Security Solutions Issue 117

Page 1

A U S T R A L A S I A’ S L E A DI N G S E C U R I T Y R E S O U R C E F O R BU S I N E S S A N D G O V E R N M E N T

JULY 2019 ISSUE 117

THE CHALLENGE

OF BIO TERRORISM



S280 Industrial is an IP66 rated 19” cabinet suitable for harsh and unforgiving environments. Air Conditioning available.

The last thing on your mind is the first thing on ours.

DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS

Whist MFB have an extensive range of standard IP rated enclosures from cable entry ports, special size enclosures, wall mount applications, cooling, fans, louvers, sun shades or insulation and even manufactured to be supplied in knockdown form. Rated to IP66 dust and moisture specification the MFB’s S280 Industrial range is an enclosure designed for harsh or tough industrial and outdoor environments. MFB can produce custom build enclosures to your specific needs.

AUSTRALIAN MADE MAKES AUSTRALIA

www.mfb.com.au

VIC NSW -

P (03) 9801 1044 P (02) 9749 1922

E sales@mfb.com.au E sydney@mfb.com.au


ISSUE 117

FEATURES

46

cover story

78

26 34 50

Designer viruses that can target a single person or an entire ethnic group. Mass casualty events on an unprecedented scale. Silent killers that we cannot detect or stop. These are just some of the challenges of bioterrorism. In this issue’s cover story, Professor Raina MacIntyre looks at the evolving and complex challenges of bioterrorism. Professor MacIntyre is National Health and Medical Research Council (NHMRC) Principal Research Fellow and Professor of Global Biosecurity. She heads the Biosecurity Program at the Kirby Institute, which conducts research in epidemiology, vaccinology, bioterrorism prevention, mathematical modelling, genetic epidemiology, public health and clinical trials in infectious diseases.

26 THE OSINT CONNECTION: INTELLIGENCE IN

EXECUTIVE PROTECTION

REGULARS

30 TO G OR NOT TO G?

Beware the zombie apocalypse!

Most people in the security industry are familiar with the use of video analytics in CCTV applications. However, as the technology grows and evolves, what other applications and markets could we expect to see adopting the use of video analytics?

54 RECREATIONAL OUTRAGE

Is society becoming more angry? If so, why? What might be the causes? Longtime contributor, author and industry commentator Don Williams looks at the issues around the emergence of recreational outrage.

70 2019 SECURITY EXHIBITION & CONFERENCE Who will be speaking at Security 2019? Which companies are exhibiting? What products are on display? Get all the information you need to plan your visit to Australia’s leading security event.

C

M

06 LETTER FROM THE EDITOR

38 FUTURE USES OF VIDEO ANALYTICS IN CCTV

66 38

Travis Lishok, founder of Executive Protection Nexus, explores how one can conduct an open-source intelligence (OSINT) investigation and explains the value this type of investigation can bring to a protective operation. The article draws on real-life events leading up to a political fundraiser that took place in a large Silicon Valley convention centre some years ago.

We examine the advances in mobile communication technology and look at the potential impact of those advances on technical surveillance countermeasures.

CONTENTS

08 LEADERSHIP

Jason Brown examines how security standards both within Australia and internationally are being impacted by current world events.

10 CYBERSECUIRITY

12 HUMAN RESOURCES

Are your casual workers really casual?

14 RISK MANAGEMENT

Kevin Foster looks at the components and requirements of safe design for security practitioners.

16 COMMUNICATIONS

If you are not crisis prepared, then you had better read this article – quickly!

18 BUSINESS DEVELOPMENT

How do you develop a professional referral group to help grow your business?

20 THINKING ABOUT SECURITY

Why is it more exciting now than ever before to be a security professional?

22 EVENTS CALENDAR

A look at upcoming industry events.

34 OPERATIONS

Y

Why is it so hard to create a safe training environment that achieves results?

CM

42 BUSINESS

MY

What is the best strategy to help grow your business?

CY

50 AVIATION SECURITY

CMY

Steve Lawson looks at great ideas in aviation security that have not worked out quite as planned.

K

58 CCTV

Internationally renowned CCTV expert Vlado Damjanovski explains the new (or not so new) IP VSS Standards.

62 CYBER SECURTY

Why is it that companies are still failing to report data breaches despite the recent introduction of legislation making reporting a requirement?

66 PROFESSIONAL DEVELOPMENT

How can a risk assessment help you develop more effective operational security systems?

78 LOSS PREVENTION

How is loss prevention evolving and what does this mean for loss prevention professionals?

84 PRODUCT SHOWCASES

74 THE WAR OF THE ALGORITHMS

As algorithms become increasingly complex, AI has evolved to become a crucial aspect of cybersecurity solutions – with the technology being applied across various fields, including spam filter applications, fraud and botnet detection. Can relying too heavily on these technologies create a false sense of security? 4 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


NEW!


FROM THE EDITOR FROM THE EDITOR

www.securitysolutionsmagazine.com

EDITORIAL www.securitysolutionsmagazine.com

EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon

Jason Brown, Greg Byrne, Julian Claxton, Vlado Damjanovski, CONTRIBUTORSKevin Foster, Alex Ganin, Mark Gabrelotto, Tony Jacques, Kay,Kevin SteveFoster, Garry Barnes, Jason Brown,Richard Greg Byrne, Lawson, Travis Lishok, Dr Justin RainaLawrence, MacIntyre, Richard Kay, Steve Lawson, Scott Richard Menear, Tim Rippon, Ami Toben, Don O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Williams, Tony Zalewski Anne Speckard, Alex Sidernko, Ardian Shajkovci, Ami Toben, Simeon Votier

ADVERTISING Keith Rozairo ADVERTISING

Keith Rozairo PHONE 1300 300 552 PHONEkeith@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL keith@interactivemediasolutions.com.au

DESIGN AND PRODUCTION Jonathan Rudolph DESIGN AND PRODUCTION

Jonathan Rudolph PHONE 1300 300 552 PHONEgraphics@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL graphics@interactivemediasolutions.com.au

MARKETING AND SUBSCRIPTIONS MARKETING AND PHONE 1300 300 552SUBSCRIPTIONS

PHONEadmin@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL AUD admin@interactivemediasolutions.com.au $62.00 inside Aust. (6 Issues) $62.00 AUD Aust. (6 (6 Issues) $124.00 AUDinside outside Aust. Issues) $124.00 AUD outside Aust. (6 Issues)

ACCOUNTS ACCOUNTS PHONE 1300 300 552

PHONEaccounts@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL accounts@interactivemediasolutions.com.au

PUBLISHER PUBLISHER

ABN 919463 ABN56561,606 606Joseph 919463 Blackburn, Victoria 3130 Level Level 1,34 34 Joseph St, St, Blackburn, Victoria 3130 PHONE PHONE 1300 1300300 300 552 552 EMAIL enquiries@interactivemediasolutions.com.au EMAIL enquiries@interactivemediasolutions.com.au WEBSITE WEBSITE www.securitysolutionsmagazine.com www.securitysolutionsmagazine.com DISCLAIMER DISCLAIMER

The of this this Thepublisher publishertakes takes due due care care in in the the preparation preparation of magazine and magazineand andtakes takes all all reasonable reasonable precautions precautions and makes the accuracy accuracy of of makesall allreasonable reasonable effort effort to to ensure ensure the material but is is not not liable liable materialcontained contained in in this this publication, publication, but for The publisher publisher forany anymistake, mistake, misprint misprint or or omission. omission. The does not assume any responsibility or liability for any does not assume any responsibility for any loss inaccuracy lossor ordamage damage which which may may result from any inaccuracy or use of of oromission omissionin inthis this publication, publication, or from the use information makes no no informationcontained contained herein. herein. The publisher makes warranty, any of of the the warranty,express express or or implied implied with respect to any material materialcontained contained herein. herein.

t appears to be a strange quirk of reality that we find ourselves living in aAustralia world, atreally a point in time when, oes take security despite everyone being more seriously? Yes, Government claims interconnected appear to be to,than and ever somebefore, of the we corporate more divided sector than atdemonstrate any other point in history. a passing E asefrom of international travel, combined interest time-to-time, but what of the with decreasing costs andstreet? increased average man and travel woman on the Do we immigration, means that the world feels honestly take security seriously or do we, like as aa much smaller Where it used to take nation, just payplace. lip service to once the idea a month to travel by ship from one side of the of security? globe to the other, thewe same tripbe canthankful now bethat As we enter 2018, should achievedhas in the space of a day. Where less than Australia never suffered a major terrorist incident likes of 9/11, the Boston bombings, 50 yearsthe ago, a person living in the Western the bombings of July 7, 2005 the life world might conceivably live in hisLondon or her or entire terrorist attacks of October 12, 2002 in Bali. without encountering people from developing However, as a result, the Australian community nations, today migration and immigration have has become somewhat complacent with regard turned the world into one big multicultural melting to security. I often hear many of our readers who pot. And the divides between cultures, religions, are security managers within large corporations political ideologies and nations seem wider than comment on the differences between attitudes ever before. to security and America, where they One of in theAustralia unfortunate side effects of these often have to travel and work. According to many growing divides is that we appear to be facing security managers, Americans understand that what feels like an ever-increasing raft of security terrorism is aFor clear and present danger and a challenges. almost 20 years, terrorism fact of daily life and thus, they treat security has presented an ever-looming challenge in and security workers with the due respect. In Western countries and yet, in the face of rapid contrast, they believe that Australian’s have a technological advances, we now find ourselves very blasé attitude towards security and it is this facing challenges that make traditional terrorism attitude that makes us much more vulnerable pale by comparison. to attack. In this issue’s cover story, Professor Raina In my opinion, having recently travelled MacIntyre looks at the evolving and complex through Egypt and Jordan, they are correct. challenges of bioterrorism. Professor MacIntyre (MBBS Hons 1, FRACP, FAFPHM, M App Epid, PhD)

I D

is National Health and Medical Research Council (NHMRC) Principal Research Fellow and Professor of Global Biosecurity. She heads theattitude Biosecurity Australian’s do have a very relaxed the Kirby Institute, which conducts toProgram security at because they believe, rightly or researchthat in epidemiology, bioterrorism wrongly, “it will never vaccinology, happen here”. This genetic is prevention, a sentimentmathematical we can only modelling, hope remains true. epidemiology, health and clinical trials in However, as the public old axiom states, one should infectious diseases. always expect the best but plan for the worst and Thetoarticle is both a fascinating and terrifying prepare be surprised.

insight into aone threat that isnot unlike I believe Of course, should haveanything to rely upon the world hasdevastating faced before. The potential forin some form of incident to occur organisations or groups to inflict harmseriously. upon targets order to force people to take security ranging single person to worldwide mass There is a from greatadeal that the security industry can do to educate business community about casualties is trulythe alarming. I would encourage the benefitstoofread taking seriously. everyone the security article and take timeIntopast follow issues Security Solutions Editor-At-Large RodThis is a the links Professor MacIntyre has included. Cowan has written security act as huge challenge of about which how we should all can be mindful. a differentiator for business and giveifcompanies On a separate but related note, you have a competitive edge. not yet had the chance to check out the Security If we have learnedinanything tragic Solutions podcast, which wefrom feature in-depth events that have occurred globally in recent conversation with fascinating security experts like years, it must be that the world has changed Professor MacIntyre speaking on all manner–of permanently – andtopics, we cannot pretending security-related then Ikeep would encourage that has wasand not easily an isolated incident youit to donot. so.9/11 It is free accessible from and if groups like ISIS have their way, such iTunes, popular streaming services such as Apple attacks will become much more frequent. Spotify, Google Podcasts or the Security There Solutions is a great deal more work to be done to ensure

website. Why not check out our sister podcast, ASIAL Security Insider, while you are at it, available culture within organisations and the broader through all the same sources. community that will enable Australian’s to be If you have a guest or a topic you would safe and secure. And the work must begin with particularly like us to feature, then please send me security professionals. Let’s make 2018 the year an email. that we create the kind of effective security

that Australia begins to take security seriously. n

Until next time. n

The reproduced Thecontents contentsof of this this magazine magazine may not be reproduced inANY ANYform formin in whole whole OR OR in in part without WRITTEN in WRITTEN permissionfrom from the the publisher. publisher. Reproduction includes permission includes copying,photocopying, photocopying, translation translation or reduced to copying, to any any electronicmedium medium or or machine-readable machine-readable form. electronic form.

WRITTENCORRESPONDENCE CORRESPONDENCE TO: WRITTEN

Level1, 1,34 34 Joseph Joseph St, St, Blackburn, Blackburn, Victoria Level Victoria 3130 3130  1300300 300552 552 1300  enquiries@interactivemediasolutions.com.au  enquiries@interactivemediasolutions.com.au 

John Bigelow

PR O

SECURIT Y

PR

RALIA LTD UST FA RALIA LTD

Official Official Partners Partners O rigin a l Siz e Original Size

PR O

Y P R OV RYI TP R O V I D I D E E RCIUT

CU

SE SE

SECURITY

N

USTRA F SAT R A L L I A A OU IA

STRALIA LTD AU OF STRALIA LTD AU

SECURITY

O C I AT I ASS ON O C I AT I ASS O

RS

SPAAL SPAAL

OF

OF

PR O

RS

SSOCIAT RS A IO DE N SSOCIAT VI RS A IO DE N VI

D LT D LT

SECURIT Y

SSOCIATI ON O SSOCIATI RS A ON DE O VI

RS A DE VI

UST FA

O

Editor

blue colour changed to this colour green. blue colour changed to this colour green.

COPY/ARTWORK/TYPESETTING APPROVAL COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE Please proof read carefully of this material BEFORE signing your approval to print.ALL Please paycopy/artwork/typesetting special attention to spelling, punctuation, signing your approval numbers, to print. Please pay special to spelling, punctuation, dates, times, telephone addresses etc, asattention well as layout.It is your responsibility to dates, times, telephone numbers, addresses etc,Press as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman assumes no responsibility our attention anybeen corrections. Minuteman Press assumes responsibility for bring errorstoafter a proof has authorised to print and print re-runsno will be at your cost. for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................ Signed.................................................................. Date........................

// SECURITY SECURITY SOLUTIONS SOLUTIONS 46 //

John Bigelow Editor

securitysolutionsmagazine.com securitysolutionsmagazine.com


FIRST AUSTRALIAN MADE PAS68 SHALLOW MOUNT BOLLARDS BOLLARD RATINGS

PAS68 rated bollard with ‘ZERO’ penetration

CSG10840 PAS68:2010 V/7500(N2)/64/90:0.0/17.9 ‘ZERO’ penetration CSG10850 PAS68:2010 V/7500(N2)/80/90:2.8/9.8 Articulated linkage not only allows for each bollard unit to accommodate gradients up to 3.6°, but allows for convex and concave arrays

Available in galvanised finish or fitted with stainless steel sleeve, can be painted in different colours LEDA has been at the forefront of designing, manufacturing

LEDA shallow mount bollards install

and installing crash rated bollards for more than 20 years protecting Australian people and its assets. LEDA’s CSG10840 and 10850 are the first Australian manufactured PAS68 rated shallow mount bollards that requires a foundation depth of only 200mm.

Shallow mount bollards around tree roots

The growing demand to install bollards in CBD locations often means encountering sub-pavement services which may need to be moved or relocated to accommodate conventional concrete footings. In many instances it may be impossible to obtain the required footing depth or to maintain the impact rating needed. This situation has driven LEDA to manufacture its own PAS rated shallow

Shallow mount bollards around existing underlying services

mount bollards providing cost and lead time savings to clients as well as supporting Australian manufacturing.

FOR MORE INFORMATION Contact your nearest LEDA sales office or visit our website www.ledasecurity.com.au

Follow us

Call 1300 780 450 Email sales@ledasecurity.com.au


LEADERSHIP

BY JASON BROWN

he last six months

and private sector systems

have seen a

continues to increase, as does

Chinese state of approving a global

co-convenors of the new working

significant

the threat from malicious

campaign of online theft and

group. A seminar to promote

reassessment of the

insiders. An increasing

interference, Canberra is taking

interest and participation on these

security environment, both within

number of countries are

a far sterner diplomatic line with

standards is planned for Sydney in

Australia and internationally. The

pursuing a cyber espionage

Beijing than usual. Tobias Feakin,

August and invitations will go out

Christchurch tragedy might have

program as this offers high

Australia’s ambassador for cyber

through professional bodies and

happened here if not for good

returns for relatively low cost

affairs, said, “The fact that this is

public announcements.

intelligence and police work that

and plausible deniability.

the first time we have ever actually

prevents the activities of extremist

The continued evolution of

named China as responsible for

these and related security and risk

Islamist elements from creating

technology increases the

one of these kinds of activities is

standards at the ASIAL Conference

similar carnage in Australia.

sophistication and complexity

enough of a serious indication of

on Friday 26 July at 9am for the

of attacks, while also becoming

how acute an issue we feel this

Executive Program. I will be present

potentials on the radar for over

increasingly accessible.

is... This is the theft of intellectual

most days of the ASIAL Conference,

a decade, but they are gathering

• The harm caused by hostile

property. There has been an impact

so feel free to approach me regarding

pace, alongside the resurgence

intelligence activity can

on Australia.”

participation in the work. n

of foreign interference and

undermine Australia’s national

espionage. The traditional methods

security and sovereignty. It can

increasing support for business

of espionage have re-emerged

damage Australia’s international

from ASIO, in partnership with

Security Director for Thales in

in force and their exponential

reputation and degrade our

Defence, to assist with the

Australia and New Zealand. He is

expansion through cyber-enabled

diplomatic and trade relations.

understanding and defence against

responsible for security liaison

attacks has added multiple

Both espionage and foreign

these threats. But it is not just

with government, law enforcement

dimensions for consideration.

interference can inflict

the role of Government; private

and intelligence communities to

Intellectual property and industrial

economic damage, degrade or

industry and security providers

develop cooperative arrangements

espionage has expanded rapidly as

compromise nationally vital

need to work with Government to

to minimise risk to Thales and

a result of global competition for

assets and critical infrastructure,

build integrated national capability.

those in the community that it

economic dominance.

and threaten the safety

T

These types of events have been

The Australian Security

of Australians.

By directly accusing the

Management – Infosys in India, as

I will be running a workshop on

Government has responded by

Standards Australia and

Jason Brown is the National

supports. He is also responsible

the International Organization

for ensuring compliance with

Intelligence Organisation (ASIO) has

The confirmation came after the

for Standardization (ISO) are

international and Commonwealth

advised that espionage and foreign

U.S. Department of Justice charged

working to develop or revise the

requirements for national security

interference targeting Australian

two Chinese nationals for allegedly

current standards on security-

and relevant federal and state

interests remains pervasive and

carrying out hacking on behalf of

related matters. The Australian

laws. He has served on a number

enduring. ASIO has observed

Beijing’s Ministry of State Security.

Employment Screening standard is

of senior boards and committees,

increased targeting of Australian

In a strongly worded statement,

being reviewed to provide a ‘whole

including Chair of the Security

interests in Australia and abroad

Australian Foreign Affairs Minister

of working life’ security assessment

Professionals Australasia; member

through a variety of methods and

Marise Payne said cybercrime

model, which can be integrated into

of ASIS International Standards and

against an array of sectors.

had “the potential to undermine

business processes for reducing

Guidelines Commission, and Chair

global economic growth, national

the likelihood of insider threat,

of Australian Standards Committee

foreign intelligence services as a

security and international stability.”

and work has progressed on a new

for Security and Resilience. As

result of:

The minister called for China to

draft of the Australian Handbook

of February 2017, Jason has

• The range, scale and

“refrain from cyber-enabled theft

on Security Risk Management. ISO

been appointed Chair of the

sophistication of foreign

of intellectual property, trade

has agreed to the revision of the

International Standards Committee

powers engaged in hostile

secrets and confidential business

International Supply Chain Security

for Risk Management. Jason can

cyber espionage activity

information with the intent of

Standards ISO28000, with myself

be contacted at jason.brown@

against Australian Government

obtaining a competitive advantage.”

and Rajeev Thykatt, Head of Risk

thalesgroup.com.au

Australia is a target of hostile

8 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


The Missing Link in an

Access Control System

Geoff Plummer Executive Business Manager - Davcor Group

On entry to most of the major capital city CBD buildings you are confronted with a host of access control initiatives to govern who is allowed and who is not allowed access. Be it the presentation of your card to a reader to open a turnstile, activate the lift or trigger an automatic door; access is controlled in an efficient and easily managed way and our security programmed brains believe that all is good.

I pose a question. How many of these doors/lifts/turnstiles have a mechanical key override? The answer is many, not all, but many.

I would then need to pose another question. Are the mechanical keys secure? Are the keys stored in a secure place and are not lost? Also, are they secure from attack and duplication? Remembering that many keys can be visually read and even reproduced from a photograph. The answer is as soon as they are in a person’s hand that the keys can be compromised by copying, duplication or even 3D printing.

My observation is that at many sites, extremely effective and costly access control systems are installed. These systems are hugely effective in monitoring and controlling access to the building however many of these systems have a very basic weak point that allows the whole system to be compromised. The chink in the armour is,

They are fitted with a conventional mechanical cylinder. This cylinder has no audit trail, can be in many cases mechanically manipulated (picked). Added to which any access to a key by an unscrupulous person can result in it being read, impressioned (in the way of an impression into a soft material) or photographed and 3D printed. So now what? A solution is available. Install an electromechanical key system such as EKA CyberLock. EKA CyberLock makes a range of cylinders to suit most common locks in the Australian market. The Cylinders are opened with CyberKeys, both of which are managed using software in the same way as an access control system. The management software allows access to be granted when and where, or simply timed out or even revoked when required. CyberKeys are programmed through Communicators such as a smart app and Bluetooth and a 20-key vault cabinet. The entire system can be audited and to make it even simpler can potentially be integrated with your existing access control system.

EKA | CyberLock - Division of Davcor Group Pty Ltd. 1300 722 311 - WWW.EKACYBERLOCK.COM.AU


CYBER SECURITY

BE CYBER-AWARE IF YOU’RE A SMALL BUSINESS

T

BY TIM RIPPON

here is a common

attacks were up 424 percent last

protection include:

Mentoring Service (SBMS), an

misnomer that only

year (2018) for small businesses?

• semi regular network

independent, not-for-profit

large-scale

Year on year figures like these

businesses get

beg the question, why are we

attacked or hacked by the cyber

seeing such a dramatic increase

criminals. However, this statement

in the number of attacks carried

is far from the truth.

out by cyber-criminals against

In the media, there is a real

small businesses?

penetration testing • the implementation of access management

Association, can be a good first step to advise in this area. SBMS can be contacted on 1300 816 817. n

• employing firewalls, antivirus, and endpoint security solutions • the establishment of computer

Tim Rippon is an author, speaker and trainer of

use, device, and password

cybersecurity and business

policies

continuity. He holds a certified

focus on the destruction caused

For starters, many small

by cyber criminals on large scale

businesses do not put suitable

business. However, the impact to

safeguards in place to protect their

small business is more drastic,

valuable business data. What’s

email security solutions (such

(ISO 27001), certified Master of

often resulting in the complete

more, they often lack the in-house

as anti-phishing solutions, spam

Business Continuity (ISO 22301)

demise of the targeted business,

skills required to handle cyber

filters, email signing certificates)

and Lead Cyber Security Manager

with approximately 60 percent

security adequately. Additionally,

of small companies that suffer a

many small businesses invest

security awareness training and

is actively involved in various

cyber-attack being out of business

less than $500 per year in cyber

phishing simulations

industry groups, including the

within six months.

security products. Many business

• the implementation of effective

• conducting employee cyber

• developing and maintaining

Master of Information Security

(ISO 27032) from PECB. Tim

Australian Women in Security

owners are complacent about

an incident response, business

Network (AWSN) and the Business

all data breaches target small-to

cyber-security until they have a

continuity and disaster

Continuity Institute, where

medium-sized businesses, hence

breach occur and lose important

recovery plan

he volunteered for five years,

the reputational impact on a small

information, by which time it is

business post-breach can present

too late.

Additionally, 43 percent of

real, long-term challenges when

With all these factors occurring,

• creating and maintaining regular data backups.

including two years being a board member of the BCI Australasia. Tim

Should your business not have the

is founder and director of elasticus,

customer data has been released

it is no wonder the cyber-criminals

skills, expertise or experience in the

advising Australian-based

into the wild.

are doubling down their efforts on

above areas, then outsourcing these

executives on how to best manage

small businesses, it is an extremely

functions to a third-party IT service

cybersecurity, disaster recovery

even more concerning with small

lucrative and profitable business

may well save your business from

and business continuity prior to

businesses seemingly becoming a

for them.

the wrath of cyber-criminals.

the occurrence of a major disaster

The trend looking forward is

favourite target of cyber criminals. According to some sources, cyber-

10 // SECURITY SOLUTIONS

Various methods that should be used to create multi-layered

For those in the eastern states of Australia, the Small Business

or crisis. He can be contacted via mobile on 0417 036 026.

securitysolutionsmagazine.com


Recognise and Analyse Did he ask for self-exclusion?

Is he a banned person?

How old is she?

Are they employees?

When, where did she enter?

Is this valued customer Mia Clark?

New: The ready.set.go face recognition solution Software alone won’t produce optimal results. Our Enterprise Solution brings an all-inclusive, managed system to end users. No upfront cost. No staff training necessary. Cognitec does it all—from system design to hardware and software setup, with affordable subscription pricing covering licensing and services.

See it in action at Security Expo in Sydney, stand B3 FaceVACS-VideoScan alerts to known persons in real time while performing anonymous face recognition to count individuals, analyse demographics and track people flow. www.cognitec.com | info@cognite.com


HUMAN RESOURCES

ABANDONMENT OF EMPLOYMENT: WHAT YOU NEED TO KNOW BY GREG BYRNE

T

he large percentages

However, it is essential to also

of workers in the

look at what approach the Fair

Australian security

Work Commission has taken in

industry currently

specific cases of ‘abandonment of

employed as casuals and part-

employment’.

timers poses risk to the industry.

take an active step to terminate the employment in writing.

the absence. It would also be advisable to make an attempt to contact the

What is Not Abandonment of Employment

employee firstly with a telephone

• When an employee has

sent by email or registered post

call, and, if there is no response, to follow up with a written request

The risk lays in ‘abandonment of

The Case Law

employment’ where a casual or

Generally, ‘abandonment of

provided a medical certificate

requiring the employee to provide

part-time worker either finds more

employment’ is defined as

for an absence (note the

an explanation for their absence by a

secure work with another company

“circumstances where an employee

“temporary absence” provisions

specified deadline.

or leaves the security

is absent from the workplace without

of the Fair Work Act).

industry altogether.

reasonable excuse or has failed to

• When an employee has made

It is imperative that the employer is aware of what provisions govern

communicate with the employer

a workers compensation claim

that particular staff member’s

of what constitutes ‘abandonment

to provide an excuse for being

and is unfit for work while being

employment, whether that be a

of employment’, and what the

absent.” (see Sharp v MCG Group Pty

paid weekly payments under

modern award, enterprise agreement

employer can do about it.

Limited [2010] FWA2357 as per Duty

the claim.

or contract of employment, as

This article will address the issue

The Fair Work Commission (FWC) recently released the outcomes

President Asbury.) Traditionally, an absence of

• When an employee has taken authorised leave.

that particular instrument may contain a specific clause stating

of a review conducted by the FWC

more than three days was evidence

on the issue of ‘abandonment of

a worker has abandoned their

employment’. The review in part

employment and an absence of

established that the employer has

14 days without reasonable cause

Key procedures to follow

dealing with absences which should

consultation obligations where an

showing clearly that they have.

Having regard to the Fair Work

be considered.

employee was absent from work

The Full Bench decision by the

• Unnotified absence from work for up to three days.

how ‘abandonment of employment’ must be handled. Also, an employer may have a workplace policy

Commission’s views on ‘abandonment

Generally, it is best practice in

for three or more consecutive

Fair Work Commission in January

of employment’, an employer is

all circumstances to keep written

working days without authorisation,

2017 of Boguslaw Bienias v Iplex

obliged to follow due process and

records of any absences and the

explanation or notification to the

Pipelines Australia Pty Limited

procedural fairness when seeking to

attempts at contacting the employee.

employer. Further, if;

(2017) noted that, in circumstances

terminate employment due to that

where an ‘abandonment of

employment being abandoned.

“the employee has truly

Prior to assuming that

Finally, once all avenues have been exhausted and there is no

abandoned his or her employment;

employment’ clause existed in

then it is at least arguable that the

the employment contract, the

employment has been abandoned,

provided, an employer should

employer owes the employee no

employer was still required to

it is essential that the employer

always issue a letter stating that

duty of procedural fairness.”

take active steps to terminate the

takes a preliminary step of making

the employee’s employment has

employment as the employee’s

enquiries with all the employee’s

been terminated without notice,

there may be less of an onus on

‘abandonment of employment’ did

managers to check that the

effective immediately, on the basis of

an employer to take steps to make

not equal an automatic termination

employee had not given notice

‘abandonment of employment’. n

enquiries of the absent employee or

of employment. In that situation,

of the absence either in advance,

to give them notice that termination

the abandonment clause in the

or during the absence, which may

of employment will occur.

contract required the employer to

provide a reasonable explanation for

This statement indicates that

12 // SECURITY SOLUTIONS

explanation for the absences

Greg Byrne is the CEO and founder of MultiSec Consultancy.

securitysolutionsmagazine.com


WHAT’S NEW WITH ASSA ABLOY IN ACCESS SOLUTIONS! Showcasing everything that’s new with security innovation whilst supplying all your end to end needs in access solutions! LEARN ABOUT ACCESS CONTROL

VIEW THE NEW APERIO RANGE

VIEW WHAT’S NEW WITH SECURE CONNECT

SECURITY EXHIBITION + CONFERENCE 24-26 Jul 2019 | ICC Sydney, Darling Harbour

REGISTER NOW


RISK MANAGEMENT

SAFE DESIGN FOR SECURITY PRACTITIONERS Security designers often do not have management control of the actual construction or installation. However, it is the designer’s duty to provide guidance on how the security measures

BY DR KEVIN J. FOSTER

might be constructed safely. The designer must apply the safe

S

afe Work Australia

security product or system is safe

Safe Design of Structures. Each

design principles specified in their

(SWA) is a statutory

to install, safe to operate, safe to

Australian state and territory will

state’s Code of Practice for Safe

body established in

maintain and safe to remove at

have a similar code.

Design of Buildings or Structures;

2008 to develop

end of life. Often the design of

• Principle 1 states that

or in the absence of a state code,

national policy relating to

security measures in a building

safe design is everyone’s

they should apply the model code

Workplace Health and Safety (WHS)

is developed and delivered by a

responsibility; that is, everyone

published by SWA. They should

and workers’ compensation. The

team that might include architects,

who has control or influence

do this in association with people

establishment of SWA coincided

engineers and security specialists.

over the design of products,

who have expertise in construction

with the intergovernmental

The team, and all members of the

systems, items or processes.

safety. It is important that designers

agreement to formalise the

team who have control or influence

harmonisation of WHS laws in all

over the design, are responsible for

design applies to every phase in

their design documentation so that

Australian states and territories. In

safe design.

the life cycle, from conception

this information is readily available

to installation, operation,

when the design is provided to the

maintenance and disposal.

next person or organisation in the

this article, I shall describe why it is

The aim of safe design is to

• Principle 2 states that safe

document the risks and controls in

important for security managers

eliminate occupational safety and

and designers to understand and

health hazards at the design stage.

implement the SWA Model Code of

If hazards cannot be designed

systematic risk management

Practice for Safe Design of

out, then risk control measures

processes should be

Structures, or the code applicable

may need to be implemented at

implemented to identify

accept responsibility for addressing

to their state.

a later date. This would usually

hazards, assess risk and select

the risks that are reasonably

require the designer to advise other

controls to achieve safe design.

practicable for them to control. n

Each state and territory in

• Principle 3 states that

supply, construction or operational chain of responsibility. The security designer must

Australia has its own legislation

stakeholders of the risks and what

covering occupational health

control measures they need to take

designer must have both the

and safety. Designers of security

when the design is implemented.

knowledge and capability to

Chairman of the Risk Engineering

control or influence safe design.

Society in Western Australia and is

systems, products and equipment

Safe design needs to consider

• Principle 4 states that the Dr Kevin J. Foster is the

Engineers Australia’s representative

need to be aware of their

installation, maintenance and

obligations under this legislation so

operational processes, human

there must be effective

on Standards Australia Committee

that when these security measures

factors (for example, errors),

communication and exchange

MB-025 (Security and Resilience).

are installed in a building or

organisational issues and life

of the documented design

Kevin is also one of the many

other structure, they meet certain

cycle management.

and risk control information

contributors to the drafting of

between all people involved

Standards Australia HB188: Physical

principles of safe design described

throughout the life cycle of the

Protective Security Treatment

in the SWA Code of Practice for

design solution.

for Buildings.

safety requirements. For example, the designer has an obligation to ensure that the

14 // SECURITY SOLUTIONS

There are some important

• Principle 5 states that

securitysolutionsmagazine.com


CO O LD S SOAR CE E N 3Y RE ST FE A N L U T

FOCUS ON SECURITY WHERE YOUR SECURITY NEEDS ARE BROUGHT INTO FOCUS

300 LOCAL AND INTERNATIONAL

BRANDS INCLUDE:

Gain insight into the newest innovations that are reinventing the industry. AI, biometrics and tech inventions are moving at lightning speed and smart technology is inspiring new discoveries every day. Industry leaders, new visionaries and expert users are all joining together to exchange ideas and developments. The Security Exhibition + Conference is Australia’s largest and most established commercial security event that cultivates innovation, solves problems and leads an industry to be the best in the world.

ASIAL SECURITY CONFERENCE

HEADLINE SPEAKERS

NICK A New Scotland Yard

KELLY SUNDBERG Mount Royal University Canada

HUGH RIMINTON Conference Moderator

SHARA EVANS Futurist, Market Clarity

NICK DE BONT Thales Australia

DR LISA WARREN Code Black Threat Management Lead Industry Partner

REGISTER FOR FREE EXHIBITION ENTRY

BOOK YOUR CONFERENCE PASS

securityexpo.com.au


COMMUNICATION

NOT CRISIS PREPARED? WHAT IS YOUR EXCUSE? BY TONY JAQUES

`

j

v

`j

jv

I

t is one of the most

percent said their company never or

leadership in public relations

especially true with regard to crisis

perplexing questions

rarely conducts a risk assessment of

and communication management

management.”

in issue and crisis

potential reputation threats.

ever conducted”, involving almost

management. If

Given the lightning speed

However, progress is likely to be

4,500 respondents in 23 countries

slow. One global survey of board

in nine different languages.

members found that fewer than

executives are well aware of the

of social media, it is particularly

devastating impact of a crisis, why

disheartening that 49 percent of

do they not assign resources to get

the respondents also said that

explosion of social media means

reported they had engaged with

properly crisis prepared? Despite a

if a public relations issue which

the speed of information flow

management to understand what

continuing torrent of case studies

threatened a brand crisis occurred

has increased every year, so it is

was being done to support crisis

and damaging headlines which

out of office hours, they would not

worrying that almost half of the

preparedness. And only half the

spell out the impact of a crisis on

be alerted until the next morning or

public relations professionals in

boards had undertaken specific

reputation, brand, share value and

the next working day.

the latest survey say they would

discussion with management about

not be advised about a potential

driving crisis prevention.

the chances of corporate survival,

Have we learned nothing?

Since that study in 2012, the

half of the non-executive directors

new data just published reveals

As long ago as 2012, a massive

that there is little or no sign

global study by the Plank Institute

of improvement.

asked public relations and

people need to be asking some

only questions is, are you properly

communications professionals

important questions about why,

crisis prepared? And if not, why

of public relations professionals

what the most important issues

and about the need to put proper

not? n

shows that well over 25 percent

were that they faced. Crisis

planning in place. But it is pretty

said their organisation still did

preparedness ranked second

clear that real improvement can

not have a crisis plan, or it had not

in importance, just behind

only be driven from the executive

Issue Outcomes Pty Ltd. This article

been updated for more than a year.

dealing with the speed and

suite. As renowned crisis expert

originally appeared on www.

Additionally, more than 20 percent

volume of information flow. This

Ian Mitroff once wrote, “Without

issueoutcomes.com.au Tony can

said their CEO was “not really”

decisive data came from what

a champion, nothing significant

be reached at Email: tjaques@

or “not at all” willing to invest in

has been called “the largest,

will occur with regard to any major

issueoutcomes.com.au Website:

strong crisis preparation, and 30

most comprehensive study of

program in an organisation. This is

issueoutcomes.com.au

The latest PR News/Crisp survey

16 // SECURITY SOLUTIONS

crisis until the following day. Obviously, the public relations

The challenge is clear. The risk of failure is unquestionable. The

Tony Jaques is Director of

securitysolutionsmagazine.com

`v

`jv

h


THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.

NEW!

ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.

+61 (3) 9544 2477

email: oz_sales@takex.com

HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.

BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.

INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.

OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .

1300 319 499 csd.com.au www.takex.com

TAKEX AMERICA

VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta


BUSINESS DEVELOPMENT

BUSINESS PARTNER REFERRAL GROUPS H

ere is a simple

BY MARK GARBELOTTO

question: how much easier is it to close a referral sale than a

non-referral sale? A lot easier, right? Immeasurably easier. And how do you get referrals? Well, we all know that the best referrals come from satisfied customers. In order to be competitive in business development today, you have to please customers to the degree that they will refer you to friends. But how many business development people tap the potential of a different kind of referral – those from other professionals? A business partner referral group is a network of professionals from complementary fields working together to create referrals for one another. The fields must

works if everybody is actively

be complementary but not

seeking to make referrals for their

that people in referral partnerships

business referral group, you have to

overlapping, and the people must

partners whenever and wherever

come from complementary fields

find people who will be of the most

know each other well, trust each

they can.

that do not conflict with each other.

value to you, but to whom you are

And you can also see that it is just as

equally valuable. No one is going to

other and feel fully confident

I have had several such

You can see how important it is

When looking to establish a

creating proactive referrals for each

networks for years and my sales

crucial that you really believe in the

want to be part of your network if

other. It is the law of reciprocity: the

training business would not

abilities of your referral partners,

they think they will be doing all the

more you give, the more you get.

be what it is without them. It

because your reputation is on the

giving and you the taking. Who can

is not a lie when I tell you that

line, as well as theirs. It pays to take

you really help? Helping is where the

comprised of many complementary

the really exciting part comes

your time finding the right people to

energy for this approach originates.

but non-competitive trades, gives

in making referrals rather than

join your network and to get to know

us a useful model. Electricians do

in getting them. If I am working

them well. If you would not have

members of your network realise

not compete with plumbers, who

with a big company with lots of

them doing work for you then they

that it is not just about making

do not compete with bricklayers,

potential training needs, one of

do not belong in your network.

more sales. It is also about shared

who do not compete with painters,

the first things I ask is, “Who is

and so on. If you have a trusted

doing your OHS training? Do you

you would enjoy having a coffee

really is. Once people recognise

plumber, you are likely to take

need a good person? How about

or a beer with, then they might not

the commonality of it and commit

his advice when you need an

first-aid training? Would you like

be right for you either. That is just

themselves to helping their

electrician. He works a lot with

a recommendation?” These are

the sort of thing I am suggesting, a

partners, things really start to

electricians; there is no conflict of

people in my referral network. I

small group of like-minded people

click. Everyone becomes more

interest involved, so he is the ideal

know them and I trust them. I know

from related industries who trust

involved, better connected and

person to give you that referral.

that they will be looking out for me

each other and enjoy spending time

more powerful. After you have

in a similar fashion when they get

together. I have breakfast once a

established your network, meet

done in any industry and even in

the opportunity. And my customers’

week with one of my referral groups

often. Have fun together. Look out

related industries. It takes time,

positive feedback after a good

and meet monthly with another.

for one another. It is amazing how

smarts and commitment to build

experience with one of my referral

Doing this kind of thing is the only

excited you can get about helping

the right network, but more than

partners is not insignificant to me. It

way to get to know people well

someone else – and you will find

anything else, it requires goodwill.

is a win-win-win situation, one that

enough to instil your faith in them,

yourself receiving a lot more

A business referral network only

creates strength for all parties.

and vice-versa.

business. n

The building industry,

This form of reciprocity can be

18 // SECURITY SOLUTIONS

If they are not the kind of people

Make sure that prospective

interests and friendships. And it

securitysolutionsmagazine.com



THINKING ABOUT SECURITY

BY DON WILLIAMS

t is an exciting time

provides scope for security

to be involved in

professionals to be involved – they

foreign government-sponsored

webinars and online chat groups

security management.

certainly provide the opportunity

and corporate data gathering,

appears to be on the increase. The

Security has become

for informed and educated

sometimes utilising ‘soft target’

breadth, relevance and particularly

a recognised management

comment on the applicability of the

commercial entry points, creates

the currency of such sessions

discipline with its own body of

products provided.

additional responsibilities for the

makes them attractive.

I

knowledge, research and literature

Security professionals are being

Increased awareness of

security advisor.

association chapter meetings,

The web provides the security

that is beginning to permeate into

recognised as legitimate and even

the general awareness.

necessary contributors to reviews of

technologies and capabilities mean

academic papers, discussion groups

Organisations such as the

related standards and guides. Where

that security specialists need to

and advertising material, as well

Australian Security Policy Institute

security has not been initially invited,

constantly monitor the market to

as news and historical data on

(ASPI) recognise the importance of

in some cases they have been able to

see what new tools can assist with

security incidents.

the private security sector and are

obtain seats at the relevant tables.

mitigating the new threats.

advising and informing government. National, international and

The existing training packages

Improvements in security

Supply chains are becoming

professional with access to

There is more happening in the security field than ever before

related to guards and security risk

more interdependent and, as a

at the moment and the future

industry standards defining and

advisors are under review. These

result, the likelihood of single

looks good. Having observed

scoping security management are

reviews provide the opportunity to

points of failure continues to grow

and participated in the security

being drafted and published. These

mould them to reflect what is needed

and be vulnerable to deliberate,

management sector for 40 years,

provide us with a common lexicon

now and in the future, rather than

malicious human action.

there is no doubt that right now is

and help us provide consistent

just retain what has evolved from the

and collaborative assessments

old days.

and advice. The societal awareness of terrorist

The speed at which our physical

Security professionals know

the most exciting, challenging and

they cannot be knowledgeable in

rewarding time to be a security

every expanding specialist area,

professional. n

and cyber environments are changing

but that a general awareness

and other threats has resulted in

provides the opportunity, even the

of the security spectrum is

government advice on crowded

necessity, for security professionals

essential. There has never been

is a recognised thought leader in

places and venue safety/security.

to consider and advise on new threat

such easy access to information.

security, emergency management

These documents help create a

vectors. New technologies such as

Attendance at professional security

and related disciplines. His book

greater awareness of the need for and

the Internet of Things, dash cams,

organisation activities appears

Bomb Safety and Security: the

value of security as a management

drones, 5G and whatever else has or

to be growing. Informal research

Manager’s Guide is available from

discipline. Ideally, the preparation of

is about to or has just arrived, create

suggests that, although conferences

Amazon. Don can be contacted via

government-sponsored documents

both new assets and new threats.

may be in decline, access to local

email donwilliams@grapevine.net.au

20 // SECURITY SOLUTIONS

Don Williams CPP RSecP ASecM

securitysolutionsmagazine.com


Prepared to

support you

at every level.

Effective cybersecurity is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And it’s about partnering with a solutions provider who’s prepared to support you at every level. Which is where we enter the picture. We are 100% focused on cybersecurity, and we do everything in our power to mitigate its risks. We have strict requirements for our own products and we work diligently with our partners—and you—to fight this threat.

Learn about our layers of protection at www.axis.com/cybersecurity


EVENTS

Security Exhibition & Conference 2019

to seeing you again in Sydney in

• asset management systems

2019 for the Security Exhibition &

• drone capability

event within ISC West focusing

24–26 July

ASIAL Conference!

• software cyber management

on unmanned aerial vehicles

International Convention Centre, Darling Harbour, Sydney

Visit securityexpo.com.au for more information. n

In 2019, the Security Exhibition & Conference is heading back

PNG Security Congress

to Sydney.

2–4 March 2020

solutions

• Unmanned Security Expo is an

(UAVs), unmanned ground

• innovative video intercoms

robotics and vehicles (UGVs),

• large enterprise systems

and the various software and

• mechanical locking integration with electronic security solutions

applications that support them • Connected Security Expo (CSE)

Port Moresby, Papua New Guinea

• emerging technologies.

has moved to the ISC West show

Conference is the industry’s annual

Now is the time to plan to attend a

Visit pngsecuritycongress.com/

floor! As the digital and physical

opportunity to reunite for three

world-class security and technology

register to register or for more

worlds collide, it is increasingly

days of quality networking and

conference and exhibition – PNG

information. n

important for industry

unrivalled education alongside a

Security Congress.

The Security Exhibition &

showcase of the most innovative

Security industry specialists and

professionals to protect their

ISC West

organisations and clients from

solutions to the Australian market.

professionals will converge on Port

18–20 March 2020

both physical and cyber threats.

For over three decades, it has been

Moresby, PNG, in March 2020 for this

Sands Expo Convention Center,

CSE provides holistic solutions for

the largest and most established

premier security industry event, with

Las Vegas

commercial event for the security

a security conference and exhibition,

ISC West is the largest security

Working with SIA, ISC West also

industry in Australia, bringing

real-world challenges presented and

industry trade show in the US. At

features world-class education

together the entire supply chain of

a glimpse into the future of global

ISC West, you will have the chance

to learn about every facet of the

manufacturers, distributors, security

security integration and trends.

to network with over 30,000

security industry.

professionals and end-users to

The Congress will feature

security professionals through

today’s connected organisations.

Visit www.iscwest.com for more

connect and create unparalleled

electronic security and safety

new products and technologies

business opportunities.

solutions for aviation, banking,

encompassing everything from

infrastructure, industrial sites, mines,

access control to unmanned

Total Facilities

forward to once again reuniting

commercial buildings, residential

vehicles from over 1,000 exhibitors

22–23 March 2020

with more than 4,500 security

towers, building and development;

and brands.

Melbourne Convention & Exhibition

professionals and over 150 leading

the best of the best in a world-

suppliers. The 2019 show is set

class offering:

offer attendees a host of

Total Facilities is Australia’s most

to see some interesting new

• intelligent CCTV, access control

attractions, including:

important facility management

• new products and

event. Explore an Environments

The entire team is looking

innovations as well as a host of new attractions. Make sure you put the dates in your diary. We look forward

22 // SECURITY SOLUTIONS

and alarms systems • advanced video surveillance solutions • intelligent traffic solutions

In 2020, ISC West will

information. n

Centre, Melbourne

technologies, encompassing

of Excellence and discover the

everything from access control

latest and smartest ways our

to unmanned vehicles

built environment can help

securitysolutionsmagazine.com


The next generation in smart panels is here •

Compatible with existing

Data stored on panel

Reliance equipment

Encrypted connections

NBN ready

Z-wave® compatible

Built in IP communication

4G / WiFi Module

True monitored path via UltaSync™

Native IP/camera support

Residential

Multi-Storey

Education

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au

facebook.com/HillsLtd/ CONNECT

E N T E RTA I N

SECURE

Retail

Government

Aged Care

Warehousing


EVENTS

us realise our full potential in

CivSec 2020

Australia’s leading showcase of

24–26 March 2020

high-performing facilities, and intelligent living and work spaces.

• Australian Association for

between installer, integrator,

Unmanned Systems.

end-user and vendor.

Melbourne Convention & Exhibition

CivSec 2020 is a premium

• Discover the high-quality

Centre, Melbourne

international event with

solutions you need whilst

Built around major conferences of

exceptional opportunities to

raising your anxieties

Smart Zone designed as a thriving

Australia’s key law enforcement

reach key driver organisations

with the experts behind

hub of technological innovation

and policing organisations, the

in this evolving, tech-savvy

every innovation you hope

which presents new technologies

CivSec 2020 International Civil

regional marketplace.

and solutions to help you create

Security Congress and Exposition is

smarter, greener buildings. The new

your gateway event to the growing

zone offers visitors a dedicated

Indo-Asia-Pacific civil national

environment to look for integrated

security environment. CivSec 2020

IFSEC International

and cloud-based solutions to

will include an industry exhibition,

19–21 May 2020

improve operations and deliver

supporting a program including:

ExCel, London, UK

business value.

• Australia New Zealand Policing

Our 2020 event will feature a

Visit www.civsec.com.au for more information. n

to procure. • Draw impartial verdicts for security solutions against rigorous, real-life testing zones, including attack scenarios and surveillance. • Research the inspiring ways

Beyond an internationally

you can adapt to the changing

Advisory Agency (ANZPAA)

esteemed product showcase,

tides of tomorrow’s security

IoT technologies will be more

PC20 Police Commissioners

IFSEC International is Europe’s

challenges and equip yourself

pervasive in smart commercial

Conference

centralised gateway to the critical

with the tools you need to

According to industry research,

buildings than anywhere else over the next three years. This zone is designed to deliver to visitors industry-class solutions and strategic

• National Security Science and

mutating threats, the integrated

Science and Technology)

path to achieving global safety

security industry whilst

starts with IFSEC.

sophisticated partnerships

• Access inspiring high-

and inspiring collaborations

• Corrective Services Emerging Technologies Project Group

and data to better understand and

• Custodial Corrections Working

Visit www.totalfacilities.com.au for more information. n

24 // SECURITY SOLUTIONS

move forward with certainty.

Technology Centre (Defence

advice on how to use technology manage their building performance.

security conversation. Amidst

Group • Electronic Monitoring Conference

level panel debates from

• Network with the global

kickstart under the same roof.

government and industry

Visit www.ifsec.events/

influencers, and join the

international/ for more

collaborative conversation

information. n

securitysolutionsmagazine.com



FEAUSRE

THE OSINT CONNECTION Intelligence In Executive Protection BY TRAVIS LISHOK

26 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


This article explores how one

to a student organisation that

Palestine (SJP). For our purposes,

can conduct an open-source

vehemently opposed our client.

we will specifically focus on

intelligence (OSINT) investigation

We even knew by which legitimate

the University of California,

and explains the value this type

means the individual intended

Los Angeles (UCLA) chapter. I

to obtain a weapon?

of investigation can bring to a

to enter. We advised our client

chose to use this organisation

• What is the status of the

protective operation. The article

not to let him into the event, but

and its former president as

draws on events leading up to

were told that, for public relations

examples because they fit all of

a political fundraiser that took

reasons, he was not to be turned

the characteristics that we would

place in a large Silicon Valley

away. We would check him

expect, given our scenario above.

convention centre some years ago.

thoroughly but, if no contraband

Plus, anyone involved in higher

There were over 1,500 attendees

was found, we were instructed to

education could relate this to their

and the event included a stately

let him in.

personal experience.

dinner with various distinguished

In approaching this situation

During our research and

fascination with weaponry of any type? • Is the subject currently seeking

subject’s inhibitors, including any recent losses? • Has the subject engaged in any ‘final act’ behaviours?

Additional Research Needed to Assist the Field Operatives

from an OSINT perspective, it is

analysis, we will attempt to

During our research, it would be

our primary goal to answer this

answer the following questions

helpful for us to further support

that hosted this fundraiser has

question: Is the individual or their

to assist in our assessment of the

the field operatives by obtaining a

quite a few enemies, much

organisation likely to take action

subject and his/her organisation:

picture of:

attention had been given to

at the event? We are primarily

1. Primary question:

• the subject

the online forums and social

concerned with violence or

• Is the individual or the

• the subject’s vehicle with

media pages that are often

embarrassment directed toward

organisation likely to take

used to coordinate protests and

the client and, to a lesser degree,

action at the event?

disruptions at this organisation’s

any attempts to harm the image

2. Secondary questions:

events. It was on one of these

of the client (their event, their

• Has the subject approached the

forums where a specific individual

organisation and so on).

speakers on stage. Since the political organisation

expressed his intention to get

I will use an analogous

licence plate information • the subject’s associates.

client previously and, if so, in

Immediate Area of Concern

what way?

Since the subject is attending the event, we can confirm that

himself into the venue (in order to

real-world subject and student

collect information and possibly

organisation to give you a

organisation have a history

they are actively researching the

disrupt it), and made it clear that

detailed, realistic example. If

of violent, threatening, or

client and engaging in planning

he had the legitimate means of

you have ever been to any of the

criminal behaviour?

and preparation. Even if this

achieving this feat.

University of California campuses,

• Does the subject/

• Is the subject seeking

is not hostile in any way, it is

then you would know that this

knowledge about the client and

important to be conscious of it.

very precise and included the

organisation and others like it

the client’s current situation?

This is concerning, because we

name and even the photo of

have a constant and aggressive

this individual, who belonged

presence in Students for Justice in

The details we obtained were

securitysolutionsmagazine.com

• Does the subject possess, have access to, or give evidence of a

know that research, planning and preparation are part of the

SECURITY SOLUTIONS // 27


FEAUSRE

path to intended violence. By

profiles. These are going to

databases.) After viewing both sets

social media accounts (SJP at

conducting more online research,

provide us with the most current

of sources, we should have enough

UCLA), it was easy to find their

we may find evidence to support

and detailed information. Once

information to form a foundation

Facebook page, Twitter, YouTube,

or contradict this concern.

we discover the subject’s email

for answering the question, “Is the

associated Instagram hashtags,

address or username, we can use

subject likely to take action at the

Tumblr, Facebook group, Google

depicts the path to intended

these pieces of information to

event?”

group, Yahoo group and online

violence as described by the

search across all relevant social

authors Frederick Calhoun

media sites. It is a common theme

research about the organisation

their literature (Scribd and

and Stephen Weston in Threat

in online investigations that most

itself. First, SJP at UCLA have an

DocShare). Some of their group

Assessment and Management

users will use a single username

official website where they make

pages were not open to the public;

Strategies (2nd edition).

across all of their accounts

announcements and share their

however, it would be simple to

(Facebook, Twitter, Instagram and

views. Here, they left a contact

create an alias account and join

Path to Intended Violence

so on). What if his accounts are

email for the organisation on the

to view their conversations. The

private? Then the researcher can

main page. This is immensely

organisers of the SJP UCLA chapter

Grievance  Ideation  Research

target his associates’ profiles and

helpful because we can search this

were also listed by name on the

and Planning  Preparation 

view conversations/interactions

email address in Google to find

UCLA website.

Breach  Attack

between them (target by proxy).

more pages that are associated

The simple illustration below

Once we collect information

Next, we can begin our

repositories they use to share

Lastly, there were several

with it. Plus, it is highly likely

websites that included detailed

Intelligence Collection Mind Map

about the subject from open

that this email address was

profiles about SJP (not necessarily

sources, we can next try closed

used to set up all of SJP’s social

the UCLA chapter), detailing their

The graphic below is a mind map

sources such as TLO or Thomson

media accounts.

activity and classifying them as

that gives a simplified illustration

Reuters Clear, which typically

of my research process. The

require a private investigator’s

author of IntelTechniques.

primary focus is (1) the subject

licence (or similar barrier to using

com, has stated for this very

and (2) the subject’s organisation.

it). These sources would reveal the

reason, that the target’s email

Summary of Findings: Subject

(Side note: Michael Bazzell,

hate groups.

subject’s previous arrests, debts,

address is the single best piece

I was able to discover his social

Mind Map Explanation

associates and detailed personal

of information to have when

media profiles, articles he

Beginning with the subject,

information. (For the purpose of

beginning an OSINT investigation.)

published, and Google Drive

our most valuable sources of

writing this post, I did not run

information are his social media

the subject’s name through these

After discovering the username that is used for SJP’s

documents in which a pro-US/Israel group wrote a detailed profile about him (including his personal blog, his associates, his activism, pictures of him and more). To assist the field operatives, I was able to find the following: pictures of the subject and pictures of his associates, but no picture of his vehicle. I did not find any significant evidence to support a hypothesis that the subject was likely to act out violently or otherwise at the event. In addition, I was unable to find any evidence of previous violence/criminality, familiarity with weapons, loss of inhibitors, or final act behaviours. Since the subject is a graduate student and the leader of his organisation, these are likely to inhibit him from doing anything extreme, such as acting out violently. However, I am concerned that the subject’s personal blog contains violent

28 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


poetry and literature. This likely

acted violently or interrupted

Conclusion

concrete details and a dynamic

has a significant influence on his

events. However, I was able to

Intelligence is about making

framework to view the situation.

personal outlook, plus he could

find instances of alleged violence

judgements about the future,

Where the limits of OSINT end,

influence others to act violently

against students and evidence

interpreting problems and

field intelligence (surveillance)

though this literature.

of shouting down speakers

supporting decision makers.

begins. n

they disagree with, by other SJP

There are significant limitations

Summary of Findings: Subject’s Organisation

chapters. Given this information

for anyone attempting to make

and the information about the

judgments about the future

founder of EP Nexus, an online

For SJP’s UCLA chapter, I was

subject, I would estimate that

by only using OSINT tools.

resource for executive protection

able to discover their official

there is a low to medium risk

These limitations include,

professionals comprising a blog

website, UCLA organisation page,

that the SJP UCLA chapter would

but are not limited to, the

and an online newsletter with

social media profiles, online

potentially act out (violently or to

following: source reliability,

great information from some of

communities, online repositories

disrupt) at the event.

analyst biases, limited time,

industries’ leading practitioners.

limited information and so on.

Based in California, Travis has

where they share their literature

If we had more time to invest,

Travis Lishok is the

and third-party sites that

it would be worthwhile to analyse

Therefore, intelligence collection

over a decade of experience

comment on controversial groups

trends set by SJP chapters at other

and analysis in terms of OSINT

working in the military and

such as SJP.

university college campuses to

is only one part of the protective

private sector security. If you

anticipate evolving tactics used by

puzzle. It gives the operatives

would like to know more, visit his

the UCLA chapter.

working in the field limited

website at www.epnexus.com

I was unable to find instances where the SJP UCLA chapter

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 29


FEATURE

TO G OR NOT TO G? BY JULIAN CLAXTON

30 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


A review of mobile

Three, owned by Hutchinson

communication advancements

Telecommunications. In 2003,

and its impact on technical

they released a handset that

surveillance countermeasures.

could make video calls over an

I still fondly remember the

enhanced network (although 3G

excitement I felt when I purchased

was released internationally in

my first mobile phone in 1990.

1998). Latency was considerable

It was the size of two bricks; an

and the image was often

analogue device with patchy

distorted, but who cared – I could

reception (1G). At the time, I was

actually see my interlocutor! A

a young surveillance operative

considerable benefit of the 3G

and investigator still learning

network was the ability to send

the ropes. The mobile phone

video clips, photos and audio files

was a novelty at first, although

relatively quickly. It also provided

its convenience quickly became

internet access from the palm of

a necessity as I rushed across

your hand. This revolutionised the

the city with a constant need to

concept of real-time surveillance,

communicate with my colleagues,

providing the ability to instantly

hot on the tail of our respective

send images and video to our

surveillance targets.

employers for verification or

A year or so later, the analogue

Access to the internet meant that

digital and, not long after that, text

directions and other relevant

messaging (SMS) and multimedia

information could be accessed in

messaging (MMS) features were

real time to aid investigations.

enabled. The digital network was

Covert surveillance devices

second generation (2G) and mobile

soon flooded the market and, with

communications were becoming

advancements in technology and

the norm. Communication as

improvements to the chipsets

we knew it changed and with

used, they became smaller and

it went our privacy. The digital

lasted longer. Online retailers such

network saw a proliferation of

as eBay provided an anonymous

audio surveillance devices (bugs)

means by which to purchase such

transmitting room audio using the

products and, throughout the

2G cellular network.

2000s, surveillance bugs were

By this time, I had enhanced my tradecraft to include technical surveillance and, like

being sold in the thousands by online retailers. In 2008, the laws changed in

the thieves and fraudsters I was

New South Wales, resulting in a

pursuing, I collaborated with

restriction on the way in which

colleagues to see how to benefit

covert surveillance products

from this enhanced method of

were used. I subsequently

communication, particularly

decided to switch sides and

with respect to developing covert

actively steer my career

electronic surveillance products

toward countersurveillance,

to lawfully aid investigations.

particularly technical surveillance

Whilst I have always operated

countermeasures (TSCM). Having

within the boundaries of the law,

had a thorough understanding

my adversaries do not and they

of how to develop and use covert

too were devising means by which

surveillance products, it made

to benefit from this enhanced

sense to put that knowledge to

communication method.

good use, helping organisations

One of the pioneers of third

securitysolutionsmagazine.com

further surveillance instructions.

phone service was upgraded to

find them. This stood me in

generation (3G) technology in

good stead to combat the ever-

Australia was a company called

increasing use of 2G and 3G

SECURITY SOLUTIONS // 31


FEATURE

surveillance bugs – not to mention

from within your designated area

advantage of 5G transmissions

likely it is to penetrate obstacles.

the older style devices operating

had to be identified, typically

is that a lot more bandwidth

Take the low frequency signal

using standard radio frequency

using direction finding or near

is available at much higher

of 30Hz. It has a wavelength

(RF) means – such as frequency

field radio receivers focused on

frequencies, known as mmWaves.

of 10,000km. This wavelength

modulation (FM) radio bugs, often

received signal strength indicators

These operate above 6GHz (in this

will easily penetrate through

sold as a toy kit!

(RSSI). This was not significantly

instance, we refer to frequencies,

walls. A high frequency signal of

different to how we operated prior

not the evolution of mobile phone

300GHz has a wavelength of only

(4G) products were commercially

to digital encryption, except that

technology, also labelled ‘G’ for

one millimetre! Its penetration

released, enabling large amounts

we needed to be more vigilant

Generation) and have the capacity

capacity is as good as zero.

of data to be transmitted in what

with our physical searches and

to operate up to around 90GHz

Using the familiar 2.4GHz Wi-Fi

was then considered lightning-

more cognisant of RF spectrum

(albeit impracticably). From a

frequency as another example, its

fast speeds. Manufacturers of

management and propagation.

practical standpoint, anything

wavelength is 12.5cm and, as you

transmitting at those mmWave

would know from your home or

Also in 2008, fourth generation

covert surveillance devices were

The emergence of fifth

becoming more creative in the

generation 5G networks from a

frequencies will be unreliable

office Wi-Fi setup, it will typically

way they concealed devices and

TSCM perspective presents little

and ineffective, unless antennas/

penetrate through a couple of

transmitted via the 4G network.

change to our modus operandi.

repeaters are placed in direct

walls to provide connectivity

Burst bugs were using encrypted

In essence, the physical search

line of sight. The 5G mmWave

within your environment. In

data to send audio via the 4G

methodology needs to be reviewed

transmissions can be blocked

summary, lower frequencies

network and, depending on the

and more research conducted on

by precipitation, foliage, walls,

have longer wavelengths which

product and its compression

the emerging threats associated

people and even oxygen (at the

penetrate obstacles better.

algorithms, 24 hours of audio

with wider bandwidths and faster

upper end of the spectrum). We

Higher frequencies have

recordings could be transmitted

speeds. Transmitting via the 5G

all know what it is like trying to

shorter wavelengths and will

across the globe in a matter

network will mean that a full day

make a call from within a building

not penetrate much beyond

of minutes.

of audio recordings stored within

when mobile signal strengths

line of sight (depending on the

a burst bug’s memory will take

are low. At this point in time and

frequency used).

(encrypted) communication, the

just seconds, rather than minutes,

for the foreseeable future, using

countersurveillance community

to transmit and a lot more video

mmWave technology to transmit

infrastructure companies, such as

had to lift its game and become

(and audio) can be transmitted

from a mobile will be far worse,

Ericsson, Nokia and Huawei, have

more reliant upon signal

in almost real time. However,

especially if you are deep indoors.

all released white papers and/

strength, rather than signal

the practical realisation of 5G

demodulation, to determine which

advantages for covert surveillance

the wavelength of a signal

the issue of propagation. All of

radio frequencies were a threat.

is a long way off.

is inversely proportional to

them refer to the complexity of

With the advent of digital

To put things in perspective,

Leading 5G telecommunication

or academic papers discussing

Thorough physical inspections

The difference between 4G

frequency – higher frequencies

operating mobile handsets at

were even more pertinent than

and 5G from a signal propagation

have shorter wavelengths. The

mmWave frequencies. In every

before and any signal originating

perspective is considerable. The

shorter the wavelength, the less

instance, they refer to using what

32 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


IT MAKES LITTLE SENSE AT THIS EARLY STAGE OF 5G DEVELOPMENT TO DESIGN AND USE A BUG THAT IS RELIANT UPON UNTESTED AND CLUNKY 5G TECHNOLOGY. IN FACT, IT WOULD BE COUNTERPRODUCTIVE, GIVEN THE RISK OF FAILURE OR OTHERWISE INTERMITTENT SUCCESS. is known as sub-6GHz frequencies

tried and tested. If an operative

by obstacles (including people).

mmWave transmissions beyond

to operate 5G mobile handsets

has regular access to the target

A building will therefore need

around 11GHz at most. It would

to overcome the restrictions of

premises (such as that available

numerous antennas installed

be ridiculously expensive and

signal penetration. As a result,

to a trusted insider) then they

within; ergo, easily discovered by

subsequently increase the cost of

it has been widely agreed that

may choose to install a solid-state

a basic TSCM inspection team, or

services, whilst providing little

a more effective frequency to

listening device which records

the router itself will need to be

to no benefit to an experienced,

benefit from 5G technology is

locally with no (or limited)

placed on the external perimeter

qualified and professional

sub-6GHz and, in many instances,

need to transmit a signal at

of the room in which it is expected

TSCM team.

will be 3.6GHz or below for indoor

all. It makes little sense at this

to operate (preferably near a

mobile phone use. This means

early stage of 5G development

window, which in itself will cause

that existing 4G LTE infrastructure

to design and use a bug that is

attenuation), or a separate antenna

will be relied upon and, in many

reliant upon untested and clunky

will need to run from the device to

instances, used to help with

5G technology. In fact, it would

outside the building, in proximity

industry participation, Julian

mobile uplinks (handsets/devices

be counterproductive, given

to a 5G base station. In each of

Claxton is an experienced

talking to base stations). The result

the risk of failure or otherwise

these cases, a physical search team

security professional, with

of this will likely be enhanced 4G

intermittent success. That is not to

should have no trouble identifying

specific expertise in technical

network access, providing faster

say that 5G technology will not be

most 5G threats or components

surveillance countermeasures,

connections than we currently

of use for surveillance purposes.

used to covertly transmit a 5G

insider threat management and

have. This is an important

It absolutely will – just not for

signal. Moving forward, 5G routers

credibility analysis (detecting

factor when considering the

many years. And even then,

and various other products may

deception). Julian has presented on

topic of covert surveillance and

the propagation (penetration)

rely upon mmWave frequencies

TSCM and security management

related countermeasures.

of mmWave-based products is

exclusively; however, for now, that

Espionage Research Institute in

unlikely to change, as the laws of

comes with more components and

Washington DC, as well as being a

physics are somewhat fixed!

a larger housing, decreased battery

founding member of the Technical

life and an increased power draw

Surveillance Countermeasures

A good covert surveillance operative will typically find the least resistant path to placing a

So, let us argue the concept

The sixth generation may be a different story. n With over 25 years of active

listening device or electronic bug.

that a covert surveillance device

(resulting in the generation of heat

Institute in London and a member

It needs to be easily installed,

might be built into a 5G mmWave

– easily detected using thermal

of the Espionage Research Institute

reliable and unlikely to be

modem/router. Assuming it is not

imaging).

International in America. He is

detected if his or her surveillance

using sub-6GHz frequencies, it

Our equipment currently

operation is to be successful. It

will require line-of-sight access

covers up to 24GHz. My firm

ASIS International, and a serving

also needs to have stable power,

to a base station. It is proposed

purchased receivers with this

board member of the Australian

an audio path for the microphone

that 5G base stations will use

capability in 2011, to pander to

Institute of Professional Intelligence

or visual path for cameras, and

something called massive multiple-

clients who were ill-informed

Officers in Canberra, Australia.

access to transmission methods

input-multiple-output (mMIMO)

by charlatan TSCM wannabes,

He is director of Jayde Consulting

(these can be wired and/or

and beam forming, full-duplex

marketing the unnecessary and

Pty Ltd and holds certificates

wireless depending on the

technology. In simple terms, it will

alarmist requirement to scan

in security risk management,

product used). On the market

have antennas steered toward each

mmWave frequencies. This was

countersurveillance and

today is a plethora of reliable and

device it connects to and chipsets

well before 5G technology was

investigations, as well as a graduate

inexpensive devices operating

will communicate uplinks and

even on the drawing board.

diploma in Behavioural Analysis

using radio transmission methods

downlinks simultaneously. For

Given the RF propagation

and Investigative Interviewing and a

such as VHF, UHF and SHF, which

this to operate effectively, those

issues raised in this article, I see

master’s degree in Communication,

include Wi-Fi, Bluetooth, 3G and,

antennas will need to be placed

little benefit in organisations

Behaviour and Credibility Analysis

in some cases, 4G networks. All of

in close proximity to that device

increasing the capability of their

(MMU). He can be contacted at

these transmission methods are

so as to not be too interrupted

spectrum analysers to detect 5G

julian@jaydeconsulting.com

securitysolutionsmagazine.com

also a longstanding member of

SECURITY SOLUTIONS // 33


OPERATIONS

SAFETY IN TRAINING: SIMPLE BUT NOT EASY BY RICHARD KAY

Officers need to gain experience in a controlled environment to prepare them for situations they may face on the job. Professional instructors care about the people they train, but the average officer is expected to control a real, aggressive subject with fewer training hours than a high school athlete. The objective is to provide realistic training while minimising risk, so safety in training is critical. Safe training is simple, but it is not easy. Simple implies a lack of complexity, whereas easy implies minimum effort. Ensuring safety during a training activity is as simple as eliminating dangers; however, this is not easy. A pitfall of well-orchestrated training is that it looks easy to the casual or untrained observer, so they come away from well-run training motivated to start their own program. Unfortunately, they do this with little understanding of the complexities necessary to make it effective and safe. There are three types of people who often cause issues in high-risk endeavours: the inexperienced (naively think ‘how hard can it be?’ and make it up as they go along), the unlucky (luck can be offset through organisation of the training environment, experienced instructors and proper safety protocols) and the experienced (cut corners, push the envelope and become too familiar with the activity). Safety guidelines should be systematic and meaningful. Safety rituals leave no room for complacency because the attention to detail is implicit. Policies established after an incident often become lax due to time, money, stupidity, laziness or ignorance. Implementing safety rituals is not overly complex; they are simple to follow if properly developed and do not take a lot of time if applied systematically. It

34 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


is unlikely that people get injured

practical phase, use imitation or

monitor and reinforce safety

Safety officers should be clearly

if safety rituals are implemented

simulated gear for safety. Do not

to prevent accidents occurring

identifiable to all participants. A

and enforced.

overuse props, as they can become

and familiarise everyone with

brightly coloured vest is a good

a distraction. Participants tend

idea, as well as a visible whistle,

Safety Preparation

what is expected in order to

to copy what they see staff do, so

safely complete the training.

which acts as a warning in the

Preparation is the key for safe

model the concept.

Point out any hazards or safety

event of safety breaches. Whistles

non-compliance until the safety

should not be used for any other

training. Instructors should have

Instructors should always

all the appropriate materials; a

inspect participants’ gear to

principles become a part of

purpose; using them for drills

checklist is helpful to ensure that

ensure it is appropriate and

training culture.

creates a confusing signal that has

items required during training

conforms to safety requirements.

are available for each program.

Do not presume that participants

Safety Personnel

The training environment should

have maintained their gear in

The role of safety officers is to

engaged in practical training

be set-up early; not only does this

good operational condition.

ensure safe, injury-free training.

know the appropriate level of

look organised and professional, it

Inspect duty rigs for items not

They do not instruct, coach, train,

force, weapon types, functions,

assists in controlling the safety of

required in the training program

demonstrate or correct; they focus

use and safety, and what

the training environment.

that may be contained on the rig

solely on safety. As the ultimate

constitutes a designated target

or the person and may pose a

safety authority in training,

during training. Accidents are

for any safety hazards and proper

safety risk. To ensure consistency

safety officers enforce all safety

caused by people, not equipment,

measures taken to rectify, as

of safe equipment, an option

guidelines, monitor participant

and occur when an unsafe

required. The facility should be

is to provide participants with

conduct during training and

condition and unsafe act are

relative to class size and be free

training equipment that is

report any unsafe or illegal acts,

present at the same time. Safety

of outside distractions. When

checked prior and that the

so only authorised and trained

officers should establish a clear

space is limited, this may be

instructor knows is safe and

representatives should act as

safety plan; key items include a

controlled by varying the number

appropriate. Instructors should

safety officers.

mobile phone and first aid kit, and

of participants, or the layout of the

check, maintain and clean all

facility. Arrange the classroom in

training gear after each class.

The location should be checked

such a manner that participants

Train role players how to

the potential for safety issues.

Core responsibilities of safety officers include the following: • inspect venue, weapons and

It is essential that participants

key procedures include a first aid and evacuation plan. Safety officers should not

equipment before training so

be confused with instructors;

there are no potential hazards

the instructor runs the training

are comfortable, can focus on the

act without causing injury, and

content matter and participate

make sure there are policies,

freely. As part of the housekeeping

procedures, and protocols

• conduct a safety briefing at the

activities, whilst safety officers are

brief, outline safety issues early.

for training, including the

commencement of training

responsible for the overall safety.

The practical training area

use of safety equipment and

• ensure appropriate instructor/

It is advisable to have at least

should be free of obstructions

appropriate safety ratios. Never

participant ratios for the

one safety officer present during

and appropriate for the training

allow role players to overwhelm

training activity

a training activity, regardless

activity. Adequate space is vital

participants; they should be

to safety; a cluttered training

progressively pushed to higher

weapons and equipment used

present. The task begins before

environment makes it hard

levels of performance, but

during training

everyone arrives and ends after

for the instructor to properly

too far too fast is dangerous.

monitor participants. Clearly

Training injuries can be reduced

involved in training are not in

detail-oriented person who is an

designate the administration area,

by instructors focusing on

possession of any dangerous

excellent observer and commands

equipment area and the first aid

the core objective – to make

items

respect by presence. Instructors

point. For strenuous physical

officers better in an operational

training, ensure there is adequate

environment – but nevertheless

or leaving the training area,

maximising safety. Multiple safety

ventilation and water to mitigate

injuries can happen. Participants

including all visitors

officers are a benefit, as long as

fatigue and heat-related trauma.

should always be encouraged to

Practical training can result in

report injuries.

trauma, so a first aid kit should

Participants should be

• control the issue and return of

• ensure that all persons

• check all persons entering

• ensure that all procedures regarding safety, discipline and regulations are enforced • ensure that all participants

of how many instructors are

everyone leaves, and requires a

should support safety officers in

they are trained and understand their specific role. People tend to perceive what

always be readily accessible.

conversant with the safety

Identification of the first aid

guidelines, since they are the

are wearing the appropriate

this has implications for safety.

kit is an integral aspect of the

foundation upon which a

approved safety equipment

Safety officers may assume that

safety brief.

proper training attitude is built.

• conduct a wellness check of all

they expect to perceive, and

participants are not in possession

Instructors should cover them in

participants at the completion

of prohibited items simply because

resources are appropriate to the

detail at the commencement of

of training

they were told not to bring them,

subject matter and are safe. To

training and participants should

demonstrate a technical aspect

acknowledge their understanding.

and safe after training is

during a search even if they are

in the classroom prior to the

Instructors should constantly

concluded

in plain sight because, on some

Make sure that training

securitysolutionsmagazine.com

• ensure the venue is left clean

or they might overlook items

SECURITY SOLUTIONS // 35


OPERATIONS

piece of protective gear comes off, immediately protect the area with the hands and go to ground calling the warning command. The action must stop and the gear be replaced when instructors indicate it is safe to do so. Instructors should encourage participant questions and monitor whether they understand instructions. Instructions must be kept simple and instructors must be vigilant at observing participants for safety. If issues occur, stop training if necessary to ensure participants understand the safety rules.

Protective Equipment Instructors should regulate the type of gear and equipment used in training. If live weapons are used, they must be carefully inspected, marked and, if using NLTA, properly converted and loaded. There are numerous specialty ammunition products available and so it is essential to understand different types of ammunition and their design level of cognition, they expect

participating in any level

training can be hazardous.

purposes and capabilities.

it to be there, and so might not

of training.

However, a balance between

Education is the key to safety for

training safety and reality can

the recognition of appropriate

be reached.

types of training weapons

consciously register that they

The key firearm safety rules,

are looking for them with the

designed to reduce harm caused

opposite intention – in training

by mishandling firearms, are:

it should not be there. With

• treat every firearm as loaded

distractions associated with disorganised training which

(check always)

Additional safety guidelines for operational training activities include the following:

• maintain strict trigger finger

and ammunition. Protective gear should be carefully considered and chosen to best suit the training situation.

lacks control over participants,

discipline at all times (prevent

Monitor Safety

The minimum mandatory

the likelihood of overlooking

unintentional discharge)

Everyone has a safety

protective equipment for NLTA

responsibility in training. If

is head, throat, groin and hand

weapons is high. It is essential

• maintain strict muzzle

to use trained and dedicated

discipline at all times (ensure

participants perceive a hazardous

protection, based on experience

safety officers who function with

safe direction)

situation they should shout the

and injury research; body and

warning command ‘STOP, STOP,

limb covers are recommended.

conviction, where these different

• know your target and

circumstances evoke different sets

what is beyond it (ID

STOP!’, which is simple, loud,

Protective gear for non-

of expectations.

before engagement)

clear and specific. When training

participants depends on their level

is highly active, participants

of participation and proximity

are more likely to respond to a

to the action. Reasonable safety

Safety Guidelines

In reality-based training, the

Operational training guidelines

issue is that people point real

pre-conditioned command or

protocols and using appropriate

consist of firearm safety rules,

firearms at others; however, firing

sound like a whistle, which cuts

protective equipment creates

plus additional safety guidelines

non-lethal training ammunition

through adrenalin and stress.

liability protection regardless

that cover various aspects of

(NLTA) at others in training fits

Upon hearing the warning,

of the equipment manufacture

practical training, especially

within these rules when viewed

instructors should stop the

source. For protective equipment,

reality-based activities. They

in context. The use of force and

exercise, ascertain the issue, clear

research carefully, test

should be followed by anyone

real weapons during operational

it, and restart the activity. If a

extensively, wear properly and

36 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


“Accidents are caused by people, not equipment, and occur when an unsafe condition and unsafe act are present at the same time.� use appropriately. Negligence

may manifest if participants

tension through aggression,

care. With proper safety protocols,

results from injuries that were

feel out of their depth, or if role

avoidance or humour, which

this is avoidable. Documentation

predictable and yet no steps were

players go too hard or do not react

can deteriorate into frivolous

and reporting will play an

taken for avoidance.

appropriately, or it may kick in

behaviour and thereby create

immense role in demonstrating

instinctively the first time they

hazardous situations. Instructors

propensity for vigilance against

gear permits mobility, tactility

receive force applied to them. Both

and role players can also

avoidable injuries and for

and visibility. Although sensory

of these aspects can create serious

exhibit adaptive behaviour, but

improving in areas where minor

input is reduced with protective

safety hazards, so composure and

letting this happen could cost

injuries have occurred.

equipment, many issues can be

self-discipline must be maintained

professionalism and safety in

overcome through site selection

at all times.

training. Training should be

an excellent opportunity to

enjoyable, but not unsafe.

provide realistic experiences

Proper selection of protective

and organisation of the training

Some people will not

Operational training provides

to limit participant exposure to

participate in training regardless

adverse elements. Many perceived

of how well organised and

Document Injuries

might otherwise be physically,

limitations of protective gear

how safely it is conducted. This

It is important to learn of existing

emotionally, psychologically and

can actually be valuable training

resistance is often related to

health problems participants

professionally unprepared to

tools if properly considered.

past experiences and mostly ego

may have prior to beginning

handle critical incidents. There

Head armour reduces visibility,

related; they believe training

training. A systematic approach

are enough real operational

hearing and the ability to speak

is designed for failure and do

to injury control places the onus

hazards; officers should not

clearly, but this forces participants

not want to be subjected to a

on participants to declare injuries

have to wonder whether they

to use simple, clear and loud

degrading experience. Forcing

and has an injury documentation

are going to actually get harmed

verbal commands and creates

someone into a situation does

procedure. It is essential to ask

during training.

the necessity to scan and breathe,

not inoculate him against that

participants about any potential

which is important during a

behaviour, but reinforces it

issues and existing physical

in lax safety protocols that can

stressful encounter.

and creates a phobic response.

injuries. Once an injury is

result in preventable incidents

Participants should understand

identified, avoid doing anything to

and trauma. The nature of

Professional Conduct

they are demonstrating an

complicate matters.

operational training requires

Participants exhibit a range of

objective standard of performance

reactions during training. In

not related in any way to any

minor ones, need an incident

injury-free training. Ultimately,

addition to testing knowledge and

other participant or activity. For

report. This is important not just

this is the responsibility of the

skill integration with policy, a key

operational training to work

from the perspective of avoiding

instructor. Safety in training

benefit is real reactions under

effectively, they should view the

future occurrences, but also to

is simple but not easy, but it is

simulated stress. Since safety

activity as a real situation, and

protect against program mortality.

definitely worth the effort. n

is the foundation of training,

deal with it with the same level

If training is effective and realistic,

participant conduct should be

of professionalism, and with

injuries can happen, which is why

professional and never violate

regard to the same justifications,

those that are avoidable should

internationally certified tactical

safety guidelines.

outcomes and consequences,

be, and those that are explainable

instructor-trainer, Director

in a training environment that

must be. People who choose a

and senior trainer of Modern

participants do not view the

provides a positive learning model

dangerous vocation can take legal

Combatives, a provider of

exercise as valuable, and therefore

through successful repetition.

action for personal injury inflicted

operational safety training for the

during their duties (including

public safety sector. Visit www.

Ego can manifest if

decide not to take it seriously, or

Operational training can

to dedicated officers who

All incidents and injuries, even

Flawed assumptions result

strict discipline, as the goal is

Richard Kay is an

if they introduce a competitive

be a tense environment for

training) in cases of deliberate

moderncombatives.com.au for

element into an exercise. Fear

participants and they often diffuse

indifference or lack of reasonable

more information.

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 37


FEATURE

FUTURE USES OF VIDEO ANALYTICS IN CCTV BY RACHELL DELUCA

38 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Video analytics in simple terms

fatigue. Human operators are

a valuable tool in reducing the

optimisation, which allows

is the technique used to describe

not capable of alert observation

lengthy process of manual review

adopters of the technology to

the algorithmic processing and

of a large number of cameras for

of countless hours of video from

reap benefits through multiple

analysis of video, either in real

long periods of time, and often

numerous cameras.

business streams with unlimited

time, or in pre-recorded format.

there is a need to review large

It is a term that has usually been

amounts of recorded video to

Current Uses

associated with CCTV cameras

extract video sections specific to

Video analytics is currently

that have been installed for

a particular event – a task often

being used across a range of

the purposes of surveillance;

impacted by strict time constraints

industries and sectors, including

however, as the technology

and urgency.

airports, transportation

Airports

and roads, government, city

Airports have been early investors

improves and advances are

Having software analytics

future options as the technology advances further. Some examples of the current applications include:

made, potential is being realised

review footage and determine

surveillance systems, critical

in analytical software due to

in other applications and across

abnormal behaviour and activity

infrastructure and commercial

their unique risk profile and high

many industries.

that exceeds pre-determined

and industrial applications.

patronage of transient users.

thresholds in many cases is

Current applications of video

As a result, they experience

are clear to any potential user

more accurate than detection

analytics is seeing the technology

an increased level of security

due to the cost savings that

via the human eye alone. Used

perform a dual function, firstly

from use in traditional areas of

come from reduced reliance on

in conjunction with human

in providing critical security-

perimeter protection, intrusion

human operation, both in paid

resources to review the material

related information and secondly

detection using virtual zoning,

manpower hours and in accuracy,

detected by the analytical

in providing data on business

passenger and vehicle tracking,

particularly when impacted by

software, video analytics becomes

intelligence and resource

surveillance and monitoring

The benefits of video analytics

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 39


FEATURE

of pick-up and drop-off areas,

data, such as car park usage, store layout and configuration

Transportation and Roads

Future Uses

abandoned vehicle monitoring, package and baggage alerts and

performance analysis, patron

Transportation and road

technology are likely to be

facial recognition.

dwell times at particular shelves

surveillance is an industry

centred on increased customer

or items, marketing campaign

sector that has embraced video

service and adding value to,

airport environment include

effectiveness analysis, shopper

analytic technology for safety

and streamlining of, the user

the optimisation of staff and

counts and typical shopper

and security reasons, as well as

experience, across a large range

resource deployment at high-

analysis, queue management,

effective traffic management

of different environments. This

traffic or problem areas, location

people tracking and counting

and incident response. The

will build upon the existing

of missing passengers who are late

and recognition, and even event

timely identification of incidents

behavioural analysis uses of video

for a flight, the prediction, and

monitoring and counting on

and response generation are

analytic technology, moving away

therefore minimisation, of traffic

casino gaming tables.

of critical importance in these

from traditional security-incident

areas and video analytics are

detection and more into data

Additional benefits in an

bottle necks (both pedestrian

Traditional security uses for

Future uses of video analytic

and vehicular) and queue and

video analytics in commercial

enhancing existing systems in

collection on how users interact

crowd management.

environments include intrusion

detecting issues and generating

with particular environments.

detection, perimeter detection,

alarm signals for response.

Commercial

detection of blocked exit paths

Types of issues that are detected

proven to be an effective tool

Current commercial applications

and emergency exits, detection of

include congestion and incident

for security use; however, the

of video analytics include

abandoned vehicles or packages,

detection, smoke detection

potential for marketing, safety

corporate office buildings,

location of key persons, tracking

in tunnels, active traffic

and behavioural analysis is only

supermarkets, retail shopping

and monitoring of staff and

management and the detection

recently becoming a feature

centres, heavy industry, banks,

security personnel, loitering and

of bottlenecks and congestion

recognised by adopters. Future

hotels, casinos, sporting arenas

vandalism protection, protection

and stopped and abandoned

uses will include high-level

and stadiums. Often the analytical

of stock and high security items

vehicle detection, which may

integration of video analytics with

software is added to an existing

through the creation of secure

indicate a breakdown or

other systems, such as building

CCTV system’s architecture to

zones and the detection of smoke

other emergency situation on

automation, access control,

enhance it and provide beneficial

within a facility.

the roads.

building management and lighting

40 // SECURITY SOLUTIONS

Video analytics has already

securitysolutionsmagazine.com


the end of each day, increased

environment in terms of lighting

technology is stricter policing

safety mechanisms could be

or temperature to one single user,

and law enforcement.

programmed into the system

such systems might instead display

that identified which staff

personalised messages, including

predicted to be quick to engage

members were onsite after dark to

loyalty program information

detection of parking violations,

automatically ensure that lighting

and benefits to users as they

also utilising number plate

along their path of egress was

engage with the environment. In

recognition for swift infringement

on, that machinery and systems

a shopping centre environment,

notice issuance; however, the

were shut down and left in a safe

this may include personalised

technology could also be used in

manner, timecard and attendance

centre maps with directions to

more effective design of car parks

registration was updated, and

favourite stores, or information

and review of time restrictions

that all personnel had been

on sales when a user presents at

based upon the data gathered

accounted for.

an information booth. Similarly,

about actual usage.

In the future, high-pedestrian

frequent flyer programs could

Municipal councils are

Likewise, police and road

commercial environments, such

provide customised information

traffic authorities will embrace the

as sporting arenas, shopping

to their members at airports

analysis of vehicles that tailgate,

centres, stadiums and casinos,

around the world, in a variety

speed, travel the wrong way,

are likely to further develop

of languages, both personalising

illegally turn, block intersections

their tracking and analysis of

and streamlining the customer

and train lines, and those that

pedestrian activity to predict

experience and providing benefit

do not accommodate emergency

and respond more efficiently

to users.

vehicles. This is likely to see an

control systems, audio visual

to incidents and disruptions.

systems, and IT infrastructure to

This will be supported by more

analytical system likewise

at first, but as understanding grows

combine the security features with

effective human resource

will direct future marketing

of how our roads are used, it will

those that will enhance the user

management and deployment,

campaigns and increase

likely result in better designed

experience and collect valuable

incident response and provision

understanding of how customers

systems with emergency lanes,

data about its users.

of facilities such as parking,

interact with products, impacting

bike lanes and better systems for

washrooms, food and beverage

product displays, store layouts

all users, which is consistent with

Commercial

options and the like, all of

and pedestrian paths through

the overall future prediction of

In a commercial setting, the

which will streamline the

store environments. Whilst

enhancing the user experience.

analytical software could be set to

user experience and reduce

these systems have already been

detect a user’s entry to the facility

security and safety concerns for

implemented by individual early

analytics is endless and will be

via CCTV and commence a series

the facility.

adaptors, the potential for it to be

limited only by the creativeness

shared amongst companies and

of those who apply it. The ability

applied across a greater range of

to track, monitor, detect, count,

sectors is something that will no

recognise and identify individuals,

lighting settings, to audio visual

Retail, Membership Programs and Marketing

doubt be developed heavily in

vehicles, freight, animals and

messages, such as reminders

Future uses of video analytics

the future.

virtually any conceivable item and

or alerts being displayed on

within the retail and marketing

screens and interfaces, booting

sectors is predicted to be one

into appropriate IT systems,

of integrated operations particular to that user. This may range from building temperature and

Data gathered by the

increased number of infringements

Overall, the potential of video

assess it against pre-determined algorithmic behaviours is limited

of the highest growth areas

Policing and Law Enforcement

start-up of heavy machinery

of technology uptake and

Finally, whilst many potential

behavioural algorithms, and the

or plant, to timecard and

implementation. In these

future uses of video analytics

creativity of those creating them. n

attendance integration and

sectors, customisation of the

seek to enhance the user

registration with evacuation and

user experience is more driven

experience in a positive manner,

emergency systems of the users

by the potential for increased

providing mutual benefit to

security consultant at Aurecon,

present within the facility at any

sales and profit, so whilst it may

the user and provider, one

focusing on electronic security,

particular time. Conversely, at

not be possible to customise the

very likely future use of the

resilience and risk.

securitysolutionsmagazine.com

only in the creation of those

Rachell DeLuca is a senior

SECURITY SOLUTIONS // 41


BUSINESS

HOW THE BEST STRATEGY CAN COME DOWN TO BETTER ACTION BY MICHAEL MCGRATH

42 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


There are a lot of great security

happen as intended. There is

an adequate strategy into game-

not be shy of comparisons against

strategies that can suit a given

a real discipline, cohesion, a

changing action.

other companies if it means your

set of circumstances, but one of

process and a culture required

the greatest strategies is almost

to make a company perform well

Here is how you can do it:

not a strategy at all – it is being

in turning strategies into actions,

1. Start at the top

better at putting any security

repeatedly and reliably. So much

As the leader of your department

– the ones that really matter.

strategy into action. The biggest

so that becoming good at this can,

or company (if it is your security

Then coach people to perform in

impediment to a great strategy

in itself, be a powerful strategy.

business), it starts with you. You

these areas.

is failing to do that. Even modest

If you are running a security

set the tone and the reality of your

strategies can out-perform

business and your competitors

intention to turn strategy into

2. Use actions to change culture

breakthrough strategies if they

are strong, but not necessarily

action. Be in touch with the day-

To change culture toward one

are executed by a company that

responsive, decisive and effective,

to-day realities of the company

that achieves things, change the

does it well. That is because it

then your chosen strategy could

(department), your people, the

way your team act. It is actions

is usually tough to make things

be to become the best at putting

financials and the operations. Do

that change culture, not the other

securitysolutionsmagazine.com

company might evolve and act more strongly. Focus on only a few priorities

SECURITY SOLUTIONS // 43


BUSINESS

way around. So, reward the

you hire the right people from the

the unity of the company, the

effort. This way, you involve

achievement of the company’s

outset. Do not choose people you

execution and the deliverables are

them in how different programs

(department’s) priorities, the

are simply comfortable with. That

what are primary.

will affect them, how they need

doers who get things done.

may not stretch you, challenge

So, those basic boxes to tick

Provide an open dialogue

assumptions or achieve honest

for an adequate strategy are to

others in their team, and everyone

environment so that realities

dialogue. Instead, discriminate

understand your market, your

knows what will be expected of

and feedback get passed upward,

between the strong performers

competitors and your company’s

not only themselves but of others.

downward and sideways. That

and poor performers. Hire the

strengths and weaknesses. A

The outcome is ownership and

means do not punish bad news.

strong performers. Then develop

strategy that takes these into

accountability. The actions are

Dialogues do not have to be formal

the right people, train them, coach

account is in a pretty solid context.

more likely to occur as intended.

meeting structures. Informal

them and foster the next leaders.

communications work fine. The

to accommodate the needs of

5. Put the strategies into a plan

6. Putting the plan into action

best are open, candid, without

4. Get the right strategies

Make your plan far more than

Getting action uses the processes,

recriminations and encourage

This may seem simplistic, but

targets and costs. Include the

people and strategies now in

issues to be surfaced.

the right strategy might be

‘how’ behind the major programs.

place. Lead your company’s

very straightforward: to build a

What is going to actually happen

actions by maintaining the

set the example at the top. If

competitive difference, to promote

and when is it meant to happen?

disciplines. Hold meetings that

you model the right behaviour

it, to win customers and to

then your agenda will be

generate a profit.

And, of course, continue to

supported. Be accountable to the

Again, the strategy being

These programs should

report on actions and outcomes.

include the different facets of

Do these regularly, at pre-plotted

your company, even if it is a small

times. Provide feedback and coaching in real time.

company and others will accept

pursued here is in fact to be

business: marketing activities,

their accountability.

the most effective at putting an

sales activities, how your product

adequate strategy into game-

or service is delivered, what

reporting that shares progress

3. Get the right people

changing action. In this context,

new equipment and people you

and keeps the company’s people

Know what kinds of people you

provided you tick some basic

will need.

informed, heard, accountable

need to get certain tasks done. Be

boxes, what might normally

specific about what they need to

be regarded as strategy is not

different people from your

the achievements that are in line

achieve and how. Then make sure

primary. Instead, the speed,

company into one major planning

with the plan. n

44 // SECURITY SOLUTIONS

The key is to round up the

Encourage cross-functional

and supported. And recognise

securitysolutionsmagazine.com


ViDi Labs Academy

Login

Sign Up

CCTV - from light to pixels

Learn CCTV and IP Video Surveillance technology from the guru - Vlado Damjanovski

Enrol now

vidilabs.com/academy.html vidilabs-academy.teachable.com

Recognize AND Analyze Is she an employee?

When, where did she enter? How often was she here this month?

Is she a banned person?

Premier face recognition technology for real-time video surveillance, recorded video investigation, crowd detection, and anonymous people analytics

www.cognitec.com | info@cognitec.com

Does she appear in videos recorded last week?

How old is she?


COVER STORY

THE EVOLVING REALITY

OF BIOTERRORISM BY PROF RAINA MACINTYRE

46 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Key Points

against one person could spark

This dual-use research of concern

to do so in an open-access

• Designer pathogens can be

an epidemic because of contagion

(DURC) is technology that can be

journal. This research passed

and this gives it potential as a

used to benefit or harm humanity.

safety and ethics requirements

weapon of mass destruction. Most

It includes synthetic biology, an

in Canada without question. If

potential and are an existential

bioterrorism agents also occur in

unregulated industry that can be

law enforcement or intelligence

threat to humanity.

nature, so differentiating natural

used to create synthetic pathogens

agencies were tracking such

and unnatural outbreaks is a

in a lab; genetic modification of

research, they failed to detect it,

technologies – biology, AI,

challenge. Terror may be absent

existing pathogens to make them

but now it is entirely possible for

cyber, drones and robotics.

if bioterrorism is not recognised,

more dangerous; and even 3D

the smallpox virus, variola, to be

and incitement of terror may not

printing of biological materials.

synthesized in a lab.

technology, which is intended

be a motive for a biological attack.

Insect drones and radio-controlled

to benefit humanity, may also

In some historical instances, the

beetles further enable precision

information revolution,

be used to cause harm.

motive has been a stealth attack

targeting of biological attacks.

accessibility and availability of

rather than creation of terror.

Genetic modification of pathogens

scientific knowledge, public access

has been documented since the

to methods (recipes) for DURC and

documented throughout human

Soviet bioweapons program

platforms such as the Dark Web,

history. The Persians, Romans and

and has been revolutionised by

we are in a new era of biothreat.

can result in an epidemic

ancient Greeks used cadavers of

CRISPR Cas 9, a precision gene

The use of The Onion Router

or pandemic.

people deceased from infectious

editing tool that enables editing

(TOR – a Dark Web search engine),

diseases to contaminate water

of plants, animals, human beings,

cryptocurrency for transactions

supplies. Lord Jeffery Amherst

viruses and bacteria. Undesirable

and cybercrime (including

allegedly used smallpox-

genes can be removed, desirable

hacking of scientific intellectual

regulation or governance

contaminated blankets to infect

ones inserted and Mendelian

property and knowledge) are

of DURC.

American Indians, and similar

inheritance (the manner by

coalescing with biothreat, making

events may have occurred in

which genes and traits are passed

it easier than ever for groups to

A biological attack may be

Australia against Indigenous

from parents to their children)

collude, plan attacks and remain

defined as warfare or terrorism,

peoples. The Japanese conducted

bypassed altogether by the

undetected. The insider threat

depending on the perpetrator, but

biological warfare in China during

introduction of hereditable new

is also a major issue in the era

the act has the same consequences

WW2, dropping plague bombs

characteristics. The technology

of DURC, recognised by the US

on human health and life. In

over Manchuria. Despite being

can be used to engineer human

Commission on the Prevention

this article, I will use the term

a signatory to The Biological

beings, to eradicate entire species

of Weapons of Mass Destruction

bioterrorism. There are several

Weapons Convention, the former

or create biological weapons of

Proliferation and Terrorism in

definitions of bioterrorism,

Soviet Union ran a large-scale

mass destruction (WMD).

2008, who said, “Given the high

but the US Centers for Disease

biological weapons program,

Control and Prevention (CDC)

experimenting on anthrax,

believed the threat of smallpox

should be less concerned that

states, “A bioterrorism attack is

smallpox, Ebola, Marburg virus

was from the theft of stockpiles

terrorists will become biologists

the deliberate release of viruses,

and a range of other pathogens.

from the only two known

and far more concerned that

bacteria, or other germs (agents)

Many other countries, including

laboratories to harbour the virus,

biologists will become terrorists.”

used to cause illness or death

the US and the UK, had biological

in the US and Russia. It was

The 2001 anthrax attack in the US

in people, animals, or plants.”

weapons programs.

acknowledged that there was a

was traced to a strain from the U.S.

theoretical possibility of synthetic

Army Medical Research Institute

made by genetic engineering. • Some pathogens have WMD

• Dual-use applies to many

• Biological research or

• Harm can occur generally by two mechanisms: a laboratory accident, or deliberate release. • In the case of biology, DURC

• Capability is cheap, accessible and getting more so by the day. • There is no global, enforceable

In the era of hybrid warfare,

Bioterrorism has been

The risk of bioterrorism is

Prior to 2017, security experts

Combined with the

level of know-how needed… (we)

economic warfare can be waged

a function of both intent and

smallpox being manufactured in

of Infectious Diseases (USAMRID)

by targeting crops or livestock,

capability. Terrorist groups have

a lab, but this was dismissed as

lab, and the main suspect was a

for example. Biological agents

made their intent to use biological

too difficult a task and therefore

USMARID anthrax scientist, who

as weapons (bioweapons) may

weapons clear. Capability has also

unlikely. In 2017, Canadian

committed suicide before he could

be used against an individual as

increased because of advances in

scientists created an extinct pox

be charged. Insider scientists

a gun may be used; or against

technology, which make genetic

virus, closely related to smallpox,

may have additional motives to

populations as a bomb may be

engineering and synthetic biology

in a lab using mail order DNA. In

the ones outlined in corporate

used. However, a bioweapon used

accessible and relatively cheap.

2018, they published the methods

and other crime – for example,

securitysolutionsmagazine.comSECURITY SOLUTIONS // 47


COVER STORY

“Prevention is better than cure, and prevention rests squarely with law enforcement, defence and intelligence agencies. The combination of legislation, intelligence and law enforcement can be used to detect, prevent and disrupt planned attacks.”

patents on drugs and vaccines,

these self-regulated labs is not core

easier than to nuclear weapons;

high-impact research publications,

business for law enforcement, yet

biohacking may be a priority for

attack look like and would we

research grants and the prospect

issues extend beyond the actual

nefarious actors. Just as the ease

even recognise one? We may

of prestigious awards may all

experiments within these labs to

of access to technology has seen

imagine a zombie apocalypse

motivate an insider scientist.

the risks associated with biological

a proliferation of illegal drug labs

or, at the very least, sirens and

Insider threat may be at the level

waste disposal in an unregulated

in the community, so too might

HAZMAT suits, but this may not

of junior scientists or research

and unmonitored setting. Whilst

there be illegal bio labs in the

be the case. The motives and

students, up to the most senior

authorities are aware of official

community. It is likely the threat is

perpetrators may be different

scientists, any of whom may be

DIY labs, what of the unofficial

occurring on domestic soil – which

to other forms of terrorism

susceptible to grooming, recruiting

ones? Lab-in-a-box kits can be

means front-line responders will

and an attack may pass as a

and infiltration by terrorist

purchased online and DIY labs can

be exposed and need protection.

natural event if the intention

organisations or hostile states.

be established with relative ease.

We do not look for these threats

is a stealth attack or to mimic a

Genetic code can be purchased

or think about the possibility, but

natural event. A classic example

proliferation of do-it-yourself

online and methods to create

what does it mean for front-line

is the largest documented

(DIY) and biohacker labs and

super-viruses are published online

police, who may be increasingly

biological attack in the US, the

the accompanying movement to

in open-access scientific journals.

exposed to biological risks in

Rajneesh salmonella attack,

‘democratize science’. Monitoring

Access to biological weapons is far

their work?

which public health experts

Another concern is the

48 // SECURITY SOLUTIONS

So, what would a biological

securitysolutionsmagazine.com


a stealth attack, to make enough

public health response should

legislation, such as the Biological

locals ill so they would not be

commence within about a week

Weapons Convention, is not

able to vote in a council election,

after the first case of smallpox is

enforceable and the patchwork

enabling the Rajneesh cult to win

diagnosed, or a severe epidemic

of other relevant laws which

and control the council.

may result. If 95 percent of

exist do not adequately cover

patients are rapidly and effectively

the contemporary threat of

air testing experiment by the

isolated, outbreak control can

bioterrorism. The best prospect

U.S. Navy over San Francisco in

be achieved within 100 days.

for prevention of attacks

1950, resulted in at least 11 people

However, if isolation rates and/

is domestic anti-terrorism

developing an unusual illness.

or contact tracing rates are not

legislation, which would need to

However, health experts failed

high enough, the epidemic may

be revised to ensure bioterrorism

to recognise this as an unnatural

blow out. In such an epidemic,

is clearly in scope. Revision is

outbreak at the time and the truth

the ability to treat other urgent

needed for the definition of

was only revealed almost 20 years

health conditions, such as heart

terrorism (as many historical

later. In fact, the only infection

attacks or strokes, may be

biological attacks have not

which would be immediately

impacted by shortages of staff and

included incitement of terror

recognised as unnatural is

hospital beds.

or coercion as a motive) as well

Operation Seaspray, an open-

smallpox, because the infection

How likely is it that someone

as powers to prevent a suspect

was eradicated in 1980. Proving

will create a WMD such as

from accessing a laboratory

bioterrorism can only be done by

smallpox? If a reproducible

or dangerous pathogens while

law enforcement or intelligence

method for hacking bank

investigations are ongoing.

agencies. Public health experts

accounts is published on the

In considering the need for

can only point to unusual patterns

Internet, we probably agree it

legislation specifically to stop

of disease, but usually do not,

would be used by criminals. Why

potential bioterrorism, the risk

as this is not part of training in

then would it be any different

posed to the community by a

public health. The technology and

for published methods for

suspected rogue scientist working

intent are present, so how do we

creating pathogenic viruses?

with a dangerous pathogen in

know if man-made epidemics are

Prevention is better than cure,

a legitimate, DIY or clandestine

already occurring? If we do not

and prevention rests squarely

laboratory must be weighed

ask the question, we may never

with law enforcement, defence

against the individual rights

find out.

and intelligence agencies. The

of that scientist. In terms of

combination of legislation,

regulation and governance, the

the worst threat would be an

intelligence and law enforcement

US government has a National

infection that can spread from

can be used to detect, prevent

Biodefense Strategy and a Blue

person to person, such as smallpox

and disrupt planned attacks. Just

Ribbon Biodefense Panel, for

or pandemic influenza. Anthrax

as intelligence is used to prevent

which there is no equivalent in

can cause high fatality rates, but

kinetic attacks, the same methods

Australia. While the US and the

is not spread person to person,

(with different keywords and

European Union grapple with the

assessed as a natural event,

so harm would be limited to

search terms) could be used to

problem of DURC, Australia has

despite inconsistent facts. Even

the radius of contamination

prevent biological attacks. For

relaxed export controls for DURC

when Rajneesh (born Chandra

following an aerosol attack. Using

example, rumour surveillance (a

and approved the use of CRISPR

Mohan Jain and also known as

mathematical modelling, a worst-

term used to describe a collection

Cas 9 for gene editing.

Acharya Rajneesh, Bhagwan

case scenario attack of smallpox

of unofficial systems) could be

Shree Rajneesh and latterly as

would cause a global pandemic

used to detect chatter about

analogous to cybersecurity.

Osho), an Indian spiritual guru,

that could last years, with impacts

planned attacks. Just as sales

Technology has outpaced

philosopher and the leader of the

worse than a nuclear strike. In a

of chemicals that may be used

governance, legislation

Rajneesh movement, confessed

city like Sydney, despite our good

for manufacturing explosives

and preparedness, and law

six months after the attack, he

health system, an attack could

are flagged in hardware stores,

enforcement was slow to accept

was not believed, and we would

have severe impacts. Every day

so too could sales of materials

that cybersecurity has become

be none the wiser today if not

of delay in response counts, and

and equipment for biological

core business. We are at least

for the fact the Federal Bureau of

we need the physical and human

experiments be flagged. However,

10 years behind in biosecurity

Investigation (FBI) accidentally

resources to isolate infectious

tracking such transactions

compared to cybersecurity and

stumbled upon the Rajneesh

patients in appropriate hospital

would require tracking of

there are many steps that can be

laboratory a full year after the

isolation rooms and to track and

online orders and transactions

taken to mitigate the threat, but

attack. The motive in this case was

vaccinate contacts of patients. The

in cryptocurrency. Existing

time is running out. n

In the case of a WMD event,

securitysolutionsmagazine.com

Biosecurity is in many ways

SECURITY SOLUTIONS // 49


AVIATION

50 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


LAGs Screening

Is It Still Relevant?

It has been almost 13 years

the time looking at some images

Cebu-Tokyo and Yousef boarded

that showed damaged control

not been able to take liquids,

the aircraft as a passenger Manila-

cables. The crew and passengers

aerosols or gels (LAGs) onto an

Cebu. He had everything he needed

were extremely lucky to survive

international flight. This article

to create an improvised explosive

Yousef’s test.

is intended to have a look at

device (IED) on his person. All of

the history of LAGs and if the

it was relatively innocuous and

of the device. Yousef, together

prohibition of LAGs in the cabin of

easily passed through screening.

with Khalid Sheikh Mohammed,

a passenger aircraft is still valid.

After take-off on a relatively sector

planned to destroy 11 US-

The late 1980s and early

flight, he went to the toilet and

registered aircraft on flights from

1990s was an interesting time

there assembled the IED, which

Asia to the US.

in aviation security. We started

only contained 30ml of liquid

screening domestic flights

explosive. The timer, an electronic

a number of these IEDs and his

in Australia; initially only a

wristwatch, was set so that the

accomplices would board each

percentage, but it quickly became

aircraft would be well into its

aircraft for one sector, assemble

every flight. In 1989, there was

flight to Tokyo. He also planned to

the device and deboard at a transit

a double whammy, with the end

place the device so that it would

port that was also the last port of

of the Australian Airlines and

explode over the centre fuel tank.

call to the US. Fortunately, Yousef

Ansett Airways duopoly, and the

To achieve that, he moved seats

was discovered and arrested on

pilots’ dispute. It is fair to say that

to ensure that the device was in

6 January 1995 and the plot was

I learned more about aviation in

an optimal position and secreted

abandoned. Subsequently, the

this period than any time in my

it in a life vest holder. He left the

US authorities told all aircraft

career – it was also the hardest

plane in Cebu and, since he had

operators flying to the US that

that I have ever worked.

his baggage with him, no one

they had to examine all carry-on

was suspicious.

baggage at the last port of call into

On 11 December 1994, Ramzi Yousef bombed Philippine

securitysolutionsmagazine.com

The aircraft operated Manila-

since the travelling public have

However, this was only a test

Yousef’s goal was to create

The device worked and, in

the US and stop people carrying

Airlines Flight 434 (Cebu-

the subsequent explosion, one

any liquid, including toothpaste,

Tokyo), killing a passenger and

passenger was killed and a

into the cabin of the aircraft.

almost downing the aircraft.

number injured. Fortunately, the

Interestingly, the threat was to US-

The operation, while complex

aircraft was slightly modified so

flagged aircraft and I recall that the

in preparation, was simple in

the explosion didn’t affect the

US operators told the US Federal

its execution.

centre fuel tank, but I recall at

Aviation Administration (FAA)

SECURITY SOLUTIONS // 51


AVIATION

that the extra cost to US operators

terrorists using a liquid explosive

in 1995 and the response was like

was an unfair impost and that

in a device constructed on an

in 1995, but more severe – they

authorities reached the measure

all carriers should be required

aircraft in an attempt to destroy

banned all liquids from the cabin

of 100ml (volume) or 100 grams

to undertake similar screening.

that aircraft. To be clear, he

of the aircraft, even pens since

(weight) or less of liquids, aerosols

The Europeans (especially the

successfully assembled, secreted

they contain liquids.

or gels. It is an odd measure

French) told the US authorities

and detonated an IED in the

that they would not comply and,

cabin of an aircraft, and if not for

aviation was horrific. British

remember was the first successful

if any of their operations into

‘luck’, that aircraft would have

Airways cancelled 1,500 flights in

liquid IED used in aviation, used

the US were restricted, then they

been destroyed.

that first week at a cost of about

about 30ml of explosive. Today, in

£50 million. People travelling

addition to the now mainstream

would restrict US operations

Yet there was no reaction

The immediate effect to

I do not know how the

given that Yousef’s device, which

into Europe. European politics

from government or the security

to Europe swapped to trains at

LAGS, we add inorganic powders

won and they did not bother

industry for almost 11 years and

a rate, at one point, of about 10

not exceeding 350ml or 350g in

with the checks, but Qantas

even then the reaction was not

per minute.

weight. All these measures are

did. Consequently, I spent a

in response to Yousef’s bombing,

reasonable part of January and

nor was it due to a change in

untenable and, within three

February 1995 in Tahiti (then a

technology. In August 2006, UK

months of the original ban, the

(to be blunt I do not know of any

last port of call for Qantas into the

authorities became aware that

restrictions were eased a little

evidence to support it), but it is

US) – it was a hard job with only

there was a viable threat to

and a ‘temporary’ measure that

one that I have always thought

one aircraft around midnight, but

aircraft travelling to the US across

we now call LAGs screening

valid: three people working in

someone had to do it.

the Atlantic. The information was

was implemented. Like most

concert will defeat most security

that terrorists intended to carry

temporary measures in security,

systems or processes.

To me it is because it has largely

liquid explosives onto several

it has become permanent

been forgotten and it was really

flights and create an IED on

and now expanded to include

problem with LAGs as a concept

the first case, that we know of, of

board. This was much the same as

some powders.

and have mentioned them in

Why is this plot important?

52 // SECURITY SOLUTIONS

As a measure, it was

per person. This is not a hard and fast rule

I have always had a little

securitysolutionsmagazine.com


earlier articles, but I may as well

baby powders and

for five or six years where the

current format, especially for

repeat them:

most cosmetics, so

machine does not check against

liquids. I would suggest that tied

• The amount of liquid that we

I could present an

a library of explosives; rather,

together with other technology it

restrict does not match the

allowed container with

it takes a sample and causes a

could be made useful, it may even

only successful example of an

modified contents.

micro-reaction from the substance

be worth replacing the random

to see if it is explosive material or

and continuous ETD screening

IED constructed in flight by

• The rules do not consider

the offender (30ml).

people acting in concert. They

not and, I have checked, it could

that we already use with this

• We do not rely on any

are per person! So, a family of

with little modification be used

technology – that process would

technology to screen the items

four can take four times the

on liquids. It does not necessarily

likely take more time and be a little

presented or exempt. They

amount of restricted product

identify the explosive, which is

more invasive.

are usually just provided for

into the cabin, then think of a

not what regulators like, but as

visual examination.

group of people.

an operator, in the first instance I

worthwhile process? I have never

o Of the inorganic powders

• There is technology that can

Is LAGs screening still a

would like to know if something

been confident in it as an effective

that are banned, only some

detect these explosives.

was a danger rather than know

solution. It has some small

talcum powders, some

That last point has probably

what it is!

deterrent effect, and it may stop

powdered deodorant and

raised a few questions. I am not

Why is this technology not

certain foot powders are

going to go into exactly how

being used? I am not sure, but I

the more incompetent terrorist. Would it stop someone like Yousef

banned, so if I know which

explosive trace detection (ETD)

would think that checking every

or a sophisticated terrorist?

ones are allowed, I could

works, but the ETD that most

liquid, aerosol, gel and powder

Probably not.

simply empty the container

people know at an airport uses a

going into the aircraft using

of allowed products and fill

library of known explosives and

this technology would be time

that once terrorists decide on a

with disallowed powders.

An interesting side note is

checks the samples taken against

consuming and probably quite

good target and/or method, they

o Some of the exempt

that library. I know that there is

expensive. I also think that there

will not forget, they will wait and

powders include

a process that has been around

would be a need to modify the

revisit it later. n

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 53


FEAUSRE

RECREATIONAL OUTRAGE BY DON WILLIAMS

54 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


One of the interesting things

the most inconsequential and

offended. Talking truth to power

might it occur in the corporate

about delivering courses for a

innocuous things. Furthermore, if

has always been dangerous, but it

world, particularly to those who

reputable provider is reading the

they cannot find personal offence

now appears that talking truth to

must state the unpalatable?

student critiques. Having revised

in a matter, they will happily take

anyone can result in being ‘outed’

and delivered the Diploma of

up the torch and become offended

as insensitive and offensive.

Security and Risk Management,

on some else’s behalf – even when

the student feedback was

the supposedly aggrieved victim is

situation in which an employee

upon a time, if someone felt truly

particularly important.

not actually offended.

complains to management that

offended to his very core based on

his partner was informed that the

the belief that his righteous view

Students can choose to

The other point of interest is

To provide context, imagine a

What is unclear is when we went from righteous indignation to ‘recreational outrage’. Once

provide their names or remain

the need to do so anonymously

office where he works could be

of the world had been attacked,

anonymous; in either case, the

(I checked – not for the name

subjected to workplace violence.

he could be indignant. It was

presenter has no visibility of who

but just to see if one had been

Or that he has been told the

expected that this person would

said what. A student commented

provided). At no time during the

reason things are locked away in

respond visibly and formally,

that one of the guest lecturers

10 days of presenting did anyone

the workplace is because there is

even forcibly, with the courage

made offensive comments, which

suggest that the tone, content or

the potential that someone in the

of his convictions. It was not an

I found surprising as, having sat

delivery were inappropriate or

building might take something,

enjoyable exercise and required

through the presentations myself,

of concern. If they had, the issue

thereby implying that there are

personal commitment.

I failed to note any offensive

could have been addressed and

dishonest people in the building,

comments. That said, I am old

the content of concern reviewed

which the employee finds to be

achieved an almost universal

and opinionated, so perhaps I

and, if necessary, adjusted. Just

an offensive concept. Or, the

state of recreational outrage

missed it. Thinking back on the

because a complaint could have

reason someone needs a specific

where anyone can find or actively

course, I can only assume that the

been raised does not mean

clearance before accessing

seek offence, whether against

complaint was made in reference

the material must be changed.

particular information is because

themselves or on behalf of others.

to one particular presenter who,

Sometimes the material is correct;

it is necessary to ensure he or she

Researching recreational outrage

in my opinion, was not so much

it is perception that must be

is a fit and proper person – or,

suggests the common features are:

offensive as honest. Perhaps blunt

addressed. As someone said,

perish the thought, he/she fails the

enjoying the experience of venting

truth has become offensive to

“Because you are offended does

assessment and is found not to be

on a topic; enjoying a position of

some people?

not mean you are right.”

appropriate. How offensive might

moral superiority; not necessarily

that be?

being directly involved or affected

The same student also

Offence is in the ear of the

suggested that some of the

beholder. What one person

comments made during the

hears as true may be unpalatable

telling the truth as we see it; do

on behalf of others; anonymity

course may have caused offence

to another. Because it differs

we stop advising on the reality of

or diffusion amongst a crowd –

to the military members present.

from the hearer’s view does not

threat vectors; do we stop pointing

for fear of being labelled a troll.

I also find this perplexing as,

mean it should automatically be

out vulnerabilities and exposures

Exceptions are those who have

while I had avoided telling my

considered offensive. Unless of

because someone may be

made a vocation of calling out

rude jokes about the Air Force, I

course the hearer is offended by

offended, or may think someone

behaviour, comments or opinions

did state that wearing a uniform

the fact that others have differing

else might be offended? Obviously,

that they see as being actually or

is not a security qualification

opinions, experiences and

we cannot stop doing our jobs – or

potentially offensive.

and noted that the military are

world views.

so we think. An internet search

trained to write in a concise

By now, readers are possibly

Do security professionals stop

Now, it appears, we have

by the issue but willing to speak

“Outrage is currently

of “academics afraid to speak”

America’s deepest core

rather than literary manner. For

wondering what, if any, relevance

will bring up reports from the

value – and it shouldn’t be,”

whatever reason, this may have

all of this has to security

UK, US, Canada and Australia on

stated Dylan Gallimore on the

caused offence?

management. The answer is

academics limiting their opinions

Arcmedia website. Gallimore

quite simple. It often falls upon

and teaching so as not to be

claims, “Psychologists have

with some interest upon the

the security manager to take

shamed, harassed and humiliated

increasingly warned of the

notion that there appears to be

responsibility for pointing out

on social media and in student

dangerous pleasures of outrage…

a growing section of society that

things that may be unpopular

forums for being offensive in one

Additionally, outrage is a social

is not only easily offended, but

and making statements which

form or another. If it can happen

emotion; it compels individuals to

almost eager to find offence at

could cause the susceptible to be

in the academic world, how easily

express their outrage publicly in

All of this leads me to reflect

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 55


FEAUSRE

search of validation and solidarity.

then we can seek to understand

Which means that while

the cause of the offence and try to

outrage remains a response to

placate them. Or, accept that there

perceived injustice, it can also be

are those who want the ‘buzz’ that

a self-serving emotional defence

comes from venting their moral

mechanism deployed to alleviate

superiority at the cost of others.

guilt, buffer threats to one’s moral

Perhaps we should be offended by

identity and portray oneself as a

their offensive behaviour?

very good person in the eyes of one’s peers.” Another online search for

Perhaps more people need to remember the adage, “A gentleman (or gentle person) is

addiction to outrage brings up

someone who is never deliberately

many refences; there are even

rude.” The right to tell someone

books on the subject of breaking

what you think should never

the addiction to outrage. It

be removed, but courtesy and

appears frequent bursts of outrage

politeness should always be

become addictive and, like most

employed, even when pointing

addictions, leads to a release of

out errors.

endorphins that make the person

Other than the issues above,

feel good. The more they vent the

the student critiques are good.

better they feel. Security offers just

It appears most stayed awake

another target-rich environment.

most of the time and if any did

Certainly, written and verbal reports of security issues must be

fall asleep, I would not have been offended. n

objective, professional, impersonal and polite. They must also be

Don Williams CPP RSecP

factual and honest. If people take

ASecM is a recognised thought

offence, we can ask them to argue

leader in security, emergency

the facts, not the emotion. Here

management and related

is the rub – offence is emotive. If

disciplines. His book, Bomb Safety

the concern was over the data or

and Security: the Manager’s Guide,

analysis, it can be discussed. If

is available from Amazon. Don

someone claims to be offended or

can be contacted at donwilliams@

believes others might be offended,

internode.on.net

56 // SECURITY SOLUTIONS

“All of this leads me to reflect with some interest upon the notion that there appears to be a growing section of society who is not only easily offended, but almost eager to find offence at the most inconsequential and innocuous things.”

securitysolutionsmagazine.com


VIDEO DOESN’T HAVE TO BE EXPENSIVE TO BE EFFECTIVE

With years of experience across hundreds of clients, let us show you how we can help you generate more business than ever before. enquiries@interactivemediasolutions.com.au


CCTV

THE NEW (OR NOT SO NEW) IP VSS STANDARDS BY VLADO DAMJANOVSKI

58 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Since the creation of the first

non-government organisation

Australian CCTV standards –

that prepares and publishes

the 4806 series in 2005 – there

international standards for

has been a huge change in the

all electrical, electronic and

technology from analogue to

related technologies. These

digital communications. This

technologies cover a vast range

was a fundamental change of

and include power generation,

data capturing, transmission

transmission and distribution

and storage, which influenced

to home appliances and office

all industry, including CCTV and

equipment, semiconductors, fibre

other security categories, such as

optics, batteries, solar energy,

access control, alarms, intercoms

nanotechnology and marine

and fire protection. These changes

energy. The IEC name is probably

called for an upgrade of many

better known among electrical

old standards.

and electronic engineers because

Working on creating or

like the so-called IEC plug for

easy job. Les Simmonds, Olly

electronic devices, are specified by

D’Souza and myself invested many

these standards.

hours in creating the analogue

What used to be CCTV (closed

AS4806 standards over 15 years

circuit television) is now referred

ago and can attest to this firsthand.

to as IP VSS (Internet Protocol

I call this trio ‘the old team’

video surveillance systems) by

because we dealt with the old

the IEC. The first acronym, IP, is a

technologies, many of which are

symbolic one and reflects the most

now obsolete. Now, 15 years later,

common video data transmission

the old team is facing yet another

protocol used in CCTV today – the

challenge, working on the new

IP standards. The second acronym

IP CCTV standards, this time with

of VSS was proposed by the

the International Electrotechnical

Chinese delegation when working

Commission (IEC).

with the IEC standards, due to the

The IEC is an international

possible confusion with their local

standards organisation which

Chinese television, with the same

sits under the umbrella of

acronym of CCTV.

the United Nations (UN), with

securitysolutionsmagazine.com

all specifications of hardware,

updating any standard is not an

The IEC’s technical committee,

its headquarters in Geneva,

TC-79, started working in around

Switzerland. It is a non-profit,

2010 on a set of standards for

SECURITY SOLUTIONS // 59


CCTV

new technologies that cover alarms and electronic security systems. A number of work groups were created to include IP

• WG-12 deals with IP video surveillance systems (VSS) • WG-13 deals with alarm systems

CCTV, access control, alarms and

All working groups have a number

video intercoms.

of standards already published,

Initially, Australia did not have

but many are working on new

The following IP VSS standards

• IEC 62676-3 Video surveillance

have been published so far:

systems for use in security

• IEC 62676-1-1 Video

applications – Part 3: Analog

surveillance systems for use in

and digital video interfaces

security applications – Part 1-1:

• IEC 62676-4 Video surveillance

System requirements – General

systems for use in security

• IEC 62676-1-2 Video

applications – Part 4:

the opportunity to participate

standards or updating the existing

surveillance systems for use

in developing these standards

ones due to the very rapid change

in security applications – Part

since it was an observing

in technology.

1-2: System requirements –

systems for use in security

Performance requirements for

applications – Part 5: Data

video transmission

specifications and image

• IEC 62676-2-1 Video

quality performance for

member. However, the El-051

This article has been written

Application guidelines • IEC 62676-5 Video surveillance

committee members (the old

from the perspective of CCTV (IP

team) recognised the need for

VSS) standards IEC 62676, for

Australia’s involvement and

which myself and Olly D’Souza

surveillance systems for use in

camera devices

requested Standards Australia to

have invested many hours in

security applications – Part 2-1:

Currently, there is an

make our country a participating

international teleconferences,

Video transmission protocols –

annex being worked on for

member. With the change in status,

meetings, collaboration and

General requirements

62676-5, which refers to the

we earned the right to vote and

contribution. Although we became

contribute to all the IEC TC-79

involved after the first four 62676

surveillance systems for use

camera operation and how to

works moving forward.

standards were completed, we

in security applications –Part

measure those.

managed to contribute substantially

2-2: Video transmission

following working groups:

to Part 5 and are now actively

protocols – IP interoperability

standards are published by the

• WG-11 deals with access

contributing to Part 6, which covers

implementation based on

IEC, in Australia we do not have

video contents analytics (VCA).

HTTP and REST services

any IP CCTV (VSS) standards as

TC-79 is composed of the

control

60 // SECURITY SOLUTIONS

• IEC 62676-2-2 Video

environmental conditions during

While the above-mentioned

securitysolutionsmagazine.com


will create the standards from the outside. Without the standards, the industry will have no substantial progress. This has been especially important in the last decade when technology progress in video analytics, transmission technologies and modern VMS platforms has developed significantly. Without the standards following such developments in a timely manner, there will be very little chance to develop a mature, innovative and profitable industry. This ultimately depends on the younger members of the industry. They need to get involved now if we want to be a noticeable power in the world, like we were 20 years ago, in the analogue times. n Vlado Damjanovski is an internationally renowned CCTV author, lecturer, innovator and consultant. Vlado has also recently launched a series of online courses for people interested in learning more about CCTV systems and networking. For more information visit www.vidilabs.com yet. Many other countries, such

in the IEC. This is under way and

as UK and France, have already

will hopefully create momentum

adopted 62676. With the current

for adoption to be finalised.

Standards Australia involvement

The old team continues

in the IEC work as a participating

working on the new IP standards;

member, Australia has a good

unfortunately, there seems to be

chance of adopting these new

few young experts that would

standards, without re-inventing

like to take a part in it. It is a

the wheel. In fact, the IEC wants

demanding job that requires

Standards Australia to adopt such

knowledge and experience,

standards, as we are a member of

but there are many young and

the UN as well. However, while we

capable engineers out there.

started the process over two years

Maybe the main reason for

ago, Standards Australia still have

such a lack of interest is that

not finalised the adoption of the

this job is voluntary work and

IEC 62676 standards. This means,

it appears that not many people

in simple terms, that Australia

are prepared to sacrifice their

runs its IP CCTV (VSS) businesses

own time. However, if we want

without any official standards.

progress, we must change

To speed up the process, Standards Australia advised

our attitude. My personal plea to the younger

the alarm group EL-031 and the

members of the industry is for

CCTV EL-051 should be merged to

them to take a proactive role in

mirror the similar configuration

the standards work, as nobody

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 61


CYBERSECURITY

DESPITE LEGISLATION, ORGANISATIONS FAILING TO REPORT DATA BREACHES BY GARRY BARNES

Over the past five years, not-for-

As it pertains to cybersecurity

– many cybercrime statistics

profit IT industry association

incidents and attacks, the

presented by governments and

technical resources, and poor

ISACA has surveyed thousands of

respondent data yields potentially

businesses would have to be

understanding of legislation

cybersecurity leaders across the

encouraging, yet cautionary,

treated sceptically by comparison.

As an example, in the 2017

globe to identify what they are

insights. On the whole, prevalent

Indeed, 50 percent of respondents

Medicare data breach, the reason

seeing and experiencing, including

types of attack and threat actors

believe that most cybercrime is

surrounding the underreporting

current attack vectors, the skills

remain the same for a third year

underreported, even if enterprises

of the initial attack was the federal

shortage, funding and more.

running. However, the report also

are legally required to report

government’s understanding

illustrates an alarming new trend

incidents, with 79 percent saying

that the breach would not impact

attack vectors remain largely

– underreporting data breaches

it is likely they will experience a

Australians and their personal

the same as they were in 2017

and cybercrime – and paints a

cyberattack next year.

details. However, since September

and 2018. Forty-four percent of

somewhat concerning portrait of

respondents reported phishing

a professional field which does not

remains the most prevalent attack

This year’s report finds

• inadequate internal and

2018, the details of any living Australian citizen have been

trust itself to report cybersecurity

Why are Breaches being Underreported?

vector. Malware came in second

incidents to the authorities, even if

Having consulted with numerous

the ‘Medicare Madness’ listing

at 31 percent, decreasing seven

a legal or regulatory statute exists

organisations, my perception is

on the Darknet. Furthermore,

percentage points compared to

that requires an organisation to

that there are several reasons that

Medicare did not anticipate the

last year, and social engineering

report such incidents.

leads to the underreporting of a

betrayal that the breach relayed to

cyberattack. These include:

Australians by not fully complying

• an organisation does not

and making the public aware of

is the third most-common attack type (27 percent). Additionally, cybersecurity

Underreporting Cybercrime

believe the breach will affect

made available and sold via

the breach.

threat actors and their weapons

Three quarters of respondents

its customers, partners or

of choice are almost identical

indicated their belief that the

suppliers

to those reported in last year’s

actual instances of cybercrime

• the hackers did not obtain

Canberra’s Centre for Internet

results. Specifically, the top three

are intentionally suppressed.

valuable or encrypted

Safety, commented at the time

threat actors this year include:

If this level of underreporting

information; therefore,

of the Medicare breach that, as a

• cybercriminals – 32 percent

does in fact reflect reality –

organisations do not think they

result of this breach, Australians

• hackers – 23 percent

acknowledging that the survey

need to report it

are now less likely to sign up to

• non-malicious insiders –

asks respondents to reflect

15 percent

62 // SECURITY SOLUTIONS

on their belief in this regard

• reputational damage and longterm risk

Nigel Phair, now an adjunct professor at the University of

any future government online information management systems,

securitysolutionsmagazine.com


such as My Health Record,

Target has seen an increase in

than 200,000 records of staff and

which contains an individual’s

consumer trust, largely due to the

students going back as far as 19

The Benefit of Reporting Cybercrime

health information and allows

strength of its brand and efforts to

years. The breach occurred in late

The benefit from reporting

them to share this between

improve its security. Other studies

2018, and more than six months

cyberattacks is that we can advise

doctors, hospitals and other

have also shown an organisation’s

passed before the university

organisations and institutions of

healthcare providers.

share price does improve and

realised the intrusion.

potential breaches that may pose

Another common failing by

often increases a year after a

According to ISACA’s State

a risk. Recently, the Australian

organisations is to decide not to

data breach, if the company takes

of Cybersecurity report,

Catholic University (ACU) in

report cybercrime because they

effective measures to address the

one in three cybersecurity

Sydney reported a phishing

believe the hackers were unable

security issues.

leaders (34 percent) have high

cyberattack that allowed other

levels of confidence in their

institutions to be conscious and aware of potential breaches.

to steal any encrypted data or data

More often than not though,

of any real value. Unfortunately,

the reason for underreporting is

cybersecurity team’s ability

security professionals are often

a lack of technology or human

to detect and respond to

unaware as to how much data

resources related to cybersecurity

cyberthreats. The highest levels

reported, Nagle Catholic College

was taken and, while it may

and inadequate knowledge and

of confidence are correlated

in Geraldton, WA, found it was

not be of value to the particular

skill, as well as poor reporting

with teams that report directly

a victim of a similar phishing

organisation, it could still be used

or incident response policies

into the CISO, and the lowest

breach, stating bank account

for malicious means.

within the enterprise. ISACA’s

levels are correlated with teams

and credit card information

State of Cyber Part 1 outlines 95

reporting into the CIO.

may have been stolen, including

Organisations also fear

Not long after the breach was

signatures scanned when

reputational brand damage and

percent of respondents reported

In today’s unpleasant

long-term financial consequences

a gap between the organisation’s

threat landscape, we need to

parents paid school fees. The

by reporting a data breach.

desired and actual culture of

acknowledge the initial threat

college sent out a letter to all

Indeed, Target’s consumer

cybersecurity. This is evidenced in

and admit that this is in fact a

staff and parents to treat every

perception suffered a 54.6 percent

the many cybersecurity breaches

deep-seated risk. We need the

email as suspicious, monitor

dip the year following the data

we see where a company admits

right approach to security – with a

their accounts closely for

breach. However, if handled

finding the breach three to six

CISO sitting on the C-suite, where

strange transactions and to

correctly, studies are showing

months after it occurred.

security is adequately resourced

contact their banks for advice

and embedded by design and

on money protection. And all

consumers are willing to forgive

Just last month, Australian

organisations in the long term.

National University (ANU)

where any cybercrime or data

of these simple, yet effective,

In the years that have followed,

revealed a hacker obtained more

breach is reported.

measures assist individuals in

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 63


CYBERSECURITY

protecting their personal and

over year, attack volume will

address any propensity to

potential breaches, the more that

increase and cybercrime is

not report these incidents.

can be done to avert the risk. As

being underreported. Grappling

Enterprises can offset escalating

first CISO in the White House and

a community, together we are

with the true impact of

intensity in the threat landscape

now president of Cyxtera Federal

stronger, and building trust is

cyberattacks and cybercrime

through better governance

Group, retired Brig. Gen. Gregory

imperative in a digital world, thus

proves a slippery slope. The

and reporting structures that

Touhill, is calling for a ‘cyber

collaboration is the key.

high percentage of respondent

promote confidence in security

scepticism regarding cybercrime

across the enterprise, and across

Conclusion

reporting substantially may

industries. n

campaign. If you are being

The study confirms that many

offset the optimism indicated by

attacked, chances are pretty good

practitioners continue to face

any levelling of cybersecurity

somebody else in your industry

significant challenges – not

attack volume and consistency

CGEIT, CRISC is practice

is also under attack. And that is

only technically, but also

of threat actors and exploitation

lead, Governance Advisory at

where information sharing can

organisationally and professionally

techniques. Enterprises need to

Vital Advisory. He has more

make a big difference. I would

– in a maturing, dynamic and

consider that many cybercrime

than 20 years of experience in

like to encourage people ‘if they

sometimes turbulent field.

incidents may go unreported

information and IT security,

– despite legal and regulatory

IT audit and risk management

requirements to report – and

and governance.

confidential information. My peer, the US government’s

The more we speak up of

neighbourhood watch’ concept. “It is part of an overall

see something, they should say something’,” Touhill says.

64 // SECURITY SOLUTIONS

While attack vectors remain largely the same year

Garry Barnes CISA, CISM,

securitysolutionsmagazine.com


It’s as easy as 1two3 Three phases for construction keying

1 2 3 Construction keying is commonly used on site during the construction phase of building. A convenient way of providing continued security during the 3 phases of construction is to use pExtra construction keying. In simple terms, all cylinders are operated by the one key (Phase 1) during the construction phase. At “handover” the next stage key is turned in the cylinder blocking the Phase

1 key from working again. Once the apartment is sold, the owner would insert the key into the cylinder blocking Phase 1 and Phase 2 keys from working again. To learn more about our complete range of smart and secure access solutions, contact dormakaba. 1800 675 411 www.dormakaba.com.au

Phase 1 Construction Stage

Phase 2 Hand over to the developer/ real estate Phase 3 Hand over to the end user


PROFESSIONAL DEVELOPMENT

OPERATIONAL SECURITY SYSTEMS BY DR TONY ZALEWSKI

Introduction

This article will explore how

2. Strategies developed with

An operational system comprises

operational security systems are

resources introduced to

activity by individuals or groups,

developed from a risk assessment.

enhance security awareness

usually within an organisation

The core influences that must

across staff and others, such

or facility. In the context of

be considered are the local

as visitors and contractors at

security, operational systems

environment, the design of a

typically involve proactive

property, physical protections that

and reactive functions that are

might be present or introduced,

workplace/property, such

performed by security staff.

personnel that include potential

as those typically mandated

However, other personnel can

guardians and measures to

by a regulator to impact

also enhance protective functions

minimise the exercise of discretion

on the organisation’s

as ‘guardians’ who observe and

by personnel through protocols.

report. Collectively, operational

a property. 3. Laws specific to the

security program. 4. Related regulatory or

Influences on Effective Security Systems

legal influences that affect

security-related risks provided the protective strategies are

There are few formalised

occupational health

appropriate to various exposures

standards for systems of security

and safety, contracts or

within a situational environment.

as well as how security-related

arrangements between

issues might be managed

parties, trade practices,

are evidenced across most public

across workplaces. The

anti-discrimination and

and private spaces. This is where

following factors influence the

security legislation.

people live, work, socialise, mix and

development, implementation

5. Practices and standards

travel. Examples include airports,

and ongoing effectiveness of any

that align with industry or

shopping centres, public transport,

organisational security program.

professional guidelines, such

festivals and concerts, licensed

1. Culture in the context

as ISO Standards for Risk

security systems can minimise

Operational security systems

security. This includes

premises, exhibitions, hospitals,

of security strategies/

Management, OHS and local

and small and large cities or town

methods balanced

guidelines for work-related

centres. These places often host

against the organisation’s

issues such as occupational

mass gatherings on a daily basis.

business objectives.

violence and aggression.

66 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


securitysolutionsmagazine.com

SECURITY SOLUTIONS // 67


PROFESSIONAL DEVELOPMENT Security Culture and Impact Upon Risk

norms associated with protective

about the importance of staff to

Where a risk assessment identifies

security strategies throughout

ensure effective security practices

deficiencies in organisational

Security culture is the most

the organisation.

are followed. Reinforcement

security culture, security

through supervision and

practitioners should consider

important consideration in the

Reason (1997) reports that

assessment of operational security

a high-performing security

monitoring, and acknowledging

including advice on addressing

systems. It is well documented

environment within an

activity that enhances the required

these shortcomings through a

that a robust security culture

organisation flows from an

security practices will minimise

well-driven induction and security

is both a mindset and mode of

“informed culture”. Organisations

risk (Reason, 2000).

awareness program.

operation. Correctly promoted,

with informed cultures comprise

this can enhance security across

staff who are well aware of

maintains strategies associated

organisations (Beaver, 2015;

security-related risks. They are

with ill-considered work habits

Talbot & Jakeman, 2008). Ravasi

typically led by individuals who

should consider the following

Structure of Operational Security Systems

and Schultz (2005) define risk

manage, support and apply

as important components

An operational security system

culture as, “the specific collection

operational security systems.

to a successful program of

is based upon a risk assessment

of values and norms that are

Critical to informed culture are

security awareness:

that typically results in the

shared by people and groups in an

staff equipped with up-to-date

• explaining through examples

identification of a number of

organisation and that control the

understandings of relevant human,

that security is everyone’s

security/safety risks and then the

way they interact with each other

technical, organisational and

responsibility

introduction of physical, personnel

and with stakeholders outside the

environmental factors (Reason,

organisation.”

1997). Maintaining knowledge

basics and benefits of security

minimise those identified risks.

involves professional development,

knowledge

This is most evident in approaches

Similarly, Lafrance (2004)

Any enterprise which

• ensuring staff understand the

and procedural measures to

to risk minimisation in workplace

asserts that, “security culture is

adjustments to work-related

the logical result of a well-driven

protocols and provision of

security risks may evolve

health and safety through three

security awareness program.”

guidance materials, combined with

and that ongoing reviews of

simple steps: (1) find the hazards,

Further, “once people become

staff reminders, and dissemination

security practices are essential

(2) assess the risks, and (3) fix

aware of threats, it is in their

of information from safe work

nature to react to them.” Lafrance

authorities and regulators and

through on actions that

therefore proposes that motivated

other similar initiatives designed

enhance the system of security

people want to solve a problem if

to keep staff apprised of current

they feel concerned about it. This

environmental factors within the

underscores the importance that

working environment.

• ensuring staff understand

• acknowledging staff following

• ensuring that good security practices are followed

the problems. Typically, an operational security system is structured according to the following: A risk assessment in the

• introducing strategies that

context of security is important in

arouse staff interest in

the development of an operational

to ensuring that a strategy for

enhancing areas of workplace

security practices – if concepts

security system. Correctly applied,

inculcating a positive security

security, the organisation might

associated with security are

the protective system that results

culture is in place. This should

provide information justifying

interesting and enjoyable they

from a security risk assessment

commence with induction of new

why higher levels of security are

are more likely to be followed

should safeguard an organisation,

employees to reinforce values and

required. This involves messages

willingly

its assets, third parties and

all organisations should attach

68 // SECURITY SOLUTIONS

In the context of practices

securitysolutionsmagazine.com


others in terms of current and

dispatch of responding security

through induction and a security

future activities.

guards, as well as requests for

awareness program. Failures

innovation through carefully

police attendance.

in this area mean workers will

considered plans and operational

be unnecessarily exposed to

strategies in the context of risk.

Following a security risk assessment, the system of security

Security risk practitioners,

Effective systems often require

that is introduced should be

including operational security

security-related breaches, which

This approach will ensure best

operationalised according to

staff and potential guardians,

in turn increases risk to staff,

practice is established and a

requirements introduced through

should be familiar with

organisational assets and the

system that should maximise

measures categorised as physical,

and, where possible, utilise

organisation itself.

protections from both proactive

personnel and protocols.

both proactive and reactive

Other influences and

and reactive perspectives. n

approaches. Devising approaches

considerations for an operational

Proactive and Reactive Systems

with a focus on proactivity

security system are strategies

minimises risk. However, where

to enhance security awareness

Zalewski has provided expert

Security systems involve two

risks cannot be fully eliminated,

across staff and others onsite.

security reports across most

approaches – proactive and

a suitable response must still be

Such awareness should include

industry and professional

reactive. Both must be built into

available to diminish or minimise

a focus on laws and other legal

sectors. He has four degrees from

any security management system,

the impact of any security-

influences and, where relevant,

Australian universities, including

as not all proactive measures will

related breach.

the application of standards

law and criminology, has worked

and guidelines.

on over 500 cases, including

be successful all the time. A proactive approach focuses

Summary

Security risk assessments and

For over 20 years, Dr Tony

some of Australia’s leading

on preventing incidents through

Operational security systems

resulting operational systems

security-related civil actions,

deterrence or target hardening.

typically involve a combination of

of security should be developed

provides advice about security

For example, security controls

physical, personnel and written

in consideration of known

across industry sectors and is a

may be introduced at the

protocols. They are authorised by

influences on effective security;

security adviser to governments

perimeter of a property utilising

an employer/client and subject to

that is, culture, strategies and

locally and abroad. His recent

a combination of strategies.

proactive and reactive measures.

resources, laws specific to the

publication An Introduction

workplace, related regulatory or

to Operational Security Risk

This includes openness between

Culture is critical to the success

public thoroughfares and the

or otherwise of a system of

legal influences, and practices

Management is available through

site perimeter, security signage,

security and should be addressed

and standards.

www.gpsafety.com.au

bollards, barriers with secured gates that may be difficult to scale or compromise, and consistent perimeter lighting. One may also utilise prominent placement of CCTV cameras, signage indicating 24/7 site monitoring through a centralised control room, patrolling security guards, locks on gates and doors and vehicle intrusion measures using bollards, blockers and similar devices. These target-hardening strategies may deter or prevent persons who contemplate breaching the protective security system. A reactive approach introduces various security responses to incidents already in progress. These can include responses to audible alarms (directly or indirectly) through the activation of visual strobe or perimeter lights, remote monitoring of CCTV pan, tilt and zoom cameras, site checking through a control room by designated staff,

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 69


FEATURE

24-26 JULY 2019

ICC SYDNEY, DARLING HARBOUR

FOCUS ON SECURITY WHERE YOUR SECURITY NEEDS ARE BROUGHT INTO FOCUS Gain insight into the newest innovations that are reinventing the industry. AI, biometrics and tech inventions are moving at lightning speed and smart technology is inspiring new discoveries every day. Industry leaders, new visionaries and expert users are all joining together to exchange ideas and developments. The Security Exhibition + Conference is Australia’s largest and most established commercial security event that cultivates innovation, solves problems and leads an industry to be the best in the world.

24-26 JULY 2019 ICC SYDNEY DARLING HARBOUR

REGISTER FREE NOW securityexpo.com.au

Lead Industry Partner

70 // SECURITY SOLUTIONS


WELCOME TO SECURITY 2019 On behalf of the Security Exhibition & Conference team, I am pleased to invite and welcome you to the ICC Sydney for the 34th edition of Security, the event that brings the industry together to cultivate innovation and solve shifting challenges. Innovations continue to reinvent our industry, so in 2019 Security is focusing on bringing your needs into focus, as smart technology inspires new discoveries every day and changes the way we all work. This year we have introduced several new initiatives across the show in response to attendee feedback - features like the Innovation Precinct, Round Table sessions and the AI/ML Seminar were developed to help our visitors stay ahead of industry developments, connect with peers and the latest products, and gain practical insights. The ASIAL Security Conference has sold out for the fourth year in a row, and we look forward to hosting renowned local and international experts as they share their insights and expertise on a range of topics. We will once again be joined by leading experts and brands from across the globe, making Security truly international and Australia’s largest commercial security event. I hope you get the chance to join us over the three days to connect with suppliers, products and experts as the industry converges. I wish you a productive visit and look forward to working with you in the coming year.

Best wishes, Melissa Clendinen Event Manager

THE 2019 SECURITY EXHIBITION

INNOVATION & INSPIRATION For over 30 years the Security Exhibition & Conference has been the largest and most established commercial event for the security industry in Australia. Bringing together the entire supply chain to connect and create unparalleled business opportunities. It is the largest collection of electronic and physical security suppliers in the Southern Hemisphere. Discover a showcase of the emerging trends and products to help you stay ahead of the game in an industry moving at lightning speed, from brands including:

DOWNLOAD THE

SECURITY 2019 APP Plan your daily schedules, make connections, view full Conference and Seminar agendas, rate sessions and more.

Search 'Security Exhibition 2019' in your app store. securitysolutionsmagazine.com

SECURITY SOLUTIONS // 71


FEATURE

WHAT'S ON IN 2019? INNOVATION PRECINCT Take this opportunity to walk through a showcase of the latest products hitting the market in the last 12 months to take back to your day-to-day. Visitors can also vote in the 'Peoples Choice Best New Product' Award.

START-UP STREET A dedicated zone full of innovative and smart technology from exhibitors making their debut at Security. Looking for the newest suppliers? Meet face-to-face with the teams behind the latest solutions that will help streamline your work and keep you up to date in a rapidly moving industry.

AI/ML SEMINAR ROUND TABLES Facilitated by My Security Media & Security Solutions In response to strong demand for a platform to discuss common challenges across the industry, we've created a place for security professionals to exchange transferable skills, challenges and insights with peers from different sectors. Each session will address a different topic facing the marketplace, but spaces are limited!

GALA DINNER Thursday 25 July The industry evening of the year! Celebrate the year so far at the annual Security Gala dinner, and recognise industry achievements with the Best New Product Awards.

Thursday 25 July The new technology era is here and empowering the Security industry. Hosted by ACES Group, this one day seminar will explore the landscape of Data Science, Artificial Intelligence (AI) and Machine Learning (ML), the importance of embracing AI and how you can start adopting the capability in your business today.

FUTURE OF SECURITY BREAKFAST Wednesday 24 July Hear the research that will shape the next 10-20 years in security and take advantage of the opportunities underpinned by emerging technologies, over a light breakfast.

ASIAL SECURITY CONFERENCE An annual opportunity to receive fundamental updates from the organisations shaping today’s security landscape in a program carefully curated by the industry’s peak body.

NETWORKING DRINKS Wednesday 24 July Continue meaningful business conversations after the first day of Security wraps up. Relax, connect and catch up with peers over a drink or two in a more social environment.

72 // SECURITY SOLUTIONS

REGISTER FREE FOR THE EXHIBITION AT SECURITYEXPO.COM.AU

securitysolutionsmagazine.com


CE N RE EW FE I N REV CO P

THE 2019 ASIAL SECURITY CONFERENCE

BUILDING RESILIENCE TO COMBAT CHANGING SECURITY THREATS The ASIAL Security Conference hosts a compelling program of renowned local and international experts, and academics with case study evidence on how to protect your business, brand reputation and vital assets along with mitigating risk and vulnerability.

It an annual opportunity to receive fundamental updates from the organisations shaping today’s security landscape in a program carefully curated by the industry’s peak body. The 2019 ASIAL Security Conference is now sold out, discover a preview of the leading experts and visionaries set to present:

DOWNLOAD THE APP FOR FULL CONFERENCE PROGRAM

2019 HEADLINE SPEAKERS

Nick de Bont Thales Australia

Nick A New Scotland Yard

Kelly Sundberg Mount Royal University (Canada)

Shara Evans Technology Futurist

Dr. Tony Zalewski Global Public Safety

Debi Ashenden Deckin University

Dr. Lisa Warren Code Black Threat Management

John Lomax The Star

Dr Gavriel Schneider Risk 2 Solution Group

David Kortum Triplex Acies Consulting

Lead Industry Partner

24-26 JULY 2019

ICC SYDNEY, DARLING HARBOUR securitysolutionsmagazine.com

EXHIBITION HOURS

CONFERENCE HOURS

Wed 24 Jul 9:30 am - 5:00 pm Thurs 25 Jul 9:30 am - 5:00 pm Frid 26 Jul 9:30 am - 3:30 pm

Wed 24 Jul 9:00 am - 5:00 pm Thurs 25 Jul 9:00 am - 2:30 pm Fri 26 Jul 9:00 am - 2:30 pm SECURITY SOLUTIONS // 73


FEATURE

AI

THE WAR OF THE ALGORITHMS

74 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


BY RICHARD MENEAR

Thanks to the likes of Amazon,

poses a number of risks and, if

Google and Facebook, the term

these are overlooked, there is a

Artificial Intelligence (AI) has

worry that AI algorithms could

become more widespread than

create a false sense of security.

ever before. Defined as a branch of computer science dealing

A Blessing or a Curse?

with the simulation of intelligent

Many companies in a range of

behaviour in computers, AI

industries have already started

promises all sorts of things,

implementing AI initiatives to

from self-driving cars and

great effect. Although AI presents

smart home appliances to robot

a number of opportunities

‘employees’.

for businesses and there are

As algorithms become

many benefits of using these

increasingly complex, AI has

technologies, they also come

evolved to become a crucial aspect

with substantial risks, including

of cybersecurity solutions – with

malicious corruption and

the technology being applied

manipulation of data, devices

across various fields, including

and systems.

spam filter applications, fraud and botnet detection. By automating threat

securitysolutionsmagazine.com

Just as companies can use AI to automate and improve business processes, hackers

detection, AI can help to identify

can break through defences

threats more efficiently and

using the same technology and

effectively than other software-

automate the identification of

driven approaches – ultimately

vulnerabilities. So, for CIOs and

easing the burden and workload

CISOs who are responsible for

of employees. But relying too

corporate security, AI can prove

heavily on these technologies

to be both a blessing and a curse.

SECURITY SOLUTIONS // 75


FEATURE

If hackers are able to fool

Fighting AI with AI

Fortunately, there are ways

traditional methods of scrubbing

learning-based systems, they

Although self-driving cars are still

for companies to protect their

their presence from log files. For

will also be able to exploit the

very much a work in progress, we

data and systems from AI-based

high-risk targets such as banks,

classification systems AI is built

have already reached a point in

attacks. Part of the answer lies in

which may experience a number

on – meaning the fragility of

the modern day where AI has the

harnessing the power of AI itself.

of cyber incidents every day, AI

an organisation’s cybersecurity

potential to surpass the human

The only logical way to thwart

can also be used to automate

processes is heightened with

brain. It is the unfortunate truth

these new, automated attacks and

systems and help identify and

every new, clever algorithm

that human intellect may soon not

help strengthen cybersecurity

filter out truly dangerous threats

implemented by AI. For example,

be able to keep up with the leaps

processes and capabilities is to

from easily addressed issues.

they could learn to imitate

and bounds taken by AI every day.

fight AI with AI in the ultimate

people’s writing styles – enabling

Regrettably, these advances

For example, the rise

showdown. Appropriate defences

of the digital age has seen

them to execute more realistic

are not just being used for good,

also need to be put in place for

cybercriminals find new and

and effective phishing attacks. Or

as AI’s involvement in hacking has

existing AI initiatives to ensure

inventive ways to deceive both

they could prevent AI learning

allowed cybercrime to reach new

they are as secure as possible.

unsuspecting individuals and

altogether, using methods such as

realms. CIOs and CISOs need to

A combination of AI and

public services through online

tunnelling protocol and altering

wipe the stereotypical image of a

blockchain technology could

fraud. However, many banks

log files to scrub their tracks –

hacker from their minds; hackers

help develop a decentralised,

have been investing in AI and

meaning the AI will not be able

today are far more sophisticated

cryptographically sealed system

use it to detect whether someone

to identify a similar attack in

and ominous thanks to the

log, for example – meaning

logged into online banking is a

the future.

adoption of AI technology.

hackers would not be able to use

customer, a fraudster or a ‘bot’.

76 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


“If hackers are able to fool learningbased systems, they will also be able to exploit the classification systems AI is built on – meaning the fragility of an organisation’s cybersecurity processes is heightened with every new, clever algorithm implemented by AI.”

as signatures. Without these

and incorporate AI into their

signatures, conventional detection

cybersecurity measures to combat

tools are entirely ineffective.

the complex algorithms used

However, threat hunting

by hackers will, undoubtedly,

technologies do not rely on

leave their IT infrastructure

signatures – meaning they can

in jeopardy.

detect many forms of malware,

In order to respond effectively

which tools that rely on bad-

to the threat of AI, it is vital for

behaviour modelling cannot.

organisations to rethink and

Instead, these technologies

revolutionise the ways in which

use good-behaviour models to

they approach the security of their

proactively search out anomalous

systems and data. By investing

and malicious activities, such

in AI, companies can hope to

as unusual login times or large

streamline their cybersecurity

volumes of data being transferred

processes and reduce the workload

to an external host, which do not

for CIOs and CISOs – enabling

match the models.

them to prioritise risk areas and

Performing good-behaviour

to intelligently automate manual

modelling tasks would be virtually

tasks. Not only will this improve

impossible to do manually;

operational efficiencies, but it will

fortunately, AI is especially suited

also help to reduce costs. AI can

to this type of work. Unlike human

also aid and facilitate intelligent

Similar techniques are also

of investigations and frees up

beings, AI can handle gigantic

responses to attacks based on

being used by insurers to flag

resources to tackle major cases.

volumes of data and automatically

shared knowledge and learning.

suspicious claims.

generate baseline models of

It is advisable for businesses

normal behaviour. What is

to seek the help of a cybersecurity

of-the-art algorithms are also

Defending Against Malicious Malware

more, AI never tires – making

specialist who can help them

helping to crack down on benefits

Traditionally, malware detection

detection tools bolstered with this

implement appropriate AI-based

fraud by detecting and identifying

tools have also used passive

technology much more effective

solutions. These solutions will

the cloning techniques commonly

technologies to identify models

at discovering modern evasive

ensure the necessary defences

used by organised criminal gangs

of bad behaviour, in the practice

malware threats.

are put in place before it is

committing this type of mass-

known as ‘threat trapping’.

scale deception. The algorithms

Recently, these tools have had

look for patterns in claims,

In the public sector, state-

too late, allowing threats to be automatically detected

to evolve to ‘threat hunting’ in

An Intelligent Response

such as a phone number or

order to keep up with changes

Successful or otherwise, hacking

and money – as well as their

applications written in the same

in cybercrime.

attempts leave a digital footprint

reputation. n

style. Once a claim is flagged as

Criminals are increasingly

and companies to save time

which AI systems absorb and Richard Menear is CEO of the

suspicious, a human investigator

using AI to create progressively

use to develop an understanding

then takes over. AI can identify

advanced malware which is so

of the algorithms in place. This

specialist cybersecurity company

possible issues far faster than

sophisticated that it can easily

means any companies that do

Burning Tree. He can be contacted

human investigators, which helps

evade security solutions that rely

not take the initiative to progress

on 01252 843014 or info@

to greatly increase the efficiency

on bad-behaviour models such

with technological changes

burningtree.co.uk

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 77


LOSS PREVENTION

THE NEW GENERATION OF LOSS PREVENTION BY JACQUE BRITTAIN

The retail landscape is changing

Our role in the field, our place

prevention community perceives

must be shared across the loss

every day, with new ways to

in the business and our seat at

key subjects facing the profession

prevention community and

shop, pay for goods, interact

the table have all progressed

today, and whether it shares a

supported by company leadership.

with customers and deliver

well beyond the responsibilities

common theme across all levels

There will always be things to

commodities to the consumer. We

and expectations that were

of leadership.

work on. There will always be

have innovative items for sale that

conventional prior to the new

are changing the world we live in,

millennium. Our commitment

The 2019 Survey

on how things should be done or

creative services that can deliver

to growth and dedication to

As the industry has evolved,

what priorities should come first.

to your car door or your front

collaboration and partnership

doors have opened to reveal

But when it comes down to it, loss

door, and amazing technology that

have offered a new perspective

a new and exciting culture.

prevention professionals at all

allows us to scan and purchase

of our significance within the

Today’s loss prevention

levels of leadership should have

merchandise with a phone and a

retail landscape.

professional is expected to be

a fundamental agreement – or at

multi-dimensional, open-minded,

least an understanding – of what

fingertip. With every revelation

We are entering a new

different approaches and opinions

comes new opportunities for

chapter as a profession and, with

global-thinking, enterprising and

we do, where we are and where

growth and invention – and new

the dynamic changes that are

intelligent, serving as an integral

we are going. Relatively speaking,

challenges for the new generation

currently taking place across the

component of the retail world

if we are not on the same page, it

of loss prevention/asset protection.

retail industry, loss prevention

and part of the foundation for

makes it much more difficult to

professionals must have a shared

a successful business plan. The

move forward.

prevention is an ongoing and

mission and vision as we drive

retail enterprise understands

important topic that draws

forward. But as we take our next

and respects the importance of

to provide an objective window

considerable attention across the

steps, when considering the many

protecting a company’s assets

into the thoughts, ideas and

profession. As has become the

important subjects that need our

against the challenges of total

opinions of loss prevention

norm throughout the industry, a

attention and support, are we on

retail loss. This has encouraged

professionals at all levels of

proactive approach rather than a

the same page? Are the policies

a new and improved retail

leadership regarding these

reactive response has become the

and objectives defined at the

industry where effective loss

key areas and open doors

method of choice in our ongoing

corporate level the same messages

prevention strategies are viewed

for additional discussion. By

quest for a seat at the table and a

being implemented in the field?

as an integral part of a successful

gaining a more comprehensive

voice in the room. We are looking

Do we see critical subjects under

business model.

understanding of how loss

to the future and exploring the

the same light? Do we agree

many ways that our role may

on what is most important?

have been made, we must

collectively and independently

change to meet the emphatic

How should that influence our

maintain our focus and attention

perceive these important

needs of a transforming business.

decision making?

on every aspect of what we do.

questions – and whether we

Asset protection is not a singular

see these issues in the same

The evolution of loss

However, as we look to the

This year, LP Magazine, the

While tremendous strides

The goal of the 2019 survey is

prevention professionals

future, we cannot overshadow the

Loss Prevention Foundation

function, but a binding objective

light – perhaps we can spark

importance of where we are today.

and leaders from across the loss

that is a key aspect of profit

fresh thoughts and ideas on the

The fact is, we are deep into a new

prevention industry came together

enhancement. As part of a global

best ways to move forward and

generation of loss prevention.

to explore just how the loss

retail culture, this way of thinking

how we can best address these

78 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


topics to further enhance our loss

prevention and asset protection

process and the anonymity of the

this was then narrowed to a

profession and those in roles

survey respondents.

pool of 55 questions, with the

directly related to the profession.

The Question-Writing Process

final product submitted to

All participants were informed

professionals participated in the

these leaders for additional

that their participation would

survey, representing different

The survey itself was constructed

feedback prior to distribution.

remain anonymous to further

levels of experience, diverse

by leaders across the loss

All of those participating in the

encourage honest, open and

backgrounds, different positions,

prevention industry to provide

question-writing process have

complete responses.

different aspirations and every

a list of questions that they

remained anonymous.

prevention teams.

For practical purposes,

felt represented important

While department store and specialty retailers were most

Well over 600 loss prevention

level of career responsibility. Only minor edits were made

and productive topics relevant

Survey Distribution

common, respondents with

to respondents’ comments to

to the ongoing goals and

Invitations to participate in the

retailers across the industry were

correct spelling and grammar,

objectives of the loss prevention

survey were extended through

widely represented.

further protect the anonymity of

profession. Leaders representing

mailing lists, extensive social

many different types of retail

media outlets and LP Magazine’s

backgrounds and a diverse scope

LP Insider. Industry leaders

of retail organisations were

the respondents and to alleviate similar concerns. Otherwise, the

representing retailers across

Collecting and Reporting Survey Results

involved in the development

the country were also contacted

Construction of the survey

those expressed by the individual

process. Several of these leaders

directly and encouraged to share

and the collection of survey

respondents as they completed

further encouraged key members

the survey with all members of

results was managed through a

the survey.

of their teams to participate in the

their loss prevention teams.

professional survey platform to

process as well, resulting in a wide spectrum of topics.

securitysolutionsmagazine.com

Participation was encouraged for all those involved in the loss

thoughts and opinions shared in these comments are strictly

The content summarised

further protect the accuracy of

here represents a high-level

the results, the integrity of the

overview of the survey results.

SECURITY SOLUTIONS // 79


LOSS PREVENTION

Those interested in a more detailed perspective of survey results and comments should visit losspreventionmedia.com for a full report on the survey.

Career Development The process of career development is important in many ways, with the need for both employees and employers to be prepared, keep up with the changing environment and respond accordingly. Employees need to upgrade their skills and competencies on an ongoing basis to meet current and future demands, whereas organisations must hire, develop and retain employees who can successfully handle those changing needs and move the business forward. Ultimately, this opens doors to

increasing slightly at the

were slightly more likely to

at all levels of leadership

new and different opportunities

higher levels. Many comments

hold these designations.

tended to agree that two

for all involved.

supported the concept of

How do loss prevention professionals feel about their career prospects and the need to

• Similarly, loss prevention

or three regional loss

mentorship programs as a

professionals at all levels of

prevention conferences per

development tool.

leadership showed an interest

year designed for up-and-

in pursuing one or more of the

coming professionals would

• Career growth and

continue to develop and refine

development remained a

industry certifications over

be a valuable, effective and

professional skill sets? Several

primary objective of most loss

the next 12 months. Interest in

worthwhile way to develop

questions focused on gauging

prevention professionals. In

pursuing these certifications

talent. This trend also appears

responses concerning this topic.

general terms, loss prevention

varied slightly based on the

to increase in importance

• Loss prevention professionals

professionals at all levels

particular level of leadership

among loss prevention

at every level of leadership

of leadership strongly

involved, with those at the

professionals as they progress

felt they have the opportunity

emphasised that they seek out

higher levels of leadership

to further their careers in loss

opportunities for continuing

slightly less likely to show

prevention if they choose to

education to support

interest in pursuing additional

whether most loss prevention

do so, with those in high-

growth and investment in

certifications. However, this

professionals are legitimately

level positions slightly more

their careers.

would actually align with

prepared for the changes

those leaders indicating

that will take place across the

at all levels supported an

that they have already

profession over the next five

prevention professionals at all

ongoing commitment to

earned designations.

to ten years, with numbers

levels of leadership tended to

professional growth and

• Overall, 85 percent of

feel that they have the respect

development through the

those participating in the

percent) very similar to those

and support of supervisors

certification process. Overall,

survey agreed that using

that disagree (38 percent).

regarding career aspirations.

nearly 70 percent of those

online tools and social

However, results remained

participating in the survey

media is an important way

fairly consistent when

participating in the survey

have either earned an

to remain educated and

breaking down the numbers

indicated that they have had

industry-related certification

current. Interestingly, this

by leadership position.

one or more mentors that have

or are currently pursuing an

trend appears to increase

influenced their professional

industry-related certification,

in importance among loss

Company Support

careers. This trend appears

and just over one in five

prevention professionals

Company support is and will

to be fairly consistent at

indicated that they hold

as they progress up the

remain a primary concern to

every level of loss prevention

multiple certifications. Those at

career ladder.

the health of the loss prevention

leadership, with the numbers

the higher levels of leadership

confident in their prospects. • Generally speaking, loss

• Overall, 75 percent of those

80 // SECURITY SOLUTIONS

• Loss prevention professionals

• Loss prevention professionals

up the career ladder. • There was disagreement as to

for those that agree (37

profession. For the loss prevention

securitysolutionsmagazine.com


overall at 8.1 out of 10. These

having a strong understanding

numbers were very consistent

of loss prevention as a retail

across all levels of leadership.

professional as a 9 out of

• Survey respondents had a

10, only 64 percent felt that

very mixed response in regard

their sales/operations peers

to whether they believed

have an understanding and

that they have experienced

respect of the role of loss

or witnessed signs of

prevention in the overall

discrimination when they

success of the business. These

or others were considered

numbers remained consistent

for hire or promotion.

across all levels of loss

Overall, 35 percent of those participating in the survey

prevention leadership. • Overall, survey respondents

indicated that they have

had a very mixed response as

experienced or witnessed signs

to whether the loss prevention

of discrimination, 50 percent

department is undervalued

disagreed, and 15 percent

within their company – 42

offered a neutral response.

percent agreed that loss prevention is undervalued,

Retail Support

41 percent disagreed, and

We often discuss the importance

17 percent offered a neutral

of the evolving role of loss

response. These numbers

prevention – how this impacts

remained fairly consistent

our jobs, how we perceive our role within the business model

across all levels of leadership. • Survey respondents ranked the

and the importance of working

importance of loss prevention

hand in hand with our sales

professionals having a strong

and operations peers to achieve

understanding of retail as a

the goals and objectives of the

9.3 out of 10. They ranked the

program to be successful, the

professionals at all levels of

organisation. Partnerships and

importance of loss prevention

company must be committed to

leadership revealed a slightly

cooperation will remain a big

professionals having the ability

communicating the purpose and

positive response in how they

part of that moving forward, but

to build strong partnerships

importance of the program and

rank their company with

the way that retailers in general

with their operations peers as

instilling a culture that reaches

respect to developing talent for

understand and respect the role of

all levels of the organisation.

leadership roles, there is some

loss prevention will also remain a

However, it is just as important

opportunity for improvement,

key aspect of our success.

that most loss prevention

that this commitment is made to

with respondents indicating

• As a whole, loss prevention

professionals have a strong

those responsible for carrying

6.5 out of 10. These numbers

professionals felt there is some

respect and understanding of

out the plan and moving the

were consistent across all

opportunity for improvement

their retail partners and the

program forward.

levels, with every level of

with the retail industry’s

retail profession as a whole,

leadership falling between 6

support of loss prevention,

while 74 percent felt that

and 7 out of 10.

ranking that support as 6 out of

they have the respect and

10. While survey respondents

cooperation of their sales/

ranked the importance of

operations partners.

Do loss prevention professionals believe they have the support of their companies in

• With respect to promoting

terms of professional development

diversity in loss prevention,

and career advancement? Let us

survey respondents graded

take a closer look.

their companies at 7.8 out

• Loss prevention professionals

of 10. These numbers were

at all levels of leadership

consistent across all levels,

overwhelmingly believed that

with every level of leadership

retail companies should do

falling between 7 and 8 out

more to support continuing education opportunities for

of 10. • Support for women in

their loss prevention teams,

loss prevention was also

with 95 percent in agreement.

encouraging, with respondents

• While loss prevention

securitysolutionsmagazine.com

9.61 out of 10. • Seventy-eight percent felt

grading their companies

SECURITY SOLUTIONS // 81


LOSS PREVENTION

Training and awareness

mission and objectives are

programs that emphasise the

effectively communicated.

role of reducing losses as part

• Generally speaking, the results

of successful sales and profit

were very similar when

enhancement models have widely

respondents were asked if loss

been seen as an important part of

prevention leadership has a

a robust loss prevention program.

firm grasp on the way that

While these results would indicate

loss prevention policies and

that respondents believe that

procedures are actually carried

respect and cooperation are at

out in the field and in the stores.

strong levels of support, results

While 80 percent of department

would further suggest that greater

leaders felt they have a firm

emphasis on shrink management

grasp on the way that policies

and the value of these programs

and procedures are carried out,

within our sales and operations

only 63 percent of those in the

teams would appear to be an area of opportunity. In other words,

field believed this to be the case. • Survey participants were

while respondents believe there is

also less likely to believe that their supervisors are open to

General Loss Prevention

and the ability to identify and

a willingness to partner and learn, the level of understanding is not

new and creative ideas from

Where do we stand on many of

out of 10 for loss prevention

where it needs to be amongst our

members of the loss prevention

the more fundamental concepts

professionals. These numbers

sales/operations peers.

team. While 84 percent of

of loss prevention? Where do

were fairly consistent, although

department leaders stated

survey respondents believe we

not surprisingly, that role was

Leadership and Communication

that they are open to new and

have the greatest opportunities

seen as slightly more important

creative ideas from members of

for improvement? How closely

at the lower levels of loss

One of the most critical aspects

the loss prevention team, only

aligned are we with these concepts

of determining whether or not

67 percent of those in the field

across the various levels of loss

believed this to be the case.

prevention leadership? Let us take

retailers should put less

a closer look.

emphasis on apprehending

• Overall, survey participants

shoplifters and more emphasis

loss prevention professionals at every level of leadership are on

• While 83 percent of department

apprehend shoplifters as a 6.7

prevention leadership. • However, when asked whether

the same page is through our

leaders stated that they agree

ability to effectively communicate

with the goals, mission and

rated the importance of

on deterring theft in the stores,

our mission, vision and culture

approach that their company

having a strong and successful

agreement amongst survey

throughout all levels of the

holds with respect to loss

background in interviewing as

participants varied considerably

organisation. Even when we agree

prevention, only 69 percent of

a loss prevention professional

by level of leadership.

on the fundamental concepts of

those in the field agreed.

as 8.3 out of 10. This remains

Eighty-four percent of top loss

loss prevention as a profession

It is not uncommon for senior

in concert with their views

prevention leadership were in

or the retail business in general,

leadership to have slightly

regarding the role that internal

agreement, while less than 50

without the ability to effectively

different opinions based on their

theft plays in the overall shrink

percent of those in store-level

communicate our message or

experience and unique exposure

performance of their company

positions were in agreement.

channel our ideas and opinions,

and perspective to all areas of the

as a 7.4 out of 10. These ratings

Very few believed that loss

we will continue to face challenges

business. There are many different

were consistent across all levels

prevention professionals

moving forward.

factors that come into play, many

of leadership.

should have the discretion to

• Perhaps not surprisingly, loss

different responsibilities that are

• Participants also viewed

pursue shoplifters beyond the

prevention leadership were

faced, and a litany of considerations

the importance of the audit

much more likely to believe

that most in the field will fail to

function and strong operational

that they do an effective job

fully appreciate or understand.

controls as an important

respondents believed that

of communicating the goals,

Unfortunately, this does

function in the overall shrink

organised retail crime (ORC)

boundaries of the store. • Ninety-two percent of survey

mission and other critical

appear to be an ongoing area of

performance of their company,

is a real and growing problem

objectives of the department

opportunity. However, this is a

rating this as a 7.7 out of 10.

in today’s retail environment.

to the loss prevention team in

shared responsibility across all

This ranking was consistent

Eighty-nine percent believed

the field. However, while 83

levels of leadership. There are

across all levels of leadership.

that it is important and

percent of department leaders

areas that can be improved upon

felt they do an effective job,

– both at the corporate level and

the role of shoplifting as 7.4

of our loss prevention teams

only 65 percent of those in

in the field – that can help bridge

out of 10 in the overall shrink

active in organised retail crime

the field believed the goals,

some of these gaps.

performance of the company

associations (ORCAs).

82 // SECURITY SOLUTIONS

• Survey participants ranked

valuable to have members

securitysolutionsmagazine.com


• Just over 6 out of 10 (62

responsibilities of loss

• Overall, 68 percent of

the health and well-being of the

percent) respondents agreed

prevention will show

respondents believed

profession, the survey would

that incidents involving violent

significant changes over the

that, when used correctly,

appear to indicate that, whether

behaviours have increased

next five to ten years, with

merchandise protection

a positive trend or an area of

in their area of responsibility

92 percent in agreement.

standards (EAS and other

opportunity, we are fundamentally

over the past 12 months.

Ninety-six percent felt it

security measures) are truly

in agreement. In fact, in some

Sixty-five percent believed

is becoming much more

effective in deterring theft

areas, it was astonishing just how

shoplifting incidents involving

important for loss prevention

in retail stores. Those at the

closely aligned the responses were

those addicted to opioids and

professionals to learn more

higher levels of loss prevention

across all levels of loss prevention

other addictive drugs have

about information technology

leadership held stronger

leadership. But there are still some

increased over the same

and the retail supply chain,

beliefs that these measures are

critical areas that we need to work

period. Approximately 7 in 10

while 81 percent felt that they

effective (75 percent).

on. There are a few areas where

agreed that this is influencing

have adequate understanding

• Seventy percent of survey

we are not on the same page, and

the way their companies

and training regarding

respondents felt that legislative

some of these inconsistencies can

are approaching shoplifting

the technology and other

changes, changing demands

present hurdles.

incidents. These beliefs were

resources used to accomplish

on police and police response

It is not simply that we

consistent across all levels

loss prevention goals.

are negatively impacting our

disagree – there will always be

of leadership.

ability to effectively protect

areas where we disagree for

respondents (22 percent) stated

retail stores. While those

any number of reasons. In fact,

their loss prevention team

that they have experienced or

at the higher levels of loss

there are times when having

is adequately trained and

witnessed incidents of sexual

prevention leadership were in

alternative opinions can have a

prepared to handle disruptive

harassment in the workplace

higher agreement (75 percent),

healthy and positive influence.

behaviours/incidents if they

over the past 12 months. These

responses were highly

It is when we do not know we

occur in the stores. Even

responses were consistent

consistent among all levels of

have a difference of opinion or

more significant is that only

across all levels of loss

leadership

perspective that can lead to more

29 percent believed that

prevention leadership.

• Only 61 percent believed that

store management/associates

• Just over one in five

• Only 34 percent of respondents

• Eighty-seven percent of

serious challenges, some of which

respondents agreed that

can be difficult to overcome.

are adequately trained and

felt that there is adequate

providing loss prevention

For example, if loss prevention

prepared to handle disruptive

staffing and resources to

professionals an opportunity to

leadership believes that they

behaviours/incidents if they

accomplish the goals of the

voice their ideas and opinions

are doing an effective job of

occur in the stores. Although

loss prevention department.

can and will have an influence

communicating critical objectives

top levels of leadership were

Seventy percent agree that

on loss prevention leadership.

of the department, but those in the

slightly less likely to be in

there are times when the

Ninety-three percent of those

field do not necessarily agree with

agreement (25 percent), these

ability to use/access contract

at the highest level of loss

that perspective, this can lead to

beliefs were also consistent

security guard services to

prevention leadership agreed

serious concerns in any number

across all levels of leadership.

complement loss prevention

that this is accurate.

of ways.

• Loss prevention professionals

Self-reflection is always an

efforts is essential to the

across all levels of leadership

operation and protection of

What Does it all Mean?

important element of growth.

believed that the overall

retail locations.

The survey process offers

While the survey offers us a great

practitioners a forum to share their

deal of raw information, it is what

true thoughts and opinions on a

we do with that information that

variety of critical loss prevention

will make a difference.

subjects. While having the

encourage you to take a deeper

the ability to take that information,

look at the survey results as part

interpret what it means and apply

of the free special report available

it in a pure, logical and meaningful

at losspreventionmedia.com,

way takes things to an entirely

which provides more detailed

different level. Leadership and

information on each survey

responsibility should always go

question, along with comments

hand in hand, and it all comes

offered by the loss prevention

down to what we do with the

community. You should also look

information that is presented to us.

for leadership response to the

We should be encouraged that in most areas important to

securitysolutionsmagazine.com

So, what do you think? We

information is always important,

survey results in a future issue of LP Magazine. n

SECURITY SOLUTIONS // 83


PRODUCT SHOWCASES

VISUAL IMAGINEERING OF SECURITY ENTRANCES BY BOON EDAM HELPS ARCHITECTS AND BUILDERS SHOW HOW TO BLEND PROTECTION WITH STYLE

Before and after: security gates product realisations can assist specifiers, designers, owners and their customers

Blending function with style

and functionality, says Mr Fisher,

Boon Edam Business Development

entrances has introduced a

“But we have found that a recurring

Manager Darren Assey, who will

product realisation service

Now the Australian operation

consideration for architects,

liaise regarding the visual, security

that helps building designers,

has introduced the new Product

engineers, facility managers,

and specifier needs, then return a

refurbishers and managers

Realisation Imagineering service by

security consultants and other

finished product representation.

to show how good entrance

which building specifiers, suppliers

specifiers is how to visualise the

protection can look when applied

and building managers can

product blending in with their

entrance security technologies

to their own projects.

submit graphics of their planned

particular architectural style and

has advanced significantly over

entrances areas for Boon Edam to

the corporate style of the building

the past decade – “Good security

security entrances for scores of

complete with a graphic containing

and the rest of the entrance.”

entrance design has reached a

Fortune 500 companies in 27

the security entrance leader’s

countries, combining practicality

solution for the particular security

Imagineering

having to minimise how out-of-

and performance with the

need presented.

“That’s why we’ve created the

place security looks, the entrances

Product Realisation Imagineering

actively enhance the overall look

A global leader in security

Royal Boon Edam provides

architectural style required for

“We have a head start in

Mr Assey says the design of

point where, instead of designers

some of the world’s biggest

supplying security entrances to

service through which they can

of an area. Boon Edam has invested

commercial, data centre, financial,

companies in Australia and New

sends us a photo or computerised

time and experience to become a

government, industrial, health,

Zealand, because we are the only

graphic representation of their

global leader melding style with

hospitality, retail, telco, and

company out there with a truly

current entrance, and we’ll add to it

functionality, and we’d like to show

internet and cloud computing

comprehensive range of security

to show them what it could look like

you just how good security can look

technology companies.

entrances, extending from building

with preferred security products

on your project.”

Its Boon Edam Australian

entrance and internal traffic flow

installed. This Imagineering service

operation does the same for

through to intense protection of

– which is ideal for their client

leading Australasian banks,

core assets,” says the Managing

presentations – facilitates the

A layered approach to entrance security

broadcasters, corporate HQs,

Director of Boon Edam Australia, Mr

implementation of creative ideas in

Based on its experience in 27

legislatures, government agencies,

Michael Fisher.

practical form,” he says.

countries, Boon Edam advocates

diplomatic posts and public and

These security entrance systems

Those wishing to use the

a layered cost-effective system

private facility mobility hotspots

are all designed to the highest

service send the picture or graphic

of security entrances to data

prone to unwanted attention.

standards of crisp European style

of the existing entrance area to

and sensitive business facilities,

84 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

increasing in sophistication and

“And for corporate and public

securitysolutionsmedia.com/newsletter

entrances and designated building

Boon Edam Australia’s expert

features as employees and visitors

buildings, this security cannot

facility entrances, as well as other

architectural and entrance security

advance from the entrance

be ugly or threatening. It has

sensitive interior areas.

team includes Managing Director

areas of private or government

to be architecturally crisp and

“And using security entrances

facility involved, through internal

harmonious with the style and

24/7 instead of relying solely on

Sales Manager Alastair Russell,

trafficked areas and on to the

presentation of the leading

expensive manned security can be

centre, and Business Development

core areas requiring greatest

organisations involved.”

not only the best way of layering

Manager, Darren Assey, right. The

security, but it can save money.

team is backed by a national service

provide high security even at

The ROI on security entrance

team dedicated to ensuring long-

approach has been proven globally

times when security staff are

systems is both quick and cost-

term customer satisfaction.

to be the most effective and cost-

scarce, Boon Edam Australia’s

efficient, compared with the rising

saving alternative to oppressive,

latest architecturally harmonious

costs of manned security.”

unnecessary and impossibly

Tourlock, Circlelock and Lifeline

expensive blanket systems of

ranges of entrance security

globally to date, and the savings

in thousands of applications – are

manned security needed for around

product families provide security

trend can only accelerate as

backed in the field throughout

the clock security as globally

for not only the entrances to data

businesses increasingly move

Australia, New Zealand and Papua

interconnected businesses move to

centres, but also can be used for

to 24/7 business cycles and

New Guinea by dedicated service

24/7 trading cycles.

company perimeters, corporate HQ

decentralise their data services.”

and security teams. n

protection. Mr Fisher says the layered

securitysolutionsmagazine.com

In response to the need to

“This has been our experience

Michael Fisher, left, National

Boon Edam’s latest products – which have evolved from market leading families of product proven

SECURITY SOLUTIONS // 85


PRODUCT SHOWCASES

BOON EDAM AUSTRALIA STRENGTHENS SERVICE OFFERING WITH NEW PROCESS ENGINEER Architectural revolving door and

continue to grow their service

security entrance leader, Boon

offering in Australia, New Zealand

Edam Australia, is strengthening

and Papua New Guinea,” said

its Australasian service

Mr Florendo.

offering with the appointment

“In my new role, I want to

of new Process Engineer, Mr

bring my combination of technical

Michael Florendo.

skills and the ability to establish

Mr Florendo (BSc – Industrial

and maintain quality long-term

Engineering) has more than

relationships with customers,

15 years’ technical experience,

and I hope to contribute to the

including major petrochemical,

company’s success locally,”

ports and automotive companies

he said.

across Asia and the Middle East. “I chose to work with Boon

Customer-centric

Edam because they are an

Managing Director of Boon Edam

industry leader in their field,

Australia, Mr Michael Fisher says

which will provide me with

the appointment is a further step

an excellent opportunity to

in expanding Boon Edam’s service

further my technical expertise

offering nation-wide.

and professional training, while

“Mr Florendo has excellent

Mr Michael Florendo

Boon Edam Service

working with prestige clients

technical skills and attention to

Boon Edam visits, audits and

and household names,” said

detail. His previous experience

reports on the condition of any

Mr Florendo.

will make him an asset to our

revolving door or security door,

service team, as we continue

without fee, to help companies

Boon Edam is a global supplier

to provide a level of service,

remain compliant with the

to some of the world’s biggest

support and backup previously

Australian Standard AS: 5007.

companies and multinational

unavailable locally,” said

groups, as well as public and

Mr Fisher.

Operating in 27 countries,

private agencies. Boon Edam’s

“Boon Edam has a strong

-

Collapsible door wings, closers and locks

-

Electronic smart devices and control systems

-

Active and passive safety sensors

-

Laser calibration and mapping

-

Door wing brushes

based on 140 years of experience,

-

Door activation devices

includes not only the standard

-

HVAC/green building issues

This comprehensive process,

global clients include dozens of

company culture of long-term

checks, but also a deeper,

One of Boon Edam’s key focuses

Fortune 500 companies.

customer satisfaction, and the

preventative maintenance

is creating and maintaining

addition of Mr Florendo to our

understanding, including

future-proof facility management

Boon Edam was committed to

service team will help us deliver

potential trouble spots that could

solutions that meet the diverse

helping customers find the best

this for all customers in Australia,

become far more costly and

requirements of sustainability,

solution for their business. This

New Zealand and Papua New

troublesome over time, including

security, and service while also

company culture of long-term

Guinea,” he said.

inspections of:

being aesthetically outstanding. All

Mr Florendo will lead Boon

-

Complete drive train systems

Boon Edam work is covered by its

outstanding after sales and

Edam’s Australia’s growing service

-

Slip rings and electronic

industry-leading warranty.

service, is one of the reasons

and installation team, and report

they’ve been successful for more

to National Technical Manager

than 140 years, and I hope to

John Powell.

“I could immediately see that

customer satisfaction, including

86 // SECURITY SOLUTIONS

signaling devices -

Shaft-mounted, motor and electromechanical locks

For further information visit www.boonedam.com.au n

securitysolutionsmagazine.com


F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry

instagram.com/securitysolutionsmag

COGNITEC’S FACE RECOGNITION ENHANCES DIGITAL ID SERVICES FOR DUTCH DRIVER’S LICENSE APPLICATIONS

Dresden, July 2, 2019 — Cognitec is

for this person in the Central

extensive N:N matching process

the areas of licensing of vehicles

working with RDW, the Netherlands

Driving License Register.

takes time, and needs to be

and vehicle parts, supervision

monitored carefully, but it ensures

and enforcement, registration,

Vehicle Authority, to provide a

Cognitec’s trusted face

digital application platform for

recognition technology not only

the quality of our database,

information provision and

the renewal of drivers’ licenses.

performs the image comparisons,

and prevents false matching

issuing documents.

The platform is now operational

it also checks the new image to

errors during future application

in 15 municipalities, growing to

ensure it satisfies the ISO/IEC

processes,” says Gert Jan de

About Cognitec

30 municipalities during 2019, for

standard for biometric photos.

Nijs, Senior Project Manager at

Cognitec is the only company

RDW. “We are excited to move

worldwide that has worked

almost 25% of Dutch residents. In

In addition, the project involves

2020, the Ministry of Infrastructure

an initial deduplication of the

toward a fully secure, convenient

exclusively on face recognition

and Water Management will

image database, enrolling about 12

digital process that provides our

technology since its inception in

evaluate the system to decide on a

million images and comparing them

citizens with a future-proof ID

2002. The company is proud to

national service that eliminates the

against each other to find duplicate

management system.”

maintain a stable, market-leading

mandatory visit at the city hall for

records and clerical errors.

driver’s license renewal.

position within the industry, and to About RDW

uphold the trust it has gained as a

recognition for more than a year

RDW is the Netherlands Vehicle

reliable, experienced provider of

the application process, RDW

to increase the overall quality

Authority in the mobility chain.

biometric technologies.

uses Cognitec’s technology to

of the license renewal process,

RDW has developed extensive

establish the applicant’s identity

and have just begun to apply

expertise through years of

by comparing the newly submitted

the deduplication capabilities

experience in executing its

www.cognitec.com

photo against the last image stored

of the Cognitec system. This

statutory and assigned tasks in

info@cognitec.com n

As an additional check during

securitysolutionsmagazine.com

“We have been using face

More Information and Contact:

SECURITY SOLUTIONS // 87


PRODUCT SHOWCASES DAHUA TECHNOLOGY LAUNCHES INTELLIGENT VIDEO SURVEILLANCE SERVER (IVSS) 2.0 WITH ENHANCED AI PERFORMANCE FOR DIVERSE APPLICATIONS

Hangzhou, China/June 27, 2019 Dahua Technology, a worldleading video-centric smart IoT solution and service provider, has launched IVSS 2.0 (IVSS7000-I) , an upgraded series of its NVR family powered by the latest AI capable of deep learning, which opens up new possibilities to smart security solutions. The upgraded IVSS 7000-I features scalable GPU design to meet the ever-growing project requirements. The unique Dahua deep-learning algorithm with GPU group enables IVSS7000-I to perform face recognition, perimeter protection and metadata with high accuracy. Offering advanced AI features, it even enables danger prevention via faster video content inquiry, rapid discovery of targets as well as real-time and accurate alarm in a variety of applications, providing AI-based all-in-one surveillance solution for customers. The following details some major features of IVSS7000-I.

Award-winning Face Recognition With Multiple Applications Dahua Technology’s AI-powered face recognition technology enjoys a high reputation in the industry, as testified by multiple first prizes in international competitions. Equipped with Dahua face recognition technology, IVSS7000-I series records faces by structured data and performs real-time crosscheck with reliable accuracy to figure out the face by features of the target. Supporting up to 256-channel face

88 // SECURITY SOLUTIONS

recognition by device and up to 256-channel face recognition by camera, IVSS7000-I can analyze up to 50 face databases with 300,000 face pictures in total. Besides,the upgraded IVSS7000-I also supports search by face image which means users can upload face pictures to IVSS7000-I and compare them with recorded ones by similarity. Boasting aforementioned abilities, IVSS7000-I series can realize a lot of functions for users such as VIP recognition, blacklist alarm, stranger identification, attendance management, access control, etc. It divides faces detected into different categories defined by users, and acts accordingly, like notifying the manager that a VIP customer is coming or sending an alert when a persona non grata is identified. Users can choose regular/Stranger mode to trigger kinds of alarm actions according to different applications.

Advanced Perimeter Protection For Superior Alarm Accuracy Focusing on people and vehicles, perimeter protection automatically filters out false alarms caused by animals, rustling leaves, bright lights, camera shaking and other irrelevant elements. It also enables system to act secondary recognition for the targets, thus significantly improving alarm accuracy with saved cost. In terms of perimeter protection, IVSS7000-I supports up to 256-channel with each channel allowing up to 10 IVS rules.

Rich Metadata For Efficient AI Search Metadata is feature attribute information of a target object which can be used for data retrieval. Currently, there are mainly four types of metadata that are human face, human body, motor vehicle and nonmotor vehicle. IVSS7000-I supports up to 64-channel video metadata, making it possible for operators to quickly and easily search through multiple channels and long duration to find out when and where a person/vehicle of interest appeared, which significantly enhances accuracy and efficiency.

Optimized GUI to Lower User’s Training Cost The IVSS7000-I employs optimized GUI which is easier for users to learn and use. With the same GUI working for local output and PC client, training cost of system operator is reduced. Comparable to VMS client, the new GUI design is more user-friendly for projectlevel customers.

Other Exclusive Highlights Apart from the above features, IVSS7000-I also allows independent PC client for remote access so that users will not be bothered by things like Web plug-ins and browser update. It’s also worth mentioning that with a new security center to keep hackers away, IVSS7000-I series provides a safer network environment for users. Being multifunctional, IVSS-I can meet variable needs of users, thus applicable to a wide range of scenes, including entrances and

exits of banks, business parks, schools, prisons and transportation centers like airports, railway stations that are sensitive to strangers and criminals; or the shopping malls that want to protect customers from petty thieves; or football stadiums that choose to ban those known hooligans for good. As a key back-end product to smart security system, IVSS7000-I brings intelligence, safety, and reliability to a new level. With a mission of Enabling a Safer Society and Smarter Living, Dahua Technology will continue to focus on “Innovation, Quality, and Service” to serve partners and customers around the world. *Product launch date might be varied depending on countries About Dahua Technology Zhejiang Dahua Technology Co., Ltd. is a world-leading video-centric smart IoT solution and service provider. With more than 16,000 employees all over the world, Dahua solutions, products, and services are applied in over 180 countries and regions. The company was ranked 2nd in “2018 a&s Security 50”. Committed to technological innovations, Dahua Technology continues to explore emerging opportunities based on video IoT technologies and has already established business in machine vision, video conferencing systems, professional drones, electronic license plates, RFID, and robotics etc, enabling a safer society and smarter living. Visit http://www.dahuasecurity. com to learn more and follow us on social media. n

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmedia.com/newsletter

Breakthroughs in low penetration, shallow mount Hostile Vehicle Barriers

The profusion of hostile vehicle

bollard system, impacted at

to elegantly follow the contour of

or connection of any kind. Equally

attacks directed at crowded

40mph by an N2A 7500kg GVW

sloping surfaces.

amazing was that the RB002-40

public spaces has drawn

Truck. The system was certified

urgent focus upon capacity to

to the internationally recognised

collaboration with Safetyflex UK’s

destroyed truck was prized from

arrest hostile vehicles, whilst

standard; IWA 14-1 2013 Barrier

design team and continuing our

the bollard, then recorded being

conceding the absolute minimum

V/7200[N2A]/64/90:2.4.

mutual focus on identified market

lowered back into its enclosure

priorities, Safetyflex in mid-May

and raised as normal.

penetration achievable. This

This represents the new world

Emphasising Ezi’s close

was still in working order once the

is particularly critical where

benchmark in low penetration

2019 tested a further significant

public spaces expose predictable

achieved in this class by a shallow

innovation incorporating the

stopping credentials bear

high density assemblies of

mount bollard. The IWA test

hugely robust TS9-40 bollard.

testimony to perpetual research

pedestrians. Obviously, the less

credential recorded is deemed

Safetyflex’s shallow mount

and development attending to

penetration, the less potential for

equivalent to;

retractable bollard system was

emerging risks and customer

human collateral.

• PAS68-1:2013 Barrier

adapted to combine the powerful

applications, constantly alert

spring steel core bollard assembly

in Australia and our region via

Ezi Security Systems has

V/7500[N2]/64/90:2.2/15.0

These spectacular truck

recently released the Truckstopper

• ASTM F2656 M40:P2

of the TS9-40 and subjected to

Ezi Security Systems and based

TS9-40 fixed or removable

• CWA 16221 Fixed bollard V/

impact by a 7500kg truck at

on truly innovative technology.

40mph (64kmph) at the UK’s MIRA

https://www.ezisecurity.com.au/

test laboratory.

product/pas68-slimline-rising-

crash tested bollard system,

[N2]7500/64/90:2.2/15.0

incorporating the massive spring

Frequently, assessed risk areas

steel componentry and highly

are located within CBDs and

adaptable triple array foundation

cityscapes where underground

success; the “RB002-40” arrested

system proven at 50mph in the

services inhibit deep foundations.

the 7500kg N2 truck conceding

TS9-50.

The TS9-40 system requires a

less than one metre penetration.

the extreme performance TS9-40

The TS9-40 was successfully

This test was an astounding

bollard-semi-auto-b/ For further information about

foundation of only 200mm in

This is completely unprecedented

and RB002-40 HVB systems, or

tested at the UK’s MIRA Test

depth and the unique foundation

by a retractable bollard system in

any of Ezi’s comprehensive range

Centre in August 2018. The

design permits individual socket

this class, let alone one deployable

of perimeter protection solutions,

system conceded unprecedented

boxes to be swiveled, allowing

within 90 seconds from its

contact Rod Acland on 0412 120

minimal penetration of 2.4m

the bollards to follow a curved

450mm deep ‘coffin enclosure’ by

984, rod@ezisecurity.com, or sales

(dynamic) and 2.2m (static) for

barrier line during installation,

one person with a battery drill,

@ezisecurity.com Ph 1 300 558 304,

a shallow foundation (200mm)

even accommodating ‘stepping’

without need of electrical power

or visit www.ezisecurity.com.au n

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 89


PRODUCT SHOWCASES

EXTREME'S NEW IoT SECURITY AND AUTOMATED THREAT MITIGATION SOLUTION FOR THE DIGITAL ENTERPRISE Technology vendor Extreme Networks has launched a new product designed to monitor and secure IoT devices that are connected to the corporate network. With IoT devices ranging from million-dollar smart MRI machines to five-dollar sensors, they are increasingly becoming the weak point for networks and device-level security alone can’t be trusted to secure endpoints. The ExtremeAI™ Security application is a new class of network security that leverages artificial intelligence and machine learning to identify and remediate advanced threats against IoT devices.

90 // SECURITY SOLUTIONS

ExtremeAI Security delivers deep visibility and detection of malicious traffic, and real-time monitoring of IoT devices for behavioural anomalies, to identify and stop cyberattacks from moving across networks. Through fully-automated remediation of suspicious devices and traffic, ExtremeAI Security ensures threats are contained without manual intervention. Extreme’s powerful traffic analytics and visibility capabilities are embedded in this new security solution, bringing added peace of mind and a much-needed extra layer of security to enterprise networking.

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmedia.com/newsletter

MOBOTIX Cactus Concept: MOBOTIX launches first Cactus Patch Langmeil, June 24th 2019 –

and closing them immediately

released Cactus Patch guarantees

necessary information about

MOBOTIX cameras and solutions

to keep it that way,’ explains

users of MOBOTIX cameras

the available Cactus Patch and

rightly have a reputation for

Thomas Dieregsweiler, Head

from the M10 series, which

a recommendation to install the

being particularly cyber-secure.

of Product Management at

was launched in 2004, up to the

software immediately.

MOBOTIX customers all over

MOBOTIX AG. ‘We do this to the

current models the best possible

the world trust the reliability

point that we anticipate the latest

protection against cyber-attacks

can be downloaded from the

of products developed and

technological developments

in the future. ‘This allows us

MOBOTIX website: https://www.

manufactured in Germany to

and analyse how they could

to protect the longevity of our

mobotix.com/en/cactus-concept-

protect their images and analysis

affect the cyber security of our

products and ensures that the

cyber-security

data from unauthorised access

products and solutions. If we see

older MOBOTIX systems that are

From there, a link takes you

and to prevent an insecure

a potential threat, we will release

still in use continue to be cyber-

directly to the Cyber Protection

interface from offering hackers

an appropriate security update,’

safe,’ says Dieregsweiler.

Guide, which contains all the

an opening.

says Dieregsweiler.

The hard work pays off, as

MOBOTIX is now releasing a

The Cactus Patch will be

The MOBOTIX Cactus Concept

information you need to protect

available to all MOBOTIX

MOBOTIX products against cyber-

evidenced by the fact a MOBOTIX

Cactus Patch for the first time.

customers free of charge and

attacks: https://www.mobotix.

camera has never been hacked.

All MOBOTIX cyber security

is easy to install. MOBOTIX has

com/sites/default/files/2018-02/

‘We are constantly working on

activities are described in the

also published customer and

Mx_CyberProtectionGuide_

identifying possible security gaps

Cactus Concept. The newly

partner newsletters with all the

en_20180214.pdf n

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 91


PRODUCT SHOWCASES STRATEGIC PARTNERSHIP: MOBOTIX AND REALNETWORKS DEVELOP LIVE VIDEO FACIAL RECOGNITION Langmeil, June 17th 2019 — At

companies and our customers,”

at the entrance and other

in-house production facility

the beginning of 2017, MOBOTIX

says Mathias Grünwald, Senior

locations within the museum to

in Germany and operates

and RealNetworks established

Lead Account & Service

automatically count the number

distribution companies in New

their strategic partnership.

Management at RealNetworks.

of people by time of day, using

York, Dubai, Sydney,

demographic breakdowns, such

Paris and Madrid. Customers

Almost everyone has known

“The new MOBOTIX is

RealNetworks since the 1990s,

increasingly developing into a

as gender and age. The same

worldwide trust in the longevity

when the Seattle-based company

base platform for a multitude of

system can also analyse people’s

and reliability of MOBOTIX

introduced the first online audio

industryspecific tasks – Beyond

moods. This solution is made

hardware and software. The

streaming solution, RealAudio®.

Human Vision,” says Lausten.

possible by the combination

flexibility, built-in intelligence

Years of continuous innovation

Since joining the company,

of versatile, high-precision

and unparalleled data security

and multiple generations of

Lausten has transformed

MOBOTIX cameras and the

of the company’s solutions

RealVideo® then gave birth

MOBOTIX from a highly secure

equally high-precision SAFR facial

are valued in many industries.

to the company’s most well-

but self-contained product

recognition platform.

MOBOTIX products and solutions

known product, RealPlayer®,

provider into an open and flexible

which is still used millions of

solution and system platform

solutions based on MOBOTIX

such as industrial manufacturing,

times every day for streaming

that continues to identify cyber

cameras are already being used in

retail, logistics and healthcare.

and downloading videos. More

security as its top priority. This

numerous vertical markets. “Since

With strong and international

recently, RealNetworks has been

means that all MOBOTIX products

MOBOTIX cameras were designed

technology partnerships, the

steadily expanded its expertise in

are now ONVIF-compliant, there

as the best video surveillance

company will continue to

the area of artificial intelligence

is a dedicated NAS solution and,

cameras and SAFR is regarded

expand its universal platform

(AI) and machine learning. “Our

with the MOBOTIX MOVE series, a

as the leading facial recognition

and develop new applications in

innovative strength, quality

PTZ camera has been launched on

platform for live video, together,

the future.

standards and commitment to

the market as a complementary

we are able to deliver solutions

high-quality, customer-oriented

independent product line.

that go far beyond recognition,”

About RealNetworks

says Grünwald.

Building on a legacy of digital

solutions form the basis of

“Artificial Intelligence will

SAFR facial recognition

help customers in industries

our strategic partnership with

play an increasingly important

RealNetworks,” explains Thomas

role in all areas of IT, meaning

more than just monitoring video

RealNetworks has created a

Lausten, CEO of MOBOTIX AG.

video surveillance as well – and

from a camera feed. Together

new generation of products that

with Konica Minolta, we have a

with our selected strategic

employ best-in-class artificial

from RealNetworks, is an

leading technology partner by

partners, MOBOTIX is creating

intelligence and machine

exceptionally accurate, artificial

our side in this area,” explains

solutions based on artificial

learning to enhance and secure

intelligence-based system for

Christian Heller, MOBOTIX Sales

intelligence that make events

our daily lives. SAFR (www.safr.

facial and mood recognition

Director for Germany, Austria

predictable and that can initiate

com) is the world’s premier

that has been optimised for

and Switzerland. “In conjunction

countermeasures to protect the

facial recognition platform for

the challenges of live video.

with our new openness and our

environment, valuables and

live video. Leading in real-world

MOBOTIX and RealNetworks

drive to produce cyber-safe

people,” emphasises Lausten.

performance and accuracy as

see enormous market potential

products and solutions, we can

for further joint projects and

work with our strategic partners

About MOBOTIX

SAFR enables new applications

customised solutions.

like RealNetworks to strengthen

MOBOTIX is a leading

for security, convenience and

the market and develop new

manufacturer of premium-

analytics. Kontxt (www.kontxt.

an excellent market reputation

solutions for a variety of vertical

quality intelligent IP video

com) is the foremost platform

for high quality, cyber security,

markets,” he adds.

systems and sets standards for

for categorising A2P messages

innovative camera technologies

to help mobile phone network

SAFR™, the latest solution

“MOBOTIX cameras have

reliability and direct applicability

MOBOTIX’s partnership

“Beyond Human Vision means

media expertise and innovation,

evidenced in testing by NIST,

for facial recognition. Our

with RealNetworks and SAFR

and decentralised security

operators build customer

partnership has grown rapidly as

demonstrates this in unique

solutions with the highest level

loyalty and generate new

we also share the same values,

ways: “We are currently working

of cybersecurity. MOBOTIX was

revenue through text message

such as a commitment to quality,

together on an exciting project

founded in 1999 and is based in

classification and anti-spam

innovation, data security and

for a high-profile European

Langmeil, Germany. MOBOTIX

filters. For information about our

building strategic partnerships to

museum,” says Lausten. The

has an in-house research and

other products, please visit www.

generate synergies for both our

museum uses SAFR live analytics

development department, an

realnetworks.com. n

92 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmedia.com/newsletter

CHIEF FINANCIAL OFFICER INCREASES EBIT FORECAST FOLLOWING STRONG MOBOTIX FIGURES FOR THE FIRST SIX MONTHS MOBOTIX AG ended the first six

of EUR 3.1 million compared to

2018/19 as a whole . Accordingly,

initiated in the fiscal year 2017/18.

months of the fiscal year 2018/19

the same period in the previous

Kiener has revised the outlook

Among other things, MOBOTIX

with a strong increase in revenues

year (EUR -0.8 million). The first

from 7 May 2019 for the fiscal year

successfully met the challenges of

and EBIT. At EUR 35.4 million,

six months of 2018/19 thus ended

2018/19 of EUR 1.4 million upwards.

the industry with the introduction

revenues in the first six months of

with a return on sales of 4.2 percent

The forecast for MOBOTIX’s five-year

of new camera lines, numerous

the current fiscal year rose by 11.6

(first six months of 2017/18: -2.4

plan, which envisages sales of at

software innovations, and strategic

percent compared to the same

percent).

least EUR 100 million and an EBIT

technology partnerships. In addition,

margin of 12 percent by the fiscal

an agreement was signed with Konica Minolta in March 2018 to

period in the previous year. EBIT

As a result of the company’s

(earnings before interest and taxes)

positive development, Klaus Kiener,

year 2022/23, remains unchanged.

accounted for 6.6 percent of total

Chief Financial Officer at MOBOTIX,

The MOBOTIX Management

operating performance, amounting

forecasts EBIT within a range of

Board sees the positive

and software technology to provide

to EUR 2.3 million for the reporting

approximately EUR 1.4 million to

development of the company as

innovative solutions and open up

period. This represents an increase

EUR 1.8 million for the fiscal year

full confirmation of the strategy

new markets. n

securitysolutionsmagazine.com

further develop MOBOTIX hardware

SECURITY SOLUTIONS // 93


PRODUCT SHOWCASES

STID MOBILE ID OPEN & SECURE ECOSYSTEM STid Mobile ID is a global, open ecosystem enabling end-to-end digitisation of access control that brings convenience to the personal identification experience.

The ecosystem is an online

APIs (Application Programming

or in the mobile device fleet

Certification (CSPN) from the

platform that generates,

Interfaces) and the STid Mobile ID

management systems (MDM)

French government agency ANSSI

distributes and administers

mobile application development

of large corporations, access to

for its access control solutions.

dematerialised access cards. STid

kit open up the ecosystem.

the WEB APIs, use of the SDK

With eight awards, STid offers

licence, and personnalisation

the product line most awarded in the world by security experts.

Mobile ID is also an Android-

The WEB APIs are intended

and iOS-compatible mobile

for transparent use of our online

of dematerialised badge design

application. This application,

platform using third-party

using the online platform. The

developed by STid, is an electronic

service provider software. The

STid Mobile ID app offers an

badges come with state of the

portfolio of access badges used

mobile application development

unclonable badge free of charge.

art cryptographic protection

to authenticate with Architect

kit (SDK) allows the instinctive

Our business model is based on

and security protocol. Our free

Blue multi-technology readers,

authentication modes and

the management of high-security

badge is much more secure than

another core component of the

the security system, tested by

dematerialised cards with a level

a simple, basic MIFARE credential

ecosystem that uses Bluetooth

independent laboratories, to be

equivalent to DESFire EV2.

since it’s not clonable. The

Low Energy (BLE) and NFC

embedded in mobile applications

technologies. Another application

intended to integrate the access

models that provide flexibility,

badge is roughly equivalent to

also developed by STid allows an

control service.

freedom (pay for what you use)

DESFire EV2.

edited configuration to be loaded

The ecosystem offers a

Our offering includes several

All our dematerialised

security level of our high-security

and peace of mind (monthly

using the online platform in the

customisation service that allows

payments) for our customers

Architect Blue readers via the

customers to create their own

as they digitalize their access

Access control & instinctivity

BLE channel.

dematerialised badge design.

control system.

STid Mobile ID takes the user

STid offers its extensive

experience further. Security can

Lastly, to make the

quickly become constraining

allows you to individualise

No compromises on security

protocol based on industry

the STid Mobile ID application

STid has been developing its

to rejection of the solution.

standards in order to secure

for customers that don’t have

security expertise since 1996.

With this ecosystem STid has

exchanges via BLE technology.

development capabilities.

Security has become a pillar

removed all constraints. Security

of the company’s values, and

becomes instinctive with our five

one for which STid makes

identification options: badge,

no compromises.

slide, tap-tap, remote, and hands-

security expertise and has

ecosystem truly global, STid

established a cryptographic

Global & Open STid Mobile ID is much

Free access to the ecosystem

more than a Client-Server

Access to the entire ecosystem

A recognized pioneer in its

application. A third-party can

is free. This includes access to

field, STid was at the forefront

fully incorporate the solution in

the online platform, the mobile

by being the first manufacturer

their own ecosystem. The WEB

apps available on the stores

to obtain First Level Security

94 // SECURITY SOLUTIONS

for users, and constraints lead

free… n More information on www.stidsecurity.com

securitysolutionsmagazine.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.