Advertisement
Home Blog Page 109

Important Security Merchants Australia Distribution Announcement

 

 

pic-1

Security Merchants Australia and UTC Fire & Security Australia Pty Ltd trading as Interlogix are excited to team together in offering Tecom®, TruVision®, Aritech®, ITI™ and IFS™ into the Australian market.

Expanding channel to market – Interlogix and Security Merchants

Committed to delivering best-in-class security products to security channel markets, one of the world’s largest and most recognised security solution provider, Interlogix, has partnered with Security Merchants Australia. The Security Merchants value proposition complements the Interlogix portfolio well. SMA holds a strong position in the market for specification, technical support delivering the best customer service experience in the industry.

Kristian Speers, Security Merchants General Manager, welcomes the addition of the Interlogix portfolio to the SMA offering, “SMA has grown exponentially in the last 2 years. Our investment in staff infrastructure and innovative systems are clearly paying off. Our focus on providing the always better customer experience will now be paired with one of the world’s leading integrated intrusion and access control portfolio”.

From the 23rd of November 2015, Tecom®, TruVision®, Aritech®, ITI™ (formerly Sentrol) and

IFS™ products will be distributed by Security Merchants Australia.

Martin Dillon, General Manager of Interlogix in Australia and New Zealand, shares an aligned vision, “Interlogix is excited about the addition of SMA to our channel, as a focused and successful distributor. SMA’s customer focus and approach are a perfect match for our innovative products”.

Imagery:

Please download complementary images here: Kristian Speers & Martin Dillon

Media contact Security Merchants Australia:

Daniel Dunbar – Sales Manager

Security Merchants Australia Pty Limited

Phone: +61 3 8545 9814, Email: daniel.dunbar@securitymerchants.com.au

About Security Merchants Australia

Security Merchants Australia offers integrated solutions for unique electronic security

challenges, and part of the ASSA ABLOY portfolio as the global leader in door opening solutions, dedicated to satisfying end-user needs for security, safety and convenience.

ASSA ABLOY is represented in all major regions, in both mature and emerging markets, with leading positions in Australia, Europe and North America.

ASSA ABLOY is the company behind leading brands in Australia including, ABLOY, Henderson, Lockwood, Whitco and Yale.

For more information visit www.securitymerchants.com.a

 

Media contact Interlogix Australia:

Steven Hawley – National Sales Manager UTC Fire & Security Australia Pty Limited trading as Interlogix

Phone: +61 3 9239 1200, Email: steven.hawley@interlogix.com.au

About Interlogix

Interlogix is part of UTC Building & Industrial Systems. UTC Building & Industrial Systems is the leading provider of heating, air conditioning and refrigeration systems, building controls and automation, and fire and security solutions. UTC Building & Industrial Systems is a unit of United Technologies Corporation (NYSE: UTX), a leading provider to the aerospace and building systems industries worldwide.

Manufacturing an extensive portfolio, Interlogix caters for most security applications from small domestic installations to the largest airport and educational facility. Interlogix products have been designed to cater for the specific needs of these applications with flexible product design and application specific products.

The Interlogix business structure also enhances the work of a strong local team of application engineers who interpret specific application requirements and provide effective solutions.

In Australia, customers rely on Interlogix for products and solutions from the Lenel® and Onity® portfolio of products. With the backing of a global network, we provide solutions from some of the most recognised names in the industry, including Tecom®, Aritech®, TruVision® and ITI™.

For more information visit www.interlogix.com.au

 

 

 

Seadan launches complete range of Advanced Thermal Cameras from Dahua

pic1Seadan is pleased to announce a complete range of Thermal Cameras for the Australian market from Dahua. Unlike many other camera manufacturers, Dahua offers a full series of Thermal cameras. The three categories include Hybrid style cameras (Thermal and Conventional MegaPixel, Speed Dome style and mid-size Bullet Thermal cameras).

An innovative new capability allows the thermal camera to thermally detect a distant object of interest (such as a vehicle) then communicate this information to the associated conventional camera, instructing it to zoom into that object, completely unattended. With up to 40 X zoom, clear visual identification is possible.

Actual temperature measurement is available with the “T” models, further extending the application into industries such as energy utilities and heavy manufacturing for maintenance analysis of switchyards and process lines where “hotspots” are indications of early failures. In addition, the camera can trigger an alarm if set temperatures are exceeded.

The Hybrid series offer panoramic display (of both Thermal and Conventional cameras), hot spot detection and alarm, plus intelligent tracking. A unique feature of the Professional and Lite series is the Tri–output video, permitting connection to SD, HD-CVI or IP video recorders. Lenses are available from 7mm to 100mm. All cameras include IVS (Intelligent Video Surveillance) offering features such as virtual trip wire, object discrimination and more.

Seadan Security & Electronics is a leading Australian wholesale supplier of security and CCTV system solutions. Seadan is a national distributor of Dahua products, with local engineering support and with Dahua products on display in all Seadan showrooms across Australia.

For more information about Advanced Thermal Cameras, please contact David Pettigrew, National Marketing Manager – CCTV Division of Seadan Security & Electronics. Call 1300 366 851 or email: david.pettigrew@seadan.com.au

 

Tactical Strategies – Practical Use Of The Operational Environment

 

pic1By Richard Kay.

Officers tasked with the role of public safety face challenges every day they step into the operational environment. Some challenges relate to fulfilling the responsibility of the job role, others relate to officer safety at the hands of violent criminals or resistive subjects. The former may be intentionally seeking to harm the officer, whilst for the latter it may be a coincidental consequence. Either way, officers need to remain prepared for any eventuality.

Rather than merely amble around in an unaware state (condition white), officers should always maintain a state of relaxed awareness (condition yellow). A state of ‘over-readiness’ is also not suitable, as prolonged hyper-vigilance is not practical, can make officers overly anxious and is not healthy. Officers that are relaxed yet aware can make the most of their environment and notice small things that may indicate potential issues for examination.

A key aspect of operational safety is how officers interact with the environment. Knowing and using the physical environment properly can assist officers and provide an advantage in the conduct of operational duties. This becomes especially important if the situation involves interpersonal conflict or active aggression from others, especially critical if the subject is armed with a firearm.

The most important thing in a violent encounter is harm minimisation whilst ensuring officer safety. Subjects are just like officers – they do not want to get hurt either. In order for a subject to harm officers effectively, several requirements must be met – he must be able to locate the officer, he must have a target to focus on and he must be able to carry out his attack successfully.

Concealment delays the subject from figuring out where an officer is, but to avoid being shot, an officer should use cover. Taking steady, aimed shots is important, but not at the cost of exposure to the subject. This is where tactics come into effect. A subject cannot shoot at officers if he is not willing to expose himself to fire. Sticking the firearm out of cover and firing blindly is a dangerous thing to do because there is little control over where the rounds hit. Officers that make it harder for the subject to see them will make it harder for them to be shot at.

Fatal Funnels

A fatal funnel is any area that narrows and constricts movement or an area that focuses the subject’s attention. Buildings and rooms are dangerous because officers must enter through fatal funnels. The subject knows the officers will use these passageways.

Doorways are the most prevalent fatal funnels that an officer uses. Beware of backlighting when opening doors and remember that doors may open into areas with more doors, such as closets and other rooms. Doors with visible hinges open toward the officer, while doors with hidden hinges open away from the officer. Officers should avoid standing in the fatal funnel the opening door creates and, when possible, stand to one side away from the opening door. Looking through the crack between the open door and the frame can clear some parts of the room. When the hinges are visible, a rope can be used to remotely pull the door open. If the hinges are not visible, the door can be pushed open with a flashlight or baton.

Windows are sometimes used for entry, particularly when investigating a building that has no other unsecured entry points. The same window the subject climbed through to get inside the building may be the only way in; however, it can be difficult to protect officers entering through the window frame. Windows can also create unique lighting and reflection problems. For example, an officer investigating a building alarm looking through a window from a lighted area outside into a dark room can be seen by persons on the inside. Conversely, during evening hours, persons outside can see officers in a lighted room. Officers should avoid being silhouetted by windows.

Hallways are usually long, narrow and restrictive, generally with doors on either side and at both ends. Alternate routes to a hallway should be considered, but if a hallway must be entered, beware of backlighting and do not pass up doors. The width of the hallway will dictate tactics for movement down hallways. If the hallway is narrow, an officer should blade his body, with his chest area facing the wall. If a subject is contacted in the hallway, the officer will give verbal commands to distract the subject. This should enable the officer to retreat out of the hallway to a cover position. If possible, the subject should be turned facing away from the officer and a visual inspection made for weapons on the subject’s person. The subject can then be directed out of the hallway to a secure area.

Stairwells are generally surrounded by steel and concrete, with upper and lower landings as well as switchbacks where the stairs change direction. If stairs must be used to clear a building and a choice is available, move from top to bottom. While both directions have disadvantages, coming from top-down exposes the less critical areas of the lower body. Moving from the bottom-up could expose the critical areas of the head and chest.

Elevators are vertical coffins and the worst fatal funnel of all. Upon arriving at the designated floor a bell will usually ring signaling the arrival. Once the door opens there is no available cover and only one direction to go and that is toward an unknown threat. One option is to use the stairway, but there are situations when the building is so tall the use of the stairway takes an excessive amount of time or will physically exhaust an officer. Instead, use an elevator with a master key, go to a floor several floors above the actual target, exit at this higher floor and take the stairway down to the target floor.

Visual Surveys

An officer should use visual survey techniques, which create a situation where a subject has to react to the officer’s action. The objectives are to not be seen, or to move so quickly that the subject cannot react in time to harm the officer.

Glancing (‘Quick Peek’): The principle is to present as small a target as possible and to present this target so quickly that a subject would have difficulty reacting. When glancing, only the eye closest to the corner and the firearm held in the hand closest to the corner should become visible to the threat area. Inevitably, shoulders and elbows may also extend into the threat area dependent upon body size, therefore officers must attempt to minimise time spent glancing.

The location of glances should be unpredictable to the subject. Therefore, it is recommended the first glance not be at eye level but rather come from a higher or lower position, with any subsequent glances varied in location. The advantages of the glance are that it is fast and an officer can do many in a short time. The officer also has the advantage of some cover. The disadvantage is the subject may see the officer and easily reach them if the subject is near the corner or doorway.

To perform a glance, the officer should stare at the wall in front of him to help prevent extending their head and both eyes past the corner’s edge. If the glance is from a low position, the officer must keep good balance by placing his weight on the balls of his feet and, if needed, placing his free hand against the wall for support.

While in a crouched position, the officer should be cautious that his knees do not enter the fatal funnel. Only the closest eye and the barrel of the firearm should break the invisible plane that extends from the corner. Do not glance from the same place twice in a row. Have the firearm in the ready position. Only bring as much of the head around the corner as is necessary to see (one eye), do not tilt the head, limit exposure. The more body exposed, the longer it will take to get back behind cover.

Angling (‘Slicing the Pie’): The principle of this technique is to get the officer’s eye around the obstacle, the sides, and see some part of the subject’s body before the officer can be seen. Angling has some limitations in that it takes longer than the glance and the officer may expose himself to other threat areas. If the officer realises that he is exposed to other threat areas when using this technique, he should stop and use the glance. Be aware of casting shadows on nearby reflective surfaces, such as windows and vehicles, that could give away the position while using either technique.

To perform angling, turn the head at about a 30-degree angle to the obstacle. This makes the eye the closest part of the body to the angle of incidence and will keep the nose or ear from coming around before the eye. The firearm is in the same hand as the eye that is being used to look around the obstacle. Holding the firearm in the other hand tends to expose more of the body, thereby leaving cover to fire or return fire.

Do not allow a foot to give the location away. Point the toe inside the corner. The forehead must not come around first, so do not tilt the head. Keep the head straight up and the chances of getting anything around the corner before the eye are reduced. Maintain balance and hold the firearm in a position so it is possible to see past the arm all the way to the ground. Once the subject is seen, go to a position of cover before the subject is called out.

Reflections: Mirrors can be used to clear areas without exposing the officer to the threat. A small mirror (flat or convex) can be attached to a collapsible baton and then placed around the corner, allowing the officer to remain behind cover. The mirror can also be handheld if necessary, but the hand will be exposed to the threat. A drawback to mirrors is that they reverse and distort images, which could confuse the officer.

Reflective devices are not confined to mirrors brought by officers to the scene. Officers can use reflections on glass-fronted cabinets, bathroom mirrors, glass in picture frames, vehicles, windows, glass in storefronts, or any item that reflects an image. Officers should be cognizant that any reflection that they can use can be used against them as well. For example, if the officer can see the subject’s eyes in the reflection, then the subject can see the officer.

Like all operational safety strategies, practice is the key to effective use under stress. Officers should maintain awareness of these tactical aspects and try to incorporate them into everyday activities. Mastering the physical skills of operational safety is important, but using the physical environment in a tactical manner provides a huge advantage for the officer. Be prepared, be aware, stay alive.

 

Richard Kay is an internationally certified tactical instructor-trainer, director and senior trainer of Modern Combatives, a provider of operational safety training for the public safety sector. Visit www.moderncombatives.com.au for more information.

Western Australian Intelligence Forum – Making Sense of a Changing World

Thursday 26th November 2015

The Australian Institute of Professional Intelligence Officers is offering professional in the security industry a rare opportunity to hear from some of the intelligence industry’s leading practitioners on cutting edge practices in areas such as:

  • Cybercrime in financial markets
  • AML challenges – shaping current and future impacts Methods and tools supporting analysts
  • Understanding the nature and dimensions of rapid change

To register online please visit www.aipio.asn.au

This years conference will be held at The University of Notre Dame, Fremantle WA 6959. Participants will have the opportunity to directly engage with speakers and panel members during and after the forum, to discuss issues related to their intelligence practice. Attendees will include those who work in the intelligence community (law enforcement, defence, regulation and financial services), those currently studying in the field and those who aspire to work in the intelligence profession.

Current speakers include:

  • Major General John Hartley AO (ret’d): The Future: A Changing World with Different Threats
  • Nolan Dedrick: AML Challenges
  • Jeff Corkill: Diagnosis & communication, the keys to successful intelligence in any world
  • Chris Cubbage: Technology, Crime & the Future
  • Steve Simpson: The Shadow IT Threat: trends and challenges
  • An expert panel including Professor Matthew Ogilvie: Intelligence and Intelligent responses to threats in a changing world
  • Colonel Michael Brennan: Regional Peacekeeping: Perspectives on the East Timor and Bougainville Operations 1999-2012

For more information about pricing or to register for the event, please visit www.aipio.asn.au

If, for any reason, you are unable to register online, or for more information please contact WA AIPIO Regional Representative Daniel Baldino wa.rep2@aipio.asn.au (+61 8 9433 0127) or Jess Reidy marketing@aipio.asn.au

AIPIO Events operate under the Chatham House Rule: Under the Chatham House Rule, participants are free to use the information received, but neither the identity nor the affiliation of the speakers, nor that of any other participant, may be revealed.

Codelocks introduces new SMART locker lock

Combines keypad and smart card access with the ability to set access codes from a remote location and manage through NFC-enabled tablet.

Codelocks announced details of a new SMART lock that provides flexible access for end users and makes it faster and easier for operators to manage and control access to large numbers of lockers, cabinets or enclosures.

pic-1

 

Based on its popular 1500 locker lock, the new KitLock 1550 SMART is a multi-purpose, multi-functional digital lock with the ability to support many different forms of access.
As well as being used in its most basic form, i.e. programmed via the keypad and accessed using a four-digit code, the KL1550 SMART supports Private* and Public Use*, MIFARE-based smart cards and NetCode.

Using an NFC-enabled tablet (available to purchase separately), operators can upload selective programs and features, and download audit trail data on demand in a matter of seconds.
“Technology has enabled us to offer several access options in one product; via the keypad, smart card or iButton. It has also allowed us to cut down the time it takes to program and manage access permissions,” explains Grant Macdonald, Managing Director, Codelocks. “Customers need flexibility and this lock, with the addition of smart cards and NetCode, is able to offer just that. Using the web-based NetCode portal, customers can issue time-sensitive access codes for temporary or one-off purposes via SMS or email.

“The functionality of the lock allows for many possible scenarios. For example, set Public Function* for short-term multiple occupancy applications and open the lock with either a code on the keypad or with a smart card. Issue NetCodes via SMS for one-time entry – this function is useful for service engineers when visiting remote cabinet enclosures. Issue up to 50 smart cards for access to storage used regularly by a small group of people, for example nurses accessing a medical cart in a hospital.”

The product is available to order in silver grey and is priced at $188 +GST. The NFC-enabled SMART tablet is available to purchase separately at a cost of $500 +GST.

pic2

 

For more detailed product information, visit http://www.codelocks.com.au/kitlock/kl1550-kitlock-locker-lock.html or call +61 2 9882 1009.

KitLock has three functions; Private, Public and NetCode. Private Function is the default function and is used where the same code or card will be repeatedly used. Public Function is used when access is required for short periods by many different users. NetCode allows temporary access to lockers or cabinets via the web-based NetCode portal. Smart cards can be used for all functions.

About Codelocks (Australia)

Codelocks designs and manufactures a range of digital door and cabinet locks for organisations that need to control access within their buildings. The locks save time and money by being easy to fit and easy to program. Unlike other solutions, digital push-button locks don’t require complex wiring or external power, and are more cost effective for many applications. The locks offer the user a convenient standalone solution and are sold with ‘everything you need in the box’ to fit them, including parts, instructions and templates. For more information visit www.codelocks.com.au

For further information contact:

Mark Samuelson
Codelocks (Australia) Pty Ltd,
Unit 222/354 Eastern Valley Way
Chatswood, NSW 2067
+61 2 9882 1009
 sales@codelocks.com.au
 

Future Directions In Screening Technology

Technology screeningSince September 11, 2001, the reaction of authorities, especially those in the United States, has highlighted how inefficient passenger screening can severely affect the operation of an airport. Those who travelled in the United States in the years soon after September 11 will remember the lines at screening points. On the positive side, a result of those inefficient times is a desire by all parties to make the security systems more efficient.

To design a more efficient system, the International Air Transport Association (IATA) and the Airports Council International (ACI) have joined in the Smart Security project. According to IATA and ACI, “Smart Security envisions a continuous journey from curb to airside, where passengers proceed through security with minimal inconvenience, where security resources are allocated based on risk and where airport facilities can be optimised.” It is a long-term project and the first phase is underway at pilot airports. To date, four airports have signed onto the first phase: London, Schiphol, Doha and Melbourne.

So, what is the Smart Security project? Put simply, the first phase is described as integrating new technology, repurposing existing equipment, using known traveller regimes in some countries and networking security systems. After 2017, the project is looking towards the use of better risk assessment methods, greater automation, linking behavioural analysis with known traveller (which is expected to expand across borders) and using technology to monitor screening point performance and better allocation of resources. Beyond 2020, it is expected that passengers will be able to flow through the screening point without stopping, unless the advanced technology indicates a threat.

So, is the project feasible? The first phase is absolutely feasible, but what will happen next? Firstly, do not expect huge changes in the suggested timeframe. That timeframe will, in reality, only allow for the development of an agreed model. By 2017 there will be a variation of the model at a number of airports, but not widespread adoption.

Implementation is likely to be piecemeal; not because there is no desire by airports, but it is simply a factor of history. Before 2001, screening was seen as a necessary evil but, in revenue terms, it was non-productive, so the space allocated was the minimum possible. Given the need for additional room, a full Smart Security model is likely to require a complex redesign of the screening point and possibly the terminal. This is likely to be expensive, so it will need to be integrated into the airport’s master plan.

In the short term, some minor systems may be introduced, such as longer powered conveyors at the front of the point to move passenger items through the process and ‘others’ belts for the movement of trays from the rear to the front of the point. Later, explosive detection systems (EDS) similar to those used in checked baggage screening (CBS) may be integrated into passenger screening points. In the short term, these are more likely to be the automated multi-view (MV) X-ray rather than computed tomography (CT) systems, simply because of costs and space.

The Smart Security concept talks about remote analysis of the X-ray images. That idea has been around since the 90s and is feasible, but there were always questions about cost effectiveness. The major advantages are better staff resource management and an improvement in space. Currently, the X-ray monitor position takes up about 1.5 metres to the side of the X-ray; that 1.5 metres becomes important to increase space for things like body scanners or to widen the lane to allow for better passenger flow. However, the space can disappear when the conveyor is modified to quickly and securely remove bags for further examination. Staff management is a more interesting issue; for example, is using a single operator to monitor multiple X-ray machines an option?

If EDS X-ray machines are introduced, a hybrid remote system could be implemented, where the responsibility for explosive detection is removed from the passenger screening point. EDS machines used in CBS automatically detect explosives and if they cannot clear the bag, it is removed from the baggage flow and a remote operator examines the image. Some airports may retain the X-ray monitor at the screening point to look for firearms, sharps and other prohibited items, but will network the EDS X-ray to the existing CBS network. If the machine cannot automatically clear a bag it can be removed from the flow, examined by CBS operators and, if cleared, returned to the passenger.

There is scope for body scanners to gradually replace walk-through metal detectors (WTMD) as they become cheaper and more efficient, with more an arch design, where the passenger pauses, rather than a cubicle.

Additionally, things like smart gates could be introduced in some airports, especially in Europe and the United States, where passports are checked before the passenger is screened. That requirement is less common in Australia where, generally, screening points are after the passport control. Another noticeable change will be in the aesthetics; passenger screening points will finally become part of the airport ‘experience’ rather than an add-on.

While there will be little generational change in passenger screening equipment, the concept that is different in the Smart Security model is risk analysis. In an earlier article, the author expressed reservations about the ‘known traveller’ process and the sharing of intelligence. He thought it would become a bureaucratic nightmare with ever lowering standards or it would be a little club where a few select countries would exchange information. He thought that it would end up being torn apart at the hearings following the next major terrorist incident. Those issues remain, but the result will more likely be less terrorist-related and more about facilitation for frequent flyers.

Using the US Transportation Security Administration (TSA) Pre P as an example, it allows for a quicker transit through the screening point, among other things, by not requiring the removal of belts, shoes, light outer garments or laptops. However, if screening can be achieved without removing belts and so on, why is it not applied generally? All things considered, the Pre P process is relatively benign; there is little difference to the dedicated screening points available to business class or club passengers. Those business class points are not as busy as general screening points so the process is quicker, but the standard is the same and that is the important point. However, some airports have a dedicated VIP terminal and, in reality, there is no screening. Of particular concern is that some countries may consider VIP terminals as ‘known traveller’. This is not an issue provided they are screened to the same standard as the general population.

Enhanced screening lanes present human factor issues for screening staff, such as the level of staff vigilance depending on which lane they are working. While the Smart Security idea of a risk score is good, it should not be noticeable to the passenger or others. For example: a passenger at the screening point has an average risk score of 6; his baggage is X-rayed and he goes through the WTMD, which is set at an agreed minimum level. The next passenger has a risk score of 8; he may be directed to a screening point where the WTMD is more sensitive or use the same screening point (but the WTMD automatically becomes more sensitive) or be asked to go through a body scanner. There should be no change to the X-ray process, either the X-ray operates correctly and the operators are vigilant or they are not. The passenger should not know if he is being subjected to enhanced screening, nor should other passengers.

Generational change will hopefully come with the introduction of biometrics and behavioural analysis. Not simply at the screening point, but at key points in airports, including the carpark. Automated systems such as voice stress analysers or systems to detect micro-expressions could be used to adjust the risk score of a passenger. Similarly, specially trained profiling staff watching CCTV or walking around the terminal could assess passengers and adjust their risk score accordingly.

It is hoped that the new systems will lead to a more efficient flow at passenger screening points and a better passenger experience, without lowering standards.

DVTEL Signs Q Security Systems as Australia’s Primary Distributor

pic-1

 

Strategic alliance strengthens DVTEL’s presence in the Australia and New Zealand video solutions marketplace.

DVTEL, INC., the video surveillance solutions provider has announced that Q Security Systems (QSS), a leading distributor based in Australia, will become the primary distributor for Latitude, edge devices and DVTEL ioi Analytics solution range in Australia. DVTEL and QSS initially formed their business partnership in January 2014. Impressed by QSS’ commitment, indefatigable work ethic, and excellent customer service, DVTEL moved to make QSS its primary partner in the area.

“At DVTEL, we believe that providing exceptional support to our customers is paramount to offering the best video technologies on the market,” said Yoav Stern, CEO of DVTEL. “The reason we chose to collaborate with QSS is because they have a clear understanding of our business and our people. We know that they will make a great partner and play an instrumental role in helping us achieve our goals in the Australia and New Zealand regions moving forward. QSS’ corporate culture related to an uncompromised commitment to an end-to-end customer support fits DVTEL’s modus operandi.”

Prior to QSS, DVTEL worked with Hills Ltd. Serving as DVTEL’s main distributor for the last decade, Hills provided great support to DVTEL, who deeply appreciates the many years of friendship and business partnership with the distributor.

DVTEL customers in the Australia and New Zealand regions will continue to enjoy access to the video solution provider’s product line with QSS at the helm. All existing accounts, projects, stock requirements, services, warranties and support will seamlessly transition from Hills to QSS’ ownership in the next three weeks.

For more details and Q&A, please click here.

About DVTEL

DVTEL is a leading developer of open-standard, end-to-end video surveillance solutions. DVTEL’s advanced technology R&D department provides enterprise-grade integrated IP video networks available for small, mid-size and enterprise applications – that are scalable and share unified architecture. Solutions include high-performance, storage-efficient HD IP cameras and video analytics for outdoor intrusion detection and tracking developed by DVTEL’s research teams. DVTEL partners with leading industry players to deliver ONVIF-compliant solutions, provide high-quality services, develop custom applications, and seamlessly integrate third-party products to ensure interoperability and performance. DVTEL’s installations provide field-proven expandability, flexibility and functionality in thousands of locations across five continents, while minimizing your investment and cost of ownership.

For more information, go to www.dvtel.com

MEDIA CONTACTS:

DVTEL
Tel: (201) 708-9898
media@dvtel.com     Q Security Systems (QSS)
Rob Rosa, CEO & Managing Director
Tel: +61 396 76 7051
Cell: +61 406 81 7320

Managing An Active Shooter Emergency

ShooterHeightened alerts for terrorist activity have prompted many to review their response procedures for armed intrusion, particularly after the Lindt Café Siege in Sydney’s Martin Place in December 2014.

There had been a number of mass shootings committed in Australia prior to the introduction of national gun laws by the Howard Government in 1996. Of particular interest to security and property managers are the Queen Street Massacre (1987), Strathfield Plaza Massacre (1991) and Port Arthur Massacre (1996).

Each shooting incident was over in less than 15 minutes. The Port Arthur spree involved multiple locations, with 20 of the 35 victims killed within two minutes at a café and gift shop. Although the change in gun laws has limited access to the types of weapons used, it is still imperative that building management and security are prepared.

The Australia Post building at 191 Queen Street, Melbourne was the scene of the December 1987 murders. A rampage by 22-year-old Frank Vitkovic in his attempt to shoot a former friend and anyone else was fortunately restricted by a faulty M1 Carbine. He still managed to kill eight people and wound five others before plunging from an 11th floor window to his death.

The Strathfield Massacre occurred on Saturday 17th August 1991 at Strathfield Plaza and is considered one of Australia’s worst and most violent crimes. Within a ten-minute period, 33-year-old Wade Frankum, armed with an AK-47 rifle, knife and machete, killed seven people and seriously injured six other people before turning the gun on himself (Jones, 2011).

On Sunday, 28th April 1996, the name Martin Bryant was infamously etched into Australian history. His murderous onslaught at the Broad Arrow Café and surrounds of Port Arthur resulted in the death of 35 people and 23 injured. His initial shooting spree lasted 15 seconds, with 17 shots fired, 12 people dead and 10 injured. The sequence of events into the wanton killing of so many people is too much to describe here. His arrest after setting fire to the Seascape Bed and Breakfast ended the carnage.

What is the profile of a mass shooter? Usually, a white male, 20 to30 years old, isolated by choice, with feelings of insignificance, who usually commits the crime for revenge (Pappas, 2012).

Vitkovic, Frankum and Bryant all had psychological issues. Frank Vitkovic would have been certified as insane if he had been referred to a psychiatrist instead of a Scientology course. Frankum was diagnosed with depression after the death of his father and suicide by his mother. His diary showed a decline from loneliness to murderous intent. Bryant was intellectually moderate with an IQ in the mid-60s and bordering on schizophrenia. His behaviour deteriorated markedly following the deaths of his carers – his father and a female mentor.

Is there anything that can be learned from each incident? It is impossible to predict when they might occur. Security and building management must rely on others for early identification and intervention to prevent such events. However, they must be prepared for when the system fails. The following examines the security that exists in most modern buildings.

CCTV is a great crime deterrent and evidentiary tool for investigators. Clear signage and overt cameras identify the presence of a security conscious building management. The presence of CCTV may be a pre-requisite for the killer, the chance to record their notoriety. Bryant set up a video camera on a café table prior to commencing his murderous spree. The mass shooter has moved from a feeling of insignificance to chasing his own 15 minutes of fame (Nuwer, 2014).

Terror is a much more effective tool. Having restricted access minimises the risk of intrusion and maximises the safety and security of occupants. If the systems and procedures are not maintained, there is a risk that control measures will fail.

Level 12 of Queen Street was a secure area with a security entry door and bullet-resistant viewing panel on the adjacent wall. Material stored on a desk in front of the panel prevented anyone from using it. One Australia Post employee was shot by Vitkovic when he opened the door after the killer knocked or rang the bell. He was fortunate to survive after being shot three times, but three others were less fortunate, all killed in that area.

Security procedures must be maintained to ensure the integrity of the system. This of course includes a rigorous training and induction program to make sure that all occupants are aware of those procedures.

Public and common areas are at greatest risk. Both Frankum and Bryant had either coffee or a meal in the cafés prior to their respective rampage. Frankum’s stony-faced presence and his constant looks at two nearby teenage girls (one of whom became his first victim) may have indicated some of the mental torment that was occurring. Bryant was noticed talking to himself rather than anybody in particular, referring to the presence of wasps in the area. Irregular behaviour was displayed by both, but certainly not enough to predict their eventual actions.

Vigilance is another strategy that should be employed in security management. To be vigilant means to be keenly alert to or heedful of trouble or danger, while others are sleeping or unsuspicious (Collins Dictionary, 2015). Vigilance requires awareness – communication and coaching are important aspects of ‘whole of occupancy’ participation in preparedness.

Preparedness is not only about prevention, it is also about response. To have an effective response there must be an emergency management plan. Particular attention should be given to the following steps (Talbot & Jakeman, 2008):

  • review existing plans and procedures
  • seek and gain support from upper management
  • assign facilities or jurisdictions
  • identify resources
  • conduct a business vulnerability analysis
  • develop emergency management team

AS3745 Planning for emergencies in facilities provides a structure that should be used to develop the plan. The Australian Standard is the recommended model for compliance with work health and safety regulations in any workplace. The actions for Civil Disorder/Armed Invasion provide a simplistic response, without referencing the presence of an active shooter.

The standard provides for an emergency planning committee and emergency control organisation, with mandatory display of emergency procedures and occupant training. Compliance will ensure that there is a structured response to an armed person (identified as code black in AS3745).

The following should assist in the preparedness for any active shooter event:

  • an emergency control organisation (wardens) trained in code black responses
  • a sound system for emergency purposes (emergency management intercommunication system [EWIS], building occupant warning system [BOWS])
  • manual call points (break glass fire alarms)
  • evacuation diagrams showing the location of emergency exits and alternate routes
  • the existence of safe rooms

To encapsulate a managed preparedness to such an event, management should incorporate security and risk management initiatives and processes into emergency management. This requires the following program (developed from My Skills, Department of Education and Training, Maintain security awareness and vigilance in the aviation workplace):

  1. Maintain awareness of security measures and security risks – security policies and procedures are in place, security roles and responsibilities are clearly identified and current, occupants are aware of their role in the process, and security management is reviewed on a regular basis, particularly after any incident.
  1. Maintain security vigilance – potential security risks (public and common areas) are monitored during occupancy and effective communication skills are used to reinforce security vigilance amongst occupants.
  1. Recognise and assess potential security risks – one size does not fit all and in this case any planning would require a security risk assessment to identify security risks and security control measures. It is recommended that an independent consultant be used to develop this assessment.
  1. Respond to potential security risks – developing a team approach for security in building management makes sure that everyone ‘is on the same page’ and able to work as a cohesive unit during any crisis. Communication and involvement in the planning and implementation stage ensures a fluid response.
  1. Report potential security risks – as with any work health and safety management system there has to be a reporting procedure to identify any potential fail-points in the security system and/or procedure. That reporting process should be prompt, easy to use, informative and with provision for timely action.
  1. Responding to an active shooter (US Department of Homeland Security) – there are three options to be adopted by any building occupant during an active shooter event:
  • Have an escape route planned, evacuate even if others refuse to follow, leave belongings, help others and keep hands visible when heading to responders.
  • Find somewhere out of the shooter’s view, lock and barricade the door, silence mobile phones, turn off any noise, hide behind large items, remain quiet.
  • As a last resort and only when in imminent danger attempt to disrupt or incapacitate the shooter by acting as aggressively as possible, throwing items, yelling and committing to actions.

The last option saved numerous lives in the Queen Street Massacre, with two people subduing Vitkovic and removing his weapon. Although he had already fired 50 rounds, he still had another 150 in his pockets.

Key elements of a good security system are procedures, communication, participation and awareness, vigilance, review and continuous improvement.

How does this relate to the Lindt Café Siege? It shows that no matter how prepared security and building management can be, sometimes it is impossible to predict human behaviour. It is only possible to make sure that there are systems and procedures in place to minimise the damage. The possibility of any terrorist attack should be included in every emergency management plan, incorporating security and risk management principles.

Sektor Appoints New National Accounts BDM

 

 

pic2

Tom Kinkade has been appointed as the National Accounts BDM for Sektor’s security division in Australia.

Sektor is already the market leader in POS, data capture, rugged and mobility computing technologies. Sektor is strategically positioning to increase their Security footprint, having already appointed Mike Hardee, previously of FLIR Systems, Inc. in the USA as Security Product Manager, Gary Choo as BDM in Perth and Nigel Varny as BDM in Brisbane.  Tom Kinkade joins the team with 15 years’ experience in the electronic security industry, most recently heading up the TAKEX America, Inc. operation for the Oceanic region.

Sektor offers the full gamut of Actii, Bosch, Canon, Inex Zamir LPR, FLIR, HP IDOL and Onssi security solutions with a growing portfolio of software and hardware solutions.

20th Australian Security Industry Awards for Excellence and Outstanding Security Performance Awards (OSPAs) winners announced in Sydney

Australia’s security landscape has changed significantly in recent years as new threats and challenges have emerged. Increasingly, the private security industry is being called upon to perform a greater role as part of Australia’s national security mix.

In recognition of the vital role the security industry performs, leaders from across Australia have gathered at the Westin Hotel in Martin Place, Sydney for the 20th Australian Security Industry Awards for Excellence and the inaugural Outstanding Security Performance Awards (OSPAs).

Organised by the Australian Security Industry Association Limited (ASIAL) in conjunction with the UK-based World Excellence Awards, the awards provide an opportunity to recognise outstanding organisations and security professionals. Winners were selected by an independent judging panel of experts.

ASIAL CEO Bryan de Caires said that: “Tonight provides an opportunity to reflect on the important and often unseen role the industry performs and to recognise the efforts of the many professionals and organisations who day in day out contribute to help keep us safe.”

This year’s event also marks the launch of the inaugural OSPAs – a global initiative to recognise excellence in security. The founder of the UK-based OSPAs, Professor Martin Gill commented: “It is significant that Australia is at the forefront of this worldwide movement to recognise excellence. OSPAs events have or are taking place in Norway, Germany, the USA, with more countries to be announced soon.”

About ASIAL: ASIAL is the peak body for security professionals in Australia. The Association is committed to supporting its members, promoting standards and safeguarding public interests. More information: www.asial.com.au.

ENQUIRIES should be directed to Manager, Marketing and Communications, Kirsty Jagger via communications@asial.com.au or 1300 127 425.

IMAGES/INTERVIEWS are available upon request.

Australian Security Industry Awards for Excellence – recipients

Gender Diversity: MSS Security. MSS Security’s commitment to gender diversity is demonstrated through a range of initiatives to increase female workforce participation and engagement, key component of which is their partnership with Industry Women Central.

Gender Diversity: SNP Security. SNP Security has introduced two initiatives to redefine the future of women within the company, #ConnectedWomen strategy and the Women in Leadership program. These initiatives were formed to embed gender diversity at every level of the organisation and e nsure equality within the security industry.

Special Security Event: Wilson Security. The successful deployment of Wilson Security’s Tier 1 security officers and equipment for the G20 events and Leaders’ Summit was

publically acknowledged by key leaders of the Australian Government. The G20 contract was the largest and most complex privat e security operation in Australia.

Indigenous Employment: MSS Security. MSS Security’s commitment to providing a supportive and culturally inclusive workplace, that recognises and respects indigenous people is demonstrated through its partnership with an indigenous recruitment training partner.

Individual Achievement – General Security: Mohammed Mustafa. Mohammed is part of the Access Group Solutions security team at the Dandenong Plaza Victoria, a site that suffered from significant problems with gang related incidents and assaults. His proactive work with local youth and gang members has resulted in a change in their mentality from being violent and disruptive toward the community to a more considerate approach.

Individual Achievement – Technical Security: Richard Bone. A diligent and conscientious employee of Chubb Electronic Security, Richard is known for his passion for technology and dedication to ensure every customer’s needs are handled promptly.

Product of the Year – Access Control: Gallagher. Gallagher’s state of the art security management platform introduces a mobile application solution that significantly extends visibility and control of access and perimeter alarms. The application allows guards to become more mobile and better able to quickly identify and react to alarms requiring further attention.

Product of the year – Alarms: Ness Corporation. Mezzo is the latest security and automation solution developed by Ness Corporation. The smart home controller combines spread spectrum wireless, z-wave and IP technologies to handle multiple security, automation, energy management, CCTV, intercom and medical alarms.

Product of the Year- CCTV: Axis Communications. Optimised for video surveillance, Axis Communication’s Zipstream technology lowers bandwidth and storage requirements by an average of 50% for many common 24/7 surveillance recordings, making it possible to use higher resolution and increase forensic detail.

Product of the Year – Communication/transmission systems: SYLO. Sylo’s Cortex system improves the safety and quality of life for many civic and business communities by combining public amenity and safety infrastructure in one device.

Technical Security Solutions – projects over $100,000: Fredon Security Fredon Security installed a unified Access Control and Video surveillance system with fixed and

wireless duress. The installation is in an iconic building at Martin Place Sydney occupied by the NSW Department of Premier a nd Cabinet and caters for VIP guests and government officials.

Technical Security Solutions – projects over $100,000: Chubb Electronic Security – Chubb Electronic Security successfully implemented a vast and challenging security project for the Department of Defence.

 

Outstanding Security Performance Awards – recipients

Outstanding Guarding Company: Southern Cross Group Services. Investing in technology and focussing on their staff, Southern Cross Group Services has delivered outstanding performance in all areas of their business.

Outstanding In-house Security Manager: Melbourne Racing Club. As Security Manager at the Melbourne Racing Club, Grant Frankel is responsible for the security operation of three racecourses. Each year over 1 million people pass through the doors as they attend over 500 events. Grant has implemented numerous programs to provide a safe environment and enhanced customer experience.

Outstanding In-house Security Team: Sydney Water Corporation. Sydney Water’s physical security group has worked with internal stakeholders to provide support in key operating areas of Security Risk Management and deliver an effective and efficient Physical Security Strategy to support the organisation.

Outstanding Security Consultant: AECOM Australia. AECOM have successfully provided a full suite of services from Security Master Plan and Security Risk Assessments to complex design services which have positively influenced and optimised security design outcomes.

Outstanding Security Partnership: SNP Security. SNP Security has worked closely with Qantas to successfully deliver security services for the Qantas freight business.

Outstanding Security Training Initiative: Chubb Electronic Security. Chubb Electronic Security has invested in its people to enable them to meet the changes in technology, comply with regulatory requirements and enable them to meet the quality and performance expectations of customers.

 

QSS increases their extensive range to now include Dahua

pic1

As of late November 2015, Q Security Systems will increase it’s expanding product range to include Dahua CCTV products to their impressive line-up. Comments from QSS Chief Executive Officer, Rob Rosa, verify that QSS is extremely excited with the new arrangement. “This new move allows QSS to target the competitive and cost-effective market space, which now adds further value to our complete CCTV product offerings.

Rob goes on to explain, “Dahua’s range of cameras and NVR’s offer unprecedented value, especially considering the amount of features they have, not to mention how reliable they are. I guess this is to be expected when you’re the second largest CCTV manufacturer ion the world (and probably soon to be the first)! “

“However what’s really exciting for us, is the great middle to high-end products we’ll now be stocking. These will include products such as Dahua’s 4K NVR’s and a genuinely impressive line-up of 4K cameras, with a 360 degree camera which has one of the best de-warping features, after the footage is actually recorded. Only a hand full of other manufacturers have this available today! “

“We’ll keep all of our customers posted with the official launch date late in November, along with a number of other promotional activities tied in with the Dahua launch in the coming days and weeks”.

QSS is extremely excited at this newly formed partnership as the inclusion of Dahua to their already impressive range of quality brands ensures that their customers will have everything under the one roof.

 

Security in the Transport/Logistics Industry

Transport-trackBy Ray Mancini.

This article examines issues around security in the transport industry. It does not provide all-encompassing solutions to the problems, but it does provide what are, in the author’s opinion, simple, cost-effective and achievable solutions that focus on the five key topics. If utilised wisely, these solutions could provide companies with an opportunity to not only protect their brand, but also possibly generate increased revenues.

Organised Crime

Organised crime is increasingly found in industries where there is traditionally little awareness of, or exposure to, organised crime activities, where gaps in regulations can be exploited and/or where the penalties for crime are not sufficient to deter criminal behaviour. The transport industry presents opportunities for this exploitation by organised crime (Australian Crime Commission, 2007).

From the author’s own experience, organised crime members have been able to infiltrate companies as an owner-operator contractor or as a contract truck driver. One transport company employed a contract truck company to transport their freight locally; however, this company’s owner had strong links to an organised crime syndicate and employed members from his group.

Importantly, the fact that there is no dedicated national law enforcement unit targeting or combating organised theft of freight within Australia, especially involving organised crime gangs, has permitted these crime syndicates to flourish. Previously, a joint venture by Australian Federal Police (AFP), customs and various state law enforcement agencies created the RAFT project (Reduce Aviation Freight Theft), which introduced a multi-agency approach to investigating aviation theft. However, this project was abandoned in most states and the intelligence was handled by AFP in Canberra. (To the author’s knowledge, Queensland is the only state that still maintains the RAFT project that involves security employees from transport companies). The RAFT project was conceptually a positive move by the law enforcement agencies; however, it was hamstrung as it only targeted aviation freight and not necessarily road freight as well.

While it is acknowledged that many state’s law enforcement services do have a ‘gang crime squad’ to investigate the activities of organised crime gangs, many crimes perpetrated within the transport/logistic industries are often not reported or are overlooked by the police due to the crimes themselves being a lower priority, or there being a lack of avenues of inquiry.

The Transported Asset Protection Association (TAPA) is a unique forum that unites global manufacturers, logistics providers, freight carriers, law enforcement agencies and other stakeholders with the common aim of reducing losses from international supply chains (TAPA). According to the European Union, the theft of high-value, high-risk products moving in supply chains in Europe costs business in excess of 8.2 billion Euro a year. The threat from organised criminals is increasing and becoming more violent (TAPA).

Recommendations:

  • Re-create and implement the RAFT project, including the Joint Aviation Investigation Team (JAIT), on both a national and state level, involving both road and aviation transport companies and the respective security companies.
  • Provide continual security awareness training for employees and security personnel to reduce apathy displayed by employees and managers in the respective transport companies.
  • Provide TAPA training to staff and adopt TAPA’s minimum security standards; undertake regular auditing of security by a qualified TAPA auditor or security personnel trained in TAPA certification standards.

Terrorism

Transport companies have transformed into transnational companies, providing international freight services across the globe. As such, dramatic increases have occurred in the demand for express service delivery of international freight using aviation services, including both freighter and passenger aircraft. This increased demand increases the risks of terrorist activities within this area. For example, in 2010, two separate items of freight (printer cartridges) were determined to contain improvised explosive devices (IEDs). These items had already been loaded onto two separate freighter aircraft in the United Kingdom for flights into the United States. One can only imagine what might have happened if these two IEDs exploded over heavily populated areas; it could have replicated the disaster over Lockerbie, Scotland, in 1988. According to the Australian Government, transport systems continue to be attractive targets for terrorists seeking to inflict mass casualties, economic damage, instill fear and create spectacular media imagery.

Whilst the transport industry already has measures in place, such as screening and security checks, to reduce the risks of IEDs and other explosives or chemicals being loaded onto aircraft, criminals and terrorists continue to improvise methods to circumvent detection strategies. These incidents have caused a growing awareness in the industry for improved security. Many governments have made it mandatory for improved freight screening and security procedures to prevent breaches.

Transport security encompasses aviation, air cargo supply chains, maritime and mass passenger transport systems such as road and rail. The Office of Transport Security (OTS) is responsible for regulating and monitoring transport and air cargo security on behalf of the Australian Government and for administering an intelligence-led, risk-based preventative security regime. OTS works with the aviation and maritime industry to achieve sustainable and proportional preventative security measures that are commensurate with the nature and level of the terrorist threat.

Supply chain security for air cargo is regulated in Australia under the Aviation Transport Security Act 2004 and Aviation Transport Security Regulations 2005. It is administered under the Regulated Air Cargo Agent (RACA) and Accredited Air Cargo Agent (AACA) schemes. The RACA scheme regulates air cargo security for a range of industry participants through the preparation, implementation and compliance of a transport security program, compiled by the respective transport companies and the regulated shipper scheme, that includes:

  • cargo terminal operators at airports
  • express post services
  • freight forwarders (including express freight companies)
  • regular international postal services

All freight for international destinations via the aviation industry is processed according to the ‘unknown shipper process.’ However, due to time constraints, lack of knowledge or lack of communication, this process is often neglected, increasing the odds and risks that an unlawful item or substance could be loaded onto an aircraft.

It is interesting to note that, in Australia, surface (road) transport security arrangements are under state and territory jurisdiction, with OTS working to coordinate the dissemination of best practice information on security measures. Implementation of preventative security measures is the responsibility of owners and operators of the individual transport companies.

Recommendations:

  • Provide training/information for transport operators and employees in relation to RACA and security awareness for the security of their freight.
  • Provide updated and continual training for security and transport employees (company or contract) in the areas of transport/logistics and aviation security requirements, including RACA and other regulatory or convention requirements, including the ‘unknown shipper process’.
  • Use suitably trained and qualified security guards to provide professional and quality guarding services within the transport/logistics industry.

Theft of freight

Criminals use employees to gain intelligence or provide information as to which transport company is transporting the various brands or products of high-value electronic freight (for example Apple, Panasonic and JVC electronic items) and to gain information on the company’s weaknesses and areas of opportunity in order to plan and commit offences.

Offences could be committed across various states (causing jurisdictional issues with law enforcement agencies) and/or whilst the freight is in transit (difficult to track and delays the discovery of the crime). For example, high-value freight is often targeted on the Sydney to Perth tour as it is a three-day transit tour, thereby delaying the discovery of the crime and reducing the possibility of apprehending the perpetrators.

Many employees in the transport industry are low income earners, which increases the risk of these employees providing information, stealing freight or providing accessibility for criminals to access freight, in order for the employee to supplement their low wages through bribes or ‘pay offs’.

It is a fact of life that the majority of the workforce will struggle to survive with the wages that they earn. In more cases today, many people live in excess of their earnings, which is powered by their yearnings to have more. This causes frustrations with their working life and conditions, which can be reflected onto their attitude towards their employer. (Mann and Al-Khadha)

The employee’s desire to have a better life and possess more expensive items is created by what Mann and Al-Khadha suggest as marketing efforts to stimulate evermore wants for evermore consumer goods. New products can be presented as compensations for the general powerlessness, frustration, insecurity, domination and struggle of the majority of the population. Here is another major source of duress for many people – the duress of thwarted desires, along with envy and resentment of those who apparently have everything while doing nothing to deserve it.

This stress is then reflected by the employee’s attitude towards their employer or business. One of these attitudes is called rationalised action. Rationalised action can be described with the example that an employee who steals an item rationalises his actions with the fact that the company is making millions but not looking after its workers.

Additionally, many workers in the transport industry are transient, temporary labour hire employees who have no allegiance to the company and are hired because no one else has a desire to complete a four-hour split shift between 2am and 10am or 3pm and 9pm. As such, the risks of theft and damage due to poor handling skills and lack of training is increased tenfold, especially since the turnover of staff is significant and the continual training of these personnel is a large cost burden to the parent company.

Many large transport/express companies have implemented ‘up-to-date’ technology to allow customers to track their consignment over the Internet and to provide internal ‘visibility’ of a specific consignment or item. However, those companies recognise that many employees do not scan the freight for a variety of reasons, including laziness, lack of time or so that the item itself can be stolen. Even those companies that conform to the TAPA convention security standards still suffer losses through theft or compliance failures when employees do not comply with policies or procedures.

Many incidents lack the appropriate security investigation to uncover the root cause so that procedures or strategies can be implemented to reduce the incident or risk of the specific failure occurring in the future.

Recommendations:

  • Provide training on a continual basis for all employees and contractors to maintain their knowledge of scanners, scanning disciplines and scanning compliance requirements.
  • Provide adequate and frequent training of freight handlers to handle the freight in a correct manner to reduce the risks of damage or injury to the freight handler.
  • Provide adequate training of security personnel who are involved in the handling, securing, sorting, scanning and loading of high-risk freight or freight classed under an ‘enhanced security program’ requirement.
  • Provide appropriate training to security personnel/transport staff to enable the thorough conduct of factual investigations and subsequent root cause analysis.
  • Ensure security personnel/transport employees have the knowledge to conduct security audits and risk analyses so as to reduce the risks of theft or shrinkage.

Transport Companies

Transport companies operate under increasing financial challenges caused by the world’s markets, including fuel prices. Various natural disasters, such as the Iceland volcano eruptions, can bring air traffic to a standstill and cost companies millions of dollars.

The profit margins for transport companies are not large. Therefore, freight is moved as rapidly as possible to ensure the highest level of profit and, more importantly, repeat business from a satisfied customer. However, it is this rapid handling of freight that causes process failures to occur. Efficiency versus expedience is always an issue with the movement of freight and a headache to security personnel tasked to investigate missing freight, as expedience will always be put first. Further, the lack of customer service units and/or appropriate security personnel, coupled with the lack of appropriate training, can delay the early detection of lost or stolen freight, which in turn increases the time taken to locate the freight.

Recommendations:

  • Provide appropriate training to employees to equip them with the knowledge and tools needed to conduct inquiries to locate freight or to report freight missing as soon as possible.
  • Provide accessible training tools and workshops, which are cost-effective and do not waste either the employee’s or employer’s time.

Security Companies

With the various security issues experienced across the world and with new challenges being faced every day, numerous security firms have been formed to meet the growing demand for private security as law enforcement agencies are battling to cope with increases in demand for their services.

Many security companies offer security guarding services within Australia and, in a competitive market, attempt to underquote their competitors to win the contract. As a result, these security companies have to reduce their costs, which may include staff wages/conditions and training. This results in the supply of undertrained and unwilling security guards.

The supply of a security guard who is tasked to watch a CCTV system and sit at a guard hut to provide access control to a depot is no longer acceptable or viable. Security personnel now and in the future need to be fully trained in a variety of areas (for example, to investigate losses, understand and use complex electronic surveillance equipment, have knowledge of the transport/logistics industry), be able to multi-task and have a willingness to conduct other transport-related duties such as pallet counts, refuelling vehicles, audits and so on to assist in providing cost effectiveness to the transport industry.

A cheaper service does not always equate to a cost-effective solution. There are security companies that attempt to run with small margins and supply a blanket of security guards at a cheaper rate. Many of these security employees are not paid according to the specific awards and are not trained to an appropriate level. There are, however, competent security companies in the market who are passionate about the security industry and maintain their longevity within the security industry through the provision of a quality security service, which is reflected by their employees.

Recommendations:

  • Source security companies who provide the appropriate level of security services associated or aligned with a registered training organisation and who have transport industry trained/experienced guards to provide the requisite guarding requirements for transport companies.
  • In any hire or tender process, transport companies are encouraged to request references from other transport companies and investigate the incumbent security company to ascertain other evidence of what specialist transport/logistics security services they have provided in the past.

Conclusion

The transport/logistics industry is rapidly evolving and transforming due to many factors, including costs, increasing demand for movement of high-value freight and global security risks. With these changes, the industry must embrace the appropriate high level of security to ensure that their assets, employees and customers’ freight are protected to minimise risks from theft and losses.

The old cliché that security is a cost that cannot be retrieved is a thing of the past. The more savvy transport companies now utilise security services and protection of freight as a selling tool to customers in order to win their business or to increase their bottom line.

Ray Mancini is an internationally known trainer and professional security consultant. He is the CEO of SIG GROUP International Limited, which has been providing security services to the transport industry for the past nine years, with clients such as Star Track, Toll Group, Australian Air Express, Centurion Transport, TNT and the US Navy.

IP Cameras: The Important Specifications For A Security System

ip-cameras-monitorBy Bob Mesnick.

IP camera manufacturers provide product specification sheets that help in the selection of the right camera for individual IP security and surveillance systems. But which specifications are important? They include such things as resolution, minimum light sensitivity, lens, wide dynamic range, signal to noise and so on. The importance of each of the camera specifications depends on the objective and application. For example, the low-light specification is important if the camera is to be used outdoors where it can get dark. If the IP camera will only be used indoors, the viewing angle width may be more relevant. This article reviews the important camera specifications and how to avoid being fooled by ‘specsmanship’ (from the marketing department).

Resolution

This is an important specification. Resolution is usually defined by the total number of pixels in the sensor or the horizontal and vertical pixels. Marketing people also use the terms ‘HD’, ‘720p’ or ‘1080p’ and, most recently, ‘4K’.

  • Megapixel camera: This is a general term used for any camera that has over one million pixels in the sensor. There are many cameras that have over one megapixel resolution. The pixels are organised in a matrix of horizontal and vertical pixels. The relationship between the horizontal and vertical pixels is called the aspect ratio. The aspect ratio (vertical to horizontal ratio) is usually 4:3 or 9:16 (wide). The latest sensors (especially the ones that claim 4K resolution) have different aspect ratios that are similar to the very wide formats used in the cinema market.
  • HD camera: This is more of a marketing term and is defined as either a 720p or 1080p type HD camera. This specification comes from the video broadcast market rather than the security market. The 720p refers to 720 horizontal lines. The ‘p’ indicates that the lines are progressive rather than interlaced. There is only one scan per frame that includes 720 lines. The 1080p HD camera has at least 1080 horizontal lines.

720p cameras usually have a sensor with at least 1.0 megapixels. Pixel resolution is 1280 x 1024, or it can be 1280 x 800. 1080p cameras have at least a 2 megapixel sensor and are considered to be the higher resolution HD cameras. To add to the confusion, some manufacturers call their 3 megapixel or 5 megapixel cameras 1080p as well.

  • 4K camera: This usually refers to a camera with over 8 megapixels of resolution. It has approximately 4,000 horizontal pixels. The number of vertical and horizontal pixels and the aspect ratio are defined differently. For example, Sony announced that their new (coming soon) camera has a chip with 4096H × 2160V pixels, which runs at up to 60fps. Axis announced a camera with 3840 x 2160, which runs at up to 30fps (which is called Ultra HD). The marketing people call all these cameras 4K.

The resolution of a camera is defined not only by the sensor, but also the lens and the electronic circuits. Megapixel IP cameras are sometimes advertised for under $200. Be careful; the sensor may have the megapixels, but the lens may be plastic and the result is a very low quality image.

Minimum Illumination (or Low-Light Sensitivity)

The minimum illumination is the lowest light level (measured in lux) that provides a reasonable image from the IP camera. This can be very subjective and depends on what the viewer thinks is an acceptable image. Low-light images are not only dark, but can also be very noisy.

At the low-light level, the amplifiers are working very hard and there can be circuit noise that affects the video image. This is called the signal to noise (S/N) ratio. The better manufacturers also include the relative level of the signal (IRE), which is a measure of how hard the amplifier has to work. For example, a camera that is operating at 30 IRE is receiving 30 percent of the signal from the sensor circuits, while one operating at 50 IRE is receiving 50 percent of the signal. The lower the number, the harder the amplifier has to work to boost the signal so it can be seen. The noise level can be as high as 20 percent of the signal, so the resulting video can look very noisy when the signal level is very low.

The minimum light level is also affected by the shutter speed, which relates to the frame rate. The longer the shutter is opened, the more light can reach the sensor. The longer the shutter stays open, the lower the frame rate. There are some camera specifications that indicate very low minimum illumination (0.0001 lux), but this is measured at a shutter speed of 0.5 sec. This translates to a maximum frame rate of 2fps.

The minimum illumination level is also determined by the lens. The lower the f-number of the lens, the more light it will let through.

Lens

Many IP cameras come with a lens. A wide angle lens could be used to view a small room, while a narrow angle lens (with more magnification) can be used to see an area that is far away. The lens can also affect some of the other specifications, such as minimum illumination, frame rate and resolution. If the IP camera does not include a lens, it usually includes a standard type CS (or C) mounting capability, so various third party lenses can be used.

  • Lens angle: The lens is measured in millimetres. The lower the number, the wider the viewing angle. A 2mm lens may have an angle of about 110 degrees, while a 50mm lens has an angle of about 5.5 degrees. The angle of the lens depends on the size of the sensor and the distance from the sensor to the lens.
  • Lens light capability: The f-number of the lens indicates how well the light is transferred through the lens. A camera with an f-number of f1.2 can pass more light than one that has an f2.0 lens. The lens angle can affect the f-number– the wider the angle the more light can get in, so the illumination specification is usually measured at the widest lens angle (when a variable lens is included).
  • Types of lenses: There are fixed, variable and zoom lenses. A fixed lens, as the name implies, has only one mm or angle setting. A variable lens can be manually adjusted through a range of angles. A zoom lens is similar to the variable lens, but it can be controlled remotely.
  • Iris: Iris control adjusts how much light falls on the sensor and affects the depth of field. The smaller the iris opening, the longer the depth of field. When the scene is very dark, the lens iris opens and the field of view is reduced. This means some areas that are close or far away are not in focus. There are manual iris controls, DC auto iris and p-iris lenses.
  • Manual iris is manually adjusted and depends on how much light is expected in the scene. A manual iris lens is usually used with indoor cameras where there is a small light variation.
  • DC auto iris lenses are usually used with outdoor cameras. The camera electronics adjust the iris opening depending on how much light it detects. At night it opens the iris and when there is bright sunlight it closes the iris.
  • P-iris lenses are similar to the DC auto iris lens, except they add additional intelligence to the lens opening. When the iris is closed all the way, it can reduce the clarity of the image (when used with megapixel cameras). A p-iris camera system works with the camera electronics to prevent the iris from closing all the way. Conversely, when the view is very dark, the camera tries to open the iris to let in as much light as possible. As the iris increases, the depth of field is reduced. A p-iris lens prevents the lens from opening all the way and compensates by increasing the camera amplification of the video signal.
  • Focus: The focus of the IP camera can be adjusted either by adjusting the lens or by remotely adjusting the distance between the lens and the sensor (back focus). Lenses can have a fixed focus (it cannot be changed) or manual focus. Back focus is not part of the lens, but is usually listed with the lens specification. It makes installation much easier, enabling the focus to be adjusted at the computer instead of at the camera.
  • Infrared (IR) corrected lenses: Lenses bend the light to achieve the right focus and magnification. IR light can bend at a different angle than visible light when the wrong type of glass is used in the lens. IR corrected lenses compensate for the focal difference and provide a much clearer image. This is most apparent at higher resolution.

Special Applications that Require Specific Capability

  • Wide dynamic range: To view an area with challenging lighting conditions, it is best to select a camera that provides good, wide dynamic range (WDR). For example, a camera that either provides back light control or, better yet, WDR, will be needed to view a lobby with a large window. Wide dynamic range has been dramatically improved in the latest cameras. Older cameras provide about 50dB of WDR; newer models provide over 120dB.
  • Frame rate: Frame rates are not particularly critical in most applications, but most megapixel cameras support reasonably good frame rates. What is reasonable? It depends on the application.

Video is very smooth even at 10fps. There are a few applications where higher frame rates may be needed, such as in gambling casinos, or in special testing situations, where there is very fast motion; but in most cases, users can save bandwidth and storage by reducing the frame rate.

In certain cases, the frame rate has to be reduced. For example, frame rates tend to be lower in very high-resolution cameras (over 3 megapixel). The frame rate can also be affected by very low-light situations. By increasing the time that the shutter stays opened, users can improve the low-light performance of most cameras. But be careful; increasing the shutter speed to 0.5 seconds changes the maximum frame rate to only 2fps.

  • Audio: Audio capability can be very important in some applications, such as when connecting an intercom to the camera. In this case, a camera with audio input capability is required. Some cameras have a built-in microphone, but be aware that it is always best to have the microphone close to the person talking.
  • Input and output (I/O): Depending on the application, input and output connections may be required. For example, to release a door lock, an output signal to control a relay that can open an electric lock is needed. To detect that a door has been opened and start recording video, then an I/O input connection to the camera is required.

Summary

Understanding the specifications allows users to select the right camera for their IP camera system; however, before reviewing the specifications, users should fully understand their required application and objectives.

Bob Mesnick is President and owner of Kintronics, an organization specializing in providing network attached IP camera surveillance and security systems. With over 30 years experience in the technology industry, Bob also provides specialist advice on optical storage systems and network attached storage systems. He can be contacted at www.kintronics.com

Introducing the new FLIR IP Range exclusive to QSS

Brand new to Q Security Systems, the new range of IP Cameras and NVR’s from FLIR marks an exciting step forward in the world of CCTV.

 

 

Bride Of ISIS: One Young Woman’s Path Into Homegrown Terrorism

All over the world, young, Western women are slipping out of their bedrooms, giving silent farewells and leaving heart-rending notes to their families, apologising for their sudden disappearances. Girls are leaving from Paris, London, Glasgow, Denver, Sydney and other cities all over the globe. Their stories differ, yet they are the same in many respects. The young girls are usually seduced over the Internet by older men already in the Islamic State (ISIS). Taking flights to Turkey and creeping over borders, they surreptitiously make their way into Syria and Iraq, often leaving little trace.

They leave home for multiple reasons – in a quest for romance, adventure, purity, seeking what they believe is the ‘true Islam’, reacting out of anger over geo-politics and disillusionment with the societies they live in, lured by promises of family, home, even riches if they go to join ISIS – to take part in and build up what they believe will become a utopian society. And those that considered going, but decide not to, may instead opt to ‘stay and act in place’, plotting for or actually carrying out lethal attacks in their own countries. Both types are lethal ladies – brides and servants of ISIS, whose roles are yet expanding and what they are capable of is still not fully understood.

What started as small drips from many places has increased to a steady stream of young women disappearing from their homes and families to later show up as terrorist cadres. Of the foreign fighters currently in Syria and Iraq, there are estimated to be over 500 female recruits, dozens of them from Western countries (Owens, 2015). Women and girls now make up nearly one-fifth of the 20,000 foreign fighters estimated to have gone to fight with ISIS and related groups.

Of the 30 to 60 Canadians that are estimated to have gone to Syria and Iraq, five to seven of these are thought to be women (Amarasingam, 2015). Scores of young Australian women have either gone, or contemplated going, as so-called jihadi brides according to Duncan Lewis, the head of Australian Security Intelligence Organisation (ASIO). “There are 30 to 40 women that are involved in this cohort that we know of, some of whom have been stopped, some of whom have been successful in getting offshore,” Lewis told the Australian Senate in February of 2015 (Owens, 2015).

“ISIS is more aggressively recruiting women than any other terror group has,” Michael Steinbach, the head of the FBI’s Counterterrorism Division, said in February of 2015. “ISIS is luring them by painting a false narrative about what life is like in Syria. We have seen everything from a female fighter – dedicated groups of women fighters – and those who have come over to support foreign fighters by marrying them.” Appearing before the US Senate Judiciary Committee in July of 2015, FBI Director James Comey announced that ISIS is using Twitter and encryption to recruit thousands of English-language followers and send out orders. According to Comey, ISIS reaches 21,000 followers on Twitter, some that are then moved onto encrypted messaging platforms as they are pulled into the terrorist group. “Our job is to look at a haystack the size of this country to find needles that are increasingly invisible to us because of end-to-end encryption,” Comey told the Senate committee. “This is an enormous problem… we are stopping these things so far, but it is incredibly difficult.”

Indeed, young women are being actively lured into ISIS via websites specifically set up for that purpose, through social media and Internet seduction, through chat, text and Skype conversations carried out by a terrorist group that, more than any of its predecessors, is adept at using the plethora of Internet platforms available to reach digitally accessible audiences.

These are the things that the author wrote about in her latest book, Bride of ISIS, describing a Colorado Fusion Center’s staff – US Homeland Security analysts, FBI agents and analysts working side by side as they really do, sorting through braggarts on the Internet and chasing terrorists, as they struggle and race to sort through and determine who is signalling serious intent to move into violent extremism. The book, which is based on a composite of actual cases and inspired by the true story of Shannon Conley (an American teen from Denver, Colorado, who converted to Islam, took the niqab and who ultimately ended up in the clutches of ISIS), Bride of ISIS follows the fictional character of Sophie Lindsay, (another ‘girl next-door’) as she is seduced over the Internet. It wrestles with the questions of why a ‘normal’ American teen would convert to Islam and then try to join a terrorist organisation and how terrorists seduce women over the Internet and lure them into travelling thousands of miles to become their wives.

In the real case, Shannon Conley was arrested in 2014 while trying to board a flight to Turkey with the alleged goal of travelling to Syria to join and marry an ISIS extremist she had met online. Conley believed her Internet mentors that ‘defensive jihad’ was not only permissible, but her duty. She told FBI agents that she believed US military bases, government facilities and personnel, public officials and law enforcement were all legitimate terrorist targets. Trained as a nurse’s aide and in firearms, Conley hoped to either fight jihad in Syria and Iraq, or if prevented from entering a combat role, to assist jihadi fighters. Lured by a romance that she carried out via Skype with an ISIS fighter, Conley was on the road to destruction – until her father turned her in to the FBI.

One of the downfalls of movements like ISIS is that those who get drawn into them often do so because of identity issues. They want to consolidate lagging egos, show their bravado as ‘men’ or purity as women, or be ‘jihadi cool’. This means that when they begin to go down the terrorist’s trajectory, they cannot resist bragging about it on social media, thereby giving out valuable clues to those who can stop them. Shannon Conley endorsed Anwar al Alwaki, a now dead jihadi ideologue, on her Facebook page and made other pro-ISIS statements, giving clues to the FBI of her beliefs. She also showed up at a neighborhood church and looked menacing enough that the police were called. When the FBI tried to talk sense into Conley she told them she was reading a jihadi manual on guerilla warfare and had considered carrying out a VIP attack inside the US. She also made clear that police, military and even civilians could be legitimate attacks in her mind for a terrorist attack.

When confronted with Internet endorsement of terrorist groups, one needs a tool to sort through who may be serious and who is unlikely to actually become a violent extremist. Was Conley serious? Should the FBI act? One way to judge serious intent is to use tools like University of Liverpool Jon Cole’s the Inventory of Vulnerable Persons (IVP) to rate individuals that endorse ISIS to learn what other signs they are showing of vulnerability to becoming violent extremists and then investigate and intervene with the serious ones. This has already been done and works well. Jeff Weyers, a Canadian researcher, identified 300 such persons who appeared to be vulnerable to becoming violent extremists and turned them over to law enforcement. When investigations were conducted, police found explosives, guns and other evidence of terror plots that were thankfully thwarted.

Preventing terrorism can also bring up the thorny issues of sting operations and the potential for entrapment, as well as the potential to miss real terrorists who are staging for an attack. In Bride of ISIS, one young man (also based on a real case) is the target of a sting operation and is caught trying to bomb the US Capitol building with the help of undercover FBI agents. Troubling to some is that he may have been moved more deeply into terrorism by agents that offered him social and material support for engaging in terrorism – without that he may have remained only a braggart. But without them he may also have carried out a successful and lethal attack.

All of these cases – male or females going to ISIS – beg the question of what can be done and how can authorities track violent extremists and figure out who are the dangers? Just as the problem is complex, so are the answers for how ISIS can be stopped. A multifaceted approach is needed.

For one, hotlines, imams and psychologists that can be called on to intervene early are needed. Shannon Conley, for instance, was on the FBI’s radar and agents spoke to her nine different times, but were unable to dissuade her. Finally, her father called and alerted them that she had a one-way ticket out of the country, to join ISIS. Mohamed Sidique Khan, one of the 7-7 London bombers, came back from Pakistan highly radicalised and his family members became concerned, but did not know where to turn for help. Family members often realise when a loved one is radicalising, but they need easier alternatives other than calling law enforcement that can result in something other than arrest – early prevention if possible.

Youngsters can also be inoculated against violent extremism by teaching them about violent ideologies in civics classes before they encounter them on the Internet. It is important to give them a baseline of knowledge and teach that there is no cause that justifies framing problems and their solutions in violent terms, including justifying attacking innocent civilians in terrorist attacks, no matter the cause. A baseline of abhorrence for terrorist ideologies can be created if it is approached creatively at a young enough age.

Many believe Western societies need to wait for Muslims to delegitimise terrorists’ claims. In fact, Western societies can use their own marketing and persuasion skills to fight the terrorist ideologies. They just need to be as slick, emotional based, knowledgeable and savvy as the terrorists are. And using tools like the IVP, authorities can track and rate the vulnerability of individuals moving into extremism and stop them before they attack. The important thing is, as ISIS gets more sophisticated, authorities and society in general must have the will and the smarts to get out in front of them and prevent and thwart potential attacks.