A U S T R A L A S I A’ S L E A DI N G S E C U R I T Y R E S O U R C E F O R BU S I N E S S A N D G O V E R N M E N T
NOVEMBER 2019 ISSUE 118
WHAT ARE WE REALLY CONCERNED ABOUT
ISSUE 118
FEATURES
46
cover story This year’s Unisys Security Index
CONTENTS
78
26 34 50
reveals that safety fears will not keep Australians from attending public events or experiences; however, our behaviours, actions and choices are changing. Ashwin Pal, Director of Security Services from Unisys, explores how Australians are minding their physical wellbeing and protecting their data in 2019.
66 38
26 THE EVOLUTION OF THE PROFESSIONAL SECURITY INDUSTRY
As the criminal and security threats facing the public and private sectors become increasingly pronounced and complex, and as the resources of traditional law enforcement and police services become increasingly overstretched, how has security evolved to manage the threats?
30 HUMAN CYBERSECURITY
People outside the information security sector are usually surprised to learn that the human factor accounts for the overwhelming majority of cyberattacks. Why is this and what can be done to address the situation?
38 WHO ARE THE REAL TERRORISTS IN NORTH
EAST SYRIA?
In the wake of US President Trump’s decision to green light Turkey’s incursion into north east Syria, what has been the real work cost and impact on the former US Allies and what might this mean for US foreign relations moving forward?
REGULARS
C
M
06 LETTER FROM THE EDITOR 08 LEADERSHIP
Jason Brown provides an update on the development of new standards around security and resilience.
10 LEGAL
Dealing with workplace safety and contract security providers?
12 CYBERSECUIRITY
Why should you standardise your information security framework?
14 HUMAN RESOURCES
How can overtime allocation effect your security business?
34 OPERATIONS
22 THINKING ABOUT SECURITY
What is in a name? How much does your title really matter?
24 EVENTS CALENDAR
A look at upcoming industry events.
CMY
K
Is Australia’s aviation security regime cost and performance effective?
54 LEGAL Q&A
How do you deal with existing contracts in a merger?
62 CYBER SECURTY
How can you use comparative marketing to help grow your security business?
CY
50 AVIATION SECURITY
18 COMMUNICATIONS
20 BUSINESS DEVELOPMENT
MY
How will the Australian Taxation Office’s (ATO) tips help security, investigation and surveillance businesses manage their contractor payments?
58 CCTV
How can you use comparative marketing to help grow your security business?
CM
42 BUSINESS
16 RISK MANAGEMENT
What is the difference between risk and threat?
Y
Why is it so important to enforce proper selection, carriage and maintenance of duty equipment?
What are the real world difference between professional and home user IP camera systems?
What happens when the Internet of Things comes to the world of commercial security?
66 PROFESSIONAL DEVELOPMENT
What is surveillance detection enabled security and why is it important to know?
70 LOSS PREVENTION
How can a safe, effective employee termination help you avoid a store tragedy?
74 PRODUCT SHOWCASES 79 SPOTLIGHT
4 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
FROM THE EDITOR FROM THE EDITOR www.securitysolutionsmagazine.com
EDITORIAL www.securitysolutionsmagazine.com
EDITOR John Bigelow EMAIL john@interactivemediasolutions.com.au EDITORIAL SUBEDITORS Sist, Ged McMahon EDITOR JohnHelen Bigelow EMAIL john@interactivemediasolutions.com.au SUBEDITORS Helen CONTRIBUTORS Sist, Ged McMahon
Jason Brown, Greg Byrne, Tony Jacques, Stephen Johnson, Richard Kay, Dan Levinson, Bob Mesnick, CONTRIBUTORS Paul Retter, Tim Rippon, Garett Seivoid, Anna Garry Barnes, Jason Brown, Greg Byrne, Kevin Foster, Silwon, Speckhard, RichardAnne Kay, Steve Lawson,Kelly JustinSundberg, Lawrence,Ami Scott Toben, Don Williams, Tony Zalewski O’Driscoll, Rita Parker, Don Williams, Lamie Saif, Anne Speckard, Alex Sidernko, Ardian Shajkovci, Ami Toben, Simeon Votier
ADVERTISING
Keith Rozairo PHONE 1300 300 552 ADVERTISING Keith Rozairo EMAIL keith@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL keith@interactivemediasolutions.com.au Jonathan Rudolph DESIGN1300 AND300PRODUCTION PHONE 552 Jonathan Rudolph EMAIL graphics@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL graphics@interactivemediasolutions.com.au
DESIGN AND PRODUCTION
MARKETING AND SUBSCRIPTIONS PHONE 1300 300 552 MARKETING AND SUBSCRIPTIONS EMAIL admin@interactivemediasolutions.com.au PHONE AUD 1300inside 300 552 $62.00 Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues) EMAIL admin@interactivemediasolutions.com.au $62.00 AUD inside Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues)
ACCOUNTS PHONE 1300 300 552 ACCOUNTS EMAIL accounts@interactivemediasolutions.com.au PHONE 1300 300 552 EMAIL accounts@interactivemediasolutions.com.au
PUBLISHER PUBLISHER
ABN 56 606 919463 Level 1, 34 Joseph St, Blackburn, Victoria 3130 ABN 56 606 919463 PHONE 300 552 Level 1,1300 34 Joseph St, Blackburn, Victoria 3130 EMAIL PHONEenquiries@interactivemediasolutions.com.au 1300 300 552 WEBSITE www.securitysolutionsmagazine.com EMAIL enquiries@interactivemediasolutions.com.au WEBSITE www.securitysolutionsmagazine.com DISCLAIMER The publisher takes due care in the preparation of this DISCLAIMER magazine and takes all reasonable precautions and
The publisher takes due care in the preparation of this makes all reasonable effort to ensure the accuracy magazine and takes all reasonable precautions andof material in effort this publication, butaccuracy is not liable makes allcontained reasonable to ensure the of for any mistake, misprint omission. but Theispublisher material contained in thisor publication, not liable does notmistake, assume any responsibility or liability for any for any misprint or omission. The publisher loss or damage which may result from any inaccuracy does not assume any responsibility or liability for any or omission in this publication, orfrom fromany theinaccuracy use of loss or damage which may result information herein. The publisher makes or omission contained in this publication, or from the use of no warranty, express or implied to any of the information contained herein.with Therespect publisher makes no material contained herein. warranty, express or implied with respect to any of the material contained herein. The contents of this magazine may not be reproduced in ANY form in OR in part without The contents ofwhole this magazine may not be WRITTEN reproduced permission from the publisher. Reproduction includes in ANY form in whole OR in part without WRITTEN copying, photocopying, translation or reducedincludes to any permission from the publisher. Reproduction electronic medium or machine-readable form.to any copying, photocopying, translation or reduced electronic medium or machine-readable form.
WRITTEN CORRESPONDENCE TO: WRITTEN TO: Level CORRESPONDENCE 1, 34 Joseph St, Blackburn, Victoria 3130 Level300 1, 34 Joseph St, Blackburn, Victoria 3130 1300 552 1300 300 552 enquiries@interactivemediasolutions.com.au enquiries@interactivemediasolutions.com.au
F D
or a little over two decades, I have
by psychopaths”. Of course, there is often just enough
watched the evolution of the security
truth in such reductionist views to enable the holder of
industry with interest. The innovations oes Australia really take security made throughout the technical side of the seriously? Yes, Government claims
such views to some authority that he or she Australian’s doclaim havewith a very relaxed attitude is right; my point being that I do not want to fall to security because they believe, rightly or prey to doing that the same thing here.happen There is here”. no single catch wrongly, “it will never This all, fix all for the operational side of security. Operating is a sentiment we can only hope remains true.
security industry last twenty have been to,over andthe some of the years corporate nothing short ofsector breathtaking. I will notawaste space or demonstrate passing words cataloguing them all, as but the vast interest from time-to-time, whatmajority of the of people reading this will be well familiar with the journey average man and woman on the street? Do from we
margins need to old improve. Licensing should be national, However, as the axiom states, one should training should be standardised and there should always expect the best but plan for the worst and
analogue to digital. Moreover, and ofor equal importance, honestly take security seriously do we, as a
be a national prepare to becertification surprised. for security professionals that as widely recognised as ahave Certified Practicing Ofiscourse, one should not to rely upon
has beenjust thepay explosive growthtoofthe technologies and nation, lip service idea
Accountant for example. But these are allin some form of(CPA), devastating incident to occur
capabilities of security?that have come about as a result of that journey. Quite simply, while pace be andthankful scope of that change As we enter 2018, we the should
extremely complex issues with security many moving parts. order to force people to take seriously.
in the technical side ofsuffered the security industry of the last Australia has never a major terrorist
in technical security is somewhat easier. ThereChange is a great deal that the security industry
incident the has likes of 9/11, the Boston bombings, twenty years been staggering, you could have slept
Make product gives the end-user more can do atobetter educate thethat business community about
the bombings July years 7, 2005 in operational London orside the of the through the lastof twenty in the
the benefits taking security In past bang for his of or her dollar and the seriously. result is simple. In
terrorist attacks ofnot October 2002 in Bali. industry and largely missed12, anything.
issues Solutions Editor-At-Large order Security to maintain my competitive advantage,Rod I need to
However, as talking a result, therisk Australian community I am not about management or other
Cowan has written howproducts. securityChanging can act as keep making newer about and better the
has become somewhat complacent with academic topics and practices that impact on regard the
a differentiator for business and giveofcompanies physical security sector is more a case changing
to security.aspects I often of hear manyWhen of our readers who operational security. I speak about are securitysecurity, managers large corporations operational I amwithin referring to the licensing,
a competitive edge.over many rests in the hands of the culture. The power
comment onand theemployment differencesofbetween procurement personnel,attitudes from to security in Australia and where guards to crowd controllers to America, consultants and sothey on.
If we learned from tragic few – thehave politicians andanything procurement departments in events that have occurred globally in recent large organisations for starters. The only way to effect years, it must be that has changed – change is to make it sothe thatworld the people who hold the
often have to travel work. many Furthermore, I am and referring to According the manner to in which security managers, Americans understand the industry represents itself. Twenty years on, that despite an
permanently – and weso cannot keep pretending power have no choice, it is great to finally see the that it hascoming not. 9/11 was as nota more an isolated incident industry together cohesive unit to drive
terrorism is aamount clear and present danger a extraordinary of effort on behalf of aand significant fact of daily life andmen thus, treatthe security number of dedicated andthey women, industry is
and groupsThe likeone ISISthing have way, such thatifchange. in their the physical security space attacks will become much more There that has changed dramatically overfrequent. the last twenty years
and with the due respect. In still security strugglingworkers to develop its reputation as a profession. contrast, they believe that Australian’s have a It is still struggling to put in place a national licensing very blasé attitude towards security and it is this model. It is still struggling to build value amongst its user attitude that makes us much more vulnerable base that enables organisations to operate on margins to attack. greater than the typical four to six percent. Margins this In my opinion, having recently travelled slim not only fail to provide the kinds of remuneration through Egypt and Jordan, they are correct. and working conditions that men and women of security
is is a great deal of more workassociations to be donealltotrying ensure the number industry to carve
deserve, it could be reasonably argued that such minimal
louder the noise, the greater the chance of being heard.
margins encourage illegal and unethical practices.
It is only when you are heard that people understand
What is more, if any one of the myriad of companies
what you want. And if you can deliver your message
engaging security services was to suddenly find that its
with enough force and conviction, and also have the
operating margins had reduced to between four and six
numbers to create very real consequences for the
percent, it is more than likely that organisation would
people with whom you are speaking, then finally, you
declare itself insolvent and close down! Yet those same
are in a position to begin to effect real change.
that we create the kind of effective security out their own slice of the pie. In this rare instance, more culture within organisations and the broader is not better. The reduction in the number of approved community that will enable Australian’s to be industry associations is, in my view, a good thing. safe and secure. And the work must begin with The greater the number of industry members security professionals. Let’s make 2018 the year represented by the fewest industry bodies the better. that Australia begins to take security seriously. n The more people in one room shouting at once, the
I feel that we are finally approaching that tipping
organisations expect their security providers to operate on these ridiculously slim margins, while having the
point. If nothing else, this was represented last month
actual temerity to ask if they can do it any cheaper!
when the Australian Security Industry Association Limited (ASIAL) teamed up with the Outstanding
ON
O SSOCIATI RS A ON DE O VI
SECURIT Y
PR
O
SSOCIATI
RALIA LTD UST FA RALIA LTD
Official Official Partners Partners
reduce extremely complex situations down to single
Performance Awards and Australian Security Medals
issues. This supposedly makes it easier for the public
Foundation to recognise the amazing things being
to engage and respond, which in turn drives ratings,
achieved in the industry. This is the kind of momentum
viewership, readership and, ultimately, advertising
that brings about real change in the areas that
revenue. Examples include “Migration increases the
matter. Who knows, with enough voices all speaking
risk of terrorism” or “Mass shootings are perpetrated
as one, we might yet see some real change. n
O rigin a l Siz e Original Size
PR O
Y P R OV RYI TP R O V I D I D E E RCIUT
CU
SE SE
SECURITY
N
USTRA F SAT R A L L I A A OU IA
STRALIA LTD AU OF STRALIA LTD AU
SECURITY
O C I AT I ASS ON O C I AT I ASS O
RS
SPAAL SPAAL
OF
OF
PR O
RS
SSOCIAT RS A IO DE N SSOCIAT VI RS A IO DE N VI
D LT D LT
SECURIT Y
PR
RS A DE VI
UST FA
O
The media has a terrible propensity to try to
blue colour changed to this colour green. blue colour changed to this colour green.
John Bigelow
COPY/ARTWORK/TYPESETTING APPROVAL COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE Please proof read carefully of this material BEFORE signing your approval to print.ALL Please paycopy/artwork/typesetting special attention to spelling, punctuation, signing your approval numbers, to print. Please pay special to spelling, punctuation, dates, times, telephone addresses etc, asattention well as layout.It is your responsibility to dates, times, telephone numbers, addresses etc,Press as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman assumes no responsibility our attention anybeen corrections. Minuteman Press assumes responsibility for bring errorstoafter a proof has authorised to print and print re-runsno will be at your cost. for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................ Signed.................................................................. Date........................
John Bigelow
Editor
Editor // SECURITY SECURITY SOLUTIONS SOLUTIONS 66 //
securitysolutionsmagazine.com securitysolutionsmagazine.com
FIRST AUSTRALIAN MADE PAS68 SHALLOW MOUNT BOLLARDS BOLLARD RATINGS
PAS68 rated bollard with ‘ZERO’ penetration
CSG10840 PAS68:2010 V/7500(N2)/64/90:0.0/17.9 ‘ZERO’ penetration CSG10850 PAS68:2010 V/7500(N2)/80/90:2.8/9.8 Articulated linkage not only allows for each bollard unit to accommodate gradients up to 3.6°, but allows for convex and concave arrays
Available in galvanised finish or fitted with stainless steel sleeve, can be painted in different colours LEDA has been at the forefront of designing, manufacturing
LEDA shallow mount bollards install
and installing crash rated bollards for more than 20 years protecting Australian people and its assets. LEDA’s CSG10840 and 10850 are the first Australian manufactured PAS68 rated shallow mount bollards that requires a foundation depth of only 200mm.
Shallow mount bollards around tree roots
The growing demand to install bollards in CBD locations often means encountering sub-pavement services which may need to be moved or relocated to accommodate conventional concrete footings. In many instances it may be impossible to obtain the required footing depth or to maintain the impact rating needed. This situation has driven LEDA to manufacture its own PAS rated shallow
Shallow mount bollards around existing underlying services
mount bollards providing cost and lead time savings to clients as well as supporting Australian manufacturing.
FOR MORE INFORMATION Contact your nearest LEDA sales office or visit our website www.ledasecurity.com.au
Follow us
Call 1300 780 450 Email sales@ledasecurity.com.au
LEADERSHIP BY JASON BROWN
T
he International
milestones have been passed so far
Standards Committee
(http://www.isotc292online.org/
– Protective security – Guidelines
managers of facilities involved in
(TC 292) responsible
about/history/).
for the development of a security
societal security, non-government
plan for an organization (led
organisations and societies
by France)
representing citizens’ interests.
for standards in the
• ISO 22342 Security and resilience
security equipment or solutions,
area of security and resilience has
Current Structure
completed its seventh plenary
ISO/TC 292 currently has the
WG6 has developed a road map
meeting, successfully held
following organisation:
to guide future security standard
– Working Group 8: Supply chain
in Bangkok.
• Working Group 1: Terminology
development and is open to
security – has been established
• Working Group 2: Continuity and
additional experts from Australia.
and is responsible for drafting
Possible future work areas for WG6
standards in the area of security
may include, but is not limited to:
management and the supply
• Treatments to reduce risk of and
chain. The current project is the
From 8–13 September, ISO/TC 292 held its seventh plenary meeting together with all its working groups. The meeting was hosted by TISI Thailand and, once again, became
organizational resilience • Working Group 3: Emergency management • Working Group 4: Authenticity,
the biggest meeting in the history of
integrity and trust for products
the committee, with a participation
and documents
of over 150 delegates representing almost 30 countries and several liaison organisations.
• Working Group 5: Community resilience • Working Group 6: Protective security
About ISO/TC 292 To remind forgetful readers and new subscribers, ISO/TC 292 was established on 1 January 2015 and is a committee with over 60 involved countries and international
• Working Group 7: Guidelines for events • Working Group 8: Supply chain security • Working Group 9: Crisis management
agencies such as the United Nations
• Joint Working Group 1: Managing
(UN) and ASIS International. It works
emerging risk (joint work with
with standardisation in the field of
ISO/TC 262)
from malicious acts • Development of security risk models • Managing protective security programs and systems: security management, private security,
In addition, a new working group
review of ISO 28000 Security and resilience – Security management system for the supply chain – Requirements and supporting supplementary standards. All Australians with a desire
security review and audit,
to participate in this and similar
conformity assessment, managing
work for Australian Standards
security related risk, reporting
should feel free to contact myself
• Security incident management:
or the magazine. Those who have
investigations, response and
already expressed an interest will
remediation, classification
be followed up over the next few
if incidents, mitigation, case
weeks. n
management, recovery • Physical protective security:
Jason Brown is the National
physical controls and materials,
Security Director for Thales in
security to enhance the safety and
• CG: Communication Group
access control systems,
Australia and New Zealand. He is
resilience of society. The committee
• DCCG: Developing Country
protection of physical assets
responsible for security liaison
is responsible for more than 20 published International Standards.
Cooperation Group • UNCG: UN Cooperation Group
The scope of TC 292 is
• Personnel protective security:
with government, law enforcement
investigations, vetting/screening/
and intelligence communities to
personnel assessment/security,
develop cooperative arrangements
standardisation in the field of
Of most interest for readers is
aftercare, security awareness and
to minimise risk to Thales and those
security to enhance the safety and
Working Group 6: Protective security
training, identity assurance, token
in the community that it supports.
resilience of society. There are some
(WG6). This working group is
verification and authentication
He is also responsible for ensuring
exclusions, such as sector-specific
responsible for drafting standards
and access, security culture
compliance with international
security projects developed in other
in the area of protective security,
relevant ISO committees and projects
• Information (tangible) protective
and Commonwealth requirements
which is the framework, policies and
security: security elements of
for national security and relevant
developed in ISO/TC 262 and ISO/
processes implemented to identify,
information lifecycle, system for
federal and state laws. He has served
PC 278. Liaison is established
respond to and reduce the risk of
handling tangible information
on a number of senior boards and
with other committees to ensure
harm from malicious acts.
alignment of effort, particularly in
Their ongoing projects are:
governance and methodology,
Security Professionals Australasia;
risk management, cybersecurity
• ISO 22340 Security and resilience
electronic and audio counter
member of ASIS International
– Protective security – Guidelines
measures and investigations
Standards and Guidelines
and governance.
• Surveillance: surveillance,
committees, including Chair of the
for security architecture,
WG6 needs more experts with
Commission and Chair of Australian
History
framework and controls (led
management and operational
Standards Committee for Security
ISO/TC 292 was established on 1
by Australia)
expertise in the work areas
and Resilience. As of February 2017,
identified above, drawing
Jason has been appointed Chair
January 2015 and has since then
• ISO 22341 Security and resilience
achieved quite a lot for a newly
– Protective security – Guidelines
from professional experience
of the International Standards
born committee. Read more about
for crime prevention through
in organisations such as civil
Committee for Risk Management.
the history of TC 292, which goes
environmental design (led
protection, law enforcement
Jason can be contacted at jason.
back to early 2000 and what major
by Korea)
agencies, companies providing
brown@thalesgroup.com.au
8 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
The Missing Link in an
Access Control System
Geoff Plummer Executive Business Manager - Davcor Group
On entry to most of the major capital city CBD buildings you are confronted with a host of access control initiatives to govern who is allowed and who is not allowed access. Be it the presentation of your card to a reader to open a turnstile, activate the lift or trigger an automatic door; access is controlled in an efficient and easily managed way and our security programmed brains believe that all is good.
I pose a question. How many of these doors/lifts/turnstiles have a mechanical key override? The answer is many, not all, but many.
I would then need to pose another question. Are the mechanical keys secure? Are the keys stored in a secure place and are not lost? Also, are they secure from attack and duplication? Remembering that many keys can be visually read and even reproduced from a photograph. The answer is as soon as they are in a person’s hand that the keys can be compromised by copying, duplication or even 3D printing.
My observation is that at many sites, extremely effective and costly access control systems are installed. These systems are hugely effective in monitoring and controlling access to the building however many of these systems have a very basic weak point that allows the whole system to be compromised. The chink in the armour is,
They are fitted with a conventional mechanical cylinder. This cylinder has no audit trail, can be in many cases mechanically manipulated (picked). Added to which any access to a key by an unscrupulous person can result in it being read, impressioned (in the way of an impression into a soft material) or photographed and 3D printed. So now what? A solution is available. Install an electromechanical key system such as EKA CyberLock. EKA CyberLock makes a range of cylinders to suit most common locks in the Australian market. The Cylinders are opened with CyberKeys, both of which are managed using software in the same way as an access control system. The management software allows access to be granted when and where, or simply timed out or even revoked when required. CyberKeys are programmed through Communicators such as a smart app and Bluetooth and a 20-key vault cabinet. The entire system can be audited and to make it even simpler can potentially be integrated with your existing access control system.
EKA | CyberLock - Division of Davcor Group Pty Ltd. 1300 722 311 - WWW.EKACYBERLOCK.COM.AU
LEGAL
WORKPLACE SAFETY AND CONTRACT SECURITY PROVIDERS
BY DR TONY ZALEWSKI
Taking Reasonable Care An employer’s duty to take reasonable care to avoid a foreseeable risk of injury is wellknown. In determining the potential for liability, it is usually enough if the circumstances reveal injury to an employee was a possibility that would have occurred to a reasonable employer. This includes matters such as inattention or misjudgement in common work functions by an employee, hence the importance of appropriate induction, training, supervision and protocols. Reasonable care is not a guarantee of safety and some Australian cases have emphasised the need for employees to take personal responsibility. Australian Standard for Guard and In addition to any formal
security provider work closely
Patrol Services
released by the
agreement between the parties
to minimise security and safety
The Australian Standard AS4421:2011
Australian Bureau of
and express conditions regarding
risks. In addition to a formal risk
Guard and Patrol Security Services has
Statistics, over
safety, it is also implied in a
assessment and risk treatments,
been adopted by regulators and the
700,000 Australian employees
contract of employment that
employers can further minimise
security industry as an appropriate
suffer some sort of work-related
security providers take reasonable
risk by:
guide to minimum operating
injury or illness each year. Some
care for the safety of their
• introducing operational safety
standards for providers of security
work is inherently more hazardous
employees. There are many
strategies for staff carrying
services. The standard reinforces
than others, including the various
resources available to assist
out work without exposure
concepts of taking reasonable care
roles performed by operational
providers in minimising risks
to unnecessary risk, such as
including, amongst other things:
security staff across high-risk
associated with the safety of
protective ‘zones of control’
1. Unless declined by the client,
sectors and within public-
staff and others in and around a
facing environments.
workplace; this article will discuss
foreseeable, unusual or possibly
client’s premises be conducted
some of those resources and
unexpected risks that might arise
by a competent person who
methods for minimising risk.
in the workplace
highlights the various strengths
A
ccording to figures
It is not uncommon for security services to be provided to
• warning staff and others of
• instructing and further
government departments through
a protective risk review of the
and weaknesses of the system
a contract security firm; in fact
Responsibilities for Workplace
developing staff in the
and what has to be done to
it has become the norm in most
Safety
performance of work where
provide reasonable protection
government settings. The process
Government agencies that utilise
instructions might reasonably be
is usually formalised through a
contract security providers have
thought to minimise the risk of
contract for security services where,
a non-delegable duty of care to
amongst other things, safety of staff
all persons in and around the
Further to this shared responsibility,
communicated to security
and the protection of workplace
workplace. In most contracted
contract security providers also owe
officers at the time of despatch
assets is a key responsibility for the
security environments, the
a duty to take reasonable care for
or deployed to site (Section
contracted security provider.
government agency and its
their staff.
2.6.2).
10 // SECURITY SOLUTIONS
danger and injury
(Section 2.6.1). 2. Where site risks are identified, records shall be kept and
securitysolutionsmagazine.com
Resources that Assist to Enhance
Common Problems
4801:2001 OH&S Management
agreement between the parties
Safety
Problems arise for employers
Systems and AS4421:2011
(Section 2.7).
There is a plethora of
when they do not adopt
Guard and Patrol Security
information freely available to
appropriate practices, align with
Services, should be reviewed to
shall formulate assignment
assist employers in enhancing
standards and guidelines or do
assist employers to adopt and
instructions for the effective
workplace safety, including
not regularly review their safe
operationalise a system that is
security of the site, dealing
online advice by safe work
work system. Problems that are
evidence of a reasonable standard
with emergency procedures,
regulators. For example,
typical when there have been
of care.
lines of communication and
Safe Work Australia has a
incidents involving alleged safety
accountability. The assignment
number of resources on risk
breaches include:
should work with their clients
instructions should be agreed
minimisation in the workplace.
• an absence of or a deficient
to develop a system of work
between the parties (Section
The NSW WorkCover publications
safety policy, plan or
that aligns with industry best
2.8).
Occupational Health and Safety in
procedures
practice. Addressed correctly,
3. A clear written contract or
4. The company (security firm)
Security industry employers
Most providers of security services
Hospitality (2003) and the guide
• poor workplace supervision
such practices will meet the safety
align closely with the standard and
Violence in the Workplace (2002)
• no additional professional
needs of employers, employees
in many cases exceed the minimum
assist employers in understanding
development training to
and others in and around various
requirements by introducing
risk issues for particular sectors
progress the safety culture or
workplaces. It will also ensure a
additional services such as
or work functions. Other
competence of workers
more productive and profitable
regular meetings about operating
states and territories also
performance, debriefing after
have similar publications, with
incidents, system reviews to enhance
additional guidance through
the system of work and data analysis
Australian standards such
relating to operational performance.
as AS/NZS 4801:2001 OH&S
Although alignment with the standard
Management Systems.
• failure to adjust the system of
operation. n
work from other incidents or near misses • poor, deficient or dated risk assessments
For over 20 years Dr Tony Zalewski has provided expert security reports to courts in all Australian jurisdictions. He has four
Conclusion
degrees, including a law degree,
adopt various methodology and
Workplace safety programs need
from Australian universities and has
adopt the recommended practices
recommendations in relevant
to be carefully thought through.
worked on over 500 cases, including
as outlined within the standard. This
guides to minimise risk in the
They must be developed or further
some of Australia’s leading security-
approach minimises risk and provides
development of their formal
contextualised in consideration of
related civil actions. He also provides
some evidence that a reasonable
(documented) security/safety
the operational work environment.
advice about security across industry
approach to care has been taken by
systems minimise a broad range
the employer.
of operational risks.
is optional, it is common industry
Typically, employers who
practice for security providers to
securitysolutionsmagazine.com
Various standards and guidance materials, including AS/NZS
sectors and is a security adviser to governments locally and abroad.
SECURITY SOLUTIONS // 11
CYBER SECURITY
STANDARDISING YOUR INFORMATION SECURITY FRAMEWORK BY TIM RIPPON
W
What are the Basics of an ISO Standard?
1.6 Information security policy
frameworks to set out how to operate in an
All ISO standards are based around
1.8 Statement of applicability
efficient and effective
a fundamental Plan-Do-Check-Act
e all use various
1.7 Risk assessment
manner. Cybersecurity and
(PDCA) approach, also known as the
2. Do
information security should not be
Deming Cycle. It is an iterative cycle
2.1 Information security strategy
any different – there are many great
that helps to build the maturity of
2.2 Document management
frameworks available, some quite
the framework or, in ISO terms, the
2.3 Design of controls & procedures
easy to follow, some very technical
management system.
2.4 Communication
and others are used for
Planning is important for
2.5 Training and awareness
understanding the organisation
2.6 Implementation of controls
intellectual property and valuable
defining the scope of the
2.7 Incident management review
information secure.
with many frameworks in attempts
management system, setting
2.8 Operations management
to standardise information security.
policy, investigating risk appetite
Some standards work well, while
and determining what risks exist.
3. Check:
or consultant can be the first step
others can cause more harm
The doing is key, where strategy
3.1 Monitoring, measurement,
to enhance your capabilities in
than good, as they may have not
is set, controls and procedures
analysis & evaluation
order to develop and implement
been effectively worked out in
are defined and the competency
3.2 Internal audit
an effective and efficient ISMS,
the first place, or they are more
of people is addressed by way
3.3 Management review
with the next step educating your
suited to academia than real-
of communication, training
2.5 Training and awareness
executives about this initiative
world situations.
and awareness. Checking is
2.6 Implementation of controls
in order to protect your valuable
specific industries. Over the years, I have worked
Some really good interoperable
A simple conversation with your information technology staff
fundamental to ensure integrity
corporate data from internal and
global standards have been
of the management system. This
4. Act:
produced since 1947 from
is done by way of monitoring,
4.1 Treatment of non-conformities
the International Organisation
measurement, developing an
4.2 Continuous improvement
for Standardisation (ISO),
internal audit approach and having
headquartered in Switzerland. The
effective management reviews
ISO defines rules and standards to
in place. The final component is
aid in tasks for virtually all products
acting on the audit findings by way
that people use, including rules
of treating non-conformities and
and stakeholders with confidence
Master of Business Continuity (ISO
and standards about how products
looking at ways to continuously
in how you manage risk related to
22301) and Lead Cyber Security
are made and how quality control
improve and evolve the
information security. Additionally,
Manager (ISO 27032) from PECB.
tests should be performed. This
management system.
it provides senior management
Tim is actively involved in various
involved in information security
industry groups, including the
with an efficient management
Australian Women in Security
process. It can offer a competitive
Network (AWSN) and the Business
advantage due to customer trust
Continuity Institute, where he
are in place to review and update
The ISO 27001 Information Security Management System (ISMS)
and market share. From a regulatory
volunteered for five years, including
these standards on a regular
A structured PDCA cycle approach is
aspect, it demonstrates compliance
two years being a board member of
basis, typically every three to five
used and the following components
with customer, regulatory and
the BCI Australasia. Tim is founder
years. These committees call out
are required:
government requirements. The
and director of elasticus, advising
to industry groups and thought
1. Plan
ISMS can help to align information
Australian-based executives on
leaders for input, so you can be
1.1 Initiating the ISMS
security with the organisation’s
how to best manage cybersecurity,
assured that a strong vetting
1.2 Understanding the organisation
objectives and can enhance
disaster recovery and business
process has taken place of the
1.3 Analyse the existing system
integration between business
continuity prior to the occurrence of
information contained within
1.4 Leadership and project approval
operations and information
a major disaster or crisis. He can be
these standards.
1.5 Information security scope
security. Importantly, an ISMS keeps
contacted via mobile 0417 036 026.
is brilliant for cybersecurity and information security in the modern, online world. Global ISO technical committees
12 // SECURITY SOLUTIONS
external threats. n Tim Rippon is an author, speaker and trainer of cybersecurity and
The Benefits of Implementing an ISMS
business continuity. He holds a
An ISMS provides customers
Security (ISO 27001), certified
certified Master of Information
securitysolutionsmagazine.com
HUMAN RESOURCES
OVERTIME ALLOCATION IN THE AUSTRALIAN SECURITY INDUSTRY: UNITED VOICE VS WILSON BY GREG BYRNE
A
recent decision in the Federal Court
(ii) 114 hours within a roster cycle not exceeding three weeks;
involving Wilson
(iii) 152 hours within a roster cycle
Security and the
not exceeding four weeks; or
United Voice Union, a large Australian trade union with a
(iv) 304 hours within a roster cycle not exceeding eight weeks.
The Federal Court
However, when overtime is
The Federal Court deliberated on
worked within a week or roster
one single question – whether
cycle spanning more than one
overtime could be paid on hours
week, overtime can be moved to
worked before the limit on
different places within the period.
ordinary hours was reached. It was
This decision created far more
concluded that it could.
flexibility in the security industry in
membership in excess of 130,000
During the decade prior to 2018,
members, including Australian
Wilson ran a fixed monthly
security guards, has ramifications
rotating roster. During that period,
“Overtime hours are hours that
for owners, managers and
staff were rostered 152 hours (as
are worked in addition to ordinary
employees of security companies in
per the award – see (iii) above),
hours”, but “rostering arrangements
security industry were now able to
Australia. The decision has clarified
plus an additional 16 hours
are within the discretion of the
move overtime to hours that would
the issue of allocation of overtime
overtime. Prior to October 2016,
employer. Consistently with the
otherwise attract penalty rates. The
for guards on fixed rotating rosters.
these overtime hours were worked
existence of this discretion, the
decision effectively reduced labour
during the last two shifts of the
award does not contain any express
costs by eliminating penalties and
Background
month, at the regular overtime
restrictions on the exercise of that
reducing superannuation premiums.
In early 2018, the Federal Court of
rates (see above).
power”. And further that, it was at
Because the Full Federal Court’s
the discretion of the employer “to
observations were not just founded
Australia heard a matter between
On or around 31 October 2016,
The Federal Court found,
the allocation of overtime that had previously been the case. Employers in the Australian
the United Voice Union and
Wilson altered the arrangements so
decide whether overtime hours can
in the Security Award, the effect of
Wilson Security, one of Australia’s
paid overtime was no longer worked
be included in the roster at a point
the union’s appeal to the Full Court
largest security companies. The
on the last two days of the month,
before which all ordinary hours
is that the decision now affects
arrangements between Wilson
but instead on one of the Sundays of
have been worked.”
all employers and employees in
and its employees is covered by
the month.
It should be noted that this
Australia. This is, of course, provided
decision was made having regard
the Award or Agreement is similar to
a 100 percent penalty rate on
to the provisions of the Security
the Security Services Industry Award
Sundays, Sunday hours did not
Award and, as such, its meaning was
in so far as it relates to the definition
that overtime is to be paid at a rate
exceed the limit on ordinary hours
restricted only to the Australian
of ordinary hours.
of time and one-half for the first
imposed by the Award. Further, it
security industry.
two hours, and double time for
did not require employers to pay
every hour after that, and payable
a penalty on a penalty (that is,
Decision Appealed
as follows:
overtime plus the Sunday rate) –
The union appealed to the Full
How should the Australian Security Industry Move Forward?
(a) The ordinary hours of work are
this resulted in Wilson avoiding
Court of the Federal Court of
This decision will allow for some
38 hours per week or, where the
paying the overtime loading and,
Australia. The Full Court of the
employers to reduce labour costs
employer chooses to operate a
because superannuation, annual
Federal Court dismissed the appeal
through overtime allocation. However,
roster, an average of 38 hours per
leave and personal leave were
stating that overtime is time “over
all employers are strongly advised to
week to be worked on one of the
paid only against ordinary time,
ordinary hours, not necessarily after
seek independent legal advice on this
following bases at the discretion of
they minimised these entitlements
ordinary hours”, explaining that
issue prior to moving to attempt to
the employer:
as well.
where overtime is paid against a
adjust overtime hours in such a manner
single shift, it ought to be paid on
as to reduce costs in the way Wilson’s
the last hours worked.
did as outlined in this article. n
the Security Services Industry Award 2010. Clause 21.1 of the Award states
(i) 76 hours within a roster cycle not exceeding two weeks;
14 // SECURITY SOLUTIONS
As the Award provided for
Not surprisingly, United Voice Union appealed to the Federal Court.
securitysolutionsmagazine.com
Smart Vehicle Identification
Photos credits: Shutterstock - aressy.com 04/18 - 10917
New Spectre reader: Let the good go, kick the bad out. Without delay. Meet the challenge of fast-track security at your vehicle gates. Spectre’s UHF-based vehicle ID reader is the first of a new generation: discreet by design, flexible in its configuration, secure and encrypted in its communication. Our new long-range reader is built to perform for up to 4 driveways, even in highly challenging environments. It’s the most robust reader on the market, yet intuitively easy to use. Welcome to speed and security - in a single solution.
SCALABLE | SMOOTH | SECURE | AGILE | STEALTH | INSTINCTIVE
www.stid-security.com Security Meetings Trophées de la sécurité Expoprotection ISC West APS
RISK MANAGEMENT
THREATS AND RISKS
BY AMI TOBEN
To mitigate a threat, on the other hand, is to combat the active harm itself, which is the definition of reactive or countermeasures. This is where you will find emergency procedures (evacuation, shelter in place, run-hide-fight), apprehension and arrest, along with full-on armed response (eliminating the threat). Now, keep in mind that there are no right or wrong strategies here, it is just a question of fitting your
W
hat is the difference
operations, the environment and/
between risk and
or property.
threat? It is a simple
A good way to understand the dynamic here is to use the formula:
Risk: Potential for an unwanted
mitigating actions to the situation and to your defined goals. But anyone who has been following
very common terms used in the
incident, event, or occurrence, as
Threat + Vulnerability = Risk to Asset
security industry, but one that more
determined by its likelihood and
The risk to an asset is calculated
mitigation and therefore have my
people need to ask themselves. As
the associated consequences.
as the combination of threats
own biases in favour of it.
question about two
outcome resulting from an
a result of not doing so, too many
And, just for good measure:
and vulnerabilities. This means
security professionals end up using
Vulnerability: Physical
my blog will know that I happen to live deeply within the realm of risk
I hope this article can help clear
`
j
v
that in some situations, though
up some of the terminology that
`j
risk and threat (and occasionally,
feature or operational attribute
threats may exist, if there are no
gets tossed around out there. But
jv
vulnerability too) interchangeably.
that renders an entity open to
vulnerabilities then there is little
keep in mind that the actual bottom
This is why you end up with risk
exploitation or susceptible to a
to no risk. Conversely, you can have
line is the work itself, and the
management specialists providing
given hazard.
a vulnerability, but if there is no
safety, security and wellbeing of
To put things in even simpler
threat, then you also have little
everyone involved.
threat management professionals
terms: Threat is the potential harm
to no risk. Either way, the most
providing risk assessments.
that can come to an asset (the thing
important factor we are trying
with me on anything I have said,
Confused yet? If not, which do you
you are trying to protect). Risk is
to calculate, manage and control
I would be most grateful for
think is better: risk management
the likelihood that the harm will
is risk.
your comments, questions and
strategies for threat mitigation, or
be realised. Vulnerability is the
threat management strategies for
weakness by which the harm can
consider is what happens when
risk mitigation?
reach the asset.
we inject into the mix the all too
threat assessments, alongside
Another important thing to
As always, if you beg to differ
suggestions. n An experienced security director,
From my own perspective, the
familiar term (at least for security
consultant, trainer, operator and
you get the point. So, let us try to
most important thing to calculate
professionals) of mitigation – the
business developer, Ami Toben
sort through this mess. The place
and assess is risk, not threat. Yes,
action of reducing the severity,
has over 14 years of military and
to start is by understanding the
we can talk about levels of threat
seriousness, or painfulness of
private sector security experience,
proper definitions of the terms
(and agree that, say, a truck-bomb
something. To mitigate a risk is to
and a successful record of providing
used. Now, there are different
has more destructive power than
target the probability of a threat
full-spectrum, high-end services to
sources that can give you different
a hand grenade), but what we
being realised, which is to say that
Fortune 500 corporations, foreign
definitions, but the source I have
really want to know is how likely
you make it less likely to happen.
governments, foundations, non-
stuck to for some years now (and
we are to encounter each of them,
This is pretty much the definition
profit organisations and wealthy
the one I would recommend) is the
that is, risk. A threat assessment
of preventive measures, and is
individuals. Ami is currently director
US Government’s Department of
should tell you if an earthquake
where you will find property and
of consulting, training and special
Homeland Security.
will be more destructive than an
access control, circles of security,
operations at HighCom Security
armed attacker. A risk assessment
deterrence by appearance,
Services, a US-based high-end
occurrence, individual, entity, or
should tell you how likely it is
visual control, EP advance work,
security firm specialising in
action that has or indicates the
for your assets to be harmed by
protective intelligence and
protective services, security systems,
potential to harm life, information,
said threats.
surveillance detection.
consulting and training.
I can keep going, but I think
Threat: Natural or man-made
16 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
`v
`jv
h
THE ALL-NEWTXF-125E BATTERY OPERATED QUAD BEAM Introducing the eagerly anticipated TXF-125E; a high performance Quad Beam sensor designed for battery operation - perfectly suited for rapid deployment in creating temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service.
NEW!
ACTIVE IR BEAMS The ultimate in trouble free perimeter detection for distances up to 200m outdoor / 400m indoor.
+61 (3) 9544 2477
email: oz_sales@takex.com
HIGH-MOUNT PIR Triple mirror optics for maximum detection performance at 2 to 6m.
BEAM TOWERS Rugged floor and wall mounted enclosures in 1/1.5/2/3m heights.
INDOOR PIR Spot, 360°, wide angle, and curtain detection from 2 to 4.9m height.
OUTDOOR PIR Hard-wired or battery operated outdoor PIR up to 180° x 12m .
1300 319 499 csd.com.au www.takex.com
TAKEX AMERICA
VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta
COMMUNICATION
HOW INTRODUCED CRISES THREATEN BRAND REPUTATION BY TONY JAQUES
I
t is a fact that about
the unwarranted association will
done and the racist label gained
three quarters of all
likely persist for years.
enormous exposure.
organisational crisis are not sudden
The latest victims of such an
Or consider the high-profile
• respond consistently as often as required to dispute the claimed link
introduced crisis are innocent
drug companies which got dragged
unexpected events, but follow red
businesses in Hong Kong, which
into the death penalty debate
with effective material to
flag warnings which could have, and
recently found themselves caught
and had to block their brands
be used with customers and
should have, been identified in
up in pro-democracy protests.
from being used in executions by
advance. But there is an emerging
China has put heavy pressure on
lethal injection.
class of events I call ‘introduced
high-profile companies – which are
crises’ – where reputational risk is
seemingly not in any way complicit
case when was falsely accused of
Most importantly, responding
instigated by external events, often
– to support the Chinese line and
sponsoring dogfighting. It arose
to an introduced crisis demands
social media driven, over which the
sanction staff who attend the
from a photograph of a dogfight at a
balance; balancing the need to
company or brand has little control
demonstrations. They even forced
nightclub in Mongolia years earlier
state the facts against the risk of
and usually no warning.
the British CEO of Cathay Pacific
where Heineken posters appeared
giving oxygen to groundless claims
Airline to resign.
in the background, left over from
and balancing the need to respond
an earlier promotion. The brewery
against continuing to repeat
A prime example is when American white supremacists
However, introduced crises
Then there was the notorious
• provide managers and staff
stakeholders • monitor and respond to misstatements on social media
staged a torchlight march in the
which damage brand are not new.
announced it had nothing to do with
the false link. It is self-evident
glare of what were described as
Think of the brand impact when
the event, but the allegation and the
that a one-off denial is probably
Tiki-torches, and the phrase was
long-standing Subway spokesman
images continued to circulate online.
not enough. But the impact of
constantly repeated for weeks.
Jared Fogle – widely known as the
No thought of course for the unlucky manufacturer, which found itself unwittingly linked to
Given that social media
unwarranted links and introduced
Subway guy – was jailed for 15
has turbo-charged the spread
crises can last for weeks or months
years for child sex offences.
of introduced crises, they are
and the company and brand need to
extraordinarily difficult to
establish a firm foundation to move forward. n
Or when a manager at New
a racist cause. The company made
Balance expressed support for
combat. So, what can companies
its position clear, that Tiki Brand
Donald Trump’s ‘made in America’
do to protect brands which
was not associated in any way
trade policy, and the neo-Nazi
become innocently embroiled
with the events that took place in
website Daily Stormer labelled
in controversy?
Outcomes Pty Ltd, a specialist
Charlottesville and their products
the company’s sneakers “the
• do not underestimate how deep
consultancy for people who work
are “designed to enhance backyard
official shoes of white people”.
and long lasting reputational
in issue and crisis management.
gatherings and to help family and
The company quickly declared,
damage can be
For more articles like this one,
friends connect with each other
“New Balance does not tolerate
at home in their yard”. Sadly, the
bigotry or hate in any form,”
statements denying
Tony can be reached at tjaques@
reputational damage was done, and
but here again the damage was
involvement
issueoutcomes.com.au
18 // SECURITY SOLUTIONS
• issue prompt and firm
Tony Jaques is Director of Issue
visit www.issuesoutcomes.com.au
securitysolutionsmagazine.com
BUSINESS DEVELOPMENT
GETTING COMPARATIVE: GOING FOR YOUR COMPETITOR’S JUGULAR C
omparative marketing
BY STEPHEN JOHNSON
strategies, where you compare your product against competitors,
can be risky but also very powerful in the right circumstances. If you have a genuine and measurable advantage over your opposition, you might have a lot to gain by considering it. It is worth knowing when to use comparative marketing strategies
position. These are important or the
through. If you start blending other
Depending on what you sell,
and how to use them. First, be clear
comparison would not be fair.
campaign agendas you can blur and
sales presentations also allow your
weaken your competitive message.
customer to see a comparison for
about what it is. Making a claim in comparative when you take some
Choosing the Right Comparisons
Advertising
achieve this, it will make a much
specific aspect of your product or
Choose the point of difference you
Most comparative marketing is, in
bigger impact.
service and compare it against those
base your comparison on with care.
fact, comparative advertising. You
of your opposition.
The key is to choose a factor that is
can reach a large audience and make
Social Media
unlikely to change over the lifetime
a big impression by demonstrating
Twitter and Facebook can be powerful
Direct or Indirect
of your comparison. If your prices are
and proving the superiority of what
ways of achieving comparative
There are different ways you can
better than your competitor, keep in
you sell over your competitors.
marketing by recruiting your contacts
get comparative. If you name a
mind that unless you have significant
competitor, you are engaging in
cost advantages, your competitor
comparative marketing because
testimonials. You need to accept that
direct comparative marketing. If you
could change their pricing and
of the very same attributes
the medium can be hijacked, and you
do not name them explicitly, you are
render your campaign ineffective.
that make it so powerful; it is a
are still required to monitor content
broadcast medium, viewed by the
and treat your social media like any
isolation is not comparative. It is
being indirect. It is safer to not be
Another price-related factor to
themselves, directly. If you can
It is also the riskiest form of
to supply the comparisons and the
explicit about who your comparison
avoid is ‘value’. Claiming more value
masses. But if you are accurate
publishing. But you can outsource the
is against. You can do this by de-
than a competitor can be subjective.
in your claims and you compare
content and get greater credibility by
identifying a competitor and still use
Instead, choose something your
the same attribute in the same
getting customers making your claims
their information, but it can be more
competitor is unlikely to be able
context, getting comparative
on your behalf.
compelling to name a competitor.
to change. The quality of the build,
in mass communications is a
the strength of the product, the
powerful strategy.
Prepare to Defend
Apples and Apples
geographic reach of your service, the
Good comparative advertising
freedom to transact in so many ways,
Sales Presentations
if you decide to get comparative,
compares like for like. You can open
or some other factor that should see
Sales presentations are where you
especially in broadcast media, is
yourself up for challenges from
your advantage stay intact.
can make greater comparisons,
that you might need to defend your
and safer comparisons. You still
decision against competitors or
competitors or regulators if you do
Lastly, something to keep in mind
not compare the same attributes or
What to Show
need to toe the line on comparing
regulators. You might be right in your
compare in the same context.
In your comparative marketing,
accurately, but you can more freely
claims but the more effective your
keep your points on facts and
name names. Getting comparative
campaign, the more motivated your
shows a competitor screen being
comparisons. Do not show too much
in sales presentations also lets
competitor is to stop you or to at least
kicked in after three kicks. The
about your competitors and, as
you provide more detail and tailor
rattle the sabre. And regulators will
Crimsafe screen does not kick in.
unusual as it sounds, do not show
your comparison. If your customer
also require you to provide at least
The competitor’s door was installed
too much of your own product or
is already using a competitor, you
some degree of substance to your
by the competitor and the Crimsafe
service being used. The message
can tailor your comparison against
claims. You will need to have these
door was installed later in the same
in your comparison needs to get
that competitor.
at hand. n
A current TV ad for Crimsafe
20 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Prepared to
support you
at every level.
Effective cybersecurity is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And it’s about partnering with a solutions provider who’s prepared to support you at every level. Which is where we enter the picture. We are 100% focused on cybersecurity, and we do everything in our power to mitigate its risks. We have strict requirements for our own products and we work diligently with our partners—and you—to fight this threat.
Learn about our layers of protection at www.axis.com/cybersecurity
THINKING ABOUT SECURITY
A ROSE BY ANY OTHER NAME
BY DON WILLIAMS
W
hat is in a name? Answer: quite a lot, particularly if you choose a name that
• the entity’s protective security practices and procedures • investigating, responding to, and reporting on security incidents”
CSO Organisational Standard (ASIS
and certifications to match
CSO.1-2008). It provides guidance
the requirements of a subject
on position description, required
matter expert. These government
competencies, responsibilities and
CSOs cannot hold peer-to-
already has a specific meaning. In
The CSO must also “ensure
accountabilities, reporting chains
peer discussions with their
this case, chief security officer
personnel and contractors
and leadership considerations,
corporate equivalents. This is like
(CSO). A CSO is a senior position
are aware of their collective
as well as definitions and other
appointing a chief finance officer
within the organisation. While a
responsibility to foster a positive
resources. It is a good reference
with no background in accounting
CSO does not usually sit in the C
security culture, and are provided
if an organisation is looking to
or budgeting.
Suite with the chief executive,
sufficient information and training
create a CSO position.
finance and operations officers,
to support this”. These are
they are probably only a tier or two
reasonable requirements of the
corporate sector, there are
is not a subject matter expert,
lower, alongside the chief risk,
person responsible for the security
many CSOs responsible for
no matter how experienced in
safety, compliance and other
of a government entity.
protecting the assets and
government functions, and who
functions and working with other
can only manage security on a
Government directory (www.
senior managers to assure the
part-time basis, creates false
directory.gov.au/departments-
survivability of the business.
expectations on one side and
specialist managers. Of course, every organisation is different. It is therefore interesting that
The Commonwealth
Within the Australian
To assign the title chief security officer to someone who
the Commonwealth Government’s
and-agencies) shows about
Protective Security Policy
190 departments and agencies,
turning over more than ten billion
Framework (PSPF), Governance
not including the sub-entities,
dollars a year meet on invitation
itself a disservice by selecting
section (www.protectivesecurity.
commissions and others that need
only, in closed-door sessions to
a position title that already had
gov.au/governance/Pages/default.
security. If the previous version of
discuss issues of mutual concern;
meaning and credibility. Perhaps
aspx) requires each “accountable
the PSPF is an indicator, it can be
with due regard of legislated
not everything called a rose
authority” (read department
expected that state and territory
and informal confidentiality
smells as sweet. n
and agency) to appoint a chief
governments will also adopt the
and competitive frameworks.
security officer.
PSFP and its requirement, in which
These are high-level security
case, there will be many hundreds
professionals with a sound
is a recognised thought leader in
must “empower the CSO to make
of government CSOs. The issue
understanding of applied security
security, emergency management
decisions about:
is that these appointed CSOs are
principles and practices within
and related disciplines. His book
• appointing security advisors
senior public servants for whom
their operating environments.
Bomb Safety and Security: the
The accountable authority
within the entity • the entity’s protective security planning
22 // SECURITY SOLUTIONS
The CSOs for companies
false impressions on the other. The Government has done
Don Williams CPP RSecP ASecM
being the CSO is an additional duty.
The government-appointed
Manager’s Guide is available from
ASIS International published
CSOs do not have the experience,
Amazon. Don can be contacted at
qualifications, competencies
donwilliams@internode.on.net
an American National Standard,
securitysolutionsmagazine.com
HFRG AUSTRALIA DEFENSIVE TACTICS INSTRUCTOR PROGRAMS HFRG (formerly PPCT) is best recognized for developing training systems based on documented tactical, legal, and medical research. This unique approach allows HFRG to design training systems that are quick and simple to learn, and easy to retain, while reducing the potential for significant injuries. This combination has become immediately popular with administrators and field officers, for they now have use-of-force training which is reliable and defensible in court. HFRG has become one of the largest use-of-force training organizations in the world training over 25,000 instructors since 1990 and an estimated 40,000 instructors since 1980 throughout the United States, Canada, Mexico, United Kingdom, Saudi Arabia, Hong Kong, and Australia. The HFRG Defensive Tactics System is the first subject control system developed through tactical, legal and medical research. Tactically, the system addresses the most common types of resistance officers encounter, allowing the instructor to maximize training on job related techniques. Legally, the HFRG System teaches a simple use of force continuum that clarifies the appropriate force level for every level of resistance. Medical research was conducted on every HFRG technique to refine technique efficiency and to ensure the medical implications were proportional to the level of resistance. The suite of courses fully satisfies the new RTO requirements and obligations for defensive tactics units including baton & handcuffs, ensuring compliance for the RTO and the trainer with ASQA Standards for: competencies Standard 1.13[a], current knowledge & skills 1.13[c] and professional development 1.16. We are also the only organisation that can offer expert witness support for the skills you teach from our courses by a legal practitioner and industry expert.
CONTACT US TODAY TO DISCUSS YOUR AGENCIES TRAINING NEEDS admin@hfrgaus.com www.hfrgaus.com
EVENTS
PNG Security Congress
• large enterprise systems
robotics and vehicles (UGVs),
2–4 March 2020
• mechanical locking integration
and the various software and
Port Moresby, Papua New Guinea
with electronic security solutions
applications that support them
intelligent living and work spaces. Our 2020 event will feature a Smart Zone designed as a thriving
Now is the time to plan to attend a
• emerging technologies.
world-class security and technology
Visit pngsecuritycongress.com/
has moved to the ISC West show
which presents new technologies
conference and exhibition – PNG
register to register or for more
floor! As the digital and physical
and solutions to help you create
Security Congress.
information. n
worlds collide, it is increasingly
smarter, greener buildings. The new
important for industry
zone offers visitors a dedicated
Security industry specialists and
• Connected Security Expo (CSE)
hub of technological innovation
professionals will converge on Port
ISC West
professionals to protect their
environment to look for integrated
Moresby, PNG, in March 2020 for this
18–20 March 2020
organisations and clients from
and cloud-based solutions to
premier security industry event, with
Sands Expo Convention Center,
both physical and cyber threats.
improve operations and deliver
a security conference and exhibition,
Las Vegas
CSE provides holistic solutions for
business value.
real-world challenges presented and
ISC West is the largest security
today’s connected organisations.
a glimpse into the future of global
industry trade show in the US. At
Working with SIA, ISC West also
IoT technologies will be more
security integration and trends.
ISC West, you will have the chance
features world-class education
pervasive in smart commercial
to network with over 30,000
to learn about every facet of the
buildings than anywhere else over
electronic security and safety
security professionals through
security industry.
the next three years. This zone
solutions for aviation, banking,
new products and technologies
infrastructure, industrial sites, mines,
encompassing everything from
commercial buildings, residential
access control to unmanned
towers, building and development;
vehicles from over 1,000 exhibitors
Total Facilities
and data to better understand and
the best of the best in a world-
and brands.
21–23 April 2020
manage their building performance.
The Congress will feature
class offering: • intelligent CCTV, access control and alarms systems
In 2020, ISC West will
Visit www.iscwest.com for more information. n
According to industry research,
is designed to deliver to visitors industry-class solutions and strategic advice on how to use technology
Melbourne Convention and
offer attendees a host of
Exhibition Centre, Melbourne
attractions, including:
Total Facilities is Australia’s most
• new products and
Visit www.totalfacilities.com.au for more information. n
important facility management
CivSec 2020
technologies, encompassing
event. Explore an Environments
1-3 September 2020
• intelligent traffic solutions
everything from access control
of Excellence and discover the
Brisbane Convention and Exhibition
• asset management systems
to unmanned vehicles
latest and smartest ways our
Centre
built environment can help
Built around major conferences of
event within ISC West focusing
us realise our full potential in
Australia’s key law enforcement
on unmanned aerial vehicles
Australia’s leading showcase of
and policing organisations, the
(UAVs), unmanned ground
high-performing facilities, and
CivSec 2020 International Civil
• advanced video surveillance solutions
• drone capability • software cyber management solutions • innovative video intercoms
24 // SECURITY SOLUTIONS
• Unmanned Security Expo is an
securitysolutionsmagazine.com
Security Congress and Exposition is
IFSEC International
you can adapt to the changing
most innovative solutions to
your gateway event to the growing
19–21 May 2020
tides of tomorrow’s security
the Australian market. For over
Indo-Asia-Pacific civil national
ExCel, London, UK
challenges and equip yourself
three decades, it has been the
security environment. CivSec 2020
Beyond an internationally
with the tools you need to move
largest and most established
will include an industry exhibition,
esteemed product showcase,
forward with certainty.
commercial event for the
supporting a program including:
IFSEC International is Europe’s
• Australia New Zealand Policing
• Network with the global security
security industry in Australia,
centralised gateway to the critical
industry whilst sophisticated
bringing together the entire
Advisory Agency (ANZPAA)
security conversation. Amidst
partnerships and inspiring
supply chain of manufacturers,
PC20 Police Commissioners
mutating threats, the integrated
collaborations kickstart under
Conference
path to achieving global safety
the same roof.
• National Security Science and Technology Centre (Defence Science and Technology) • Corrective Services Emerging Technologies Project Group • Custodial Corrections Working Group • Electronic Monitoring
starts with IFSEC.
Visit www.ifsec.events/
• Access inspiring high-level
international/ for more
panel debates from government
information. n
and industry influencers, conversation between installer,
Security Exhibition & Conference 2020
integrator, end-user and vendor.
22–24 July 2020
and join the collaborative
• Discover the high-quality
Melbourne Convention and
solutions you need whilst
Exhibition Centre, Melbourne
raising your anxieties with the
In 2020, the Security Exhibition
Unmanned Systems
experts behind every innovation
& Conference is returning
CivSec 2020 is a premium
you hope to procure.
to Melbourne.
Conference • Australian Association for
international event with exceptional
• Draw impartial verdicts for
The Security Exhibition &
distributors, security professionals and end-users to connect and create unparalleled business opportunities. The entire team is looking forward to once again reuniting more than 4,500 security professionals with over 150 leading suppliers. The 2020 show is set to see some interesting new innovations as well as a host of new attractions. Make sure you put the dates in your diary. We look forward to
opportunities to reach key driver
security solutions against
Conference is the industry’s
seeing you again in Melbourne in
organisations in this evolving, tech-
rigorous, real-life testing zones,
annual opportunity to reunite for
2020 for the Security Exhibition &
savvy regional marketplace.
including attack scenarios
three days of quality networking
ASIAL Conference!
and surveillance.
and unrivalled education
Visit www.civsec.com.au for more information. n
securitysolutionsmagazine.com
• Research the inspiring ways
alongside a showcase of the
Visit securityexpo.com.au for more information. n
SECURITY SOLUTIONS // 25
FEAUSRE
26 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
THE EVOLUTION OF
THE PROFESSIONAL
Security Industry BY DAN LEVINSON AND KELLY SUNDBERG
Over the past decade, the private
and other professionals, highly
rather, they must be dynamic
Furthermore, when discussing the
security industry has noticeably
advanced threat-centric analysis
professionals who continually
proposed tiered standardisation
become more professional, skilled,
for buildings, sites and campuses,
seek to advance both personally
of security and protective services
responsive and integrated. As
along with advancement in
and professionally.
roles with members of the general
the criminal and security threats
the areas of Crime Prevention
facing the public and private
Through Environmental Design
sectors become increasingly
(CPTED), emergency preparedness
pronounced and complex, and
and response capabilities, and
as the resources of traditional
public, they often are surprised to learn that such a system does
civil liability mitigation. Likewise,
The Need to Publicly Promote Today’s Private Security Industry
law enforcement and police
security consultants and advisors,
Similar professionalisation
tasked with protecting life and
services become increasingly
along with inhouse security
is required at the security
property, and whose frontline
overstretched, the security
directors and managers, have
guard level as well. While
practitioners exercise various
industry has had to quickly
advanced and professionalised
understanding that many of
levels of use of force and at times
position itself as a highly effective
through the completion of
them receive minimal training
carry firearms, it is legitimate
and responsive alternative.
industry accreditation and
and are relatively low paid, there
to ask how this sector came to
Notwithstanding that many
certification programs – many
nevertheless is an expectation that
be governed by a patchwork
jurisdictions around the world
also having completed specialised
security officers perform at a level
of regulations largely based on
have significantly increased
college and university degrees
of professionalism not yet present
anecdotal evidence that differs
the licencing requirements for
in the fields of criminology
within most of the global industry
greatly from one jurisdiction
security services at both the
and security studies. Today’s
– Australia, Germany, Israel,
to the next – at times with the
individual and firm levels, the
private security professionals
the United Kingdom and the
requirements in one jurisdiction
security industry itself has taken
increasingly are expected to
United States are serving as a few
opposing those of another.
on a major role in coming together
supplement their personal
exceptions where private security
through various national and
knowledge and experience
has become highly advanced
it has been the private security
international bodies to raise the
through continuing education
and professionalised.
industry itself that has driven an
profile, quality and capacity of
while also possessing a passion
security professionals.
for learning about the most recent
industry rapidly replacing or
accountability, not the regulator.
updates on case studies, state-of-
supplementing many of the
While there remains much room
revolving around video
the-art equipment, and the most
traditional services delivered by
for improvement, many of the
surveillance cameras and
efficient policies and procedures.
law enforcement and the police,
threats facing the public today
minimally trained security
Simply put, today’s security
the security industry as a whole
are being directly mitigated and
guards have gradually made
professionals cannot rely solely
is quickly realising the need to
responded to by private security
way for tiers of security guards
on their past work experience;
tier and standardise services.
professionals, with traditional law
Old conventions primarily
securitysolutionsmagazine.com
With the private security
not already exist – many in fact insisting that it does. To this point, for an industry that is primarily
Ironically, in most jurisdictions
increase in professionalism and
SECURITY SOLUTIONS // 27
FEAUSRE
enforcement and police services
likely target for a robbery than
religious or institutional, the GBV
design considerations, case-
attending incidents upon notice
a school, but a school may be a
offender is often not deterred
specific policies on procedures
from private security services.
more likely target for an active
by access control measures,
and maintenance, appropriate
Considering the changing nature
shooter then the jewellery
video cameras or even an armed
security equipment and suitably
of public safety and security, it is
store. Recognising this results
law enforcement or security
hired and trained security
advisable that the organisations
in adopting a threat-centric
response. Therefore, for example,
personnel. This methodology is
and associations representing
approach that analyses relevant
when planning security for a
supported not only by research
the industry more actively and
threats on a case-by-case basis and
place of worship, where the
and case studies of security
broadly promote the important
informs which countermeasures
relevant threat of GBV may be
incidents, but also by recent
and quality work their members
will be most effective in every
higher than theft, emergency
jurisprudence. Over the past
are doing to protect the day-
instance. In other words, rather
drills with local police and
few years, duty of care concerns
to-day interests of the public,
than assessing a property as
rapid forms of communications
raised during civil cases against
driving the continued and positive
being under low, medium or high
such as emergency buttons are
property owners and managers
interaction between the industry
risk, a prudent risk analyst and/
significantly more important than
under occupiers’ liability have
and the general public, and the
or security consultant should
a recording camera system.
demonstrated that the courts are
ongoing improvement in industry
first determine which risks are
standards and practices.
pertinent and then assign them
increasingly holding occupiers
Not All Threats are Created Equal
likelihood. One example that highlights significant differences
Different Threats Require Different Countermeasures and the Courts Agree!
Public safety and security
in appropriate countermeasures
An efficient security system must
In other words, when passing
planning must be conducted
is the threat of grievance-based
be planned using an evidence-
down judgements, judges are now
with a view towards every
lethal violence (GBV) – attacks
based approach that is specific
reviewing details such as numbers
stakeholder’s relevant
committed by individuals or
to the building or site being
of security personnel and their
threats. Different properties,
groups of individuals against
protected, meets the unique
response time, and opining
organisations, corporations and
other individuals or groups
needs of the organisation and
on whether the procedures,
individuals are confronted by
subsequent to a grievance,
its stakeholders, and is based on
equipment and training in place
different threats that are specific
whether real or perceived.
trusted research and scholarship.
were reasonable and adequate
to their unique circumstances.
Notwithstanding the motive,
Moreover, it should encompass a
in the property’s operational and
A jewellery store is a more
whether political, ideological,
threat-centric analysis, relevant
contextual circumstances.
with corresponding levels of
accountable for negligent security practices that lead to death or injury resulting from reasonably foreseeable security incidents.
Case in Point: ENMAX In a recent exploratory study of ENMAX – the power generation and utility company that services the greater Calgary, Alberta, Canada region – the benefits and challenges associated with using an evidence-based methodology for an enterprisewide security strategy were examined. Recognising the changing nature of risk to Calgary’s power generation and utility sector, ENMAX hired an expert to assume primary responsibility for the company’s security – in large part tasked with completely transforming the way ENMAX conducts its access control, physical security and other protective services. A key deliverable that emerged under ENMAX’s new approach has been the adoption of threat-
28 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
centric analysis that identifies the
has started to explore the value
through legislation, regulation,
Criminologist, Mount Royal
relevant threats to the company
of adopting a systematic and
industry best practices, peer-
University, Adjunct Professor in
(from irate customers, to copper
evidence-based CPTED) standard
reviewed scholarship or case
Adelaide Law School – University
theft to active assailants) in order
– the SAFE Design Standard®.
law and jurisprudence, security
of Adelaide) Dr. Kelly Sundberg
to properly plan the most apt
By having an independent non-
is becoming increasingly
is a tenured Associate Professor
countermeasures. Consulting
profit organisation (the SAFE
professionalised and evidence
in the Department of Economics,
with ENMAX managers and other
Design Council) reviewing the
based. Stakeholders, clients,
Justice, and Policy Studies at Mount
stakeholders within and outside
physical security of its buildings
consultants, advisors, directors
Royal University (Canada), and
the security industry, ENMAX
and sites (ultimately certifying
and managers generally agree
the President of the SAFE Design
established its new comprehensive
these places as meeting the SAFE
and understand that applying
Council. His research primarily
strategy, which noticeably changed
Design methodology), ENMAX
threat-centric analysis, security-
focuses on crime reduction through
the static posture of the company’s
stands to have great protection
focused building and site design
design, as well as national and
historic security strategy. One
against possible occupiers’
concepts, relevant procedures and
border security.
noted challenge faced by ENMAX
liability. In all regards, the ENMAX
policies, together with appropriate
was achieving consistent security
study supports the value of
hiring and training of security
Director, SAFE Design Council.
guard performance from their
having focused, overarching and
personnel are not only imperative
Dan is a security advisor
third-party provider. To address
comprehensive security policy,
to demonstrating duty of care,
specializing in assessment,
this challenge, ENMAX included
processes and strategy.
but are essential for generating a
analysis and mitigation of security
secure and safe environment for
incidents. He combines 20 years
a stipulation in its contract with
Dan Levinson, Executive
the security provider that guards
Conclusion
residents, employees, customers
of experience as a practitioner in
would receive in-house training
Standardisation, codification
and visitors. As the saying goes:
government, aviation, corporate,
developed and delivered by
and consistency clearly are the
fail to plan, plan to fail. n
and community security, with his
ENMAX and that the company
next logical steps toward the
would have a dedicated cohort of
professionalisation of the private
guards for its sites. Lastly, ENMAX
security industry. Whether
securitysolutionsmagazine.com
research of case studies worldwide Kelly Sundberg (Associate Professor & Environmental
of both tactics employed and the civil litigation that followed.
SECURITY SOLUTIONS // 29
FEATURE
HUMAN CYBERSECURITY BY AMI TOBEN
30 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
I recently had the privilege of
it is. So, what do we do about it?
being invited to the third annual
Well, not much, as it turns out.
Physical and Cyber Threat
Information security experts
Convergence Forum in Phoenix,
seem completely obsessed with
Arizona. I previously wrote what
defining the problem – over and
has become a very well-read
over and over again. Yes, we
article about this important
understand the human factor
initiative. Here comes the
is the biggest vulnerability. It is
next one.
a fact. Got it. Thank you. Why
It was initially surprising
not stop just complaining about
to discover that many in the
it and start developing effective
information/cybersecurity sector
strategies and tactics to prevent
envy us in the physical security
and combat it?
side because our industry is
The only solutions I keep
a) generally effective at what
bumping into are either training
we try to do, and b) quite well
or some flavour-of-the-month,
established, with many years of
flashy silver-bullet product that is
experience. This was surprising to
supposed to be the end-all-be-all
me because the information/cyber
solution. Training usually takes
side of things always seemed so
the form of how to better educate
much more organised and well-
the workforce on cyberattacks
funded compared to us.
and how to get people to stop
Now, since I still fall into the
downloading or clicking on stuff.
physical security side of things
And, in the flashy, silver-bullet
and, as long as this divide still
solution department, artificial
exists (there are some good people
intelligence (AI), in whatever form
working on breaking it down), I
the term is interpreted, seems to
thought I would try to offer my
reign supreme.
info/cybersecurity friends a few
Well, training and nifty new
insights from my experience in
systems are fine. We employ
the physical side.
a good amount of them on the physical side too. And yes, to be
Defining the Problem
fair, training has been shown to
People outside the information
be generally effective in lowering
security sector are usually
click rates and AI can indeed
surprised to learn that the
provide many solutions. But
human factor accounts for
phishing and social engineering
the overwhelming majority of
attacks are still so overwhelmingly
cyberattacks. It was certainly
effective; combating information
surprising for me at first. Systems
security attacks by training and
and programs might be complex
trendy new systems alone is
and advanced, but humans are
about as effective as two farts in
still relatively easy to deceive.
a hurricane.
Duping someone into clicking program through various phishing
Do Something – Different!
and social engineering tricks
Now, since the main threat
is still a simple and effective
comes from people, and the main
way to execute any number
vulnerability that is exploited is
of cyberattacks.
people, maybe us physical security
on a link or downloading a
Okay, so the human factor
After all, we have been in the
company or system. Got it! It was
people business forever.
surprising to learn this at first, but once you find out about it, there
securitysolutionsmagazine.com
guys can give you a bit of advice.
is the main vulnerability in any
Physical security efforts (even if assisted by high-tech systems)
SECURITY SOLUTIONS // 31
FEATURE
MAYBE IT IS TIME TO THINK OUTSIDE THE CYBER BOX. IS IT REALLY THAT CRAZY TO CONSIDER THAT TIME-TESTED PHYSICAL SECURITY STRATEGIES MIGHT ALSO WORK FOR INFORMATION SECURITY? AFTER ALL, OUR GOALS ARE QUITE SIMILAR – WE PROTECT OUR ASSETS FROM EXTERNAL AND INTERNAL THREATS. are usually directed at people
security concerns continue
threat mitigation, hostile attacks,
and largely executed by people.
to follow suit. And this is
security awareness, preventive
training and awareness are
Most of the highest risks we
usually when companies start
and reactive measures,
necessary but not sufficient
try to mitigate have to do with
having to employ protective/
access control, Red-Teaming,
measures for achieving this.
people and most screening and
guard services on top of their
penetration testing and more.
They will work to some extent
assessment efforts are attempts
existing measures.
Of course, it is not going
Security systems, protocols,
during stages 1 and 2 but,
to distinguish between people
So, that how it works on the
to look the same and the
if you have a large enough
who pose a security risk and
physical side. The limb I am
implementation of these
organisation (or just one with
people who do not.
going out on is the idea that
strategies will be different.
large enough security concerns
information security might be
You are not going to see
and vulnerabilities), you are
to go out on a limb and try to
able to employ this successful
any uniformed information
going to need people in the form
suggest a time-tested physical
strategy too. It seems to me that
security officers patrolling
of professional screeners and
security strategy. Are physical
information security is stuck
your workspace. But it seems
gatekeepers to maintain and
security strategies guaranteed to
somewhere in stage 1 or 2,
to me that a layered approach
enforce a security program. Not
work for information security? I
when the need to enter stage 3 is
with circles of security, better
periodically, not just with remote
honestly do not know. But hear
long overdue.
perimeters, more stringent
management, not just with spot
access control, more external
checks, not just in educational
in the world are effective
and internal monitoring and a
sessions, but continuously, in the
things, most companies start out
information security protective
general assertion of control over
field, in real time.
like this:
services? And to tell you the
the assets and their environment
It works for physical security.
1. You have a small workforce
truth, I do not exactly know. All
is the way to go. And since people
Let us find a way to implement it
in a small workspace with
I am saying is that there seems
(the bad guys) keep exploiting
for information security too. n
relatively small physical
to be a need to move past the
human vulnerabilities in the
security concerns. As long
stage of diagnosing the problem
system, maybe we should have
as the property containing
over and over again; past the
other people (the good guys)
director, consultant, trainer,
the workspace is generally
stage of complaining about the
prevent them from doing so.
operator and business developer,
controlled and employees are
problem over and over again;
given some form of ID that
past the stage of just training the
have well-established
years of military and private
proves they belong there and
workforce over and over again;
information security
sector security experience,
that can grant them access
and past the stage of looking for
departments, some even
and a successful record of
to the workspace (key card,
the next mythical silver-bullet
equipped with security
providing full-spectrum,
fob and so on), you are pretty
solution over and over again.
operations centres (SOCs).
high-end services to Fortune
Adding more of a human factor
500 corporations, foreign
outside the cyber box. Is it
to it will probably necessitate
governments, foundations,
security concerns tend to
really that crazy to consider that
bigger budgets (as it does on the
non-profit organisations and
follow suit. That is when
time-tested physical security
physical security side), but what
wealthy individuals. Ami is
companies start upgrading
strategies might also work for
other choice do you have? What
currently director of consulting,
their security systems, revise
information security? After
is the point in just repeating
training and special operations
their security policies and
all, our goals are quite similar
a failed strategy, knowing full
at HighCom Security Services,
procedures and look into
– we protect our assets from
well that the chances of your
a US-based high-end security
security training.
external and internal threats.
assets being targeted through
specialising in protective services,
We even define things in much
your known vulnerabilities are
security systems, consulting
the same ways, with risk and
something like 100 percent?
and training.
So, here is where I am going
me out first. On the physical side of
much good to go. 2. As companies become larger,
3. As companies become larger still, vulnerabilities and
32 // SECURITY SOLUTIONS
The big question is what
Maybe it is time to think
Many companies already
An experienced security
Ami Toben has over 14
securitysolutionsmagazine.com
OPERATIONS
DUTY EQUIPMENT: PROPER SELECTION, CARRIAGE AND MAINTENANCE BY RICHARD KAY
The equipment carriage system plays an important role in day-to-day duty operations. For most gear, officers will carry it far more than they will use it. However, understanding the basics of gear selection and setup can save a lot of time, frustration and money in the long run, as well as making officers safer in day-to-day operations. Many officers are never trained how to properly setup duty equipment. Often, they simply copy their instructor, or position gear where the instructor tells them to, regardless of whether it actually suits them or not. Utilising duty equipment properly and professionally involves three key stages – selection, carriage and maintenance. All three should be addressed sequentially and in conjunction with training in the proper use of the items.
Selection and Carriage Key equipment for public safety personnel are notepad and pen, first aid kit, flashlight and communications. Force response options (baton, handcuffs, spray, firearm and so on) are specific to the operational role, and require equal attention for proper carriage, use and maintenance. When choosing equipment, there are a few basic considerations: 1. Own your gear It is generally better to own duty gear rather than use company issue, where possible, for safety and practicality. When you purchase gear, you choose gear suitable for your needs, and then you control the ongoing maintenance of the gear as you are the only one who uses it. If using company gear, ensure it is checked thoroughly before using it.
34 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
Consider quality gear over
Officers should also be
type of policy requirement
of systems to suit operational
cheaper alternatives. After all,
however, rather than just
requirements, as well as the
familiar with manufacturer
someone’s safety and wellbeing
personal opinion. If you have
operational environment you
information, including gear
may depend on the equipment,
an issue with the policy in this
will be working in – standing,
limitations or restrictions, prior
and it could be yours. Quality
regards, discuss it with your
seated, vehicle, confined space,
to purchasing or using any item.
gear may cost more initially,
team. Make sure you research
land based or maritime, inside
Incorrect use may render the
but with proper care and
your ideas before you suggest
or outside, static or mobile
officer liable for any injury or
maintenance, it will generally
plausible alternatives.
and so on. Do not be afraid to
damage caused during use, or
• Accessibility: Being able
experiment with new options
may void the warranty in the
alternatives and be more
to get to gear and present
and positions, but always test
event the gear is damaged.
reliable during use if needed.
it from your duty rig to
new options off duty first before
Keep receipts for financial year
deploy it operationally is a
employing on duty.
tax returns.
critical factor as, once again,
last far longer than cheaper
Train With Gear Use duty gear in operational
someone’s life may depend on
Check Before Use
configuration and wear your
2. Only carry what is needed
this skill. Your highest force
You should check your gear
operational uniform in training,
for duty
option (generally the firearm)
before the start of each shift to
as this not only allows you to ‘test’
It can be common, especially
should get the best position
ensure it is properly functioning.
the practicality of your uniform
for new personnel, to load up
on your equipment setup.
Just because it was working
and gear, but also the placement,
with every piece of gear they
Often, officers make comfort
yesterday does not mean it will
accessibility and functionality of
can think of. However, it all
a priority, based on the fact
be in the same condition today.
gear as you wear and use it on
amounts to weight that has to be
that they never use their force
Batteries go flat, fittings work
the job.
carried for the duration of the
response options. However,
loose and items can be misplaced
shift, and extra weight means
if a situation presents that
or even left behind if not checked
what works and what does not,
greater fatigue, which in turn
requires the gear to be used,
routinely. With practice, an
and that includes gear quality
means reduced alertness. Many
accessing it quickly and
equipment check can be done
and placement, as well as the
companies provide reduced
bringing it to bear efficiently
efficiently in minimum time, but
practicality and functionality of
weight or ‘air-weight’ technology
may be the difference between
done properly, can save much
clothing. It is far better to expose
to reduce the weight impact on
safety and harm.
time and hassle, and possibly
limitations of gear and clothing in
reduce incident trauma.
the relative safety of training than
operational personnel. Equipment needs may change
• Comfort: You carry your rig every day, so consider weight
It is a good idea to possess a
Training is the time to assess
during an actual confrontation
depending on the operational
distribution around your
quality gear bag, where all duty
when failure of equipment could
role or circumstance, but you
body. The highest force option
items can be kept secure ready
hinder safety.
should assess the equipment
gets priority, and everything
for transport to work, and for
requirements prior to going
else gets distributed according
secure storage when at home off
on duty and only carry what
to personal choice. There are
duty. Store items in the bag the
Inspection and Maintenance
is necessary. Not only does
no hard and fast rules for
same way every time, so you have
It is essential that equipment
this reduce weight, but it also
this. The only exception is at
a mental check that everything is
functions correctly at all times.
reduces the incidence of lost or
the rear of your belt. Do not
present and in order. Have back-
The best way to ensure reliable
damaged equipment.
place any gear in the small of
up items in the bag also, such as
performance is through regular
the back, as this risks damage
spare batteries, pens, handcuff
inspection and maintenance.
3. Construct a duty rig properly
to the lumbar spine region in
keys and so on.
Inspection should be conducted
Proper operational use of
the event of a fall or sudden
equipment starts with carriage.
pressure to this region, not to
Use Gear Properly
start of each shift. Cleaning is
Gear should always be placed on
mention being uncomfortable
This one may seem like a
easily mastered and if done
the rig ready to deploy. The less
when sitting. To prevent this
no-brainer, but often officers
correctly and at the appropriate
an officer has to focus on his gear,
from happening, it can be
use gear incorrectly or
time, does not take too long.
the more he can focus on the
a good idea to place a soft
inappropriately, which may cause
Servicing should be left to
subject and situation. There are
portable first aid pouch in this
safety issues at the time of use,
qualified armourers, for
three considerations with regards
space on your belt. This not
or liability issues after the fact.
extensive stripping or severe
to setting up a duty rig:
only provides a cushion for
Gear should only be used within
cleaning of equipment.
• Policy: If your agency dictates
this region, but prevents other
industry and agency guidelines
1. Batons
items shifting into this space.
and, where required, officers
Inspection: batons should be
the position of gear on your
by the user prior to use at the
person, then you should follow
Consider alternative carriage
should engage in proper training
free from rust or corrosion and
those guidelines. There should
systems, such as concealed or
and re-training to ensure safe and
have no sharp edges on the cap
be plausible logic behind this
tactical, a vest, or combination
competent use.
or tip. Check for smooth opening/
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 35
OPERATIONS
closing and proper functioning
from dirt and debris. They should
for cracks, especially the flag.
test firing function and check
of the mechanism, and check
be free from rust or corrosion
Should the handcuffs become
the function of safety or de-cock
the condition of the scabbard.
and have no sharp edges. Check
contaminated with blood or other
mechanisms, if present. Test the
Difficulty opening and closing is
for smooth opening and closing
bodily fluids, use appropriate
firearm extraction system, and
most frequently due to operator
and proper functioning of lock
bleach solution or autoclave
inspect ammunition and carriers
error (poor technique). Keeping
mechanisms, and check the key
sterilization techniques (avoid
for defects and to ensure proper
the baton well maintained
for cracks, especially the ‘flag’.
temperatures >148.9°C); after
function. Load the firearm and
can help eliminate most
Common faults include difficulty
sterilization, apply a small amount
secure in holster; load carriers
mechanical failures.
in unlocking handcuffs, the single
of silicone to the pivot pin.
and secure in pouches.
Maintenance: Wipe clean and
bar will not rotate smoothly
3. Firearms
Maintenance: wipe the external
brush off any dirt; do not oil, as
through the ratchet and the
Ensure firearm safety procedures
aspect of the firearm thoroughly
this attracts dirt and may impede
double bars are forced together,
are followed at all times and
with a saturated cloth and brush
operation. Check the shafts for
which prevents the single bar
maintain trigger and muzzle
the barrel, breech and chambers
hairline fractures or excessive
from rotating smoothly.
discipline at all times.
with solvent to remove fouling.
wear between the sections. If
Maintenance: wipe clean and
Inspection: inspect externally
For stubborn fouling, clean with
necessary, the tip can be removed
brush off any dirt in the ratchet
and internally for defects. Ensure
dental picks and toothbrush.
to facilitate replacement of
mechanism; compressed air
the breech and barrel are free
Lightly lubricate the working
damaged parts. Replace worn
can be used to clean inside the
of obstructions. Check that
mechanism, but do not over
retaining clips and grips before
lock mechanism. If required,
mechanical parts lock properly
lubricate as oil attracts dust, which
they become a functional issue.
lubricate with a dry lubricant;
into place and that the firearm
could impede functioning. Inspect
2. Handcuffs
do not use oil as this will attract
mechanism operates smoothly
firearm components for abnormal
Inspection: carry handcuffs in a
dirt and possibly impede proper
and without issues. Dry fire the
wear, reassemble and carry out
protective case to keep them free
functioning. Check the key
empty firearm several times to
test of all functions.
36 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
"Use duty gear in operational configuration and wear your operational uniform in training, as this not only allows you to ‘test’ the practicality of your uniform and gear, but also the placement, accessibility and functionality of gear as you wear and use it on the job." Body Armour
defeat a standard test round
and facemasks, but these
along with operational need and
Body armour is defined as a
may not defeat other loadings
should be selected only in
plausibility. Officers should be
garment or item that is designed,
in the same calibre. In general,
conjunction with regulatory and
well trained and familiar with
intended or adapted for the
armour that defeats a given
operational requirements.
the functioning and lawful use
purpose of protecting the body
lead projectile may not resist
from the effects of a weapon,
Modern body armour
of any equipment they take into
complete penetration by other
also caters for edged-weapon
the operational environment, as
including a firearm. Lawful
projectiles of the same calibre
protection, with some good
any gear has the potential to be
guidelines for possession and
of different construction
options available that provide
misused (liability) or stripped
use are outlined in legislation,
or configuration.
protection from ballistic and
from the officer and turned
edged weapons in the same
against them (trauma).
and officers are responsible
Ballistic armour suitable for
to ensure they have proper
full-time wear throughout an
armour. Research options
regulatory and agency approval
entire duty shift is available in
prior to use and make a
professionally and train as you
prior to use.
various classifications, which
selection based on operational
work. n
provide increasing levels of
requirements, and regulatory
into categories rated by ballistic
protection from ballistic threats.
and agency guidelines.
performance. The ballistic threat
An important aspect of body
posed by a projectile depends on
armour is that it is comfortable
officers should carefully
instructor-trainer, Director
its composition, shape, calibre,
to wear. A vest in a vehicle
consider the operational
and Senior Trainer of Modern
mass, angle of incidence and
does no good for spontaneous
requirements and regulatory
Combatives, a provider of
impact velocity. Because of the
situations that evolve rapidly.
and agency guidelines for
operational safety training for
variety of ammunition available
There are numerous options of
carriage and use of duty gear.
the public safety sector. For
and the existence of self-loaded
ballistic protection available,
Quality should guide decisions
more information, visit www.
ammunition, armours that will
such as glasses, helmets
for the purchase of private gear,
moderncombatives.com.au
Body armour is classified
securitysolutionsmagazine.com
Prior to selecting equipment,
Select carefully, carry
Richard Kay is an internationally certified tactical
SECURITY SOLUTIONS // 37
FEATURE
38 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
WHO ARE THE REAL TERRORISTS IN NORTH EAST SYRIA? BY ANNE SPECKHARD
Earlier this month, President
fleeing Turkish violence. In
circulate of Syrian civilians lying
and other former jihadists still
Trump abruptly changed course
addition to these massive
bloodied and dead on the ground
happy to kill in the name of Allah,
and green-lighted a Turkish
displacements, Turkey insists that
while their family members wail
who Turkey used to clear Afrin
incursion into north east Syria
it will forcibly repatriate one to
unconsolably. Hevrin Khalaf,
in 2018. Indeed, they have shown
with disastrous results. The
two million of the three million
a female and the Secretary-
a brutality akin to their mother
subsequent invasion unleashed
Syrian refugees it is currently
General of the pro-Kurdish Future
groups, some even shouting
a hellish nightmare of carnage
housing back into the SDF-held
Syria Party, is reported to have
ISIS slogans as they kill, such as
and chaos in what was a
areas it is now overtaking. That 83
been dragged from her car and
“Baqiya wa tatamadad!” meaning
dangerous, but relatively peaceful,
percent of these Arabs never lived
assassinated by Turkish-hired
we (ISIS) will remain forever,
area governed by the Syrian
in the areas they are to be forcibly
thugs who said, while filming her
and expand.
Democratic Forces (SDF) who had
resettled in begs the question of
corpse, “This is the corpse of pigs”.
just defeated ISIS territorially.
whose homes and lands will they
Likewise, video footage of bearded
ISIS cadres to fight the Kurds is
be overtaking?
mercenary soldiers backed by
no surprise, given they worked
the Turks, shooting their Kurdish
closely with ISIS to try to quell
In recent days, over 30 civilians – including Kurds, Christians
Turkey claims to be fighting
That Turkey would use former
and minorities, and very young
a terrorist group and wanting
captives while calling them “kufar
the Kurds early on in the Syrian
children – have been killed in
to clean their border area of
scum” (unbelievers) are said by US
conflicts and continue to see their
indiscriminate Turkish bombings
terrorists, but the pictures coming
forces to appear authentic. If so,
interests in destroying Kurdish
and mortar fire. Likewise, the
out of north east Syria instead
these actions are war crimes.
power to lie with militant jihadist
United Nations (UN) reports
make Turkey look like the terrorist
that over 130,000 Syrians have suddenly become displaced,
securitysolutionsmagazine.com
These bearded assassins,
and Islamist groups. An ISIS emir
aggressor. Countless photos and
backed by Turkey, are likely the
that the International Center for
videos, many of them validated,
same unemployed ISIS, al Nusra
the Study of Violent Extremism
SECURITY SOLUTIONS // 39
FEATURE
(ICSVE) interviewed in 2019 went
could also insist that the Kurds not
New York, to Brussels (where two
moved to incorporating minorities
into great detail about his work
turn to others, like the Russians,
Americans were killed), to Paris,
into their ranks and transitioning
on behalf of ISIS, about how
for support, effectively boxing
Nice, Stockholm, London and
to the SDF who have had a good
he negotiated with the Turkish
them in for slaughter.
Istanbul to name but a few.
record of building a grassroots
National Intelligence Organization
When ISIS foolishly attacked
In serving as our boots on the
democracy amidst the ashes of
(MIT) and military regarding
Kobani in 2014, the Kurdish
ground forces for the territorial
war. That their majority Kurdish
border entry for the 40,000+
People’s Protection Units (YPG)
defeat of ISIS, and continuing
leadership may have long-term
foreign fighters that streamed
and Women’s Protection Units
to battle the remnants of ISIS,
aspirations to one day become a
across Turkey into ISIS-controlled
(YPJ) rose up and fought valiantly
the Kurds saved, and continue
fully independent Kurdish state
areas of Syria, agreements for
and, since 2015, they fought with
to save, countless Americans
should be no surprise, but that
sending wounded ISIS fighters
US military backing, to defeat ISIS.
and Westerners from being
they were acquiescing to all US
back into Turkey for medical
They have been our ‘boots on the
slaughtered by a heinous force
demands upon them to remain
treatment, supplying water
ground’, sustaining most of the
willing to attack, anywhere, at
within Syria and negotiate some
for the Tabqa dam to provide
casualties and doing all the heavy
any time.
kind of governance agreement
electrical power for ISIS and so on.
lifting in defeating a global foe.
According to this emir, even then,
While US forces lost less than 20
Turkey, calls these Kurds
The trouble in that regard is
Turkey was insisting on a buffer
troops after they aligned with the
terrorists. That picking up arms
Assad wants to appoint top-down
security zone. Now it appears they
Kurds to fight ISIS in Syria, our
against ISIS gave them the sudden
leaders in the area and thereby
will go to any lengths to get it.
hardy allies lost 11,000 male and
opportunity to rule a considerable
destroy the grassroots nature of
female brave fighters who faced
swathe of Syrian land that they
the Kurdish democracy building.
down this global foe.
had liberated from ISIS is no one’s
From a position of strength and
fault, except those who supported
good governance, with US backing
Meanwhile, General Mazloum Kobani Abdi told US Ambassador William Roebuck, the US Deputy
Indeed, while ISIS was an
Yet their current aggressor,
with Assad also needs to be noted.
Special Envoy to the Global
active force on the ground
ISIS in the first place – Turkish
behind them, the SDF had a
Coalition to Defeat ISIS, “You have
in Syria, its external emni
government officials among
chance of becoming a real island
given up on us. You are leaving us
(intelligence arm) threatened
them. No doubt, the Kurds, once
of democracy, perhaps even one
to be slaughtered.” He also asked
the globe, mounting and inciting
in power, made some mistakes,
day spreading such, within the
in confused despair how the US
attacks in many major cities from
but it is notable how quickly they
Syrian state.
40 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
were asking to be bussed out of
because they are no longer serving
(n=196) with ISIS defectors,
Syria into Turkey – presumably
our interests and must take place
returnees and prisoners, studying
believing they would be welcomed
in a planful and secure manner
their trajectories into and out of
into a country that had helped
without allowing for an all-out
terrorism, their experiences inside
them in the past.
slaughter of civilians or of the
ISIS, as well as developing counter
Five hundred of the worse
allied forces who, by fighting ISIS,
narratives from these interviews.
ISIS cadres are said to have been
saved Americans countless lives.
She has also been training key
transferred by US forces from
Given that the Kurds sacrificed
stakeholders in law enforcement,
Syria into Iraq, and possibly
greatly to defeat ISIS territorially
intelligence, educators, and other
more will befall the same fate.
on the ground and, when in
countering violent extremism
For those of us who still believe
power, began at once to build
professionals on the use of
in human rights and rule of
one of the only democracies in
counter-narrative messaging
law, even when applied to ISIS
the Middle East that is respecting
materials produced by ICSVE
cadres, it is unfortunate that in
minority rights and following
both locally and internationally,
Iraq these prisoners – many of
Western rule of law while being
as well as studying the use of
them Westerners – can expect
surrounded by dictatorial and
children as violent actors by
forced confessions, hurried court
corrupt regimes, it seems we
groups such as ISIS and consulting
proceedings and almost certainly
should have continued to give
on how to rehabilitate them. In
a sentence of life imprisonment, or
them our full support. Instead,
2007, she was responsible for
death, based on very little, if any,
Trump has unleashed Turkish
designing the psychological and
evidence presented against them.
forces on a group that Turkey
Islamic challenge aspects of the
Whereas, in our ISIS interviews
universally treats as terrorists
Detainee Rehabilitation Program
conducted in SDF territory with
and is willing to violently displace
in Iraq to be applied to 20,000+
defeated territorially, ISIS is still
100 of the ISIS foreign terrorist
and kill. This sudden betrayal of
detainees and 800 juveniles. She is
far from total defeat. In recent
fighters, the prisoners stated that
our loyal allies is a matter that
a sought-after counterterrorism
months, ISIS has been attacking
they were not being subjected to
needs to be quickly resolved in
expert and has consulted to
on a weekly basis in both Syria
torture and were fairly treated
Washington, D.C.
NATO, OSCE, foreign governments
and Iraq, and the SDF were busy
by the SDF. Likewise, the SDF
rounding up ISIS sleeper cells
was working patiently, including
reputation as stalwart and reliable
Departments of State, Defense,
while also holding more than
in efforts with ICSVE, to gather
allies are at stake right now, and
Justice, Homeland Security,
70,000 ISIS prisoners and their
testimonies and data to prod
this disastrous decision needs to
Health & Human Services, CIA
family members, thousands of
Western countries into action that
be reversed immediately.
and FBI and CNN, BBC, NPR,
which are from European and
have been reluctant to take their
Western countries who have
ISIS citizens home for prosecution.
In the meantime, with ISIS
refused to repatriate and bring
While the SDF could only do its
Our American ideals and our
and to the U.S. Senate & House,
Fox News, MSNBC, CTV, and in Anne Speckhard, Ph.D.,
Time, The New York Times, The
is Director of the International
Washington Post, London Times
important work with US support,
Center for the Study of Violent
and many other publications. She
this support was not costing us
Extremism (ICSVE) and serves as
regularly speaks and publishes
unleashed by Turkey, up to 800
much. Few troops were deployed
an Adjunct Associate Professor
on the topics of the psychology of
ISIS cadres have escaped when
on the ground and our air support
of Psychiatry at Georgetown
radicalization and terrorism and
their prison was shelled, with
was operating out of Iraq, where
University School of Medicine.
is the author of several books,
hundreds more ISIS women and
it is likely the US forces will stay
She has interviewed over 600
including Talking to Terrorists,
children escaping from their
for some time. That we should not
terrorists, their family members
Bride of ISIS, Undercover Jihadi
bombed and burning camps.
involve ourselves in endless wars
and supporters in various parts
and ISIS Defectors: Inside Stories
Where they will run to amidst the
or that the troops need to come
of the world, including in Western
of the Terrorist Caliphate. Her
chaos is uncertain, but Turkey and
home is something most agree
Europe, the Balkans, Central
publications can be found here:
beyond is certainly a possibility
with, but how and when is also of
Asia, the Former Soviet Union
https://georgetown.academia.edu/
given that, when cornered in
great importance.
and the Middle East. In the past
AnneSpeckhard and on the ICSVE
two years, she and ICSVE staff
website: http://www.icsve.org
have been collecting interviews
Follow @AnneSpeckhard n
them home to justice. Now, amidst the chaos
Hajin and later Baghouz, SDF leaders told ICSVE that ISIS leaders
securitysolutionsmagazine.com
Any US withdrawal of support for the SDF should only occur
SECURITY SOLUTIONS // 41
BUSINESS
42 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
SECURITY, INVESTIGATION, SURVEILLANCE BUSINESSES TO REPORT CONTRACTOR PAYMENTS UNDER THE TAXABLE PAYMENTS REPORTING SYSTEM The Australian Taxation Office’s (ATO) tips to help security, investigation and surveillance businesses report their contractor payments From 1 July 2019, the Taxable
to protect the majority of people
good records makes it easy
keep records of contractor
Payments Reporting System (TPRS)
who do the right thing. The Black
and quick to complete the
payments, and what details
started for businesses providing
Economy Taskforce estimates
TPAR every year.”
you need to report. “You’ll also
security, investigation or
that the black economy is costing
surveillance services. Businesses
the community as much as $50
check if it’s TPAR-ready. Talk
sample TPAR, a worksheet
that provide these services will
billion, which is approximately
to your software provider if
to record payments, case
need to complete a Taxable
three percent of Gross Domestic
you are unsure. If you don’t
studies, fact sheets, videos,
payments annual report (TPAR)
Product (GDP). In 2015–16, the
have TPAR-ready business
and information in other
if they a) have an ABN and b)
TPRS helped to protect $2.7
software, visit ato.gov.au/TPAR
pay contractors to provide these
billion from being lost to the
for a simple worksheet that
services on the business’s behalf.
black economy in the building
can help you to record the
need to complete a TPAR or if
This new contractor reporting
and construction industry alone,
information.”
you have questions, follow our
obligation is not part of any
which shows how effective
other regulatory review of the
the TPRS is in improving tax
range of services, not just
TPAR or talk to your registered
security industry.
compliance in an industry.
security, investigation or
tax professional.”
These businesses need
ATO Assistant Commissioner
2. “If you use business software,
3. “If your business provides a
find helpful resources like a
languages.” 5. “If you’re not sure whether you
three-step guide at ato.gov.au/
surveillance services – known
to report the total payments
Peter Holt has five handy tips
as ‘mixed services’ – you may
– including cash payments –
for security, investigation and
need to report if payments
Key Facts about the TPRS and TPAR
they make to each contractor
surveillance businesses to help
you received for these services
• The Taxable Payments
for security, investigation or
make completing the TPAR quick,
make up 10 percent or more
Reporting System (TPRS)
surveillance services provided
easy and secure.
of your total GST turnover,
now applies to businesses
on their behalf in the 2019–20
1. “Make sure you’re keeping
even if your business isn’t
providing security,
registered for GST.”
investigation and surveillance
financial year by 28 August 2020. The TPRS is a black economy
the right records for each contractor – their name,
4. “Visit ato.gov.au/TPAR – it has
services that a) have an
measure – designed to detect
address, ABN, and the total
comprehensive information
Australian business number
contractors who do not report or
amount you paid them,
to help you work out if
(ABN) and b) make payments
under-report their income, and
including any GST. Keeping
you need to report, how to
to contractors for security,
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 43
BUSINESS
investigation or surveillance
screening, watching or
services they provide on a
guarding any people,
providing security,
business’s behalf.
premises or property, by
investigation and surveillance
any means.
services, the TPRS also
provided in the TPAR to
applies to:
identify contractors who may
o Building and construction
not be doing the right thing
• These contractor payments are reported to the ATO
• Investigation services
each year using the Taxable
include searching inquiries
payments annual report
by any means into one or
(TPAR).
more specific individuals
• Contractor payments
• In addition to businesses
industry (from 1 July 2012) o Businesses providing
regardless of whether or not they are registered for GST. • The ATO uses the data
with their tax; for example, not reporting income, failing
or matters, to determine
cleaning and courier
to lodge tax returns or activity
for providing security,
facts or gather evidence.
services (from 1 July 2018)
statements, not registering for
investigation or surveillance
Investigation services are
services from 1 July 2019 to 30
not routine record or police
June 2020 must be reported in
checks, or telemarketers
the TPAR by 28 August 2020.
conducting surveys.
• Contractors include
• Surveillance services include
o Businesses providing road freight and IT services (from 1 July 2019) • If a business provides a range of services (the ATO
GST, or using false ABNs. • This new contractor reporting obligation is not part of any other regulatory review of the security industry.
subcontractors, consultants
watching or observing an area
refers to these as mixed
What about Contractors?
or independent contractors.
or location, and monitoring
services), including security,
• Contractors need to report all
They can be companies,
security systems.
investigation or surveillance
of their income – including
• Security, investigation and
services, the business may
cash – accurately when it is
surveillance services do
need to lodge a TPAR if the
to report on the TPAR is the
not include police services,
payments they received
same information generally
surveillance of country
for these services make up
declaring all their income, we
available on the invoices you
borders, aerial surveying or
10 percent or more of the
will contact them. n
should receive from your
mapping services, academic
business’s total GST turnover.
contractors. It is the same
or market research, fire alarm
information businesses need
services, key cutting services,
for GST, businesses still need
regarding the Taxable Payments
when claiming deductions.
or the manufacture or retail
to check if they need to lodge
Reporting System (TPRS),
of security, investigative or
a TPAR because all businesses
businesses should visit ato.gov.
surveillance devices.
have a GST turnover
au/TPAR.
individuals or partnerships. • The information you need
• Security services are patrolling, protecting,
44 // SECURITY SOLUTIONS
o Even if they are not registered
time. • If we think someone is not
For information and resources
securitysolutionsmagazine.com
Recognize AND Analyze Is she an employee?
When, where did she enter? Does she appear in videos recorded last week?
How often was she here this month? Is she a banned person?
How old is she?
Premier face recognition technology for real-time video surveillance, recorded video investigation, crowd detection, and anonymous people analytics
www.cognitec.com | info@cognitec.com
ViDi Labs Academy
Login
CCTV - from light to pixels
Sign Up
Learn CCTV and IP Video Surveillance technology from the guru - Vlado Damjanovski
Enrol now
vidilabs.com/academy.html vidilabs-academy.teachable.com
COVER STORY
AUSTRALIA’S CHANGING
SECURITY PRACTICES BY ASHWIN PAL
46 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
This year’s Unisys Security Index reveals that safety fears will not keep Australians from attending public events or experiences; however, our behaviours, actions and choices are changing. Ashwin Pal, Director of Security Services from Unisys, explores how Australians are minding their physical wellbeing and protecting their data in 2019. First undertaken in 2007, the
concerned about a criminal
options on your phone and then
Without both the digital and the
Unisys Security Index is the
attack causing physical harm.
swipe to find your favourite ride
physical, the experience would
longest running snapshot of
Similarly, 43 percent are seriously
share app to see how prices are
not be as fast, easy, rich, enjoyable
security concerns conducted
concerned about someone stealing
looking. Public transport wins the
or memorable.
globally. Based on the survey
their personal data from their
day and you tap on with your pre-
results from more than 1,000
mobile device. The same number
paid transport card.
adults in 13 key countries,
of people are concerned about
this year’s Index shows that
someone stealing their credit card
stadium, you cannot resist buying
the definition of ‘being safe’
data when using public Wi-Fi.
some nachos from a market seller
increasingly refers to the safety of our digital assets, as well as our physical selves. To see the relationship
Once you have made it to the
Imagine your favourite band just
our personal and financial data at risk.
two quick taps of your phone and
Concerned but Confident
the transactions are made.
With one in four Australians very
and a tour t-shirt is a must too –
Not Without my Smartphone
Each digital interaction, however, has the potential to put
With so many concertgoers,
concerned about the risks to their
between our digital and physical
announced its new tour dates.
the mobile network is a little slow,
personal or digital security at
security concerns in action,
You jump onto your smartphone,
so you jump on the free Wi-Fi and
large-scale events, are Australians
this year’s Index explored how
check with your family or
your phone buzzes wildly as a
ready to hang up their festival
confident citizens felt attending
friends to see who wants tickets
flood of WhatsApp messages come
outfits and sporting jerseys?
large-scale events such as sporting
and furiously refresh the ticket
through naming the location for
The short answer is no, but a
matches or music festivals.
suppliers page when they go on
where you and your friends or
deeper look at the results of the
The Index also explored what
sale to get the best seats possible.
family will meet. Now that you
Unisys Security Index shows that
have found everyone and made it
Australians are taking a more
The tickets you paid for online are
to your seats, you take a snap of
considered approach to attending
in your digital wallet and you have
the team excitedly waiting for the
events than in the past.
physical wellbeing has become so
just received an SMS from the
show to start; and naturally you
entwined that respondents were
event organiser with tips about
share it using airdrop.
equally concerned about cyber
the best ways to get to the stadium.
and physical threats at large-scale
Taking on the advice of the SMS,
concerts are one of those moments
attending large-scale events
events. Forty-three percent of
you start to plan your trip to the
in life where our digital identities
remain unchanged. For the other
Australians say they are seriously
venue. You check public transport
and the physical world collide.
nine, attending a large-scale
steps Australians are taking to protect themselves. In Australia, our digital and
securitysolutionsmagazine.com
It is now the day of the concert.
Events, sports matches and
According to the Index, just one in 10 Australians says their behaviours and decisions about
SECURITY SOLUTIONS // 47
COVER STORY
“The prioritisation of protection for our digital assets and data over our physical safety is representative of the current security mindset in Australia, where the top three security concerns all relate to data theft.” When travelling to large-scale events such as a World Cup sports match or music festival, how concerned are you about the following security issues? Security Issue
Very/extremely concerned
Somewhat concerned
Not concerned
Not sure
A criminal might attack and harm event attendees
43%
36%
17%
3%
Credit card data on your mobile device could be stolen when you use public Wi-Fi
43%
29%
23%
5%
Criminals might target you on the streets near the event
43%
31%
21%
4%
Personal data on your mobile device could be stolen when you use public Wi-Fi at the event
40%
34%
22%
3%
Hackers will send event attendees emails with links to trick them into granting access to their mobile devices
37%
31%
28%
4%
event is now a series of rational
adult Australians are seriously
steps to reduce their risk of
website you are using to
decisions to protect themselves
concerned about unauthorised
falling victim to data theft or even
buy tickets shows the secure
physically and digitally.
access to their personal data,
a physical attack.
padlock icon in the browser
Three in ten (30 percent)
bankcard fraud (56 percent) and
Along with taking their own
say they now think twice about
computer hacking or viruses (54
steps and precautions to protect
“https://”. And if ticket prices
attending large-scale events and
percent).
their data and personal safety,
look too good to be true, they
one in five (19 percent) have
Fear for our data outweighs
Australians are largely in support
and the address begins
probably are. 2. Plan ahead and check local
changed their plans based on
our concerns about the threat
of the police having access to and
their concerns for the safety. A
of terrorism (49 percent), fear of
even saving event surveillance
authorities’ alerts. Sign up
quarter of Australians (23 per
a natural disaster (43 percent)
footage to assist in the prevention
for any travel or news alerts
cent) still attend large-scale
or general personal safety (32
of crime. Of those surveyed, 47
provided or recommended by
events, but take proactive steps
percent).
percent had no concerns with
the event organisers to receive
police capturing and saving event
updates on traffic or news of
A Proactive Approach to Security
surveillance video.
any potential disturbances on
protection for our digital assets
Overall, the news is good.
protected at large-scale events
and data over our physical safety
Australians are aware of the
such as concerts or festivals,
event alone, let someone
is representative of the current
risks associated with making
Unisys has ten key tips for
know. Make sure your friends
security mindset in Australia,
online bookings and purchases,
Australians to observe:
or family know where you are
where the top three security
using public Wi-Fi and receiving
1. Only buy event tickets from
going, when you plan to arrive
concerns all relate to data theft.
messages from non-trusted
official channels or websites
and when you are expected
More than half (57 percent) of
sources and are taking sensible
you trust. Make sure the
to return.
to protect their mobile devices and wallets. The prioritisation of
48 // SECURITY SOLUTIONS
To stay safe and keep data
event day. 3. If you are going to a crowded
securitysolutionsmagazine.com
4. Travel light. There is no need
“In Australia, our digital and physical wellbeing has become so entwined that respondents were equally concerned about cyber and physical threats at large-scale events.”
securitysolutionsmagazine.com
use password-protected Wi-Fi.
9. Keep your phone charged
to take everything you own to a
Unprotected Wi-Fi networks
in case of emergencies. If
festival. Leave the valuables at
could give hackers access to
possible, take a battery charger
home and travel light, with just
personal or financial data on
pack with you to ensure your
the essentials – in your pockets
your phone.
phone is always available
if possible. 5. As soon as you get to the event,
7. Do not make electronic transactions with unofficial
when you need it. 10. In an emergency, stay calm
survey your surroundings.
event vendors. Be careful
and move to the edges of
Make sure you know where the
with your contactless cards or
crowds. Try to leave the area
exits are and agree on a meeting
making mobile transactions,
quickly and calmly. If you need
place with your friends in case
particularly outside event
to get away from the incident
you get separated from your
venues. Unscrupulous traders
quickly, hide yourself if need
group. Know where stewards
could be gathering your
be, call 000 when you can and
and information points are so
financial data to use or sell to
then let your family know you
you can speak to someone if you
other criminals.
are safe. n
need to. 6. Update your mobile device
8. Be vigilant for suspicious activity at an event. Do not
and avoid unsecured Wi-Fi
be afraid to report something
networks. Make sure your
you think is unusual, such as
phone is updated with the
unattended baggage or people
latest software, so it is as
behaving in a suspicious or
secure as it can be. And only
threatening way.
SECURITY SOLUTIONS // 49
AVIATION
IS AUSTRALIA’S AVIATION SECURITY REGIME COST AND PERFORMANCE EFFECTIVE? 50 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
BY PAUL RETTER AM
1. It is almost 10 years since
d. an intelligence-led, risk-
more challenging. Australian
undertook a detailed review
aviation businesses are facing
of Australia’s aviation sector
both global and domestic
e. well understood and
and produced a national
headwinds. Key decision
practised security
aviation policy White Paper
makers within the Australian
procedures/processes
entitled Flight Path to the
aviation industry are worried
that are integrated with
Future. The aviation policy
about issues such as Middle
appropriate security
White Paper was released
East oil insecurity, the US–
to the public in December
China trade war and the
2009 by the then Minister for Infrastructure, Transport,
softening Australian economy. 3. We have examined the various
based layered security regime
technology f. an independent securityoutcomes assurance regime g. well trained and motivated
Regional Development and
layers of AVSEC currently
security staff who
Local Government, Anthony
in place across Australia’s
understand the importance
Albanese. At that time, the
security regulated airports and
of the resolution of
Federal Government analysis
airlines. The paper makes a
concluded that the Australian
number of recommendations
aviation security (AVSEC)
where it appears there is
data sharing and frequent
model was cost effective and
room for improvements in
communication between
that it reflected world’s best
effectiveness and efficiency
government agencies,
practice, while remaining
(including through reducing
security providers and
flexible to the future
costs).
challenges confronting the aviation sector. 2. Ten years on, PBAR Associates has examined whether
4. A truly cost-effective AVSEC
suspicious activity h. effective coordination,
industry operators 5. In terms of effectiveness, the
regime will include many of
current AVSEC regime has
the following characteristics:
served Australia reasonably
a. fit-for-purpose legislation/
well to date; however, there
Australia’s AVSEC regime
regulation that is outcomes
is room for improvement.
remains cost effective. This
focused
Fine-tuning of the AVSEC
is particularly relevant at a time when both the economic and security environment confronting the Australian
securitysolutionsmagazine.com
aviation sector is becoming
the Federal Government last
b. strong operational leadership by industry c. a pro-active security culture
regime (including its layers of security) needs to occur on a regular basis if it is to remain fit for purpose. Any
SECURITY SOLUTIONS // 51
AVIATION
proposed amendments to
airports where large passenger
Home Affairs should, in
the AVSEC regime should be
numbers reduce the overall
conjunction with other federal
encourage the development
based on a clear and shared
security costs per passenger.
government agencies and
of a more robust yet cost-
understanding of the emerging
In regional Australia, reduced
the key aviation industry
effective AVSEC regime.
threats facing the aviation
flight and passenger numbers
participants, examine several
Australia needs a security
sector, and the need to identify
result in higher security costs
proposed enhancements to
regime that balances the
and mitigate the different
per passenger.
the existing AVSEC regime.
desired level of robustness
Key enhancements proposed
in security outcomes in the
infrastructure and operations-
7. The sustainability of many
9. These enhancements will
related vulnerabilities across
regional airports is a
include improving airport
most economical way – after
the aviation sector. This is
contentious issue in Australia
access control arrangements;
considering the threats being
a shared government and
because the continued provision
enhancing Aviation Security
faced, the risk appetite of
industry responsibility.
of affordable air services is a
Identity Card (ASIC)
the Government, optimal
critical economic and cultural
functionality; examining the
passenger facilitation rates,
effectiveness of the current
factor when assessing the long-
feasibility of moving to a
and the capacity and resources
AVSEC regime is a more
term viability of many regional
‘network pricing’ screening
of industry to implement the
challenging and complex task,
cities and towns.
model; and reviewing
required AVSEC measures. n
6. Assessing the overall cost
8. We have suggested the
the proposed new AVSEC
industry participants across
Aviation and Maritime
screening measures to be
the sector. The current regime
Security (AMS) Division
adopted by smaller security-
PBAR Associates and non-executive
works well at major capital city
within the Department of
controlled regional airports.
director at Certis Security Group
noting the diversity of aviation
52 // SECURITY SOLUTIONS
Paul Retter is Principal at
securitysolutionsmagazine.com
It’s as easy as 1two3 Three phases for construction keying
1 2 3 Construction keying is commonly used on site during the construction phase of building. A convenient way of providing continued security during the 3 phases of construction is to use pExtra construction keying. In simple terms, all cylinders are operated by the one key (Phase 1) during the construction phase. At “handover” the next stage key is turned in the cylinder blocking the Phase
1 key from working again. Once the apartment is sold, the owner would insert the key into the cylinder blocking Phase 1 and Phase 2 keys from working again. To learn more about our complete range of smart and secure access solutions, contact dormakaba. 1800 675 411 www.dormakaba.com.au
Phase 1 Construction Stage
Phase 2 Hand over to the developer/ real estate Phase 3 Hand over to the end user
LEGAL
MANAGING COMPANY ACQUISITIONS
54 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
What happens when a small to
legal entity. This means that it
that has traditionally provided
can enter into contracts and do
guarding, patrol and monitoring
all other things at law that any
services, merges with another
private individual is capable of
company that also provides
doing. However, unlike people,
installation services for security
a company can change both its
equipment as an example?
identity and appearance with the
Typically, as part of the merger,
stroke of a pen. So how does the
both organisation will either come
law keep tabs on this?
together under a new company
The way that the law requires
name or perhaps keep one of the
a company to identify and
previous names. However, both
distinguish itself is not via its
organisations have a significant
name, but via its Australian
portfolio of existing contracts
Company Number (ACN).
with clients with whom they
Under the Corporations Act,
have been working for years,
a company must ensure that
all signed under the previous
its ACN appears on all of its
company names.
“public documents” and “eligible
Do they need to re-draft
securitysolutionsmagazine.com
A company is a separate
medium-sized security company
negotiable instruments”. These
all of their old contracts for
include all documents lodged
both companies and have their
with the Australian Securities
clients re-sign new contracts,
and Investments Commission,
or can they simply keep the old
invoices, receipts, orders for goods
contracts in place until they are up
and services, letterheads, official
for renewal?
company notices, cheques and
SECURITY SOLUTIONS // 55
LEGAL
written advertisements which
party, then the fact that you
make a specific offer.
have changed the name of your
A company is not required to
company is irrelevant. For the
include its ACN on packaging and
sake of completeness, however,
labelling, advertisements which
you might like to write to all of
do not make a specific offer, credit
those parties to confirm that
cards, business cards and with
the company name has been
compliments slips, and items
changed and to reassure them
which are not documents.
that the company with whom
The purpose of the ACN is to
they contracted remains the
ensure that companies can be
same and that the name change
easily identified. It does not matter
is merely cosmetic. To further
what the name of the company
reassure them, you might wish
is and nor does it matter how
to point out that the ACN relating
often the company changes its
to both company names has
name. The constant is the ACN. If
not changed, and that is really
the ACN remains the same, then
what matters.
the company is the same entity
Once your existing contracts
and can be distinguished from
come up for renewal, you can
any other company, including a
substitute the old company name
company of a similar name.
for the new one. Again, as long
You do not need to alter
as the same ACN appears, the
your contract documents after
other party can feel comfortable
changing the name of your
in knowing that while the name
company. If your ACN appeared
of the company might have
in the set of contract documents
changed, the company itself
executed by you and the other
remains the same. n
56 // SECURITY SOLUTIONS
A company is not required to include its ACN on packaging and labelling, advertisements which do not make a specific offer, credit cards, business cards and with compliments slips, and items which are not documents.
securitysolutionsmagazine.com
VIDEO DOESN’T HAVE TO BE EXPENSIVE TO BE EFFECTIVE
With years of experience across hundreds of clients, let us show you how we can help you generate more business than ever before. enquiries@interactivemediasolutions.com.au
CCTV
COMPARISON OF PROFESSIONAL IP CAMERA SYSTEMS AND HOME CAMERA SYSTEMS: WHAT IS THE DIFFERENCE? BY BOB MESNIK
58 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
If you do a search for Internet
lens for your photo camera? I bet
Protocol (IP) camera systems,
you had to pay $200 to $500 for
you may see low-cost IP cameras
the better lens. Now imagine what
advertised by Amazon, Costco,
type of lens is included with the
BestBuy and other consumer
$39.99 camera. These low-cost
sellers. You can find IP cameras
lenses reduce the clarity of the
starting at under $40, but are
video. This means users will not
these IP cameras right for
be able to identify a person’s
your business, school, hospital,
face in the video or see a licence
government organisation or
plate number.
commercial organisation?
The other day, I was walking
The answer is no. They are
down the street and I passed a
not designed for professional
guy selling watches. There was
applications. One of the most
one watch that looked just like an
important things to understand
expensive Rolex, but it cost only
is that commercial IP camera
$50. What a deal, I thought. I think
systems are systems. They consist
everyone tries to find the best
of an IP camera, video recording
deal. Unfortunately, we sometimes
system and infrastructure that
forget the old maxim, ‘you get
includes the network, video
what you pay for’. I know I do.
management software and
How many times have we been
display system. The consumer
burned by this? Better IP cameras
surveillance camera is primarily
are reliable and rugged. They are
only a camera.
designed to last for many years of operation. The professional
Quality versus Price of Professional IP Camera Systems
IP cameras that are designed for
Commercial IP camera systems,
that are further away and can
while costing more than home
operate at night.
business applications provide much better video, can see areas
cameras, provide more capability
as low as $39.99. These cameras
Reliability of Commercial IP Camera Systems Versus Consumer Camera Systems
advertise 1080p resolution. That is
Commercial camera systems
equivalent to 2 megapixel camera
have better reliability than the
resolution. Think about this price.
low-cost consumer cameras.
Have you ever purchased a good
Imagine installing a camera on a
and better quality and reliability than consumer cameras. Consumer cameras are available for under $100, with some selling
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 59
CCTV
over multiple cameras. If a cloud
vulnerable to hackers. The setup
Video Recording for Professional IP Camera Systems
the cheap camera much more
of home cameras usually consists
Commercial IP camera systems
internet connection to a remote
expensive than the professional
of a small number of cameras
are designed to record video
server. These systems usually have
IP camera. The commercial IP
connected to Wi-Fi. These Wi-Fi
from large numbers of network-
limited bandwidth, which means
cameras from Hanwha have a
connections and their ease of
attached IP cameras, which
that only a few cameras can be
five-year warranty. This almost
use make them more vulnerable
could range from a few cameras
used in the home.
guarantees trouble-free operation
than the sophisticated network-
to enterprise systems with
for at least that long. Take a look at
attached IP camera systems used
thousands of cameras that
simple motion detection that
our article, What is the Best Price
for business. The consumer-grade
are located in many different
triggers video recording. This
for Your IP Camera System? for
IP cameras include nice features
geographic locations. The VMS
means that the home video system
more about this topic.
for personal use, such as viewing
provides sophisticated IP camera
may record quite a lot of video
the video on a smartphone, but
management tools that make it
that is of no interest, making it
Security Provided by Professional IP Camera Systems versus Home Cameras
these features are not safe. They
easy to install and maintain the
difficult to find the important
should not be used in a business
camera system.
recorded video.
systems also have mobile apps,
is designed for a small number of
secure connections to dedicated
The professional IP camera
but these are connected to the
cameras – the IP cameras record
video recording systems. The
systems that are designed for
video management software
to a memory card in the camera
video data stream is encrypted
schools, business, government
(VMS) or the network video
or to a cloud system, which can
and the recording system can
and other organisations provide
recorder rather than the
be costly. The memory cards
handle hundreds of IP cameras.
much better protection from
camera, which provides better
have limited capacity and it is
These systems have effective
hacking and malware than
security control.
difficult to track the recording
alarm detection that only records
pole and then having to replace it
home cameras. The consumer
after a few months of operation.
home cameras are much more
The labour cost alone will make
60 // SECURITY SOLUTIONS
IP camera system. Professional
A home-type IP camera system
recording system is used, it must be connected through the home
Consumer IP cameras have
Professional IP cameras have
securitysolutionsmagazine.com
Integration of Professional IP Camera Systems and Other Security Systems Commercial IP camera systems can be integrated with door access control, IP paging systems and IP intercom systems to help control who enters a building, thereby increasing security. They can also be used with licence plate recognition systems, gate control systems and biometric access control. To learn more about how to integrate security systems, take a look at our article How to Integrate Door Access and IP Camera Systems.
Summary of how Professional IP Camera Systems Compare to Consumer Home Type IP Cameras critical video. The recording
number of notifications to the
IP camera systems that are
system can be set to record video
security centre and reduces the
designed for professional
if something is a certain size, or
recorded video. Professional IP
applications provide better
if a person crosses a pre-set line.
cameras are also available with
quality, reliability and
It can also detect an object left
intelligent video capability. For
functionality to users such as
in a lobby, or trigger an alarm
information about all the features
required by business, schools,
when a laptop is removed from
provided by intelligent IP video
hospitals, government and
a desk. The recording systems
cameras, look at our article The
commercial organisations. They
include search features that
Intelligent IP Camera.
are designed to support large
allow users to find relevant video quickly.
There are also high-
numbers of cameras, are more
performance PTZ cameras with
secure and allow users to easily
extended range that allow users
identify security problems.
Performance of Professional IP Camera Systems Versus Consumer Cameras
to see objects that are miles away.
Although consumer IP cameras
These special cameras include
are inexpensive, they are not right
infrared (IR) illumination or are
for commercial applications. n
Professional IP cameras provide
can see during day and night.
owner of Kintronics. Kintronics
advanced features and functions
Users can select from professional
specialize in providing network
that are not available in consumer
off-the-shelf PTZ IP cameras
attached IP camera surveillance and
cameras. One important aspect of
or custom-designed PTZ IP
security systems, optical storage
commercial IP camera systems is
camera systems that allow them
systems and network attached
that they can be adjusted to reduce
to see things that are over five
storage. For more articles like this
false alarms, which controls the
miles away.
one visit https://kintronics.com
securitysolutionsmagazine.com
“THE PROFESSIONAL IP CAMERA SYSTEMS THAT ARE DESIGNED FOR SCHOOLS, BUSINESS, GOVERNMENT AND OTHER ORGANISATIONS PROVIDE MUCH BETTER PROTECTION FROM HACKING AND MALWARE THAN HOME CAMERAS.�
teamed with thermal imaging cameras to create systems that
Bob Mesnick is President and
SECURITY SOLUTIONS // 61
CYBERSECURITY
THE IoT COMES TO COMMERCIAL SECURITY BY ANNA SLIWON-STEWART
The use of wireless technologies
by sending data to the control
in commercial security
panel and receiving commands
installations has traditionally
from the control panel.
also being widely deployed. All these developments can
industry to develop alternative networks to help resolve
help broaden the role of the
issues like signal pollution,
intrusion control panel and
insufficient range, power
potentially turn it into a form of a
consumption, capacity and the
local signal processing hub. This
cost of devices that will connect to
as regulatory restrictions and
Improving Availability of Communication Pathways
is happening alongside increased
these networks.
insurance liabilities. However,
Developments in IoT technologies
adoption of smart building
the industry and the regulatory
promise to improve the range of
platforms, to which the intrusion
authorities have made big strides
communication paths available
system can feed vital data. Smart
in recent years towards facilitating
for the exchange of data in
building platforms primarily
Narrowband Accelerates IoT Connectivity
adoption of new technologies in
building systems. The adoption
benefit from the underlying
To help meet this communications
commercial security installations.
of IoT communication protocols
cloud infrastructure for data
challenge quickly,
in intruder alarm systems will
processing. However, the traffic of
telecommunications companies
from the world of Internet of
increase the average number of
signals travelling to the cloud over
have dedicated part of their
Things (IoT) which, until very
sensors connected to each system
internet protocol (IP) connectivity
Global System for Mobile (GSM)
recently, has been the purview
and could promote the wider
has become too great in some
communications infrastructure
of residential intruder alarm
deployment of wireless sensors
cases, which reduced efficiency of
to IoT-suitable technologies called
systems. IoT has enabled users to
in commercial installations. The
the connection and risked some
narrowband IoT (NB IoT): CAT-NB
create true networks of devices
variety of sensors that will be
signals being delayed. Locally
and LTE-M. CAT-NB and LTE-M
that can cover the entire area of
connected to commercial intruder
based devices can ease some of
are two protocols suitable for IoT
the home and work together to
alarm systems will also increase,
that burden by pre-processing
that operate as part of existing
provide the user with ultimate
with temperature sensors,
data on the ground and sending
mobile networks, allowing service
home comfort and security
humidity sensors and, potentially,
conclusions to the cloud. This
providers to offer immediate IoT
through one system. IoT has also
smoke and heat detectors able
means that the intruder alarm
connectivity to their customers.
facilitated creating mesh networks
to connect using alternative IoT-
control panel can take on a more
However, the deployment
where each device talks to each
suitable protocols. As the focus
strategic role, in both the context
costs of NB IoT are quite high
other, exchanging data about the
on environmental friendliness of
of IoT and smart buildings.
compared to other low-power
area which they overlook, instead
buildings and employee wellbeing
of leading only a two-way dialogue
increases, air quality sensors are
been burdensome, due to range and coverage issues, potential for signal interference as well
The latest innovation comes
62 // SECURITY SOLUTIONS
Recently, there have been efforts by the telecommunications
wide area networks (LPWAN) and therefore may not be the
securitysolutionsmagazine.com
best option for single-building
security measures in line with
because the battery life, range
protocols are currently available
installations. Also, because
their specific requirements.
and maintenance of such
in the market, although
systems will become much less
development efforts continue.
NB IoT uses existing mobile
Furthermore, signals sent
networks and their frequencies,
over such networks potentially
it still faces the same challenges
can be more resistant to
of weak signal penetration
jamming. LoRa, for example,
deployment will allow end-users
examined and designed out of
in thick-walled buildings or
sends the signals over a broader
to connect more smart devices
the system architecture. In the
underground facilities.
frequency spectrum.
at a lower cost than adding
case of private IoT networks,
Signal stability should be
ZigBee/Z-Wave devices. The cost
the responsibility for network
Low-power, Wide Area Networks Join the IoT
improved as LoRa also uses sub-
of adding LoRa LPWAN modules
continuity, maintenance,
GHz spectrum, which helps it to
to the intrusion control panel
repair and security will rest
LPWANs such as LoRaWAN and
avoid the overcrowded 2.4 GHz
is minimal ($5), while a Z-Wave
with the network owner. This
Sigfox are the two most popular
spectrum, which is the staple of
module adds around $50.
responsibility will require
alternatives that work alongside
Wi-Fi and IP communications.
3G, 4G and 5G frequencies. Each
The very long range of Sigfox
labour intensive. Ultra-low costs of
Even if sensors are deployed
Cybersecurity risks will also need to be carefully
employing staff members with
with the specific purpose of
relevant expertise. There is also
has specific features that make
or LoRa means that the problem
providing intrusion detection,
the question of how inherently
them suitable for either urban
of the distance of motion
they will be ready for use in a
secure IoT communications
or rural area IoT applications.
detectors from the intrusion
smart building setup without
are and what providers of the
These networks allow public
control panel is resolved and
additional systemic changes.
network infrastructure will
and private setups that can
the need for additional signal
be more suitable for specific
repeaters is eliminated. This
The Hurdles
of signals sent through them.
installations. For example,
reduces the complexity of
One of the key barriers that may
Currently, wireless devices using
utilities and other critical
the setup of a building-wide
prevent adoption of pure IoT
proprietary frequencies can
industries prefer to use private
intruder alarm system.
technologies in intruder alarm
benefit from signal encryption
installations is regulation. While
as it travels between the sensing device and a control panel.
networks due to capex versus
The arrival of advanced IoT
need to do to ensure security
opex tradeoff, data security
connectivity in commercial
Z-Wave technology received
and increased control over the
intruder alarm installations
a UL certification in 2017,
critical infrastructure. They
will mean that wireless sensors
none of the other IoT-specific
that requires too much effort
also allow network owners to
can finally be deployed on
technologies have yet. Very few
for building developers,
customise communications and
a much wider scale. This is
security devices that use LPWAN
manufacturers or service
securitysolutionsmagazine.com
This may be an activity
SECURITY SOLUTIONS // 63
CYBERSECURITY
providers to undertake. Hence,
be able to provide full support to
products and applications, there
one supplier that can provide
companies wishing to use
their customers.
may be a shortage of multi-
a necessary die to create such
protocol chips that could allow
devices, hence there is significant
IoT network services for their
Another potential difficulty
connected buildings will need to
is with the trend of creating
the devices to work on the basis
risk involved with supply of the
either use the services of mobile
multi-communication devices.
of LoRa and NB IoT. In the initial
key component to such multi-
network providers or work with
In the residential space, control
stages of deployment of LoRa
protocol devices. n
local IoT network developers.
panels have begun to incorporate
and other IoT communication
Installers working with IoT
Anna Sliwon-Stewart is a
three or four key communication
networks, it may be necessary
products will need to undergo
technologies to make them as
for devices to use chips that can
market research analyst with IHS
training and be well-versed in the
versatile and flexible as possible.
transmit over both protocols.
Markit, a leader in research for the
workings of these technologies to
In the expanding world of IoT
However, currently, there is only
security industry.
64 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
FOLLOW US ON INSTAGRAM instagram.com/securitysolutionsmag
SCAN CODE WITH YOUR CAMERA
PROFESSIONAL DEVELOPMENT
SURVEILLANCE DETECTION ENABLED SECURITY BY AMI TOBEN
Surveillance detection (SD) has
possibly some subtle mistakes that
thankfully received increasing
might only be apparent to an SD
amounts of attention in recent
operator who knows what to look
years, as more and more industry
for. It is possible that the detection
professionals (and even some
of these subtle indicators will
non-industry professionals) are
take quite a bit of time, requiring
waking up to its potential benefits.
a number of fully dedicated SD
As positive as this development is,
operators; which is one of the
it does create the need to abolish
reasons why SD operations are
some misconceptions regarding
so costly and still not all that
SD, and to better explain how it
common (though more common
can actually benefit real-world
than before).
protective details. In order to detect the subtle
Now, let me make what might be a contested claim – for anyone
indicators of hostile surveillance,
who is dedicated to conventional
SD operators must first be
or even low-profile security
well versed in surveillance
(including executive protection
operations. Generally speaking,
[EP]), even if it is on the highest
these indicators consist of subtle
level, surveillance detection, in
correlations to the target, and
its purest form, is not exactly
66 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 67
PROFESSIONAL DEVELOPMENT
open to you. I hasten to add that
a matter of not being able to be
Lest you think I am
this is not because of training
in two places at the same time
only picking on individual
or experience, but because of
while simultaneously performing
operators, it is important to
the necessity to operate covertly
two very different roles. So, for
understand that SD is much
though individual qualities
– without which, a potential
the same reasons you cannot
more determined by operational
might be insufficient by
surveillance operative would be
direct traffic at an intersection
parameters than it is by the
themselves to constitute a full
able to know who and where the
while simultaneously taking
individual’s skill and motivation.
SD program, they can get you
operator is and, therefore, not
an aerial photo of the area,
As qualified as a security
closer to what can be termed
allow the operator to detect any
you cannot perform physical
operator might be, in the
SD-enabled security, which, for
subtle indicators of surveillance.
security (including EP) while
absence of a functioning covert
many organisations, turns out
It is not a question of skill; it is
simultaneously providing SD.
SD program, you are probably
not only to be more realistic, but
68 // SECURITY SOLUTIONS
not going to end up with real surveillance detection. The good news is that, even
securitysolutionsmagazine.com
can include an attempt to detect
will be conclusively detected
(and possibly acknowledge) any
by an SD-enabled operator.
person spending time, or even
Nevertheless, when even a skilled
just passing through, the area
surveillance operative is observed,
(regardless of whether or not
acknowledged and verbally
they exhibit any surveillance
engaged (possibly in more than
indicators).
one location), a strong message
It is important that a
is being sent – namely, that
particularly large amount of
security understands where to
attention be paid to the vantage
look and what to look for, and that
points around a target. These
planning, much less executing,
vantage points can be plotted
an attack might be too risky
out by an SD professional,
and difficult.
performing what is called
It is also important to note
surveillance mapping. This
that there can be quite a few
special attention to the vantage
variations on the theme of
points can include (but is not
SD-enabled security and that
limited to) careful observations
in addition to, or instead of, the
of people at those locations,
proactive deterrence channel, a
casual acknowledgements of
slightly more covert and reactive
these people and even polite
channel is also available. There
verbal engagements.
is, as always, way more than
Note that this idea of
one way to skin the hostile
surveillance mapping does not
surveillance cat, and more than
necessarily have to entail a
one way to combine security and
prolonged and comprehensive
surveillance detection.
process. If a principal will be staying at a certain hotel, for
For more information, please check out Protection Circle. n
example, various vantage points, both outside and inside the
An experienced security
hotel, can be mapped out by an
director, consultant, trainer,
SD-enabled advanced team in a
operator and business developer,
relatively short amount of time.
Ami Toben has over 14 years
These potential vantage points
of military and private sector
then receive special attention
security experience, and a
before and while the principal
successful record of providing
much more useful, cost effective
profile, SD-enabled security force
is in the hotel. This, of course,
full-spectrum, high-end services to
and desirable.
to detect it. What we can expect,
applies to the residence and
Fortune 500 corporations, foreign
however, is to deter it.
workplace as well, where even
governments, foundations, non-
more attention and time should
profit organisations and wealthy
be invested.
individuals. Ami is currently
The process of learning SDenabled security is not entirely
The idea here is to combine
different from that of pure SD. The
a number of actions that will be
biggest difference comes in the
viewed unfavourably by hostile
implementation part of it, and in
surveillance operatives. Perhaps
trained surveillance operative
special operations at HighCom
the realisation that if surveillance
the most basic of these is an
would probably assume a vantage
Security Services, a US-based
is conducted at a high enough
active projection of visual control
point only after having established
high-end security firm specialising
level, we cannot realistically
over the area around the target,
a solid cover and cover story,
in protective services, security
expect an overt, or even low-
which, depending on the situation,
making it unlikely that he/she
systems, consulting and training.
securitysolutionsmagazine.com
Keep in mind that a well-
director of consulting, training and
SECURITY SOLUTIONS // 69
LOSS PREVENTION
70 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
HOW A SAFE, EFFECTIVE EMPLOYEE TERMINATION PROCESS CAN PREVENT A STORE TRAGEDY BY GARETT SEIVOLD
Employees with a history of violence or threats represent a higher risk, and the employee termination process for those individuals should follow the strictest security measures.
The horrific event that unfolded in
consultant and regular expert
supervisor during a termination
history to look for signs that
February at a manufacturing plant
witness in workplace violence
and speaks with the employee
special security measures might
in Aurora, IL – when a long-time
cases, said he still sees employers
about any unresolved issues,
be necessary.
employee, in the midst of being
mishandle these employee
such as benefits, pay and so on.
• Employees with a history of
fired, pulled out a gun and killed
termination process events.
The employee is told to address
violence or threats represent a
three people and wounded several
“Helping workers preserve their
any further questions to HR in
higher risk, and the employee
more before his rampage ended –
dignity is important, so they still
an effort to take the supervisor
termination process for those
is a risk every employer faces.
have something left to lose,”
out of the communication link,
individuals should follow the
A job termination is an
he said. Sem said it is when a
according to an HR specialist
especially delicate task – one that
worker feels he or she has lost
with the USPS. “It is critical that
should follow a specific security
everything that a violent incident
a relationship that is likely bad
he or she has a history of
game plan every time it happens.
is most likely.
already not be allowed to get
filing grievances or lawsuits,
worse through additional contact
retailers should also be on high
According to a national
The United States Postal
strictest security measures. • If the employee’s record shows
survey of company security
Service (USPS) has certainly had
between the parties during the
alert, as studies show that such
executives, 26 percent perceive
its share of high-profile problems
employee termination process,”
individuals pose a greater risk
the act of firing employees as
with disgruntled ex-workers
noted Sem.
“significantly contributing”
(giving birth to the common slang
to the risk of violence in the
expression ‘going postal’), but
workplace. Not surprisingly,
USPS has worked hard to address
the issue is seen as particularly
of future violence. • Although prior violent acts are the most accurate predictor
the risk, implementing a soft exit
Risk Assessments for the Employee Termination Process
problematic by security leaders at
program to provide managers
Prior to delivering bad news to
have expressed unfounded
large organisations.
with a support system when
an employee, retailers need to
or delusional claims that co-
Although the danger is
they have to fire an employee.
spend sufficient time reviewing
workers are “out to get them”
rather obvious, Richard Sem, a
An HR representative joins the
the individual’s employment
should be considered high risk
securitysolutionsmagazine.com
of future violent behaviour, non-violent employees who
SECURITY SOLUTIONS // 71
LOSS PREVENTION
“Studies show that employees with many years in a job are more likely to react violently to a perceived unfairness, such as being fired or passed over for promotion, than employees with just a year or two with a company.”
when they are terminated,
news. “People who got away with
of the Henry Pratt Company. The
Moreover, the threat from
suspended or reprimanded.
inappropriate behaviour, who got
more value an employee attaches
violence associated with a job
• A termination that would not
a slap on the wrist time and again
to the job, the more stressful
termination does not end on the
ordinarily be characterised
until it escalates to where you are
he or she finds a disruption in
day of discharge. According to one
as high risk may warrant
forced to address it, feel entitled
job status.
workplace study, the mean length
such a classification if the
to any behaviour in the same way
employee being terminated
a bully does,” said Sem. “They can
to conduct careful reviews
violence following termination is
is also under severe financial
be hostile and respond violently
of employee records and to
six months, as resentment toward
pressures, such as undergoing
when you finally try to put your
interview supervisors to gauge
the previous employer often
a foreclosure.
foot down.”
the potential for violence, there
intensifies when a fired employee
may be no red flags in some
cannot find new employment.
Retailers also need to critically
Finally, retailers should
While it is wise for companies
of time for acts of workplace
review their past handling of a
recognise that long-term
situations that turn violent. Every
problem worker prior to his or her
employees may actually present
time an employee is fired, even
dismissal or discipline, according
a greater threat in the wake
in cases when the termination
to a former workplace violence
of a job termination. Studies
is expected to go smoothly,
specialist for the North Carolina
show that employees with many
stores should follow relevant
Recommended Security Procedures for the Employee Termination Process
Office of State Personnel.
years in a job are more likely
security recommendations.
The mechanics of a termination
to react violently to a perceived
Sometimes the employee
– location, time and so on – can
to get away with aggressive
unfairness, such as being fired or
termination process may demand
minimise risk by removing
behaviour in the past – something
passed over for promotion, than
an extra security presence,
the opportunity for violence.
companies find difficult to
employees with just a year or two
but all bad news delivered to
Security leaders should help
acknowledge – that worker is
with a company. For example,
employees in the work setting
their retail organisations to
more likely to react aggressively
Gary Martin (the Aurora, IL,
should be recognised as high-
develop a written policy on
on the occasion of negative
shooter) was a 15-year veteran
risk situations.
how to conduct a layoff or a
If a worker has been allowed
72 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
when a store needs to take
• Have security staff stay with
extraordinary security
an employee you believe
precautions during a dismissal.
might be dangerous until he
Supervisors may also need to
or she leaves the premises.
occasionally deliver other types
Only use quality officers for
of unwanted news to employees,
this detail, ones whom you
making it important that they
trust to handle the dismissal
have the skills to do so effectively.
quickly and smoothly
The entire employee termination process should last no longer than 15 minutes, and a difficult termination should be as
without unnecessarily confronting or humiliating the exiting employee. • If firing an individual for
brief as possible. Notification of
behavioural problems, position
the firing should be immediate,
security staff in or just outside
rather than slowly building up to the news, and the dismissal should
the room. • If the employee being
be direct and leave no room
terminated has previously
for confusion.
issued threats of violence, a
To expedite the process, all the
protection team of security
materials necessary to complete
professionals in plain clothes
the termination process should
should be available during the
be at hand, including a written
termination. They should also
explanation of any severance
remain onsite for a reasonable
benefits, counselling or out-
period of time to ensure that
placement services and the name of the specific manager with
the individual does not return. • Consider soliciting help from
whom the worker must make any
local law enforcement during
necessary future contact.
any high-risk employee
It is important to never take a
termination process.
break during a job termination,
This article first appeared in Loss
say experts. There have been cases
Prevention Magazine. If you would
job termination, including the
in which employees have asked
like more articles like this one, visit
identification of all individuals
for a break during a firing and
losspreventionmedia.com n
who need to be notified in
gone to their desk or vehicle to
advance of the event.
retrieve a gun.
It is possible for store
If it is the conclusion of a
Garett Seivold is a contributing writer for LP
managers, the HR department,
threat assessment that a specific
Magazine. He is a trained journalist
security, and legal departments to
firing is high risk, experts suggest
who has been covering corporate
find themselves at cross-purposes,
that an employer should consider
security for industry professionals
say experts, which makes a cross-
the following security measures:
for eighteen years. Since 1998,
disciplinary, team-based solution
• Watch for the worker’s arrival
he has served as the principal
the most appropriate avenue
on the day of termination
writer and editor of Security
to pursue.
to see if he or she might be
Director’s Report, a monthly
bringing a weapon into the
publication highlighting trends
workplace violence prevention
workplace. Often, when
and best practices in corporate
is critical. Although supervisors
a fired worker goes on a
security management. Seivold
should not typically fire
shooting rampage immediately
has been recognized by several
employees directly, they are in the
following being fired, they
organizations for outstanding
best position to assess the violence
suspected the news was
writing, investigative reporting, and
potential of individuals prior to
coming. For a high-risk
instructional journalism. He has
termination. If supervisors are
termination in which this is
authored dozens of survey-based
well trained in the warning signs
a possibility, organisations
research reports and best-practice
exhibited by potentially violent
should consider hiring an
manuals on security-related topics.
employees, they can act as a vital
off-duty officer to be present or
Seivold can be reached at GarettS
security asset by recommending
holding the meeting off-site.
(at) LPportal (dot) com.
Training supervisors in
securitysolutionsmagazine.com
“The mechanics of a termination – location, time and so on – can minimise risk by removing the opportunity for violence.”
SECURITY SOLUTIONS // 73
PRODUCT SHOWCASES
THE MANTIS X10 The Mantis X10 is the ideal
There is a USB charging cable
the original point of aim
training tool for anyone who has
Mantis X10 case and foam insert,
• Recoil angle: the angle to
to carry a firearm for work. In
quick start guide and the MantisX
addition in addition to being
app to enable you to use all the
the ideal companion tool for
diagnostic tools.
use with the SIRT Pistol (see the
One of my favourite features
• Shot: time from Horizontal to when the shot breaks
the left or right that the gun
In the second screen, MantisX
moved as it recoiled upward
displays overlaid traces of all the
• Recoil width: the width of the
holster draws in that session.
loop formed by the upward
This is valuable in assessing the
showcase on the SIRT in this
of the MantisX system is recoil
and downward movement of
path of the draw, the consistency
issue), the Mantis X10 users
analysis tool
the gun
of the draws across your session,
with a wide array of training
The recoil analysis tool gives
Clicking on each measure will
and highlighting any variance or wobble in your draw.
features including:
you the ability to quantify recoil
show summary data for that
• Courses
(and recoil management) on a
session: the session average,
• Coaching tips
gun. According to Mantis, they
and a chart showing detailed
10 also includes tools for:
• Historical Tracking
have the nerdiest (i.e. best)
comparison for all shots for
Multi-target analysis **
• Groups and Messaging
engineering team in the business,
that measure.
Shooting on the move **
• Analysis Features
and with the combination of
• Muzzle trace
hardware expertise and mind-
the MantisX 10 system is the
• Trigger control analysis
numbing software algorithms,
holster draw analysis
• Shot timer
they have created the first device
• Smoothness analytics
to accurately and reliably give you
again available by connecting
• Consistency comparisons
data on not just your gun’s recoil,
your MantisX app to a Mantis
• Recoil analysis
but your response to that recoil.
X10 sensor, then launching
love about this diagnostic tool
Recoil analysis is available by
Another invaluable tool within
Holster draw analysis is once
The top of the line MantisX
Rapid fire ** Moving targets (shotgun) ** And, free software updates as well as phone and email support. Perhaps the feature I most
the “Holster Draw Analysis”
however, is that each time the
connecting the MantisX app to a
drill. This drill will allow you to
software identifies a potential
data points per second, the
Mantis X10 sensor, then launching
perform any number of holster
flaw in your technique, it
X10 analyses your shooting in
the “RecoilMeter” drill. This drill
draws in a session, giving you
provides a range of coaching
real-time. For pistols, rifles, and
session will allow you to shoot
detailed analysis about each draw,
videos and tips to help address
shotguns. The X10 works with
any number of shots, giving you
in two diagnostic screens.
and overcome that problem.
dry fire, live fire, airsoft/CO2, and
detailed analysis about each shot,
simulated weapons systems.
and summary data, in a single
breaks down your holster draw
your own professional coach
analysis screen.
into key phases, to identify
watching and analysing every
inconsistent or slow phases:
shot you take and then offering
• Grip: time from the start beep to
improvement suggestions.
Collecting thousands of
The system comes with Mantis X10 Elite sensor which
Mantis measures and
can be fitted to a guns accessory
calculates four key components of
rail or even to the bottom of a
recoil such as:
magazine where necessary. It
• Muzzle rise: the peak angular
also comes with the BR7 Barrel Mount Picatinny Rail for rifles and shotguns.
74 // SECURITY SOLUTIONS
rise of the gun after the shot • Recovery time: time for the gun to return and stabilize to
In the first screen, MantisX
when your hand grips the gun • Horizontal: time from the
It is quite simply like having
We cannot recommend this product highly enough. n
grip to when the gun is drawn and rotated to horizontal alignment
For more information visit mantisx.com
securitysolutionsmagazine.com
SUBSCRIBE TO OUR NEWSLETTER For the latest news, products and events in the security industry
securitysolutionsmedia.com/newsletter
Carrying a firearm for security
high-volume self-diagnostic
exactly mimic the trigger pressure
drills, draw and fire drills, the list
work is a major responsibility and
training with no set up and safe
in the real world versions of both
goes on.
one that you be prepared for to
sustainable training.
the GLOCK and the S&W MNP. The
the best of your ability. However,
This replica firearm is available
What’s more, because the SIRT is
second laser activates once the
not classed as a firearm or prohibited
the reality is that time on the
in two variants, either a GLOCK or
trigger breaks (using the pressure
weapon in parts of Australia, you can
range is expensive, ammunition is
a S&W MNP. The SIRT is available
required to fire the real gun)
keep one at home a train regularly.
expensive and hiring a qualified
in number of models ranging
showing the user exactly where his
Just a few minutes of mindful
instructor can be really expensive.
from the entry level see through
or her shot would land. Using this
practice per day focusing in drawing
So what is the alternative?
plastic polymer version through to
dual laser system, one can train a
and developing am accurate site
In reality, a great deal of one’s
a polymer frame with metal slide
diagnose a wide range of issues
picture can have a significant impact
ability to shoot accurately comes
that weighs exactly the same as a
that can effect one’s accuracy with
on a real world skills. Combine that
down to three fundamentals, grip,
real firearm.
a handgun. Issue such as snatching
with trigger control and you will be
The SIRT is designed around
the trigger, poor site alignment,
more accurate than even in very little
you have learned these three
the use of dual lasers built into the
allowing too much slack on the
time. SIRT even provide a range of
fundamentals, a lot can be done
training tool. The first laser activates
trigger between shots (slapping the
training material on line for free to
to significantly improve your skill
when enough pressure is applied
trigger), poor grip and so on.
help users make the most of their
with a fire just by practicing those
to the trigger to simulate taking up
three things.
the trigger slack to the point that
weighted magazines used by the SIRT
stance and trigger control. Once
Furthermore, the accurately
practice time.
n
For more information on
The SIRT Pistol, which stands
the trigger is about to break causing
enable users to carry out a significant
for Shot Indicating Resting Trigger,
the gun to fire. The trigger pressure
range of useful drills from mag
the SIRT Training system visit
was specifically designed for
in all SIRT models is designed to
changes to reload drills, stoppage
nextleveltraining.com
securitysolutionsmagazine.com
SECURITY SOLUTIONS // 75
PRODUCT SHOWCASES
VIKTOS GUNFIGHTER JEANS DARK INDIGO BLACK ARMS, BLUE JEANS
VIKTOS Gunfighter Jeans Dark
From the jungles of Vietnam to
• Attackposture Fit
the mountains of Afghanistan,
• Cordura Stretch Denim Chassis
denim jeans have been the
• Stretch Cordura Crotch Gusset
unofficial pant of Special
• Padded Waistband
Operations Forces units for
• Oversized Belt Loops Fit
decades so it only stands to reasons that they should be great for cover security work. The GUNFIGHTER Jeans, take this benchmark and notch it up for the ultimate denim force multiplier. The Gunfighter jeans are constructed with a
Indigo features include:
Tactical Belts • Hipshoot Magazine Hip Pockets • Cashout Pistol Magazine Coin Pocket • Hidden Waistband Stash Pocket • Velcro Moral Patch Compatible
Cordura stretch denim/nylon
• US Veteran Design & Developed
blend and feature a proprietary
• 1 Year Manufacturer’s
stretch Cordura crotch, for
Warranty n
uncompromised mobility & durability. Black arms specific
Tactical Gear Distributors are
pocketing, and padded waistband,
proud distributors of VIKTOS in
they are the perfect pant for your
Australia. For more information
daily gunfight.
visit https://tacticalgear.com.au
76 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
F O L L O W U S O N I N S TA G R A M For the latest news, products and events in the security industry
instagram.com/securitysolutionsmag
THE VIKTOS 3L TEAM HARD SHELL JACKET BLACK NIGHTFALL
A good jacket can be a life saver
shell, up-armored with ballistic
Shell Jacket Black Nightfall
in security work as you are often
nylon paneling, is robust enough
features include:
outdoors. However, finding one
for multiple deployment cycles.
• Attackposture™ Fit
• Eight Exterior Pockets
that is robust enough to cope with
Magnetic closures, Gunvent™
• Waterproof/Breathable 3Layer
• Interior Carry Pockets
the demands of the job, while also
sidearm access zippers, oversized
offering access to equipment is
pass-through venting, and
almost impossible. Until now.
numerous pocketing create
The VIKTOS 3L Team Hard
Nylon Shell • Dupont® Teflon® WaterResistant Coating
• Gunvent™ Sidearm Access Zippers
• US Veteran Design & Developed • 1 Year Manufacturer’s
a jacket that is fully mission
• Fully Seam Sealed
Warranty n
Shell Jacket Black Nightfall is
capable. If your objective
• Ballistic Nylon Reinforced
Tactical Gear Distributors are
the first line of defense against
takes you into harm’s way,
unforgiving elements. It’s
dress appropriately.
waterproof & breathable 3Layer
securitysolutionsmagazine.com
The VIKTOS 3L Team Hard
Elbows
proud distributors of VIKTOS in
• YKK Aquaguard™ Zippers
Australia. For more information
• Magnet Pocket Closures
visit tacticalgear.com.au
SECURITY SOLUTIONS // 77
PRODUCT SHOWCASES
WOLF EYES TORCHES
We have said it time and again, not
torches, Sniper E torches and Pro
all torches are created equal. This
Police LED torches are their most
vehicles, you can’t go past the Wolf
also comes with a smaller 50mm
is an important fact to understand
popular models, with the smaller
Eyes Seal LED
reflector LED torch head, giving a
for security and law enforcement
Sniper II Mini LED torch just behind.
personnel because your torch is
Seal LED torches and Ranger 56
As a flood light for patrol
light out to 500 metres. This torch
The Wolf Eyes Seal torch has
nice spot surrounded by flood out to
been designed from the ground up
150 metres, great for just for using as a general torch.
one of the most important tools you
LED torches are great choices, while
to be the best possible torch for the
can carry.
those who need big outputs and
user who needs distance. It starts
floods of light are well served by
with the 25.4mm (1�) torch body size
boasts the kind of performance,
construction and quality. Other offer
the Pilot Whale Dive - also good for
which suits almost all mounts, this
build quality and output that we
more reasonable pricing. Few offer
diving! Our rechargeable batteries
6061-T6 aluminium alloy body is
have come to expect from products
both. Wolf Eyes offer a range of LED
are high power lithium ion. If you
lined with our brass Thermal Transfer
three times the price.
torches that are high power, variable
need help choosing between LED
Tube to wick damaging heat away
mode and rechargeable designed
torches our guide "Which Torch To
from your high power LED. The torch
for professional use. For security
Choose" may help or please call us
then features a huge 83mm aspheric
and Police use the Sniper II Pro LED
on 1300-
LED head, capable of throwing
Some torches offer superior
78 // SECURITY SOLUTIONS
This fully rechargeable torch
This one is definitely a keeper. n For more information visit www. wolfeyes.com.au
securitysolutionsmagazine.com
SPOTLIGHT
USING SECURITY AS A BUSINESS DRIVER
F
ounded in 2010,
data that helps drive business
their own data services brings
NEXTDC is one of
outcomes while creating value for
with it a number of significant
to identify and partner with an
Australia’s leading
the customer.
security challenges. While it is up
organisation that could provide
to each company to ensure the
a world-class, integrated security
data centres. What
According to the Chief Customer
The goal for NEXTDC was
makes NEXTDC unique is that it
Officer and Executive Vice President
integrity of its data in the cyber
offering. As Dzienciol explains,
operates as a service provider,
of Technology, David Dzienciol,
realm, NEXTDC, as the owner and
there are plenty of companies that
enabling organisations to use the
NEXTDC currently operates nine
operator of the physical site at
offer a great video management
data centre as a managed service,
data centres across Australia. “We
which the servers are located,
system, or access control system
renting out space within the data
host co-location provider data
is responsible for ensuring the
or licence plate recognition and so
centre to house and run their own
centres as a service provider for
physical security of those assets.
on, but NEXTDC preferred to find a
servers, thereby eliminating the
some of the largest companies in
Dzienciol and his team at NEXTDC
vendor that could bring all of those
expenses, infrastructure,
the world. We have a rich partner
need to have a security platform in
products and expertise together –
maintenance and, interestingly,
ecosystem of roughly around 550
place that will enable NEXTDC to
or unify them – into one system.
many of the security issues inherent
partners. We currently have over
deliver on its brand promises, one
in running one’s own data centre.
1,100 customers.
of which is security – both physical
leading security, Dzienciol
and general security.
explains, “We wanted to be able
The partnership between
“We provide on-ramp
Beyond providing class-
NEXTDC and its security platform
connectivity to six of the major
provider, Genetec, serves as a
cloud providers via our AXON
organisation faces involves
driver. Something that would
clear example of how security
layer 2 ethernet platform and we
designing, building and delivering
help us establish a unique point
has evolved over the last decade.
also have our ONEDC customer
world-class facilities that enable
of difference in the market. We
No longer is security just about
portal that allows our customers
the company to grow, both with
wanted our security to be a
providing best-of-breed cameras,
to gather intelligence around their
the needs of its customers and
business enabler and not just
detectors and access points; the
infrastructure and critical assets
the growth of the market. “We
an expense as so many people
focus for security providers and
while also providing rack locking as
made the decision very early on
often perceive it to be. By
end-users moving forward is how
a capability.”
in our business planning that we
partnering with Genetec and using
were only going to partner with
Genetec solutions, we can say
those devices, in conjunction with
As one might imagine,
The other big challenge the
to use our security as a business
intelligent software, can be used to
providing a co-location service in
world leaders, which is why, when
to our partners and prospective
better understand the nature of the
which a multitude of companies
looking for a security partner, we
customers, you know that when you
business, and provide intelligent
can choose to house and run
chose Genetec,” states Dzienciol.
choose NEXTDC you are getting the
79 // SECURITY SOLUTIONS
securitysolutionsmagazine.com
very best security for your data and
advanced customer experience. The
centre for that physical experience,
differentiator. I don’t think people
services.”
way in which we do that is through
the security not only becomes part
thought about it as a way to drive
a combination of technology,
of the value proposition, it actually
greater customer experiences
Director of Strategic Partnerships
people and process. So, on the
becomes frictionless. It works. It
either. As we run a 24/7, 365
at Genetec, its Security Center
technology side, Security Center,
always works, and it’s not seen as
business across nine sites, as we
platform was a natural fit for
combined with some of our other
something that’s cumbersome for
scale up or scale out, we’ve started
NEXTDC. “Utilising Security Center
systems like CRM and ticket
our customers.”
to realise more and more that
Omnicast™ for video management
management, helps us to offer that
and Security Center Synergis™ for
frictionless experience.
According to Philippe Ouimette,
Beyond the obvious access
through partnering with Genetec to
control and video surveillance,
utilise next generation, world-class
Dzienciol explains that Security
security, we can actually continue
access control, we are able to build
“We realised as we were
upon the capabilities of our offering
adding more and more sites that
Center allows NEXTDC to address
to innovate and continue to find
with the growing needs of each site.
one of the challenges we were
broader customer requirements
ways to differentiate ourselves in
With nine sites across Australia,
facing was the ability to deliver
such as reporting and compliance.
the marketplace by not just having
the logical step was the integration
security in a manner that was
“These are real value adds for
a box called security and ticking
of all these sites together into
neither resource intensive nor
our customers. Many, many
the box. We’re trying to use it as a
one system with Security Center
cumbersome. We didn’t want the
customers come to us on a rolling
value add, but also combine it with
Federation™. Now, as we look
people bringing our customers in
basis because we assist with their
other business processes. So, for us,
towards the future, we’re running
and out of our facilities to operate
compliance requirements by
looking at the way we do request
tests with licence plate recognition,
in a swivel chair environment
providing what we would refer to as
and ticket management, and how
seeing how that might enable the
in which they were required to
‘customer reporting’ in a way that
we think about if there’s access
business moving forward.”
move from system to system. We
is helping them reduce their own
control requirements that might also
really wanted a unified view of
complexity and overhead. When
bleed into parking requirements and
of using security as a business
our entire security process, so that
our customers tell us we helped
delivery requirements, those are
enabler, David Dzienciol explains
regardless of which of our sites a
them reduce the number of hours
the things that make the customer
that the adoption of Genetec
customer was visiting, or who the
or even days involved in generating
experience all it can and should be.
Security Center and other Genetec
customer was, or whichever of
reports and facilitating compliance
For us, our partnership with Genetec
solutions allows NEXTDC to drive
our representatives that customer
tasks, then that is a genuine value
is about finding ways to improve
a greater customer experience.
happened to be dealing with, even
add as a direct result of our security
customer experience, enhance the
“We don’t want to compromise
if they were just logging a ticket,
systems.”
value of our business and better
security, but we want to have a
the experience would be unified
frictionless customer experience.
across everything we do. This way,
in 2010,” states Dzienciol, “nobody
more of the value we create through
Part of our mission is to drive an
when a customer comes to the data
really thought about security as a
the data our system provides.” n
In line with their stated goal
securitysolutionsmagazine.com
“When we first launched back
understand how we can capture
SECURITY SOLUTIONS // 80
Sign up to our eNewsletter and receive up-to-date valuable information regarding all things Security.
www.securitysolutionsmagazine.biz/newsletter