A U S T R A L A S I A’ S L E A DI N G S E C U R I T Y R E S O U R C E F O R BU S I N E S S A N D G O V E R N M E N T
JULY 2019 ISSUE 117
THE CHALLENGE
OF BIO TERRORISM
S280 Industrial is an IP66 rated 19” cabinet suitable for harsh and unforgiving environments. Air Conditioning available.
The last thing on your mind is the first thing on ours.
DESIGNERS & MANUFACTURERS OF 19” RACK SYSTEMS
Whist MFB have an extensive range of standard IP rated enclosures from cable entry ports, special size enclosures, wall mount applications, cooling, fans, louvers, sun shades or insulation and even manufactured to be supplied in knockdown form. Rated to IP66 dust and moisture specification the MFB’s S280 Industrial range is an enclosure designed for harsh or tough industrial and outdoor environments. MFB can produce custom build enclosures to your specific needs.
AUSTRALIAN MADE MAKES AUSTRALIA
www.mfb.com.au
VIC NSW -
P (03) 9801 1044 P (02) 9749 1922
E sales@mfb.com.au E sydney@mfb.com.au
ISSUE 117
FEATURES
46
cover story
78
26 34 50
Designer viruses that can target a single person or an entire ethnic group. Mass casualty events on an unprecedented scale. Silent killers that we cannot detect or stop. These are just some of the challenges of bioterrorism. In this issue’s cover story, Professor Raina MacIntyre looks at the evolving and complex challenges of bioterrorism. Professor MacIntyre is National Health and Medical Research Council (NHMRC) Principal Research Fellow and Professor of Global Biosecurity. She heads the Biosecurity Program at the Kirby Institute, which conducts research in epidemiology, vaccinology, bioterrorism prevention, mathematical modelling, genetic epidemiology, public health and clinical trials in infectious diseases.
26 THE OSINT CONNECTION: INTELLIGENCE IN
EXECUTIVE PROTECTION
REGULARS
30 TO G OR NOT TO G?
Beware the zombie apocalypse!
Most people in the security industry are familiar with the use of video analytics in CCTV applications. However, as the technology grows and evolves, what other applications and markets could we expect to see adopting the use of video analytics?
54 RECREATIONAL OUTRAGE
Is society becoming more angry? If so, why? What might be the causes? Longtime contributor, author and industry commentator Don Williams looks at the issues around the emergence of recreational outrage.
70 2019 SECURITY EXHIBITION & CONFERENCE Who will be speaking at Security 2019? Which companies are exhibiting? What products are on display? Get all the information you need to plan your visit to Australia’s leading security event.
C
M
06 LETTER FROM THE EDITOR
38 FUTURE USES OF VIDEO ANALYTICS IN CCTV
66 38
Travis Lishok, founder of Executive Protection Nexus, explores how one can conduct an open-source intelligence (OSINT) investigation and explains the value this type of investigation can bring to a protective operation. The article draws on real-life events leading up to a political fundraiser that took place in a large Silicon Valley convention centre some years ago.
We examine the advances in mobile communication technology and look at the potential impact of those advances on technical surveillance countermeasures.
CONTENTS
08 LEADERSHIP
Jason Brown examines how security standards both within Australia and internationally are being impacted by current world events.
10 CYBERSECUIRITY
12 HUMAN RESOURCES
Are your casual workers really casual?
14 RISK MANAGEMENT
Kevin Foster looks at the components and requirements of safe design for security practitioners.
16 COMMUNICATIONS
If you are not crisis prepared, then you had better read this article – quickly!
18 BUSINESS DEVELOPMENT
How do you develop a professional referral group to help grow your business?
20 THINKING ABOUT SECURITY
Why is it more exciting now than ever before to be a security professional?
22 EVENTS CALENDAR
A look at upcoming industry events.
34 OPERATIONS
Y
Why is it so hard to create a safe training environment that achieves results?
CM
42 BUSINESS
MY
What is the best strategy to help grow your business?
CY
50 AVIATION SECURITY
CMY
Steve Lawson looks at great ideas in aviation security that have not worked out quite as planned.
K
58 CCTV
Internationally renowned CCTV expert Vlado Damjanovski explains the new (or not so new) IP VSS Standards.
62 CYBER SECURTY
Why is it that companies are still failing to report data breaches despite the recent introduction of legislation making reporting a requirement?
66 PROFESSIONAL DEVELOPMENT
How can a risk assessment help you develop more effective operational security systems?
78 LOSS PREVENTION
How is loss prevention evolving and what does this mean for loss prevention professionals?
84 PRODUCT SHOWCASES
74 THE WAR OF THE ALGORITHMS
As algorithms become increasingly complex, AI has evolved to become a crucial aspect of cybersecurity solutions – with the technology being applied across various fields, including spam filter applications, fraud and botnet detection. Can relying too heavily on these technologies create a false sense of security? 4 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
NEW!
FROM THE EDITOR FROM THE EDITOR
www.securitysolutionsmagazine.com
EDITORIAL www.securitysolutionsmagazine.com
EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon
Jason Brown, Greg Byrne, Julian Claxton, Vlado Damjanovski, CONTRIBUTORSKevin Foster, Alex Ganin, Mark Gabrelotto, Tony Jacques, Kay,Kevin SteveFoster, Garry Barnes, Jason Brown,Richard Greg Byrne, Lawson, Travis Lishok, Dr Justin RainaLawrence, MacIntyre, Richard Kay, Steve Lawson, Scott Richard Menear, Tim Rippon, Ami Toben, Don O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Williams, Tony Zalewski Anne Speckard, Alex Sidernko, Ardian Shajkovci, Ami Toben, Simeon Votier
ADVERTISING Keith Rozairo ADVERTISING
Keith Rozairo PHONE 1300 300 552 PHONEkeith@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL keith@interactivemediasolutions.com.au
DESIGN AND PRODUCTION Jonathan Rudolph DESIGN AND PRODUCTION
Jonathan Rudolph PHONE 1300 300 552 PHONEgraphics@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL graphics@interactivemediasolutions.com.au
MARKETING AND SUBSCRIPTIONS MARKETING AND PHONE 1300 300 552SUBSCRIPTIONS
PHONEadmin@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL AUD admin@interactivemediasolutions.com.au $62.00 inside Aust. (6 Issues) $62.00 AUD Aust. (6 (6 Issues) $124.00 AUDinside outside Aust. Issues) $124.00 AUD outside Aust. (6 Issues)
ACCOUNTS ACCOUNTS PHONE 1300 300 552
PHONEaccounts@interactivemediasolutions.com.au 1300 300 552 EMAIL EMAIL accounts@interactivemediasolutions.com.au
PUBLISHER PUBLISHER
ABN 919463 ABN56561,606 606Joseph 919463 Blackburn, Victoria 3130 Level Level 1,34 34 Joseph St, St, Blackburn, Victoria 3130 PHONE PHONE 1300 1300300 300 552 552 EMAIL enquiries@interactivemediasolutions.com.au EMAIL enquiries@interactivemediasolutions.com.au WEBSITE WEBSITE www.securitysolutionsmagazine.com www.securitysolutionsmagazine.com DISCLAIMER DISCLAIMER
The of this this Thepublisher publishertakes takes due due care care in in the the preparation preparation of magazine and magazineand andtakes takes all all reasonable reasonable precautions precautions and makes the accuracy accuracy of of makesall allreasonable reasonable effort effort to to ensure ensure the material but is is not not liable liable materialcontained contained in in this this publication, publication, but for The publisher publisher forany anymistake, mistake, misprint misprint or or omission. omission. The does not assume any responsibility or liability for any does not assume any responsibility for any loss inaccuracy lossor ordamage damage which which may may result from any inaccuracy or use of of oromission omissionin inthis this publication, publication, or from the use information makes no no informationcontained contained herein. herein. The publisher makes warranty, any of of the the warranty,express express or or implied implied with respect to any material materialcontained contained herein. herein.
t appears to be a strange quirk of reality that we find ourselves living in aAustralia world, atreally a point in time when, oes take security despite everyone being more seriously? Yes, Government claims interconnected appear to be to,than and ever somebefore, of the we corporate more divided sector than atdemonstrate any other point in history. a passing E asefrom of international travel, combined interest time-to-time, but what of the with decreasing costs andstreet? increased average man and travel woman on the Do we immigration, means that the world feels honestly take security seriously or do we, like as aa much smaller Where it used to take nation, just payplace. lip service to once the idea a month to travel by ship from one side of the of security? globe to the other, thewe same tripbe canthankful now bethat As we enter 2018, should achievedhas in the space of a day. Where less than Australia never suffered a major terrorist incident likes of 9/11, the Boston bombings, 50 yearsthe ago, a person living in the Western the bombings of July 7, 2005 the life world might conceivably live in hisLondon or her or entire terrorist attacks of October 12, 2002 in Bali. without encountering people from developing However, as a result, the Australian community nations, today migration and immigration have has become somewhat complacent with regard turned the world into one big multicultural melting to security. I often hear many of our readers who pot. And the divides between cultures, religions, are security managers within large corporations political ideologies and nations seem wider than comment on the differences between attitudes ever before. to security and America, where they One of in theAustralia unfortunate side effects of these often have to travel and work. According to many growing divides is that we appear to be facing security managers, Americans understand that what feels like an ever-increasing raft of security terrorism is aFor clear and present danger and a challenges. almost 20 years, terrorism fact of daily life and thus, they treat security has presented an ever-looming challenge in and security workers with the due respect. In Western countries and yet, in the face of rapid contrast, they believe that Australian’s have a technological advances, we now find ourselves very blasé attitude towards security and it is this facing challenges that make traditional terrorism attitude that makes us much more vulnerable pale by comparison. to attack. In this issue’s cover story, Professor Raina In my opinion, having recently travelled MacIntyre looks at the evolving and complex through Egypt and Jordan, they are correct. challenges of bioterrorism. Professor MacIntyre (MBBS Hons 1, FRACP, FAFPHM, M App Epid, PhD)
I D
is National Health and Medical Research Council (NHMRC) Principal Research Fellow and Professor of Global Biosecurity. She heads theattitude Biosecurity Australian’s do have a very relaxed the Kirby Institute, which conducts toProgram security at because they believe, rightly or researchthat in epidemiology, bioterrorism wrongly, “it will never vaccinology, happen here”. This genetic is prevention, a sentimentmathematical we can only modelling, hope remains true. epidemiology, health and clinical trials in However, as the public old axiom states, one should infectious diseases. always expect the best but plan for the worst and Thetoarticle is both a fascinating and terrifying prepare be surprised.
insight into aone threat that isnot unlike I believe Of course, should haveanything to rely upon the world hasdevastating faced before. The potential forin some form of incident to occur organisations or groups to inflict harmseriously. upon targets order to force people to take security ranging single person to worldwide mass There is a from greatadeal that the security industry can do to educate business community about casualties is trulythe alarming. I would encourage the benefitstoofread taking seriously. everyone the security article and take timeIntopast follow issues Security Solutions Editor-At-Large RodThis is a the links Professor MacIntyre has included. Cowan has written security act as huge challenge of about which how we should all can be mindful. a differentiator for business and giveifcompanies On a separate but related note, you have a competitive edge. not yet had the chance to check out the Security If we have learnedinanything tragic Solutions podcast, which wefrom feature in-depth events that have occurred globally in recent conversation with fascinating security experts like years, it must be that the world has changed Professor MacIntyre speaking on all manner–of permanently – andtopics, we cannot pretending security-related then Ikeep would encourage that has wasand not easily an isolated incident youit to donot. so.9/11 It is free accessible from and if groups like ISIS have their way, such iTunes, popular streaming services such as Apple attacks will become much more frequent. Spotify, Google Podcasts or the Security There Solutions is a great deal more work to be done to ensure
website. Why not check out our sister podcast, ASIAL Security Insider, while you are at it, available culture within organisations and the broader through all the same sources. community that will enable Australian’s to be If you have a guest or a topic you would safe and secure. And the work must begin with particularly like us to feature, then please send me security professionals. Let’s make 2018 the year an email. that we create the kind of effective security
that Australia begins to take security seriously. n
Until next time. n
The reproduced Thecontents contentsof of this this magazine magazine may not be reproduced inANY ANYform formin in whole whole OR OR in in part without WRITTEN in WRITTEN permissionfrom from the the publisher. publisher. Reproduction includes permission includes copying,photocopying, photocopying, translation translation or reduced to copying, to any any electronicmedium medium or or machine-readable machine-readable form. electronic form.
WRITTENCORRESPONDENCE CORRESPONDENCE TO: WRITTEN
Level1, 1,34 34 Joseph Joseph St, St, Blackburn, Blackburn, Victoria Level Victoria 3130 3130 1300300 300552 552 1300 enquiries@interactivemediasolutions.com.au enquiries@interactivemediasolutions.com.au
John Bigelow
PR O
SECURIT Y
PR
RALIA LTD UST FA RALIA LTD
Official Official Partners Partners O rigin a l Siz e Original Size
PR O
Y P R OV RYI TP R O V I D I D E E RCIUT
CU
SE SE
SECURITY
N
USTRA F SAT R A L L I A A OU IA
STRALIA LTD AU OF STRALIA LTD AU
SECURITY
O C I AT I ASS ON O C I AT I ASS O
RS
SPAAL SPAAL
OF
OF
PR O
RS
SSOCIAT RS A IO DE N SSOCIAT VI RS A IO DE N VI
D LT D LT
SECURIT Y
SSOCIATI ON O SSOCIATI RS A ON DE O VI
RS A DE VI
UST FA
O
Editor
blue colour changed to this colour green. blue colour changed to this colour green.
COPY/ARTWORK/TYPESETTING APPROVAL COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE Please proof read carefully of this material BEFORE signing your approval to print.ALL Please paycopy/artwork/typesetting special attention to spelling, punctuation, signing your approval numbers, to print. Please pay special to spelling, punctuation, dates, times, telephone addresses etc, asattention well as layout.It is your responsibility to dates, times, telephone numbers, addresses etc,Press as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman assumes no responsibility our attention anybeen corrections. Minuteman Press assumes responsibility for bring errorstoafter a proof has authorised to print and print re-runsno will be at your cost. for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................ Signed.................................................................. Date........................
// SECURITY SECURITY SOLUTIONS SOLUTIONS 46 //
John Bigelow Editor
securitysolutionsmagazine.com securitysolutionsmagazine.com
FIRST AUSTRALIAN MADE PAS68 SHALLOW MOUNT BOLLARDS BOLLARD RATINGS
PAS68 rated bollard with ‘ZERO’ penetration
CSG10840 PAS68:2010 V/7500(N2)/64/90:0.0/17.9 ‘ZERO’ penetration CSG10850 PAS68:2010 V/7500(N2)/80/90:2.8/9.8 Articulated linkage not only allows for each bollard unit to accommodate gradients up to 3.6°, but allows for convex and concave arrays
Available in galvanised finish or fitted with stainless steel sleeve, can be painted in different colours LEDA has been at the forefront of designing, manufacturing
LEDA shallow mount bollards install
and installing crash rated bollards for more than 20 years protecting Australian people and its assets. LEDA’s CSG10840 and 10850 are the first Australian manufactured PAS68 rated shallow mount bollards that requires a foundation depth of only 200mm.
Shallow mount bollards around tree roots
The growing demand to install bollards in CBD locations often means encountering sub-pavement services which may need to be moved or relocated to accommodate conventional concrete footings. In many instances it may be impossible to obtain the required footing depth or to maintain the impact rating needed. This situation has driven LEDA to manufacture its own PAS rated shallow
Shallow mount bollards around existing underlying services
mount bollards providing cost and lead time savings to clients as well as supporting Australian manufacturing.
FOR MORE INFORMATION Contact your nearest LEDA sales office or visit our website www.ledasecurity.com.au
Follow us
Call 1300 780 450 Email sales@ledasecurity.com.au
LEADERSHIP
BY JASON BROWN
he last six months
and private sector systems
have seen a
continues to increase, as does
Chinese state of approving a global
co-convenors of the new working
significant
the threat from malicious
campaign of online theft and
group. A seminar to promote
reassessment of the
insiders. An increasing
interference, Canberra is taking
interest and participation on these
security environment, both within
number of countries are
a far sterner diplomatic line with
standards is planned for Sydney in
Australia and internationally. The
pursuing a cyber espionage
Beijing than usual. Tobias Feakin,
August and invitations will go out
Christchurch tragedy might have
program as this offers high
Australia’s ambassador for cyber
through professional bodies and
happened here if not for good
returns for relatively low cost
affairs, said, “The fact that this is
public announcements.
intelligence and police work that
and plausible deniability.
the first time we have ever actually
prevents the activities of extremist
The continued evolution of
named China as responsible for
these and related security and risk
Islamist elements from creating
technology increases the
one of these kinds of activities is
standards at the ASIAL Conference
similar carnage in Australia.
sophistication and complexity
enough of a serious indication of
on Friday 26 July at 9am for the
of attacks, while also becoming
how acute an issue we feel this
Executive Program. I will be present
potentials on the radar for over
increasingly accessible.
is... This is the theft of intellectual
most days of the ASIAL Conference,
a decade, but they are gathering
• The harm caused by hostile
property. There has been an impact
so feel free to approach me regarding
pace, alongside the resurgence
intelligence activity can
on Australia.”
participation in the work. n
of foreign interference and
undermine Australia’s national
espionage. The traditional methods
security and sovereignty. It can
increasing support for business
of espionage have re-emerged
damage Australia’s international
from ASIO, in partnership with
Security Director for Thales in
in force and their exponential
reputation and degrade our
Defence, to assist with the
Australia and New Zealand. He is
expansion through cyber-enabled
diplomatic and trade relations.
understanding and defence against
responsible for security liaison
attacks has added multiple
Both espionage and foreign
these threats. But it is not just
with government, law enforcement
dimensions for consideration.
interference can inflict
the role of Government; private
and intelligence communities to
Intellectual property and industrial
economic damage, degrade or
industry and security providers
develop cooperative arrangements
espionage has expanded rapidly as
compromise nationally vital
need to work with Government to
to minimise risk to Thales and
a result of global competition for
assets and critical infrastructure,
build integrated national capability.
those in the community that it
economic dominance.
and threaten the safety
T
These types of events have been
The Australian Security
of Australians.
By directly accusing the
Management – Infosys in India, as
I will be running a workshop on
Government has responded by
Standards Australia and
Jason Brown is the National
supports. He is also responsible
the International Organization
for ensuring compliance with
Intelligence Organisation (ASIO) has
The confirmation came after the
for Standardization (ISO) are
international and Commonwealth
advised that espionage and foreign
U.S. Department of Justice charged
working to develop or revise the
requirements for national security
interference targeting Australian
two Chinese nationals for allegedly
current standards on security-
and relevant federal and state
interests remains pervasive and
carrying out hacking on behalf of
related matters. The Australian
laws. He has served on a number
enduring. ASIO has observed
Beijing’s Ministry of State Security.
Employment Screening standard is
of senior boards and committees,
increased targeting of Australian
In a strongly worded statement,
being reviewed to provide a ‘whole
including Chair of the Security
interests in Australia and abroad
Australian Foreign Affairs Minister
of working life’ security assessment
Professionals Australasia; member
through a variety of methods and
Marise Payne said cybercrime
model, which can be integrated into
of ASIS International Standards and
against an array of sectors.
had “the potential to undermine
business processes for reducing
Guidelines Commission, and Chair
global economic growth, national
the likelihood of insider threat,
of Australian Standards Committee
foreign intelligence services as a
security and international stability.”
and work has progressed on a new
for Security and Resilience. As
result of:
The minister called for China to
draft of the Australian Handbook
of February 2017, Jason has
• The range, scale and
“refrain from cyber-enabled theft
on Security Risk Management. ISO
been appointed Chair of the
sophistication of foreign
of intellectual property, trade
has agreed to the revision of the
International Standards Committee
powers engaged in hostile
secrets and confidential business
International Supply Chain Security
for Risk Management. Jason can
cyber espionage activity
information with the intent of
Standards ISO28000, with myself
be contacted at jason.brown@
against Australian Government
obtaining a competitive advantage.”
and Rajeev Thykatt, Head of Risk
thalesgroup.com.au
Australia is a target of hostile
8 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
The Missing Link in an
Access Control System
Geoff Plummer Executive Business Manager - Davcor Group
On entry to most of the major capital city CBD buildings you are confronted with a host of access control initiatives to govern who is allowed and who is not allowed access. Be it the presentation of your card to a reader to open a turnstile, activate the lift or trigger an automatic door; access is controlled in an efficient and easily managed way and our security programmed brains believe that all is good.
I pose a question. How many of these doors/lifts/turnstiles have a mechanical key override? The answer is many, not all, but many.
I would then need to pose another question. Are the mechanical keys secure? Are the keys stored in a secure place and are not lost? Also, are they secure from attack and duplication? Remembering that many keys can be visually read and even reproduced from a photograph. The answer is as soon as they are in a person’s hand that the keys can be compromised by copying, duplication or even 3D printing.
My observation is that at many sites, extremely effective and costly access control systems are installed. These systems are hugely effective in monitoring and controlling access to the building however many of these systems have a very basic weak point that allows the whole system to be compromised. The chink in the armour is,
They are fitted with a conventional mechanical cylinder. This cylinder has no audit trail, can be in many cases mechanically manipulated (picked). Added to which any access to a key by an unscrupulous person can result in it being read, impressioned (in the way of an impression into a soft material) or photographed and 3D printed. So now what? A solution is available. Install an electromechanical key system such as EKA CyberLock. EKA CyberLock makes a range of cylinders to suit most common locks in the Australian market. The Cylinders are opened with CyberKeys, both of which are managed using software in the same way as an access control system. The management software allows access to be granted when and where, or simply timed out or even revoked when required. CyberKeys are programmed through Communicators such as a smart app and Bluetooth and a 20-key vault cabinet. The entire system can be audited and to make it even simpler can potentially be integrated with your existing access control system.
EKA | CyberLock - Division of Davcor Group Pty Ltd. 1300 722 311 - WWW.EKACYBERLOCK.COM.AU
CYBER SECURITY
BE CYBER-AWARE IF YOU’RE A SMALL BUSINESS
T
BY TIM RIPPON
here is a common
attacks were up 424 percent last
protection include:
Mentoring Service (SBMS), an
misnomer that only
year (2018) for small businesses?
• semi regular network
independent, not-for-profit
large-scale
Year on year figures like these
businesses get
beg the question, why are we
attacked or hacked by the cyber
seeing such a dramatic increase
criminals. However, this statement
in the number of attacks carried
is far from the truth.
out by cyber-criminals against
In the media, there is a real
small businesses?
penetration testing • the implementation of access management
Association, can be a good first step to advise in this area. SBMS can be contacted on 1300 816 817. n
• employing firewalls, antivirus, and endpoint security solutions • the establishment of computer
Tim Rippon is an author, speaker and trainer of
use, device, and password
cybersecurity and business
policies
continuity. He holds a certified
focus on the destruction caused
For starters, many small
by cyber criminals on large scale
businesses do not put suitable
business. However, the impact to
safeguards in place to protect their
small business is more drastic,
valuable business data. What’s
email security solutions (such
(ISO 27001), certified Master of
often resulting in the complete
more, they often lack the in-house
as anti-phishing solutions, spam
Business Continuity (ISO 22301)
demise of the targeted business,
skills required to handle cyber
filters, email signing certificates)
and Lead Cyber Security Manager
with approximately 60 percent
security adequately. Additionally,
of small companies that suffer a
many small businesses invest
security awareness training and
is actively involved in various
cyber-attack being out of business
less than $500 per year in cyber
phishing simulations
industry groups, including the
within six months.
security products. Many business
• the implementation of effective
• conducting employee cyber
• developing and maintaining
Master of Information Security
(ISO 27032) from PECB. Tim
Australian Women in Security
owners are complacent about
an incident response, business
Network (AWSN) and the Business
all data breaches target small-to
cyber-security until they have a
continuity and disaster
Continuity Institute, where
medium-sized businesses, hence
breach occur and lose important
recovery plan
he volunteered for five years,
the reputational impact on a small
information, by which time it is
business post-breach can present
too late.
Additionally, 43 percent of
real, long-term challenges when
With all these factors occurring,
• creating and maintaining regular data backups.
including two years being a board member of the BCI Australasia. Tim
Should your business not have the
is founder and director of elasticus,
customer data has been released
it is no wonder the cyber-criminals
skills, expertise or experience in the
advising Australian-based
into the wild.
are doubling down their efforts on
above areas, then outsourcing these
executives on how to best manage
small businesses, it is an extremely
functions to a third-party IT service
cybersecurity, disaster recovery
even more concerning with small
lucrative and profitable business
may well save your business from
and business continuity prior to
businesses seemingly becoming a
for them.
the wrath of cyber-criminals.
the occurrence of a major disaster
The trend looking forward is
favourite target of cyber criminals. According to some sources, cyber-
10 // SECURITY SOLUTIONS
Various methods that should be used to create multi-layered
For those in the eastern states of Australia, the Small Business
or crisis. He can be contacted via mobile on 0417 036 026.
securitysolutionsmagazine.com
Recognise and Analyse Did he ask for self-exclusion?
Is he a banned person?
How old is she?
Are they employees?
When, where did she enter?
Is this valued customer Mia Clark?
New: The ready.set.go face recognition solution Software alone won’t produce optimal results. Our Enterprise Solution brings an all-inclusive, managed system to end users. No upfront cost. No staff training necessary. Cognitec does it all—from system design to hardware and software setup, with affordable subscription pricing covering licensing and services.
See it in action at Security Expo in Sydney, stand B3 FaceVACS-VideoScan alerts to known persons in real time while performing anonymous face recognition to count individuals, analyse demographics and track people flow. www.cognitec.com | info@cognite.com
HUMAN RESOURCES
ABANDONMENT OF EMPLOYMENT: WHAT YOU NEED TO KNOW BY GREG BYRNE
T
he large percentages
However, it is essential to also
of workers in the
look at what approach the Fair
Australian security
Work Commission has taken in
industry currently
specific cases of ‘abandonment of
employed as casuals and part-
employment’.
timers poses risk to the industry.
take an active step to terminate the employment in writing.
the absence. It would also be advisable to make an attempt to contact the
What is Not Abandonment of Employment
employee firstly with a telephone
• When an employee has
sent by email or registered post
call, and, if there is no response, to follow up with a written request
The risk lays in ‘abandonment of
The Case Law
employment’ where a casual or
Generally, ‘abandonment of
provided a medical certificate
requiring the employee to provide
part-time worker either finds more
employment’ is defined as
for an absence (note the
an explanation for their absence by a
secure work with another company
“circumstances where an employee
“temporary absence” provisions
specified deadline.
or leaves the security
is absent from the workplace without
of the Fair Work Act).
industry altogether.
reasonable excuse or has failed to
• When an employee has made
It is imperative that the employer is aware of what provisions govern
communicate with the employer
a workers compensation claim
that particular staff member’s
of what constitutes ‘abandonment
to provide an excuse for being
and is unfit for work while being
employment, whether that be a
of employment’, and what the
absent.” (see Sharp v MCG Group Pty
paid weekly payments under
modern award, enterprise agreement
employer can do about it.
Limited [2010] FWA2357 as per Duty
the claim.
or contract of employment, as
This article will address the issue
The Fair Work Commission (FWC) recently released the outcomes
President Asbury.) Traditionally, an absence of
• When an employee has taken authorised leave.
that particular instrument may contain a specific clause stating
of a review conducted by the FWC
more than three days was evidence
on the issue of ‘abandonment of
a worker has abandoned their
employment’. The review in part
employment and an absence of
established that the employer has
14 days without reasonable cause
Key procedures to follow
dealing with absences which should
consultation obligations where an
showing clearly that they have.
Having regard to the Fair Work
be considered.
employee was absent from work
The Full Bench decision by the
• Unnotified absence from work for up to three days.
how ‘abandonment of employment’ must be handled. Also, an employer may have a workplace policy
Commission’s views on ‘abandonment
Generally, it is best practice in
for three or more consecutive
Fair Work Commission in January
of employment’, an employer is
all circumstances to keep written
working days without authorisation,
2017 of Boguslaw Bienias v Iplex
obliged to follow due process and
records of any absences and the
explanation or notification to the
Pipelines Australia Pty Limited
procedural fairness when seeking to
attempts at contacting the employee.
employer. Further, if;
(2017) noted that, in circumstances
terminate employment due to that
where an ‘abandonment of
employment being abandoned.
“the employee has truly
Prior to assuming that
Finally, once all avenues have been exhausted and there is no
abandoned his or her employment;
employment’ clause existed in
then it is at least arguable that the
the employment contract, the
employment has been abandoned,
provided, an employer should
employer owes the employee no
employer was still required to
it is essential that the employer
always issue a letter stating that
duty of procedural fairness.”
take active steps to terminate the
takes a preliminary step of making
the employee’s employment has
employment as the employee’s
enquiries with all the employee’s
been terminated without notice,
there may be less of an onus on
‘abandonment of employment’ did
managers to check that the
effective immediately, on the basis of
an employer to take steps to make
not equal an automatic termination
employee had not given notice
‘abandonment of employment’. n
enquiries of the absent employee or
of employment. In that situation,
of the absence either in advance,
to give them notice that termination
the abandonment clause in the
or during the absence, which may
of employment will occur.
contract required the employer to
provide a reasonable explanation for
This statement indicates that
12 // SECURITY SOLUTIONS
explanation for the absences
Greg Byrne is the CEO and founder of MultiSec Consultancy.
securitysolutionsmagazine.com
WHAT’S NEW WITH ASSA ABLOY IN ACCESS SOLUTIONS! Showcasing everything that’s new with security innovation whilst supplying all your end to end needs in access solutions! LEARN ABOUT ACCESS CONTROL
VIEW THE NEW APERIO RANGE
VIEW WHAT’S NEW WITH SECURE CONNECT
SECURITY EXHIBITION + CONFERENCE 24-26 Jul 2019 | ICC Sydney, Darling Harbour
REGISTER NOW
RISK MANAGEMENT
SAFE DESIGN FOR SECURITY PRACTITIONERS Security designers often do not have management control of the actual construction or installation. However, it is the designer’s duty to provide guidance on how the security measures
BY DR KEVIN J. FOSTER
might be constructed safely. The designer must apply the safe
S
afe Work Australia
security product or system is safe
Safe Design of Structures. Each
design principles specified in their
(SWA) is a statutory
to install, safe to operate, safe to
Australian state and territory will
state’s Code of Practice for Safe
body established in
maintain and safe to remove at
have a similar code.
Design of Buildings or Structures;
2008 to develop
end of life. Often the design of
• Principle 1 states that
or in the absence of a state code,
national policy relating to
security measures in a building
safe design is everyone’s
they should apply the model code
Workplace Health and Safety (WHS)
is developed and delivered by a
responsibility; that is, everyone
published by SWA. They should
and workers’ compensation. The
team that might include architects,
who has control or influence
do this in association with people
establishment of SWA coincided
engineers and security specialists.
over the design of products,
who have expertise in construction
with the intergovernmental
The team, and all members of the
systems, items or processes.
safety. It is important that designers
agreement to formalise the
team who have control or influence
harmonisation of WHS laws in all
over the design, are responsible for
design applies to every phase in
their design documentation so that
Australian states and territories. In
safe design.
the life cycle, from conception
this information is readily available
to installation, operation,
when the design is provided to the
maintenance and disposal.
next person or organisation in the
this article, I shall describe why it is
The aim of safe design is to
• Principle 2 states that safe
document the risks and controls in
important for security managers
eliminate occupational safety and
and designers to understand and
health hazards at the design stage.
implement the SWA Model Code of
If hazards cannot be designed
systematic risk management
Practice for Safe Design of
out, then risk control measures
processes should be
Structures, or the code applicable
may need to be implemented at
implemented to identify
accept responsibility for addressing
to their state.
a later date. This would usually
hazards, assess risk and select
the risks that are reasonably
require the designer to advise other
controls to achieve safe design.
practicable for them to control. n
Each state and territory in
• Principle 3 states that
supply, construction or operational chain of responsibility. The security designer must
Australia has its own legislation
stakeholders of the risks and what
covering occupational health
control measures they need to take
designer must have both the
and safety. Designers of security
when the design is implemented.
knowledge and capability to
Chairman of the Risk Engineering
control or influence safe design.
Society in Western Australia and is
systems, products and equipment
Safe design needs to consider
• Principle 4 states that the Dr Kevin J. Foster is the
Engineers Australia’s representative
need to be aware of their
installation, maintenance and
obligations under this legislation so
operational processes, human
there must be effective
on Standards Australia Committee
that when these security measures
factors (for example, errors),
communication and exchange
MB-025 (Security and Resilience).
are installed in a building or
organisational issues and life
of the documented design
Kevin is also one of the many
other structure, they meet certain
cycle management.
and risk control information
contributors to the drafting of
between all people involved
Standards Australia HB188: Physical
principles of safe design described
throughout the life cycle of the
Protective Security Treatment
in the SWA Code of Practice for
design solution.
for Buildings.
safety requirements. For example, the designer has an obligation to ensure that the
14 // SECURITY SOLUTIONS
There are some important
• Principle 5 states that
securitysolutionsmagazine.com
CO O LD S SOAR CE E N 3Y RE ST FE A N L U T
FOCUS ON SECURITY WHERE YOUR SECURITY NEEDS ARE BROUGHT INTO FOCUS
300 LOCAL AND INTERNATIONAL
BRANDS INCLUDE:
Gain insight into the newest innovations that are reinventing the industry. AI, biometrics and tech inventions are moving at lightning speed and smart technology is inspiring new discoveries every day. Industry leaders, new visionaries and expert users are all joining together to exchange ideas and developments. The Security Exhibition + Conference is Australia’s largest and most established commercial security event that cultivates innovation, solves problems and leads an industry to be the best in the world.
ASIAL SECURITY CONFERENCE
HEADLINE SPEAKERS
NICK A New Scotland Yard
KELLY SUNDBERG Mount Royal University Canada
HUGH RIMINTON Conference Moderator
SHARA EVANS Futurist, Market Clarity
NICK DE BONT Thales Australia
DR LISA WARREN Code Black Threat Management Lead Industry Partner
REGISTER FOR FREE EXHIBITION ENTRY
BOOK YOUR CONFERENCE PASS
securityexpo.com.au
COMMUNICATION
NOT CRISIS PREPARED? WHAT IS YOUR EXCUSE? BY TONY JAQUES
`
j
v
`j
jv
I
t is one of the most
percent said their company never or
leadership in public relations
especially true with regard to crisis
perplexing questions
rarely conducts a risk assessment of
and communication management
management.”
in issue and crisis
potential reputation threats.
ever conducted”, involving almost
management. If
Given the lightning speed
However, progress is likely to be
4,500 respondents in 23 countries
slow. One global survey of board
in nine different languages.
members found that fewer than
executives are well aware of the
of social media, it is particularly
devastating impact of a crisis, why
disheartening that 49 percent of
do they not assign resources to get
the respondents also said that
explosion of social media means
reported they had engaged with
properly crisis prepared? Despite a
if a public relations issue which
the speed of information flow
management to understand what
continuing torrent of case studies
threatened a brand crisis occurred
has increased every year, so it is
was being done to support crisis
and damaging headlines which
out of office hours, they would not
worrying that almost half of the
preparedness. And only half the
spell out the impact of a crisis on
be alerted until the next morning or
public relations professionals in
boards had undertaken specific
reputation, brand, share value and
the next working day.
the latest survey say they would
discussion with management about
not be advised about a potential
driving crisis prevention.
the chances of corporate survival,
Have we learned nothing?
Since that study in 2012, the
half of the non-executive directors
new data just published reveals
As long ago as 2012, a massive
that there is little or no sign
global study by the Plank Institute
of improvement.
asked public relations and
people need to be asking some
only questions is, are you properly
communications professionals
important questions about why,
crisis prepared? And if not, why
of public relations professionals
what the most important issues
and about the need to put proper
not? n
shows that well over 25 percent
were that they faced. Crisis
planning in place. But it is pretty
said their organisation still did
preparedness ranked second
clear that real improvement can
not have a crisis plan, or it had not
in importance, just behind
only be driven from the executive
Issue Outcomes Pty Ltd. This article
been updated for more than a year.
dealing with the speed and
suite. As renowned crisis expert
originally appeared on www.
Additionally, more than 20 percent
volume of information flow. This
Ian Mitroff once wrote, “Without
issueoutcomes.com.au Tony can
said their CEO was “not really”
decisive data came from what
a champion, nothing significant
be reached at Email: tjaques@
or “not at all” willing to invest in
has been called “the largest,
will occur with regard to any major
issueoutcomes.com.au Website:
strong crisis preparation, and 30
most comprehensive study of
program in an organisation. This is
issueoutcomes.com.au
The latest PR News/Crisp survey
16 // SECURITY SOLUTIONS
crisis until the following day. Obviously, the public relations
The challenge is clear. The risk of failure is unquestionable. The
Tony Jaques is Director of
securitysolutionsmagazine.com
`v
`jv
h
THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.
NEW!
ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.
+61 (3) 9544 2477
email: oz_sales@takex.com
HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.
BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.
INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.
OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .
1300 319 499 csd.com.au www.takex.com
TAKEX AMERICA
VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta
BUSINESS DEVELOPMENT
BUSINESS PARTNER REFERRAL GROUPS H
ere is a simple
BY MARK GARBELOTTO
question: how much easier is it to close a referral sale than a
non-referral sale? A lot easier, right? Immeasurably easier. And how do you get referrals? Well, we all know that the best referrals come from satisfied customers. In order to be competitive in business development today, you have to please customers to the degree that they will refer you to friends. But how many business development people tap the potential of a different kind of referral – those from other professionals? A business partner referral group is a network of professionals from complementary fields working together to create referrals for one another. The fields must
works if everybody is actively
be complementary but not
seeking to make referrals for their
that people in referral partnerships
business referral group, you have to
overlapping, and the people must
partners whenever and wherever
come from complementary fields
find people who will be of the most
know each other well, trust each
they can.
that do not conflict with each other.
value to you, but to whom you are
And you can also see that it is just as
equally valuable. No one is going to
other and feel fully confident
I have had several such
You can see how important it is
When looking to establish a
creating proactive referrals for each
networks for years and my sales
crucial that you really believe in the
want to be part of your network if
other. It is the law of reciprocity: the
training business would not
abilities of your referral partners,
they think they will be doing all the
more you give, the more you get.
be what it is without them. It
because your reputation is on the
giving and you the taking. Who can
is not a lie when I tell you that
line, as well as theirs. It pays to take
you really help? Helping is where the
comprised of many complementary
the really exciting part comes
your time finding the right people to
energy for this approach originates.
but non-competitive trades, gives
in making referrals rather than
join your network and to get to know
us a useful model. Electricians do
in getting them. If I am working
them well. If you would not have
members of your network realise
not compete with plumbers, who
with a big company with lots of
them doing work for you then they
that it is not just about making
do not compete with bricklayers,
potential training needs, one of
do not belong in your network.
more sales. It is also about shared
who do not compete with painters,
the first things I ask is, “Who is
and so on. If you have a trusted
doing your OHS training? Do you
you would enjoy having a coffee
really is. Once people recognise
plumber, you are likely to take
need a good person? How about
or a beer with, then they might not
the commonality of it and commit
his advice when you need an
first-aid training? Would you like
be right for you either. That is just
themselves to helping their
electrician. He works a lot with
a recommendation?” These are
the sort of thing I am suggesting, a
partners, things really start to
electricians; there is no conflict of
people in my referral network. I
small group of like-minded people
click. Everyone becomes more
interest involved, so he is the ideal
know them and I trust them. I know
from related industries who trust
involved, better connected and
person to give you that referral.
that they will be looking out for me
each other and enjoy spending time
more powerful. After you have
in a similar fashion when they get
together. I have breakfast once a
established your network, meet
done in any industry and even in
the opportunity. And my customers’
week with one of my referral groups
often. Have fun together. Look out
related industries. It takes time,
positive feedback after a good
and meet monthly with another.
for one another. It is amazing how
smarts and commitment to build
experience with one of my referral
Doing this kind of thing is the only
excited you can get about helping
the right network, but more than
partners is not insignificant to me. It
way to get to know people well
someone else – and you will find
anything else, it requires goodwill.
is a win-win-win situation, one that
enough to instil your faith in them,
yourself receiving a lot more
A business referral network only
creates strength for all parties.
and vice-versa.
business. n
The building industry,
This form of reciprocity can be
18 // SECURITY SOLUTIONS
If they are not the kind of people
Make sure that prospective
interests and friendships. And it
securitysolutionsmagazine.com
THINKING ABOUT SECURITY
BY DON WILLIAMS
t is an exciting time
provides scope for security
to be involved in
professionals to be involved – they
foreign government-sponsored
webinars and online chat groups
security management.
certainly provide the opportunity
and corporate data gathering,
appears to be on the increase. The
Security has become
for informed and educated
sometimes utilising ‘soft target’
breadth, relevance and particularly
a recognised management
comment on the applicability of the
commercial entry points, creates
the currency of such sessions
discipline with its own body of
products provided.
additional responsibilities for the
makes them attractive.
I
knowledge, research and literature
Security professionals are being
Increased awareness of
security advisor.
association chapter meetings,
The web provides the security
that is beginning to permeate into
recognised as legitimate and even
the general awareness.
necessary contributors to reviews of
technologies and capabilities mean
academic papers, discussion groups
Organisations such as the
related standards and guides. Where
that security specialists need to
and advertising material, as well
Australian Security Policy Institute
security has not been initially invited,
constantly monitor the market to
as news and historical data on
(ASPI) recognise the importance of
in some cases they have been able to
see what new tools can assist with
security incidents.
the private security sector and are
obtain seats at the relevant tables.
mitigating the new threats.
advising and informing government. National, international and
The existing training packages
Improvements in security
Supply chains are becoming
professional with access to
There is more happening in the security field than ever before
related to guards and security risk
more interdependent and, as a
at the moment and the future
industry standards defining and
advisors are under review. These
result, the likelihood of single
looks good. Having observed
scoping security management are
reviews provide the opportunity to
points of failure continues to grow
and participated in the security
being drafted and published. These
mould them to reflect what is needed
and be vulnerable to deliberate,
management sector for 40 years,
provide us with a common lexicon
now and in the future, rather than
malicious human action.
there is no doubt that right now is
and help us provide consistent
just retain what has evolved from the
and collaborative assessments
old days.
and advice. The societal awareness of terrorist
The speed at which our physical
Security professionals know
the most exciting, challenging and
they cannot be knowledgeable in
rewarding time to be a security
every expanding specialist area,
professional. n
and cyber environments are changing
but that a general awareness
and other threats has resulted in
provides the opportunity, even the
of the security spectrum is
government advice on crowded
necessity, for security professionals
essential. There has never been
is a recognised thought leader in
places and venue safety/security.
to consider and advise on new threat
such easy access to information.
security, emergency management
These documents help create a
vectors. New technologies such as
Attendance at professional security
and related disciplines. His book
greater awareness of the need for and
the Internet of Things, dash cams,
organisation activities appears
Bomb Safety and Security: the
value of security as a management
drones, 5G and whatever else has or
to be growing. Informal research
Manager’s Guide is available from
discipline. Ideally, the preparation of
is about to or has just arrived, create
suggests that, although conferences
Amazon. Don can be contacted via
government-sponsored documents
both new assets and new threats.
may be in decline, access to local
email donwilliams@grapevine.net.au
20 // SECURITY SOLUTIONS
Don Williams CPP RSecP ASecM
securitysolutionsmagazine.com
Prepared to
support you
at every level.
Effective cybersecurity is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And it’s about partnering with a solutions provider who’s prepared to support you at every level. Which is where we enter the picture. We are 100% focused on cybersecurity, and we do everything in our power to mitigate its risks. We have strict requirements for our own products and we work diligently with our partners—and you—to fight this threat.
Learn about our layers of protection at www.axis.com/cybersecurity
EVENTS
Security Exhibition & Conference 2019
to seeing you again in Sydney in
• asset management systems
2019 for the Security Exhibition &
• drone capability
event within ISC West focusing
24–26 July
ASIAL Conference!
• software cyber management
on unmanned aerial vehicles
International Convention Centre, Darling Harbour, Sydney
Visit securityexpo.com.au for more information. n
In 2019, the Security Exhibition & Conference is heading back
PNG Security Congress
to Sydney.
2–4 March 2020
solutions
• Unmanned Security Expo is an
(UAVs), unmanned ground
• innovative video intercoms
robotics and vehicles (UGVs),
• large enterprise systems
and the various software and
• mechanical locking integration with electronic security solutions
applications that support them • Connected Security Expo (CSE)
Port Moresby, Papua New Guinea
• emerging technologies.
has moved to the ISC West show
Conference is the industry’s annual
Now is the time to plan to attend a
Visit pngsecuritycongress.com/
floor! As the digital and physical
opportunity to reunite for three
world-class security and technology
register to register or for more
worlds collide, it is increasingly
days of quality networking and
conference and exhibition – PNG
information. n
important for industry
unrivalled education alongside a
Security Congress.
The Security Exhibition &
showcase of the most innovative
Security industry specialists and
professionals to protect their
ISC West
organisations and clients from
solutions to the Australian market.
professionals will converge on Port
18–20 March 2020
both physical and cyber threats.
For over three decades, it has been
Moresby, PNG, in March 2020 for this
Sands Expo Convention Center,
CSE provides holistic solutions for
the largest and most established
premier security industry event, with
Las Vegas
commercial event for the security
a security conference and exhibition,
ISC West is the largest security
Working with SIA, ISC West also
industry in Australia, bringing
real-world challenges presented and
industry trade show in the US. At
features world-class education
together the entire supply chain of
a glimpse into the future of global
ISC West, you will have the chance
to learn about every facet of the
manufacturers, distributors, security
security integration and trends.
to network with over 30,000
security industry.
professionals and end-users to
The Congress will feature
security professionals through
today’s connected organisations.
Visit www.iscwest.com for more
connect and create unparalleled
electronic security and safety
new products and technologies
business opportunities.
solutions for aviation, banking,
encompassing everything from
infrastructure, industrial sites, mines,
access control to unmanned
Total Facilities
forward to once again reuniting
commercial buildings, residential
vehicles from over 1,000 exhibitors
22–23 March 2020
with more than 4,500 security
towers, building and development;
and brands.
Melbourne Convention & Exhibition
professionals and over 150 leading
the best of the best in a world-
suppliers. The 2019 show is set
class offering:
offer attendees a host of
Total Facilities is Australia’s most
to see some interesting new
• intelligent CCTV, access control
attractions, including:
important facility management
• new products and
event. Explore an Environments
The entire team is looking
innovations as well as a host of new attractions. Make sure you put the dates in your diary. We look forward
22 // SECURITY SOLUTIONS
and alarms systems • advanced video surveillance solutions • intelligent traffic solutions
In 2020, ISC West will
information. n
Centre, Melbourne
technologies, encompassing
of Excellence and discover the
everything from access control
latest and smartest ways our
to unmanned vehicles
built environment can help
securitysolutionsmagazine.com
The next generation in smart panels is here •
Compatible with existing
•
Data stored on panel
Reliance equipment
•
Encrypted connections
•
NBN ready
•
Z-wave® compatible
•
Built in IP communication
•
4G / WiFi Module
•
True monitored path via UltaSync™
•
Native IP/camera support
Residential
Multi-Storey
Education
For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au
facebook.com/HillsLtd/ CONNECT
E N T E RTA I N
SECURE
Retail
Government
Aged Care
Warehousing
EVENTS
us realise our full potential in
CivSec 2020
Australia’s leading showcase of
24–26 March 2020
high-performing facilities, and intelligent living and work spaces.
• Australian Association for
between installer, integrator,
Unmanned Systems.
end-user and vendor.
Melbourne Convention & Exhibition
CivSec 2020 is a premium
• Discover the high-quality
Centre, Melbourne
international event with
solutions you need whilst
Built around major conferences of
exceptional opportunities to
raising your anxieties
Smart Zone designed as a thriving
Australia’s key law enforcement
reach key driver organisations
with the experts behind
hub of technological innovation
and policing organisations, the
in this evolving, tech-savvy
every innovation you hope
which presents new technologies
CivSec 2020 International Civil
regional marketplace.
and solutions to help you create
Security Congress and Exposition is
smarter, greener buildings. The new
your gateway event to the growing
zone offers visitors a dedicated
Indo-Asia-Pacific civil national
environment to look for integrated
security environment. CivSec 2020
IFSEC International
and cloud-based solutions to
will include an industry exhibition,
19–21 May 2020
improve operations and deliver
supporting a program including:
ExCel, London, UK
business value.
• Australia New Zealand Policing
Our 2020 event will feature a
Visit www.civsec.com.au for more information. n
to procure. • Draw impartial verdicts for security solutions against rigorous, real-life testing zones, including attack scenarios and surveillance. • Research the inspiring ways
Beyond an internationally
you can adapt to the changing
Advisory Agency (ANZPAA)
esteemed product showcase,
tides of tomorrow’s security
IoT technologies will be more
PC20 Police Commissioners
IFSEC International is Europe’s
challenges and equip yourself
pervasive in smart commercial
Conference
centralised gateway to the critical
with the tools you need to
According to industry research,
buildings than anywhere else over the next three years. This zone is designed to deliver to visitors industry-class solutions and strategic
• National Security Science and
mutating threats, the integrated
Science and Technology)
path to achieving global safety
security industry whilst
starts with IFSEC.
sophisticated partnerships
• Access inspiring high-
and inspiring collaborations
• Corrective Services Emerging Technologies Project Group
and data to better understand and
• Custodial Corrections Working
Visit www.totalfacilities.com.au for more information. n
24 // SECURITY SOLUTIONS
move forward with certainty.
Technology Centre (Defence
advice on how to use technology manage their building performance.
security conversation. Amidst
Group • Electronic Monitoring Conference
level panel debates from
• Network with the global
kickstart under the same roof.
government and industry
Visit www.ifsec.events/
influencers, and join the
international/ for more
collaborative conversation
information. n
securitysolutionsmagazine.com
FEAUSRE
THE OSINT CONNECTION Intelligence In Executive Protection BY TRAVIS LISHOK
26 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
This article explores how one
to a student organisation that
Palestine (SJP). For our purposes,
can conduct an open-source
vehemently opposed our client.
we will specifically focus on
intelligence (OSINT) investigation
We even knew by which legitimate
the University of California,
and explains the value this type
means the individual intended
Los Angeles (UCLA) chapter. I
to obtain a weapon?
of investigation can bring to a
to enter. We advised our client
chose to use this organisation
• What is the status of the
protective operation. The article
not to let him into the event, but
and its former president as
draws on events leading up to
were told that, for public relations
examples because they fit all of
a political fundraiser that took
reasons, he was not to be turned
the characteristics that we would
place in a large Silicon Valley
away. We would check him
expect, given our scenario above.
convention centre some years ago.
thoroughly but, if no contraband
Plus, anyone involved in higher
There were over 1,500 attendees
was found, we were instructed to
education could relate this to their
and the event included a stately
let him in.
personal experience.
dinner with various distinguished
In approaching this situation
During our research and
fascination with weaponry of any type? • Is the subject currently seeking
subject’s inhibitors, including any recent losses? • Has the subject engaged in any ‘final act’ behaviours?
Additional Research Needed to Assist the Field Operatives
from an OSINT perspective, it is
analysis, we will attempt to
During our research, it would be
our primary goal to answer this
answer the following questions
helpful for us to further support
that hosted this fundraiser has
question: Is the individual or their
to assist in our assessment of the
the field operatives by obtaining a
quite a few enemies, much
organisation likely to take action
subject and his/her organisation:
picture of:
attention had been given to
at the event? We are primarily
1. Primary question:
• the subject
the online forums and social
concerned with violence or
• Is the individual or the
• the subject’s vehicle with
media pages that are often
embarrassment directed toward
organisation likely to take
used to coordinate protests and
the client and, to a lesser degree,
action at the event?
disruptions at this organisation’s
any attempts to harm the image
2. Secondary questions:
events. It was on one of these
of the client (their event, their
• Has the subject approached the
forums where a specific individual
organisation and so on).
speakers on stage. Since the political organisation
expressed his intention to get
I will use an analogous
licence plate information • the subject’s associates.
client previously and, if so, in
Immediate Area of Concern
what way?
Since the subject is attending the event, we can confirm that
himself into the venue (in order to
real-world subject and student
collect information and possibly
organisation to give you a
organisation have a history
they are actively researching the
disrupt it), and made it clear that
detailed, realistic example. If
of violent, threatening, or
client and engaging in planning
he had the legitimate means of
you have ever been to any of the
criminal behaviour?
and preparation. Even if this
achieving this feat.
University of California campuses,
• Does the subject/
• Is the subject seeking
is not hostile in any way, it is
then you would know that this
knowledge about the client and
important to be conscious of it.
very precise and included the
organisation and others like it
the client’s current situation?
This is concerning, because we
name and even the photo of
have a constant and aggressive
this individual, who belonged
presence in Students for Justice in
The details we obtained were
securitysolutionsmagazine.com
• Does the subject possess, have access to, or give evidence of a
know that research, planning and preparation are part of the
SECURITY SOLUTIONS // 27
FEAUSRE
path to intended violence. By
profiles. These are going to
databases.) After viewing both sets
social media accounts (SJP at
conducting more online research,
provide us with the most current
of sources, we should have enough
UCLA), it was easy to find their
we may find evidence to support
and detailed information. Once
information to form a foundation
Facebook page, Twitter, YouTube,
or contradict this concern.
we discover the subject’s email
for answering the question, “Is the
associated Instagram hashtags,
address or username, we can use
subject likely to take action at the
Tumblr, Facebook group, Google
depicts the path to intended
these pieces of information to
event?”
group, Yahoo group and online
violence as described by the
search across all relevant social
authors Frederick Calhoun
media sites. It is a common theme
research about the organisation
their literature (Scribd and
and Stephen Weston in Threat
in online investigations that most
itself. First, SJP at UCLA have an
DocShare). Some of their group
Assessment and Management
users will use a single username
official website where they make
pages were not open to the public;
Strategies (2nd edition).
across all of their accounts
announcements and share their
however, it would be simple to
(Facebook, Twitter, Instagram and
views. Here, they left a contact
create an alias account and join
Path to Intended Violence
so on). What if his accounts are
email for the organisation on the
to view their conversations. The
private? Then the researcher can
main page. This is immensely
organisers of the SJP UCLA chapter
Grievance Ideation Research
target his associates’ profiles and
helpful because we can search this
were also listed by name on the
and Planning Preparation
view conversations/interactions
email address in Google to find
UCLA website.
Breach Attack
between them (target by proxy).
more pages that are associated
The simple illustration below
Once we collect information
Next, we can begin our
repositories they use to share
Lastly, there were several
with it. Plus, it is highly likely
websites that included detailed
Intelligence Collection Mind Map
about the subject from open
that this email address was
profiles about SJP (not necessarily
sources, we can next try closed
used to set up all of SJP’s social
the UCLA chapter), detailing their
The graphic below is a mind map
sources such as TLO or Thomson
media accounts.
activity and classifying them as
that gives a simplified illustration
Reuters Clear, which typically
of my research process. The
require a private investigator’s
author of IntelTechniques.
primary focus is (1) the subject
licence (or similar barrier to using
com, has stated for this very
and (2) the subject’s organisation.
it). These sources would reveal the
reason, that the target’s email
Summary of Findings: Subject
(Side note: Michael Bazzell,
hate groups.
subject’s previous arrests, debts,
address is the single best piece
I was able to discover his social
Mind Map Explanation
associates and detailed personal
of information to have when
media profiles, articles he
Beginning with the subject,
information. (For the purpose of
beginning an OSINT investigation.)
published, and Google Drive
our most valuable sources of
writing this post, I did not run
information are his social media
the subject’s name through these
After discovering the username that is used for SJP’s
documents in which a pro-US/Israel group wrote a detailed profile about him (including his personal blog, his associates, his activism, pictures of him and more). To assist the field operatives, I was able to find the following: pictures of the subject and pictures of his associates, but no picture of his vehicle. I did not find any significant evidence to support a hypothesis that the subject was likely to act out violently or otherwise at the event. In addition, I was unable to find any evidence of previous violence/criminality, familiarity with weapons, loss of inhibitors, or final act behaviours. Since the subject is a graduate student and the leader of his organisation, these are likely to inhibit him from doing anything extreme, such as acting out violently. However, I am concerned that the subject’s personal blog contains violent
28 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
poetry and literature. This likely
acted violently or interrupted
Conclusion
concrete details and a dynamic
has a significant influence on his
events. However, I was able to
Intelligence is about making
framework to view the situation.
personal outlook, plus he could
find instances of alleged violence
judgements about the future,
Where the limits of OSINT end,
influence others to act violently
against students and evidence
interpreting problems and
field intelligence (surveillance)
though this literature.
of shouting down speakers
supporting decision makers.
begins. n
they disagree with, by other SJP
There are significant limitations
Summary of Findings: Subject’s Organisation
chapters. Given this information
for anyone attempting to make
and the information about the
judgments about the future
founder of EP Nexus, an online
For SJP’s UCLA chapter, I was
subject, I would estimate that
by only using OSINT tools.
resource for executive protection
able to discover their official
there is a low to medium risk
These limitations include,
professionals comprising a blog
website, UCLA organisation page,
that the SJP UCLA chapter would
but are not limited to, the
and an online newsletter with
social media profiles, online
potentially act out (violently or to
following: source reliability,
great information from some of
communities, online repositories
disrupt) at the event.
analyst biases, limited time,
industries’ leading practitioners.
limited information and so on.
Based in California, Travis has
where they share their literature
If we had more time to invest,
Travis Lishok is the
and third-party sites that
it would be worthwhile to analyse
Therefore, intelligence collection
over a decade of experience
comment on controversial groups
trends set by SJP chapters at other
and analysis in terms of OSINT
working in the military and
such as SJP.
university college campuses to
is only one part of the protective
private sector security. If you
anticipate evolving tactics used by
puzzle. It gives the operatives
would like to know more, visit his
the UCLA chapter.
working in the field limited
website at www.epnexus.com
I was unable to find instances where the SJP UCLA chapter
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 29
FEATURE
TO G OR NOT TO G? BY JULIAN CLAXTON
30 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
A review of mobile
Three, owned by Hutchinson
communication advancements
Telecommunications. In 2003,
and its impact on technical
they released a handset that
surveillance countermeasures.
could make video calls over an
I still fondly remember the
enhanced network (although 3G
excitement I felt when I purchased
was released internationally in
my first mobile phone in 1990.
1998). Latency was considerable
It was the size of two bricks; an
and the image was often
analogue device with patchy
distorted, but who cared – I could
reception (1G). At the time, I was
actually see my interlocutor! A
a young surveillance operative
considerable benefit of the 3G
and investigator still learning
network was the ability to send
the ropes. The mobile phone
video clips, photos and audio files
was a novelty at first, although
relatively quickly. It also provided
its convenience quickly became
internet access from the palm of
a necessity as I rushed across
your hand. This revolutionised the
the city with a constant need to
concept of real-time surveillance,
communicate with my colleagues,
providing the ability to instantly
hot on the tail of our respective
send images and video to our
surveillance targets.
employers for verification or
A year or so later, the analogue
Access to the internet meant that
digital and, not long after that, text
directions and other relevant
messaging (SMS) and multimedia
information could be accessed in
messaging (MMS) features were
real time to aid investigations.
enabled. The digital network was
Covert surveillance devices
second generation (2G) and mobile
soon flooded the market and, with
communications were becoming
advancements in technology and
the norm. Communication as
improvements to the chipsets
we knew it changed and with
used, they became smaller and
it went our privacy. The digital
lasted longer. Online retailers such
network saw a proliferation of
as eBay provided an anonymous
audio surveillance devices (bugs)
means by which to purchase such
transmitting room audio using the
products and, throughout the
2G cellular network.
2000s, surveillance bugs were
By this time, I had enhanced my tradecraft to include technical surveillance and, like
being sold in the thousands by online retailers. In 2008, the laws changed in
the thieves and fraudsters I was
New South Wales, resulting in a
pursuing, I collaborated with
restriction on the way in which
colleagues to see how to benefit
covert surveillance products
from this enhanced method of
were used. I subsequently
communication, particularly
decided to switch sides and
with respect to developing covert
actively steer my career
electronic surveillance products
toward countersurveillance,
to lawfully aid investigations.
particularly technical surveillance
Whilst I have always operated
countermeasures (TSCM). Having
within the boundaries of the law,
had a thorough understanding
my adversaries do not and they
of how to develop and use covert
too were devising means by which
surveillance products, it made
to benefit from this enhanced
sense to put that knowledge to
communication method.
good use, helping organisations
One of the pioneers of third
securitysolutionsmagazine.com
further surveillance instructions.
phone service was upgraded to
find them. This stood me in
generation (3G) technology in
good stead to combat the ever-
Australia was a company called
increasing use of 2G and 3G
SECURITY SOLUTIONS // 31
FEATURE
surveillance bugs – not to mention
from within your designated area
advantage of 5G transmissions
likely it is to penetrate obstacles.
the older style devices operating
had to be identified, typically
is that a lot more bandwidth
Take the low frequency signal
using standard radio frequency
using direction finding or near
is available at much higher
of 30Hz. It has a wavelength
(RF) means – such as frequency
field radio receivers focused on
frequencies, known as mmWaves.
of 10,000km. This wavelength
modulation (FM) radio bugs, often
received signal strength indicators
These operate above 6GHz (in this
will easily penetrate through
sold as a toy kit!
(RSSI). This was not significantly
instance, we refer to frequencies,
walls. A high frequency signal of
different to how we operated prior
not the evolution of mobile phone
300GHz has a wavelength of only
(4G) products were commercially
to digital encryption, except that
technology, also labelled ‘G’ for
one millimetre! Its penetration
released, enabling large amounts
we needed to be more vigilant
Generation) and have the capacity
capacity is as good as zero.
of data to be transmitted in what
with our physical searches and
to operate up to around 90GHz
Using the familiar 2.4GHz Wi-Fi
was then considered lightning-
more cognisant of RF spectrum
(albeit impracticably). From a
frequency as another example, its
fast speeds. Manufacturers of
management and propagation.
practical standpoint, anything
wavelength is 12.5cm and, as you
transmitting at those mmWave
would know from your home or
Also in 2008, fourth generation
covert surveillance devices were
The emergence of fifth
becoming more creative in the
generation 5G networks from a
frequencies will be unreliable
office Wi-Fi setup, it will typically
way they concealed devices and
TSCM perspective presents little
and ineffective, unless antennas/
penetrate through a couple of
transmitted via the 4G network.
change to our modus operandi.
repeaters are placed in direct
walls to provide connectivity
Burst bugs were using encrypted
In essence, the physical search
line of sight. The 5G mmWave
within your environment. In
data to send audio via the 4G
methodology needs to be reviewed
transmissions can be blocked
summary, lower frequencies
network and, depending on the
and more research conducted on
by precipitation, foliage, walls,
have longer wavelengths which
product and its compression
the emerging threats associated
people and even oxygen (at the
penetrate obstacles better.
algorithms, 24 hours of audio
with wider bandwidths and faster
upper end of the spectrum). We
Higher frequencies have
recordings could be transmitted
speeds. Transmitting via the 5G
all know what it is like trying to
shorter wavelengths and will
across the globe in a matter
network will mean that a full day
make a call from within a building
not penetrate much beyond
of minutes.
of audio recordings stored within
when mobile signal strengths
line of sight (depending on the
a burst bug’s memory will take
are low. At this point in time and
frequency used).
(encrypted) communication, the
just seconds, rather than minutes,
for the foreseeable future, using
countersurveillance community
to transmit and a lot more video
mmWave technology to transmit
infrastructure companies, such as
had to lift its game and become
(and audio) can be transmitted
from a mobile will be far worse,
Ericsson, Nokia and Huawei, have
more reliant upon signal
in almost real time. However,
especially if you are deep indoors.
all released white papers and/
strength, rather than signal
the practical realisation of 5G
demodulation, to determine which
advantages for covert surveillance
the wavelength of a signal
the issue of propagation. All of
radio frequencies were a threat.
is a long way off.
is inversely proportional to
them refer to the complexity of
With the advent of digital
To put things in perspective,
Leading 5G telecommunication
or academic papers discussing
Thorough physical inspections
The difference between 4G
frequency – higher frequencies
operating mobile handsets at
were even more pertinent than
and 5G from a signal propagation
have shorter wavelengths. The
mmWave frequencies. In every
before and any signal originating
perspective is considerable. The
shorter the wavelength, the less
instance, they refer to using what
32 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
IT MAKES LITTLE SENSE AT THIS EARLY STAGE OF 5G DEVELOPMENT TO DESIGN AND USE A BUG THAT IS RELIANT UPON UNTESTED AND CLUNKY 5G TECHNOLOGY. IN FACT, IT WOULD BE COUNTERPRODUCTIVE, GIVEN THE RISK OF FAILURE OR OTHERWISE INTERMITTENT SUCCESS. is known as sub-6GHz frequencies
tried and tested. If an operative
by obstacles (including people).
mmWave transmissions beyond
to operate 5G mobile handsets
has regular access to the target
A building will therefore need
around 11GHz at most. It would
to overcome the restrictions of
premises (such as that available
numerous antennas installed
be ridiculously expensive and
signal penetration. As a result,
to a trusted insider) then they
within; ergo, easily discovered by
subsequently increase the cost of
it has been widely agreed that
may choose to install a solid-state
a basic TSCM inspection team, or
services, whilst providing little
a more effective frequency to
listening device which records
the router itself will need to be
to no benefit to an experienced,
benefit from 5G technology is
locally with no (or limited)
placed on the external perimeter
qualified and professional
sub-6GHz and, in many instances,
need to transmit a signal at
of the room in which it is expected
TSCM team.
will be 3.6GHz or below for indoor
all. It makes little sense at this
to operate (preferably near a
mobile phone use. This means
early stage of 5G development
window, which in itself will cause
that existing 4G LTE infrastructure
to design and use a bug that is
attenuation), or a separate antenna
will be relied upon and, in many
reliant upon untested and clunky
will need to run from the device to
instances, used to help with
5G technology. In fact, it would
outside the building, in proximity
industry participation, Julian
mobile uplinks (handsets/devices
be counterproductive, given
to a 5G base station. In each of
Claxton is an experienced
talking to base stations). The result
the risk of failure or otherwise
these cases, a physical search team
security professional, with
of this will likely be enhanced 4G
intermittent success. That is not to
should have no trouble identifying
specific expertise in technical
network access, providing faster
say that 5G technology will not be
most 5G threats or components
surveillance countermeasures,
connections than we currently
of use for surveillance purposes.
used to covertly transmit a 5G
insider threat management and
have. This is an important
It absolutely will – just not for
signal. Moving forward, 5G routers
credibility analysis (detecting
factor when considering the
many years. And even then,
and various other products may
deception). Julian has presented on
topic of covert surveillance and
the propagation (penetration)
rely upon mmWave frequencies
TSCM and security management
related countermeasures.
of mmWave-based products is
exclusively; however, for now, that
Espionage Research Institute in
unlikely to change, as the laws of
comes with more components and
Washington DC, as well as being a
physics are somewhat fixed!
a larger housing, decreased battery
founding member of the Technical
life and an increased power draw
Surveillance Countermeasures
A good covert surveillance operative will typically find the least resistant path to placing a
So, let us argue the concept
The sixth generation may be a different story. n With over 25 years of active
listening device or electronic bug.
that a covert surveillance device
(resulting in the generation of heat
Institute in London and a member
It needs to be easily installed,
might be built into a 5G mmWave
– easily detected using thermal
of the Espionage Research Institute
reliable and unlikely to be
modem/router. Assuming it is not
imaging).
International in America. He is
detected if his or her surveillance
using sub-6GHz frequencies, it
Our equipment currently
operation is to be successful. It
will require line-of-sight access
covers up to 24GHz. My firm
ASIS International, and a serving
also needs to have stable power,
to a base station. It is proposed
purchased receivers with this
board member of the Australian
an audio path for the microphone
that 5G base stations will use
capability in 2011, to pander to
Institute of Professional Intelligence
or visual path for cameras, and
something called massive multiple-
clients who were ill-informed
Officers in Canberra, Australia.
access to transmission methods
input-multiple-output (mMIMO)
by charlatan TSCM wannabes,
He is director of Jayde Consulting
(these can be wired and/or
and beam forming, full-duplex
marketing the unnecessary and
Pty Ltd and holds certificates
wireless depending on the
technology. In simple terms, it will
alarmist requirement to scan
in security risk management,
product used). On the market
have antennas steered toward each
mmWave frequencies. This was
countersurveillance and
today is a plethora of reliable and
device it connects to and chipsets
well before 5G technology was
investigations, as well as a graduate
inexpensive devices operating
will communicate uplinks and
even on the drawing board.
diploma in Behavioural Analysis
using radio transmission methods
downlinks simultaneously. For
Given the RF propagation
and Investigative Interviewing and a
such as VHF, UHF and SHF, which
this to operate effectively, those
issues raised in this article, I see
master’s degree in Communication,
include Wi-Fi, Bluetooth, 3G and,
antennas will need to be placed
little benefit in organisations
Behaviour and Credibility Analysis
in some cases, 4G networks. All of
in close proximity to that device
increasing the capability of their
(MMU). He can be contacted at
these transmission methods are
so as to not be too interrupted
spectrum analysers to detect 5G
julian@jaydeconsulting.com
securitysolutionsmagazine.com
also a longstanding member of
SECURITY SOLUTIONS // 33
OPERATIONS
SAFETY IN TRAINING: SIMPLE BUT NOT EASY BY RICHARD KAY
Officers need to gain experience in a controlled environment to prepare them for situations they may face on the job. Professional instructors care about the people they train, but the average officer is expected to control a real, aggressive subject with fewer training hours than a high school athlete. The objective is to provide realistic training while minimising risk, so safety in training is critical. Safe training is simple, but it is not easy. Simple implies a lack of complexity, whereas easy implies minimum effort. Ensuring safety during a training activity is as simple as eliminating dangers; however, this is not easy. A pitfall of well-orchestrated training is that it looks easy to the casual or untrained observer, so they come away from well-run training motivated to start their own program. Unfortunately, they do this with little understanding of the complexities necessary to make it effective and safe. There are three types of people who often cause issues in high-risk endeavours: the inexperienced (naively think ‘how hard can it be?’ and make it up as they go along), the unlucky (luck can be offset through organisation of the training environment, experienced instructors and proper safety protocols) and the experienced (cut corners, push the envelope and become too familiar with the activity). Safety guidelines should be systematic and meaningful. Safety rituals leave no room for complacency because the attention to detail is implicit. Policies established after an incident often become lax due to time, money, stupidity, laziness or ignorance. Implementing safety rituals is not overly complex; they are simple to follow if properly developed and do not take a lot of time if applied systematically. It
34 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
is unlikely that people get injured
practical phase, use imitation or
monitor and reinforce safety
Safety officers should be clearly
if safety rituals are implemented
simulated gear for safety. Do not
to prevent accidents occurring
identifiable to all participants. A
and enforced.
overuse props, as they can become
and familiarise everyone with
brightly coloured vest is a good
a distraction. Participants tend
idea, as well as a visible whistle,
Safety Preparation
what is expected in order to
to copy what they see staff do, so
safely complete the training.
which acts as a warning in the
Preparation is the key for safe
model the concept.
Point out any hazards or safety
event of safety breaches. Whistles
non-compliance until the safety
should not be used for any other
training. Instructors should have
Instructors should always
all the appropriate materials; a
inspect participants’ gear to
principles become a part of
purpose; using them for drills
checklist is helpful to ensure that
ensure it is appropriate and
training culture.
creates a confusing signal that has
items required during training
conforms to safety requirements.
are available for each program.
Do not presume that participants
Safety Personnel
The training environment should
have maintained their gear in
The role of safety officers is to
engaged in practical training
be set-up early; not only does this
good operational condition.
ensure safe, injury-free training.
know the appropriate level of
look organised and professional, it
Inspect duty rigs for items not
They do not instruct, coach, train,
force, weapon types, functions,
assists in controlling the safety of
required in the training program
demonstrate or correct; they focus
use and safety, and what
the training environment.
that may be contained on the rig
solely on safety. As the ultimate
constitutes a designated target
or the person and may pose a
safety authority in training,
during training. Accidents are
for any safety hazards and proper
safety risk. To ensure consistency
safety officers enforce all safety
caused by people, not equipment,
measures taken to rectify, as
of safe equipment, an option
guidelines, monitor participant
and occur when an unsafe
required. The facility should be
is to provide participants with
conduct during training and
condition and unsafe act are
relative to class size and be free
training equipment that is
report any unsafe or illegal acts,
present at the same time. Safety
of outside distractions. When
checked prior and that the
so only authorised and trained
officers should establish a clear
space is limited, this may be
instructor knows is safe and
representatives should act as
safety plan; key items include a
controlled by varying the number
appropriate. Instructors should
safety officers.
mobile phone and first aid kit, and
of participants, or the layout of the
check, maintain and clean all
facility. Arrange the classroom in
training gear after each class.
The location should be checked
such a manner that participants
Train role players how to
the potential for safety issues.
Core responsibilities of safety officers include the following: • inspect venue, weapons and
It is essential that participants
key procedures include a first aid and evacuation plan. Safety officers should not
equipment before training so
be confused with instructors;
there are no potential hazards
the instructor runs the training
are comfortable, can focus on the
act without causing injury, and
content matter and participate
make sure there are policies,
freely. As part of the housekeeping
procedures, and protocols
• conduct a safety briefing at the
activities, whilst safety officers are
brief, outline safety issues early.
for training, including the
commencement of training
responsible for the overall safety.
The practical training area
use of safety equipment and
• ensure appropriate instructor/
It is advisable to have at least
should be free of obstructions
appropriate safety ratios. Never
participant ratios for the
one safety officer present during
and appropriate for the training
allow role players to overwhelm
training activity
a training activity, regardless
activity. Adequate space is vital
participants; they should be
to safety; a cluttered training
progressively pushed to higher
weapons and equipment used
present. The task begins before
environment makes it hard
levels of performance, but
during training
everyone arrives and ends after
for the instructor to properly
too far too fast is dangerous.
monitor participants. Clearly
Training injuries can be reduced
involved in training are not in
detail-oriented person who is an
designate the administration area,
by instructors focusing on
possession of any dangerous
excellent observer and commands
equipment area and the first aid
the core objective – to make
items
respect by presence. Instructors
point. For strenuous physical
officers better in an operational
training, ensure there is adequate
environment – but nevertheless
or leaving the training area,
maximising safety. Multiple safety
ventilation and water to mitigate
injuries can happen. Participants
including all visitors
officers are a benefit, as long as
fatigue and heat-related trauma.
should always be encouraged to
Practical training can result in
report injuries.
trauma, so a first aid kit should
Participants should be
• control the issue and return of
• ensure that all persons
• check all persons entering
• ensure that all procedures regarding safety, discipline and regulations are enforced • ensure that all participants
of how many instructors are
everyone leaves, and requires a
should support safety officers in
they are trained and understand their specific role. People tend to perceive what
always be readily accessible.
conversant with the safety
Identification of the first aid
guidelines, since they are the
are wearing the appropriate
this has implications for safety.
kit is an integral aspect of the
foundation upon which a
approved safety equipment
Safety officers may assume that
safety brief.
proper training attitude is built.
• conduct a wellness check of all
they expect to perceive, and
participants are not in possession
Instructors should cover them in
participants at the completion
of prohibited items simply because
resources are appropriate to the
detail at the commencement of
of training
they were told not to bring them,
subject matter and are safe. To
training and participants should
demonstrate a technical aspect
acknowledge their understanding.
and safe after training is
during a search even if they are
in the classroom prior to the
Instructors should constantly
concluded
in plain sight because, on some
Make sure that training
securitysolutionsmagazine.com
• ensure the venue is left clean
or they might overlook items
SECURITY SOLUTIONS // 35
OPERATIONS
piece of protective gear comes off, immediately protect the area with the hands and go to ground calling the warning command. The action must stop and the gear be replaced when instructors indicate it is safe to do so. Instructors should encourage participant questions and monitor whether they understand instructions. Instructions must be kept simple and instructors must be vigilant at observing participants for safety. If issues occur, stop training if necessary to ensure participants understand the safety rules.
Protective Equipment Instructors should regulate the type of gear and equipment used in training. If live weapons are used, they must be carefully inspected, marked and, if using NLTA, properly converted and loaded. There are numerous specialty ammunition products available and so it is essential to understand different types of ammunition and their design level of cognition, they expect
participating in any level
training can be hazardous.
purposes and capabilities.
it to be there, and so might not
of training.
However, a balance between
Education is the key to safety for
training safety and reality can
the recognition of appropriate
be reached.
types of training weapons
consciously register that they
The key firearm safety rules,
are looking for them with the
designed to reduce harm caused
opposite intention – in training
by mishandling firearms, are:
it should not be there. With
• treat every firearm as loaded
distractions associated with disorganised training which
(check always)
Additional safety guidelines for operational training activities include the following:
• maintain strict trigger finger
and ammunition. Protective gear should be carefully considered and chosen to best suit the training situation.
lacks control over participants,
discipline at all times (prevent
Monitor Safety
The minimum mandatory
the likelihood of overlooking
unintentional discharge)
Everyone has a safety
protective equipment for NLTA
responsibility in training. If
is head, throat, groin and hand
weapons is high. It is essential
• maintain strict muzzle
to use trained and dedicated
discipline at all times (ensure
participants perceive a hazardous
protection, based on experience
safety officers who function with
safe direction)
situation they should shout the
and injury research; body and
warning command ‘STOP, STOP,
limb covers are recommended.
conviction, where these different
• know your target and
circumstances evoke different sets
what is beyond it (ID
STOP!’, which is simple, loud,
Protective gear for non-
of expectations.
before engagement)
clear and specific. When training
participants depends on their level
is highly active, participants
of participation and proximity
are more likely to respond to a
to the action. Reasonable safety
Safety Guidelines
In reality-based training, the
Operational training guidelines
issue is that people point real
pre-conditioned command or
protocols and using appropriate
consist of firearm safety rules,
firearms at others; however, firing
sound like a whistle, which cuts
protective equipment creates
plus additional safety guidelines
non-lethal training ammunition
through adrenalin and stress.
liability protection regardless
that cover various aspects of
(NLTA) at others in training fits
Upon hearing the warning,
of the equipment manufacture
practical training, especially
within these rules when viewed
instructors should stop the
source. For protective equipment,
reality-based activities. They
in context. The use of force and
exercise, ascertain the issue, clear
research carefully, test
should be followed by anyone
real weapons during operational
it, and restart the activity. If a
extensively, wear properly and
36 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
“Accidents are caused by people, not equipment, and occur when an unsafe condition and unsafe act are present at the same time.� use appropriately. Negligence
may manifest if participants
tension through aggression,
care. With proper safety protocols,
results from injuries that were
feel out of their depth, or if role
avoidance or humour, which
this is avoidable. Documentation
predictable and yet no steps were
players go too hard or do not react
can deteriorate into frivolous
and reporting will play an
taken for avoidance.
appropriately, or it may kick in
behaviour and thereby create
immense role in demonstrating
instinctively the first time they
hazardous situations. Instructors
propensity for vigilance against
gear permits mobility, tactility
receive force applied to them. Both
and role players can also
avoidable injuries and for
and visibility. Although sensory
of these aspects can create serious
exhibit adaptive behaviour, but
improving in areas where minor
input is reduced with protective
safety hazards, so composure and
letting this happen could cost
injuries have occurred.
equipment, many issues can be
self-discipline must be maintained
professionalism and safety in
overcome through site selection
at all times.
training. Training should be
an excellent opportunity to
enjoyable, but not unsafe.
provide realistic experiences
Proper selection of protective
and organisation of the training
Some people will not
Operational training provides
to limit participant exposure to
participate in training regardless
adverse elements. Many perceived
of how well organised and
Document Injuries
might otherwise be physically,
limitations of protective gear
how safely it is conducted. This
It is important to learn of existing
emotionally, psychologically and
can actually be valuable training
resistance is often related to
health problems participants
professionally unprepared to
tools if properly considered.
past experiences and mostly ego
may have prior to beginning
handle critical incidents. There
Head armour reduces visibility,
related; they believe training
training. A systematic approach
are enough real operational
hearing and the ability to speak
is designed for failure and do
to injury control places the onus
hazards; officers should not
clearly, but this forces participants
not want to be subjected to a
on participants to declare injuries
have to wonder whether they
to use simple, clear and loud
degrading experience. Forcing
and has an injury documentation
are going to actually get harmed
verbal commands and creates
someone into a situation does
procedure. It is essential to ask
during training.
the necessity to scan and breathe,
not inoculate him against that
participants about any potential
which is important during a
behaviour, but reinforces it
issues and existing physical
in lax safety protocols that can
stressful encounter.
and creates a phobic response.
injuries. Once an injury is
result in preventable incidents
Participants should understand
identified, avoid doing anything to
and trauma. The nature of
Professional Conduct
they are demonstrating an
complicate matters.
operational training requires
Participants exhibit a range of
objective standard of performance
reactions during training. In
not related in any way to any
minor ones, need an incident
injury-free training. Ultimately,
addition to testing knowledge and
other participant or activity. For
report. This is important not just
this is the responsibility of the
skill integration with policy, a key
operational training to work
from the perspective of avoiding
instructor. Safety in training
benefit is real reactions under
effectively, they should view the
future occurrences, but also to
is simple but not easy, but it is
simulated stress. Since safety
activity as a real situation, and
protect against program mortality.
definitely worth the effort. n
is the foundation of training,
deal with it with the same level
If training is effective and realistic,
participant conduct should be
of professionalism, and with
injuries can happen, which is why
professional and never violate
regard to the same justifications,
those that are avoidable should
internationally certified tactical
safety guidelines.
outcomes and consequences,
be, and those that are explainable
instructor-trainer, Director
in a training environment that
must be. People who choose a
and senior trainer of Modern
participants do not view the
provides a positive learning model
dangerous vocation can take legal
Combatives, a provider of
exercise as valuable, and therefore
through successful repetition.
action for personal injury inflicted
operational safety training for the
during their duties (including
public safety sector. Visit www.
Ego can manifest if
decide not to take it seriously, or
Operational training can
to dedicated officers who
All incidents and injuries, even
Flawed assumptions result
strict discipline, as the goal is
Richard Kay is an
if they introduce a competitive
be a tense environment for
training) in cases of deliberate
moderncombatives.com.au for
element into an exercise. Fear
participants and they often diffuse
indifference or lack of reasonable
more information.
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 37
FEATURE
FUTURE USES OF VIDEO ANALYTICS IN CCTV BY RACHELL DELUCA
38 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Video analytics in simple terms
fatigue. Human operators are
a valuable tool in reducing the
optimisation, which allows
is the technique used to describe
not capable of alert observation
lengthy process of manual review
adopters of the technology to
the algorithmic processing and
of a large number of cameras for
of countless hours of video from
reap benefits through multiple
analysis of video, either in real
long periods of time, and often
numerous cameras.
business streams with unlimited
time, or in pre-recorded format.
there is a need to review large
It is a term that has usually been
amounts of recorded video to
Current Uses
associated with CCTV cameras
extract video sections specific to
Video analytics is currently
that have been installed for
a particular event – a task often
being used across a range of
the purposes of surveillance;
impacted by strict time constraints
industries and sectors, including
however, as the technology
and urgency.
airports, transportation
Airports
and roads, government, city
Airports have been early investors
improves and advances are
Having software analytics
future options as the technology advances further. Some examples of the current applications include:
made, potential is being realised
review footage and determine
surveillance systems, critical
in analytical software due to
in other applications and across
abnormal behaviour and activity
infrastructure and commercial
their unique risk profile and high
many industries.
that exceeds pre-determined
and industrial applications.
patronage of transient users.
thresholds in many cases is
Current applications of video
As a result, they experience
are clear to any potential user
more accurate than detection
analytics is seeing the technology
an increased level of security
due to the cost savings that
via the human eye alone. Used
perform a dual function, firstly
from use in traditional areas of
come from reduced reliance on
in conjunction with human
in providing critical security-
perimeter protection, intrusion
human operation, both in paid
resources to review the material
related information and secondly
detection using virtual zoning,
manpower hours and in accuracy,
detected by the analytical
in providing data on business
passenger and vehicle tracking,
particularly when impacted by
software, video analytics becomes
intelligence and resource
surveillance and monitoring
The benefits of video analytics
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 39
FEATURE
of pick-up and drop-off areas,
data, such as car park usage, store layout and configuration
Transportation and Roads
Future Uses
abandoned vehicle monitoring, package and baggage alerts and
performance analysis, patron
Transportation and road
technology are likely to be
facial recognition.
dwell times at particular shelves
surveillance is an industry
centred on increased customer
or items, marketing campaign
sector that has embraced video
service and adding value to,
airport environment include
effectiveness analysis, shopper
analytic technology for safety
and streamlining of, the user
the optimisation of staff and
counts and typical shopper
and security reasons, as well as
experience, across a large range
resource deployment at high-
analysis, queue management,
effective traffic management
of different environments. This
traffic or problem areas, location
people tracking and counting
and incident response. The
will build upon the existing
of missing passengers who are late
and recognition, and even event
timely identification of incidents
behavioural analysis uses of video
for a flight, the prediction, and
monitoring and counting on
and response generation are
analytic technology, moving away
therefore minimisation, of traffic
casino gaming tables.
of critical importance in these
from traditional security-incident
areas and video analytics are
detection and more into data
Additional benefits in an
bottle necks (both pedestrian
Traditional security uses for
Future uses of video analytic
and vehicular) and queue and
video analytics in commercial
enhancing existing systems in
collection on how users interact
crowd management.
environments include intrusion
detecting issues and generating
with particular environments.
detection, perimeter detection,
alarm signals for response.
Commercial
detection of blocked exit paths
Types of issues that are detected
proven to be an effective tool
Current commercial applications
and emergency exits, detection of
include congestion and incident
for security use; however, the
of video analytics include
abandoned vehicles or packages,
detection, smoke detection
potential for marketing, safety
corporate office buildings,
location of key persons, tracking
in tunnels, active traffic
and behavioural analysis is only
supermarkets, retail shopping
and monitoring of staff and
management and the detection
recently becoming a feature
centres, heavy industry, banks,
security personnel, loitering and
of bottlenecks and congestion
recognised by adopters. Future
hotels, casinos, sporting arenas
vandalism protection, protection
and stopped and abandoned
uses will include high-level
and stadiums. Often the analytical
of stock and high security items
vehicle detection, which may
integration of video analytics with
software is added to an existing
through the creation of secure
indicate a breakdown or
other systems, such as building
CCTV system’s architecture to
zones and the detection of smoke
other emergency situation on
automation, access control,
enhance it and provide beneficial
within a facility.
the roads.
building management and lighting
40 // SECURITY SOLUTIONS
Video analytics has already
securitysolutionsmagazine.com
the end of each day, increased
environment in terms of lighting
technology is stricter policing
safety mechanisms could be
or temperature to one single user,
and law enforcement.
programmed into the system
such systems might instead display
that identified which staff
personalised messages, including
predicted to be quick to engage
members were onsite after dark to
loyalty program information
detection of parking violations,
automatically ensure that lighting
and benefits to users as they
also utilising number plate
along their path of egress was
engage with the environment. In
recognition for swift infringement
on, that machinery and systems
a shopping centre environment,
notice issuance; however, the
were shut down and left in a safe
this may include personalised
technology could also be used in
manner, timecard and attendance
centre maps with directions to
more effective design of car parks
registration was updated, and
favourite stores, or information
and review of time restrictions
that all personnel had been
on sales when a user presents at
based upon the data gathered
accounted for.
an information booth. Similarly,
about actual usage.
In the future, high-pedestrian
frequent flyer programs could
Municipal councils are
Likewise, police and road
commercial environments, such
provide customised information
traffic authorities will embrace the
as sporting arenas, shopping
to their members at airports
analysis of vehicles that tailgate,
centres, stadiums and casinos,
around the world, in a variety
speed, travel the wrong way,
are likely to further develop
of languages, both personalising
illegally turn, block intersections
their tracking and analysis of
and streamlining the customer
and train lines, and those that
pedestrian activity to predict
experience and providing benefit
do not accommodate emergency
and respond more efficiently
to users.
vehicles. This is likely to see an
control systems, audio visual
to incidents and disruptions.
systems, and IT infrastructure to
This will be supported by more
analytical system likewise
at first, but as understanding grows
combine the security features with
effective human resource
will direct future marketing
of how our roads are used, it will
those that will enhance the user
management and deployment,
campaigns and increase
likely result in better designed
experience and collect valuable
incident response and provision
understanding of how customers
systems with emergency lanes,
data about its users.
of facilities such as parking,
interact with products, impacting
bike lanes and better systems for
washrooms, food and beverage
product displays, store layouts
all users, which is consistent with
Commercial
options and the like, all of
and pedestrian paths through
the overall future prediction of
In a commercial setting, the
which will streamline the
store environments. Whilst
enhancing the user experience.
analytical software could be set to
user experience and reduce
these systems have already been
detect a user’s entry to the facility
security and safety concerns for
implemented by individual early
analytics is endless and will be
via CCTV and commence a series
the facility.
adaptors, the potential for it to be
limited only by the creativeness
shared amongst companies and
of those who apply it. The ability
applied across a greater range of
to track, monitor, detect, count,
sectors is something that will no
recognise and identify individuals,
lighting settings, to audio visual
Retail, Membership Programs and Marketing
doubt be developed heavily in
vehicles, freight, animals and
messages, such as reminders
Future uses of video analytics
the future.
virtually any conceivable item and
or alerts being displayed on
within the retail and marketing
screens and interfaces, booting
sectors is predicted to be one
into appropriate IT systems,
of integrated operations particular to that user. This may range from building temperature and
Data gathered by the
increased number of infringements
Overall, the potential of video
assess it against pre-determined algorithmic behaviours is limited
of the highest growth areas
Policing and Law Enforcement
start-up of heavy machinery
of technology uptake and
Finally, whilst many potential
behavioural algorithms, and the
or plant, to timecard and
implementation. In these
future uses of video analytics
creativity of those creating them. n
attendance integration and
sectors, customisation of the
seek to enhance the user
registration with evacuation and
user experience is more driven
experience in a positive manner,
emergency systems of the users
by the potential for increased
providing mutual benefit to
security consultant at Aurecon,
present within the facility at any
sales and profit, so whilst it may
the user and provider, one
focusing on electronic security,
particular time. Conversely, at
not be possible to customise the
very likely future use of the
resilience and risk.
securitysolutionsmagazine.com
only in the creation of those
Rachell DeLuca is a senior
SECURITY SOLUTIONS // 41
BUSINESS
HOW THE BEST STRATEGY CAN COME DOWN TO BETTER ACTION BY MICHAEL MCGRATH
42 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
There are a lot of great security
happen as intended. There is
an adequate strategy into game-
not be shy of comparisons against
strategies that can suit a given
a real discipline, cohesion, a
changing action.
other companies if it means your
set of circumstances, but one of
process and a culture required
the greatest strategies is almost
to make a company perform well
Here is how you can do it:
not a strategy at all – it is being
in turning strategies into actions,
1. Start at the top
better at putting any security
repeatedly and reliably. So much
As the leader of your department
– the ones that really matter.
strategy into action. The biggest
so that becoming good at this can,
or company (if it is your security
Then coach people to perform in
impediment to a great strategy
in itself, be a powerful strategy.
business), it starts with you. You
these areas.
is failing to do that. Even modest
If you are running a security
set the tone and the reality of your
strategies can out-perform
business and your competitors
intention to turn strategy into
2. Use actions to change culture
breakthrough strategies if they
are strong, but not necessarily
action. Be in touch with the day-
To change culture toward one
are executed by a company that
responsive, decisive and effective,
to-day realities of the company
that achieves things, change the
does it well. That is because it
then your chosen strategy could
(department), your people, the
way your team act. It is actions
is usually tough to make things
be to become the best at putting
financials and the operations. Do
that change culture, not the other
securitysolutionsmagazine.com
company might evolve and act more strongly. Focus on only a few priorities
SECURITY SOLUTIONS // 43
BUSINESS
way around. So, reward the
you hire the right people from the
the unity of the company, the
effort. This way, you involve
achievement of the company’s
outset. Do not choose people you
execution and the deliverables are
them in how different programs
(department’s) priorities, the
are simply comfortable with. That
what are primary.
will affect them, how they need
doers who get things done.
may not stretch you, challenge
So, those basic boxes to tick
Provide an open dialogue
assumptions or achieve honest
for an adequate strategy are to
others in their team, and everyone
environment so that realities
dialogue. Instead, discriminate
understand your market, your
knows what will be expected of
and feedback get passed upward,
between the strong performers
competitors and your company’s
not only themselves but of others.
downward and sideways. That
and poor performers. Hire the
strengths and weaknesses. A
The outcome is ownership and
means do not punish bad news.
strong performers. Then develop
strategy that takes these into
accountability. The actions are
Dialogues do not have to be formal
the right people, train them, coach
account is in a pretty solid context.
more likely to occur as intended.
meeting structures. Informal
them and foster the next leaders.
communications work fine. The
to accommodate the needs of
5. Put the strategies into a plan
6. Putting the plan into action
best are open, candid, without
4. Get the right strategies
Make your plan far more than
Getting action uses the processes,
recriminations and encourage
This may seem simplistic, but
targets and costs. Include the
people and strategies now in
issues to be surfaced.
the right strategy might be
‘how’ behind the major programs.
place. Lead your company’s
very straightforward: to build a
What is going to actually happen
actions by maintaining the
set the example at the top. If
competitive difference, to promote
and when is it meant to happen?
disciplines. Hold meetings that
you model the right behaviour
it, to win customers and to
then your agenda will be
generate a profit.
And, of course, continue to
supported. Be accountable to the
Again, the strategy being
These programs should
report on actions and outcomes.
include the different facets of
Do these regularly, at pre-plotted
your company, even if it is a small
times. Provide feedback and coaching in real time.
company and others will accept
pursued here is in fact to be
business: marketing activities,
their accountability.
the most effective at putting an
sales activities, how your product
adequate strategy into game-
or service is delivered, what
reporting that shares progress
3. Get the right people
changing action. In this context,
new equipment and people you
and keeps the company’s people
Know what kinds of people you
provided you tick some basic
will need.
informed, heard, accountable
need to get certain tasks done. Be
boxes, what might normally
specific about what they need to
be regarded as strategy is not
different people from your
the achievements that are in line
achieve and how. Then make sure
primary. Instead, the speed,
company into one major planning
with the plan. n
44 // SECURITY SOLUTIONS
The key is to round up the
Encourage cross-functional
and supported. And recognise
securitysolutionsmagazine.com
ViDi Labs Academy
Login
Sign Up
CCTV - from light to pixels
Learn CCTV and IP Video Surveillance technology from the guru - Vlado Damjanovski
Enrol now
vidilabs.com/academy.html vidilabs-academy.teachable.com
Recognize AND Analyze Is she an employee?
When, where did she enter? How often was she here this month?
Is she a banned person?
Premier face recognition technology for real-time video surveillance, recorded video investigation, crowd detection, and anonymous people analytics
www.cognitec.com | info@cognitec.com
Does she appear in videos recorded last week?
How old is she?
COVER STORY
THE EVOLVING REALITY
OF BIOTERRORISM BY PROF RAINA MACINTYRE
46 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Key Points
against one person could spark
This dual-use research of concern
to do so in an open-access
• Designer pathogens can be
an epidemic because of contagion
(DURC) is technology that can be
journal. This research passed
and this gives it potential as a
used to benefit or harm humanity.
safety and ethics requirements
weapon of mass destruction. Most
It includes synthetic biology, an
in Canada without question. If
potential and are an existential
bioterrorism agents also occur in
unregulated industry that can be
law enforcement or intelligence
threat to humanity.
nature, so differentiating natural
used to create synthetic pathogens
agencies were tracking such
and unnatural outbreaks is a
in a lab; genetic modification of
research, they failed to detect it,
technologies – biology, AI,
challenge. Terror may be absent
existing pathogens to make them
but now it is entirely possible for
cyber, drones and robotics.
if bioterrorism is not recognised,
more dangerous; and even 3D
the smallpox virus, variola, to be
and incitement of terror may not
printing of biological materials.
synthesized in a lab.
technology, which is intended
be a motive for a biological attack.
Insect drones and radio-controlled
to benefit humanity, may also
In some historical instances, the
beetles further enable precision
information revolution,
be used to cause harm.
motive has been a stealth attack
targeting of biological attacks.
accessibility and availability of
rather than creation of terror.
Genetic modification of pathogens
scientific knowledge, public access
has been documented since the
to methods (recipes) for DURC and
documented throughout human
Soviet bioweapons program
platforms such as the Dark Web,
history. The Persians, Romans and
and has been revolutionised by
we are in a new era of biothreat.
can result in an epidemic
ancient Greeks used cadavers of
CRISPR Cas 9, a precision gene
The use of The Onion Router
or pandemic.
people deceased from infectious
editing tool that enables editing
(TOR – a Dark Web search engine),
diseases to contaminate water
of plants, animals, human beings,
cryptocurrency for transactions
supplies. Lord Jeffery Amherst
viruses and bacteria. Undesirable
and cybercrime (including
allegedly used smallpox-
genes can be removed, desirable
hacking of scientific intellectual
regulation or governance
contaminated blankets to infect
ones inserted and Mendelian
property and knowledge) are
of DURC.
American Indians, and similar
inheritance (the manner by
coalescing with biothreat, making
events may have occurred in
which genes and traits are passed
it easier than ever for groups to
A biological attack may be
Australia against Indigenous
from parents to their children)
collude, plan attacks and remain
defined as warfare or terrorism,
peoples. The Japanese conducted
bypassed altogether by the
undetected. The insider threat
depending on the perpetrator, but
biological warfare in China during
introduction of hereditable new
is also a major issue in the era
the act has the same consequences
WW2, dropping plague bombs
characteristics. The technology
of DURC, recognised by the US
on human health and life. In
over Manchuria. Despite being
can be used to engineer human
Commission on the Prevention
this article, I will use the term
a signatory to The Biological
beings, to eradicate entire species
of Weapons of Mass Destruction
bioterrorism. There are several
Weapons Convention, the former
or create biological weapons of
Proliferation and Terrorism in
definitions of bioterrorism,
Soviet Union ran a large-scale
mass destruction (WMD).
2008, who said, “Given the high
but the US Centers for Disease
biological weapons program,
Control and Prevention (CDC)
experimenting on anthrax,
believed the threat of smallpox
should be less concerned that
states, “A bioterrorism attack is
smallpox, Ebola, Marburg virus
was from the theft of stockpiles
terrorists will become biologists
the deliberate release of viruses,
and a range of other pathogens.
from the only two known
and far more concerned that
bacteria, or other germs (agents)
Many other countries, including
laboratories to harbour the virus,
biologists will become terrorists.”
used to cause illness or death
the US and the UK, had biological
in the US and Russia. It was
The 2001 anthrax attack in the US
in people, animals, or plants.”
weapons programs.
acknowledged that there was a
was traced to a strain from the U.S.
theoretical possibility of synthetic
Army Medical Research Institute
made by genetic engineering. • Some pathogens have WMD
• Dual-use applies to many
• Biological research or
• Harm can occur generally by two mechanisms: a laboratory accident, or deliberate release. • In the case of biology, DURC
• Capability is cheap, accessible and getting more so by the day. • There is no global, enforceable
In the era of hybrid warfare,
Bioterrorism has been
The risk of bioterrorism is
Prior to 2017, security experts
Combined with the
level of know-how needed… (we)
economic warfare can be waged
a function of both intent and
smallpox being manufactured in
of Infectious Diseases (USAMRID)
by targeting crops or livestock,
capability. Terrorist groups have
a lab, but this was dismissed as
lab, and the main suspect was a
for example. Biological agents
made their intent to use biological
too difficult a task and therefore
USMARID anthrax scientist, who
as weapons (bioweapons) may
weapons clear. Capability has also
unlikely. In 2017, Canadian
committed suicide before he could
be used against an individual as
increased because of advances in
scientists created an extinct pox
be charged. Insider scientists
a gun may be used; or against
technology, which make genetic
virus, closely related to smallpox,
may have additional motives to
populations as a bomb may be
engineering and synthetic biology
in a lab using mail order DNA. In
the ones outlined in corporate
used. However, a bioweapon used
accessible and relatively cheap.
2018, they published the methods
and other crime – for example,
securitysolutionsmagazine.comSECURITY SOLUTIONS // 47
COVER STORY
“Prevention is better than cure, and prevention rests squarely with law enforcement, defence and intelligence agencies. The combination of legislation, intelligence and law enforcement can be used to detect, prevent and disrupt planned attacks.”
patents on drugs and vaccines,
these self-regulated labs is not core
easier than to nuclear weapons;
high-impact research publications,
business for law enforcement, yet
biohacking may be a priority for
attack look like and would we
research grants and the prospect
issues extend beyond the actual
nefarious actors. Just as the ease
even recognise one? We may
of prestigious awards may all
experiments within these labs to
of access to technology has seen
imagine a zombie apocalypse
motivate an insider scientist.
the risks associated with biological
a proliferation of illegal drug labs
or, at the very least, sirens and
Insider threat may be at the level
waste disposal in an unregulated
in the community, so too might
HAZMAT suits, but this may not
of junior scientists or research
and unmonitored setting. Whilst
there be illegal bio labs in the
be the case. The motives and
students, up to the most senior
authorities are aware of official
community. It is likely the threat is
perpetrators may be different
scientists, any of whom may be
DIY labs, what of the unofficial
occurring on domestic soil – which
to other forms of terrorism
susceptible to grooming, recruiting
ones? Lab-in-a-box kits can be
means front-line responders will
and an attack may pass as a
and infiltration by terrorist
purchased online and DIY labs can
be exposed and need protection.
natural event if the intention
organisations or hostile states.
be established with relative ease.
We do not look for these threats
is a stealth attack or to mimic a
Genetic code can be purchased
or think about the possibility, but
natural event. A classic example
proliferation of do-it-yourself
online and methods to create
what does it mean for front-line
is the largest documented
(DIY) and biohacker labs and
super-viruses are published online
police, who may be increasingly
biological attack in the US, the
the accompanying movement to
in open-access scientific journals.
exposed to biological risks in
Rajneesh salmonella attack,
‘democratize science’. Monitoring
Access to biological weapons is far
their work?
which public health experts
Another concern is the
48 // SECURITY SOLUTIONS
So, what would a biological
securitysolutionsmagazine.com
a stealth attack, to make enough
public health response should
legislation, such as the Biological
locals ill so they would not be
commence within about a week
Weapons Convention, is not
able to vote in a council election,
after the first case of smallpox is
enforceable and the patchwork
enabling the Rajneesh cult to win
diagnosed, or a severe epidemic
of other relevant laws which
and control the council.
may result. If 95 percent of
exist do not adequately cover
patients are rapidly and effectively
the contemporary threat of
air testing experiment by the
isolated, outbreak control can
bioterrorism. The best prospect
U.S. Navy over San Francisco in
be achieved within 100 days.
for prevention of attacks
1950, resulted in at least 11 people
However, if isolation rates and/
is domestic anti-terrorism
developing an unusual illness.
or contact tracing rates are not
legislation, which would need to
However, health experts failed
high enough, the epidemic may
be revised to ensure bioterrorism
to recognise this as an unnatural
blow out. In such an epidemic,
is clearly in scope. Revision is
outbreak at the time and the truth
the ability to treat other urgent
needed for the definition of
was only revealed almost 20 years
health conditions, such as heart
terrorism (as many historical
later. In fact, the only infection
attacks or strokes, may be
biological attacks have not
which would be immediately
impacted by shortages of staff and
included incitement of terror
recognised as unnatural is
hospital beds.
or coercion as a motive) as well
Operation Seaspray, an open-
smallpox, because the infection
How likely is it that someone
as powers to prevent a suspect
was eradicated in 1980. Proving
will create a WMD such as
from accessing a laboratory
bioterrorism can only be done by
smallpox? If a reproducible
or dangerous pathogens while
law enforcement or intelligence
method for hacking bank
investigations are ongoing.
agencies. Public health experts
accounts is published on the
In considering the need for
can only point to unusual patterns
Internet, we probably agree it
legislation specifically to stop
of disease, but usually do not,
would be used by criminals. Why
potential bioterrorism, the risk
as this is not part of training in
then would it be any different
posed to the community by a
public health. The technology and
for published methods for
suspected rogue scientist working
intent are present, so how do we
creating pathogenic viruses?
with a dangerous pathogen in
know if man-made epidemics are
Prevention is better than cure,
a legitimate, DIY or clandestine
already occurring? If we do not
and prevention rests squarely
laboratory must be weighed
ask the question, we may never
with law enforcement, defence
against the individual rights
find out.
and intelligence agencies. The
of that scientist. In terms of
combination of legislation,
regulation and governance, the
the worst threat would be an
intelligence and law enforcement
US government has a National
infection that can spread from
can be used to detect, prevent
Biodefense Strategy and a Blue
person to person, such as smallpox
and disrupt planned attacks. Just
Ribbon Biodefense Panel, for
or pandemic influenza. Anthrax
as intelligence is used to prevent
which there is no equivalent in
can cause high fatality rates, but
kinetic attacks, the same methods
Australia. While the US and the
is not spread person to person,
(with different keywords and
European Union grapple with the
assessed as a natural event,
so harm would be limited to
search terms) could be used to
problem of DURC, Australia has
despite inconsistent facts. Even
the radius of contamination
prevent biological attacks. For
relaxed export controls for DURC
when Rajneesh (born Chandra
following an aerosol attack. Using
example, rumour surveillance (a
and approved the use of CRISPR
Mohan Jain and also known as
mathematical modelling, a worst-
term used to describe a collection
Cas 9 for gene editing.
Acharya Rajneesh, Bhagwan
case scenario attack of smallpox
of unofficial systems) could be
Shree Rajneesh and latterly as
would cause a global pandemic
used to detect chatter about
analogous to cybersecurity.
Osho), an Indian spiritual guru,
that could last years, with impacts
planned attacks. Just as sales
Technology has outpaced
philosopher and the leader of the
worse than a nuclear strike. In a
of chemicals that may be used
governance, legislation
Rajneesh movement, confessed
city like Sydney, despite our good
for manufacturing explosives
and preparedness, and law
six months after the attack, he
health system, an attack could
are flagged in hardware stores,
enforcement was slow to accept
was not believed, and we would
have severe impacts. Every day
so too could sales of materials
that cybersecurity has become
be none the wiser today if not
of delay in response counts, and
and equipment for biological
core business. We are at least
for the fact the Federal Bureau of
we need the physical and human
experiments be flagged. However,
10 years behind in biosecurity
Investigation (FBI) accidentally
resources to isolate infectious
tracking such transactions
compared to cybersecurity and
stumbled upon the Rajneesh
patients in appropriate hospital
would require tracking of
there are many steps that can be
laboratory a full year after the
isolation rooms and to track and
online orders and transactions
taken to mitigate the threat, but
attack. The motive in this case was
vaccinate contacts of patients. The
in cryptocurrency. Existing
time is running out. n
In the case of a WMD event,
securitysolutionsmagazine.com
Biosecurity is in many ways
SECURITY SOLUTIONS // 49
AVIATION
50 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
LAGs Screening
Is It Still Relevant?
It has been almost 13 years
the time looking at some images
Cebu-Tokyo and Yousef boarded
that showed damaged control
not been able to take liquids,
the aircraft as a passenger Manila-
cables. The crew and passengers
aerosols or gels (LAGs) onto an
Cebu. He had everything he needed
were extremely lucky to survive
international flight. This article
to create an improvised explosive
Yousef’s test.
is intended to have a look at
device (IED) on his person. All of
the history of LAGs and if the
it was relatively innocuous and
of the device. Yousef, together
prohibition of LAGs in the cabin of
easily passed through screening.
with Khalid Sheikh Mohammed,
a passenger aircraft is still valid.
After take-off on a relatively sector
planned to destroy 11 US-
The late 1980s and early
flight, he went to the toilet and
registered aircraft on flights from
1990s was an interesting time
there assembled the IED, which
Asia to the US.
in aviation security. We started
only contained 30ml of liquid
screening domestic flights
explosive. The timer, an electronic
a number of these IEDs and his
in Australia; initially only a
wristwatch, was set so that the
accomplices would board each
percentage, but it quickly became
aircraft would be well into its
aircraft for one sector, assemble
every flight. In 1989, there was
flight to Tokyo. He also planned to
the device and deboard at a transit
a double whammy, with the end
place the device so that it would
port that was also the last port of
of the Australian Airlines and
explode over the centre fuel tank.
call to the US. Fortunately, Yousef
Ansett Airways duopoly, and the
To achieve that, he moved seats
was discovered and arrested on
pilots’ dispute. It is fair to say that
to ensure that the device was in
6 January 1995 and the plot was
I learned more about aviation in
an optimal position and secreted
abandoned. Subsequently, the
this period than any time in my
it in a life vest holder. He left the
US authorities told all aircraft
career – it was also the hardest
plane in Cebu and, since he had
operators flying to the US that
that I have ever worked.
his baggage with him, no one
they had to examine all carry-on
was suspicious.
baggage at the last port of call into
On 11 December 1994, Ramzi Yousef bombed Philippine
securitysolutionsmagazine.com
The aircraft operated Manila-
since the travelling public have
However, this was only a test
Yousef’s goal was to create
The device worked and, in
the US and stop people carrying
Airlines Flight 434 (Cebu-
the subsequent explosion, one
any liquid, including toothpaste,
Tokyo), killing a passenger and
passenger was killed and a
into the cabin of the aircraft.
almost downing the aircraft.
number injured. Fortunately, the
Interestingly, the threat was to US-
The operation, while complex
aircraft was slightly modified so
flagged aircraft and I recall that the
in preparation, was simple in
the explosion didn’t affect the
US operators told the US Federal
its execution.
centre fuel tank, but I recall at
Aviation Administration (FAA)
SECURITY SOLUTIONS // 51
AVIATION
that the extra cost to US operators
terrorists using a liquid explosive
in 1995 and the response was like
was an unfair impost and that
in a device constructed on an
in 1995, but more severe – they
authorities reached the measure
all carriers should be required
aircraft in an attempt to destroy
banned all liquids from the cabin
of 100ml (volume) or 100 grams
to undertake similar screening.
that aircraft. To be clear, he
of the aircraft, even pens since
(weight) or less of liquids, aerosols
The Europeans (especially the
successfully assembled, secreted
they contain liquids.
or gels. It is an odd measure
French) told the US authorities
and detonated an IED in the
that they would not comply and,
cabin of an aircraft, and if not for
aviation was horrific. British
remember was the first successful
if any of their operations into
‘luck’, that aircraft would have
Airways cancelled 1,500 flights in
liquid IED used in aviation, used
the US were restricted, then they
been destroyed.
that first week at a cost of about
about 30ml of explosive. Today, in
£50 million. People travelling
addition to the now mainstream
would restrict US operations
Yet there was no reaction
The immediate effect to
I do not know how the
given that Yousef’s device, which
into Europe. European politics
from government or the security
to Europe swapped to trains at
LAGS, we add inorganic powders
won and they did not bother
industry for almost 11 years and
a rate, at one point, of about 10
not exceeding 350ml or 350g in
with the checks, but Qantas
even then the reaction was not
per minute.
weight. All these measures are
did. Consequently, I spent a
in response to Yousef’s bombing,
reasonable part of January and
nor was it due to a change in
untenable and, within three
February 1995 in Tahiti (then a
technology. In August 2006, UK
months of the original ban, the
(to be blunt I do not know of any
last port of call for Qantas into the
authorities became aware that
restrictions were eased a little
evidence to support it), but it is
US) – it was a hard job with only
there was a viable threat to
and a ‘temporary’ measure that
one that I have always thought
one aircraft around midnight, but
aircraft travelling to the US across
we now call LAGs screening
valid: three people working in
someone had to do it.
the Atlantic. The information was
was implemented. Like most
concert will defeat most security
that terrorists intended to carry
temporary measures in security,
systems or processes.
To me it is because it has largely
liquid explosives onto several
it has become permanent
been forgotten and it was really
flights and create an IED on
and now expanded to include
problem with LAGs as a concept
the first case, that we know of, of
board. This was much the same as
some powders.
and have mentioned them in
Why is this plot important?
52 // SECURITY SOLUTIONS
As a measure, it was
per person. This is not a hard and fast rule
I have always had a little
securitysolutionsmagazine.com
earlier articles, but I may as well
baby powders and
for five or six years where the
current format, especially for
repeat them:
most cosmetics, so
machine does not check against
liquids. I would suggest that tied
• The amount of liquid that we
I could present an
a library of explosives; rather,
together with other technology it
restrict does not match the
allowed container with
it takes a sample and causes a
could be made useful, it may even
only successful example of an
modified contents.
micro-reaction from the substance
be worth replacing the random
to see if it is explosive material or
and continuous ETD screening
IED constructed in flight by
• The rules do not consider
the offender (30ml).
people acting in concert. They
not and, I have checked, it could
that we already use with this
• We do not rely on any
are per person! So, a family of
with little modification be used
technology – that process would
technology to screen the items
four can take four times the
on liquids. It does not necessarily
likely take more time and be a little
presented or exempt. They
amount of restricted product
identify the explosive, which is
more invasive.
are usually just provided for
into the cabin, then think of a
not what regulators like, but as
visual examination.
group of people.
an operator, in the first instance I
worthwhile process? I have never
o Of the inorganic powders
• There is technology that can
Is LAGs screening still a
would like to know if something
been confident in it as an effective
that are banned, only some
detect these explosives.
was a danger rather than know
solution. It has some small
talcum powders, some
That last point has probably
what it is!
deterrent effect, and it may stop
powdered deodorant and
raised a few questions. I am not
Why is this technology not
certain foot powders are
going to go into exactly how
being used? I am not sure, but I
the more incompetent terrorist. Would it stop someone like Yousef
banned, so if I know which
explosive trace detection (ETD)
would think that checking every
or a sophisticated terrorist?
ones are allowed, I could
works, but the ETD that most
liquid, aerosol, gel and powder
Probably not.
simply empty the container
people know at an airport uses a
going into the aircraft using
of allowed products and fill
library of known explosives and
this technology would be time
that once terrorists decide on a
with disallowed powders.
An interesting side note is
checks the samples taken against
consuming and probably quite
good target and/or method, they
o Some of the exempt
that library. I know that there is
expensive. I also think that there
will not forget, they will wait and
powders include
a process that has been around
would be a need to modify the
revisit it later. n
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 53
FEAUSRE
RECREATIONAL OUTRAGE BY DON WILLIAMS
54 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
One of the interesting things
the most inconsequential and
offended. Talking truth to power
might it occur in the corporate
about delivering courses for a
innocuous things. Furthermore, if
has always been dangerous, but it
world, particularly to those who
reputable provider is reading the
they cannot find personal offence
now appears that talking truth to
must state the unpalatable?
student critiques. Having revised
in a matter, they will happily take
anyone can result in being ‘outed’
and delivered the Diploma of
up the torch and become offended
as insensitive and offensive.
Security and Risk Management,
on some else’s behalf – even when
the student feedback was
the supposedly aggrieved victim is
situation in which an employee
upon a time, if someone felt truly
particularly important.
not actually offended.
complains to management that
offended to his very core based on
his partner was informed that the
the belief that his righteous view
Students can choose to
The other point of interest is
To provide context, imagine a
What is unclear is when we went from righteous indignation to ‘recreational outrage’. Once
provide their names or remain
the need to do so anonymously
office where he works could be
of the world had been attacked,
anonymous; in either case, the
(I checked – not for the name
subjected to workplace violence.
he could be indignant. It was
presenter has no visibility of who
but just to see if one had been
Or that he has been told the
expected that this person would
said what. A student commented
provided). At no time during the
reason things are locked away in
respond visibly and formally,
that one of the guest lecturers
10 days of presenting did anyone
the workplace is because there is
even forcibly, with the courage
made offensive comments, which
suggest that the tone, content or
the potential that someone in the
of his convictions. It was not an
I found surprising as, having sat
delivery were inappropriate or
building might take something,
enjoyable exercise and required
through the presentations myself,
of concern. If they had, the issue
thereby implying that there are
personal commitment.
I failed to note any offensive
could have been addressed and
dishonest people in the building,
comments. That said, I am old
the content of concern reviewed
which the employee finds to be
achieved an almost universal
and opinionated, so perhaps I
and, if necessary, adjusted. Just
an offensive concept. Or, the
state of recreational outrage
missed it. Thinking back on the
because a complaint could have
reason someone needs a specific
where anyone can find or actively
course, I can only assume that the
been raised does not mean
clearance before accessing
seek offence, whether against
complaint was made in reference
the material must be changed.
particular information is because
themselves or on behalf of others.
to one particular presenter who,
Sometimes the material is correct;
it is necessary to ensure he or she
Researching recreational outrage
in my opinion, was not so much
it is perception that must be
is a fit and proper person – or,
suggests the common features are:
offensive as honest. Perhaps blunt
addressed. As someone said,
perish the thought, he/she fails the
enjoying the experience of venting
truth has become offensive to
“Because you are offended does
assessment and is found not to be
on a topic; enjoying a position of
some people?
not mean you are right.”
appropriate. How offensive might
moral superiority; not necessarily
that be?
being directly involved or affected
The same student also
Offence is in the ear of the
suggested that some of the
beholder. What one person
comments made during the
hears as true may be unpalatable
telling the truth as we see it; do
on behalf of others; anonymity
course may have caused offence
to another. Because it differs
we stop advising on the reality of
or diffusion amongst a crowd –
to the military members present.
from the hearer’s view does not
threat vectors; do we stop pointing
for fear of being labelled a troll.
I also find this perplexing as,
mean it should automatically be
out vulnerabilities and exposures
Exceptions are those who have
while I had avoided telling my
considered offensive. Unless of
because someone may be
made a vocation of calling out
rude jokes about the Air Force, I
course the hearer is offended by
offended, or may think someone
behaviour, comments or opinions
did state that wearing a uniform
the fact that others have differing
else might be offended? Obviously,
that they see as being actually or
is not a security qualification
opinions, experiences and
we cannot stop doing our jobs – or
potentially offensive.
and noted that the military are
world views.
so we think. An internet search
trained to write in a concise
By now, readers are possibly
Do security professionals stop
Now, it appears, we have
by the issue but willing to speak
“Outrage is currently
of “academics afraid to speak”
America’s deepest core
rather than literary manner. For
wondering what, if any, relevance
will bring up reports from the
value – and it shouldn’t be,”
whatever reason, this may have
all of this has to security
UK, US, Canada and Australia on
stated Dylan Gallimore on the
caused offence?
management. The answer is
academics limiting their opinions
Arcmedia website. Gallimore
quite simple. It often falls upon
and teaching so as not to be
claims, “Psychologists have
with some interest upon the
the security manager to take
shamed, harassed and humiliated
increasingly warned of the
notion that there appears to be
responsibility for pointing out
on social media and in student
dangerous pleasures of outrage…
a growing section of society that
things that may be unpopular
forums for being offensive in one
Additionally, outrage is a social
is not only easily offended, but
and making statements which
form or another. If it can happen
emotion; it compels individuals to
almost eager to find offence at
could cause the susceptible to be
in the academic world, how easily
express their outrage publicly in
All of this leads me to reflect
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 55
FEAUSRE
search of validation and solidarity.
then we can seek to understand
Which means that while
the cause of the offence and try to
outrage remains a response to
placate them. Or, accept that there
perceived injustice, it can also be
are those who want the ‘buzz’ that
a self-serving emotional defence
comes from venting their moral
mechanism deployed to alleviate
superiority at the cost of others.
guilt, buffer threats to one’s moral
Perhaps we should be offended by
identity and portray oneself as a
their offensive behaviour?
very good person in the eyes of one’s peers.” Another online search for
Perhaps more people need to remember the adage, “A gentleman (or gentle person) is
addiction to outrage brings up
someone who is never deliberately
many refences; there are even
rude.” The right to tell someone
books on the subject of breaking
what you think should never
the addiction to outrage. It
be removed, but courtesy and
appears frequent bursts of outrage
politeness should always be
become addictive and, like most
employed, even when pointing
addictions, leads to a release of
out errors.
endorphins that make the person
Other than the issues above,
feel good. The more they vent the
the student critiques are good.
better they feel. Security offers just
It appears most stayed awake
another target-rich environment.
most of the time and if any did
Certainly, written and verbal reports of security issues must be
fall asleep, I would not have been offended. n
objective, professional, impersonal and polite. They must also be
Don Williams CPP RSecP
factual and honest. If people take
ASecM is a recognised thought
offence, we can ask them to argue
leader in security, emergency
the facts, not the emotion. Here
management and related
is the rub – offence is emotive. If
disciplines. His book, Bomb Safety
the concern was over the data or
and Security: the Manager’s Guide,
analysis, it can be discussed. If
is available from Amazon. Don
someone claims to be offended or
can be contacted at donwilliams@
believes others might be offended,
internode.on.net
56 // SECURITY SOLUTIONS
“All of this leads me to reflect with some interest upon the notion that there appears to be a growing section of society who is not only easily offended, but almost eager to find offence at the most inconsequential and innocuous things.”
securitysolutionsmagazine.com
VIDEO DOESN’T HAVE TO BE EXPENSIVE TO BE EFFECTIVE
With years of experience across hundreds of clients, let us show you how we can help you generate more business than ever before. enquiries@interactivemediasolutions.com.au
CCTV
THE NEW (OR NOT SO NEW) IP VSS STANDARDS BY VLADO DAMJANOVSKI
58 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Since the creation of the first
non-government organisation
Australian CCTV standards –
that prepares and publishes
the 4806 series in 2005 – there
international standards for
has been a huge change in the
all electrical, electronic and
technology from analogue to
related technologies. These
digital communications. This
technologies cover a vast range
was a fundamental change of
and include power generation,
data capturing, transmission
transmission and distribution
and storage, which influenced
to home appliances and office
all industry, including CCTV and
equipment, semiconductors, fibre
other security categories, such as
optics, batteries, solar energy,
access control, alarms, intercoms
nanotechnology and marine
and fire protection. These changes
energy. The IEC name is probably
called for an upgrade of many
better known among electrical
old standards.
and electronic engineers because
Working on creating or
like the so-called IEC plug for
easy job. Les Simmonds, Olly
electronic devices, are specified by
D’Souza and myself invested many
these standards.
hours in creating the analogue
What used to be CCTV (closed
AS4806 standards over 15 years
circuit television) is now referred
ago and can attest to this firsthand.
to as IP VSS (Internet Protocol
I call this trio ‘the old team’
video surveillance systems) by
because we dealt with the old
the IEC. The first acronym, IP, is a
technologies, many of which are
symbolic one and reflects the most
now obsolete. Now, 15 years later,
common video data transmission
the old team is facing yet another
protocol used in CCTV today – the
challenge, working on the new
IP standards. The second acronym
IP CCTV standards, this time with
of VSS was proposed by the
the International Electrotechnical
Chinese delegation when working
Commission (IEC).
with the IEC standards, due to the
The IEC is an international
possible confusion with their local
standards organisation which
Chinese television, with the same
sits under the umbrella of
acronym of CCTV.
the United Nations (UN), with
securitysolutionsmagazine.com
all specifications of hardware,
updating any standard is not an
The IEC’s technical committee,
its headquarters in Geneva,
TC-79, started working in around
Switzerland. It is a non-profit,
2010 on a set of standards for
SECURITY SOLUTIONS // 59
CCTV
new technologies that cover alarms and electronic security systems. A number of work groups were created to include IP
• WG-12 deals with IP video surveillance systems (VSS) • WG-13 deals with alarm systems
CCTV, access control, alarms and
All working groups have a number
video intercoms.
of standards already published,
Initially, Australia did not have
but many are working on new
The following IP VSS standards
• IEC 62676-3 Video surveillance
have been published so far:
systems for use in security
• IEC 62676-1-1 Video
applications – Part 3: Analog
surveillance systems for use in
and digital video interfaces
security applications – Part 1-1:
• IEC 62676-4 Video surveillance
System requirements – General
systems for use in security
• IEC 62676-1-2 Video
applications – Part 4:
the opportunity to participate
standards or updating the existing
surveillance systems for use
in developing these standards
ones due to the very rapid change
in security applications – Part
since it was an observing
in technology.
1-2: System requirements –
systems for use in security
Performance requirements for
applications – Part 5: Data
video transmission
specifications and image
• IEC 62676-2-1 Video
quality performance for
member. However, the El-051
This article has been written
Application guidelines • IEC 62676-5 Video surveillance
committee members (the old
from the perspective of CCTV (IP
team) recognised the need for
VSS) standards IEC 62676, for
Australia’s involvement and
which myself and Olly D’Souza
surveillance systems for use in
camera devices
requested Standards Australia to
have invested many hours in
security applications – Part 2-1:
Currently, there is an
make our country a participating
international teleconferences,
Video transmission protocols –
annex being worked on for
member. With the change in status,
meetings, collaboration and
General requirements
62676-5, which refers to the
we earned the right to vote and
contribution. Although we became
contribute to all the IEC TC-79
involved after the first four 62676
surveillance systems for use
camera operation and how to
works moving forward.
standards were completed, we
in security applications –Part
measure those.
managed to contribute substantially
2-2: Video transmission
following working groups:
to Part 5 and are now actively
protocols – IP interoperability
standards are published by the
• WG-11 deals with access
contributing to Part 6, which covers
implementation based on
IEC, in Australia we do not have
video contents analytics (VCA).
HTTP and REST services
any IP CCTV (VSS) standards as
TC-79 is composed of the
control
60 // SECURITY SOLUTIONS
• IEC 62676-2-2 Video
environmental conditions during
While the above-mentioned
securitysolutionsmagazine.com
will create the standards from the outside. Without the standards, the industry will have no substantial progress. This has been especially important in the last decade when technology progress in video analytics, transmission technologies and modern VMS platforms has developed significantly. Without the standards following such developments in a timely manner, there will be very little chance to develop a mature, innovative and profitable industry. This ultimately depends on the younger members of the industry. They need to get involved now if we want to be a noticeable power in the world, like we were 20 years ago, in the analogue times. n Vlado Damjanovski is an internationally renowned CCTV author, lecturer, innovator and consultant. Vlado has also recently launched a series of online courses for people interested in learning more about CCTV systems and networking. For more information visit www.vidilabs.com yet. Many other countries, such
in the IEC. This is under way and
as UK and France, have already
will hopefully create momentum
adopted 62676. With the current
for adoption to be finalised.
Standards Australia involvement
The old team continues
in the IEC work as a participating
working on the new IP standards;
member, Australia has a good
unfortunately, there seems to be
chance of adopting these new
few young experts that would
standards, without re-inventing
like to take a part in it. It is a
the wheel. In fact, the IEC wants
demanding job that requires
Standards Australia to adopt such
knowledge and experience,
standards, as we are a member of
but there are many young and
the UN as well. However, while we
capable engineers out there.
started the process over two years
Maybe the main reason for
ago, Standards Australia still have
such a lack of interest is that
not finalised the adoption of the
this job is voluntary work and
IEC 62676 standards. This means,
it appears that not many people
in simple terms, that Australia
are prepared to sacrifice their
runs its IP CCTV (VSS) businesses
own time. However, if we want
without any official standards.
progress, we must change
To speed up the process, Standards Australia advised
our attitude. My personal plea to the younger
the alarm group EL-031 and the
members of the industry is for
CCTV EL-051 should be merged to
them to take a proactive role in
mirror the similar configuration
the standards work, as nobody
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 61
CYBERSECURITY
DESPITE LEGISLATION, ORGANISATIONS FAILING TO REPORT DATA BREACHES BY GARRY BARNES
Over the past five years, not-for-
As it pertains to cybersecurity
– many cybercrime statistics
profit IT industry association
incidents and attacks, the
presented by governments and
technical resources, and poor
ISACA has surveyed thousands of
respondent data yields potentially
businesses would have to be
understanding of legislation
cybersecurity leaders across the
encouraging, yet cautionary,
treated sceptically by comparison.
As an example, in the 2017
globe to identify what they are
insights. On the whole, prevalent
Indeed, 50 percent of respondents
Medicare data breach, the reason
seeing and experiencing, including
types of attack and threat actors
believe that most cybercrime is
surrounding the underreporting
current attack vectors, the skills
remain the same for a third year
underreported, even if enterprises
of the initial attack was the federal
shortage, funding and more.
running. However, the report also
are legally required to report
government’s understanding
illustrates an alarming new trend
incidents, with 79 percent saying
that the breach would not impact
attack vectors remain largely
– underreporting data breaches
it is likely they will experience a
Australians and their personal
the same as they were in 2017
and cybercrime – and paints a
cyberattack next year.
details. However, since September
and 2018. Forty-four percent of
somewhat concerning portrait of
respondents reported phishing
a professional field which does not
remains the most prevalent attack
This year’s report finds
• inadequate internal and
2018, the details of any living Australian citizen have been
trust itself to report cybersecurity
Why are Breaches being Underreported?
vector. Malware came in second
incidents to the authorities, even if
Having consulted with numerous
the ‘Medicare Madness’ listing
at 31 percent, decreasing seven
a legal or regulatory statute exists
organisations, my perception is
on the Darknet. Furthermore,
percentage points compared to
that requires an organisation to
that there are several reasons that
Medicare did not anticipate the
last year, and social engineering
report such incidents.
leads to the underreporting of a
betrayal that the breach relayed to
cyberattack. These include:
Australians by not fully complying
• an organisation does not
and making the public aware of
is the third most-common attack type (27 percent). Additionally, cybersecurity
Underreporting Cybercrime
believe the breach will affect
made available and sold via
the breach.
threat actors and their weapons
Three quarters of respondents
its customers, partners or
of choice are almost identical
indicated their belief that the
suppliers
to those reported in last year’s
actual instances of cybercrime
• the hackers did not obtain
Canberra’s Centre for Internet
results. Specifically, the top three
are intentionally suppressed.
valuable or encrypted
Safety, commented at the time
threat actors this year include:
If this level of underreporting
information; therefore,
of the Medicare breach that, as a
• cybercriminals – 32 percent
does in fact reflect reality –
organisations do not think they
result of this breach, Australians
• hackers – 23 percent
acknowledging that the survey
need to report it
are now less likely to sign up to
• non-malicious insiders –
asks respondents to reflect
15 percent
62 // SECURITY SOLUTIONS
on their belief in this regard
• reputational damage and longterm risk
Nigel Phair, now an adjunct professor at the University of
any future government online information management systems,
securitysolutionsmagazine.com
such as My Health Record,
Target has seen an increase in
than 200,000 records of staff and
which contains an individual’s
consumer trust, largely due to the
students going back as far as 19
The Benefit of Reporting Cybercrime
health information and allows
strength of its brand and efforts to
years. The breach occurred in late
The benefit from reporting
them to share this between
improve its security. Other studies
2018, and more than six months
cyberattacks is that we can advise
doctors, hospitals and other
have also shown an organisation’s
passed before the university
organisations and institutions of
healthcare providers.
share price does improve and
realised the intrusion.
potential breaches that may pose
Another common failing by
often increases a year after a
According to ISACA’s State
a risk. Recently, the Australian
organisations is to decide not to
data breach, if the company takes
of Cybersecurity report,
Catholic University (ACU) in
report cybercrime because they
effective measures to address the
one in three cybersecurity
Sydney reported a phishing
believe the hackers were unable
security issues.
leaders (34 percent) have high
cyberattack that allowed other
levels of confidence in their
institutions to be conscious and aware of potential breaches.
to steal any encrypted data or data
More often than not though,
of any real value. Unfortunately,
the reason for underreporting is
cybersecurity team’s ability
security professionals are often
a lack of technology or human
to detect and respond to
unaware as to how much data
resources related to cybersecurity
cyberthreats. The highest levels
reported, Nagle Catholic College
was taken and, while it may
and inadequate knowledge and
of confidence are correlated
in Geraldton, WA, found it was
not be of value to the particular
skill, as well as poor reporting
with teams that report directly
a victim of a similar phishing
organisation, it could still be used
or incident response policies
into the CISO, and the lowest
breach, stating bank account
for malicious means.
within the enterprise. ISACA’s
levels are correlated with teams
and credit card information
State of Cyber Part 1 outlines 95
reporting into the CIO.
may have been stolen, including
Organisations also fear
Not long after the breach was
signatures scanned when
reputational brand damage and
percent of respondents reported
In today’s unpleasant
long-term financial consequences
a gap between the organisation’s
threat landscape, we need to
parents paid school fees. The
by reporting a data breach.
desired and actual culture of
acknowledge the initial threat
college sent out a letter to all
Indeed, Target’s consumer
cybersecurity. This is evidenced in
and admit that this is in fact a
staff and parents to treat every
perception suffered a 54.6 percent
the many cybersecurity breaches
deep-seated risk. We need the
email as suspicious, monitor
dip the year following the data
we see where a company admits
right approach to security – with a
their accounts closely for
breach. However, if handled
finding the breach three to six
CISO sitting on the C-suite, where
strange transactions and to
correctly, studies are showing
months after it occurred.
security is adequately resourced
contact their banks for advice
and embedded by design and
on money protection. And all
consumers are willing to forgive
Just last month, Australian
organisations in the long term.
National University (ANU)
where any cybercrime or data
of these simple, yet effective,
In the years that have followed,
revealed a hacker obtained more
breach is reported.
measures assist individuals in
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 63
CYBERSECURITY
protecting their personal and
over year, attack volume will
address any propensity to
potential breaches, the more that
increase and cybercrime is
not report these incidents.
can be done to avert the risk. As
being underreported. Grappling
Enterprises can offset escalating
first CISO in the White House and
a community, together we are
with the true impact of
intensity in the threat landscape
now president of Cyxtera Federal
stronger, and building trust is
cyberattacks and cybercrime
through better governance
Group, retired Brig. Gen. Gregory
imperative in a digital world, thus
proves a slippery slope. The
and reporting structures that
Touhill, is calling for a ‘cyber
collaboration is the key.
high percentage of respondent
promote confidence in security
scepticism regarding cybercrime
across the enterprise, and across
Conclusion
reporting substantially may
industries. n
campaign. If you are being
The study confirms that many
offset the optimism indicated by
attacked, chances are pretty good
practitioners continue to face
any levelling of cybersecurity
somebody else in your industry
significant challenges – not
attack volume and consistency
CGEIT, CRISC is practice
is also under attack. And that is
only technically, but also
of threat actors and exploitation
lead, Governance Advisory at
where information sharing can
organisationally and professionally
techniques. Enterprises need to
Vital Advisory. He has more
make a big difference. I would
– in a maturing, dynamic and
consider that many cybercrime
than 20 years of experience in
like to encourage people ‘if they
sometimes turbulent field.
incidents may go unreported
information and IT security,
– despite legal and regulatory
IT audit and risk management
requirements to report – and
and governance.
confidential information. My peer, the US government’s
The more we speak up of
neighbourhood watch’ concept. “It is part of an overall
see something, they should say something’,” Touhill says.
64 // SECURITY SOLUTIONS
While attack vectors remain largely the same year
Garry Barnes CISA, CISM,
securitysolutionsmagazine.com
It’s as easy as 1two3 Three phases for construction keying
1 2 3 Construction keying is commonly used on site during the construction phase of building. A convenient way of providing continued security during the 3 phases of construction is to use pExtra construction keying. In simple terms, all cylinders are operated by the one key (Phase 1) during the construction phase. At “handover” the next stage key is turned in the cylinder blocking the Phase
1 key from working again. Once the apartment is sold, the owner would insert the key into the cylinder blocking Phase 1 and Phase 2 keys from working again. To learn more about our complete range of smart and secure access solutions, contact dormakaba. 1800 675 411 www.dormakaba.com.au
Phase 1 Construction Stage
Phase 2 Hand over to the developer/ real estate Phase 3 Hand over to the end user
PROFESSIONAL DEVELOPMENT
OPERATIONAL SECURITY SYSTEMS BY DR TONY ZALEWSKI
Introduction
This article will explore how
2. Strategies developed with
An operational system comprises
operational security systems are
resources introduced to
activity by individuals or groups,
developed from a risk assessment.
enhance security awareness
usually within an organisation
The core influences that must
across staff and others, such
or facility. In the context of
be considered are the local
as visitors and contractors at
security, operational systems
environment, the design of a
typically involve proactive
property, physical protections that
and reactive functions that are
might be present or introduced,
workplace/property, such
performed by security staff.
personnel that include potential
as those typically mandated
However, other personnel can
guardians and measures to
by a regulator to impact
also enhance protective functions
minimise the exercise of discretion
on the organisation’s
as ‘guardians’ who observe and
by personnel through protocols.
report. Collectively, operational
a property. 3. Laws specific to the
security program. 4. Related regulatory or
Influences on Effective Security Systems
legal influences that affect
security-related risks provided the protective strategies are
There are few formalised
occupational health
appropriate to various exposures
standards for systems of security
and safety, contracts or
within a situational environment.
as well as how security-related
arrangements between
issues might be managed
parties, trade practices,
are evidenced across most public
across workplaces. The
anti-discrimination and
and private spaces. This is where
following factors influence the
security legislation.
people live, work, socialise, mix and
development, implementation
5. Practices and standards
travel. Examples include airports,
and ongoing effectiveness of any
that align with industry or
shopping centres, public transport,
organisational security program.
professional guidelines, such
festivals and concerts, licensed
1. Culture in the context
as ISO Standards for Risk
security systems can minimise
Operational security systems
security. This includes
premises, exhibitions, hospitals,
of security strategies/
Management, OHS and local
and small and large cities or town
methods balanced
guidelines for work-related
centres. These places often host
against the organisation’s
issues such as occupational
mass gatherings on a daily basis.
business objectives.
violence and aggression.
66 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 67
PROFESSIONAL DEVELOPMENT Security Culture and Impact Upon Risk
norms associated with protective
about the importance of staff to
Where a risk assessment identifies
security strategies throughout
ensure effective security practices
deficiencies in organisational
Security culture is the most
the organisation.
are followed. Reinforcement
security culture, security
through supervision and
practitioners should consider
important consideration in the
Reason (1997) reports that
assessment of operational security
a high-performing security
monitoring, and acknowledging
including advice on addressing
systems. It is well documented
environment within an
activity that enhances the required
these shortcomings through a
that a robust security culture
organisation flows from an
security practices will minimise
well-driven induction and security
is both a mindset and mode of
“informed culture”. Organisations
risk (Reason, 2000).
awareness program.
operation. Correctly promoted,
with informed cultures comprise
this can enhance security across
staff who are well aware of
maintains strategies associated
organisations (Beaver, 2015;
security-related risks. They are
with ill-considered work habits
Talbot & Jakeman, 2008). Ravasi
typically led by individuals who
should consider the following
Structure of Operational Security Systems
and Schultz (2005) define risk
manage, support and apply
as important components
An operational security system
culture as, “the specific collection
operational security systems.
to a successful program of
is based upon a risk assessment
of values and norms that are
Critical to informed culture are
security awareness:
that typically results in the
shared by people and groups in an
staff equipped with up-to-date
• explaining through examples
identification of a number of
organisation and that control the
understandings of relevant human,
that security is everyone’s
security/safety risks and then the
way they interact with each other
technical, organisational and
responsibility
introduction of physical, personnel
and with stakeholders outside the
environmental factors (Reason,
organisation.”
1997). Maintaining knowledge
basics and benefits of security
minimise those identified risks.
involves professional development,
knowledge
This is most evident in approaches
Similarly, Lafrance (2004)
Any enterprise which
• ensuring staff understand the
and procedural measures to
to risk minimisation in workplace
asserts that, “security culture is
adjustments to work-related
the logical result of a well-driven
protocols and provision of
security risks may evolve
health and safety through three
security awareness program.”
guidance materials, combined with
and that ongoing reviews of
simple steps: (1) find the hazards,
Further, “once people become
staff reminders, and dissemination
security practices are essential
(2) assess the risks, and (3) fix
aware of threats, it is in their
of information from safe work
nature to react to them.” Lafrance
authorities and regulators and
through on actions that
therefore proposes that motivated
other similar initiatives designed
enhance the system of security
people want to solve a problem if
to keep staff apprised of current
they feel concerned about it. This
environmental factors within the
underscores the importance that
working environment.
• ensuring staff understand
• acknowledging staff following
• ensuring that good security practices are followed
the problems. Typically, an operational security system is structured according to the following: A risk assessment in the
• introducing strategies that
context of security is important in
arouse staff interest in
the development of an operational
to ensuring that a strategy for
enhancing areas of workplace
security practices – if concepts
security system. Correctly applied,
inculcating a positive security
security, the organisation might
associated with security are
the protective system that results
culture is in place. This should
provide information justifying
interesting and enjoyable they
from a security risk assessment
commence with induction of new
why higher levels of security are
are more likely to be followed
should safeguard an organisation,
employees to reinforce values and
required. This involves messages
willingly
its assets, third parties and
all organisations should attach
68 // SECURITY SOLUTIONS
In the context of practices
securitysolutionsmagazine.com
others in terms of current and
dispatch of responding security
through induction and a security
future activities.
guards, as well as requests for
awareness program. Failures
innovation through carefully
police attendance.
in this area mean workers will
considered plans and operational
be unnecessarily exposed to
strategies in the context of risk.
Following a security risk assessment, the system of security
Security risk practitioners,
Effective systems often require
that is introduced should be
including operational security
security-related breaches, which
This approach will ensure best
operationalised according to
staff and potential guardians,
in turn increases risk to staff,
practice is established and a
requirements introduced through
should be familiar with
organisational assets and the
system that should maximise
measures categorised as physical,
and, where possible, utilise
organisation itself.
protections from both proactive
personnel and protocols.
both proactive and reactive
Other influences and
and reactive perspectives. n
approaches. Devising approaches
considerations for an operational
Proactive and Reactive Systems
with a focus on proactivity
security system are strategies
minimises risk. However, where
to enhance security awareness
Zalewski has provided expert
Security systems involve two
risks cannot be fully eliminated,
across staff and others onsite.
security reports across most
approaches – proactive and
a suitable response must still be
Such awareness should include
industry and professional
reactive. Both must be built into
available to diminish or minimise
a focus on laws and other legal
sectors. He has four degrees from
any security management system,
the impact of any security-
influences and, where relevant,
Australian universities, including
as not all proactive measures will
related breach.
the application of standards
law and criminology, has worked
and guidelines.
on over 500 cases, including
be successful all the time. A proactive approach focuses
Summary
Security risk assessments and
For over 20 years, Dr Tony
some of Australia’s leading
on preventing incidents through
Operational security systems
resulting operational systems
security-related civil actions,
deterrence or target hardening.
typically involve a combination of
of security should be developed
provides advice about security
For example, security controls
physical, personnel and written
in consideration of known
across industry sectors and is a
may be introduced at the
protocols. They are authorised by
influences on effective security;
security adviser to governments
perimeter of a property utilising
an employer/client and subject to
that is, culture, strategies and
locally and abroad. His recent
a combination of strategies.
proactive and reactive measures.
resources, laws specific to the
publication An Introduction
workplace, related regulatory or
to Operational Security Risk
This includes openness between
Culture is critical to the success
public thoroughfares and the
or otherwise of a system of
legal influences, and practices
Management is available through
site perimeter, security signage,
security and should be addressed
and standards.
www.gpsafety.com.au
bollards, barriers with secured gates that may be difficult to scale or compromise, and consistent perimeter lighting. One may also utilise prominent placement of CCTV cameras, signage indicating 24/7 site monitoring through a centralised control room, patrolling security guards, locks on gates and doors and vehicle intrusion measures using bollards, blockers and similar devices. These target-hardening strategies may deter or prevent persons who contemplate breaching the protective security system. A reactive approach introduces various security responses to incidents already in progress. These can include responses to audible alarms (directly or indirectly) through the activation of visual strobe or perimeter lights, remote monitoring of CCTV pan, tilt and zoom cameras, site checking through a control room by designated staff,
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 69
FEATURE
24-26 JULY 2019
ICC SYDNEY, DARLING HARBOUR
FOCUS ON SECURITY WHERE YOUR SECURITY NEEDS ARE BROUGHT INTO FOCUS Gain insight into the newest innovations that are reinventing the industry. AI, biometrics and tech inventions are moving at lightning speed and smart technology is inspiring new discoveries every day. Industry leaders, new visionaries and expert users are all joining together to exchange ideas and developments. The Security Exhibition + Conference is Australia’s largest and most established commercial security event that cultivates innovation, solves problems and leads an industry to be the best in the world.
24-26 JULY 2019 ICC SYDNEY DARLING HARBOUR
REGISTER FREE NOW securityexpo.com.au
Lead Industry Partner
70 // SECURITY SOLUTIONS
WELCOME TO SECURITY 2019 On behalf of the Security Exhibition & Conference team, I am pleased to invite and welcome you to the ICC Sydney for the 34th edition of Security, the event that brings the industry together to cultivate innovation and solve shifting challenges. Innovations continue to reinvent our industry, so in 2019 Security is focusing on bringing your needs into focus, as smart technology inspires new discoveries every day and changes the way we all work. This year we have introduced several new initiatives across the show in response to attendee feedback - features like the Innovation Precinct, Round Table sessions and the AI/ML Seminar were developed to help our visitors stay ahead of industry developments, connect with peers and the latest products, and gain practical insights. The ASIAL Security Conference has sold out for the fourth year in a row, and we look forward to hosting renowned local and international experts as they share their insights and expertise on a range of topics. We will once again be joined by leading experts and brands from across the globe, making Security truly international and Australia’s largest commercial security event. I hope you get the chance to join us over the three days to connect with suppliers, products and experts as the industry converges. I wish you a productive visit and look forward to working with you in the coming year.
Best wishes, Melissa Clendinen Event Manager
THE 2019 SECURITY EXHIBITION
INNOVATION & INSPIRATION For over 30 years the Security Exhibition & Conference has been the largest and most established commercial event for the security industry in Australia. Bringing together the entire supply chain to connect and create unparalleled business opportunities. It is the largest collection of electronic and physical security suppliers in the Southern Hemisphere. Discover a showcase of the emerging trends and products to help you stay ahead of the game in an industry moving at lightning speed, from brands including:
DOWNLOAD THE
SECURITY 2019 APP Plan your daily schedules, make connections, view full Conference and Seminar agendas, rate sessions and more.
Search 'Security Exhibition 2019' in your app store. securitysolutionsmagazine.com
SECURITY SOLUTIONS // 71
FEATURE
WHAT'S ON IN 2019? INNOVATION PRECINCT Take this opportunity to walk through a showcase of the latest products hitting the market in the last 12 months to take back to your day-to-day. Visitors can also vote in the 'Peoples Choice Best New Product' Award.
START-UP STREET A dedicated zone full of innovative and smart technology from exhibitors making their debut at Security. Looking for the newest suppliers? Meet face-to-face with the teams behind the latest solutions that will help streamline your work and keep you up to date in a rapidly moving industry.
AI/ML SEMINAR ROUND TABLES Facilitated by My Security Media & Security Solutions In response to strong demand for a platform to discuss common challenges across the industry, we've created a place for security professionals to exchange transferable skills, challenges and insights with peers from different sectors. Each session will address a different topic facing the marketplace, but spaces are limited!
GALA DINNER Thursday 25 July The industry evening of the year! Celebrate the year so far at the annual Security Gala dinner, and recognise industry achievements with the Best New Product Awards.
Thursday 25 July The new technology era is here and empowering the Security industry. Hosted by ACES Group, this one day seminar will explore the landscape of Data Science, Artificial Intelligence (AI) and Machine Learning (ML), the importance of embracing AI and how you can start adopting the capability in your business today.
FUTURE OF SECURITY BREAKFAST Wednesday 24 July Hear the research that will shape the next 10-20 years in security and take advantage of the opportunities underpinned by emerging technologies, over a light breakfast.
ASIAL SECURITY CONFERENCE An annual opportunity to receive fundamental updates from the organisations shaping today’s security landscape in a program carefully curated by the industry’s peak body.
NETWORKING DRINKS Wednesday 24 July Continue meaningful business conversations after the first day of Security wraps up. Relax, connect and catch up with peers over a drink or two in a more social environment.
72 // SECURITY SOLUTIONS
REGISTER FREE FOR THE EXHIBITION AT SECURITYEXPO.COM.AU
securitysolutionsmagazine.com
CE N RE EW FE I N REV CO P
THE 2019 ASIAL SECURITY CONFERENCE
BUILDING RESILIENCE TO COMBAT CHANGING SECURITY THREATS The ASIAL Security Conference hosts a compelling program of renowned local and international experts, and academics with case study evidence on how to protect your business, brand reputation and vital assets along with mitigating risk and vulnerability.
It an annual opportunity to receive fundamental updates from the organisations shaping today’s security landscape in a program carefully curated by the industry’s peak body. The 2019 ASIAL Security Conference is now sold out, discover a preview of the leading experts and visionaries set to present:
DOWNLOAD THE APP FOR FULL CONFERENCE PROGRAM
2019 HEADLINE SPEAKERS
Nick de Bont Thales Australia
Nick A New Scotland Yard
Kelly Sundberg Mount Royal University (Canada)
Shara Evans Technology Futurist
Dr. Tony Zalewski Global Public Safety
Debi Ashenden Deckin University
Dr. Lisa Warren Code Black Threat Management
John Lomax The Star
Dr Gavriel Schneider Risk 2 Solution Group
David Kortum Triplex Acies Consulting
Lead Industry Partner
24-26 JULY 2019
ICC SYDNEY, DARLING HARBOUR securitysolutionsmagazine.com
EXHIBITION HOURS
CONFERENCE HOURS
Wed 24 Jul 9:30 am - 5:00 pm Thurs 25 Jul 9:30 am - 5:00 pm Frid 26 Jul 9:30 am - 3:30 pm
Wed 24 Jul 9:00 am - 5:00 pm Thurs 25 Jul 9:00 am - 2:30 pm Fri 26 Jul 9:00 am - 2:30 pm SECURITY SOLUTIONS // 73
FEATURE
AI
THE WAR OF THE ALGORITHMS
74 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
BY RICHARD MENEAR
Thanks to the likes of Amazon,
poses a number of risks and, if
Google and Facebook, the term
these are overlooked, there is a
Artificial Intelligence (AI) has
worry that AI algorithms could
become more widespread than
create a false sense of security.
ever before. Defined as a branch of computer science dealing
A Blessing or a Curse?
with the simulation of intelligent
Many companies in a range of
behaviour in computers, AI
industries have already started
promises all sorts of things,
implementing AI initiatives to
from self-driving cars and
great effect. Although AI presents
smart home appliances to robot
a number of opportunities
‘employees’.
for businesses and there are
As algorithms become
many benefits of using these
increasingly complex, AI has
technologies, they also come
evolved to become a crucial aspect
with substantial risks, including
of cybersecurity solutions – with
malicious corruption and
the technology being applied
manipulation of data, devices
across various fields, including
and systems.
spam filter applications, fraud and botnet detection. By automating threat
securitysolutionsmagazine.com
Just as companies can use AI to automate and improve business processes, hackers
detection, AI can help to identify
can break through defences
threats more efficiently and
using the same technology and
effectively than other software-
automate the identification of
driven approaches – ultimately
vulnerabilities. So, for CIOs and
easing the burden and workload
CISOs who are responsible for
of employees. But relying too
corporate security, AI can prove
heavily on these technologies
to be both a blessing and a curse.
SECURITY SOLUTIONS // 75
FEATURE
If hackers are able to fool
Fighting AI with AI
Fortunately, there are ways
traditional methods of scrubbing
learning-based systems, they
Although self-driving cars are still
for companies to protect their
their presence from log files. For
will also be able to exploit the
very much a work in progress, we
data and systems from AI-based
high-risk targets such as banks,
classification systems AI is built
have already reached a point in
attacks. Part of the answer lies in
which may experience a number
on – meaning the fragility of
the modern day where AI has the
harnessing the power of AI itself.
of cyber incidents every day, AI
an organisation’s cybersecurity
potential to surpass the human
The only logical way to thwart
can also be used to automate
processes is heightened with
brain. It is the unfortunate truth
these new, automated attacks and
systems and help identify and
every new, clever algorithm
that human intellect may soon not
help strengthen cybersecurity
filter out truly dangerous threats
implemented by AI. For example,
be able to keep up with the leaps
processes and capabilities is to
from easily addressed issues.
they could learn to imitate
and bounds taken by AI every day.
fight AI with AI in the ultimate
people’s writing styles – enabling
Regrettably, these advances
For example, the rise
showdown. Appropriate defences
of the digital age has seen
them to execute more realistic
are not just being used for good,
also need to be put in place for
cybercriminals find new and
and effective phishing attacks. Or
as AI’s involvement in hacking has
existing AI initiatives to ensure
inventive ways to deceive both
they could prevent AI learning
allowed cybercrime to reach new
they are as secure as possible.
unsuspecting individuals and
altogether, using methods such as
realms. CIOs and CISOs need to
A combination of AI and
public services through online
tunnelling protocol and altering
wipe the stereotypical image of a
blockchain technology could
fraud. However, many banks
log files to scrub their tracks –
hacker from their minds; hackers
help develop a decentralised,
have been investing in AI and
meaning the AI will not be able
today are far more sophisticated
cryptographically sealed system
use it to detect whether someone
to identify a similar attack in
and ominous thanks to the
log, for example – meaning
logged into online banking is a
the future.
adoption of AI technology.
hackers would not be able to use
customer, a fraudster or a ‘bot’.
76 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
“If hackers are able to fool learningbased systems, they will also be able to exploit the classification systems AI is built on – meaning the fragility of an organisation’s cybersecurity processes is heightened with every new, clever algorithm implemented by AI.”
as signatures. Without these
and incorporate AI into their
signatures, conventional detection
cybersecurity measures to combat
tools are entirely ineffective.
the complex algorithms used
However, threat hunting
by hackers will, undoubtedly,
technologies do not rely on
leave their IT infrastructure
signatures – meaning they can
in jeopardy.
detect many forms of malware,
In order to respond effectively
which tools that rely on bad-
to the threat of AI, it is vital for
behaviour modelling cannot.
organisations to rethink and
Instead, these technologies
revolutionise the ways in which
use good-behaviour models to
they approach the security of their
proactively search out anomalous
systems and data. By investing
and malicious activities, such
in AI, companies can hope to
as unusual login times or large
streamline their cybersecurity
volumes of data being transferred
processes and reduce the workload
to an external host, which do not
for CIOs and CISOs – enabling
match the models.
them to prioritise risk areas and
Performing good-behaviour
to intelligently automate manual
modelling tasks would be virtually
tasks. Not only will this improve
impossible to do manually;
operational efficiencies, but it will
fortunately, AI is especially suited
also help to reduce costs. AI can
to this type of work. Unlike human
also aid and facilitate intelligent
Similar techniques are also
of investigations and frees up
beings, AI can handle gigantic
responses to attacks based on
being used by insurers to flag
resources to tackle major cases.
volumes of data and automatically
shared knowledge and learning.
suspicious claims.
generate baseline models of
It is advisable for businesses
normal behaviour. What is
to seek the help of a cybersecurity
of-the-art algorithms are also
Defending Against Malicious Malware
more, AI never tires – making
specialist who can help them
helping to crack down on benefits
Traditionally, malware detection
detection tools bolstered with this
implement appropriate AI-based
fraud by detecting and identifying
tools have also used passive
technology much more effective
solutions. These solutions will
the cloning techniques commonly
technologies to identify models
at discovering modern evasive
ensure the necessary defences
used by organised criminal gangs
of bad behaviour, in the practice
malware threats.
are put in place before it is
committing this type of mass-
known as ‘threat trapping’.
scale deception. The algorithms
Recently, these tools have had
look for patterns in claims,
In the public sector, state-
too late, allowing threats to be automatically detected
to evolve to ‘threat hunting’ in
An Intelligent Response
such as a phone number or
order to keep up with changes
Successful or otherwise, hacking
and money – as well as their
applications written in the same
in cybercrime.
attempts leave a digital footprint
reputation. n
style. Once a claim is flagged as
Criminals are increasingly
and companies to save time
which AI systems absorb and Richard Menear is CEO of the
suspicious, a human investigator
using AI to create progressively
use to develop an understanding
then takes over. AI can identify
advanced malware which is so
of the algorithms in place. This
specialist cybersecurity company
possible issues far faster than
sophisticated that it can easily
means any companies that do
Burning Tree. He can be contacted
human investigators, which helps
evade security solutions that rely
not take the initiative to progress
on 01252 843014 or info@
to greatly increase the efficiency
on bad-behaviour models such
with technological changes
burningtree.co.uk
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 77
LOSS PREVENTION
THE NEW GENERATION OF LOSS PREVENTION BY JACQUE BRITTAIN
The retail landscape is changing
Our role in the field, our place
prevention community perceives
must be shared across the loss
every day, with new ways to
in the business and our seat at
key subjects facing the profession
prevention community and
shop, pay for goods, interact
the table have all progressed
today, and whether it shares a
supported by company leadership.
with customers and deliver
well beyond the responsibilities
common theme across all levels
There will always be things to
commodities to the consumer. We
and expectations that were
of leadership.
work on. There will always be
have innovative items for sale that
conventional prior to the new
are changing the world we live in,
millennium. Our commitment
The 2019 Survey
on how things should be done or
creative services that can deliver
to growth and dedication to
As the industry has evolved,
what priorities should come first.
to your car door or your front
collaboration and partnership
doors have opened to reveal
But when it comes down to it, loss
door, and amazing technology that
have offered a new perspective
a new and exciting culture.
prevention professionals at all
allows us to scan and purchase
of our significance within the
Today’s loss prevention
levels of leadership should have
merchandise with a phone and a
retail landscape.
professional is expected to be
a fundamental agreement – or at
multi-dimensional, open-minded,
least an understanding – of what
fingertip. With every revelation
We are entering a new
different approaches and opinions
comes new opportunities for
chapter as a profession and, with
global-thinking, enterprising and
we do, where we are and where
growth and invention – and new
the dynamic changes that are
intelligent, serving as an integral
we are going. Relatively speaking,
challenges for the new generation
currently taking place across the
component of the retail world
if we are not on the same page, it
of loss prevention/asset protection.
retail industry, loss prevention
and part of the foundation for
makes it much more difficult to
professionals must have a shared
a successful business plan. The
move forward.
prevention is an ongoing and
mission and vision as we drive
retail enterprise understands
important topic that draws
forward. But as we take our next
and respects the importance of
to provide an objective window
considerable attention across the
steps, when considering the many
protecting a company’s assets
into the thoughts, ideas and
profession. As has become the
important subjects that need our
against the challenges of total
opinions of loss prevention
norm throughout the industry, a
attention and support, are we on
retail loss. This has encouraged
professionals at all levels of
proactive approach rather than a
the same page? Are the policies
a new and improved retail
leadership regarding these
reactive response has become the
and objectives defined at the
industry where effective loss
key areas and open doors
method of choice in our ongoing
corporate level the same messages
prevention strategies are viewed
for additional discussion. By
quest for a seat at the table and a
being implemented in the field?
as an integral part of a successful
gaining a more comprehensive
voice in the room. We are looking
Do we see critical subjects under
business model.
understanding of how loss
to the future and exploring the
the same light? Do we agree
many ways that our role may
on what is most important?
have been made, we must
collectively and independently
change to meet the emphatic
How should that influence our
maintain our focus and attention
perceive these important
needs of a transforming business.
decision making?
on every aspect of what we do.
questions – and whether we
Asset protection is not a singular
see these issues in the same
The evolution of loss
However, as we look to the
This year, LP Magazine, the
While tremendous strides
The goal of the 2019 survey is
prevention professionals
future, we cannot overshadow the
Loss Prevention Foundation
function, but a binding objective
light – perhaps we can spark
importance of where we are today.
and leaders from across the loss
that is a key aspect of profit
fresh thoughts and ideas on the
The fact is, we are deep into a new
prevention industry came together
enhancement. As part of a global
best ways to move forward and
generation of loss prevention.
to explore just how the loss
retail culture, this way of thinking
how we can best address these
78 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
topics to further enhance our loss
prevention and asset protection
process and the anonymity of the
this was then narrowed to a
profession and those in roles
survey respondents.
pool of 55 questions, with the
directly related to the profession.
The Question-Writing Process
final product submitted to
All participants were informed
professionals participated in the
these leaders for additional
that their participation would
survey, representing different
The survey itself was constructed
feedback prior to distribution.
remain anonymous to further
levels of experience, diverse
by leaders across the loss
All of those participating in the
encourage honest, open and
backgrounds, different positions,
prevention industry to provide
question-writing process have
complete responses.
different aspirations and every
a list of questions that they
remained anonymous.
prevention teams.
For practical purposes,
felt represented important
While department store and specialty retailers were most
Well over 600 loss prevention
level of career responsibility. Only minor edits were made
and productive topics relevant
Survey Distribution
common, respondents with
to respondents’ comments to
to the ongoing goals and
Invitations to participate in the
retailers across the industry were
correct spelling and grammar,
objectives of the loss prevention
survey were extended through
widely represented.
further protect the anonymity of
profession. Leaders representing
mailing lists, extensive social
many different types of retail
media outlets and LP Magazine’s
backgrounds and a diverse scope
LP Insider. Industry leaders
of retail organisations were
the respondents and to alleviate similar concerns. Otherwise, the
representing retailers across
Collecting and Reporting Survey Results
involved in the development
the country were also contacted
Construction of the survey
those expressed by the individual
process. Several of these leaders
directly and encouraged to share
and the collection of survey
respondents as they completed
further encouraged key members
the survey with all members of
results was managed through a
the survey.
of their teams to participate in the
their loss prevention teams.
professional survey platform to
process as well, resulting in a wide spectrum of topics.
securitysolutionsmagazine.com
Participation was encouraged for all those involved in the loss
thoughts and opinions shared in these comments are strictly
The content summarised
further protect the accuracy of
here represents a high-level
the results, the integrity of the
overview of the survey results.
SECURITY SOLUTIONS // 79
LOSS PREVENTION
Those interested in a more detailed perspective of survey results and comments should visit losspreventionmedia.com for a full report on the survey.
Career Development The process of career development is important in many ways, with the need for both employees and employers to be prepared, keep up with the changing environment and respond accordingly. Employees need to upgrade their skills and competencies on an ongoing basis to meet current and future demands, whereas organisations must hire, develop and retain employees who can successfully handle those changing needs and move the business forward. Ultimately, this opens doors to
increasing slightly at the
were slightly more likely to
at all levels of leadership
new and different opportunities
higher levels. Many comments
hold these designations.
tended to agree that two
for all involved.
supported the concept of
How do loss prevention professionals feel about their career prospects and the need to
• Similarly, loss prevention
or three regional loss
mentorship programs as a
professionals at all levels of
prevention conferences per
development tool.
leadership showed an interest
year designed for up-and-
in pursuing one or more of the
coming professionals would
• Career growth and
continue to develop and refine
development remained a
industry certifications over
be a valuable, effective and
professional skill sets? Several
primary objective of most loss
the next 12 months. Interest in
worthwhile way to develop
questions focused on gauging
prevention professionals. In
pursuing these certifications
talent. This trend also appears
responses concerning this topic.
general terms, loss prevention
varied slightly based on the
to increase in importance
• Loss prevention professionals
professionals at all levels
particular level of leadership
among loss prevention
at every level of leadership
of leadership strongly
involved, with those at the
professionals as they progress
felt they have the opportunity
emphasised that they seek out
higher levels of leadership
to further their careers in loss
opportunities for continuing
slightly less likely to show
prevention if they choose to
education to support
interest in pursuing additional
whether most loss prevention
do so, with those in high-
growth and investment in
certifications. However, this
professionals are legitimately
level positions slightly more
their careers.
would actually align with
prepared for the changes
those leaders indicating
that will take place across the
at all levels supported an
that they have already
profession over the next five
prevention professionals at all
ongoing commitment to
earned designations.
to ten years, with numbers
levels of leadership tended to
professional growth and
• Overall, 85 percent of
feel that they have the respect
development through the
those participating in the
percent) very similar to those
and support of supervisors
certification process. Overall,
survey agreed that using
that disagree (38 percent).
regarding career aspirations.
nearly 70 percent of those
online tools and social
However, results remained
participating in the survey
media is an important way
fairly consistent when
participating in the survey
have either earned an
to remain educated and
breaking down the numbers
indicated that they have had
industry-related certification
current. Interestingly, this
by leadership position.
one or more mentors that have
or are currently pursuing an
trend appears to increase
influenced their professional
industry-related certification,
in importance among loss
Company Support
careers. This trend appears
and just over one in five
prevention professionals
Company support is and will
to be fairly consistent at
indicated that they hold
as they progress up the
remain a primary concern to
every level of loss prevention
multiple certifications. Those at
career ladder.
the health of the loss prevention
leadership, with the numbers
the higher levels of leadership
confident in their prospects. • Generally speaking, loss
• Overall, 75 percent of those
80 // SECURITY SOLUTIONS
• Loss prevention professionals
• Loss prevention professionals
up the career ladder. • There was disagreement as to
for those that agree (37
profession. For the loss prevention
securitysolutionsmagazine.com
overall at 8.1 out of 10. These
having a strong understanding
numbers were very consistent
of loss prevention as a retail
across all levels of leadership.
professional as a 9 out of
• Survey respondents had a
10, only 64 percent felt that
very mixed response in regard
their sales/operations peers
to whether they believed
have an understanding and
that they have experienced
respect of the role of loss
or witnessed signs of
prevention in the overall
discrimination when they
success of the business. These
or others were considered
numbers remained consistent
for hire or promotion.
across all levels of loss
Overall, 35 percent of those participating in the survey
prevention leadership. • Overall, survey respondents
indicated that they have
had a very mixed response as
experienced or witnessed signs
to whether the loss prevention
of discrimination, 50 percent
department is undervalued
disagreed, and 15 percent
within their company – 42
offered a neutral response.
percent agreed that loss prevention is undervalued,
Retail Support
41 percent disagreed, and
We often discuss the importance
17 percent offered a neutral
of the evolving role of loss
response. These numbers
prevention – how this impacts
remained fairly consistent
our jobs, how we perceive our role within the business model
across all levels of leadership. • Survey respondents ranked the
and the importance of working
importance of loss prevention
hand in hand with our sales
professionals having a strong
and operations peers to achieve
understanding of retail as a
the goals and objectives of the
9.3 out of 10. They ranked the
program to be successful, the
professionals at all levels of
organisation. Partnerships and
importance of loss prevention
company must be committed to
leadership revealed a slightly
cooperation will remain a big
professionals having the ability
communicating the purpose and
positive response in how they
part of that moving forward, but
to build strong partnerships
importance of the program and
rank their company with
the way that retailers in general
with their operations peers as
instilling a culture that reaches
respect to developing talent for
understand and respect the role of
all levels of the organisation.
leadership roles, there is some
loss prevention will also remain a
However, it is just as important
opportunity for improvement,
key aspect of our success.
that most loss prevention
that this commitment is made to
with respondents indicating
• As a whole, loss prevention
professionals have a strong
those responsible for carrying
6.5 out of 10. These numbers
professionals felt there is some
respect and understanding of
out the plan and moving the
were consistent across all
opportunity for improvement
their retail partners and the
program forward.
levels, with every level of
with the retail industry’s
retail profession as a whole,
leadership falling between 6
support of loss prevention,
while 74 percent felt that
and 7 out of 10.
ranking that support as 6 out of
they have the respect and
10. While survey respondents
cooperation of their sales/
ranked the importance of
operations partners.
Do loss prevention professionals believe they have the support of their companies in
• With respect to promoting
terms of professional development
diversity in loss prevention,
and career advancement? Let us
survey respondents graded
take a closer look.
their companies at 7.8 out
• Loss prevention professionals
of 10. These numbers were
at all levels of leadership
consistent across all levels,
overwhelmingly believed that
with every level of leadership
retail companies should do
falling between 7 and 8 out
more to support continuing education opportunities for
of 10. • Support for women in
their loss prevention teams,
loss prevention was also
with 95 percent in agreement.
encouraging, with respondents
• While loss prevention
securitysolutionsmagazine.com
9.61 out of 10. • Seventy-eight percent felt
grading their companies
SECURITY SOLUTIONS // 81
LOSS PREVENTION
Training and awareness
mission and objectives are
programs that emphasise the
effectively communicated.
role of reducing losses as part
• Generally speaking, the results
of successful sales and profit
were very similar when
enhancement models have widely
respondents were asked if loss
been seen as an important part of
prevention leadership has a
a robust loss prevention program.
firm grasp on the way that
While these results would indicate
loss prevention policies and
that respondents believe that
procedures are actually carried
respect and cooperation are at
out in the field and in the stores.
strong levels of support, results
While 80 percent of department
would further suggest that greater
leaders felt they have a firm
emphasis on shrink management
grasp on the way that policies
and the value of these programs
and procedures are carried out,
within our sales and operations
only 63 percent of those in the
teams would appear to be an area of opportunity. In other words,
field believed this to be the case. • Survey participants were
while respondents believe there is
also less likely to believe that their supervisors are open to
General Loss Prevention
and the ability to identify and
a willingness to partner and learn, the level of understanding is not
new and creative ideas from
Where do we stand on many of
out of 10 for loss prevention
where it needs to be amongst our
members of the loss prevention
the more fundamental concepts
professionals. These numbers
sales/operations peers.
team. While 84 percent of
of loss prevention? Where do
were fairly consistent, although
department leaders stated
survey respondents believe we
not surprisingly, that role was
Leadership and Communication
that they are open to new and
have the greatest opportunities
seen as slightly more important
creative ideas from members of
for improvement? How closely
at the lower levels of loss
One of the most critical aspects
the loss prevention team, only
aligned are we with these concepts
of determining whether or not
67 percent of those in the field
across the various levels of loss
believed this to be the case.
prevention leadership? Let us take
retailers should put less
a closer look.
emphasis on apprehending
• Overall, survey participants
shoplifters and more emphasis
loss prevention professionals at every level of leadership are on
• While 83 percent of department
apprehend shoplifters as a 6.7
prevention leadership. • However, when asked whether
the same page is through our
leaders stated that they agree
ability to effectively communicate
with the goals, mission and
rated the importance of
on deterring theft in the stores,
our mission, vision and culture
approach that their company
having a strong and successful
agreement amongst survey
throughout all levels of the
holds with respect to loss
background in interviewing as
participants varied considerably
organisation. Even when we agree
prevention, only 69 percent of
a loss prevention professional
by level of leadership.
on the fundamental concepts of
those in the field agreed.
as 8.3 out of 10. This remains
Eighty-four percent of top loss
loss prevention as a profession
It is not uncommon for senior
in concert with their views
prevention leadership were in
or the retail business in general,
leadership to have slightly
regarding the role that internal
agreement, while less than 50
without the ability to effectively
different opinions based on their
theft plays in the overall shrink
percent of those in store-level
communicate our message or
experience and unique exposure
performance of their company
positions were in agreement.
channel our ideas and opinions,
and perspective to all areas of the
as a 7.4 out of 10. These ratings
Very few believed that loss
we will continue to face challenges
business. There are many different
were consistent across all levels
prevention professionals
moving forward.
factors that come into play, many
of leadership.
should have the discretion to
• Perhaps not surprisingly, loss
different responsibilities that are
• Participants also viewed
pursue shoplifters beyond the
prevention leadership were
faced, and a litany of considerations
the importance of the audit
much more likely to believe
that most in the field will fail to
function and strong operational
that they do an effective job
fully appreciate or understand.
controls as an important
respondents believed that
of communicating the goals,
Unfortunately, this does
function in the overall shrink
organised retail crime (ORC)
boundaries of the store. • Ninety-two percent of survey
mission and other critical
appear to be an ongoing area of
performance of their company,
is a real and growing problem
objectives of the department
opportunity. However, this is a
rating this as a 7.7 out of 10.
in today’s retail environment.
to the loss prevention team in
shared responsibility across all
This ranking was consistent
Eighty-nine percent believed
the field. However, while 83
levels of leadership. There are
across all levels of leadership.
that it is important and
percent of department leaders
areas that can be improved upon
felt they do an effective job,
– both at the corporate level and
the role of shoplifting as 7.4
of our loss prevention teams
only 65 percent of those in
in the field – that can help bridge
out of 10 in the overall shrink
active in organised retail crime
the field believed the goals,
some of these gaps.
performance of the company
associations (ORCAs).
82 // SECURITY SOLUTIONS
• Survey participants ranked
valuable to have members
securitysolutionsmagazine.com
• Just over 6 out of 10 (62
responsibilities of loss
• Overall, 68 percent of
the health and well-being of the
percent) respondents agreed
prevention will show
respondents believed
profession, the survey would
that incidents involving violent
significant changes over the
that, when used correctly,
appear to indicate that, whether
behaviours have increased
next five to ten years, with
merchandise protection
a positive trend or an area of
in their area of responsibility
92 percent in agreement.
standards (EAS and other
opportunity, we are fundamentally
over the past 12 months.
Ninety-six percent felt it
security measures) are truly
in agreement. In fact, in some
Sixty-five percent believed
is becoming much more
effective in deterring theft
areas, it was astonishing just how
shoplifting incidents involving
important for loss prevention
in retail stores. Those at the
closely aligned the responses were
those addicted to opioids and
professionals to learn more
higher levels of loss prevention
across all levels of loss prevention
other addictive drugs have
about information technology
leadership held stronger
leadership. But there are still some
increased over the same
and the retail supply chain,
beliefs that these measures are
critical areas that we need to work
period. Approximately 7 in 10
while 81 percent felt that they
effective (75 percent).
on. There are a few areas where
agreed that this is influencing
have adequate understanding
• Seventy percent of survey
we are not on the same page, and
the way their companies
and training regarding
respondents felt that legislative
some of these inconsistencies can
are approaching shoplifting
the technology and other
changes, changing demands
present hurdles.
incidents. These beliefs were
resources used to accomplish
on police and police response
It is not simply that we
consistent across all levels
loss prevention goals.
are negatively impacting our
disagree – there will always be
of leadership.
ability to effectively protect
areas where we disagree for
respondents (22 percent) stated
retail stores. While those
any number of reasons. In fact,
their loss prevention team
that they have experienced or
at the higher levels of loss
there are times when having
is adequately trained and
witnessed incidents of sexual
prevention leadership were in
alternative opinions can have a
prepared to handle disruptive
harassment in the workplace
higher agreement (75 percent),
healthy and positive influence.
behaviours/incidents if they
over the past 12 months. These
responses were highly
It is when we do not know we
occur in the stores. Even
responses were consistent
consistent among all levels of
have a difference of opinion or
more significant is that only
across all levels of loss
leadership
perspective that can lead to more
29 percent believed that
prevention leadership.
• Only 61 percent believed that
store management/associates
• Just over one in five
• Only 34 percent of respondents
• Eighty-seven percent of
serious challenges, some of which
respondents agreed that
can be difficult to overcome.
are adequately trained and
felt that there is adequate
providing loss prevention
For example, if loss prevention
prepared to handle disruptive
staffing and resources to
professionals an opportunity to
leadership believes that they
behaviours/incidents if they
accomplish the goals of the
voice their ideas and opinions
are doing an effective job of
occur in the stores. Although
loss prevention department.
can and will have an influence
communicating critical objectives
top levels of leadership were
Seventy percent agree that
on loss prevention leadership.
of the department, but those in the
slightly less likely to be in
there are times when the
Ninety-three percent of those
field do not necessarily agree with
agreement (25 percent), these
ability to use/access contract
at the highest level of loss
that perspective, this can lead to
beliefs were also consistent
security guard services to
prevention leadership agreed
serious concerns in any number
across all levels of leadership.
complement loss prevention
that this is accurate.
of ways.
• Loss prevention professionals
Self-reflection is always an
efforts is essential to the
across all levels of leadership
operation and protection of
What Does it all Mean?
important element of growth.
believed that the overall
retail locations.
The survey process offers
While the survey offers us a great
practitioners a forum to share their
deal of raw information, it is what
true thoughts and opinions on a
we do with that information that
variety of critical loss prevention
will make a difference.
subjects. While having the
encourage you to take a deeper
the ability to take that information,
look at the survey results as part
interpret what it means and apply
of the free special report available
it in a pure, logical and meaningful
at losspreventionmedia.com,
way takes things to an entirely
which provides more detailed
different level. Leadership and
information on each survey
responsibility should always go
question, along with comments
hand in hand, and it all comes
offered by the loss prevention
down to what we do with the
community. You should also look
information that is presented to us.
for leadership response to the
We should be encouraged that in most areas important to
securitysolutionsmagazine.com
So, what do you think? We
information is always important,
survey results in a future issue of LP Magazine. n
SECURITY SOLUTIONS // 83
PRODUCT SHOWCASES
VISUAL IMAGINEERING OF SECURITY ENTRANCES BY BOON EDAM HELPS ARCHITECTS AND BUILDERS SHOW HOW TO BLEND PROTECTION WITH STYLE
Before and after: security gates product realisations can assist specifiers, designers, owners and their customers
Blending function with style
and functionality, says Mr Fisher,
Boon Edam Business Development
entrances has introduced a
“But we have found that a recurring
Manager Darren Assey, who will
product realisation service
Now the Australian operation
consideration for architects,
liaise regarding the visual, security
that helps building designers,
has introduced the new Product
engineers, facility managers,
and specifier needs, then return a
refurbishers and managers
Realisation Imagineering service by
security consultants and other
finished product representation.
to show how good entrance
which building specifiers, suppliers
specifiers is how to visualise the
protection can look when applied
and building managers can
product blending in with their
entrance security technologies
to their own projects.
submit graphics of their planned
particular architectural style and
has advanced significantly over
entrances areas for Boon Edam to
the corporate style of the building
the past decade – “Good security
security entrances for scores of
complete with a graphic containing
and the rest of the entrance.”
entrance design has reached a
Fortune 500 companies in 27
the security entrance leader’s
countries, combining practicality
solution for the particular security
Imagineering
having to minimise how out-of-
and performance with the
need presented.
“That’s why we’ve created the
place security looks, the entrances
Product Realisation Imagineering
actively enhance the overall look
A global leader in security
Royal Boon Edam provides
architectural style required for
“We have a head start in
Mr Assey says the design of
point where, instead of designers
some of the world’s biggest
supplying security entrances to
service through which they can
of an area. Boon Edam has invested
commercial, data centre, financial,
companies in Australia and New
sends us a photo or computerised
time and experience to become a
government, industrial, health,
Zealand, because we are the only
graphic representation of their
global leader melding style with
hospitality, retail, telco, and
company out there with a truly
current entrance, and we’ll add to it
functionality, and we’d like to show
internet and cloud computing
comprehensive range of security
to show them what it could look like
you just how good security can look
technology companies.
entrances, extending from building
with preferred security products
on your project.”
Its Boon Edam Australian
entrance and internal traffic flow
installed. This Imagineering service
operation does the same for
through to intense protection of
– which is ideal for their client
leading Australasian banks,
core assets,” says the Managing
presentations – facilitates the
A layered approach to entrance security
broadcasters, corporate HQs,
Director of Boon Edam Australia, Mr
implementation of creative ideas in
Based on its experience in 27
legislatures, government agencies,
Michael Fisher.
practical form,” he says.
countries, Boon Edam advocates
diplomatic posts and public and
These security entrance systems
Those wishing to use the
a layered cost-effective system
private facility mobility hotspots
are all designed to the highest
service send the picture or graphic
of security entrances to data
prone to unwanted attention.
standards of crisp European style
of the existing entrance area to
and sensitive business facilities,
84 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
increasing in sophistication and
“And for corporate and public
securitysolutionsmedia.com/newsletter
entrances and designated building
Boon Edam Australia’s expert
features as employees and visitors
buildings, this security cannot
facility entrances, as well as other
architectural and entrance security
advance from the entrance
be ugly or threatening. It has
sensitive interior areas.
team includes Managing Director
areas of private or government
to be architecturally crisp and
“And using security entrances
facility involved, through internal
harmonious with the style and
24/7 instead of relying solely on
Sales Manager Alastair Russell,
trafficked areas and on to the
presentation of the leading
expensive manned security can be
centre, and Business Development
core areas requiring greatest
organisations involved.”
not only the best way of layering
Manager, Darren Assey, right. The
security, but it can save money.
team is backed by a national service
provide high security even at
The ROI on security entrance
team dedicated to ensuring long-
approach has been proven globally
times when security staff are
systems is both quick and cost-
term customer satisfaction.
to be the most effective and cost-
scarce, Boon Edam Australia’s
efficient, compared with the rising
saving alternative to oppressive,
latest architecturally harmonious
costs of manned security.”
unnecessary and impossibly
Tourlock, Circlelock and Lifeline
expensive blanket systems of
ranges of entrance security
globally to date, and the savings
in thousands of applications – are
manned security needed for around
product families provide security
trend can only accelerate as
backed in the field throughout
the clock security as globally
for not only the entrances to data
businesses increasingly move
Australia, New Zealand and Papua
interconnected businesses move to
centres, but also can be used for
to 24/7 business cycles and
New Guinea by dedicated service
24/7 trading cycles.
company perimeters, corporate HQ
decentralise their data services.”
and security teams. n
protection. Mr Fisher says the layered
securitysolutionsmagazine.com
In response to the need to
“This has been our experience
Michael Fisher, left, National
Boon Edam’s latest products – which have evolved from market leading families of product proven
SECURITY SOLUTIONS // 85
PRODUCT SHOWCASES
BOON EDAM AUSTRALIA STRENGTHENS SERVICE OFFERING WITH NEW PROCESS ENGINEER Architectural revolving door and
continue to grow their service
security entrance leader, Boon
offering in Australia, New Zealand
Edam Australia, is strengthening
and Papua New Guinea,” said
its Australasian service
Mr Florendo.
offering with the appointment
“In my new role, I want to
of new Process Engineer, Mr
bring my combination of technical
Michael Florendo.
skills and the ability to establish
Mr Florendo (BSc – Industrial
and maintain quality long-term
Engineering) has more than
relationships with customers,
15 years’ technical experience,
and I hope to contribute to the
including major petrochemical,
company’s success locally,”
ports and automotive companies
he said.
across Asia and the Middle East. “I chose to work with Boon
Customer-centric
Edam because they are an
Managing Director of Boon Edam
industry leader in their field,
Australia, Mr Michael Fisher says
which will provide me with
the appointment is a further step
an excellent opportunity to
in expanding Boon Edam’s service
further my technical expertise
offering nation-wide.
and professional training, while
“Mr Florendo has excellent
Mr Michael Florendo
Boon Edam Service
working with prestige clients
technical skills and attention to
Boon Edam visits, audits and
and household names,” said
detail. His previous experience
reports on the condition of any
Mr Florendo.
will make him an asset to our
revolving door or security door,
service team, as we continue
without fee, to help companies
Boon Edam is a global supplier
to provide a level of service,
remain compliant with the
to some of the world’s biggest
support and backup previously
Australian Standard AS: 5007.
companies and multinational
unavailable locally,” said
groups, as well as public and
Mr Fisher.
Operating in 27 countries,
private agencies. Boon Edam’s
“Boon Edam has a strong
-
Collapsible door wings, closers and locks
-
Electronic smart devices and control systems
-
Active and passive safety sensors
-
Laser calibration and mapping
-
Door wing brushes
based on 140 years of experience,
-
Door activation devices
includes not only the standard
-
HVAC/green building issues
This comprehensive process,
global clients include dozens of
company culture of long-term
checks, but also a deeper,
One of Boon Edam’s key focuses
Fortune 500 companies.
customer satisfaction, and the
preventative maintenance
is creating and maintaining
addition of Mr Florendo to our
understanding, including
future-proof facility management
Boon Edam was committed to
service team will help us deliver
potential trouble spots that could
solutions that meet the diverse
helping customers find the best
this for all customers in Australia,
become far more costly and
requirements of sustainability,
solution for their business. This
New Zealand and Papua New
troublesome over time, including
security, and service while also
company culture of long-term
Guinea,” he said.
inspections of:
being aesthetically outstanding. All
Mr Florendo will lead Boon
-
Complete drive train systems
Boon Edam work is covered by its
outstanding after sales and
Edam’s Australia’s growing service
-
Slip rings and electronic
industry-leading warranty.
service, is one of the reasons
and installation team, and report
they’ve been successful for more
to National Technical Manager
than 140 years, and I hope to
John Powell.
“I could immediately see that
customer satisfaction, including
86 // SECURITY SOLUTIONS
signaling devices -
Shaft-mounted, motor and electromechanical locks
For further information visit www.boonedam.com.au n
securitysolutionsmagazine.com
F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry
instagram.com/securitysolutionsmag
COGNITEC’S FACE RECOGNITION ENHANCES DIGITAL ID SERVICES FOR DUTCH DRIVER’S LICENSE APPLICATIONS
Dresden, July 2, 2019 — Cognitec is
for this person in the Central
extensive N:N matching process
the areas of licensing of vehicles
working with RDW, the Netherlands
Driving License Register.
takes time, and needs to be
and vehicle parts, supervision
monitored carefully, but it ensures
and enforcement, registration,
Vehicle Authority, to provide a
Cognitec’s trusted face
digital application platform for
recognition technology not only
the quality of our database,
information provision and
the renewal of drivers’ licenses.
performs the image comparisons,
and prevents false matching
issuing documents.
The platform is now operational
it also checks the new image to
errors during future application
in 15 municipalities, growing to
ensure it satisfies the ISO/IEC
processes,” says Gert Jan de
About Cognitec
30 municipalities during 2019, for
standard for biometric photos.
Nijs, Senior Project Manager at
Cognitec is the only company
RDW. “We are excited to move
worldwide that has worked
almost 25% of Dutch residents. In
In addition, the project involves
2020, the Ministry of Infrastructure
an initial deduplication of the
toward a fully secure, convenient
exclusively on face recognition
and Water Management will
image database, enrolling about 12
digital process that provides our
technology since its inception in
evaluate the system to decide on a
million images and comparing them
citizens with a future-proof ID
2002. The company is proud to
national service that eliminates the
against each other to find duplicate
management system.”
maintain a stable, market-leading
mandatory visit at the city hall for
records and clerical errors.
driver’s license renewal.
position within the industry, and to About RDW
uphold the trust it has gained as a
recognition for more than a year
RDW is the Netherlands Vehicle
reliable, experienced provider of
the application process, RDW
to increase the overall quality
Authority in the mobility chain.
biometric technologies.
uses Cognitec’s technology to
of the license renewal process,
RDW has developed extensive
establish the applicant’s identity
and have just begun to apply
expertise through years of
by comparing the newly submitted
the deduplication capabilities
experience in executing its
www.cognitec.com
photo against the last image stored
of the Cognitec system. This
statutory and assigned tasks in
info@cognitec.com n
As an additional check during
securitysolutionsmagazine.com
“We have been using face
More Information and Contact:
SECURITY SOLUTIONS // 87
PRODUCT SHOWCASES DAHUA TECHNOLOGY LAUNCHES INTELLIGENT VIDEO SURVEILLANCE SERVER (IVSS) 2.0 WITH ENHANCED AI PERFORMANCE FOR DIVERSE APPLICATIONS
Hangzhou, China/June 27, 2019 Dahua Technology, a worldleading video-centric smart IoT solution and service provider, has launched IVSS 2.0 (IVSS7000-I) , an upgraded series of its NVR family powered by the latest AI capable of deep learning, which opens up new possibilities to smart security solutions. The upgraded IVSS 7000-I features scalable GPU design to meet the ever-growing project requirements. The unique Dahua deep-learning algorithm with GPU group enables IVSS7000-I to perform face recognition, perimeter protection and metadata with high accuracy. Offering advanced AI features, it even enables danger prevention via faster video content inquiry, rapid discovery of targets as well as real-time and accurate alarm in a variety of applications, providing AI-based all-in-one surveillance solution for customers. The following details some major features of IVSS7000-I.
Award-winning Face Recognition With Multiple Applications Dahua Technology’s AI-powered face recognition technology enjoys a high reputation in the industry, as testified by multiple first prizes in international competitions. Equipped with Dahua face recognition technology, IVSS7000-I series records faces by structured data and performs real-time crosscheck with reliable accuracy to figure out the face by features of the target. Supporting up to 256-channel face
88 // SECURITY SOLUTIONS
recognition by device and up to 256-channel face recognition by camera, IVSS7000-I can analyze up to 50 face databases with 300,000 face pictures in total. Besides,the upgraded IVSS7000-I also supports search by face image which means users can upload face pictures to IVSS7000-I and compare them with recorded ones by similarity. Boasting aforementioned abilities, IVSS7000-I series can realize a lot of functions for users such as VIP recognition, blacklist alarm, stranger identification, attendance management, access control, etc. It divides faces detected into different categories defined by users, and acts accordingly, like notifying the manager that a VIP customer is coming or sending an alert when a persona non grata is identified. Users can choose regular/Stranger mode to trigger kinds of alarm actions according to different applications.
Advanced Perimeter Protection For Superior Alarm Accuracy Focusing on people and vehicles, perimeter protection automatically filters out false alarms caused by animals, rustling leaves, bright lights, camera shaking and other irrelevant elements. It also enables system to act secondary recognition for the targets, thus significantly improving alarm accuracy with saved cost. In terms of perimeter protection, IVSS7000-I supports up to 256-channel with each channel allowing up to 10 IVS rules.
Rich Metadata For Efficient AI Search Metadata is feature attribute information of a target object which can be used for data retrieval. Currently, there are mainly four types of metadata that are human face, human body, motor vehicle and nonmotor vehicle. IVSS7000-I supports up to 64-channel video metadata, making it possible for operators to quickly and easily search through multiple channels and long duration to find out when and where a person/vehicle of interest appeared, which significantly enhances accuracy and efficiency.
Optimized GUI to Lower User’s Training Cost The IVSS7000-I employs optimized GUI which is easier for users to learn and use. With the same GUI working for local output and PC client, training cost of system operator is reduced. Comparable to VMS client, the new GUI design is more user-friendly for projectlevel customers.
Other Exclusive Highlights Apart from the above features, IVSS7000-I also allows independent PC client for remote access so that users will not be bothered by things like Web plug-ins and browser update. It’s also worth mentioning that with a new security center to keep hackers away, IVSS7000-I series provides a safer network environment for users. Being multifunctional, IVSS-I can meet variable needs of users, thus applicable to a wide range of scenes, including entrances and
exits of banks, business parks, schools, prisons and transportation centers like airports, railway stations that are sensitive to strangers and criminals; or the shopping malls that want to protect customers from petty thieves; or football stadiums that choose to ban those known hooligans for good. As a key back-end product to smart security system, IVSS7000-I brings intelligence, safety, and reliability to a new level. With a mission of Enabling a Safer Society and Smarter Living, Dahua Technology will continue to focus on “Innovation, Quality, and Service” to serve partners and customers around the world. *Product launch date might be varied depending on countries About Dahua Technology Zhejiang Dahua Technology Co., Ltd. is a world-leading video-centric smart IoT solution and service provider. With more than 16,000 employees all over the world, Dahua solutions, products, and services are applied in over 180 countries and regions. The company was ranked 2nd in “2018 a&s Security 50”. Committed to technological innovations, Dahua Technology continues to explore emerging opportunities based on video IoT technologies and has already established business in machine vision, video conferencing systems, professional drones, electronic license plates, RFID, and robotics etc, enabling a safer society and smarter living. Visit http://www.dahuasecurity. com to learn more and follow us on social media. n
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmedia.com/newsletter
Breakthroughs in low penetration, shallow mount Hostile Vehicle Barriers
The profusion of hostile vehicle
bollard system, impacted at
to elegantly follow the contour of
or connection of any kind. Equally
attacks directed at crowded
40mph by an N2A 7500kg GVW
sloping surfaces.
amazing was that the RB002-40
public spaces has drawn
Truck. The system was certified
urgent focus upon capacity to
to the internationally recognised
collaboration with Safetyflex UK’s
destroyed truck was prized from
arrest hostile vehicles, whilst
standard; IWA 14-1 2013 Barrier
design team and continuing our
the bollard, then recorded being
conceding the absolute minimum
V/7200[N2A]/64/90:2.4.
mutual focus on identified market
lowered back into its enclosure
priorities, Safetyflex in mid-May
and raised as normal.
penetration achievable. This
This represents the new world
Emphasising Ezi’s close
was still in working order once the
is particularly critical where
benchmark in low penetration
2019 tested a further significant
public spaces expose predictable
achieved in this class by a shallow
innovation incorporating the
stopping credentials bear
high density assemblies of
mount bollard. The IWA test
hugely robust TS9-40 bollard.
testimony to perpetual research
pedestrians. Obviously, the less
credential recorded is deemed
Safetyflex’s shallow mount
and development attending to
penetration, the less potential for
equivalent to;
retractable bollard system was
emerging risks and customer
human collateral.
• PAS68-1:2013 Barrier
adapted to combine the powerful
applications, constantly alert
spring steel core bollard assembly
in Australia and our region via
Ezi Security Systems has
V/7500[N2]/64/90:2.2/15.0
These spectacular truck
recently released the Truckstopper
• ASTM F2656 M40:P2
of the TS9-40 and subjected to
Ezi Security Systems and based
TS9-40 fixed or removable
• CWA 16221 Fixed bollard V/
impact by a 7500kg truck at
on truly innovative technology.
40mph (64kmph) at the UK’s MIRA
https://www.ezisecurity.com.au/
test laboratory.
product/pas68-slimline-rising-
crash tested bollard system,
[N2]7500/64/90:2.2/15.0
incorporating the massive spring
Frequently, assessed risk areas
steel componentry and highly
are located within CBDs and
adaptable triple array foundation
cityscapes where underground
success; the “RB002-40” arrested
system proven at 50mph in the
services inhibit deep foundations.
the 7500kg N2 truck conceding
TS9-50.
The TS9-40 system requires a
less than one metre penetration.
the extreme performance TS9-40
The TS9-40 was successfully
This test was an astounding
bollard-semi-auto-b/ For further information about
foundation of only 200mm in
This is completely unprecedented
and RB002-40 HVB systems, or
tested at the UK’s MIRA Test
depth and the unique foundation
by a retractable bollard system in
any of Ezi’s comprehensive range
Centre in August 2018. The
design permits individual socket
this class, let alone one deployable
of perimeter protection solutions,
system conceded unprecedented
boxes to be swiveled, allowing
within 90 seconds from its
contact Rod Acland on 0412 120
minimal penetration of 2.4m
the bollards to follow a curved
450mm deep ‘coffin enclosure’ by
984, rod@ezisecurity.com, or sales
(dynamic) and 2.2m (static) for
barrier line during installation,
one person with a battery drill,
@ezisecurity.com Ph 1 300 558 304,
a shallow foundation (200mm)
even accommodating ‘stepping’
without need of electrical power
or visit www.ezisecurity.com.au n
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 89
PRODUCT SHOWCASES
EXTREME'S NEW IoT SECURITY AND AUTOMATED THREAT MITIGATION SOLUTION FOR THE DIGITAL ENTERPRISE Technology vendor Extreme Networks has launched a new product designed to monitor and secure IoT devices that are connected to the corporate network. With IoT devices ranging from million-dollar smart MRI machines to five-dollar sensors, they are increasingly becoming the weak point for networks and device-level security alone can’t be trusted to secure endpoints. The ExtremeAI™ Security application is a new class of network security that leverages artificial intelligence and machine learning to identify and remediate advanced threats against IoT devices.
90 // SECURITY SOLUTIONS
ExtremeAI Security delivers deep visibility and detection of malicious traffic, and real-time monitoring of IoT devices for behavioural anomalies, to identify and stop cyberattacks from moving across networks. Through fully-automated remediation of suspicious devices and traffic, ExtremeAI Security ensures threats are contained without manual intervention. Extreme’s powerful traffic analytics and visibility capabilities are embedded in this new security solution, bringing added peace of mind and a much-needed extra layer of security to enterprise networking.
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmedia.com/newsletter
MOBOTIX Cactus Concept: MOBOTIX launches first Cactus Patch Langmeil, June 24th 2019 –
and closing them immediately
released Cactus Patch guarantees
necessary information about
MOBOTIX cameras and solutions
to keep it that way,’ explains
users of MOBOTIX cameras
the available Cactus Patch and
rightly have a reputation for
Thomas Dieregsweiler, Head
from the M10 series, which
a recommendation to install the
being particularly cyber-secure.
of Product Management at
was launched in 2004, up to the
software immediately.
MOBOTIX customers all over
MOBOTIX AG. ‘We do this to the
current models the best possible
the world trust the reliability
point that we anticipate the latest
protection against cyber-attacks
can be downloaded from the
of products developed and
technological developments
in the future. ‘This allows us
MOBOTIX website: https://www.
manufactured in Germany to
and analyse how they could
to protect the longevity of our
mobotix.com/en/cactus-concept-
protect their images and analysis
affect the cyber security of our
products and ensures that the
cyber-security
data from unauthorised access
products and solutions. If we see
older MOBOTIX systems that are
From there, a link takes you
and to prevent an insecure
a potential threat, we will release
still in use continue to be cyber-
directly to the Cyber Protection
interface from offering hackers
an appropriate security update,’
safe,’ says Dieregsweiler.
Guide, which contains all the
an opening.
says Dieregsweiler.
The hard work pays off, as
MOBOTIX is now releasing a
The Cactus Patch will be
The MOBOTIX Cactus Concept
information you need to protect
available to all MOBOTIX
MOBOTIX products against cyber-
evidenced by the fact a MOBOTIX
Cactus Patch for the first time.
customers free of charge and
attacks: https://www.mobotix.
camera has never been hacked.
All MOBOTIX cyber security
is easy to install. MOBOTIX has
com/sites/default/files/2018-02/
‘We are constantly working on
activities are described in the
also published customer and
Mx_CyberProtectionGuide_
identifying possible security gaps
Cactus Concept. The newly
partner newsletters with all the
en_20180214.pdf n
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 91
PRODUCT SHOWCASES STRATEGIC PARTNERSHIP: MOBOTIX AND REALNETWORKS DEVELOP LIVE VIDEO FACIAL RECOGNITION Langmeil, June 17th 2019 — At
companies and our customers,”
at the entrance and other
in-house production facility
the beginning of 2017, MOBOTIX
says Mathias Grünwald, Senior
locations within the museum to
in Germany and operates
and RealNetworks established
Lead Account & Service
automatically count the number
distribution companies in New
their strategic partnership.
Management at RealNetworks.
of people by time of day, using
York, Dubai, Sydney,
demographic breakdowns, such
Paris and Madrid. Customers
Almost everyone has known
“The new MOBOTIX is
RealNetworks since the 1990s,
increasingly developing into a
as gender and age. The same
worldwide trust in the longevity
when the Seattle-based company
base platform for a multitude of
system can also analyse people’s
and reliability of MOBOTIX
introduced the first online audio
industryspecific tasks – Beyond
moods. This solution is made
hardware and software. The
streaming solution, RealAudio®.
Human Vision,” says Lausten.
possible by the combination
flexibility, built-in intelligence
Years of continuous innovation
Since joining the company,
of versatile, high-precision
and unparalleled data security
and multiple generations of
Lausten has transformed
MOBOTIX cameras and the
of the company’s solutions
RealVideo® then gave birth
MOBOTIX from a highly secure
equally high-precision SAFR facial
are valued in many industries.
to the company’s most well-
but self-contained product
recognition platform.
MOBOTIX products and solutions
known product, RealPlayer®,
provider into an open and flexible
which is still used millions of
solution and system platform
solutions based on MOBOTIX
such as industrial manufacturing,
times every day for streaming
that continues to identify cyber
cameras are already being used in
retail, logistics and healthcare.
and downloading videos. More
security as its top priority. This
numerous vertical markets. “Since
With strong and international
recently, RealNetworks has been
means that all MOBOTIX products
MOBOTIX cameras were designed
technology partnerships, the
steadily expanded its expertise in
are now ONVIF-compliant, there
as the best video surveillance
company will continue to
the area of artificial intelligence
is a dedicated NAS solution and,
cameras and SAFR is regarded
expand its universal platform
(AI) and machine learning. “Our
with the MOBOTIX MOVE series, a
as the leading facial recognition
and develop new applications in
innovative strength, quality
PTZ camera has been launched on
platform for live video, together,
the future.
standards and commitment to
the market as a complementary
we are able to deliver solutions
high-quality, customer-oriented
independent product line.
that go far beyond recognition,”
About RealNetworks
says Grünwald.
Building on a legacy of digital
solutions form the basis of
“Artificial Intelligence will
SAFR facial recognition
help customers in industries
our strategic partnership with
play an increasingly important
RealNetworks,” explains Thomas
role in all areas of IT, meaning
more than just monitoring video
RealNetworks has created a
Lausten, CEO of MOBOTIX AG.
video surveillance as well – and
from a camera feed. Together
new generation of products that
with Konica Minolta, we have a
with our selected strategic
employ best-in-class artificial
from RealNetworks, is an
leading technology partner by
partners, MOBOTIX is creating
intelligence and machine
exceptionally accurate, artificial
our side in this area,” explains
solutions based on artificial
learning to enhance and secure
intelligence-based system for
Christian Heller, MOBOTIX Sales
intelligence that make events
our daily lives. SAFR (www.safr.
facial and mood recognition
Director for Germany, Austria
predictable and that can initiate
com) is the world’s premier
that has been optimised for
and Switzerland. “In conjunction
countermeasures to protect the
facial recognition platform for
the challenges of live video.
with our new openness and our
environment, valuables and
live video. Leading in real-world
MOBOTIX and RealNetworks
drive to produce cyber-safe
people,” emphasises Lausten.
performance and accuracy as
see enormous market potential
products and solutions, we can
for further joint projects and
work with our strategic partners
About MOBOTIX
SAFR enables new applications
customised solutions.
like RealNetworks to strengthen
MOBOTIX is a leading
for security, convenience and
the market and develop new
manufacturer of premium-
analytics. Kontxt (www.kontxt.
an excellent market reputation
solutions for a variety of vertical
quality intelligent IP video
com) is the foremost platform
for high quality, cyber security,
markets,” he adds.
systems and sets standards for
for categorising A2P messages
innovative camera technologies
to help mobile phone network
SAFR™, the latest solution
“MOBOTIX cameras have
reliability and direct applicability
MOBOTIX’s partnership
“Beyond Human Vision means
media expertise and innovation,
evidenced in testing by NIST,
for facial recognition. Our
with RealNetworks and SAFR
and decentralised security
operators build customer
partnership has grown rapidly as
demonstrates this in unique
solutions with the highest level
loyalty and generate new
we also share the same values,
ways: “We are currently working
of cybersecurity. MOBOTIX was
revenue through text message
such as a commitment to quality,
together on an exciting project
founded in 1999 and is based in
classification and anti-spam
innovation, data security and
for a high-profile European
Langmeil, Germany. MOBOTIX
filters. For information about our
building strategic partnerships to
museum,” says Lausten. The
has an in-house research and
other products, please visit www.
generate synergies for both our
museum uses SAFR live analytics
development department, an
realnetworks.com. n
92 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmedia.com/newsletter
CHIEF FINANCIAL OFFICER INCREASES EBIT FORECAST FOLLOWING STRONG MOBOTIX FIGURES FOR THE FIRST SIX MONTHS MOBOTIX AG ended the first six
of EUR 3.1 million compared to
2018/19 as a whole . Accordingly,
initiated in the fiscal year 2017/18.
months of the fiscal year 2018/19
the same period in the previous
Kiener has revised the outlook
Among other things, MOBOTIX
with a strong increase in revenues
year (EUR -0.8 million). The first
from 7 May 2019 for the fiscal year
successfully met the challenges of
and EBIT. At EUR 35.4 million,
six months of 2018/19 thus ended
2018/19 of EUR 1.4 million upwards.
the industry with the introduction
revenues in the first six months of
with a return on sales of 4.2 percent
The forecast for MOBOTIX’s five-year
of new camera lines, numerous
the current fiscal year rose by 11.6
(first six months of 2017/18: -2.4
plan, which envisages sales of at
software innovations, and strategic
percent compared to the same
percent).
least EUR 100 million and an EBIT
technology partnerships. In addition,
margin of 12 percent by the fiscal
an agreement was signed with Konica Minolta in March 2018 to
period in the previous year. EBIT
As a result of the company’s
(earnings before interest and taxes)
positive development, Klaus Kiener,
year 2022/23, remains unchanged.
accounted for 6.6 percent of total
Chief Financial Officer at MOBOTIX,
The MOBOTIX Management
operating performance, amounting
forecasts EBIT within a range of
Board sees the positive
and software technology to provide
to EUR 2.3 million for the reporting
approximately EUR 1.4 million to
development of the company as
innovative solutions and open up
period. This represents an increase
EUR 1.8 million for the fiscal year
full confirmation of the strategy
new markets. n
securitysolutionsmagazine.com
further develop MOBOTIX hardware
SECURITY SOLUTIONS // 93
PRODUCT SHOWCASES
STID MOBILE ID OPEN & SECURE ECOSYSTEM STid Mobile ID is a global, open ecosystem enabling end-to-end digitisation of access control that brings convenience to the personal identification experience.
The ecosystem is an online
APIs (Application Programming
or in the mobile device fleet
Certification (CSPN) from the
platform that generates,
Interfaces) and the STid Mobile ID
management systems (MDM)
French government agency ANSSI
distributes and administers
mobile application development
of large corporations, access to
for its access control solutions.
dematerialised access cards. STid
kit open up the ecosystem.
the WEB APIs, use of the SDK
With eight awards, STid offers
licence, and personnalisation
the product line most awarded in the world by security experts.
Mobile ID is also an Android-
The WEB APIs are intended
and iOS-compatible mobile
for transparent use of our online
of dematerialised badge design
application. This application,
platform using third-party
using the online platform. The
developed by STid, is an electronic
service provider software. The
STid Mobile ID app offers an
badges come with state of the
portfolio of access badges used
mobile application development
unclonable badge free of charge.
art cryptographic protection
to authenticate with Architect
kit (SDK) allows the instinctive
Our business model is based on
and security protocol. Our free
Blue multi-technology readers,
authentication modes and
the management of high-security
badge is much more secure than
another core component of the
the security system, tested by
dematerialised cards with a level
a simple, basic MIFARE credential
ecosystem that uses Bluetooth
independent laboratories, to be
equivalent to DESFire EV2.
since it’s not clonable. The
Low Energy (BLE) and NFC
embedded in mobile applications
technologies. Another application
intended to integrate the access
models that provide flexibility,
badge is roughly equivalent to
also developed by STid allows an
control service.
freedom (pay for what you use)
DESFire EV2.
edited configuration to be loaded
The ecosystem offers a
Our offering includes several
All our dematerialised
security level of our high-security
and peace of mind (monthly
using the online platform in the
customisation service that allows
payments) for our customers
Architect Blue readers via the
customers to create their own
as they digitalize their access
Access control & instinctivity
BLE channel.
dematerialised badge design.
control system.
STid Mobile ID takes the user
STid offers its extensive
experience further. Security can
Lastly, to make the
quickly become constraining
allows you to individualise
No compromises on security
protocol based on industry
the STid Mobile ID application
STid has been developing its
to rejection of the solution.
standards in order to secure
for customers that don’t have
security expertise since 1996.
With this ecosystem STid has
exchanges via BLE technology.
development capabilities.
Security has become a pillar
removed all constraints. Security
of the company’s values, and
becomes instinctive with our five
one for which STid makes
identification options: badge,
no compromises.
slide, tap-tap, remote, and hands-
security expertise and has
ecosystem truly global, STid
established a cryptographic
Global & Open STid Mobile ID is much
Free access to the ecosystem
more than a Client-Server
Access to the entire ecosystem
A recognized pioneer in its
application. A third-party can
is free. This includes access to
field, STid was at the forefront
fully incorporate the solution in
the online platform, the mobile
by being the first manufacturer
their own ecosystem. The WEB
apps available on the stores
to obtain First Level Security
94 // SECURITY SOLUTIONS
for users, and constraints lead
free… n More information on www.stidsecurity.com
securitysolutionsmagazine.com