What Are We Really Concerned About?

Page 1

A U S T R A L A S I A’ S L E A DI N G S E C U R I T Y R E S O U R C E F O R BU S I N E S S A N D G O V E R N M E N T

NOVEMBER 2019 ISSUE 118

WHAT ARE WE REALLY CONCERNED ABOUT




ISSUE 118

FEATURES

46

cover story This year’s Unisys Security Index

CONTENTS

78

26 34 50

reveals that safety fears will not keep Australians from attending public events or experiences; however, our behaviours, actions and choices are changing. Ashwin Pal, Director of Security Services from Unisys, explores how Australians are minding their physical wellbeing and protecting their data in 2019.

66 38

26 THE EVOLUTION OF THE PROFESSIONAL SECURITY INDUSTRY

As the criminal and security threats facing the public and private sectors become increasingly pronounced and complex, and as the resources of traditional law enforcement and police services become increasingly overstretched, how has security evolved to manage the threats?

30 HUMAN CYBERSECURITY

People outside the information security sector are usually surprised to learn that the human factor accounts for the overwhelming majority of cyberattacks. Why is this and what can be done to address the situation?

38 WHO ARE THE REAL TERRORISTS IN NORTH

EAST SYRIA?

In the wake of US President Trump’s decision to green light Turkey’s incursion into north east Syria, what has been the real work cost and impact on the former US Allies and what might this mean for US foreign relations moving forward?

REGULARS

C

M

06 LETTER FROM THE EDITOR 08 LEADERSHIP

Jason Brown provides an update on the development of new standards around security and resilience.

10 LEGAL

Dealing with workplace safety and contract security providers?

12 CYBERSECUIRITY

Why should you standardise your information security framework?

14 HUMAN RESOURCES

How can overtime allocation effect your security business?

34 OPERATIONS

22 THINKING ABOUT SECURITY

What is in a name? How much does your title really matter?

24 EVENTS CALENDAR

A look at upcoming industry events.

CMY

K

Is Australia’s aviation security regime cost and performance effective?

54 LEGAL Q&A

How do you deal with existing contracts in a merger?

62 CYBER SECURTY

How can you use comparative marketing to help grow your security business?

CY

50 AVIATION SECURITY

18 COMMUNICATIONS

20 BUSINESS DEVELOPMENT

MY

How will the Australian Taxation Office’s (ATO) tips help security, investigation and surveillance businesses manage their contractor payments?

58 CCTV

How can you use comparative marketing to help grow your security business?

CM

42 BUSINESS

16 RISK MANAGEMENT

What is the difference between risk and threat?

Y

Why is it so important to enforce proper selection, carriage and maintenance of duty equipment?

What are the real world difference between professional and home user IP camera systems?

What happens when the Internet of Things comes to the world of commercial security?

66 PROFESSIONAL DEVELOPMENT

What is surveillance detection enabled security and why is it important to know?

70 LOSS PREVENTION

How can a safe, effective employee termination help you avoid a store tragedy?

74 PRODUCT SHOWCASES 79 SPOTLIGHT

4 // SECURITY SOLUTIONS

securitysolutionsmagazine.com



FROM THE EDITOR FROM THE EDITOR www.securitysolutionsmagazine.com

EDITORIAL www.securitysolutionsmagazine.com

EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon

Jason Brown, Greg Byrne, Tony Jacques, Stephen Johnson, Richard Kay, Dan Levinson, Bob Mesnick, CONTRIBUTORS Paul Retter, Tim Rippon, Garett Seivoid, Anna Garry Barnes, Jason Brown, Greg Byrne, Kevin Foster, Silwon, Speckhard, RichardAnne Kay, Steve Lawson,Kelly JustinSundberg, Lawrence,Ami Scott Toben, Don Williams, Tony Zalewski O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Anne Speckard, Alex Sidernko, Ardian Shajkovci, Ami Toben, Simeon Votier

ADVERTISING

Keith Rozairo PHONE 1300 300 552 ADVERTISING Keith Rozairo EMAIL keith@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL keith@interactivemediasolutions.com.au Jonathan Rudolph DESIGN1300 AND300PRODUCTION PHONE 552 Jonathan Rudolph EMAIL graphics@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL graphics@interactivemediasolutions.com.au

DESIGN AND PRODUCTION

MARKETING AND SUBSCRIPTIONS PHONE 1300 300 552 MARKETING AND SUBSCRIPTIONS EMAIL admin@interactivemediasolutions.com.au PHONE AUD 1300inside 300 552 $62.00 Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues) EMAIL admin@interactivemediasolutions.com.au $62.00 AUD inside Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues)

ACCOUNTS PHONE 1300 300 552 ACCOUNTS EMAIL accounts@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL accounts@interactivemediasolutions.com.au

PUBLISHER PUBLISHER

ABN 56 606 919463 Level 1, 34 Joseph St, Blackburn, Victoria 3130 ABN 56 606 919463 PHONE 300 552 Level 1,1300 34 Joseph St, Blackburn, Victoria 3130 EMAIL PHONEenquiries@interactivemediasolutions.com.au 1300 300 552 WEBSITE www.securitysolutionsmagazine.com EMAIL enquiries@interactivemediasolutions.com.au WEBSITE www.securitysolutionsmagazine.com DISCLAIMER The publisher takes due care in the preparation of this DISCLAIMER magazine and takes all reasonable precautions and

The publisher takes due care in the preparation of this makes all reasonable effort to ensure the accuracy magazine and takes all reasonable precautions andof material in effort this publication, butaccuracy is not liable makes allcontained reasonable to ensure the of for any mistake, misprint omission. but Theispublisher material contained in thisor publication, not liable does notmistake, assume any responsibility or liability for any for any misprint or omission. The publisher loss or damage which may result from any inaccuracy does not assume any responsibility or liability for any or omission in this publication, orfrom fromany theinaccuracy use of loss or damage which may result information herein. The publisher makes or omission contained in this publication, or from the use of no warranty, express or implied to any of the information contained herein.with Therespect publisher makes no material contained herein. warranty, express or implied with respect to any of the material contained herein. The contents of this magazine may not be reproduced in ANY form in OR in part without The contents ofwhole this magazine may not be WRITTEN reproduced permission from the publisher. Reproduction includes in ANY form in whole OR in part without WRITTEN copying, photocopying, translation or reducedincludes to any permission from the publisher. Reproduction electronic medium or machine-readable form.to any copying, photocopying, translation or reduced electronic medium or machine-readable form.

WRITTEN CORRESPONDENCE TO: WRITTEN TO: Level CORRESPONDENCE 1, 34 Joseph St, Blackburn, Victoria 3130  Level300 1, 34 Joseph St, Blackburn, Victoria 3130 1300 552  1300 300 552 enquiries@interactivemediasolutions.com.au   enquiries@interactivemediasolutions.com.au

F D

or a little over two decades, I have

by psychopaths”. Of course, there is often just enough

watched the evolution of the security

truth in such reductionist views to enable the holder of

industry with interest. The innovations oes Australia really take security made throughout the technical side of the seriously? Yes, Government claims

such views to some authority that he or she Australian’s doclaim havewith a very relaxed attitude is right; my point being that I do not want to fall to security because they believe, rightly or prey to doing that the same thing here.happen There is here”. no single catch wrongly, “it will never This all, fix all for the operational side of security. Operating is a sentiment we can only hope remains true.

security industry last twenty have been to,over andthe some of the years corporate nothing short ofsector breathtaking. I will notawaste space or demonstrate passing words cataloguing them all, as but the vast interest from time-to-time, whatmajority of the of people reading this will be well familiar with the journey average man and woman on the street? Do from we

margins need to old improve. Licensing should be national, However, as the axiom states, one should training should be standardised and there should always expect the best but plan for the worst and

analogue to digital. Moreover, and ofor equal importance, honestly take security seriously do we, as a

be a national prepare to becertification surprised. for security professionals that as widely recognised as ahave Certified Practicing Ofiscourse, one should not to rely upon

has beenjust thepay explosive growthtoofthe technologies and nation, lip service idea

Accountant for example. But these are allin some form of(CPA), devastating incident to occur

capabilities of security?that have come about as a result of that journey. Quite simply, while pace be andthankful scope of that change As we enter 2018, we the should

extremely complex issues with security many moving parts. order to force people to take seriously.

in the technical side ofsuffered the security industry of the last Australia has never a major terrorist

in technical security is somewhat easier. ThereChange is a great deal that the security industry

incident the has likes of 9/11, the Boston bombings, twenty years been staggering, you could have slept

Make product gives the end-user more can do atobetter educate thethat business community about

the bombings July years 7, 2005 in operational London orside the of the through the lastof twenty in the

the benefits taking security In past bang for his of or her dollar and the seriously. result is simple. In

terrorist attacks ofnot October 2002 in Bali. industry and largely missed12, anything.

issues Solutions Editor-At-Large order Security to maintain my competitive advantage,Rod I need to

However, as talking a result, therisk Australian community I am not about management or other

Cowan has written howproducts. securityChanging can act as keep making newer about and better the

has become somewhat complacent with academic topics and practices that impact on regard the

a differentiator for business and giveofcompanies physical security sector is more a case changing

to security.aspects I often of hear manyWhen of our readers who operational security. I speak about are securitysecurity, managers large corporations operational I amwithin referring to the licensing,

a competitive edge.over many rests in the hands of the culture. The power

comment onand theemployment differencesofbetween procurement personnel,attitudes from to security in Australia and where guards to crowd controllers to America, consultants and sothey on.

If we learned from tragic few – thehave politicians andanything procurement departments in events that have occurred globally in recent large organisations for starters. The only way to effect years, it must be that has changed – change is to make it sothe thatworld the people who hold the

often have to travel work. many Furthermore, I am and referring to According the manner to in which security managers, Americans understand the industry represents itself. Twenty years on, that despite an

permanently – and weso cannot keep pretending power have no choice, it is great to finally see the that it hascoming not. 9/11 was as nota more an isolated incident industry together cohesive unit to drive

terrorism is aamount clear and present danger a extraordinary of effort on behalf of aand significant fact of daily life andmen thus, treatthe security number of dedicated andthey women, industry is

and groupsThe likeone ISISthing have way, such thatifchange. in their the physical security space attacks will become much more There that has changed dramatically overfrequent. the last twenty years

and with the due respect. In still security strugglingworkers to develop its reputation as a profession. contrast, they believe that Australian’s have a It is still struggling to put in place a national licensing very blasé attitude towards security and it is this model. It is still struggling to build value amongst its user attitude that makes us much more vulnerable base that enables organisations to operate on margins to attack. greater than the typical four to six percent. Margins this In my opinion, having recently travelled slim not only fail to provide the kinds of remuneration through Egypt and Jordan, they are correct. and working conditions that men and women of security

is is a great deal of more workassociations to be donealltotrying ensure the number industry to carve

deserve, it could be reasonably argued that such minimal

louder the noise, the greater the chance of being heard.

margins encourage illegal and unethical practices.

It is only when you are heard that people understand

What is more, if any one of the myriad of companies

what you want. And if you can deliver your message

engaging security services was to suddenly find that its

with enough force and conviction, and also have the

operating margins had reduced to between four and six

numbers to create very real consequences for the

percent, it is more than likely that organisation would

people with whom you are speaking, then finally, you

declare itself insolvent and close down! Yet those same

are in a position to begin to effect real change.

that we create the kind of effective security out their own slice of the pie. In this rare instance, more culture within organisations and the broader is not better. The reduction in the number of approved community that will enable Australian’s to be industry associations is, in my view, a good thing. safe and secure. And the work must begin with The greater the number of industry members security professionals. Let’s make 2018 the year represented by the fewest industry bodies the better. that Australia begins to take security seriously. n The more people in one room shouting at once, the

I feel that we are finally approaching that tipping

organisations expect their security providers to operate on these ridiculously slim margins, while having the

point. If nothing else, this was represented last month

actual temerity to ask if they can do it any cheaper!

when the Australian Security Industry Association Limited (ASIAL) teamed up with the Outstanding

ON

O SSOCIATI RS A ON DE O VI

SECURIT Y

PR

O

SSOCIATI

RALIA LTD UST FA RALIA LTD

Official Official Partners Partners

reduce extremely complex situations down to single

Performance Awards and Australian Security Medals

issues. This supposedly makes it easier for the public

Foundation to recognise the amazing things being

to engage and respond, which in turn drives ratings,

achieved in the industry. This is the kind of momentum

viewership, readership and, ultimately, advertising

that brings about real change in the areas that

revenue. Examples include “Migration increases the

matter. Who knows, with enough voices all speaking

risk of terrorism” or “Mass shootings are perpetrated

as one, we might yet see some real change. n

O rigin a l Siz e Original Size

PR O

Y P R OV RYI TP R O V I D I D E E RCIUT

CU

SE SE

SECURITY

N

USTRA F SAT R A L L I A A OU IA

STRALIA LTD AU OF STRALIA LTD AU

SECURITY

O C I AT I ASS ON O C I AT I ASS O

RS

SPAAL SPAAL

OF

OF

PR O

RS

SSOCIAT RS A IO DE N SSOCIAT VI RS A IO DE N VI

D LT D LT

SECURIT Y

PR

RS A DE VI

UST FA

O

The media has a terrible propensity to try to

blue colour changed to this colour green. blue colour changed to this colour green.

John Bigelow

COPY/ARTWORK/TYPESETTING APPROVAL COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE Please proof read carefully of this material BEFORE signing your approval to print.ALL Please paycopy/artwork/typesetting special attention to spelling, punctuation, signing your approval numbers, to print. Please pay special to spelling, punctuation, dates, times, telephone addresses etc, asattention well as layout.It is your responsibility to dates, times, telephone numbers, addresses etc,Press as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman assumes no responsibility our attention anybeen corrections. Minuteman Press assumes responsibility for bring errorstoafter a proof has authorised to print and print re-runsno will be at your cost. for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................ Signed.................................................................. Date........................

John Bigelow

Editor

Editor // SECURITY SECURITY SOLUTIONS SOLUTIONS 66 //

securitysolutionsmagazine.com securitysolutionsmagazine.com


FIRST AUSTRALIAN MADE PAS68 SHALLOW MOUNT BOLLARDS BOLLARD RATINGS

PAS68 rated bollard with ‘ZERO’ penetration

CSG10840 PAS68:2010 V/7500(N2)/64/90:0.0/17.9 ‘ZERO’ penetration CSG10850 PAS68:2010 V/7500(N2)/80/90:2.8/9.8 Articulated linkage not only allows for each bollard unit to accommodate gradients up to 3.6°, but allows for convex and concave arrays

Available in galvanised finish or fitted with stainless steel sleeve, can be painted in different colours LEDA has been at the forefront of designing, manufacturing

LEDA shallow mount bollards install

and installing crash rated bollards for more than 20 years protecting Australian people and its assets. LEDA’s CSG10840 and 10850 are the first Australian manufactured PAS68 rated shallow mount bollards that requires a foundation depth of only 200mm.

Shallow mount bollards around tree roots

The growing demand to install bollards in CBD locations often means encountering sub-pavement services which may need to be moved or relocated to accommodate conventional concrete footings. In many instances it may be impossible to obtain the required footing depth or to maintain the impact rating needed. This situation has driven LEDA to manufacture its own PAS rated shallow

Shallow mount bollards around existing underlying services

mount bollards providing cost and lead time savings to clients as well as supporting Australian manufacturing.

FOR MORE INFORMATION Contact your nearest LEDA sales office or visit our website www.ledasecurity.com.au

Follow us

Call 1300 780 450 Email sales@ledasecurity.com.au


LEADERSHIP BY JASON BROWN

T

he International

milestones have been passed so far

Standards Committee

(http://www.isotc292online.org/

– Protective security – Guidelines

managers of facilities involved in

(TC 292) responsible

about/history/).

for the development of a security

societal security, non-government

plan for an organization (led

organisations and societies

by France)

representing citizens’ interests.

for standards in the

• ISO 22342 Security and resilience

security equipment or solutions,

area of security and resilience has

Current Structure

completed its seventh plenary

ISO/TC 292 currently has the

WG6 has developed a road map

meeting, successfully held

following organisation:

to guide future security standard

– Working Group 8: Supply chain

in Bangkok.

• Working Group 1: Terminology

development and is open to

security – has been established

• Working Group 2: Continuity and

additional experts from Australia.

and is responsible for drafting

Possible future work areas for WG6

standards in the area of security

may include, but is not limited to:

management and the supply

• Treatments to reduce risk of and

chain. The current project is the

From 8–13 September, ISO/TC 292 held its seventh plenary meeting together with all its working groups. The meeting was hosted by TISI Thailand and, once again, became

organizational resilience • Working Group 3: Emergency management • Working Group 4: Authenticity,

the biggest meeting in the history of

integrity and trust for products

the committee, with a participation

and documents

of over 150 delegates representing almost 30 countries and several liaison organisations.

• Working Group 5: Community resilience • Working Group 6: Protective security

About ISO/TC 292 To remind forgetful readers and new subscribers, ISO/TC 292 was established on 1 January 2015 and is a committee with over 60 involved countries and international

• Working Group 7: Guidelines for events • Working Group 8: Supply chain security • Working Group 9: Crisis management

agencies such as the United Nations

• Joint Working Group 1: Managing

(UN) and ASIS International. It works

emerging risk (joint work with

with standardisation in the field of

ISO/TC 262)

from malicious acts • Development of security risk models • Managing protective security programs and systems: security management, private security,

In addition, a new working group

review of ISO 28000 Security and resilience – Security management system for the supply chain – Requirements and supporting supplementary standards. All Australians with a desire

security review and audit,

to participate in this and similar

conformity assessment, managing

work for Australian Standards

security related risk, reporting

should feel free to contact myself

• Security incident management:

or the magazine. Those who have

investigations, response and

already expressed an interest will

remediation, classification

be followed up over the next few

if incidents, mitigation, case

weeks. n

management, recovery • Physical protective security:

Jason Brown is the National

physical controls and materials,

Security Director for Thales in

security to enhance the safety and

• CG: Communication Group

access control systems,

Australia and New Zealand. He is

resilience of society. The committee

• DCCG: Developing Country

protection of physical assets

responsible for security liaison

is responsible for more than 20 published International Standards.

Cooperation Group • UNCG: UN Cooperation Group

The scope of TC 292 is

• Personnel protective security:

with government, law enforcement

investigations, vetting/screening/

and intelligence communities to

personnel assessment/security,

develop cooperative arrangements

standardisation in the field of

Of most interest for readers is

aftercare, security awareness and

to minimise risk to Thales and those

security to enhance the safety and

Working Group 6: Protective security

training, identity assurance, token

in the community that it supports.

resilience of society. There are some

(WG6). This working group is

verification and authentication

He is also responsible for ensuring

exclusions, such as sector-specific

responsible for drafting standards

and access, security culture

compliance with international

security projects developed in other

in the area of protective security,

relevant ISO committees and projects

• Information (tangible) protective

and Commonwealth requirements

which is the framework, policies and

security: security elements of

for national security and relevant

developed in ISO/TC 262 and ISO/

processes implemented to identify,

information lifecycle, system for

federal and state laws. He has served

PC 278. Liaison is established

respond to and reduce the risk of

handling tangible information

on a number of senior boards and

with other committees to ensure

harm from malicious acts.

alignment of effort, particularly in

Their ongoing projects are:

governance and methodology,

Security Professionals Australasia;

risk management, cybersecurity

• ISO 22340 Security and resilience

electronic and audio counter

member of ASIS International

– Protective security – Guidelines

measures and investigations

Standards and Guidelines

and governance.

• Surveillance: surveillance,

committees, including Chair of the

for security architecture,

WG6 needs more experts with

Commission and Chair of Australian

History

framework and controls (led

management and operational

Standards Committee for Security

ISO/TC 292 was established on 1

by Australia)

expertise in the work areas

and Resilience. As of February 2017,

identified above, drawing

Jason has been appointed Chair

January 2015 and has since then

• ISO 22341 Security and resilience

achieved quite a lot for a newly

– Protective security – Guidelines

from professional experience

of the International Standards

born committee. Read more about

for crime prevention through

in organisations such as civil

Committee for Risk Management.

the history of TC 292, which goes

environmental design (led

protection, law enforcement

Jason can be contacted at jason.

back to early 2000 and what major

by Korea)

agencies, companies providing

brown@thalesgroup.com.au

8 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


The Missing Link in an

Access Control System

Geoff Plummer Executive Business Manager - Davcor Group

On entry to most of the major capital city CBD buildings you are confronted with a host of access control initiatives to govern who is allowed and who is not allowed access. Be it the presentation of your card to a reader to open a turnstile, activate the lift or trigger an automatic door; access is controlled in an efficient and easily managed way and our security programmed brains believe that all is good.

I pose a question. How many of these doors/lifts/turnstiles have a mechanical key override? The answer is many, not all, but many.

I would then need to pose another question. Are the mechanical keys secure? Are the keys stored in a secure place and are not lost? Also, are they secure from attack and duplication? Remembering that many keys can be visually read and even reproduced from a photograph. The answer is as soon as they are in a person’s hand that the keys can be compromised by copying, duplication or even 3D printing.

My observation is that at many sites, extremely effective and costly access control systems are installed. These systems are hugely effective in monitoring and controlling access to the building however many of these systems have a very basic weak point that allows the whole system to be compromised. The chink in the armour is,

They are fitted with a conventional mechanical cylinder. This cylinder has no audit trail, can be in many cases mechanically manipulated (picked). Added to which any access to a key by an unscrupulous person can result in it being read, impressioned (in the way of an impression into a soft material) or photographed and 3D printed. So now what? A solution is available. Install an electromechanical key system such as EKA CyberLock. EKA CyberLock makes a range of cylinders to suit most common locks in the Australian market. The Cylinders are opened with CyberKeys, both of which are managed using software in the same way as an access control system. The management software allows access to be granted when and where, or simply timed out or even revoked when required. CyberKeys are programmed through Communicators such as a smart app and Bluetooth and a 20-key vault cabinet. The entire system can be audited and to make it even simpler can potentially be integrated with your existing access control system.

EKA | CyberLock - Division of Davcor Group Pty Ltd. 1300 722 311 - WWW.EKACYBERLOCK.COM.AU


LEGAL

WORKPLACE SAFETY AND CONTRACT SECURITY PROVIDERS

BY DR TONY ZALEWSKI

Taking Reasonable Care An employer’s duty to take reasonable care to avoid a foreseeable risk of injury is wellknown. In determining the potential for liability, it is usually enough if the circumstances reveal injury to an employee was a possibility that would have occurred to a reasonable employer. This includes matters such as inattention or misjudgement in common work functions by an employee, hence the importance of appropriate induction, training, supervision and protocols. Reasonable care is not a guarantee of safety and some Australian cases have emphasised the need for employees to take personal responsibility. Australian Standard for Guard and In addition to any formal

security provider work closely

Patrol Services

released by the

agreement between the parties

to minimise security and safety

The Australian Standard AS4421:2011

Australian Bureau of

and express conditions regarding

risks. In addition to a formal risk

Guard and Patrol Security Services has

Statistics, over

safety, it is also implied in a

assessment and risk treatments,

been adopted by regulators and the

700,000 Australian employees

contract of employment that

employers can further minimise

security industry as an appropriate

suffer some sort of work-related

security providers take reasonable

risk by:

guide to minimum operating

injury or illness each year. Some

care for the safety of their

• introducing operational safety

standards for providers of security

work is inherently more hazardous

employees. There are many

strategies for staff carrying

services. The standard reinforces

than others, including the various

resources available to assist

out work without exposure

concepts of taking reasonable care

roles performed by operational

providers in minimising risks

to unnecessary risk, such as

including, amongst other things:

security staff across high-risk

associated with the safety of

protective ‘zones of control’

1. Unless declined by the client,

sectors and within public-

staff and others in and around a

facing environments.

workplace; this article will discuss

foreseeable, unusual or possibly

client’s premises be conducted

some of those resources and

unexpected risks that might arise

by a competent person who

methods for minimising risk.

in the workplace

highlights the various strengths

A

ccording to figures

It is not uncommon for security services to be provided to

• warning staff and others of

• instructing and further

government departments through

a protective risk review of the

and weaknesses of the system

a contract security firm; in fact

Responsibilities for Workplace

developing staff in the

and what has to be done to

it has become the norm in most

Safety

performance of work where

provide reasonable protection

government settings. The process

Government agencies that utilise

instructions might reasonably be

is usually formalised through a

contract security providers have

thought to minimise the risk of

contract for security services where,

a non-delegable duty of care to

amongst other things, safety of staff

all persons in and around the

Further to this shared responsibility,

communicated to security

and the protection of workplace

workplace. In most contracted

contract security providers also owe

officers at the time of despatch

assets is a key responsibility for the

security environments, the

a duty to take reasonable care for

or deployed to site (Section

contracted security provider.

government agency and its

their staff.

2.6.2).

10 // SECURITY SOLUTIONS

danger and injury

(Section 2.6.1). 2. Where site risks are identified, records shall be kept and

securitysolutionsmagazine.com


Resources that Assist to Enhance

Common Problems

4801:2001 OH&S Management

agreement between the parties

Safety

Problems arise for employers

Systems and AS4421:2011

(Section 2.7).

There is a plethora of

when they do not adopt

Guard and Patrol Security

information freely available to

appropriate practices, align with

Services, should be reviewed to

shall formulate assignment

assist employers in enhancing

standards and guidelines or do

assist employers to adopt and

instructions for the effective

workplace safety, including

not regularly review their safe

operationalise a system that is

security of the site, dealing

online advice by safe work

work system. Problems that are

evidence of a reasonable standard

with emergency procedures,

regulators. For example,

typical when there have been

of care.

lines of communication and

Safe Work Australia has a

incidents involving alleged safety

accountability. The assignment

number of resources on risk

breaches include:

should work with their clients

instructions should be agreed

minimisation in the workplace.

• an absence of or a deficient

to develop a system of work

between the parties (Section

The NSW WorkCover publications

safety policy, plan or

that aligns with industry best

2.8).

Occupational Health and Safety in

procedures

practice. Addressed correctly,

3. A clear written contract or

4. The company (security firm)

Security industry employers

Most providers of security services

Hospitality (2003) and the guide

• poor workplace supervision

such practices will meet the safety

align closely with the standard and

Violence in the Workplace (2002)

• no additional professional

needs of employers, employees

in many cases exceed the minimum

assist employers in understanding

development training to

and others in and around various

requirements by introducing

risk issues for particular sectors

progress the safety culture or

workplaces. It will also ensure a

additional services such as

or work functions. Other

competence of workers

more productive and profitable

regular meetings about operating

states and territories also

performance, debriefing after

have similar publications, with

incidents, system reviews to enhance

additional guidance through

the system of work and data analysis

Australian standards such

relating to operational performance.

as AS/NZS 4801:2001 OH&S

Although alignment with the standard

Management Systems.

• failure to adjust the system of

operation. n

work from other incidents or near misses • poor, deficient or dated risk assessments

For over 20 years Dr Tony Zalewski has provided expert security reports to courts in all Australian jurisdictions. He has four

Conclusion

degrees, including a law degree,

adopt various methodology and

Workplace safety programs need

from Australian universities and has

adopt the recommended practices

recommendations in relevant

to be carefully thought through.

worked on over 500 cases, including

as outlined within the standard. This

guides to minimise risk in the

They must be developed or further

some of Australia’s leading security-

approach minimises risk and provides

development of their formal

contextualised in consideration of

related civil actions. He also provides

some evidence that a reasonable

(documented) security/safety

the operational work environment.

advice about security across industry

approach to care has been taken by

systems minimise a broad range

the employer.

of operational risks.

is optional, it is common industry

Typically, employers who

practice for security providers to

securitysolutionsmagazine.com

Various standards and guidance materials, including AS/NZS

sectors and is a security adviser to governments locally and abroad.

SECURITY SOLUTIONS // 11


CYBER SECURITY

STANDARDISING YOUR INFORMATION SECURITY FRAMEWORK BY TIM RIPPON

W

What are the Basics of an ISO Standard?

1.6 Information security policy

frameworks to set out how to operate in an

All ISO standards are based around

1.8 Statement of applicability

efficient and effective

a fundamental Plan-Do-Check-Act

e all use various

1.7 Risk assessment

manner. Cybersecurity and

(PDCA) approach, also known as the

2. Do

information security should not be

Deming Cycle. It is an iterative cycle

2.1 Information security strategy

any different – there are many great

that helps to build the maturity of

2.2 Document management

frameworks available, some quite

the framework or, in ISO terms, the

2.3 Design of controls & procedures

easy to follow, some very technical

management system.

2.4 Communication

and others are used for

Planning is important for

2.5 Training and awareness

understanding the organisation

2.6 Implementation of controls

intellectual property and valuable

defining the scope of the

2.7 Incident management review

information secure.

with many frameworks in attempts

management system, setting

2.8 Operations management

to standardise information security.

policy, investigating risk appetite

Some standards work well, while

and determining what risks exist.

3. Check:

or consultant can be the first step

others can cause more harm

The doing is key, where strategy

3.1 Monitoring, measurement,

to enhance your capabilities in

than good, as they may have not

is set, controls and procedures

analysis & evaluation

order to develop and implement

been effectively worked out in

are defined and the competency

3.2 Internal audit

an effective and efficient ISMS,

the first place, or they are more

of people is addressed by way

3.3 Management review

with the next step educating your

suited to academia than real-

of communication, training

2.5 Training and awareness

executives about this initiative

world situations.

and awareness. Checking is

2.6 Implementation of controls

in order to protect your valuable

specific industries. Over the years, I have worked

Some really good interoperable

A simple conversation with your information technology staff

fundamental to ensure integrity

corporate data from internal and

global standards have been

of the management system. This

4. Act:

produced since 1947 from

is done by way of monitoring,

4.1 Treatment of non-conformities

the International Organisation

measurement, developing an

4.2 Continuous improvement

for Standardisation (ISO),

internal audit approach and having

headquartered in Switzerland. The

effective management reviews

ISO defines rules and standards to

in place. The final component is

aid in tasks for virtually all products

acting on the audit findings by way

that people use, including rules

of treating non-conformities and

and stakeholders with confidence

Master of Business Continuity (ISO

and standards about how products

looking at ways to continuously

in how you manage risk related to

22301) and Lead Cyber Security

are made and how quality control

improve and evolve the

information security. Additionally,

Manager (ISO 27032) from PECB.

tests should be performed. This

management system.

it provides senior management

Tim is actively involved in various

involved in information security

industry groups, including the

with an efficient management

Australian Women in Security

process. It can offer a competitive

Network (AWSN) and the Business

advantage due to customer trust

Continuity Institute, where he

are in place to review and update

The ISO 27001 Information Security Management System (ISMS)

and market share. From a regulatory

volunteered for five years, including

these standards on a regular

A structured PDCA cycle approach is

aspect, it demonstrates compliance

two years being a board member of

basis, typically every three to five

used and the following components

with customer, regulatory and

the BCI Australasia. Tim is founder

years. These committees call out

are required:

government requirements. The

and director of elasticus, advising

to industry groups and thought

1. Plan

ISMS can help to align information

Australian-based executives on

leaders for input, so you can be

1.1 Initiating the ISMS

security with the organisation’s

how to best manage cybersecurity,

assured that a strong vetting

1.2 Understanding the organisation

objectives and can enhance

disaster recovery and business

process has taken place of the

1.3 Analyse the existing system

integration between business

continuity prior to the occurrence of

information contained within

1.4 Leadership and project approval

operations and information

a major disaster or crisis. He can be

these standards.

1.5 Information security scope

security. Importantly, an ISMS keeps

contacted via mobile 0417 036 026.

is brilliant for cybersecurity and information security in the modern, online world. Global ISO technical committees

12 // SECURITY SOLUTIONS

external threats. n Tim Rippon is an author, speaker and trainer of cybersecurity and

The Benefits of Implementing an ISMS

business continuity. He holds a

An ISMS provides customers

Security (ISO 27001), certified

certified Master of Information

securitysolutionsmagazine.com



HUMAN RESOURCES

OVERTIME ALLOCATION IN THE AUSTRALIAN SECURITY INDUSTRY: UNITED VOICE VS WILSON BY GREG BYRNE

A

recent decision in the Federal Court

(ii) 114 hours within a roster cycle not exceeding three weeks;

involving Wilson

(iii) 152 hours within a roster cycle

Security and the

not exceeding four weeks; or

United Voice Union, a large Australian trade union with a

(iv) 304 hours within a roster cycle not exceeding eight weeks.

The Federal Court

However, when overtime is

The Federal Court deliberated on

worked within a week or roster

one single question – whether

cycle spanning more than one

overtime could be paid on hours

week, overtime can be moved to

worked before the limit on

different places within the period.

ordinary hours was reached. It was

This decision created far more

concluded that it could.

flexibility in the security industry in

membership in excess of 130,000

During the decade prior to 2018,

members, including Australian

Wilson ran a fixed monthly

security guards, has ramifications

rotating roster. During that period,

“Overtime hours are hours that

for owners, managers and

staff were rostered 152 hours (as

are worked in addition to ordinary

employees of security companies in

per the award – see (iii) above),

hours”, but “rostering arrangements

security industry were now able to

Australia. The decision has clarified

plus an additional 16 hours

are within the discretion of the

move overtime to hours that would

the issue of allocation of overtime

overtime. Prior to October 2016,

employer. Consistently with the

otherwise attract penalty rates. The

for guards on fixed rotating rosters.

these overtime hours were worked

existence of this discretion, the

decision effectively reduced labour

during the last two shifts of the

award does not contain any express

costs by eliminating penalties and

Background

month, at the regular overtime

restrictions on the exercise of that

reducing superannuation premiums.

In early 2018, the Federal Court of

rates (see above).

power”. And further that, it was at

Because the Full Federal Court’s

the discretion of the employer “to

observations were not just founded

Australia heard a matter between

On or around 31 October 2016,

The Federal Court found,

the allocation of overtime that had previously been the case. Employers in the Australian

the United Voice Union and

Wilson altered the arrangements so

decide whether overtime hours can

in the Security Award, the effect of

Wilson Security, one of Australia’s

paid overtime was no longer worked

be included in the roster at a point

the union’s appeal to the Full Court

largest security companies. The

on the last two days of the month,

before which all ordinary hours

is that the decision now affects

arrangements between Wilson

but instead on one of the Sundays of

have been worked.”

all employers and employees in

and its employees is covered by

the month.

It should be noted that this

Australia. This is, of course, provided

decision was made having regard

the Award or Agreement is similar to

a 100 percent penalty rate on

to the provisions of the Security

the Security Services Industry Award

Sundays, Sunday hours did not

Award and, as such, its meaning was

in so far as it relates to the definition

that overtime is to be paid at a rate

exceed the limit on ordinary hours

restricted only to the Australian

of ordinary hours.

of time and one-half for the first

imposed by the Award. Further, it

security industry.

two hours, and double time for

did not require employers to pay

every hour after that, and payable

a penalty on a penalty (that is,

Decision Appealed

as follows:

overtime plus the Sunday rate) –

The union appealed to the Full

How should the Australian Security Industry Move Forward?

(a) The ordinary hours of work are

this resulted in Wilson avoiding

Court of the Federal Court of

This decision will allow for some

38 hours per week or, where the

paying the overtime loading and,

Australia. The Full Court of the

employers to reduce labour costs

employer chooses to operate a

because superannuation, annual

Federal Court dismissed the appeal

through overtime allocation. However,

roster, an average of 38 hours per

leave and personal leave were

stating that overtime is time “over

all employers are strongly advised to

week to be worked on one of the

paid only against ordinary time,

ordinary hours, not necessarily after

seek independent legal advice on this

following bases at the discretion of

they minimised these entitlements

ordinary hours”, explaining that

issue prior to moving to attempt to

the employer:

as well.

where overtime is paid against a

adjust overtime hours in such a manner

single shift, it ought to be paid on

as to reduce costs in the way Wilson’s

the last hours worked.

did as outlined in this article. n

the Security Services Industry Award 2010. Clause 21.1 of the Award states

(i) 76 hours within a roster cycle not exceeding two weeks;

14 // SECURITY SOLUTIONS

As the Award provided for

Not surprisingly, United Voice Union appealed to the Federal Court.

securitysolutionsmagazine.com


Smart Vehicle Identification

Photos credits: Shutterstock - aressy.com 04/18 - 10917

New Spectre reader: Let the good go, kick the bad out. Without delay. Meet the challenge of fast-track security at your vehicle gates. Spectre’s UHF-based vehicle ID reader is the first of a new generation: discreet by design, flexible in its configuration, secure and encrypted in its communication. Our new long-range reader is built to perform for up to 4 driveways, even in highly challenging environments. It’s the most robust reader on the market, yet intuitively easy to use. Welcome to speed and security - in a single solution.

SCALABLE | SMOOTH | SECURE | AGILE | STEALTH | INSTINCTIVE

www.stid-security.com Security Meetings Trophées de la sécurité Expoprotection ISC West APS


RISK MANAGEMENT

THREATS AND RISKS

BY AMI TOBEN

To mitigate a threat, on the other hand, is to combat the active harm itself, which is the definition of reactive or countermeasures. This is where you will find emergency procedures (evacuation, shelter in place, run-hide-fight), apprehension and arrest, along with full-on armed response (eliminating the threat). Now, keep in mind that there are no right or wrong strategies here, it is just a question of fitting your

W

hat is the difference

operations, the environment and/

between risk and

or property.

threat? It is a simple

A good way to understand the dynamic here is to use the formula:

Risk: Potential for an unwanted

mitigating actions to the situation and to your defined goals. But anyone who has been following

very common terms used in the

incident, event, or occurrence, as

Threat + Vulnerability = Risk to Asset

security industry, but one that more

determined by its likelihood and

The risk to an asset is calculated

mitigation and therefore have my

people need to ask themselves. As

the associated consequences.

as the combination of threats

own biases in favour of it.

question about two

outcome resulting from an

a result of not doing so, too many

And, just for good measure:

and vulnerabilities. This means

security professionals end up using

Vulnerability: Physical

my blog will know that I happen to live deeply within the realm of risk

I hope this article can help clear

`

j

v

that in some situations, though

up some of the terminology that

`j

risk and threat (and occasionally,

feature or operational attribute

threats may exist, if there are no

gets tossed around out there. But

jv

vulnerability too) interchangeably.

that renders an entity open to

vulnerabilities then there is little

keep in mind that the actual bottom

This is why you end up with risk

exploitation or susceptible to a

to no risk. Conversely, you can have

line is the work itself, and the

management specialists providing

given hazard.

a vulnerability, but if there is no

safety, security and wellbeing of

To put things in even simpler

threat, then you also have little

everyone involved.

threat management professionals

terms: Threat is the potential harm

to no risk. Either way, the most

providing risk assessments.

that can come to an asset (the thing

important factor we are trying

with me on anything I have said,

Confused yet? If not, which do you

you are trying to protect). Risk is

to calculate, manage and control

I would be most grateful for

think is better: risk management

the likelihood that the harm will

is risk.

your comments, questions and

strategies for threat mitigation, or

be realised. Vulnerability is the

threat management strategies for

weakness by which the harm can

consider is what happens when

risk mitigation?

reach the asset.

we inject into the mix the all too

threat assessments, alongside

Another important thing to

As always, if you beg to differ

suggestions. n An experienced security director,

From my own perspective, the

familiar term (at least for security

consultant, trainer, operator and

you get the point. So, let us try to

most important thing to calculate

professionals) of mitigation – the

business developer, Ami Toben

sort through this mess. The place

and assess is risk, not threat. Yes,

action of reducing the severity,

has over 14 years of military and

to start is by understanding the

we can talk about levels of threat

seriousness, or painfulness of

private sector security experience,

proper definitions of the terms

(and agree that, say, a truck-bomb

something. To mitigate a risk is to

and a successful record of providing

used. Now, there are different

has more destructive power than

target the probability of a threat

full-spectrum, high-end services to

sources that can give you different

a hand grenade), but what we

being realised, which is to say that

Fortune 500 corporations, foreign

definitions, but the source I have

really want to know is how likely

you make it less likely to happen.

governments, foundations, non-

stuck to for some years now (and

we are to encounter each of them,

This is pretty much the definition

profit organisations and wealthy

the one I would recommend) is the

that is, risk. A threat assessment

of preventive measures, and is

individuals. Ami is currently director

US Government’s Department of

should tell you if an earthquake

where you will find property and

of consulting, training and special

Homeland Security.

will be more destructive than an

access control, circles of security,

operations at HighCom Security

armed attacker. A risk assessment

deterrence by appearance,

Services, a US-based high-end

occurrence, individual, entity, or

should tell you how likely it is

visual control, EP advance work,

security firm specialising in

action that has or indicates the

for your assets to be harmed by

protective intelligence and

protective services, security systems,

potential to harm life, information,

said threats.

surveillance detection.

consulting and training.

I can keep going, but I think

Threat: Natural or man-made

16 // SECURITY SOLUTIONS

securitysolutionsmagazine.com

`v

`jv

h


THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.

NEW!

ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.

+61 (3) 9544 2477

email: oz_sales@takex.com

HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.

BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.

INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.

OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .

1300 319 499 csd.com.au www.takex.com

TAKEX AMERICA

VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta


COMMUNICATION

HOW INTRODUCED CRISES THREATEN BRAND REPUTATION BY TONY JAQUES

I

t is a fact that about

the unwarranted association will

done and the racist label gained

three quarters of all

likely persist for years.

enormous exposure.

organisational crisis are not sudden

The latest victims of such an

Or consider the high-profile

• respond consistently as often as required to dispute the claimed link

introduced crisis are innocent

drug companies which got dragged

unexpected events, but follow red

businesses in Hong Kong, which

into the death penalty debate

with effective material to

flag warnings which could have, and

recently found themselves caught

and had to block their brands

be used with customers and

should have, been identified in

up in pro-democracy protests.

from being used in executions by

advance. But there is an emerging

China has put heavy pressure on

lethal injection.

class of events I call ‘introduced

high-profile companies – which are

crises’ – where reputational risk is

seemingly not in any way complicit

case when was falsely accused of

Most importantly, responding

instigated by external events, often

– to support the Chinese line and

sponsoring dogfighting. It arose

to an introduced crisis demands

social media driven, over which the

sanction staff who attend the

from a photograph of a dogfight at a

balance; balancing the need to

company or brand has little control

demonstrations. They even forced

nightclub in Mongolia years earlier

state the facts against the risk of

and usually no warning.

the British CEO of Cathay Pacific

where Heineken posters appeared

giving oxygen to groundless claims

Airline to resign.

in the background, left over from

and balancing the need to respond

an earlier promotion. The brewery

against continuing to repeat

A prime example is when American white supremacists

However, introduced crises

Then there was the notorious

• provide managers and staff

stakeholders • monitor and respond to misstatements on social media

staged a torchlight march in the

which damage brand are not new.

announced it had nothing to do with

the false link. It is self-evident

glare of what were described as

Think of the brand impact when

the event, but the allegation and the

that a one-off denial is probably

Tiki-torches, and the phrase was

long-standing Subway spokesman

images continued to circulate online.

not enough. But the impact of

constantly repeated for weeks.

Jared Fogle – widely known as the

No thought of course for the unlucky manufacturer, which found itself unwittingly linked to

Given that social media

unwarranted links and introduced

Subway guy – was jailed for 15

has turbo-charged the spread

crises can last for weeks or months

years for child sex offences.

of introduced crises, they are

and the company and brand need to

extraordinarily difficult to

establish a firm foundation to move forward. n

Or when a manager at New

a racist cause. The company made

Balance expressed support for

combat. So, what can companies

its position clear, that Tiki Brand

Donald Trump’s ‘made in America’

do to protect brands which

was not associated in any way

trade policy, and the neo-Nazi

become innocently embroiled

with the events that took place in

website Daily Stormer labelled

in controversy?

Outcomes Pty Ltd, a specialist

Charlottesville and their products

the company’s sneakers “the

• do not underestimate how deep

consultancy for people who work

are “designed to enhance backyard

official shoes of white people”.

and long lasting reputational

in issue and crisis management.

gatherings and to help family and

The company quickly declared,

damage can be

For more articles like this one,

friends connect with each other

“New Balance does not tolerate

at home in their yard”. Sadly, the

bigotry or hate in any form,”

statements denying

Tony can be reached at tjaques@

reputational damage was done, and

but here again the damage was

involvement

issueoutcomes.com.au

18 // SECURITY SOLUTIONS

• issue prompt and firm

Tony Jaques is Director of Issue

visit www.issuesoutcomes.com.au

securitysolutionsmagazine.com



BUSINESS DEVELOPMENT

GETTING COMPARATIVE: GOING FOR YOUR COMPETITOR’S JUGULAR C

omparative marketing

BY STEPHEN JOHNSON

strategies, where you compare your product against competitors,

can be risky but also very powerful in the right circumstances. If you have a genuine and measurable advantage over your opposition, you might have a lot to gain by considering it. It is worth knowing when to use comparative marketing strategies

position. These are important or the

through. If you start blending other

Depending on what you sell,

and how to use them. First, be clear

comparison would not be fair.

campaign agendas you can blur and

sales presentations also allow your

weaken your competitive message.

customer to see a comparison for

about what it is. Making a claim in comparative when you take some

Choosing the Right Comparisons

Advertising

achieve this, it will make a much

specific aspect of your product or

Choose the point of difference you

Most comparative marketing is, in

bigger impact.

service and compare it against those

base your comparison on with care.

fact, comparative advertising. You

of your opposition.

The key is to choose a factor that is

can reach a large audience and make

Social Media

unlikely to change over the lifetime

a big impression by demonstrating

Twitter and Facebook can be powerful

Direct or Indirect

of your comparison. If your prices are

and proving the superiority of what

ways of achieving comparative

There are different ways you can

better than your competitor, keep in

you sell over your competitors.

marketing by recruiting your contacts

get comparative. If you name a

mind that unless you have significant

competitor, you are engaging in

cost advantages, your competitor

comparative marketing because

testimonials. You need to accept that

direct comparative marketing. If you

could change their pricing and

of the very same attributes

the medium can be hijacked, and you

do not name them explicitly, you are

render your campaign ineffective.

that make it so powerful; it is a

are still required to monitor content

broadcast medium, viewed by the

and treat your social media like any

isolation is not comparative. It is

being indirect. It is safer to not be

Another price-related factor to

themselves, directly. If you can

It is also the riskiest form of

to supply the comparisons and the

explicit about who your comparison

avoid is ‘value’. Claiming more value

masses. But if you are accurate

publishing. But you can outsource the

is against. You can do this by de-

than a competitor can be subjective.

in your claims and you compare

content and get greater credibility by

identifying a competitor and still use

Instead, choose something your

the same attribute in the same

getting customers making your claims

their information, but it can be more

competitor is unlikely to be able

context, getting comparative

on your behalf.

compelling to name a competitor.

to change. The quality of the build,

in mass communications is a

the strength of the product, the

powerful strategy.

Prepare to Defend

Apples and Apples

geographic reach of your service, the

Good comparative advertising

freedom to transact in so many ways,

Sales Presentations

if you decide to get comparative,

compares like for like. You can open

or some other factor that should see

Sales presentations are where you

especially in broadcast media, is

yourself up for challenges from

your advantage stay intact.

can make greater comparisons,

that you might need to defend your

and safer comparisons. You still

decision against competitors or

competitors or regulators if you do

Lastly, something to keep in mind

not compare the same attributes or

What to Show

need to toe the line on comparing

regulators. You might be right in your

compare in the same context.

In your comparative marketing,

accurately, but you can more freely

claims but the more effective your

keep your points on facts and

name names. Getting comparative

campaign, the more motivated your

shows a competitor screen being

comparisons. Do not show too much

in sales presentations also lets

competitor is to stop you or to at least

kicked in after three kicks. The

about your competitors and, as

you provide more detail and tailor

rattle the sabre. And regulators will

Crimsafe screen does not kick in.

unusual as it sounds, do not show

your comparison. If your customer

also require you to provide at least

The competitor’s door was installed

too much of your own product or

is already using a competitor, you

some degree of substance to your

by the competitor and the Crimsafe

service being used. The message

can tailor your comparison against

claims. You will need to have these

door was installed later in the same

in your comparison needs to get

that competitor.

at hand. n

A current TV ad for Crimsafe

20 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Prepared to

support you

at every level.

Effective cybersecurity is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And it’s about partnering with a solutions provider who’s prepared to support you at every level. Which is where we enter the picture. We are 100% focused on cybersecurity, and we do everything in our power to mitigate its risks. We have strict requirements for our own products and we work diligently with our partners—and you—to fight this threat.

Learn about our layers of protection at www.axis.com/cybersecurity


THINKING ABOUT SECURITY

A ROSE BY ANY OTHER NAME

BY DON WILLIAMS

W

hat is in a name? Answer: quite a lot, particularly if you choose a name that

• the entity’s protective security practices and procedures • investigating, responding to, and reporting on security incidents”

CSO Organisational Standard (ASIS

and certifications to match

CSO.1-2008). It provides guidance

the requirements of a subject

on position description, required

matter expert. These government

competencies, responsibilities and

CSOs cannot hold peer-to-

already has a specific meaning. In

The CSO must also “ensure

accountabilities, reporting chains

peer discussions with their

this case, chief security officer

personnel and contractors

and leadership considerations,

corporate equivalents. This is like

(CSO). A CSO is a senior position

are aware of their collective

as well as definitions and other

appointing a chief finance officer

within the organisation. While a

responsibility to foster a positive

resources. It is a good reference

with no background in accounting

CSO does not usually sit in the C

security culture, and are provided

if an organisation is looking to

or budgeting.

Suite with the chief executive,

sufficient information and training

create a CSO position.

finance and operations officers,

to support this”. These are

they are probably only a tier or two

reasonable requirements of the

corporate sector, there are

is not a subject matter expert,

lower, alongside the chief risk,

person responsible for the security

many CSOs responsible for

no matter how experienced in

safety, compliance and other

of a government entity.

protecting the assets and

government functions, and who

functions and working with other

can only manage security on a

Government directory (www.

senior managers to assure the

part-time basis, creates false

directory.gov.au/departments-

survivability of the business.

expectations on one side and

specialist managers. Of course, every organisation is different. It is therefore interesting that

The Commonwealth

Within the Australian

To assign the title chief security officer to someone who

the Commonwealth Government’s

and-agencies) shows about

Protective Security Policy

190 departments and agencies,

turning over more than ten billion

Framework (PSPF), Governance

not including the sub-entities,

dollars a year meet on invitation

itself a disservice by selecting

section (www.protectivesecurity.

commissions and others that need

only, in closed-door sessions to

a position title that already had

gov.au/governance/Pages/default.

security. If the previous version of

discuss issues of mutual concern;

meaning and credibility. Perhaps

aspx) requires each “accountable

the PSPF is an indicator, it can be

with due regard of legislated

not everything called a rose

authority” (read department

expected that state and territory

and informal confidentiality

smells as sweet. n

and agency) to appoint a chief

governments will also adopt the

and competitive frameworks.

security officer.

PSFP and its requirement, in which

These are high-level security

case, there will be many hundreds

professionals with a sound

is a recognised thought leader in

must “empower the CSO to make

of government CSOs. The issue

understanding of applied security

security, emergency management

decisions about:

is that these appointed CSOs are

principles and practices within

and related disciplines. His book

• appointing security advisors

senior public servants for whom

their operating environments.

Bomb Safety and Security: the

The accountable authority

within the entity • the entity’s protective security planning

22 // SECURITY SOLUTIONS

The CSOs for companies

false impressions on the other. The Government has done

Don Williams CPP RSecP ASecM

being the CSO is an additional duty.

The government-appointed

Manager’s Guide is available from

ASIS International published

CSOs do not have the experience,

Amazon. Don can be contacted at

qualifications, competencies

donwilliams@internode.on.net

an American National Standard,

securitysolutionsmagazine.com


HFRG AUSTRALIA DEFENSIVE TACTICS INSTRUCTOR PROGRAMS HFRG (formerly PPCT) is best recognized for developing training systems based on documented tactical, legal, and medical research. This unique approach allows HFRG to design training systems that are quick and simple to learn, and easy to retain, while reducing the potential for significant injuries. This combination has become immediately popular with administrators and field officers, for they now have use-of-force training which is reliable and defensible in court. HFRG has become one of the largest use-of-force training organizations in the world training over 25,000 instructors since 1990 and an estimated 40,000 instructors since 1980 throughout the United States, Canada, Mexico, United Kingdom, Saudi Arabia, Hong Kong, and Australia. The HFRG Defensive Tactics System is the first subject control system developed through tactical, legal and medical research. Tactically, the system addresses the most common types of resistance officers encounter, allowing the instructor to maximize training on job related techniques. Legally, the HFRG System teaches a simple use of force continuum that clarifies the appropriate force level for every level of resistance. Medical research was conducted on every HFRG technique to refine technique efficiency and to ensure the medical implications were proportional to the level of resistance. The suite of courses fully satisfies the new RTO requirements and obligations for defensive tactics units including baton & handcuffs, ensuring compliance for the RTO and the trainer with ASQA Standards for: competencies Standard 1.13[a], current knowledge & skills 1.13[c] and professional development 1.16. We are also the only organisation that can offer expert witness support for the skills you teach from our courses by a legal practitioner and industry expert.

CONTACT US TODAY TO DISCUSS YOUR AGENCIES TRAINING NEEDS admin@hfrgaus.com www.hfrgaus.com


EVENTS

PNG Security Congress

• large enterprise systems

robotics and vehicles (UGVs),

2–4 March 2020

• mechanical locking integration

and the various software and

Port Moresby, Papua New Guinea

with electronic security solutions

applications that support them

intelligent living and work spaces. Our 2020 event will feature a Smart Zone designed as a thriving

Now is the time to plan to attend a

• emerging technologies.

world-class security and technology

Visit pngsecuritycongress.com/

has moved to the ISC West show

which presents new technologies

conference and exhibition – PNG

register to register or for more

floor! As the digital and physical

and solutions to help you create

Security Congress.

information. n

worlds collide, it is increasingly

smarter, greener buildings. The new

important for industry

zone offers visitors a dedicated

Security industry specialists and

• Connected Security Expo (CSE)

hub of technological innovation

professionals will converge on Port

ISC West

professionals to protect their

environment to look for integrated

Moresby, PNG, in March 2020 for this

18–20 March 2020

organisations and clients from

and cloud-based solutions to

premier security industry event, with

Sands Expo Convention Center,

both physical and cyber threats.

improve operations and deliver

a security conference and exhibition,

Las Vegas

CSE provides holistic solutions for

business value.

real-world challenges presented and

ISC West is the largest security

today’s connected organisations.

a glimpse into the future of global

industry trade show in the US. At

Working with SIA, ISC West also

IoT technologies will be more

security integration and trends.

ISC West, you will have the chance

features world-class education

pervasive in smart commercial

to network with over 30,000

to learn about every facet of the

buildings than anywhere else over

electronic security and safety

security professionals through

security industry.

the next three years. This zone

solutions for aviation, banking,

new products and technologies

infrastructure, industrial sites, mines,

encompassing everything from

commercial buildings, residential

access control to unmanned

towers, building and development;

vehicles from over 1,000 exhibitors

Total Facilities

and data to better understand and

the best of the best in a world-

and brands.

21–23 April 2020

manage their building performance.

The Congress will feature

class offering: • intelligent CCTV, access control and alarms systems

In 2020, ISC West will

Visit www.iscwest.com for more information. n

According to industry research,

is designed to deliver to visitors industry-class solutions and strategic advice on how to use technology

Melbourne Convention and

offer attendees a host of

Exhibition Centre, Melbourne

attractions, including:

Total Facilities is Australia’s most

• new products and

Visit www.totalfacilities.com.au for more information. n

important facility management

CivSec 2020

technologies, encompassing

event. Explore an Environments

1-3 September 2020

• intelligent traffic solutions

everything from access control

of Excellence and discover the

Brisbane Convention and Exhibition

• asset management systems

to unmanned vehicles

latest and smartest ways our

Centre

built environment can help

Built around major conferences of

event within ISC West focusing

us realise our full potential in

Australia’s key law enforcement

on unmanned aerial vehicles

Australia’s leading showcase of

and policing organisations, the

(UAVs), unmanned ground

high-performing facilities, and

CivSec 2020 International Civil

• advanced video surveillance solutions

• drone capability • software cyber management solutions • innovative video intercoms

24 // SECURITY SOLUTIONS

• Unmanned Security Expo is an

securitysolutionsmagazine.com


Security Congress and Exposition is

IFSEC International

you can adapt to the changing

most innovative solutions to

your gateway event to the growing

19–21 May 2020

tides of tomorrow’s security

the Australian market. For over

Indo-Asia-Pacific civil national

ExCel, London, UK

challenges and equip yourself

three decades, it has been the

security environment. CivSec 2020

Beyond an internationally

with the tools you need to move

largest and most established

will include an industry exhibition,

esteemed product showcase,

forward with certainty.

commercial event for the

supporting a program including:

IFSEC International is Europe’s

• Australia New Zealand Policing

• Network with the global security

security industry in Australia,

centralised gateway to the critical

industry whilst sophisticated

bringing together the entire

Advisory Agency (ANZPAA)

security conversation. Amidst

partnerships and inspiring

supply chain of manufacturers,

PC20 Police Commissioners

mutating threats, the integrated

collaborations kickstart under

Conference

path to achieving global safety

the same roof.

• National Security Science and Technology Centre (Defence Science and Technology) • Corrective Services Emerging Technologies Project Group • Custodial Corrections Working Group • Electronic Monitoring

starts with IFSEC.

Visit www.ifsec.events/

• Access inspiring high-level

international/ for more

panel debates from government

information. n

and industry influencers, conversation between installer,

Security Exhibition & Conference 2020

integrator, end-user and vendor.

22–24 July 2020

and join the collaborative

• Discover the high-quality

Melbourne Convention and

solutions you need whilst

Exhibition Centre, Melbourne

raising your anxieties with the

In 2020, the Security Exhibition

Unmanned Systems

experts behind every innovation

& Conference is returning

CivSec 2020 is a premium

you hope to procure.

to Melbourne.

Conference • Australian Association for

international event with exceptional

• Draw impartial verdicts for

The Security Exhibition &

distributors, security professionals and end-users to connect and create unparalleled business opportunities. The entire team is looking forward to once again reuniting more than 4,500 security professionals with over 150 leading suppliers. The 2020 show is set to see some interesting new innovations as well as a host of new attractions. Make sure you put the dates in your diary. We look forward to

opportunities to reach key driver

security solutions against

Conference is the industry’s

seeing you again in Melbourne in

organisations in this evolving, tech-

rigorous, real-life testing zones,

annual opportunity to reunite for

2020 for the Security Exhibition &

savvy regional marketplace.

including attack scenarios

three days of quality networking

ASIAL Conference!

and surveillance.

and unrivalled education

Visit www.civsec.com.au for more information. n

securitysolutionsmagazine.com

• Research the inspiring ways

alongside a showcase of the

Visit securityexpo.com.au for more information. n

SECURITY SOLUTIONS // 25


FEAUSRE

26 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


THE EVOLUTION OF

THE PROFESSIONAL

Security Industry BY DAN LEVINSON AND KELLY SUNDBERG

Over the past decade, the private

and other professionals, highly

rather, they must be dynamic

Furthermore, when discussing the

security industry has noticeably

advanced threat-centric analysis

professionals who continually

proposed tiered standardisation

become more professional, skilled,

for buildings, sites and campuses,

seek to advance both personally

of security and protective services

responsive and integrated. As

along with advancement in

and professionally.

roles with members of the general

the criminal and security threats

the areas of Crime Prevention

facing the public and private

Through Environmental Design

sectors become increasingly

(CPTED), emergency preparedness

pronounced and complex, and

and response capabilities, and

as the resources of traditional

public, they often are surprised to learn that such a system does

civil liability mitigation. Likewise,

The Need to Publicly Promote Today’s Private Security Industry

law enforcement and police

security consultants and advisors,

Similar professionalisation

tasked with protecting life and

services become increasingly

along with inhouse security

is required at the security

property, and whose frontline

overstretched, the security

directors and managers, have

guard level as well. While

practitioners exercise various

industry has had to quickly

advanced and professionalised

understanding that many of

levels of use of force and at times

position itself as a highly effective

through the completion of

them receive minimal training

carry firearms, it is legitimate

and responsive alternative.

industry accreditation and

and are relatively low paid, there

to ask how this sector came to

Notwithstanding that many

certification programs – many

nevertheless is an expectation that

be governed by a patchwork

jurisdictions around the world

also having completed specialised

security officers perform at a level

of regulations largely based on

have significantly increased

college and university degrees

of professionalism not yet present

anecdotal evidence that differs

the licencing requirements for

in the fields of criminology

within most of the global industry

greatly from one jurisdiction

security services at both the

and security studies. Today’s

– Australia, Germany, Israel,

to the next – at times with the

individual and firm levels, the

private security professionals

the United Kingdom and the

requirements in one jurisdiction

security industry itself has taken

increasingly are expected to

United States are serving as a few

opposing those of another.

on a major role in coming together

supplement their personal

exceptions where private security

through various national and

knowledge and experience

has become highly advanced

it has been the private security

international bodies to raise the

through continuing education

and professionalised.

industry itself that has driven an

profile, quality and capacity of

while also possessing a passion

security professionals.

for learning about the most recent

industry rapidly replacing or

accountability, not the regulator.

updates on case studies, state-of-

supplementing many of the

While there remains much room

revolving around video

the-art equipment, and the most

traditional services delivered by

for improvement, many of the

surveillance cameras and

efficient policies and procedures.

law enforcement and the police,

threats facing the public today

minimally trained security

Simply put, today’s security

the security industry as a whole

are being directly mitigated and

guards have gradually made

professionals cannot rely solely

is quickly realising the need to

responded to by private security

way for tiers of security guards

on their past work experience;

tier and standardise services.

professionals, with traditional law

Old conventions primarily

securitysolutionsmagazine.com

With the private security

not already exist – many in fact insisting that it does. To this point, for an industry that is primarily

Ironically, in most jurisdictions

increase in professionalism and

SECURITY SOLUTIONS // 27


FEAUSRE

enforcement and police services

likely target for a robbery than

religious or institutional, the GBV

design considerations, case-

attending incidents upon notice

a school, but a school may be a

offender is often not deterred

specific policies on procedures

from private security services.

more likely target for an active

by access control measures,

and maintenance, appropriate

Considering the changing nature

shooter then the jewellery

video cameras or even an armed

security equipment and suitably

of public safety and security, it is

store. Recognising this results

law enforcement or security

hired and trained security

advisable that the organisations

in adopting a threat-centric

response. Therefore, for example,

personnel. This methodology is

and associations representing

approach that analyses relevant

when planning security for a

supported not only by research

the industry more actively and

threats on a case-by-case basis and

place of worship, where the

and case studies of security

broadly promote the important

informs which countermeasures

relevant threat of GBV may be

incidents, but also by recent

and quality work their members

will be most effective in every

higher than theft, emergency

jurisprudence. Over the past

are doing to protect the day-

instance. In other words, rather

drills with local police and

few years, duty of care concerns

to-day interests of the public,

than assessing a property as

rapid forms of communications

raised during civil cases against

driving the continued and positive

being under low, medium or high

such as emergency buttons are

property owners and managers

interaction between the industry

risk, a prudent risk analyst and/

significantly more important than

under occupiers’ liability have

and the general public, and the

or security consultant should

a recording camera system.

demonstrated that the courts are

ongoing improvement in industry

first determine which risks are

standards and practices.

pertinent and then assign them

increasingly holding occupiers

Not All Threats are Created Equal

likelihood. One example that highlights significant differences

Different Threats Require Different Countermeasures and the Courts Agree!

Public safety and security

in appropriate countermeasures

An efficient security system must

In other words, when passing

planning must be conducted

is the threat of grievance-based

be planned using an evidence-

down judgements, judges are now

with a view towards every

lethal violence (GBV) – attacks

based approach that is specific

reviewing details such as numbers

stakeholder’s relevant

committed by individuals or

to the building or site being

of security personnel and their

threats. Different properties,

groups of individuals against

protected, meets the unique

response time, and opining

organisations, corporations and

other individuals or groups

needs of the organisation and

on whether the procedures,

individuals are confronted by

subsequent to a grievance,

its stakeholders, and is based on

equipment and training in place

different threats that are specific

whether real or perceived.

trusted research and scholarship.

were reasonable and adequate

to their unique circumstances.

Notwithstanding the motive,

Moreover, it should encompass a

in the property’s operational and

A jewellery store is a more

whether political, ideological,

threat-centric analysis, relevant

contextual circumstances.

with corresponding levels of

accountable for negligent security practices that lead to death or injury resulting from reasonably foreseeable security incidents.

Case in Point: ENMAX In a recent exploratory study of ENMAX – the power generation and utility company that services the greater Calgary, Alberta, Canada region – the benefits and challenges associated with using an evidence-based methodology for an enterprisewide security strategy were examined. Recognising the changing nature of risk to Calgary’s power generation and utility sector, ENMAX hired an expert to assume primary responsibility for the company’s security – in large part tasked with completely transforming the way ENMAX conducts its access control, physical security and other protective services. A key deliverable that emerged under ENMAX’s new approach has been the adoption of threat-

28 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


centric analysis that identifies the

has started to explore the value

through legislation, regulation,

Criminologist, Mount Royal

relevant threats to the company

of adopting a systematic and

industry best practices, peer-

University, Adjunct Professor in

(from irate customers, to copper

evidence-based CPTED) standard

reviewed scholarship or case

Adelaide Law School – University

theft to active assailants) in order

– the SAFE Design Standard®.

law and jurisprudence, security

of Adelaide) Dr. Kelly Sundberg

to properly plan the most apt

By having an independent non-

is becoming increasingly

is a tenured Associate Professor

countermeasures. Consulting

profit organisation (the SAFE

professionalised and evidence

in the Department of Economics,

with ENMAX managers and other

Design Council) reviewing the

based. Stakeholders, clients,

Justice, and Policy Studies at Mount

stakeholders within and outside

physical security of its buildings

consultants, advisors, directors

Royal University (Canada), and

the security industry, ENMAX

and sites (ultimately certifying

and managers generally agree

the President of the SAFE Design

established its new comprehensive

these places as meeting the SAFE

and understand that applying

Council. His research primarily

strategy, which noticeably changed

Design methodology), ENMAX

threat-centric analysis, security-

focuses on crime reduction through

the static posture of the company’s

stands to have great protection

focused building and site design

design, as well as national and

historic security strategy. One

against possible occupiers’

concepts, relevant procedures and

border security.

noted challenge faced by ENMAX

liability. In all regards, the ENMAX

policies, together with appropriate

was achieving consistent security

study supports the value of

hiring and training of security

Director, SAFE Design Council.

guard performance from their

having focused, overarching and

personnel are not only imperative

Dan is a security advisor

third-party provider. To address

comprehensive security policy,

to demonstrating duty of care,

specializing in assessment,

this challenge, ENMAX included

processes and strategy.

but are essential for generating a

analysis and mitigation of security

secure and safe environment for

incidents. He combines 20 years

a stipulation in its contract with

Dan Levinson, Executive

the security provider that guards

Conclusion

residents, employees, customers

of experience as a practitioner in

would receive in-house training

Standardisation, codification

and visitors. As the saying goes:

government, aviation, corporate,

developed and delivered by

and consistency clearly are the

fail to plan, plan to fail. n

and community security, with his

ENMAX and that the company

next logical steps toward the

would have a dedicated cohort of

professionalisation of the private

guards for its sites. Lastly, ENMAX

security industry. Whether

securitysolutionsmagazine.com

research of case studies worldwide Kelly Sundberg (Associate Professor & Environmental

of both tactics employed and the civil litigation that followed.

SECURITY SOLUTIONS // 29


FEATURE

HUMAN CYBERSECURITY BY AMI TOBEN

30 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


I recently had the privilege of

it is. So, what do we do about it?

being invited to the third annual

Well, not much, as it turns out.

Physical and Cyber Threat

Information security experts

Convergence Forum in Phoenix,

seem completely obsessed with

Arizona. I previously wrote what

defining the problem – over and

has become a very well-read

over and over again. Yes, we

article about this important

understand the human factor

initiative. Here comes the

is the biggest vulnerability. It is

next one.

a fact. Got it. Thank you. Why

It was initially surprising

not stop just complaining about

to discover that many in the

it and start developing effective

information/cybersecurity sector

strategies and tactics to prevent

envy us in the physical security

and combat it?

side because our industry is

The only solutions I keep

a) generally effective at what

bumping into are either training

we try to do, and b) quite well

or some flavour-of-the-month,

established, with many years of

flashy silver-bullet product that is

experience. This was surprising to

supposed to be the end-all-be-all

me because the information/cyber

solution. Training usually takes

side of things always seemed so

the form of how to better educate

much more organised and well-

the workforce on cyberattacks

funded compared to us.

and how to get people to stop

Now, since I still fall into the

downloading or clicking on stuff.

physical security side of things

And, in the flashy, silver-bullet

and, as long as this divide still

solution department, artificial

exists (there are some good people

intelligence (AI), in whatever form

working on breaking it down), I

the term is interpreted, seems to

thought I would try to offer my

reign supreme.

info/cybersecurity friends a few

Well, training and nifty new

insights from my experience in

systems are fine. We employ

the physical side.

a good amount of them on the physical side too. And yes, to be

Defining the Problem

fair, training has been shown to

People outside the information

be generally effective in lowering

security sector are usually

click rates and AI can indeed

surprised to learn that the

provide many solutions. But

human factor accounts for

phishing and social engineering

the overwhelming majority of

attacks are still so overwhelmingly

cyberattacks. It was certainly

effective; combating information

surprising for me at first. Systems

security attacks by training and

and programs might be complex

trendy new systems alone is

and advanced, but humans are

about as effective as two farts in

still relatively easy to deceive.

a hurricane.

Duping someone into clicking program through various phishing

Do Something – Different!

and social engineering tricks

Now, since the main threat

is still a simple and effective

comes from people, and the main

way to execute any number

vulnerability that is exploited is

of cyberattacks.

people, maybe us physical security

on a link or downloading a

Okay, so the human factor

After all, we have been in the

company or system. Got it! It was

people business forever.

surprising to learn this at first, but once you find out about it, there

securitysolutionsmagazine.com

guys can give you a bit of advice.

is the main vulnerability in any

Physical security efforts (even if assisted by high-tech systems)

SECURITY SOLUTIONS // 31


FEATURE

MAYBE IT IS TIME TO THINK OUTSIDE THE CYBER BOX. IS IT REALLY THAT CRAZY TO CONSIDER THAT TIME-TESTED PHYSICAL SECURITY STRATEGIES MIGHT ALSO WORK FOR INFORMATION SECURITY? AFTER ALL, OUR GOALS ARE QUITE SIMILAR – WE PROTECT OUR ASSETS FROM EXTERNAL AND INTERNAL THREATS. are usually directed at people

security concerns continue

threat mitigation, hostile attacks,

and largely executed by people.

to follow suit. And this is

security awareness, preventive

training and awareness are

Most of the highest risks we

usually when companies start

and reactive measures,

necessary but not sufficient

try to mitigate have to do with

having to employ protective/

access control, Red-Teaming,

measures for achieving this.

people and most screening and

guard services on top of their

penetration testing and more.

They will work to some extent

assessment efforts are attempts

existing measures.

Of course, it is not going

Security systems, protocols,

during stages 1 and 2 but,

to distinguish between people

So, that how it works on the

to look the same and the

if you have a large enough

who pose a security risk and

physical side. The limb I am

implementation of these

organisation (or just one with

people who do not.

going out on is the idea that

strategies will be different.

large enough security concerns

information security might be

You are not going to see

and vulnerabilities), you are

to go out on a limb and try to

able to employ this successful

any uniformed information

going to need people in the form

suggest a time-tested physical

strategy too. It seems to me that

security officers patrolling

of professional screeners and

security strategy. Are physical

information security is stuck

your workspace. But it seems

gatekeepers to maintain and

security strategies guaranteed to

somewhere in stage 1 or 2,

to me that a layered approach

enforce a security program. Not

work for information security? I

when the need to enter stage 3 is

with circles of security, better

periodically, not just with remote

honestly do not know. But hear

long overdue.

perimeters, more stringent

management, not just with spot

access control, more external

checks, not just in educational

in the world are effective

and internal monitoring and a

sessions, but continuously, in the

things, most companies start out

information security protective

general assertion of control over

field, in real time.

like this:

services? And to tell you the

the assets and their environment

It works for physical security.

1. You have a small workforce

truth, I do not exactly know. All

is the way to go. And since people

Let us find a way to implement it

in a small workspace with

I am saying is that there seems

(the bad guys) keep exploiting

for information security too. n

relatively small physical

to be a need to move past the

human vulnerabilities in the

security concerns. As long

stage of diagnosing the problem

system, maybe we should have

as the property containing

over and over again; past the

other people (the good guys)

director, consultant, trainer,

the workspace is generally

stage of complaining about the

prevent them from doing so.

operator and business developer,

controlled and employees are

problem over and over again;

given some form of ID that

past the stage of just training the

have well-established

years of military and private

proves they belong there and

workforce over and over again;

information security

sector security experience,

that can grant them access

and past the stage of looking for

departments, some even

and a successful record of

to the workspace (key card,

the next mythical silver-bullet

equipped with security

providing full-spectrum,

fob and so on), you are pretty

solution over and over again.

operations centres (SOCs).

high-end services to Fortune

Adding more of a human factor

500 corporations, foreign

outside the cyber box. Is it

to it will probably necessitate

governments, foundations,

security concerns tend to

really that crazy to consider that

bigger budgets (as it does on the

non-profit organisations and

follow suit. That is when

time-tested physical security

physical security side), but what

wealthy individuals. Ami is

companies start upgrading

strategies might also work for

other choice do you have? What

currently director of consulting,

their security systems, revise

information security? After

is the point in just repeating

training and special operations

their security policies and

all, our goals are quite similar

a failed strategy, knowing full

at HighCom Security Services,

procedures and look into

– we protect our assets from

well that the chances of your

a US-based high-end security

security training.

external and internal threats.

assets being targeted through

specialising in protective services,

We even define things in much

your known vulnerabilities are

security systems, consulting

the same ways, with risk and

something like 100 percent?

and training.

So, here is where I am going

me out first. On the physical side of

much good to go. 2. As companies become larger,

3. As companies become larger still, vulnerabilities and

32 // SECURITY SOLUTIONS

The big question is what

Maybe it is time to think

Many companies already

An experienced security

Ami Toben has over 14

securitysolutionsmagazine.com



OPERATIONS

DUTY EQUIPMENT: PROPER SELECTION, CARRIAGE AND MAINTENANCE BY RICHARD KAY

The equipment carriage system plays an important role in day-to-day duty operations. For most gear, officers will carry it far more than they will use it. However, understanding the basics of gear selection and setup can save a lot of time, frustration and money in the long run, as well as making officers safer in day-to-day operations. Many officers are never trained how to properly setup duty equipment. Often, they simply copy their instructor, or position gear where the instructor tells them to, regardless of whether it actually suits them or not. Utilising duty equipment properly and professionally involves three key stages – selection, carriage and maintenance. All three should be addressed sequentially and in conjunction with training in the proper use of the items.

Selection and Carriage Key equipment for public safety personnel are notepad and pen, first aid kit, flashlight and communications. Force response options (baton, handcuffs, spray, firearm and so on) are specific to the operational role, and require equal attention for proper carriage, use and maintenance. When choosing equipment, there are a few basic considerations: 1. Own your gear It is generally better to own duty gear rather than use company issue, where possible, for safety and practicality. When you purchase gear, you choose gear suitable for your needs, and then you control the ongoing maintenance of the gear as you are the only one who uses it. If using company gear, ensure it is checked thoroughly before using it.

34 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


Consider quality gear over

Officers should also be

type of policy requirement

of systems to suit operational

cheaper alternatives. After all,

however, rather than just

requirements, as well as the

familiar with manufacturer

someone’s safety and wellbeing

personal opinion. If you have

operational environment you

information, including gear

may depend on the equipment,

an issue with the policy in this

will be working in – standing,

limitations or restrictions, prior

and it could be yours. Quality

regards, discuss it with your

seated, vehicle, confined space,

to purchasing or using any item.

gear may cost more initially,

team. Make sure you research

land based or maritime, inside

Incorrect use may render the

but with proper care and

your ideas before you suggest

or outside, static or mobile

officer liable for any injury or

maintenance, it will generally

plausible alternatives.

and so on. Do not be afraid to

damage caused during use, or

• Accessibility: Being able

experiment with new options

may void the warranty in the

alternatives and be more

to get to gear and present

and positions, but always test

event the gear is damaged.

reliable during use if needed.

it from your duty rig to

new options off duty first before

Keep receipts for financial year

deploy it operationally is a

employing on duty.

tax returns.

critical factor as, once again,

last far longer than cheaper

Train With Gear Use duty gear in operational

someone’s life may depend on

Check Before Use

configuration and wear your

2. Only carry what is needed

this skill. Your highest force

You should check your gear

operational uniform in training,

for duty

option (generally the firearm)

before the start of each shift to

as this not only allows you to ‘test’

It can be common, especially

should get the best position

ensure it is properly functioning.

the practicality of your uniform

for new personnel, to load up

on your equipment setup.

Just because it was working

and gear, but also the placement,

with every piece of gear they

Often, officers make comfort

yesterday does not mean it will

accessibility and functionality of

can think of. However, it all

a priority, based on the fact

be in the same condition today.

gear as you wear and use it on

amounts to weight that has to be

that they never use their force

Batteries go flat, fittings work

the job.

carried for the duration of the

response options. However,

loose and items can be misplaced

shift, and extra weight means

if a situation presents that

or even left behind if not checked

what works and what does not,

greater fatigue, which in turn

requires the gear to be used,

routinely. With practice, an

and that includes gear quality

means reduced alertness. Many

accessing it quickly and

equipment check can be done

and placement, as well as the

companies provide reduced

bringing it to bear efficiently

efficiently in minimum time, but

practicality and functionality of

weight or ‘air-weight’ technology

may be the difference between

done properly, can save much

clothing. It is far better to expose

to reduce the weight impact on

safety and harm.

time and hassle, and possibly

limitations of gear and clothing in

reduce incident trauma.

the relative safety of training than

operational personnel. Equipment needs may change

• Comfort: You carry your rig every day, so consider weight

It is a good idea to possess a

Training is the time to assess

during an actual confrontation

depending on the operational

distribution around your

quality gear bag, where all duty

when failure of equipment could

role or circumstance, but you

body. The highest force option

items can be kept secure ready

hinder safety.

should assess the equipment

gets priority, and everything

for transport to work, and for

requirements prior to going

else gets distributed according

secure storage when at home off

on duty and only carry what

to personal choice. There are

duty. Store items in the bag the

Inspection and Maintenance

is necessary. Not only does

no hard and fast rules for

same way every time, so you have

It is essential that equipment

this reduce weight, but it also

this. The only exception is at

a mental check that everything is

functions correctly at all times.

reduces the incidence of lost or

the rear of your belt. Do not

present and in order. Have back-

The best way to ensure reliable

damaged equipment.

place any gear in the small of

up items in the bag also, such as

performance is through regular

the back, as this risks damage

spare batteries, pens, handcuff

inspection and maintenance.

3. Construct a duty rig properly

to the lumbar spine region in

keys and so on.

Inspection should be conducted

Proper operational use of

the event of a fall or sudden

equipment starts with carriage.

pressure to this region, not to

Use Gear Properly

start of each shift. Cleaning is

Gear should always be placed on

mention being uncomfortable

This one may seem like a

easily mastered and if done

the rig ready to deploy. The less

when sitting. To prevent this

no-brainer, but often officers

correctly and at the appropriate

an officer has to focus on his gear,

from happening, it can be

use gear incorrectly or

time, does not take too long.

the more he can focus on the

a good idea to place a soft

inappropriately, which may cause

Servicing should be left to

subject and situation. There are

portable first aid pouch in this

safety issues at the time of use,

qualified armourers, for

three considerations with regards

space on your belt. This not

or liability issues after the fact.

extensive stripping or severe

to setting up a duty rig:

only provides a cushion for

Gear should only be used within

cleaning of equipment.

• Policy: If your agency dictates

this region, but prevents other

industry and agency guidelines

1. Batons

items shifting into this space.

and, where required, officers

Inspection: batons should be

the position of gear on your

by the user prior to use at the

person, then you should follow

Consider alternative carriage

should engage in proper training

free from rust or corrosion and

those guidelines. There should

systems, such as concealed or

and re-training to ensure safe and

have no sharp edges on the cap

be plausible logic behind this

tactical, a vest, or combination

competent use.

or tip. Check for smooth opening/

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 35


OPERATIONS

closing and proper functioning

from dirt and debris. They should

for cracks, especially the flag.

test firing function and check

of the mechanism, and check

be free from rust or corrosion

Should the handcuffs become

the function of safety or de-cock

the condition of the scabbard.

and have no sharp edges. Check

contaminated with blood or other

mechanisms, if present. Test the

Difficulty opening and closing is

for smooth opening and closing

bodily fluids, use appropriate

firearm extraction system, and

most frequently due to operator

and proper functioning of lock

bleach solution or autoclave

inspect ammunition and carriers

error (poor technique). Keeping

mechanisms, and check the key

sterilization techniques (avoid

for defects and to ensure proper

the baton well maintained

for cracks, especially the ‘flag’.

temperatures >148.9°C); after

function. Load the firearm and

can help eliminate most

Common faults include difficulty

sterilization, apply a small amount

secure in holster; load carriers

mechanical failures.

in unlocking handcuffs, the single

of silicone to the pivot pin.

and secure in pouches.

Maintenance: Wipe clean and

bar will not rotate smoothly

3. Firearms

Maintenance: wipe the external

brush off any dirt; do not oil, as

through the ratchet and the

Ensure firearm safety procedures

aspect of the firearm thoroughly

this attracts dirt and may impede

double bars are forced together,

are followed at all times and

with a saturated cloth and brush

operation. Check the shafts for

which prevents the single bar

maintain trigger and muzzle

the barrel, breech and chambers

hairline fractures or excessive

from rotating smoothly.

discipline at all times.

with solvent to remove fouling.

wear between the sections. If

Maintenance: wipe clean and

Inspection: inspect externally

For stubborn fouling, clean with

necessary, the tip can be removed

brush off any dirt in the ratchet

and internally for defects. Ensure

dental picks and toothbrush.

to facilitate replacement of

mechanism; compressed air

the breech and barrel are free

Lightly lubricate the working

damaged parts. Replace worn

can be used to clean inside the

of obstructions. Check that

mechanism, but do not over

retaining clips and grips before

lock mechanism. If required,

mechanical parts lock properly

lubricate as oil attracts dust, which

they become a functional issue.

lubricate with a dry lubricant;

into place and that the firearm

could impede functioning. Inspect

2. Handcuffs

do not use oil as this will attract

mechanism operates smoothly

firearm components for abnormal

Inspection: carry handcuffs in a

dirt and possibly impede proper

and without issues. Dry fire the

wear, reassemble and carry out

protective case to keep them free

functioning. Check the key

empty firearm several times to

test of all functions.

36 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


"Use duty gear in operational configuration and wear your operational uniform in training, as this not only allows you to ‘test’ the practicality of your uniform and gear, but also the placement, accessibility and functionality of gear as you wear and use it on the job." Body Armour

defeat a standard test round

and facemasks, but these

along with operational need and

Body armour is defined as a

may not defeat other loadings

should be selected only in

plausibility. Officers should be

garment or item that is designed,

in the same calibre. In general,

conjunction with regulatory and

well trained and familiar with

intended or adapted for the

armour that defeats a given

operational requirements.

the functioning and lawful use

purpose of protecting the body

lead projectile may not resist

from the effects of a weapon,

Modern body armour

of any equipment they take into

complete penetration by other

also caters for edged-weapon

the operational environment, as

including a firearm. Lawful

projectiles of the same calibre

protection, with some good

any gear has the potential to be

guidelines for possession and

of different construction

options available that provide

misused (liability) or stripped

use are outlined in legislation,

or configuration.

protection from ballistic and

from the officer and turned

edged weapons in the same

against them (trauma).

and officers are responsible

Ballistic armour suitable for

to ensure they have proper

full-time wear throughout an

armour. Research options

regulatory and agency approval

entire duty shift is available in

prior to use and make a

professionally and train as you

prior to use.

various classifications, which

selection based on operational

work. n

provide increasing levels of

requirements, and regulatory

into categories rated by ballistic

protection from ballistic threats.

and agency guidelines.

performance. The ballistic threat

An important aspect of body

posed by a projectile depends on

armour is that it is comfortable

officers should carefully

instructor-trainer, Director

its composition, shape, calibre,

to wear. A vest in a vehicle

consider the operational

and Senior Trainer of Modern

mass, angle of incidence and

does no good for spontaneous

requirements and regulatory

Combatives, a provider of

impact velocity. Because of the

situations that evolve rapidly.

and agency guidelines for

operational safety training for

variety of ammunition available

There are numerous options of

carriage and use of duty gear.

the public safety sector. For

and the existence of self-loaded

ballistic protection available,

Quality should guide decisions

more information, visit www.

ammunition, armours that will

such as glasses, helmets

for the purchase of private gear,

moderncombatives.com.au

Body armour is classified

securitysolutionsmagazine.com

Prior to selecting equipment,

Select carefully, carry

Richard Kay is an internationally certified tactical

SECURITY SOLUTIONS // 37


FEATURE

38 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


WHO ARE THE REAL TERRORISTS IN NORTH EAST SYRIA? BY ANNE SPECKHARD

Earlier this month, President

fleeing Turkish violence. In

circulate of Syrian civilians lying

and other former jihadists still

Trump abruptly changed course

addition to these massive

bloodied and dead on the ground

happy to kill in the name of Allah,

and green-lighted a Turkish

displacements, Turkey insists that

while their family members wail

who Turkey used to clear Afrin

incursion into north east Syria

it will forcibly repatriate one to

unconsolably. Hevrin Khalaf,

in 2018. Indeed, they have shown

with disastrous results. The

two million of the three million

a female and the Secretary-

a brutality akin to their mother

subsequent invasion unleashed

Syrian refugees it is currently

General of the pro-Kurdish Future

groups, some even shouting

a hellish nightmare of carnage

housing back into the SDF-held

Syria Party, is reported to have

ISIS slogans as they kill, such as

and chaos in what was a

areas it is now overtaking. That 83

been dragged from her car and

“Baqiya wa tatamadad!” meaning

dangerous, but relatively peaceful,

percent of these Arabs never lived

assassinated by Turkish-hired

we (ISIS) will remain forever,

area governed by the Syrian

in the areas they are to be forcibly

thugs who said, while filming her

and expand.

Democratic Forces (SDF) who had

resettled in begs the question of

corpse, “This is the corpse of pigs”.

just defeated ISIS territorially.

whose homes and lands will they

Likewise, video footage of bearded

ISIS cadres to fight the Kurds is

be overtaking?

mercenary soldiers backed by

no surprise, given they worked

the Turks, shooting their Kurdish

closely with ISIS to try to quell

In recent days, over 30 civilians – including Kurds, Christians

Turkey claims to be fighting

That Turkey would use former

and minorities, and very young

a terrorist group and wanting

captives while calling them “kufar

the Kurds early on in the Syrian

children – have been killed in

to clean their border area of

scum” (unbelievers) are said by US

conflicts and continue to see their

indiscriminate Turkish bombings

terrorists, but the pictures coming

forces to appear authentic. If so,

interests in destroying Kurdish

and mortar fire. Likewise, the

out of north east Syria instead

these actions are war crimes.

power to lie with militant jihadist

United Nations (UN) reports

make Turkey look like the terrorist

that over 130,000 Syrians have suddenly become displaced,

securitysolutionsmagazine.com

These bearded assassins,

and Islamist groups. An ISIS emir

aggressor. Countless photos and

backed by Turkey, are likely the

that the International Center for

videos, many of them validated,

same unemployed ISIS, al Nusra

the Study of Violent Extremism

SECURITY SOLUTIONS // 39


FEATURE

(ICSVE) interviewed in 2019 went

could also insist that the Kurds not

New York, to Brussels (where two

moved to incorporating minorities

into great detail about his work

turn to others, like the Russians,

Americans were killed), to Paris,

into their ranks and transitioning

on behalf of ISIS, about how

for support, effectively boxing

Nice, Stockholm, London and

to the SDF who have had a good

he negotiated with the Turkish

them in for slaughter.

Istanbul to name but a few.

record of building a grassroots

National Intelligence Organization

When ISIS foolishly attacked

In serving as our boots on the

democracy amidst the ashes of

(MIT) and military regarding

Kobani in 2014, the Kurdish

ground forces for the territorial

war. That their majority Kurdish

border entry for the 40,000+

People’s Protection Units (YPG)

defeat of ISIS, and continuing

leadership may have long-term

foreign fighters that streamed

and Women’s Protection Units

to battle the remnants of ISIS,

aspirations to one day become a

across Turkey into ISIS-controlled

(YPJ) rose up and fought valiantly

the Kurds saved, and continue

fully independent Kurdish state

areas of Syria, agreements for

and, since 2015, they fought with

to save, countless Americans

should be no surprise, but that

sending wounded ISIS fighters

US military backing, to defeat ISIS.

and Westerners from being

they were acquiescing to all US

back into Turkey for medical

They have been our ‘boots on the

slaughtered by a heinous force

demands upon them to remain

treatment, supplying water

ground’, sustaining most of the

willing to attack, anywhere, at

within Syria and negotiate some

for the Tabqa dam to provide

casualties and doing all the heavy

any time.

kind of governance agreement

electrical power for ISIS and so on.

lifting in defeating a global foe.

According to this emir, even then,

While US forces lost less than 20

Turkey, calls these Kurds

The trouble in that regard is

Turkey was insisting on a buffer

troops after they aligned with the

terrorists. That picking up arms

Assad wants to appoint top-down

security zone. Now it appears they

Kurds to fight ISIS in Syria, our

against ISIS gave them the sudden

leaders in the area and thereby

will go to any lengths to get it.

hardy allies lost 11,000 male and

opportunity to rule a considerable

destroy the grassroots nature of

female brave fighters who faced

swathe of Syrian land that they

the Kurdish democracy building.

down this global foe.

had liberated from ISIS is no one’s

From a position of strength and

fault, except those who supported

good governance, with US backing

Meanwhile, General Mazloum Kobani Abdi told US Ambassador William Roebuck, the US Deputy

Indeed, while ISIS was an

Yet their current aggressor,

with Assad also needs to be noted.

Special Envoy to the Global

active force on the ground

ISIS in the first place – Turkish

behind them, the SDF had a

Coalition to Defeat ISIS, “You have

in Syria, its external emni

government officials among

chance of becoming a real island

given up on us. You are leaving us

(intelligence arm) threatened

them. No doubt, the Kurds, once

of democracy, perhaps even one

to be slaughtered.” He also asked

the globe, mounting and inciting

in power, made some mistakes,

day spreading such, within the

in confused despair how the US

attacks in many major cities from

but it is notable how quickly they

Syrian state.

40 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


were asking to be bussed out of

because they are no longer serving

(n=196) with ISIS defectors,

Syria into Turkey – presumably

our interests and must take place

returnees and prisoners, studying

believing they would be welcomed

in a planful and secure manner

their trajectories into and out of

into a country that had helped

without allowing for an all-out

terrorism, their experiences inside

them in the past.

slaughter of civilians or of the

ISIS, as well as developing counter

Five hundred of the worse

allied forces who, by fighting ISIS,

narratives from these interviews.

ISIS cadres are said to have been

saved Americans countless lives.

She has also been training key

transferred by US forces from

Given that the Kurds sacrificed

stakeholders in law enforcement,

Syria into Iraq, and possibly

greatly to defeat ISIS territorially

intelligence, educators, and other

more will befall the same fate.

on the ground and, when in

countering violent extremism

For those of us who still believe

power, began at once to build

professionals on the use of

in human rights and rule of

one of the only democracies in

counter-narrative messaging

law, even when applied to ISIS

the Middle East that is respecting

materials produced by ICSVE

cadres, it is unfortunate that in

minority rights and following

both locally and internationally,

Iraq these prisoners – many of

Western rule of law while being

as well as studying the use of

them Westerners – can expect

surrounded by dictatorial and

children as violent actors by

forced confessions, hurried court

corrupt regimes, it seems we

groups such as ISIS and consulting

proceedings and almost certainly

should have continued to give

on how to rehabilitate them. In

a sentence of life imprisonment, or

them our full support. Instead,

2007, she was responsible for

death, based on very little, if any,

Trump has unleashed Turkish

designing the psychological and

evidence presented against them.

forces on a group that Turkey

Islamic challenge aspects of the

Whereas, in our ISIS interviews

universally treats as terrorists

Detainee Rehabilitation Program

conducted in SDF territory with

and is willing to violently displace

in Iraq to be applied to 20,000+

defeated territorially, ISIS is still

100 of the ISIS foreign terrorist

and kill. This sudden betrayal of

detainees and 800 juveniles. She is

far from total defeat. In recent

fighters, the prisoners stated that

our loyal allies is a matter that

a sought-after counterterrorism

months, ISIS has been attacking

they were not being subjected to

needs to be quickly resolved in

expert and has consulted to

on a weekly basis in both Syria

torture and were fairly treated

Washington, D.C.

NATO, OSCE, foreign governments

and Iraq, and the SDF were busy

by the SDF. Likewise, the SDF

rounding up ISIS sleeper cells

was working patiently, including

reputation as stalwart and reliable

Departments of State, Defense,

while also holding more than

in efforts with ICSVE, to gather

allies are at stake right now, and

Justice, Homeland Security,

70,000 ISIS prisoners and their

testimonies and data to prod

this disastrous decision needs to

Health & Human Services, CIA

family members, thousands of

Western countries into action that

be reversed immediately.

and FBI and CNN, BBC, NPR,

which are from European and

have been reluctant to take their

Western countries who have

ISIS citizens home for prosecution.

In the meantime, with ISIS

refused to repatriate and bring

While the SDF could only do its

Our American ideals and our

and to the U.S. Senate & House,

Fox News, MSNBC, CTV, and in Anne Speckhard, Ph.D.,

Time, The New York Times, The

is Director of the International

Washington Post, London Times

important work with US support,

Center for the Study of Violent

and many other publications. She

this support was not costing us

Extremism (ICSVE) and serves as

regularly speaks and publishes

unleashed by Turkey, up to 800

much. Few troops were deployed

an Adjunct Associate Professor

on the topics of the psychology of

ISIS cadres have escaped when

on the ground and our air support

of Psychiatry at Georgetown

radicalization and terrorism and

their prison was shelled, with

was operating out of Iraq, where

University School of Medicine.

is the author of several books,

hundreds more ISIS women and

it is likely the US forces will stay

She has interviewed over 600

including Talking to Terrorists,

children escaping from their

for some time. That we should not

terrorists, their family members

Bride of ISIS, Undercover Jihadi

bombed and burning camps.

involve ourselves in endless wars

and supporters in various parts

and ISIS Defectors: Inside Stories

Where they will run to amidst the

or that the troops need to come

of the world, including in Western

of the Terrorist Caliphate. Her

chaos is uncertain, but Turkey and

home is something most agree

Europe, the Balkans, Central

publications can be found here:

beyond is certainly a possibility

with, but how and when is also of

Asia, the Former Soviet Union

https://georgetown.academia.edu/

given that, when cornered in

great importance.

and the Middle East. In the past

AnneSpeckhard and on the ICSVE

two years, she and ICSVE staff

website: http://www.icsve.org

have been collecting interviews

Follow @AnneSpeckhard n

them home to justice. Now, amidst the chaos

Hajin and later Baghouz, SDF leaders told ICSVE that ISIS leaders

securitysolutionsmagazine.com

Any US withdrawal of support for the SDF should only occur

SECURITY SOLUTIONS // 41


BUSINESS

42 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


SECURITY, INVESTIGATION, SURVEILLANCE BUSINESSES TO REPORT CONTRACTOR PAYMENTS UNDER THE TAXABLE PAYMENTS REPORTING SYSTEM The Australian Taxation Office’s (ATO) tips to help security, investigation and surveillance businesses report their contractor payments From 1 July 2019, the Taxable

to protect the majority of people

good records makes it easy

keep records of contractor

Payments Reporting System (TPRS)

who do the right thing. The Black

and quick to complete the

payments, and what details

started for businesses providing

Economy Taskforce estimates

TPAR every year.”

you need to report. “You’ll also

security, investigation or

that the black economy is costing

surveillance services. Businesses

the community as much as $50

check if it’s TPAR-ready. Talk

sample TPAR, a worksheet

that provide these services will

billion, which is approximately

to your software provider if

to record payments, case

need to complete a Taxable

three percent of Gross Domestic

you are unsure. If you don’t

studies, fact sheets, videos,

payments annual report (TPAR)

Product (GDP). In 2015–16, the

have TPAR-ready business

and information in other

if they a) have an ABN and b)

TPRS helped to protect $2.7

software, visit ato.gov.au/TPAR

pay contractors to provide these

billion from being lost to the

for a simple worksheet that

services on the business’s behalf.

black economy in the building

can help you to record the

need to complete a TPAR or if

This new contractor reporting

and construction industry alone,

information.”

you have questions, follow our

obligation is not part of any

which shows how effective

other regulatory review of the

the TPRS is in improving tax

range of services, not just

TPAR or talk to your registered

security industry.

compliance in an industry.

security, investigation or

tax professional.”

These businesses need

ATO Assistant Commissioner

2. “If you use business software,

3. “If your business provides a

find helpful resources like a

languages.” 5. “If you’re not sure whether you

three-step guide at ato.gov.au/

surveillance services – known

to report the total payments

Peter Holt has five handy tips

as ‘mixed services’ – you may

– including cash payments –

for security, investigation and

need to report if payments

Key Facts about the TPRS and TPAR

they make to each contractor

surveillance businesses to help

you received for these services

• The Taxable Payments

for security, investigation or

make completing the TPAR quick,

make up 10 percent or more

Reporting System (TPRS)

surveillance services provided

easy and secure.

of your total GST turnover,

now applies to businesses

on their behalf in the 2019–20

1. “Make sure you’re keeping

even if your business isn’t

providing security,

registered for GST.”

investigation and surveillance

financial year by 28 August 2020. The TPRS is a black economy

the right records for each contractor – their name,

4. “Visit ato.gov.au/TPAR – it has

services that a) have an

measure – designed to detect

address, ABN, and the total

comprehensive information

Australian business number

contractors who do not report or

amount you paid them,

to help you work out if

(ABN) and b) make payments

under-report their income, and

including any GST. Keeping

you need to report, how to

to contractors for security,

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 43


BUSINESS

investigation or surveillance

screening, watching or

services they provide on a

guarding any people,

providing security,

business’s behalf.

premises or property, by

investigation and surveillance

any means.

services, the TPRS also

provided in the TPAR to

applies to:

identify contractors who may

o Building and construction

not be doing the right thing

• These contractor payments are reported to the ATO

• Investigation services

each year using the Taxable

include searching inquiries

payments annual report

by any means into one or

(TPAR).

more specific individuals

• Contractor payments

• In addition to businesses

industry (from 1 July 2012) o Businesses providing

regardless of whether or not they are registered for GST. • The ATO uses the data

with their tax; for example, not reporting income, failing

or matters, to determine

cleaning and courier

to lodge tax returns or activity

for providing security,

facts or gather evidence.

services (from 1 July 2018)

statements, not registering for

investigation or surveillance

Investigation services are

services from 1 July 2019 to 30

not routine record or police

June 2020 must be reported in

checks, or telemarketers

the TPAR by 28 August 2020.

conducting surveys.

• Contractors include

• Surveillance services include

o Businesses providing road freight and IT services (from 1 July 2019) • If a business provides a range of services (the ATO

GST, or using false ABNs. • This new contractor reporting obligation is not part of any other regulatory review of the security industry.

subcontractors, consultants

watching or observing an area

refers to these as mixed

What about Contractors?

or independent contractors.

or location, and monitoring

services), including security,

• Contractors need to report all

They can be companies,

security systems.

investigation or surveillance

of their income – including

• Security, investigation and

services, the business may

cash – accurately when it is

surveillance services do

need to lodge a TPAR if the

to report on the TPAR is the

not include police services,

payments they received

same information generally

surveillance of country

for these services make up

declaring all their income, we

available on the invoices you

borders, aerial surveying or

10 percent or more of the

will contact them. n

should receive from your

mapping services, academic

business’s total GST turnover.

contractors. It is the same

or market research, fire alarm

information businesses need

services, key cutting services,

for GST, businesses still need

regarding the Taxable Payments

when claiming deductions.

or the manufacture or retail

to check if they need to lodge

Reporting System (TPRS),

of security, investigative or

a TPAR because all businesses

businesses should visit ato.gov.

surveillance devices.

have a GST turnover

au/TPAR.

individuals or partnerships. • The information you need

• Security services are patrolling, protecting,

44 // SECURITY SOLUTIONS

o Even if they are not registered

time. • If we think someone is not

For information and resources

securitysolutionsmagazine.com


Recognize AND Analyze Is she an employee?

When, where did she enter? Does she appear in videos recorded last week?

How often was she here this month? Is she a banned person?

How old is she?

Premier face recognition technology for real-time video surveillance, recorded video investigation, crowd detection, and anonymous people analytics

www.cognitec.com | info@cognitec.com

ViDi Labs Academy

Login

CCTV - from light to pixels

Sign Up

Learn CCTV and IP Video Surveillance technology from the guru - Vlado Damjanovski

Enrol now

vidilabs.com/academy.html vidilabs-academy.teachable.com


COVER STORY

AUSTRALIA’S CHANGING

SECURITY PRACTICES BY ASHWIN PAL

46 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


This year’s Unisys Security Index reveals that safety fears will not keep Australians from attending public events or experiences; however, our behaviours, actions and choices are changing. Ashwin Pal, Director of Security Services from Unisys, explores how Australians are minding their physical wellbeing and protecting their data in 2019. First undertaken in 2007, the

concerned about a criminal

options on your phone and then

Without both the digital and the

Unisys Security Index is the

attack causing physical harm.

swipe to find your favourite ride

physical, the experience would

longest running snapshot of

Similarly, 43 percent are seriously

share app to see how prices are

not be as fast, easy, rich, enjoyable

security concerns conducted

concerned about someone stealing

looking. Public transport wins the

or memorable.

globally. Based on the survey

their personal data from their

day and you tap on with your pre-

results from more than 1,000

mobile device. The same number

paid transport card.

adults in 13 key countries,

of people are concerned about

this year’s Index shows that

someone stealing their credit card

stadium, you cannot resist buying

the definition of ‘being safe’

data when using public Wi-Fi.

some nachos from a market seller

increasingly refers to the safety of our digital assets, as well as our physical selves. To see the relationship

Once you have made it to the

Imagine your favourite band just

our personal and financial data at risk.

two quick taps of your phone and

Concerned but Confident

the transactions are made.

With one in four Australians very

and a tour t-shirt is a must too –

Not Without my Smartphone

Each digital interaction, however, has the potential to put

With so many concertgoers,

concerned about the risks to their

between our digital and physical

announced its new tour dates.

the mobile network is a little slow,

personal or digital security at

security concerns in action,

You jump onto your smartphone,

so you jump on the free Wi-Fi and

large-scale events, are Australians

this year’s Index explored how

check with your family or

your phone buzzes wildly as a

ready to hang up their festival

confident citizens felt attending

friends to see who wants tickets

flood of WhatsApp messages come

outfits and sporting jerseys?

large-scale events such as sporting

and furiously refresh the ticket

through naming the location for

The short answer is no, but a

matches or music festivals.

suppliers page when they go on

where you and your friends or

deeper look at the results of the

The Index also explored what

sale to get the best seats possible.

family will meet. Now that you

Unisys Security Index shows that

have found everyone and made it

Australians are taking a more

The tickets you paid for online are

to your seats, you take a snap of

considered approach to attending

in your digital wallet and you have

the team excitedly waiting for the

events than in the past.

physical wellbeing has become so

just received an SMS from the

show to start; and naturally you

entwined that respondents were

event organiser with tips about

share it using airdrop.

equally concerned about cyber

the best ways to get to the stadium.

and physical threats at large-scale

Taking on the advice of the SMS,

concerts are one of those moments

attending large-scale events

events. Forty-three percent of

you start to plan your trip to the

in life where our digital identities

remain unchanged. For the other

Australians say they are seriously

venue. You check public transport

and the physical world collide.

nine, attending a large-scale

steps Australians are taking to protect themselves. In Australia, our digital and

securitysolutionsmagazine.com

It is now the day of the concert.

Events, sports matches and

According to the Index, just one in 10 Australians says their behaviours and decisions about

SECURITY SOLUTIONS // 47


COVER STORY

“The prioritisation of protection for our digital assets and data over our physical safety is representative of the current security mindset in Australia, where the top three security concerns all relate to data theft.” When travelling to large-scale events such as a World Cup sports match or music festival, how concerned are you about the following security issues? Security Issue

Very/extremely concerned

Somewhat concerned

Not concerned

Not sure

A criminal might attack and harm event attendees

43%

36%

17%

3%

Credit card data on your mobile device could be stolen when you use public Wi-Fi

43%

29%

23%

5%

Criminals might target you on the streets near the event

43%

31%

21%

4%

Personal data on your mobile device could be stolen when you use public Wi-Fi at the event

40%

34%

22%

3%

Hackers will send event attendees emails with links to trick them into granting access to their mobile devices

37%

31%

28%

4%

event is now a series of rational

adult Australians are seriously

steps to reduce their risk of

website you are using to

decisions to protect themselves

concerned about unauthorised

falling victim to data theft or even

buy tickets shows the secure

physically and digitally.

access to their personal data,

a physical attack.

padlock icon in the browser

Three in ten (30 percent)

bankcard fraud (56 percent) and

Along with taking their own

say they now think twice about

computer hacking or viruses (54

steps and precautions to protect

“https://”. And if ticket prices

attending large-scale events and

percent).

their data and personal safety,

look too good to be true, they

one in five (19 percent) have

Fear for our data outweighs

Australians are largely in support

and the address begins

probably are. 2. Plan ahead and check local

changed their plans based on

our concerns about the threat

of the police having access to and

their concerns for the safety. A

of terrorism (49 percent), fear of

even saving event surveillance

authorities’ alerts. Sign up

quarter of Australians (23 per

a natural disaster (43 percent)

footage to assist in the prevention

for any travel or news alerts

cent) still attend large-scale

or general personal safety (32

of crime. Of those surveyed, 47

provided or recommended by

events, but take proactive steps

percent).

percent had no concerns with

the event organisers to receive

police capturing and saving event

updates on traffic or news of

A Proactive Approach to Security

surveillance video.

any potential disturbances on

protection for our digital assets

Overall, the news is good.

protected at large-scale events

and data over our physical safety

Australians are aware of the

such as concerts or festivals,

event alone, let someone

is representative of the current

risks associated with making

Unisys has ten key tips for

know. Make sure your friends

security mindset in Australia,

online bookings and purchases,

Australians to observe:

or family know where you are

where the top three security

using public Wi-Fi and receiving

1. Only buy event tickets from

going, when you plan to arrive

concerns all relate to data theft.

messages from non-trusted

official channels or websites

and when you are expected

More than half (57 percent) of

sources and are taking sensible

you trust. Make sure the

to return.

to protect their mobile devices and wallets. The prioritisation of

48 // SECURITY SOLUTIONS

To stay safe and keep data

event day. 3. If you are going to a crowded

securitysolutionsmagazine.com


4. Travel light. There is no need

“In Australia, our digital and physical wellbeing has become so entwined that respondents were equally concerned about cyber and physical threats at large-scale events.”

securitysolutionsmagazine.com

use password-protected Wi-Fi.

9. Keep your phone charged

to take everything you own to a

Unprotected Wi-Fi networks

in case of emergencies. If

festival. Leave the valuables at

could give hackers access to

possible, take a battery charger

home and travel light, with just

personal or financial data on

pack with you to ensure your

the essentials – in your pockets

your phone.

phone is always available

if possible. 5. As soon as you get to the event,

7. Do not make electronic transactions with unofficial

when you need it. 10. In an emergency, stay calm

survey your surroundings.

event vendors. Be careful

and move to the edges of

Make sure you know where the

with your contactless cards or

crowds. Try to leave the area

exits are and agree on a meeting

making mobile transactions,

quickly and calmly. If you need

place with your friends in case

particularly outside event

to get away from the incident

you get separated from your

venues. Unscrupulous traders

quickly, hide yourself if need

group. Know where stewards

could be gathering your

be, call 000 when you can and

and information points are so

financial data to use or sell to

then let your family know you

you can speak to someone if you

other criminals.

are safe. n

need to. 6. Update your mobile device

8. Be vigilant for suspicious activity at an event. Do not

and avoid unsecured Wi-Fi

be afraid to report something

networks. Make sure your

you think is unusual, such as

phone is updated with the

unattended baggage or people

latest software, so it is as

behaving in a suspicious or

secure as it can be. And only

threatening way.

SECURITY SOLUTIONS // 49


AVIATION

IS AUSTRALIA’S AVIATION SECURITY REGIME COST AND PERFORMANCE EFFECTIVE? 50 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


BY PAUL RETTER AM

1. It is almost 10 years since

d. an intelligence-led, risk-

more challenging. Australian

undertook a detailed review

aviation businesses are facing

of Australia’s aviation sector

both global and domestic

e. well understood and

and produced a national

headwinds. Key decision

practised security

aviation policy White Paper

makers within the Australian

procedures/processes

entitled Flight Path to the

aviation industry are worried

that are integrated with

Future. The aviation policy

about issues such as Middle

appropriate security

White Paper was released

East oil insecurity, the US–

to the public in December

China trade war and the

2009 by the then Minister for Infrastructure, Transport,

softening Australian economy. 3. We have examined the various

based layered security regime

technology f. an independent securityoutcomes assurance regime g. well trained and motivated

Regional Development and

layers of AVSEC currently

security staff who

Local Government, Anthony

in place across Australia’s

understand the importance

Albanese. At that time, the

security regulated airports and

of the resolution of

Federal Government analysis

airlines. The paper makes a

concluded that the Australian

number of recommendations

aviation security (AVSEC)

where it appears there is

data sharing and frequent

model was cost effective and

room for improvements in

communication between

that it reflected world’s best

effectiveness and efficiency

government agencies,

practice, while remaining

(including through reducing

security providers and

flexible to the future

costs).

challenges confronting the aviation sector. 2. Ten years on, PBAR Associates has examined whether

4. A truly cost-effective AVSEC

suspicious activity h. effective coordination,

industry operators 5. In terms of effectiveness, the

regime will include many of

current AVSEC regime has

the following characteristics:

served Australia reasonably

a. fit-for-purpose legislation/

well to date; however, there

Australia’s AVSEC regime

regulation that is outcomes

is room for improvement.

remains cost effective. This

focused

Fine-tuning of the AVSEC

is particularly relevant at a time when both the economic and security environment confronting the Australian

securitysolutionsmagazine.com

aviation sector is becoming

the Federal Government last

b. strong operational leadership by industry c. a pro-active security culture

regime (including its layers of security) needs to occur on a regular basis if it is to remain fit for purpose. Any

SECURITY SOLUTIONS // 51


AVIATION

proposed amendments to

airports where large passenger

Home Affairs should, in

the AVSEC regime should be

numbers reduce the overall

conjunction with other federal

encourage the development

based on a clear and shared

security costs per passenger.

government agencies and

of a more robust yet cost-

understanding of the emerging

In regional Australia, reduced

the key aviation industry

effective AVSEC regime.

threats facing the aviation

flight and passenger numbers

participants, examine several

Australia needs a security

sector, and the need to identify

result in higher security costs

proposed enhancements to

regime that balances the

and mitigate the different

per passenger.

the existing AVSEC regime.

desired level of robustness

Key enhancements proposed

in security outcomes in the

infrastructure and operations-

7. The sustainability of many

9. These enhancements will

related vulnerabilities across

regional airports is a

include improving airport

most economical way – after

the aviation sector. This is

contentious issue in Australia

access control arrangements;

considering the threats being

a shared government and

because the continued provision

enhancing Aviation Security

faced, the risk appetite of

industry responsibility.

of affordable air services is a

Identity Card (ASIC)

the Government, optimal

critical economic and cultural

functionality; examining the

passenger facilitation rates,

effectiveness of the current

factor when assessing the long-

feasibility of moving to a

and the capacity and resources

AVSEC regime is a more

term viability of many regional

‘network pricing’ screening

of industry to implement the

challenging and complex task,

cities and towns.

model; and reviewing

required AVSEC measures. n

6. Assessing the overall cost

8. We have suggested the

the proposed new AVSEC

industry participants across

Aviation and Maritime

screening measures to be

the sector. The current regime

Security (AMS) Division

adopted by smaller security-

PBAR Associates and non-executive

works well at major capital city

within the Department of

controlled regional airports.

director at Certis Security Group

noting the diversity of aviation

52 // SECURITY SOLUTIONS

Paul Retter is Principal at

securitysolutionsmagazine.com


It’s as easy as 1two3 Three phases for construction keying

1 2 3 Construction keying is commonly used on site during the construction phase of building. A convenient way of providing continued security during the 3 phases of construction is to use pExtra construction keying. In simple terms, all cylinders are operated by the one key (Phase 1) during the construction phase. At “handover” the next stage key is turned in the cylinder blocking the Phase

1 key from working again. Once the apartment is sold, the owner would insert the key into the cylinder blocking Phase 1 and Phase 2 keys from working again. To learn more about our complete range of smart and secure access solutions, contact dormakaba. 1800 675 411 www.dormakaba.com.au

Phase 1 Construction Stage

Phase 2 Hand over to the developer/ real estate Phase 3 Hand over to the end user


LEGAL

MANAGING COMPANY ACQUISITIONS

54 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


What happens when a small to

legal entity. This means that it

that has traditionally provided

can enter into contracts and do

guarding, patrol and monitoring

all other things at law that any

services, merges with another

private individual is capable of

company that also provides

doing. However, unlike people,

installation services for security

a company can change both its

equipment as an example?

identity and appearance with the

Typically, as part of the merger,

stroke of a pen. So how does the

both organisation will either come

law keep tabs on this?

together under a new company

The way that the law requires

name or perhaps keep one of the

a company to identify and

previous names. However, both

distinguish itself is not via its

organisations have a significant

name, but via its Australian

portfolio of existing contracts

Company Number (ACN).

with clients with whom they

Under the Corporations Act,

have been working for years,

a company must ensure that

all signed under the previous

its ACN appears on all of its

company names.

“public documents” and “eligible

Do they need to re-draft

securitysolutionsmagazine.com

A company is a separate

medium-sized security company

negotiable instruments”. These

all of their old contracts for

include all documents lodged

both companies and have their

with the Australian Securities

clients re-sign new contracts,

and Investments Commission,

or can they simply keep the old

invoices, receipts, orders for goods

contracts in place until they are up

and services, letterheads, official

for renewal?

company notices, cheques and

SECURITY SOLUTIONS // 55


LEGAL

written advertisements which

party, then the fact that you

make a specific offer.

have changed the name of your

A company is not required to

company is irrelevant. For the

include its ACN on packaging and

sake of completeness, however,

labelling, advertisements which

you might like to write to all of

do not make a specific offer, credit

those parties to confirm that

cards, business cards and with

the company name has been

compliments slips, and items

changed and to reassure them

which are not documents.

that the company with whom

The purpose of the ACN is to

they contracted remains the

ensure that companies can be

same and that the name change

easily identified. It does not matter

is merely cosmetic. To further

what the name of the company

reassure them, you might wish

is and nor does it matter how

to point out that the ACN relating

often the company changes its

to both company names has

name. The constant is the ACN. If

not changed, and that is really

the ACN remains the same, then

what matters.

the company is the same entity

Once your existing contracts

and can be distinguished from

come up for renewal, you can

any other company, including a

substitute the old company name

company of a similar name.

for the new one. Again, as long

You do not need to alter

as the same ACN appears, the

your contract documents after

other party can feel comfortable

changing the name of your

in knowing that while the name

company. If your ACN appeared

of the company might have

in the set of contract documents

changed, the company itself

executed by you and the other

remains the same. n

56 // SECURITY SOLUTIONS

A company is not required to include its ACN on packaging and labelling, advertisements which do not make a specific offer, credit cards, business cards and with compliments slips, and items which are not documents.

securitysolutionsmagazine.com


VIDEO DOESN’T HAVE TO BE EXPENSIVE TO BE EFFECTIVE

With years of experience across hundreds of clients, let us show you how we can help you generate more business than ever before. enquiries@interactivemediasolutions.com.au


CCTV

COMPARISON OF PROFESSIONAL IP CAMERA SYSTEMS AND HOME CAMERA SYSTEMS: WHAT IS THE DIFFERENCE? BY BOB MESNIK

58 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


If you do a search for Internet

lens for your photo camera? I bet

Protocol (IP) camera systems,

you had to pay $200 to $500 for

you may see low-cost IP cameras

the better lens. Now imagine what

advertised by Amazon, Costco,

type of lens is included with the

BestBuy and other consumer

$39.99 camera. These low-cost

sellers. You can find IP cameras

lenses reduce the clarity of the

starting at under $40, but are

video. This means users will not

these IP cameras right for

be able to identify a person’s

your business, school, hospital,

face in the video or see a licence

government organisation or

plate number.

commercial organisation?

The other day, I was walking

The answer is no. They are

down the street and I passed a

not designed for professional

guy selling watches. There was

applications. One of the most

one watch that looked just like an

important things to understand

expensive Rolex, but it cost only

is that commercial IP camera

$50. What a deal, I thought. I think

systems are systems. They consist

everyone tries to find the best

of an IP camera, video recording

deal. Unfortunately, we sometimes

system and infrastructure that

forget the old maxim, ‘you get

includes the network, video

what you pay for’. I know I do.

management software and

How many times have we been

display system. The consumer

burned by this? Better IP cameras

surveillance camera is primarily

are reliable and rugged. They are

only a camera.

designed to last for many years of operation. The professional

Quality versus Price of Professional IP Camera Systems

IP cameras that are designed for

Commercial IP camera systems,

that are further away and can

while costing more than home

operate at night.

business applications provide much better video, can see areas

cameras, provide more capability

as low as $39.99. These cameras

Reliability of Commercial IP Camera Systems Versus Consumer Camera Systems

advertise 1080p resolution. That is

Commercial camera systems

equivalent to 2 megapixel camera

have better reliability than the

resolution. Think about this price.

low-cost consumer cameras.

Have you ever purchased a good

Imagine installing a camera on a

and better quality and reliability than consumer cameras. Consumer cameras are available for under $100, with some selling

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 59


CCTV

over multiple cameras. If a cloud

vulnerable to hackers. The setup

Video Recording for Professional IP Camera Systems

the cheap camera much more

of home cameras usually consists

Commercial IP camera systems

internet connection to a remote

expensive than the professional

of a small number of cameras

are designed to record video

server. These systems usually have

IP camera. The commercial IP

connected to Wi-Fi. These Wi-Fi

from large numbers of network-

limited bandwidth, which means

cameras from Hanwha have a

connections and their ease of

attached IP cameras, which

that only a few cameras can be

five-year warranty. This almost

use make them more vulnerable

could range from a few cameras

used in the home.

guarantees trouble-free operation

than the sophisticated network-

to enterprise systems with

for at least that long. Take a look at

attached IP camera systems used

thousands of cameras that

simple motion detection that

our article, What is the Best Price

for business. The consumer-grade

are located in many different

triggers video recording. This

for Your IP Camera System? for

IP cameras include nice features

geographic locations. The VMS

means that the home video system

more about this topic.

for personal use, such as viewing

provides sophisticated IP camera

may record quite a lot of video

the video on a smartphone, but

management tools that make it

that is of no interest, making it

Security Provided by Professional IP Camera Systems versus Home Cameras

these features are not safe. They

easy to install and maintain the

difficult to find the important

should not be used in a business

camera system.

recorded video.

systems also have mobile apps,

is designed for a small number of

secure connections to dedicated

The professional IP camera

but these are connected to the

cameras – the IP cameras record

video recording systems. The

systems that are designed for

video management software

to a memory card in the camera

video data stream is encrypted

schools, business, government

(VMS) or the network video

or to a cloud system, which can

and the recording system can

and other organisations provide

recorder rather than the

be costly. The memory cards

handle hundreds of IP cameras.

much better protection from

camera, which provides better

have limited capacity and it is

These systems have effective

hacking and malware than

security control.

difficult to track the recording

alarm detection that only records

pole and then having to replace it

home cameras. The consumer

after a few months of operation.

home cameras are much more

The labour cost alone will make

60 // SECURITY SOLUTIONS

IP camera system. Professional

A home-type IP camera system

recording system is used, it must be connected through the home

Consumer IP cameras have

Professional IP cameras have

securitysolutionsmagazine.com


Integration of Professional IP Camera Systems and Other Security Systems Commercial IP camera systems can be integrated with door access control, IP paging systems and IP intercom systems to help control who enters a building, thereby increasing security. They can also be used with licence plate recognition systems, gate control systems and biometric access control. To learn more about how to integrate security systems, take a look at our article How to Integrate Door Access and IP Camera Systems.

Summary of how Professional IP Camera Systems Compare to Consumer Home Type IP Cameras critical video. The recording

number of notifications to the

IP camera systems that are

system can be set to record video

security centre and reduces the

designed for professional

if something is a certain size, or

recorded video. Professional IP

applications provide better

if a person crosses a pre-set line.

cameras are also available with

quality, reliability and

It can also detect an object left

intelligent video capability. For

functionality to users such as

in a lobby, or trigger an alarm

information about all the features

required by business, schools,

when a laptop is removed from

provided by intelligent IP video

hospitals, government and

a desk. The recording systems

cameras, look at our article The

commercial organisations. They

include search features that

Intelligent IP Camera.

are designed to support large

allow users to find relevant video quickly.

There are also high-

numbers of cameras, are more

performance PTZ cameras with

secure and allow users to easily

extended range that allow users

identify security problems.

Performance of Professional IP Camera Systems Versus Consumer Cameras

to see objects that are miles away.

Although consumer IP cameras

These special cameras include

are inexpensive, they are not right

infrared (IR) illumination or are

for commercial applications. n

Professional IP cameras provide

can see during day and night.

owner of Kintronics. Kintronics

advanced features and functions

Users can select from professional

specialize in providing network

that are not available in consumer

off-the-shelf PTZ IP cameras

attached IP camera surveillance and

cameras. One important aspect of

or custom-designed PTZ IP

security systems, optical storage

commercial IP camera systems is

camera systems that allow them

systems and network attached

that they can be adjusted to reduce

to see things that are over five

storage. For more articles like this

false alarms, which controls the

miles away.

one visit https://kintronics.com

securitysolutionsmagazine.com

“THE PROFESSIONAL IP CAMERA SYSTEMS THAT ARE DESIGNED FOR SCHOOLS, BUSINESS, GOVERNMENT AND OTHER ORGANISATIONS PROVIDE MUCH BETTER PROTECTION FROM HACKING AND MALWARE THAN HOME CAMERAS.�

teamed with thermal imaging cameras to create systems that

Bob Mesnick is President and

SECURITY SOLUTIONS // 61


CYBERSECURITY

THE IoT COMES TO COMMERCIAL SECURITY BY ANNA SLIWON-STEWART

The use of wireless technologies

by sending data to the control

in commercial security

panel and receiving commands

installations has traditionally

from the control panel.

also being widely deployed. All these developments can

industry to develop alternative networks to help resolve

help broaden the role of the

issues like signal pollution,

intrusion control panel and

insufficient range, power

potentially turn it into a form of a

consumption, capacity and the

local signal processing hub. This

cost of devices that will connect to

as regulatory restrictions and

Improving Availability of Communication Pathways

is happening alongside increased

these networks.

insurance liabilities. However,

Developments in IoT technologies

adoption of smart building

the industry and the regulatory

promise to improve the range of

platforms, to which the intrusion

authorities have made big strides

communication paths available

system can feed vital data. Smart

in recent years towards facilitating

for the exchange of data in

building platforms primarily

Narrowband Accelerates IoT Connectivity

adoption of new technologies in

building systems. The adoption

benefit from the underlying

To help meet this communications

commercial security installations.

of IoT communication protocols

cloud infrastructure for data

challenge quickly,

in intruder alarm systems will

processing. However, the traffic of

telecommunications companies

from the world of Internet of

increase the average number of

signals travelling to the cloud over

have dedicated part of their

Things (IoT) which, until very

sensors connected to each system

internet protocol (IP) connectivity

Global System for Mobile (GSM)

recently, has been the purview

and could promote the wider

has become too great in some

communications infrastructure

of residential intruder alarm

deployment of wireless sensors

cases, which reduced efficiency of

to IoT-suitable technologies called

systems. IoT has enabled users to

in commercial installations. The

the connection and risked some

narrowband IoT (NB IoT): CAT-NB

create true networks of devices

variety of sensors that will be

signals being delayed. Locally

and LTE-M. CAT-NB and LTE-M

that can cover the entire area of

connected to commercial intruder

based devices can ease some of

are two protocols suitable for IoT

the home and work together to

alarm systems will also increase,

that burden by pre-processing

that operate as part of existing

provide the user with ultimate

with temperature sensors,

data on the ground and sending

mobile networks, allowing service

home comfort and security

humidity sensors and, potentially,

conclusions to the cloud. This

providers to offer immediate IoT

through one system. IoT has also

smoke and heat detectors able

means that the intruder alarm

connectivity to their customers.

facilitated creating mesh networks

to connect using alternative IoT-

control panel can take on a more

However, the deployment

where each device talks to each

suitable protocols. As the focus

strategic role, in both the context

costs of NB IoT are quite high

other, exchanging data about the

on environmental friendliness of

of IoT and smart buildings.

compared to other low-power

area which they overlook, instead

buildings and employee wellbeing

of leading only a two-way dialogue

increases, air quality sensors are

been burdensome, due to range and coverage issues, potential for signal interference as well

The latest innovation comes

62 // SECURITY SOLUTIONS

Recently, there have been efforts by the telecommunications

wide area networks (LPWAN) and therefore may not be the

securitysolutionsmagazine.com


best option for single-building

security measures in line with

because the battery life, range

protocols are currently available

installations. Also, because

their specific requirements.

and maintenance of such

in the market, although

systems will become much less

development efforts continue.

NB IoT uses existing mobile

Furthermore, signals sent

networks and their frequencies,

over such networks potentially

it still faces the same challenges

can be more resistant to

of weak signal penetration

jamming. LoRa, for example,

deployment will allow end-users

examined and designed out of

in thick-walled buildings or

sends the signals over a broader

to connect more smart devices

the system architecture. In the

underground facilities.

frequency spectrum.

at a lower cost than adding

case of private IoT networks,

Signal stability should be

ZigBee/Z-Wave devices. The cost

the responsibility for network

Low-power, Wide Area Networks Join the IoT

improved as LoRa also uses sub-

of adding LoRa LPWAN modules

continuity, maintenance,

GHz spectrum, which helps it to

to the intrusion control panel

repair and security will rest

LPWANs such as LoRaWAN and

avoid the overcrowded 2.4 GHz

is minimal ($5), while a Z-Wave

with the network owner. This

Sigfox are the two most popular

spectrum, which is the staple of

module adds around $50.

responsibility will require

alternatives that work alongside

Wi-Fi and IP communications.

3G, 4G and 5G frequencies. Each

The very long range of Sigfox

labour intensive. Ultra-low costs of

Even if sensors are deployed

Cybersecurity risks will also need to be carefully

employing staff members with

with the specific purpose of

relevant expertise. There is also

has specific features that make

or LoRa means that the problem

providing intrusion detection,

the question of how inherently

them suitable for either urban

of the distance of motion

they will be ready for use in a

secure IoT communications

or rural area IoT applications.

detectors from the intrusion

smart building setup without

are and what providers of the

These networks allow public

control panel is resolved and

additional systemic changes.

network infrastructure will

and private setups that can

the need for additional signal

be more suitable for specific

repeaters is eliminated. This

The Hurdles

of signals sent through them.

installations. For example,

reduces the complexity of

One of the key barriers that may

Currently, wireless devices using

utilities and other critical

the setup of a building-wide

prevent adoption of pure IoT

proprietary frequencies can

industries prefer to use private

intruder alarm system.

technologies in intruder alarm

benefit from signal encryption

installations is regulation. While

as it travels between the sensing device and a control panel.

networks due to capex versus

The arrival of advanced IoT

need to do to ensure security

opex tradeoff, data security

connectivity in commercial

Z-Wave technology received

and increased control over the

intruder alarm installations

a UL certification in 2017,

critical infrastructure. They

will mean that wireless sensors

none of the other IoT-specific

that requires too much effort

also allow network owners to

can finally be deployed on

technologies have yet. Very few

for building developers,

customise communications and

a much wider scale. This is

security devices that use LPWAN

manufacturers or service

securitysolutionsmagazine.com

This may be an activity

SECURITY SOLUTIONS // 63


CYBERSECURITY

providers to undertake. Hence,

be able to provide full support to

products and applications, there

one supplier that can provide

companies wishing to use

their customers.

may be a shortage of multi-

a necessary die to create such

protocol chips that could allow

devices, hence there is significant

IoT network services for their

Another potential difficulty

connected buildings will need to

is with the trend of creating

the devices to work on the basis

risk involved with supply of the

either use the services of mobile

multi-communication devices.

of LoRa and NB IoT. In the initial

key component to such multi-

network providers or work with

In the residential space, control

stages of deployment of LoRa

protocol devices. n

local IoT network developers.

panels have begun to incorporate

and other IoT communication

Installers working with IoT

Anna Sliwon-Stewart is a

three or four key communication

networks, it may be necessary

products will need to undergo

technologies to make them as

for devices to use chips that can

market research analyst with IHS

training and be well-versed in the

versatile and flexible as possible.

transmit over both protocols.

Markit, a leader in research for the

workings of these technologies to

In the expanding world of IoT

However, currently, there is only

security industry.

64 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


FOLLOW US ON INSTAGRAM instagram.com/securitysolutionsmag

SCAN CODE WITH YOUR CAMERA


PROFESSIONAL DEVELOPMENT

SURVEILLANCE DETECTION ENABLED SECURITY BY AMI TOBEN

Surveillance detection (SD) has

possibly some subtle mistakes that

thankfully received increasing

might only be apparent to an SD

amounts of attention in recent

operator who knows what to look

years, as more and more industry

for. It is possible that the detection

professionals (and even some

of these subtle indicators will

non-industry professionals) are

take quite a bit of time, requiring

waking up to its potential benefits.

a number of fully dedicated SD

As positive as this development is,

operators; which is one of the

it does create the need to abolish

reasons why SD operations are

some misconceptions regarding

so costly and still not all that

SD, and to better explain how it

common (though more common

can actually benefit real-world

than before).

protective details. In order to detect the subtle

Now, let me make what might be a contested claim – for anyone

indicators of hostile surveillance,

who is dedicated to conventional

SD operators must first be

or even low-profile security

well versed in surveillance

(including executive protection

operations. Generally speaking,

[EP]), even if it is on the highest

these indicators consist of subtle

level, surveillance detection, in

correlations to the target, and

its purest form, is not exactly

66 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


securitysolutionsmagazine.com

SECURITY SOLUTIONS // 67


PROFESSIONAL DEVELOPMENT

open to you. I hasten to add that

a matter of not being able to be

Lest you think I am

this is not because of training

in two places at the same time

only picking on individual

or experience, but because of

while simultaneously performing

operators, it is important to

the necessity to operate covertly

two very different roles. So, for

understand that SD is much

though individual qualities

– without which, a potential

the same reasons you cannot

more determined by operational

might be insufficient by

surveillance operative would be

direct traffic at an intersection

parameters than it is by the

themselves to constitute a full

able to know who and where the

while simultaneously taking

individual’s skill and motivation.

SD program, they can get you

operator is and, therefore, not

an aerial photo of the area,

As qualified as a security

closer to what can be termed

allow the operator to detect any

you cannot perform physical

operator might be, in the

SD-enabled security, which, for

subtle indicators of surveillance.

security (including EP) while

absence of a functioning covert

many organisations, turns out

It is not a question of skill; it is

simultaneously providing SD.

SD program, you are probably

not only to be more realistic, but

68 // SECURITY SOLUTIONS

not going to end up with real surveillance detection. The good news is that, even

securitysolutionsmagazine.com


can include an attempt to detect

will be conclusively detected

(and possibly acknowledge) any

by an SD-enabled operator.

person spending time, or even

Nevertheless, when even a skilled

just passing through, the area

surveillance operative is observed,

(regardless of whether or not

acknowledged and verbally

they exhibit any surveillance

engaged (possibly in more than

indicators).

one location), a strong message

It is important that a

is being sent – namely, that

particularly large amount of

security understands where to

attention be paid to the vantage

look and what to look for, and that

points around a target. These

planning, much less executing,

vantage points can be plotted

an attack might be too risky

out by an SD professional,

and difficult.

performing what is called

It is also important to note

surveillance mapping. This

that there can be quite a few

special attention to the vantage

variations on the theme of

points can include (but is not

SD-enabled security and that

limited to) careful observations

in addition to, or instead of, the

of people at those locations,

proactive deterrence channel, a

casual acknowledgements of

slightly more covert and reactive

these people and even polite

channel is also available. There

verbal engagements.

is, as always, way more than

Note that this idea of

one way to skin the hostile

surveillance mapping does not

surveillance cat, and more than

necessarily have to entail a

one way to combine security and

prolonged and comprehensive

surveillance detection.

process. If a principal will be staying at a certain hotel, for

For more information, please check out Protection Circle. n

example, various vantage points, both outside and inside the

An experienced security

hotel, can be mapped out by an

director, consultant, trainer,

SD-enabled advanced team in a

operator and business developer,

relatively short amount of time.

Ami Toben has over 14 years

These potential vantage points

of military and private sector

then receive special attention

security experience, and a

before and while the principal

successful record of providing

much more useful, cost effective

profile, SD-enabled security force

is in the hotel. This, of course,

full-spectrum, high-end services to

and desirable.

to detect it. What we can expect,

applies to the residence and

Fortune 500 corporations, foreign

however, is to deter it.

workplace as well, where even

governments, foundations, non-

more attention and time should

profit organisations and wealthy

be invested.

individuals. Ami is currently

The process of learning SDenabled security is not entirely

The idea here is to combine

different from that of pure SD. The

a number of actions that will be

biggest difference comes in the

viewed unfavourably by hostile

implementation part of it, and in

surveillance operatives. Perhaps

trained surveillance operative

special operations at HighCom

the realisation that if surveillance

the most basic of these is an

would probably assume a vantage

Security Services, a US-based

is conducted at a high enough

active projection of visual control

point only after having established

high-end security firm specialising

level, we cannot realistically

over the area around the target,

a solid cover and cover story,

in protective services, security

expect an overt, or even low-

which, depending on the situation,

making it unlikely that he/she

systems, consulting and training.

securitysolutionsmagazine.com

Keep in mind that a well-

director of consulting, training and

SECURITY SOLUTIONS // 69


LOSS PREVENTION

70 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


HOW A SAFE, EFFECTIVE EMPLOYEE TERMINATION PROCESS CAN PREVENT A STORE TRAGEDY BY GARETT SEIVOLD

Employees with a history of violence or threats represent a higher risk, and the employee termination process for those individuals should follow the strictest security measures.

The horrific event that unfolded in

consultant and regular expert

supervisor during a termination

history to look for signs that

February at a manufacturing plant

witness in workplace violence

and speaks with the employee

special security measures might

in Aurora, IL – when a long-time

cases, said he still sees employers

about any unresolved issues,

be necessary.

employee, in the midst of being

mishandle these employee

such as benefits, pay and so on.

• Employees with a history of

fired, pulled out a gun and killed

termination process events.

The employee is told to address

violence or threats represent a

three people and wounded several

“Helping workers preserve their

any further questions to HR in

higher risk, and the employee

more before his rampage ended –

dignity is important, so they still

an effort to take the supervisor

termination process for those

is a risk every employer faces.

have something left to lose,”

out of the communication link,

individuals should follow the

A job termination is an

he said. Sem said it is when a

according to an HR specialist

especially delicate task – one that

worker feels he or she has lost

with the USPS. “It is critical that

should follow a specific security

everything that a violent incident

a relationship that is likely bad

he or she has a history of

game plan every time it happens.

is most likely.

already not be allowed to get

filing grievances or lawsuits,

worse through additional contact

retailers should also be on high

According to a national

The United States Postal

strictest security measures. • If the employee’s record shows

survey of company security

Service (USPS) has certainly had

between the parties during the

alert, as studies show that such

executives, 26 percent perceive

its share of high-profile problems

employee termination process,”

individuals pose a greater risk

the act of firing employees as

with disgruntled ex-workers

noted Sem.

“significantly contributing”

(giving birth to the common slang

to the risk of violence in the

expression ‘going postal’), but

workplace. Not surprisingly,

USPS has worked hard to address

the issue is seen as particularly

of future violence. • Although prior violent acts are the most accurate predictor

the risk, implementing a soft exit

Risk Assessments for the Employee Termination Process

problematic by security leaders at

program to provide managers

Prior to delivering bad news to

have expressed unfounded

large organisations.

with a support system when

an employee, retailers need to

or delusional claims that co-

Although the danger is

they have to fire an employee.

spend sufficient time reviewing

workers are “out to get them”

rather obvious, Richard Sem, a

An HR representative joins the

the individual’s employment

should be considered high risk

securitysolutionsmagazine.com

of future violent behaviour, non-violent employees who

SECURITY SOLUTIONS // 71


LOSS PREVENTION

“Studies show that employees with many years in a job are more likely to react violently to a perceived unfairness, such as being fired or passed over for promotion, than employees with just a year or two with a company.”

when they are terminated,

news. “People who got away with

of the Henry Pratt Company. The

Moreover, the threat from

suspended or reprimanded.

inappropriate behaviour, who got

more value an employee attaches

violence associated with a job

• A termination that would not

a slap on the wrist time and again

to the job, the more stressful

termination does not end on the

ordinarily be characterised

until it escalates to where you are

he or she finds a disruption in

day of discharge. According to one

as high risk may warrant

forced to address it, feel entitled

job status.

workplace study, the mean length

such a classification if the

to any behaviour in the same way

employee being terminated

a bully does,” said Sem. “They can

to conduct careful reviews

violence following termination is

is also under severe financial

be hostile and respond violently

of employee records and to

six months, as resentment toward

pressures, such as undergoing

when you finally try to put your

interview supervisors to gauge

the previous employer often

a foreclosure.

foot down.”

the potential for violence, there

intensifies when a fired employee

may be no red flags in some

cannot find new employment.

Retailers also need to critically

Finally, retailers should

While it is wise for companies

of time for acts of workplace

review their past handling of a

recognise that long-term

situations that turn violent. Every

problem worker prior to his or her

employees may actually present

time an employee is fired, even

dismissal or discipline, according

a greater threat in the wake

in cases when the termination

to a former workplace violence

of a job termination. Studies

is expected to go smoothly,

specialist for the North Carolina

show that employees with many

stores should follow relevant

Recommended Security Procedures for the Employee Termination Process

Office of State Personnel.

years in a job are more likely

security recommendations.

The mechanics of a termination

to react violently to a perceived

Sometimes the employee

– location, time and so on – can

to get away with aggressive

unfairness, such as being fired or

termination process may demand

minimise risk by removing

behaviour in the past – something

passed over for promotion, than

an extra security presence,

the opportunity for violence.

companies find difficult to

employees with just a year or two

but all bad news delivered to

Security leaders should help

acknowledge – that worker is

with a company. For example,

employees in the work setting

their retail organisations to

more likely to react aggressively

Gary Martin (the Aurora, IL,

should be recognised as high-

develop a written policy on

on the occasion of negative

shooter) was a 15-year veteran

risk situations.

how to conduct a layoff or a

If a worker has been allowed

72 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


when a store needs to take

• Have security staff stay with

extraordinary security

an employee you believe

precautions during a dismissal.

might be dangerous until he

Supervisors may also need to

or she leaves the premises.

occasionally deliver other types

Only use quality officers for

of unwanted news to employees,

this detail, ones whom you

making it important that they

trust to handle the dismissal

have the skills to do so effectively.

quickly and smoothly

The entire employee termination process should last no longer than 15 minutes, and a difficult termination should be as

without unnecessarily confronting or humiliating the exiting employee. • If firing an individual for

brief as possible. Notification of

behavioural problems, position

the firing should be immediate,

security staff in or just outside

rather than slowly building up to the news, and the dismissal should

the room. • If the employee being

be direct and leave no room

terminated has previously

for confusion.

issued threats of violence, a

To expedite the process, all the

protection team of security

materials necessary to complete

professionals in plain clothes

the termination process should

should be available during the

be at hand, including a written

termination. They should also

explanation of any severance

remain onsite for a reasonable

benefits, counselling or out-

period of time to ensure that

placement services and the name of the specific manager with

the individual does not return. • Consider soliciting help from

whom the worker must make any

local law enforcement during

necessary future contact.

any high-risk employee

It is important to never take a

termination process.

break during a job termination,

This article first appeared in Loss

say experts. There have been cases

Prevention Magazine. If you would

job termination, including the

in which employees have asked

like more articles like this one, visit

identification of all individuals

for a break during a firing and

losspreventionmedia.com n

who need to be notified in

gone to their desk or vehicle to

advance of the event.

retrieve a gun.

It is possible for store

If it is the conclusion of a

Garett Seivold is a contributing writer for LP

managers, the HR department,

threat assessment that a specific

Magazine. He is a trained journalist

security, and legal departments to

firing is high risk, experts suggest

who has been covering corporate

find themselves at cross-purposes,

that an employer should consider

security for industry professionals

say experts, which makes a cross-

the following security measures:

for eighteen years. Since 1998,

disciplinary, team-based solution

• Watch for the worker’s arrival

he has served as the principal

the most appropriate avenue

on the day of termination

writer and editor of Security

to pursue.

to see if he or she might be

Director’s Report, a monthly

bringing a weapon into the

publication highlighting trends

workplace violence prevention

workplace. Often, when

and best practices in corporate

is critical. Although supervisors

a fired worker goes on a

security management. Seivold

should not typically fire

shooting rampage immediately

has been recognized by several

employees directly, they are in the

following being fired, they

organizations for outstanding

best position to assess the violence

suspected the news was

writing, investigative reporting, and

potential of individuals prior to

coming. For a high-risk

instructional journalism. He has

termination. If supervisors are

termination in which this is

authored dozens of survey-based

well trained in the warning signs

a possibility, organisations

research reports and best-practice

exhibited by potentially violent

should consider hiring an

manuals on security-related topics.

employees, they can act as a vital

off-duty officer to be present or

Seivold can be reached at GarettS

security asset by recommending

holding the meeting off-site.

(at) LPportal (dot) com.

Training supervisors in

securitysolutionsmagazine.com

“The mechanics of a termination – location, time and so on – can minimise risk by removing the opportunity for violence.”

SECURITY SOLUTIONS // 73


PRODUCT SHOWCASES

THE MANTIS X10 The Mantis X10 is the ideal

There is a USB charging cable

the original point of aim

training tool for anyone who has

Mantis X10 case and foam insert,

• Recoil angle: the angle to

to carry a firearm for work. In

quick start guide and the MantisX

addition in addition to being

app to enable you to use all the

the ideal companion tool for

diagnostic tools.

use with the SIRT Pistol (see the

One of my favourite features

• Shot: time from Horizontal to when the shot breaks

the left or right that the gun

In the second screen, MantisX

moved as it recoiled upward

displays overlaid traces of all the

• Recoil width: the width of the

holster draws in that session.

loop formed by the upward

This is valuable in assessing the

showcase on the SIRT in this

of the MantisX system is recoil

and downward movement of

path of the draw, the consistency

issue), the Mantis X10 users

analysis tool

the gun

of the draws across your session,

with a wide array of training

The recoil analysis tool gives

Clicking on each measure will

and highlighting any variance or wobble in your draw.

features including:

you the ability to quantify recoil

show summary data for that

• Courses

(and recoil management) on a

session: the session average,

• Coaching tips

gun. According to Mantis, they

and a chart showing detailed

10 also includes tools for:

• Historical Tracking

have the nerdiest (i.e. best)

comparison for all shots for

Multi-target analysis **

• Groups and Messaging

engineering team in the business,

that measure.

Shooting on the move **

• Analysis Features

and with the combination of

• Muzzle trace

hardware expertise and mind-

the MantisX 10 system is the

• Trigger control analysis

numbing software algorithms,

holster draw analysis

• Shot timer

they have created the first device

• Smoothness analytics

to accurately and reliably give you

again available by connecting

• Consistency comparisons

data on not just your gun’s recoil,

your MantisX app to a Mantis

• Recoil analysis

but your response to that recoil.

X10 sensor, then launching

love about this diagnostic tool

Recoil analysis is available by

Another invaluable tool within

Holster draw analysis is once

The top of the line MantisX

Rapid fire ** Moving targets (shotgun) ** And, free software updates as well as phone and email support. Perhaps the feature I most

the “Holster Draw Analysis”

however, is that each time the

connecting the MantisX app to a

drill. This drill will allow you to

software identifies a potential

data points per second, the

Mantis X10 sensor, then launching

perform any number of holster

flaw in your technique, it

X10 analyses your shooting in

the “RecoilMeter” drill. This drill

draws in a session, giving you

provides a range of coaching

real-time. For pistols, rifles, and

session will allow you to shoot

detailed analysis about each draw,

videos and tips to help address

shotguns. The X10 works with

any number of shots, giving you

in two diagnostic screens.

and overcome that problem.

dry fire, live fire, airsoft/CO2, and

detailed analysis about each shot,

simulated weapons systems.

and summary data, in a single

breaks down your holster draw

your own professional coach

analysis screen.

into key phases, to identify

watching and analysing every

inconsistent or slow phases:

shot you take and then offering

• Grip: time from the start beep to

improvement suggestions.

Collecting thousands of

The system comes with Mantis X10 Elite sensor which

Mantis measures and

can be fitted to a guns accessory

calculates four key components of

rail or even to the bottom of a

recoil such as:

magazine where necessary. It

• Muzzle rise: the peak angular

also comes with the BR7 Barrel Mount Picatinny Rail for rifles and shotguns.

74 // SECURITY SOLUTIONS

rise of the gun after the shot • Recovery time: time for the gun to return and stabilize to

In the first screen, MantisX

when your hand grips the gun • Horizontal: time from the

It is quite simply like having

We cannot recommend this product highly enough. n

grip to when the gun is drawn and rotated to horizontal alignment

For more information visit mantisx.com

securitysolutionsmagazine.com


SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry

securitysolutionsmedia.com/newsletter

Carrying a firearm for security

high-volume self-diagnostic

exactly mimic the trigger pressure

drills, draw and fire drills, the list

work is a major responsibility and

training with no set up and safe

in the real world versions of both

goes on.

one that you be prepared for to

sustainable training.

the GLOCK and the S&W MNP. The

the best of your ability. However,

This replica firearm is available

What’s more, because the SIRT is

second laser activates once the

not classed as a firearm or prohibited

the reality is that time on the

in two variants, either a GLOCK or

trigger breaks (using the pressure

weapon in parts of Australia, you can

range is expensive, ammunition is

a S&W MNP. The SIRT is available

required to fire the real gun)

keep one at home a train regularly.

expensive and hiring a qualified

in number of models ranging

showing the user exactly where his

Just a few minutes of mindful

instructor can be really expensive.

from the entry level see through

or her shot would land. Using this

practice per day focusing in drawing

So what is the alternative?

plastic polymer version through to

dual laser system, one can train a

and developing am accurate site

In reality, a great deal of one’s

a polymer frame with metal slide

diagnose a wide range of issues

picture can have a significant impact

ability to shoot accurately comes

that weighs exactly the same as a

that can effect one’s accuracy with

on a real world skills. Combine that

down to three fundamentals, grip,

real firearm.

a handgun. Issue such as snatching

with trigger control and you will be

The SIRT is designed around

the trigger, poor site alignment,

more accurate than even in very little

you have learned these three

the use of dual lasers built into the

allowing too much slack on the

time. SIRT even provide a range of

fundamentals, a lot can be done

training tool. The first laser activates

trigger between shots (slapping the

training material on line for free to

to significantly improve your skill

when enough pressure is applied

trigger), poor grip and so on.

help users make the most of their

with a fire just by practicing those

to the trigger to simulate taking up

three things.

the trigger slack to the point that

weighted magazines used by the SIRT

stance and trigger control. Once

Furthermore, the accurately

practice time.

n

For more information on

The SIRT Pistol, which stands

the trigger is about to break causing

enable users to carry out a significant

for Shot Indicating Resting Trigger,

the gun to fire. The trigger pressure

range of useful drills from mag

the SIRT Training system visit

was specifically designed for

in all SIRT models is designed to

changes to reload drills, stoppage

nextleveltraining.com

securitysolutionsmagazine.com

SECURITY SOLUTIONS // 75


PRODUCT SHOWCASES

VIKTOS GUNFIGHTER JEANS DARK INDIGO BLACK ARMS, BLUE JEANS

VIKTOS Gunfighter Jeans Dark

From the jungles of Vietnam to

• Attackposture Fit

the mountains of Afghanistan,

• Cordura Stretch Denim Chassis

denim jeans have been the

• Stretch Cordura Crotch Gusset

unofficial pant of Special

• Padded Waistband

Operations Forces units for

• Oversized Belt Loops Fit

decades so it only stands to reasons that they should be great for cover security work. The GUNFIGHTER Jeans, take this benchmark and notch it up for the ultimate denim force multiplier. The Gunfighter jeans are constructed with a

Indigo features include:

Tactical Belts • Hipshoot Magazine Hip Pockets • Cashout Pistol Magazine Coin Pocket • Hidden Waistband Stash Pocket • Velcro Moral Patch Compatible

Cordura stretch denim/nylon

• US Veteran Design & Developed

blend and feature a proprietary

• 1 Year Manufacturer’s

stretch Cordura crotch, for

Warranty n

uncompromised mobility & durability. Black arms specific

Tactical Gear Distributors are

pocketing, and padded waistband,

proud distributors of VIKTOS in

they are the perfect pant for your

Australia. For more information

daily gunfight.

visit https://tacticalgear.com.au

76 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry

instagram.com/securitysolutionsmag

THE VIKTOS 3L TEAM HARD SHELL JACKET BLACK NIGHTFALL

A good jacket can be a life saver

shell, up-armored with ballistic

Shell Jacket Black Nightfall

in security work as you are often

nylon paneling, is robust enough

features include:

outdoors. However, finding one

for multiple deployment cycles.

• Attackposture™ Fit

• Eight Exterior Pockets

that is robust enough to cope with

Magnetic closures, Gunvent™

• Waterproof/Breathable 3Layer

• Interior Carry Pockets

the demands of the job, while also

sidearm access zippers, oversized

offering access to equipment is

pass-through venting, and

almost impossible. Until now.

numerous pocketing create

The VIKTOS 3L Team Hard

Nylon Shell • Dupont® Teflon® WaterResistant Coating

• Gunvent™ Sidearm Access Zippers

• US Veteran Design & Developed • 1 Year Manufacturer’s

a jacket that is fully mission

• Fully Seam Sealed

Warranty n

Shell Jacket Black Nightfall is

capable. If your objective

• Ballistic Nylon Reinforced

Tactical Gear Distributors are

the first line of defense against

takes you into harm’s way,

unforgiving elements. It’s

dress appropriately.

waterproof & breathable 3Layer

securitysolutionsmagazine.com

The VIKTOS 3L Team Hard

Elbows

proud distributors of VIKTOS in

• YKK Aquaguard™ Zippers

Australia. For more information

• Magnet Pocket Closures

visit tacticalgear.com.au

SECURITY SOLUTIONS // 77


PRODUCT SHOWCASES

WOLF EYES TORCHES

We have said it time and again, not

torches, Sniper E torches and Pro

all torches are created equal. This

Police LED torches are their most

vehicles, you can’t go past the Wolf

also comes with a smaller 50mm

is an important fact to understand

popular models, with the smaller

Eyes Seal LED

reflector LED torch head, giving a

for security and law enforcement

Sniper II Mini LED torch just behind.

personnel because your torch is

Seal LED torches and Ranger 56

As a flood light for patrol

light out to 500 metres. This torch

The Wolf Eyes Seal torch has

nice spot surrounded by flood out to

been designed from the ground up

150 metres, great for just for using as a general torch.

one of the most important tools you

LED torches are great choices, while

to be the best possible torch for the

can carry.

those who need big outputs and

user who needs distance. It starts

floods of light are well served by

with the 25.4mm (1�) torch body size

boasts the kind of performance,

construction and quality. Other offer

the Pilot Whale Dive - also good for

which suits almost all mounts, this

build quality and output that we

more reasonable pricing. Few offer

diving! Our rechargeable batteries

6061-T6 aluminium alloy body is

have come to expect from products

both. Wolf Eyes offer a range of LED

are high power lithium ion. If you

lined with our brass Thermal Transfer

three times the price.

torches that are high power, variable

need help choosing between LED

Tube to wick damaging heat away

mode and rechargeable designed

torches our guide "Which Torch To

from your high power LED. The torch

for professional use. For security

Choose" may help or please call us

then features a huge 83mm aspheric

and Police use the Sniper II Pro LED

on 1300-

LED head, capable of throwing

Some torches offer superior

78 // SECURITY SOLUTIONS

This fully rechargeable torch

This one is definitely a keeper. n For more information visit www. wolfeyes.com.au

securitysolutionsmagazine.com


SPOTLIGHT

USING SECURITY AS A BUSINESS DRIVER

F

ounded in 2010,

data that helps drive business

their own data services brings

NEXTDC is one of

outcomes while creating value for

with it a number of significant

to identify and partner with an

Australia’s leading

the customer.

security challenges. While it is up

organisation that could provide

to each company to ensure the

a world-class, integrated security

data centres. What

According to the Chief Customer

The goal for NEXTDC was

makes NEXTDC unique is that it

Officer and Executive Vice President

integrity of its data in the cyber

offering. As Dzienciol explains,

operates as a service provider,

of Technology, David Dzienciol,

realm, NEXTDC, as the owner and

there are plenty of companies that

enabling organisations to use the

NEXTDC currently operates nine

operator of the physical site at

offer a great video management

data centre as a managed service,

data centres across Australia. “We

which the servers are located,

system, or access control system

renting out space within the data

host co-location provider data

is responsible for ensuring the

or licence plate recognition and so

centre to house and run their own

centres as a service provider for

physical security of those assets.

on, but NEXTDC preferred to find a

servers, thereby eliminating the

some of the largest companies in

Dzienciol and his team at NEXTDC

vendor that could bring all of those

expenses, infrastructure,

the world. We have a rich partner

need to have a security platform in

products and expertise together –

maintenance and, interestingly,

ecosystem of roughly around 550

place that will enable NEXTDC to

or unify them – into one system.

many of the security issues inherent

partners. We currently have over

deliver on its brand promises, one

in running one’s own data centre.

1,100 customers.

of which is security – both physical

leading security, Dzienciol

and general security.

explains, “We wanted to be able

The partnership between

“We provide on-ramp

Beyond providing class-

NEXTDC and its security platform

connectivity to six of the major

provider, Genetec, serves as a

cloud providers via our AXON

organisation faces involves

driver. Something that would

clear example of how security

layer 2 ethernet platform and we

designing, building and delivering

help us establish a unique point

has evolved over the last decade.

also have our ONEDC customer

world-class facilities that enable

of difference in the market. We

No longer is security just about

portal that allows our customers

the company to grow, both with

wanted our security to be a

providing best-of-breed cameras,

to gather intelligence around their

the needs of its customers and

business enabler and not just

detectors and access points; the

infrastructure and critical assets

the growth of the market. “We

an expense as so many people

focus for security providers and

while also providing rack locking as

made the decision very early on

often perceive it to be. By

end-users moving forward is how

a capability.”

in our business planning that we

partnering with Genetec and using

were only going to partner with

Genetec solutions, we can say

those devices, in conjunction with

As one might imagine,

The other big challenge the

to use our security as a business

intelligent software, can be used to

providing a co-location service in

world leaders, which is why, when

to our partners and prospective

better understand the nature of the

which a multitude of companies

looking for a security partner, we

customers, you know that when you

business, and provide intelligent

can choose to house and run

chose Genetec,” states Dzienciol.

choose NEXTDC you are getting the

79 // SECURITY SOLUTIONS

securitysolutionsmagazine.com


very best security for your data and

advanced customer experience. The

centre for that physical experience,

differentiator. I don’t think people

services.”

way in which we do that is through

the security not only becomes part

thought about it as a way to drive

a combination of technology,

of the value proposition, it actually

greater customer experiences

Director of Strategic Partnerships

people and process. So, on the

becomes frictionless. It works. It

either. As we run a 24/7, 365

at Genetec, its Security Center

technology side, Security Center,

always works, and it’s not seen as

business across nine sites, as we

platform was a natural fit for

combined with some of our other

something that’s cumbersome for

scale up or scale out, we’ve started

NEXTDC. “Utilising Security Center

systems like CRM and ticket

our customers.”

to realise more and more that

Omnicast™ for video management

management, helps us to offer that

and Security Center Synergis™ for

frictionless experience.

According to Philippe Ouimette,

Beyond the obvious access

through partnering with Genetec to

control and video surveillance,

utilise next generation, world-class

Dzienciol explains that Security

security, we can actually continue

access control, we are able to build

“We realised as we were

upon the capabilities of our offering

adding more and more sites that

Center allows NEXTDC to address

to innovate and continue to find

with the growing needs of each site.

one of the challenges we were

broader customer requirements

ways to differentiate ourselves in

With nine sites across Australia,

facing was the ability to deliver

such as reporting and compliance.

the marketplace by not just having

the logical step was the integration

security in a manner that was

“These are real value adds for

a box called security and ticking

of all these sites together into

neither resource intensive nor

our customers. Many, many

the box. We’re trying to use it as a

one system with Security Center

cumbersome. We didn’t want the

customers come to us on a rolling

value add, but also combine it with

Federation™. Now, as we look

people bringing our customers in

basis because we assist with their

other business processes. So, for us,

towards the future, we’re running

and out of our facilities to operate

compliance requirements by

looking at the way we do request

tests with licence plate recognition,

in a swivel chair environment

providing what we would refer to as

and ticket management, and how

seeing how that might enable the

in which they were required to

‘customer reporting’ in a way that

we think about if there’s access

business moving forward.”

move from system to system. We

is helping them reduce their own

control requirements that might also

really wanted a unified view of

complexity and overhead. When

bleed into parking requirements and

of using security as a business

our entire security process, so that

our customers tell us we helped

delivery requirements, those are

enabler, David Dzienciol explains

regardless of which of our sites a

them reduce the number of hours

the things that make the customer

that the adoption of Genetec

customer was visiting, or who the

or even days involved in generating

experience all it can and should be.

Security Center and other Genetec

customer was, or whichever of

reports and facilitating compliance

For us, our partnership with Genetec

solutions allows NEXTDC to drive

our representatives that customer

tasks, then that is a genuine value

is about finding ways to improve

a greater customer experience.

happened to be dealing with, even

add as a direct result of our security

customer experience, enhance the

“We don’t want to compromise

if they were just logging a ticket,

systems.”

value of our business and better

security, but we want to have a

the experience would be unified

frictionless customer experience.

across everything we do. This way,

in 2010,” states Dzienciol, “nobody

more of the value we create through

Part of our mission is to drive an

when a customer comes to the data

really thought about security as a

the data our system provides.” n

In line with their stated goal

securitysolutionsmagazine.com

“When we first launched back

understand how we can capture

SECURITY SOLUTIONS // 80


Sign up to our eNewsletter and receive up-to-date valuable information regarding all things Security.

www.securitysolutionsmagazine.biz/newsletter


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.