
CYBERSECURITY
The majority of organisations
learning on the fly. The job may
cybersecurity field is another
actualisation of business outcomes.
report unfilled cybersecurity
take away weekends due to hacker
factor referenced in the research
This should be well articulated
positions and the main cause
activity or preparing for the
that could be part of the solution.
and driven by the CISO so that
cited is the lack of qualified
challenges of the week ahead. At
professionals applying for open
times, it can seem like a thankless
positions. Though this could be
job; a cybersecurity professional
true in some cases, it is a known
the budget allocated is neither too low nor too big, but meets the
is seldom praised for no incidents,
Cybersecurity budget increases are expected to slow slightly.
reality that many organisations
but faces accountability for
The research indicates that
risk acceptance.
do not fill cybersecurity positions
every incident or lurking threat.
cybersecurity budgets seem to
unless a major cyber incident
Additionally, career advancements
follow a cyclical pattern, where
Conclusion
strikes them or they are mandated
are not as lucrative as in many
every alternate year cybersecurity
There is no doubt that skilled
to do so by a regulatory authority.
other fields, although on rare
budgets increase. The
cybersecurity professionals are
The Reserve Bank of India
occasions, the CISO can advance
cybersecurity budget is dependent
in high demand. Those who
and the Central Bank of India
all the way up to the CEO perch.
upon the importance placed by
wish to enter the cybersecurity
executive management on cyber
profession, in addition to equipping
mandated that all banks should
Considering the above,
actual needs of the organisation in alignment with its risk appetite and
have a full-time chief information
cybersecurity professionals
protection and its perception of
themselves with industry
security officer (CISO) who should
leaving for better financial
the associated alignment with
certifications, would do well to
be qualified with a certified
incentives or for promotional
information systems auditor
and development opportunities
(CISA) or certified information
elsewhere, as shown in ISACA’s
systems security professional
research, makes sense. Thirty-
(CISSP) certification, and
three percent reported leaving
who should be reporting to a
for a better work culture/
designation of executive director
environment – caused mainly
or higher.
due to a lack of management buy-in for compliance and
Retaining cybersecurity
cybersecurity initiatives, which is
professionals is exceptionally
prevalent in most organisations.
difficult, and the current
Thankfully, this is increasingly
enticement of employer-paid
being addressed by regulatory and
training and certification are
government policies worldwide.
not ensuring retention.
Although artificial intelligence
Once again, this is a truthful
and networked algorithm usage
though painful insight brought
for security are becoming
out by research results. The
commonplace, they will not be
cybersecurity profession can
able to replace human beings
be expensive to pursue and
completely. Increased use of
requires continuous training
training as a retention measure
and studying, on top of yearly
referenced in the research leads
subscription fees. Though
to win-win situations, as both the
the training and certification
individuals and the enterprise
expenses often are paid by the
benefit from more highly
employer (and sometimes even
trained professionals.
the subscription fees), the salary
As a consequence of the
needs to be good enough to
lack of trained cybersecurity
entice professionals to stay in an
professionals, almost 70 percent
organisation. In cybersecurity
of State of Cybersecurity
roles, every day is a different day
respondents believe that their
that brings with it new challenges
enterprise’s cybersecurity team
and struggles to acclimate. New
is understaffed. This is a very
questions, problems and puzzles
important indicator that we need
requiring robust solutions will
lots of trained cybersecurity
inevitably crop up, which forces
professionals who are industry
a professional to be constantly
ready to alleviate this situation.
updating himself or herself and
The need for more women in the
72 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
become well versed in business
Special Publication 800-181 on
processes and business strategies
National Initiative for Cybersecurity
in the native industry in which
Education (NICE) Cyber Security
they serve or have experience.
Workforce Framework is a good
It should be remembered that
reference document that describes
the combination of both leads
the interdisciplinary nature of
to the making of a complete
the cybersecurity work. The NICE
cybersecurity professional desired
framework, along with ISACA
by the industry.
guidance, can help individuals
Employers should offer
to acquire the knowledge, skills
competitive pay and career
and abilities (KSA) needed to
growth opportunities in addition
complete tasks than can strengthen
to healthy work environments
the cybersecurity posture of an
to attract and retain the best
organisation and to strengthen
cybersecurity professionals.
cybersecurity workforce
The National Institute of Standards and Technology (NIST)
securitysolutionsmagazine.com
development, planning, training
“Those entering the cybersecurity profession should have general industry experience of at least three to five years, or they likely will be unable to sufficiently understand the rationale of business operations and the related connections with cybersecurity.�
and education. n
SECURITY SOLUTIONS // 73
PROFESSIONAL DEVELOPMENT
THE RUDDOCK FELLOWSHIP An Awardee’s Perspective BY JAMIE EDDEY
In my last semester of a six-
I received an email from ECU
a discount, living in an apartment
year (part-time) degree through
that stated I was eligible to apply
in Dubai for three months would
Edith Cowan University (ECU), I
for the Emirates Scholarship,
cost more than the award from the
applied for and was awarded a
although I was not even sure if I
university. We also knew it would
scholarship to work for Emirates
should act on it.
be hard on our family; however,
Group Security in Dubai, United
In June 2017, I applied for the
we believed it would improve
Arab Emirates. Even with
scholarship through ECU for the
my career pathways, while also
the award that came with the
once-in-a-lifetime opportunity to
setting me up to graduate six
scholarship, this opportunity
work for Emirates Group Security
months ahead of schedule.
would come at a cost – a mentor
in Dubai. By late September, I
of mine recommended I apply for
thought I had missed out and
while working for Emirates
the Ruddock Fellowship.
was knuckling down for my final
Group Security, Rod Cowan,
push to complete my degree.
recommended I apply for the
Parliamentary Security Service
To my excitement and shock, I
Ruddock Fellowship. The Ruddock
for 10 years when I applied for the
was notified of my successful
Fellowship was established by
Emirates Scholarship. That was 10
application, six business days
the Australian Security Medals
years as a shift worker, 10 years of
prior to the departure date. We
Foundation (ASMF) in partnership
missing out on weekend activities,
had just bought a house and were
with ECU. Its purpose is to provide
10 years of nightshift hangovers,
due to celebrate my daughter’s
financial assistance for people in
the last four of which were made
fourth birthday two days before
the security field who undertake
harder after the birth of my first
my departure. Thanks to an
the Emirates Scholarship to help
child. I had begun studies to give
incredibly supportive and well-
ease the financial impact of being
myself an edge when applying for
organised wife, I was on his way to
an unpaid intern while living in
jobs so that I could move away
Dubai in early October.
Dubai. To apply for the Fellowship,
I had been working in the
from shift work. In my last year
We knew this scholarship as an
One of my mentors
I was required to submit an
of core units towards achieving
unpaid intern would represent a
application outlining why I
a Bachelor of Science – Security,
financial burden for us – even at
considered myself a candidate,
74 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 75
PROFESSIONAL DEVELOPMENT
why I had been awarded the
presenting my idea, I was
given when I won the Emirates
Emirates Scholarship, what my
assigned the project, which
Scholarship, for the ASMF who
background was and what being
aimed to increase the efficiency
recognised the need for an award
awarded the Fellowship would
and security of a large Emirates
such as the Ruddock Fellowship,
mean to me. My application
facility’s supply chain; a facility
and for being recognised as
spoke of the ten years in the
that housed over 10,000 staff in
the 2017 Ruddock Fellow. I was
Parliamentary Security Service
a 24-hour period. In addition to
awarded the Fellowship in the
and the experience this job had
the project, I was entrusted to
presence of The Hon. Philip
given me, my commitment to
produce intelligence products.
Ruddock and senior members of
studies, the pressures that the
I received excellent mentoring
the Australian security industry
internship was taking on myself
during my internship from
at the ASMF’s Gala Charity
and my family, what I hoped
my Emirates Group Security
Dinner in Sydney.
the scholarship would help
supervisor and ECU’s Centre of
me achieve and the difference
Aviation Security Studies staff.
thinking of undertaking the
being awarded the Fellowship
One of my mentors requested
Emirates Scholarship but are
would make to the financial
I put together a module on
concerned about the financial
stress of being an unpaid intern.
security risk for a training
impact it will have on them
I also spoke of my decision to
package the mentor would be
and, potentially, their families,
undertake university studies and
delivering to owner/operators of
I would strongly advise them to
how I hoped this would open
security companies throughout
reach out to Winston Bucknall at
up a career pathway that would
the United Arab Emirates. Once
the ASMF through the ‘Contact
enable me to add greater value to
the module was created, the
Us’ page on their website (http://
the community while improving
mentor then suggested I should
inspiringsecurity.com/contact/). I
my work–life balance. I spoke
attend the conference in Abu
found the support very valuable
honestly about the difficulties
Dhabi and present it myself.
and know you will too. If you do
involved in leaving my wife and
I would have to present with
decide to apply for the Ruddock
daughter for three months to live
the assistance of an interpreter
Fellowship, I would advise you to
in a country I had never visited
as there were some attendees
remember to be open and honest
before. I also spoke about my
who did not speak English. My
about what the opportunity
decision to continue studying
mentor stated his belief in me
means to you for your future,
two core units while undertaking
to deliver the module, and his
and how you plan to proudly
the internship, effectively
faith that I would represent
represent ECU as an ambassador,
attaining (and paying for) six
him, Emirates Group Security
Emirates Group Security as an
units of academic recognition in
and ECU excellently. This kind
intern, and the ASMF as the
one semester.
of mentoring and trust allowed
Ruddock Fellow if successful in
me to step outside of my comfort
your application.
My open and honest application was well received
zone and grow professionally
by the ASMF and, while still
and personally.
being stunned at being offered
Since returning from my
If there are any ECU students
More information about the Emirates Scholarship through ECU can be found on the ECU
the opportunity to live in Dubai
internship in Dubai, I have
Emirates Scholarship webpage
and work for a world-leading
graduated as part of the ECU
(http://www.ecu.edu.au/
aviation security organisation,
class of 2017. I also achieved
scholarships/details/emirates-
fortune smiled on me once more
my dream of finishing a
scholarship). n
as I was announced the 2017
career in shift work after
Ruddock Fellow.
successfully applying for the
Jamie Eddey graduated
role of an Intelligence Officer
from Edith Cowan University
to be awarded the Emirates
in the Therapeutic Goods
in 2017 with a BSc – Security.
Scholarship by ECU and speak
Administration. My director
Jamie has 11 years of experience
very highly of Emirates Group
informed me that the experience
in the security industry, having
Security. I walked through the
gained from working for
worked in Security Operations
door as an unknown intern and
Emirates Group Security in
in Parliament House for nine of
was afforded the responsibility
Dubai played a significant part
those years. Jamie was named the
of identifying an operational
in my successful application
2017 Ruddock Fellow following
area that could benefit from
for the role. I am incredibly
his scholarship to work for
an innovative approach. After
grateful for the opportunity I was
Emirates Group Security in Dubai.
I know how fortunate I was
76 // SECURITY SOLUTIONS
The Ruddock Fellowship was established by the Australian Security Medals Foundation (ASMF) in partnership with ECU. Its purpose is to provide financial assistance for people in the security field who undertake the Emirates Scholarship.
securitysolutionsmagazine.com
FEATURE
78 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
NO COOKING THE BOOKS Australian Taxation Office Crack Down On WorkRelated Expense Claims To help you claim the right
deliberately and fraudulently
amount at tax time, the Australian
try to manipulate the system by
Taxation Office (ATO) has
claiming deductions they are not
developed a tailored poster and
entitled to.
occupation guide for guards and security employees. The easiest way to determine
government payments, health
whether an expense is deductible
insurance and bank interest.
is to follow the three golden rules:
If you wait until mid-August to
1. You must have spent the
complete your return, most of
money yourself and not
the work will be done as the
been reimbursed.
majority of pre-fill information
2. The expense must be directly related to earning your income. 3. You must have a record to prove it.
securitysolutionsmagazine.com
The ATO pre-fills lots of information, including wages,
will be available. Most people complete their myTax return in less than 30 minutes. You might get advice from
The ATO’s ability to identify
tax agents, colleagues, family
incorrect claims has improved
and friends, and even helpful
due to enhancements in
shop assistants, but you need to
technology and data analytics.
be mindful that not all advice
When people ‘rip off’ the ATO,
is correct. Whether you use a
they are actually ripping off
tax agent or lodge your return
their fellow Australians. That
yourself, you are responsible for
is why the ATO is committed to
the claims you make. Take the
protecting Australians and the
time to check your deductions are
tax system, paying close attention
correct and read further for some
to deductions, particularly
helpful examples, common myths
those made by people who
and errors.
SECURITY SOLUTIONS // 79
FEATURE
Incorrect Claims the ATO has seen Recently in the Security Industry
he has a company car and did
paid for or reimbursed,” said an
and therefore claimed his gym
not actually need his personal
ATO spokesperson.
expense and joggers as a work-
Since the taxpayer did not incur
car expenses, visit ato.gov.au/
are generally considered private
Using personal car for work…
any expenses and knowingly
car19
in nature and cannot be claimed.
or not?
misrepresented his circumstance,
A 42-year-old man in the security
the ATO knocked back his claim
Claiming confusion
claim, visit ato.gov.au/clothing19
industry was fined $10,400 for
and applied a penalty.
A security guard recently claimed
recklessly claiming work-related
car for work purposes at all.
The ATO said more than
To work out if you can claim
related expense – fitness expenses
To work out what you can
$500 for steel cap boots, $440 for
Common myths busted
expenses of more than $75,000
3.75 million people made a car
personal training joggers and
Myth: Everyone can automatically
across two financial years. These
expense claim in 2016–17, totalling
$150 for sunglasses. All claims
claim $150 for clothing and
claims were mainly for travel,
around $8.8 billion. “That’s a
were disallowed by the ATO as
laundry, 5,000 kilometres for
car expenses and clothing. The
lot of money and Australians
the taxpayer could not provide
car-related expenses, or $300 for
taxpayer said he used the log-book
expect us to ensure people
evidence explaining why steel
work-related expenses, even if
method to work out his deductions
are not over-claiming. We are
cap boots and protective eyewear
they did not spend the money.
to drive his Mercedes Benz for
particularly concerned about
were needed to carry out his job.
work purposes, but did not keep
taxpayers claiming for things they
He also did not have receipts
exemptions provide relief from
any evidence or receipts. When
are not entitled to, like private
to substantiate the claims. The
the need to keep receipts in
the ATO spoke to his employer,
trips, trips they didn’t make, and
taxpayer also said he needed to
certain circumstances. However,
the employer told the ATO that
car expenses that their employer
maintain a high level of fitness
they are not an automatic
80 // SECURITY SOLUTIONS
Fact: The record-keeping
securitysolutionsmagazine.com
“The ATO’s ability to identify incorrect claims has improved due to enhancements in technology and data analytics.”
Myth: I can claim all my travel expenses if I add a conference or a few days’ work to my holiday. Fact: If you decide to add
A Bit Behind on Lodging your Tax Return? Last year, around 200,000
a conference or some work
taxpayers failed to lodge a tax
to your holiday, or a holiday
return even though they were
to your work trip, you must
likely to have received a refund.
apportion the travel expenses
You may not lodge because
between the private and work-
you are on a low income, have
related components.
not worked recently or might be
Myth: I can claim my work
worried about lodging because
clothes because my boss told me
you have not lodged for several
to the wear a certain colour.
years. Unfortunately, the ATO
entitlement or a ‘standard
primary purpose of the product
deduction’ for everyone. While
is sunscreen (that is, it has a
you do not need receipts for
high SPF rating), the cosmetic
is a uniform that is unique and
until you lodge a tax return
claims under $300 for work-
component is incidental and
distinct to your employer, or
and for those taxpayers entitled
related expenses, $150 for laundry
you are required to the wear it
protective or occupation-specific
to a refund, most returns are
and 5,000 kilometres for car-
because you work outdoors in
clothing that you were required
processed in less than two weeks.
related expenses, you still must
the sun.
to the wear to earn your income,
have spent the money, it must be
Myth: I can claim my gym
Fact: Unless your clothing
cannot return your money
A very small number of people
you will not be able to claim it.
have not lodged for several years,
related to earning your income
membership because I need to be
Plain clothes, like black pants, are
and many of them report feeling
and you must be able to explain
fit for work.
not deductible even if your boss
out of control, stressed and
told you to wear them.
even embarrassed. Regardless
how you calculated your claim. Myth: I can claim makeup
Fact: While you might like to keep fit, there are only a very
Myth: I have a capped phone
of the reason, the ATO advice is
that contains sunscreen if I
small number of people who
plan, so I can claim both business
simple – even if you have several
work outside.
can claim gym memberships,
and private phone calls.
outstanding lodgments, get in
Fact: We all like to look good,
such as special operations in the
Fact: Unless you only use your
contact with the ATO and they will
but cosmetics are usually a
Australian Defence Force. To be
phone for work, you will have
help you sort it out. The key thing
private expense and the addition
eligible, your job would have
to apportion the cost between
to remember is that ATO is here
of sun protection does not make
to depend on you maintaining
business and private usage and
to help. They want all taxpayers
it tax deductible. However,
a very high level of fitness, for
only claim the work-related
to get it right. See ato.gov.au for
it may be deductible if the
which you are regularly tested.
portion of your expenses.
more information. n
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 81
LOSS PREVENTION
INTO THE RABBIT HOLE OF SUPPLY CHAIN RISK BY MAURIZIO P. SCROFANI
Learning How Much We Do Not Know Is the First Step to Appreciating Supply-Chain Risk Management
today’s supply chain to have a goal
chain starts. (With a product’s
of becoming an ‘expert’; instead,
manufacture? When plans are
dedicate oneself to being a lifetime
drawn? At ideation?) What is
student of the infinite complexities
certain is that risks are inherent at
of the supply chain.
every step along a product’s path
The supply chain web is spun so
management (SCRM) is fairly
back again as purchase does not
intricately that it is impossible to
straightforward. It is how we
always mark an end to a product’s
know it fully. Perhaps the most we
help to identify risk and manage
path through the supply chain.
can aim for is to gain knowledge
supply chain security adequately.
about one link, then another and
But learning about supply chain
product may hit the road again,
gradually appreciate more fully
risks is a bit of a rabbit hole. Even
from store back to vendor, and
how pieces fit together. Maybe it
something seemingly basic can be
undergo additional steps. In the
is not realistic when it comes to
muddy, such as where a supply
case of, say, an oil-filled radiator,
74 // SECURITY SOLUTIONS
The aim of supply chain risk
to a store’s shelf and, perhaps,
In the case of a return, the
securitysolutionsmagazine.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 75
LOSS PREVENTION
a vendor may face a series of
to safeguard the supply chain
factors, including the threat
environmental regulatory steps
a risk in the supply chain. It is,
from emerging threats and
of terrorism, global crisis
before parts and pieces are sent
however, a single risk within
vulnerabilities. Disruption can
and recession, and political
back to the manufacturer or a
a small section of the supply
hit the supply chain at any
scrap company.
chain (logistics). A furniture
point, from manipulation in
The number of players, the
Cargo theft is an example of
upheaval • business risks caused by
manufacturer/seller of wooden
raw material usage, malware
factors such as a supplier’s
differences in technologies, the
dressers, for example, will have
and intrusions in digital supply
financial or management
amount of information and the
to manage myriad supply chain
chain processes, cargo theft
stability, or purchase and sale
sheer volume of interactions
risks long before it has even
and crime in warehouses and
between these and other layers of
made a product to ship. For every
distribution centres.
today’s global supply chain make
metal screw or plastic knob that
it extremely difficult to identify
will come from a supplier, the
level, external supply chain
physical facility and regulatory
risks, let alone mitigate them.
company will need to assess
risks include:
compliance
reliability, and for every shipment
• demand risks caused
Supply chain management encompasses the coordination
of wood, its health and quality.
of the many activities related
involves planning and processing
Geographic Impact of Supply Chain Risk Management
orders; handling, transporting and
to sourcing, procurement, conversion and logistics. It
At the very broadest
of supplier companies • physical plant risks caused by the condition of a supplier’s
by unpredictable or
In each area, questions fuel a
misunderstood customer
risk-management process. Our
demand
furniture company, for example,
• supply risks caused by any
needs clarity on key issues related
interruptions to the flow of
to its suppliers if it is to embed
Today’s vulnerabilities are
product, whether raw material
resilience into its business.
storing the products purchased,
multiplied due to greater
or parts, within a company’s
Intellectual property is one
processed and/or distributed; and
geographic distances and the
supply chain
area among many that it needs
managing the inventory of goods
complex processes of the supply
in a coordinated manner. There
chain. Globalisation presents
outside the supply chain,
is risk through it all, as broad and
unique challenges when
such as economic, social,
of intellectual property theft?
diverse as the supply chain itself.
applying SCRM methodologies
governmental and climate
Been accused of it?
76 // SECURITY SOLUTIONS
• environmental risks from
to examine: • Do our suppliers have a history
securitysolutionsmagazine.com
• Have they been victims? Did
example. And what about risk
risks; to identify the right people
efficiencies to react quickly
an employee improperly
from product defects? Or high
to implement it and assign
to market signals and store/
share sensitive information
labour costs? Or poor planning?
responsibilities; and to create
or provide access to a facility?
What if key personnel leave?
escalation mechanisms for each
Was there a computer
How might that impact business
risk and contingency plan.
network intrusion?
processes or how purchasers
• How do they protect their internal computer networks?
A clear risk picture and
customer needs • managing supply sources strategically to reduce the total cost of owning goods, as
communicate to suppliers
planning are the base layer.
well as teaming with business
and customers?
Organisations must also monitor
partners to reduce costs across
and track the progress of their
the supply chain to lower
The consequences of failure The furniture dealer also needs
are hardly hypothetical. A new
risk-mitigation initiatives
to know about its suppliers’
commercial airliner was delayed
to ensure that they work in
processes and procedures to
three years because of a failure to
real-life business situations.
strategy and IT system capable
verify the quality of its products or
assess supply chain risks properly.
Risk-management tools and
of integrating all the above
third-party products and services:
A candy maker’s stock sank eight
insightful dashboards can help
information – one that makes
How is the quality of product
percent when it could not deliver
steer an organisation through
all this critical decision
verified? What mechanisms
for Halloween. And in 2015, a
interactions with suppliers and
are in place to ensure products
cascade of technology missteps in
other operational stakeholders
A well-managed supply chain
meet requirements? Is an
a major big-box retailer’s supply
and prompt timely, informed
– one that mitigates risks –
inspection process in place to
chain, which caused the prospect
decisions. Broadly, SCRM is
is essential to a successful
review materials and/or services?
of patchy or empty store shelves,
critical to manage interaction
operation. In today’s global
Distribution is another category:
forced it to withdraw entirely
between suppliers, information,
manufacturing environment,
How do suppliers transport
from a country’s marketplace.
technologies, products and
where merchandise often moves
logistics service providers.
across oceans or continents
products? Are they warehoused
prices and enhance margins • developing a technology
making possible
company stand to gain? By
shelves, the risk of loss or delays
properties? And what about
Conducting a Company-Wide Risk Assessment
improving its management of
due to cargo theft, weather, work
finances? Are the suppliers stable?
A robust SCRM process starts
supply chain risk, it can maintain
stoppage and even paperwork
by identifying this world of risk
control over inventories and
errors requires innovative and
the necessary risk-management
– conducting a comprehensive,
distribution, thereby matching
comprehensive SCRM solutions
questions to help neutralise a
organisation-wide risk
and managing supply with
to manage successfully. When we
small sampling of external risks,
assessment to determine what
demand to reduce costs, improve
consider that every single piece of
from a few slivers of the supply
can go wrong. Relevant metrics,
sales and enhance company
merchandise must in some way
chain. And while partnerships
multiple sources of input and
profitability. That, too, sounds
pass through the supply chain
with top suppliers are typically
augmented data analysis are
simpler than it is. It requires:
network, it is easy to see the
strong, these questions should
necessary to get an accurate
• understanding the business,
need to implement appropriate
also be asked and answered
picture of the current situation.
the customer and customer
controls and protect our interests
for second-tier and third-
Risks then need to be scored
needs, and adapting the supply
against an increasingly complex
tier suppliers.
and prioritised, based on their
chain to find the balance that
world of risk. n
Of course, our fictional
likelihood of occurrence and
maximises profitability
furniture firm faces an equal
potential impact on business.
during transportation and, if so, where? Who has access to those
Again, these are just some of
number of internal risks,
Once risks have been
So, what does our furniture
• customising the logistics
before appearing on store
Maurizio Scrofani is a loss
network to meet the service
prevention manager, contributing
including manufacturing risks,
identified and prioritised,
requirements of various
writer and supply chain asset
business and process risks, and
organisations need to create a
markets, which may influence
protection professional with over
planning and control risks. It faces
comprehensive risk-mitigation
the size, number, location,
25 years of experience in retail and
risk from shrinkage resulting from
plan based on short-term,
ownership, structure and
manufacturing, including leadership
holding too much inventory, for
medium-term and long-term
mission of warehouse facilities
roles with Macy’s, Bloomingdale’s,
• recognising market signals and
"THE AIM OF SUPPLY CHAIN RISK MANAGEMENT (SCRM) IS FAIRLY STRAIGHTFORWARD. IT IS HOW WE HELP TO IDENTIFY RISK AND MANAGE SUPPLY CHAIN SECURITY ADEQUATELY." securitysolutionsmagazine.com
Delonghi and Toys“R”Us. He was
aligning strategies accordingly
cofounder and president of CargoNet,
to ensure consistent supply
a supply chain theft prevention and
forecasts and optimal resource
recovery network solution of Verisk
allocation
Analytics. Currently, Maurizio is a
• strategically locating/
consultant to retail, transportation
warehousing products
and manufacturing companies.
close to the customer base
He can be contacted at maurizio@
and speeding conversion
mpsconsultants.com
SECURITY SOLUTIONS // 77
PRODUCT SHOWCASES
LOCKWOOD SELECTORÂŽ SERIES 3782EL SHORT BACKSET MORTICE LOCK ASSA ABLOY Opening Solutions
input range of 9 to 28vdc, simple
Australia is excited to announce
field selection of power to lock
mechanism also allows for a new
the launch of the new Selector
or power to open. The Selector
configuration for reader in and
3782EL Short Backset Electric
3782EL is supplied in standard
reader out applications. When
Mortice Lock. Designed and
configuration with a full range
the lock is in normal operation,
manufactured in Australia,
of monitoring options including
card reader allows access to both
the Selector 3782EL is a
request to exit, deadlatch
sides of lock when in locked mode.
high performance fully field
status, door position, key
When a card is presented to either
configurable electric mortice
override monitoring and locked
side of the lock, it will unlock both
lock for narrow stile hinged
status monitoring.
sides allowing passage. However,
doors. Featuring a unique
A significant benefit of the
in the event of a power fail, the
motor driven operation, high
Selector 3782EL relates to the
outside handle will stay locked
security monitoring capabilities
door status illumination. Electric
whilst the inside is free to escape.
and on board door status LEDs,
mortice locks traditionally
provides a significant benefit over
provide a door status
Electric Mortice Lock has been
previous models. The Selector
illumination for locked and
designed specifically for narrow
3782EL is a hardwired access
unlocked via supporting plate
stile aluminium frame glass
control product intended for use
furniture which incorporates a
doors and complies with the
in high security environments.
red/green LED. This arrangement
building regulations of Australia.
The Lockwood Selector 3782EL
requires the installer to connect
For single-action escape the
is the ideal product when used
an LED loom from the furniture
Selector 3782EL meets the varying
in conjunction with intercoms,
back into the mortice lock. With
requirements of commercial
keypads and key switches due to
the Selector 3782EL, the LEDs
applications, including large
the intuitive operation of a locked
have been integrated into the
institutional applications such
or unlocked handle.
locks design with supporting
as tertiary education campuses,
furniture that features a lens
high security and high use access
mechanical locking platform and
window, making installation
control environments such
replacing the Synergy 3582EL,
reliable, guick and easy whilst
as government buildings and
the Selector 3782EL takes many
providing a modern door status
hospitals as well as common
of the benefits of these products
illumination design.
use doors in multi-residential
Building on the Selector 3782
and delivers secure, durable and
The Selector 3782EL uses a
intuitive use to electric mortice
motor driven mechanism, as
locks with increased adaptability
opposed to the more traditional
for the supply chain.
solenoid based designs. This
The advantages of the Selector
82 // SECURITY SOLUTIONS
The unique locking
The Lockwood Selector 3782EL
applications where there is a need for durable and intuitive function. For more information on the
means in power to lock
Lockwood Selector Series 3782EL
3782EL include a true multi
applications you have the
Short Backset Electric Mortice
voltage design with a functional
potential to use less power.
Lock visit lockweb.com.au/selector.
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmedia.com/newsletter
INDUSTRIAL, LOGISTICS AND DATA CENTRES FACE SECURITY RISKS WITH MOVES TO 24/7 TRADE CYCLES access by visitors tagging along
capable of discerning between a
behind authorized personnel.
person and a briefcase or bag.
“People rightly focus on online threats to data facilities, but there
Case study example
is also another more forgotten
Boon Edam installed Turnlock
dimension to cyber security:
100 full height turnstiles at a
and that is protection of physical
multipurpose Pacific Rim shipping
facilities from unwanted visitors,
terminal (which cannot be named
including industrial intelligence
for security reasons) as part of
thieves and even sometimes
a large-scale physical security
disgruntled former employees,”
plan to protect one of the largest
says Mr Fisher.
marine terminals in the region
The latest version of Boon
from criminal activity.
Edam’s Tourlock 180+90 revolving
A.P. Moller Maersk was
door system is designed for access
awarded management of this
hotspots such as the entrances
particular terminal for a period
to company HQs and data and
of 30 years. At that time, all entry
Security of access to industrial,
including goods handling, data
financial centres that might be
control and registration activities
logistics and data facilities is a
centres, dispatch, financial and
subject to physical penetration
were performed manually by
growing issue in Australasia as
proprietary information across
from people seeking to penetrate
security staff, which detracted
we move to 24/7 trading cycles
facilities that may be working
or damage data facilities vital to
from the effectiveness of
and criminals target activity
multiple shifts,” says Mr Fisher,
trading companies
procedures and controls.
hotspots for theft, commercial
whose company globally provides
data penetration and trafficking of
entrance security for scores of
system is a 24/7 solution offering
improvement program, the
illegal goods and substances.
Fortune 500 companies, as well as
high volume capabilities (20
terminal invested in new access
banks, data centres, legislatures,
people each way per door a
control equipment designed to
Boon Edam says the full gamut of
government agencies, resource
minute) proven by some of the
modernise visitor and employee
Australasian industrial production,
development sites, airports,
world’s largest companies and
application processing and
warehousing, data, distribution and
hospitals and educational and
government agencies. It is a
auditing standards for objectivity
export facilities – including port,
scientific facilities subject to
superbly flexible, non-intrusive
and efficiency.
road, rail and air facilities – need
unwanted attention.
way to control physical access and
Global entry solutions leader
to be increasingly aware of site
In response to the need to
“This latest Tourlock 180+90
As part of a continuous
The terminal selected Boon
prevent problems arising from
Edam’s Turnlock full height
security as industry in Australasia
provide high security even at
unauthorised access to sensitive
turnstiles to achieve these
follows global trends toward 24/7
times when security staff are
facilities and areas. It is also an
objectives, for their robust
responsiveness to world markets.
scarce, Boon Edam Australia’s
outstandingly cost-effective and
barrier construction and ability
latest Turnlock, Lifeline, Tourlock
reliable way to overcome the
to efficiently control the flow of
management practices mean we
and Circlelock ranges of security
problems inherent in expensive
visitors and staff to the facility,
should ensure now that industry
entrance products are designed
manned security systems,”
who are recorded also via security
facilities are prepared for new
for areas ranging from outdoor
he said.
cameras during entry.
security issues arising from
company perimeters, through to
the expanding flow of visits to
building entrances and sensitive
BoonConnect software to
turnstiles, the terminal installed
company facilities at different
interior areas.
configure the system to individual
biometric access control systems,
users’ needs, the system can be
electronic barriers for vehicle
“Good business risk
In addition to the latest
In addition to the full height
times of the day and night,” says
Its latest products also cover
Boon Edam Australia Managing
top security facilities, such as data
specified to include StereoVision
access, a module to manage
Director Michael Fisher.
and financial centres, where the
“time of flight” camera systems
visitors, software to register and
highest level of entrance tailgating
which create extremely accurate
control personnel access with
expand, more people need access
protection is achieved using the
3D images of the person in the
capabilities such as automatic
at different times to sensitive
latest in camera detection systems
door to determine whether they
locks and anti-passback
areas of company operations,
to help prevent unwanted physical
are alone. StereoVision is even
capabilities (a user can only exit
“As 24/7 business practices
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 83
PRODUCT SHOWCASES
if his/her access has been logged
facilities include:
while still delivering strength
Directional Traffic Control
in the system), among others. The
Turnlock 100 Robust Perimeter
and purpose.
The Tourlock 180+ 90 is an
system operates 24/7/365 in order
Security Solution
to service the high level of traffic.
The Turnlock 100 is a stainless
Tourlock High Security
of the Tourlock system. It is the
steel, full-height turnstile that is
Revolving Door
most advanced high security
– which have been proven globally
extremely suitable for outside use.
Some buildings and entries can
revolving door in the Boon
with distribution extending over
Its rugged construction ensures
only be accessible to authorised
Edam product range and allows
27 countries – are engineered
trouble-free and dependable
users; any possible unauthorised
for users to enter and leave the
to provide a cost-efficient way
operation. The choice between
access is strictly prohibited. In
building at the same time. The
to regulate access to a facility
three or four door wings allows
these instances, the Tourlock
level of security offered by the
without having to employ an army
users to adapt to the specific
high security revolving door
Tourlock 180+90 can be adapted
of security people or to construct
requirements concerning capacity,
can offer an attractive and
to individual requirements, using
facilities that look like a fortress,”
user comfort and security for
effective solution. Rotation of the
the latest advanced StereoVision
says Mr Fisher.
individual buildings.
Tourlock can only begin after
2 technology, which merges two
an authorisation signal from an
types of sensing technologies,
“The product families involved
“This is particularly true
The advantage of full height
automated four wing version
of businesses such as logistics
turnstiles is that they offer a
access control system, such as a
optical and near infrared light,
facilities that are part of globally
high level of security with high
card reader or biometrics reader
to monitor the compartment of a
fast-moving industries that have
reliability. Although most often
which may use retinal, fingerprint
security revolving door or portal.
to be able to provide immediate
these characteristics are required
or facial recognition technology.
access to people who are entitled to
for outside perimeter security,
have it – but to exclude unwanted
there are also applications within
Revolving door provides a
the difference between two
visitors posing threats to physical
a building in which a full height
weather seal when used on the
people and one person holding
and cyber security,” he says.
turnstile would be well suited.
outer façade of buildings, creating
a box or luggage to minimise
an ‘always open, always closed’
false rejections.
Boon Edam security solutions
The Tourlock High Security
This new and highly advanced system can accurately tell
are designed to blend security
Full-Height Turnlock 200 for
effect for environmental control
with corporate aesthetics to
Indoor Use
and more efficient HVAC use.
is not affected by sunlight or
provide individually engineered,
Where the rugged design of most
It has all the advantages of a
reflections, which eliminates any
world-class entry solutions of a
full-height turnstiles is an obstacle
traditional revolving door, with
environmental impairment of
quality already in service with
to indoor use, the Turnlock
the added advantages of a high
the system at locations near the
dozens of Fortune 500 companies
200 combines the simple and
security door system.
exterior of buildings.
including some of the world’s
reliable operation of a full-height
largest firms. Boon Edam already
turnstile with an attractive and
with a variety of different
levels of physical protection
has more than 100 installations
transparent design.
security systems that accurately
against intruder or armed threats
detect and prevent any form of
with high degrees of bullet resistance available. n
in Australasia of its architectural
The Turnlock 200 consists
Tourlock can be integrated
revolving doors and security
of an anodised aluminium
piggybacking or tailgating by
entrance systems.
frame with three or four door
which unauthorised people seek
wings constructed from narrow
to gain entry at the same time as
Boom Edam product families
polycarbonate panels. These
other people.
suitable for Australasian
are designed to harmonise with
industrial and logistics
aesthetic company interiors
84 // SECURITY SOLUTIONS
The near-infrared light sensor
Users can also choose different
For Further Information, Please Contact: E: alastair.russell@ boonedam.com.au
Tourlock 180 Simultaneous Bi-
W: www.boonedam.com.au
securitysolutionsmagazine.com
F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry
instagram.com/securitysolutionsmag
PARTNERSHIP WITH LOCAL ENGINEERING SPECIALISTS PME HELPS BOON EDAM BRING WORLD CLASS SECURITY TECHNOLOGIES TO PNG Since it hosted the APEC forum
entrance of a building or facility,
PNG LNG Camps and Sir John
many of which are local offices
in 2018, Papua New Guinea has
and ensure only authorised
Guise Stadium.
of global organisations,” said
further enhanced its already
personnel are allowed to enter. It
strong emphasis on improving the
can replace the need for manned
knowledge of the PNG market
Mr Troy Ware, Director,
country’s safety and security.
security personnel, who can
and has built a reputation for
PME says that there is great
be better deployed elsewhere,”
quality and excellence over
potential for the high quality
he said.
many decades. They are an ideal
entrance security products Boon
Boon Edam Australia is responding to PNG’s increased
“PME has an outstanding
Mr Fisher.
security focus, through
“Local companies can have
technical partner for Boon Edam
Edam is bringing to the market,
a partnership with local
better and more balanced security
in PNG and a natural complement
particularly in urban areas.
engineering company, Port
and save money at the same time.
to our global experience,” said
Moresby Electrical (PME).
In many cases, installing entrance
Mr Fisher.
Boon Edam Australia is part of the globally leading Boon Edam organisation, which specialises in
security technologies can be cashflow positive.” Boon Edam’s comprehensive
“For the first time in history, more people are living in urban areas than in rural ones in
Responding to local trends
PNG, with Port Moresby being the largest contributor to this
entrance security technologies for
suite of entrance security
At the PNG Security Congress
statistic. To meet duty of care
Fortune 500 companies, household
technologies includes Lifeline
(March 4-6 in Port Moresby),
requirements, companies in
names, Government and public
speed gates, Tourlock security
guest speakers from Paladin
these areas need to employ
and private institutions.
revolving doors and Circlelock
Holdings Pte Ltd and Black
adequate security measures that
high security portals.
Swan mentioned that PNG-based
protect staff and visitors to their
companies spend on average
building. This is an area where
Integrated approach to security
speedgates and bottom, left to
4-8% of operating revenue on
highly effective entrance security
“After attending the PNG Security
right, Tourlock security revolving
security, which is the highest in
technologies, such as those
Congress, it’s clear that the
doors and Circlelock high
the world, and four times the
supplied by Boon Edam, can not
industry wants to move away from
security portals.
regional average.
only achieve safety and security
Top, Boon Edam’s Lifeline
a ‘guns, guard and gates’ approach
“A general theme of the
outcomes, but also provide
conference was that security
cost savings compared with
integrated and intelligent approach
Local knowledge, global experience
was a necessary expense when
the old ‘guns, guards and gates’
to security can achieve better
PME has been operating
operating in PNG to ensure the
approach,” he said. n
results, whilst also reducing costs,”
throughout the country for
safety of staff and equipment.
said Mr Michael Fisher, Managing
more than 50 years, providing
Enhancing the cost-efficiency
Director, Boon Edam Australia.
vital electrical and engineering
and using security in the most
Contact: E: alastair.russell@
work for landmark projects
efficient way possible is top
boonedam.com.au
such as the Grand Papua Hotel,
of mind for PNG companies,
W: www.boonedam.com.au
where more is better. Instead, an
“Installing entrance security technologies can protect the front
securitysolutionsmagazine.com
For Further Information, Please
SECURITY SOLUTIONS // 85
PRODUCT SHOWCASES THE READY. SET. GO FACE RECOGNITION SOLUTION Cognitec’s FaceVACS-VideoScan product, currently in use in various major casinos across the globe, performs real-time matches against facial image databases, and analyzes faces to compute anonymous data about people count, age range, gender, and people movement in time and space. In short, Cognitec’s facial recognition system combines the multi-faceted aims of security and business insight in one comprehensive solution. But the software alone won’t produce optimal results. Venues are looking for a cohesive, integrated system that combines hardware, software, and services, and that integrates seamlessly into their existing systems and operations. Types of cameras, their positioning and tuning; high performance server choice;
setting up an optimal network infrastructure; configuration of the solution; funding and deploying the system—all these components play an important part. Making them work together, and supporting their continuous operation and maintenance, needs a specialist face recognition company with a proven track record in the gaming and entertainment industry. Security may be the top concern for a casino or club when selecting a face recognition system, but a safe environment for all customers and employees, a profitable business, and support from the community will provide true rewards for investing in this leading-edge technology. More information and contact: www.cognitec.com info@cognitec.com Phone: +61-2-9006-1510
DAHUA TECHNOLOGY LAUNCHES AI NVR SERIES WITH PERIMETER PROTECTION HANGZHOU, China / March 25, 2019 Dahua Technology, a world-leading video-centric smart IoT solution and service provider, has launched its AI NVR4000-I Series, including DHINVR4208-8P-I, DHI-NVR4216-16P-I, DHI-NVR4216-I, DHI-NVR4416-16P-I, DHI-NVR4432-I and DHI-NVR4832-I. Distinguished from mainstream NVR products with single AI function in the market, the Dahua AI NVR Series integrates perimeter protection and face recognition, providing customers cost-effective AI transformation and upgrading with high-precision safety guarantee while saving labor cost. Superior Perimeter Protection for Improved Alarm Accuracy With the outstanding perimeter protection function, the Dahua NVR4000-I Series can significantly reduce false alarm and bring higher accuracy performance to end-users. The ability of the new NVRs to filter out false alarms caused by animals,
86 // SECURITY SOLUTIONS
rustling leaves, bright lights, etc. enables secondary recognition of the targets, thus improving alarm accuracy. Besides, the NVR4000-I series is capable of analyzing targets based on deep learning algorithm to differentiate people and vehicles, therefore making retrieval more efficient. Advanced Face Recognition with Multiple Applications The AI-powered face recognition technology behind these products enjoys a high reputation in the industry, winning several first prizes in international competitions. Being acknowledged on performance for both efficiency and accuracy, Dahua Face Recognition offers realtime facial analysis by identifying, capturing and recording faces with powerful metadata. Combined with configurable multiple face database, common and stranger mode could alarm for suspects on blacklist, allowing passing for authorized
people on whitelist, also alert for approaching of strangers. Reliable AI Search for Enhanced Efficiency Powerful metadata is wellconstituted with feature attribute information extracted from target faces, such as gender, age, glasses, masks, beard and expressions, making it possible for users to select the appropriate channel, feature and similarity to search for eligible targets. Otherwise, users can also upload the face pictures of targets to NVR and compare them with the face database in NVR, so as to retrieve the relevant video captured by camera and find out the targets. Quick and handy search for a person of interest can be achieved through multi-channels and which significantly enhances accuracy and efficiency. In addition to the above features, the NVR4000-I Series combined with Dahua cameras will bloom more
powerful functions. For instance, working with Dahua ITC camera enables ANPR (Automatic Number Plate Recognition) for convenient entrance/exit management. Besides, people counting and heat-map are also available when matching Dahua IP camera. Furthermore, the NVR4000-I Series also supports ePoE & EoC to meet various needs of customers. Incorporating superior perimeter protection, advanced face recognition and reliable AI search, the Dahua NVR4000-I Series delivers excellent performance and high recording quality for IP video surveillance applications such as companies, retail stores, borders, villas, museums, dangerous areas and other small- and medium-sized scenes. With a mission of “Enabling a Safer Society and Smarter Living”, Dahua will continue to focus on “Innovation, Quality, and Service”, to serve partners and customers around the world.
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmedia.com/newsletter
EAGLE’s IWA 14-1 Crash Rated LOCKDOWN Swing Gate Elegant Simplicity The need for extreme risk perimeter defences is increasingly emphasised by hostile vehicle attacks in crowded public spaces, or toward high-profile targets. Where roadways require regular, intermittent or emergency access, complex systems are best avoided if at all possible. Many of the latest advances in systems proven to arrest massive vehicles at high speeds, have focused on increasing simplicity of design; less complex automation systems with fewer moving parts, fail safe systems, low MTBF (Mean Time Between Failure). In essence,
the good old KISS principle (Keep It Simple, Stupid). Eagle’s Lockdown Swing Gate provides massive strength and IWA test certified HVM capability – combining elegant looks with the simplicity of a farm gate. When comparing the cost of automated high performance HVB systems, let alone the risk of a complex system not performing to expectation in a critical situation; an HVB system that secures an opening width up to eight metres, manually operable by one person in seconds at less than half the cost of automated
systems, Eagle’s Lockdown is well worth considering. Fully removable posts mean it can be permanently or temporarily deployed. If required, just the closing post or indeed the hanging post could be removed. Installed on a foundation depth of only 420mm, the Lockdown’s tested credentials are impressive; IWA 14-1:2013 Gate V/7200[N2A]/64/90:0.9 IWA 14-1:2013 Gate V/1500[M1]/80/90:1.5 Key Features and Benefits • Tested on a 7.5T truck (N2A) at 64kph (40mph)
•
Tested on a 1.5T car (M1) at 80kph (50mph)
•
Very low penetration
•
Shallow foundation
•
Tested at 8m clear opening
•
Robust and rigid
•
Can swing in both directions
•
Various elegant designs available
•
Can be opened / closed by one person in seconds
For further information on the Eagle Lockdown Swing Gate system visit; www.ezisecuritysystems.com or call 1 300 558 304
Hills launches Reliance XRPro Hills has released the next generation in the Reliance series – the Reliance XRpro. Offering onboard IP communication and an optional 4G/ WiFi router module, the XRpro is NBN ready and offers a true monitored path via UltraSync™. It is also Z-Wave® compatible, allowing home automation via Z-Wave® compatible devices including lights, locks and thermostats. XRpro also supports camera integration and is backwards compatible with existing Reliance equipment. Using the UltraSync+™ app, users can remotely arm and disarm their security system, view live-streaming surveillance videos via IP and lock and unlock Z-Wave® powered door locks. For more details visit hills.com.au or contact your local Hills branch
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 87
PRODUCT SHOWCASES
ADELAIDE OVAL SECURITY UPGRADE
In today’s world it has become unfortunately necessary to design and implement physical security protection against possible terrorist or vehicle attacks wherever large number of people congregate or gather. High on this priority are stadiums and other sporting facilities which are likely to draw large crowds. While this is a worldwide problem the South Australian Government has taken a lead in Australia by initiating and protecting Adelaide’s premier and famous sporting facility The Adelaide Oval. The major threat is from Vehicles as a Weapon (VAAW) so the first step is to prevent vehicles being able to gain entry. This can be achieved by the installation of physical barriers and landscaping.
LEDA partnered with SADB in Adelaide to complete this $5m plus Hostile Vehicle Mitigation (HVM) upgrade for Adelaide Oval. Working together the complex project required installation of a wide range of PAS68 Bollards (static and retractable) and gates. This photo was taken on day of the first event following completion of the security upgrade when all the bollards went operational. The perimeter of the oval is now protected with a combination of PAS certified fixed (static) and retractable bollards. For more information please do not hesitate to contact your nearest Leda sales branch or call 1300 780 450. Visit www.ledasecurity.com.au.
MOBOTIX AND HEKATRON BRANDSCHUTZ: INNOVATIVE THERMAL CAMERAS COMMUNICATE WITH EXTINGUISHING SYSTEMS TO PREVENT FIRES IN PRODUCTION Langmeil, March 14, 2019 – Things get hot when pots and pans are polished in the production process at Kuhn Rikon, the number one Swiss brand for crockery and kitchen aids. Dust explosions can easily occur if the temperature rises above a certain threshold, which in the worstcase scenario can lead to significant fire damage and production outages. Initiated by ITES GmbH, MOBOTIX and Hekatron Brandschutz teamed up in a joint project to deliver 360° protection against this risk for Kuhn Rikon. MOBOTIX thermal imaging cameras are connected to the fire alarm & extinguisher control center Integral IP at Hekatron Brandschutz. The cameras monitor the production
88 // SECURITY SOLUTIONS
process for critical temperatures and intervene autonomously in the production process. Not only does the system trigger an alarm in the case of possible overheating, it automatically stops the production machine and starts the extinguishing process where necessary. In June 2015, overheated polishing plates caused a dust explosion at the Kuhn Rikon main facility in Rikon in the Töss Valley of Switzerland, precipitating a devastating fire that destroyed the production system and parts of the factory building. Together with the associated production outage, the total damages amounted to CHF 5.2 million (AUD 7.33 million). The production outage alone cost
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
the company CHF 1.4 million (AUD 1.97 million). “Luckily no-one was hurt, but the incident made us drastically aware that we urgently require reliable protection of our production processes that exceed the scope of normal fire protection,” explains Paul Brunschwiler, production technician at Kuhn Rikon AG. MOBOTIX M16 thermal cameras: Tailored programming and ideal prevention Project manager Mathias Stauffacher provided the convincing proposal of connecting the thermal cameras M16 Thermal by MOBOTIX with a fire alarm & extinguishing control center at the firm Hekatron Brandschutz: The M16 thermal cameras by MOBOTIX offer outstanding image resolution and enable precise monitoring of all danger zones within the Kuhn Rikon production workflow. In addition, the software package for the IP cameras allows tailored programming to suit the needs of the Swiss company. “We programmed all three escalation levels exactly: A warning for critical temperatures, production stop when the threshold is exceeded, followed by immediate initiation of the extinguishing process after the production shutdown to prevent any spread of the fire,” adds Stauffacher.
securitysolutionsmagazine.com
Kuhn Rikon: Significantly fewer production errors, production process boosted by 5% “The compatibility with MOBOTIX and Hekatron Brandschutz, as well as the user-friendly and low-maintenance system, convinced us 100 percent. Continuous, precise temperature measurement also allowed us to optimize our production process to ensure that we always operate at the ideal temperature and largely prevent any production errors. Overall, we managed to optimize our production process by around 5 percent and in doing so make the general working atmosphere more pleasant for our employees,” reports Paul Brunschwiler. “ITES GmbH is an expert for innovative fire protection and safety technology: “Our competency and experience enable us to develop and implement tailored, state-of-theart solutions for our customers. Our holistic approach offers our customers crucial added functionality,” says Alexander Iglhaut, ITES Director of Safety Technology. “MOBOTIX and Hekatron Brandschutz have very similar DNA. Both our companies develop their technology and also manufacture their products in Germany. The clear focus on premium quality hardware, software and services is confirmed in the successful
securitysolutionsmedia.com/newsletter
results of projects like this one,” emphasizes Christian Heller, Sales Director DACH at MOBOTIX AG. “The Kuhn Rikon project highlights the importance of a smart hard and software solution for fire protection and production optimization. Our intelligent safety systems make major contributions in other sectors as well, among them waste management or the petroleum and gas industries,” says Heller. “The incident at Kuhn Rikon plainly shows that fire protection for technical systems is extremely important as a ‘life-insurance policy’ for the company. Here, protecting the employees and the company’s output go hand in hand,” stresses Daniel Triebswetter, specialist for extinguishing system control at Hekatron Brandschutz. “The solution for Kuhn Rikon catches the eye with its simple connection of the MOBOTIX thermal image camera to the fire alarm & extinguishing control center Integral IP, as well as the smart fire management system – from production stoppage to triggering the extinguishing system.” About MOBOTIX MOBOTIX is a leading premiumquality manufacturer of intelligent IP video systems, setting standards in innovative camera technologies and
decentralized security solutions with the highest cybersecurity. MOBOTIX was founded in 1999 and is headquartered in Langmeil, Germany. Made in Germany, the company has offices in New York, Dubai, Sydney, Paris and Madrid. Customers worldwide rely on the longevity and reliability of MOBOTIX hardware and software. The flexibility of the solutions, the integrated intelligence and the highest level of data security are appreciated in many industries. MOBOTIX products and solutions help customers in industrial manufacturing, retail, logistics and healthcare, among others. With strong and international technology partnerships, the company is working on redefining the future. About Hekatron Brandschutz Ensuring the best possible protection of people and assets in emergency situations is and remains the driving force behind Hekatron Brandschutz in the area of fire safety for technical systems in Germany. Headquartered in Sulzburg in south Baden, the company has played a key role in shaping the development of fire protection equipment with its innovative products and services for over 55 years, while also accepting social responsibility and showing environmental commitment.
SECURITY SOLUTIONS // 89
PRODUCT SHOWCASES
SOUTHWEST MICROWAVE INTRODUCES IP-BASED DIGITAL MICROWAVE DETECTION SENSOR
Arizona, USA - Southwest Microwave has expanded its suite of intelligent microwave sensor technologies with the introduction of the INTREPID™ Model 336-POE Long Range Digital Microwave Link. This all-weather, IP-based POE detection sensor makes reliable perimeter security more accessible than ever¬ – coupling field-proven RF detection performance with secure network connectivity for increased system design flexibility and simplified sensor configuration and monitoring. With a range of 457 m, Model 336-POE is ideal for the protection of fence lines, open areas, gates, entryways, walls or rooftop applications. The sensor employs advanced digital signal processing (DSP) to optimize discrimination between intrusion attempts and environmental disturbances, mitigating risk of site compromise while preventing nuisance alarms. Proprietary algorithms recognize the unique profiles of intruders walking, running or jumping through the detection field, and offers enhanced crawl and vehicle detection. Designed for maximum protection against sabotage, Model 336-POE features heavy-duty components and packaging, plus integrated radome tamper switches to impede physical abuse. Sensor electronics are shielded against extreme sources of electromagnetic and RF interference, and protected against lightning induced surges. Employing a single Ethernet cable for data and power transmission, each Model 336-POE sensor operates as a unique network element, seamlessly integrating with other IP/POEdeployed perimeter security devices, cameras and access control systems. The sensor features an on-board Ethernet server that supports multiple ports and sessions.
90 // SECURITY SOLUTIONS
Graphical configuration of each device and monitoring of sensor status and control parameters are handled locally or remotely via an embedded browserbased Installation Setup Tool (IST), simplifying administration and diagnostics. Southwest Microwave Introduces IP-Based Digital Microwave Detection Sensor – p.2 Along with instantly triggering an alarm when a legitimate target is detected, the sensor alerts on enclosure tampering and on changes to microwave path alignment. A configuration security feature provides notification when changes to device settings are attempted, ensuring that only approved modifications are implemented. “This sensor has integrated security with convenience”, said Maira Zanrosso, Southwest Microwave’s Director of Sales and Marketing. “It successfully pairs Southwest Microwave’s superior microwave intrusion detection capabilities with the ability to query and manage a sensor, at any time, from any location, by any authenticated PC or handheld device connected to the network.”
Alarm monitoring for the Model 336-POE is handled via Southwest Microwave’s server-based POE control module (CM-POE) or through an available no-cost SDK that simplifies high-level interface to third-party physical security information management (PSIM) or video management systems (VMS). While DC power transmission over Ethernet is an important feature of this sensor, the primary benefit of the Model 336-POE is its IP connectivity for communications. “This sensor’s inherent network connectivity is a key differentiator,” said Zanrosso. “By offering our customers Ethernet-based configuration, maintenance and alarm monitoring, we’ve taken our industry-leading digital microwave technology to the next level.” Learn more about Southwest Microwave’s INTREPID Model 336-POE Long Range Digital Microwave Link at Perimeter Systems Australia Pty Ltd , visit www.perimetersystems.com.au or call +61 2 9150 0651.
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmedia.com/newsletter
SAAB RELEASES ONEVIEW 4
Inmate movement module– the Client Move Administration tab, showing list of enrolled assets and the selected asset details.
Client Move Operations tab -- details of last person to swipe their assigned card (left), a list of all currently swiped into the station (middle), and Actions menu for selected person (right) and their current trip status
Saab Australia has added three major features and boosted overall performance of its OneViewTM physical security management system. In release 4, Saab has included a new remote operation capability, a module for tracking inmates and visual dashboard metrics for measuring performance.
locations is monitored. If an inmate is delayed or detected in an unexpected location, an alarm is raised. Individuals or groups can be managed by the system. Assets can also be checked in and out through the system. Alarms, journals, reports (muster, metric and anomaly), and associated management tools are all integrated to warn security operators of breaches or potential issues that need investigation.
Key features and updates of OneView 4: • System of Systems access for remote site management • Inmate Movement module to track people and assets • Visualisation of dashboard data • Improved tools and overall performance • Updated drivers to extend subsystem performance • Interface refresh—updated ‘look and feel’ • Hotfixes from 3.5 have been incorporated System of systems for remote control Operators who have multiple sites with localised control rooms or run a networked operations centre can now operate OneView systems remotely. In OneView 3.4, the connect feature gave operators remote viewing capability. This has been extended to a full remote management capability where authorised operators can now not only view triggered events, but take
Data visualisation from the dashboard
securitysolutionsmagazine.com
action. This is a great feature that offers back up support to facilities with fewer resources and provides options for resource sharing, or a second pair of eyes for checks and balances. This new feature compliments OneView’s philosophy of being simple to operate—remote site monitoring is passive so operators aren’t inundated with multiple windows from satellite sites. Alarms triggered at satellite sites display in one single alarm summary control at the connecting master site. Connections view much faster and remote sites remain connected whilst the base site is monitoring it. Each facility provides access to what can or can’t be monitored and controlled remotely. They can also terminate the external control at any time. Inmate and asset tracking The inmate movement feature reduces the workload for corrections officers by eliminating the need to escort all inmates through facilities. With this function, inmates simply report to assigned stations to be identified and state where they need to go. Their intent is time-stamped in the system and they can move freely without personal security escorts. All routes and points are preprogrammed with time measured information, and inmate’s time travelling to or spent at various
Visualisation of dashboard data for performance and scheduling measurement Another feature appearing in OneView 4 is a powerful way to visualise system metrics in multiple forms. Quickly and easily interpret data from a range of visual pictograms like graphs, charts, histograms—select your preferred way to read information. Alarm summaries, user efficiency and system health status are just a few measureable metrics which can be read at a glance with this feature. Envisage journal data in near realtime to keep watch on the facility’s daily operations. Quickly analyse predictive trends or monitor situations with the new easy-tointerpret forms. Prevent hitting the threshold of nominated alarm types with financial penalties. Analyse device usage to plan and schedule predictive maintenance. For example, those with higher usage will need frequent attention while others can be flagged for routine maintenance testing. The flexibility of this feature is scalable and adaptable to each facility’s and users’ needs. Improved tools and overall performance Overall performance has been boosted to reduce memory consumption and speed up service start-up times. Data imports and configuration is much more streamlined. Operator workstations
process data faster when the configuration tool is updating to reduce the need to restart. Creating rules is also a simpler, faster process. The configuration tool deploys faster, has popup panels to support shared layouts, a document generator with loaded templates and the ability to see previews for each configured map before deploying. New subsystem integration and updated drivers The Open NMS network monitoring management system; Gallagher events and card reader systems (CardaxAE, CardaxCardReader); Bosch duress system; and Indigo CCTV system drivers have been updated to support data tags and higher availability or functioning capacity. The CellGuard (Austco) driver has been updated to now support master-to-master calls, and set masters in the unattended mode supporting OneView’s point control. Stentophon now adds functionality for calls, PA, master-to-master, push to talk, monitor, alarms, and journal events. The PcProx card reader can now publish card swipe details. Interface refresh The OneView client’s default theme has been updated to present a more modern ‘look and feel’. The OneView tools have also been refreshed, providing a more consistent experience across the whole system. A complete list of new features and supported sub-systems is this release is available from Saab Australia. More information Mandy Barlow Marketing Communications Manager Saab Australia 08 8343 3607 mandy.barlow@au.saabgroup.com
SECURITY SOLUTIONS // 91
PRODUCT SHOWCASES
THE POWER TO SECURE AND STREAMLINE YOUR VEHICLE GATES New Generation of UHF Readers Allow a Secure, Fast and Automatic Vehicle Identification
Vincent Dupart
Queues, congestion and miscommunication can cause delay and have a negative impact on business and the wellbeing of employees. STid - trailblazer and market leader in the design of secure & instinctive solutions - introduces SPECTRE, the first born of a new generation of long-range ultrahigh-frequency readers enabling fast vehicle identification process at the gate with the highest security levels. The most important reasons to embrace AVI solutions are the convenience, traffic fluidity and the security they bring. Vehicle access control based on traditional proximity, remote control or barcode, often results in people leaning uncomfortably out of their windows towards the reader to show their access credentials. Combining high security levels based on the latest industry standards, modularity making it adaptable to any field scenario and uncommon design, SPECTRE is the solution for all AVI applications. “This secure and smart solution has been designed in close collaboration with our customers to ensure SPECTRE reader meets the myriad of security requirements of a fast, automatic vehicle identification.” commented Vincent Dupart, STid CEO. “We are committed to make
92 // SECURITY SOLUTIONS
cutting-edge security solutions much easier for corporations and their employees, so instinctive and convenient that user adoption is guaranteed.” Instinctive Vehicle identification Based on the EPC1 Gen 2 standard and UHF passive technologies, SPECTRE rewrites traditional rules of security, making it more instinctive. The long-range reader offers unmatched reading distances up to 43 ft / 13 m and reliability for smooth vehicle access. According to STid, its outstanding performances makes SPECTRE the fastest reader on the AVI market. Smart and Upgradable Fully scalable and modular, SPECTRE enables to cover all security issues and all configurations, even in highly challenging environments. This evolutive reader is built to manage up to 4 driveways handling access of a mixed fleet of vehicles (light, heavy and motorcycles), the identification on wide lanes or even distinct access control for 4 lanes of vehicles. The solution can be tailored to customer’s needs, offering the best solution for any situation and ensuring that all features and security levels can be upgraded at any
time. Supporting a large variety of standard communication interfaces (Wiegand, Clock & Data, RS232 and RS485) and the OSDP™ industry standard, it enables seamless integration into any existing or new access control systems. For more fluidity, the reader can be controlled by ground loop or presence detector. The Highest Levels of Security The reader provides proven and unprecedented security, allowing users to sign UHF credentials, using encryption methods recognized by independent certification bodies in information security. This high security function enables faster authentication and prevents UHF credential cloning without compromising performance. Standing the Test of Time The enhanced vandal-proof structure withstands knocks and malicious acts. This weatherresistant reader is IP66-rated and designed for outdoor uses in harsh environments: vibration, dust, heavy rain, sea air… “. It’s the most robust reader on the market, yet intuitively easy to use and set up. We have developed user-friendly and free tools to configure the readers in few seconds via USB cable or UHF card“, adds Maé Tholoniat, Security Product Manager.
Its stealth design with strong lines ensures it integrates easily into the corporate environment for swift adoption. The wide range of customization options enables our clients to truly get the most out of this powerful communication tool. SPECTRE offers many smart features which make it the perfect solution for gates that require a combination of high security and convenience. “SPECTRE is the perfect blend of security, performance, reliability, flexibility and a unique design all in a simple solution. Reaching excellence to deliver best-in-class products is always a goal for STid. The continuous improvement and innovation are strong and shared values in our company. We have pushed our 22-years of know-how and expertise in SPECTRE”, concludes Vincent Dupart. Winner of a New Innovation Award at Expoprotection A jury of 9 end-user experts awarded SPECTRE from more than 30 participants in the “Risques Malveillance et Incendie” category for its ability to make UHF long distance identification both instinctive and extremely secure. www.stid-security.com
securitysolutionsmagazine.com
Sign up to our eNewsletter and receive up-to-date valuable information regarding all things Security.
www.securitysolutionsmagazine.biz/newsletter