Security Insider Oct/Nov 2012

44
VOL.17 | ISSUE.5 | OCT/NOV 2012 PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION [ MAGAZINE ] THE MAGAZINE FOR SECURITY PROFESSIONALS SECURITY PP255003/02390 61 Smoke detector/sensor installation guidelines Economic crime trends: the era of cybercrime

description

October/November 2012 edition of ASIAL's Security Insider

Transcript of Security Insider Oct/Nov 2012

Page 1: Security Insider Oct/Nov 2012

VOL.17 | ISSUE.5 | OCT/NOV 2012

PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION [ M AG A Z I N E ]

THE MAGAZINE FOR SECURITY PROFESSIONALSS E C U R I T Y

PP255003/02390

2661 Smoke detector/sensorinstallation guidelines

Economiccrime trends: the era ofcybercrime

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 1

Page 2: Security Insider Oct/Nov 2012

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 2

Page 3: Security Insider Oct/Nov 2012

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 3

Page 4: Security Insider Oct/Nov 2012

4 //SECURITY INSIDER OCT/NOV 2012

CONTENTSVOL.17 | ISSUE.5 | OCT/NOV 2012

SMOKE DETECTOR /SENSORINSTALLATIONGUIDELINES

ASIAL StrategicPartners >

26SURVEILLANCEDEVICES - AREEMPLOYERSLOOKING ATALL OFTHE IMPLICATIONS?

32 35

06 | Editor’s message 08 | Private Robert Poate 10 | Security Industry Leadership

Program10 | QLD – Compliance Audits12 | NSW – Cash in Transit NSW

Firearms Registry Announcement

12 | New Police Minister forWA12 | 43rd ASIAL AGM14 | Professional Recognition for

SecurityTechnicians16 | Using technology to simplify

super17 | UK – Survey of the Security

Sector29 | ASIAL New Member Listing 37 | SIG 201238 | Monitoring Centres List39 | Hot Products42 | ASIAL Calendar of events

ECONOMICCRIME TRENDS:THE ERA OFCYBERCRIME

18

THE ROLE OFSECURITYINDESIGNING OUTCRIME

INSIDER_Oct/Nov 2012 Iss5_44pp 25/9/12 7:28 PM Page 4

Page 5: Security Insider Oct/Nov 2012

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 5

Page 6: Security Insider Oct/Nov 2012

6 //SECURITY INSIDER OCT/NOV 2012

The security industry is withoutdoubt one of the more heavilyregulated industry sectors in

Australia.Whilst compliance with legaland regulatory requirements can oftenseem a daunting and overwhelmingtask, failure to have in place compliancesystems and procedures will be to thedetriment of your business.

As a business owner or manager, itcan be all too easy to get caught up inthe day-to-day running of the business,at the expense of spending appropriatetime to plan strategically and maintainhigh governance standards. In anincreasingly competitive businessenvironment expectations are changing.Clients expect faster turnaround timesand more innovative solutions. As aresult, pressure can be placed onproviders to make “quick fix" solutions inorder to secure a client’s business.Often, such decisions can be madewithout a full understanding of theconsequences on other areas of thebusiness, both economic andcompliance related.

As an operator of a security businessit cannot be stated strongly enough howimportant it is that you fully understandyour compliance obligations and have inplace appropriate systems andprocedures. If you don’t, then you needto seek help immediately. Putting thingsoff won’t make the problem go away!

That said, often the hardest step isthe first step. So what should you do?To help you navigate through thecompliance maze, ASIAL’s online resourcecentre – the Centre for Compliance(www.asial.com.au/CentreforCompliance)will help direct you to relevant informationand links.There are many valuableFederal/State and Territory government

web sites and resources that can assistyou in understanding and meeting yourcompliance obligations.

A case in point is a short fictional filmcalled The Marker released recently bythe Australian Competition andConsumer Commission (ACCC).The filmseeks to engage people at all levels ofbusiness and educate them about thedevastating impact that cartels can haveon participants.

Under Australian law, it is a criminaloffence for competing businesses tomake agreements to fix prices, rig bids,share markets or restrict outputs orsupply.

The film shows how cartel activity canruin relationships, careers, reputationsand long term financial security, and mayland guilty parties in jail. It also shedslight on the ACCC’s immunity program,which provides successful applicantswith immunity from court proceedings inexchange for cooperation with ACCCinvestigations.

ASIAL encourages you to view thisfilm (a link to the film can be found atwww.asial.com.au).

‘Compliance’ is not a dirty word orsomething to be feared. Rather, it shouldbe an integral part of how you run yourbusiness to ensure that it operates in asustainable and successful manner.

If you find it all too overwhelming, youcan always call us on 1300 1ASIAL toseek advice and support on yourcompliance obligations.

Remember, advice and support isnever more than a phone call away forASIAL members.

Bryan de CairesEditor

EEDDIITTOORR’’SS MMEESSSSAAGGEE

‘COMPLIANCE’ ISNOT A DIRTY WORD THE MAGAZINE FOR

SECURITY PROFESSIONALS

Editorial and Advertising

Security Insider is published by

The Australian Security Industry

Association Limited

PO Box 1338 Crows Nest, NSW 1585

Tel: 02 8425 4300 • Fax: 02 8425 4343

Email: [email protected]

Web: www.asial.com.au

Publisher

Editor

Bryan de Caires | [email protected]

Editorial Enquiries

[email protected]

Advertising

Tania Laird | [email protected]

Creative Director

Martin Costanzo | [email protected]

Graphic Design + Prepress

Webfx2 Digital | [email protected]

Editorial Contributors

Malcolm Shackell, Andrea Perry, Chris Delaney,

AusSuper and Dr Lindsay Asquith.

Print + Distribution

Nationwide Advertising Group

Published bi-monthly

Estimated Readership of 10,000

Views expressed in Security Insider do not

necessarily reflect the opinion of ASIAL.Advertising

does not imply endorsement by ASIAL, unless

otherwise stated with permission. All contributions

are welcomed, though the publisher reserves the

right to decline to publish or to edit for style,

grammar, length and legal reasons. Press Releases

to: [email protected].

Internet references in articles, stories and

advertising were correct at the time of printing.

ASIAL does not accept responsibility for misleading

views. Copyright© 2012 (ASIAL) All rights reserved.

Reproduction of Security Insider magazine without

permission is strictly prohibited. Security Insider is

a subscription based publication, rates and further

details can be found at www.asial.com.au.

[Next Issue] DEC/JAN 12/13

ISSN 1442-1720

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 6

Page 7: Security Insider Oct/Nov 2012

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 7

Page 8: Security Insider Oct/Nov 2012

8 //SECURITY INSIDER OCT/NOV 2012

IINNDDUUSSTTRRYY NNeWWSS

PRIVATE ROBERT POATEASIAL has passed on itscondolences to the Poate familyfollowing the announcement bythe Australian Defence Force ofthe tragic death on 29 August2012 of their son/brother, PrivateRobert Poate on operations inAfghanistan.

Robert’s father, Hugh Poatewas a long time ASIAL member,Director and Chairman of theAssociation’s ACT branch.

Private Robert Poate was amember of the 3rd Battalion, theRoyal Australian Regiment TaskGroup and was from the 6thBattalion, Royal AustralianRegiment (6 RAR), based inBrisbane, Queensland. Heenlisted in the Army in 2009. Oncompletion of his basic andinitial employment training, he

was posted as a rifleman to 6RAR. Private Poate was a highlyqualified soldier, havingcompleted specialist training asa Protected Mobility VehicleDriver in 2010 and ProtectedMobility Vehicle Commander in2011.

He was known for havingoutstanding leadership potential,which led to him completing apromotion course for Corporal in2011. Private Poate had areputation for creating mischiefwithout getting caught, and wasproud of his family, his militaryservice, his Canberran origins,and his red hair, which hevehemently defended as being‘strawberry blonde’.

He is survived by his parentsand sister.

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 8

Page 9: Security Insider Oct/Nov 2012

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 9

Page 10: Security Insider Oct/Nov 2012

10 //SECURITY INSIDER OCT/NOV 2012

IINNDDUUSSTTRRYY NNeWWSS

Designed specifically for managersand business owners in the securityindustry, the program focuses ondeveloping the skills of the industry’sfuture leaders. Featuring anexceptional teaching faculty, thethree-day program provides practicaland interactive insights into the keyfactors to successfully managing andgrowing a security business.• Day 1: Strategy & marketing• Day 2: Finance for managers• Day 3: Leading and managing

peopleThe program will focus on

developing practical skills that youcan apply at a personal, business andnational industry level.These includean understanding of how to:• communicate effectively• develop high performance teams• drive change• brand and differentiate the product

or service you offer

• manage conflict• identify the key elements that

underpin the financial health ofyour business

• use key principles of financialmanagement to make effectivebusiness decisions

Teaching facultyChris Clark is a strategist, whoteaches corporate strategy andstrategic marketing at MacquarieUniversity, including fifteen yearsteaching on the MBA program of theMacquarie Graduate School ofManagement, where he was until2006 the Director of Corporate andExecutive Education. From 2002-2004 he was director of the MBAprogram. He is also a consultant tosome of Australia’s leadingcompanies, across a wide range ofindustries, who draw on his problemsolving and facilitation skills.

Graham Godbee has been alecturer in finance at MacquarieUniversity Graduate School ofManagement and remains VisitingFellow in the Centre for Money,Banking and Finance at MacquarieUniversity. He has held executivemanagement positions in largecorporates in the roles of businessdevelopment, marketing and finance.

Associate Professor PeterMcGraw is Director of the Labour-Management Studies Foundation anda faculty member in the Departmentof Business, Faculty of Business andEconomics at Macquarie University.

The program will be held in Sydney(23-25 October 2012), MacquarieGraduate School of ManagementExecutive Hotel and ConferenceCentre and Melbourne (19-21February 2013), Melbourne BusinessSchool.

SECURITY INDUSTRY LEADERSHIP PROGRAM

Amendments to the SecurityProviders Act 1993 which came intoeffect in February 2011 provided a rolefor peak security industry bodies totake on a compliance role to assistthe Office of FairTrading in itsregulation of the private securityindustry in Queensland.

As a condition of approval as anApproved Security IndustryAssociation, ASIAL is required toassess compliance of its members tothe Code of Conduct approved by theChief Executive of the Office of FairTrading at least once every 3 years.

ASIAL has appointed a charteredaccountancy firm to conductcompliance audits of its members.Toassist members in preparing for theseaudits, ASIAL has prepared an AuditCompliance Guide which sets out theinformation which we require from youwhen requested.This includes:

• Compliance Audit Overview whichoutlines your obligations and thoseof ASIAL.

• Compliance Audit Form which mustbe completed and returned by thedate requested; supportingdocumentation (including certifiedcopies of specified documentation);a declaration of Compliance; asigned reaffirmation of the ASIALCode of Professional Conduct; anda signed Statutory Declarationstating that the information providedis true and accurate (this must becertified by a Justice of thePeace/Commissioner forDeclarations).All information provided will be

treated strictly in confidence.Members will be notified of the

outcome within 3 months completionof their compliance audit. Ifunsuccessful, members will be

advised of the areas of non-compliance and will be provided withan opportunity to rectify them. Failureto rectify identified non-complianceissues as a result of the audit or failureto complete and return the audit formby the specified date, may result inyour firm being deemed as non-compliant. ASIAL is required to reportto the Office of FairTrading the findingsof each audit.

Should you have any queries aboutthe compliance audit process contactus on 131 ASIAL or [email protected].

QLD – COMPLIANCE AUDITS

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 10

Page 11: Security Insider Oct/Nov 2012

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 11

Page 12: Security Insider Oct/Nov 2012

12 //SECURITY INSIDER OCT/NOV 2012

IINNDDUUSSTTRRYY NNeWWSS

Following enquiries made by ASIALconcerning Firearms businesslicences and references to the CashTransportation (Non-ArmouredVehicles) Interim Award No. 2 Cashlimits, the Firearms Registry hasadvised that:

“Armed Security Firms authorisedto possess and use firearms whilstperforming ‘Cash in Transit’ activitiescurrently have the followingcondition endorsed on the businesslicence, ‘must comply with cash intransit (State) Award including cashlimits.’

On 29 July 2011 the CashTransportation (Non-ArmouredVehicles) Interim Award No. 2 wasterminated consequently thisrequirement is no longer applicable.

However compliance with theWorkCover Cash in Transit Code ofPractice will continue to apply. Itshould be noted, item 3.3.6 withinthis document provides – ‘Cashlimits for each CIT operation are tobe determined in accordance withthe safety and security riskassessment’.

In this regard, all future Risk

Assessments undertaken for eachCash in Transit activity must addressthe cash limits.

NSW – CASH IN TRANSIT NSW FIREARMS REGISTRYANNOUNCEMENT

The Hon Liza Fraser MLA(pictured) has been appointed asthe new Minister for Police andEmergency Services in WA.TheMinister will be ASIAL’s specialguest at its upcoming industrybreakfast briefing in Perth on the19th October.

NEW POLICEMINISTER FOR WA

ASIAL’s 43rd Annual GeneralMeeting will be held on Wednesday,28 November 2012 from 8.45am atthe Mantra Hotel (Cnr Parkes andValentine St) Parramatta.

A ballot for Directors of theAssociation will be conducted bythe Australian Electoral Commissionduring October.

43RD ASIAL ANNUALGENERAL MEETING

As a joint initiative, the AustralasianFire and Emergency ServiceAuthorities Council (AFAC) and theAustralian Security IndustryAssociation Limited (ASIAL) haverecently released smokedetector/sensor installation guidelines.The guidelines have been developedto assist security companies ininstalling, servicing and monitoringsmoke detectors/sensors connectedto security alarm systems in anappropriate manner, withoutrequiring detailed knowledge offire alarm standards, individual

state regulations or building codes. APDF copy of the guidelines can bedownloaded by visitingwww.asial.com.au, alternatively youcan turn to page 26 to view a copy.

Representatives from the variousstate and territory fire services willprovide an update on the guidelinesat the coming series of ASIALIndustry Breakfast Briefings aroundthe country.

AFAC / ASIAL SMOKEDETECTOR/SENSOR INSTALLATIONGUIDELINES

The Security Industry AmendmentAct 2010 expanded the suitabilitycriteria and prerequisitesfor individuals applying for a licenceto work in the security industry.Theamendments included therequirement for applicants to attenda face-to-face workplace information

session about their employmentrights and obligations withrepresentatives of a registeredorganisation (usually union officials).

Following a recent review, the ACTGovernment has decided that theSecurity IndustryWorkplace Informationrequirement should continue.

ACT – SECURITY INDUSTRY WORKPLACEINFORMATION REQUIREMENT

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 12

Page 13: Security Insider Oct/Nov 2012

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 13

Page 14: Security Insider Oct/Nov 2012

Representatives from the FairWork Ombudsman will addressthe upcoming ASIAL IndustryBriefings on FWO’s audit prioritiesand the outcomes of the recentsecurity audit campaign.For more information on theupcoming ASIAL IndustryBriefings around the country, turnto page 42.

2012 ASIAL Annual &Financial ReportASIAL's 2012 Annual andFinancial Report can be viewed atwww.asial.com.au/ar

14 //SECURITY INSIDER OCT/NOV 2012

IINNDDUUSSTTRRYY NNeWWSS

The SecurityTechnicianCertification (STC) program is anASIAL industry initiative to provide atraining course that offersprofessional recognition and anindustry recognised career pathwayfor technicians working in the securityindustry.

The STC credential is a technicalcertification program that coversalarms, access control and CCTV.Through a combination of self-paced study, face-to-face theory andpractical assessments at approvedassessment centres (located inAdelaide, Brisbane, Melbourne,Sydney and Perth), participants arerequired to demonstrate their theoryand practical skills.

Designed to provide a careerpathway for security technicians,the program is also a proactiveinitiative to attract and retainappropriately skilled workerscapable of meeting the futureneeds of the industry. Unitsassociated with the program canbe recognised as competencybased units under the AustralianQualityTraining Framework.

The program incorporates3 levels of recognition:

- Certified SecurityTechnician- Advanced SecurityTechnician- Master SecurityTechnician

Certification benefits for individuals• Professional development - The

acquisition of knowledge and skillsdemonstrates your commitment toself improvement, which increasesyour career prospects in thesecurity industry.

• Demonstrates your industryreadiness – Proves your capabilityand expertise to work within thesecurity industry.

• Career advancement – Supportscareer path development andopens doors.

• Targets and builds upon the skillsyou have as an industryprofessional

Certification benefits for employers• Competitive advantage – provides

a mechanism to recognise staff

expertise and maintain thecurrency of skills.

• Recruiting standard – provides anindustry skills threshold and aneasy way to recognize skillqualifications gained bycandidates.

• Professional development –provides a pathway for thedevelopment and retention ofvalued employees.

• Quality – provides a mechanism toimprove operational efficiency andenhance customer satisfaction.For more information visit

www.securitytechniciancertification.com.au

PROFESSIONAL RECOGNITION FORSECURITY TECHNICIANS

FWO UPDATE

The ACTMinister for IndustrialRelations has signed a Legislative

Instrument that sets the levypayable by employers, at 1.47% ofordinary salaries.

The portable long service leavescheme will come into effect from 1January 2013, with the firstinstallments due in March 2013.Thescheme will apply to all securitymanpower employees (by licensecategory) in the ACT; contributionswill be paid quarterly into the fundand the scheme pays for longservice leave (pro rate) when taken.

ACT – PORTABLE LONG SERVICELEAVE SCHEME

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 14

Page 15: Security Insider Oct/Nov 2012

IINNDDUUSSTTRRYY NNeWWSS

The Licensing & RegulationDivision is extending an invitation toall Private Security BusinessLicence & Registration holders toattend a Private Security BusinessForum.

The Forum will focus on risks thatare currently impacting on securitybusinesses and provide strategiesto assist businesses to minimise

these risks.This invitation isextended to all managers andsupervisors within your securitybusiness. An agenda for the Forumwill be listed on our website atwww.police.vic.gov.au/PrivateSecurity/News and Publications.

The Forum will be held onThursday 25th October 2012(1:30pm to 4:30 pm) in the

Concourse Meeting Room, Adjacentto Tower 4 lifts, World Trade Centre,18 – 38 Siddeley Street, Docklands.

If you would like to attend thisforum please provide your nameand mobile number via email [email protected] by20 October 2012 so that numberscan be recorded for catering andcommunication purposes.

SECURITY INSIDER OCT/NOV 2012// 15

VIC – PRIVATE SECURITY BUSINESSFORUM INVITATION

Nominations will open shortly forthe 2013 Australian Security IndustryAwards for Excellence. Awardcategories include:

Individual• Individual Achievement – General

Security• Individual Achievement – Technical

Security

• Security Student of the Year

Organisational• Security Management• In-House SecurityTeam• Training• Integrated Security Solution

(projects above $250,000)• Technical Security Solution

(projects below $250,000)

• Special Security Event or Project

The awards will be presented atthe Park Hyatt Hotel Melbourne onthe 2nd May 2013.

Further details on the awards areavailable atwww.asial.com.au/awardsforexcellenceor by [email protected]

2013 AUSTRALIAN SECURITY INDUSTRYAWARDS FOR EXCELLENCE

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 15

Page 16: Security Insider Oct/Nov 2012

16 //SECURITY INSIDER OCT/NOV 2012

AUSTRALIAN SUPER

Stronger Super – part of theGovernment’s super reforms – aimsto make the super system easier toadminister and focuses ontechnology to drive efficiencies.

The reforms will start to roll out overthe coming 12 months. But with oursecure online solutions, you can savetime now and get ready beforeStronger Super starts.

To get the most out of an onlinesolution you first need to ask twoquestions. How many employees do Ipay for? And do I pay super to morethan one fund?

Using AustralianSuper’s onlineoptions to make single paymentsFor all your employees inAustralianSuper, you can use our easyand secure online solutions tomanage your super obligations.

AustralianSuper has two onlinesystems that participating employerscan use to send contribution details:

• EmployerOnline Who? Good if you have less than30 employees.How?You enter employee detailsonce and then just update thecontribution amount for eachpayment period.

• Super FileManagerWho? For any size business thatuses an electronic payroll system.How?You upload a payroll file soyou never need to re-keycontribution information.

These online options both work wellwith paying electronically – BPAY®,Electronic Funds Transfer, direct debitand Postbillpay® – and will save youfrom possible future penalties forpaying contributions by cheque underthe new reforms.

To get started online go towww.australiansuper.com/PaySuper and sign up.This only takes aminute or two and you’ll need your

employer number. Or call us on1300 300 273 and we can help.

Using a clearing house to pay superto other fundsTo help make paying super to otherfunds easier, we offer you access to afree clearing house facility.QuickSuper – provided and managedby Westpac – is a simple and secureway to pay and manage the supercontributions for your employees whoaren’t members of AustralianSuper.

To use QuickSuper free-of-charge:• you must be a participating

employer of AustralianSuper• AustralianSuper must be your

default fund, and• at least half of the total number of

your employees must be membersof AustralianSuper.

For more details or to register go towww.australiansuper.com/ClearingHouse or call us on 1300 300 273.

BPAYis registered to BPAYPty Ltd ABN 69 079 137 518. Postbillpay is registered to the Australian Postal Corporation ABN 28 864 970 579.

USING TECHNOLOGY TO SIMPLIFY SUPER

INSIDER_Oct/Nov 2012 Iss5_44pp 26/9/12 11:15 AM Page 16

Page 17: Security Insider Oct/Nov 2012

SECURITY INSIDER OCT/NOV 2012// 17

IINNDDUUSSTTRRYY NNeWWSS

Findings from the survey ofcorporate security specialists:• Over two fifths of the 209 specialists

surveyed admitted they felt thatsecurity was viewed as a 'grudgepurchase' and most accepted thatsecurity was a low priority.

• They felt that in house serviceswere of a higher quality but thatcontract services were better valuefor money.

• The research suggests the needfor the contract security sector toprovide more evidence of itseffectiveness and value against abackground where those buyingsecurity need to be persuaded.

Findings from contract securitycompany managers:• Managers were concerned about

how security was perceived.Almost two thirds felt 'low marginschange the focus of contractsecurity directors/managers fromsecurity to cost control'.

• Over two thirds of 509

directors/managers cited the needto cut costs as a reason forsevering contracts or changingsuppliers.

• When asked about reasons forstaff leaving contract security workmanagers /directors cited poor pay,limited development opportunities,and lack of appreciation as themain push factors.Findings from security operatives:

• Most security guards have theirlicensing fee paid for by theiremployers.

• A quarter of security guards workmore than 60 hours a week.

• Over half of the 504 operativessurveyed agreed that 'most of mycolleagues are totally committed toproviding a quality service'.As Professor Martin Gill who led

the study noted: "Security is facing achallenging time...The security sectorneeds to respond in a more co-ordinated way in highlighting withevidence what you get from a goodsecurity company that you don't getfrom a bad one".

This report is available and can be requested via [email protected] or visit www.perpetuityresearch.com/sri.html.

SURVEY OF THESECURITY SECTOR Every year Perpetuity Research in the UK undertakes a researchproject for the Security Research Initiative (SRI). This year'sreport is based on the findings of three groups: corporatesecurity specialists who buy security, contract security companymanagers, and security operatives (particularly guards).

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 17

Page 18: Security Insider Oct/Nov 2012

CYBERCRIME18 //SECURITY INSIDER OCT/NOV 2012

CCYYBBEERRCCRRIIMMEE

ECONOMIC CRIMETRENDS: THE ERAOF CYBERCRIMEJust under half (47%) of Australian organisations haveexperienced at least one economic crime incident over the past 12months. This is up from 40% in the last PwC survey in 2009 andabove the global average of 34%. More than 50% of the Australianorganisations experiencing fraud had more than 10 incidents offraud, and 16% suffered combined losses of more than $5 million.The raises the question: is there more fraud in Australia or arewe better at detecting fraud? The answer is a bit of both.

By Malcolm Shackell and Andrea Perry

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 18

Page 19: Security Insider Oct/Nov 2012

ERCRIMESECURITY INSIDER OCT/NOV 2012// 19

CCYYBBEERRCCRRIIMMEE

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 19

Page 20: Security Insider Oct/Nov 2012

W hat is particularly interesting is the rapid rise incybercrime – defined as any economic crime wherea computer or the internet plays a central role in the

crime. Cybercrime is now globally ranked the fourth mostcommon form of economic crime. In Australia it is ranked thesecond with 63% of respondents perceiving the risk ofcybercrime to have increased over the last 12 months.

The surveyThe PwC Global Economic Crime Survey has beenconducted every two years since 1999 and in Australia since2001. It is one of the largest and most comprehensive surveysof its kind surveying just under 3,900 organisations in 78countries.The global and Australian surveys were lastreleased in 2009.

Respondents were asked about the types of economiccrimes they had suffered during 2011.The top four economiccrimes experienced in Australia were asset misappropriation,accounting fraud, bribery and corruption and cybercrime.Asset misappropriation was the most common crime,experienced by 86% of respondents.This has been the case

throughout the history of the survey with this categoryincreasing from 64% in 2003.

The survey has identified trends in economic crime withglobal reports of cybercrime and bribery and corruption onthe rise.This is due to a combination of factors includingincreased publicity of these issues and changes in legislationsuch as the UK Bribery Act.

Who is committing fraud? A significant feature of the latest survey results is the apparentshift towards internal fraud, as opposed to external fraud. InAustralia 54% of reported economic crimes were committedby internal fraudsters, increasing from 33% in the last surveyin 2009.These statistics mirror what we are seeing in ourwork, particularly regarding asset misappropriation where wefind the majority of this economic crime is commitment byinternal fraudsters.The exception to this trend is financialservices, telecommunications and retail industries, whereexternal fraud remains the main concern.

The increase of internal fraudsters has elicited queries from

our clients about why there is this apparent shift. Ourexperience tells us that people are experiencing a higher levelof financial hardship in the current environment (the “need”factor) and as always, greed remains a factor. Regardless ofthe reasons, employees are taking advantage of controlweaknesses in organisations to commitment fraud.

We can build a profile of an internal fraudster based on thesurvey responses we received.The average fraudster (55%) isusually young (in their 30s), but with enough experience tounderstand the systems and controls in an organisation.Theyare typically in some sort of management role (90%), or atleast in a position where they can influence the way money orassets leave an organisation.They are usually male (75%),though not exclusively so. Recent major frauds we have seenhave been committed by both sexes, and the male to femaleratio may mirror the gender ratio in many organisations.

Hotspot 1: Asset misappropriationAsset misappropriation includes theft of funds, cash andassets and this type of economic crime is one of the

consistent crimes we see every day in our business. Over thelast year there is no doubt that we have seen a rise incorporate theft of one form or another, but there are threetypes of fraud we are seeing most often: (1) Employeeexpense fraud – we have seen a significant increase in thistype of fraud, potentially because of the ease in which it canbe committed when controls are not enforced.The size ofsome of these frauds is surprising, with organisational lossesrunning into the $100,000s in many cases. (2) Fraudulentinvoicing / suppliers – this method of economic crimeremains the most common way for employees tomisappropriate funds.This type of fraud usually involvesconflicts of interest and fraudulent invoice approvals. Recentlythere has also been increasing evidence of manipulation ofelectronic records such as payment files. (3) Asset write downand theft – we have seen an increase in the occurrence ofhigh value assets being fraudulently written down to zero andthen on sold for scrap or on auction sites by employees.Thisis a particularly problem in the construction, mining andtelecommunications industries. It is important for

20 //SECURITY INSIDER OCT/NOV 2012

CCYYBBEERRCCRRIIMMEE

The increase of internal fraudsters has elicited queries fromour clients about why there is this apparent shift. Ourexperience tells us that people are experiencing a higher levelof financial hardship in the current environment (the “need”factor) and as always, greed remains a factor.

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 20

Page 21: Security Insider Oct/Nov 2012

organisations to review the way they mitigate the risksassociated with the write down and disposal of assets.

Hotspot 2: CybercrimeOne of the more remarkable insights from the survey was theincrease in cybercrime, and respondents are seeing this riskpredominantly as an external risk.The vast majority of whatwe are seeing in cybercrime relates to improper access toand/or theft of electronic information that has value (monetary,competitive advantage, reputation).There are 5 different“motives” for this.1. Insiders (employees or contractors) who have authorised

access to systems, and abuse this access for personalgain (usually employee fraud).This form of cybercrime isclosely linked to asset misappropriation, with the increaseduse of technology creating new avenues for this traditionalfraud.

2. Competitors seeking unfair advantage through theft of oraccess to confidential information.This has occurred inAustralia, however to a much lesser extent than in someother countries. Most of what occurs in this category is inrelation to disgruntled employees.

3. Foreign governments committing espionage for political oreconomic gain. Similar to the previous category this hasoccurred, by is primarily focussed in countries where theline between government and businesses is “blurred”.The

cybercrime techniques used are often extremelysophisticated and difficult to detect.

4. Trans-national criminal enterprises stealing and / orextorting information to generate income.This is arguablythe most common type of external cybercrime and is thefocus of many ITSecurity professionals.There have beenmany high profile examples of this type of crime.Theseincidents are usually associated with major financial andreputational damage to the targeted organisation.Customer information is a highly commoditised item on theinformation black-market with credit card details selling forapproximately $25 and higher prices for matching emailaddresses and passwords.

5. Hactivists protesting against organisational actions orpolicies.This type of motivation has been on the rise, withthe most notable example being the ‘Anonymous’ hackivistattack on Visa.com and Mastercard.com as part of“Operation Payback” in response to Matercard,Visa, Paypaland a number of other payment processing companiesstopping donation transactions to the WikiLeaks group.

Our experience is that most organisations treat cybercrimeas an “IT issue”, when really it is a whole of business issue.Often when we are called in to manage a cybercrime incidentwe find it is more extensive than originally believed, withvictims often being targeted over a lengthy period.When an

SECURITY INSIDER OCT/NOV 2012// 21

CCYYBBEERRCCRRIIMMEE

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 21

Page 22: Security Insider Oct/Nov 2012

incident occurs we recommend that organisations “assume aposition of compromise” rather than assuming their ITsecurityprocedures are adequate. Having a three step strategy forprotecting against and responding to cybercrime is effective.1. Have an incident response plan ready to go as soon as an

incident is suspected.This should include when and whichspecialists to involve.

2. Ensure there is cyber security awareness in the organisationas this goes a long way to delaying or stopping threats.Regular training and well resourced security goes a long way.

3. Involve senior level leadership such as the Board and CEO.This will encourage the “tone from the top” that is so vital forany type of risk awareness.

Hotspot 3: Bribery and corruptionRecent media has highlighted the risks that Australianbusinesses face when operating in countries where the risk ofbribery is high.Whilst it could be said that the actual risk ofbribery has not changed, the consequences of being exposedto bribery and corruption have been heightened.

Under current Australian legislation, the risk forAustralianorganisations is in relation to the payment of bribes to

government officials overseas (by the organisation or theiragents). Most of the incidents we see involve bribery throughlocal agents or through sales staff expenses. In these cases is itrare that Australian executives or the Board are aware of thebribery, although this does not mitigate reputational risk.

Organisations should be aware that changes to anti-briberylegislation are looming.The UK Bribery Act is now law and thislegislation is much more rigorous than the current Australianor United States bribery legislation.There is a strong belief thatthe Australian and United States governments are under

pressure to strengthen their anti-bribery laws, potentially tobring them into line with the UK. There are 4 key differencesbetween our laws and the UK legislation:1. There are no exemptions for“facilitation payments” – this will

have significant impact on companies operating inIndonesia, for example, where minor value facilitationpayments are commonly paid.

2. “Private to private”bribery is covered – this is as opposed toAustralian and United States legislation which is focussedon bribery of foreign officials.

3. A new offence of “failure to prevent” – this means thatexecutives and boards cannot just blame rogue

22 //SECURITY INSIDER OCT/NOV 2012

CCYYBBEERRCCRRIIMMEE

Many organisations continue to remain very reactive – eitherbecause they just hope a problem won’t occur or because theydon’t have the resources or understanding to implementpreventative techniques and detective controls.

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 22

Page 23: Security Insider Oct/Nov 2012

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 23

Page 24: Security Insider Oct/Nov 2012

employees. Organisations have a duty to have “adequateprocedures”, and there is official guidance on whatprevention means.

4. The legislation casts a “wide net’ – which meansorganisations do not have to have significant operationswithin the UK to be covered by the UK Bribery Act in everyother operational location.

Prevention and detection We are regularly asked to advise clients on steps to avoidbeing an economic crime statistic.The key is establishinga fraud control framework which broadly covers threecomponents: prevention, detection and incidentmanagement.The framework should include soundpolicies and training, due diligence procedures to ensureyou know more about those you do with business with(prevention), having a robust control environment withdetective controls and avenues for whistleblowing(detection) and lastly, understand what you have to doquickly should a problem occur (incident management).

Many organisations continue to remain very reactive –either because they just hope a problem won’t occur orbecause they don’t have the resources or understandingto implement preventative techniques and detectivecontrols.There have been some positive trends emergingregarding our ability to detect fraud, with the majority ofsurvey respondents stating they had performed a fraudrisk assessment (which is in our view a vital tool in fraudcontrol). Interestingly, whistleblower techniques andsuspicious transactions analysis (or fraud focused dataanalytics) are being employed more often. In our work weare seeing increasing demand in these areas.

SummaryThe PwC Global Economic Crime Survey has shown the everincreasing impact of fraud from both a value and volumeperspective. Most significantly the survey brought to focus theemergence of cybercrime. Incidents of cybercrime have rapidlyrisen in Australia and many organisations are struggling to stayone step ahead.

Particularly in the current environment, all Australianorganisations should consider the economic crime risks withintheir operations and their capabilities to proactively mitigatethese risks.

24 //SECURITY INSIDER OCT/NOV 2012

CCYYBBEERRCCRRIIMMEE

Andrea Perry is a Senior Consultantin the PwC Forensic Servicespractice specialising in forensicaccounting, investigations andcorporate intelligence.

Malcolm Shackell is a partner in PwC’sforensics practice with over 20 yearsexperience in the prevention,detection andinvestigation of economic crime.

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 24

Page 25: Security Insider Oct/Nov 2012

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 25

Page 26: Security Insider Oct/Nov 2012

The following Guidelines have beenagreed between the AustralasianFire and Emergency ServiceAuthorities Council (AFAC) and theAustralian Security IndustryAssociation Limited (ASIAL).Theyare intended to assist a securitycompany to install, service andmonitor smoke detectors/sensorsconnected to security alarmsystems in an appropriate manner,without requiring detailedknowledge of fire alarm standards,individual state regulations orbuilding codes.

Outside of installed fire safetysystems engineered to therequirements of Australian/NewZealand Standards, the purpose of asmoke detector is to detect thepresence of smoke and alert personson site only. It is important to note thatsmoke detectors/sensors that areconnected to a burglar alarm have notbeen designed to meet the specifictechnical requirements of a systemintended to respond to the fire brigade.

These Guidelines are prepared onthe basis that the intent of includingsmoke detectors / sensors in asecurity system is to provide someadditional protection in addition to anymandatory fire safety requirements.Including smoke detectors in asecurity system may not fulfillmandatory legislative requirements for

hard wired smoke alarms in premises.

1. If the security company is unsure ofthe legal/regulatory requirements forthe installation concerned, it shouldrequest that the customer obtainsclarification from an appropriate fireprofessional before proceeding. Ifthe building to be protected is anew or recently constructedbuilding, the customer should obtaina specification for the smokedetection requirements beforeproceeding.

2. As a general rule, a securitycompany should never install smokedetectors/sensors if the installationis required by legislation, as theinstallation by the security companymay not meet the requirements ofthat legislation. If the customeradvises that the detectors /sensorsare required by legislation, theyshould be directed to anappropriate fire professional foradvice before proceeding.

3. A security alarm system shouldnever be used as the primarymonitoring method for buildings thatare required underlegislation/building codes to have amonitored smoke detection system.

4. A request to call the fire brigade

should always be at the discretionof the customer and a cost may beincurred when the fire brigadeattends a false alarm. Securitycompanies should ensure theircustomers are aware that firebrigades in many states may chargeeither the security provider or theirclients for callouts to false smokealarm activations.

5. Smoke detectors/sensorsconnected to security systemsshould only be supplementarysystems and, as such, if largenumbers of detectors are required(e.g. more than 5) or the number ofsmoke detectors /sensors is greaterthan the number of security devices,the client should obtain advice froman appropriate fire professional.

6. The security system should never beused to control other functions as aresult of the detection of smoke(e.g. activation of door closers,smoke exhaust or shut down of airconditioning). If this is required, thecustomer should be advised toobtain advice from an appropriatefire professional.

7. If after providing this advice to thecustomer they still wish to proceedwith monitoring of the smokedetectors /sensors connected to a

26 //SECURITY INSIDER OCT/NOV 2012

SSMMOOKKEE DDEETTEECCTTOORRSS

Guidelines for the installation and servicing ofsmoke detectors/sensors connected toresidential and commercial security systems.

A joint initiative

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 26

Page 27: Security Insider Oct/Nov 2012

security alarm system it isrecommended that the securitycompany should have the clientsign an appropriate disclaimer.Thisdisclaimer should contain thefollowing as a minimum:

7.1. The installation is notintended to meet anyrequirements of any Act,Regulation or Building Code inregards to a fire detectionsystem including any legalrequirement to have hard-wiredsmoke alarms in the premises.7.2. Security alarm monitoringcentres are not approved firealarm monitoring centres and,whilst they will carry out theirinstructions to the best of theirability, they cannot guarantee thatthe fire brigade will attend anyspecific alarm.7.3. If the client requestsattendance of the fire brigade orauthorises the monitoringcompany to request attendanceof the fire brigade, any costsassociated with this attendancewill be the responsibility of theclient.

8. If the security company is requiredto service existing customers, orcustomers at whose premises theydid not install detectors/ sensors,they should obtain a similar waiver,as per item 7 above, beforecommencing work.

9. In normal circumstances, it isrecommended that heat detectorsnot be connected to security alarmsystems. However, if suitable for asemi-external environment, they maybe used in an attached garage.Thesecurity company needs to ensurethat their sales, installation andservice staff have beenappropriately trained in the correct

use of the products they install aslisted below:

• There are various types ofsmoke detectors/sensorsavailable, from the battery-onlyversion to the mains-poweredtype installed by electricians.• The security industry uses thepower from the alarm panel asthe primary source and musthave a separate battery supplyonboard or on the system.• The selection of the correctdetector/sensor is based on thepurpose of the installation.• The type of transmission pathused to monitor the alarmsystem, which may includesmoke detectors/sensors, shouldbe based on the risk rating of thepremises and, therefore, theClass from 1 to 5 (covered inAS/NZS 2201.5:2008 – AlarmTransmission Systems).• For fire monitoring systems, itis important to know thatconstant monitoring is available.This is normally relevant to Class3, 4 and 5 in the above Standard.• Monitoring of smokedetectors/sensors in an intruderalarm system when coded forregulatory or insurance reasonsshould be performed by amonitoring centre independentlygraded to AS 2201.2:2004,Monitoring Centres.

10. Recommendation should be madeto the client to maintain the systemto the manufacturer’srecommendations, even ifmaintenance is not requested bythe client. AS/NZS 2201.1:2007recommends maintenance becarried out but it is not mandatory.Where smoke detectors/sensorsare installed the client should bemade aware of their responsibility to

test the whole system ifmaintenance is not performed bythe security company.

11.All smoke detection/sensor cablingmust be performed in compliancewith Australian Communicationsand Media Authority (ACMA)regulations.

12.The security company shouldmaintain a log of all smokedetector work performed, as isrequired under AS/NZS2201.1:2007, Intruder alarm systems– Part 1: Client’s premises –Design, installation, commissioningand maintenance.

13. All customer cabling associatedwith the above service must be incompliance with AS/ACIFS009:2006 (telecommunicationscabling Wiring Rules) and all otherrequirements of the AustralianCommunications and MediaAuthority (ACMA) Cabling ProviderRules.

Special note:In some circumstances the fire alarmpanel may also be monitored by asecurity monitoring centre as afailsafe feature. A fire technicianworking on the system should notifythe Facility Manager, isolate the AlarmSignalling Equipment (ASE) and alsonotify the security monitoring centreto avoid unnecessary false alarmresponses from the fire brigade.Details of the security monitoringcentre should be kept on the front ofthe fire panel log book.

A PDF version of the InstallersGuide is available for download onthe ASIAL website or you can [email protected] to requestyour copy.

SECURITY INSIDER OCT/NOV 2012// 27

SSMMOOKKEE DDEETTEECCTTOORRSS

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 27

Page 28: Security Insider Oct/Nov 2012

28 //SECURITY INSIDER OCT/NOV 2012

SSMMOOKKEE DDEETTEECCTTOORRSS

A joint initiative

Purpose of a SmokeDetector/SensorThe purpose of any smoke detectorsensor in your home is to detect thepresence of smoke and sound analarm which in turn provides earlywarning of a fire so that you and yourfamily can get out safely. It is notdesigned to call the fire service.

Why have your SmokeDetectors/Sensors monitoredby a security company?Some people prefer that their smokedetectors/sensors are connected totheir security system and monitoredby a security company.This allows thesecurity company to call you or anominated person if a problem arisesin your home.You may also requestthat your security company calls thefire service for you. If you request thisservice the fire service may charge forattendance if it turns out that there isno fire.The fire service may also haveto force entry into your home if theysuspect a fire.

What you need to know:Fire Services may charge a fee forcallouts initiated by securitycompanies on your behalf if there hasbeen no sign of fire when they arrive.In some states this fee is over $1000.

The legislative requirements for the

installation of smoke alarms vary fromstate to state.Your local fire serviceand in some cases your local councilcan provide advice regarding therequirements. If you install a smokedetector/alarm connected to yoursecurity system, it must be in additionto the smoke alarms required to beinstalled to meet mandatory legislativerequirements in your state.

For all consumer installation,monitoring and maintenanceinformation, refer to the systemmanufacturer or your security serviceprovider.

A PDF version of the ConsumerGuide is available for download onthe ASIAL website or you can [email protected] to requestyour copy.

Smoke Detectors/Alarms connected toMonitored Security Systems InformationGuide for Residential Properties

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 28

Page 29: Security Insider Oct/Nov 2012

CORPORATE MEMBERSAdmiral Security Services

Advanced Communications Riverina

Agilient Pty Ltd

AIG Security Pty Ltd

Alert Venue Services Pty Ltd

Alied Security Solutions Pty Ltd

Allcorp Security Pty Ltd

Allied Security Australia Pty Ltd

All-Locks Master Locksmiths Pty Ltd

APS - Ability Protection Services Pty Ltd

APSE Group

Arc Security Systems Pty Ltd

Archangel Security

Aspect Group (WA) Pty Ltd

Ausi Security Solutions

Australia Wide Security and Protection

AUSTRALIAN AIR HOLIDAYS

Australian Operational Security Service

Australian School of Security and

Investigations

Authorized Security Pty Ltd

Base Security Pty Ltd

Basec Pty Limited

Bens Data Communications &

Electrical Services

Blue Security Qld

BlueCorp Security

Bluestar Security Services

Britech Security Pty Ltd

Casa Security

Cato Logistics Pty Ltd

CCTV Express Pty Ltd

CCTV Online Security

CDIK Pty Ltd

Celebrity Security Pty Ltd

CG security

CMS Data & Electrical Engineering

Pty Ltd

Communicable Pty Ltd

Comsecure Australia

Conceptual Technology Solutions

Pty Limited

CounterThreat Security Services Pty Ltd

Coupar Angus Security

CPD Consulting

Cross Link Security Pty Ltd

CSI Security Australia

Customised Security Group Pty Ltd

Digimax Security Pty Ltd

E Tec Security

Empowered Learning

Endura Security Pty Ltd

Evolution Traffic Control Pty Ltd

FalconCorp Security Services Pty Ltd

Forebode

Foresight Security Planning Pty Ltd

Fortress Security Solutions

Get Smart Gadgets

GROUP 3 SECURITY

Group Force Security Pty Ltd

Grouped Property Services Pty Ltd

GTE Security Services

Guard Dog Security Services

Guard19 Security Group

Guardian Alarms

Guardian Security Solutions

H & H Security Australia Pty Ltd

Haven Protection Services

& Investigations

Holler Security Services

I Spy Security Services Pty Ltd

Insperata Integrated Systems Pty Ltd

Integra Security Solutions PTYLTD

Intellectual Synergy Pty Ltd

Intercept Security

Intervid

IWS Services Pty Ltd

AASSIIAALL NNEEWW MMEEMMBBEERRSS

ASIAL is pleased to welcome the following new members(including Corporate, Associate and Affiliate members) who havejoined the Association over the past few months.

WELCOMETO OURNEW MEMBERS

SECURITY INSIDER OCT/NOV 2012// 29

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 29

Page 30: Security Insider Oct/Nov 2012

JC Protech-tion Security

Justus Protective Services Pty Ltd

Knight Security Group

Leader Security

Lighting Art & Science Pty Ltd

Link Enterprise Solutions Pty Ltd

Lookup.Com

Lykos Protection Group Pty Ld

Maja Security Services

March Networks (Australia) Pty Ltd

Master Security Group (MSG) Pty Ltd

Maxims Security Group Pty Ltd

Maxus Security Services Pty Ltd

McAtamney Pty Ltd

Megabase Pty Ltd

Metro Communications

Mounted Security and Asset Protection

MR Security Pty Ltd

National Vetting Services Pty Ltd

Netcorp GPS Pty Limited

North State Security

NQ Security

On The Spot Cleaning and Security

Pty Ltd

Online Security Protection Pty Ltd

Paragon Risk Management Pty Ltd

Patrons Protective Services

Perth Security Services

Platinum Protection Solutions

Pop-A-Lock

ProCorp Security Services Pty Ltd

Pronto Security Pty Ltd

PSR Security

PTPERTPty Ltd

QA ELECTRICAL PTYLTD

Radiant

RCZ Australia Pty Ltd

Renown Security Group

Rent-A-Cop Pty Ltd

Resolution Security Services Pty Ltd

Rhads Investment Pty Ltd

Robust Services

S.A.S. 1 PTYLTD

Safe Sheild Security Services PTY. LTD.

Safeline Security Service

Salcom

Scope Protective & Data Solutions

Pty Ltd

Secu Corp

Secure Az Pty Ltd

Secure City

Secure Plus Asset Protection Pty Ltd

Securex Pty Ltd

Securezone Security Services

( AUS) Pty Ltd

Securimax

Security Advisers Australia Pty Ltd

Security Awards Pty Limited

Security Network Protection Group

Pty Ltd

Security Risk Management Pty Ltd

Security2u Australia

SERA Group Pty Ltd

Shanx Security

simPRO Software Pty Ltd

Sonic Security Services Pty Ltd

Specialized Infrastructure Security

SSG Security

Stanthorpe Security

Steel Security Group Pty Ltd

Sunrise Security Services Pty Ltd

Tactical K-9 Group

Tamtek Australia Pty Ltd

Taylorm Security

Technical Installations

Tempest Security Solutions

That's All Protection

The Ultimate Protection Group Pty Ltd

Third Eye Surveillance Pty Ltd

TJ Services NSW

Trisquared Pty Ltd

Trust Security Solutions

Twin Cities Security

United Protocol Security Holdings Pty Ltd

United Risk Management Group Pty Ltd

Urban Crowd Control Pty Ltd

VCPG Security Services

Vice Security Port Lincoln

Vodafone Hutchison Australia Pty Ltd

Water Ratz Security Pty Ltd

Wayne L Hall Pty Ltd

Weslo Staff Pty Ltd

Yates Electrical & Communications

Zone Advanced Protection Systems

WELCOMETO OURNEW MEMBERS

30 //SECURITY INSIDER OCT/NOV 2012

AASSIIAALL NNEEWW MMEEMMBBEERRSS

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 30

Page 31: Security Insider Oct/Nov 2012

Between 1 May and 14 September

2012, the following ASIAL members

achieved recognition as either a

silver or bronze member:

Silver (11-15 years membership)

Butlers Not Only Windscreens

Mibyte Technology

Securacore Pty Ltd

Diplomatic Security Protection Services

Pty Ltd

Lamson Concepts Pty Ltd

Davlin Security Group

City Coast Security

The Illawarra Business College

Marbia Security Installations

New Era Enterprises

Pronet Security & Data

AEK Management Aust. Pty Ltd

Technical Solutions International

Nepean Regional Security Pty Ltd

P M Securities Pty Ltd

Bronze (6-10 years membership)

Siga Consulting

G & M Honeyman Pty Ltd

Vladimir John Halaska

Into Security

Eris McCarthy Pty Limited

E & K Richardson FamilyTrust

SIMS Security Systems Pty Ltd

Controlled Access Solution Pty Ltd

Taylor's Property Services Pty Ltd

Armitage Alarms Pty Ltd

ASIAL Member Recognition Levels

• Platinum: 25 years + membership

• Gold: 16-24 years membership

• Silver: 11-15 years membership

• Bronze: 6-10 years membership

If you have not already signed up to

the ASIAL Member recognition

program or would like to find out

more, visit

www.asial.com.au/Memberrecognitio

nprogram.

ASIAL MEMBER RECOGNITIONPROGRAM

MMEEMMBBEERR RREECCOOGGNNIITTIIOONN PPRROOGGRRAAMM

SECURITY INSIDER OCT/NOV 2012// 31

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:11 PM Page 31

Page 32: Security Insider Oct/Nov 2012

Surveillance devices usually cover optical, tracking, listeningand data. Data surveillance devices are devices or programscapable of being used to record or monitor the input ofinformation into, or the output of information from a computer.

Global Positioning Satellite (GPS) systems, software formonitoring of email and internet use, CCTV surveillance andphone recording applications are all readily available for useby employers to ensure the health and safety of employeesand to identify performance and conduct issues should theyarise.

The aim of this article is to provide some direction on whatlegislation exists and what the implications are for employers.It is not intended to be exhaustive or cover every scenario.

Tracking DevicesIn New South Wales the Workplace Surveillance Act 2005(the Act) covers the use of surveillance systems in the

workplace.The Act regulates both the use of CCTV, computerand tracking surveillance devices.

New South Wales also has the Surveillance Devices Act2005, which defines a “tracking device” and how it may beused. In NSW, NTand the ACTa tracking device is one that iscapable of being used to determine the location of a personor an object, whilst in Victoria (Surveillance Devices Act 1999(Vic)) determining the location must be the primary purpose ofthe device. For example in a recent case , FairWork Australia(FWA) found at the first instance that an electronic devicewhich was capable of reporting the geographical position of avehicle was not an 'electronic tracking device' for the purposeof the Surveillance Devices Act, as the 'primary purpose' ofthe system was to monitor the environment in which cold-stored goods were being transported. For this reason, theemployer was not required to notify the employee that it wasinstalled. In Victoria, the Surveillance Devices Act 1999 also

32 //SECURITY INSIDER OCT/NOV 2012

IIRR AADDVVIICCEE && SSUUPPPPOORRTT

SURVEILLANCEDEVICES–AREEMPLOYERS LOOKINGAT ALL OF THEIMPLICATIONS?By Chris Delaney

Advances in technology have added new dimensions toemployers' opportunities to monitor employee conduct.However, not all states and territories have in place legislationthat cover surveillance in the work place. Other surveillancelegislation both State and Federal may impact on an employer’sopportunity to gather and use the information.

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:11 PM Page 32

Page 33: Security Insider Oct/Nov 2012

regulates the use of data surveillance devices.Western Australia is similar to NSW.Their legislation is the

Surveillance Devices Act 1998 (WA). In South Australiatracking devices are defined, but nothing in the legislationprohibits or even regulates their private or commercial use.

There is no state legislation dealing with tracking devices ineither Queensland orTasmania.

Listening DevicesMost states have legislation dealing with listening to and/orrecording conversations, however there are subtle (yetextremely important) differences, most evident in thedefinition of “private conversations” and the rules relating to“consent”.

In Victoria, a party with the consent of the other parties toa conversation may record the conversation or install thedevice to record the conversation. In a case run in heFederal Court the Court held that a secretly tapedconversation was admissible as evidence as it did notcontravene the Surveillance Devices Act, because one of theparties to the conversation had intended to tape theconversation.This meant that it did not fall within thedefinition of 'private conversation', which requires 'theparties' to the conversation to desire it to be private.Whilstthe secret taping could be seen as an invasion of theprivacy and as involving underhand tactics, it could not besaid to have breach the Act.

In New South Wales the laws are similar, however a party toa conversation may record it, without the consent of others toprotect the own lawful interests if necessary at a later point intime. (Surveillance Devices Act 2005 (NSW)).

Queensland is similar to NSW. A private conversation isdefined as one where the principal parties could reasonablyexpect not to be overheard. If it is not a private conversationthe use of a listening device may not be restricted. (Invasionof Privacy Act 1971 (QLD)).

The ACTis similar, however there is not an exception forwhere the parties may expect to be overheard (ListeningDevices Act 1992 (ACT)).

Northern Territory prohibits the installation, use ormaintenance of a listening device used to record or monitor aprivate conversation without the consent of the parties orwhere it is known that it will be without the consent of theparties (Surveillance Devices Act 2007 (NT)).

In South Australia you may not use a listening device tooverhear, record, monitor or listen to a private conversationwithout the consent of all the parties, unless it is in the courseof your job, in the public interest or for the protection of yourinterests. (Listening and Surveillance Devices Act 1972 (SA)).

Tasmanian legislation allows the recording of aconversation with the consent of one of the principal parties if

it is to protect the interests of the parties (Listening DevicesAct 1991(TAS)).

Optical Surveillance DevicesThe common misconception is that these devices arecameras, CCTV or mobile phone cameras, however alsoincluded are binoculars, telescopes and the like as they allowobservation – recording is not the only activity covered.

In New South Wales you can only install an opticalsurveillance device in premises or motor vehicles with theconsent of the owner or occupier. In a workplace you mustgive employees 14 days notice in writing of the use of overtdevices. Covert devices require the approval of a magistrate(Surveillance Devices Act 2005 (NSW) and WorkplaceSurveillance Act 2005 (NSW)).

In Victoria using an optical surveillance device to view orrecord a private activity, regardless of where it is taking place,

SECURITY INSIDER OCT/NOV 2012// 33

IIRR AADDVVIICCEE && SSUUPPPPOORRTT

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:11 PM Page 33

Page 34: Security Insider Oct/Nov 2012

is prohibited (Surveillance Devices Act 1999 (VIC)).Queensland legislation proscribes the use of an optical

surveillance device without the consent of the person wherethey are in a private place or could reasonably expect theiractions to be private. Private acts are defined in the legislation(Criminal Code Act 1899 (QLD)).

In South Australia and Tasmania and the ACTopticalsurveillance is not restricted by specific legislation howevermay come under listening devices legislation if it recordssound.

In Western Australia, optical surveillance devices cannot beused to view or record a private activity, regardless of wherethat activity takes place (Surveillance Devices Act 1998(WA).

The Northern Territory is similar to WA.

Workplace surveillance may constituteadverse actionIt is possible that an employer's actions in carrying outworkplace surveillance could invoke a breach of theexpansive general protection provisions of the FairWork Act2009 (FW Act).

The general protection provisions in the FW Act prohibitemployers taking certain 'adverse action' against employees.The surveillance of an employee (either within or outside theworkplace), even where compliant with any existingsurveillance legislation, could potentially constitute 'adverseaction', if it is held to 'alter the position of the employee to theemployee's prejudice'. There is an argument that the invasivenature of surveillance, particularly where it might monitorpersonal conversations or emails, could be construed asadverse to an employee's right to privacy in the workplace.

Introducing workplace surveillanceand ConsultationEmployers should be aware that the introduction of workplacesurveillance may require it to be dealt with under aconsultation clause in an applicable modern award orenterprise agreement. It is always better to consult withemployees and develop policies that are acceptable to bothparties and meet the operational and legislative needs of theworkplace.

Most modern awards and the FairWork Act requireconsultation where a decision with have a significant impacton employees for example termination of employment. It isimportant that employers are aware of whether the

introduction of surveillance would set off the consultation.Failing to consult with employees may result in fines orpenalties from a Court.

Employers should ensure that when introducing the use ofworkplace surveillance devices, that they provide anexplanation to employees of when and how any form ofsurveillance will work, how investigations or data audits will beconducted and the ramifications of any breaches.

Relying on Surveillance as EvidenceEvidence obtained from surveillance devices will not alwaysbe accepted as evidence in litigation.This will depend in partupon the particular forum of the proceedings, and alsowhether the employer has notified employees that thesurveillance is in place.

Courts have the discretion to exclude evidence that wasobtained 'improperly or in contravention of an Australianlaw', unless 'the desirability of admitting the evidenceoutweighs the undesirability of admitting evidence'. In NSWcovert surveillance would not be admissible, if the relevantcourt authority had not been obtained under the WorkplaceSurveillance Act.

Relying solely on surveillance without other supportingevidence can result in an unsuccessful outcome in unfairdismissal claims. In 2008 the AIRC ruled that the dismissal oftwo employees for misrepresenting the extent of their medicalcondition was unfair.

The employees were both on restricted duties when theywere both captured on video surveillance during a weekendcamping trip undertaking activities that were allegedlyinconsistent with their restrictions. Both employees had theiremployment terminated for misconduct.

In the unfair dismissal claims, the Australian IndustrialRelations Commission (AIRC) found that the videosurveillance footage, in the absence of evidence from thetreating doctor, was not enough to prove that either employeehad misrepresented the extent of their injuries to the treatingdoctor.The failure to corroborate the evidence that bothemployees had misrepresented their medical conditionsresulted in the dismissals being unjust and unreasonable.

The content of this article is intended to provide a generalguide to the subject matter. It is not, nor is it intended to belegal advice. Specialist advice should be sought about yourspecific circumstances before making any action.

Note:The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this

information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific.

Accordingly, we provide this information for general reference only, but we advise you to take no action without prior reference to

an Employee Relations professional. ASIAL members can contact Chris Delaney by emailing [email protected]

34 //SECURITY INSIDER OCT/NOV 2012

IIRR AADDVVIICCEE && SSUUPPPPOORRTT

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:11 PM Page 34

Page 35: Security Insider Oct/Nov 2012

SECURITY INSIDER OCT/NOV 2012// 35

DDEESSIIGGNNIINNGG OOUUTT CCRRIIMMEE

THE ROLE OF SECURITYIN DESIGNING OUT CRIMEBy Dr Lindsay Asquith*

The Designing Out Crime ResearchCentre (DOC) is internationally recognisedas a leader in innovative,creative andsocially responsive design.DOC is a jointinitiative of the University of Technology,Sydney (UTS) and the NSW Department ofAttorney General and Justice.Ourability tointegrate crime risk,Saferby Designprinciples and crime research into theexploration and identification of crimeproblems and assessment of designrecommendations is a rare attribute.Wework with a breadth of clients, fromgovernment agencies to privatecompanies,and apply a range of methodsand skills that are unique to ourmulti-disciplinary team.

Central to ourway of working iswhereverpossible to avoid taking a‘countermeasures’approach to reducingcrime.Problem-solving in the area of safetyand security often focuses oncountermeasures – solutions that focus onconstraining individual behaviour,manifestin interventions such as physical barriers,increased security, increased CCTV,andharsherpunishments foroffending.Thisapproach can contribute to fearand theperception of fear,causing environments tofeel,paradoxically, less safe than beforeand initiating a spiral of under-use that caneventually create environments that fostercrime.

At DOC ourdesign team reframes theinitial problem context with the aim ofredefining a crime orsecurity problem interms of broadersocial and environmentalissues.This process makes the problemmore amenable to design interventionsand allows designers to remain focused

on desired outcomes rather than fixatingon the problem itself.

One of the tools we use in thereframing process is stakeholderand dutyholdermapping,where we aim to engageand empathise with the people andorganisations connected with the situationin which the problem occurs.Ouraim is toascertain their stake and theircurrent rolewithin the problem context.

The security industry is a commonstakeholder in many of ourplace-basedprojects, yet the industry’s needs andexperience are often under-represented inthe design process.This is a lostopportunity.We view the security industryas an untapped knowledge bank,andbelieve that by engaging with security

expertise at the start,designers get aricherdesign process that results,ultimately, in betterdesign solutions.

An example of the importance ofengaging the security industry in thedesign process is illustrated in somerecent work we carried out for the City ofSydney in the Kings Cross area.KingsCross,with its high proportion of bars andclubs,attracts about 30,000 people (mostunder30 years of age) every Friday andSaturday night,and has a well-establishedreputation forproblems such asdrunkenness, fights,petty theft,drugdealing and sporadic violence.Over theyears, law enforcement tactics such asincreased police presence, restrictions ontrading,and increased CCTVand security

We view the security industry as an untapped knowledge bank...

INSIDER_Oct/Nov 2012 Iss5_44pp 26/9/12 5:35 AM Page 35

Page 36: Security Insider Oct/Nov 2012

personnel at clubs have been employed tosolve these issues but they have persisted.

In search of a more effective alternativeto this ‘law-and-order’approach,we turnedourattention to the social andenvironmental context of Kings Cross toinform the design process.The revellersgetting into trouble at Kings Cross are,overwhelmingly, young people looking foragood time in a precinct apparently madefor the purpose.So what goes wrong?

To answer this question we tried toreframe these (apparently) criminal issuesusing the analogy of a music festival.Events such as the various musicfestivals held in Sydney each year arecomparable to Kings Cross in thenumber of revellers they attract; they arealso at risk of many of the same alcoholand crowd-fuelled problems. Knowingthat a single well-publicised disastercould signal the demise of all futureevents, festival organisers aim toanticipate the problems that get theirpatrons into trouble with others and thelaw and manage them in a positive,non-antagonistic way.

In talking with the security industryas a key stakeholder we learned thatthe industry plays a big role in crowdmanagement at these sorts of events,where specially trained and taskedpersonnel are integral to the smoothfunctioning of the event and the safetyof patrons. Redefining Kings Cross atnight as a major event and looking theproblem from a crowd managementand public safety point of view (ratherthan a law enforcement point of view)helped our designers come up withmany new ideas.

The current situation at Kings Crossis that buses and trains stop at 1am,around two hours before mostpartygoers are ready to go home.Thisleads to crowds of bored, frustratedand aggressive people queuing for in-demand taxis in the early hours of themorning. Our designers proposedincreased transport, as well as a

system of temporary signage to helppartygoers find an alternative trainstation with a late-night service.

In Kings Cross people congregatearound a few big clubs and often thequeues for each are long, causingcongested footpaths anddissatisfaction among those waiting.Our designers proposed a smartphoneapp that would allow patrons to checkthe waiting time for the next club beforeleaving the one they are in. Anothersuggestion was to encouragepedestrian movement down theadjacent laneways by creating relaxed‘chill-out’ spaces equipped withdrinking water fountains to help combatintoxication.

A significant amount of crowd-related disorder at Kings Cross resultsfrom (often inebriated) patrons beingunable to find their way around. At DOCwe proposed a system of very visible,

approachable young guides in bright T-shirts who would help partygoersnavigate the area and provide specifichealth and safety assistance if needed.This would also help security personnelconcentrate on issues that require theirspecific knowledge and training.

This example in Kings Crossprovides insight into the value ofdrawing on stakeholder expertise andexperience and why the securityindustry is an important partner.

The first Design and CrimeConference and Exhibition is beingheld in Sydney on December 12-13th2012 and real life problems like KingsCross will be workshopped byinternationally renowned academicsand practitioners involved in this rapidlygrowing field.We’d love to involvesecurity in this conversation.Visitwww.designandcrime.com to find outmore and register your attendance.

*Dr Lindsay Asquith is a Research Officer with the Designing Out Crime Research Centre, Faculty of Design, Architecture and Building,University of Technology Sydney.

36 //SECURITY INSIDER OCT/NOV 2012

DDEESSIIGGNNIINNGG OOUUTT CCRRIIMMEE

INSIDER_Oct/Nov 2012 Iss5_44pp 26/9/12 5:35 AM Page 36

Page 37: Security Insider Oct/Nov 2012

SIG 2012

The 24th annual Security In Governmentconference was held at the National ConventionCentre, Canberra from 3 – 5 September. ASIALwas a major sponsor of the event which attracted400 conference delegates and over 95 exhibitors.

SIG 2013 will be held in Canberra from the 12th-14th August 2013SIG 2013 will be held in Canberra from 12 -14 August

The Hon Nicola Roxon MP, Attorney-GeneralPaul Cave AM, Chairman and Founder, BridgeClimb

SECURITY INSIDER OCT/NOV 2012// 37

INSIDER_Oct/Nov 2012 Iss5_44pp 26/9/12 11:26 AM Page 37

Page 38: Security Insider Oct/Nov 2012

38 //SECURITY INSIDER OCT/NOV 2012

ADT Security NSW 366 A1 09 Mar 2013

Allcare Monitoring Services WA 379 A2 28 Feb 2014

ARM Security WA 360 A1 10 Mar 2013

ART Security VIC 392 A1 30 Sep 2014

Calamity Monitoring NSW 383 A1 20 Mar 2014

Central Monitoring Services NSW 380 B1 21 Mar 2014

Commonwealth Bank of Australia NSW 389 A1 24 Sep 2014

Energize Australia VIC 391 C2 18 Mar 2014

Golden Electronics TAS 395 A1 17 Oct 2014

Grade One Monitoring NSW 378 A1 13 Feb 2014

Grid Security Services NSW 381 A1 18 Mar 2014

GSS Asset Management QLD 385 C2 31 Oct 2012

Instant Security Alarms QLD 365 A1 29 May 2013

Insurance Australia Limited (operating with Insurance Australia Data Centre) NSW 377 C1 17 Jan 2014

ISS Security NSW 373 B3 25 Nov 2013

Linfox Armaguard VIC 393 A1 08 Aug 2014

NSS Group NSW 384 A1 07 May 2014

Onwatch NSW 375 B1 08 Oct 2012

Paul-Tec Australia NSW 367 A1 28 Feb 2013

Protection Pacific Security VIC 394 C2 9 Aug 2014

RAA Security Services SA 358 A1 12 Dec 2012

Secom Australia NSW 374 A1 14 Dec 2013

Sectrol Security VIC 369 B2 19 Aug 2013

Securemonitoring VIC 370 A1 23 Nov 2013

Securenet Monitoring Services NSW 386 A1 04 May 2014

Security Alarm Monitoring Service SA 387 A1 18 Jun 2014

Security Control Room VIC 362 A1 06 May 2013

Sesco Security WA 364 A1 03 Jun 2013

SMC Australia QLD 372 A1 07 Dec 2013

SMC Australia VIC 371 A1 16 Dec 2013

SNP Security (Newcastle) NSW 368 A1 17 Aug 2013

SNP Security (Sydney) NSW 390 A1 31 May 2013

Spectus WA 376 A1 28 Dec 2013

State Government Protective Security Service QLD 388 C1 22 May 2014

Westpac Banking Corporation NSW 382 A1 19 Mar 2014

Woolworths Limited NSW 351 C1 04 Nov 2012

Company (short form name) State Cert. No. Grade Expires

ASIAL Certified Security Monitoring Centres*

Current as at: 13 September 2012

*The above-listed ASIAL Certified monitoring centres comprise those establishments that have been inspected and graded forcompliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for listedcompanies which may change the nature of their operations subsequent to Certification.

Australian Security IndustryAssociation Limited

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:11 PM Page 38

Page 39: Security Insider Oct/Nov 2012

HHOOTT PPRROODDUUCCTTSS

HF-1 Needle-Proof KevlarMetal Detection Glovesn UniGuard Management & Security > 1300 133 366n Email > [email protected] Web > www.uniguard.com.au

New Video Analysis ToolsFor The MOBOTIX Q24Mn Central Security Distribution > 1300 319 499n Email > [email protected] Web > www.centralsd.com.au

MOBOTIX has enhanced image data processing inside the camera withthe MxAnalytics video analysis tools thus offering new and valuableinformation sources. For example: How many people go in and out of aselected entrance during the day? Which shelves in the shop attracted themost customers this month?

MxAnalytics makes it possible to track the movement of people andobjects in the image and to collect statistical behaviour data. For thispurpose heat maps, highlighting the most frequented areas, can be createdand counting lines defined. All this added functionality is available as a freedownload for supported cameras.

Kenwei’s popular touch sense intercomis now available in a 2-wire modeln Central Security Distribution > 1300 319 499n Email > [email protected] Web > www.centralsd.com.au

Supporting up to two external door stations in addition to twostandard CCTV cameras, the KW-S702C-T series can be easilyoperated yet provides an impressive list of features.

Directly PAGE any one or all four room stations at the press of abutton, view the front door camera and remotely unlock the door orgate. The Do Not Disturb feature allows a room station to be isolatedand CCTV surveillance cameras can be added to improve securityeven further.

Up to three extra monitors, available in black or white finishes aresupported, and best of all... it’s a 2 wire product.

HF–1 gloves give the operator the ability to have hands free metal detectionwith the protection of Kevlar. This gives the wearer added protection fromhypodermic needles, knives and razor blades.

They are light weight and comfortable to wear as well as being easy to usewith no adjustments necessary for use. Just switch on and they are ready togo. Available as a pair or singularly.Product Specifications:Sizes: L, XL, XXL, Weight: 149g (approx), Battery: Standard 9V Alkaline, BatteryLife: 400 hours, Sensitivity: 0.5g,Warranty: 12 month manufacturer warranty.

NEW!

SECURITY INSIDER OCT/NOV 2012// 39

NEW!

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:11 PM Page 39

Page 40: Security Insider Oct/Nov 2012

HHOOTT PPRROODDUUCCTTSS

New Tamper Evident Chambern Harcor Security Seals & Bags > +612 9454 4200n Email > [email protected] Web > www.harcor.com.au

simPRO Field Mobilityn simPro > 1300 139 467n Email > [email protected] Web > www.simpro.com.au

Your time is money and your hours are billable. Cut your travel and admin timedown by at least 20% per day per person with simPRO Field Mobility.

Our range of simPRO Field Mobility options let you and your staff stayconnected and keep your entire system up-to-date with real-time overview ofthe labour, material and equipment costs incurred, the margin you haveapplied and the invoiced amount.

Our SmartPhone version is optimised for phone sized devices such asAndroid, Windows Mobile, iPhone and devices such as the Datalogic Elf.

Get out and about with simPRO Field Mobility and simplify your businessprocesses so you can spend more time making money, not chasing it.

Pelco Digital Sentry Network VideoRecorder – DSSRVn Pelco by Schneider Electric > +612 9125 9310n Email > [email protected] Web > www.pelco.com

40 //SECURITY INSIDER OCT/NOV 2012

Flexible IP VMS for mainstream security applicationsThe new Pelco Digital Sentry Network Video Recorder provides allthe power you need to maximise HD recording and leverage existinganalogue investments. With 280 Mbps bandwidth, support for up to 128IP streams, increased storage options and built-in reliability, thispowerful new platform delivers more HD capability than ever before.Thenew Pelco Digital Sentry can accommodate up to 64 analogue camerasat D1 resolution and full frame rate. Simplify and optimise your videosecurity platform and choose the new Pelco Digital Sentry as your one-stop solution for all the HD and analogue recording power you need.

The high level of security, environmental and cost benefits offered, areincreasing the popularity of reusable tamper evident bags. Designedspecifically to set a new standard in tamper evident security, Harcor haslaunched the Only Tamper Evident Chamber.

We’ve created a range of different TEC chambers to suit the needs ofour clients. These chambers all include Harcor’s newly patented“Fracture Safe” design.

In addition to the increased security, the new robust chamberscontinue to provide reliable sealing and easy opening/closing of reusablesecurity bags.

For additional information on reusable tamper evident bags or to see ademo of the TEC Chamber please visit www.harcor.com.au

NEW!

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:12 PM Page 40

Page 41: Security Insider Oct/Nov 2012

HHOOTT PPRROODDUUCCTTSS

Award Winning PANOMERAn CR Kennedy > +613 9823 1555n Email > [email protected] Web > www.crkennedy.com.au/surveillance

Smartphone Control for Concept3000/4000 Systemsn For more information contact:n Web > www.innerrange.comn Web > www.centralsd.com.au

Inner Range has released a WEB interface kit designed to provide convenientcontrol of Concept Security Systems via any web browser. It is optimized for use onportable smart touchscreen devices such as iPhones, iPads,Android Mobile Devicesand Tablet PC's, but can be used on any device with a WEB browser application.

Smartphones can be used to remotely control Concept Security Systems fromanywhere in the world.There are no additional apps to install orpurchase – simply useyourdevices existing web browser.The userscreens are intuitive and provide a simpleuser-friendly layout that is very easy to use. The Concept WEB interface providesMulti-User login,Arming & Disarming of SecurityAreas,Locking & Unlocking of Doors,Control of Home Automation Devices and viewing of system reviews events.

Inner Range Rack Mount Enclosuren For more information contact:n Web > www.innerrange.comn Web > www.centralsd.com.au

Inner Range has released a universal Rack Mount Enclosure designed foruse with its Concept and Integriti system hardware. Featuring a trulyuniversal design that allows virtually all Inner Range System Controllers orLAN modules to be installed into a 19” rack equipment cabinet withoutrestricting critical access to cabling, termination of connections or accessfor commissioning and maintenance purposes. Flexible installation optionsallow the rack mounted drawer to be configured to meet a vast array ofspecifications, allowing mix & match installation of System Controllers,Universal Expanders, Relay Cards, Access Control Modules, InputExpanders, UniBus Expansion Cards, Multipath Communications Devicesand up to 4 Doors of fully Intelligent Access Control.Inner Range Melbourne: www.innerrange.com.

Dallmeier is famous for creating the world’s largest Casinosurveillance systems in places such as Macau and Singapore.Panomera is Dallmeier’s completely new camera technology forsurveillance of very large areas. It offers a panoramic overview with real-time HD recording, so can significantly reduce infrastructurerequirements. Projects such as Airports, sporting arenas etc previouslyrequiring huge numbers of cameras, can now be covered withPanomera. Unlike Megapixel systems, Panomera uses H.264 encodingto deliver up to 51 megapixels in real time.

Panomera won the coveted “CCTV Camera Equipment of the Year”Award at IFSEC 2011.The first showing of Panomera in Australia was atthe Security 2012 show.

NEW!

SECURITY INSIDER OCT/NOV 2012// 41

NEW!

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:12 PM Page 41

Page 42: Security Insider Oct/Nov 2012

ASIAL NATIONALCALENDAR OF EVENTS 2012/2013

To find out more register online www.asial.com.au/eventscourses or email [email protected]

OCTOBERQLD Industry Breakfast Briefing7.30-9.00am, 10 October 2012Niche Event Spaces, Stones Corner, BrisbaneSpeakers include: representatives from QLD Fire& Rescue Service and the Fair Work Ombudsman.

ACT Industry Breakfast Briefing7.30-9.00am, 17th October 2012Belconnen Premier Inn, CanberraSpeakers include: representatives from ACT FireService and the Fair Work Ombudsman

SA Industry Breakfast Briefing7.30-9.00am, 18th October 2012Sebel Playford Hotel, AdelaideSpeakers include: representatives from SAMetropolitan Fire Service and the Fair WorkOmbudsman.

WA Industry Breakfast Briefing7.30-9.00am, 19 October 2012Hotel Northbridge, PerthSpeakers include: The Hon LizaHarvey MLA (pictured), Minister forPolice and Emergency Services.

TAS Industry Breakfast Briefing7.30-9.00am, 19 October 2012Hobart Function and Convention CentreSpeakers include: a representative from theTasmanian Fire Service.

SECURITY INDUSTRY LEADERSHIP PROGRAM23-25 October 2012Macquarie Graduate School of ManagementConference Centre.

NOVEMBERVIC Industry Breakfast Briefing7.30-9.00am, 23rd November 2012Quality Hotel Batman's Hill on Collins623 Collins Street, Melbourne Speakers include: a representative from theVictorian Fire Service.

NSW Industry Breakfast Briefing7.30-9.30am, 28th November 2012Mantra Hotel, ParramattaSpeakers include: representatives from theSecurity Licensing & Enforcement Directorate(SLED) and the Fair Work Ombudsman.

ASIAL 43rd Annual General Meeting28th November 20128.45am, Mantra Hotel, Parramatta

2013FEBRUARYSecurity Industry Leadership Program19-21 February 2013Melbourne Business School200 Leicester Street, Carlton VIC 3053

MAY2013 Australian Security IndustryAwards for Excellence2 May 2013Park Hyatt Hotel, Melbourne.

JULYSecurity 2013 Exhibition& Conference24-26 July 2013, Sydney Convention & ExhibitionCentre, Darling Harbour.

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:12 PM Page 42

Page 43: Security Insider Oct/Nov 2012

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:12 PM Page 43

Page 44: Security Insider Oct/Nov 2012

INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:12 PM Page 44