Security Solutions Magazine Issue 97 Digital Version

Page 1


Us & Them

Is The Media Eroding Australia’s Security? #97 SEP/OCT 2015 $9.95 inc GST / $10.95 NZ ISSN 1833 0215

APPreciate your security! WITH Videofied, a key player in the alarm system market!


On detection, the wide-angle camera records a colour video clip.

Depending on the selected panel: • Operates up to 4 years on one set of batteries • Quick installation wireless or powered • Alarm video sent over GPRS / IP • Connected, accessible, portable, usable anywhere


The video is sent to the monitoring station.


The monitoring operators can watch the video of the intrusion in real time, removing any doubt!


When there is a genuine intrusion, the monitoring station calls the police or required response...


Peace of Mind


VIDEOFIED®, simply closer to you...

From your office, holidays or anywhere in the world, the APPlication allows you to check Videofied systems on your smartphone. It’s a real interactive tool between you and the panel. The APPlication* allows you to genuinely APPreciate your security system.

*Contact your distributor / Videofied dealer to upload your application for smartphones. Compatible with iPhone and Android




1300 46 44 55



The W panel is a wireless alarm system which adapts itself to the availability of transmission networks. During an intrusion, the W Panel is able to transmit alarms and videos on the ETHERNET network or GPRS. W-IP720 PANEL


Hardwired inputs / outputs

Optional module (WIO100)

Optional module (WIO100)

Wired siren

Optional (WIS100)

Optional (WIS100)

GPRS Communication IP transmission

The wireless system with colour video verification Thanks to its wireless capability, the Videofied system is easily installed. It also transmits wirelessly through GPRS cellular communications.

Number of devices Power supply Radio



Mains power (WPS100) with battery back-up

Mains power (WPS100) with battery back-up

915 MHz

915 MHz


Programming Button

 Combine Indoor & Outdoor systems  Extend security to protect outdoor assets

 IP65 - All weather anywhere security  100% wireless battery operation  Fast and Easy installations

Detector VGA Day/Night Video camera







Infrared LED Input/Output Integration terminals

*New model (as pictured) COMING SOON in early 2016


Ezi Security designs, manufactures and installs a premium range of electronic perimeter security products designed for both vehicle and pedestrian control. These consisting of a wide range of security products suitable for low to high-risk applications. Ezi Security Systems has been manufacturing quality security products for over twenty-one years with equipment is installed in some of the very harshest of environments the planet has to offer. And all with outstanding results. While Ezi has a commitment to innovative design and quality products we also fully understand the importance of easy and efficient after sales service. Ezi Security Systems services and maintain the products we sell to ensure that your critical infrastructure and personnel are protected at all times. “ALL EZI SECURITY SYSTEM PRODUCTS ARE BUILT TO LAST A RELIABLE THIRTY YEAR (PLUS) PRODUCT LIFE SPAN WHEN MAINTAINED”

Ezi Security Systems has the most extensive offering of Hostile vehicle barrier products (HVB’s) and has the expertise to design and secure any critical infrastructure or site of national importance. Ezi has an extensive range AVB and HVB Crash Certified products such as the world famous TruckStopper, the renowned K12 Wedge, crash boom beams and crash rated static and automatic bollards. Ezi Security Systems has all the realistic solutions to meet your high security requirements while maintaining an aesthetically pleasing solution for your site. All Ezi Security System AVB & HVB have been vigorously crash tested and certified to meet all ASTM, IWA and PAS 68 stipulations. Ezi Security and its partners continue to the push boundaries on all crash products with our in-house R&D security experts providing market leading products designs. This specialist ability also involves our renowned installation expertise and advice with the all important civil work design & engineering. Ezi Security believes in pushing design frontiers for its products to keep pace with marketplace and security priorities. This year alone Ezi and PPG have successfully worked with CTS and crash tested to Pas 68 in 2015 the following products:

M30 Bollard Performance rating V/7500[N2]/48/90:0.0/0.0

M50 Bollard Performance rating V/7200[N3C]/80/90:5.5

Wedge II Performance rating V/7500[N3]/80/90:0.0/20.7 (tested with 4 m blocking width)

With our highly chosen business partners being the best in their field and coupled with our own Ezi Security R&D in house design team Ezi Security continue to push boundaries on market leading and state of the art crash rated designed products. Our ability also involves installation expertise and advice with all important civil work design & engineering.

Ezi also takes pride to provide our clients with more than just perimeter security solutions. We also offer a quality range of internal pedestrian control products from Werra Entrance Control. The Werra Entrance Control range compliments perfectly the already strong offering of pedestrian security control that Ezi Security currently offers to the market. The range includes a wide variety of systems suitable for pedestrian access management that includes the ability to hold and isolate persons of interest and/or concern. Ezi Security again has a quality product for every threat and contingency for building personnel security. All products offer quick access for authorised persons and reliable protection against unauthorised access. With a flow rate of up to 35/min even large flows of people can be monitored and controlled effectively. Werra Entrance Control not only stands for innovative for the individual’s passage of person, but also is an extension for our philosophy of being a professional fullservice provider of all components within perimeter security and access control. Ezi Security Systems, and their business partners, are privileged to be protecting some of the most prestige and iconic man made marvels of the modern era from the Burj Khalifa Tower in Dubai to Australia’s very own Parliament House in Canberra.



1300 558 304 11 Cooper Street Smithfield NSW 2164





COVER STORY THE TRAP OF US AND THEM: HOW THE MEDIA IS CREATING AUSTRALIA’S GREATEST SECURITY THREAT As Australia, along with a multitude of other nations, seeks to battle the growing influence of extremist groups such as Islamic State, we look at the role the media and the government are playing in potentially eroding some of the country’s most effective protections against the extremist teaching and vitriol. Why is the current narrative of the media playing directly into the hands of groups like Islamic State and what can be done to strengthen Australia’s security and counter opportunities for further radicalisation?





John Kendall, security program director at Unisys Asia Pacific, looks at the research findings of their 2015 survey and explains why we need to adopt a more transparent approach to data protection if businesses are to rebuild public confidence in their capability to store and protect Australian citizens’ personal information.


INTELLIGENCE AS A TOOL FOR RISK DECISION MAKING In this issue, we look at security intelligence alongside the familiar security risk management process, providing a consideration to the uncertainty that faces all corporate security practitioners in their day-to-day decision making.


BRIDE OF ISIS Internationally renowned terrorism expert Dr Anne Speckhard takes us inside the journey to radicalisation for young women being drawn to the call of groups like ISIS. How is it happening and what can we do to combat it?


SECURITY IN GOVERNMENT 2015 Find out everything you need to know about this year’s Security in Government conference and expo. We bring you floor plans, exhibitor lists, a conference program and all the information you need to get the most out of your visit.


SECURITY 2015 WRAP UP Did you miss Security 2015? Catch up on all the latest news from the show, including awards, new products and more.




Presco™ Event Logger



The Presco™ Event Logger makes programming multiple Presco™ door access controllers a breeze, providing a user friendly platform for access control with full upload/ download capabilities directly from your PC.

• 12 Volt D.C. operation.

Maximum security is provided with 3 different operator levels for programming, editing user details or simply viewing events. When an event is logged it is locked into memory and cannot be manipulated, so you know the integrity of your access control system is assured.

• Stores 5,000 events with time & date stamping.

PC software supplied for Windows™ Vista, 7 & 8.1.

• 36 month manufacturer’s warranty. • 800 Users with names up to 32 characters.

• Up to 8 Presco™ PAC controllers can be monitored simultaneously giving control of up to 16 doors. • Internal replaceable button cell holds memory and keeps clock running for up to 10 years.

Three software operator levels restricts access to program

For your local stockist visit: Phone: +61 3 9808 6244















018. SECURITY BYTES Funny stories, tips, tricks, trivia and news from the security industry.

070. LOSS PREVENTION Why must loss prevention take a more proactive, as opposed to its traditional reactive, stance in order to remain effective?


It should be called ‘What not to do to end up in this section’, but alas, we find a special home for those who are met with odd criminal situations and a lack of intellect.

078. AVIATION SECURITY Steve Lawson looks at future trends in screening processes and technology.

022. EVENTS CALENDAR A look at upcoming industry events. 026.

INDUSTRY NEWS All the latest from the industry.

028. MLA UPDATE We bring you the latest news and updates from the Master Locksmiths Association.

036. ALARMS What is the value of physical security information management systems?

040. OPERATIONS Richard Kay looks at ways officers can more effectively use their environment to their advantage.

044. CCTV We present the first of a two-part series that looks at the findings from a national survey by the Australian Institute of Criminology into the use of CCTV by local governments.

050. BUSINESS BEYOND What are the top ten emerging technologies that will see the greatest opportunity for financial gain in the security market?

062. JUST LAW Dr Tony Zalewski discusses issues relating to workplace safety and contract security providers.


080. LEGAL Q&A We do our best to answer your legal queries, pro bono.


ACCESS CONTROL What happens when IT systems and security networks collide? How can IT and security work more effectively together? 086.

TRANSPORT SECURITY We present a special examination of the

security issues facing the transport industry and ask what might be done to address these challenges.

094. EMERGENCY RESPONSE How should you manage an active shooter situation?





118. SHOPTALK Company announcements from within the industry.

Superior Detection. All the Time.

The most accurate motion detection camera available. Thermal mini-Bulle T Camer a

• Reduce false alarms with more reliable motion detection • Most affordable intrusion detection and video alarm verification system • Easy integration – PoE/12VDC, IP/ MPX(HDCVI)/analog, ONVIF Find out more at

Images shown are for illustrative purposes only, and may not have been taken by the camera depicted. ©2015 FLIR Systems, Inc.

Asia Pacific Headquarters HONG KONG FLIR Systems Co. Ltd. Room 1613 -16, Tower 2, Grand Central Plaza, No. 138 Shatin Rural Committee Road, Shatin, New Territories, Hong Kong Tel : +852 2792 8955 Fax : +852 2792 8952 Email :


Editorial Editor: John Bigelow Sub-Editing: Helen Sist, Ged McMahon

Contributors: Peter Johnston, Shann Hulme, Anthony Morgan, Rick Brown, Emanuel Stafalidis, John Kendall, Ian Weightman, Anooshe Mushtaq, Tony Zalewski, Codee Ludbey, Darren Egan, Anne Speckard, Anna Richards, Stephen Lawson, Rachel Deluca, Ray Mancini, Greg Muir.

Advertising Phone: 1300 300 552 Publication Co-Ordinator: Stan Asenberger

Marketing & Subscriptions $62.00 AUD inside Aust. (6 Issues) $124.00 AUD outside Aust. (6 Issues)

Design & Production Graphic Design: Jamieson Gross Phone: 1300 300 552

Accounts Phone: 1300 300 552


Interactive Media Solutions ABN 56 606 919 463 Level 1, 34 Joseph St, Blackburn, Victoria 3130 Phone: 1300 300 552 Email: Disclaimer The publisher takes due care in the preparation of this magazine and takes all reasonable precautions and makes all reasonable effort to ensure the accuracy of material contained in this publication, but is not liable for any mistake, misprint or omission. The publisher does not assume any responsibility or liability for any loss or damage which may result from any inaccuracy or omission in this publication, or from the use of information contained herein. The publisher makes no warranty, express or implied with respect to any of the material contained herein. The contents of this magazine may not be reproduced in ANY form in whole OR in part without WRITTEN permission from the publisher. Reproduction includes copying, photocopying, translation or reduced to any electronic medium or machine-readable form.




ABN 56 606 919 463 Level 1, 34 Joseph St, Blackburn, Victoria 3130 Phone: 1300 300 552 Email:






Written Correspondence to:

Or i g i n a l Si z e

















Official partners with:




blue colour changed to this colour green.

COPY/ARTWORK/TYPESETTING APPROVAL Please proof read carefully ALL of this copy/artwork/typesetting material BEFORE signing your approval to print. Please pay special attention to spelling, punctuation, dates, times, telephone numbers, addresses etc, as well as layout.It is your responsibility to bring to our attention any corrections. Minuteman Press assumes no responsibility for errors after a proof has been authorised to print and print re-runs will be at your cost. Signed.................................................................. Date........................


XS4 2.0 by SALTO:

The new standard in electronic locking.

Smarter thinking. Smarter performance. Smarter design. THE SALTO ACCESS CONTROL SYSTEM USES OUR ADVANCED SVN AND WIRELESS RFID TECHNOLOGY TO TURN ANY DOOR INTO A FULLY FEATURED ACCESS CONTROL DOOR. SECURE • Create ‘keyless’ buildings. • Secure all interior and exterior doors. • Credentials and locks are simply and quickly updated, restricted or deleted remotely.

BETTER USER EXPERIENCE • Secure access to resources, rooms and facilities for staff and visitors. • Integrate third party services such as cashless vending, photocopying, library, identity management...

COMPATIBLE WITH ANY DOOR • SALTO’s extensive range covers virtually every door on the market.

MOBILE VIRTUAL NETWORK • JustIN Mobile SVN (mSVN) is an innovative identification updater system that allows users to update contactless identification cards.

BUILDING MANAGEMENT • Monitor and manage all user access rights. • Provide full audit trail capability. • Minimise lost key expense. • Integrate all your users’ and staff’s physical security needs into a single platform management tool.

Email: -


LETTER FROM THE EDITOR Cybersecurity: Why It Is Everybody’s Problem According to the Cisco 2014 Annual Security Report, “The sophistication of the technology and tactics used by online criminals – and their nonstop attempts to breach network security and steal data – have outstripped the ability of IT and security professionals to address threats. Most organisations do not have the people or the systems to monitor their networks consistently and to determine how they are being infiltrated.” The same report claims that, in 2014, Cisco had estimated the security industry would have a shortfall of more than one million cybersecurity professionals across the globe. The gap is expected to blow out to five million by 2020. Also in short supply are security professionals with data science skills, which are necessary to understand and analyse security data in order to improve alignment with business objectives. These figures clearly demonstrate that there is a growing skills gap in the security industry that needs to be addressed and it is not just an IT security problem. With so many security systems now operating in the digital domain, it is a security problem for the entire industry. Physical security information management systems (PSIM) involving the management of CCTV, access control, intrusion detection, identification management and so on now sit right alongside the traditional information systems and, if not properly monitored and managed, can be just as vulnerable as intellectual property, account details and records. However, with the growth of the Internet of Things and the switch from Internet Protocol 4 (IPv4) to Internet Protocol 6 (IPv6) now providing for up to 78 octillion IP addresses (that is 78 billion, billion, billion addresses), every person, every device and every grain of sand on the planet could conceivably be provided its own IP address and there would still be trillions of addresses left over. Why is this important? Because that is exactly what is going to happen over the next decade. Every camera, every card reader, every sensor, every radio frequency identification (RFID) tag, person, phone, tablet, toothbrush and can of drink will have an IP address so that people can better use, find, enable, disable, monitor, manage and track everything and everyone everywhere, all of the time. People can choose to embrace it, hate it, rebel against it or accept that it is already happening. The point is, as more and more security systems and services move into the cloud, traditionally secure physical security systems become vulnerable to cybersecurity threats. Even security officers will become vulnerable as the adoption of body worn surveillance systems begin to be linked back to control rooms. Poorly secured links to such systems could potentially allow people to see and hear exactly what the security officer is seeing and hearing. So, cybersecurity is not just the IT department’s problem. Cybersecurity is an issue for every security company, every security manager, every security vendor and every security integrator. It is up to each and every single one of these groups to tackle the problem and talk about the issues now, before those people who would subvert security services and systems are able to do so in a major way. If this challenge is just left to IT security professionals, then the industry runs the very real risk of letting this challenge get out of control. Professional development, networking with peers, seeing what others in the industry are doing and collaborating on standards and solutions are all going to be crucial factors in ensuring that security can remain in front of the coming cybersecurity challenges.

John Bigelow Editor


GAIN CONTROL WITH ONEVIEW Defuse situations quicker with a truly unified security control room solution Saab’s OneView is a next-generation physical security information management integration platform that provides unprecedented levels of subsystem integration in mission-critical infrastructure environments. OneView empowers operators to respond effectively and efficiently to the most stressful situations. Offering accurate intuitive situation awareness, a simple operator interface, fast detection-response and comprehensive support for post action analysis, OneView is the ultimate choice for modern surveillance and security operations. You can rely on Saab’s thinking edge to bring your control room under real control.


BRIGHT IDEAS NRL Video Game Could Help Dog Handlers Train For Detecting IEDs And Illegal Drugs Adam Moses is practising dog command gestures with an Xbox Kinect in his office at the US Naval Research Laboratory (NRL). On the screen in front of him, a virtual Labrador obediently moves through an empty desert village; together, they are trying to locate a buried improvised explosive device (IED). “ONR [The Office of Naval Research] wanted a way for the human to train with a dog, with a virtual dog, that you can train with anytime, anywhere,” says Moses. What looks like a video game is actually a training tool called Virtual Battlespace, which is widely used by the US Army. After a lot of research into dog behaviour, including watching hundreds of hours of tapes of handlers and their dogs in Iraq, Moses worked with others to create ROVER. ROVER is a distinct module that employs Virtual Battlespace and helps handlers to practise working with a dog to find IEDs, practising commands and learning to read the dog’s silent cues. “Gestures are important, the whistle commands are important, even the voice commands are important,” says Moses. He wrote what he calls a skeleton tracker program for ROVER, so the Xbox camera can ‘see’ a player’s gestures. “There is a lot of stuff going on in the background,” Moses explains. “Our challenge was not only doing the plume part of it, which is actually the easier part. The harder part was how do you account for dog psychology?” Says Lisa Albuquerque, the former ONR Program Manager, “This collaborative effort between ONR and NRL demonstrates... our ability to provide multi-disciplinary solutions to warfighter-identified problems. Use of IEDs will persist, and efforts such as this will help our nation to be ready to respond.” Simulating an IED Plume Simulating a plume (or trail) was easy for Moses because he has been working with first responders for ten years to model how airborne toxins would spread through a city after an explosion of hazardous materials or a chemical


attack. The NRL program CT-Analyst was used by command and control centres during the 2009 and 2013 Presidential Inaugurations, and even at a Super Bowl. “CT-Analyst is unique because it simulates worst-case scenario plumes based on minimal information,” Moses explains. As more information comes in (more detail about where the origin of the attack might be, or which sensors are ‘hot’ and picking up the toxin and which are not), it can be instantly refined through a very intuitive interface. “Really this is the only program that does this rapid computing by pre-calculation,” says Moses, referring to the week the team spends building the city model. “Everyone else computes when they need it.” CT-Analyst can also plan for where sensors should be to protect key parts of a city. A buried IED releases a plume similar to that from a toxin. “It is actually leaking all this gas subtly, at levels no human-built sensor could read because the particles are so small,” says Moses. “Per billion is the level these dogs can sniff.” The plume model powering ROVER simulates that the scent is strongest when the dog is closest to the IED, then gets harder and harder for the dog to detect as it spreads downwind. Reading a Dog’s Behavioural Cues Pinpointing the IED or the dog detecting some part of the plume is not enough; the handler also has to monitor the dog’s behaviour and help safely guide the dog to its origin. “Not only should the dog be taking cues from the handler, the handler should be taking cues from the dog,” explains Moses. “If a dog is going down a street, every now and then he might glance to the left or right when he passes an alleyway. And sometimes he will glance longer or stop. That is one of those cues that is really important; that is when the handler has to read something from the dog.” A dog is trying to please the handler, so if the handler keeps the dog moving instead of looking at what has caught the dog’s attention, the dog is less likely to display that cue again. “An inexperienced handler can untrain a dog by accident,” says Moses, “so better that they could spend a week on one of these and, if they make a mistake here, it is no big deal.”

The Future of ROVER ROVER was created during combat operations in Afghanistan, one of many areas being investigated by the ONR. Now that the US Marine Corps is closing its IED dog detection training facilities, Moses says, “My hope is that with something like this, all that other research and institutional knowledge could at least be kept around and studied further, in case we need these dogs again.” Moses also sees a potential for this program to be adapted for law enforcement agencies. Hidden narcotics also release plumes detectable by dogs, and Moses imagines using Virtual Battlespace to help handlers practice in different scenarios, like crowded airports, border crossings or city streets. With multiplayer capabilities, other players could join, simulating good guys and bad guys in the scene. If Moses were to take ROVER to the next phase, he would like to focus on expanding and improving the dog’s behaviours. Just as players can pick their car in a racing video game, he would like to create maybe 20 different dog personality types that would all handle crowds and noise and traffic differently. “This one is super obedient, this one is distracted a lot, this one is more aggressive. [The handlers] do not know which dog they will end up with, so if they train against 20 different kinds they will be better in the long haul.” He even imagines adding a quantitative component, scoring the handlers on how well they interact, if they noticed all the cues that the dog gave them and if they kept the dog on track. Adam Moses studied computer science at Virginia Tech. He came to NRL when he graduated in 2003 and started working on CT-Analyst out of NRL’s Laboratory for Computational Physics & Fluid Dynamics. Other NRL researchers who have contributed to CT-Analyst and ROVER include Dr Jay Boris, Dr Gopal Patnaik, Keith Obenschain, Dr Mark Livingston and Dr Zhuming Ai. For more information visit: media/news-releases/2014/nrl-video-gamecould-help-dog-handlers-train-for-detectingieds-illegal-drugs#sthash.NJm1SWTQ.dpuf



DID YOU KNOW Information Systems Audit and Control Association (ISACA), an independent, nonprofit, global association that specialises in industry-leading knowledge and practices for information systems, recently released its 2015 survey on cybersecurity titled the 2015 Global Cybersecurity Status Report. The report presents the finding of a global survey of 3,439 business and IT professionals in 129 countries to capture their real-time insights on cybersecurity attacks and skills shortages. The survey was conducted online in early 2015. Did you know... that of the 3,439 business and IT professionals across 129 countries: • 46 percent of respondents expect a cyberattack against their organisation in 2015, while 30 percent remained unsure. • Only 38 percent of respondents felt their organisation was prepared for a sophisticated cyberattack, with an overwhelming 86 percent of respondents stating they believed that there is a shortage of skilled cybersecurity professionals in the industry at present. • Only 34 percent of respondents intend to hire more cybersecurity professionals in 2015, with an almost equal number (32 percent) stating they have no intention of hiring more cybersecurity staff, despite the fact that 83 percent of respondents believe cyberattacks are amongst the three biggest threats currently facing their organisations. • Interestingly, only 9 percent of respondents felt they provided adequate cybersecurity training for staff, while 53 percent of respondents stated they intended to provide more training in light of recent cybersecurity breaches; 26 percent of organisations


acknowledged they should provide more training but are unlikely to for various reasons. • When asked if they were more concerned about a physical attack, such as a terrorist attack or act of war or a cyberattack, almost half (48 percent) responded that they were equally concerned about both; 36 percent felt a cyberattack was more likely. • Interestingly, of the 129 responding nations, Australia represented the second highest number of respondents behind the US. Did you know… that Evgeniy Mikhailovich Bogachev is currently the Federal Bureau of Investigation’s (FBI) most wanted cyber criminal? Using the online monikers ‘lucky12345’ and ‘slavik’, Bogachev is wanted for his alleged involvement in a wide-ranging racketeering enterprise and scheme that installed, without authorisation, malicious software known as ‘Zeus’ on victims’ computers. The software was used to capture bank account numbers, passwords, personal identification numbers and other information necessary to log into online banking accounts. The U.S. Department of State’s Transnational Organized Crime Rewards Program is currently offering a reward of up to $3 million for information leading to the arrest and/or conviction of Evgeniy Mikhailovich Bogachev. Did you know… that TEMPEST is a codename, first coined in the late 1960’s and early 1970’s, for the NSA (National Security Agency) operation to secure electronic communications equipment from potential eavesdroppers. It has often been reported that Tempest is a form of technology which

gives one the ability to remotely read or recreate what is on another person’s computer monitor by detecting and deciphering the electromagnetic radiation emitted by the monitor as it displays information. While this is in some respects correct, Tempest more broadly refers to investigations and studies of compromising emanations (CE), which are defined as unintentional intelligence-bearing signals which, if intercepted and analysed, disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment. Compromising emanations consist of electrical or acoustical energy unintentionally emitted by any of a great number of sources within equipment/systems which process national security information. This energy may relate to the original message, or information being processed, in such a way that it can lead to recovery of the plaintext. Laboratory and field tests have established that such CE can be propagated through space and along nearby conductors. The interception/propagation ranges and analysis of such emanations are affected by a variety of factors. For example, the functional design of the information processing equipment; system/ equipment installation; and, environmental conditions related to physical security and ambient noise. The term “compromising emanations” rather than “radiation” is used because the compromising signals can, and do, exist in several forms such as magnetic- and/or electric-field radiation, line conduction, or acoustic emissions.

NVMS Solutions

CCTV Solutions

+61 7 3841 8882

Custom Solutions

Megapixel CCTV

Display Solutions

Business Analytics

Thermal Imaging SECURITY SOLUTIONS 017



A New Kind Of Mobile Security Patrol

The Law Is An Ass

Jackie Wu and Ritwik Ummalaneni, two graduate students from Northwestern University in the US, have come up with an idea that that could have a significant impact on the home security and interactive smart home monitoring markets. The device is called Jackie – an indoor flying drone with camera capabilities accessed via your smartphone through an app that is soon going to be available for iOS and Android phones. While the project is still in the kick-starter phase, interested parties can sign up to preorder the device for a special price of US $199 ($50 off expected recommended retail price) and contribute to this exciting development. Jackie (the drone) is an indoor flying camera connected to your WiFi, enabling the device to stream video over the Internet to your mobile phone application. A multitude of manufacturers have already developed static cameras capable of allowing users to pan, tilt and even zoom when remotely viewing video through their home camera. However, Jackie is the first mobile camera that we are aware of that enables users to move around the house or office in a virtual tour to check if people are on-site, packages have been left, the pets are behaving and so on. In essence, you will be able to view video and pilot the miniature drone from anywhere you have an Internet connection. Jackie will allegedly come with a landing pad, which acts as a wireless charging platform to ensure that it is charged and ready to fly when you need it most.

We often make fun of stupid laws and the stupid people who pass them; however, occasionally we come across a law that we think is a great idea. For example, in Mansfield, Louisiana in the US, a law was enacted stating that anyone caught wearing sagging pants that expose underwear will be subject to a fine of up to $150 plus court costs or face up to 15 days in jail. Unfortunately, where the stupidity came into play with this law was that a court later overturned the law, declaring it unconstitutional. What a shame. In Arkansas (again in the US), one can only assume that drive-in fast food chains are not very popular given that they have a law which states, “No person shall drive a motor vehicle onto the premises of a drive-in restaurant and leave the premises without parking such motor vehicle, unless there is no unoccupied parking space available on the premises.” This would seem somewhat contradictory and at odds with the entire concept of a drivethrough restaurant. In Mississippi, a state law prohibits


the seduction of a female over the age of 18 by promised or pretended marriage – which probably makes about half the male population of Mississippi (if not more) a potential criminal. Last but not least, while on the topic of men and women, there supposedly exists a law in New York stating that a fine of $25 can be levied for flirting. This old law specifically prohibits men from turning around on any city street and looking ‘at a woman in that way’. What is more, a second conviction for a crime of this magnitude calls for the violating male to be forced to wear a ‘pair of horse-blinders’ wherever and whenever he goes outside for a stroll.



CRIMINAL ODDITY We live in a world that is full of war, crime and despair. Be that as it may, it is good to focus on the ridiculous and hilarious in life sometimes. That is why it is great to look on the bright side of life… and read stories about really dumb criminals. It will help you learn to laugh about your own misfortunes.

In 1973, infamous hard-nosed cop Dirty Harry (Clint Eastwood) wisely stated, “A man has to know his limitations.” It would seem that 66-year-old Luciano Gutierrez of Texas took the advice literally. When he was recently arrested for driving while under the influence for allegedly the ninth time, police found Gutierrez wearing a t-shirt with the slogan ‘Warning – I Do Dumb Things’ plastered across the front. It would seem that stating the obvious is becoming something of a trend following the report in the last issue of the magazine regarding the drug dealer arrested wearing a t-shirt stating ‘I am a drug lord’. Based on these two examples, one might feel that stating the obvious is a less than effective way to conceal criminal behaviour. Therefore, it only stands to reason that doing the reverse – in other words, stating the opposite of the truth – would be a more effective tactic for masking one’s illegal behaviour. At least that appears to have been the logic adopted by 21-year-old Nebraska motorist Jordan Meier. According to a police report, Meier was travelling with three passengers around 9pm one evening when a Lancaster County Sheriff’s Office deputy pulled over his 2002 Chevrolet Monte Carlo for a traffic violation. After determining that Meier was driving under the influence, the deputy arrested Meier and began to inventory his vehicle, whereupon he discovered a plastic container labelled ‘Not Weed’. Despite the cunning deception (which was handwritten in marker pen), the deputy decided to open the


container inside and, ‘surprise’, he discovered roughly 11 grams of marijuana. Imagine his astonishment at this tricky turn of events. However, when it comes to failed attempts at deceit, one cannot go past the story of Matthew McNelly and Joey Miller. While this tale relates to a criminal act that is now a few years old, it will without doubt go down in history as one of ‘the’ stupidest criminal acts ever. In fact, of all the dumb stories we have reported over the years, this one gets my vote as number one on the ‘idiot criminal’ rankings. The two were arrested by armed police in 2009 when witnesses reported seeing them attempting to break into an apartment in Iowa in the US. According to the reports, 23-yearold McNelly and 20-year-old Miller had attempted to hide their identities using fake beards and masks. However, here is where it gets interesting.

Police responding to a call about the attempted burglary later pulled over a car matching the alleged suspects’ vehicle. Upon stopping the pair in their 1994 Buick Roadmaster, it turns out that the two were not only intoxicated, but had drawn their disguises on their faces with permanent marker. Following their arrest, local police chief Jeff Cayler told CNN, “I have been chief here almost 25 years, been with the department 28 and a half years and I have seen a lot of things that make me laugh and weird things, but this was probably the best combination of the two – strangely weird and hilariously funny all at the same time.” Lex Luthor watch out – with criminal masterminds like these on the loose, anything is possible.

Rapid Deployment Security Camera

Lightweight. Easy to install. No cabling required.

features: 9

Supports any standard PoE camera, for easy integration into existing security infrastructure


Protected against the elements with a robust IP65 lockable enclosure


Optional 3G/4G and/or WiFi connectivity


Up to 3 days unassisted operation on the integrated battery


Additional battery pack or solar 9 interface for extended deployments

Suits a variety of industry sectors requiring temporary surveillance.

VPN Service RDC3



with Madison, you’re

Make the Madison RDC3 an integral part of your security surveillance strategy With integrated WiFi support offering local viewing and configuration, and the 3G/4G communications capabilities for remote viewing, access to the RDC3 can be achieved virtually anywhere. For details on the Madison Privonet VPN service visit Contact us on 1800 72 79 79 or email




EVENTS Black Hat USA 2015 1–6 August 2015 Mandalay Bay, Las Vegas Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 18th year. This six-day event begins with four days of intense trainings for security practitioners of all levels, followed by the two-day main event, including over 100 independently selected briefings, business hall, arsenal, Pwnie awards, and more. Visit for more information.

Oceania CACS Sydney 2015 10–11 August 2015 Sheraton on the Park, Sydney The latest business technology opportunities and challenges, including cybersecurity, will be addressed at the upcoming ISACA Oceania Computer, Audit, Control and Security (CACS) Conference in Sydney, Australia. The conference will bring together highly respected industry experts from Australia, the US and Asia who will present their latest thinking, research and practical experience, along with tips and tools to help IT professionals add value to their enterprises.


Hosted by ISACA, a global association serving 140,000 information systems professionals in 180 countries, Oceania CACS 2015 is the region’s leading annual conference and mustattend event for IT audit, control, security and governance professionals. This year the conference will focus on The Creation of Value, The Science of Trust – a broad theme that explores recent cyberattack and hacking incidents through thought-provoking discussions surrounding information strategies, information sharing and IT governance. The conference will also delve into why technology decisions and innovation should be addressed at a board level, and how IT professionals can initiate and facilitate conversations around best practice and driving value from IT investments. Reflective of ISACA’s high standards, speakers are industry experts from all over the world and their papers have been peer-reviewed. These highly respected experts will present their latest thinking, research and practical case studies in topical presentations and workshops that delve into some of the biggest challenges currently facing IT audit and security professionals. “Through speaking engagements, panel discussions and practical workshops, industry leaders will discuss the latest trends and

solutions in the rapidly evolving IT profession and will arm attendees with knowledge and advice to benefit their organisations,” said Garry Barnes, international Vice President of ISACA. Keynote presentations include: • The Honourable Theresa Grafenstine, Inspector General of the US House of Representatives and ISACA’s international Vice President, will speak on how shifting compliance-based auditing to strategic auditing can positively impact the bottom line and management relations. • Russell Yardley, a Director at National Information Communications Technology Australia, will provide an important discussion on why boards must govern technology, not the IT department. • Robert E. Stroud, ISACA’s immediate past international President and Vice President of Innovation and Strategy at CA Technologies, will discuss innovative methods for professionals to arm themselves against the ever-changing cyberthreat landscape. Robert will also provide an inside look at ISACA’s new Cybersecurity Nexus (CSX), an initiative to help address the global skills shortage by providing resources for cyber professionals at every level of their careers.

DUAL-ZONE PIR Nuisance free outdoor detection up to 180째 x 12m coverage.

BATTERY PIR Dual-zone detection powered by 3 to 9VDC for wireless applications.

HIGH-MOUNT PIR High performance triple mirror optics for 15m detection up to 6m high.

INDOOR PIR Spot, 360째, wide angle, and curtain detection from 2 to 4.9m height.

FLAME SENSORS UV flame sensors for early detection of open flames within 10m.

SENSOR SPEAKER Record any message for warning, security & advisory applications.

HIGH-MOUNT PIR Introducing the all-new PIR-T15WE: a high performance, high-mount (up to 6m), triple mirror PIR detector for both indoor and outdoor intruder applications. With 4 selectable operation modes including low position, high position, pet, and high density, the PIR-T15WE offers the ultimate in detection versatility; capable of reaching distances of up to 15 metres from a mounting height of 2 to 6m. A newly developed optical system ensures detection patterns are dynamically optimised for performance depending on the mounting height and operation mode.

+61 (3) 9544 2477

TWIN BEAMS Protect windows, doors, fence lines, entrances, & driveways up to 100m.

QUAD BEAMS The ultimate in trouble free perimeter detection for distances up to 200m.

BATTERY BEAMS Ideal for temporary or permanent perimeter systems up to 100m.

BEAM TOWERS Rugged floor and wall mounted enclosures in 1m/1.5m/2m/3m heights.

TOWER BEAMS Multi channel quad beam performance for use in beam towers.

REFLECTOR BEAMS A convenient way to monitor entrances and driveways up to 11m.

BATTERY BEAMS Introducing the eagerly anticipated TXF-125E; a battery operated Quad Beam sensor for temporary or permanent secure perimeter intruder systems. With 4 selectable frequencies, multiple beam sets can be used without crosstalk, whilst adjustable detection distance allows a single beam set to be re-deployed in a variety of installations throughout its operational life. Two 3.6V (17Ah) batteries power each unit for up to 5 years of service, and integrated wireless transmitter battery sharing provides a customisable low-battery warning notification output.



EVENTS Security in Government Conference 2015 31 August – 2 September 2015 National Convention Centre, Canberra • Bronwyn Friday, the Group General Manager, Enterprise Risk at John Holland, will convey why project risk management has become such a key focus within the construction industry (and undoubtedly other sectors), and how to capture the intended benefits of these tools while mitigating the pitfalls. Conference highlights include: • 40 plus presenters in three separate streams focusing on audit, governance, security and risk over two days • highly respected speakers from Australia, New Zealand, Singapore and the US • delegates from government and corporate organisations across the Oceania region, providing a range of opportunities to discuss current challenges and network with industry professionals • pre-conference networking dinner • post-conference workshops that allow attendees to dive deeper into key focus areas and topics. Visit for information on the Oceania CACS conference.

more 2015

Visit for more information on ISACA.


The 27th annual Security in Government (SIG) conference is scheduled to be held at the National Convention Centre, Canberra from 31 August to 2 September 2015. The theme for the SIG 2015 conference is Security risk management – getting it right! The conference theme will consider the evolution of security risk management in recent years, focusing on case studies, best practice and current and emerging strategies available for getting security risk management right! The Attorney-General, Senator the Hon George Brandis QC will open the SIG 2015 conference on Tuesday 1 September. Attached to the SIG 2015 conference is the extensive trade exhibition which will provide an insight into the latest developments and innovations in protective security products, technology and educational opportunities. The SIG conference is targeted at senior executives responsible for managing security in agencies, officers from all levels of government who contribute to the development of security capability and response, and security practitioners from the public and private sectors who provide protective security services to government. For more information visit or contact

Gartner Symposium/ITxpo 2015 26–29 October 2015 Gold Coast Convention and Exhibition Centre, Gold Coast Digital business is where it all changes for CIOs. The stakes are higher; the pay-offs bigger; and the need to lead enterprise transformation more urgent than ever before. At Gartner Symposium/ITxpo 2015, the world’s most influential CIO conference, you will find what you need to succeed. You will have the time to reflect on the topics that match your most critical priorities, and the space to refresh your point of view. Guided by the unbiased advice of Gartner analysts and the insights of worldclass business and IT thought leaders, you will be empowered to build relationships, solve problems and embrace new ideas with your CIO peers. Most of all, you will be inspired to re-imagine ‘business as usual’ and strengthen your own personal brand as a key driver of the digital movement. Be a part of the industry’s most forwardthinking gathering of CIOs and senior IT executives for a CIO-focused exploration of technology, business and professional leadership. Visit symposium/gold-coast/ for more information.

RACKUS IDENTICUS. Series 210 cabinets

We’re proud to pin our reputation to our constant development in racking solutions. But as we make advancements for tomorrow, we never forget the past. Our commitment to continuity-of-design ensures each new product and advancement is back compatible with existing units, enhancing and prolonging the life of every MFB product. With a solid history of over 40 years supplying innovative, off-the-shelf and custom built racking systems, you can rely on MFB for consistent compatibility.


P (03) 9801 1044 F (03) 9801 1176 E

NSW - P (02) 9749 1922 F (02) 9749 1987 E


INDUSTRY NEWS The OSPAs Are Coming To Australia

Honouring Our Heroes The Australian Security Medals Foundation (ASMF) has once again celebrated the achievements of outstanding personnel in the security industry at its annual gala dinner and awards night held this year at the Australian War Memorial in Canberra on Friday, 19th July, 2015. Each year, the ASMF, through nominations submitted by both members of the security industry and the broader community, identify and award two categories of medals: • The Australian Security Medal of Valour (ASMV), recognising acts of bravery and initiative; and • The Australian Security Medal (ASM), recognising contribution to security professionalism and providing examples of outstanding citizenship, positive leadership, insights or influence at a strategic management level. This year, the Australian Security Medals Foundation awarded five Australian Security Medals for Valour. Recipients included: • Matthew Newman – for his bravery and quick thinking in protecting innocent bystanders from a knife-wielding offender at a local Sydney shopping complex. • Jye Nevins – for his quick actions in helping police detain an armed offender, despite receiving knife-related injuries in the process. • Emir Balicevac and Gary Jannese – for their calm and professional actions, demonstrating not only bravery but also extraordinary compassion in saving a young a man’s life who was both intoxicated and highly agitated and intent on selfharm. • Charlie Erdogdu – who without hesitation acted to stop a man in a busy Sydney mall who, while in a highly agitated and disturbed state, had doused himself and the area around in kerosene with the intent of setting himself and others alight.


The Outstanding Security Performance Awards, the OSPAs, have been launched in Australia. The OSPAs is a worldwide scheme for recognising outstanding performers in the security sector. The foundation also awarded five Australian Security Medals to distinguished individuals, including: • NSW Police Deputy Commissioner Nick Kaldas – for his years of support to the security industry, working behind the scenes to foster greater relationships between private security and police. • George Zeitoune – for outstanding efforts working with the community in his role as a security professional to assist young men and women through community programs he has pioneered. • Neville Kiely – for his consistent commitment over the years to getting the security industry and its customers to adopt a standards-based approach to alarm installation and use. As part of his commitment, he has funded educational material for consumers and provided staff to share knowledge with consumers, as well as other security companies, in addition to his volunteer work with a number of different industry groups. • Tom Roche of SNP – for his tireless charity work as well and the role he has played in helping to drive industry standards and develop and mentor new industry leaders through programs such as iLead. • Kathy Pavlich – for her decades of work in educating, mentoring and guiding people in the security industry. Visit for more information about the Australian Security Medals Foundation and current and past recipients.

They have also been launched in Norway and Germany and other countries are about to follow. Australia is at the forefront. The OSPAs are already supported by ASIAL, ASIS Australia and the Security Professionals Registry (although the OSPAs is independent of all groups) in an initiative that is designed to unite the security sector in celebrating the success of its outstanding performers. They are set to bring new life to security excellence. In this first year of the OSPAs, there are nine categories open to enter in Australia. They are: • Outstanding In-House Security Team • Outstanding In-House Security Manager • Outstanding Guarding Company • Outstanding Security Consultant • Outstanding Customer Service Initiative • Outstanding Security Training Initiative • Outstanding Security Installer • Outstanding Security Partnership • Outstanding Investigator. Entry for the 2015 Australian OSPAs is being administered by ASIAL, who are working in partnership with the OSPAs. Entry is via the website and is open to anyone. It is straightforward and requires answers to two questions with a word limit of 500 for each, so it is not onerous. Keep up with the latest news and updates on the OSPAs Facebook page theOSPAs and the Twitter page theOSPAs Visit the Australian OSPAs website at: for entry details.



MLA UPDATE Peter Johnson

Are Locksmiths Leaving Something On The Table? Most people are familiar with the question that used to be commonly asked in a very famous fast food establishment, “Do you want fries with that?” In more recent times, attendants in the supermarket-aligned petrol stations regularly ask customers if they want chocolates, lollies or chips as they are paying for their fuel. The attendants only do this because they want customers to spend more money, and they can only do this because customers are in their store. When a locksmith is called out to do a job it is often because of an incident – a break-in, new tenants, lost keys. He has been invited into someone’s home or office or factory because something needs to be done and, because of this, he has the unique opportunity to look for add-on sales. Here are some examples: • A locksmith has been called to rekey someone’s locks because a key has been lost, along with personal identification. The owner wants the front and back doors rekeyed. This is a straightforward job, but the locksmith notices there are security doors at the front and the back. He should first ask the customer to have a look at the key for the security door; if it is the same as the front and back doors, then he should recommend that both security doors be rekeyed; if it is a different key then he should offer the client the convenience of a single key for all external doors. • There has been a break-in through a poorly secured door and a locksmith has been called


to replace the existing lock with a deadlock. He should offer to survey the premises so he can provide the client with a report on the level of security, along with his recommendations. Are all the doors secured with an adequate lock? Are window locks fitted? Is there an alarm system? • A person has lost all the keys to his/her car and a locksmith has been called out to make a new key. In a job like this there is a great opportunity to sell the client an extra key. Motor vehicles in Australia have been fitted with immobiliser technology since the early 90s. It is always going to be more expensive for the client to get replacement keys if all the keys have been lost. Recommending a client gets an extra key is a bit like selling them insurance, but if they lose a key again they would be very glad they had purchased an extra key at the time. There are also lots of opportunities to generate additional business with regular commercial clients. Mechanical locks need to be serviced and while the client can often perform basic servicing such as using graphite in the cylinders, the reality is that this seldom occurs. A locksmith should recommend a service program where he attends on-site to service the existing locks and check that they are all in proper working order. This will generate regular income, but it will also allow the locksmith to look for a potential security upgrade. The same principal should be applied to clients that have mechanical and electronic safe locks; these should be serviced at regular intervals. Quotations can also provide a locksmith with

the opportunity to upsell. If asked to provide a quotation for a mechanical security system, consider submitting an alternative quotation that includes electronic security. At the very least, this lets the client know a bit more about what services the locksmith can offer and it might just lead to a higher value sale. Even the humble key duplication can lead to an upselling opportunity. For example, if asked to cut a domestic key by a client, suggest a coloured key, or a novelty key or even an extra key. Locksmiths are seen as a trusted adviser by their clients and an expert in their field. Their clients have confidence in them and what they recommend. The locksmith who looks for add-on and upselling opportunities is not likely to leave anything on the table.

Peter Johnson
is the General Manager of the Master Locksmiths Association of Australasia (MLA). You can find out more about the MLA at

Monitor, control and report from anywhere

Our innovative LINQ™ technology fills the void in network communications for mission critical power distribution applications. Power and transmission solutions integrated at multiple sites are easily managed and monitored remotely. LINQ reports diagnostics via Email/SNMP notifications greatly reducing system downtime and eliminating unnecessary service calls while creating RMR opportunities. Communicate over the network with LINQ.

More than just power.™






Transparent Approach To Data Protection Needed To Win Back Public Trust



By John Kendall “Businesses must rebuild public confidence in their ability to store and protect Australian citizens’ personal information,” says John Kendall, security program director at Unisys Asia Pacific, as research reveals a trust crisis. The data breach of 233 million users’ personal information by multinational e-commerce retailer eBay should be seen as shocking. However, in an era where data breaches are becoming a daily headline, it has become an all too commonplace occurrence. For nearly 10 years, the Unisys Security Index has tracked the attitude of Australians toward various security issues. Since 2006, the top two security concerns for Australians

reported in the media: Telstra’s Pacnet found an unknown third party had gained access to its corporate network, while Optus admitted to three data breaches affecting more than 300,000 customers. With the government set to introduce a bill requiring Australian telcos to preserve customer data for up to two years, it is little wonder that Australians are feeling nervous regarding the safety of their personal information. Alarmingly, the next least-trusted group is government organisations, with almost half (49 percent) of Australians expecting a breach by government agencies in the next 12 months. This is concerning considering the amount,

have helped build trust compared to telcos and government, even though they are an equally likely target. The growth of online shopping and the financial information stored by online retailers still poses some concerns for Australians, with 45 percent expecting a breach within the next year. While the utilities industry fared somewhat better in the research (40 percent expecting a breach), Unisys research undertaken in 2014 found that 84 percent of critical infrastructure providers in Australia and New Zealand experienced a data breach in the previous year. These findings show that there is still

Consumer trust must be earned and maintained. To build trust, an organisation needs to not only take preventative measures, but to also make those measures visible to build public confidence. have consistently related to data security: unauthorised access to personal information, and others obtaining and using their financial information. This year, Unisys asked more than 1200 Australians about the likelihood that their personal data, held by seven types of organisations (including airlines, banking and finance, government agencies, healthcare, retailers, telecommunications and utilities), would be accessed by an unauthorised person, accidentally or deliberately, within the next year. The findings reveal a crisis of faith in these organisations and agencies to hold and protect critical personal information. What is the Issue? The 2015 Unisys Security Insights research found telecommunications organisations are the least trusted by Australians to protect their personal data, with 58 percent expecting their information to be accessed in an unauthorised manner within the next 12 months. This year alone, data breaches at two of Australia’s biggest telco providers were widely


detail and sensitivity of personal data held by governments. Although this survey looks at perceived vulnerability, not actual vulnerability, it clearly shows which organisations the public perceives to be most vulnerable. Consumer trust must be earned and maintained. To build trust, an organisation needs to not only take preventative measures, but to also make those measures visible to build public confidence. For example, the banking and finance sector ranked third, with 46 percent of Australians expecting their data to be unlawfully accessed within the next year. But given that one in five Australians have already been the victim of a data breach (Veda, 2015) and the cost of credit card fraud in 2014 jumped up by almost a third to hit $387 million worth of payments (Australian Payments Clearing Association, 2015), it might be expected for them to have ranked alongside telcos. However, banks do a great job of proactively identifying identity breaches and taking quick action in communicating with their customers to minimise the impact of fraud. This appears to

work to be done in the industry to limit data breaches and protect personal information. Surprisingly, despite public scrutiny around the introduction of e-health records, just 36 percent of Australians expect a breach by their healthcare providers in the next 12 months. It is likely that this very scrutiny – and the public debate and commentary around the issue – helped to build customer confidence as the public discussion reinforced that data privacy was a key issue and that relevant security measures would be taken. Airlines took home the title as the most trusted industry to protect personal information, with just one in three Australians thinking a data breach was likely. While airlines will be pleased with this, they need to work to maintain this trust as they continue to capture more and more information about their passengers in a bid to provide personalised end-to-end services and to assist with border security measures. A Target or Carelessness? While it can be easy to view organisations as



IP 100H Icom Australia has released a revolutionary new IP Advanced Radio System that works over both wireless LAN and IP networks. The IP Advanced Radio System is easy to set up and use, requiring no license fee or call charges.

To find out more about Icom’s IP networking products email WWW.ICOM.NET.AU

the victim in data breach scenarios, the reality is that most breaches occur as a result of poor security practices and careless employee behaviour. Unisys research of critical infrastructure providers in Australia and New Zealand found that while many (48 percent) security breaches occurred as a result of insecure networks, one in three (33 percent) were caused by unmanaged mobile devices and employee use of social networks. Yet, despite human error being named as the cause of up to 50 percent of security breaches, only six percent of organisations said they provide cybersecurity training for all employees. Such behaviour makes organisations a tempting target for attackers. The ability to ‘strike from afar’, careless inattention to the basics (for example, weak authentication practices) and a lack of user training are just a few of the details that make organisations vulnerable to cyberattacks. And the 2015 Unisys Security Insights research clearly shows that this carelessness has eroded confidence and resulted in consumer frustration with organisations that collect and hold their personal data. Does Consumer Trust Matter? Security breaches do not just impact an organisation’s ability to deliver services. The subsequent negative repercussions of a data breach can adversely change the way customers and prospective customers think about or trust the business. The reputation and brand image of a business is a key corporate asset and when the balance of trust is compromised, it remains to be seen whether this confidence can be fully restored. Loss of reputation is not easily quantifiable, but is likely to erode future business opportunities. In today’s fast-paced and unforgiving business environment, there is no shortage of other operators waiting to collect disenchanted customers in the wake of a controversial security breach. Previous Unisys research revealed that 85 percent of Australians said they would stop dealing with an organisation if they became aware that their personal information had been accessed by an unauthorised person. Additionally, 65 percent said they would publically expose the issue and 47 percent said they would take legal action.


Consumer trust is not just something warm and fuzzy that is nice to have – it impacts the bottom line. What can Organisations do to Improve Trust? Experience and knowledge help to build trust. Organisations need to not only implement security measures, they also need to be seen to be taking such measures to build public confidence. There is no silver bullet for security. In addition to taking steps to prevent data breaches, organisations must be prepared to mitigate the risks should a breach occur. To do that, organisations must learn to think and behave like they are already under attack. All employees should be made aware of potential internal and external threats to the organisation and understand the role they play in protecting corporate assets against security threats. With employees aware of potential risks, the next phase to reinforcing security systems and processes is to implement cybervulnerability assessments for all systems, to allow organisations to identify areas of weakness and blind spots.

At a minimum, organisations should require hard-to-guess passwords on all systems, consider multi-factor identification to grant access to sensitive data, and patch outdated operating systems and applications. Looking forward, security enhancements must always be part of any modernisation initiative. It takes time and effort to earn and maintain consumer trust – it does not happen overnight. A holistic approach to security is required that incorporates people, policies, processes and technology. This will help organisations to manage who has access to what data, as well as protecting the data itself via encryption, so that even if the wrong people get access to the data, they still cannot read it. By focusing on building more robust IT security systems, organisations can safeguard their business and their customers against accidental and intentional data breaches. John Kendall is the Security Program Director for Unisys Asia Pacific. For a full list of references, email:

% of Australians expecting a data breach in next 12 months at various types of organisations






Banking & Finance










KeyWatcher is a reliable and extremely easy to use electronic key management system, designed to prevent mismanaged, misplaced, or stolen keys. KeyWatcher eliminates outdated metal boxes, unreliable manual logs and messy key identification tags utilising a computerised storage cabinet. The system releases keys only to the individuals with correct authorisation, recording each user transaction and providing total system accountability.

KEYWATCHER SYSTEM OFFERS to 14,400 keys and 10,000 user per site l “Site” concept uses a common database l Numerous high level interfaces for access control, contractor management and vehicle fleet systems l Longer user IDs can be up to any 6 digits, plus a 4 digit PIN l Bright 7” full colour, touch screen l “Key Anywhere” allows keys to be returned to any KeyWatcher Touch within a site l On-screen guides for users, along with voice commands l Up

Available in Australia through: AST Pty Ltd T: +61 2 8020 5555 | M: +61 417 089 608 | F: +61 2 9624 7194 E: |



Standalone Security Systems Versus Integrated Systems By Emanuel Stafilidis

There are a number of reasons why clients opt for an integrated security solution, usually to increase the overall level of security, or make it easier to manage. Reducing threats and risks is the whole purpose of security, but has integration increased vulnerabilities? Options for clients include separate standalone or disparate security systems, integrated security systems and/or a dedicated platform such as Physical Security Information Management (PSIM). Standalone security solutions are a more traditional approach to security installations. The installed systems may include access control, CCTV, intercoms, perimeter intrusion detection, pedestrian and vehicle barriers, duress systems and so on. Each standalone system is managed and operated independently. Actions initiated within each independent system do not impact on any other system. Single system failures will not impact on any other system and each system can be upgraded independently without affecting other systems. Obviously, as these systems are standalone, one system cannot interact with any other system. Each system is activated and addressed independently. The result is a slow and cumbersome operation. Operator input is required on multiple systems to create action events and make sure each system is kept up-todate.

Generally, more server and backend hardware is required to deliver all the systems, and more operators are needed to interact with the additional user consoles. Each system will have its own network infrastructure and these need to be managed and secured separately. When performing investigations, standalone systems are interrogated in isolation, which has a huge impact on time synchronisation. The shortfalls of standalone systems have seen system integrators spruiking the benefits of integrating systems. Some systems can be connected to each other and work together to deliver select information to operators and managers, which will reduce operator interaction. An alarm on a system such as a door open too long (DOTL) can automatically bring associated cameras to screen, thus, actions performed on a single system can automatically perform actions on other connected systems, providing monitoring operators a better result. Integrated systems have other benefits. For example, they can utilise the same infrastructure and thereby reduce hardware, utilise the same network infrastructure, be time synchronised to a single central point and provide additional information for investigators. However, integrated systems also have a number of their own problems. The most widely reported is the mandate of purchasing proprietary equipment that locks the customer into the one vendor,

limiting any flexibility. System failures in integrated systems often impact on other systems and a third party attack on a single system can increase the vulnerability of an integrated system. Version changes, upgrades and bug fixes can impact on the integration(s) and day-to-day operations. Generally, an integrated solution will not result in improved redundancy or failover from one server to another. Simply, integrating systems does not necessarily address the need for operational improvements. Operational improvements are made by operators performing specific actions and business rules on receiving certain events or state changes in the equipment. The underlying purpose of integration is to improve the system’s performance and operation. The solution needs to define the event through filters and route the predetermined rules to the operator to ensure correct implementation. A poorly designed implementation that simply integrates systems to reduce the amount of hardware and utilise the same infrastructure can increase vulnerabilities. Often, cost-effective and direct designs do not deliver secure results. Only a complete and well-designed integrated solution can successfully secure premises and manage vulnerabilities. Achieving a successful result requires careful planning. Alternatively, PSIM systems offer speed and accuracy for event actions like alarms. A PSIM defines the events and routes the rules so the operators correctly execute



policies and procedures. A PSIM reduces the amount of hardware needed because appliances such as servers can be used to operate multiple systems. Further, the number of services required on each server can be reduced, making the solution more efficient. Redundancy can be implemented across the entire solution, including all sub-systems, managed by the PSIM. By implementing fault tolerance within a virtualised environment, a server failure will not impact on operations as the system will continue operating, averting downtime. Each operator uses a single console, drastically reducing complexity, viewing monitors, operator keyboards and so on. This benefit itself reduces control room clutter. A quality PSIM will present all relevant information immediately to the operator, providing them the best situational awareness possible. This reduces operator stress and delivers a more precise and consistent result. All information for a thorough investigation is presented in a single console, with all events chronologically categorised and time synchronised. The systems’ health, including the network infrastructure, can be monitored from a single console. The training burden is greatly reduced and easy to administer as operators and administrators learn and operate a single system that performs all the site’s functions. A PSIM is the ultimate integration platform that offers superior security, awareness, operational and management ease. The key point to realise with a PSIM is that system operators only really have to learn one single system (the PSIM) and should it fail, operators do not necessarily need to know how to operate the individual sub-systems, even though they are still fully operational. This can be mitigated by implementing failover design strategies far superior to traditional integrated systems. Eliminating the single points of failure must be a design priority. PSIMs rely on integrating sub-systems. Integration can be time consuming and costly. Therefore, upgrades and version changes should be planned and managed


Each standalone system is managed and operated independently. Actions initiated within each independent system do not impact on any other system.

by initiating a strategy-at-solution design to inform all parties of system maintenance procedures. Overall, a PSIM greatly reduces the associated risks over any other method. As the majority of systems are now Internet Protocol (IP) based, an attack on any system, whether standalone, integrated or PSIM, can impact upon its operations. However, IP systems can generally be made more secure than their older analogue counterparts as security features can be installed on them. This should be strongly considered before upgrading any old analogue systems. An IT security network specialist can design and implement strategies to safeguard against cyberattacks. This usually involves locking all unused ports, registering each device (such as cameras and intercoms) to send alerts if unplugged or tampered with, installing monitoring applications and so on. All the usual security programs such as anti-virus and firewalls need to be installed and made fully operational. A quality PSIM will interface to these IT security systems and present alarms and any other IT-related information to the operators. The security system IT network should be managed and maintained by onsite personnel who should always be in a much better position to protect the networks from any compromise. Any organisation that has control room operations should seriously consider a PSIM as its integration platform. PSIMs deliver speed and accuracy never seen before. The superior security, awareness, operational and management ease cannot be matched by any other solution. A PSIM is the best method to successfully integrate security systems. Emanuel Stafilidis has worked in the electronic security industry since 1988 as a security systems integrator and a security consultant. Emanuel is currently the Business Development Manager at Saab Australia. Visit region/saab-australia/security/ for more information. Emanuel can be contacted via email:



Tactical Strategies Practical Use Of The Operational Environment By Richard Kay Officers tasked with the role of public safety face challenges every day that they step into the operational environment. Some challenges relate to fulfilling the responsibility of the job role, others relate to officer safety at the hands of violent criminals or resistive subjects. The former may be intentionally seeking to harm the officer, whilst for the latter it may be a coincidental consequence. Either way, officers need to remain prepared for any eventuality. Rather than merely amble around in an unaware state (condition white), officers should always maintain a state of relaxed awareness (condition yellow). A state of ‘over-readiness’ is also not suitable, as prolonged hyper-vigilance is not practical, can make officers overly anxious and is not healthy. Officers that are relaxed yet aware can make the most of their environment and notice small things that may indicate potential issues for examination. A key aspect of operational safety is how officers interact with the environment. Knowing and using the physical environment properly can assist officers and provide an advantage in the conduct of operational duties. This becomes especially important if the situation involves interpersonal conflict or active aggression from others, especially critical if the subject is armed with a firearm.


The most important thing in a violent encounter is harm minimisation whilst ensuring officer safety. Subjects are just like officers – they do not want to get hurt either. In order for a subject to harm officers effectively, several requirements must be met – he must be able to locate the officer, he must have a target to focus on and he must be able to carry out his attack successfully. Concealment delays the subject from figuring out where an officer is, but to avoid being shot, an officer should use cover. Taking steady, aimed shots is important, but not at the cost of exposure to the subject. This is where tactics come into effect. A subject cannot shoot at officers if he is not willing to expose himself to fire. Sticking the firearm out of cover and firing blindly is a dangerous thing to do because there is little control over where the rounds hit. Officers that make it harder for the subject to see them will make it harder for them to be shot at. Fatal Funnels A fatal funnel is any area that narrows and constricts movement or an area that focuses the subject’s attention. Buildings and rooms are dangerous because officers must enter through fatal funnels. The subject knows the officers will use these passageways. Doorways are the most prevalent fatal funnels that an officer uses. Beware of backlighting when opening doors and remember that doors may open into areas with more doors, such as closets and other rooms. Doors with visible hinges open toward the officer, while doors with hidden hinges open away from the officer. Officers should avoid standing in the fatal funnel the opening door creates and, when possible, stand to one side away from the opening door. Looking through the crack between the open door and the frame can clear some parts of the room. When the hinges are visible, a rope can be used to remotely pull the door open. If the hinges are not visible, the door can be pushed open with a flashlight or baton. Windows are sometimes used for entry, particularly when investigating a building that has no other unsecured entry points. The same window the subject climbed through to get inside the building may be the only way in; however, it can be difficult to protect officers entering through the window frame. Windows can also


create unique lighting and reflection problems. For example, an officer investigating a building alarm looking through a window from a lighted area outside into a dark room can be seen by persons on the inside. Conversely, during evening hours, persons outside can see officers in a lighted room. Officers should avoid being silhouetted by windows. Hallways are usually long, narrow and restrictive, generally with doors on either side and at both ends. Alternate routes to a hallway should be considered, but if a hallway must be entered, beware of backlighting and do not pass up doors. The width of the hallway will dictate tactics for movement down hallways. If the hallway is narrow, an officer should blade his body, with his chest area facing the wall. If a subject is contacted in the hallway, the officer will give verbal commands to distract the subject. This should enable the officer to retreat out of the hallway to a cover position. If possible, the subject should be turned facing away from the officer and a visual inspection made for weapons on the subject’s person. The subject can then be directed out of the hallway to a secure area. Stairwells are generally surrounded by steel and concrete, with upper and lower landings as well as switchbacks where the stairs change direction. If stairs must be used to clear a building and a choice is available, move from top to bottom. While both directions have disadvantages, coming from top-down exposes the less critical areas of the lower body. Moving from the bottom-up could expose the critical areas of the head and chest. Elevators are vertical coffins and the worst fatal funnel of all. Upon arriving at the designated floor a bell will usually ring signalling the arrival. Once the door opens there is no available cover and only one direction to go and that is toward an unknown threat. One option is to use the stairway, but there are situations when the building is so tall the use of the stairway takes an excessive amount of time or will physically exhaust an officer. Instead, use an elevator with a master key, go to a floor several floors above the actual target, exit at this higher floor and take the stairway down to the target floor. Visual Surveys An officer should use visual survey techniques, which create a situation where a subject has to

A key aspect of operational safety is how officers interact with the environment. react to the officer’s action. The objectives are to not be seen, or to move so quickly that the subject cannot react in time to harm the officer. Glancing (‘Quick Peek’): The principle is to present as small a target as possible and to present this target so quickly that a subject would have difficulty reacting. When glancing, only the eye closest to the corner and the firearm held in the hand closest to the corner should become visible to the threat area. Inevitably, shoulders and elbows may also extend into the threat area dependent upon body size, therefore officers must attempt to minimise time spent glancing. The location of glances should be unpredictable to the subject. Therefore, it is recommended the first glance not be at eye level but rather come from a higher or lower position, with any subsequent glances varied in location. The advantages of the glance are that it is fast and an officer can do many in a short time. The officer also has the advantage of some cover. The disadvantage is the subject may see the officer and easily reach them if the subject is near the corner or doorway. To perform a glance, the officer should stare at the wall in front of him to help prevent extending their head and both eyes past the corner’s edge. If the glance is from a low position, the officer must keep good balance by placing his weight on the balls of his feet and, if needed, placing his free hand against the wall for support. While in a crouched position, the officer should be cautious that his knees do not enter the fatal funnel. Only the closest eye and the barrel of the firearm should break the invisible plane that extends from the corner. Do not glance from the same place twice in a row. Have the firearm in the ready position. Only bring as much of the head around the corner as is necessary to see (one eye), do not tilt the head, limit exposure. The more body exposed, the longer it will take to get back behind cover. Angling (‘Slicing the Pie’): The principle of this technique is to get the officer’s eye around the obstacle, the sides, and see some part of the subject’s body before the officer can be seen. Angling has some limitations in that it

takes longer than the glance and the officer may expose himself to other threat areas. If the officer realises that he is exposed to other threat areas when using this technique, he should stop and use the glance. Be aware of casting shadows on nearby reflective surfaces, such as windows and vehicles, that could give away the position while using either technique. To perform angling, turn the head at about a 30-degree angle to the obstacle. This makes the eye the closest part of the body to the angle of incidence and will keep the nose or ear from coming around before the eye. The firearm is in the same hand as the eye that is being used to look around the obstacle. Holding the firearm in the other hand tends to expose more of the body, thereby leaving cover to fire or return fire. Do not allow a foot to give the location away. Point the toe inside the corner. The forehead must not come around first, so do not tilt the head. Keep the head straight up and the chances

of getting anything around the corner before the eye are reduced. Maintain balance and hold the firearm in a position so it is possible to see past the arm all the way to the ground. Once the subject is seen, go to a position of cover before the subject is called out. Reflections: Mirrors can be used to clear areas without exposing the officer to the threat. A small mirror (flat or convex) can be attached to a collapsible baton and then placed around the corner, allowing the officer to remain behind cover. The mirror can also be handheld if necessary, but the hand will be exposed to the threat. A drawback to mirrors is that they reverse and distort images, which could confuse the officer. Reflective devices are not confined to mirrors brought by officers to the scene. Officers can use reflections on glass-fronted cabinets, bathroom mirrors, glass in picture frames, vehicles, windows, glass in storefronts, or any

item that reflects an image. Officers should be cognizant that any reflection that they can use can be used against them as well. For example, if the officer can see the subject’s eyes in the reflection, then the subject can see the officer. Like all operational safety strategies, practice is the key to effective use under stress. Officers should maintain awareness of these tactical aspects and try to incorporate them into everyday activities. Mastering the physical skills of operational safety is important, but using the physical environment in a tactical manner provides a huge advantage for the officer. Be prepared, be aware, stay alive. Richard Kay is an internationally certified tactical instructor-trainer, Director and Senior Trainer of Modern Combatives, a provider of operational safety training for the public safety sector. For more information, please visit



CCTV Use By Local Government: Findings From A National Survey Part 1


By Shann Hulme, Anthony Morgan and Rick Brown

There has been considerable growth in the use of closed circuit television (CCTV) in public spaces as a crime prevention measure and, increasingly, as a tool to detect and identify offenders. In Australia, CCTV systems have become an increasingly common fixture in urban centres, shopping centres and malls, individual shops and banks, on public transport and in car parks. There has been significant investment in CCTV systems as part of state, territory and Commonwealth government crime prevention programs, with CCTV accounting for a growing proportion of overall grant funding available to community-based organisations, particularly local councils (Attorney General’s Department, 2015; Homel et al, 2007). More than a decade ago, Wilson and Sutton (2003) explored the operation and management of 33 open-street CCTV systems in Australia. They found that, while open-street CCTV systems were initially primarily located in central business districts of major metropolitan centres, there was a growing trend towards their installation in smaller regional and rural centres and in suburban locations (Wilson and Sutton, 2003). Around the same time, Iris Research (2005) conducted a survey of all local councils in Australia to assess the use of CCTV and characteristics of the systems in operation, finding that around one in ten councils had a CCTV system in operation. More recently, Carr (2014) examined the use of CCTV by 18 local councils funded by the Australian Government, finding that police were increasingly reliant on local government CCTV and that the ensuing additional cost to council was significant. Similarly, Edmonds (2014) found that nearly half of all councils in New South Wales (46 percent; n=70) had installed CCTV in public spaces, with urban councils more than twice as likely than rural councils to

have a system in place. Given the continued investment in CCTV at all levels of government, plus the significant advances in technology over the past ten years, it is timely to reassess the use of CCTV by local councils in Australia. This paper presents the findings from a national survey of local government conducted by the Australian Institute of Criminology (AIC). The overall aim of this research was to develop a national picture of the prevalence and characteristics of open-street CCTV systems in Australia managed by local councils. Methodology This research involved a national online survey of local councils in Australia, conducted in mid-2014. An invitation to participate in the survey was sent to all 561 councils in each state and territory (with the exception of the Australian Capital Territory) via a letter to the CEO and an email to the front desk or generic council email address. Several reminder emails were sent encouraging councils to participate in the research and incentives were offered to participants. The survey was open for approximately six weeks between May and June 2014. A total of 221 councils completed the survey by the end of the data collection period, a response rate of 39 percent. Data were weighted using Australian Bureau of Statistics (ABS) population data for local government areas to ensure responses were representative of all councils. Population data were used because the number of residents influences council revenue (via rates) and councils with higher revenue may be more able to afford the installation of CCTV (or larger CCTV systems). Larger councils (in terms of population) may also be more likely to have CCTV because crime is typically more common in densely populated areas. Preliminary analysis of the

data indicated that the achieved sample had a disproportionate number of larger councils. A formula was applied to weight the data provided by each council to make each response proportionate to the broader population from which the sample was derived. For example, councils with more than 100,000 residents accounted for 20 percent of respondents to the survey, but account for 13 percent of all Australian councils (ABS, 2014). A ratio of 0.65 (20á13) was therefore applied to the responses for this cohort. This ensured that the results of the survey were generalisable to the wider population. All results refer to weighted data, unless otherwise specified. Limitations Important limitations with this survey must be acknowledged and taken into consideration when interpreting the results. First, this survey provides valuable information on the use of CCTV by local government. It does not, however, provide a national picture on the use of CCTV more broadly. CCTV systems are owned and operated by a range of other government and private sector organisations, as well as by private residents. Related to this point, the research is focused on open-street CCTV in public spaces and does not include those systems that are operated in private spaces (for example, within commercial premises). Second, the Iris Research survey is used as a baseline against which to measure the change in CCTV use by local councils since 2005. However, limitations associated with the Iris Research survey data (which was only available from the final publicly released report) means that comparisons have been limited to selected questions. Further, there were some concerns regarding the overall sampling methodology used by Iris Research – they reported a 100



percent response rate and completed the survey on behalf of councils that indicated that they did not have CCTV – with the main concern being that the 2005 survey potentially under-represented the true level of CCTV use. Finally, this survey relied on a representative from each council responding on behalf of his or her entire council. Councils were encouraged to nominate the staff member with the most extensive knowledge of open-street CCTV systems in their council to complete the survey. In some cases, respondents acknowledged that they had conferred with other members of their council to obtain the necessary information. In others, respondents acknowledged that they were responding based on the best available information. Further, some questions required respondents to report their perceptions of the CCTV systems operated by their council. These responses should not be assumed to represent either the view of all staff working within each council, or the organisation’s overall position on the use of CCTV. Prevalence of CCTV Responses to the survey confirmed that a high proportion of local councils now operate at least one CCTV system. As presented in Figure 1, overall, 57 percent (n=127) of all councils reported having a CCTV system in operation as at 2014, while a further 12 percent (n=28) did not currently have a CCTV system in operation but planned to install one in the future. Thirty percent (n= 67) of councils did not have a CCTV system and had no plans to install one.

There was some variation between the different states and territories in terms of the proportion of councils with a CCTV system (Figure 2). The Northern Territory had the lowest proportion of councils report that they currently had a CCTV system in operation (41 percent, n= 6), while only the Northern Territory and South Australia (45 percent, n=32) fell below the national average. Two thirds of all councils in Queensland reported having CCTV (67 percent, n=28). 100 90 80 70 60 50 40 30 20 10 0

Qld (n=28)

Tas (n=9)

Vic WA (n=30) (n=56)

2014 (n=221)

No CCTV and no plans to install No CCTV but plans to install



Total (n=221)

Comparing these results with the earlier Iris Research survey reveals that there has been significant growth in the use of CCTV by local councils. The proportion of councils that reported having a CCTV system has increased from nine percent in 2005 to 57 percent in 2014 (Figure 1). Putting aside the limitations of the Iris Research sampling method and changes to council boundaries, both the number and proportion of councils that operate a CCTV system in a public space have increased significantly. The proportion of councils

Yes, Council has CCTV


NT (n=6)

Figure 2: Prevalence of council-managed CCTV systems, by state/territory (%)

2005 (n=669) Figure 1: Prevalence of council-managed CCTV systems in Australia (%)

NSW SA (n=60) (n=32)





that planned to install CCTV in the future also increased from two percent in 2005 to 12 percent in 2014. This means that the overall proportion of councils with CCTV or planning to install CCTV has increased from one in ten (11 percent) to more than two thirds (69 percent) in the past ten years. While the majority of councils that responded to the survey did have a CCTV system in operation, around one-third (30 percent) did not have CCTV and did not have any plans to install it in the future. Reasons for not having installed CCTV, as presented in Figure 3, were varied and included the perception that CCTV was not required because crime is low in the local area (65 percent), the view that CCTV was not a strategic priority for council (65 percent) and a lack of funding available to cover the costs of CCTV systems (51 percent). Other less common reasons included lack of support from the local community (25 percent), lacking expertise within council (13 percent) and the perception that CCTV is ineffective in reducing crime (5 percent). 100 90 80 70 60 50 40 30 20 10 0

CCTV is not


Lack of

Lack of

Lack of

CCTV is not

a strategic required funding support staff with effective in priority in because from relevant reducing our LGA crime is low the local expertise crime in our LGA community


Figure 3: Reasons for not installing CCTV (%) LGA – local government area

Bring your Security

to the next level Bullet, Dome & PTZ Cameras & Recorders Designed with outstanding HD resolution for both indoor and outdoor installation, IR and low-light capable solutions for exceptional night vision, and reliable IP PoE connectivity – FLIR has a security solution for you. • 1-5 MP resolution cameras • Third-party VMS Software compliant/ONVIF • Remote cloud-based viewing via iOS, Android, PC & Mac Visit to learn more. Call your local QSS Branch today.



NSW 02 8833 6500 QLD 07 3630 0813 VIC 03 9676 7000 SA 08 8210 4900 WA 08 9207 6900 SECURITY SOLUTIONS 047


CCTV Funding and Expenditure In recent years, a large increase in the amount of funding available to local government to install CCTV has been offered as part of competitive grant programs managed by both national, state and territory governments. For example, at the Commonwealth level since 2007, funding for local government CCTV (along with other initiatives) has been offered as part of the National Community Crime Prevention Programme (NCCPP), Proceeds of Crime Act (POCA) funding program, Safer Suburbs, Secure Schools and, most recently, Safer Streets. A number of state and territory crime prevention agencies

Responses to the survey confirmed that a high

each (in 2013 dollars). More than half (58 percent) had received funding in the fiveyear period up to and including 2012–13, with an average $198,214 received by each council. Qualitative responses provided by councils suggest that most of this funding was provided for capital infrastructure and installation costs, rather than for the ongoing maintenance of CCTV systems. Information was also supplied by respondents on the total expenditure on CCTV by councils. Among the 127 councils that had a CCTV system in operation, 110 reported spending any money on the system in 2012–13. The remaining 17 either did not record any expenditure in the financial year or were unable to provide an estimate of the total amount spent. Those councils that reported having CCTV-related expenditure in 2012–13 spent, on average, $84,309.

proportion of local

The overall proportion of councils with CCTV or planning to install CCTV has increased from one in ten (11 percent) to more than two thirds (69 percent) in the past ten years.


Past five years

councils now operate at

Funding for local government CCTVa

least one CCTV system.

Received funding (n)



Received funding (%)









have also established CCTV funding streams within their grants programs, such as the Public Safety Infrastructure Fund in Victoria and the Community Crime Prevention Fund in Western Australia. Other government agencies also offer funding for CCTV without the explicit goal of preventing and detecting crime (for example, the Regional and Local Community Infrastructure Program), while a number of private corporations (such as insurance bodies) have also provided funding for local government CCTV. As shown in Table 1, the survey found that councils receive and spend a significant amount of funding on CCTV, a finding that is consistent with recent research by Carr (2014) and Edmonds (2014). One-third (35 percent) of councils received funding for CCTV in the 2012–13 financial year, with councils receiving an average $85,090


Average funding received ($) Expenditure on CCTV by local government b Spent money on CCTV system (n) Average expenditure ($) Table 1: Local government CCTV funding and expenditure a: councils with CCTV systems only b: limited to councils with a CCTV system and that spent money in 2012–13

Part two of this two-part article in the next issue of Security Solutions Magazine presents the findings on the characteristics of CCTV systems used by local councils, along with how frequently police use the footage and for what purpose. This article originally appeared as a research paper from the Australian Institute of

Criminology in May 2015. The article has been republished with permission. The original paper can be found at:



Top 10

Technologies That Are





By Ian Weightman

We know that technology has the capability to change the world: from the Gutenberg printing press to the steam engine to the microchip. But how can we determine which technologies are likely to have the greatest potential to transform the future of the human race? What is the process to distinguish between the innovations that will have limited impact and those that will be remembered as milestones on the path of progress? How can you tell the difference between VHS and Betamax? To answer these questions, IHS Technology gathered its leading experts representing all segments – electronic components; finished products; applications markets; consumer, media and telecom; industrial; medical and power. These experts were asked to nominate and vote for their top 10 most impactful technologies over the next five years.




Artificial Intelligence (AI) Whether you agree with Stephen Hawking that it could be the end of the human race or your views trend towards Ray Kurzweil’s vision of a transcendent new era of the technological singularity, everyone recognises that the advent of true AI will be a transformative event. Long the province of science fiction, the key building blocks for AI are coming together. Furthermore, some tests designed to identify the threshold for true AI capability have been passed. A Russian computer program this year passed the famous Turing test by convincing a sufficient number of experts that it was a real person, the first time AI has been able to do this. Imagine what an AI could do with regard to video analytics in the security market. Would it be our Guardian Angel or our own version of Skynet?


Biometrics Advancements in mobile biometrics, such as Apple Inc.’s Touch ID, are having a major impact on security, allowing unlocking of devices, user identification, applications in mobile payment and potentially security applications in corporate and other authenticated environments. Influential entrepreneur Elon Musk – who has made 
a career out of turning science-fiction concepts into viable businesses – has stated that AI technology is making incredibly rapid advancements. Biometrics will also increase efficiency and efficacy
 in the expanding market for digital health care, using technologies that include fingerprint identification, retina scan, electrocardiogram, facial recognition
 and heart rate, pulse oximeter, ultraviolet sensor,
 6-axis accelerometer/gyroscope, skin temperature
and barometer.


Flexible Displays Flexible display technology is poised to transform electronic product design from wearables and smartphones to tablets and TVs. Breakthroughs in materials, processes and manufacturing technologies are leading flexible displays toward widespread commercialisation. New developments in flexible display technology, especially in organic light emitting diodes (OLED), are inspiring innovation in wearable devices. Examples abound with recent announcements of smartwatches and fitness trackers that employ curved displays. Flexible displays are starting to appear in smartphones and are poised to spur


transformational designs in the tablet market. Meanwhile, flexible displays are also bringing waves of curved TVs into the market. Imagine applications in the security space from being able to monitor CCTV on the move to creating more ergonomic monitoring control rooms and more.


Sensors The proliferation of sensor technology enables many of the technologies described in this article – the cloud, big data, biometrics and the Internet of Things (IoT). From image sensors in smartphones to gyroscopes and accelerometers, sensors are the elements that convert the real world into the digital world where it is processed, stored, used for control and output in myriad forms. They are essential to driving the entire value chain that includes software, services, electronics and semiconductors. Sensors are probably the most underrated technology in terms of their impact. The global sensor market for mobile handsets and tablets alone is expected to nearly double in the coming years, rising to $6.5 billion in 2018, from $3.5 billion in 2013. Applications for sensors in the security market are limitless from worker safety (man down and guard tracking) to being able to measure heart rate in confrontations to GPS location of staff and so on.


Advanced User Interfaces There are a lot of new uses for devices that have not yet been clearly integrated into a single, clean user experience. There are a lot of new uses for devices that have not yet been clearly integrated into a single, clean user experience. These uses include new device types such as wearables and new services such as the combination of linear and on-demand content. Other areas include the IoT, smart homes and industrial applications and, of course, Physical Security Interface Management (PSIM) systems. User interface technologies that are applied to these applications include navigation, intuitive interfaces, search, control and predictive/adaptive elements. Advances in user interfaces also encompass AI and involve developments in devices like smartphones and tablets. One key area of advancement in user interfaces is in touch, gesture and motion. Devices are increasingly shifting to a touch-centric world. Displays are functioning as both input and output devices. Innovative solutions in touch, proximity based

sensing, and gesture and motion based interactivity are coming to market at a rapid pace. Non-contact gestures are enabling new intuitive interface for varieties of products. For example, consumers will be able to rotate their hands in the air to change the volume on a car radio or turn off light with the wave of a hand. They might also be able to move video between displays as well as zooming in or panning and tilting cameras with gestures in a security control room in a similar fashion that the sort of things seen in the Tom Cruise movie Minority Report. The recent launch of Apple Watch demonstrates the trend towards increasing adoption of haptic technology, which provides tactile feedback in response to user inputs. These new innovations will open up opportunities for companies to create new products with increased revenue and profitability. Development in this field will also impact the electronic value chain from semiconductors and sensors to display materials and devices.


Graphene Imagine a material only one atom thick yet 100 times stronger than steel. Envision super-fast-charging capacitors with enough energy to power electric cars. Picture light-speed electronics, ultra-efficient solar cells that can power everything from CCTV to perimeter detection systems, highly flexible digital displays for public warning and impermeable body armor. This is graphene, and these are just a few examples of the applications that are in development. The major obstacle to delivering this breakthrough to consumers is the astounding cost to produce high quality graphene in sufficient quantity. However, advancements are occurring at a rapid pace with manufacturers around the world focused on cracking the graphene production conundrum. Earlier this year, Samsung announced a breakthrough in producing graphene in manufacturing quantities, a development that could transform everything from building materials to semiconductors.


Energy Storage and Advanced Battery Technologies The global movement towards generating power 
 from renewable sources, like solar and wind, has created huge economic and environmental benefits. However, the nature of these technologies dictates 
that power generation is intermittent and fluctuates throughout the minute, hour, day and year in a relatively unpredictable manner.

Energy storage has the potential to dramatically transform the way the power system is operated and overcome many of the challenges presented by the growing penetration of renewable energy. To date,
 the single biggest obstacle to mass deployment of battery-based energy storage has been the relatively high lifetime cost of such batteries, which has restricted the business case to a small number of niche applications. However, technological improvements and cost reductions have been rapid and the commercial deployment of energy storage solutions is gaining huge momentum. While energy storage will be critical to maintaining reliable electricity grids and enabling renewables to make an even more significant contribution to the energy mix, it will also have a big impact on security control rooms, security systems as standalone or fail safe systems, and so on. IHS predicts that global installations of new solar storage systems in the residential, commercial and utility-scale segments will rise to 2,875 megawatts in 2018, up by a factor of nearly 18 from 163 megawatts in 2014.


3-D Printing In Industrial Applications Also called additive manufacturing, 3-D printing encourages design innovation by facilitating the creation of new structures and shapes and allows limitless product complexity without additional production costs. It also greatly speeds up time to market by making the idea-toprototype cycle much shorter. Total revenue for the 3-D printing industry is forecast to grow by nearly 40 percent annually through 2020, when the aggregated market size is expected to exceed $35 billion, up from $5.6 billion in 2014.


Cloud Computing and Big Data The cloud has become a ubiquitous description for on-demand provisioning of data, storage, computing power and services that are touching nearly every consumer and enterprise across the globe. Together with data analytics and mobile broadband, the cloud and big data are poised to reshape almost every facet of the consumer digital lifestyle experience and dramatically impact enterprise IT and security strategies, while creating new opportunities and challenges for the various nodes in the entire ICT value chain. The cloud is transformational in the business landscape, changing the way enterprises interact with their suppliers, customers and developers.

The elasticity
 of demand and the capability of supply to match demand are giving rise to new services, promoting different business models and value chains for servers, and computer, storage and device manufacturers. Consequently, companies all over the world and in almost every industry are looking at how to best leverage the capabilities of the cloud and create new business models. The big data and data analytics segment is a separate but related transformational technology that harnesses the power of the cloud to analyze data for disparate sources to uncover hidden patterns, enable predictive analysis and achieve huge efficiencies in performance. The security market is just one industry set to reap huge rewards in this area. IHS predicts that the enterprise market for cloud, big data and data analytics is poised for explosive growth as an increasing number of enterprises move their applications to the cloud and look to data analytics to drive new insights into their consumer behaviour. In the enterprise market, cloud services coupled with big data and data analytics will reshape the way enterprises in almost every industry interact with their suppliers, partners, shareholders and customers. IHS forecasts that global enterprise IT spending on cloud-based architectures will double from about $115 billion in 2012 to about $230 billion in 2017. The market consists of storage, servers, applications and content that can be configured and delivered in a framework that is rapidly scalable, dynamically provisionable, on-demand and has minimal management requirements. As enterprises increasingly migrate to a cloud strategy, it is foreseeable that cloud and big data will become an increasingly larger portion of the annual global enterprise IT spending, which is currently at approximately $2 trillion. The migration to a cloud-based enterprise IT structure requires the adoption of new technologies as well 
as new business models. The rise of the cloud will cause enterprise spending to transition from capital expenditures to operational expenditures. In addition, enterprise IT currently has concerns regarding security and transparency of data and applications in the cloud. This transition will require new levels of data security and backup and disaster recovery – especially in the enterprise IT environment – to ensure that critical elements of the corporate knowledge base are protected. These concerns must be addressed by cloud IT service providers in order to drive even more widespread adoption of the cloud.


The Internet of Everything The world is becoming increasingly digital thanks to the reality of near ubiquitous connectivity, inexpensive processing and sensor solutions, and the use of the Internet to facilitate communication between electronic devices. As such, society is in the early stages of the Internet of things (IoT) – a technological evolution that is based on the way that Internet-connected devices can be used to enhance communication, automate complex industrial processes and generate a wealth of information. To provide some context on the magnitude of this evolution, nearly 86 billion Internet-connected devices are projected to be in use in 2024, up from less than 20 billion in 2014. While the concept of the IoT is still relatively new, it
is already transforming into a broader concept: the Internet of Everything (IoE). The metamorphosis is not just about the number of devices; it is really about the complete departure from the way these devices have used the Internet in the past. Most of the connected devices in place today largely require direct human interaction and are used for the consumption of content and entertainment. The majority of the 86 billion future connections will be employed to monitor and control systems, machines and objects – including lights, thermostats, window locks and security systems and devices. As this installed base of connected devices continues to grow and diversify, the question will not be how 
to connect but rather how to maximise the benefit from these devices. Much of today’s focus on the IoT surrounds the hardware – the shiny, sleek, smart devices that are going into the connected device ecosystem. However, as with any new wave of technology, suppliers and OEMs alike will have to move beyond the hardware to consider the necessary combination of hardware, software and services that will truly enable the IoE experience we envision. The IoE can be used to provide unique value propositions and create complex information systems that are greater than the sum of the individual components, and the impact will resonate in virtually every field of human endeavour. Ian Weightman is Vice President, Research & Operations, IHS Technology. For more information on this article, refer to IHS Technology encompassing research across all key technology sectors at



The Trap Of

Us and Them

How The Media Is Creating Australia’s Greatest Security Threat




By Anooshe Mushtaq

There is no doubt that the Australian media’s coverage of current affairs includes an increasing volume of news on terrorism by Muslim extremists, in particular Islamic State (IS). Those who understand media strategy will be familiar with the practice of leveraging evocative topics and sensationalising content to boost ratings and create audience engagement. This is the very reason media has lapped up the highly chilling acts of barbarianism carried out by IS; these are highimpact stories that touch on common human sensitivities of religion, death and politics. The weight of media coverage and the tone of much of it has left many in the Muslim community feeling targeted. In many parts of the community there is a pervasive feeling that the government, the media and society as a whole is set against Muslims and Islam. The attention lavished on IS by the media and the government plays directly into IS strategy and has important implications for national security in Australia. Terrorist groups seek to sow fear and division in communities as a means of achieving their goals. This is the essence of terrorism. The hyperbolic coverage of the IS threat in many Australian media outlets plays directly into this strategy. Understanding how government rhetoric and media coverage fuel extremism is important if the threat posed by extremism is to be successfully combated. Abu Bakr al-Baghdadi is the self-proclaimed caliph of IS. Al-Baghdadi’s ambitions of establishing an Islamic caliphate are based on radical misinterpretations of religion that have surprisingly gained tremendous momentum the world over. The messages that form the core of IS’s recruitment strategy are ultraorthodox and extreme, designed to evoke a fear of punishment and a desire for reward in the afterlife in the target audience. IS has

IS’s target recruits are a mix of radicalised individuals from Muslim-dominated regions, as well as Muslim youth residing in non-Muslim Western communities. In direct response to the burgeoning popularity of IS, Western nations including Australia are aggressively pursuing a counterterrorism policy that has inadvertently alienated local Muslims from the broader community. It seems the public also does not tire of articles and opinion pieces on national security or anti-terrorism laws. The media’s focus on these topics may be great for publicity; however, the fallout has been a polarisation in the attitudes of the general public on these topics and a marginalisation of the Muslim community. The rise of movements such as Reclaim Australia and United Patriots Front, both whom promote an anti-Islam narrative, are a symptom of this constant attention. The extent and tone of the coverage are such that many in the Muslim community feel that they are targeted by both government anti-terrorism policies and the media itself. While the government maintains that its counterterrorism policies are aimed at guarding Australia’s society from the threat of radicalisation, Muslim communities feel that their religious and cultural identities are being painted as synonymous with terrorism and radicalisation. Since September 11 2001, Australia has enacted over 61 anti-terrorism statutes and further expanded anti-terrorism policies in 2014. Although the laws do not specify application to Muslims or Islamic groups, Islamic leaders have grave concerns that ordinary Muslims could run foul of these laws by simply referring to certain passages in the Quran in a public setting. Concerns regarding the laws are shared by some civil liberty groups who have described the rapid expansion of anti-terrorism laws as hyperlegislation and have voiced concerns that

positioned itself as a religious army carrying out horrendous acts of terror both against Muslims and non-Muslims who do not devote themselves to their literal interpretation of the Islamic scripture. For IS, its war is not with the West or East, but with people the world over who are not following its version of Islam, which is extreme and misconstrued.

these laws give too much power to government agencies with too little oversight. Many now question whether various national security measures adopted are genuinely reducing the risk posed by potential Jihadis joining the ranks of IS. There is a risk that these laws and the media coverage surrounding them are marginalising otherwise liberal and tolerant


Muslims, and creating an environment in Australia in which IS’s messages can more easily take root. Addressing this situation requires a renewed approach to understanding what IS wants and what it is about its message that is so appealing to a small section of the adolescent or young adult Muslim population. Secondly, attempts must be made to better understand how moderate and law abiding Muslim citizens are affected by Australia’s anti-terrorism policies. IS’s strong international follower base is built upon its promotion of an imminent apocalypse and a misinterpretation of part of Islamic teachings based on the strict Wahhabism sect of Islam. Many are attracted to join the IS caliphate as a last-ditch effort to redeem themselves as they have come to believe with strong conviction that the Day of Judgement is near. IS’s recruitment messages highlight some Islamic beliefs that are alluring to young disenfranchised youth, but these beliefs do not tell the whole story of Islam. The contradiction, which is not readily apparent to non-Muslims and ill-informed Muslims, is that IS’s practices of ex-judicial killings, enslavement, forced marriages, ransom, smuggling oil and smuggling ancient artefacts go against the core teachings of Islam. Fundamentally, IS is ‘cherry-picking’ a selection of core Islamic teachings to further its cause and carry out its recruitment drive. The actions of IS are not completely reflective of Islamic teachings and IS is not representative of the true teachings of Islam. The current government’s politicisation of national security has led it to scapegoat the Muslim population to benefit its domestic political ambitions. Further exacerbating the issue for the Muslim community is the media’s disproportionate coverage of terrorism at the expense of other issues of national importance. Members of the Muslim community have long kept a watchful eye for dissident immigrants attempting to preach vitriol and hatred in Australia. Marginalising Muslim communities does nothing to strengthen this first line of defence against home-grown extremism. The government’s anti-terrorism policies could be perceived as counterproductive as


Does not require any specialised network hardware and can co-exist with other network systems

Supports all infrastructure - Buildings, Industrial, Remote Areas Extremely energy efficient with low power consumption and low heat dissipation Effortless scalability to any sized systems Excellent system management with advanced system maintenance and monitoring

Oceania Inquiries Phone: +61 3 9729 6600



Terrorist groups seek to sow fear and division in communities as a means of achieving their goals.

they erode the will of honest and law abiding Muslims to actively work with Australian security forces to counter the mutually shared threat of terrorism and religious radicalisation. The Grand Mufti of Australia’s recent decision to boycott the annual Australian Federal Police Eid Dinner is an example of how trust between the government and the community has been eroded. If the government wishes to establish effective policies to prevent possible terrorism attacks and mitigate the drivers of radicalisation, policy makers need to consider the social and religious identities of the Muslims. To achieve this, trusted members of the Muslim community should be given a more inclusive role in the design of policy. The dramatic erosion of trust between the government and the Muslim community has bolstered IS’s agenda of creating a rift between Muslims and non-Muslims. IS’s aim is not only to spread fear through intimidation and violence in the Middle East, but also to use media and social media to create this rift in Western nations. At the moment, its strategy is succeeding in Australia. IS leverages the alienation and negative depiction of Muslims in the media to target its recruitment base via bold social media campaigns. The Australian Government’s indirect marginalisation of the broader Australian Muslim community via its antiterrorism laws is providing the perfect means for IS to further its cause. IS’s capability to attract recruits must be stymied while ensuring civil liberties are not trampled upon and the bedrock of a modern democracy, free speech, is not compromised. This is easier said than done. Addressing the rise in extremism requires change from the top. To begin with, the government and other public figures must consider how the tenor of public discourse


contributes to the issue. In times of genuine national crisis, Australians have a proud tradition of coming together as a society. Australia’s history is littered with examples of crises such as bushfires and floods that have brought out the best in society as people band together to overcome adversity. Former Queensland Premier Anna Bligh was highly praised for her handling of the 2011 Queensland floods, in large part because of how effectively she communicated – calmly and with genuine empathy. It is almost impossible to imagine that a leader during a natural disaster would seek to inflame a situation with rash language and exhortations to panic. It would be the height of irresponsibility. Tony Abbott clearly believes that the threat of IS is a national security crisis. He did, after all, say that IS was coming for every single one of us. However, his rhetoric and that of other public figures does not match what Australians expect of their leaders during a time of crisis. When Tony Abbott said he wished more Muslim leaders would speak out against extremism, his words sowed division.

This is the essence of terrorism. The hyperbolic coverage of the IS threat in many Australian media outlets plays directly into this strategy.

When he coined the phrase 'Team Australia' and used it in a national security context, he sowed division. Whether it is by design or inadvertent, the government’s language persistently sets up an ‘us and them’ narrative that is corrosive and plays directly into the propaganda strategy of IS. The ‘us and them’ narrative has serious impacts on Australia’s security by fostering the growth of groups defined by their intolerance of others. Recent weeks have seen the rise to prominence of groups such as Reclaim Australia and the United Patriots Front. Both of these organisations seek to define society by what divides people, rather than what people have in common. In many ways these organisations are similar to Islamic groups such as Hizb ut-Tahrir, who sow division in society to meet their own aims. No one can seriously argue that Australia as a whole is safer or more secure for the existence of these groups. It is similarly difficult, although perhaps not impossible, to imagine a major media outlet failing to pass on important messages during a natural disaster; or encouraging people to look after themselves at the expense of their neighbour. During a natural disaster, media outlets seek out good news stories; stories of mateship and courage; stories of communities banding together to make the best of a bad situation. Now, in the midst of what the Prime Minister considers a national security crisis, the Australian community would be best served by stories of the many successes of multiculturalism and the positive contributions of the waves of migrants that have made Australia what it is today. Instead, the media presents stories that echo the uncompromising, combative language of the government. Ultimately, this focus on differences rather than what unites Australians strengthens extremists of all varieties and weakens Australia.

Contact us on 1300 364 864 Follow us on

Delivering Proven Solutions for Security & Safety We Protect People & Assets SECURITY SOLUTIONS 059


The government’s aim to counter violent extremism is also missing the key element of Australian Muslims who are moderate and have successfully integrated themselves into the Australian society. The government has been unable to connect with these moderate Muslims because it lacks understanding of the cultural and theological identities which many immigrant Muslims revere. This is especially pertinent when considering the fact that the vast majority of Muslims, both locally and the world over, do not support violent interpretations of Islam, as is the case with the IS. Contrary to common perception, when immigrants move from conservative societies to the West, they adopt a more conservative approach because they feel their religious and cultural values are under threat of extinction in a new culture and a new way of life. Immigrant parents use religious and cultural values to place tremendous restrictions on their children to shield themselves and their families from Australian culture, which deviates so extensively from their own. This feeling of insecurity is widespread in the Muslim communities, where community leaders dictate religious and cultural preservation as core of their lives. Impressionable immigrants quickly abide by this and construct walls between themselves and other non-Muslims by limiting social engagements and thus isolating themselves to their own like-minded communities. To engage these isolated individuals, especially the aggravated youth, into the Australian society, they need to be persuaded that Western society and religious convictions are not ‘corrupt’ and hence do not pose a threat to their unique values. The biggest concern of this cautious and insecure mindset is that of the youth. Today’s children who belong to such conservative homes are forced to spend more time at home and any social engagements are restricted to within the migrant Muslim community. Not instilling their parent’s conservative views in their lifestyles and vexed by their lack of social activities, they become extremely susceptible to the information they are exposed to on social media. When these migrant youth are active on these social media platforms, they continue to feel isolated. This is because there is a


Addressing the rise in extremism requires change from the top. To begin with, the government and other public figures must consider how the tenor of public discourse contributes to the issue.

widespread perception that they themselves are targets of Australian anti-terrorism measures. This is the very domain that IS progressively utilises to lure disenfranchised youth residing in Western societies. Many immigrants feel that they must choose an identity; that one must be either an Australian or a Muslim. The idea that one can be both may fast be becoming incomprehensible. The narrative that they can be both Australian and Muslim at the same time will, undoubtedly, encourage them to integrate with the Australian society without feeling that their core religious and cultural values are being threatened. Moderate and trusted Muslim leaders, who hold substantial influence over their communities, should be given more inclusive roles in the formulation of anti-terrorism laws and other policies adopted to counter radicalised behaviour. The government is urged to understand that countering religious extremism is of utmost importance to the moderate and trusted Muslim community. In its efforts to sideline radical individuals, the government has marginalised law abiding and hardworking Muslims, dedicated to their Australian way of life. The issue of terrorism and violent extremism is a national issue affecting all of Australia’s inhabitants, both Muslim and non-Muslim. Despite its ongoing efforts, the government

has not yet fully understood the real drivers of extremism within Australian society. The government must grasp the core ideas proliferated by IS’s propaganda that have been so alluring to so many Australian youth. Only then can it begin to establish a sustainable counterterrorism policy that is both effective and inclusive of all concerned participants. If the government truly believes that Australia faces a crisis, it is its duty to adopt a positive counter-narrative, eradicate hyperbole and finger pointing from the public discourse and unite the community to face the challenge of extremism together. The media 'of course' has an equally important role to play in shaping public discourse and contributing to the security and safety of the nation.

Anooshe Mushtaq is a first generation Australian of Pakistani origin. She spent her early years in Pakistan and several years in Libya on posting with her family. Since her arrival in Sydney in 1985, Anooshe has experienced first-hand the changing cultural landscape of Australia. She is an Associate Member of the Australian Institute of Professional Intelligence Officers (AIPIO) and a Research Associate Australian Security Research Centre (ASRC). She has published articles on the topic of Australian Muslim Culture and Radicalisation.

Moderate and trusted Muslim leaders, who hold substantial influence over their communities, should be given more inclusive roles in the formulation of anti-terrorism laws and other policies adopted to counter radicalised behaviour. SECURITY SOLUTIONS 061



Workplace Safety And Contr act Security Providers


JUST LAW By Dr Tony Zalewski According to figures released by the Australian Bureau of Statistics, over 700,000 Australian employees suffer some sort of work-related injury or illness each year. Some work is inherently more hazardous than others, including the various roles performed by operational security staff across high-risk sectors and within publicfacing environments. It is not uncommon for security services to be provided to government departments through a contract security firm; in fact it has become the norm in most government settings. The process is usually formalised through a contract for security services where, amongst other things, safety of staff and the protection of workplace assets is a key responsibility for the contracted security provider. In addition to any formal agreement between the parties and express conditions regarding safety, it is also implied in a contract of employment that security providers take reasonable care for the safety of their employees. There are many resources available to assist providers in minimising risks associated with the safety of staff and others in and around a workplace; this article will discuss some of those resources and methods for minimising risk. Responsibilities for Workplace Safety Government agencies that utilise contract security providers have a non-delegable duty of care to all persons in and around the workplace. In most contracted security environments, the government agency and its security provider work closely to minimise security and safety risks. In addition to a formal risk assessment and risk treatments, employers can further minimise risk by: • introducing operational safety strategies for staff carrying out work without exposure to unnecessary risk, such as protective ‘zones of control’ • warning staff and others of foreseeable, unusual or possibly unexpected risks that might arise in the workplace • instructing and further developing staff in the performance of work where instructions might reasonably be thought to minimise the risk of danger and injury. Further to this shared responsibility, contract security providers also owe a duty to take reasonable care for their staff.


Taking Reasonable Care An employer’s duty to take reasonable care to avoid a foreseeable risk of injury is wellknown. In determining the potential for liability, it is usually enough if the circumstances reveal injury to an employee was a possibility that would have occurred to a reasonable employer. This includes matters such as inattention or misjudgement in common work functions by an employee, hence the importance of appropriate induction, training, supervision and protocols. Reasonable care is not a guarantee of safety and some Australian cases have emphasised the need for employees to take personal responsibility. Australian Standard for Guard and Patrol Services The Australian Standard AS4421:2011 Guard and Patrol Security Services has been adopted by regulators and the security industry as an appropriate guide to minimum operating standards for providers of security services. The standard reinforces concepts of taking reasonable care including, amongst other things: Unless declined by the client, a protective risk review of the client’s premises be conducted by a competent person who highlights the various strengths and weaknesses of the system and what has to be done to provide reasonable protection (Section 2.6.1). Where site risks are identified, records shall be kept and communicated to security officers at the time of despatch or deployed to site (Section 2.6.2). A clear written contract or agreement between the parties (Section 2.7). The company (security firm) shall formulate assignment instructions for the effective security of the site, dealing with emergency procedures, lines of communication and accountability. The assignment instructions should be agreed between the parties (Section 2.8). Most providers of security services align closely with the standard and in many cases exceed the minimum requirements by introducing additional services such as regular meetings about operating performance, debriefing after incidents, system reviews to enhance the system of work, and data analysis

1 2 3 4

... safety of staff and the protection of workplace assets is a key responsibility for the contracted security provider.

relating to operational performance. Although alignment with the standard is optional, it is common industry practice for security providers to adopt the recommended practices as outlined within the standard. This approach minimises risk and provides some evidence that a reasonable approach to care has been taken by the employer. Resources that Assist to Enhance Safety There is a plethora of information freely available to assist employers in enhancing workplace safety, including online advice by safe work regulators. For example, Safe Work Australia has a number of resources on risk minimisation in the workplace. The NSW WorkCover publications Occupational Health and Safety in Hospitality (2003) and the guide Violence in the Workplace (2002) assist employers in understanding risk issues for particular sectors or work functions. Other states and territories also have similar publications, with additional guidance through Australian standards such as AS/NZS 4801:2001 OH&S Management Systems. Typically, employers who adopt various methodology and recommendations in relevant guides to minimise risk in the development of their formal (documented) security/safety systems minimise a broad range of operational risks. Common Problems Problems arise for employers when they do not adopt appropriate practices, align with standards and guidelines or do not regularly review their safe work system. Problems that are typical when there have been incidents involving alleged safety breaches include: • an absence of or a deficient safety policy, plan or procedures • poor workplace supervision • no additional professional development training to progress the safety culture or competence of workers • failure to adjust the system of work from other incidents or near misses • poor, deficient or dated risk assessments. Conclusion Workplace safety programs need to be carefully thought through. They must be developed or further contextualised in consideration of the

Typically, employers who adopt various methodology and recommendations in relevant guides to minimise risk in the development of their formal (documented) security/safety systems minimise a broad range of operational risks.

operational work environment. Various standards and guidance materials, including AS/NZS 4801:2001 OH&S Management Systems and AS4421:2011 Guard and Patrol Security Services, should be reviewed to assist employers to adopt and operationalise a system that is evidence of a reasonable standard of care. Security industry employers should work with their clients to develop a system of work that aligns with industry best practice. Addressed correctly, such practices will meet the safety needs of employers, employees and others in and around various workplaces. It will also ensure a more productive and profitable operation. For over 20 years Dr Tony Zalewski has provided expert security reports to courts in all Australian jurisdictions. He has worked on some of Australia’s leading security-related civil actions and currently provides advice about security across industry sectors, as well as being a member of relevant industry associations, and a security adviser to governments locally and abroad.




Intelligence As A Tool For Risk Decision Making Part One



By Codee Ludbey In this issue, we will have a look at security intelligence alongside the familiar security risk management process, providing a consideration to the uncertainty that faces all corporate security practitioners in their day-today decision making. Security risk management is the language of corporate security practitioners. Through it, they can effectively communicate threat, ensure duty of care and provide business justification for risk mitigation. Security risk management allows the security manager to identify security threats through examination of the current organisational context, manage risks through security and business policy and eliminate or reduce these risks through protective security measures. The risk management process is one that is always evolving, with many different approaches being undertaken depending on organisational objectives, operating environment and perceived threat. Effective risk management requires organisational commitment, extensive internal and external stakeholder engagement and strong leadership both in times of crisis and in everyday operation. Throughout the risk management process, decision making is often required in uncertain circumstances, against an uncertain threat, with uncertain outcomes. To reduce this uncertainty, robust information collection channels are required to ensure a holistic operational picture at all levels of an organisation and its external environment. Often overlooked is the application of intelligence gathering and analysis techniques to solve this problem. Uncertainty and Decision Making Decision making in an organisation can be a difficult task, even in ideal circumstances. The fluctuation of markets, supply and demand, employee morale, work output, and legislative and competitor pressures can introduce significant uncertainty to strategic and operational decision making. In security applications, this uncertainty is magnified due to the requirement to predict and prevent rational, intelligent actors against an everincreasing number of vulnerable and exposed targets. There are considerable expectations on the corporate security practitioner to remain ahead of the curve, ensuring the protection of


people, property, information and reputation across the organisation. These expectations can be met and exceeded through the proper implementation of a security risk management process that is often reviewed, has access to relevant, and timely information and is supported with organisational and executive buy-in. Julian Talbot and Miles Jakeman, leading authorities in the security risk management domain, claim that security decision making deals with more uncertainty, complexity and ambiguity than any other risk management context. In light of this, it is vitally important for the corporate security function to be well informed of all business operations, aware of long-term strategic goals, and embedded into corporate decision making. The complex and diverse nature of the threat facing an organisation means that the corporate security function must be proactive in developing a comprehensive and holistic threat context through extensive information collection. Security Risk Management Security risk management is the process undertaken by a corporate security practitioner in the identification of security threats, assessment of security risks and the implementation of risk treatments to an organisation. It allows the consideration of assets, existing controls and potential vulnerabilities when faced with specific threats to inform the decision-making process. A problem arises when faced with the extensive information requirements of such a process. How does the security manager identify all the possible threats, vulnerabilities and risks to an organisation? It is impractical to assume that all possible occurrences can be accounted for, which is why the implementation of security control measures must be targeted carefully and in such a way as to ensure umbrella protection against multiple identified risks. The efficacy of these controls is limited to the information collection capabilities of the organisation, as it is not possible to protect against something that is unforeseen. To reduce uncertainty in the organisation’s operating environment, especially in the context of security, the implementation of robust information collection and analysis measures must be undertaken.

The Intelligence Function Intelligence is a function often considered exclusively in the domain of governments and dedicated private organisations; however, lessons can be learned from these actors and implemented into business functions. Intelligence operations exist to reduce uncertainty in decision making by collecting information from all available sources. In the context of a business, this means news media, online information, business contacts and other information feeds that are readily available. Intelligence processes are essentially a method of acquiring sparse and incomplete information across multiple sources and building a coherent picture of events for use by a decision maker. The key differentiator of an intelligence function as opposed to a good news source is the ability for the analyst to cut through the nonsense and provide relevant, timely and informed discussion about business-specific concerns. Good intelligence can provide an organisation and decision makers with the information they require to make difficult decisions, to identify and manage risk, and to operate effectively in risky and uncertain environments where they may not have been able to in the past.

The complex and diverse nature of the threat facing an organisation means that the corporate security function must be proactive in developing a comprehensive and holistic threat context through extensive information collection.

Good intelligence can provide an organisation and decision makers with the information they require to make difficult decisions, to identify and manage risk, and to operate effectively in risky and uncertain environments...

The Process The first stage of any intelligence function requires direct input from the decision maker and knowledge of the problems that need solving. The decision maker, policy maker, or executive team must outline areas of interest, operational boundaries, strategic objectives and all other pertinent information to ensure that the function is scoped and collection methods remain relevant to the organisation. Next, the analyst begins collection of relevant information across all available sources, such as news and social media, and internal and external contacts. Once the analyst has collected enough pertinent information, analysis begins. Analysis is the process through which information is accepted or rejected and then value added in the final report. It is vital that the analyst critically examines every piece of information being used, slowly building a picture of events that is as accurate as possible, whilst ensuring that all assumptions made about the situation or target have been examined. The analyst must be entirely impartial and must deliver the facts as they are discovered without bias, explicitly identifying missing, contradictory, or uncertain information. The analyst will also provide context for the supplied information and, if requested, thoughts on how a situation may develop over time.

Once the product has been developed, dissemination occurs. This is the crux of a strong intelligence process. Dissemination methods can vary from oral briefings, written reports, emails, video conferences, or anything in between. The method of dissemination depends on the organisational context, the needs and wants of the decision maker and the type of intelligence being disseminated. Tactical level intelligence, such as half-hourly situation updates, may be more suited to an email or in-person briefing, whereas an overview of the current and probable future outcomes of an overseas labour strike may be more suited to a multiple page report. Ideally, intelligence reporting is brief and concise, bearing in mind the decision maker’s preferences. If the intelligence function is providing reports that do not suit the information requirements of the decision maker, it is unlikely that the reporting will be read or used. To overcome this problem, it is vitally important that the analyst knows the audience and shapes the product accordingly.

The responsibility for effective risk management rests solely on the corporate security function...

Informing Risk Process The risk management process is one based on knowledge and information. The responsibility for effective risk management rests solely on the corporate security function and, often, this function is overworked when trying to meet all of its business and protective security obligations. This strain can cause even the most effective security functions to operate on information that is not entirely up-to-date or accurate, leading to ineffective or inefficient security controls. Intelligence as a security function is designed specifically to fill this gap, and combining the two is common sense. An effective intelligence function will provide a more holistic and effective risk management process for any organisation. It is important that information feeds developed by the intelligence process are directed by those conducting the risk management process and that the information received is embedded in every step of the process. Both functions should be interrelated, as one cannot be truly effective without the other. In the next issue, we will take a closer look at security intelligence and its operation within the security business unit; in particular, there will be a focus on how to integrate this into a security risk management process.




A LOSS PREVENTION INTROSPECTIVE By Darren Egan The modern retail loss prevention/risk management function can be described as a multifaceted role that, to achieve sustained success, requires a multifaceted approach. Fundamentally, it is a hugely influential and important role that has the potential to deliver significant savings to the company’s bottom line if performed to its full capacity. In recent times, the role of loss prevention has shifted dramatically, moving away from the reactive, such as catching shoplifters, into a more proactive methodology, such as increasing staff awareness towards business loss.



There are four words that have largely encapsulated the author’s loss prevention journey to this point. These words (accompanied by the English Dictionary meaning) are: • dynamic – energetic, active, potent • inspire – stimulate a person towards creativity • message – a mission or errand • process – a course of action or proceeding. Dynamic Retail is a wholly interactive, dynamic environment. Put another way, retail is people serving people for every minute of every viable hour of trade. Ultimately, however, retail is about generating sales. In such a demanding service environment, more than ever it has become vital for retailers and their employees to rise to the challenge of enticing more customers through the checkouts, while at the same time mitigating shrinkage/wastage and causing minimum disruption to the core business of selling merchandise. Unfortunately, the flipside of retail is loss. Loss, in the form of shrinkage, can cost companies dearly. In its most effective form, shrinkage can be managed and controlled down to a narrow point, but it is never completely vanquished. At its most destructive, shrinkage, if managed improperly or undervalued, has the potential to negate profits to the point where a retail store or company can be altogether shrunk out of business. Enter loss prevention. Although a nonsales function, any dedicated loss prevention person worth their salt should recognise, if not outwardly embrace, the ideology of a dynamic retail environment. Adopting a dynamic outlook (energetic, active, potent) will inspire staff co-operation and convey the loss prevention message across all levels of the retail business. The loss prevention officer should be dynamic, even if he is the only person in the room who is. Almost without exception, following a store visit from a certain dynamic Star Retail Group general manager, that store’s daily sales figures increased significantly against the sales trend. Inspire On the surface, the prospect of inspiring people, particularly in a loss prevention context, is enough to fill most people with


Fundamentally, it [loss prevention] is a hugely influential and important role that has the potential to deliver significant savings to the company’s bottom line if performed to its full capacity. dread. However, the concept has a definite place in the loss prevention lexicon, having the potential to hugely impact company shrinkage. When a person or, more importantly, a group of people become inspired, big things start to happen. An inspired employee will spread the loss prevention message to others, creating the potential difference between a good shrinkage result and an exceptional one. The path to inspiration begins with the following steps: • In retail terms, inspiration can be defined as unlocking an employee’s potential. • Unlocking potential involves setting achievable targets, then challenging and supporting staff at regular intervals to meet and eventually surpass shrinkage objectives. • An employee who regularly achieves set shrinkage targets is no longer a follower – he becomes a leader – a key company asset who will pass on his learnings to other staff. Message Every loss prevention officer should consider his personal loss prevention message. The author’s message is ‘accountability’, which he wears like a second uniform whenever he is on the job. When conveying the loss prevention message, practise the three C’s – calm, caring, confident. The message should be prevalent in body language; it should be conveyed in every word and action. In that way, staff will never doubt or become complacent about the loss prevention person or his role in the organisation. Practising the three C’s inspires trust, which in turn encourages self-reporting of internal and external theft. Additionally, it promotes initiative, because staff no longer fear being censured. Process: What is Measured can be Managed Process is undoubtedly the mother of all invention – or in this instance, loss prevention! In any dedicated loss prevention role, knowledge of shrinkage and the way it trends becomes a critical component in determining the root cause of almost all major company shrinkage. Once the root cause has been identified, a policy initiative can then be rolled out to combat the shrinkage at its source. Effective process builds excellent team culture, which has the

capacity to limit and ultimately control all aspects of business loss. Although there are many ways to measure shrinkage, the most important information tool may be right at a company’s fingertips – inside its electronic database. Key Shrinkage Strategy Any key shrinkage strategy should, at least in part, be reflective of the following measurement parameters: Singular • stocktake results • daily/weekly/monthly (transactional reports) • loss prevention audits Collective • departments • stores • regions Historical • quarterly • seasonal • yearly. Summary The following summary emphasises the key points of this article: • Loss prevention is a multifaceted function, which requires a multifaceted approach. • Retail is a wholly interactive, dynamic environment. • A loss prevention officer should be dynamic. • When employees become inspired, big things start to happen. • Every loss prevention officer should have a message that is relevant in today’s loss prevention environment. The message should be something that defines him in his role. • Building trust and co-operation in a team environment involves the three C’s: calm, caring, confident. • Effective process, on the back of thorough research, can limit and, to an extent, control all aspects of business loss. Darren Egan has 15 years of experience in the loss prevention field. He is employed by the Star Retail Group, a Western Australian company, as the Group Loss Prevention Manager. Darren can be contacted via mail to 37 Ewing St, Bentley WA 6102; attention: Loss Prevention Manager.


Sherpa Scout


Sherpa APC with Assault Ladder

At Volvo Group Governmental Sales Oceania, delivering platforms of armoured and unarmoured military and security vehicles is our core business. And behind every unit, product and part is a proven and reliable global network with over 100 years of experience. Superior solutions providing exceptional protected mobility. SECURITY SOLUTIONS 073


Bride Of ISIS: One Young Woman’s Path Into Homegrown Terrorism




By Anne Speckhard All over the world, young, Western women are slipping out of their bedrooms, giving silent farewells and leaving heart-rending notes to their families, apologising for their sudden disappearances. Girls are leaving from Paris, London, Glasgow, Denver, Sydney and other cities all over the globe. Their stories differ, yet they are the same in many respects. The young girls are usually seduced over the Internet by older men already in the Islamic State (ISIS). Taking flights to Turkey and creeping over borders, they surreptitiously make their way into Syria and Iraq, often leaving little trace. They leave home for multiple reasons – in a quest for romance, adventure, purity, seeking what they believe is the ‘true Islam’, reacting out of anger over geo-politics and disillusionment with the societies they live in, lured by promises of family, home, even riches if they go to join ISIS – to take part in and build up what they believe will become a utopian society. And those that considered going, but decide not to, may instead opt to ‘stay and act in place’, plotting for or actually carrying out lethal attacks in their own countries. Both types are lethal ladies – brides and servants of ISIS, whose roles are yet expanding and what they are capable of is still not fully understood. What started as small drips from many places has increased to a steady stream of young women disappearing from their homes and families to later show up as terrorist cadres. Of the foreign fighters currently in Syria and Iraq, there are estimated to be over 500 female recruits, dozens of them from Western countries (Owens, 2015). Women and girls now make up nearly one-fifth of the 20,000 foreign fighters estimated to have gone to fight with ISIS and related groups. Of the 30 to 60 Canadians that are estimated to have gone to Syria and Iraq, five to seven of these are thought to be women (Amarasingam, 2015). Scores of young Australian women have either gone, or contemplated going, as socalled jihadi brides according to Duncan Lewis, the head of Australian Security Intelligence Organisation (ASIO). “There are 30 to 40 women that are involved in this cohort that we know


of, some of whom have been stopped, some of whom have been successful in getting offshore,” Lewis told the Australian Senate in February of 2015 (Owens, 2015). “ISIS is more aggressively recruiting women than any other terror group has,” Michael Steinbach, the head of the FBI’s Counterterrorism Division, said in February of 2015. “ISIS is luring them by painting a false narrative about what life is like in Syria. We have seen everything from a female fighter – dedicated groups of women fighters – and those who have come over to support foreign fighters by marrying them.” Appearing before the US Senate Judiciary Committee in July of 2015, FBI Director James Comey announced that ISIS is using Twitter and encryption to recruit thousands of English-language followers and send out orders. According to Comey, ISIS reaches 21,000 followers on Twitter, some that are then moved onto encrypted messaging platforms as they are pulled into the terrorist group. “Our job is to look at a haystack the size of this country to find needles that are increasingly invisible to us because of end-to-end encryption,” Comey told the Senate committee. “This is an enormous problem... we are stopping these things so far, but it is incredibly difficult.” Indeed, young women are being actively lured into ISIS via websites specifically set up for that purpose, through social media and

Security analysts, FBI agents and analysts working side by side, sorting through braggarts on the Internet and chasing terrorists, as they struggle and race to sort through and determine who is signalling serious intent to move into violent extremism. The book, which is based on a composite of actual cases and inspired by the true story of Shannon Conley (an American teen from Denver, Colorado, who converted to Islam, took the niqab and who ultimately ended up in the clutches of ISIS), Bride of ISIS follows the fictional character of Sophie Lindsay, (another ‘girl next-door’) as she is seduced over the Internet. It wrestles with the questions of why a ‘normal’ American teen would convert to Islam and then try to join a terrorist organisation and how terrorists seduce women over the Internet and lure them into travelling thousands of miles to become their wives. In the real case, Shannon Conley was arrested in 2014 while trying to board a flight to Turkey with the alleged goal of travelling to Syria to join and marry an ISIS extremist she had met online. Conley believed her Internet mentors that ‘defensive jihad’ was not only permissible, but her duty. She told FBI agents that she believed US military bases, government facilities and personnel, public officials and law enforcement were all legitimate terrorist targets. Trained as a nurse’s aide and in firearms, Conley hoped to

What started as small drips from many places has increased to a steady stream of young women disappearing from their homes and families to later show up as terrorist cadres. Internet seduction, through chat, text and Skype conversations carried out by a terrorist group that, more than any of its predecessors, is adept at using the plethora of Internet platforms available to reach digitally accessible audiences. These are the things that the author wrote about in her latest book, Bride of ISIS, describing a Colorado Fusion Center’s staff – US Homeland

either fight jihad in Syria and Iraq, or if prevented from entering a combat role, to assist jihadi fighters. Lured by a romance that she carried out via Skype with an ISIS fighter, Conley was on the road to destruction – until her father turned her in to the FBI. One of the downfalls of movements like ISIS is that those who get drawn into them often

do so because of identity issues. They want to consolidate lagging egos, show their bravado as ‘men’ or purity as women, or be ‘jihadi cool’. This means that when they begin to go down the terrorist’s trajectory, they cannot resist bragging about it on social media, thereby giving out valuable clues to those who can stop them. Shannon Conley endorsed Anwar al Alwaki, a now dead jihadi ideologue, on her Facebook page and made other pro-ISIS statements, giving clues to the FBI of her beliefs. She also showed up at a neighborhood church and looked menacing enough that the police were called. When the FBI tried to talk sense into Conley she told them she was reading a jihadi manual on guerilla warfare and had considered carrying out a VIP attack inside the US. She also made clear that police, military and even civilians could be legitimate targets in her mind for a terrorist attack. When confronted with Internet endorsement of terrorist groups, one needs a tool to sort through who may be serious and who is unlikely to actually become a violent extremist. Was Conley serious? Should the FBI act? One way to judge serious intent is to use tools like University of Liverpool Jon Cole’s the Inventory of Vulnerable Persons (IVP) to rate individuals that endorse ISIS to learn what other signs they are showing of vulnerability to becoming violent extremists and then investigate and intervene with the serious ones. This has already been done and works well. Jeff Weyers, a Canadian researcher, identified 300 such persons who appeared to be vulnerable to becoming violent extremists and turned them over to law enforcement. When investigations were conducted, police found explosives, guns and other evidence of terror plots that were thankfully thwarted. Preventing terrorism can also bring up the thorny issues of sting operations and the potential for entrapment, as well as the potential to miss real terrorists who are staging for an attack. In Bride of ISIS, one young man (also based on a real case) is the target of a sting operation and is caught trying to bomb the US Capitol building with the help of undercover FBI agents. Troubling

to some is that he may have been moved more deeply into terrorism by agents that offered him social and material support for engaging in terrorism – without that he may have remained only a braggart. But without them he may also have carried out a successful and lethal attack.

Young women are being actively lured into ISIS via websites specifically set up for that purpose, through social media and Internet seduction, through chat, text and Skype conversations... All of these cases – male or females going to ISIS – beg the question of what can be done and how can authorities track violent extremists and figure out who are the dangers? Just as the problem is complex, so are the answers for how ISIS can be stopped. A multifaceted approach is needed. For one, hotlines, imams and psychologists that can be called on to intervene early are needed. Shannon Conley, for instance, was on the FBI’s radar and agents spoke to her nine different times, but were unable to dissuade her. Finally, her father called and alerted them that she had a one-way ticket out of the country, to join ISIS. Mohamed Sidique Khan, one of the 7-7 London bombers, came back from Pakistan highly radicalised and his family members became concerned, but did not know where to turn for help. Family members often realise when a loved one is radicalising, but they need easier alternatives other than calling law enforcement that can result in something other than arrest – early prevention if possible. Youngsters can also be inoculated against violent extremism by teaching them about violent ideologies in civics classes before they encounter them on the Internet. It is important to give

them a baseline of knowledge and teach that there is no cause that justifies framing problems and their solutions in violent terms, including justifying attacking innocent civilians in terrorist attacks, no matter the cause. A baseline of abhorrence for terrorist ideologies can be created if it is approached creatively at a young enough age. Many believe Western societies need to wait for Muslims to delegitimise terrorists’ claims. In fact, Western societies can use their own marketing and persuasion skills to fight the terrorist ideologies. They just need to be as slick, emotional based, knowledgeable and savvy as the terrorists are. And using tools like the IVP, authorities can track and rate the vulnerability of individuals moving into extremism and stop them before they attack. The important thing is, as ISIS gets more sophisticated, authorities and society in general must have the will and the smarts to get out in front of them and prevent and thwart potential attacks. Anne Speckhard, Ph.D. is Adjunct Associate Professor of Psychiatry at Georgetown University in the School of Medicine and of Security Studies in the School of Foreign Service. She is author of Talking to Terrorists, Bride of ISIS and co-author of Undercover Jihadi. Anne was responsible for designing the psychological and Islamic challenge aspects of the Detainee Rehabilitation Program in Iraq to be applied to 20,000 detainees and 800 juveniles. She also has interviewed over 400 terrorists, their family members and supporters in various parts of the world, including Gaza, the West Bank, Chechnya, Iraq, Jordan and many countries in Europe. Visit www.AnneSpeckhard. com for more information. References For a full list of references, email:



Future Directions In Screening Technology By Steve Lawson Since September 11, 2001, the reaction of authorities, especially those in the United States, has highlighted how inefficient passenger screening can severely affect the operation of an airport. Those who travelled in the United States in the years soon after September 11 will remember the lines at screening points. On the positive side, a result of those inefficient times is a desire by all parties to make the security systems more efficient. To design a more efficient system, the International Air Transport Association (IATA) and the Airports Council International (ACI) have joined in the Smart Security project. According to IATA and ACI, “Smart Security envisions a continuous journey from curb to airside, where passengers proceed through security with minimal inconvenience, where security resources are allocated based on risk and where airport facilities can be optimised.” It is a long-term project and the first phase is underway at pilot airports. To date, four airports have signed onto the first phase: London, Schiphol, Doha and Melbourne. So, what is the Smart Security project? Put simply, the first phase is described as integrating new technology, repurposing existing equipment, using known traveller regimes in some countries and networking security systems. After 2017, the project is looking towards the use of better risk assessment methods, greater automation, linking behavioural analysis with known travellers (which is expected to expand across borders) and using technology to monitor


screening point performance and better allocation of resources. Beyond 2020, it is expected that passengers will be able to flow through the screening point without stopping, unless the advanced technology indicates a threat. So, is the project feasible? The first phase is absolutely feasible, but what will happen next? Firstly, do not expect huge changes in the suggested timeframe. That timeframe will, in reality, only allow for the development of an agreed model. By 2017 there will be a variation of the model at a number of airports, but not widespread adoption. Implementation is likely to be piecemeal; not because there is no desire by airports, but it is simply a factor of history. Before 2001, screening was seen as a necessary evil but, in revenue terms, it was non-productive, so the space allocated was the minimum possible. Given the need for additional room, a full Smart Security model is likely to require a complex redesign of the screening point and possibly the terminal. This is likely to be expensive, so it will need to be integrated into the airport’s master plan. In the short-term, some minor systems may be introduced, such as longer powered conveyors at the front of the point to move passenger items through the process and ‘others’ belts for the movement of trays from the rear to the front of the point. Later, explosive detection systems (EDS) similar to those used in checked baggage screening (CBS) may be integrated into passenger screening points. In

the short-term, these are more likely to be the automated multi-view (MV) X-ray rather than computed tomography (CT) systems, simply because of costs and space. The Smart Security concept talks about remote analysis of the X-ray images. That idea has been around since the 1990s and is feasible, but there were always questions about cost effectiveness. The major advantages are better staff resource management and an improvement in space. Currently, the X-ray monitor position takes up about 1.5 metres to the side of the X-ray; that 1.5 metres becomes important to increase space for things like body scanners or to widen the lane to allow for better passenger flow. However, the space can disappear when the conveyor is modified to quickly and securely remove bags for further examination. Staff management is a more interesting issue; for example, is using a single operator to monitor multiple X-ray machines an option?

While the Smart Security idea of a risk score is good, it should not be noticeable to the passenger or others.

... passenger screening points will finally become part of the airport ‘experience’ rather than an add-on.

If EDS X-ray machines are introduced, a hybrid remote system could be implemented, where the responsibility for explosive detection is removed from the passenger screening point. EDS machines used in CBS automatically detect explosives and if they cannot clear the bag, it is removed from the baggage flow and a remote operator examines the image. Some airports may retain the X-ray monitor at the screening point to look for firearms, sharps and other prohibited items, but will network the EDS X-ray to the existing CBS network. If the machine cannot automatically clear a bag it can be removed from the flow, examined by CBS operators and, if cleared, returned to the passenger. There is scope for body scanners to gradually replace walk-through metal detectors (WTMD) as they become cheaper and more efficient, with more an arch design, where the passenger pauses, rather than a cubicle. Additionally, things like smart gates could be introduced in some airports, especially in Europe and the United States, where passports are checked before the passenger is screened. That requirement is less common in Australia where, generally, screening points are after the passport control. Another noticeable change will be in the aesthetics; passenger screening points will finally become part of the airport ‘experience’ rather than an add-on. While there will be little generational change in passenger screening equipment, the concept that is different in the Smart Security model is risk analysis. In an earlier article, the author expressed reservations about the ‘known traveller’ process and the sharing of intelligence. He thought it would become a bureaucratic nightmare with ever lowering standards or it would be a little club where a few select countries would exchange information. He thought that it would end up being torn apart at the hearings following the next major terrorist incident. Those issues remain, but the

result will more likely be less terrorist-related and more about facilitation for frequent flyers. Using the US Transportation Security Administration (TSA) Pre  as an example, it allows for a quicker transit through the screening point, among other things, by not requiring the removal of belts, shoes, light outer garments or laptops. However, if screening can be achieved without removing belts and so on, why is it not applied generally? All things considered, the Pre  process is relatively benign; there is little difference to the dedicated screening points available to business class or club passengers. Those business class points are not as busy as general screening points so the process is quicker, but the standard is the same and that is the important point. However, some airports have a dedicated VIP terminal and, in reality, there is no screening. Of particular concern is that some countries may consider VIP terminals as ‘known traveller’. This is not an issue provided they are screened to the same standard as the general population. Enhanced screening lanes present human factor issues for screening staff, such as the level of staff vigilance depending on which lane they are working. While the Smart Security idea of a risk score is good, it should not be noticeable to the passenger or others. For example: a passenger at the screening point has an average risk score of 6; his baggage is X-rayed and he goes through the WTMD, which is set at an agreed minimum level. The next passenger has a risk score of 8; he may be directed to a screening point where the WTMD is more sensitive or use the same screening point (but the WTMD automatically becomes more sensitive) or be asked to go through a body scanner. There should be no change to the X-ray process, either the X-ray operates correctly and the operators are vigilant or they are not. The passenger should not know if he is being subjected to enhanced screening, nor should other passengers.

Generational change will hopefully come with the introduction of biometrics and behavioural analysis. Generational change will hopefully come with the introduction of biometrics and behavioural analysis. Not simply at the screening point, but at key points in airports, including the carpark. Automated systems such as voice stress analysers or systems to detect microexpressions could be used to adjust the risk score of a passenger. Similarly, specially trained profiling staff watching CCTV or walking around the terminal could assess passengers and adjust their risk score accordingly. It is hoped that the new systems will lead to a more efficient flow at passenger screening points and a better passenger experience, without lowering standards. Steve Lawson has over 20 years of experience in aviation security. As a Security Executive with Qantas Airways, Steve held a number of senior management roles covering all aspects of aviation security from policy development to airport operations. He was sent to New York immediately following the 9/11 attacks to manage the Qantas response and undertook a similar role following the 2002 Bali Bombings. On his return to Australia, he was appointed Security Manager Freight for the Qantas Group. Since 2007 he has been a Director of AvSec Consulting in partnership with Bill Dent, a fellow former Qantas Security Exec. Today Avsec Consulting provides consultants from the US, NZ, ME, Israel and Europe. Steve can be contacted on 0404 685 103 or



Q&A Anna Richards

What Happens When A Dispute Arises Between Partners Of A Business – Part 2

Part 1 of this two-part article was published in the previous edition of Security Solutions Magazine. Background By way of a brief background, this article focuses on unlimited or general partnerships. It does not deal with unlimited partnerships or incorporated partnerships. It focuses on the impact of Parliament-made law (legislation) on business relationships which fall into the category of a partnership. Part 1 of this article addressed common areas of dispute which arise in partnerships, along with the default position where partners have not entered into a formal partnership agreement, which arises by application of legislation in each state and territory of Australia. The topics covered by the legislation in Part 1 included: • the type of business arrangements that are covered by the Act • partners acting as agents of the firm/ partnership business • how partners bind the firm • the consequences of admissions made by partners to the firm/partnership business. The second and final part of this article addresses further aspects of the legislation which affect and regulate partnership business relationships, and which are most important in situations where partners have not signed a formal partnership agreement or that such an agreement is inadequate in any way. Unfortunately, due to lack of time and space, the examination of legislation cannot


occur across the whole of Australia. For that reason, both Parts 1 and 2 of this article examine some aspects of the legislation in Victoria only, which is embodied in the Partnership Act 1958 (Victoria) (the Act). The legislation in each state and territory follows similar themes. Advances by Partners The Act provides that where any partner makes a payment or advance for the purpose of the partnership which is beyond the amount of capital which each partner agreed to contribute, then that partner is entitled to interest at seven percent per annum on that amount from the date of the payment or advance. For example, Partners 1, 2, 3 and 4 all agreed to contribute an initial capital amount of $10,000 to start the business, making a total capital amount of $40,000 on 1 January 2012. However, on 1 January 2013, it became apparent that the firm needed to spend another $20,000 on equipment and wages to continue the operation of the business, but only Partner 4 had the funds to advance that amount to the firm. Assuming that Partner 4 advanced those funds to the partnership on 1 January 2013 and the funds are repaid to him on 1 January 2015 by the firm, then Partner 4 would be entitled to interest at seven percent per annum on that amount in addition to repayment of it. Expulsion of a Partner Whilst partners can generally decide matters by way of a majority of them, the Act provides that they cannot decide to expel a partner

from the partnership, unless that power is specifically provided for by express agreement between all of the partners. Private Profits The Act provides that if a partner obtains a benefit from any transaction concerning the partnership or from the use of any of the partnership property, he must disclose that benefit to the other partners and account to them for it. For example, if Partner 1 rents a vehicle owned by the business to a third party over the weekend, he must account for the profits to the partnership. This applies even where a partner has died before the partnership has been wound up. For instance, in such a situation, the estate of the deceased partner would be entitled to the partner’s percentage share of the profits. Duty not to Compete The Act provides that if a partner engages in any business of the same nature as and which competes with the business conducted by the partnership, then he must account for and pay to the firm all profits of that competing business. When does a Partnership Finish Where there is no agreement to the contrary, the Act provides that a partnership is dissolved: • upon the death of a partner • upon a partner becoming bankrupt • at the option of the other partners, where a partner charges his share of the partnership property for his separate debt


Q&A • if entered into for a fixed term, at the expiration of that term • if entered into for a single adventure or undertaking, at the termination of that event • if entered into for an undefined time, by any partner giving notice to the other partners of his intention to dissolve the partnership – in this case, the partnership is deemed to end on

• •

persistently committed a breach of the partnership agreement or to have conducted himself in such a way as t o make it not reasonably practicable for the other partners to carry on the business with him the business can only be carried on at a loss it is just and equitable in the view of the court.

One of the most important aspects of the Act is its protection of the profits of outgoing partners where there has been no formal agreement.

the date of dissolution stated in the notice, or, if none is stated, on the date that the notice is communicated to the other partners. Even if the partners entered into an agreement to the contrary, the Act also provides that a partnership is dissolved upon the occurrence of any event which renders the business of the firm unlawful. Also, a court can make an order dissolving partnerships where: • a partner is found to be mentally ill • a partner is found to be permanently incapable of performing his part of the partnership contract • a partner is found to be guilty of conduct which is calculated to prejudicially affect the carrying on of the business • a partner is found to have willfully or

Share of Profits after the End of Partnership One of the most important aspects of the Act is its protection of the profits of outgoing partners where there has been no formal agreement on how the partner is to exit or what he is to be paid for his share of the business conducted by the partnership. The Act provides that where any member of a firm has died or ceased to be a partner and the surviving or continuing partners continue to carry on the business of the firm (with its capital or assets) without any final settlement of accounts as between the firm and the estate of the deceased partner or the outgoing partner, then that estate or person is entitled to such share of the profits of the business from the date of dissolution of the partnership as the court may find to be attributable to the use of his share of the partnership assets or to interest at the rate of seven percent per

annum on the amount of his share of the partnership assets. Further, the Act provides that if there is an agreement permitting the continuing partners to purchase the share of the outgoing or deceased partner, but they fail to comply with that arrangement, that the partners are liable to the outgoing or deceased partner as set out above. Ideal Situation Ideally, when two or more people decide to engage in a joint enterprise, they should: • discuss all conceivable areas which may lead to dispute and come to an agreement on how to deal with such situations if they arise, and • consult a lawyer to provide advice and to draft a formal partnership agreement to set out mechanisms for dealing with such matters. Anna Richards is the Legal Director and a lawyer from Victorian Legal Solutions Pty Ltd and practices in the areas of Commercial law including Commercial litigation and other areas. Anna Richards and Victorian Legal Solutions can be contacted on (03) 9872 4381 or 0419 229 142. Whilst every effort has been taken to ensure its accuracy, the information contained in this article is intended to be used as a general guide only and should not be interpreted to take as being specific advice, legal or otherwise. The reader should seek professional advice from a suitably qualified practitioner before relying upon any of the information contained herein. This article and the opinions contained in it represent the opinions of the author and do not necessarily represent the views or opinions of Interactive Media Solutions Pty Ltd or any advertiser or other contributor to Security Solutions Magazine.



Security Networks: When Electronic And IT Security Collide By Rachell DeLuca Until the reasonably recent past, electronic security systems existed in stand-alone environments, often utilising expensive proprietary software and hardware, and being operated and maintained by specialist professionals. Systems such as CCTV and intrusion detection and access control were completely independent from other networks that operated within a business, building or facility, and were made up of analogue devices that utilised coaxial, multi-core or other type of traditional cable to connect to independent workstations, usually located together within a central ‘control’ room. Such systems required specialist training to operate, service and maintain, which was typically provided by security professionals at a premium rate. The progressive emergence of new generation, Internet Protocol (IP) based electronic security systems over the past 15 or so years has been welcomed eagerly by both the security industry and its customers due to the numerous functionality increases provided by the technology. These systems have quickly become the new industry standard, providing more cost-effective and comprehensive solutions that are able to be integrated with other systems like never before. CCTV in particular has experienced a revolution with the introduction of IP connectivity, requiring less planning and co-ordination of rack locations, cable runs, power and uninterrupted power supply (UPS) management, monitor placement and numbers, cooling and space management to facilitate a new system installation than of the analogue variety. IP CCTV systems utilise IT network equipment and can be designed using basic IT network design and planning strategies. The system cameras likewise are no longer reliant on independent power sources and now use a Power over Ethernet (PoE) solution, which reduces cable requirements by providing power and data communication via the same cable. These cameras feed into a standard network switch, which passes the data to specialist CCTV recording equipment and a monitoring terminal, hardware which typically can be shared with other electronic security systems such as access control and intrusion detection. Mercifully, older analogue cameras are able to be integrated into an IP network easily by using encoding devices to convert the analogue signal to IP and back again as required, although such cameras will still have independent power requirements.

Access control and intrusion detection systems have enjoyed less of an IP revolution than CCTV and more of a gradual shift toward the new protocol. Most commonly used systems communicate from the control panel, either wall or rack mounted, to the control terminal via IP, but still have devices such as readers and detectors connected using traditional cable. Readers and door controllers in these types of installations do provide twoway communications; however, they use multicore and shielded cable to provide both power and data functionality. IP connectivity from the control panels allows these systems to interface to dedicated management software that allows operators greater control and functionality for control activities, as well as greater reporting and analytical capabilities for management review. Often, more than one system will integrate to the security management system (SMS) software, including CCTV, making the entire security control function more simplistic and providing greater control. As many of the hardware manufacturers in the industry use different technologies to create their products, this integration between brands is achieved through interfaces – small software applications that pass the control of equipment to the SMS at either low level (read only), or high level (read, write and control). The benefits of IP security systems are many and vary from the client, installer and end-user perspective. For end-users, the benefit is a centralised security command centre that is simplistic to use, offers a graphical user interface environment and


provides the operator with greater control. For example, an operator using an IP-integrated security management console would be able to receive notification of an alarm, check the CCTV cameras located at the alarm event location, make a decision on how to action that alarm based upon the CCTV output and take the chosen action – all from the same console or workstation, without needing to switch from stand-alone system to stand-alone system and use different usernames and login information to authenticate to numerous systems to action a single alarm event. Another impressive benefit to the customer is the reporting capabilities offered by a centralised software management application that can provide budget and return- on-inve stment analysis, which is an asset to any system, as well as analysis of alarm event history and system effectiveness. Similarly, there are cost savings in IP connectivity in using nonproprietary network equipment instead of having to purchase all system equipment from the security hardware manufacturer. Switches, routers, workstation terminals and other network equipment can be purchased from numerous vendors at competitive prices, with only the specialised security equipment needing to be purchased directly from the manufacturer or supplier. Likewise, the maintenance and configuration of the standard network equipment used can often be performed by internal IT personnel, rather than relying on the security provider, again providing cost benefit to an organisation. Such advances and changes within the security industry have brought about some challenges in addition to the benefits provided. With systems that now essentially are IT networks, there has been a steep learning curve for physical security technical personnel who supply, install, configure and maintain the equipment. The installation of analogue cameras, for example, was largely a plug and go arrangement, similar to connecting a VCR to a TV in a home environment. Now there are IP addresses, bandwidth considerations, network

access control and a heavy reliance on a customer’s IT system administrator to facilitate the installation and provide the access and configuration information necessary for the installation to take place. For many technical personnel this has meant considerable retraining and adjustment to perform works they were once specialised in. The necessary level of knowledge for the new breed of IP systems far exceeds the standard specification of basic security electronics and now reaches deep into the realm of network infrastructure and data systems. Collaboration with a customer’s IT administrator is now essential in ensuring a system functions in the manner intended and has been correctly configured for the best possible outcome. To properly facilitate this, co-operation between company management, senior technical personnel and the security supplier is essential through the design, development and implementation phases of the security installation. Finally, one consideration of networked security systems that must be planned for is the decision of whether to physically locate the security network on a facility’s existing IT infrastructure, or to completely segregate it as a separate network. Each option has possible repercussions and must be assessed with consideration to functionality, cost and the security requirements of the customer. Hosting the security systems on an enterprise network will greatly impact upon bandwidth availability, particularly for systems incorporating large CCTV systems. Consideration must be given to the bandwidth requirements for enterprise applications in such instances to ensure that there will be enough to facilitate sharing the network resources. Hard drive and physical storage too must be taken into consideration to ensure that both enterprise critical data and CCTV footage is able to be stored and accessed for the nominated time period required; often 30 days minimum for the recording time from each camera that forms part of the system. This would be in addition to typical company data

For end-users, the benefit is a centralised security command centre that is simplistic to use, offers a graphical user interface environment and provides the operator with greater control.


storage requirements, such as for database, customer detail and product development requirements, including data with timesensitive specifications such as financial, human resources and other such information. The accessibility and restriction of access to the integrated security system content, both internal and external to the network, must be planned for, in addition to how to best protect and safeguard this information. This would include from internal and otherwise authorised company personnel, but also from external and malicious sources. Sharing of a physical network in theory exposes the security system and the records it creates to the same IT security risks faced by the network as a whole. A network attacker may discover more than they had anticipated if they successfully breached the network and could access security system history, footage and other information, in addition to their original target. For this very reason, the security risk profile and specifications of the facility being protected must always be adhered to, as higher security applications simply will not allow security networks to share physical network equipment as a means of eliminating the risk of unauthorised access to the critical information that it contains. With proper planning, including the early engagement of relevant management and IT representatives, it is now possible to create integrated security networks that offer customers greater benefits and ease of use than ever before. Customers and end-users are embracing the new breed of systems and the benefits they offer, which are increasingly providing the industry with new technological advancements. Ten years ago the use of mobile phones to view CCTV footage was unheard of but, due to developments in both electronic security systems and mobile phone technology, it is now a reality. As future technologies are developed, the relationship between electronic security and IT will surely continue to further integrate. Rachell DeLuca is a senior security professional located in Melbourne, Australia. She has over 16 years’ experience in the security industry and has been involved in projects utilising a huge range of analogue, IP and hybrid technologies. For more information, Rachell can be contacted via email at rachell-deluca@




Security in the Transport/Logistics Industry



By Ray Mancini This article examines issues around security in the transport industry. It does not provide all-encompassing solutions to the problems, but it does provide what are, in the author’s opinion, simple, cost-effective and achievable solutions that focus on the five key topics. If utilised wisely, these solutions could provide companies with an opportunity to not only protect their brand, but also possibly generate increased revenues. Organised Crime Organised crime is increasingly found in industries where there is traditionally little awareness of, or exposure to, organised crime activities, where gaps in regulations can be exploited and/or where the penalties for crime are not sufficient to deter criminal behaviour. The transport industry presents opportunities for this exploitation by organised crime (Australian Crime Commission, 2007). From the author’s own experience, organised crime members have been able to infiltrate companies as an owner-operator contractor or as a contract truck driver. One transport company employed a contract truck company to transport their freight locally; however, this company’s owner had strong links to an organised crime syndicate and employed members from his group. Importantly, the fact that there is no dedicated national law enforcement unit targeting or combating organised theft of freight within Australia, especially involving organised crime gangs, has permitted these crime syndicates to flourish. Previously, a joint venture by Australian Federal Police (AFP), customs and various state law enforcement agencies created the RAFT project (Reduce Aviation Freight Theft), which introduced a multi-agency approach to investigating aviation theft. However, this project was abandoned in most states and the intelligence was handled by AFP in Canberra. (To the author’s knowledge, Queensland is the only state that still maintains the RAFT project that involves security employees from transport companies). The RAFT project was conceptually a positive move by the law enforcement agencies; however, it was hamstrung as it only targeted aviation


freight and not necessarily road freight as well. While it is acknowledged that many state’s law enforcement services do have a ‘gang crime squad’ to investigate the activities of organised crime gangs, many crimes perpetrated within the transport/logistic industries are often not reported or are overlooked by the police due to the crimes themselves being a lower priority, or there being a lack of avenues of inquiry. The Transported Asset Protection Association (TAPA) is a unique forum that unites global manufacturers, logistics providers, freight carriers, law enforcement agencies and other stakeholders with the common aim of reducing losses from international supply chains (TAPA). According to the European Union, the theft of high-value, high-risk products moving in supply chains in Europe costs business in excess of 8.2 billion Euro a year. The threat from organised criminals is increasing and becoming more violent (TAPA). Recommendations: • Re-create and implement the RAFT project, including the Joint Aviation Investigation Team (JAIT), on both a national and state level, involving both road and aviation transport companies and the respective security companies. • Provide continual security awareness training for employees and security personnel to reduce apathy displayed by employees and managers in the respective transport companies. • Provide TAPA training to staff and adopt TAPA’s minimum security standards; undertake regular auditing of security by a qualified TAPA auditor or security personnel trained in TAPA certification standards. Terrorism Transport companies have transformed into transnational companies, providing international freight services across the globe. As such, dramatic increases have occurred in the demand for express service delivery of international freight using aviation services, including both freighter and passenger aircraft. This increased demand increases the risks of terrorist activities within this area.

For example, in 2010, two separate items of freight (printer cartridges) were determined to contain improvised explosive devices (IEDs). These items had already been loaded onto two separate freighter aircraft in the United Kingdom for flights into the United States. One can only imagine what might have happened if these two IEDs exploded over heavily populated areas; it could have replicated the disaster over Lockerbie, Scotland, in 1988. According to the Australian Government, transport systems continue to be attractive targets for terrorists seeking to inflict mass casualties, economic damage, instill fear and create spectacular media imagery. Whilst the transport industry already has measures in place, such as screening and security checks, to reduce the risks of IEDs and other explosives or chemicals being loaded onto aircraft, criminals and terrorists continue to improvise methods to circumvent detection strategies. These incidents have caused a growing awareness in the industry for improved security. Many governments have made it mandatory for improved freight screening and security procedures to prevent breaches. Transport security encompasses aviation, air cargo supply chains, maritime and mass passenger transport systems such as road and rail. The Office of Transport Security (OTS) is responsible for regulating and monitoring transport and air cargo security on behalf of the Australian Government and for administering an intelligence-led, risk-based preventative security regime. OTS works with the aviation and maritime industry to achieve sustainable and proportional preventative security measures that are commensurate with the nature and level of the terrorist threat. Supply chain security for air cargo is regulated in Australia under the Aviation Transport Security Act 2004 and Aviation Transport Security Regulations 2005. It is administered under the Regulated Air Cargo Agent (RACA) and Accredited Air Cargo Agent (AACA) schemes. The RACA scheme regulates air cargo security for a range of industry participants through the preparation, implementation and compliance of a transport

EasyGate an award winning range of speedgates DDA Compliant Secure – up to 1800mm high barriers Stylish – European design and manufacture Reliable – 24 month warranty & 3,000,000 MTBF Fast – Throughput rates of up to 60 people per minute

With 14 years’ experience delivering entrance control solutions and 5 offices across Australia & New Zealand Centaman is here to help you make the right entrance

T: 1300 858 840 E:

MASTER LOCKSMITHS Master Locksmith Association members are highly trained, fully qualified security professionals with access to the very latest in restricted key systems, from mechanical keys and locks to the world-leading electronic master key systems.

Find your nearest locksmith and MLA member at












security program, compiled by the respective transport companies and the regulated shipper scheme, that includes: • cargo terminal operators at airports • express post services • freight forwarders (including express freight companies) • regular international postal services. All freight for international destinations via the aviation industry is processed according to the ‘unknown shipper process.’ However, due to time constraints, lack of knowledge or lack of communication, this process is often neglected, increasing the odds and risks that an unlawful item or substance could be loaded onto an aircraft. It is interesting to note that, in Australia, surface (road) transport security arrangements are under state and territory jurisdiction, with OTS working to co-ordinate the dissemination of best practice information on security measures. Implementation of preventative security measures is the responsibility of owners and operators of the individual transport companies. Recommendations: • Provide training/information for transport operators and employees in relation to RACA and security awareness for the security of their freight. • Provide updated and continual training for security and transport employees (company or contract) in the areas of transport/logistics and aviation security requirements, including RACA and other regulatory or convention requirements, including the ‘unknown shipper process’. • Use suitably trained and qualified security guards to provide professional and quality guarding services within the transport/logistics industry.


Theft of freight Criminals use employees to gain intelligence or provide information as to which transport company is transporting the various brands or products of high-value electronic freight (for example Apple, Panasonic and JVC electronic items) and to gain information on the company’s weaknesses and areas of opportunity in order to plan and commit offences. Offences could be committed across various states (causing jurisdictional issues with law enforcement agencies) and/or whilst the freight is in transit (difficult to track and delays the discovery of the crime). For example, highvalue freight is often targeted on the Sydney to Perth tour as it is a three-day transit tour, thereby delaying the discovery of the crime and reducing the possibility of apprehending the perpetrators. Many employees in the transport industry are low income earners, which increases the risk of these employees providing information, stealing freight or providing accessibility for criminals to access freight, in order for the employee to supplement their low wages through bribes or ‘pay offs’. It is a fact of life that the majority of the workforce will struggle to survive with the wages that they earn. In more cases today, many people live in excess of their earnings, which is powered by their yearnings to have more. This causes frustrations with their working life and conditions, which can be reflected onto their attitude towards their employer. (Mann and AlKhadha)

Importantly, the fact that there is no dedicated national law enforcement unit targeting or combating organised theft of freight within Australia... has permitted these crime syndicates to flourish.

The employee’s desire to have a better life and possess more expensive items is created by what Mann and Al-Khadha suggest as marketing efforts to stimulate evermore wants for evermore consumer goods. New products can be presented as compensations for the general powerlessness, frustration, insecurity, domination and struggle of the majority of the population. Here is another major source of duress for many people – the duress of thwarted desires, along with envy and resentment of those who apparently have everything while doing nothing to deserve it. This stress is then reflected by the employee’s attitude towards their employer or business. One of these attitudes is called rationalised action. Rationalised action can be described with the example that an employee who steals an item rationalises his actions with the fact that the company is making millions but not looking after its workers. Additionally, many workers in the transport industry are transient, temporary labour hire employees who have no allegiance to the company and are hired because no one else has a desire to complete a four-hour split shift between 2am and 10am or 3pm and 9pm. As such, the risks of theft and damage due to poor handling skills and lack of training is increased tenfold, especially since the turnover of staff is significant and the continual training of these personnel is a large cost burden to the parent company. Many large transport/express companies have implemented ‘up-to-date’ technology to allow customers to track their consignment over the Internet and to provide internal ‘visibility’ of a specific consignment or item. However, those companies recognise that many employees do not scan the freight for a variety of reasons, including laziness, lack of time or so that the item itself can be stolen. Even those companies that conform to the TAPA convention security standards still suffer losses through theft or compliance failures when employees do not comply with policies or procedures. Many incidents lack the appropriate security investigation to uncover the root cause so that procedures or strategies can be implemented to reduce the incident or risk of the specific failure occurring in the future.



Recommendations: • Provide training on a continual basis for all employees and contractors to maintain their knowledge of scanners, scanning disciplines and scanning compliance requirements. • Provide adequate and frequent training of freight handlers to handle the freight in a correct manner to reduce the risks of damage or injury to the freight handler. • Provide adequate training of security personnel who are involved in the handling, securing, sorting, scanning and loading of high-risk freight or freight classed under an ‘enhanced security program’ requirement. • Provide appropriate training to security personnel/transport staff to enable the thorough conduct of factual investigations and subsequent root cause analysis. • Ensure security personnel / transport employees have the knowledge to conduct security audits and risk analyses so as to reduce the risks of theft or shrinkage. Transport Companies Transport companies operate under increasing financial challenges caused by the world’s markets, including fuel prices. Various natural disasters, such as the Iceland volcano eruptions, can bring air traffic to a standstill and cost companies millions of dollars. The profit margins for transport companies are not large. Therefore, freight is moved as rapidly as possible to ensure the highest level of profit and, more importantly, repeat business from a satisfied customer. However, it is this rapid handling of freight that causes process failures to occur. Efficiency versus expedience is always an issue with the movement of freight and a headache to security personnel tasked to investigate missing freight, as expedience will always be put first. Further, the lack of customer service units and/or appropriate security personnel, coupled with the lack of appropriate training, can delay the early detection of lost or stolen freight, which in turn increases the time taken to locate the freight. Recommendations: • Provide appropriate training to employees to equip them with the knowledge and tools needed to conduct inquiries to locate freight or to report freight missing as soon as possible.


Freight is moved as rapidly as possible to ensure the highest level of profit... However, it is this rapid handling of freight that causes process failures to occur. • Provide accessible training tools and workshops, which are cost-effective and do not waste either the employee’s or employer’s time. Security Companies With the various security issues experienced across the world and with new challenges being faced every day, numerous security firms have been formed to meet the growing demand for private security as law enforcement agencies are battling to cope with increases in demand for their services. Many security companies offer security guarding services within Australia and, in a competitive market, attempt to underquote their competitors to win the contract. As a result, these security companies have to reduce their costs, which may include staff wages/conditions and training. This results in the supply of undertrained and unwilling security guards. The supply of a security guard who is tasked to watch a CCTV system and sit at a guard hut to provide access control to a depot is no longer acceptable or viable. Security personnel now and in the future need to be fully trained in a variety of areas (for example, to investigate losses, understand and use complex electronic surveillance equipment, have knowledge of the transport/logistics industry), be able to multitask and have a willingness to conduct other transport-related duties such as pallet counts, refuelling vehicles, audits and so on to assist in providing cost effectiveness to the transport industry. A cheaper service does not always equate to a cost-effective solution. There are security companies that attempt to run with small margins and supply a blanket of security

guards at a cheaper rate. Many of these security employees are not paid according to the specific awards and are not trained to an appropriate level. There are, however, competent security companies in the market who are passionate about the security industry and maintain their longevity within the security industry through the provision of a quality security service, which is reflected by their employees. Recommendations: • Source security companies who provide the appropriate level of security services associated or aligned with a registered training organisation and who have transport industry trained/experienced guards to provide the requisite guarding requirements for transport companies. • In any hire or tender process, transport companies are encouraged to request references from other transport companies and investigate the incumbent security company to ascertain other evidence of what specialist transport/logistics security services they have provided in the past. Conclusion The transport/logistics industry is rapidly evolving and transforming due to many factors, including costs, increasing demand for movement of high-value freight and global security risks. With these changes, the industry must embrace the appropriate high level of security to ensure that their assets, employees and customers’ freight are protected to minimise risks from theft and losses. The old cliché that security is a cost that cannot be retrieved is a thing of the past. The more savvy transport companies now utilise security services and protection of freight as a selling tool to customers in order to win their business or to increase their bottom line. Ray Mancini is an internationally known trainer and professional security consultant. He is the CEO of SIG GROUP International Limited, which has been providing security services to the transport industry for the past nine years, with clients such as Star Track, Toll Group, Australian Air Express, Centurion Transport, TNT and the US Navy.

Do You Know This Person?

This person has made a difference to someone’s life. It may be that he or she, through an act of courage or valour, has stepped in harm’s way so that someone else may be safe. It may be that he or she has put in tireless hours, made great personal sacrifices and dedicated a career to making the security industry a better place. Please, help us find and reward this person. Nominations are now open for the 2016 Australian Security Medals. Whether you are nominating a medal recipient, making a donation to the Foundation or booking seat (or table) at the industry’s premier charitable event, you will be helping to create a more professional security industry of which we can all be proud. For more information about making a nomination or providing sponsorship, please visit the Australian Security Medals Foundation website today! 093



Managing An Active Shooter Emergency By Greg Muir Heightened alerts for terrorist activity have prompted many to review their response procedures for armed intrusion, particularly after the Lindt Café Siege in Sydney’s Martin Place in December 2014. There had been a number of mass shootings committed in Australia prior to the introduction of national gun laws by the Howard Government in 1996. Of particular interest to security and property managers are the Queen Street Massacre (1987), Strathfield Plaza Massacre (1991) and Port Arthur Massacre (1996). Each shooting incident was over in less than 15 minutes. The Port Arthur spree involved multiple locations, with 20 of the 35 victims killed within two minutes at a café and gift shop. Although the change in gun laws has limited access to the types of weapons used, it is still imperative that building management and security are prepared. The Australia Post building at 191 Queen Street, Melbourne was the scene of the December 1987 murders. A rampage by 22-year-old Frank Vitkovic in his attempt to shoot a former friend and anyone else was fortunately restricted by a faulty M1 Carbine. He still managed to kill eight people and wound five others before plunging from an 11th floor window to his death. The Strathfield Massacre occurred on Saturday 17th August 1991 at Strathfield Plaza and is considered one of Australia’s worst and most violent crimes. Within a ten-minute period, 33-year-old Wade Frankum, armed with an AK-47 rifle, knife and machete, killed seven people and seriously injured six other people before turning the gun on himself (Jones, 2011). On Sunday, 28th April 1996, the name Martin Bryant was infamously etched into Australian history. His murderous onslaught at the Broad Arrow Café and surrounds of Port Arthur resulted in the death of 35 people and 23 injured. His initial shooting spree lasted 15 seconds, with 17 shots fired, 12 people dead and 10 injured. The sequence of events into the wanton killing of so many people is too much to describe here. His arrest after setting fire to the Seascape Bed and Breakfast ended the carnage. What is the profile of a mass shooter? Usually, a white male, 20 to 30 years old, isolated by choice, with feelings of insignificance, who usually commits the crime for revenge (Pappas, 2012). Vitkovic, Frankum and Bryant all had psychological issues. Frank Vitkovic would have been certified as insane if he had been referred to a psychiatrist instead of a Scientology course. Frankum was diagnosed

with depression after the death of his father and suicide by his mother. His diary showed a decline from loneliness to murderous intent. Bryant was intellectually moderate with an IQ in the mid-60s and bordering on schizophrenia. His behaviour deteriorated markedly following the deaths of his carers – his father and a female mentor. Is there anything that can be learned from each incident? It is impossible to predict when they might occur. Security and building management must rely on others for early identification and intervention to prevent such events. However, they must be prepared for when the system fails. The following examines the security that exists in most modern buildings. CCTV is a great crime deterrent and evidentiary tool for investigators. Clear signage and overt cameras identify the presence of a security conscious building management. The presence of CCTV may be a prerequisite for the killer, the chance to record their notoriety. Bryant set up a video camera on a café table prior to commencing his murderous spree. The mass shooter has moved from a feeling of insignificance to chasing his own 15 minutes of fame (Nuwer, 2014). Access control is a much more effective tool. Having restricted access minimises the risk of intrusion and maximises the safety and security of occupants. If the systems and procedures are not maintained, there is a risk that control measures will fail. Level 12 of Queen Street was a secure area with a security entry door and bullet-resistant viewing panel on the adjacent wall. Material stored on a desk in front of the panel prevented anyone from using it. One Australia Post employee was shot by Vitkovic when he opened the door after the killer knocked or rang the bell. He was fortunate to survive after being shot three times, but three others were less fortunate, all killed in that area. Security procedures must be maintained to ensure the integrity of the system. This, of course, includes a rigorous training and induction program to make sure that all occupants are aware of those procedures. Public and common areas are at greatest risk. Both Frankum and Bryant had either coffee or a meal in the cafés prior to their respective rampage. Frankum’s stony-faced presence and his constant looks at two nearby teenage girls (one of whom became his first victim) may have indicated some of the mental torment that was occurring. Bryant was noticed talking to himself rather than anybody in particular, referring to the presence of wasps in the area. Irregular behaviour was displayed by



Security and building management must rely on others for early identification and intervention to prevent such events. However, they must be prepared for when the system fails. both, but certainly not enough to predict their eventual actions. Vigilance is another strategy that should be employed in security management. To be vigilant means to be keenly alert to or heedful of trouble or danger, while others are sleeping or unsuspicious (Collins Dictionary, 2015). Vigilance requires awareness – communication and coaching are important aspects of ‘whole of occupancy’ participation in preparedness. Preparedness is not only about prevention, it is also about response. To have an effective response there must be an emergency management plan. Particular attention should be given to the following steps (Talbot & Jakeman, 2008): • review existing plans and procedures • seek and gain support from upper management • assign facilities or jurisdictions • identify resources • conduct a business vulnerability analysis • develop emergency management team. AS3745 Planning for emergencies in facilities provides a structure that should be used to develop the plan. The Australian Standard is the recommended model for compliance with work health and safety regulations in any workplace. The actions for Civil Disorder/ Armed Invasion provide a simplistic response, without referencing the presence of an active shooter. The standard provides for an emergency planning committee and emergency control organisation, with mandatory display of


emergency procedures and occupant training. Compliance will ensure that there is a structured response to an armed person (identified as code black in AS3745). The following should assist in the preparedness for any active shooter event: • an emergency control organisation (wardens) trained in code black responses • a sound system for emergency purposes (emergency management intercommunication system [EWIS], building occupant warning system [BOWS]) • manual call points (break glass fire alarms) • evacuation diagrams showing the location of emergency exits and alternate routes • the existence of safe rooms. To encapsulate a managed preparedness to such an event, management should incorporate security and risk management initiatives and processes into emergency management. This requires the following program (developed from My Skills, Department of Education and Training, Maintain security awareness and vigilance in the aviation workplace): Maintain awareness of security measures and security risks – security policies and procedures are in place, security roles and responsibilities are clearly identified and current, occupants are aware of their role in the process, and security management is reviewed on a regular basis, particularly after any incident. Maintain security vigilance – potential security risks (public and common areas) are monitored during occupancy and effective communication skills are used to reinforce security vigilance amongst occupants. Recognise and assess potential security risks – one size does not fit all and in this case any planning would require a security risk assessment to identify security risks and security control measures. It is recommended that an independent consultant be used to develop this assessment. Respond to potential security risks – developing a team approach for security in building management makes sure that everyone ‘is on the same page’ and able to work as a cohesive unit during any crisis. Communication and involvement in the planning and implementation stage ensures a fluid response. Report potential security risks – as with any work health and safety management


2 3 4


system there has to be a reporting procedure to identify any potential fail-points in the security system and/or procedure. That reporting process should be prompt, easy to use, informative and with provision for timely action. Responding to an active shooter (US Department of Homeland Security) – there are three options to be adopted by any building occupant during an active shooter event: • Run. Have an escape route planned, evacuate even if others refuse to follow, leave belongings, help others and keep hands visible when heading to responders. • Hide. Find somewhere out of the shooter’s view, lock and barricade the door, silence mobile phones, turn off any noise, hide behind large items, remain quiet. • Fight. As a last resort and only when in imminent danger attempt to disrupt or incapacitate the shooter by acting as aggressively as possible, throwing items, yelling and committing to actions. The last option saved numerous lives in the Queen Street Massacre, with two people subduing Vitkovic and removing his weapon. Although he had already fired 50 rounds, he still had another 150 in his pockets. Key elements of a good security system are procedures, communication, participation and awareness, vigilance, review and continuous improvement. How does this relate to the Lindt Café Siege? It shows that no matter how prepared security and building management can be, sometimes it is impossible to predict human behaviour. It is only possible to make sure that there are systems and procedures in place to minimise the damage. The possibility of any terrorist attack should be included in every emergency management plan, incorporating security and risk management principles.


Greg Muir had 32 years as a police officer before starting his company in 2006. He provides risk management services for facilities, specialising in emergency management, work health and safety, security consultancy and workplace training. For a full list of references, email:

insights into security and property related Powerful insights into security and property related hat occurmatters in and around the in work that occur andplace. around the work place.

the solution of choice for organisations SIMTRACK™ is the solution of choice for organisations track security related incidents across all to manage and track security related incidents across all in a structuredbusiness and unified environment. sectors in a structured and unified environment.

te mobile and tablet support, SIMTRACK™ Built with complete mobile and tablet support, SIMTRACK™ o be reported as they happen, where they allows incidents to be reported as they happen, where they happen.

hts to trends, Intelligent incidents insights hotspots,toserial trends, incidents hotspots, serial more emergeoffenders through powerful and moreinbuilt emerge through powerful inbuilt g. Businesses can mitigate risks effectively real-time reporting. Businesses can mitigate risks effectively plementation ofwith preventative measures. strategic implementation of preventative measures.

alia ics

l l

l Full data l l Hosted Secured facilitiesin Australia encryption Secured facilities l Securely l l Incident Forensics Web based Hosted Web based

l l

Full data encryption Securely Hosted

ncident hotspots, track hotspots, track ‘Locate incident enders and identify trendsand identify trends serial offenders merge with powerful in with powerful in as they emerge time reporting.’ built real-time reporting.’ Visit us at:


Visit us at: STAND H42



“providing your business with“providing solutions toyour do business” ™ business with solutions to do business”™ 3 Dimensional Consulting 211A Swan Street Richmond Melbourne Victoria Founded Australia, 3121 1999

Australia: 3 Dimensional Consulting1300 881 711 Australia: International: +61 3 8844 7550 International: 211A Swan Street RichmondE-mail: Melbourne E-mail: Web: Victoria Australia, 3121 Web:

1300 881 711 +61 3 8844 7550




Next-Generation Security Products Steal The Show At 30th Annual Security Exhibition & Conference



Leading security product and service suppliers including Avigilon, Ness Corporation and Inner Range, used the 2015 Security Exhibition & Conference as a platform to launch or preview new products to a captive audience of more than 4,500 industry professionals. Held at Melbourne Convention & Exhibition Centre from Wednesday July 15 to Friday July 17, the 30th annual edition of the event hosted over 240 brands from 140 exhibiting companies. Ness Corporation, a manufacturer and wholesaler of Australian designed electronic security equipment, launched its new Mezzo home automation panel, which also took out this year’s Best New Product Award. The Mezzo combines Z-Wave and IP technologies to handle multiple functions in one wireless unit, including automation, energy management, intercom, security and CCTV. The Security Best New Products Awards were judged by a panel of leading security experts including the National Security Director of Thales Australia & New Zealand, Jason Brown. Mr Brown said, “This product is more than just a security application. It can change the way you manage your world - the engineering, quality and usability is exceptional.” Avigilon, a designer and manufacturer of video surveillance software and equipment, received second place for its new 7K 30MP HD Pro Camera, which was seen for the first time at Security 2015. Third place went to LEDA Security Products, a leader in mechanical perimeter security and vehicular access control products, for its Advertising Boom Gate. Other products and solutions unveiled to the Australian market on the Security show floor included: – a new web-based security and access control solution by Inner Range, which is slated for launch in early 2016 – a unique lock cylinder system that removes the need for extensive access control cabling throughout facilities – an access control system that allows you to give anyone with the app access to a facility or room through online software. Other highlights at this year’s event included a session with ViDi Labs Director and author of the industry renowned books ‘CCTV - From


Pixels To Light ’, Vlado Damjanovski, who presented to a packed room on day one of the three-day Security Seminar Series for installers and integrators. Mr Damjanovski spoke about what is beyond high-definition technology 4K and what is next in the pipeline – the 8K. This year’s two-day ASIAL Conference for security managers also hosted an enviable line-up of local and international thought leaders. Australian Joint Intelligence Committee Chair, Dan Tehan MP, used his keynote speech at the conference to express the importance of industry and community banding together to combat online extremism. Other keynote speakers included University of Chicago Professor, Daniel Diermeier, and Crisis Management International CEO, Bruce Blyth. Security 2015 Event Manager, Alanna Phillips, said the event was a resounding success with more than 80 per cent of exhibitors already committing to the 2016 Melbourne event. “In a year when we celebrated the evolution of the security industry over the past 30 years, it was exciting to see so many new products on the show floor that demonstrated the kind of technological innovation the security industry is known for,” Ms Phillips said. “The calibre of the brands participating and professionalism of visitors through the door in 2015 are no doubt key reasons why we’ve had so many exhibitors already resign for 2016.” Ms Phillips said the Security Exhibition & Conference would return to the Melbourne Convention & Exhibition Centre in 2016 from Wednesday July 20 to Friday July 22. Subscribe to receive news, updates and offers at



31 August – 2 September 2015 National Convention Centre Canberra Welcome to the 27th annual Security in Government (SIG) conference, considered the premier government protective security conference and exhibition in Australia.

the sig conference provides a valuable opportunity for public and private sector protective security professionals to further develop their knowledge of current and emerging policies, products and technologies in the protective security space. the conference also offers an ideal forum to network and exchange ideas on protective security issues. the theme for the sig 2015 conference is, Security risk management – getting it right! the program will consider the evolution of security risk management in recent years, focusing on case studies, best practice and current and emerging issues which impact on getting security risk management right.

to register visit 102 SECURITY SOLUTIONS

Attached to the sig conference is the extensive trade exhibition, showcasing the latest developments and innovations in protective security products, technology and training applications.

The Attorney-General’s Department would like to thank the following companies for their commitment and support of the SIG 2015 conference:

Confirmed exhiBitorS p r i n C i pA l S p o n S o r

mAjor SponSorS


ConferenCe SupporterS

C o m pA n y


3 Dimensional Consulting - SIMTRACK


AMS Australia Pty Ltd


Australian Lock Company

82, 83

Axis Communications


Central Security Distribution

42, 69

Chubb Electronic Security

63, 64

CIT Solutions Pty Ltd


Class Locksmiths




Document Dynamix Australia




FSH Fire and Security Hardware Pty Ltd


Geutebrück Pacific

117, 118, 119, 120

GK Solutions Pty Ltd



28. 29


33, 34

Integrated Control Technology

87, 88

ISACA Canberra


Jakeman Business Solutions


Kaba Australia Pty Ltd


Kobra Shredders Australia Pty Ltd


L3 Communications Pty Ltd


Leda Security Products Pty Ltd

38, 39

Locksmith Nominees Pty Ltd


Magnetic Automation Pty Ltd


Mega Fortris Australia


Multidoors Pty Ltd


National Surveillance and Intelligence


Orion Integration


Protective Security Training College


QinetiQ Australia


Rittal Pty Ltd


SAAB Australia Pty Ltd

4, 5

Secure Edge Technologies Pty Ltd


Security 1 Pty Ltd


Security Solutions Magazine


Star Track



65, 66

Thinking Space Systems


Zone Products




ConferenCe progrAm T u e s d ay 1 s e p T e m b e r National Convention Centre, Canberra 9.00am-9.05am

Introduction by conference chair Katherine Jones, Attorney-General’s Department


Opening and welcome address Senator the Hon George Brandis QC, Attorney-General


Australia’s current security & intelligence operating environment Duncan Lewis AO DSC CSC, Australian Security Intelligence Organisation


International keynote address: The Washington Navy Yard shootings and changes to personnel security arrangements


Managing personnel security risk Chris Moraitis PSM, Attorney-General’s Department


Managing risks at a nuclear facility Paul Jones, Australian Nuclear Science & Technology Organisation


Panel: The cyber security review – managing cyber risk Sandra Ragg, Department of the Prime Minister and Cabinet David Campbell, CERT Australia David McLean, Australian Federal Police


Managing risk in a changing work force James Raymer, Australian National University


Panel: Risk appetite – what is your agency’s tolerance? Mark Jarratt, Norman Disney & Young David Crossley, Sydney Opera House Mitch Levy, Department of Human Services


SIG 2015 conference dinner - Parliament House Keynote dinner speaker: The Hon Dr Brendan Nelson BMBS FRACP (Hon) FAMA Australian War Memorial


31 August – 2 September 2015

National Convention Centre Canberra

ConferenCe progrAm W e d n e s d ay 2 s e p T e m b e r National Convention Centre, Canberra 7.45am-8.45am

Industry breakfast workshop: sponsored by SNP Security The innovation and technology partnership of SNP and TSM


Personnel security risk assessment: an international insight


The PGPA Act – Stage 2 – Accountability and risk based business processes and systems Robert Antich, Department of Finance CyBer SeCurity

governAnCe, perSonnel SeCurity & phySiCAl SeCurity


Protecting the critical infrastructure of the United States in the digital age: The role of government, industry, and the audit community Theresa M Grafenstine, CISA CGEIT CRISC, US House of Representatives and ISACA International Vice President Ron Ross, National Institute of Standards and Technology

Understanding your risk environment Carl Gibson, La Trobe University


Managing the risk posed by targeted cyber intrusions Joe Franzi, Australian Signals Directorate

The NZ Protective Security Requirements – managing contract risk


Industry lunch workshop: sponsored by QinetiQ Australia Major incident capability assurance CyBer SeCurity

governAnCe, perSonnel SeCurity implementing guidAnCe & phySiCAl SeCurity on riSk mAnAgement


The banking sector’s live fire exercise – lessons learnt

Risk management on a global scale


Managing the risk of cyber security threats and trends

Assessing the impact and Security standards and consequence of risk professionalism in the industry Mark Stewart, The University of Newcastle


Social media and human factors security risk Rod Cowan, Independent Writer and Director


Closing address by conference chair Carolyn Patteson, Attorney-General’s Department

Training to mitigate risk

All endeavours will be made to present the conference program as detailed. The conference committee and the conference organisers reserve the right to alter without prior notice, any arrangements, timetables, plans or other items relating to the conference, for any cause beyond its reasonable control. The committee and organisers are not liable for any loss or inconvenience caused as a result of such alteration.


SUBSCRIBE Security Solutions Magazine, Level 1, 34 Joseph St, Blackburn, Victoria 3130 | Tel: 1300 300 552

I wish to subscribe for:

oONLY $62 per annum!

Name: ............................................................................Company: ....................................................................................... Position: .........................................................................Address: ......................................................................................... Suburb:...........................................................................State: ................................. Postcode:............................................. Tel:..................................................................................Email: ................................................................. ........................... TERMS AND CONDITIONS For more information on subscriptions, or to contact Interactive Media Solutions, please phone 1300 300 552 or email to Deductions will be made from your nominated credit card every year in advance of delivery. The direct debit request and subscription price may be changed by Interactive Media Solutions from time to time, however you will always be given at least 28 days notice. The authority to debit your account every year remains valid until you notify Interactive Media Solutions to cancel your subscription by contacting Interactive Media Solutions Customer Service. No refund is given after a payment is made. In the event of a cancellation of your subscription, the subscription will simply expire twelve months from when the last subscription payment was made. Information on how we handle your personal information is explained in our Privacy Policy Statement.

Credit Card oBankcard





Card Number: ........................................................................................................................................................................ Exp: _ _ / _ _ Card Name: .................................................................................................................................................................................................................... Signature: ....................................................................................................................................................................................................................... When payment has been received and funds cleared, this document serves as a Tax Invoice. Interactive Media Solutions ABN 56 606 919 463. If this document is to be used for tax purposes, please retain a copy for your records.

Security Solutions Magazine now available on your iPad.


Subscribe to Security Solutions Magazine for

ONLY $62 per annum!

Simply fill in the form or call 1300 300 552




108 Profiles


114 Spotlights


116 Product Showcases


108 109 110 111 112 113


Tosibox Dorma Magnetic Automation BeAware World Reach Madison Technology

Q Security

116 116 116

ActivConsole ELITE D Series UniGuard 12 Salto XS4 Mini


Bride of ISIS



118 Shop Talk VinTech DORMA Beaware AST EZI FLIR


are in his or her own contro




Introducing TOSIBOX In a connected world, easy access to your information is vital. However, easy access and high security don’t usually go hand-in-hand. That has changed thanks to Finnish company Tosibox Oy. After enjoying great success in Europe over the last few years, Tosibox Australia has taken up the reigns and is set to launch this unique new product in Australia. For quite some time now, various forms of VPNs (Virtual Private Networks) have been the main source of secure remote access. However, traditional VPNs present users with a number of issues. To begin with, creating a VPN requires a detailed understanding of network security issues as well as careful installation and setup to ensure security. Furthermore, the effectiveness of a VPN

rests on the competence of the IT professional installing and managing it. Your security is only effective as that person’s level of service and knowledge. What’s more, a VPN, and the person installing and managing it, must also be able to overcome any cross platform compatibility issues. In short, for all but the most technically proficient business’s, VPNs have been as much of a burden as they have been a saving grace - until now. Tosibox is described as the first configure-less plug-and-go, multi-factor, physical VPN connection appliance based on the concept of ‘key and lock’.


Designed and made in Finland, Tosibox Australia describes it as the easiest VPN solution on the market, claiming it is by far the easiest to connect, to secure, to use and to scale. What’s more, Tosibox does not trap users into monthly fees (there simply are none), and does not create further hardware or software problems that need to be solved. It is, quite simply, just plug it in. Furthermore, Tosibox is extremely versatile. While it is aimed at small to medium sized businesses, it can offer larger enterprises bank-level security and enterprise grade scalability. Of course, anyone who knows anything about IT security would view such a device with a degree of skepticism. Can it really be that easy? It is really that secure? How does it work?

Tosibox-Ad-SSM90.indd 94

works simply and reliably from any computer in the world. The key can also be synchronized to your mobile device making this a truly mobile solution to your access needs. Once connected to a computer with an internet connection, the key will “find” every lock it is serialized to and establish the connection (making it ideal for the M2M market). This is a highly encrypted “military-grade” connection between the Key and the Lock. Easy and reliable, the connection is truly cross platform allowing you total control over your network and who can access it. Sensitive Data does not need to be exposed to any outside terminals, servers or software to be accessed and utilized. The use of keys and locks means that Tosibox is easy to scale to any requirements. Think of it like electronic security lego, just add locks and keys as your needs grow or to cover multiple sites. In fact, Tammermatic, a global distributor of carwash systems, has enjoyed a 90% drop in deployment and downtime since implementing Tosibox. All this adds up to Tosibox being the safest way to both work remotely and protect your network access.

Let us begin by explaining the ease with which Tosibox can be used. Tosibox allows anyone with even a basic understanding of computers, to achieve in minutes what normally takes IT professionals hours or days. It truly is plug and go, not the usual ‘plug and play’ or ‘plug and pray’ as is so often the case. Accessing your network securely from anywhere in the world has never been easier.

Why Tosibox? Because it is easy to use, easy to scale, it provides a very high level of encryption, has a low initial cost and no ongoing fees. These are just some of the reasons one might deploy Tosibox. However, if that is not enough, here is another reason. Tosibox is not just a secure remote access device, it is also a network access control device. Once installed, you, as the network owner, have complete control over who has access, as you now need a key to unlock the network. These keys can be granted limited user rights allowing even greater control over who can get to your data. Business’s are now liable for their data and it’s protection. Why place your liability in the hands of someone else, with Tosibox you are in control.

How does it work? Being a hardware solution, Tosibox places a physical lock on your network which you then need your key to access. This key

According to Tosibox Australia, taking the easiest option to secure your network access is now also the best. You can see more at

Unless otherwise expressly stated, the review of the product or products appearing in this section represent the opinions of the relevant advertiser and do not represent the views or opinions of Interactive Media Solutions or the other advertisers or contributors to this publication.




Seeking Champion Service – DORMA, The Automatic Door Experts DORMA are global leaders in automatic sliding, swing and revolving door operators. For over four decades, DORMA has been manufacturing market-leading sliding door operators at our plant in Hallam, Victoria, for supply to projects nationally. When you choose DORMA, you are not only selecting an exceptional product, you are buying peace of mind knowing that you are supported by Australia’s largest nationwide network of accredited and fully trained, specialist automatic door technicians and agents, 24 hours a day, 7 days a week. Our specialised service includes DORMA’s comprehensive range of door operators, door closers, industrial doors and movable walls, with our expertise extending to all models. When you call DORMA Service you will speak to someone who knows the products and who can offer expert advice. Public safety and security are our paramount concern and this is reflected in our prompt response times – making DORMA the unrivalled industry leader in service support. Why the Necessity Door operators and wall systems are complex pieces of equipment that are subject to punishing wear and tear. A regular maintenance program ensures that wearing components are replaced or a malfunction is addressed before it becomes a problem. Regular maintenance helps prevent accidents, prolongs the life of the product and ensures the safety of users while reducing breakdowns and the accompanying inconvenience. Australian standard AS5007 Powered Doors for Pedestrian Access and Egress, clause 5.1.3, states that it is the obligation of the owner to ensure their automatic entrance undergoes service and maintenance at intervals no longer than four

months. Automatic doors can cycle open and close hundreds of times every day, so part of routine maintenance must also include the checking of activation and safety sensors. Prevention is Better than Cure Well-maintained DORMA products can provide safe and efficient use for over 20 years and are vital to the smooth operation of any business. Consider the risks of inefficiently operating doors and operable wall systems – reduced security, increased downtime, productivity loss, customer complaints, acoustic reduction and soaring airconditioning and heating costs. National Service Network With over 40 years’ experience in the door service

industry, DORMA is committed to ongoing specialist training for our technicians and service agents. DORMA employs over 140 service technicians throughout Australia and New Zealand, and is supported by an accredited service agent network. This ensures nationwide coverage and expertise across an extensive product portfolio. Being close to our customers and understanding each individual situation is imperative to our business success. With a dedicated in-house training program, national coverage and efficient response times, it is hard to go past DORMA products and service.

For more information, visit or phone 1800 675 411.



Magnetic Automation


Protecting People & Assets Through Proven Solutions for Security & Safety Effective perimeter security is about more than gates and turnstiles. Like everything in life, effective perimeter security is a balancing act in which one must seek the right blend of design, price, quality and service. Being the cheapest most certainly does not make something look the best, just like being the most expensive is not always a guarantee that one will receive great service. It is the ability to balance all four, design, quality, price and service which sets true industry leaders apart from the competition. It is for this reason that Magnetic Automation has been a leader in the perimeter security industry in Australia for more than 30 years offering locally manufactured products that are designed, engineered, and installed in accordance with international standards. Magnetic is also certified to ISO9001, ISO14001 and OHS18001. The Magnetic product range includes every kind of product one might need from barriers and boom gates, to automated slide and swing security gates, turnstiles and other pedestrian access control technologies – all of which can be custom tailored to a client’s specific needs. With extensive experience in commercial and industrial environments, Magnetic Automation has installed a wide range of solutions across a diverse range of industries including mining, rail, corporate buildings, industrial sites, government installations, critical infrastructure projects and defence sites. In fact, the depth and breadth of their work stands as testament to their service, quality and reliability. Within government environments, Magnetic Automation offers a variety of high security products enhanced through the addition of value adding features and services. The full height turnstile is fully risk assessed, IP65 rated, solar powered (optional), a can be constructed using A portable plynth (optional) in addition to being constructed using Australian RHS galvanised hot dipped steel


(stainless steel option available). Their Road Blocker has been installed in various correctional facilities and can be customised to meet individual site requirements. The Magnetic Telescopic gate provides a high level of security for vehicle access where restricted gate run off areas are found. In fact, there are numerous examples of Magnetic’s gates which have been installed gates in various high security government locations. Furthermore, Magnetic's Pedestrian High Door speed gate offers a stylish and robust security solution which can be integrated with existing and/or new access control systems. Whatever the situation, Magnetic Automation can provide a total solution for individual needs, incorporating complete traffic control systems for both vehicles and pedestrians. All Magnetic products are supported by a comprehensive, preventative maintenance, service and spare parts programs.

Magnetic Automation is part of the global FAAC Group – a world leader in access control and automation since 1965. To ensure the highest levels of service and support, Magnetic Automation maintains a presence in every state, with a Head Office in Tullamarine, Victoria and branches in Western Australia, Queensland and New South Wales. In this way, you can be assured that whether you require a consultation, service technician, installation or just have a question, a Magnetic Automation staff member is only ever a phone call away. Why not turn to a name you can rely on and trust the next time you need someone to provide proven solutions for security and safety to help protect your people and assets. Contact Magnetic Automation 1300 364 864 or visit

Unless otherwise expressly stated, the review of the product or products appearing in this section represent the opinions of the relevant advertiser and do not represent the views or opinions of Interactive Media Solutions or the other advertisers or contributors to this publication.




Your One-Stop Shop For Risk Management

SECURITY AUDITS & TRAINING WHS AUDITS DIAGRAMS & EMERGENCY PROCEDURES Beaware Solutions was incorporated in May 2006. Our company was developed to provide services to manage risks within any organisation or building. We concentrate primarily on security, WHS and emergency management. Our consultants have tertiary qualifications and experience in any or all of the following fields: • • • • •

Security and Risk Management Work Health and Safety Workplace training and assessment Emergency Management Public Safety


SCAN HERE 1300 71 81 31 Security in government is a very broad subject, but limited in application. The presence of physical and structural measures, enhanced by procedural preparedness, may cloud bigger issues associated with maintaining integrity and protection of intellectual property. Concentration on security risk is, in itself, a recipe for failure. It is imperative that managers incorporate security into a ‘whole-of-risk’ approach – information technology, access control and human resources management, surveillance, awareness, emergency response (particularly to armed intruder and bomb/chemical, biological or radiological [CBR] threat), and work health and safety issues. After all, the aim is to provide not only a secure environment but also a safe one. Beaware Solutions has a wealth of experience to satisfy the needs of the risk manager. They provide different levels of response to the needs of clients, from gap analysis to project management. A review of existing measures and procedures can develop a security management plan aligned with a work health and safety management system and emergency procedures. Beaware consultants are former or serving members of the defence force, police, fire and rescue, and WorkCover. Previous projects have been completed for Department of Foreign Affairs and Trade, NSW Public Works, Family and Community Services, and local government, as well as health and education facilities. Other clients include Stockland, Richard Crookes, Mirvac, Lend Lease, Parramatta Stadium, University of NSW, Uniting Care, Baptist Care, Wesley Mission, Abbotsleigh College, and Open Colleges. The founder and principal of the group, Greg Muir, is a former NSW police inspector with 32 years’ operational experience and 10 years as company managing director. During his police career, Greg was a member of the Central Sydney Operations Group, involved in risk management for

major event planning. He was also responsible for the Duty Officer Deployment Model, introducing new work practices and increasing accountability at senior management levels. He also conducted an inquiry into the background of the 2005 Macquarie Fields Riots, identifying issues that could impact on the response capability of a large government organisation. He was earmarked for promotion to higher rank as a member of the Leadership Development Program prior to early retirement caused by injury in 2005. Greg started Beaware Solutions in 2006 after recognising a lack of service providers capable of being a one-stop shop for risk management. He could see the opportunity for clients to have access to a group of field specialists all working under the one banner; one provider for security assessments, work health and safety audits and emergency management plans and diagrams. This access also afforded the client a cost-effective risk management plan, minimising cost in time and money associated with tendering for different services. Since 2006, Greg has enhanced the skills attained during his extensive policing career

with qualifications in public safety, work health and safety, security and risk management, and workplace training and assessment. His broad and comprehensive knowledge of these fields has led him to document procedures in all risk areas. One recent example involved assessing security measures within a particular government department, developing response procedures for a facility and providing training in those procedures. The whole project incorporated changed work practice, security awareness, preparedness and response as well as safety issues (WorkCover became involved at the request of the workers’ federation) and emergency procedures (armed intruder and bomb/CBR threat). As mentioned, a broad knowledge provides a whole-of-risk approach. Beaware Solutions has insurance cover in public/product liability and professional integrity, licences and qualifications to satisfy government requirements. Beaware Solutions – your one-stop shop for risk management. Visit for more information.

NSW Security Master Licence 410196472



World Reach RFID


Architect Series Every now and again, things come along that completely transform our world view, creating new benchmarks and challenging our well-worn concepts. With its new Architect concept, S.A. of France has created the perfect blend of high security and scalability by developing the first modular range of secure readers that offer both flexibility and simplicity. By optimising the design of their readers, STid have developed a common radio frequency identification (RFID) core that can be connected to a set of additional modules, such as a keyboard, biometrics or a touch screen. The new Architect range, distributed in Australia by World Reach RFID, is unlike anything else currently on the market. As the first modular range of access control readers designed specifically to offer users maximum flexibility, the Architect range enables users to create their own scalable configuration. Intuitive and dynamic, the Architect range is made up of smart, easy-to-connect modules. The concept can be tailored to suit individual needs, offering an optimum solution for any situation and enabling all the functionalities and security levels to be upgraded across all readers. Users can literally build an access control system that can grow with the needs and requirements of their business, offering increased security, greater return on investment and a longer life cycle. STid is the first RFID manufacturer to have received First Level Security Certification (Certification de Sécurité de Premier Niveau CSPN is awarded by the French Network and Information Security Agency). This certification stands as testament to the company’s unique knowhow and technological and security expertise. Architect readers use the latest contactless chip technologies with new data security mechanisms and are compatible with all approved public encryption algorithms such as TDES, AES, RSA, HMAC-SHA-2 and so on.


Additionally, an innovative accelerometer-based tamper protection system means the reader can respond with precision to a threat, giving users the opportunity to delete the authentication codes. It is the reliability of the technology behind the Architect range that helps to ensure that, unlike many other technologies and systems on the market, the system cannot be outsmarted. Ensure Secure Migration The multi-technology Architect range makes it easy to manage extensions, upgrades and technology migrations. Readers are compatible with leading market standards ISO14443 A & 3B and ISO18092. They support simultaneous reading of all chips in the NXP Mifare family: Ultralight, Classic (1kB and 4kB), Ultralight C, Mifare Plus (S and X, 2kB and 4kB), DESFire and DESFire EV1. Readers in the Architect range can also be reprogrammed on-site to upgrade to future technological options. Vandal Proof – Standing the Test of Time The robust design and reinforced polycarbonate casing make the readers rugged enough for both indoor and outdoor use. The whole range (excluding connectors) is rated IP65 for its capability to withstand the most hostile climates and environment (watertight against water jets, fully dust-tight). Furthermore, the RFID readers and keypad are highly vandal proof (shockproof, flameproof and the like).

STid offers a range of customisation options to tailor readers to a user’s corporate image and integrate it fully in its installation environment. Options include a virtually unlimited range of LED colour combinations, the inclusion of corporate logos on the reader housing, a choice of colours and materials for covers and so on. World Reach RFID and STid World Reach RFID was established in January 2014, in partnership with STid, as a division of World Reach Ltd. Since its beginnings in 1996, STid has become a leading European RFID designer, developer and manufacturer of RFID readers and tags focused on the asset tracking/ asset management space and access control/ security for personnel and vehicles. Due to their innovative design, STid products enable World Reach RFID to excel in the delivery of technology migration solutions using hybrid readers and cards, and also for their long-range UHF products for vehicle, asset and people identification. Visit for more information on the Architect range.

Customise Aesthetics In addition to their technological innovation, reliability, flexibility and robust design, the Architect range of readers complement the aesthetics of any building thanks to their elegant and immediately recognisable design.

Unless otherwise expressly stated, the review of the product or products appearing in this section represent the opinions of the relevant advertiser and do not represent the views or opinions of Interactive Media Solutions or the other advertisers or contributors to this publication.


Madison Technologies


Make Madison’s Rapid Deployment Security Camera part of your surveillance strategy Madison Technologies recently released a new Rapid Deployment Camera (RDC) solution with integrated communications (Wi-Fi and 3G/4G) and backup battery. As industry interest surges, we take a closer look at the capabilities of this device. Now in its third iteration, the Madison RDC3 has been designed as a monitoring solution for use in areas where mains power is not available, or where camera monitoring is only temporarily required. With its unique lightweight construction, and flexible camera mounting (supporting any PoE camera) the RDC is the most innovative rapid deployment system on the market. Madison’s Industrial IT&C General Manager Lee Papadimitrious shares how and why the RDC is generating early interest as a solution for various applications. Easily deployable, making it perfect for major event security. The RDC has received great interest from security services providers who administer crowd control and risk management to major sporting and music events. One of the main challenges faced, is installing a surveillance system that fits the event’s unique and temporary requirements as well as meeting the latest connectivity needs, all within budget. And this is where the Madison RDC really comes into its own. Lee Papadimitrious explains, “The RDC3 can be deployed in about 5 mins. With the ability to remotely activate the unit, the RDC remains dormant conserving battery levels until it’s required. Once activated, the RDC provides a live video stream back to a central control centre for monitoring and/or storage.” “Security teams go to great lengths installing purpose built surveillance trailers. The RDC solution offers true rapid deployment, small footprint and numerous communications interfaces” he said.

Improving public safety and reducing crime. The RDC device is already popular amongst Local Councils looking to improve public safety and reduce traffic, graffiti and vandalism crimes. One council has already deployed RDC units in a suburban location notorious for car hooning. “The Council is able to remotely monitor the area and record offenders, catching them in the act” Lee Papadimitrious said. In this application, the RDC automatically notifies the relevant administrator via SMS and email so that immediate action can be taken. The RDC has successfully assisted police and Local Council prosecute offenders, with fines in excess of $20,000 being issued. Reducing jobsite theft. Another area where RDC interest is growing, is with construction project integrators looking to implement inexpensive jobsite surveillance. As well as being able to monitor site efficiency and observe coming and goings, the key objective of jobsite surveillance is to reduce theft, break-ins and vandalism. “Losing equipment at night on jobsites is becoming an expensive exercise for builders and civil contractors” Lee Papadimitrious explained.

“By using the RDC, you not only get a visual indication of what’s happening, you also have the capability to activate a voice message to speak to the intruders – offering advanced indication that an alert has been raised” he said. The RDC can be moved from site to site with minimal fuss and when used with the optional solar interface, can be deployed for extended periods of time. To learn more about customising an RDC for your surveillance requirements, call 1800 72 79 79, email or visit

RDC3 integrated Wi-Fi support offers local viewing and configuration whilst the 3G/4G capabilities for remote viewing ensures that access to the RDC3 can be achieved virtually anywhere.



Introducing the new FLIR IP Range The new range of IP cameras and NVR’s from FLIR marks an exciting step forward in the world of CCTV. High quality cameras and recorders from a trusted and established industry name at an affordable price, supported by a state-of-theart Cloud based content management system are not the sorts of things that come to market every day. To mark the launch of the new range and the announcement that Q Security Systems has been appointed as the Australian distributor for the FLIR IP range, we thought we would take a quick look and see what all the noise was about.

FLIR DNR400 and 500 Series

FLIR’s new DNR400 and 500 Series NVRs further accelerate high definition recording, offering higher capacity processing for realtime recording with cameras up to 5MP. The 400 series features the 408 and the 416. The 408, is an 8 channel NVR boasting 200 Mbps (Megabytes per second) processing and 8 POE ports, while the 416 is a 16 channel NVR boasting 400 Mbps and 8 POE ports. The 500 range features the 516, a 16 channel NVR with 400 Mbps processing and 16 POE


ports and the 532, which is the top-of-the-line 32 channel NVR features 800 Mbps processing and 16 POE ports. No programming or configuration is necessary as the NVR automatically discovers FLIR IP Cameras on the network. Plus, drive mirroring enables back-up recordings to the second internal hard disk drive to keep data secure. The DNR400 Series NVRs offer real-time recording in Full HD on each channel while also providing pentaplex operation enabling users to simultaneously view, record, playback, backup and remotely monitor cameras. The DNR400 Series NVRs also support 2x SATA HDDs up to 4TB (8TB total), enabling users to mirror information between the two internal hard drives while backing up to external

drives via the 2 in-built USB 2.0 ports. However, perhaps the greatest feature of the new DNR400 series is the inclusion of the FLIR Cloud, an easy-to-use, cloud-enabled service that provides remote viewing and control of multiple cameras from various locations via iOS, Android, PC or Mac devices. No complex router configuration is required making video monitoring easier than ever before. Setting up remote viewing is achieved in three easy steps: install the free FLIR Cloud app, scan the QR

code on the NVR and then view live video. Users can even set up multisite viewing on FLIR Cloud CMS for PC / Mac.

FLIR 2.1MP Fixed Mini Dome IP Camera

The FLIR Fixed Dome IP cameras offer exceptional HD picture quality in real time (25fps). All models provide outstanding night vision with a True Day/Night IR Cut Filter plus IR illumination. Installation is made easy with a PoE power option allowing for simplified cabling. The cameras are built rugged, suitable for both indoor and outdoor installations (IP66 rated) and cold climates (minimum operating temperature -30°C). Conveniently view live or recorded video remotely via the new FLIR Cloud’s CMS and advanced mobile apps. The new range of FLIR Dome IP cameras offer a wide range of advanced features including HD picture quality at real time (resolution varies by model), a 3.6mm wide angle lens, IR Night

Unless otherwise expressly stated, the review of the product or products appearing in this section represent the opinions of the relevant advertiser and do not represent the views or opinions of Interactive Media Solutions or the other advertisers or contributors to this publication.

sites, commercial offices and campuses The most accurate motion utilizing the most technologically detection camera available. advanced HD IP camera. Thermal mini-Bulle T Camer a • Reduce false alarms with more

Q Security

reliable motion detection • Most affordable intrusion detection and video alarm verification system • Easy integration – PoE/12VDC, IP/ MPX(HDCVI)/analog, ONVIF

Find out more at Images shown are for illustrative purposes only, and may not have been taken by the camera depicted. ©2015 FLIR Systems, Inc.

Asia Pacific Headquarte HONG KONG FLIR Systems Co. Ltd. Room 1613 -16, Tower 2, Grand Central Plaza, No. 138 Shatin Rural Com Shatin, New Territories, Tel : +852 2792 8955 Fax : +852 2792 8952 Email :


TCXSecurityProducts_APAC_210x275.indd 1

Vision/TDN (True Day, Night), Onvif Profile S conformance and dual-streaming in both H.264 and MJPEG, all backed by a 3 year warranty.

FLIR’s HD 30X PTZ IP Speed Dome

FLIR Micro Pan Tilt Camera

Available in 2.1MP configuration, the FLIR HD Micro PT IP camera offer the most compact pan/ tilt viewing solution at outstanding value. With a miniature and discreet form factor at 2.2 inches or 57mm height and 5.1 inches or 130mm diameter, the Micro PT packs impressive performance with HD picture quality, Onvif Profile S conformance, Edge storage, a built-in microphone, plus a rugged IK10 & IP66 vandal and weatherproof housing. These amazingly compact HD Micro Pan Tilt IP cameras provide a180 degree pan range and can tilt between 2 to 90 degrees Tilt, with a super fast 100 degree per second rotation speed and 25 configurable presets making camera tours a breeze. The cameras also feature a powerful 3x Digital Zoom and supports MicroSD cards up to 64GB (max) for edge recording. Installation is a breeze thanks to the use of a quick clip-on mounting bracket and PoE plus support.

FLIR’s new HD 30X PTZ IP Speed Dome sets a new standard in high performance IP with outstanding HD clarity at long range. The powerful 30X optical zoom is ideal for clear identification over wide area applications such as parking lots, airport tarmacs, harbor fronts, or highways. DNZ30TL2RP is built to be rugged with a weatherproof enclosure plus ArcticPro technology for harsh climates (minimum operating temperature of -40°F/-40°C). Defog enables the camera to penetrate misty conditions, rendering a clear image so that users can enjoy the full benefits of the camera’s 2.1 MP HD, Sony Exmor™ 1/3” CMOS Progressive Scan image sensor.

Unless otherwise expressly stated, the review of the product or products appearing in this section represent the opinions of the relevant advertiser and do not represent the views or opinions of Interactive Media Solutions or the other advertisers or contributors to this publication.

The DNZ30TL2RP is a true day/night camera featuring in-built IR illuminators capable of projecting up to 150 meters while the camera’s PTZ function facilitates 360° continuous rotation and a 90° tilt range with a high speed 240° per second max Pan Tilt and up to 255 pre-set positions, 5 auto scans, 8 tours and 5 patterns. The DNZ30TL2RP offers dual streaming in both H.264 and MJPEG in 1080p at real-time (25 fps) while also supporting two-way audio and edge recording to a 32GB MicroSD card (card not included). Furthermore, the camera is ONVIF 2.1 compliant (backwards compatible), supports Onvif standard PTZ protocol plus RS485 with selectable PTZ protocols including Pelco P/D. And of course, while the DNZ30TL2RP is compatible with most popular third party VMS software, it also comes standard with FLIR Cloud software and Mobile Apps for iPhone, iPad, Android. For more information visit: or call your local QSS sales branch



THE ELITE D SERIES CONTROL ROOM CONSOLE The Elite D Series from ActivConsole has been developed for environments where both functionality and operator comfort are equally important. Independent dual level electric height adjustment gives you the flexibility to adjust both your working surface and your monitor layout at the touch of a button, helping you achieve your optimum ergonomic working configuration. Capable of remembering up to three different operator height positions and displaying an LED read out of the current height, this console ensures shift changeovers are as smooth as possible. Sporting an enclosed base cabinet, the Elite D series allows for hidden hardware storage with lockable key access for technicians while the interlocking cabinets bolt together for continuous cable management and storage compartments. Able to be customised to any shape using unique interchangeable base cabinet design and in house manufacturing facilities in Australia, the Elite D series can be tailored to suit every environment. Supplied with inbuilt configurable power modules and heavy duty cable management, the Elite D series ensures that all cables and hardware are contained within the base cabinet and all external surfaces are neat and tidy. Australian designed and manufactured, the Elite D series is the most ergonomic and comfortable console ActivConsole has ever produced. For More Information Visit, ActivConsole:

UNIGUARD 12 UniGuard 12 provides a real-time solution for collecting, organizing, and presenting real-time data from your field operations. The UniGuard 12 system can be accessed from any Smartphone, tablet, or computer, eliminating the inherent inefficiencies and exaggerated costs associated with paper-based reporting. From security agencies to facility managers, UniGuard is the solution to streamlining your operations and reducing your overheads. UniGuard 12 provides users with a single secure, central hub for all your field data, employees, clients, reports and more. What’s more, UniGuard 12 can reduce your administrative tasks by eliminating the manual procedures involved with paper based reporting by providing a self-service interface to employees and clients. UniGuard 12 also provides the peace of mind that comes from being able to obtain up-to-the-minute, real-time information on employee status so you know exactly what’s going on out in the field. Furthermore, UniGuard 12 gives you the edge you need to gain new accounts and secure the existing ones with the latest tools and innovations. Through increased accountability, UniGuard 12 can help raise employee performance, directly impacting on liability and motivation which ultimately translates into an increase in professionalism and efficiency providing your organization with a competitive advantage. For more information, visit

SALTO XS4 MINI SALTO Systems latest product breakthrough, the XS4 Mini, is part of a broad initiative of new products that follows SALTO’s concept of developing innovative access control products with state-of-the art technology and an attractive design. XS4 Mini includes all the original SALTO features like SALTO Virtual Network SVN and wireless capability but in a mini size, with mini installation needs and on an updated technology basis. Embedded in the heart of the product is the latest microprocessor technology, ready for the connected world, open and future-proof for online connection, wireless technology and NFC. The XS4 Mini’s compact size combined with a modern LED aesthetic also marks a new design language from SALTO. The market will increasingly see this in the coming months as the XS4 family continues to grow, with a long-plate version, new XS4 readers, cylinders and a control unit following. More advanced than any other electronic lock on the market, XS4 Mini has been designed to cover users security needs today and future needs tomorrow. In addition to supporting the SALTO Virtual Network and SALTO Wireless Network, the XS4 Mini will be compatible with multiple types of RFID technology, including NFC. For more information, visit:


Unless otherwise expressly stated, the review of the product or products appearing in this section represent the opinions of the Editor or relevant editorial staff member assigned to this publication and do not represent the views or opinions of Interactive Media Solutions or the advertisers or other contributors to this publication.

BRIDE OF ISIS: ONE YOUNG WOMAN’S PATH INTO HOMEGROWN TERRORISM Why would a “normal” American teen convert to Islam and then try to join a terrorist organization, and how do terrorists seduce women over the Internet and lure them into traveling thousands of miles to become their wives? These are the questions that Anne Speckhard, Ph.D., internationally respected counter-terrorism expert and Georgetown University Adjunct Associate Professor of Psychiatry and Security Studies asks in her book Bride of ISIS. Based upon a composite of actual cases and inspired by the true story of Shannon Conley, an American teen from Denver, Colorado who converted to Islam, took the niqab, and who ultimately ended up in the clutches of ISIS, Bride of ISIS follows Sophie Lindsay—another “girl next-door” as she is seduced over the Internet. Shannon Conley was arrested in 2014 while trying to board a flight to Turkey with the alleged goal of traveling to Syria to join and marry an ISIS extremist she had met online. Conley believed her Internet mentors that “defensive jihad” was not only permissible, but her duty. She told FBI agents that she believed U.S. military bases; government facilities and personnel; public officials and law enforcement were all legitimate terrorist targets. Trained as a nurse’s aide and in firearms, Conley hoped to either fight jihad in Syria and Iraq, or if prevented from entering a combat role, to assist jihadi fighters. Lured by a romance that she carried out via Skype with an ISIS fighter, Conley was on the road to destruction—until her father turned her in to the FBI. Sophie Lindsay follows a similar path to Shannon Conley’s but in this book we get an inside look at how she enters the terrorist trajectory and moves steadily toward carrying out a terrorist act. Will FBI agent, Cathy Chambers and Homeland Security analyst, Ken Follett sort through all the “wannabe” ISIS and al Qaeda extremists on the Internet to discover who is the true terrorist? And will they be able to stop Sophie in time to save her and the lives of countless others? Could you be living next door to a future bride of ISIS? Bride Of Isis, available through

OMGATE Introducing OmGate: The most advanced control and management application for your gate system. No remote control. No ‘phoning” the gate. Just arrive and enter. OmGate in an innovative, Bluetooth-powered device which is managed by dedicated mobile app for remote opening of electronic gates. Ideal for both residential and commercial gates, the OmGate app can manage up to 20 different gates from the one phone. Not only is the OmGate app free (available on both Android and iOS), it will even work on gates where OmGate has been installed even while you are on the phone. OmGate is compatible with any gate which has an electrical connection and a wireless control such as garage doors, security gates, barrier gates and so on. Installation is quick and easy (for authorized technicians) and does not require complex infrastructure. Once installed, the user simply downloads the free mobile app to begin controlling his or her gates. The system works by enabling the OmGate device to recognize authorized phones via Bluetooth. Upon detecting an authorized phone, the device sends an alert. The user need only tap the alert on his or her phone to open the gate and presto! The gate opens. The app’s intuitive interface enables you to define an administrator for each gate who can then easily and simply authorize multiple additional users to open the gate. The administrator can also add or remove gates from the network or change gate names where necessary. Avaliable through Mainline Security, the OmGate is an innovative step forward in access control. For more information, visit:



Unless otherwise expressly stated, the review of the product or services appearing in this section represent the opinions of the relevant advertiser and do not represent the views or opinions of Interactive Media Solutions or the other advertisers or contributors to this publication.

Codelocks Introduces Compact Digital Keypad Lock For Office Furniture Codelocks recently unveiled the latest edition to its KitLock range of electronic push button locks – the NANO90. The new lock is based on the company’s best selling cabinet lock, but with a much smaller footprint of just 30mm by 90mm. “We’ve primarily designed NANO90 to replace locks, keys and basic mechanical locks supplied with many items of office furniture, such as desk drawers and filing cabinets,” explains Grant Macdonald, managing director of Codelocks. “However, due to its compact size, it’s also ideal for smaller lockers, mail boxes, courier drop boxes and medical cabinets.” “It’s also our first product that can be either flush or surface mounted,” continues Grant. “The increase in popularity of working practices such as hot desking, has resulted in a need for more convenient and secure locking solutions in the office environment. The fact that this lock can sit flush to the surface of a desk or cabinet drawer makes it much harder for someone to break the lock off completely, providing the office worker with somewhere safe to secure belongings while at lunch or in meetings. A flush-fitted NANO90 has a smart, sleek look too.” The NANO90 provides an almost ‘fit and forget’ solution – performing up to 100,000 operations from just one coin-cell battery. The product is available to order in silver grey as standard, and is also available in black and white. It is priced at $60. NANO90 recently debuted at the international office furniture expo in Germany, interzum, and was presented with a ‘High Product Quality’ award for excellence in product design. For more information visit or call +61 2 9882 1009

Hills Signs Up As Master Australian Vivotek Hills has signed a new agreement to be the master Australian distributor of the world’s leading IP surveillance solution brand, VIVOTEK from 1 July 2015. Daniel Lee, Head of Hills CCTV and IT practice welcomed the VIVOTEK range to the Hills stable of camera products and will mark the new alliance with a VIVOTEK showcase at the upcoming ASIAL security show in Melbourne. “We are committed to meeting the diverse range of customer needs which is why we are delighted to bring VIVOTEK to our range. “Hills is proud to be able to offer our customers one of Australia’s biggest ranges of network camera options,” Daniel Lee said. VIVOTEK is pleased to work with Hills as a distributor in the Australian market: “Both Hills and VIVOTEK are committed to deliver innovative, best in class surveillance products to customers. “Hills is a strategically important partner of VIVOTEK. As its expertise in surveillance products and channel management, we believe both companies can benefit from this partnership.” says William Ku, Vice President, VIVOTEK. In addition, HILLS will showcase the industry-leading surveillance solutions of VIVOTEK during Securing Expo, including the Ultra-Megapixel fisheye network camera, FE8391-V; the 5-Megapixel mini fisheye network camera, FE8180; and the world’s first PoE switch with IP surveillance management functions, VivoCam PoE switch.


Unless otherwise expressly stated, the review of the product or services appearing in this section represent the opinions of the relevant advertiser and do not represent the views or opinions of Interactive Media Solutions or the other advertisers or contributors to this publication.


VIVOTEK Launches the CC8130(HS), a New Height-Strip Network Camera for Reliable Facial Recognition VIVOTEK is pleased to announce the recent launch of a new height-strip network camera, the CC8130(HS), featuring 1-Megapixel video resolution at 30 fps, a 180 degree wide-angle lens and heightstrip housing design, allowing the camera to deliver clear images for reliable facial recognition with no dead angles. In addition, the plug-and-play design makes the CC8130(HS) installation both simple and rapid. Combining low-profile and high-level features, the CC8130(HS) is ideal for discreet indoor applications, such as retail, banks, restaurants, small businesses and particularly in cashier areas. The CC8130(HS) opens up new horizons for surveillance users who need a system that blends in, but want images that stand out. “Capturing clear facial images is one of the most critical issues in surveillance. One solution is to mount the camera at eye-level, but this increases the risk of vandalism. VIVOTEK, the professional solution provider, is proud to release the CC8130(HS) with discreet eye-level mounting, allowing capture of clearer facial images than ceiling-mounted cameras, even when subjects wear hats or hoods,” said Tim Su, Director, Marketing Division at VIVOTEK. “Additionally, the CC8130(HS) offers graduated and color-coded height measurements in both U.S. and Metric units to meet the needs of users all over the world.” To dramatically reduce file sizes and conserve valuable network bandwidth, the CC8130(HS) supports the industry-standard H.264 compression technology. Combined with the ST7501 multi-lingual 32-channel recording software, users can quickly and easily set up an IP surveillance system that’s simple to operate but hard to beat. For more information about VIVOTEK and its comprehensive product line, please visit

Panasonic Releases new IP network Security Cameras Full-featured cameras are easy to install and deploy in a variety of locations Panasonic Australia recently announced its new network-friendly 5 Series security cameras. Suited for both indoor and outdoor applications, the 5 Series provides outstanding images and wide dynamic range performance, incorporating Enhanced Super Dynamic capabilities for clear and easy identification in high contrast scenes and backlight situations. The new 5 Series Network Cameras include the WV-SFV531 Outdoor Vandal Resistant Dome, the WV-SFR531 Indoor Vandal Resistant Dome, the WV-SFN531 Indoor Dome and the WV-SPN531 Indoor Fixed. Robert Wensing, Group Manager, Security, Panasonic Australia, said: “The new 5 Series dome cameras deliver great performance and a dramatically reduced cost of ownership. They offer high sensitivity and provide clear images in low lighting conditions. With Full HD 1080p resolution at up to 60 frames per second, they are capable of capturing rapidly moving objects from bills in banking environments to vehicle licence plates on the road, or moving chips and cards in casinos.” “All of our fixed network cameras are designed to withstand harsh conditions both outdoor and indoor which make them highly durable and reliable. They are very network-friendly, with technologies that save bandwidth, maintain quality and allow quick review of footage.” Panasonic’s new 5 Series Dome and Fixed Network cameras also provide advanced features such as 133dB Enhanced Super Dynamic Range, and day/night functionality with a built-in removable infrared (IR) cut filter. The 5 Series uses Panasonic’s latest image sensor technology combined with Multi-process Noise Reduction (MNR), resulting in high sensitivity of 0.07 lux in colour images, and the ability to deliver clear images with minimum ambient light. The 5 Series conserves network bandwidth by sending out multiple H.264 and JPEG streams, sized appropriately for each device requirement (monitors, recorders, mobile applications). Higher H.264 compression algorithms included in the powerful UniPhier® Shadow Compression Engine LSI processors save network bandwidth and recorder disk space while maintaining high image quality. Finally, supporting four transmission modes of constant bitrate, frame rate, best effort and advanced VBR, the new 5 Series cameras enable a flexible and effective network design for any application. For local storage options, the 5 Series cameras come equipped with an SDXC memory card slot for on-board recording. The cameras are available now from Panasonic Security distributors and resellers. For more information visit or call 132 600.



Unless otherwise expressly stated, the review of the product or services appearing in this section represent the opinions of the relevant advertiser and do not represent the views or opinions of Interactive Media Solutions or the other advertisers or contributors to this publication.

Saab delivers Security System for Auckland South Corrections Facility in New Zealand Defence and Security company Saab, has delivered an integrated electronic security system for the new men’s prison at Wiri, South Auckland in New Zealand.

Auckland South Corrections Facility, Wiri, South Auckland in New Zealand

The Auckland South Corrections Facility, also known as Kohuora, is one of the most modern corrections facilities in the world and will house up to 960 male prisoners. The security system supports an innovative approach to prisoner management with prisoners progressing within the facility as they come closer to their release date. SecureFuture was contracted by the New Zealand Department of Corrections to design, finance, build, operate and maintain the new facility, which opened in May 2015. SecureFuture has Fletcher Construction as primary sub-contractor for the design and construction phase of the prison, which contracted Saab for the provision of the state of the art OneView integrated security system. OneView is a next generation Physical Security Information Management system providing customers with unprecedented levels of security subsystem integration for mission critical infrastructure. “OneView provides prison staff with a very simple and intuitive user interface in the security control room that allows the efficient management of routine activities and enables quick analysis and response to situations as they arise. Saab’s experience in project management, quality, complex engineering and partnerships with local companies, including our New Zealand partner Advanced Security, maintains our reputation for performance as part of a major construction program,” says Dean Rosenfield, Managing Director of Saab New Zealand. The successful completion of the security system by Saab follows on from the previous successful delivery of the security system at Southern Queensland Correctional Centre facility in 2011 and the continuing rollout of the OneView system into defence bases and facilities in Australia over the past two years under the Defence Base Security Improvement Program.

For further information, please contact: Saab Press Centre, +46 (0)734 180 018,


The future of digital video The future of digital video Thesurveillance future of digital video is here. surveillance is here. surveillance is here. Get the surveillance storage portfolio Get surveillance storage portfolio thatthe protects your customers’ data. Get the surveillance storage portfolio that protects your customers’ data. that protects your customers’ data.

Surveillance HDD Surveillance Surveillance HDD HDD Surveillance-optimised for system with high camera and drive counts to improve Surveillance-optimised for system with both recording and playback performance Surveillance-optimised for system with high camera and drive counts to improve and data reliability. Ideal for DVR, NVR high recording camera and drive countsperformance to improve both and playback and Video Management Systems. bothdata recording andIdeal playback performance and reliability. for DVR, NVR 1TB-6TB Capacity and Video data reliability. Ideal Systems. for DVR, NVR and Management and VideoCapacity Management Systems. 1TB-6TB 1TB-6TB Capacity

Video 3.5 HDD Video 3.5 Video HDD 3.5 HDD Seagate® Video 3.5 HDDs are designed to deliver® reliable 24×7 operation Seagate Video 3.5 HDDs are designed optimised for low-power consumption, Seagate Video 3.5 HDDs are designed to deliver® reliable 24×7 operation quiet operation, smooth video streaming, to deliver reliable 24×7 operation optimised for low-power consumption, high reliability and high capacity. optimised for low-power consumption, quiet operation, smooth video streaming, 1TB-6TB Capacity quiet operation, smooth video streaming, high reliability and high capacity. high reliability and high capacity. 1TB-6TB Capacity 1TB-6TB Capacity

Archive HDD Archive Archive HDD HDD Affordable Active Archive Hard Drives for Cloud Storage. Power efficient, Affordable Active Archive Hard Drives high density cold storage for online Affordable Active Archive Drives for Cloud Storage. PowerHard efficient, data archiving. for Cloud Storage. Power efficient, high density cold storage for online 5TB, 6TB, 8TB Capacity high cold storage for online datadensity archiving. data 5TB,archiving. 6TB, 8TB Capacity 5TB, 6TB, 8TB Capacity

SECURE ACCESS. NO CARD REQUIRED. Secure mobile access solutions by HID represent a revolutionary breakthrough in next gen technology by combining convenience, flexibility and the power of Seos. With a simple tap or use of our patented “Twist and Go” gesture technology, you’ll experience the most innovative way to make an entrance—no card required. And because it’s all powered by Seos, issuing, managing and revoking access couldn’t be easier—or more secure. You’ll call it the most advanced way to use your mobile device. We call it, “your security connected.” Contact or +613 9809 2892



Visit us at