Advertisement
Home Blog Page 111

Reputation Risk And The Cyber-Enemy Within

hack-320At a time when organisations worry about cyber-security threats from hackers, criminals, competitors and foreign governments, many fail to properly recognise the operational and reputational risk from insider security breaches.

This was highlighted last month when a disgruntled 26-year-old IT engineer appeared in court in Melbourne after he hacked into his employer’s mainframe computer because he felt he was ‘under appreciated.’ His defence claimed he planned to appear a ‘hero’ by demonstrating his skills in restoring the system.  But the Magistrate didn’t see it like that and denounced his “pernicious, vile and vicious” act.

Similarly, last year the UK supermarket group Wm Morrison had payroll information and bank account numbers of 100,000 staff stolen by an employee and posted online.  In that case the reputational damage for Morrison’s was further compounded by the fact that just weeks earlier the Bradford-based company’s former Group Treasurer was charged with two counts of insider dealing after trading in shares of an associated company before a major announcement.

Despite the current rash of headline-grabbing major data breaches by activists and criminals – think no further than the hack attack on Sony – assaults by insiders are far more prevalent.   The latest PwC cybercrime survey of security, IT and business executives shows that total security incidents detected by respondents increased 48% year on year, with those caused by current or former employees being by far the largest category. The report found that the percentage of respondents who point the finger at current employees rose by 10%, and almost one third of respondents said insider crimes were more costly and more damaging than those perpetrated by outsiders.

When it comes to damage, it’s easy to forget that two of the highest profile cyber-breaches in recent years were committed by insiders.  Private Bradley Manning walked off-base with classified military information and gave it to Wikileaks, and Daniel Snowden stole and released millions of sensitive files while working for a defence contractor.  Yet amid all the resulting panic over issues of national, political and military security, both these notorious cases were basically insider breaches by employees, albeit that they caused massive damage.

And it’s this fear of exposure to potential damage which helps ensure the full extent of insider attacks is largely hidden from public view.  In fact, 75% of the respondent in the PwC cyber crime survey said they did not involve law enforcement or bring legal charges in compromises committed by insiders.

The desire to avoid embarrassment and adverse publicity is understandable, yet organisations remain highly vulnerable.  The PwC report found less than half of respondents (49%) said they had a cross-organisation team which regularly convenes to discuss coordinate and communicate about issues involving information security.  With insider cyber-attacks on the rise, the risk of reputational damage or an operational crisis is very real, and this threat demands a much higher level of management commitment and communication planning.

Honoring Our Heros

Australian Security Medals Foundation (ASMF) Gala dinnerThe Australian Security Medals Foundation (ASMF) has once again celebrated the achievements of outstanding personnel in the security industry at its annual Gala dinner and awards night held this year at the Australian War Memorial in Canberra on Friday July 19th.

Each year, the ASMF, through nominations submitted by both members of the security industry and the broader community, identified and awards two categories of medals:

  • The Australian Security Medal of Valour (ASMV), recognising acts of bravery and initiative; and
  • The Australian Security Medal (ASM), recognising contribution to security professionalism and providing examples of outstanding citizenship, positive leadership, insights or influence at a strategic management level.

This year, the Australian Security Medals Foundation awarded five Australian Security Medals for Valour. Recipients included:

  • Matthew Newman – for his bravery and quick thinking in protecting innocent bystanders from a knife wielding offender at a local Sydney shopping complex
  • Jye Nevins – for his quick actions in helping police detain an armed offender, despite receiving knife related injuries in the process
  • Emir Balicevac  and Gary Jannese – for their calm and professional actions, demonstrating not only bravery but also extraordinary compassion in saving a young a man’s life who was both intoxicated and highly agitated and intent on self harm.
  • Charlie Erdogdu – who without hesitation acted to stop a man in a busy Sydney mall who, while in a highly agitated and disturbed state, had dowsed himself and the area around in in kerosene with the intent of setting himself and other alight.

The foundation also awarded five Australian Security Medals to distinguished individuals including:

  • NSW Police Deputy Commissioner Nick Kaldas – for his years of support to the security industry, working behind the scenes to foster greater relationships between private security and police.
  • George Zeitoune – for outstanding efforts working with the community in his role as a security professional to assist young men and women through community programs he has pioneered.
  • Neville Kiely – for his consistent committed over the years to getting the security industry and its customers to adopt a standard-based approach to alarm installation and use. As part of his commitment, he has funded educational material for consumers and provided staff to share knowledge with consumers, as well as other security companies in addition to his volunteer work with a number of different industry group.
  • Tom Roche of SNP – for his tireless charity work as well and the role he has played in helping to drive industry standards and develop and mentor new industry leaders through programs such as iLead.
  • Kathy Pavlich – for her decades of work in educating, mentoring and guiding people in the security industry.

For more information about the Australian Security Medals Foundation and current and past recipients, please visit inspiringsecurity.com

 

 

 

HILLS SIGNS UP AS MASTER AUSTRALIAN VIVOTEK

SurveillanceHills has signed a new agreement to be the master Australian distributor of the world’s leading IP surveillance solution brand, VIVOTEK from 1 July 2015.

Daniel Lee, Head of Hills CCTV and IT practice welcomed the VIVOTEK range to the Hills stable of camera products and will mark the new alliance with a VIVOTEK showcase at the upcoming ASIAL security show in Melbourne.

“We are committed to meeting the diverse range of customer needs which is why we are delighted to bring VIVOTEK to our range.

“Hills is proud to be able to offer our customers one of Australia’s biggest ranges of network camera options,” Daniel Lee said.

VIVOTEK is pleased to work with Hills as a distributor in the Australian market: “Both Hills and VIVOTEK are committed to deliver innovative, best in class surveillance products to customers.
“Hills is a strategically important partner of VIVOTEK. As its expertise in surveillance products and channel management, we believe both companies can be benefit from this partnership.” says William Ku, Vice President, VIVOTEK.

In addition, HILLS will showcase the industry-leading surveillance solutions of VIVOTEK during Securing Expo, including the Ultra-Megapixel fisheye network camera, FE8391-V; the 5-Megapixel mini fisheye network camera, FE8180; and the world’s first PoE switch with IP surveillance management functions, VivoCam PoE switch.

Do Directors Really Know What Duties They Owe Under The Law?

It is amazing how many people in the security industry open businesses based on the idea ‘I can do it better’. While entrepreneurial spirit is a great thing, those same people often do not give a great deal of thought to the ramifications of taking on the position of director of a company.

Source of Directors’ Duties

Duties are imposed on directors through a number of sources, including:

  • statute or legislation
  • case law or court-made law
  • the constitution of the company.

Statute or legislation refers largely to the Corporations Act 2001 (Commonwealth) (the Act) which is an Act of Parliament that sets out various legal provisions, including directors’ duties and penalties applicable if those duties are breached.

Case law (also known as common law) is law created by courts. Often such laws arise where there are gaps in the legislation/statute and when the courts are called upon to define how statute should be applied to particular cases.

The company constitution is the document which sets out various rules that apply in relation to the particular company. The provisions of a standard constitution are often adopted from legislative provisions.

Due to the substantive nature of the above matters, this article only explores those duties on directors which are imposed by legislation.

Who is a Director?

Section 9 of the Act defines a director of a company or other body as including:

  • a person who is appointed to the position of director or alternate director regardless of the name that is given to his or her position, and
  • most importantly and interestingly, a person who is not validly appointed as a director, but either:
  • that person acts in the position of a director, or
  • the directors of the company or body are accustomed to act in accordance with that person’s instructions or wishes.

Therefore, even the statutory definition of director means that people other than those who are clearly appointed as being one can still be viewed as owing the duties of directors under statute/legislation and case-made law.

Statutory or Legislative Duties Owed by Directors

  1. Section 180 (1) – Duty of care and diligence and the business judgment rule

This section requires a director or other officer of a company to exercise his powers and discharge his duties with a degree of care and diligence that a reasonable person would exercise if they:

  • were a director or officer of a corporation in that corporation’s circumstances, and
  • occupied the office held by, and had the same responsibilities within the corporation as, the director or officer.
  1. Section 180 (2) – The business judgment rule

This section states that a director or other officer of a corporation who makes a business judgment is taken to meet the requirements of section 180 (1) and his equivalent duties at common law and in equity in respect of a judgment if he:

  • makes the judgment in good faith for a proper purpose, and
  • does not have a material personal interest in the subject matter of the judgment, and
  • informs himself about the subject matter of the judgment to the extent that he reasonably believes to be appropriate, and
  • rationally believes that the judgment is in the best interests of the corporation.

A ‘business judgment’ is taken to be any decision (including to omit to do something) relating to the business operations of a corporation.

It is not sufficient for a director to simply deny being aware of the risks of having the company transact in certain ways without having carried out due diligence or informed himself of the risks of the transaction.

  1. Section 181 – Duty of good faith

Section 181 (1) of the Act states that a director or other officer of a corporation must exercise his powers and discharge his duties:

  • in good faith in the best interests of the corporation, and
  • for a proper purpose.

A director might be found in breach of this provision even if he believes that he is acting honestly.

  1. Section 182 – Duty not to make improper use of position

Section 182 (1) of the Act states that a director, secretary, other officer or employee of a corporation must not improperly use his position to:

  • gain an advantage for himself or someone else, or
  • cause detriment to the corporation.

A director can be found in breach of this duty even if he or another person does not in fact receive some form of benefit or cause some form of loss to the corporation if he is found to have conducted himself with the intention and purpose of obtaining the benefit or causing the detriment.

An example would be where a director uses information which he learned through his position in the corporation (and which was not public knowledge) to have the company engage in a transaction which benefitted himself or his family. A well-known example would be what is commonly referred to in the media as insider trading.

  1. Section 183 – Duty not to make improper use of information

Section 183 (1) of the Act states that a person who obtains information because he is, or has been, a director or other officer or employee of a corporation must not improperly use the information to:

  • gain an advantage for himself or for someone else, or
  • cause detriment to the corporation.

Again, regardless of whether an advantage is obtained or a detriment is caused, a director or former director can still be found in breach of this duty if he has the intention and purpose of obtaining such an advantage or causing detriment. Again, insider trading would fall into this type of category.

  1. Section 184 – Criminal offences

Directors can also become liable for criminal offences under the Act in certain circumstances. The penalties for criminal offences tend to be more severe and can involve imprisonment. The main penalties for criminal offences arise under section 184 of the Act. The following is a summary of the types of scenarios in which criminal liability can ensue.

  • Where a director is reckless or intentionally dishonest and fails to exercise his powers and discharge his duties:
  • in good faith in the best interests of the corporation, or
  • for a proper purpose.
  • Where a director uses his position dishonestly:
    • with the intention of:
    • gaining an advantage for himself or someone else, or
    • causing detriment to the corporation, or
    • recklessly as to whether the use may result in him or someone else:
    • gaining an advantage, or
    • causing a detriment to the corporation.
  • Where a person obtains information because he is or had been a director or other officer or employee of a corporation if he uses that information dishonestly:
    • with the intention of:
    • gaining an advantage for himself or someone else, or
    • causing detriment to the corporation, or
    • recklessly as to whether the use may result in:
    • him or someone else gaining an advantage, or
    • causing detriment to the corporation.
  1. Section 588G – Duty not to trade whilst insolvent

Section 588G of the Act also imposes a duty on a director to avoid the corporation trading whilst insolvent. A corporation is deemed to be insolvent when it is unable to pay its debts as and when they fall due and payable.

A director will be in breach of this duty if:

  • he is or was a director of the corporation at the time it incurred a debt, and
  • the corporation was insolvent at that time or becomes insolvent by incurring that debt, and
  • at the time of incurring the debt, there were reasonable grounds for suspecting that the company was insolvent or would become insolvent as a result of incurring the debt.

However, the following defences are open to such a director:

  • where it can be proved that, at the time that the debt was incurred, that the person had reasonable grounds to expect, and did expect, that the company could pay its debts as they fell due and became payable and that it would remain in that position even if it incurred the debt.
  • where the person, at the time that the debt was incurred had reasonable grounds to believe and did in fact believe that:
  • a competent and reliable person was responsible for providing adequate information about whether the company was solvent, and
  • that other person was fulfilling that responsibility, and
  • on the basis of the information provided that the company was solvent at the time and would remain solvent upon incurring that debt and any other debts at that time.
  • in the case of a director, where at the time that the debt was incurred by the corporation, that director did not take part in the management of the company because of illness or for some other good reason.
  • if the director took all reasonable steps to prevent the corporation from incurring the debt.

So, in summary, becoming a director of a company has many implications. For that reason, it is imperative that anyone taking on this role is aware of those duties and responsibilities so that he at least has the knowledge to hopefully avoid situations that may lead to a breach of any of those duties.

Half Aussie IT Managers Report Weekly Cyber Breach

A new report released today by Centrify Corporation reveals that nearly half of Australian IT managers believe their organisations experience attempted data breaches every week.

While major breaches at iconic brands like Sony and Office of Personnel Management in the US make headlines, Centrify, the leader in securing identities from cyber threats, commissioned the survey to evaluate the frequency of breaches on organisations that do not make the front page.

Results show not only that corporations are vulnerable to attack, they validate Centrify’s hypothesis that protecting identity is at the heart of protecting data.

The survey reports that 46 per cent of IT managers believe their organisations had experienced an attempted security breach in the previous seven days. Incredibly, 13 per cent — one in eight — believed that such an attack had occurred in the previous 60 seconds.

Reflecting this concern, a majority of these IT managers (56 per cent) nominate security as their biggest concern for the next year, closely followed by cloud computing (55 per cent). The third most pressing concern was mobile applications and management (21 per cent).

The survey of more than 100 IT attendees at last month’s AusCERT event aimed to find out if corporations are as secure as they need to be. These Australian findings tally with the results of Centrify research undertaken in the US and the UK where security is also a leading concern. Centrify has a well-established presence in Australia and New Zealand, with clients ranging from small businesses to large corporations and government agencies.

Centrify Senior Director APAC Sales Niall King said the survey findings reinforced what customers were telling Centrify. “The combination of cloud computing and mobile access is creating incredible security headaches for organisations globally.”

“Because Australia is an early adopter of technology, our IT managers are already feeling the stress of defending against the vulnerabilities created by this convergence of mobility and ubiquitous access.”

“At Centrify, we believe that identity is the new perimeter. The good news is that with the right tools in place, you can protect your organisation against unrelenting attacks,” he continued.

A clear finding from the survey is that most IT managers (83 per cent) are as concerned or more concerned about security breaches at their organisations than they were 12 months ago. Only five per cent are less concerned.

Mr. King said Centrify was committed to providing organisations with the tools they needed to secure an evolving corporate perimeter. “The challenge is that today’s corporate perimeter has nothing to do with physical headquarters and contains data that resides in the cloud and on the numerous devices employees and contractors use in the field,” he said.

“As employees reach for the cloud or their mobiles to get their jobs done, it opens up greater security vulnerabilities. As a result, there is greater need than ever for unified identity security across multiple devices and platforms. It’s our hope that this survey helps convince IT decision makers to take steps now to enhance identity management before hackers find holes and exploit them.”

For media assistance in Australia, call John Harris on 08 8431 4000.

About Centrify

Centrify strengthens enterprise security by managing and securing identities from cyber threats. As organisations expand IT resources and teams beyond their premises, identity is becoming the new security perimeter. With our platform of integrated software and cloud-based services, Centrify uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data centre. The result is stronger security and compliance, improved business agility and enhanced user productivity through single sign-on. More than 5000 customers, including half of the Fortune 50 and more than 80 Federal agencies in the US, leverage Centrify to secure identities. Learn more at www.centrify.com

Our mailing address is:
Impress Media Australia
Box 95
Adelaide, SA 5000
Australia

Icom IP100 H

We look at Icom’s compact, yet powerful IP100H WLAN or IP radio system. Measuring only 95 mm high (~3.7 inches) and weighing 205 grams, the IP100H is one of the smallest professional radios on the market.

Canon VBR11

We review the VBR11, the latest Indoor Speed Dome Network Camera from Canon ideally suited to virtually any indoor environment requiring maximum visual coverage.

Vintech Systems launches Bluetooth Low Energy into the Australian Hospitality market.

vintechEver since RFID technology found its way into off-line battery operated locks, the market has driven the guest experience to the next level, trying to enable a faster check in process at the hotel / accommodation site.

Vintech Systems is now able to introduce true BLE functionality across its full range of locks and other devices. With the development of a seamless secure KABA “Legic Connect” tunnel, the encrypted locking package of data can be sent to any mobile device. Having first registered the device with the properties PMS (property management software), a simple to use but very secure app can be downloaded allowing the use of the BLE functionality of the device to communicate with the lock.

Using a very low energy wake up field, battery life of the locking device isn’t effected and the guest benefits from avoiding check-in queues. Additional BLE wall panels around the property and in the guest’s room allows even further integration and functionality. Not only tracking the guest’s phone, but allowing the operation to send messages to their guests according to their location and activities, as well as the ability to control lights and other services such as air conditioning according to real room occupancy.

For more information on BLE technology, please contact sales@vintech.com.au

 

The OSPAs are coming to Australia

The Outstanding Security Performance Awards, the OSPAs, have been launched in Australia.

The OSPAs is a worldwide scheme for recognising outstanding performers in the security sector. They have been launched in Norway and Germany too and other countries are about to follow. Australia is at the forefront.

The OSPAs are already supported by ASIAL, ASIS Australia and the Security Professionals Registry (although the OSPAs is independent of all groups) in an initiative that is designed to unite the security sector in celebrating the success of its outstanding performers.

The idea is based on a research study which highlighted the difficulty of recognising outstanding performers in the security sector. Other industries have awards that are universally applauded, the BAFTAs in acting, the Tonys in theatre, and now the OSPAs are designed to fill that gap in security.

They are set to bring new life to security excellence. In due course the winners of OSPAs for each category in each country will enter a worldwide OSPAs. In this first year of the OSPAs there are 9 categories open to enter in Australia. They are:

  • Outstanding In-House Security Team
  • Outstanding In-House Security Manager
  • Outstanding Guarding Company
  • Outstanding Security Consultant
  • Outstanding Customer Service Initiative
  • Outstanding Security Training Initiative
  • Outstanding Security Installer
  • Outstanding Security Partnership
  • Outstanding Investigator

Anyone can enter the OSPAs. The entry form for the 2015 Australian OSPAs is being administered by ASIAL who are working in partnership with the OSPAs. You enter the awards via the website. Entering is straightforward and you are required to answer two questions with a word limit of 500 for each, so it is not onerous.

Professor Martin Gill who founded the awards said:

‘The OSPAs are completely independent of any association or group. Indeed, the guiding principles of the OSPAs are that they are independent, credible, respectable and transparent. In different countries the security sector is coming together to celebrate success in what is a worldwide initiative. If you know an outstanding security performer or you are one please do consider the awards.’

Keep up with our latest news and updates on Facebook page: www.facebook.com/theOSPAs and the Twitter page: www.Twitter.com/theOSPAs

 Entry details are available at the Australian OSPAs website: www.au.theospas.com

 For further information: email Jo Ramm; j.ramm@theospas.com

 

 

SALTO to show new access control innovations at Security 2015 Melbourne

SALTO New access controlSALTO Systems will present the newest additions to its world class access control platform at Security 2015 (stand A20) which returns to Melbourne, Australia 15-17 July, for the first time in more than a decade.

Australasia’s premier security industry event, the Security Exhibition & Conference will provide the perfect showcase for SALTO to present its state-of-the-art wire free access platform to specifiers, installers and end users from Australia and a host of Pacific Rim nations.

In a world where everything is getting smarter, people are looking for new solutions that make sense in an increasingly digital world. They want to substitute mechanical locks with secure electronic products, creating keyless buildings that are smart to own, operate and manage. We can help facilitate this as every day in over 90 countries, over 15 million people use SALTO products to provide total control over who is able to access what, where and when at all times.

SALTO new access controlSALTO will be demonstrating its innovative JustIN mobile solution that allows smartphones to be used as access control credentials, the XS4 Mini smart lock which is being shown for the first time in the Australian market, the new CU4000 wall reader, new ProAccess SPACE software and much more.

Jennifer Stack, Vice President Marketing SALTO Systems, says “We want to become the class leaders for wire-free access control solutions in Australia and beyond and Security 2015 Melbourne will to help us achieve that aim. At the event we will be showing a new generation of products that are both technically advanced and offer a multiple range of capabilities that deliver real benefits to both customers and end users alike.”

About SALTO Systems

We’re driven by innovation. Guided by our insights into customer needs, we deliver industry-leading, next-generation electronic locking solutions without wires and without mechanical keys. Since 2001, SALTO has been redefining the access control world by continually being first to anticipate market needs in a rapidly evolving marketplace. We set new standards in security, manageability and scalability.

SALTO’s pioneering SVN platform provides stand-alone networked locking solutions. With its online and real-time technology, our market-leading XS4 platform enhances the usability of every building environment by securing virtually every door and enabling the monitoring and control of every user. Salto hardware and software can be networked without wires to provide real-time intelligence and instant control, whilst enabling integration with existing systems to improve manageability and enhance end-user experience.

Having revolutionised access control around the world in sectors where security is critical – from airports and healthcare to government education and hotels – we continue to deliver the most advanced and flexible electronic locking solutions in the market.

 

Last chance to register for the 30th annual Security Exhibition & Conference

pic2Faced with industry innovation and evolving technologies, security professionals are being urged to to attend the 2015 Security Exhibition & Conference, Australasia’s premier security industry event.

With just 10 days to go until the event, which returns to the Melbourne Convention & Exhibition Centre from July 15 to July 17, Security 2015 Event Manager, Alanna Phillips, encouraged anyone looking for an edge in the industry to register now or risk falling behind on the latest business security solutions.

“The Security Exhibition presents a yearly opportunity to connect with the best in the industry while discovering and experiencing the latest products and innovations to hit the Australian marketplace relevant to access control, surveillance, fire and safety, biometrics and IP networking,” Ms Phillips said.

Now in its 30th year – a testament to the event’s unmatched success – Ms Phillips said, the 2015 event was expected to be the biggest yet.

“With more than 4,500 attendees set to connect with 140 leading suppliers in the security industry, including industry heavyweights Interlogix, Chubb, Central Security Distribution, Hills and Honeywell, the Security Exhibition should be a fixture on every security professional’s calendar,” Ms Phillips said.

Learn from the best at a choice of two educational programs

As well as featuring leading suppliers, the 2015 event gives attendees the chance to hear from industry experts through two seminar programs – a conference program hosted by the Australian Security Industry Association Limited (ASIAL), and the free educational Security Seminar Series.

The ASIAL Conference Program, which is a two-day conference for security end-users, features a world-class line-up of experts including Bryce Blythe, Chair of Crisis Management International in the US, and Dave Komendat, Vice President and Chief Security Officer of the Boeing Company.

The free Security Seminar Series, which is designed specifically for security installers and integrators, will provide practical advice and education based on current key industry trends.

Discover award-winning innovations

The three-day event will also look at the future challenges and opportunities for the industry, and feature the best new products to tackle these challenges – some of which are in contention for the Best New Product Awards at the Security Cocktail Reception on 16 July. These products include:

·         The Pyronix CLOUD app by Alarm IP Australia, which enables users to control their home security from anywhere in the world using their smart phone

·         The Protrac ID by TourTrac, a real-time reporting and recording device to track tour rotations of security guards, cleaners and maintenance personnel

·         The Gallagher mobile app by Gallagher Security, which means a site can have a greater physical security presence for no additional labour cost by enabling security guards to remotely monitor the site

·         The JustIN Mobile Key Technology by Salto Systems, which allows users to use their smartphone as a key to unlock doors and access areas

·         The Solar Cam by Spectur, which is a solar-powered, high-definition security camera system, providing a security solution for remote sites with no power or internet access such as construction sites and mine sites.

These products and more will be on display over the course of the event.

World renowned security expert, Jason Brown National Security Director of Thales Australia & New Zealand, reiterated the importance of the event to the Australian security industry:

“For 30 years now the Security Exhibition and Conference has delivered an event for our industry that is not to be missed,” Mr Brown said.

“It’s paramount we seize opportunities like this to connect with fellow industry members to keep abreast of the latest happenings and future plans.

“This is especially important in this complex modern environment, where security practices and technologies are evolving at such a rapid rate.”

At the 2015 ASIAL Conference Mr Brown, in his additional role as Australia’s Head of Delegation on Security and Resilience to the International Standards Organisation, will address the current national and international standards for security, business continuity and crisis management, and outline future directions.

pic1To secure your free entry to Security 2015 at the centrally located Melbourne Convention & Exhibition Centre visit www.securityexpo.com.au

Medibank Place integrates security system with business process

Walls of greenery, circadian lighting and workspaces specially designed to accommodate activity-based working are just some of the features of Medibank’s new Docklands headquarters in Melbourne.

Occupied since October 2014, the 16-floor building encourages flexibility, creativity, interaction and staff wellbeing and is also on track to become one of Australia’s most energy and waste efficient buildings, targeting a six-star Green Star rating and five-star NABERS rating.

But a better end-user experience has not been limited to just the work spaces, with early engagement between landlord, building management, architects, technology, facilities management and security teams resulting in an impressively integrated and highly adaptable security system.

Medibank’s Head of Workplace Operations Craig Maroney said that staff experience was the company’s primary driver when developing the new building’s security infrastructure:

“We now have a single security card for each staff member that allows them to do everything, from accessing Medibank’s buildings and carparks, using destination lift systems through to accessing storage cabinets, workspace and exercise lockers and printing from any printer,” Mr Maroney said.

Mr Maroney said Medibank hoped the integrated system would also be rolled out across multiple sites.

“With many Medibank personnel travelling frequently between offices, we wanted a system that would enable predetermined access to other sites, rather than having to waste time in manually signing people in and guiding them through individual building and office processes,” Mr Maroney said.

Medibank decided on HID CRESCENDO iCLASS MIFARE, a card that allows up to 12 different technology systems to be encrypted on to the one card, meaning Medibank’s printers, lockers, storage, technology, lift and building access systems across multiple sites are all accessible.

A collaborative approach between facilities management, IT and suppliers from the outset made the project possible, plus has resulted in business and cost efficiencies, a much higher standard of basic security as well as useful data collection.

“Having established a base security system that works for us we are able to specify to greater detail what we want from new technology, requesting that all equipment and systems be compatible with this one card,” Mr Maroney said.

The access card has many back-of-house advantages, including more efficient staff on and off boarding processes that can be managed nationally from a central location. It also has RFID technology that supports a third party heat mapping tool, providing facilities management and security teams with quick and easy access to data showing the number of people in each building and on each floor at any one time.

Though the system was initially more expensive than traditional systems, Mr Maroney said Medibank had already started to see some immediate financial savings with other non-financial benefits also being realised.

“The increased level of security has resulted in a reduced risk profile, leading to reduced insurance costs, while having the printer system connected to the card has resulted in an 80 per cent reduction in paper use through forgotten printing,” Mr Maroney said.

Integrated security solutions expert Michael Brookes from Honeywell Security Group said that approaches to security systems, such as that adopted by Medibank, were becoming increasingly popular as businesses look to use one access tool across several business systems to improve business processes.

“Integration is expanding from being solely about security technology. Customers not only want business efficiency, but also want to be able to glean as much useful business information as possible, particularly for larger sites,” Mr Brookes said.

“For example, cameras installed for security purposes can reveal a lot about crowd flow through a facility and effectively work as a sensor for the business to help decide things like where to place advertising, vending machines or ATMs and ultimately link to a potential revenue stream.”

Honeywell Security Group will return to the Security Exhibition and Conference with its Honeywell House exhibit, showcasing the latest in residential and commercial integrated security systems, including the launch of MAXPRO Cloud video appliance and an updated version of its Tuxedo product.

You can register to attend this free event by visiting www.securityexpo.com.au.

THE THERMAL REVOLUTION – A New Way To Look At CCTV Systems

pic1Historically, CCTV systems have been installed for three reasons: to deter people from potentially doing something illegal, because the insurance company insisted and to record events of what has already happened. But imagine being able to actually prevent incidences from happening rather than just record what did happen.

It is easy to justify the purchase an expensive piece of equipment if, when it is installed, it starts making money. However, as CCTV systems often do not create profit and rarely add to the bottom line of a business in the short term, they can sometimes be a tough sell. There is no question that they help create a safer environment and can provide evidence to the authorities of activities that have already occurred. Furthermore, CCTV can assist greatly when faced with a public liability claim or an occupational health and safety issue with staff members. However, CCTV systems often create the most value for end-users by providing recorded images that can save an end-user, such as a shopping centre, millions in damages. This is assuming, of course, that the system is working.

Unfortunately, most CCTV systems are poorly maintained and rarely serviced. Invariably, when something does happen, a user accesses the system to extract footage only to find either the system has not been working or the images are of such poor quality that he or she cannot identify anyone or anything.

Over the last 20 years, the industry has gone through multiple technological revolutions – from VCRs to DVRs fifteen years ago, from analogue CCTV cameras to digital megapixel IP cameras over the last five years and now the migration from physical matrix switching systems to software-based video management systems (VMS). All of these changes have been built around the desire for higher resolution images combined with longer recording times. However, none of these improvements address the fact that a standard CCTV system is designed to record events that have already happened.

That said, recent developments in some specialist areas of CCTV have made it possible and affordable to enhance CCTV technology in order to identify and prevent incidences from happening. Early warning detection systems (EWDS) traditionally consisted of blind technologies such as electric fences, bollards, photo electric beams, microwave sensors and the like. The integration of thermal cameras, combined with analytics, IP cameras and a back-end VMS all linked to lighting, speakers and mobile devices can transform traditional blind EWDS into a pre-emptive tool that enables users to not only be aware of a threat, but actually see the nature of the threat. This type of design changes the way the industry should look at CCTV systems. It turns CCTV from a reactive tool providing historical evidence into a proactive system that can prevent things from happening.

Originally developed for military applications, thermal technology has, until recently, been a somewhat expensive technology. However, with defence contracts drying up globally, companies that have traditionally catered to defence and military requirements have shifted focus, creating commercially attractive thermal products for use in everyday CCTV applications. This has given rise to an increase in production volume, which in turn has seen a reduction in the cost of thermal technology. For example, as recently as five years ago, a 640 x 480 resolution thermal camera would have retailed for approximately $20K. Depending on the type of lens being used, that same level of technology today is available for less than half that price. The 320 x 240 resolution thermal cameras – still capable of seeing great distances – are half that again. As such, security consultants and managers need to better understand the capabilities of thermal cameras as this technology has the capacity to change the way they think about and deploy normal CCTV systems. When used in conjunction with analytic software, perimeter cameras can detect and trigger an alert if someone is approaching the premises anywhere from 50m out to 2km if required. This alert can then be acted upon to stop an event from occurring if a guard is on-site or if he is linked in with a speaker system on site.

Obviously, early warning perimeter protection cameras are not for everyone. There are, however, a number of vertical markets such as mining, critical infrastructure, air and sea ports, large logistics warehouses, search and rescue, rural fire, police, solar farms, councils, oil rigs, refineries, universities, military installations and government departments that can benefit from this type of technology. This technology certainly comes into its own when there are large open spaces in remote locations that need to be monitored. Thermal can provide cost-effective, invisible, long-range perimeter protection in areas lacking lighting or power. Most thermal cameras run on low power, enabling the use of a small solar panel on a trailer if cabling is not an option.

Aside from its obvious applications in perimeter protection, where else might thermal imaging provide benefits for security professionals? Some real-world examples of outside-the-box applications include:

  1. To monitor compost heaps in large sheds on rural properties. Believe it or not, compost can heat up in the middle of a large mass, leading to spontaneous self-combustion. Farmers have lost sheds worth $100,000. In this scenario, a thermal/radiometric (thermal camera that assigns temperature and colour to a scene) would detect the heat build-up and be able to alert the farmer of an impending fire.
  2. To monitor laundry. As strange an application as this may sound, there have been documented instances of heat building up in the middle of a pile of freshly dried clothes/linen, causing the pile to catch fire and burn down the laundromat. The same can occur in garbage and recycling plants.
  3. To locate buried bodies. Although thermal will not see through anything, it can detect a temperature difference between land that has not been disturbed and an area of land that has been dug up. The emissivity of the two areas will be different.

Some other uses for thermal imaging technology include using the thermal core and putting it in an unmanned aerial vehicle (UAV) to look for cattle on a property as well as identifying fires or electrical heat build-up in power lines. Obviously, this type of technology has created an advantage in military applications as well, enabling troops to see where the enemy is situated by flying the UAV over the battleground and looking at the thermal image transmitted on a monitor.

Some CCTV purists have an issue with thermal technology due to its limitations. It cannot identify someone. CCTV has traditionally been about resolution and identification, hence the push for megapixel cameras and hard drive recording. This might make sense in a banking environment, as well as business or retail applications. However, thermal cameras are not designed for these applications. Thermal technology is designed with early warning detection in mind – mainly external, long-distance applications where it does not matter who it is – just that someone is there when he is not supposed to be. Thermal can cut through smoke like it is not even there. Fog, sandstorms and foliage are not a problem either. People and animals will stand out in any of these situations with a thermal camera, day or night.

As mentioned, typical external detection to date has comprised photo electric beam and microwave sensors. These technologies are good; however, they are prone to false alarming whenever a rogue animal is wandering or the wind blows with any force. Another advantage of thermal is no false alarms. An image of the perimeter can be sent to a phone and security personnel will be able to tell the difference between a man and a dog. The wind does not affect the camera in any way whatsoever and intruders cannot jump over it like they can a beam.

How does thermal work – every living thing and inanimate object will absorb and emit energy (which is normally measured as temperature and referred to as heat) at a different rate. The emitted radiation will vary depending on the object that is transmitting whether it be a human, a desk, a pen or a TV as every object gives off a different about of energy or heat. Thermal cameras are able to identify and analyse the temperature differential between objects in a scene, and radiometric cameras can actually assign a temperature value to everything in that scene.

The key to the success of thermal imaging is camera placement. Thermal technology works on picking up emitted radiation (object heat) at distance. If you are looking at full bodied fixed cameras, you need to design the perimeter so there are no holes through which a perpetrator might slip past cameras. Having the cameras all pointing in the same direction from inside the perimeter, with the right distances between each camera, will ensure there are no holes in your perimeter.

There are a multitude of thermal technologies to help secure a site that encompasses a variety of challenges, including but not limited to, a large land mass. These include pan/tilt thermal cameras with digital zoom for commercial applications, as well as thermal cameras featuring continuous zoom. However, cameras of that nature often cost over $100K and need to be cooled. There are also thermal and optical combined cameras on the market. While these cameras might be a little more expensive, they provide users with the best of both worlds – optical capabilities for identification of an object or suspect during the day and thermal imaging for early warning detection at night.

There is no doubt that Thermal Cameras are a growth product in the security industry.
Megapixel versions are already on the market and allow significantly improved recognition features as well as exceptional long range performance in poor visibility conditions.
These cameras are still very expensive but can make the difference in finding people in adverse conditions at night and potentially saving lives. As the technology continues to advance and the manufacturing yields improve, thermal imaging detectors will continue down in cost.
Moreover the ability to make the pixel size in the detector array smaller will allow the use of smaller optics, which is now a significant portion of the cost of a thermal camera. Because the lens material in thermal cameras is not glass, but rather Germanium, a “metalloid” in the Carbon Group, it is quite expensive and difficult to manufacture into a lens form. In current uncooled Long Wave Band thermal cameras, the cost of a lens is generally higher than the detector once the focal length exceeds 50 – 60mm. Higher volumes also allows manufacturing savings, but it is not expected to radically change costs in the near term.

In summary, thermal cameras now offer genuinely affordable and usable solutions in the growing commercial security market for specific applications where detection rather than recognition is the paramount. Where day and night operation is essential or where low power (and lighting) are a limiting or preferred options and where seeing through atmospheric obscurants is a necessity.

The Next Generation Of Global Terrorism

pic-1Daesh (Islamic State) and Al Qaeda have been competing violently on the battlefields of Iraq and Syria over the last couple of years – showing no quarter to each other. However, a much more insidious aspect of their enmity – reflecting their respective ambitions to be the pre-eminent jihadist group internationally – involves the competing outreach programs they have both carefully constructed. Daesh has developed sophisticated public relations and media units that are constantly working on new methods to get its messages to an international audience to motivate its current supporters and to attract new supporters and fighters. Unfortunately, it is clear its outreach strategies have been achieving a worrying degree of success.

In the late 90s, security forces became acutely aware of the danger posed to the civilised world by the ‘Afghan alumni’; a large cadre of veterans who had honed their military and terrorist skills in the Afghanistan conflict. This Afghan alumni was subsequently used as a recruitment and resource base by Al Qaeda to export terrorism around the globe, including to Australia and in its immediate region.

The world is now confronted with a new alumni phenomenon, as the scale of the Iraq–Syria alumni will be dramatically larger than the numbers of terrorists that emerged out of the Afghan conflict.

It is anticipated that significant numbers of returned fighters will continue to pursue terrorism in other parts of the globe long after the Iraq–Syria conflict eventually ends. It is critical for a multi-tiered strategy to be developed by political leaders to try to mitigate the public security consequences of this new alumni phenomenon.

The Islamic State of Iraq and the Levant (ISIL), also known as Islamic State (IS) or commonly referred to as Daesh, is an off-shoot from Al Qaeda. It emerged as a part of the insurgency movement that grew up after the 2003 invasion of Iraq and it joined Al Qaeda in 2004. Since at least early 2006, its leadership was represented on the Mujahideen Shura Council in Iraq. However, its leader, Abu Bakr al-Baghdadi, fell out with the leadership of Al Qaeda and, following several months of wrangling, Al Qaeda and its Iraqi group, Jabhat an-Nusra (the al-Nusra Front), expelled al-Baghdadi and his supporters in early 2014.

As a consequence of their split, Daesh and the al-Nusra Front have been at constant war with each other in Syria and northern Iraq. Daesh has been just as merciless in its dealings with its former terrorist associates as it has been in its genocide against its other political or religious enemies, and al-Nusra has responded in kind. They are effectively in competition for members, finances, geographical territory, influence and, as perverse as it sounds, the global leadership of jihadist terrorism.

Al-Baghdadi has adopted a different approach to Al Qaeda based on his determination to stake out territorial gains and create a geographical caliphate – his version of an Islamic state. Following some extraordinary military successes, Daesh currently controls an extraordinary swathe of territory in Syria and northern Iraq. Just as worrying, a number of foreign terrorist groups have switched allegiance from Al Qaeda to Daesh, including terrorist groups in Libya, Egypt and Yemen, as well as Boko Haram in Nigeria and Abu Sayyaf in the Philippines.

Al-Baghdadi is a classic megalomaniac – he now claims political, religious and military authority over all Muslims worldwide (rejected, unsurprisingly, by all credible Islamic scholars and leaders). However, there is a one key factor that is assisting him to progress his vast ambitions – he has access to very significant cash reserves to fund his operations.

Daesh controls significant hydrocarbon reserves and is able to sell its oil products on the spot market through a range of intermediaries in the region (even selling oil to its supposed arch-nemesis the Syrian Government). Estimates of its oil and gas earnings vary from between US$2m and US$3m per day. It has also seized significant cash as it has occupied major cities, including over US$500m of cash and bullion from municipal banks after its forces captured the city of Mosul in 2014. Furthermore, it is estimated that Daesh has received in excess of US$120m in ransom payments for the release of kidnapped persons in the last 18 months.

Daesh is using its financial resources to build a state-like administration and infrastructure. Headquartered in modest circumstances in Aleppo a few years ago, it had significant command and control elements in its de facto capital of Raqqa, Syria, but it quickly decentralised operations as soon as the coalition aerial campaign commenced against its forces and infrastructure. In fact, there is confirmed intelligence that shows it had prepared detailed plans to dissolve its administrative structures into the urban environments of the major cities it occupies well in advance of the aerial campaign.

Within Daesh’s organisational and functional structure is a sophisticated media capability that regularly demonstrates professional broadcast standards and issues material in numerous languages. The al-Fuqan Media Foundation produces many of its more violent videos, including the beheadings, and presents it in a perfunctory newsreader style. The al-Hayat Media Center is even more professional and is aimed directly at western audiences. It focuses on community stories aimed at influencing and seducing the Ummah (the global Muslim community). It uses computer graphics, slow motion, smoked effects and an enhanced colour palate. The outputs from these two ISIL media units are supplemented by a proliferation of amateur social media postings by IS fighters and supporters in Iraq and Syria – using Instagram, YouTube, Twitter, Facebook and other blogs. As social media staff quickly delete Daesh content from their sites, the group has been able to successfully maintain its online presence through a maze of backup and copycat accounts with slight permutations of names and titles.

Overarching all of the ISIL social media content is the Daesh flag-ship digital publication called Dabiq (named after the site where, according to Islamic myth, a final apocalyptic battle will take place). Several editions of this glossy, high production value publication have been issued on the internet over the last couple of years, covering all the major activities of Daesh within the Middle East and further afield.

Among the more interesting characteristics of the Dabiq publication is its sheer chutzpah in claiming responsibility for disparate acts of violence, anywhere in the world, as an IS-directed operation, including the stabbing of two police officers in Melbourne in late 2014 and the Lindt Café siege and hostage situation in Sydney.

However, despite the dubious nature of some of the related claims made in Dabiq, there is no doubt that the digital outreach program of ISIL has impacted on many impressionable or disturbed Islamic youth around the globe. And it must be conceded that even if some of the attacks were not directed by Daesh, the perpetrators had been exposed to and influenced by the material it is placing on the internet. Similarly, there is no doubt that many of the foreigners that have been motivated to leave their homes and travel to Syria to join Daesh have been significantly influenced by the material they had been accessing on the internet.

In April this year, the Victorian and Australian Federal Police (AFP) arrested an 18 year old allegedly planning an Anzac Day attack in Melbourne – he was heavily influenced by ISIL propaganda he accessed on the internet. And, a month later, a 17 year old was separately charged in relation to three improvised explosive devices (IEDs) he was allegedly intent on using in terrorist attacks in Melbourne. The police will allege he had been cultivated over the internet by a jihadist recruiter associated with ISIL.

While the detail of some Daesh claims can be disputed, there is no denying the relative success of Daesh in spreading its messages around the globe and influencing a number of people to support its cause. It is undoubtedly one of the reasons there are now estimated to be nearly 20,000 foreign fighters from over 100 countries in Syria and northern Iraq; that is a truly astounding figure.

To put the figure in context, during the mujahideen struggle to eject the Soviets from Afghanistan – from 1980 to 1992 – it is estimated 5,000 foreign fighters were involved in the conflict. It has of course been well documented that Bin Laden had access to the details of most of the foreign fighters who went through mujahideen training camps and used them as the basis for creating the Al Qaeda global terrorist network.

Many members of the so-called Afghan alumni were adroitly recruited by Bin Laden and his operations chief, Khalid Sheikh Mohammed, and these veterans were involved in every major Al Qaeda terrorist operation, including in Australia’s region. Hambali, the operational commander of Jemaah Islamiyah (JI), who authorised the 2002 Bali attacks that killed 202 people, including 88 Australians, was a member of the Afghan alumni. Muklas and some other key members of the JI team that planned and carried out the Bali attacks were also veterans of the Afghan conflict.

While Al Qaeda is certainly not a spent force as a global terrorist group, it is clear, in just a few short years since it split from Al Qaeda, that ISIL has overtaken Al Qaeda as the major global jihadist group. Its success in recruiting members has been a key factor in that development.

Given the damage that Al Qaeda has caused international security over the course of the last 20 years, empowered by its ability to draw on the 5,000 or so foreign veterans from the Afghan conflict, it begs the question what ISIL might be able to achieve if it is able to draw on the 20,000 foreign fighters who have been trained and blooded in the current conflict in Syria and Iraq?

Many of these fighters will return to their home countries while others, prevented from returning home for a variety of reasons, will stay in the Syrian region or relocate to other parts of the globe. Apart from a quite small minority who might be likely to recant and avoid involvement in future acts of violence, it should be anticipated that this diverse pool of jihadists will, just like the Afghan alumni of a generation earlier, pose a very significant security risk for the foreseeable future.

There are some strategies that need to be carefully formulated to mitigate the potential risk; however, the options all require a considerable level of international cooperation and appropriate resourcing.

The International Criminal Court (ICC), headquartered in The Hague, is the only permanent impartial tribunal empowered to try cases of genocide, war crimes and crimes against humanity. However, the ICC currently has no jurisdiction in Syria or Iraq, as both Russia and China exercised their power of veto at the United Nations (UN) Security Council to prevent the ICC receiving a remit in relation to the conflict, believing the motion was motivated by the US desire to target members of the Assad regime over alleged chemical attacks on the Syrian population.

Individual countries who are members/signatories of the court can give the ICC a mandate to investigate specific citizens. Jordan, Tunisia and several European nations have done so in response to a number of their citizens joining ISIL as foreign fighters. Nevertheless, the senior ICC prosecutor has stated that without jurisdiction being conferred by the UN Security Council, there is no basis for the ICC opening a preliminary examination into the wider assertions of systemic crimes against humanity in Syria and Iraq.

Under the Rome Statute that governs the activities of the ICC, the various national authorities, including from Australia, have primacy to investigate and prosecute their citizens that have been involved in crimes against humanity abroad. The AFP has the lead in those matters, but clearly has an unenviable task to gather admissible evidence in what is, in effect, a war zone. The AFP will be reliant to a certain extent on support and assistance from Australian intelligence agencies, but even then will still find the task extraordinarily difficult; particularly as much of the human intelligence is likely to be deemed hearsay and inadmissible by the courts and some of the technical intelligence will be subject to public interest immunity provisions given its operational sensitivity.

To ensure the serious offenders among the Daesh fighters face justice and are removed as threats to international security, there needs to be a coordinated international strategy to ensure the ICC has a jurisdictional remit to coordinate investigations. Furthermore, all the reputable national law enforcement agencies need to cooperate and share appropriate information. This will require a focused diplomatic effort on the part of Australia and others and some significant commitments on resources and funding.

Similarly, Australian diplomatic resources, the AFP and Australian intelligence agencies are going to need to devote considerable energy to locating where Australian foreign fighters in Iraq and Syria (and those who might be stripped of Australian citizenship) relocate to as and when they depart from the conflict zone. It is inconceivable for Australia to ‘wash its hands’ of these people simply because they have not been brought before a court and/or have not returned to Australia. As well as potentially posing a risk to public safety in the international context, they are likely to continue to pose an ongoing risk to Australian interests from elsewhere in the world. Keep in mind that a number of the Australians fighting for Daesh have made some very direct and violent threats against Australia, the Australian authorities and the Australian public in their emails and blogs.

Based on experience with Al Qaeda and the Afghan alumni that group relied on for so long, it can be expected that the security problems caused by Daesh fighters will consume international security forces for many years to come. It is absolutely essential that considerable thought is given, as early as possible, to strategies to mitigate the related risks – otherwise the problems the world face will be much more severe and the threat could endure for another generation.

Neil Fergus is Chief Executive of Intelligent Risks (IR), an international management services company specialising in the delivery of security, risk and crisis management services. It has delivered projects and crisis response services for government and corporate clients in over 100 countries, including complex assignments for the US Anti-Terrorism Assistance (ATA) Program. Before co-founding IR in 2001, Neil served in senior diplomatic roles in Europe and the Middle East.

Neil is a regular commentator on international security issues for the Nine Network and public broadcasters. He is the author of over 50 articles for professional journals and is a co-author of Security Risk Management for Standards Australia. He has presented on terrorism, security and corruption issues at numerous international conferences, including for the United Nations, US State Department, Europol, ASIS International and APEC SOM. Visit www.irisks.com for more information.

 

Saab delivers Security System for Auckland South Corrections Facility in New Zealand

UnknownDefence and Security company Saab, has delivered an integrated electronic security system for the new men’s prison at Wiri, South Auckland in New Zealand.

The Auckland South Corrections Facility, also known as Kohuora, is one of the most modern corrections facilities in the world and will house up to 960 male prisoners. The security system supports an innovative approach to prisoner management with prisoners progressing within the facility as they come closer to their release date.

SecureFuture was contracted by the New Zealand Department of Corrections to design, finance, build, operate and maintain the new facility, which opened in May 2015. SecureFuture has Fletcher Construction as primary sub-contractor for the design & construction phase of the prison, which contracted Saab for the provision of the state of the art OneView integrated security system.

OneView is a next generation Physical Security Information Management system providing customers with unprecedented levels of security subsystem integration for mission critical infrastructure.

“OneView provides prison staff with a very simple and intuitive user interface in the security control room that allows the efficient management of routine activities and enables quick analysis and response to situations as they arise. Saab’s experience in project management, quality, complex engineering and partnerships with local companies, including our New Zealand partner Advanced Security, maintains our reputation for performance as part of a major construction program,” says Dean Rosenfield, Managing Director of Saab New Zealand.

The successful completion of the security system by Saab follows on from the previous successful delivery of the security system at Southern Queensland Correctional Centre facility in 2011 and the continuing rollout of the OneView system into defence bases and facilities in Australia over the past two years under the Defence Base Security Improvement Program.

 For further information, please contact:

Saab Press Centre,

+46 (0)734 180 018,

presscentre@saabgroup.com